CN106851642A - Wireless networking authorization method and device - Google Patents

Wireless networking authorization method and device Download PDF

Info

Publication number
CN106851642A
CN106851642A CN201710083140.3A CN201710083140A CN106851642A CN 106851642 A CN106851642 A CN 106851642A CN 201710083140 A CN201710083140 A CN 201710083140A CN 106851642 A CN106851642 A CN 106851642A
Authority
CN
China
Prior art keywords
router
client
time
predeterminable area
shell
Prior art date
Application number
CN201710083140.3A
Other languages
Chinese (zh)
Inventor
张国生
Original Assignee
深圳市欣博跃电子有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欣博跃电子有限公司 filed Critical 深圳市欣博跃电子有限公司
Priority to CN201710083140.3A priority Critical patent/CN106851642A/en
Publication of CN106851642A publication Critical patent/CN106851642A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication

Abstract

The present invention is applied to mobile client technical field, there is provided the method for adjusting and device of on-screen display objects, including:Whether there is object to contact in predeterminable area on detection router;If thering is object to contact in predeterminable area on the router, open wireless networking mandate and record start-up time;If current time is less than or equal to preset time threshold with the time difference of the start-up time, the access request that client sends is received;Detect the distance with the client;If the distance with the client is less than or equal to predeterminable range threshold value, the client is allowed to access the wireless network.Can be connected the clients in wireless network in the case where password is not input the invention enables user, access the complexity of wireless network operations so as to reduce client, and ensure that the safety of family wireless network.

Description

Wireless networking authorization method and device

Technical field

The invention belongs to communication technical field, more particularly to wireless networking authorization method and device.

Background technology

Wireless networking turns into essential communication mode in the middle of people's daily life, thus wireless router use Very popularization.Traditional wireless router needs the user input password just can to carry out networking mandate to client.

But, there are 2 points of deficiencies, at first point by way of inputing password and connecting wireless router so as to online in user It is that input password this action is very cumbersome in itself, have impact on convenience of user when using wireless router;Second point is After once wireless router password is revealed or is cracked, the wireless network of family can turn into public network, and this can threaten family The safety of network and the loss of broadband resource can be caused.

The content of the invention

In view of this, wireless networking authorization method and device are the embodiment of the invention provides, it is existing without circuit to solve By device because needing the user input password can just to carry out online mandate, caused by low and convenience difference the problem of security.

A kind of first aspect, there is provided wireless networking authorization method, including:Whether have in predeterminable area on detection router Object is contacted;If thering is object to contact in predeterminable area on the router, open wireless network and record start-up time;If working as The preceding moment is less than or equal to preset time threshold with the time difference of the start-up time, then the access for receiving client transmission please Ask;Detect the distance with the client;If the distance with the client is less than or equal to predetermined threshold value, institute is allowed State client and access the wireless network.

A kind of second aspect, there is provided wireless networking authorization device, including:Contact detection sub-unit, route for detecting Whether there is object to contact in predeterminable area on device;Promoter unit, if for thering is object to connect in predeterminable area on the router Touch, then open wireless network and record start-up time;Receiving subelement, if for the time of current time and the start-up time Difference is less than or equal to preset time threshold, then receive the access request that client sends;Apart from detection sub-unit, for detecting With the distance of the client;Access subelement, if being less than or equal to predetermined threshold value for the distance with the client, The client is then allowed to access the wireless network.

In embodiments of the present invention, by detecting on router whether there is object to contact in predeterminable area, when on router After thering is object to contact in predeterminable area, it is allowed to which client in Preset Time and within a preset range enters the side of wireless network Formula so that user can be in the case where password not be input, in connecting the clients to wireless network, so as to reduce client The complexity of wireless network operations is accessed, and ensure that the safety of family wireless network.

Brief description of the drawings

Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to embodiment or description of the prior art Needed for the accompanying drawing to be used be briefly described, it should be apparent that, drawings in the following description are only more of the invention Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.

Fig. 1 is that wireless networking authorization method provided in an embodiment of the present invention realizes flow chart;

Fig. 2 is that wireless networking authorization method S102 provided in an embodiment of the present invention implements flow chart;

Fig. 3 is that the wireless networking authorization method that another embodiment of the present invention is provided realizes flow chart;

Fig. 4 is the structured flowchart of wireless networking authorization device provided in an embodiment of the present invention.

Specific embodiment

In below describing, in order to illustrate rather than in order to limit, it is proposed that the such as tool of particular system structure, technology etc Body details, thoroughly to understand the embodiment of the present invention.However, it will be clear to one skilled in the art that specific without these The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity Road and the detailed description of method, in case unnecessary details hinders description of the invention.

Whether there is object to contact in predeterminable area on embodiment of the present invention detection router;If preset areas on the router There is object to contact in domain, then open wireless network and record start-up time;If the time difference of current time and the start-up time Value is less than or equal to preset time threshold, then receive the access request that client sends;Detect the distance with the client;If The distance with the client is less than or equal to predetermined threshold value, then allow the client to access the wireless network.

In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.

Embodiment one:

What Fig. 1 showed wireless networking mandate provided in an embodiment of the present invention realizes flow chart, and details are as follows:

In S101, whether there is object to contact in predeterminable area on detection router.

In embodiments of the present invention, the software systems environment of router is linux, eCos system, and supports that 802.11 are System agreement.

In embodiments of the present invention, detect that the level on router in predeterminable area changes by electric current induction technology, from And judge whether there is object to contact in predeterminable area on router.

Specifically, there is a current sensor on router, have a voltage comparator in current sensor, when no thing During body touching router particular range, current sensor does not have electric current to flow through, and now the output voltage of current sensor is less than base Quasi- voltage, voltage comparator output low level.But when having object to touch router particular range, current sensor has Electric current flows through, if during controller electric current, voltage comparator output high level.Router can be by the change of this level Change into signal, and CPU by router processes these signals, so as to judge whether there is object in predeterminable area on router Contact.

In embodiments of the present invention, the software in this step operates and is:Router is called initial by running main functions The signal for changing the reflection level change that button probe function (initGpio) is produced to current sensor is initialized, and is adjusted The signal that is changed into by the change of level to CPU is uploaded with ralink_gpio_notify_user.Finally by calling gpio_ Whether the change of irq_handler Functional Analysis signals is so as to judge have object to contact on router in predeterminable area.

In S102, if thering is object to contact in predeterminable area on the router, open wireless networking mandate and record Start-up time.

Fig. 2 shows the flow that implements of wireless networking authorization method S102 provided in an embodiment of the present invention, describes in detail such as Under:

In S201, if thering is object to contact in predeterminable area on the router, by calling accessing wirelessly point function, Open the wireless networking mandate.

In embodiments of the present invention, when detect on router have in predeterminable area object contact after, call ralink_ Gpio_notify_user uploads the signal that is changed into by the change of level to CPU.

If having object to contact in predeterminable area on the router, it is wireless to open that router can call ConfigAP functions Online is authorized, and now router can receive the access request of other-end.

In S202, start-up time is recorded.

While wireless network is opened, record wireless network start-up time, so as in follow-up calculating with it is current when Quarter compares.

In S103, if current time is less than or equal to preset time threshold with the time difference of the start-up time, Receive the access request that client sends.

In embodiments of the present invention, after router has detected object touches or rub router predeterminable area, can hold Wireless networking mandate is opened, but only receives the access request of client in the short period of time, once held in wireless networking mandate In the continuous time, a client does not send access request, then can not access wireless network.

Specifically, it is assumed that preset time threshold is 5 seconds, then 5 seconds after user touches router ad-hoc location Clock, the router that user must be touched by client-side search to him, and attempt accessing that this router is corresponding wirelessly connects Access point, is so possible to obtain online mandate.Once user sent access request within 5 seconds not over client, Just attempt accessing this router such as at the 6th second, then now the online authorization function of router just has been switched off, client Online can not be obtained to authorize.In this case, authorized if the user desired that obtaining online, then must again touch router special Positioning is put, and sends access request by router within 5 seconds.

Advantage of this is that the security of family wireless network is ensure that, it is very short after wireless networking mandate is opened The access request of client is received in time, it is ensured that the client touch router person for sending access network request uses Client, or touch router person allows to access the client of wireless network.

Further, if current time reaches preset time threshold with the time difference of the start-up time, call Config functions are stopping wireless networking mandate.

Refer to assume that preset time threshold is 5 seconds in above-mentioned example, then router only can be after being touched 5 seconds in online mandate is carried out to satisfactory client.Have a time set in router, once current time with The time difference of start-up time reaches 5 seconds, and router can call the config function, this function to stop router Wireless networking mandate, now router no longer receive the access request of any client.

It is worth noting that, router authorizes the time difference of start-up time to reach 5 seconds at current time and netting twine online Zhong Shi, has simply turned off wireless networking authorization function, is not off wireless networking capabilities, that is, do not access the client of wireless network End, it is impossible to access wireless network by this touch router, but the client for having accessed wireless network before can be with Normal online.

In S104, the distance with the client is detected.

In embodiments of the present invention, after router receives the access request of client transmission, can detect and client The distance at end.Only when the distance between client and router meet certain condition, router can just allow client to terminate Enter wireless network.

In S105, if the distance with the client is less than or equal to predeterminable range threshold value, the visitor is allowed Family is terminated into the wireless network.

In embodiments of the present invention, being detected on predeterminated position in router has touch or friction so as to open wireless networking After mandate, the condition that can determine a client be allowed to access network has two.One is as previously mentioned, Client has to be sent at the appointed time after router opens wireless networking mandate the request of access network.Another It is then that the client that S105 is mentioned has to be less than a distance threshold with the distance of router.The two conditions ensure that route Device is on the premise of without client input password, it is also possible to ensure the security of home network.

Further, after a router allows a client access network, router can preserve client Encryption information, and preserve the Back ground Information of client.

The encryption information of client here includes the cipher mode and Crypted password of WIFI encryptions, the basis letter of client Breath is including the SSID name information and encrypted logs of client WIFI etc..

Embodiment two:

In embodiments of the present invention, router can simultaneously receive the access request of multiple client transmission, it is also possible to same When checking multiple client whether meet allow access radio network conditions, finally also allow multiple client access and use nothing Gauze network.

In S301, whether there is object to contact in predeterminable area on detection router.

In embodiments of the present invention, the software systems environment of router is linux, eCos system, and supports that 802.11 are System agreement.

In embodiments of the present invention, detect that the level on router in predeterminable area changes by electric current induction technology, from And judge whether there is object to contact in predeterminable area on router.

Specifically, there is a current sensor on router, have a voltage comparator in current sensor, when no thing During body touching router particular range, current sensor does not have electric current to flow through, and now the output voltage of current sensor is less than base Quasi- voltage, voltage comparator output low level.But when having object to touch router particular range, current sensor has Electric current flows through, if during controller electric current, voltage comparator output high level.Router can be by the change of this level Change into signal, and CPU by router processes these signals, so as to judge whether there is object in predeterminable area on router Contact.

In embodiments of the present invention, the software in this step operates and is:Router is called initial by running main functions The signal for changing the reflection level change that button probe function (initGpio) is produced to current sensor is initialized, and is adjusted The signal that is changed into by the change of level to CPU is uploaded with ralink_gpio_notify_user.Finally by calling gpio_ Whether the change of irq_handler Functional Analysis signals is so as to judge have object to contact on router in predeterminable area.

In S302, if thering is object to contact in predeterminable area on the router, open wireless networking mandate and record Start-up time.

In embodiments of the present invention, when detect on router have in predeterminable area object contact after, call ralink_ Gpio_notify_user uploads the signal that is changed into by the change of level to CPU.

If there is object to contact on router in predeterminable area, router can call ConfigAP functions to open wireless networking Authorize, now router can receive the access request of other-end.

While wireless network is opened, record wireless network start-up time, so as in follow-up calculating with it is current when Quarter compares.

In S303, if current time is less than or equal to preset time threshold with the time difference of the start-up time, Receive the access request that client sends.

In embodiments of the present invention, after router has detected object touches or rub router predeterminable area, can hold Wireless networking mandate is opened, but only receives the access request of client in the short period of time, once held in wireless networking mandate In the continuous time, a client does not send access request, then can not access wireless network.

Specifically, it is assumed that preset time threshold is 10 seconds, then after user touches router ad-hoc location 10 Second, the router that user must be touched by client-side search to him, and attempt accessing this router corresponding wireless Access point, is so possible to obtain online mandate.

Assuming that there is four clients, customer end A sent access request at the 1st second, and customer end B sent in the 5th second and connects Enter request, client C sent access request in the 8th second, and client D sent access request in the 12nd second.So in this hair Bright to be embodiment, the access request of customer end A, customer end B and client C can just be received by router, and client D Access request cannot be received by router, therefore lose the chance of this access network.

Advantage of this is that the security of family wireless network is ensure that, it is very short after wireless networking mandate is opened The access request of client is received in time, it is ensured that the client touch router person for sending access network request uses Client, or touch router person allows to access the client of wireless network.

Further, if current time reaches preset time threshold with the time difference of the start-up time, call Config functions are stopping wireless networking mandate.

Refer to assume that preset time threshold is 10 seconds in above-mentioned example, then router only can be after being touched 5 seconds in online mandate is carried out to satisfactory client.Have a time set in router, once current time with The time difference of start-up time reaches 10 seconds, and router can call the config function, this function to stop router Wireless networking mandate, now router no longer receive the access request of any client.

It is worth noting that, router authorizes the time difference of start-up time to reach 10 seconds at current time and netting twine online Zhong Shi, has simply turned off wireless networking authorization function, is not off wireless networking capabilities, that is, do not access the client of wireless network End, it is impossible to access wireless network by this touch router, but the client for having accessed wireless network before can be with Normal online.For example there is a client E accessing wireless network before, then to be awarded when router closes wireless networking After power function, client E still can normally surf the Net.

In S304, search sends the client of access request in default client blacklist, if the client is deposited It is in default client blacklist, then to forbid the client to access wireless network.

There is a blacklist list in the router, have recorded a series of corresponding thing of clients being put on the blacklist Reason address and model.If therefore router is found that the physical address of the client for sending access request in blacklist list And model, will directly forbid these client access networks, without carrying out other operations.

It is previously mentioned, router have received the access request that customer end A, customer end B and client C send.Assuming that Client C has been appeared in the blacklist of router, then router directly forbids client C to access wireless network, and customer end A Can enter next step with customer end B to calculate to determine whether to access wireless network.

In S304, the distance with the client is detected.

In embodiments of the present invention, after router receives the access request of client transmission, and these are demonstrated After the client of access request is sent not in the blacklist, the distance with client can be detected.Only when client and route When the distance between device meets certain condition, router can just allow client to access wireless network.

In the present invention is embodiment, only customer end A and customer end B enter the calculating of this step, and wherein customer end A is arrived The distance of router is 10 meters, and customer end B to the distance of router be 25 meters.

In S305, if the distance with the client is less than or equal to predeterminable range threshold value, the visitor is allowed Family is terminated into the wireless network.

In embodiments of the present invention, being detected on predeterminated position in router has touch or friction so as to open wireless networking After mandate, the condition that can determine a client be allowed to access network has two.One is as previously mentioned, Client has to be sent at the appointed time after router opens wireless networking mandate the request of access network.Another It is then that client has to be less than a distance threshold with the distance of router.The two conditions ensure that router without visitor On the premise of family end input password, it is also possible to ensure the security of home network.

In embodiments of the present invention, predeterminable range threshold value is 15 meters, therefore router can allow customer end A access network, And forbid customer end B access network.It can be seen from the examples above that sending the customer end A of access request, customer end B, client End C and client D, finally only has customer end A to be allowed to access wireless network.

Further, after a router allows a client access network, router can preserve client Encryption information, and preserve the Back ground Information of client.

The encryption information of client here includes the cipher mode and Crypted password of WIFI encryptions, the basis letter of client Breath is including the SSID name information and encrypted logs of client WIFI etc..

In S306, display has accessed the information of wireless network clients.

Router can show it is all by this router using the client of network physical address and set Standby model.User can be judged either with or without client access network without permission by these information, if it has, can be by not Through allowing the client using network to pipe off in list.

Fig. 4 is the structured flowchart of wireless networking authorization device provided in an embodiment of the present invention, including:

Contact detection sub-unit 401, for detecting on router whether there is object to contact in predeterminable area;

Promoter unit 402, if for thering is object to contact in predeterminable area on the router, opening wireless networking and awarding Weigh and record start-up time;

Receiving subelement 403, if be less than or equal to default with the time difference of the start-up time for current time Between threshold value, then receive client send access request;

Apart from detection sub-unit 404, for detecting the distance with the client;

Access subelement 405, if being less than or equal to predetermined threshold value for the distance with the client, allows institute State client and access the wireless network.

Further, contact detection unit includes:

Level detection subelement, for detecting that the level on router in predeterminable area changes by electric current induction technology.

Further, start unit includes:

Subelement is reported, for reporting contact testing result;

Subelement is opened, if for thering is object to contact in predeterminable area on the router, by calling accessing wirelessly Point function, opens the wireless networking mandate;

Record subelement, for recording start-up time.

Further, device also includes:

Authorize and terminate subelement, if reaching Preset Time with the time difference of the start-up time for the current time Threshold value, then call config functions to stop wireless networking mandate.

Further, device also includes:

First encryption sub-unit operable, for preserving client encryption information;

Second encryption sub-unit operable, for preserving client Back ground Information.

It is apparent to those skilled in the art that, for convenience of description and succinctly, only with above-mentioned each work( Energy unit, the division of module are carried out for example, in practical application, as needed can distribute by different above-mentioned functions Functional unit, module are completed, will the internal structure of described device be divided into different functional unit or modules, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used Being that unit is individually physically present, it is also possible to which two or more units are integrated in a unit, above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.In addition, each function list Unit, the specific name of module are also only to facilitate mutually differentiation, is not limited to the protection domain of the application.Said system The specific work process of middle unit, module, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.

Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function, but this realization can be realized it is not considered that exceeding using distinct methods to each specific application The scope of the present invention.

In embodiment provided by the present invention, it should be understood that disclosed apparatus and method, can be by other Mode is realized.For example, system embodiment described above is only schematical, for example, the division of the module or unit, It is only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be with With reference to or be desirably integrated into another system, or some features can be ignored, or not perform.It is another, it is shown or discussed Coupling each other or direct-coupling or communication connection can be by some interfaces, the INDIRECT COUPLING of device or unit or Communication connection, can be electrical, mechanical or other forms.

The unit that is illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize the mesh of this embodiment scheme 's.

In addition, during each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, it is also possible to which two or more units are integrated in a unit.Above-mentioned integrated list Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.

If the integrated unit is to realize in the form of SFU software functional unit and as independent production marketing or use When, can store in a computer read/write memory medium.Based on such understanding, the technical scheme of the embodiment of the present invention The part for substantially being contributed to prior art in other words or all or part of the technical scheme can be with software products Form embody, the computer software product is stored in a storage medium, including some instructions are used to so that one Computer equipment (can be personal computer, server, or network equipment etc.) or processor (processor) perform this hair The all or part of step of bright embodiment each embodiment methods described.And foregoing storage medium includes:USB flash disk, mobile hard disk, Read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic Dish or CD etc. are various can be with the medium of store program codes.

Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality Example is applied to be described in detail the present invention, it will be understood by those within the art that:It still can be to foregoing each Technical scheme described in embodiment is modified, or carries out equivalent to which part technical characteristic;And these are changed Or replace, do not make the spirit and scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution, all should It is included within protection scope of the present invention.

Claims (10)

1. a kind of wireless networking authorization method, it is characterised in that including:
Detect whether the predeterminable area of router surface of shell is touched;
If the predeterminable area of the router surface of shell is touched, opens wireless networking mandate and record start-up time;
If current time is less than or equal to preset time threshold with the time difference of the start-up time, receives client and send Access request;
Detect the distance with the client;
If the distance is less than or equal to predeterminable range threshold value, the client is allowed to access wireless network.
2. the method for claim 1, it is characterised in that the predeterminable area of the detection router surface of shell whether by Touching includes:
Detect whether the predeterminable area of router surface of shell level occurs and change by electric current induction technology;
If level change occurs in the predeterminable area of the router surface of shell, the default of the router surface of shell is judged Region is touched.
3. the method for claim 1, it is characterised in that if the predeterminable area of the router surface of shell is touched Touch, then opening wireless networking mandate and recording start-up time includes:
If the predeterminable area of the router surface of shell is touched, by calling accessing wirelessly point function, the nothing is opened Line online is authorized;
Record start-up time.
4. the method for claim 1, it is characterised in that if the time difference of the current time and the start-up time Less than or equal to preset time threshold, then receive after the access request that client sends, also include:
If the current time reaches preset time threshold with the time difference of the start-up time, call config functions with Stop wireless networking mandate.
5. the method for claim 1, it is characterised in that if methods described is less than in the distance with the client Or equal to predeterminable range threshold value, then allow after the client access wireless network, also include:
Preserve client encryption information;
Preserve client Back ground Information.
6. a kind of wireless networking authorization device, it is characterised in that including:
Whether contact detection sub-unit, the predeterminable area for detecting router surface of shell is touched;
Promoter unit, if being touched for the predeterminable area of the router surface of shell, opens wireless networking mandate simultaneously Record start-up time;
Receiving subelement, if being less than or equal to preset time threshold with the time difference of the start-up time for current time, Then receive the access request that client sends;
Apart from detection sub-unit, for detecting the distance with the client;
Access subelement, if being less than or equal to predeterminable range threshold value for the distance with the client, allows described Client accesses wireless network.
7. device as claimed in claim 6, it is characterised in that the contact detection unit includes:
Whether level detection subelement, the predeterminable area for detecting router surface of shell by electric current induction technology there is electricity Flat change;If level change occurs in the predeterminable area of the router surface of shell, the router surface of shell is judged Predeterminable area is touched.
8. device as claimed in claim 6, it is characterised in that the start unit includes:
Subelement is reported, for touching testing result to be uploaded into router cpu;
Subelement is opened, if being touched for the predeterminable area of the router surface of shell, by calling wireless access point Function, opens the wireless networking mandate;
Record subelement, for recording start-up time.
9. device as claimed in claim 6, it is characterised in that described device also includes:
Authorize and terminate subelement, if reaching Preset Time threshold with the time difference of the start-up time for the current time Value, then call config functions to stop wireless networking mandate.
10. device as claimed in claim 6, it is characterised in that described device also includes:
First encryption sub-unit operable, for preserving client encryption information;
Second encryption sub-unit operable, for preserving client Back ground Information.
CN201710083140.3A 2017-02-16 2017-02-16 Wireless networking authorization method and device CN106851642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710083140.3A CN106851642A (en) 2017-02-16 2017-02-16 Wireless networking authorization method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710083140.3A CN106851642A (en) 2017-02-16 2017-02-16 Wireless networking authorization method and device
PCT/CN2017/100920 WO2018149118A1 (en) 2017-02-16 2017-09-07 Wireless internet access authorization method and device

Publications (1)

Publication Number Publication Date
CN106851642A true CN106851642A (en) 2017-06-13

Family

ID=59128354

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710083140.3A CN106851642A (en) 2017-02-16 2017-02-16 Wireless networking authorization method and device

Country Status (2)

Country Link
CN (1) CN106851642A (en)
WO (1) WO2018149118A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018149118A1 (en) * 2017-02-16 2018-08-23 深圳市欣博跃电子有限公司 Wireless internet access authorization method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
CN101621804A (en) * 2009-08-04 2010-01-06 中兴通讯股份有限公司 Safe wireless access method and safe wireless access device
CN102448065A (en) * 2010-10-13 2012-05-09 中兴通讯股份有限公司 Method and device for automatically configuring wireless access control list
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device
CN105992390A (en) * 2015-02-13 2016-10-05 Tcl集团股份有限公司 Method and system for enabling mobile terminal to be connected with WIFI router

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781074B (en) * 2014-02-08 2017-01-04 北京极科极客科技有限公司 Wireless LAN safety cut-in method and equipment
CN103916855A (en) * 2014-04-28 2014-07-09 太仓市同维电子有限公司 Method for enabling mobile phone to be connected to WiFi network
US10034118B2 (en) * 2015-04-30 2018-07-24 Lantronix, Inc. Zero-touch Wi-Fi
CN106851642A (en) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 Wireless networking authorization method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217805A (en) * 2008-01-21 2008-07-09 中兴通讯股份有限公司 A wireless LAN access control method
CN101621804A (en) * 2009-08-04 2010-01-06 中兴通讯股份有限公司 Safe wireless access method and safe wireless access device
CN102448065A (en) * 2010-10-13 2012-05-09 中兴通讯股份有限公司 Method and device for automatically configuring wireless access control list
CN105992390A (en) * 2015-02-13 2016-10-05 Tcl集团股份有限公司 Method and system for enabling mobile terminal to be connected with WIFI router
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018149118A1 (en) * 2017-02-16 2018-08-23 深圳市欣博跃电子有限公司 Wireless internet access authorization method and device

Also Published As

Publication number Publication date
WO2018149118A1 (en) 2018-08-23

Similar Documents

Publication Publication Date Title
US10743182B2 (en) User identification in cell phones based on skin contact
US9699659B2 (en) On-boarding a device to a secure local network
US9628478B2 (en) Technologies for secure storage and use of biometric authentication information
US9391985B2 (en) Environment-based two-factor authentication without geo-location
JP6338775B2 (en) Distributing biometric authentication among devices in ad hoc networks
US20180324182A1 (en) Network access control method and apparatus
CN105393193B (en) Wearable device multi-mode system
CN107852410B (en) Dissect rogue access point
CN103959750B (en) For the configuration of wireless docking and the method and apparatus of control
US9717065B2 (en) Indoor remote triggered location scanning
US20180206119A1 (en) Providing Wireless Network Authentication Data to Climate Control System Devices
US10387704B2 (en) Method and apparatus for enabling the touchscreen display of a mobile device
KR102069863B1 (en) Apparatas and method for controlling a input means of payment function in an electronic device
CN105933943B (en) Multi-mode radio location tracking method and system
US7940732B2 (en) Automatic wireless network device configuration
CN103442097B (en) A kind of home gateway controls the system and method for WiFi terminal access authority
TWI428047B (en) Wlan peer-to-peer group owner negotiation
CN104333863B (en) Connection management method and device, electronic equipment
US20160330182A1 (en) Method of sharing key between devices using physical access restriction
KR20160027037A (en) TRUST HEURISTIC MODEL FOR REDUCING CONTROL LOAD IN IoT RESOURCE ACCESS NETWORKS
CN103940056B (en) Access control equipment, mobile terminal, server and air-conditioning system and control method
JP2018507461A (en) Mobile devices that provide continuous and discrete user authentication
CN104902500B (en) The automatic connection method and system of Wireless Communication Equipment and radio reception device
US9928670B2 (en) Method and system for access control monitoring
CN104270386B (en) Across application system user (asu) information integrating method and identity information management server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170613

RJ01 Rejection of invention patent application after publication