CN106851639B - WiFi access method and access point - Google Patents

WiFi access method and access point Download PDF

Info

Publication number
CN106851639B
CN106851639B CN201510887955.8A CN201510887955A CN106851639B CN 106851639 B CN106851639 B CN 106851639B CN 201510887955 A CN201510887955 A CN 201510887955A CN 106851639 B CN106851639 B CN 106851639B
Authority
CN
China
Prior art keywords
access
mobile terminal
access point
password
response
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201510887955.8A
Other languages
Chinese (zh)
Other versions
CN106851639A (en
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510887955.8A priority Critical patent/CN106851639B/en
Publication of CN106851639A publication Critical patent/CN106851639A/en
Application granted granted Critical
Publication of CN106851639B publication Critical patent/CN106851639B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a WiFi access method and an access point, wherein an access request of a first mobile terminal is received through the access point, the first mobile terminal is determined to request password-free access according to the access type in the access request, the access request is sent to a second mobile terminal, and the second mobile terminal determines whether the first mobile terminal is allowed to access the access point without a password according to the user name of the first mobile terminal; the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password; and the access point allows or refuses the first mobile terminal to access the access point according to the access response. Namely, the first mobile terminal requesting access to the access point is verified through the second mobile terminal, and whether password-free access of the first mobile terminal is allowed or not is determined, so that quick access of WiFi is realized, network security is guaranteed, and user experience is improved.

Description

WiFi access method and access point
Technical Field
The invention relates to a network technology, in particular to a method for accessing Wireless Fidelity (WiFi) and an access point.
Background
WiFi is a technology that can connect terminals such as personal computers and handheld devices (e.g., pads and mobile phones) to each other in a wireless manner, and compared with the traditional technology that connects terminals in a wired manner, WiFi is widely used because it has the advantages of convenient access, no need of additional network cables, and capability of using a network at any position within the coverage of WiFi.
However, in the same WiFi coverage, the number of users accessing may affect the network speed of each accessing user, and an illegal accessing person may also affect the problem of network security, so in the prior art, by setting a WiFi password, the access of the illegal user is prevented and the number of accessing users is limited, and generally, the set WiFi password is long and adopts a complex combination, for example: "zlf 1987-0606! "has been prevented from being hacked, thereby reducing the probability that network speed is affected and improving network security.
However, with the prior art method, since the password setting is too long and the combination is complicated, when some legitimate users need access, for example: when a relative at home visits a friend, the relative usually needs to inform the friend of the password so that the relative can connect with the WiFi, but the password which is too long and complex in combination is often required to be input for many times to be input correctly, so that the existing WiFi accessing mode is inconvenient and the user experience is poor.
Disclosure of Invention
Aiming at the existing problems, the invention provides a WiFi access method and an access point, which are used for overcoming the defects of inconvenient WiFi access mode, poor user experience and the like in the prior art.
In a first aspect, the present invention provides a method for accessing WiFi, including:
the access point receives an access request of a first mobile terminal, wherein the access request comprises a user name and an access type of the first mobile terminal, and the access type is used for requesting the first mobile terminal to access the access point without a password;
the access point sends an access request to the second mobile terminal according to the access type; enabling the second mobile terminal to determine whether to allow the first mobile terminal to access the access point without the password according to the user name of the first mobile terminal;
the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password;
and the access point allows or refuses the first mobile terminal to access the access point according to the access response.
Specifically, the method for allowing or rejecting the first mobile terminal to access the access point according to the access response by the access point comprises the following steps:
when the access response is that the first mobile terminal is allowed to access the access point without the password, the access point allows the first mobile terminal to access;
and when the access response is that the first mobile terminal is refused to access the access point without the password, the access point refuses the access of the first mobile terminal.
Specifically, the sending, by the access point, the access request to the second mobile terminal according to the access type includes:
the access point determines a first mobile terminal request surface password access point according to the access type;
the access point determines a second mobile terminal with the highest priority in at least one second mobile terminal accessed to the access point;
and the access point sends the access request to a second mobile terminal with the highest priority.
Specifically, the sending, by the access point, the access request to the second mobile terminal according to the access type includes:
the access point sends an access request to N second mobile terminals, wherein N is an integer greater than or equal to 1;
the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password, and the access point comprises the following steps:
the access point receives the earliest transmitted access response of the N second mobile terminals.
Specifically, the sending, by the access point, the access request to the second mobile terminal according to the access type includes:
the access point sends an access request to N second mobile terminals, wherein N is an integer greater than or equal to 1;
the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password, and the access point comprises the following steps:
the access point receives access responses sent by M second mobile terminals in the N second mobile terminals, wherein M is an integer less than or equal to N;
the access point allows or rejects the first mobile terminal to access the access point according to the access response, and the method comprises the following steps:
and the access point allows or rejects the first mobile terminal to access the access point according to the access response sent by the second mobile terminal with the highest priority in the M second mobile terminals.
In a second aspect, the present invention provides an access point accessing WiFi, including:
the access module is used for receiving an access request of a first mobile terminal, wherein the access request comprises a user name and an access type of the first mobile terminal, and the access type is used for requesting the first mobile terminal to access an access point without a password;
the sending module is used for sending the access request to the second mobile terminal according to the access type so that the second mobile terminal can determine whether to allow the password-free access point of the first mobile terminal according to the user name of the first mobile terminal;
the receiving module is further used for receiving an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password;
and the response module is used for allowing or rejecting the first mobile terminal to access the access point according to the access response.
Specifically, the response module is specifically configured to allow the first mobile terminal to access the access point without a password when the access response is that the first mobile terminal is allowed to access the access point without a password; and when the access response is that the password-free access point of the first mobile terminal is refused, the access of the first mobile terminal is refused.
Specifically, the sending module is specifically configured to determine, according to the access type, that the first mobile terminal requests a face password to access the access point; determining a second mobile terminal with the highest priority in at least one second mobile terminal accessing the access point; and sending the access request to the second mobile terminal with the highest priority.
Specifically, the sending module is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than or equal to 1;
the receiving module is specifically configured to receive an access response sent earliest in the N second mobile terminals.
Specifically, the sending module is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than or equal to 1;
the receiving module is specifically configured to receive access responses sent by M second mobile terminals in the N second mobile terminals, where M is an integer less than or equal to N;
the response module is specifically configured to allow or deny the first mobile terminal to access the access point according to an access response sent by a second mobile terminal with the highest priority among the M second mobile terminals.
According to the method and the access point for accessing the WiFi, the access request of a first mobile terminal (a mobile terminal to be accessed to a WiFi network) is received through the access point, the first mobile terminal is determined to request password-free access according to the access type in the access request, the access request is sent to a second mobile terminal, and the second mobile terminal determines whether the password-free access of the first mobile terminal is allowed according to the user name of the first mobile terminal; the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without a password; and the access point allows or refuses the first mobile terminal to access the access point according to the access response. Namely, the first mobile terminal requesting access to the access point is verified through the second mobile terminal, and whether password-free access of the first mobile terminal is allowed or not is determined, so that quick access of WiFi is realized, network security is guaranteed, and user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a first method for accessing WiFi according to a first embodiment of the present invention;
FIG. 2 is a schematic interface diagram of a first mobile terminal according to the present invention;
FIG. 3 is a schematic interface diagram of a second mobile terminal according to the present invention;
fig. 4 is a schematic structural diagram of an embodiment of an access point accessing WiFi in the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to the invention, a specific mobile terminal (called as a second mobile terminal) is bound with the access point, when the mobile terminal to be accessed (called as the first mobile terminal) accesses the access point without a password, the first mobile terminal sends an access request to the access point, the access point forwards the access request to the second mobile terminal, and through the authentication of the second mobile terminal, the second mobile terminal determines whether the first mobile terminal is allowed to access the access point according to the user name of the first mobile terminal, so that the network security can be ensured, and the password access is avoided for the first mobile terminal, so that the WiFi is accessed quickly, and the user experience is improved.
The technical solution of the present invention will be described in detail below with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Fig. 1 is a flowchart illustrating a first embodiment of a WiFi access method according to the present invention, as shown in fig. 1, the method of this embodiment is executed by an access point, where the access point may be a router or other hot spots, and the present invention is not limited thereto, and the method of this embodiment is as follows:
s100: the access point receives an access request of a first mobile terminal.
When a first mobile terminal wants to access an access point and use a network within a coverage area of the access point, the first mobile terminal needs to send an access request to the access point, specifically, the access request may be sent through an access interface provided on the first mobile terminal, where the access interface is as shown in fig. 2, fig. 2 is an interface schematic diagram of the first mobile terminal of the present invention, and the access interface includes two access modes, one of which is fast access, and the access request may be sent to the access point by clicking a fast access control, and it should be noted that the control is not limited to be identified by a "fast access" word, and may also be identified by other words, for example: the present invention is not limited to "password-free access" as long as the user can know that the password-free access can be requested by clicking the control. The other access mode is common password access, and the user can access the password after inputting a correct password by providing a password input box.
The access request comprises a user name and an access type of the first mobile terminal, and the access type is used for requesting the first mobile terminal to access the access point without a password.
The access type may be identified by 1 bit identification bits, for example: when the number is 1, quick access is requested, and when the number is 2, password access is requested. The invention does not limit how to identify the access type, as long as the access point can identify the requested access type as the quick access.
S102: and the access point sends the access request to the second mobile terminal according to the access type.
And when the access point determines that the access type is quick access, the access point sends the access request to the second mobile terminal.
The method comprises the following implementation modes:
one implementation is as follows:
the access point determines a first mobile terminal request surface password access point according to the access type; the access point determines a second mobile terminal with the highest priority in at least one second mobile terminal accessed to the access point; and sending the access request to the second mobile terminal with the highest priority.
That is, there may be a plurality of second mobile terminals bound to the access point, some of the second mobile terminals are in an access state, and some of the second mobile terminals are in a non-access state, and the access point forwards the access request to the second mobile terminal with the highest priority among the at least one second mobile terminal in the access state.
The other realization mode is as follows:
and the access point sends the access request to N second mobile terminals, wherein N is an integer greater than or equal to 1.
Namely: there may be a plurality of second mobile terminals bound to the access point, and the access point sends access requests to the plurality of second mobile terminals.
S104: and the second mobile terminal determines whether to allow the first mobile terminal to access the access point without the password according to the user name of the first mobile terminal.
After receiving the access request forwarded by the access point, the second mobile terminal presents an interface on the second mobile terminal as shown in fig. 3, where fig. 3 is an interface schematic diagram of the second mobile terminal according to the present invention; and assuming that the user name of the first mobile terminal in the access request is xiaohong, the second mobile terminal determines to allow password-free access of the first mobile terminal according to the user name, or refuses password-free access of the first mobile terminal. If yes, click the control of agreement, if no, click the control of refusal.
S106: and the access point receives the access response sent by the second mobile terminal.
Wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password.
When the access point transmits an access request to a second mobile terminal in the former manner in S102, an access response of the second mobile terminal is received.
When the access point sends an access request to a plurality of second mobile terminals in the latter manner, the access point accepts an access response sent by the second mobile terminals, including but not limited to the following two manners: the earliest transmitted access response among the plurality of second mobile terminals is received and the other access responses are discarded. Another access point receives access responses sent by M second mobile terminals in the N second mobile terminals, wherein M is an integer less than or equal to N; namely: receiving access responses sent by part or all of the plurality of mobile terminals, taking an access response sent by a second mobile terminal with the highest priority in the corresponding second mobile terminals in the received access responses as an effective access response, and executing S108 according to the effective access response.
S108: and the access point allows or refuses the first mobile terminal to access the access point according to the access response.
Specifically, when the access response is to allow the first mobile terminal to access the access point without the password, the access point allows the first mobile terminal to access. A response may be sent to the first mobile terminal that the access was successful or connected.
And when the access response is that the first mobile terminal is refused to access the access point without the password, the access point refuses the access of the first mobile terminal. An access failure response may be sent to the first mobile terminal.
In this embodiment, an access point receives an access request of a first mobile terminal, determines that the first mobile terminal requests password-free access according to an access type in the access request, and sends the access request to a second mobile terminal, and the second mobile terminal determines whether to allow the first mobile terminal to access the access point without a password according to a user name of the first mobile terminal; the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without the password; and the access point allows or refuses the first mobile terminal to access the access point according to the access response. Namely, the first mobile terminal requesting access to the access point is verified through the second mobile terminal, and whether password-free access of the first mobile terminal is allowed or not is determined, so that quick access of WiFi is realized, network security is guaranteed, and user experience is improved.
Fig. 4 is a schematic structural diagram of an embodiment of an access point accessing WiFi in the present invention, where the structure of the embodiment includes a receiving module 401, a sending module 402, and a responding module 403, where the receiving module 401 is configured to receive an access request of a first mobile terminal, where the access request includes a user name and an access type of the first mobile terminal, and the access type is used to request the first mobile terminal to access the access point without a password; the sending module 402 is configured to send an access request to a second mobile terminal according to an access type, so that the second mobile terminal determines whether to allow the first mobile terminal to access the access point without a password according to a user name of the first mobile terminal; the receiving module 401 is further configured to receive an access response sent by the second mobile terminal, where the access response is used to indicate whether the first mobile terminal is allowed to access the access point without using the password; the response module 403 is configured to allow or deny the first mobile terminal to access the access point according to the access response.
In the above embodiment, the response module 403 is specifically configured to allow the first mobile terminal to access the access point without using the password when the access response indicates that the first mobile terminal is allowed to access the access point without using the password; and when the access response is that the password-free access point of the first mobile terminal is refused, the access of the first mobile terminal is refused.
In the foregoing embodiment, the sending module 402 is specifically configured to determine, according to the access type, that the first mobile terminal requests a plane password to access the access point; determining a second mobile terminal with the highest priority in at least one second mobile terminal accessing the access point; and sending the access request to the second mobile terminal with the highest priority.
In the foregoing embodiment, the sending module 402 is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than or equal to 1; the receiving module 401 is specifically configured to receive the access response sent earliest in the N second mobile terminals.
In the foregoing embodiment, the sending module 402 is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than or equal to 1; the receiving module 401 is specifically configured to receive access responses sent by M second mobile terminals in the N second mobile terminals, where M is an integer less than or equal to N; the response module 403 is specifically configured to allow or deny the first mobile terminal to access the access point according to an access response sent by a second mobile terminal with the highest priority in the M second mobile terminals.
The apparatus of this embodiment may be correspondingly used to implement the technical solution of the method embodiment shown in fig. 1, and the implementation principle and the technical effect are similar, which are not described herein again.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (6)

1. A method for accessing WiFi, comprising:
an access point receives an access request of a first mobile terminal, wherein the access request comprises a user name and an access type of the first mobile terminal, and the access type is used for requesting the first mobile terminal to access the access point without a password;
the access point sends the access request to a second mobile terminal according to the access type, so that the second mobile terminal determines whether to allow the first mobile terminal to access the access point without a password according to the user name of the first mobile terminal;
the access point receives an access response sent by the second mobile terminal, wherein the access response is used for indicating whether the first mobile terminal is allowed to access the access point without a password;
the access point allows or rejects the first mobile terminal to access the access point according to the access response;
wherein, the access point sends the access request to a second mobile terminal according to the access type, which comprises: the access point determines that the first mobile terminal requests password-free access to the access point according to the access type;
the access point determines a second mobile terminal with the highest priority in at least one second mobile terminal accessing the access point;
the access point sends the access request to a second mobile terminal with the highest priority; or
The access point sends the access request to N second mobile terminals, wherein N is an integer greater than 1;
the access point receiving an access response sent by the second mobile terminal, where the access response is used to indicate whether to allow the first mobile terminal to access the access point without a password, including:
and the access point receives the access response sent earliest in the N second mobile terminals.
2. The method of claim 1, wherein the access point allowing or denying the first mobile terminal to access the access point according to the access response comprises:
when the access response is that the first mobile terminal is allowed to access the access point without the password, the access point allows the first mobile terminal to access;
and when the access response is that the first mobile terminal is refused to access the access point without the password, the access point refuses the access of the first mobile terminal.
3. The method according to claim 1 or 2, wherein the access point sends the access request to the second mobile terminal according to the access type, comprising:
the access point sends the access request to N second mobile terminals, wherein N is an integer greater than or equal to 1;
the access point receiving an access response sent by the second mobile terminal, where the access response is used to indicate whether to allow the first mobile terminal to access the access point without a password, including:
the access point receives access responses sent by M second mobile terminals in the N second mobile terminals, wherein M is an integer less than or equal to N;
the access point allowing or rejecting the first mobile terminal to access the access point according to the access response comprises:
and the access point allows or rejects the first mobile terminal to access the access point according to the access response sent by the second mobile terminal with the highest priority in the M second mobile terminals.
4. An access point for accessing WiFi, comprising:
a receiving module, configured to receive an access request of a first mobile terminal, where the access request includes a user name and an access type of the first mobile terminal, and the access type is used to request the first mobile terminal to access the access point without using a password;
a sending module, configured to send the access request to a second mobile terminal according to the access type, so that the second mobile terminal determines, according to the user name of the first mobile terminal, whether to allow the first mobile terminal to access the access point without using a password;
the receiving module is further configured to receive an access response sent by the second mobile terminal, where the access response is used to indicate whether the first mobile terminal is allowed to access the access point without a password;
a response module, configured to allow or deny the first mobile terminal to access the access point according to the access response;
the sending module is specifically configured to determine, according to the access type, that the first mobile terminal requests password-free access to the access point; determining a second mobile terminal with the highest priority in at least one second mobile terminal accessing the access point; sending the access request to a second mobile terminal with the highest priority;
the sending module is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than 1;
the receiving module is specifically configured to receive an access response sent earliest in the N second mobile terminals.
5. The access point of claim 4, wherein the response module is specifically configured to
When the access response is that the first mobile terminal is allowed to access the access point without the password, the first mobile terminal is allowed to access; and when the access response is that the first mobile terminal is refused to access the access point without the password, the first mobile terminal is refused to access.
6. The access point according to claim 4 or 5, wherein the sending module is specifically configured to send the access request to N second mobile terminals, where N is an integer greater than or equal to 1;
the receiving module is specifically configured to receive access responses sent by M second mobile terminals in the N second mobile terminals, where M is an integer less than or equal to N;
the response module is specifically configured to allow or deny the first mobile terminal to access the access point according to an access response sent by a second mobile terminal with a highest priority level among the M second mobile terminals.
CN201510887955.8A 2015-12-07 2015-12-07 WiFi access method and access point Expired - Fee Related CN106851639B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510887955.8A CN106851639B (en) 2015-12-07 2015-12-07 WiFi access method and access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510887955.8A CN106851639B (en) 2015-12-07 2015-12-07 WiFi access method and access point

Publications (2)

Publication Number Publication Date
CN106851639A CN106851639A (en) 2017-06-13
CN106851639B true CN106851639B (en) 2020-12-18

Family

ID=59151201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510887955.8A Expired - Fee Related CN106851639B (en) 2015-12-07 2015-12-07 WiFi access method and access point

Country Status (1)

Country Link
CN (1) CN106851639B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107708116B (en) * 2017-10-25 2020-11-13 台州市吉吉知识产权运营有限公司 Method and system for realizing password-free connection of equipment to router
CN108966218A (en) * 2018-06-22 2018-12-07 四川斐讯信息技术有限公司 A kind of wireless network access method and system based on management terminal control

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
CN104363631A (en) * 2014-10-24 2015-02-18 小米科技有限责任公司 Connection method, device and system of wireless router
CN104363666A (en) * 2014-11-26 2015-02-18 广州三星通信技术研究有限公司 Method and device for setting up wireless connection between electronic devices and external device
CN104735661A (en) * 2013-12-18 2015-06-24 韩燕� WIFI access authentication terminal
EP2887744A1 (en) * 2012-09-28 2015-06-24 Huawei Technologies Co., Ltd. Wireless local area network access method, base station controller and user equipment
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2887744A1 (en) * 2012-09-28 2015-06-24 Huawei Technologies Co., Ltd. Wireless local area network access method, base station controller and user equipment
CN103765855A (en) * 2013-09-13 2014-04-30 华为终端有限公司 Processing method of wireless network equipment, wireless network equipment and processor
CN104735661A (en) * 2013-12-18 2015-06-24 韩燕� WIFI access authentication terminal
CN104363631A (en) * 2014-10-24 2015-02-18 小米科技有限责任公司 Connection method, device and system of wireless router
CN104363666A (en) * 2014-11-26 2015-02-18 广州三星通信技术研究有限公司 Method and device for setting up wireless connection between electronic devices and external device
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system

Also Published As

Publication number Publication date
CN106851639A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
US10356588B2 (en) Network access method, device, and system
CN103746812B (en) A kind of access authentication method and system
JP6842919B2 (en) Network connection method, hotspot terminal and management terminal
US11093598B2 (en) Identity authentication method and apparatus
JP6599341B2 (en) Method, device and system for dynamic network access management
US9215005B2 (en) Social cloud application-mediated mobile data hotspot sharing
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
US20140254499A1 (en) Tethering of mobile wireless devices
KR101743195B1 (en) Method and apparatus for providing information, program and recording medium
US9787678B2 (en) Multifactor authentication for mail server access
EP3122144A1 (en) Device and method for accessing wireless network
CN105099704A (en) Biometric identification-based OAuth service
US8989380B1 (en) Controlling communication of a wireless communication device
CN106851639B (en) WiFi access method and access point
KR102071281B1 (en) Method for intergraged authentication thereof
JP6067101B2 (en) Method and system for authenticating at least one terminal requesting access to at least one resource
CN105577609B (en) Method and apparatus for being controlled the content of access
KR20190036741A (en) Service providing system and method for security supporting multi-channel authentication with user equipment, and non-transitory computer readable medium having computer program recorded thereon
KR101141101B1 (en) Access point access approval system and method
KR101542099B1 (en) Method for SNS Account Registration and Access Authentication of WiFi
CN112752262A (en) Networking method of household electrical appliance, household electrical appliance and terminal equipment
CN115758315A (en) System account switching method and device, electronic equipment and storage medium
KR20190036739A (en) Service providing system and method for security supporting multi-channel authentication, and non-transitory computer readable medium having computer program recorded thereon
JP2014191569A (en) Information device and connection control method therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201218

Termination date: 20211207