CN106102057A - Portable control end equipment and WiFi access remote authentication method, device - Google Patents

Portable control end equipment and WiFi access remote authentication method, device Download PDF

Info

Publication number
CN106102057A
CN106102057A CN201610365923.6A CN201610365923A CN106102057A CN 106102057 A CN106102057 A CN 106102057A CN 201610365923 A CN201610365923 A CN 201610365923A CN 106102057 A CN106102057 A CN 106102057A
Authority
CN
China
Prior art keywords
end equipment
access point
face characteristic
point apparatus
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610365923.6A
Other languages
Chinese (zh)
Inventor
赵伟涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qiku Internet Technology Shenzhen Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qiku Internet Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qiku Internet Technology Shenzhen Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610365923.6A priority Critical patent/CN106102057A/en
Publication of CN106102057A publication Critical patent/CN106102057A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of WiFi and access remote authentication method, comprise the steps: to obtain the request that WiFi access point apparatus transmits and access its communication network and the face characteristic data to be verified submitted to;Verify described face characteristic data, obtain the authentication result information characterizing verification success or failure;Described authentication result information is fed back to described WiFi access point apparatus.Additionally, the invention also discloses device corresponding with the method and equipment.The enforcement of the present invention so that the authentication mode of WiFi communication network changes, thus strengthen network security, improve authentication efficiency, and improve user-interaction experience.

Description

Portable control end equipment and WiFi access remote authentication method, device
Technical field
The present invention relates to secure wireless communication field, connect more particularly, to a kind of portable control end equipment and WiFi Enter remote authentication method, device.
Background technology
Radio communication, especially relates in the wireless communication technology of computer realm, derives based on IEEE802.11 agreement WiFi communication technology, its safety is increasingly paid attention to.Realize WiFi communication, according to the function of WiFi chip, and operation system The support of system, and there is various modes, such as Managed, AP, P2P Group Owner (GO), P2P Client etc..Its Middle Managed refers to Station i.e. station mode, for accessing the WiFi node being under ap mode.In like manner, P2P GO is used for Other WiFi equipment for being under P2P pattern build a communication set, in order to realize the communication between group member's equipment.
In order to realize secure communication, in addition to the wide-open network of WiFi protocol specification, it usually needs authenticate, The pattern of authentication is varied, and common such as modes such as WEP, WPA, the safety coefficient under different modes is different, but it is former Manage of an identical nature, i.e. user identity is carried out legitimacy certification.In common scene, mobile device is with WiFi work station The mode of (Station is called for short STA) accesses WiFi access point (AP), and the STA that AP wants desire to access self provides password, and right Password is verified, when after cryptographic check success, it is allowed to corresponding STA completes to access, otherwise refuses corresponding STA and accesses.
Traditional this authentication mode, owing to attack for WiFi communication now is more and more frequent, safety based on WEP Mechanism becomes cannot withstand a single blow, security mechanism based on WPA, the most also can by code dictionary or other violence modes in addition Crack, the appearance of WiFi access point of the most more and more going fishing so that traditional WiFi security function is had too many difficulties to cope with.The opposing party Face, cryptosecurity based on character mechanism, it is individually present departing from characteristics of human body, therefore password is otherwise stolen and is also The most universal.
In view of this, improve the code authentication mechanism of WiFi network, be conducive to improving the communication security of WiFi network.
Summary of the invention
In view of the problem of above-mentioned at least one aspect, the present invention provides a kind of WiFi to access remote authentication method and corresponding Device, in order to realize the user authentication process of WiFi access point apparatus remotely controlling.
Accordingly, the present invention also provides for a kind of portable control end equipment, for implementing aforesaid method or running institute The device stated.
Accordingly, present invention employs following technical scheme:
A kind of WiFi that the present invention provides accesses remote authentication method, comprises the steps:
The face characteristic number to be verified obtaining the asking to access its communication network of WiFi access point apparatus transmission and submit to According to;
Verify described face characteristic data, obtain the authentication result information characterizing verification success or failure;
Described authentication result information is fed back to described WiFi access point apparatus.
In a kind of mode, described face characteristic data are extracted from multicast signal and are obtained.
It is also preferred that the left described face characteristic packet be contained in the multicast frame of described multicast signal can be in edit field.
Disclosed in one embodiment of the present invention, verify in the step of described face characteristic data, by by institute The face characteristic data obtained compare with feature database, determine that it is the most consistent with the pre-stored characteristics data in feature database, from And should determine that check results is success or failure mutually.
Further, this method also comprises the steps:
In response to user's acquisition instructions, show image acquisition interface, for gathering the face characteristic data of user as institute The pre-stored characteristics data stated.
Concrete, in the step in response to user's acquisition instructions display image acquisition interface, by described image acquisition Interface obtains the facial image of user, and extracts described face characteristic data from this facial image.
It is also preferred that the left institute's pre-stored characteristics data are stored in described feature database in an encrypted form.
Optionally, during described feature database is stored in the machine or cloud server.
It is also preferred that the left set up Trusted channel in the way of WiFi is connected between the machine with described WiFi access point apparatus.
Concrete, described face characteristic Data Source is in incoming end equipment.
Further, this method also comprises the steps:
Manage instruction in response to user, show subscriber administration interface, set for described WiFi access point for being modified for Standby setting options.
Further, feed back the step of described authentication result information to described WiFi access point apparatus, cause described WiFi to connect Enter point device to allow or stop the incoming end equipment of the described face characteristic data to be verified of offer to access this WiFi access point to set The standby communication network set up.
Disclosed in embodiments of the invention, this method also includes following previous step:
Obtain incoming end equipment and be intended to access the access request of the communication network that described WiFi access point apparatus is set up and anti- Feedback authentication performs instruction, in order to the face characteristic number described to be verified that follow-up acquisition performs instruction in response to this authentication and submits to According to.
In a kind of embodiment, described access request and described authentication perform instruction and enter via described WiFi access point apparatus Walking along the street by.
Disclosed in the section Example of the present invention, this method also comprises the steps:
Statistics has the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated, and works as the frequency of failure After preset value, shield the face characteristic data of this source address.
According to this section Example, this method also comprises the steps:
Receive the recovery request belonging to described source address, cancel the people shielding this source address in response to user instruction Face characteristic.
Concrete, described statistics has the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated Step in, when the frequency of failure is beyond after preset value, and described source address is added in blacklist, is treated school for transmit The face characteristic data tested, shield this by carrying out filtering by the face characteristic data of the source address belonged in this blacklist The face characteristic data of source address.
Disclosed in the section Example of the present invention, this method also comprises the steps:
Statistics has the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated, and works as the frequency of failure After preset value, send sign and shield the announcement information of the access request belonging to this source address to described WiFi access point Equipment.
According to this section Example, this method also comprises the steps:
Receive the recovery request belonging to described source address, send cancellation in response to user instruction and shield this source address The announcement information of access request give described WiFi access point apparatus.
A kind of WiFi that the present invention provides accesses remote authentication device, comprising:
Acquiring unit, it is to be verified that the request transmitted for obtaining WiFi access point apparatus accesses its communication network and submits to Face characteristic data;
Verification unit, is used for verifying described face characteristic data, obtains the authentication result letter characterizing verification success or failure Breath;
Feedback unit, for feeding back described authentication result information to described WiFi access point apparatus.
In a kind of mode, described face characteristic data are extracted from multicast signal and are obtained.
It is also preferred that the left described face characteristic packet be contained in the multicast frame of described multicast signal can be in edit field.
Disclosed in one embodiment of the present invention, described verification unit, it is configured to acquired Face characteristic data compare with feature database, determine that it is the most consistent with the pre-stored characteristics data in feature database, thus accordingly Determine that check results is success or failure.
Further, this device also includes:
Collecting unit, is configured to respond to user's acquisition instructions, shows image acquisition interface, for gathering the people of user Face characteristic is as described pre-stored characteristics data.
Concrete, described collecting unit is configured to described image acquisition interface and obtains the facial image of user, and Described face characteristic data are extracted from this facial image.
It is also preferred that the left institute's pre-stored characteristics data are stored in described feature database in an encrypted form.
Optionally, it is characterised in that described feature database is stored in the machine or cloud server.
It is also preferred that the left set up Trusted channel in the way of WiFi is connected between the machine with described WiFi access point apparatus.
Concrete, described face characteristic Data Source is in incoming end equipment.
Further, this device also includes:
Dispensing unit, is configured to respond to user and manages instruction, shows subscriber administration interface, for be modified for for The setting options of described WiFi access point apparatus.
Further, the operation of described feedback unit, cause described WiFi access point apparatus to allow or stop treating described in offer The incoming end equipment of the face characteristic data of verification accesses the communication network that this WiFi access point apparatus is set up.
Disclosed in embodiments of the invention, this device also includes the unit of following preposition operation:
Start unit, is intended to access, for obtaining incoming end equipment, communication network that described WiFi access point apparatus set up Access request and feed back authentication performs instruction, in order to follow-up acquisition in response to this authentication execution instruct and submit to described to be verified Face characteristic data.
In a kind of embodiment, access request and described authentication that described start unit obtains perform instruction via described WiFi access point apparatus route.
Disclosed in the section Example of the present invention, this device also includes:
Statistic unit, has, for statistics, the failure time that the described face characteristic data of identical source address are repeatedly authenticated Number, after the frequency of failure is beyond preset value, shields the face characteristic data of this source address.
According to this section Example, this device also includes:
Calamity is for unit, and for receiving the recovery request belonging to described source address, it cancels screen in response to user instruction Cover the face characteristic data of this source address.
Concrete, in described statistic unit, after the frequency of failure is beyond preset value, described source address is added to black name Dan Zhong, for the face characteristic data to be verified transmitted, the face of the source address by belonging in this blacklist is special Levy data to carry out filtering and shielding the face characteristic data of this source address.
Disclosed in the section Example of the present invention, this device also includes:
Statistic unit, has, for statistics, the failure time that the described face characteristic data of identical source address are repeatedly authenticated Number, after the frequency of failure is beyond preset value, sends sign and shields the announcement information of the access request belonging to this source address to institute The WiFi access point apparatus stated.
According to this section Example, this device also includes:
Calamity is for unit, and for receiving the recovery request belonging to described source address, it sends in response to user instruction and takes The announcement information of the access request shielding this source address that disappears is to described WiFi access point apparatus.
A kind of portable control end equipment that the present invention provides, comprising:
Wireless fidelity module, is used for providing communication network;
Touch-sensitive display, for display interface, it is achieved man-machine interaction;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt It is configured to be performed by the one or more processor;
The one or more program is used for driving the one or more processor to be configured to perform and preceding method The corresponding device of any one embodiment.
A kind of portable control end equipment that the present invention provides, comprising:
Wireless fidelity module, is used for providing communication network;
Touch-sensitive display, for display interface, it is achieved man-machine interaction;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and quilt It is configured to be performed by the one or more processor;
The one or more program is used for driving the one or more processor to be configured to perform aforementioned any one Plant the device that embodiment is realized.
In a possible design, processor that the structure of portable control end equipment includes and memorizer, described Memorizer is for storing the program supporting that R-T unit performs said method, and described processor is configurable for described in execution depositing The program of storage in reservoir.Described portable control end equipment can also include communication interface, for portable control end equipment With other equipment or communication.
Another further aspect, embodiments provides a kind of computer-readable storage medium, is used for saving as above-mentioned portable control Computer software instructions used by end equipment processed, it comprises for performing above-mentioned journey designed by portable control end equipment Sequence, or comprise for performing the program designed by above-mentioned method, device.
Relative to prior art, the scheme that the present invention provides so that user can use portable control end equipment to experience Beneficial effects of the present invention.Concrete manifestation participates in each side of the communication network that WiFi access point apparatus is set up: 1, for portable Formula control end equipment, by portable control end equipment receive WiFi access point apparatus transmit be used for access its communication network These face characteristic data are carried out proof of identity by the face characteristic data of network, then feed back whether school to WiFi access point apparatus Testing successful authentication result information, this measure has substantially been taken over original WiFi access point apparatus by portable control end equipment and has been had Standby authentication functions, or be at least reinforced (WiFi access point apparatus the most still can retain existing authentication functions, Face characteristic data authentication function is increased) on the basis of this.Can know, on the one hand, by the authentication functions of WiFi access point apparatus After transferring to portable control end equipment, log in WiFi access point apparatus relative to needs manager by form web page and carry out The mode of webpage configuration, utilizes the powerful programing function of portable control end equipment and friendly user interface, and this kind of mode can With more convenient and efficiently WiFi access point apparatus is carried out authentication management;On the other hand, this pipe-connecting mode makes to depend on people The checking of body characteristics is possibly realized, and especially this data volume of face characteristic transmits relatively large mode, and WiFi can be made to connect While entering point device holding weight reducing, moreover it is possible to realize the most powerful and safe authentication functions by portable control terminal; Another further aspect, portable control end equipment can utilize other approach to access the Internet more conveniently, can be with cloud service Device combines, and data involved in authentication process, such as face characteristic data etc. are carried out the management of storage and higher level, right For user safety management, play the most thorough effectiveness.
2, for WiFi access point apparatus, it is responsible for the access request in response to incoming end equipment, and optionally requires to connect Enter end equipment feedback authentication and perform instruction, thus obtain the face characteristic data of incoming end equipment feedback further, basis at this On, the face characteristic data of incoming end equipment are submitted to portable control end equipment and authenticates, and determine according to authenticating result The fixed request allowing or stoping incoming end equipment to access the communication network set up.Can know, WiFi access point apparatus and control The connection of end equipment processed is trusty, and therefore, the former authentication functions is transferred to the latter at least in part, and the former just can save Overhead, is realized safety management by the latter.And the latter, namely control end equipment, the most powerful hard owing to himself having Part is supported and systemic-function, therefore, it is possible to the authentication process of access side equipment is effectively verified.Control end equipment and access Communication between end equipment, is route by WiFi access point apparatus, it is ensured that communication each other is unimpeded.In theory, WiFi access point apparatus thus can save its traditional authentication functions based on cryptographic check thus save its hardware spending, and Its authentication functions carte blanche is controlled end equipment process, but, still can retain its traditional authentication functions, and can consider Make when its tradition authentication functions is exclusively used in and realizes and set up Trusted channel between WiFi access point apparatus and described control end equipment With.
3, for portable incoming end equipment, it can initiate the communication setting up WiFi access point apparatus in some way The access request of network, after WiFi access point apparatus receives this request, just can perform instruction to its feedback authentication, so that its Startup image acquisition unit is to obtain face characteristic data, then transfers to WiFi access point apparatus to be routed to institute face characteristic data The control end equipment stated, to the authenticating result of described face characteristic data, final foundation determines whether incoming end equipment self becomes Communication network described in merit access.It can be seen that want the incoming end equipment of access communications network, its authentication logic is compared to tradition Authentication mode there occurs change, with the best interactive mode, directly obtain user's head portrait, therefrom extract face characteristic number According to, just by these face characteristic data, the process accessing communication network can be authenticated.Compared to input password, simplify User operation, the most also can improve efficiency.Additionally, after incoming end equipment has broken away from the process being manually entered password, it is possible to It is prevented effectively from fishing software or the illegal monitoring to Password Input implementation Process of other eavesdropping software, thus is greatly improved access Safety coefficient during end device for communication network access.
In brief, the enforcement of the present invention so that participate in the communication parties of WiFi communication network, specifically include incoming end and set Standby, control end equipment, WiFi access point apparatus all embody the technological improvement being different from conventional art so that WiFi communication network Authentication mode change, thus strengthen network security, improve authentication efficiency, and improve user-interaction experience.
The aspects of the invention or other aspects be meeting more straightforward in the following description.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below required for make Accompanying drawing be briefly described, it should be apparent that, below describe in accompanying drawing be only some embodiments of the present invention, for From the point of view of those skilled in the art, on the premise of not paying creative work, it is also possible to obtain the attached of other according to these accompanying drawings Figure.
Fig. 1 illustrates by the portable control end equipment of the present invention, portable incoming end equipment and WiFi access point apparatus The theory diagram of one network system of structure;
Fig. 2 is the schematic flow sheet of a kind of embodiment of the WiFi access remote authentication method of the present invention.
Fig. 3 is the schematic flow sheet of a kind of embodiment of the WiFi access authentication method of the present invention.
Fig. 4 is the schematic flow sheet of a kind of embodiment of the WiFi access authentication control method of the present invention.
Fig. 5 shows that the WiFi of the present invention accesses the schematic flow sheet of another embodiment of remote authentication method.
Fig. 6 shows that the WiFi of the present invention accesses the schematic flow sheet of the another embodiment of remote authentication method.
Fig. 7 shows that the WiFi of the present invention accesses the schematic flow sheet of the another embodiment of remote authentication method.
Fig. 8 shows the schematic flow sheet of another embodiment of the WiFi access authentication method of the present invention.
Fig. 9 shows the schematic flow sheet of another embodiment of the WiFi access authentication control method of the present invention.
Figure 10 shows the schematic flow sheet of the another embodiment of the WiFi access authentication control method of the present invention.
Figure 11 shows the schematic flow sheet of another embodiment of the WiFi access authentication control method of the present invention.
Figure 12 shows the schematic flow sheet of the another embodiment of the WiFi access authentication control method of the present invention.
Figure 13 shows the schematic flow sheet of the another embodiment of the WiFi access authentication control method of the present invention.
Figure 14 is the principle schematic of an embodiment of the WiFi access remote authentication device of the present invention.
Figure 15 is the principle schematic of another embodiment of the WiFi access remote authentication device of the present invention.
Figure 16 is the principle schematic of another embodiment of the WiFi access remote authentication device of the present invention.
Figure 17 is the principle schematic of another embodiment of the WiFi access remote authentication device of the present invention.
Figure 18 is the principle schematic of the another embodiment of the WiFi access remote authentication device of the present invention.
Figure 19 is the principle schematic of an embodiment of the WiFi access authentication device of the present invention.
Figure 20 is the principle schematic of another embodiment of the WiFi access authentication device of the present invention.
Figure 21 is the principle schematic of an embodiment of the WiFi access authentication control device of the present invention.
Figure 22 is the principle schematic of another embodiment of the WiFi access authentication control device of the present invention.
Figure 23 is the principle schematic of another embodiment of the WiFi access authentication control device of the present invention.
Figure 24 is the principle schematic of another embodiment of the WiFi access authentication control device of the present invention.
Figure 25 is the principle schematic of another embodiment of the WiFi access authentication control device of the present invention.
Figure 26 is the principle schematic of the another embodiment of the WiFi access authentication control device of the present invention.
Figure 27 is that the portable control end equipment of the present invention, portable incoming end equipment and WiFi access point apparatus can The schematic diagram of the structure being suitable for.
Detailed description of the invention
In order to make those skilled in the art be more fully understood that the present invention program, below in conjunction with in the embodiment of the present invention Accompanying drawing, is clearly and completely described the technical scheme in the embodiment of the present invention.
In some flow processs of description in description and claims of this specification and above-mentioned accompanying drawing, contain according to Particular order occur multiple operations, but it should be clearly understood that these operation can not according to its occur in this article suitable Sequence performs or executed in parallel, the sequence number of operation such as 101,102 etc., is only used for distinguishing each different operation, sequence number Itself does not represent any execution sequence.It addition, these flow processs can include more or less of operation, and these operations can To perform in order or executed in parallel.It should be noted that " first ", " second " herein etc. describe, it is for distinguishing not Message together, equipment, module etc., do not represent sequencing, and not limiting " first " and " second " is different types.
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Describe, it is clear that described embodiment is only a part of embodiment of the present invention rather than whole embodiments wholely.Based on Embodiment in the present invention, the every other enforcement that those skilled in the art are obtained under not making creative work premise Example, broadly falls into the scope of protection of the invention.
Face characteristic data alleged by the present invention, refer to carry out data obtained by feature extraction, wherein based on facial image Facial image, generally obtain by starting the image acquisition unit of one or more photographic head etc.If desired, image obtains Take unit and can be compared confirmation by a frame or multiframe real time imaging, be to meet to ensure its acquired facial image The effective image of specification, to avoiding unauthorized user to carry out forged identity by the facial image of validated user.Described face Characteristic, in transmission and storing process, can be presented as certain encrypted form, for example with data summarization, signature, PKI The multi-forms such as encryption, symmetric cryptography, only need to be when using it, it is possible to use reverse algorithm to solve its encrypted form Close, thus realize correct data operation.The pre-stored characteristics data being stored in feature database alleged by the present invention, are in advance The described face characteristic data generated after collection, also can be presented as above-mentioned encrypted form when storage, carry out at follow-up needs During authentication verification, can be called for comparing.
Communication network alleged by the present invention, refer to by IEEE 802.11 and serial protocols institute specification thereof for realizing The network of WiFi access service, in the environment of this network, has a WiFi access point apparatus as alleged by the present invention, its Launch and include the WiFi signal of service set and realize the erection of described communication network, and allow the access of validated user; Having the incoming end equipment alleged by a such as present invention, it is configured with WiFi chip module, in order to may search for described communication The beacon frame of network and determine the service set of this communication network, or after initiating actively inquiry, the services set described in acquisition Mark, thus initiate to access the access request of the communication network representated by this service set, at this access point apparatus by it After access request, complete WiFi establishment of connection.Generally, this communication network can be via the further road of WiFi access point apparatus By and be connected in internal-external network, in order to access same LAN or the Internet or other kinds of wide area network.In the present invention, Permission one is controlled end equipment and sets up Trusted channel with WiFi access point apparatus, and access by controlling end equipment adapter WiFi The authentication services that other are intended to access the incoming end equipment of its communication network by point device, and the present invention is realized relative to tradition Scheme realizes technology and strengthens.
Equipment alleged by the present invention, the control end equipment that specifically will disclose and access point apparatus, it is often referred to such as Panel computer, mobile phone, intelligent wristwatch etc can the movement of portable ground, be configured with the mobile device of intellectualized operation system, this A little operating systems can the most also may be used to be the mobile terminal operating system of Windows Phone, Android, IOS or other forms Be such as Windows system desktop series, as long as the equipment used possess portable, intelligent, there is WiFi communication function Feature, its mesh can be the corresponding portable set alleged by this area by those skilled in the art.
In the WiFi connection procedure of IEEE 802.11 protocol specification, WiFi establishment of connection typically requires goes through connection Request (Probe Request/Response), authentication processing (Authentication), foundation association (Association) etc. Process.In the stage when connection request, set up preliminary being mutually distinguishable between incoming end equipment and access point apparatus, on certification rank Section, then allow both two-way interactives to complete authentication, finally, utilize set up association management frame realize alternately connect really Recognize.The various methods of the present invention, various aspects, improve based on this, and accordingly, some concepts have been also carried out simplifying and have retouched State.Such as, the process of connection request may be reduced to an access request in the present invention, and the process of authentication processing may be The present invention is broken down into multiple interactive step, even includes the difference step participating in realizing between the multi-terminal devices of certification, and The described process setting up association, then may be reduced to set up between incoming end equipment and access point apparatus in the present invention Connect.Therefore, even if those skilled in the art are it is to be understood that description of the invention may not adopt IEEE 802.11 completely Specification in agreement describes, but still with the key technical feature of IEEE802.11 with the present invention can be according to the explanation of the present invention Basis, is implemented various concrete scheme and is done the understanding of technical rationalization the present invention.Especially, should be because of single term or feature Simplify describe and misread or twist the basis of the present invention implement be intended to and the Reasonable Protection scope that contains.
For the ease of understanding the present invention, a kind of running environment of the present invention introduced below, it is possible to be considered as the one of the present invention Application scenarios.
As it is shown in figure 1, the present invention is set up and opens a WiFi communication network, common AP by WiFi access point apparatus (Access Point) can realize this function, or have AP function and with the addition of the similar devices of routing function, all Can be used for setting up the communication network of the present invention.
Having a portable control end equipment, such as one smart mobile phone including WiFi chip module equally, to close Method user identity accesses the configuration to this communication network of this communication network the application program that can be installed by this smart mobile phone Management is implemented with authentication functions.Control end equipment suitably with set up the trust company being connected based on WiFi between WiFi access point apparatus Connecing relation, a kind of mode is to make both carry out hard affinity, namely when WiFi access point apparatus dispatches from the factory, just by the letter of its management interface Breath solidification, as long as being thus mounted with that the application program of the present invention and grasp have the smart machine of the information of its management interface, just Described control end equipment can be become;Another way is that WiFi access point apparatus provides authentication functions in a conventional manner, permits Permitted smart machine to be accessed therewith by authentication modes such as such as WEP, WPA, and allow smart machine to call its administration interface, will Smart machine self is appointed as controlling end equipment, can be realized based on face characteristic number by this control end equipment further According to the control carrying out the serviceable condition of function authenticated.No matter which kind of mode, control end equipment all can monopolize or non-solely The mode accounted for, becomes the management terminal of WiFi access point apparatus.
There is at least one smart machine being intended to access described communication network can serve as the incoming end equipment of the present invention, certainly Ground, is configured with the image acquisition unit of WiFi chip module and photographic head etc, and it detects the beacon frame of described communication network After (beacon frame), connection request can be initiated, it is desirable to complete the access to this communication network.When next stepping enters verification process When being required to provide authorization data, can require and obtain corresponding authorization data to user, the most also can be reduced to access The automatization of end equipment provides the process of authorization data and the mode of nonessential employing response realizes, and is submitted to WiFi Access point apparatus, finally regards WiFi access point apparatus authentication in the stage setting up association and determines self by whether the most successfully Communication network described in access.These authorization datas can be close to include or not include the checking of traditional such as WEP, WPA mode Code, but in the present invention, emphasis needs the face characteristic data including being obtained by described image acquisition unit.
Described incoming end equipment, control end equipment and WiFi access point apparatus can be respectively mounted different operation systems System, if the identical agreement realized in accordance with the solution of the present invention between each equipment or communication interface standard, just can be accessible Ground coordinates the running environment building the present invention.It should be noted that described control end equipment can be one or more, and institute State incoming end equipment can also there is one or more simultaneously, the essence creative spirit of the present invention should not limited with its quantity.
The working mechanism running structure shown in Fig. 1 is: after described WiFi access point apparatus starts, complete according to default setting Become the configuration of communication network, start its WiFi access service.Control end equipment start after, can be traditional such as based on WPA Password authentification mode accesses the communication network of WiFi access point apparatus, accesses the control end equipment of this communication network, can give tacit consent to For having manager's qualification, or enjoy this qualification with the some like authentication mechanism in manager's login.There is this kind of pipe The control end equipment of reason person's qualification, can read the config option of WiFi access point apparatus, in its touch-sensitive display with manager's identity The user interface that screen provides shows the configuration page, and after user completes the amendment of setting options, is submitted to WiFi and accesses Point device completes amendment and comes into force.Additionally, WiFi access point apparatus is for the equipment to be accessed outside control end equipment, all Can be considered incoming end equipment, it is desirable to it provides face characteristic data, and face characteristic data are submitted to controls end equipment carry out Checking, after being verified, it is allowed to this incoming end equipment accesses own net, otherwise forbids that it logs in.Incoming end equipment is submitted to Face characteristic data, be substantially that one treats authorization data, by WiFi access point apparatus according to acquiescence logic be routed to control End equipment processed, the authentication result information controlling the generation of end equipment is then transferred to WiFi access point apparatus to process according to this, thus is completed One core authentication access procedure.
About implementing of each concrete equipment, will be disclosed one by one in multiple embodiments of the follow-up present invention.
Refer to Fig. 2, in an embodiment of the present invention, the WiFi that a kind of portable control end equipment of the present invention is used Accessing remote authentication method, comprise the steps: step S12, the request obtaining the transmission of WiFi access point apparatus accesses its communication Network and the face characteristic data to be verified submitted to;Step S13, verifies described face characteristic data, obtains sign and verifies into The authentication result information of merit or failure;Step S14, feeds back described authentication result information to described WiFi access point apparatus.
Obviously, control end equipment to have accessed described WiFi access point apparatus based on WiFi Trusted channel in advance and set up Communication network, thus, once the incoming end equipment of the present invention provides to WiFi access point apparatus and is used for asking accessing its communication The face characteristic data of the authentication of network, these face characteristic data are just routed to control end equipment by WiFi access point apparatus, Control end equipment just face characteristic data to be verified, authentication output object information, and authentication result information is sent to WiFi access point apparatus.After WiFi access point apparatus obtains this authentication result information, if authentication result information representation verifies into Merit, then allowing incoming end equipment to access this communication network, otherwise, verifying unsuccessfully if characterized, then refusal incoming end equipment accesses This communication network.Refusal incoming end equipment accesses the mode of this network, can be not to respond its face characteristic data, it is possible to Be feedback one characterize failed authentication management frame to incoming end equipment.The enforcement of the method, can be connect by controlling end equipment Pipe WiFi access point apparatus is to being intended to access the authentication process of the incoming end equipment of its communication network.
Referring to Fig. 3, in a kind of embodiment of the present invention, a kind of portable incoming end equipment of the present invention is used WiFi access authentication method, comprises the steps: step S21, initiates access request to WiFi access point apparatus;Step S22, rings Instruction should be performed in the authentication after this access request, start image acquisition unit and obtain face characteristic data;Step S23, to WiFi access point apparatus feeds back these face characteristic data and performs instruction with authentication described in response;Step S24, when this face characteristic number After by authentication, it is achieved the access to the communication network that described WiFi access point apparatus is set up.
Obviously, by starting, after performing instruction in the authentication receiving WiFi access point apparatus, the figure that incoming end equipment has As acquiring unit obtains face characteristic data, and face characteristic data are submitted to WiFi access point apparatus, can be accessed by WiFi It is routed to control end equipment implementing authentication by point device, passes through as obtained authentication, i.e. accessible described communication network, thus, This process enhances the authentication logic of portable incoming end equipment so that the process of incoming end device for communication network access is more Convenient and efficient, and be mode based on characteristics of human body owing to changing authentication mode based on password, thus safer.
Refer to Fig. 4, in a kind of embodiment of the present invention, the WiFi that a kind of WiFi access point apparatus of the present invention is used Access authentication control method, comprises the steps: step S31, receives the access request of incoming end equipment;Step S32, responds institute State access request and feed back authentication and perform instruction;Step S33, receives and authenticates the face characteristic performing instruction and feed back described in response Data, request controls end equipment and is authenticated;Step 34, authenticates recognizing of success or failure according to controlling characterizing of end equipment feedback Card object information, allows accordingly or stops described incoming end equipment to access the communication network preset.
After WiFi access point apparatus listens to the access request of incoming end equipment, just can source send out one authentication perform instruction or The authentication of route test end equipment performs instruction to described incoming end equipment, in order to incoming end equipment starts acquisition face characteristic The operation of data.After incoming end equipment feedback face characteristic data, WiFi access point apparatus just can be by this face characteristic number End equipment is controlled, in order to request controls end equipment and authenticated, finally, according to the result of client device feedback, accordingly according to giving Control to allow or stop the communication network described in the access of incoming end equipment.During this, WiFi access point apparatus is from advancing Row authentication, but play route effect, authentication functions is transferred to controls end equipment actual, and its authenticating result is utilized, According to the request of control incoming end equipment.Thus, WiFi access point apparatus can improve according to this method and strengthen its WiFi core The function of sheet module so that on the one hand it increase the cooperation support to face characteristic data check process according to this method, another Aspect can ensure that again normal network routing function.
Visible, between above-mentioned control end equipment, incoming end equipment and WiFi access point apparatus, it is associated with by access point The same communication network that equipment sets up, respectively executes its duty, works in coordination, make authentication effect more effectively.
The present invention is applicable to the WiFi access remote authentication method of described portable control end equipment and has various embodiments, Hereinafter based on previous embodiment, will launch to illustrate the relevant content of remaining various alternate embodiment with regard to its each step.Please depend on So refering to Fig. 2 and combine following word and understood:
In the case of acquiescence controls end equipment and the foundation of WiFi access point apparatus has Trusted channel, described WiFi accesses Remote authentication method generally performs according to the process of step S12 to step S14.About setting up the process of Trusted channel the most here Disclosed: in a kind of embodiment, control end equipment and set up in the way of WiFi is connected with between WiFi access point apparatus in advance Playing Trusted channel, specifically, controlling end equipment can set with the WiFi access point that STA mode startup access is under ap mode Standby.Then, it is common to each embodiment but situation not necessarily as the present invention, step S10 can be set and (do not scheme Show), it manages instruction in response to user, shows subscriber administration interface, for being modified for for described WiFi access point apparatus Setting options.By performing step S10, control end equipment and just can call the setting of WiFi access point apparatus according to pre-agreement These setting options are shown on subscriber administration interface by option, show at touch-sensitive display.User is controlling end equipment tune Play described subscriber administration interface, be to manage instruction by triggering user on control end equipment, or triggered user by with acquiescence The mode of management instruction is initiated.And described subscriber administration interface, managed the triggering of instruction by this user and show, thereon The various setting options of display WiFi access point apparatus, it is allowed to user revises these and acts on WiFi access point apparatus (especially Refer to the setting options of its communication network) setting options, to realize management to WiFi access point apparatus by controlling end equipment The adapter at interface, thus more convenient management operation is provided.The SSID name of described setting options, such as communication network, DHCP function setting item, channel number, authentication mode selection etc., varied, all belong to the option that WiFi network function is relevant, its Change causing WiFi access point apparatus generation allocative effect to change, all can be considered this.Especially can not be by described " choosing " word is interpreted as " alternative ", the limitation situation of " multiselect one ", this should be known by those skilled in the art.
Described step S12, obtains the request that WiFi access point apparatus transmits and accesses its communication network and submit to treat school The face characteristic data tested, its specific implementation is as follows:
In a kind of embodiment, control that end equipment can directly process that incoming end equipment sends comprises described people to be verified The multicast signal of face characteristic obtains described face characteristic data.Specifically, the most successfully connect due to incoming end equipment Enter the communication network that WiFi access point apparatus provides, thus, it is impossible to send face characteristic by Frame, but can make It is total to multiple multicast frames with one group and transmits its data.Face characteristic data are converted to binary code by incoming end equipment, then add Be downloaded to multiple multicast frame can edit field, specifically refer to, in its address field, then send the plurality of multicast frame.Control end Equipment directly receives those multicast frames, then from extracting by the binary code edit field, is reconverted into face characteristic number According to.
In another embodiment, the multicast signal of above-mentioned access side equipment extracts the operation of face characteristic data and is connect by WiFi Enter point device to complete, by WiFi access point apparatus it is loaded in Frame the most again and is sent to control end equipment, control end Equipment directly extracts face characteristic data from Frame.
After obtaining described face characteristic data, according to agreement, if it is encryption data, it should it is decrypted, Otherwise, it is used directly for follow-up verification.
Described step S13, verifies described face characteristic data, obtains the authentication result letter characterizing verification success or failure Breath, its specific implementation is as follows:
Specifically, control end equipment and feature that a storage have the face characteristic data of validated user can be obtained ahead of time Storehouse, this feature database can be stored in control end equipment local storage, it is also possible to being stored in can be with controlled terminal equipment Carried out in the cloud server utilized by remote request.Face characteristic data in feature database, namely pre-stored characteristics data, can Exist in an encrypted form to strengthen its Information Security.When verifying described face characteristic data, controlling end equipment can be suitable for Feature database storage position is different and performs the most different processes:
It is applicable to locally stored feature database, controls end equipment by pre-with feature database of face characteristic data to be verified Deposit characteristic to compare, if it is confirmed that there are the pre-stored characteristics data with this face characteristic data consistent, this people i.e. visual The content that face characteristic provides for validated user identity, otherwise, is considered as the content that disabled user's identity provides, according to both Situation, just can generate the authentication result information characterizing verification success or failure respectively.Face characteristic data designated herein are with pre- Deposit the consistent of characteristic, should not be confined on data representation form or its data content the most completely the same, for example, it may be Refer to that both degrees of approximation arrive the degree preset, or be in the range of permission, i.e. can be considered that both are consistent.
It is applicable to be stored in the feature database of cloud server, controls end equipment by described face characteristic data to be verified It is encapsulated in verification request, is sent to cloud server, these face characteristic data of server by utilizing perform all schools described above Testing process, finally the authentication result information described in cloud server generates feeds back to control end equipment.
Could be aware that, either verify in this locality, be still submitted to cloud server and verify, control end equipment All can get described authentication result information by verification.
In order to construct this feature storehouse, in a kind of embodiment, control the WiFi performed by end equipment and access remote authentication method Start and perform steps S18 (not shown), in response to user's acquisition instructions, show image acquisition interface, be used for gathering use The face characteristic data at family are as described pre-stored characteristics data.
Generally, control end equipment can construct and be specifically designed to the application program realizing the method, when this application program runs, Image acquisition interface described in can being activated by virtual key or certain gestures and show, with this image acquisition interface quilt Activate, carry out shooting image preview, when user determines one by starting the image acquisition unit such as photographic head controlling end equipment After facial expression, another confirmation instruction realized by the form of such as voice, gesture, virtual key etc, Image Acquisition list Unit just can shoot a width facial image for it, and is processed this facial image, to extract face characteristic data therein, Then these face characteristic data are stored in described local feature database as described pre-stored characteristics data, or are submitted to Described high in the clouds feature database stores.Time really it has been observed that stored these face characteristic data, can show in feature database For certain encrypted form, in order to strengthen its Information Security.
Described step S14, feeds back described authentication result information, its specific implementation to described WiFi access point apparatus As follows:
First, feed back described authentication result information to described WiFi access point apparatus, its object is to cause described WiFi Access point apparatus allows or stops the incoming end equipment providing described face characteristic data to be verified to access this WiFi access point The communication network that equipment is set up, but this to accessing the function that communication network allows or stops, by described WiFi access point apparatus realizes.Therefore, WiFi access point apparatus is by after receiving described authentication result information, according to recognizing The content that card object information is characterized, is made whether to allow it to the corresponding incoming end equipment initiating the request of access communications network The response of access communications network, such that it is able to confirm by inspecting it whether to be successfully accessed communication network at incoming end equipment Whether authentication is passed through.
What above various alternate embodiment did not all consider that access side equipment initiates is intended to access connecing of described communication network Enter the process of request, and only consider the face characteristic data of its follow-up submission are processed, therefore, adapt to above-mentioned enforcement Example, for described access request, is based particularly on the beacon frame of tradition WiFi agreement and the handshake request initiated, will be connect by WiFi Enter point device to process according to its traditional protocol logic, and the people described in its further requirement incoming end equipment is submitted to Face characteristic, is routed to control the process that end equipment does in the respective embodiments described above by WiFi access point apparatus the most again, this Sample, for controlling for end equipment, just have ignored the link that the access request of access side equipment carries out processing, only considers people The functional realiey that face characteristic is considered as request and is verified, thus simplify overhead.
But, in the embodiment that the present invention improves further, as it is shown in figure 5, the method farther includes previous step S11, obtains incoming end equipment and is intended to access the access request of the communication network that described WiFi access point apparatus is set up and feed back mirror Power performs instruction, in order to the face characteristic data described to be verified that follow-up acquisition performs instruction in response to this authentication and submits to.
Specifically, incoming end equipment detects the beacon frame (beacon) of the communication network that WiFi access point apparatus sets up Or determined the SSID of communication network by Probe Request (returning Probe Response frame) after, just can connect to WiFi Enter point device and initiate access request, do not consider the first kind above-mentioned of this access request at aforesaid various control end equipment In embodiment, this access request directly will be processed by WiFi access point apparatus;And in the present embodiment, WiFi access point apparatus can To route this access request to controlling end equipment, or the form after changing with certain sends control end equipment to, no matter which kind of Form, controls to be accordingly to be regarded as incoming end equipment after end equipment receives and is intended to access the communication network that described WiFi access point apparatus is set up Access request.In response to this access request, control end equipment and feedback one authentication is performed instruction in WiFi access point apparatus To described incoming end equipment, or by WiFi access point apparatus be converted into certain form give this incoming end equipment, and In aforesaid first kind embodiment, described authentication execution instruction will be sent to incoming end with sending out by WiFi access point apparatus source and set Standby.After incoming end equipment receives described authentication execution instruction (or the Probe Response that will be received by incoming end equipment Frame is considered as authentication and performs instruction), just can perform instruction in response to this authentication according to pre-set programs and start its image acquisition unit Obtain physical characteristic data to be verified and carry out feedback submission, thus perform aforesaid subsequent step S12-S14.
Each embodiment of remote authentication method is accessed it can be seen that part controlling the WiFi that end equipment realizes in conjunction with above-mentioned In embodiment, the access request of described incoming end equipment and the authentication in response to this request perform instruction, can be set by controlling end Standby process also route through WiFi access point.In another part embodiment, then without controlling to connect described in end equipment participation process Enter request and authentication performs instruction.In comparison, if processed the access request for it of incoming end by WiFi access point apparatus Feedback authentication performs instruction, then can simplify communication process, reduces the load controlling end equipment;If connect by controlling the process of end equipment Enter to hold equipment access request and by its source send out feedback authentication perform instruction, then the centralized management energy of the end equipment that can tighten control Power, promotes communications network security energy further.Further in improved procedure, implement to connect at WiFi access point apparatus and ask During asking, for confirming a management frame such as Request Response frame of this connection request process, just can be considered Described authentication performs instruction.
As shown in Figure 6, in the most perfect a kind of embodiment, control the WiFi performed by end equipment and access remote authentication Method also includes that step S15, statistics have the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated, After the frequency of failure is beyond preset value, shield the face characteristic data of this source address.
The face characteristic data described to be verified repeatedly submitted same source address to are by the failure of repeatedly failed authentication Number of times is tracked management, is favorably improved the safety of communication network, so, control the people that it can be received by end equipment Face characteristic is added up.No matter WiFi access point apparatus is the described face characteristic data of direct routing incoming end equipment, Or with the data message form of these face characteristic data of self Reconfiguration of form, when it is sent to described control end equipment, all The uniqueness characteristic of described incoming end equipment, such as its MAC Address, UUID or host name can be comprised in the packet submitted to Claim.So, a uniqueness characteristic just characterizes a source address, and controlling end equipment can be to having identical source address The face characteristic data check frequency of failure add up, preferably in the case of, such as half an hour or five points can be set The measurement period of clock, when, in this cycle, the accumulative of the face characteristic data that same source address is repeatedly submitted to suffers appointment time After the verification failure of number (preset value), or claim, beyond after this preset value, to cause controlling end equipment and this source address be considered as Malicious attack source place, or at least it is considered as disabled user's intrusion behavior.In this case, end equipment is controlled by this source of shielding The face characteristic data of this source address follow-up no longer will be verified and feed back by the face characteristic data of address, it is to avoid this The most whole communication network of machine suffers malicious attack.
The easiest and to achieve a kind of mode of effectively management be to add the above-mentioned source address to be shielded to one In blacklist, follow-up for the face characteristic data to be verified transmitted, first whether inquiry blacklist exists its source place Location, if it is present directly filter these face characteristic data to realize the shielding of the face characteristic data to this source address, if Do not exist, then process according to normal step.
Adapt to the setting of step S15, it is also possible to step S16 is set the most further, receives and belong to described next The recovery request of source address, cancels the face characteristic data shielding this source address in response to user instruction.
Incoming end equipment may preset when the face characteristic data that self provides are shielded, and request shield side gives extensive The disaster tolerance means of multiple its subsequent check request, implement particular by sending a recovery request to communication network.To this end, control End equipment processed, by this recovery request of reception, also comprises the source address of this incoming end equipment in this recovery request, this request will It is reviewed, thus, controlling end equipment may not necessarily release the shielding to this source address in the very first time.Release shielding generally with hands Dynamic mode realizes, and manager can know described recovery request by controlling the subscriber administration interface of end equipment, and Decide whether to agree to this recovery request.After this recovery request is agreed, controlling end equipment just can be by described source address from it Deleting in blacklist, follow-up the most no longer shielding has the face characteristic data of this source address, incoming end equipment access communication network The probability of network is thus lifted a ban.Although it is pointed out that and employing subscriber administration interface, but the setting of subscriber administration interface Put option may also comprise be stored in control end equipment option, the most above-mentioned blacklist and the content of above-mentioned recovery request, permissible It is stored in the memorizer controlling end equipment, and as the setting options of WiFi access point apparatus, in described user's management Interface shows.
As it is shown in fig. 7, in the another kind of embodiment improved further, control the WiFi performed by end equipment and access remotely mirror Power method also includes step S15 ', statistics has the failure time that the described face characteristic data of identical source address are repeatedly authenticated Number, after the frequency of failure is beyond preset value, sends sign and shields the announcement information of the access request belonging to this source address to institute The WiFi access point apparatus stated.
It can be seen that identical with previous perfect embodiment, controlling end equipment can be to face characteristic data by many The number of times of secondary failed authentication is added up, and follow-up how to achieve a butt joint into the shielding of end equipment.In the present embodiment, when The frequency of failure, beyond after preset value, is sent to WiFi access point apparatus by generating an announcement information, the content table of this announcement information Levy shielding and belong to the access request of this source address.It is to say, control the end equipment form with announcement information, notice WiFi connects Enter point device the access request specifying source address is shielded.Accordingly, WiFi access point apparatus just can be according to this notice Information no longer responds to the access request of source address therein or directly transmits the network frame that refusal accesses, so that this source The corresponding incoming end equipment in address cannot access the communication network of WiFi access point apparatus.Obviously, being different from precedent, shielding comes The function of source address will be realized by WiFi access point apparatus, and its shield effectiveness is faster and direct, and WiFi access point apparatus is very To without reprocessing the face characteristic data of this source address.
In like manner, step S15 is adapted to ', it is also possible to step S16 is set the most further ', receive and belong to described next The recovery request of source address, send in response to user instruction cancel shield this source address access request announcement information to Described WiFi access point apparatus.
Incoming end equipment may preset when the face characteristic data that self provides are shielded, and request shield side gives extensive The disaster tolerance means of multiple its subsequent check request, implement particular by sending a recovery request to communication network.To this end, control End equipment processed, by this recovery request of reception, also comprises the source address of this incoming end equipment in this recovery request, this request will It is reviewed, thus, controlling end equipment may not necessarily release the shielding to this source address in the very first time.Release shielding generally with hands Dynamic mode realizes, and manager can know described recovery request by controlling the subscriber administration interface of end equipment, and Decide whether to agree to this recovery request.After this recovery request is agreed, controls end equipment and just can encapsulate an announcement information, be used for Characterize and cancel the access request shielding this source address, this announcement information is sent to WiFi access point apparatus.WiFi access point After equipment receives this announcement information, just described source address is deleted from the data (may show as blacklist form) recorded Removing, follow-up the most no longer shielding has the access request of this source address, and the probability of incoming end device for communication network access is thus Lifted a ban.It is pointed out that the setting options of subscriber administration interface may also comprise and be stored in WiFi access point end equipment The data of the described source address to be shielded being recorded, blacklist as escribed above, manager is at described subscriber administration interface After recovery request described in middle permission, subscriber administration interface just can show and deletes the source address corresponding to this recovery request List.
The most detailed and disclose the WiFi that the portable control end equipment of the present invention implemented fully and access remotely mirror The various embodiments of power method, therefrom could be aware that, controlling end equipment can realize WiFi communication based on face characteristic data The authentication management of network, thus strengthen the safety of this communication network.
The present invention is applicable to the WiFi access authentication method of described portable incoming end equipment and has various embodiments, below Based on previous embodiment, will launch to illustrate the relevant content of remaining various alternate embodiment with regard to its each step.The most still join Read Fig. 3 and combine following word and understood:
Described step S21, initiates access request to WiFi access point apparatus, and its specific implementation is as follows:
Described WiFi access point apparatus is configured with communication network as AP, radiates WiFi signal in the air.A kind of enforcement In example, WiFi its beacon frame of access point apparatus fixed time broadcast (Beacon frame, when not hiding SSID), the portable access of the present invention End equipment, by scanning, finds this beacon frame, just can initiate described access request;In another kind of embodiment, especially for Hiding the situation of SSID, incoming end equipment can be by initiating Probe Request frame and from WiFi access point apparatus feedback Probe Response frame obtains network configuration information, the most also can initiate access request.
Generally, user can be initiated attached by the WiFi switch option arranging the page of incoming end device operating system The scanning of nearly WiFi communication network a, it is thus achieved that ssid list, is then clicked the SSID of corresponding communication network by user and connects Enter corresponding communication network.Incoming end equipment also can store the configuration information of the communication network that user once accessed, in this case, User only need to open WiFi switch option, it is possible to is automatically accessed preferably WiFi communication net by system according to default preference strategy Network.Therefore, it is possible to be considered as by user mutual, the user that instruction incoming end equipment accesses the communication network of the present invention can be produced Instruction, this communication network is initiated access request in response to this user instruction by incoming end equipment.
Described step S22, performs instruction in response to the authentication after this access request, starts image acquisition unit and obtains Face characteristic data.
Described authentication can be produced by numerous embodiments and perform instruction:
In one embodiment, after described access request is sent to WiFi access point apparatus, WiFi access point set Standby directly or through the control end equipment as described in routing to after certain frame format conversion (being loaded in Frame), thus cause Control end equipment feedback one authentication and performs instruction, then by WiFi access point apparatus, this authentication performed instruction and route to incoming end and set Standby.
In another embodiment, after described access request is sent to WiFi access point apparatus, WiFi access point set For being directly acted upon, and fed back authentication by WiFi access point apparatus source with sending out perform instruction to incoming end equipment.
In another enforcement, described authentication performs instruction and can have sent by incoming end equipment according to pre-set programs logic Trigger voluntarily after described access request, specifically, can be by its protocol procedures traditionally, complete connection request Stage, receive such as Probe Response frame (at this just be considered authentication performs instruction) triggering following the most voluntarily and walk Suddenly, and avoid relying in external equipment, simplify operation flow.
Which kind of no matter use mode to come described access request feedback authentication to perform instruction, the most do not affect incoming end equipment The execution of subsequent step.But there is exception, if the instruction that i.e. this access request is comprised is to this incoming end equipment Source address is shielded by WiFi access point apparatus, then incoming end equipment can be caused cannot to receive described authentication and perform instruction, from And terminate the execution of subsequent step.
After incoming end equipment obtains described authentication execution instruction, this authentication performs instruction and can trigger in incoming end equipment The startup of image acquisition unit.The startup of accompanying image acquiring unit, can activate one scan interface, shows in this scanning interface The preview image of image acquisition unit.As user by the camera lens of image acquisition unit towards face, by voice, gesture, button Just can obtain a corresponding facial image when applying shooting instruction Deng any-mode, and facial image is carried out face characteristic The extraction of data.Or, image acquisition unit is exempted from through user instruction effect, and automatically with the arbitrary frame content in preview image As facial image, then this facial image is extracted face characteristic data.After successfully getting described face characteristic data, Just described scanning interface can be exited controlled or voluntarily.
Described step S23, feeds back these face characteristic data to WiFi access point apparatus and refers to authentication execution described in response Order, its specific implementation is as follows:
After incoming end equipment completes described face characteristic data acquisition, just need to submit to these face characteristic data WiFi access point apparatus, in order to the authentication to these face characteristic data completely, as the response that described authentication performs instruction.
Incoming end equipment is connected owing to not setting up WiFi with WiFi access point apparatus, it is impossible to transmit institute as a data frame The face characteristic data stated, to this end, incoming end equipment uses one group to be total to multiple multicast frames to transmit face characteristic.Concrete and Speech, face characteristic data are converted to binary code by incoming end equipment, segmentation be loaded into multiple multicast frame can edit field, tool Body refers to, in its address field, then send the plurality of multicast frame.
It is responsible for processing the equipment of face characteristic data, with reference to the corresponding embodiment in front announcement, the most described WiFi Access point apparatus, it is possible to for described control end equipment, after receiving those multicast frames, from each multicast frame can be edit field Extracting the binary code of loaded face characteristic data, and assemble by striping order, then corresponding conversion is face Characteristic.
For the consideration of the Information Security strengthened in transmitting procedure, after obtaining described face characteristic data, Ke Yiyi According to the agreement with the equipment of responsible process face characteristic data, encrypt for face characteristic, the most again by the face after encryption Characteristic is encoded in described multicast frame.Corresponding, the equipment being responsible for processing should also be as being decrypted it.
It is responsible for processing the equipment of face characteristic data, in conjunction with aforesaid a kind of embodiment, can be that described WiFi accesses Point device, it obtains, by resolving, the face characteristic data received, then is encoded in Frame, is transferred to described control end Equipment, then from Frame, extracted described face characteristic data by controlling end equipment;In conjunction with another embodiment aforesaid, permissible Directly obtained the multicast frame through WiFi access point apparatus route by described control end equipment, resolve and obtain face characteristic number therein According to.
Control end equipment then its face characteristic data received to be authenticated.The section Example of aforementioned announcement In, if controlled containing pointing to the source address of described incoming end equipment in the blacklist of end equipment, this source address can be with Described face characteristic data provide in case identifying in the lump, then, controlling end equipment may not make described face characteristic data Response, although or respond, but cause these face characteristic data to be rejected authentication the most at last.If controlling end equipment not exist Its blacklist finds to provide the source address of the incoming end equipment of these face characteristic data, then special to this face by normal processes Levy data to authenticate.According to aforementioned different embodiment, control end equipment by the face characteristic data of incoming end equipment and basis Pre-stored characteristics data in the feature database of machine or cloud server compare, when finding to exist in feature database and described face spy When levying the pre-stored characteristics data of data consistent, i.e. can be considered and authenticate successfully, be otherwise considered as failed authentication, accordingly generate authentication result Information, is sent to WiFi access point apparatus.Face characteristic data designated herein are consistent with pre-stored characteristics data, should not limit to In data representation form or its data content the most completely the same, for example, it is possible to refer to both the degree of approximation arrive preset Degree, or it is in the range of permission, i.e. can be considered that both are consistent.
In the most perfect embodiment, described WiFi access point apparatus can cache or store and described source address The corresponding pre-stored characteristics data belonging to described feature database, even cache or store whole feature database, in this case, when connecing When entering end equipment arrival WiFi access point apparatus, the feature database that WiFi access point apparatus can cache with it in advance compares, To determine whether to authenticate successfully, and generate authentication result information voluntarily according to authenticating result, and make this to face characteristic data The process of authentication is not necessarily dependent on the participation controlling end equipment.When WiFi access point apparatus with caching formal layout described in pre- When depositing characteristic or its whole feature database, it is suitably these pre-stored characteristics data or feature database arranges an effect duration, to ensure The promptness that data update.Obviously, can by control end equipment control WiFi access point apparatus cache or storage prestore Characteristic or the long-range renewal of whole feature database.
Described step S24, after these face characteristic data are by authentication, it is achieved to described WiFi access point apparatus institute frame If the access of communication network, its specific implementation is as follows:
Either control end equipment and send the described authentication result characterizing authentication success or failure to WiFi access point apparatus Information, or generated described authentication result information voluntarily by WiFi access point apparatus, described WiFi access point apparatus all can According to authenticating result, the access request of described incoming end equipment is made last response.Specifically, WiFi access point apparatus Following any one or the response of any various ways can be made, to reach described access request according to authentication result information The purpose finally responded:
Mode one, according to IEEE 802.11 agreement, according to described authentication result information representation authentication success or failure not Same situation, characterizes to correspondingly incoming end equipment feedback and allows or stop it to access the management frame of described communication network, it is common that A kind of management frame, completes authentication phase.After incoming end equipment receives this management frame, just can from the content check of management frame whether By authentication, thus correspondingly set up or terminate the connection of communication network with WiFi access point apparatus, authentication by time, open Dynamic association phase, it is achieved the access to the communication network that described WiFi access point apparatus is set up.
Mode two, according to the different situations of described authentication result information representation authentication success or failure, when it characterizes authentication During success, WiFi access point apparatus i.e. allows the association request of incoming end equipment to make it access described communication network, it is achieved Described signal network is successfully accessed by incoming end equipment;When characterizing failed authentication, the most the association of access side equipment please not Ask and respond, thus cause incoming end equipment to be considered as request timed out and be considered as failed authentication.
Mode three, described authentication result information is sent to described incoming end as response and sets by WiFi access point apparatus Standby, self then operates according to IEEE 802.11 agreement, after incoming end equipment receives and parses through this authentication result information, works as sign When authenticating successfully, i.e. initiate association request according to agreement and confirm to realize the access to described communication network;When characterizing failed authentication Time, then can make the subsequent job of request etc the most again accordingly.
Certainly, broad sense is treated, the management frame described in mode one, itself also can be considered described authentication result information.Ability Field technique personnel can with use flexibly above-mentioned various modes realize flexibly face characteristic data by authentication after, at incoming end equipment Middle foundation connects or carries out the process warned.In a kind of blanket embodiment, when incoming end equipment confirms that authentication is lost After losing, to notify that user makes subsequent treatment, man-machine interaction can be improved in user interface display alarm information.And when accessing After end equipment confirms to authenticate successfully, the most this connection is confirmed to be Trusted channel, and after Trusted channel is set up, incoming end equipment is permissible Certain agreement preengage with WiFi access point apparatus, storage is for the connection letter of the follow-up communication network exempted from described in authenticated login Breath, so that this link information of incoming end equipment utilization is exempted from easily to access described communication network through any authentication procedure.
Referring to Fig. 8, as in the embodiment that the present invention further enhances, the present invention is applicable to portable incoming end equipment WiFi access authentication method also include step S25, statistics initiates the described communication network of unsuccessful access after described access request Number of times, after this number of times reaches predetermined value, it is determined that the machine is in the state that access request is shielded, and sends out in response to user instruction Acting the recovery request recovering to allow its access request, its specific implementation is as follows:
On the premise of foregoing control end equipment or WiFi access point apparatus support disaster tolerance means, incoming end equipment The number of times of connection failure can be added up, in order to shield access at self controlled terminal equipment or WiFi access point apparatus In the case of, can be recovered self by technological means and access the possibility of described communication network.
As it was previously stated, when, after failed authentication, described WiFi access point apparatus being set up by causing incoming end equipment The connection of communication network, face characteristic data repeatedly failed authentication that equipment provides because of it and to suffer permanent mask be not conform to Reason.For reaching the purpose of reasonable benefit/risk, the number of times that self is accessed described communication network failed by incoming end equipment is added up, And provide a preset value for it, after this statistics number exceedes this preset value, i.e. can determine that the machine is in access request and is shielded The state covered, therefore and open one of user interface controls parts, and these control parts can be a virtual key, in order to passes through Communication network described in this control component request recovers the response to its access request.As a kind of equivalent means, also can set Put an effect duration, only when statistics at the beginning of to this effect duration duration arrive time, could open described in control parts.
Then, user can trigger its user instruction by the control parts described in triggering, thus, incoming end equipment rings Should initiate to recover the recovery request of the access request of permission self in this user instruction to described communication network.Accordingly, To realize by controlling end equipment or WiFi access point apparatus depending on shielding mechanism, this recovery request by arrivals control end equipment or WiFi access point apparatus, the equipment receiving this recovery request can notify that manager responds, when manager is by this recovery After request, the follow-up access request of incoming end equipment just can be by described communication network normal process.
The most detailed and disclose the WiFi access authentication side that the portable incoming end equipment of the present invention is implemented fully The various embodiments of method, therefrom could be aware that, the requirement of the communication network that incoming end equipment can be accessed, in the machine collection Face characteristic data, it is provided that authenticate to communication network, thus coordinate the safety strengthening communication network.
The present invention is applicable to the WiFi access authentication control method of WiFi access point apparatus and has various embodiments, below will Based on previous embodiment, launch to illustrate the relevant content of remaining various alternate embodiment with regard to its each step.The most still refer to Fig. 4 also combines following word and is understood:
Described WiFi access point apparatus, generally also makes WiFi router, traditional WiFi router have WiFi chip Module, and achieved by bottom layer driving and manage function accordingly, these management functions with IEEE 802.11 agreement are generally Basis is developed.In at least part of embodiment that the present invention relates to, it is found that with the base in IEEE 802.11 agreement On plinth, need the function that realized according to the corresponding embodiment of the present invention and the bottom layer driving function of abundant WiFi chip pattern, Making it be conducive to assisting to realize the function that at least part of embodiment of the present invention to be realized, these functions are described by being embodied in During the different step of the multiple alternate embodiment of WiFi access authentication control method describes.
Described step S31, receives the access request of incoming end equipment, and in like manner, described access request is that incoming end sets The standby early stage request initiated afterwards in the service set (SSID) detecting the present invention.According to aforementioned announcement control end equipment with The difference of the role's relations of distribution between WiFi access point apparatus, the process of the access request described in reception can be presented as difference The change of embodiment.
Be applicable to a kind of embodiment of the management that by WiFi access point apparatus, access request is carried out traditional approach, WiFi After access point apparatus receives access request, will voluntarily this access request be responded, so it is not route or Conversion output, especially need not be sent to described control end equipment.On the contrary, in another embodiment improved, WiFi access point sets Standby receive request after, this access request can be transmitted to institute with self form such as certain Frame, the form that manages frame The control end equipment stated, is responsible for response by controlling end equipment, the most also this access request of direct routing can enter to control end equipment Row response.Specifically, described access request should arrive this request is carried out directly in response to equipment in.
A kind of embodiment of situation about access request can be shielded be applicable to described WiFi access point apparatus, After WiFi incoming end equipment receives this access request, from this request, extract the incoming end equipment of this access request of initiation Source address, inquires about its blacklist, when confirming that this source address is contained in blacklist, just terminates the sound to this access request Should, or correspond directly to this access request and feed back the management frame that a sign refusal accesses, thus strengthen the peace of communication network Full management.As source address does not appears in blacklist, then can continue other steps according to normal process.
Described step S32, responds described access request and feeds back authentication and perform instruction, and its specific implementation is as follows:
Understanding in conjunction with the aforementioned different embodiments about controlling end equipment, described authentication performs instruction both can be by controlling End equipment sources processed is sent out and is route through WiFi access point apparatus, it is possible to sent out by WiFi access point apparatus source, thus, designated herein is anti- Feedback authentication performs instruction, both can refer to that the authentication that control end equipment sources is sent out is performed instruction is routed to the enforcement of described incoming end equipment Mode, it is possible to for being sent to the embodiment of described incoming end equipment by the WiFi access point apparatus source property sent out, in conjunction with before take off The embodiment shown, after described access request is initiated, completes the connection request stage of IEEE 802.11 agreement, then to certification rank After Duan Faqi certification request, and produce the management frame of the certification response asked in response to this certification, it is possible to regard reflects as a kind of Power performs instruction.Concrete which kind of mode of employing, still needs to distribute pass depending on the managerial roles controlling end equipment and WiFi access point apparatus Depending on system.
It can be deduced that after a certain access request is implemented masking operation according to blacklist by WiFi access point apparatus, will It is no longer respond to this access request and feeds back described authentication and perform instruction.
Described step S33, receives and authenticates the face characteristic data performing instruction and feed back described in response, and request controls end Equipment is authenticated, and its detailed description of the invention shows as following various situation of change:
As disclosed in front, portable incoming end equipment will be responsive to the described authentication execution of WiFi access point apparatus transmission and refers to Make and gather face characteristic data, and by face characteristic data feedback to communication network, direct controlled terminal equipment receives, or such as The present embodiment, arrives WiFi access point apparatus in advance.
With reference in a kind of embodiment as disclosed in front, WiFi access point apparatus can be voluntarily to the face characteristic received Data authenticate, WiFi access point apparatus storage or be cached with the described feature database needed for authentication or or many therein Bar pre-stored characteristics data, WiFi access point is by the face characteristic data received and described (in feature database) pre-stored characteristics number According to mating, when matching consistent face characteristic data, just it is considered as authenticating successfully;Otherwise it is considered as authentication to lose Lose.About the subsequent treatment of the present embodiment, the most comprehensively disclose in the aforementioned corresponding method of incoming end equipment, follow-up general Based on latter embodiment, introduce.
In another embodiment, the not responsible face characteristic data to being received of WiFi access point apparatus authenticate, but Face characteristic data route to described control end equipment or encapsulate voluntarily after these face characteristic data become Frame be sent to Described control end equipment, request controls end equipment and authenticates it, by described control end equipment by described face characteristic number Compare according to the pre-stored characteristics data with the feature database in the feature database or cloud server of its this locality, confirm both whether one Causing, and authentication result information feeds back to WiFi access point apparatus, WiFi access point apparatus is according to authentication result information representation Content and confirm to authenticate successfully or failure.
Certainly, during multiple device transmission, face characteristic data both can be in plain text, it is also possible to is encryption , cipher mode also can set flexibly.Only between the individual devices the transmission of this information need to be carried out agreement in advance, mutual when working Match.
It is pointed out that incoming end equipment is connected owing to not setting up WiFi with WiFi access point apparatus, it is impossible to data The face characteristic data described in form transmission of frame, to this end, incoming end equipment uses one group to be total to multiple multicast frames to transmit face Characteristic.Specifically, face characteristic data are converted to binary code by incoming end equipment, and segmentation is loaded into multiple multicast frame Can edit field, specifically refer to, in its address field, then send the plurality of multicast frame.In the present embodiment, described After WiFi access point apparatus is responsible for receiving those multicast frames, edit field can extract loaded people from each multicast frame The binary code of face characteristic, and assemble by striping order, then corresponding conversion is face characteristic.
Control end equipment then its face characteristic data received to be authenticated.The section Example of aforementioned announcement In, if controlled containing pointing to the source address of described incoming end equipment in the blacklist of end equipment, this source address can be with Described face characteristic data provide in case identifying in the lump, then, controlling end equipment may not make described face characteristic data Response, although or respond, but finally inform that these face characteristic data are rejected authentication.If controlling end equipment not at it Blacklist finds to provide the source address of the incoming end equipment of these face characteristic data, then by normal processes to this face characteristic Data authenticate.According to aforementioned different embodiment, control end equipment by the face characteristic data of incoming end equipment and the machine Or the pre-stored characteristics data in the feature database of cloud server compare, when finding that feature database exists and described face characteristic During the pre-stored characteristics data of data consistent, i.e. can be considered and authenticate successfully, be otherwise considered as failed authentication, accordingly generate authentication result letter Breath, is sent to WiFi access point apparatus.It is emphasized that the one of face characteristic data designated herein and pre-stored characteristics data Cause, should not be confined on data representation form or its data content the most completely the same, for example, it is possible to refer to both degrees of approximation Arrive the degree preset, or be in the range of permission, i.e. can be considered that both are consistent.
Described step S34, according to the authentication result information of the sign authentication success or failure controlling end equipment feedback, phase Should allow or stop described incoming end equipment to access the communication network preset, its concrete multiple implementation is as follows:
As it was previously stated, in typical a kind of embodiment, described authentication result information comes from described control end equipment, After WiFi access point apparatus receives the authentication result information of described control end equipment feedback, resolve this authentication result information, To determine the particular content that this authentication result information is characterized, it is common that refer to authenticate success or failed authentication is two kinds of interior Hold.
Additionally, in another embodiment of the invention, WiFi access point apparatus can control according to its controlled terminal equipment And the feature database (or specific to its pre-stored characteristics data) realizing caching or the storage updated supplies described face to be verified special Levy data to mate, and by the authentication result information described in matching result also alignment processing one-tenth, thus WiFi access point apparatus Just can generate described authentication result information primaryly.
Embodiments disclosed herein apparently more close to the tradition realization of IEEE 802.11 agreement, is advised according to this agreement The process setting up connection of model, in authentication phase face characteristic data described in incoming end equipment is submitted to for authentication, is controlling After end equipment or WiFi access point apparatus are to its authentication success or failure, WiFi access point apparatus the certification generated according to authentication Object information feeds back a certification acknowledgement frame, concretely characterizes certification and successfully manages frame or characterize the management frame of authentification failure, From the visual angle of incoming end equipment, this certification acknowledgement frame also can broadly be considered as it and have received authentication result information.
Certainly, it is possible to then make improvement by a larger margin, specifically: WiFi access point apparatus also can not directly process Control the authentication result information of end equipment, and give described incoming end equipment by its direct routing.Or, even if WiFi access point Face characteristic data are authenticated by equipment voluntarily, it is possible to generate the authentication result letter being different from IEEE 802.11 protocol specification Breath.In this kind of embodiment, the form of described authentication result information and content all can be differently configured from IEEE 802.11 agreement, As long as can agreement in advance between incoming end equipment and WiFi access point apparatus.
Therefore, in any case, though non-abundant steps necessary, WiFi access point apparatus can be sent out to incoming end equipment sources Or forward authentication result information, incoming end equipment can resolve this authentication result information, according to the follow-up of decision self connected Journey.
But, as basic function, WiFi access point apparatus can resolve the described authentication result information under self vision. After WiFi access point apparatus resolves described authentication result information, the content that can characterize according to it, i.e. authenticate successfully or lose Losing, the association request that equipment follow-up expectation in access side completes to connect responds, it is determined whether allow to set up described access WiFi Trusted channel between end equipment.In conjunction with the various situations above disclosed, WiFi access point apparatus can be recognized according to described The difference of card object information, the described access request of access side equipment is made following result and is controlled, as follows:
When authentication result information representation authenticates successfully, send sign certification to incoming end equipment and successfully manage frame, with Allow incoming end equipment to access the communication network set up, according to IEEE 802.11 agreement, table is being received for incoming end equipment Levy the association request initiated voluntarily after certification successfully manages frame and subsequent communications gives normal response, in response to this association request And feed back the management frame being successfully associated to described incoming end equipment to show confirmation, thus set up incoming end equipment and WiFi access point WiFi between equipment connects.
When authentication result information representation failed authentication, send the management frame characterizing authentification failure to incoming end equipment, with Stop incoming end equipment to access the communication network set up, according to IEEE802.11 agreement, sign is being received for incoming end equipment The association request initiated voluntarily after the management frame of authentification failure, WiFi access point apparatus or not response, or in response to this pass Connection is asked and is fed back the failed management frame of association to described incoming end equipment to show alarm.
Certainly, according to the section Example of aforementioned announcement, incoming end equipment receives described authentication result information Afterwards, the face characteristic data that just knowing self provides authenticate successfully or failure, and therefore, incoming end equipment can depend on voluntarily The connection procedure of follow-up IEEE 802.11 agreement institute specification is decided whether to continue according to authentication result information.When authentication result information Characterize when authenticating successfully (as described sign certification successfully manages frame), then can initiate association request, receive WiFi access point After the acknowledgement frame being successfully associated of equipment feedback, complete the access to described communication network.When authentication result information representation reflects (such as the management frame of described sign authentification failure) when weighing unsuccessfully, then can terminate follow-up connection procedure, as necessary by user circle Face display alarm information.
It will be appreciated that according to above-mentioned each embodiment, at incoming end equipment, from its visual angle, the authentication result received Information, both can be primary by WiFi access point apparatus or the communication format including pre-agreement custom content of route, also The content that WiFi access point apparatus can be characterized according to its authentication result information received and according to IEEE 802.11 agreement The management frame characterizing certification success or failure sent.
For convenience of management and operation, after incoming end equipment is successfully accessed the communication network of WiFi access point apparatus, The information of incoming end equipment can be saved in this locality by WiFi access point apparatus, and it is considered as Trusted channel, and follow-up incoming end sets For when again accessing, based on trusting relationship, the execution process of its authentication phase can be removed from, thus simplify follow-up access.
Refer to Fig. 9, in the embodiment of a further materialization, performed by the WiFi access point apparatus of the present invention WiFi access authentication control method also includes previous step S30, based on the pre-established the machine of WiFi connected mode and described control end The Trusted channel of equipment, its specific implementation refer to aforementioned relevant introduction.
Refer to Figure 10, in the most perfect embodiment, the present invention the WiFi performed by WiFi access point apparatus Access authentication control method also includes step S35, in response to reading instruction and/or the configuration-direct of described control end equipment, instead The configuration parameter of the communication network of feedback and/or amendment the machine, its specific implementation can be in conjunction with being previously with regard to control end equipment Numerous embodiments, as follows:
Foregoing control end equipment, can read the configuration ginseng of described communication network from WiFi access point apparatus Number, and show a subscriber administration interface for it, subscriber administration interface is stated relevant setting options, it is provided that carry out to user as Amendment, when user submits amendment to, then submits to WiFi access point apparatus and carries out parameter modification, thus change described communication network The configuration of at least some of parameter.
Accordingly, showing WiFi access point apparatus side, it can receive the reading instruction controlling end equipment, and calls Relate to the configuration file of described communication network, and relate to described communication network in the control end equipment described configuration file of feedback Configuration parameter.In like manner, WiFi access point apparatus can also receive control end equipment to be have modified described configuration parameter by user (right Should be in the setting options in user interface) post package formed configuration-direct, from configuration-direct, read the configuration being modified The data of relevant configured parameter are modified according to configuration-direct, and are made it come into force by parameter and data thereof, thus realize and control End equipment processed matches, and provides the user better remote maintenance and experiences.
As it was previously stated, the present invention can increase the control at WiFi access point apparatus for the consideration improving safety Function, to this end, refer to the content disclosed in various improved procedures of lower section:
It is adapted to controlling an embodiment of realization at end equipment, as shown in figure 11, performed by WiFi access point apparatus WiFi access authentication control method also set up step S36, its receive from described control end equipment sign shield belong to finger Determine the announcement information of the access request of source address, terminate the incoming end equipment specifying source address contained by this announcement information The response (the most not feeding back Probe Response frame) of access request, or feed back, to it, the management frame that cannot connect.Thus, connect Enter end equipment to will be regarded as to be connected with described communication network.
Further in improved procedure, after receiving this announcement information to, this source address is added the blacklist held In list, thus, WiFi access point apparatus can by by the source address in the access request of the access terminal received with Record in blacklist mates, and sees whether this source address is present in this blacklist, when present the most directly by it Access request shields;If not existing, then press normal rule and process.
For improving the management function to WiFi access point apparatus, in the embodiment further enhanced, refering to Figure 12, previous On the basis of embodiment, the WiFi access authentication control method of the present invention also includes step S37, receives the cancellation controlling end equipment Shield the announcement information of the access request of this source address, recover the access of the incoming end equipment corresponding to described source address The response of request.With reference to previous embodiment, can be embodied according to described announcement information, extract in this announcement information The source address of shielding to be cancelled, then delete from its blacklist.
In the embodiment increased further, it is adaptable to the user interface management function that described control end realizes, see Figure 13, WiFi access authentication control method performed by WiFi access point apparatus also sets up step S38, receives the recovery of incoming end equipment Request, route this request and cancels the face characteristic to this incoming end equipment to the described end equipment that controls with request control end equipment The shielding of data.This step and aforementioned control terminal equipment are implemented the embodiment of shielding face characteristic data and are adapted, when described control After face characteristic data are shielded by end equipment processed, it is allowed to the recovery request described in the initiation of incoming end equipment, this recovery please Ask and sent by described communication network, just routed to described control end equipment by WiFi access point apparatus.Described control After end equipment receives this announcement information, can alert to user in user interface, user enters user's pipe according to warning information instruction The private pages at reason interface, whether examination & verification allows this recovery request, when it allows, controls end equipment and just eliminates described The shielding of the face characteristic data of incoming end equipment, namely again opened authentication functions for described incoming end equipment.Thus And a kind of effective technology disaster relief means are provided after incoming end equipment controlled terminal device mask.
The most detailed and disclose the WiFi that the portable WiFi access point apparatus of the present invention implemented fully and access mirror The various embodiments of power control method, therefrom could be aware that, WiFi access point apparatus can set with control end equipment and incoming end For matching, improve the authentication functions of its open communication network, improve safety coefficient and administrative convenience degree.
According to the modular design concept of computer program, the present invention also provides corresponding device for above-mentioned each method, with Under describe in detail:
A kind of WiFi that the present invention is applicable to described portable control end equipment and provides accesses remote authentication device to be had Various embodiments, below by the way of adapting with described WiFi access remote authentication method, launches this device is described The relevant content of various alternate embodiment.
Refer to Figure 14, WiFi access remote authentication device and include acquiring unit 12, verification unit 13 and feedback unit 14, the function that each unit is realized is understood incorporated by reference to accompanying drawing and following word:
In the case of acquiescence controls end equipment and the foundation of WiFi access point apparatus has Trusted channel, described WiFi accesses Remote authentication device generally runs according to the order of its acquiring unit 12, verification unit 13, feedback unit 14 and performs.About building The process of vertical Trusted channel is the most here disclosed: in a kind of embodiment, control end equipment in advance with WiFi access point apparatus Between by WiFi connection in the way of set up Trusted channel, specifically, control end equipment can with STA mode start access be in WiFi access point apparatus under ap mode, then, is common to each embodiment but situation not necessarily as the present invention, can To arrange a dispensing unit 10 as shown in figure 15, be configured to respond to user and manage instruction, show subscriber administration interface, with In being modified for the setting options for described WiFi access point apparatus.By running this dispensing unit 10, control end equipment and just may be used Call the setting options of WiFi access point apparatus according to pre-agreement, these setting options shown on subscriber administration interface, Show at touch-sensitive display.User has adjusted described subscriber administration interface at control end equipment, is by controlling on end equipment Trigger user and manage instruction, or initiated in the way of user manages instruction by triggering by acquiescence.And described user's management field Face, is managed the triggering of instruction by this user and shows, show the various setting options of WiFi access point apparatus thereon, it is allowed to use These setting options acting on WiFi access point apparatus (referring in particular to the setting options of its communication network) are revised at family, pass through Control end equipment and realize the adapter of the administration interface to WiFi access point apparatus, thus more convenient management operation is provided.Described Setting options, the SSID name of such as communication network, DHCP function setting item, channel number, authentication mode selection etc., multiple many Sample, all belongs to the option that WiFi network function is relevant, and its change will cause WiFi access point apparatus generation allocative effect to change, All can be considered this.Described " option " word can not be interpreted as " alternative ", the limitation situation of " multiselect one ", ability especially This should be known by field technique personnel.
Described acquiring unit 12, the request transmitted for obtaining WiFi access point apparatus accesses its communication network and submits to Face characteristic data to be verified, its specific implementation is as follows:
In a kind of embodiment, control that end equipment can directly process that incoming end equipment sends comprises described people to be verified The multicast signal of face characteristic obtains described face characteristic data.Specifically, the most successfully connect due to incoming end equipment Enter the communication network that WiFi access point apparatus provides, thus, it is impossible to send face characteristic by Frame, but can make It is total to multiple multicast frames with one group and transmits its data.Face characteristic data are converted to binary code by incoming end equipment, then add Be downloaded to multiple multicast frame can edit field, specifically refer to, in its address field, then send the plurality of multicast frame.Control end Equipment directly receives those multicast frames, then from extracting by the binary code edit field, is reconverted into face characteristic number According to.
In another embodiment, the multicast signal of above-mentioned access side equipment extracts the operation of face characteristic data and is connect by WiFi Enter point device to complete, by WiFi access point apparatus it is loaded in Frame the most again and is sent to control end equipment, control end Equipment directly extracts face characteristic data from Frame.
After acquiring unit 12 obtains described face characteristic data, according to agreement, if it is encryption data, it should to it It is decrypted, otherwise, is used directly for follow-up verification.
Described verification unit 13, is used for verifying described face characteristic data, obtains and characterizes recognizing of verification success or failure Card object information, its specific implementation is as follows:
Specifically, control end equipment and feature that a storage have the face characteristic data of validated user can be obtained ahead of time Storehouse, this feature database can be stored in control end equipment local storage, it is also possible to being stored in can be with controlled terminal equipment Carried out in the cloud server utilized by remote request.Face characteristic data in feature database, namely pre-stored characteristics data, can Exist in an encrypted form to strengthen its Information Security.When verifying described face characteristic data, controlling end equipment can be suitable for Feature database storage position is different and performs the most different processes:
It is applicable to locally stored feature database, controls end equipment and pass through verification unit 13, by face characteristic number to be verified Compare according to the pre-stored characteristics data in feature database, if it is confirmed that there is the pre-stored characteristics with this face characteristic data consistent Data, the content that these face characteristic data i.e. visual provide for validated user identity, otherwise, it is considered as what disabled user's identity provided Content, according to both of these case, just can generate the authentication result information characterizing verification success or failure respectively.People designated herein Face characteristic is consistent with pre-stored characteristics data, should not be confined on data representation form or its data content the most complete one Cause, for example, it is possible to refer to that both degrees of approximation arrive the degree preset, or be in the range of permission, i.e. can be considered both Unanimously.
It is applicable to be stored in the feature database of cloud server, controls end equipment by verification unit 13 by described to be verified Face characteristic data be encapsulated in verification request in, be sent to cloud server, these face characteristic data of server by utilizing hold The all checking procedures described above of row, finally the authentication result information described in cloud server generates feeds back to control end equipment.
Could be aware that, either verify in this locality, be still submitted to cloud server and verify, control end equipment All can get described authentication result information by verification unit 13.
In order to construct this feature storehouse, in a kind of embodiment, control the WiFi performed by end equipment and access remote authentication device Start and perform its collecting unit 18 farther included, be configured to respond to user's acquisition instructions, show image acquisition interface, For gathering the face characteristic data of user as described pre-stored characteristics data.
Generally, control end equipment can construct to be specifically designed to and realize this device and the application program of this collecting unit 18, when this When application program runs, can be activated by virtual key or certain gestures and show described in image acquisition interface, adjoint This image acquisition interface is activated, and the image acquisition unit such as photographic head starting control end equipment is carried out shoot image pre- Looking at, after user determines a facial expression, another by the form realization of such as voice, gesture, virtual key etc is true Recognizing instruction, image acquisition unit just can shoot a width facial image for it, and is processed this facial image, to extract it In face characteristic data, then these face characteristic data are stored in described local special as described pre-stored characteristics data Levy in storehouse, or be submitted to described high in the clouds feature database and store.Time really it has been observed that stored these face characteristic data, Certain encrypted form can be shown as, in order to strengthen its Information Security in feature database.
Described feedback unit 14, for feeding back described authentication result information to described WiFi access point apparatus, it is specifically real Existing mode is as follows:
First, feedback unit 14 feeds back described authentication result information to described WiFi access point apparatus, its object is to lead Cause described WiFi access point apparatus to allow or stop the incoming end equipment providing described face characteristic data to be verified to access to be somebody's turn to do The communication network that WiFi access point apparatus is set up, but this to accessing the function that communication network allows or stops, It is to be realized by described WiFi access point apparatus.Therefore, WiFi access point apparatus will receive described authentication result information Afterwards, the content characterized according to authentication result information, the corresponding incoming end equipment initiating the request of access communications network is done Go out the response whether allowing its access communications network, such that it is able to by inspecting whether it is successfully accessed logical at incoming end equipment Communication network and confirm to authenticate and whether pass through.
What above various alternate embodiment did not all consider that access side equipment initiates is intended to access connecing of described communication network Enter the process of request, and only consider the face characteristic data of its follow-up submission are processed, therefore, adapt to above-mentioned enforcement Example, for described access request, is based particularly on the beacon frame of tradition WiFi agreement and the handshake request initiated, will be connect by WiFi Enter point device to process according to its traditional protocol logic, and the people described in its further requirement incoming end equipment is submitted to Face characteristic, is routed to control the process that end equipment does in the respective embodiments described above by WiFi access point apparatus the most again, this Sample, for controlling for end equipment, just have ignored the link that the access request of access side equipment carries out processing, only considers people The functional realiey that face characteristic is considered as request and is verified, thus simplify overhead.
But, in the embodiment that the present invention improves further, as shown in figure 16, WiFi accesses remote authentication device and enters one Step includes the start unit 11 of preposition operation, is intended to access what described WiFi access point apparatus was set up for obtaining incoming end equipment The access request of communication network and feed back authentication and perform instruction, in order to follow-up acquisition instructs in response to the execution of this authentication and submits to Described face characteristic data to be verified.
Specifically, incoming end equipment detects the beacon frame (beacon) of the communication network that WiFi access point apparatus sets up Or determined the SSID of communication network by Probe Request (returning Probe Response frame) after, just can connect to WiFi Enter point device and initiate access request, do not consider the first kind above-mentioned of this access request at aforesaid various control end equipment In embodiment, this access request directly will be processed by WiFi access point apparatus;And in the present embodiment, WiFi access point apparatus can To route this access request to controlling end equipment, or the form after changing with certain sends control end equipment to, no matter which kind of Form, controls to be accordingly to be regarded as incoming end equipment after end equipment receives and is intended to access the communication network that described WiFi access point apparatus is set up Access request.In response to this access request, controlling end equipment will feed back an authentication execution instruction warp by start unit 11 To described incoming end equipment in WiFi access point apparatus, or it is converted into certain form to being somebody's turn to do by WiFi access point apparatus Incoming end equipment, and in aforesaid first kind embodiment, described authentication performs instruction and will be sent out by WiFi access point apparatus source Be sent to incoming end equipment.After incoming end equipment receives described authentication execution instruction (or will be received by incoming end equipment Probe Response frame be considered as authentication and perform instruction), just can instruct in response to the execution of this authentication and open according to pre-set programs Its image acquisition unit dynamic obtains physical characteristic data to be verified and carries out feedback submission, so that it is guaranteed that this device remaining element Properly functioning.
Each embodiment of remote authentication device is accessed it can be seen that part controlling the WiFi that end equipment realizes in conjunction with above-mentioned In embodiment, the access request of described incoming end equipment and the authentication in response to this request perform instruction, can be set by controlling end Standby process also route through WiFi access point.In another part embodiment, then without controlling to connect described in end equipment participation process Enter request and authentication performs instruction.In comparison, if processed the access request for it of incoming end by WiFi access point apparatus Feedback authentication performs instruction, then can simplify communication process, reduces the load controlling end equipment;If connect by controlling the process of end equipment Enter to hold equipment access request and by its source send out feedback authentication perform instruction, then the centralized management energy of the end equipment that can tighten control Power, promotes communications network security energy further.Further in improved procedure, implement to connect at WiFi access point apparatus and ask During asking, for confirming a management frame such as Request Response frame of this connection request process, just can be considered Described authentication performs instruction.
As shown in figure 17, in the most perfect a kind of embodiment, control the WiFi performed by end equipment and access remotely mirror Power device also includes statistic unit 15, for adding up what the described face characteristic data with identical source address were repeatedly authenticated The frequency of failure, after the frequency of failure is beyond preset value, shields the face characteristic data of this source address.
The face characteristic data described to be verified that same source address is repeatedly submitted to by statistic unit 15 repeatedly authenticate mistake The frequency of failure lost is tracked management, is favorably improved the safety of communication network, so, controlling end equipment can connect it The face characteristic data received are added up.No matter WiFi access point apparatus is that the described face of direct routing incoming end equipment is special Levy data, or the data message form with these face characteristic data of self Reconfiguration of form, set when it is sent to described control end Time standby, all can comprise the uniqueness characteristic of described incoming end equipment, such as its MAC Address, UUID in the packet submitted to Or Hostname etc..So, a uniqueness characteristic just characterizes a source address, and controlling end equipment can be identical to having The face characteristic data check frequency of failure of source address is added up, preferably in the case of, can arrange one such as half little Time or the measurement period of five minutes, when in this cycle, the accumulative of the face characteristic data that same source address is repeatedly submitted to meets with After the verification failure of predetermined number of times (preset value), or claim, beyond after this preset value, will cause controlling end equipment by this source Address is considered as malicious attack source place, or is at least considered as disabled user's intrusion behavior.In this case, controlling end equipment will screen Cover the face characteristic data of this source address, follow-up no longer face characteristic data to this source address are carried out verification and anti- Feedback, it is to avoid the most whole communication network of the machine suffers malicious attack.
The easiest and to achieve a kind of mode of effectively management be to add the above-mentioned source address to be shielded to one In blacklist, follow-up for the face characteristic data to be verified transmitted, first whether inquiry blacklist exists its source place Location, if it is present directly filter these face characteristic data to realize the shielding of the face characteristic data to this source address, if Do not exist, then process according to normal processes.
Adapt to the setting of statistic unit 15, it is also possible to a calamity is set the most further for unit 16, is used for receiving Belong to the recovery request of described source address, cancel the face characteristic data shielding this source address in response to user instruction.
Incoming end equipment may preset when the face characteristic data that self provides are shielded, and request shield side gives extensive The disaster tolerance means of multiple its subsequent check request, implement particular by sending a recovery request to communication network.To this end, control End equipment processed, by this recovery request of reception, also comprises the source address of this incoming end equipment in this recovery request, this request will It is reviewed, thus, controlling end equipment may not necessarily release the shielding to this source address in the very first time.Release shielding generally with hands Dynamic mode realizes, and manager can know described recovery request by controlling the subscriber administration interface of end equipment, and Decide whether to agree to this recovery request.After this recovery request is agreed, controlling end equipment just can be by described source address from it Deleting in blacklist, follow-up the most no longer shielding has the face characteristic data of this source address, incoming end equipment access communication network The probability of network is thus lifted a ban.Although it is pointed out that and employing subscriber administration interface, but the setting of subscriber administration interface Put option may also comprise be stored in control end equipment option, the most above-mentioned blacklist and the content of above-mentioned recovery request, permissible It is stored in the memorizer controlling end equipment, and as the setting options of WiFi access point apparatus, in described user's management Interface shows.
As shown in figure 18, in the another kind of embodiment improved further, control the WiFi performed by end equipment and access remotely Authentication device also includes statistic unit 15 ', and the described face characteristic data for statistics with identical source address are repeatedly reflected The frequency of failure of power, after the frequency of failure is beyond preset value, transmission sign shielding belongs to the logical of the access request of this source address Know that information is to described WiFi access point apparatus.
It can be seen that identical with previous perfect embodiment, controlling end equipment can be to face characteristic data by many The number of times of secondary failed authentication is added up, and follow-up how to achieve a butt joint into the shielding of end equipment.In the present embodiment, when The frequency of failure is beyond after preset value, and statistic unit 15 ' is sent to WiFi access point apparatus by generating an announcement information, and this notice is believed The content of breath characterizes shielding and belongs to the access request of this source address.It is to say, control the end equipment form with announcement information, The access request specifying source address is shielded by notice WiFi access point apparatus.Accordingly, WiFi access point apparatus just may be used According to this announcement information, the access request of source address therein is no longer responded or is directly transmitted the network frame of refusal access, So that the corresponding incoming end equipment of this source address cannot access the communication network of WiFi access point apparatus.Obviously, it is different from Precedent, the function of shielding source address will be realized by WiFi access point apparatus, and its shield effectiveness is faster and direct, and WiFi connects Enter point device even without the face characteristic data reprocessing this source address.
In like manner, statistic unit 15 ' is adapted to, it is also possible to a calamity is set the most further for unit 16 ', is used for receiving Belong to the recovery request of described source address, send the access request of cancellation this source address of shielding in response to user instruction Announcement information gives described WiFi access point apparatus.
Incoming end equipment may preset when the face characteristic data that self provides are shielded, and request shield side gives extensive The disaster tolerance means of multiple its subsequent check request, implement particular by sending a recovery request to communication network.To this end, control End equipment processed, by this recovery request of reception, also comprises the source address of this incoming end equipment in this recovery request, this request will It is reviewed, thus, controlling end equipment may not necessarily release the shielding to this source address in the very first time.Release shielding generally with hands Dynamic mode realizes, and manager can know described recovery request by controlling the subscriber administration interface of end equipment, and Decide whether to agree to this recovery request.After this recovery request is agreed, controls end equipment and just can encapsulate an announcement information, be used for Characterize and cancel the access request shielding this source address, this announcement information is sent to WiFi access point apparatus.WiFi access point After equipment receives this announcement information, just described source address is deleted from the data (may show as blacklist form) recorded Removing, follow-up the most no longer shielding has the access request of this source address, and the probability of incoming end device for communication network access is thus Lifted a ban.It is pointed out that the setting options of subscriber administration interface may also comprise and be stored in WiFi access point end equipment The data of the described source address to be shielded being recorded, blacklist as escribed above, manager is at described subscriber administration interface After recovery request described in middle permission, subscriber administration interface just can show and deletes the source address corresponding to this recovery request List.
The most detailed and disclose the WiFi that the portable control end equipment of the present invention implemented fully and access remotely mirror The various embodiments of power method, therefrom could be aware that, controlling end equipment can realize WiFi communication based on face characteristic data The authentication management of network, thus strengthen the safety of this communication network.
The WiFi access authentication device that the present invention provides for described portable incoming end equipment has various embodiments, this dress Put and include request unit 21, elementary area 22, response unit 23 and access unit 24, below will be with previous embodiment as base Plinth, launches to illustrate the relevant content of remaining various alternate embodiment with regard to its each unit.Refer to Figure 19 and combine following word and add To understand:
Described request unit 21, for initiating access request to WiFi access point apparatus, its specific implementation is as follows:
Described WiFi access point apparatus is configured with communication network as AP, radiates WiFi signal in the air.A kind of enforcement In example, WiFi its beacon frame of access point apparatus fixed time broadcast (Beacon frame, when not hiding SSID), the portable access of the present invention End equipment, by scanning, finds this beacon frame, just can initiate described access request;In another kind of embodiment, especially for Hiding the situation of SSID, incoming end equipment can be by initiating Probe Request frame and from WiFi access point apparatus feedback Probe Response frame obtains network configuration information, the most also can initiate access request.
Generally, user can be initiated attached by the WiFi switch option arranging the page of incoming end device operating system The scanning of nearly WiFi communication network a, it is thus achieved that ssid list, is then clicked the SSID of corresponding communication network by user and connects Enter corresponding communication network.Incoming end equipment also can store the configuration information of the communication network that user once accessed, in this case, User only need to open WiFi switch option, it is possible to is automatically accessed preferably WiFi communication net by system according to default preference strategy Network.Therefore, it is possible to be considered as by user mutual, the user that instruction incoming end equipment accesses the communication network of the present invention can be produced Instruction, this communication network is initiated access request in response to this user instruction by incoming end equipment.
Described elementary area 22, the authentication after being configured to respond to this access request performs instruction, starts image Acquiring unit obtains face characteristic data.
This elementary area 22 can produce described authentication by numerous embodiments and perform instruction:
In one embodiment, after described access request is sent to WiFi access point apparatus, WiFi access point set Standby directly or through the control end equipment as described in routing to after certain frame format conversion (being loaded in Frame), thus cause Control end equipment feedback one authentication and performs instruction, then by WiFi access point apparatus, this authentication performed instruction and route to incoming end and set Standby.
In another embodiment, after described access request is sent to WiFi access point apparatus, WiFi access point set For being directly acted upon, and fed back authentication by WiFi access point apparatus source with sending out perform instruction to incoming end equipment.
In another enforcement, described authentication performs instruction and can have sent by incoming end equipment according to pre-set programs logic Trigger voluntarily after described access request, specifically, can be by its protocol procedures traditionally, complete connection request Stage, receive such as Probe Response frame (at this just be considered authentication performs instruction) triggering following the most voluntarily and walk Suddenly, and avoid relying in external equipment, simplify operation flow.
Which kind of no matter use mode to come described access request feedback authentication to perform instruction, the most do not affect incoming end equipment The execution of subsequent step.But there is exception, if the instruction that i.e. this access request is comprised is to this incoming end equipment Source address is shielded by WiFi access point apparatus, then incoming end equipment can be caused cannot to receive described authentication and perform instruction, from And terminate the execution of subsequent step.
After incoming end equipment obtains described authentication execution instruction, this authentication performs instruction and can trigger in incoming end equipment The startup of image acquisition unit.The startup of accompanying image acquiring unit, can activate one scan interface, shows in this scanning interface The preview image of image acquisition unit.As user by the camera lens of image acquisition unit towards face, by voice, gesture, button Just can obtain a corresponding facial image when applying shooting instruction Deng any-mode, and facial image is carried out face characteristic The extraction of data.Or, image acquisition unit is exempted from through user instruction effect, and automatically with the arbitrary frame content in preview image As facial image, then this facial image is extracted face characteristic data.After successfully getting described face characteristic data, Just described scanning interface can be exited controlled or voluntarily.
Described response unit 23, for feeding back these face characteristic data to authenticate described in response to WiFi access point apparatus Performing instruction, its specific implementation is as follows:
After incoming end equipment completes described face characteristic data acquisition, just need to submit to these face characteristic data WiFi access point apparatus, in order to the authentication to these face characteristic data completely, as the response that described authentication performs instruction.
Incoming end equipment is connected owing to not setting up WiFi with WiFi access point apparatus, it is impossible to transmit institute as a data frame The face characteristic data stated, to this end, incoming end equipment uses one group to be total to multiple multicast frames to transmit face characteristic.Concrete and Speech, face characteristic data are converted to binary code by incoming end equipment, segmentation be loaded into multiple multicast frame can edit field, tool Body refers to, in its address field, then send the plurality of multicast frame.
It is responsible for processing the equipment of face characteristic data, with reference to the corresponding embodiment in front announcement, the most described WiFi Access point apparatus, it is possible to for described control end equipment, after receiving those multicast frames, from each multicast frame can be edit field Extracting the binary code of loaded face characteristic data, and assemble by striping order, then corresponding conversion is face Characteristic.
For the consideration of the Information Security strengthened in transmitting procedure, after obtaining described face characteristic data, Ke Yiyi According to the agreement with the equipment of responsible process face characteristic data, encrypt for face characteristic, the most again by the face after encryption Characteristic is encoded in described multicast frame.Corresponding, the equipment being responsible for processing should also be as being decrypted it.
It is responsible for processing the equipment of face characteristic data, in conjunction with aforesaid a kind of embodiment, can be that described WiFi accesses Point device, it obtains, by resolving, the face characteristic data received, then is encoded in Frame, is transferred to described control end Equipment, then from Frame, extracted described face characteristic data by controlling end equipment;In conjunction with another embodiment aforesaid, permissible Directly obtained the multicast frame through WiFi access point apparatus route by described control end equipment, resolve and obtain face characteristic number therein According to.
Control end equipment then its face characteristic data received to be authenticated.The section Example of aforementioned announcement In, if controlled containing pointing to the source address of described incoming end equipment in the blacklist of end equipment, this source address can be with Described face characteristic data provide in case identifying in the lump, then, controlling end equipment may not make described face characteristic data Response, although or respond, but cause these face characteristic data to be rejected authentication the most at last.If controlling end equipment not exist Its blacklist finds to provide the source address of the incoming end equipment of these face characteristic data, then special to this face by normal processes Levy data to authenticate.According to aforementioned different embodiment, control end equipment by the face characteristic data of incoming end equipment and basis Pre-stored characteristics data in the feature database of machine or cloud server compare, when finding to exist in feature database and described face spy When levying the pre-stored characteristics data of data consistent, i.e. can be considered and authenticate successfully, be otherwise considered as failed authentication, accordingly generate authentication result Information, is sent to WiFi access point apparatus.Face characteristic data designated herein are consistent with pre-stored characteristics data, should not limit to In data representation form or its data content the most completely the same, for example, it is possible to refer to both the degree of approximation arrive preset Degree, or it is in the range of permission, i.e. can be considered that both are consistent.
In the most perfect embodiment, described WiFi access point apparatus can cache or store and described source address The corresponding pre-stored characteristics data belonging to described feature database, even cache or store whole feature database, in this case, when connecing When entering end equipment arrival WiFi access point apparatus, the feature database that WiFi access point apparatus can cache with it in advance compares, To determine whether to authenticate successfully, and generate authentication result information voluntarily according to authenticating result, and make this to face characteristic data The process of authentication is not necessarily dependent on the participation controlling end equipment.When WiFi access point apparatus with caching formal layout described in pre- When depositing characteristic or its whole feature database, it is suitably these pre-stored characteristics data or feature database arranges an effect duration, to ensure The promptness that data update.Obviously, can by control end equipment control WiFi access point apparatus cache or storage prestore Characteristic or the long-range renewal of whole feature database.
Described access unit 24, be configured as these face characteristic data by authentication after, it is achieved described WiFi is connect Entering the access of the communication network that point device is set up, its specific implementation is as follows:
Either control end equipment and send the described authentication result characterizing authentication success or failure to WiFi access point apparatus Information, or generated described authentication result information voluntarily by WiFi access point apparatus, described WiFi access point apparatus all can According to authenticating result, the access request of described incoming end equipment is made last response.Specifically, WiFi access point apparatus Following any one or the response of any various ways can be made, to reach described access request according to authentication result information The purpose finally responded:
Mode one, according to IEEE 802.11 agreement, according to described authentication result information representation authentication success or failure not Same situation, characterizes to correspondingly incoming end equipment feedback and allows or stop it to access the management frame of described communication network, it is common that A kind of management frame, completes authentication phase.After incoming end equipment receives this management frame, just can from the content check of management frame whether By authentication, thus correspondingly set up or terminate the connection of communication network with WiFi access point apparatus, authentication by time, open Dynamic association phase, it is achieved the access to the communication network that described WiFi access point apparatus is set up.
Mode two, according to the different situations of described authentication result information representation authentication success or failure, when it characterizes authentication During success, WiFi access point apparatus i.e. allows the association request of incoming end equipment to make it access described communication network, it is achieved Described signal network is successfully accessed by incoming end equipment;When characterizing failed authentication, the most the association of access side equipment please not Ask and respond, thus cause incoming end equipment to be considered as request timed out and be considered as failed authentication.
Mode three, described authentication result information is sent to described incoming end as response and sets by WiFi access point apparatus Standby, self then operates according to IEEE 802.11 agreement, after incoming end equipment receives and parses through this authentication result information, works as sign When authenticating successfully, i.e. initiate association request according to agreement and confirm to realize the access to described communication network;When characterizing failed authentication Time, then can make the subsequent job of request etc the most again accordingly.
Certainly, broad sense is treated, the management frame described in mode one, itself also can be considered described authentication result information.Ability Field technique personnel can with use flexibly above-mentioned various modes realize flexibly face characteristic data by authentication after, at incoming end equipment Middle foundation connects or carries out the process warned.In a kind of blanket embodiment, when incoming end equipment confirms that authentication is lost After losing, to notify that user makes subsequent treatment, man-machine interaction can be improved in user interface display alarm information.And when accessing After end equipment confirms to authenticate successfully, the most this connection is confirmed to be Trusted channel, and after Trusted channel is set up, incoming end equipment is permissible Certain agreement preengage with WiFi access point apparatus, storage is for the connection letter of the follow-up communication network exempted from described in authenticated login Breath, so that this link information of incoming end equipment utilization is exempted from easily to access described communication network through any authentication procedure.
Referring to Figure 20, as in the embodiment that the present invention further enhances, the present invention is applicable to portable incoming end and sets Standby WiFi access authentication device also includes recovery unit 25, is used for adding up after the described access request of initiation described in unsuccessful access The number of times of communication network, after this number of times reaches predetermined value, it is determined that the machine is in the state that access request is shielded, in response to The recovery request recovering to allow its access request is initiated in family instruction, and its specific implementation is as follows:
On the premise of foregoing control end equipment or WiFi access point apparatus support disaster tolerance means, incoming end equipment The number of times of connection failure can be added up, in order to shield access at self controlled terminal equipment or WiFi access point apparatus In the case of, can be recovered self by technological means and access the possibility of described communication network.
As it was previously stated, when, after failed authentication, described WiFi access point apparatus being set up by causing incoming end equipment The connection of communication network, face characteristic data repeatedly failed authentication that equipment provides because of it and to suffer permanent mask be not conform to Reason.For reaching the purpose of reasonable benefit/risk, the number of times that self is accessed described communication network failed by incoming end equipment is added up, And provide a preset value for it, after this statistics number exceedes this preset value, i.e. can determine that the machine is in access request and is shielded The state covered, therefore and open one of user interface controls parts, and these control parts can be a virtual key, in order to passes through Communication network described in this control component request recovers the response to its access request.As a kind of equivalent means, also can set Put an effect duration, only when statistics at the beginning of to this effect duration duration arrive time, could open described in control parts.
Then, user can trigger its user instruction by the control parts described in triggering, thus, incoming end equipment rings Should initiate to recover the recovery request of the access request of permission self in this user instruction to described communication network.Accordingly, To realize by controlling end equipment or WiFi access point apparatus depending on shielding mechanism, this recovery request by arrivals control end equipment or WiFi access point apparatus, the equipment receiving this recovery request can notify that manager responds, when manager is by this recovery After request, the follow-up access request of incoming end equipment just can be by described communication network normal process.
The most detailed and disclose the WiFi access authentication side that the portable incoming end equipment of the present invention is implemented fully The various embodiments of method, therefrom could be aware that, the requirement of the communication network that incoming end equipment can be accessed, in the machine collection Face characteristic data, it is provided that authenticate to communication network, thus coordinate the safety strengthening communication network.
The present invention is applicable to the WiFi access authentication control device of WiFi access point apparatus and has various embodiments, this device Including receiving unit 31, response unit 32, routing unit 33 and performance element 34, below will based on previous embodiment, Launch to illustrate the relevant content of remaining various alternate embodiment with regard to its each unit.Refer to Figure 21 and combine following word and managed Solve:
Described WiFi access point apparatus, generally also makes WiFi router, traditional WiFi router have WiFi chip Module, and achieved by bottom layer driving and manage function accordingly, these management functions with IEEE 802.11 agreement are generally Basis is developed.In at least part of embodiment that the present invention relates to, it is found that with the base in IEEE 802.11 agreement On plinth, need the function that realized according to the corresponding embodiment of the present invention and the bottom layer driving function of abundant WiFi chip pattern, Making it be conducive to assisting to realize the function that at least part of embodiment of the present invention to be realized, these functions are described by being embodied in In the description of the different units that WiFi access authentication controls the multiple alternate embodiment of device.
Described reception unit 31, for receiving the access request of incoming end equipment, in like manner, described access request is to connect Enter the early stage request that end equipment is initiated afterwards in the service set (SSID) detecting the present invention.Control end according to aforementioned announcement Role's relations of distribution between equipment from WiFi access point apparatus different, the process of the access request described in reception can embody Change for different embodiments.
Be applicable to a kind of embodiment of the management that by WiFi access point apparatus, access request is carried out traditional approach, WiFi After access point apparatus receives access request, will voluntarily this access request be responded, so it is not route or Conversion output, especially need not be sent to described control end equipment.On the contrary, in another embodiment improved, WiFi access point sets Standby receive request after, this access request can be transmitted to institute with self form such as certain Frame, the form that manages frame The control end equipment stated, is responsible for response by controlling end equipment, the most also this access request of direct routing can enter to control end equipment Row response.Specifically, described access request should arrive this request is carried out directly in response to equipment in.
A kind of embodiment of situation about access request can be shielded be applicable to described WiFi access point apparatus, After WiFi incoming end equipment receives this access request, from this request, extract the incoming end equipment of this access request of initiation Source address, inquires about its blacklist, when confirming that this source address is contained in blacklist, just terminates the sound to this access request Should, or correspond directly to this access request and feed back the management frame that a sign refusal accesses, thus strengthen the peace of communication network Full management.As source address does not appears in blacklist, then can continue other unit according to normal process.
Described response unit 32, is used for responding described access request and feeds back authentication and perform instruction, its side of implementing Formula is as follows:
Understanding in conjunction with the aforementioned different embodiments about controlling end equipment, described authentication performs instruction both can be by controlling End equipment sources processed is sent out and is route through WiFi access point apparatus, it is possible to sent out by WiFi access point apparatus source, thus, designated herein is anti- Feedback authentication performs instruction, both can refer to that the authentication that control end equipment sources is sent out is performed instruction is routed to the enforcement of described incoming end equipment Mode, it is possible to for being sent to the embodiment of described incoming end equipment by the WiFi access point apparatus source property sent out, in conjunction with before take off The embodiment shown, after described access request is initiated, completes the connection request stage of IEEE 802.11 agreement, then to certification rank After Duan Faqi certification request, and produce the management frame of the certification response asked in response to this certification, it is possible to regard reflects as a kind of Power performs instruction.Concrete which kind of mode of employing, still needs to distribute pass depending on the managerial roles controlling end equipment and WiFi access point apparatus Depending on system.
It can be deduced that after a certain access request is implemented masking operation according to blacklist by WiFi access point apparatus, will It is no longer respond to this access request and feeds back described authentication and perform instruction.
Described routing unit 33, the face characteristic data fed back for receiving authentication execution instruction described in response, please Asking control end equipment to be authenticated, its detailed description of the invention shows as following various situation of change:
As disclosed in front, portable incoming end equipment will be responsive to the described authentication execution of WiFi access point apparatus transmission and refers to Make and gather face characteristic data, and by face characteristic data feedback to communication network, direct controlled terminal equipment receives, or such as The present embodiment, arrives WiFi access point apparatus in advance.
With reference in a kind of embodiment as disclosed in front, WiFi access point apparatus can be voluntarily to the face characteristic received Data authenticate, WiFi access point apparatus storage or be cached with the described feature database needed for authentication or or many therein Bar pre-stored characteristics data, WiFi access point is by the face characteristic data received and described (in feature database) pre-stored characteristics number According to mating, when matching consistent face characteristic data, just it is considered as authenticating successfully;Otherwise it is considered as authentication to lose Lose.About the subsequent treatment of the present embodiment, the most comprehensively disclose in the aforementioned corresponding method of incoming end equipment, follow-up general Based on latter embodiment, introduce.
In another embodiment, the not responsible face characteristic data to being received of WiFi access point apparatus authenticate, but Face characteristic data route to described control end equipment or encapsulate voluntarily after these face characteristic data become Frame be sent to Described control end equipment, request controls end equipment and authenticates it, by described control end equipment by described face characteristic number Compare according to the pre-stored characteristics data with the feature database in the feature database or cloud server of its this locality, confirm both whether one Causing, and authentication result information feeds back to WiFi access point apparatus, WiFi access point apparatus is according to authentication result information representation Content and confirm to authenticate successfully or failure.
Certainly, during multiple device transmission, face characteristic data both can be in plain text, it is also possible to is encryption , cipher mode also can set flexibly.Only between the individual devices the transmission of this information need to be carried out agreement in advance, mutual when working Match.
It is pointed out that incoming end equipment is connected owing to not setting up WiFi with WiFi access point apparatus, it is impossible to data The face characteristic data described in form transmission of frame, to this end, incoming end equipment uses one group to be total to multiple multicast frames to transmit face Characteristic.Specifically, face characteristic data are converted to binary code by incoming end equipment, and segmentation is loaded into multiple multicast frame Can edit field, specifically refer to, in its address field, then send the plurality of multicast frame.In the present embodiment, described After WiFi access point apparatus is responsible for receiving those multicast frames, edit field can extract loaded people from each multicast frame The binary code of face characteristic, and assemble by striping order, then corresponding conversion is face characteristic.
Control end equipment then its face characteristic data received to be authenticated.The section Example of aforementioned announcement In, if controlled containing pointing to the source address of described incoming end equipment in the blacklist of end equipment, this source address can be with Described face characteristic data provide in case identifying in the lump, then, controlling end equipment may not make described face characteristic data Response, although or respond, but finally inform that these face characteristic data are rejected authentication.If controlling end equipment not at it Blacklist finds to provide the source address of the incoming end equipment of these face characteristic data, then by normal processes to this face characteristic Data authenticate.According to aforementioned different embodiment, control end equipment by the face characteristic data of incoming end equipment and the machine Or the pre-stored characteristics data in the feature database of cloud server compare, when finding that feature database exists and described face characteristic During the pre-stored characteristics data of data consistent, i.e. can be considered and authenticate successfully, be otherwise considered as failed authentication, accordingly generate authentication result letter Breath, is sent to WiFi access point apparatus.It is emphasized that the one of face characteristic data designated herein and pre-stored characteristics data Cause, should not be confined on data representation form or its data content the most completely the same, for example, it is possible to refer to both degrees of approximation Arrive the degree preset, or be in the range of permission, i.e. can be considered that both are consistent.
Described performance element 34, for according to the authentication result characterizing authentication success or failure controlling end equipment feedback Information, allows accordingly or stops described incoming end equipment to access the communication network preset, and its concrete multiple implementation is as follows:
As it was previously stated, in typical a kind of embodiment, described authentication result information comes from described control end equipment, After WiFi access point apparatus receives the authentication result information of described control end equipment feedback, resolve this authentication result information, To determine the particular content that this authentication result information is characterized, it is common that refer to authenticate success or failed authentication is two kinds of interior Hold.
Additionally, in another embodiment of the invention, WiFi access point apparatus can control according to its controlled terminal equipment And the feature database (or specific to its pre-stored characteristics data) realizing caching or the storage updated supplies described face to be verified special Levy data to mate, and by the authentication result information described in matching result also alignment processing one-tenth, thus WiFi access point apparatus Just can generate described authentication result information primaryly.
Embodiments disclosed herein apparently more close to the tradition realization of IEEE 802.11 agreement, is advised according to this agreement The process setting up connection of model, in authentication phase face characteristic data described in incoming end equipment is submitted to for authentication, is controlling After end equipment or WiFi access point apparatus are to its authentication success or failure, WiFi access point apparatus the certification generated according to authentication Object information feeds back a certification acknowledgement frame, concretely characterizes certification and successfully manages frame or characterize the management frame of authentification failure, From the visual angle of incoming end equipment, this certification acknowledgement frame also can broadly be considered as it and have received authentication result information.
Certainly, it is possible to then make improvement by a larger margin, specifically: WiFi access point apparatus also can not directly process Control the authentication result information of end equipment, and give described incoming end equipment by its direct routing.Or, even if WiFi access point Face characteristic data are authenticated by equipment voluntarily, it is possible to generate the authentication result letter being different from IEEE 802.11 protocol specification Breath.In this kind of embodiment, the form of described authentication result information and content all can be differently configured from IEEE 802.11 agreement, As long as can agreement in advance between incoming end equipment and WiFi access point apparatus.
Therefore, in any case, though non-abundant necessity, WiFi access point apparatus can be sent out to incoming end equipment sources or turn Sending out authentication result information, incoming end equipment can resolve this authentication result information, according to the follow-up connection procedure of decision self.
But, as basic function, WiFi access point apparatus can resolve the described authentication result information under self vision. After WiFi access point apparatus resolves described authentication result information, the content that can characterize according to it, i.e. authenticate successfully or lose Losing, the association request that equipment follow-up expectation in access side completes to connect responds, it is determined whether allow to set up described access WiFi Trusted channel between end equipment.In conjunction with the various situations above disclosed, WiFi access point apparatus can be recognized according to described The difference of card object information, the described access request of access side equipment is made following result and is controlled, as follows:
When authentication result information representation authenticates successfully, send sign certification to incoming end equipment and successfully manage frame, with Allow incoming end equipment to access the communication network set up, according to IEEE 802.11 agreement, table is being received for incoming end equipment Levy the association request initiated voluntarily after certification successfully manages frame and subsequent communications gives normal response, in response to this association request And feed back the management frame being successfully associated to described incoming end equipment to show confirmation, thus set up incoming end equipment and WiFi access point WiFi between equipment connects.
When authentication result information representation failed authentication, send the management frame characterizing authentification failure to incoming end equipment, with Stop incoming end equipment to access the communication network set up, according to IEEE802.11 agreement, sign is being received for incoming end equipment The association request initiated voluntarily after the management frame of authentification failure, WiFi access point apparatus or not response, or in response to this pass Connection is asked and is fed back the failed management frame of association to described incoming end equipment to show alarm.
Certainly, according to the section Example of aforementioned announcement, incoming end equipment receives described authentication result information Afterwards, the face characteristic data that just knowing self provides authenticate successfully or failure, and therefore, incoming end equipment can depend on voluntarily Decide whether to continue the connection procedure of follow-up IEEE802.11 agreement institute specification according to authentication result information.When authentication result information table Levy when authenticating successfully (as described sign certification successfully manages frame), then can initiate association request, set receiving WiFi access point After the acknowledgement frame being successfully associated of standby feedback, complete the access to described communication network.When authentication result information representation authenticates During failure (such as the management frame of described sign authentification failure), then can terminate follow-up connection procedure, as necessary by user interface Display alarm information.
It will be appreciated that according to above-mentioned each embodiment, at incoming end equipment, from its visual angle, the authentication result received Information, both can be primary by WiFi access point apparatus or the communication format including pre-agreement custom content of route, also The content that WiFi access point apparatus can be characterized according to its authentication result information received and according to IEEE 802.11 agreement The management frame characterizing certification success or failure sent.
For convenience of management and operation, after incoming end equipment is successfully accessed the communication network of WiFi access point apparatus, The information of incoming end equipment can be saved in this locality by WiFi access point apparatus, and it is considered as Trusted channel, and follow-up incoming end sets For when again accessing, based on trusting relationship, the execution process of its authentication phase can be removed from, thus simplify follow-up access.
Refer to Figure 22, in the embodiment of a further materialization, performed by the WiFi access point apparatus of the present invention WiFi access authentication control device and also include the connection unit 30 of preposition operation, be configured to build in advance based on WiFi connected mode Vertical the machine and the Trusted channel of described control end equipment, its specific implementation refer to aforementioned relevant introduction.
Refer to Figure 23, in the most perfect embodiment, the present invention the WiFi performed by WiFi access point apparatus Access authentication control device also include unit 35 of being interviewed, be configured to respond to described control end equipment reading instruction and/or Configuration-direct, feeds back and/or revises the configuration parameter of communication network of the machine, and its specific implementation can be in conjunction with being previously with regard to Control the numerous embodiments of end equipment, as follows:
Foregoing control end equipment, can read the configuration ginseng of described communication network from WiFi access point apparatus Number, and show a subscriber administration interface for it, subscriber administration interface is stated relevant setting options, it is provided that carry out to user as Amendment, when user submits amendment to, then submits to WiFi access point apparatus and carries out parameter modification, thus change described communication network The configuration of at least some of parameter.
Accordingly, showing WiFi access point apparatus side, it can receive the reading instruction controlling end equipment, and calls Relate to the configuration file of described communication network, and relate to described communication network in the control end equipment described configuration file of feedback Configuration parameter.In like manner, WiFi access point apparatus can also receive control end equipment to be have modified described configuration parameter by user (right Should be in the setting options in user interface) post package formed configuration-direct, from configuration-direct, read the configuration being modified The data of relevant configured parameter are modified according to configuration-direct, and are made it come into force by parameter and data thereof, thus realize and control End equipment processed matches, and provides the user better remote maintenance and experiences.
As it was previously stated, the present invention can increase the control at WiFi access point apparatus for the consideration improving safety Function, to this end, refer to the content disclosed in various improved procedures of lower section:
It is adapted to controlling an embodiment of realization at end equipment, as shown in figure 24, performed by WiFi access point apparatus WiFi access authentication control device also set up limiting unit 36, for receive from described control end equipment sign shield belong to In the announcement information of the access request specifying source address, terminate specifying the incoming end of source address to set contained by this announcement information The response (the most not feeding back Probe Response frame) of standby access request, or feed back, to it, the management frame that cannot connect.By This, incoming end equipment will be regarded as to be connected with described communication network.
Further in improved procedure, after receiving this announcement information to, this source address is added the blacklist held In list, thus, WiFi access point apparatus can by by the source address in the access request of the access terminal received with Record in blacklist mates, and sees whether this source address is present in this blacklist, when present the most directly by it Access request shields;If not existing, then press normal rule and process.
For improving the management function to WiFi access point apparatus, in the embodiment further enhanced, refering to Figure 25, previous On the basis of embodiment, the WiFi access authentication of the present invention controls device and also includes lifting a ban unit 37, is used for receiving control end and sets The standby announcement information cancelling the access request shielding this source address, recovers to set the incoming end that described source address is corresponding The response of standby access request.With reference to previous embodiment, can be embodied according to described announcement information, extract this and lead to Know the source address of shielding to be cancelled in information, then delete from its blacklist.
In the embodiment increased further, it is adaptable to the user interface management function that described control end realizes, refer to figure WiFi access authentication control device performed by 26, WiFi access point apparatus also sets up lifts a ban unit 37 ', is used for receiving incoming end The recovery request of equipment, route this request and controls the cancellation of end equipment to this incoming end equipment to described control end equipment with request The shielding of face characteristic data.This unit and aforementioned control terminal equipment are implemented the embodiment of shielding face characteristic data and are fitted mutually Should, after face characteristic data are shielded by described control end equipment, it is allowed to the recovery described in the initiation of incoming end equipment please Asking, this recovery request is sent by described communication network, is just routed to described control end equipment by WiFi access point apparatus. After described control end equipment receives this announcement information, can alert to user in user interface, user indicates according to warning information Entering the private pages of subscriber administration interface, whether examination & verification allows this recovery request, when it allows, controls end equipment and just cancels Shielding to the face characteristic data of described incoming end equipment, namely again opened authentication for described incoming end equipment Function.A kind of effective technology disaster relief means are provided therefrom after incoming end equipment controlled terminal device mask.
The most detailed and disclose the WiFi that the portable WiFi access point apparatus of the present invention implemented fully and access mirror The various embodiments of power control method, therefrom could be aware that, WiFi access point apparatus can set with control end equipment and incoming end For matching, improve the authentication functions of its open communication network, improve safety coefficient and administrative convenience degree.
The embodiment of the present invention additionally provides a kind of portable control end equipment and one portable incoming end equipment, can regard For same class mobile terminal, and allow the structure with such as follow-up with reference to present invention introduction.As shown in figure 27, in order to just In explanation, illustrate only the part relevant to the embodiment of the present invention, concrete ins and outs do not disclose, and refer to the present invention and implement Example method part.This terminal can be to include mobile phone, panel computer, PDA (Personal Digital Assistant, individual Digital assistants), POS (Point of Sales, point-of-sale terminal), the arbitrarily terminal unit such as vehicle-mounted computer, with terminal for mobile phone be Example:
Figure 27 is illustrated that the block diagram of the part-structure of the mobile phone relevant to the terminal of embodiment of the present invention offer.With reference to figure 27, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 1510, memorizer 1520, input block 1530, display unit 1540, sensor 1550, voicefrequency circuit 1560, Wireless Fidelity (wireless fidelity, WiFi) module 1570 (namely WiFi chip module), the parts such as processor 1580 and power supply 1590.It will be understood by those skilled in the art that shown in Figure 27 Handset structure be not intended that the restriction to mobile phone, can include that ratio illustrates more or less of parts, or combine some portion Part, or different parts layouts.
Below in conjunction with Figure 27 each component parts of mobile phone carried out concrete introduction:
RF circuit 1510 can be used for receiving and sending messages or in communication process, the reception of signal and transmission, especially, by base station After downlink information receives, process to processor 1580;It addition, be sent to base station by designing up data.Generally, RF circuit 1510 include but not limited to antenna, at least one amplifier, transceiver, bonder, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..Additionally, RF circuit 1510 can also be led to network and other equipment by radio communication Letter.Above-mentioned radio communication can use arbitrary communication standard or agreement, includes but not limited to global system for mobile communications (Global System of Mobile communication, GSM), general packet radio service (General Packet Radio Service, GPRS), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), Long Term Evolution (Long Term Evolution, LTE), Email, Short Message Service (Short Messaging Service, SMS) etc..
Memorizer 1520 can be used for storing software program and module, and processor 1580 is stored in memorizer by operation The software program of 1520 and module, thus perform the application of various functions and the data process of mobile phone.Memorizer 1520 can be led Including storage program area and storage data field, wherein, needed for storage program area can store operating system, at least one function Application program (such as sound-playing function, image player function etc.) etc.;Storage data field can store the use institute according to mobile phone The data (such as voice data, phone directory etc.) etc. created.Additionally, memorizer 1520 can include that high random access stores Device, it is also possible to include nonvolatile memory, for example, at least one disk memory, flush memory device or other volatibility are solid State memory device.
Input block 1530 can be used for receiving numeral or the character information of input, and produce with the user setup of mobile phone with And function controls relevant key signals input.Specifically, input block 1530 can include contact panel 1531 and other inputs Equipment 1532.Contact panel 1531, also referred to as touch screen, can collect user thereon or neighbouring touch operation (such as user Use any applicable object such as finger, stylus or adnexa behaviour on contact panel 1531 or near contact panel 1531 Make), and drive corresponding attachment means according to formula set in advance.Optionally, contact panel 1531 can include touching detection Device and two parts of touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it It is converted into contact coordinate, then gives processor 1580, and order that processor 1580 sends can be received and performed.Additionally, The polytypes such as resistance-type, condenser type, infrared ray and surface acoustic wave can be used to realize contact panel 1531.Except touch surface Plate 1531, input block 1530 can also include other input equipments 1532.Specifically, other input equipments 1532 can include But it is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more.
Display unit 1540 can be used for each of the information that inputted by user of display or the information being supplied to user and mobile phone Plant menu.Display unit 1540 can include display floater 1541, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the form such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) Configure display floater 1541.Further, contact panel 1531 can cover display floater 1541, when contact panel 1531 detects Arrive thereon or after neighbouring touch operation, send processor 1580 to determine the type of touch event, with preprocessor 1580 provide corresponding visual output according to the type of touch event on display floater 1541.Although in figure 27, touch surface Plate 1531 and display floater 1541 are to realize input and the input function of mobile phone as two independent parts, but at some In embodiment, can be by integrated to contact panel 1531 and display floater 1541 and realize input and the output function of mobile phone.
Mobile phone may also include at least one sensor 1550, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor can include ambient light sensor and proximity transducer, and wherein, ambient light sensor can be according to ambient light Light and shade regulate the brightness of display floater 1541, proximity transducer can cut out display floater when mobile phone moves in one's ear 1541 and/or backlight.As the one of motion sensor, accelerometer sensor can detect (generally three axles) in all directions and add The size of speed, can detect that size and the direction of gravity time static, can be used for identifying application (the such as horizontal/vertical screen of mobile phone attitude Switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;As for mobile phone also Other sensors such as configurable gyroscope, barometer, drimeter, thermometer, infrared ray sensor, do not repeat them here.
Voicefrequency circuit 1560, speaker 1561, microphone 1562 can provide the audio interface between user and mobile phone.Audio frequency The signal of telecommunication after the voice data conversion that circuit 1560 can will receive, is transferred to speaker 1561, speaker 1561 changes Export for acoustical signal;On the other hand, the acoustical signal of collection is converted to the signal of telecommunication by microphone 1562, by voicefrequency circuit 1560 Voice data is converted to after reception, then after voice data output processor 1580 is processed, through RF circuit 1510 to be sent to ratio Such as another mobile phone, or voice data is exported to memorizer 1520 to process further.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 1570 Part, browsing webpage and access streaming video etc., it has provided the user wireless broadband internet and has accessed.Although Figure 27 shows WiFi module 1570, but it is understood that, it is also not belonging to must be configured into of mobile phone, can not change as required completely Omit in the scope of the essence becoming invention.
Processor 1580 is the control centre of mobile phone, utilizes various interface and the various piece of the whole mobile phone of connection, It is stored in the software program in memorizer 1520 and/or module by running or performing, and calls and be stored in memorizer 1520 Interior data, perform the various functions of mobile phone and process data, thus mobile phone is carried out integral monitoring.Optionally, processor 1580 can include one or more processing unit;Preferably, processor 1580 can integrated application processor and modulation /demodulation process Device, wherein, application processor mainly processes operating system, user interface and application program etc., and modem processor is mainly located Reason radio communication.It is understood that above-mentioned modem processor can not also be integrated in processor 1580.
Mobile phone also includes the power supply 1590 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply Management system is logically contiguous with processor 1580, thus realizes management charging, electric discharge and power consumption pipe by power-supply management system The functions such as reason.
Although not shown, mobile phone can also include photographic head, bluetooth module etc., does not repeats them here.
It is adapted to described portable control end equipment, in embodiments of the present invention, the processor included by this terminal 1580 also have WiFi as the aforementioned accesses the function that the multiple different embodiments of remote authentication method, device are realized.
It is adapted to described portable incoming end equipment, in an embodiment of the present invention, the processor that this terminal includes The function that the 1580 multiple different embodiments also with WiFi as the aforementioned access authentication method/device are realized.
In like manner, the embodiment of the present invention additionally provides a kind of WiFi access point apparatus, and it is with portable control end equipment and just Take formula incoming end equipment in like manner, the necessary parts such as wireless fidelity module 1570, memorizer 1520, processor 1580 can be included, Running application program, application program is called in internal memory and runs it by processor, so that processor 1580 presents WiFi as the aforementioned The function that the multiple different embodiments of access authentication control method/device are realized.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, and the system of foregoing description, The specific works process of device and unit, is referred to the corresponding process in preceding method embodiment, does not repeats them here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method are permissible Realize by another way.Such as, device embodiment described above is only schematically, such as, and described unit Dividing, be only a kind of logic function and divide, actual can have other dividing mode, the most multiple unit or assembly when realizing Can in conjunction with or be desirably integrated into another system, or some features can be ignored, or does not performs.Another point, shown or The coupling each other discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communication connection, can be electrical, machinery or other form.
The described unit illustrated as separating component can be or may not be physically separate, shows as unit The parts shown can be or may not be physical location, i.e. may be located at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected according to the actual needs to realize the mesh of the present embodiment scheme 's.
It addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to two or more unit are integrated in a unit.Above-mentioned integrated list Unit both can realize to use the form of hardware, it would however also be possible to employ the form of SFU software functional unit realizes.
One of ordinary skill in the art will appreciate that all or part of step in the various methods of above-described embodiment is can Completing instructing relevant hardware by program, this program can be stored in a computer-readable recording medium, storage Medium may include that read only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), disk or CD etc..
One of ordinary skill in the art will appreciate that all or part of step realizing in above-described embodiment method is permissible Instructing relevant hardware by program to complete, described program can be stored in a kind of computer-readable recording medium, on Stating the storage medium mentioned can be read only memory, disk or CD etc..
Above series scheme provided by the present invention is described in detail, for one of ordinary skill in the art, According to the thought of the embodiment of the present invention, the most all will change, in sum, this theory Bright book content should not be construed as limitation of the present invention.

Claims (10)

1. a WiFi accesses remote authentication method, it is characterised in that comprise the steps:
The face characteristic data to be verified obtaining the asking to access its communication network of WiFi access point apparatus transmission and submit to;
Verify described face characteristic data, obtain the authentication result information characterizing verification success or failure;
Described authentication result information is fed back to described WiFi access point apparatus.
Method the most according to claim 1, it is characterised in that verify in the step of described face characteristic data, by inciting somebody to action Acquired face characteristic data compare with feature database, determine that it is the most consistent with the pre-stored characteristics data in feature database, Thus should determine that check results is success or failure mutually.
Method the most according to claim 1, it is characterised in that feed back described authentication result to described WiFi access point apparatus The step of information, causes described WiFi access point apparatus to allow or stops the access providing described face characteristic data to be verified End equipment accesses the communication network that this WiFi access point apparatus is set up.
Method the most according to claim 1, it is characterised in that also comprise the steps:
Statistics has the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated, when the frequency of failure exceeds After preset value, shield the face characteristic data of this source address.
5. a WiFi accesses remote authentication device, it is characterised in that including:
Acquiring unit, the people to be verified that the request transmitted for obtaining WiFi access point apparatus accesses its communication network and submits to Face characteristic;
Verification unit, is used for verifying described face characteristic data, obtains the authentication result information characterizing verification success or failure;
Feedback unit, for feeding back described authentication result information to described WiFi access point apparatus.
Device the most according to claim 5, it is characterised in that described verification unit, is configured to acquired Face characteristic data compare with feature database, determine that it is the most consistent with the pre-stored characteristics data in feature database, thus phase Should determine that check results is success or failure.
Device the most according to claim 5, it is characterised in that the operation of described feedback unit, causes described WiFi to access Point device allows or stops the incoming end equipment providing described face characteristic data to be verified to access this WiFi access point apparatus The communication network set up.
Device the most according to claim 5, it is characterised in that also include:
Statistic unit, has, for statistics, the frequency of failure that the described face characteristic data of identical source address are repeatedly authenticated, After the frequency of failure is beyond preset value, shield the face characteristic data of this source address.
9. a portable control end equipment, it is characterised in that comprising:
Wireless fidelity module, for access communications network;
Touch-sensitive display, for display interface, it is achieved man-machine interaction;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured For being performed by the one or more processor;
The one or more program is used for driving the one or more processor to be configured to perform in claim 1 to 4 The device of the method described in any one.
10. a portable control end equipment, it is characterised in that comprising:
Wireless fidelity module, for access communications network;
Touch-sensitive display, for display interface, it is achieved man-machine interaction;
One or more processors;
Memorizer;
One or more application programs, wherein said one or more application programs are stored in described memorizer and are configured For being performed by the one or more processor;
The one or more program is used for driving the one or more processor to be configured to perform claim 5 to 8 times Anticipate a described device.
CN201610365923.6A 2016-05-27 2016-05-27 Portable control end equipment and WiFi access remote authentication method, device Pending CN106102057A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610365923.6A CN106102057A (en) 2016-05-27 2016-05-27 Portable control end equipment and WiFi access remote authentication method, device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610365923.6A CN106102057A (en) 2016-05-27 2016-05-27 Portable control end equipment and WiFi access remote authentication method, device

Publications (1)

Publication Number Publication Date
CN106102057A true CN106102057A (en) 2016-11-09

Family

ID=57230213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610365923.6A Pending CN106102057A (en) 2016-05-27 2016-05-27 Portable control end equipment and WiFi access remote authentication method, device

Country Status (1)

Country Link
CN (1) CN106102057A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113473009A (en) * 2021-06-29 2021-10-01 广州极飞科技股份有限公司 Photographing method and device based on dual systems and camera equipment
CN114520977A (en) * 2020-11-20 2022-05-20 中国联合网络通信集团有限公司 Router authentication method, router authentication device and storage medium
CN116760638A (en) * 2023-08-17 2023-09-15 建信金融科技有限责任公司 Information processing method, system, electronic device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120072106A1 (en) * 2010-07-21 2012-03-22 Korea Advanced Institute Of Science And Technology Location based service system and method for performing indoor navigation
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system
CN105636036A (en) * 2015-05-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Wi-Fi connection control method, terminal and Wi-Fi device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120072106A1 (en) * 2010-07-21 2012-03-22 Korea Advanced Institute Of Science And Technology Location based service system and method for performing indoor navigation
CN103021045A (en) * 2011-09-25 2013-04-03 边高伟 Intelligent entrance guard system for mobile terminal user verification
CN105636036A (en) * 2015-05-29 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Wi-Fi connection control method, terminal and Wi-Fi device
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114520977A (en) * 2020-11-20 2022-05-20 中国联合网络通信集团有限公司 Router authentication method, router authentication device and storage medium
CN113473009A (en) * 2021-06-29 2021-10-01 广州极飞科技股份有限公司 Photographing method and device based on dual systems and camera equipment
CN113473009B (en) * 2021-06-29 2022-11-08 广州极飞科技股份有限公司 Photographing method and device based on dual systems and camera equipment
CN116760638A (en) * 2023-08-17 2023-09-15 建信金融科技有限责任公司 Information processing method, system, electronic device and storage medium
CN116760638B (en) * 2023-08-17 2023-10-27 建信金融科技有限责任公司 Information processing method, system, electronic device and storage medium

Similar Documents

Publication Publication Date Title
US20220330029A1 (en) Method for mutual recognition or mutual trust between bluetooth devices
CN105898750A (en) WiFi access point equipment and WiFi access authentication method and device
CN105848151A (en) WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device
CN103634294B (en) Information verifying method and device
US20160050203A1 (en) Environment-Based Two-Factor Authentication without Geo-Location
CN108476226A (en) application program authorization method, terminal and server
WO2015154488A1 (en) Method and device for accessing router
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN108881103B (en) Network access method and device
CN109416800B (en) Authentication method of mobile terminal and mobile terminal
CN110399713A (en) A kind of method and relevant apparatus of authentification of message
CN107437009A (en) Authority control method and related product
CN107483213A (en) A kind of method of safety certification, relevant apparatus and system
CN104639354B (en) Router administration method and apparatus
US11017066B2 (en) Method for associating application program with biometric feature, apparatus, and mobile terminal
CN107508682A (en) Browser certificate authentication method and mobile terminal
CN106912048A (en) Access-in point information sharing method and device
CN109102297A (en) Revocable payment method and device
CN109274635B (en) Security management method, client device, server, communication system, and storage medium
CN110677851B (en) Terminal network access method and network access equipment access method
CN111782722B (en) Data management method and device, electronic equipment and storage medium
CN103179100A (en) Method and device for preventing the attack on a domain name system tunnel
CN105898749A (en) Portable access end equipment and WiFi access authentication method and device
CN106488453A (en) A kind of method and system of portal certification
CN107317680B (en) Method and system for marking safety account and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161109