CN106792661B - WLAN access method and device - Google Patents

WLAN access method and device Download PDF

Info

Publication number
CN106792661B
CN106792661B CN201610280642.0A CN201610280642A CN106792661B CN 106792661 B CN106792661 B CN 106792661B CN 201610280642 A CN201610280642 A CN 201610280642A CN 106792661 B CN106792661 B CN 106792661B
Authority
CN
China
Prior art keywords
information
access
encrypted
sound
access password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610280642.0A
Other languages
Chinese (zh)
Other versions
CN106792661A (en
Inventor
黄翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201610280642.0A priority Critical patent/CN106792661B/en
Publication of CN106792661A publication Critical patent/CN106792661A/en
Application granted granted Critical
Publication of CN106792661B publication Critical patent/CN106792661B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

The embodiment of the invention discloses a WLAN access method and a device, wherein terminal equipment sends an access request to a searched AP and receives information to be encrypted returned by the AP according to the access request; encrypting information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP, so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information; and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.

Description

WLAN access method and device
Technical Field
The invention relates to the technical field of smart home, in particular to a Wireless Local Area Network (WLAN) access method and a WLAN access device.
Background
Along with the development of science and technology, intelligent household equipment gradually walks into people's the field of vision to bring very big facility for people's life, for example: the intelligent air conditioner can receive cloud remote control, so that the indoor temperature, the temperature and the like can be remotely adjusted; the intelligent monitoring camera can store the monitoring video collected by the intelligent monitoring camera in a cloud.
At present, an intelligent home device may be connected to a WLAN through an AP (Access Point), and perform information exchange and communication through a WLAN network, thereby implementing functions such as identification, positioning, tracking, remote control, and the like. In general, after the access password of the target WLAN network needs to be configured on the smart home device, the smart home device can correctly access the target WLAN network.
However, general smart home devices do not have an operation interface configured with a WLAN network access password, and need to access to the smart home devices by using other devices, and after the corresponding configuration is made, the smart home devices can access to the WLAN network, which is complex in configuration and inconvenient in operation. In addition, the same problem exists with other similar small smart devices that access WLAN networks.
Disclosure of Invention
The embodiment of the invention aims to provide a WLAN access method and a WLAN access device, so that smart home equipment or other similar small-sized smart equipment can be simply and conveniently accessed to a WLAN network.
In order to achieve the above object, an embodiment of the present invention discloses a WLAN access method, which is applied to a terminal device, and the method includes:
sending an access request to the searched AP, and receiving information to be encrypted returned by the AP according to the access request;
encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information;
and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted.
Optionally, before sending the access request to the searched AP, the method may further include:
judging whether the searched AP needs password access;
if yes, executing the step of sending the access request to the searched AP.
Optionally, the human biological information may include at least one of voice information, fingerprint information, and iris information.
In order to achieve the above object, an embodiment of the present invention further discloses a WLAN access method, which is applied to an AP, and the method includes:
receiving an access request sent by terminal equipment, and sending information to be encrypted to the terminal equipment so that the terminal equipment encrypts the information to be encrypted by using a first access password generated according to the human body biological information acquired by the terminal equipment;
receiving encrypted information sent by the terminal equipment, and decrypting the encrypted information by using a second access password generated according to the acquired human body biological information;
judging whether the decrypted information is the same as the information to be encrypted;
and if the authentication information is the same as the authentication information, sending information of successful authentication to the terminal equipment so as to enable the terminal equipment to access the WLAN network where the terminal equipment is located.
Optionally, the human biological information may include at least one of voice information, fingerprint information, and iris information.
In order to achieve the above object, an embodiment of the present invention further discloses a WLAN access apparatus, which is applied to a terminal device, and the apparatus includes: a sending module, a receiving module, an encryption module and an access module, wherein,
the sending module is used for sending an access request to the searched AP;
the receiving module is used for receiving the information to be encrypted returned by the AP according to the access request;
the encryption module is used for encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information;
the sending module is further configured to send the encrypted information to the AP, so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human biological information;
the receiving module is further configured to receive authentication success information sent by the AP, where the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and determines that the decrypted information is the same as the information to be encrypted;
the access module is used for accessing the WLAN network where the AP is located.
Optionally, the method may further include:
and the judging module is used for judging whether the searched AP needs password access or not, and if so, triggering the sending module to send an access request to the searched AP.
Optionally, the human biological information may include at least one of voice information, fingerprint information, and iris information.
In order to achieve the above object, an embodiment of the present invention further discloses a WLAN access apparatus, which is applied to an AP, and the apparatus includes: a receiving module, a sending module, a decryption module and a judging module, wherein,
the receiving module is used for receiving an access request sent by the terminal equipment;
the sending module is used for sending information to be encrypted to the terminal equipment so that the terminal equipment encrypts the information to be encrypted by using a first access password generated according to the human body biological information acquired by the terminal equipment;
the receiving module is further configured to receive the encrypted information sent by the terminal device;
the decryption module is used for decrypting the encrypted information by using a second access password generated according to the acquired human body biological information;
the judgment module is used for judging whether the decrypted information is the same as the information to be encrypted;
and the sending module is further configured to send information of successful authentication to the terminal device when the judgment result of the judging module is yes, so that the terminal device is accessed to the WLAN network where the terminal device is located.
Optionally, the human biological information may include at least one of voice information, fingerprint information, and iris information.
According to the technical scheme, the terminal equipment sends the access request to the searched AP and receives the information to be encrypted returned by the AP according to the access request by applying the embodiment of the invention; encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information; and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.
Of course, it is not necessary for any product or method of practicing the invention to achieve all of the above-described advantages at the same time.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a WLAN access system according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a WLAN access method applied to a terminal device according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a WLAN access method applied to an AP according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a WLAN access apparatus applied to a terminal device according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a WLAN access device applied to an AP according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to solve the problem of the prior art, embodiments of the present invention provide a WLAN access method and apparatus. It should be noted that the WLAN access method and apparatus provided in the embodiments of the present invention are preferably applied to a WLAN access system. Fig. 1 is a schematic structural diagram of a WLAN access system according to an embodiment of the present invention, including an AP and a terminal device (Station).
In practical applications, the terminal device may be a terminal device supporting 802.11 protocol, such as a smart home device or some other similar small smart device accessing a WLAN network. The AP can provide wireless access service based on 802.11 protocol for Station, and simultaneously convert the frame format of 802.11 in the wireless network into the frame format of other types of wired networks, such as 802.3, which is equivalent to completing the bridging between wireless and wired networks.
Fig. 2 is a flowchart of a WLAN access method applied to a terminal device according to an embodiment of the present invention, where the flowchart includes:
s101: and sending an access request to the searched AP.
In practical application, the terminal device may search for the AP in two ways, one is to passively monitor Beacon frame information of the AP, the other is to actively send a Probe Request frame Request by Station, and the AP responds to the Probe Response frame. Specifically, the terminal device searches for the AP is the prior art, and is not described herein again.
S102: and receiving information to be encrypted returned by the AP according to the access request.
After receiving an access request sent by a terminal device, the AP sends information to be encrypted to the terminal device.
S103: and encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information.
The terminal device obtains human body biological information in advance, and specifically, the human body biological information may include at least one of voice information, fingerprint information, and iris information.
And the terminal equipment generates a first access password according to the acquired human body biological information. Taking the sound information as an example, the process of generating the first access password by the terminal device according to the acquired human biological information may include: the method comprises the steps of receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information. For example, the extracted voice information is processed according to a preset algorithm to obtain a first access password.
The terminal equipment is provided with a sound collection function, and can collect sound clips input by a user. As can be understood by those skilled in the art, extracting sound information from the sound fragment, generating an access password according to the sound information, and encrypting information to be encrypted by using the access password are all the prior art, and are not described herein.
In addition, it is prior art that the terminal device acquires the fingerprint information or the iris information and generates the access password by using the fingerprint information or the iris information, which is not described herein again.
Assuming that the received information to be encrypted returned by the AP is S, a first access password is generated according to the acquired sound information, and S is encrypted by using the first access password to become S1.
S104: and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the human biological information acquired by the AP.
The AP also obtains human biological information in advance, and specifically, the human biological information may include at least one of voice information, fingerprint information, and iris information. The AP generates a second access password according to the acquired biological information. And if the terminal equipment has the authority of accessing the AP, the second access password generated in the AP is the same as the first access password generated by the terminal equipment.
The encrypted information S1 is sent to the AP. The AP decrypts S1 with the second access password to obtain information S. If the terminal device does not have the authority to access the AP, the AP does not generate the second access password identical to the first access password of the terminal device, and the AP cannot correctly decrypt S1 and cannot obtain the information S.
S105: and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located. And the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted.
When the AP correctly decrypts S1 to obtain S, which indicates that the terminal device has the right to access the AP, the AP sends information that the authentication is successful to the terminal device.
Specifically, the step may include: sending a connection request message to an AP (access point), and receiving a connection reply message returned by the AP; and establishing connection with the AP according to the information in the connection reply message.
In practical applications, the AP and the Station are connected through a wireless link, and during the process of establishing the link, the Station needs to be authenticated by the AP. Only after passing the authentication, the Station can access the WLAN network where the AP is located. The above-mentioned S101-S104 are the authentication process.
After the Station passes the authentication of the AP, a connection Request (Association Request) message is sent to the AP, the AP responds to a connection reply (Association Response) message, and the Association Response message comprises related information distributed by the AP for the Station. After this link, the connection between the AP and the Station is established, and the Station accesses the WLAN network where the AP is located, so that the data packets can be exchanged. It can be understood by those skilled in the art that the process of establishing a connection with an AP after a Station passes authentication is prior art and will not be described herein.
In the illustrated embodiment of the present invention, before S101, the method may further include: and judging whether the searched AP needs password access, if so, executing S101.
In practical applications, the authentication process may adopt two ways:
the first mode, Open System Authentication (Open System Authentication), is Open Authentication for short, and is called as non-Authentication, and as long as a Station sends an Authentication request, an AP allows the Authentication to be successful, which is an unsafe Authentication mode.
The second method, Pre-Shared-key Authentication, is to configure a password in the Station and the AP, and to successfully authenticate the AP only if the password configured in the Station and the AP is the same.
Therefore, before the Station sends an access request to the searched AP, it is determined whether the searched AP needs password access, if the password access is not needed, it indicates that the Station and the AP adopt a first authentication mode, otherwise, it indicates that the Station and the AP adopt a second authentication mode. When the first authentication mode is adopted, the Station directly accesses to the WLAN network where the AP is positioned; when the second authentication mode is adopted, the method provided by the embodiment of the invention is executed.
In the illustrated embodiment of the present invention, the above-mentioned S101-S105 may be sequentially executed according to the signal strength ranking for each searched AP until the correct WLAN network is accessed. The configuration of the user on the intelligent household equipment or other similar small intelligent equipment is greatly simplified.
With the embodiment of the present invention shown in fig. 2, a terminal device sends an access request to a searched AP, and receives information to be encrypted returned by the AP according to the access request; encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information; and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.
Fig. 3 is a flowchart of a WLAN access method applied to an AP according to an embodiment of the present invention, including:
s201: and receiving an access request sent by the terminal equipment.
S202: and sending information to be encrypted to terminal equipment so that the terminal equipment encrypts the information to be encrypted by using a first access password generated according to the human body biological information acquired by the terminal equipment.
After receiving an access request sent by a terminal device, the AP sends information to be encrypted to the terminal device. Assume that the information to be encrypted is S.
The terminal device obtains human body biological information in advance, and specifically, the human body biological information may include at least one of voice information, fingerprint information, and iris information. And the terminal equipment generates a first access password according to the acquired human body biological information. Taking the sound information as an example, the process of generating the first access password by the terminal device according to the acquired human biological information may include: the method comprises the steps of receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information.
It is assumed that the Station encrypts the information to be encrypted S with the first access password to become S1.
S203: and receiving the encrypted information sent by the terminal equipment.
The AP receives the encrypted information S1 sent by the Station.
S204: and decrypting the encrypted information by using a second access password generated according to the acquired human biological information.
The AP also obtains human biological information in advance, and specifically, the human biological information may include at least one of voice information, fingerprint information, and iris information.
And the AP generates a second access password according to the acquired human body biological information. Taking the sound information as an example, the process of generating the second access password by the AP according to the acquired human biological information may include: and receiving a sound fragment sent by a user or a remote computer, extracting sound information from a preset position of the sound fragment, and generating a second access password according to the extracted sound information. For example, the extracted voice information is processed according to a preset algorithm to obtain a second access password.
In practical application, the AP acquires the sound information in two ways. The first way, locally generates: the AP is provided with a sound collection function, so that sound fragments input by a user can be collected, and sound information is extracted from preset positions of the collected sound fragments. The second way, remote generation: the user remotely logs on the AP through the PC, the sound clip is loaded on the AP through the network, and the AP extracts sound information from the preset position of the sound clip. It can be understood by those skilled in the art that extracting the sound information from the sound segment, generating the access password according to the sound information, and decrypting the encrypted information by using the access password are all prior art, and are not described herein again.
In addition, it is the prior art that the AP acquires the fingerprint information or the iris information and generates the password using the fingerprint information or the iris information, which is not described herein again.
S205: and judging whether the decrypted information is the same as the information to be encrypted, if so, executing S206.
And if the terminal equipment has the authority of accessing the AP, the second access password generated in the AP is the same as the first access password of the terminal equipment. The AP decrypts S1 with the second access password to obtain information S. If the terminal device does not have the authority to access the AP, the AP does not generate the same access password as the first access password of the terminal device, and the AP cannot correctly decrypt S1 and cannot obtain the information S.
It should be noted that, in order to ensure that the second access password generated in the AP is the same as the first access password of the terminal device, the AP and the Station need to extract the voice information at the same position from the same voice segment as the password.
S206: and sending information of successful authentication to the terminal equipment so that the terminal equipment is accessed to the WLAN network where the terminal equipment is located.
When the AP correctly decrypts S1 to obtain S, that is, when the AP indicates that the terminal device has the right to access the AP, the AP sends information that the authentication is successful to the terminal device. And after receiving the information of successful authentication sent by the AP, the terminal equipment accesses the WLAN network where the AP is located.
With the embodiment of the invention shown in fig. 3, the AP receives an access request sent by a terminal device, and sends information to be encrypted to the terminal device, so that the terminal device encrypts the information to be encrypted by using a first access password generated according to the human biological information acquired by the terminal device; receiving encrypted information sent by the terminal equipment, and decrypting the encrypted information by using a second access password generated according to the acquired human body biological information; judging whether the decrypted information is the same as the information to be encrypted; and if the authentication information is the same as the authentication information, sending information of successful authentication to the terminal equipment so as to enable the terminal equipment to access the WLAN network where the terminal equipment is located. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.
Corresponding to the above method embodiment, the embodiment of the present invention further provides a WLAN access apparatus.
Fig. 4 is a schematic structural diagram of a WLAN access apparatus applied to a terminal device according to an embodiment of the present invention, including: a sending module 301, a receiving module 302, an encryption module 303, and an access module 304, wherein,
a sending module 301, configured to send an access request to a searched AP;
a receiving module 302, configured to receive information to be encrypted, which is returned by the AP according to the access request;
the encryption module 303 is configured to encrypt the information to be encrypted by using a first access password generated according to the acquired human biological information;
specifically, the human biological information may include at least one of voice information, fingerprint information, and iris information.
The sending module 301 is further configured to send the encrypted information to the AP, so that the AP decrypts the encrypted information by using a second access password generated according to the obtained human biological information;
the receiving module 302 is further configured to receive authentication success information sent by the AP, where the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and determines that the decrypted information is the same as the information to be encrypted;
an access module 304, configured to access a WLAN network where the AP is located.
In the illustrated embodiment of the present invention, the access module 304 may include: a sending submodule, a receiving submodule and a connecting submodule (not shown in the figure), wherein,
a sending submodule, configured to send a connection request packet to the AP;
the receiving submodule is used for receiving a connection reply message returned by the AP;
and the connection sub-module is used for establishing connection with the AP according to the information in the connection reply message.
In the embodiment of the present invention, the apparatus may further include a determining module (not shown in the figure) configured to determine whether the searched AP needs to access the password, and if so, trigger the sending module 301 to send an access request to the searched AP.
In the illustrated embodiment of the present invention, the apparatus may further include a receiving and extracting module (not shown in the figure) for receiving a sound clip input by a user, extracting sound information from a preset position of the sound clip, and generating the first access password according to the extracted sound information.
With the embodiment of the present invention shown in fig. 4, a terminal device sends an access request to a searched AP, and receives information to be encrypted returned by the AP according to the access request; encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information; and if the authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.
Fig. 5 is a schematic structural diagram of a WLAN access device applied to an AP according to an embodiment of the present invention, including: a receiving module 401, a sending module 402, a decryption module 403, and a determining module 404, wherein,
a receiving module 401, configured to receive an access request sent by a terminal device;
a sending module 402, configured to send information to be encrypted to the terminal device, so that the terminal device encrypts the information to be encrypted by using a first access password generated according to the obtained human biological information;
specifically, the human biological information may include at least one of voice information, fingerprint information, and iris information.
The receiving module 401 is further configured to receive encrypted information sent by the terminal device;
a decryption module 403, configured to decrypt the encrypted information by using a second access password generated according to the acquired human biological information;
a judging module 404, configured to judge whether the decrypted information is the same as the information to be encrypted;
the sending module 402 is further configured to send information of successful authentication to the terminal device when the determination result of the determining module 404 is yes, so that the terminal device accesses the WLAN network where the terminal device is located.
In the embodiment of the present invention, a receiving and extracting module (not shown in the figure) may be further included, configured to receive a sound clip sent by a user or a remote computer, extract sound information from a preset position of the sound clip, and generate a second access password according to the extracted sound information.
With the embodiment of the invention shown in fig. 5, the AP receives an access request sent by a terminal device, and sends information to be encrypted to the terminal device, so that the terminal device encrypts the information to be encrypted by using a first access password generated according to the human biological information acquired by the terminal device; receiving encrypted information sent by the terminal equipment, and decrypting the encrypted information by using a second access password generated according to the acquired human body biological information; judging whether the decrypted information is the same as the information to be encrypted; and if the authentication information is the same as the authentication information, sending information of successful authentication to the terminal equipment so as to enable the terminal equipment to access the WLAN network where the terminal equipment is located. Therefore, the terminal equipment such as intelligent household equipment or other similar small intelligent equipment generates the password according to the human biological information, other equipment is not needed to be used for configuring the password, the configuration is simple, and the operation is convenient.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
Those skilled in the art will appreciate that all or part of the steps in the above method embodiments may be implemented by a program to instruct relevant hardware to perform the steps, and the program may be stored in a computer-readable storage medium, which is referred to herein as a storage medium, such as: ROM/RAM, magnetic disk, optical disk, etc.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.

Claims (6)

1. A WLAN access method is applied to a terminal device, and is characterized in that the method comprises the following steps:
sending an access request to the searched AP, and receiving information to be encrypted returned by the AP according to the access request;
encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information, and sending the encrypted information to the AP so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human body biological information; the human body biological information comprises at least one of voice information and iris information;
if authentication success information sent by the AP is received, accessing the WLAN network where the AP is located, wherein the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and judges that the decrypted information is the same as the information to be encrypted;
when the human biological information comprises sound information, the first access password is generated in the following mode: receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information;
when the human biological information comprises sound information, the second access password is generated according to the following mode: and receiving a sound fragment sent by a user or a remote computer, extracting sound information from a preset position of the sound fragment, and generating a second access password according to the extracted sound information.
2. The method of claim 1, further comprising, prior to sending the access request to the searched AP:
judging whether the searched AP needs password access;
if yes, executing the step of sending the access request to the searched AP.
3. A WLAN access method is applied to an Access Point (AP), and comprises the following steps:
receiving an access request sent by terminal equipment, and sending information to be encrypted to the terminal equipment so that the terminal equipment encrypts the information to be encrypted by using a first access password generated according to the human body biological information acquired by the terminal equipment; the human body biological information comprises at least one of voice information and iris information;
receiving encrypted information sent by the terminal equipment, and decrypting the encrypted information by using a second access password generated according to the acquired human body biological information;
judging whether the decrypted information is the same as the information to be encrypted;
if the authentication information is the same as the authentication information, sending information of successful authentication to the terminal equipment so that the terminal equipment can be accessed to a WLAN network where the terminal equipment is located;
when the human biological information comprises sound information, the first access password is generated in the following mode: receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information;
when the human biological information comprises sound information, the second access password is generated according to the following mode: and receiving a sound fragment sent by a user or a remote computer, extracting sound information from a preset position of the sound fragment, and generating a second access password according to the extracted sound information.
4. A WLAN access device applied to a terminal device, the device comprising: a sending module, a receiving module, an encryption module and an access module, wherein,
the sending module is used for sending an access request to the searched AP;
the receiving module is used for receiving the information to be encrypted returned by the AP according to the access request;
the encryption module is used for encrypting the information to be encrypted by using a first access password generated according to the acquired human body biological information; the human body biological information comprises at least one of voice information and iris information;
the sending module is further configured to send the encrypted information to the AP, so that the AP decrypts the encrypted information by using a second access password generated according to the acquired human biological information;
the receiving module is further configured to receive authentication success information sent by the AP, where the authentication success information is sent when the AP decrypts the encrypted information by using the second access password and determines that the decrypted information is the same as the information to be encrypted;
the access module is used for accessing the WLAN network where the AP is located;
when the human biological information comprises sound information, the first access password is generated in the following mode: receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information;
when the human biological information comprises sound information, the second access password is generated according to the following mode: and receiving a sound fragment sent by a user or a remote computer, extracting sound information from a preset position of the sound fragment, and generating a second access password according to the extracted sound information.
5. The apparatus of claim 4, further comprising:
and the judging module is used for judging whether the searched AP needs password access or not, and if so, triggering the sending module to send an access request to the searched AP.
6. A WLAN access device for a wireless local area network, AP, the device comprising: a receiving module, a sending module, a decryption module and a judging module, wherein,
the receiving module is used for receiving an access request sent by the terminal equipment;
the sending module is used for sending information to be encrypted to the terminal equipment so that the terminal equipment encrypts the information to be encrypted by using a first access password generated according to the human body biological information acquired by the terminal equipment; the human body biological information comprises at least one of voice information and iris information;
the receiving module is further configured to receive the encrypted information sent by the terminal device;
the decryption module is used for decrypting the encrypted information by using a second access password generated according to the acquired human body biological information;
the judgment module is used for judging whether the decrypted information is the same as the information to be encrypted;
the sending module is further configured to send information of successful authentication to the terminal device when the judgment result of the judging module is yes, so that the terminal device is accessed to the WLAN network where the terminal device is located;
when the human biological information comprises sound information, the first access password is generated in the following mode: receiving a sound fragment input by a user, extracting sound information from a preset position of the sound fragment, and generating a first access password according to the extracted sound information;
when the human biological information comprises sound information, the second access password is generated according to the following mode: and receiving a sound fragment sent by a user or a remote computer, extracting sound information from a preset position of the sound fragment, and generating a second access password according to the extracted sound information.
CN201610280642.0A 2016-04-29 2016-04-29 WLAN access method and device Active CN106792661B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610280642.0A CN106792661B (en) 2016-04-29 2016-04-29 WLAN access method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610280642.0A CN106792661B (en) 2016-04-29 2016-04-29 WLAN access method and device

Publications (2)

Publication Number Publication Date
CN106792661A CN106792661A (en) 2017-05-31
CN106792661B true CN106792661B (en) 2021-05-14

Family

ID=58972181

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610280642.0A Active CN106792661B (en) 2016-04-29 2016-04-29 WLAN access method and device

Country Status (1)

Country Link
CN (1) CN106792661B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396319B (en) * 2017-09-01 2019-09-20 深圳回收宝科技有限公司 A kind of method of wireless network authentication, equipment, storage medium and terminal reclaimer
US11284256B2 (en) * 2019-03-25 2022-03-22 Nanning Fugui Precision Industrial Co., Ltd. Method and system for automatic access to WI-FI network

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030852A (en) * 2007-01-30 2007-09-05 天津市阿波罗信息技术有限公司 Method for enciphering and deciphering human-body safety
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
CN103139768A (en) * 2011-11-28 2013-06-05 上海贝尔股份有限公司 Authentication method and authentication device in integrated wireless network
CN105450597A (en) * 2014-08-14 2016-03-30 阿里巴巴集团控股有限公司 Information transmission method and device

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7577835B2 (en) * 2003-08-20 2009-08-18 Telecommunication Systems, Inc. Deployable secure communication system
US8341700B2 (en) * 2003-10-13 2012-12-25 Nokia Corporation Authentication in heterogeneous IP networks
CN104159269B (en) * 2013-05-14 2018-11-27 海尔集团公司 Access method, relevant device and the system of wireless router
CN105227516A (en) * 2014-05-28 2016-01-06 中兴通讯股份有限公司 The access method of Smart Home, control centre's equipment and dress terminal
CN105307285B (en) * 2014-06-06 2020-07-31 佛山市顺德区美的电热电器制造有限公司 Networking setting method and system of household appliance, terminal and household appliance
CN105430645A (en) * 2015-10-29 2016-03-23 青岛海尔智能家电科技有限公司 Method of accessing intelligent device to router, intelligent device and router

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101030852A (en) * 2007-01-30 2007-09-05 天津市阿波罗信息技术有限公司 Method for enciphering and deciphering human-body safety
CN101350724A (en) * 2008-08-15 2009-01-21 西安电子科技大学 Encrypting method base on biology characteristic information
CN103139768A (en) * 2011-11-28 2013-06-05 上海贝尔股份有限公司 Authentication method and authentication device in integrated wireless network
CN105450597A (en) * 2014-08-14 2016-03-30 阿里巴巴集团控股有限公司 Information transmission method and device

Also Published As

Publication number Publication date
CN106792661A (en) 2017-05-31

Similar Documents

Publication Publication Date Title
US10862684B2 (en) Method and apparatus for providing service on basis of identifier of user equipment
US11778458B2 (en) Network access authentication method and device
CN112261708B (en) System and method for automatically configuring WiFi equipment in batches
CN113055867A (en) Method and device for auxiliary network distribution of terminal and electronic equipment
CN105050081A (en) Method, device and system for connecting network access device to wireless network access point
JP2018523950A (en) Method and apparatus for direct communication key establishment
WO2015180261A1 (en) Smart home access method, control centre device and wearable terminal
US20160315773A1 (en) Method and apparatus for providing information
CN107567017B (en) Wireless connection system, device and method
CN104284331B (en) A kind of method and system connecting portable WLAN hot spot
CN112672351A (en) Wireless local area network authentication method and device, electronic equipment and storage medium
CN105847223A (en) Authentication method and device of terminal device
CN108306793B (en) Intelligent device, intelligent home gateway, and method and system for establishing connection
CN106792661B (en) WLAN access method and device
JP6408627B2 (en) Remote device control system and remote device control method
CN106658488B (en) Intelligent household appliance and method and device for safely accessing intelligent household appliance
JP5721183B2 (en) Wireless LAN communication system, wireless LAN base unit, communication connection establishment method, and program
TWI489899B (en) Connection method applying for wireless netwok and wireless network device and wireless network access point applying thereof
CN114760112B (en) Wireless local area network-oriented intelligent home equipment networking method, system, equipment and storage medium
WO2022078058A1 (en) Decryption method, server and storage medium
CN110839237B (en) Method and device for accessing equipment to be configured with network to access point
CN106937286B (en) A kind of user access authentication method and device
KR101834632B1 (en) Security system of moving object information and security method of moving object information using the system
KR101718438B1 (en) Access point handover apparatus and method for secure handover
CN109981420B (en) Intelligent device network distribution method and intelligent device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant