CN105553675B - Log in the method and device of router - Google Patents

Log in the method and device of router Download PDF

Info

Publication number
CN105553675B
CN105553675B CN201610066596.4A CN201610066596A CN105553675B CN 105553675 B CN105553675 B CN 105553675B CN 201610066596 A CN201610066596 A CN 201610066596A CN 105553675 B CN105553675 B CN 105553675B
Authority
CN
China
Prior art keywords
terminal
router
random code
authorization token
binding relationship
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610066596.4A
Other languages
Chinese (zh)
Other versions
CN105553675A (en
Inventor
曹丁鹏
陈勇
王益冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610066596.4A priority Critical patent/CN105553675B/en
Publication of CN105553675A publication Critical patent/CN105553675A/en
Application granted granted Critical
Publication of CN105553675B publication Critical patent/CN105553675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Artificial Intelligence (AREA)
  • Toxicology (AREA)
  • General Health & Medical Sciences (AREA)
  • Electromagnetism (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The disclosure is directed to a kind of method and devices for logging in router, belong to network technique field.Router is by receiving the verification information sent with the second terminal for itself having binding relationship in the disclosure, when the second random code that verification information carries is identical as the first random code that itself is generated, generate authorization token, and the authorization token is sent to send the first terminal of logging request, first terminal logs in router by the authorization token.So, when user forgets Password, verification information is sent to the router by the second terminal bound with router, so that router is based on the binding relationship with second terminal, first terminal currently to want to log in generates authorization token, so that first terminal can use the authorization token and be logged in, to avoid the need for obtaining factory default setting password by way of factory reset, the integrality of history setting data when logging in router ensure that.

Description

Log in the method and device of router
Technical field
This disclosure relates to network technique field, in particular to a kind of method and device for logging in router.
Background technique
With the fast development of network technology, router enters into huge numbers of families as network access equipment extensively.When Limit power is carried out to the terminal address of couple in router, alternatively, to router distribution IP (Internet Protocol, network association View) when being configured, user needs to be managed router, during to router administration, needs for the mode of address Login password.
In the related art, " resetting (reset) " key is typically provided on router, when user forgets login password When, it can be by triggering the key, so that router factory reset, so that the login password of router restores to going out The password of default setting when factory, user can pass through the password login router of the default setting.
Summary of the invention
The embodiment of the present disclosure provides a kind of method and device for logging in router.The technical solution is as follows:
According to the first aspect of the embodiments of the present disclosure, a kind of method for logging in router is provided, comprising:
When receiving the logging request of first terminal transmission, pattern identification is generated, the pattern identification is for providing road The first random code generated in this login by device;
Receive second terminal send verification information, the verification information carry the second terminal end message and Second random code;
When the end message and stored binding relationship according to the second terminal, the second terminal and institute are determined It states and has binding relationship between router, and when first random code and second random code match, generate warrant Board;
The authorization token is sent to the first terminal, the authorization token is for the first terminal to the road It is logged in by device.
In the first possible implementation of the first aspect of the embodiment of the present disclosure, the reception second terminal is sent Verification information before, the method also includes:
The bind request of the second terminal is received, the bind request carries the end message of the second terminal;
According to the end message of the second terminal, the binding established between the second terminal and the router is closed System.
In second of possible implementation of the first aspect of the embodiment of the present disclosure, the generation authorization token it Afterwards, the method also includes:
When reaching for the first specified time, the authorization token is set to failure, first specified time is apart from institute State the time point that authorization token generates time preset duration.
In the third possible implementation of the first aspect of the embodiment of the present disclosure, second random code is by described Second terminal is scanned to obtain to pattern identification shown on the first terminal.
In the 4th kind of possible implementation of the first aspect of the embodiment of the present disclosure, the method also includes:
When reaching for the second specified time, first random code is set to failure, second specified time is distance First random code generates the time point of time preset duration.
According to the second aspect of an embodiment of the present disclosure, a kind of device for logging in router is provided, comprising:
Generation module, for generating pattern identification, the figure mark when receiving the logging request of first terminal transmission Know the first random code generated in this login for providing router;
Receiving module, for receiving the verification information of second terminal transmission, the verification information carries the second terminal End message and the second random code;
The generation module is also used to when the end message and stored binding relationship according to the second terminal, really Have binding relationship, and first random code and the second random code phase between the fixed second terminal and the router When matching, authorization token is generated;
Sending module, for the authorization token to be sent to the first terminal, the authorization token is for described the One terminal logs in the router.
In the first possible implementation of the second aspect of the embodiment of the present disclosure, the receiving module is also used to connect The bind request of the second terminal is received, the bind request carries the end message of the second terminal;
Described device further include:
Module is established, for the end message according to the second terminal, establishes the second terminal and the router Between binding relationship.
In second of possible implementation of the second aspect of the embodiment of the present disclosure, described device further include:
Configuration module, for the authorization token being set to failure, described first is specified when reaching for the first specified time Time is the time point that time preset duration is generated apart from the authorization token.
In the third possible implementation of the second aspect of the embodiment of the present disclosure, second random code is by described Second terminal is scanned to obtain to pattern identification shown on the first terminal.
In the 4th kind of possible implementation of the second aspect of the embodiment of the present disclosure, the configuration module is also used to When reaching for the second specified time, first random code is set to failure, second specified time be apart from described first with The time point of machine code generation time preset duration.
According to the third aspect of an embodiment of the present disclosure, a kind of device for logging in router is provided, comprising:
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is used for:
When receiving the logging request of first terminal transmission, pattern identification is generated, the pattern identification is for providing road The first random code generated in this login by device;
Receive second terminal send verification information, the verification information carry the second terminal end message and Second random code;
When the end message and stored binding relationship according to the second terminal, the second terminal and institute are determined It states and has binding relationship between router, and when first random code and second random code match, generate warrant Board;
The authorization token is sent to the first terminal, the authorization token is for the first terminal to the road It is logged in by device.
The technical solution that the embodiment of the present disclosure provides can include the following benefits:
Router is taken by receiving the verification information sent with the second terminal for itself having binding relationship in verification information When second random code of band is identical as the first random code that itself is generated, authorization token is generated, and to send the of logging request One terminal sends the authorization token, and first terminal logs in router by the authorization token.In this way, when using When family forgets Password, verification information is sent to the router by the second terminal bound with router, so that router is based on With the binding relationship of second terminal, the first terminal logged in generation authorization token is wanted to be current, allows first terminal sharp It is logged in the authorization token, thus avoid the need for obtaining factory default setting password by way of factory reset, It ensure that the integrality of history setting data when logging in router.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.
Figure 1A is a kind of schematic diagram of implementation environment shown according to an exemplary embodiment.
Figure 1B is a kind of method flow diagram for logging in router shown according to an exemplary embodiment.
Fig. 2 is a kind of method flow diagram of the login router shown according to another exemplary embodiment.
Fig. 3 is a kind of device block diagram for logging in router shown according to an exemplary embodiment.
Fig. 4 is a kind of device block diagram of the login router shown according to another exemplary embodiment.
Fig. 5 is a kind of block diagram of device 500 for logging in router shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all implementations consistent with this disclosure.On the contrary, they be only with it is such as appended The example of the consistent device and method of some aspects be described in detail in claims, the disclosure.
The method that the embodiment of the present disclosure provides, can be by router as executing subject.Involved in the present embodiment First terminal and second terminal can be mobile phone, tablet computer and computer etc..Wherein, second terminal has scanning patter mark The function of the function of knowledge, scanning patter mark can be realized by the application installed in second terminal.Figure 1A is please referred to, is A kind of schematic diagram of implementation environment shown according to an exemplary embodiment, the implementation environment include mobile phone 110, computer 120 And router 130.It respectively can be by wired between mobile phone 110 and router 130, between computer 120 and router 130 Mode or wireless mode establish communication connection.Wherein, wireless mode may include by bluetooth (Bluetooth), Wi-Fi Modes such as (Wireless Fidelity, Wireless Fidelitys) establish communication connection.
Figure 1B is a kind of method flow diagram for logging in router shown according to an exemplary embodiment.The login router Method may include the following steps:
In a step 101, when receiving the logging request of first terminal transmission, pattern identification, the pattern identification are generated The first random code generated in this login for providing router.
In a step 102, the verification information that second terminal is sent is received, which carries the terminal letter of second terminal Breath and the second random code.
In step 103, when the end message and stored binding relationship according to second terminal, second terminal is determined Have binding relationship between router, and when the first random code and the second random code match, generates authorization token.
At step 104, authorization token is sent to first terminal, the authorization token for first terminal to router into Row logs in.
The method that the embodiment of the present disclosure provides, router are sent by receiving with the second terminal for itself having binding relationship Verification information, verification information carry the second random code it is identical with the first random code that itself is generated when, generation warrant Board, and the authorization token is sent to send the first terminal of logging request, allow first terminal to pass through the authorization token pair Router is logged in.In this way, being sent by the second terminal bound with router to the router when user forgets Password Verification information, so that router wants the first terminal logged in generation authorization based on the binding relationship with second terminal, to be current Token, so that first terminal can use the authorization token and be logged in, to avoid the need for the side by factory reset Formula obtains factory default setting password, ensure that the integrality of history setting data when logging in router.
Based on the method for above-mentioned offer, in one possible implementation, the verifying for receiving second terminal and sending Before information, the method also includes: the bind request of the second terminal is received, the bind request carries described second eventually The end message at end;According to the end message of the second terminal, tying up between the second terminal and the router is established Determine relationship.
Above by the binding relationship established between second terminal and router so that only router just for this second The verification information that terminal is sent is authorized, and the safety of router is improved.
In alternatively possible implementation, after the generation authorization token, the method also includes:
When reaching for the first specified time, the authorization token is set to failure, first specified time is apart from institute State the time point that authorization token generates time preset duration.
Above by the validity period that authorization token generated is arranged, so that after the first specified time, the is limited One terminal logs in router again by the authorization token, ensure that the safety of router.
In alternatively possible implementation, second random code is by the second terminal on the first terminal Shown pattern identification is scanned to obtain.
Above-mentioned second terminal is obtained the second random code, is mentioned by way of the pattern identification shown on scanning first terminal The high convenience of operation.
In alternatively possible implementation, the method also includes:
When reaching for the second specified time, first random code is set to failure, second specified time is distance First random code generates the time point of time preset duration.
Above by the validity period that the first random code generated is arranged, so that first random code is in no utility value In the case where, the first random code can be deleted in time, improve the safety of router.
All the above alternatives can form the alternative embodiment of the disclosure, herein no longer using any combination It repeats one by one.
Fig. 2 is a kind of method flow diagram of the login router shown according to another exemplary embodiment.Login routing The method of device may include the following steps:
In step 201, the bind request of second terminal is received, which carries the end message of second terminal.
The method that the embodiment of the present disclosure provides, for the safety of router, in the mistake for carrying out default setting to router Cheng Zhong, user can set the terminal for having binding relationship with itself for second terminal in the router.
Specifically, second terminal sends bind request to router, and the terminal letter of second terminal is carried in the bind request Breath.Wherein, which can be the account logged in the second terminal, or terminal iidentification, for example, second is whole End is millet account etc..Correspondingly, router receives the bind request that second terminal is sent.
In step 202, according to the end message of second terminal, the binding established between second terminal and router is closed System.
After router receives the end message of second terminal, according to the end message of the second terminal and the road of itself By device mark or the physical address of router, the binding relationship between second terminal is established.
When establishing binding relationship, if there is multiple second terminals in family or office space, it can establish multiple Binding relationship between two terminals and router, that is to say, for router, can preserve multiple second terminals to one The binding relationship of a router.
Certainly, it should be noted that the above-mentioned binding relationship established between second terminal and router can also pass through clothes Business device is realized.Specifically, second terminal sends bind request, carried terminal information and routing in the bind request to server The mark of device.After server receives the bind request, according to the mark of the end message of second terminal and router, establish Binding relationship between second terminal and router.In this way, establishing the binding between second terminal and router by server Relationship, can reduce the burden of the router, and the disclosure is not especially limited this.For example, the end of the second terminal received Client information is Terminal User1, and router is identified as Router N, then in the server, establishes second terminal and the road It is as shown in table 1 below by the binding relationship between device.
Table 1
Bindings group Second terminal information The mark of router
n Terminal User1 Router N
It should be noted that the example above be only it is exemplary, binding relationship between second terminal and router can be with There are other binding forms, the disclosure is not construed as limiting this.
In step 203, when receiving the logging request of first terminal transmission, pattern identification, the pattern identification are generated The first random code generated in this login for providing router.
Wherein, communication connection, Yong Huke are established by wired mode or wireless mode between first terminal and router To open the login interface of router by first terminal.In one possible implementation, it is provided on login interface Specified option, the specified option are used to indicate first terminal and send logging request to router, that is, are somebody's turn to do when detecting that user triggers When specified option, first terminal sends logging request to router.In alternatively possible implementation, when detecting user When opening the login interface of router, first terminal sends logging request to router, certainly, it should be noted that this In the case of, if the known account and password for logging in router of user, can directly be stepped on using the known account and password Router is recorded, that is, does not need to log in by subsequent step.
When router receives the logging request, pattern identification is generated, and return to first terminal, first terminal receives When to the pattern identification, the pattern identification is shown on login interface.In one possible implementation, which can Think two dimensional code.Wherein, which includes the first random code, which is asked by router receiving login It is random to generate when asking.Verification information of first random code for router to send second terminal is verified, and can specifically be joined See step 205.
In one possible implementation, when reaching for the second specified time, the first random code is set to failure, this Two specified times were the time point that the first random code of distance generates time preset duration.Wherein, preset duration can be by router Default setting, can also be by user's customized setting according to actual needs.
In above-mentioned possible implementation, router generate the first random code after, may in longer period of time, First random code not be used to verify the verification information that second terminal is sent, it may be considered that first random code can Utility value can be had no longer, for example, user is had sent to router stepped on respectively by first terminal A and first terminal B Record request upon receiving the registration request, generates the first random code corresponding with first terminal A in the router respectively 12345, and the first random code 25634 corresponding with first terminal B, still, if user finally merely desires to step on by first terminal A Router is recorded, then the first random code 12345 corresponding with first terminal A may be used to verify, and corresponding with first terminal B The first random code 25634 will not be used to verify again.In alternatively possible implementation, the first random code by with In verifying.For two kinds of possible implementations of above-mentioned offer, it may be considered that first random code fails.Therefore, it is generating When the first random code, router, which obtains, generates the time, after preset duration, that is, when reaching for the second specified time, and router First random code is set to failure.In this way, the safety of router can be improved by the term of validity of the first random code of setting Property.
For example, preset duration is 30 minutes if the generation time of the first random code is, then reach at 12 points 30 minutes at 12 points When, the first random code is set in vain by router.
In step 204, the verification information that second terminal is sent is received, which carries the terminal letter of second terminal Breath and the second random code.
First random code and the second random code provided in above-described embodiment be only used for distinguish distinct device receive or The random code of transmission, for example, the first random code is the random code that router generates, and the second random code is what second terminal was sent Random code that is to say that second random code can be identical as the first random code, can also be different, under identical circumstances, explanation The obtained random code of pattern identification actually provided really by scanning first terminal transmitted by the second terminal, and in difference In the case where, illustrate different from random code provided by first terminal transmitted by second terminal, it may be possible to situations such as stealing chain.
Wherein, the second random code is scanned to obtain by second terminal to pattern identification shown on first terminal, example Such as, if the pattern identification is two dimensional code, the second random code is scanned acquisition to the two dimensional code by second terminal.Verifying letter The second random code is at least carried in breath, whether which matches for router verification with the first random code.
After second terminal gets random code by scanning patter mark, the end message of itself and random code generation are tested Information is demonstrate,proved, and the verification information is sent to the router, correspondingly, router receives the verification information that second terminal is sent.
In one possible implementation, if establishing binding relationship by server between second terminal and router, Then receiving the verification information that second terminal is sent can also include: the mark that the verification information also carries router, the router Mark be used for one router of unique identification.After second terminal obtains the verification information, which is sent to service Device, wherein the end message of second terminal, the mark and the second random code of router are carried in the verification information, wherein the For indicating that whom the verification information sent by, the mark of router will be sent out the end message of two terminals for identifying the verification information Whom gives.After server receives the verification information, according to the mark of the end message of second terminal and router, second is judged Whether there is binding relationship between terminal and router, however, it is determined that there is binding relationship, then will be forwarded to routing to verification information In device, correspondingly, router receives the verification information forwarded from server.Otherwise, however, it is determined that do not have binding relationship, service The verification information is not transmitted to router by device.
In step 205, when the end message and stored binding relationship according to second terminal, second terminal is determined Have binding relationship between router, and when the first random code and the second random code match, generates authorization token.
As described above, the binding relationship between second terminal and router is stored in advance in router, router receives The verification information that second terminal is sent determines that second is whole according to end message and the binding relationship that the verification information carries There is binding relationship, then it is assumed that received verification information is to have administration authority to the router between end and router Terminal is sent, and can be authorized.
Specifically, router obtains the second random code from verification information, judges first random code and the second random code Whether match, and when determining matching, generates authorization token.Otherwise, authorization token is not generated.The authorization token is used to indicate Router allows first terminal to log in, for example, authorization token can be token token.Wherein, above-mentioned judgement first random code It can be to judge whether the first random code and the second random code are identical with whether the second random code matches.
In one possible implementation, when reaching for the first specified time, authorization token is set to failure, this first Specified time is the time point that time preset duration is generated apart from authorization token.
During practical application, if first terminal exits the login of router, after a period of time has passed, if The authorization token is effective always, and other users still can use the first terminal to log in the router, in this way, not can guarantee road By the safety of device.For this purpose, router, which obtains, generates the time, and after preset duration, that is, arrives when authorization token generates Up to the first specified time, which is set to failure, that is, first terminal can not log in road by the authorization token again By device.If first terminal is wanted to log in router, need to verify verification information again through second terminal.In this way, can To guarantee the safety of router.
In one possible implementation, as described above, if router receives the verification information that server is sent, When determining that the first random code and the second random code match, authorization token is generated.
In step 206, authorization token is sent to first terminal, the authorization token for first terminal to router into Row logs in.
After router generates authorization token, which is sent to first terminal, in this way, first terminal can lead to The authorization token is crossed, router is logged in.
In fact, after router is that first terminal generates authorization token, it can be straight by the logging state of first terminal Switch through to be changed to and log in.And after authorization token is sent to first terminal, first terminal can sent to router every time When control instruction, the authorization token is carried, so that router when receiving the control instruction for carrying authorization token, responds The control instruction of the first terminal, the control instruction may include instructing to the modification of router setting, currently transporting to router The switching command etc. of row state, the disclosure is not specifically limited in this embodiment.
In one possible implementation, when first terminal receives authorization token, router is stepped on automatically Record.In alternatively possible implementation, when first terminal receives authorization token, popped up in current display interface Dialog box is selected, the option for whether determining and logging in router is provided in the selection dialog box, when first terminal detects user When triggering determines the option for logging in router, which is logged in.
The method that the embodiment of the present disclosure provides, router are sent by receiving with the second terminal for itself having binding relationship Verification information, verification information carry the second random code it is identical with the first random code that itself is generated when, generation warrant Board, and the authorization token is sent to send the first terminal of logging request, allow first terminal to pass through the authorization token pair Router is logged in.In this way, being sent by the second terminal bound with router to the router when user forgets Password Verification information, so that router wants the first terminal logged in generation authorization based on the binding relationship with second terminal, to be current Token, so that first terminal can use the authorization token and be logged in, to avoid the need for the side by factory reset Formula obtains factory default setting password, ensure that the integrality of history setting data when logging in router.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 3 is a kind of device block diagram for logging in router shown according to an exemplary embodiment, the login router Device being implemented in combination with by software, hardware or both.The device of the login router may include:
Generation module 310, for generating pattern identification, the figure when receiving the logging request of first terminal transmission Shape identifies the first random code generated in this login for providing router;
Receiving module 320, for receiving the verification information of second terminal transmission, the verification information carries described second eventually The end message at end and the second random code;
The generation module 310, for working as end message and stored binding relationship according to the second terminal, Determine have binding relationship between the second terminal and the router, and first random code and second random code When matching, authorization token is generated;
Sending module 330, for the authorization token to be sent to the first terminal, the authorization token is for described First terminal logs in the router.
The device that the embodiment of the present disclosure provides, router are sent by receiving with the second terminal for itself having binding relationship Verification information, verification information carry the second random code it is identical with the first random code that itself is generated when, generation warrant Board, and the authorization token is sent to send the first terminal of logging request, allow first terminal to pass through the authorization token pair Router is logged in.In this way, being sent by the second terminal bound with router to the router when user forgets Password Verification information, so that router wants the first terminal logged in generation authorization based on the binding relationship with second terminal, to be current Token, so that first terminal can use the authorization token and be logged in, to avoid the need for the side by factory reset Formula obtains factory default setting password, ensure that the integrality of history setting data when logging in router.
Based on the device of above-mentioned offer, referring to FIG. 4, in one possible implementation, the receiving module 320 is also For receiving the bind request of the second terminal, the bind request carries the end message of the second terminal;
Described device further include:
Module 340 is established, for the end message according to the second terminal, establishes the second terminal and the routing Binding relationship between device.
In alternatively possible implementation, described device further include:
The authorization token is set to failure for when reaching for the first specified time by configuration module 350, and described first Specified time is the time point that time preset duration is generated apart from the authorization token.
In alternatively possible implementation, second random code is by the second terminal on the first terminal Shown pattern identification is scanned to obtain.
In alternatively possible implementation, the configuration module 350 is also used to when reaching for the second specified time, will First random code is set to failure, and second specified time is to generate time preset duration apart from first random code Time point.
It should be noted is that above-described embodiment provides the device for logging in router in the method for realizing login router When, it, can according to actual needs will be above-mentioned only with the division progress of above-mentioned each functional module for example, in practical application Function distribution is completed by different functional modules, i.e., the content structure of equipment is divided into different functional modules, with complete with The all or part of function of upper description.In addition, wherein modules execute the tool of operation about the device in above-described embodiment Body mode is described in detail in the embodiment of the method, and no detailed explanation will be given here.
Fig. 5 is a kind of block diagram of device 500 for logging in router shown according to an exemplary embodiment.For example, device 500 may be provided as a router.Referring to Fig. 5, it further comprises one or more that device 500, which includes processing component 522, Processor, and the memory resource as representated by memory 532, for storing the instruction that can be executed by processing component 522, example Such as application program.The application program stored in memory 532 may include it is one or more each correspond to one group The module of instruction.In addition, processing component 522 is configured as executing instruction, provided with executing above-mentioned Fig. 1 or embodiment illustrated in fig. 2 Login router method.
Device 500 can also include the power management that a power supply module 526 is configured as executive device 500, and one has Line or radio network interface 550 are configured as device 500 being connected to network and input and output (I/O) interface 558.Dress Setting 500 can operate based on the operating system for being stored in memory 532, such as Windows ServerTM, Mac OS XTM, UnixTM,LinuxTM, FreeBSDTMOr it is similar.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (11)

1. a kind of method for logging in router, which is characterized in that the described method includes:
When receiving the logging request of first terminal transmission, pattern identification is generated, the pattern identification is for providing router The first random code generated in this login;
The verification information that second terminal is sent is received, the verification information carries the end message and second of the second terminal Random code;
When the end message and stored binding relationship according to the second terminal, the second terminal and the road are determined By having binding relationship between device, and when first random code and second random code match, authorization token, institute are generated It states router and preserves multiple second terminals to the binding relationship of the router;
The authorization token is sent to the first terminal, the authorization token is for the first terminal to the router It is logged in.
2. the method according to claim 1, wherein it is described receive second terminal send verification information before, The method also includes:
The bind request of the second terminal is received, the bind request carries the end message of the second terminal;
According to the end message of the second terminal, the binding relationship between the second terminal and the router is established.
3. the method according to claim 1, wherein after the generation authorization token, the method also includes:
When reaching for the first specified time, the authorization token is set to failure, first specified time is to award described in distance Weigh the time point that token generates time preset duration.
4. the method according to claim 1, wherein second random code is by the second terminal to described Shown pattern identification is scanned to obtain in one terminal.
5. the method according to claim 1, wherein the method also includes:
When reaching for the second specified time, first random code is set to failure, second specified time is described in distance The time point of first random code generation time preset duration.
6. a kind of device for logging in router, which is characterized in that described device includes:
Generation module, for generating pattern identification when receiving the logging request of first terminal transmission, the pattern identification is used In the first random code that offer router generates in this login;
Receiving module, for receiving the verification information of second terminal transmission, the verification information carries the end of the second terminal Client information and the second random code;
The generation module is also used to determine institute when the end message and stored binding relationship according to the second terminal It states and has binding relationship between second terminal and the router, and first random code matches with second random code When, authorization token is generated, the router preserves multiple second terminals to the binding relationship of the router;
Sending module, for the authorization token to be sent to the first terminal, the authorization token is whole for described first End logs in the router.
7. device according to claim 6, which is characterized in that the receiving module is also used to receive the second terminal Bind request, the bind request carry the end message of the second terminal;
Described device further include:
Module is established, for the end message according to the second terminal, is established between the second terminal and the router Binding relationship.
8. device according to claim 6, which is characterized in that described device further include:
Configuration module, for when reaching for the first specified time, the authorization token to be set to failure, first specified time For the time point for generating time preset duration apart from the authorization token.
9. device according to claim 6, which is characterized in that second random code is by the second terminal to described Shown pattern identification is scanned to obtain in one terminal.
10. device according to claim 6, which is characterized in that described device further include:
First random code is set to failure for when reaching for the second specified time by configuration module, it is described second it is specified when Between for apart from first random code generate time preset duration time point.
11. a kind of device for logging in router characterized by comprising
Processor;
For storing the memory of the executable instruction of the processor;
Wherein, the processor is used for:
When receiving the logging request of first terminal transmission, pattern identification is generated, the pattern identification is for providing router The first random code generated in this login;
The verification information that second terminal is sent is received, the verification information carries the end message and second of the second terminal Random code;
When the end message and stored binding relationship according to the second terminal, the second terminal and the road are determined By having binding relationship between device, and when first random code and second random code match, authorization token, institute are generated It states router and preserves multiple second terminals to the binding relationship of the router;
The authorization token is sent to the first terminal, the authorization token is for the first terminal to the router It is logged in.
CN201610066596.4A 2016-01-29 2016-01-29 Log in the method and device of router Active CN105553675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610066596.4A CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610066596.4A CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Publications (2)

Publication Number Publication Date
CN105553675A CN105553675A (en) 2016-05-04
CN105553675B true CN105553675B (en) 2019-05-10

Family

ID=55832618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610066596.4A Active CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Country Status (1)

Country Link
CN (1) CN105553675B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391572A (en) * 2015-10-15 2016-03-09 上海寰创通信科技股份有限公司 Method for restoring factory configuration of equipment
CN106878002B (en) 2016-07-05 2020-04-24 阿里巴巴集团控股有限公司 Permission revocation method and device
CN111935173A (en) * 2020-08-25 2020-11-13 南方电网科学研究院有限责任公司 Router login verification method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955174A (en) * 2014-03-25 2015-09-30 上海宽带技术及应用工程研究中心 Intelligent router and login method thereof
CN105141537A (en) * 2015-10-16 2015-12-09 上海斐讯数据通信技术有限公司 Method of processing router login request by terminal and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105392136A (en) * 2014-09-09 2016-03-09 中兴通讯股份有限公司 Method and device for access to router based on two-dimensional code

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955174A (en) * 2014-03-25 2015-09-30 上海宽带技术及应用工程研究中心 Intelligent router and login method thereof
CN105141537A (en) * 2015-10-16 2015-12-09 上海斐讯数据通信技术有限公司 Method of processing router login request by terminal and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"如何在手机和ipad上同时登入微信 微信同时登录IPAD教程";不详;《跑跑车手机网》;20141123;第1页第4段-第3页第2段,图3-6

Also Published As

Publication number Publication date
CN105553675A (en) 2016-05-04

Similar Documents

Publication Publication Date Title
CN108768970B (en) Binding method of intelligent equipment, identity authentication platform and storage medium
US11831629B2 (en) Server for providing a token
CN104601590B (en) A kind of login method, server and mobile terminal
CN105162777B (en) A kind of wireless network login method and device
CN108235319A (en) Allow for the communication between equipment
CN106411517B (en) A kind of password remapping method and device
CN104052775B (en) Right management method, device and the system of a kind of cloud platform service
CN110266642A (en) Identity identifying method and server, electronic equipment
CN105743841A (en) Intelligent hotel room facility control authority distribution method, client and system
US9319882B2 (en) Method for mutual authentication between a terminal and a remote server by means of a third-party portal
CN102143492B (en) Method for establishing virtual private network (VPN) connection, mobile terminal and server
CN105553675B (en) Log in the method and device of router
CN106453349B (en) Account login method and device
CN105722072A (en) Business authorization method, device, system and router
CN105763517A (en) Router security access and control method and system
CN105636030B (en) Share the method and device of access point
CN114189863A (en) Binding method and device of intelligent door lock, storage medium and electronic device
CN114363067B (en) Network access control method, device, computer equipment and storage medium
CN107766717A (en) A kind of access control method, apparatus and system
CN102113297A (en) Configuration of a communication device
CN103259785B (en) The authentication method of virtual token and system
CN113422712B (en) Network distribution method, network distribution device, household equipment and computer readable storage medium
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment
CN110072235B (en) Networking method and device for intelligent equipment, electronic device and storage medium
US9532215B2 (en) Secure deployment of terminals in a wireless network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant