CN106851642A - Wireless networking authorization method and device - Google Patents
Wireless networking authorization method and device Download PDFInfo
- Publication number
- CN106851642A CN106851642A CN201710083140.3A CN201710083140A CN106851642A CN 106851642 A CN106851642 A CN 106851642A CN 201710083140 A CN201710083140 A CN 201710083140A CN 106851642 A CN106851642 A CN 106851642A
- Authority
- CN
- China
- Prior art keywords
- router
- client
- time
- predeterminable area
- shell
- Prior art date
Links
- 238000005516 engineering processes Methods 0.000 claims description 7
- 230000001939 inductive effects Effects 0.000 claims description 5
- 239000011257 shell materials Substances 0.000 claims 14
- 230000005540 biological transmission Effects 0.000 description 4
- 238000004891 communication Methods 0.000 description 4
- 230000000875 corresponding Effects 0.000 description 4
- 238000000034 methods Methods 0.000 description 4
- 280000398328 Open Wireless Network companies 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reactions Methods 0.000 description 3
- 230000001808 coupling Effects 0.000 description 2
- 238000010230 functional analysis Methods 0.000 description 2
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 2
- 281000056986 Peoples Daily companies 0.000 description 1
- 230000004069 differentiation Effects 0.000 description 1
- 239000000686 essences Substances 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 239000000203 mixtures Substances 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
- H04W12/06—Authentication
Abstract
Description
Technical field
The invention belongs to communication technical field, more particularly to wireless networking authorization method and device.
Background technology
Wireless networking turns into essential communication mode in the middle of people's daily life, thus wireless router use Very popularization.Traditional wireless router needs the user input password just can to carry out networking mandate to client.
But, there are 2 points of deficiencies, at first point by way of inputing password and connecting wireless router so as to online in user It is that input password this action is very cumbersome in itself, have impact on convenience of user when using wireless router;Second point is After once wireless router password is revealed or is cracked, the wireless network of family can turn into public network, and this can threaten family The safety of network and the loss of broadband resource can be caused.
The content of the invention
In view of this, wireless networking authorization method and device are the embodiment of the invention provides, it is existing without circuit to solve By device because needing the user input password can just to carry out online mandate, caused by low and convenience difference the problem of security.
A kind of first aspect, there is provided wireless networking authorization method, including:Whether have in predeterminable area on detection router Object is contacted;If thering is object to contact in predeterminable area on the router, open wireless network and record start-up time;If working as The preceding moment is less than or equal to preset time threshold with the time difference of the start-up time, then the access for receiving client transmission please Ask;Detect the distance with the client;If the distance with the client is less than or equal to predetermined threshold value, institute is allowed State client and access the wireless network.
A kind of second aspect, there is provided wireless networking authorization device, including:Contact detection sub-unit, route for detecting Whether there is object to contact in predeterminable area on device;Promoter unit, if for thering is object to connect in predeterminable area on the router Touch, then open wireless network and record start-up time;Receiving subelement, if for the time of current time and the start-up time Difference is less than or equal to preset time threshold, then receive the access request that client sends;Apart from detection sub-unit, for detecting With the distance of the client;Access subelement, if being less than or equal to predetermined threshold value for the distance with the client, The client is then allowed to access the wireless network.
In embodiments of the present invention, by detecting on router whether there is object to contact in predeterminable area, when on router After thering is object to contact in predeterminable area, it is allowed to which client in Preset Time and within a preset range enters the side of wireless network Formula so that user can be in the case where password not be input, in connecting the clients to wireless network, so as to reduce client The complexity of wireless network operations is accessed, and ensure that the safety of family wireless network.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to embodiment or description of the prior art Needed for the accompanying drawing to be used be briefly described, it should be apparent that, drawings in the following description are only more of the invention Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is that wireless networking authorization method provided in an embodiment of the present invention realizes flow chart;
Fig. 2 is that wireless networking authorization method S102 provided in an embodiment of the present invention implements flow chart;
Fig. 3 is that the wireless networking authorization method that another embodiment of the present invention is provided realizes flow chart;
Fig. 4 is the structured flowchart of wireless networking authorization device provided in an embodiment of the present invention.
Specific embodiment
In below describing, in order to illustrate rather than in order to limit, it is proposed that the such as tool of particular system structure, technology etc Body details, thoroughly to understand the embodiment of the present invention.However, it will be clear to one skilled in the art that specific without these The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity Road and the detailed description of method, in case unnecessary details hinders description of the invention.
Whether there is object to contact in predeterminable area on embodiment of the present invention detection router;If preset areas on the router There is object to contact in domain, then open wireless network and record start-up time;If the time difference of current time and the start-up time Value is less than or equal to preset time threshold, then receive the access request that client sends;Detect the distance with the client;If The distance with the client is less than or equal to predetermined threshold value, then allow the client to access the wireless network.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
Embodiment one:
What Fig. 1 showed wireless networking mandate provided in an embodiment of the present invention realizes flow chart, and details are as follows:
In S101, whether there is object to contact in predeterminable area on detection router.
In embodiments of the present invention, the software systems environment of router is linux, eCos system, and supports that 802.11 are System agreement.
In embodiments of the present invention, detect that the level on router in predeterminable area changes by electric current induction technology, from And judge whether there is object to contact in predeterminable area on router.
Specifically, there is a current sensor on router, have a voltage comparator in current sensor, when no thing During body touching router particular range, current sensor does not have electric current to flow through, and now the output voltage of current sensor is less than base Quasi- voltage, voltage comparator output low level.But when having object to touch router particular range, current sensor has Electric current flows through, if during controller electric current, voltage comparator output high level.Router can be by the change of this level Change into signal, and CPU by router processes these signals, so as to judge whether there is object in predeterminable area on router Contact.
In embodiments of the present invention, the software in this step operates and is:Router is called initial by running main functions The signal for changing the reflection level change that button probe function (initGpio) is produced to current sensor is initialized, and is adjusted The signal that is changed into by the change of level to CPU is uploaded with ralink_gpio_notify_user.Finally by calling gpio_ Whether the change of irq_handler Functional Analysis signals is so as to judge have object to contact on router in predeterminable area.
In S102, if thering is object to contact in predeterminable area on the router, open wireless networking mandate and record Start-up time.
Fig. 2 shows the flow that implements of wireless networking authorization method S102 provided in an embodiment of the present invention, describes in detail such as Under:
In S201, if thering is object to contact in predeterminable area on the router, by calling accessing wirelessly point function, Open the wireless networking mandate.
In embodiments of the present invention, when detect on router have in predeterminable area object contact after, call ralink_ Gpio_notify_user uploads the signal that is changed into by the change of level to CPU.
If having object to contact in predeterminable area on the router, it is wireless to open that router can call ConfigAP functions Online is authorized, and now router can receive the access request of other-end.
In S202, start-up time is recorded.
While wireless network is opened, record wireless network start-up time, so as in follow-up calculating with it is current when Quarter compares.
In S103, if current time is less than or equal to preset time threshold with the time difference of the start-up time, Receive the access request that client sends.
In embodiments of the present invention, after router has detected object touches or rub router predeterminable area, can hold Wireless networking mandate is opened, but only receives the access request of client in the short period of time, once held in wireless networking mandate In the continuous time, a client does not send access request, then can not access wireless network.
Specifically, it is assumed that preset time threshold is 5 seconds, then 5 seconds after user touches router ad-hoc location Clock, the router that user must be touched by client-side search to him, and attempt accessing that this router is corresponding wirelessly connects Access point, is so possible to obtain online mandate.Once user sent access request within 5 seconds not over client, Just attempt accessing this router such as at the 6th second, then now the online authorization function of router just has been switched off, client Online can not be obtained to authorize.In this case, authorized if the user desired that obtaining online, then must again touch router special Positioning is put, and sends access request by router within 5 seconds.
Advantage of this is that the security of family wireless network is ensure that, it is very short after wireless networking mandate is opened The access request of client is received in time, it is ensured that the client touch router person for sending access network request uses Client, or touch router person allows to access the client of wireless network.
Further, if current time reaches preset time threshold with the time difference of the start-up time, call Config functions are stopping wireless networking mandate.
Refer to assume that preset time threshold is 5 seconds in above-mentioned example, then router only can be after being touched 5 seconds in online mandate is carried out to satisfactory client.Have a time set in router, once current time with The time difference of start-up time reaches 5 seconds, and router can call the config function, this function to stop router Wireless networking mandate, now router no longer receive the access request of any client.
It is worth noting that, router authorizes the time difference of start-up time to reach 5 seconds at current time and netting twine online Zhong Shi, has simply turned off wireless networking authorization function, is not off wireless networking capabilities, that is, do not access the client of wireless network End, it is impossible to access wireless network by this touch router, but the client for having accessed wireless network before can be with Normal online.
In S104, the distance with the client is detected.
In embodiments of the present invention, after router receives the access request of client transmission, can detect and client The distance at end.Only when the distance between client and router meet certain condition, router can just allow client to terminate Enter wireless network.
In S105, if the distance with the client is less than or equal to predeterminable range threshold value, the visitor is allowed Family is terminated into the wireless network.
In embodiments of the present invention, being detected on predeterminated position in router has touch or friction so as to open wireless networking After mandate, the condition that can determine a client be allowed to access network has two.One is as previously mentioned, Client has to be sent at the appointed time after router opens wireless networking mandate the request of access network.Another It is then that the client that S105 is mentioned has to be less than a distance threshold with the distance of router.The two conditions ensure that route Device is on the premise of without client input password, it is also possible to ensure the security of home network.
Further, after a router allows a client access network, router can preserve client Encryption information, and preserve the Back ground Information of client.
The encryption information of client here includes the cipher mode and Crypted password of WIFI encryptions, the basis letter of client Breath is including the SSID name information and encrypted logs of client WIFI etc..
Embodiment two:
In embodiments of the present invention, router can simultaneously receive the access request of multiple client transmission, it is also possible to same When checking multiple client whether meet allow access radio network conditions, finally also allow multiple client access and use nothing Gauze network.
In S301, whether there is object to contact in predeterminable area on detection router.
In embodiments of the present invention, the software systems environment of router is linux, eCos system, and supports that 802.11 are System agreement.
In embodiments of the present invention, detect that the level on router in predeterminable area changes by electric current induction technology, from And judge whether there is object to contact in predeterminable area on router.
Specifically, there is a current sensor on router, have a voltage comparator in current sensor, when no thing During body touching router particular range, current sensor does not have electric current to flow through, and now the output voltage of current sensor is less than base Quasi- voltage, voltage comparator output low level.But when having object to touch router particular range, current sensor has Electric current flows through, if during controller electric current, voltage comparator output high level.Router can be by the change of this level Change into signal, and CPU by router processes these signals, so as to judge whether there is object in predeterminable area on router Contact.
In embodiments of the present invention, the software in this step operates and is:Router is called initial by running main functions The signal for changing the reflection level change that button probe function (initGpio) is produced to current sensor is initialized, and is adjusted The signal that is changed into by the change of level to CPU is uploaded with ralink_gpio_notify_user.Finally by calling gpio_ Whether the change of irq_handler Functional Analysis signals is so as to judge have object to contact on router in predeterminable area.
In S302, if thering is object to contact in predeterminable area on the router, open wireless networking mandate and record Start-up time.
In embodiments of the present invention, when detect on router have in predeterminable area object contact after, call ralink_ Gpio_notify_user uploads the signal that is changed into by the change of level to CPU.
If there is object to contact on router in predeterminable area, router can call ConfigAP functions to open wireless networking Authorize, now router can receive the access request of other-end.
While wireless network is opened, record wireless network start-up time, so as in follow-up calculating with it is current when Quarter compares.
In S303, if current time is less than or equal to preset time threshold with the time difference of the start-up time, Receive the access request that client sends.
In embodiments of the present invention, after router has detected object touches or rub router predeterminable area, can hold Wireless networking mandate is opened, but only receives the access request of client in the short period of time, once held in wireless networking mandate In the continuous time, a client does not send access request, then can not access wireless network.
Specifically, it is assumed that preset time threshold is 10 seconds, then after user touches router ad-hoc location 10 Second, the router that user must be touched by client-side search to him, and attempt accessing this router corresponding wireless Access point, is so possible to obtain online mandate.
Assuming that there is four clients, customer end A sent access request at the 1st second, and customer end B sent in the 5th second and connects Enter request, client C sent access request in the 8th second, and client D sent access request in the 12nd second.So in this hair Bright to be embodiment, the access request of customer end A, customer end B and client C can just be received by router, and client D Access request cannot be received by router, therefore lose the chance of this access network.
Advantage of this is that the security of family wireless network is ensure that, it is very short after wireless networking mandate is opened The access request of client is received in time, it is ensured that the client touch router person for sending access network request uses Client, or touch router person allows to access the client of wireless network.
Further, if current time reaches preset time threshold with the time difference of the start-up time, call Config functions are stopping wireless networking mandate.
Refer to assume that preset time threshold is 10 seconds in above-mentioned example, then router only can be after being touched 5 seconds in online mandate is carried out to satisfactory client.Have a time set in router, once current time with The time difference of start-up time reaches 10 seconds, and router can call the config function, this function to stop router Wireless networking mandate, now router no longer receive the access request of any client.
It is worth noting that, router authorizes the time difference of start-up time to reach 10 seconds at current time and netting twine online Zhong Shi, has simply turned off wireless networking authorization function, is not off wireless networking capabilities, that is, do not access the client of wireless network End, it is impossible to access wireless network by this touch router, but the client for having accessed wireless network before can be with Normal online.For example there is a client E accessing wireless network before, then to be awarded when router closes wireless networking After power function, client E still can normally surf the Net.
In S304, search sends the client of access request in default client blacklist, if the client is deposited It is in default client blacklist, then to forbid the client to access wireless network.
There is a blacklist list in the router, have recorded a series of corresponding thing of clients being put on the blacklist Reason address and model.If therefore router is found that the physical address of the client for sending access request in blacklist list And model, will directly forbid these client access networks, without carrying out other operations.
It is previously mentioned, router have received the access request that customer end A, customer end B and client C send.Assuming that Client C has been appeared in the blacklist of router, then router directly forbids client C to access wireless network, and customer end A Can enter next step with customer end B to calculate to determine whether to access wireless network.
In S304, the distance with the client is detected.
In embodiments of the present invention, after router receives the access request of client transmission, and these are demonstrated After the client of access request is sent not in the blacklist, the distance with client can be detected.Only when client and route When the distance between device meets certain condition, router can just allow client to access wireless network.
In the present invention is embodiment, only customer end A and customer end B enter the calculating of this step, and wherein customer end A is arrived The distance of router is 10 meters, and customer end B to the distance of router be 25 meters.
In S305, if the distance with the client is less than or equal to predeterminable range threshold value, the visitor is allowed Family is terminated into the wireless network.
In embodiments of the present invention, being detected on predeterminated position in router has touch or friction so as to open wireless networking After mandate, the condition that can determine a client be allowed to access network has two.One is as previously mentioned, Client has to be sent at the appointed time after router opens wireless networking mandate the request of access network.Another It is then that client has to be less than a distance threshold with the distance of router.The two conditions ensure that router without visitor On the premise of family end input password, it is also possible to ensure the security of home network.
In embodiments of the present invention, predeterminable range threshold value is 15 meters, therefore router can allow customer end A access network, And forbid customer end B access network.It can be seen from the examples above that sending the customer end A of access request, customer end B, client End C and client D, finally only has customer end A to be allowed to access wireless network.
Further, after a router allows a client access network, router can preserve client Encryption information, and preserve the Back ground Information of client.
The encryption information of client here includes the cipher mode and Crypted password of WIFI encryptions, the basis letter of client Breath is including the SSID name information and encrypted logs of client WIFI etc..
In S306, display has accessed the information of wireless network clients.
Router can show it is all by this router using the client of network physical address and set Standby model.User can be judged either with or without client access network without permission by these information, if it has, can be by not Through allowing the client using network to pipe off in list.
Fig. 4 is the structured flowchart of wireless networking authorization device provided in an embodiment of the present invention, including:
Contact detection sub-unit 401, for detecting on router whether there is object to contact in predeterminable area;
Promoter unit 402, if for thering is object to contact in predeterminable area on the router, opening wireless networking and awarding Weigh and record start-up time;
Receiving subelement 403, if be less than or equal to default with the time difference of the start-up time for current time Between threshold value, then receive client send access request;
Apart from detection sub-unit 404, for detecting the distance with the client;
Access subelement 405, if being less than or equal to predetermined threshold value for the distance with the client, allows institute State client and access the wireless network.
Further, contact detection unit includes:
Level detection subelement, for detecting that the level on router in predeterminable area changes by electric current induction technology.
Further, start unit includes:
Subelement is reported, for reporting contact testing result;
Subelement is opened, if for thering is object to contact in predeterminable area on the router, by calling accessing wirelessly Point function, opens the wireless networking mandate;
Record subelement, for recording start-up time.
Further, device also includes:
Authorize and terminate subelement, if reaching Preset Time with the time difference of the start-up time for the current time Threshold value, then call config functions to stop wireless networking mandate.
Further, device also includes:
First encryption sub-unit operable, for preserving client encryption information;
Second encryption sub-unit operable, for preserving client Back ground Information.
It is apparent to those skilled in the art that, for convenience of description and succinctly, only with above-mentioned each work( Energy unit, the division of module are carried out for example, in practical application, as needed can distribute by different above-mentioned functions Functional unit, module are completed, will the internal structure of described device be divided into different functional unit or modules, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used Being that unit is individually physically present, it is also possible to which two or more units are integrated in a unit, above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.In addition, each function list Unit, the specific name of module are also only to facilitate mutually differentiation, is not limited to the protection domain of the application.Said system The specific work process of middle unit, module, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function, but this realization can be realized it is not considered that exceeding using distinct methods to each specific application The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed apparatus and method, can be by other Mode is realized.For example, system embodiment described above is only schematical, for example, the division of the module or unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be with With reference to or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed Coupling each other or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or unit or Communication connection, can be electrical, mechanical or other forms.
The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.
In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use When, can store in a computer read/write memory medium.Based on such understanding, the technical scheme of the embodiment of the present invention The part for substantially being contributed to prior art in other words or all or part of the technical scheme can be with software products Form embody, the computer software product is stored in a storage medium, including some instructions are used to so that one Computer equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform this hair The all or part of step of bright embodiment each embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, Read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic Dish or CD etc. are various can be with the medium of store program codes.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality Example is applied to be described in detail the present invention, it will be understood by those within the art that:It still can be to foregoing each Technical scheme described in embodiment is modified, or carries out equivalent to which part technical characteristic;And these are changed Or replace, do not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution, all should It is included within protection scope of the present invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710083140.3A CN106851642A (en) | 2017-02-16 | 2017-02-16 | Wireless networking authorization method and device |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710083140.3A CN106851642A (en) | 2017-02-16 | 2017-02-16 | Wireless networking authorization method and device |
PCT/CN2017/100920 WO2018149118A1 (en) | 2017-02-16 | 2017-09-07 | Wireless internet access authorization method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106851642A true CN106851642A (en) | 2017-06-13 |
Family
ID=59128354
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710083140.3A CN106851642A (en) | 2017-02-16 | 2017-02-16 | Wireless networking authorization method and device |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106851642A (en) |
WO (1) | WO2018149118A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018149118A1 (en) * | 2017-02-16 | 2018-08-23 | 深圳市欣博跃电子有限公司 | Wireless internet access authorization method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217805A (en) * | 2008-01-21 | 2008-07-09 | 中兴通讯股份有限公司 | A wireless LAN access control method |
CN101621804A (en) * | 2009-08-04 | 2010-01-06 | 中兴通讯股份有限公司 | Safe wireless access method and safe wireless access device |
CN102448065A (en) * | 2010-10-13 | 2012-05-09 | 中兴通讯股份有限公司 | Method and device for automatically configuring wireless access control list |
CN105992208A (en) * | 2015-05-15 | 2016-10-05 | 乐视致新电子科技(天津)有限公司 | Wireless connection authentication method and wireless connection authentication device |
CN105992390A (en) * | 2015-02-13 | 2016-10-05 | Tcl集团股份有限公司 | Method and system for enabling mobile terminal to be connected with WIFI router |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103781074B (en) * | 2014-02-08 | 2017-01-04 | 北京极科极客科技有限公司 | Wireless LAN safety cut-in method and equipment |
CN103916855A (en) * | 2014-04-28 | 2014-07-09 | 太仓市同维电子有限公司 | Method for enabling mobile phone to be connected to WiFi network |
US10034118B2 (en) * | 2015-04-30 | 2018-07-24 | Lantronix, Inc. | Zero-touch Wi-Fi |
CN106851642A (en) * | 2017-02-16 | 2017-06-13 | 深圳市欣博跃电子有限公司 | Wireless networking authorization method and device |
-
2017
- 2017-02-16 CN CN201710083140.3A patent/CN106851642A/en not_active Application Discontinuation
- 2017-09-07 WO PCT/CN2017/100920 patent/WO2018149118A1/en active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101217805A (en) * | 2008-01-21 | 2008-07-09 | 中兴通讯股份有限公司 | A wireless LAN access control method |
CN101621804A (en) * | 2009-08-04 | 2010-01-06 | 中兴通讯股份有限公司 | Safe wireless access method and safe wireless access device |
CN102448065A (en) * | 2010-10-13 | 2012-05-09 | 中兴通讯股份有限公司 | Method and device for automatically configuring wireless access control list |
CN105992390A (en) * | 2015-02-13 | 2016-10-05 | Tcl集团股份有限公司 | Method and system for enabling mobile terminal to be connected with WIFI router |
CN105992208A (en) * | 2015-05-15 | 2016-10-05 | 乐视致新电子科技(天津)有限公司 | Wireless connection authentication method and wireless connection authentication device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018149118A1 (en) * | 2017-02-16 | 2018-08-23 | 深圳市欣博跃电子有限公司 | Wireless internet access authorization method and device |
Also Published As
Publication number | Publication date |
---|---|
WO2018149118A1 (en) | 2018-08-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10743182B2 (en) | User identification in cell phones based on skin contact | |
US9699659B2 (en) | On-boarding a device to a secure local network | |
US9628478B2 (en) | Technologies for secure storage and use of biometric authentication information | |
US9391985B2 (en) | Environment-based two-factor authentication without geo-location | |
JP6338775B2 (en) | Distributing biometric authentication among devices in ad hoc networks | |
US20180324182A1 (en) | Network access control method and apparatus | |
CN105393193B (en) | Wearable device multi-mode system | |
CN107852410B (en) | Dissect rogue access point | |
CN103959750B (en) | For the configuration of wireless docking and the method and apparatus of control | |
US9717065B2 (en) | Indoor remote triggered location scanning | |
US20180206119A1 (en) | Providing Wireless Network Authentication Data to Climate Control System Devices | |
US10387704B2 (en) | Method and apparatus for enabling the touchscreen display of a mobile device | |
KR102069863B1 (en) | Apparatas and method for controlling a input means of payment function in an electronic device | |
CN105933943B (en) | Multi-mode radio location tracking method and system | |
US7940732B2 (en) | Automatic wireless network device configuration | |
CN103442097B (en) | A kind of home gateway controls the system and method for WiFi terminal access authority | |
TWI428047B (en) | Wlan peer-to-peer group owner negotiation | |
CN104333863B (en) | Connection management method and device, electronic equipment | |
US20160330182A1 (en) | Method of sharing key between devices using physical access restriction | |
KR20160027037A (en) | TRUST HEURISTIC MODEL FOR REDUCING CONTROL LOAD IN IoT RESOURCE ACCESS NETWORKS | |
CN103940056B (en) | Access control equipment, mobile terminal, server and air-conditioning system and control method | |
JP2018507461A (en) | Mobile devices that provide continuous and discrete user authentication | |
CN104902500B (en) | The automatic connection method and system of Wireless Communication Equipment and radio reception device | |
US9928670B2 (en) | Method and system for access control monitoring | |
CN104270386B (en) | Across application system user (asu) information integrating method and identity information management server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170613 |
|
RJ01 | Rejection of invention patent application after publication |