CN105898747A - Wireless network security authentication method and device and wireless network access method and device - Google Patents
Wireless network security authentication method and device and wireless network access method and device Download PDFInfo
- Publication number
- CN105898747A CN105898747A CN201610317120.3A CN201610317120A CN105898747A CN 105898747 A CN105898747 A CN 105898747A CN 201610317120 A CN201610317120 A CN 201610317120A CN 105898747 A CN105898747 A CN 105898747A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- dimensional code
- access
- mac address
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000001914 filtration Methods 0.000 abstract description 5
- 230000009286 beneficial effect Effects 0.000 abstract description 3
- 238000012423 maintenance Methods 0.000 abstract description 3
- 230000000694 effects Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 4
- 238000005336 cracking Methods 0.000 description 3
- 230000009977 dual effect Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000001066 destructive effect Effects 0.000 description 1
- 238000011010 flushing procedure Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention is suitable for the technical field of network security authentication, and provides a wireless network security authentication method and device and a wireless network access method and device. The authentication method comprises the steps of: generating and displaying a two-dimensional code for accessing an AP (Access Point) according to a wireless AP name and a one-time AP password; receiving an MAC (Media Access Control) address provided by a user terminal after scanning of the two-dimensional code for accessing the AP; adding the provided MAC address into a list of MAC addresses that are allowed to surf the Internet; and generating and displaying a two-dimensional code for the user terminal to access a wireless network according to the provided MAC address and an Internet-surfing password. The wireless network security authentication method and device and the wireless network access method and device have the beneficial effects: 1) the trouble of manually setting MAC address filtering is avoided, thereby simplifying the network management; 2) a password does not need to be input manually, so that the access speed of the user terminal is increased, and the access effect is improved; and 3) the two-dimensional code which corresponds to the MAC address is generated, and failure time such as failure on a next day can be set for the two-dimensional code, so that a temporary user is isolated easily, and a complicated MAC address maintenance operation is omitted.
Description
Technical Field
The invention belongs to the technical field of network security authentication, and particularly relates to a wireless network security authentication and access method and an authentication and access device.
Background
With the popularization of wireless networks, many stores are equipped with wireless networks, and customers can browse web pages, see documents and other applications through the wireless networks by connecting to the wireless networks through user terminals so as to enjoy internet experiences brought by the wireless networks.
However, in the current wireless network authentication method, a router or a gateway needs to manually maintain and update the MAC address list, the network management is complicated, a user terminal needs to manually input a password, the network use is complicated, and the dual convenience of the network management and the network use is difficult to realize. The reason for this is the following two aspects:
on the first hand, the existing wireless terminal and wireless AP hot spot use password mode to carry out safety certification, but the cracking technology is continuously developed, and the events that the family wireless route is rubbed by others and the company network is cracked to carry out destructive activities and the like occur, so that the prevention is not sufficient.
In the second aspect, the current wireless terminal has a function of filtering the MAC address, and can allow or deny a computer in the wireless network to access the wide area network through the MAC address, but the operation is very complicated for a common user, and the user needs to pay attention to maintaining and updating the MAC address list, so that the experience is poor.
Disclosure of Invention
The embodiment of the invention aims to provide a wireless network security authentication method, aiming at solving the problem that the existing wireless network authentication method is difficult to realize the dual convenience of network management and network use.
The embodiment of the invention is realized in such a way that a wireless network security authentication method comprises the following steps:
generating and displaying a two-dimensional code of the access AP according to the name of the wireless access AP and the disposable AP password;
receiving an MAC address provided by a user terminal after scanning a two-dimensional code accessed to an AP;
adding the provided MAC address into an MAC address list allowing internet access;
and generating and displaying the two-dimensional code of the user terminal accessing the wireless network according to the provided MAC address and the password of the internet access.
Another objective of an embodiment of the present invention is to provide a wireless network access method, including:
accessing the AP by scanning the two-dimensional code accessed to the AP;
providing the MAC address to the accessed AP;
and accessing the wireless network by scanning the two-dimensional code accessed to the wireless network.
Another objective of an embodiment of the present invention is to provide a wireless network security authentication apparatus, including:
the two-dimensional code display module of the access AP is used for generating and displaying the two-dimensional code of the access AP according to the name of the wireless access point AP and the disposable AP password;
the MAC address receiving module is used for receiving an MAC address provided by the user terminal after scanning the two-dimensional code accessed to the AP;
the MAC address adding module is used for adding the provided MAC address into an MAC address list allowing to access the Internet;
and the two-dimension code display module is used for generating and displaying the two-dimension code of the user terminal accessed to the wireless network according to the provided MAC address and the password of the internet access.
Another objective of an embodiment of the present invention is to provide a wireless network access apparatus, including:
the AP access module is used for accessing the AP by scanning the two-dimensional code accessed to the AP;
the MAC address module is used for providing an MAC address for the accessed AP;
and the wireless network access module is used for accessing the wireless network by scanning the two-dimensional code accessed to the wireless network.
In the embodiment of the invention, the provided MAC address is added into an MAC address list allowing internet access; and generating and displaying the two-dimensional code of the user terminal accessing the wireless network according to the provided MAC address and the password of the internet access. Therefore, the problem that the existing wireless network authentication method is difficult to realize dual convenience in network management and network use is solved. The method has the following specific beneficial effects and scenes:
under a home network, the mode can effectively avoid network congestion caused by password cracking, the speed is slow, and meanwhile, the trouble of manually setting MAC address filtering is avoided, for example, when a friend or a relative logs in a router to make a visitor at home, the MAC address of the friend is added, and the trouble is very troublesome. Meanwhile, strangers cannot enter the home to scan the two-dimensional code twice, and the home network security is completely avoided.
In restaurants, restaurants and other business occasions, WiFi is provided for many restaurants, coffee shops and the like at present, but passwords are provided for customers who need to enter the store for consumption, but now cracking and sharing technologies are advanced, many hot spots actually become public WiFi, and troubles are caused to business place operators.
In important network occasions such as a company network and the like, by utilizing the technical scheme, wireless terminals such as a router and the like can be arranged at key parts such as a machine room and the like, and staff can scan and join the network only by registering and applying, so that the network is ensured to only face a few users with authority, and the information safety is ensured.
The scheme of the invention greatly improves the security of user password input and well improves the use experience of the terminal user.
Drawings
Fig. 1 is a flowchart of an implementation of a wireless network security authentication method provided in an embodiment of the present invention;
fig. 2 is a flowchart of implementing step S101 of a wireless network security authentication method provided in an embodiment of the present invention;
fig. 3 is a flowchart of an implementation of a wireless network access method according to an embodiment of the present invention;
FIG. 4 is a flow chart of a preferred embodiment of the present invention, illustrating a method for wireless network security authentication in practical applications;
fig. 5 is a block diagram of a wireless network security authentication apparatus according to an embodiment of the present invention;
fig. 6 is a block diagram of a wireless network access device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Example one
Fig. 1 is a flowchart of an implementation of a wireless network security authentication method provided in an embodiment of the present invention, which is detailed as follows:
in step S101, generating and displaying a two-dimensional code of an Access Point (AP) according to the name of the AP and a disposable AP password;
wherein the AP comprises at least one of an AP of WIFI and an AP of WAPI.
WIFI: wireless Fidelity, Wireless Fidelity.
WAPI: wireless LAN Authentication and Privacy Infrastructure.
Step S101, specifically:
generating and displaying a two-dimensional code accessed to the AP according to the WiFi name and the one-time WiFi password;
or,
and generating and displaying the two-dimensional code accessed to the AP according to the WAPI name and the disposable WAPI password.
In step S102, receiving an MAC address provided by the user terminal after scanning the two-dimensional code of the access AP;
in step S103, adding the provided MAC address to an MAC address list allowing internet access;
reading the system time;
when the system time reaches the set time, the MAC address list is reset.
Resetting the MAC address list by MAC address flushing in the MAC address list
In step S104, a two-dimensional code of the user terminal accessing the wireless network is generated and displayed according to the provided MAC address and the password for accessing the internet.
And the two-dimensional code of the user terminal accessing the wireless network corresponds to the provided MAC address.
Wherein, one MAC address corresponds to a two-dimensional code of a user terminal accessing a wireless network.
Setting the failure time of the two-dimensional code of the user terminal accessing the wireless network;
acquiring the generation time of the two-dimensional code of the user terminal accessing the wireless network;
and if the generation time reaches the failure time, identifying the two-dimensional code of the user terminal accessed to the wireless network as the failed two-dimensional code.
The user terminal cannot access the wireless network through the invalid two-dimensional code, so that temporary users are isolated.
In the embodiment of the invention, the method has the obvious advantages of simple and easy operation, safety and good user experience. The user can finish the trust equipment binding and the internet surfing setting only by scanning for 2 times, is suitable for the requirement of the safety of the passwords on different occasions, has wide application prospect and deep commercial value, and has the following three main beneficial effects, which are detailed as follows:
1) the trouble of manually setting MAC address filtering is avoided, and network management is greatly simplified;
2) the password does not need to be input manually, so that the access speed of the user terminal is increased, and the access effect is improved.
3) The two-dimensional code corresponding to the MAC address is generated, even if the untrusted device takes the previous two-dimensional code, the untrusted device cannot access the two-dimensional code, meanwhile, failure time setting can be performed on the two-dimensional code, and if the untrusted device fails every other day, temporary users are easily isolated, and complicated MAC address maintenance operation is omitted.
Example two
The embodiment of the invention describes an implementation process for generating and displaying a two-dimensional code accessed to an AP, and the detailed description is as follows:
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the one-time WiFi password.
EXAMPLE III
Fig. 2 is a flowchart of implementing step S101 of the wireless network security authentication method provided in the embodiment of the present invention, which is detailed as follows:
randomly generating a WiFi password;
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the randomly generated WiFi password.
Example four
The embodiment of the invention describes an implementation process for configuring the password of the internet access, which is detailed as follows:
before generating and displaying the two-dimensional code of the user terminal accessing the wireless network according to the provided MAC address and the password of surfing the internet, the wireless network security authentication method further comprises the following steps:
and configuring a password for surfing the Internet.
EXAMPLE five
Fig. 3 is a flowchart of an implementation of a wireless network access method according to an embodiment of the present invention, which is detailed as follows:
in step S301, the AP is accessed by scanning the two-dimensional code accessed to the AP;
in step S302, a MAC address is provided to the accessed AP;
in step S303, the wireless network is accessed by scanning the two-dimensional code accessed to the wireless network.
The invention has the characteristic of easy use, and is very humanized in combination with a method of combining MAC address filtering and password verification, wherein the link is a two-dimensional code, and by utilizing the characteristics that shared WiFi hotspots and wireless AP hotspots are both provided for trusted people, trusted users can join the wireless network by using a scanning function at a short distance, thereby realizing safe sharing of wireless network resources.
And other untrusted people, such as a network user, cannot scan the two-dimensional code, and further, the two-dimensional code can be generated to be related to a certain MAC address, so that untrusted equipment cannot be accessed even if the untrusted equipment takes the previous two-dimensional code, and meanwhile, failure time setting can be carried out on the two-dimensional code, such as failure every other day, and temporary users can also be distinguished by using a simple mode, and complicated MAC address maintenance operation is avoided.
EXAMPLE six
Fig. 4 is a flowchart illustrating a wireless network security authentication method according to an embodiment of the present invention, which is a preferred implementation in practical applications, and is detailed as follows:
generating an initial two-dimensional code by the AP;
scanning a link AP by a user terminal through a camera;
the AP judges whether or not;
a blacklist device;
submitting equipment information to the AP, and confirming handshake;
the AP adds this device MAC address to the trusted list;
the AP regenerates a two-dimensional code display related to the equipment;
the user terminal uses the camera to scan and join the wireless network to surf the internet.
EXAMPLE seven
Fig. 5 is a block diagram of a wireless network security authentication apparatus provided in an embodiment of the present invention, which may be operated in a wireless terminal, including but not limited to a router and a gateway. For convenience of explanation, only the portions related to the present embodiment are shown.
The two-dimensional code display module 51 is accessed to the AP, and is used for generating and displaying the two-dimensional code of the accessed AP according to the name of the wireless access point AP and the disposable AP password;
the MAC address receiving module 52 is configured to receive an MAC address provided by the user terminal after scanning the two-dimensional code of the access AP;
the MAC address adding module 53 is configured to add the provided MAC address to an MAC address list allowing internet access;
and the two-dimension code display module 54 is used for generating and displaying the two-dimension code of the user terminal accessing the wireless network according to the provided MAC address and the password of the internet access.
As an implementation manner of this embodiment, in the wireless network security authentication apparatus, the two-dimensional code display module of the access AP is specifically configured to:
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the one-time WiFi password.
As an implementation manner of this embodiment, in the wireless network security authentication apparatus, the two-dimensional code display module of the access AP includes:
the WiFi password generating unit is used for randomly generating WiFi passwords;
and the two-dimension code display unit is used for generating and displaying the two-dimension code accessed to the AP according to the WiFi name and the randomly generated WiFi password.
As an implementation manner of this embodiment, in the wireless network security authentication apparatus, the code storage module includes:
and the password configuration module is used for configuring the password of the internet.
The apparatus provided in the embodiment of the present invention may be applied to the corresponding method embodiment, and details of the implementation process refer to the description of the embodiment described above, which are not described herein again.
Example nine
Fig. 6 is a block diagram of a wireless network access device according to an embodiment of the present invention, which can be operated in a user terminal, including but not limited to a mobile phone, a notebook computer, and a tablet computer. For convenience of explanation, only the portions related to the present embodiment are shown.
Referring to fig. 6, the wireless network access apparatus includes:
an AP access module 61, configured to access an AP by scanning a two-dimensional code of the access AP;
a MAC address module 62 for providing a MAC address to an accessed AP;
and the wireless network access module 63 is used for accessing the wireless network by scanning the two-dimensional code accessed to the wireless network.
The apparatus provided in the embodiment of the present invention may be applied to the corresponding method embodiment, and details of the implementation process refer to the description of the embodiment described above, which are not described herein again.
Through the above description of the embodiments, those skilled in the art will clearly understand that the present invention can be implemented by software plus necessary general hardware. The program may be stored in a readable storage medium, such as a random access memory, a flash memory, a read only memory, a programmable read only memory, an electrically erasable programmable memory, a register, and the like. The storage medium is located in a memory, and a processor reads information in the memory and performs the method according to the embodiments of the present invention in combination with hardware thereof.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A wireless network security authentication method, comprising:
generating and displaying a two-dimensional code of the access AP according to the name of the wireless access AP and the disposable AP password;
receiving an MAC address provided by a user terminal after scanning a two-dimensional code accessed to an AP;
adding the provided MAC address into an MAC address list allowing internet access;
and generating and displaying the two-dimensional code of the user terminal accessing the wireless network according to the provided MAC address and the password of the internet access.
2. The wireless network security authentication method of claim 1, wherein the two-dimensional code of the access AP is generated and displayed according to the name of the wireless access point AP and the one-time AP password, and specifically:
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the one-time WiFi password.
3. The wireless network security authentication method according to claim 1 or 2, wherein the two-dimensional code for accessing the AP is generated and displayed according to the WiFi name and the one-time WiFi password, specifically:
randomly generating a WiFi password;
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the randomly generated WiFi password.
4. The wireless network security authentication method of claim 1, wherein before the generating and displaying the two-dimensional code of the user terminal accessing the wireless network according to the provided MAC address and the password for accessing the internet, the wireless network security authentication method further comprises:
and configuring a password for surfing the Internet.
5. A wireless network access method, comprising:
accessing the AP by scanning the two-dimensional code accessed to the AP;
providing the MAC address to the accessed AP;
and accessing the wireless network by scanning the two-dimensional code accessed to the wireless network.
6. A wireless network security authentication apparatus, comprising:
the two-dimensional code display module of the access AP is used for generating and displaying the two-dimensional code of the access AP according to the name of the wireless access point AP and the disposable AP password;
the MAC address receiving module is used for receiving an MAC address provided by the user terminal after scanning the two-dimensional code accessed to the AP;
the MAC address adding module is used for adding the provided MAC address into an MAC address list allowing to access the Internet;
and the two-dimension code display module is used for generating and displaying the two-dimension code of the user terminal accessed to the wireless network according to the provided MAC address and the password of the internet access.
7. The wireless network security authentication device of claim 6, wherein the two-dimensional code display module of the access AP is specifically configured to:
and generating and displaying the two-dimensional code accessed to the AP according to the WiFi name and the one-time WiFi password.
8. The wireless network security authentication device of any one of claims 6 to 7, wherein the two-dimensional code display module of the access AP comprises:
the WiFi password generating unit is used for randomly generating WiFi passwords;
and the two-dimension code display unit is used for generating and displaying the two-dimension code accessed to the AP according to the WiFi name and the randomly generated WiFi password.
9. The wireless network security authentication device of claim 6, wherein the code storage module comprises:
and the password configuration module is used for configuring the password of the internet.
10. A wireless network access apparatus, comprising:
the AP access module is used for accessing the AP by scanning the two-dimensional code accessed to the AP;
the MAC address module is used for providing an MAC address for the accessed AP;
and the wireless network access module is used for accessing the wireless network by scanning the two-dimensional code accessed to the wireless network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610317120.3A CN105898747A (en) | 2016-05-13 | 2016-05-13 | Wireless network security authentication method and device and wireless network access method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610317120.3A CN105898747A (en) | 2016-05-13 | 2016-05-13 | Wireless network security authentication method and device and wireless network access method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105898747A true CN105898747A (en) | 2016-08-24 |
Family
ID=56716105
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610317120.3A Pending CN105898747A (en) | 2016-05-13 | 2016-05-13 | Wireless network security authentication method and device and wireless network access method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105898747A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106412900A (en) * | 2016-11-01 | 2017-02-15 | 上海师范大学 | Password input-free secure Wi-Fi connection method |
WO2018076675A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Network access method, routing device and terminal, and computer storage medium |
CN108647763A (en) * | 2018-04-17 | 2018-10-12 | 新大陆(福建)公共服务有限公司 | Quick Response Code life cycle management method based on memory database and computer equipment |
CN109219045A (en) * | 2018-09-17 | 2019-01-15 | 北京奇艺世纪科技有限公司 | A kind of router connection method, device, electronic equipment and system |
CN110072237A (en) * | 2019-03-13 | 2019-07-30 | 广东九联科技股份有限公司 | A kind of wireless network access scheme and its method with dual affirmation mechanism |
CN111132159A (en) * | 2019-12-04 | 2020-05-08 | 珠海格力电器股份有限公司 | Method and device for opening hot spot of sharing end and connecting hot spot |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103607710A (en) * | 2013-12-02 | 2014-02-26 | 北京东方泰华投资有限公司 | Quick connection method and device for wireless devices and intelligent terminal |
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
CN104244245A (en) * | 2014-09-12 | 2014-12-24 | 普联技术有限公司 | Wireless access authentication method, wireless router device and wireless terminal |
CN104574065A (en) * | 2015-01-26 | 2015-04-29 | 深圳前海万融智能信息有限公司 | Whole-process medical convenient mobile payment method and system |
-
2016
- 2016-05-13 CN CN201610317120.3A patent/CN105898747A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2014189262A1 (en) * | 2013-05-24 | 2014-11-27 | Strix Inc. | User terminal authentication method of access point apparatus |
CN103607710A (en) * | 2013-12-02 | 2014-02-26 | 北京东方泰华投资有限公司 | Quick connection method and device for wireless devices and intelligent terminal |
CN104244245A (en) * | 2014-09-12 | 2014-12-24 | 普联技术有限公司 | Wireless access authentication method, wireless router device and wireless terminal |
CN104574065A (en) * | 2015-01-26 | 2015-04-29 | 深圳前海万融智能信息有限公司 | Whole-process medical convenient mobile payment method and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018076675A1 (en) * | 2016-10-27 | 2018-05-03 | 中兴通讯股份有限公司 | Network access method, routing device and terminal, and computer storage medium |
CN106412900A (en) * | 2016-11-01 | 2017-02-15 | 上海师范大学 | Password input-free secure Wi-Fi connection method |
CN108647763A (en) * | 2018-04-17 | 2018-10-12 | 新大陆(福建)公共服务有限公司 | Quick Response Code life cycle management method based on memory database and computer equipment |
CN109219045A (en) * | 2018-09-17 | 2019-01-15 | 北京奇艺世纪科技有限公司 | A kind of router connection method, device, electronic equipment and system |
CN110072237A (en) * | 2019-03-13 | 2019-07-30 | 广东九联科技股份有限公司 | A kind of wireless network access scheme and its method with dual affirmation mechanism |
CN111132159A (en) * | 2019-12-04 | 2020-05-08 | 珠海格力电器股份有限公司 | Method and device for opening hot spot of sharing end and connecting hot spot |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105898747A (en) | Wireless network security authentication method and device and wireless network access method and device | |
US11283805B2 (en) | Cloud device account configuration method, apparatus and system, and data processing method | |
CN104519020B (en) | Manage method, server and the system of wireless network login password sharing function | |
CN108337677B (en) | Network authentication method and device | |
US8973122B2 (en) | Token based two factor authentication and virtual private networking system for network management and security and online third party multiple network management method | |
CN101621798B (en) | Session key management for public wireless lan supporitng multiple virtual operators | |
KR101243713B1 (en) | Wireless lan access point and method for accessing wireless lan | |
CN103597799B (en) | service access authentication method and system | |
CN101437223B (en) | Access method, system and apparatus for household base station | |
TWI403145B (en) | Authentication system and method thereof for wireless networks | |
CN101610241B (en) | Method, system and device for authenticating binding | |
WO2018000834A1 (en) | Wifi hotspot information modification method and device | |
CN104205891A (en) | Virtual sim card cloud platform | |
US20230344626A1 (en) | Network connection management method and apparatus, readable medium, program product, and electronic device | |
CN101986598B (en) | Authentication method, server and system | |
CA2647684A1 (en) | Secure wireless guest access | |
CN106559785B (en) | Authentication method, device and system, access device and terminal | |
CN102572832A (en) | Secure sharing method and mobile terminal | |
JP2018533864A (en) | Remote control method, device and portable terminal | |
CN104767621A (en) | Single-point security certification method for having access to enterprise data through mobile application | |
US20160308870A1 (en) | Network access method and apparatus | |
KR102558821B1 (en) | System for authenticating user and device totally and method thereof | |
CN113438712A (en) | Wireless connection method and device | |
JP7312279B2 (en) | MOBILE NETWORK ACCESS SYSTEM, METHOD, STORAGE MEDIUM AND ELECTRONIC DEVICE | |
CN104581723A (en) | Application method and device for networking information data of client equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20160824 |
|
RJ01 | Rejection of invention patent application after publication |