CN106899967A - WiFi cipher safe protecting methods and device - Google Patents

WiFi cipher safe protecting methods and device Download PDF

Info

Publication number
CN106899967A
CN106899967A CN201510962042.8A CN201510962042A CN106899967A CN 106899967 A CN106899967 A CN 106899967A CN 201510962042 A CN201510962042 A CN 201510962042A CN 106899967 A CN106899967 A CN 106899967A
Authority
CN
China
Prior art keywords
user
access request
wifi
access
disabled
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510962042.8A
Other languages
Chinese (zh)
Inventor
杨丽丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201510962042.8A priority Critical patent/CN106899967A/en
Publication of CN106899967A publication Critical patent/CN106899967A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of WiFi cipher safe protecting methods and device; by receiving the access request that first user sends; if access pin is different from the password of WiFi network, the user profile according to first user obtains the number of times of the access request that first user sends in preset time period;If the number of times of the access request that first user sends in preset time period is more than first threshold, it is determined that first user is disabled user, the access request that first user sends after rejection.Using such scheme, simple WiFi passwords can be set, that is, be easy to memory and input, there is the safety that can guarantee that WiFi passwords, improve Consumer's Experience.

Description

WiFi cipher safe protecting methods and device
Technical field
The present invention relates to network technology, more particularly to a kind of Wireless Fidelity (Wireless Fidelity, abbreviation: WIFI) cipher safe protecting method and device.
Background technology
WiFi is that one kind can be by PC, handheld device (such as flat board (PAD), mobile phone) Terminal is wirelessly interconnected, it has also become a kind of presently the most popular network technology.
In order to ensure network security, usual user can set the access pin of WiFi, existing WiFi The setting of password typically by numeral, letter and/or additional character the composition that be combined with each other, in order to protect Card WiFi passwords are not cracked, and generally to set password very long, are difficult memory, even if also, It is validated user when using WiFi network, also input password more long, once a character is defeated Enter mistake, must re-enter, bother very much, Consumer's Experience is not high.
The content of the invention
Regarding to the issue above, the present invention provides a kind of WiFi cipher safe protecting methods and device, for gram WiFi passwords are complicated more long in the prior art for clothes, are difficult to remember, be input into fallibility and Consumer's Experience not high scarce Fall into.
In a first aspect, the present invention provides a kind of Wireless Fidelity WiFi cipher safe protecting methods, including:
The access request that first user sends is received, access request is used to ask to access WiFi network, accesses User profile and access pin comprising first user in request;
If access pin is different from the password of WiFi network, user profile according to first user obtains the The number of times of the access request that one user sends in preset time period;
If the number of times of the access request that first user sends in preset time period is more than first threshold, really First user is determined for disabled user, the access request that first user sends after refusal.
Alternatively, method also includes:
The user profile of first user is sent to second user, second user is validated user.
Alternatively, method also includes:
To determine that first user is sent to second user for the time of disabled user.
Alternatively, when it is determined that disabled user quantity be more than Second Threshold when, method also includes:
The quantity of disabled user is sent to second user.
Alternatively, before receiving the access request that first user sends, also include:
Setting second user is validated user.
Second aspect, the present invention provides a kind of Wireless Fidelity WiFi cipher safe protecting devices, including:
Receiver module, the access request for receiving first user transmission, access request is used to ask to access WiFi network, user profile and access pin comprising first user in access request;
Processing module, if different from the password of WiFi network for access pin, according to first user User profile obtains the number of times of the access request that first user sends in preset time period;
If the number of times that receiver module is additionally operable to the access request that first user sends in preset time period is more than First threshold, it is determined that first user is disabled user, the access request that first user sends after refusal.
Alternatively, also include:
First sending module, for the user profile of first user to be sent into second user, second user It is validated user.
Alternatively, the first sending module is additionally operable to determine that first user is sent to for the time of disabled user Second user.
Alternatively, also include:Second sending module is used to be more than second when the quantity of the disabled user for determining During threshold value, the quantity of disabled user is sent to second user.
Alternatively, it is validated user that processing module is additionally operable to set second user.
WiFi cipher safe protecting methods and device that the present invention is provided, by receiving what first user sent Access request, if access pin is different from the password of WiFi network, according to the user profile of first user Obtain the number of times of the access request that first user sends in preset time period;If first user is when default Between the number of times of access request that sends in section be more than first threshold, it is determined that first user is disabled user, The access request that first user sends after rejection.Make use of the validated user in preset time period The frequency for being manually entered password is more much lower by decoding the frequency of software input password than disabled user, so that, The number of times of the access request sent in Preset Time according to first user determines whether to be disabled user, when for During disabled user, the access request that first user sends after refusal is identified illegally in the time earlier User, the trial for preventing it from carrying out password, so that, simple WiFi passwords are set, that is, it is easy to note Recall with input, have the safety that can guarantee that WiFi passwords, improve Consumer's Experience.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to reality The accompanying drawing to be used needed for example or description of the prior art is applied to be briefly described, it should be apparent that, below Accompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art, Without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment one of the present invention;
Fig. 2 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment two of the present invention;
Fig. 3 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment three of the present invention;
Fig. 4 is the structural representation of WiFi cipher safe protectings device embodiment one of the present invention;
Fig. 5 is the structural representation of WiFi cipher safe protectings device embodiment two of the present invention;
Fig. 6 is the structural representation of WiFi cipher safe protectings device embodiment three of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the invention, and It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing Go out the every other embodiment obtained under the premise of creative work, belong to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing, (if present)s such as " the 3rd " " the 4 " is for distinguishing similar object, without for retouching State specific order or precedence.It should be appreciated that the data for so using in the appropriate case can be mutual Change, so that embodiments of the invention described herein for example can be with except illustrating or describing herein Order beyond those is implemented.Additionally, term " comprising " and " having " and their any change Shape, it is intended that covering is non-exclusive to be included, for example, contain the process of series of steps or unit, Method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but can Including it is not listing clearly or for these processes, method, product or equipment it is intrinsic other step Rapid or unit.
In order to protect the safety of WiFi passwords, the password why user will set long and complexity comes Overcome the risk being decrypted, because user is by existing code breaking software, it is close by exhaustion Code possible all combinations are attempted breaking a code, in the case where signal is more satisfactory, usual 2 A password is attempted by second, therefore, if password is shorter or simple, it is easier to be decrypted.And Usual validated user is manually entered password, and the time difference is had in input password twice, also, manually The speed for being input into password is slower, therefore, the present invention is (soft using decoding with disabled user using validated user The user of part) input password duration difference, identification disabled user as early as possible, stop disabled user Decoding to password, so that, without setting long and complex password, it is easy to memory, improve user's body Test.
Technical scheme is described in detail with specifically embodiment below.These have below The embodiment of body can be combined with each other, may be in some embodiments for same or analogous concept or process Repeat no more.
Fig. 1 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment one of the present invention, the present embodiment Performed by the access point of WiFi network, the method for the present embodiment is as follows:
S101:The access request that first user sends is received, access request is used to ask to access WiFi network, User profile and access pin comprising first user in access request.
First user then sends access request to access WiFi network to the access point of WiFi network, Request accesses WiFi network, user profile and access pin comprising first user in access request.Wherein, The user profile of first user can include the agreement interconnected between user name, the network of first user (Internet Protocol, referred to as:IP) address and/or medium education (Media Access Control, Referred to as:MAC) address etc..
Access point receives the access request of first user transmission.
S103:If access pin is different from the password of WiFi network, according to the user profile of first user Obtain the number of times of the access request that first user sends in preset time period.
That is, access pin mistake, then according to the first user user profile same user of acquisition when default Between the number of times of access request that sends in section, wherein, Preset Time is to be manually entered password hair according to user Send what the most fast frequency of access request determined, for example:Validated user be manually entered password it is most fast 1 minute in 2 times, it is determined that Preset Time is 1 minute, and first threshold is 2 times, and Preset Time is it can also be provided that 1 The multiple of minute, correspondingly, first threshold will also be set to 2 identical multiple.Wherein, the WiFi The password of network is set in advance by the manager of WiFi network, and is preserved in memory.
S105:If the number of times of the access request that first user sends in preset time period is more than first threshold, Then determine that first user is disabled user, the access request that first user sends after refusal.
If the number of times of the access request that first user sends in preset time period is more than first threshold, explanation First user carries out password attempt by decoding software again, is disabled user, first user hair after refusal The access request sent.
Specifically, the IP address or MAC Address of the packet that can be sent according to first user determine No is first user, it is also possible to which the user name in access request determines whether to be first user, if It is the packet of first user transmission, then abandons and do not processed.
The present embodiment, by receiving the access request that first user sends, if access pin and WiFi network Password it is different, then the user profile according to first user obtains first user and is sent in preset time period Access request number of times;If the number of times of the access request that first user sends in preset time period is more than First threshold, it is determined that first user is disabled user, the access that first user sends after rejection Request.The frequency that make use of the validated user in preset time period to be manually entered password is led to than disabled user The frequency for crossing decoding software input password is much lower, so that, sent in Preset Time according to first user The number of times of access request determines whether to be disabled user, when for disabled user, first user after refusal The access request of transmission, disabled user is identified in the time earlier, the trial for preventing it from carrying out password, So as to, simple WiFi passwords are set, that is, it is easy to memory and input, can guarantee that WiFi passwords Safety, improve Consumer's Experience.
Fig. 2 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment two of the present invention, Fig. 2 be On the basis of embodiment illustrated in fig. 1, it is determined that after disabled user, further also include:S107 and / or the execution sequence of S109, S107 and S109 be not limited, it is as follows:
S107:The user profile of first user is sent to second user.
Wherein, second user is validated user.
The user profile of first user is sent to second user, second user can be known to be wanted to access it The specifying information of the user of network, understands the information of disabled user, to be alerted or be investigated law duty Appoint etc..
S109:To determine that first user is sent to second user for the time of disabled user.
Determine the illegal turn-on time of the time i.e. first user that first user is disabled user.
Second user can attempt accessing the time of its WiFi network according to first user, analyze first user User profile, or, according to its trial access WiFi network time take correspondingly measure.
The present embodiment, by second user feed back first user user profile and/or first user it is non- Method turn-on time, correspondingly measure is taken to be referred to for second user.Wherein, second user is usually The manager or owner of the WiFi network, its password that can change WiFi network and configuration please Seek blacklist of user etc..The information of the second user can pre-set and be stored in corresponding storage Space, for subsequent calls.
Fig. 3 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment three of the present invention, Fig. 3 be On the basis of embodiment illustrated in fig. 1, when it is determined that disabled user quantity be more than Second Threshold when, enter one Step ground also includes S111, as follows:
S111:The quantity of disabled user is sent to second user.
The present embodiment, second user is sent to by by the quantity of disabled user, to point out user illegally to use The quantity at family is more, second user is changed password in time or in inapplicable network, closes access point, To ensure network security.
On the basis of Fig. 1, Fig. 2 or embodiment illustrated in fig. 3, the access that first user sends is being received Before request, also include:Setting second user is validated user, and second user typically refers to open the WiFi The user of network account, second user refers to the mobile terminal bound with the account.
Fig. 4 is the structural representation of WiFi cipher safe protectings device embodiment one of the present invention, the present embodiment Device include:Receiver module 401 and processing module 402, wherein, receiver module 401 is used to receive The access request that first user sends, access request is used to ask to access WiFi network, is wrapped in access request User profile and access pin containing first user;If processing module 402 is used for access pin and WiFi The password of network is different, then the user profile according to first user obtains first user in preset time period The number of times of the access request of transmission;If receiver module 401 is additionally operable to first user being sent out in preset time period The number of times of the access request sent is more than first threshold, it is determined that first user is disabled user, rejection The access request that first user sends afterwards.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 1, Its realization principle is similar with technique effect, and here is omitted.
Fig. 5 is the structural representation of WiFi cipher safe protectings device embodiment two of the present invention, Fig. 5 be On the basis of embodiment illustrated in fig. 4, further comprise:First sending module 403, for by first The user profile of user is sent to second user, and second user is validated user.
First sending module 403 is additionally operable to determine that first user is sent to second for the time of disabled user User.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 2, Its realization principle is similar with technique effect, and here is omitted.
Fig. 6 is the structural representation of WiFi cipher safe protectings device embodiment three of the present invention, Fig. 6 be On the basis of embodiment illustrated in fig. 4, further comprise:Second sending module 404 is used for when determination When the quantity of disabled user is more than Second Threshold, the quantity of disabled user is sent to second user.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 3, Its realization principle is similar with technique effect, and here is omitted.
In above-mentioned each device embodiment kind, it is validated user that processing module 402 is additionally operable to set second user.
One of ordinary skill in the art will appreciate that:Realize all or part of step of above-mentioned each method embodiment Suddenly can be completed by the related hardware of programmed instruction.Foregoing program can be stored in a computer can In reading storage medium.The program upon execution, performs the step of including above-mentioned each method embodiment;And Foregoing storage medium includes:ROM, RAM, magnetic disc or CD etc. are various can be with store program codes Medium.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than right Its limitation;Although being described in detail to the present invention with reference to foregoing embodiments, this area it is common Technical staff should be understood:It can still modify to the technical scheme described in foregoing embodiments, Or equivalent is carried out to which part or all technical characteristic;And these modifications or replacement, and The scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution is not made.

Claims (10)

1. a kind of Wireless Fidelity WiFi cipher safe protecting methods, it is characterised in that including:
The access request that first user sends is received, the access request is used to ask to access WiFi network, User profile and access pin comprising the first user in the access request;
If the access pin is different from the password of the WiFi network, according to the use of the first user The number of times of the access request that first user described in the acquisition of information of family sends in preset time period;
If the number of times of the access request that the first user sends in preset time period is more than first threshold, The first user is then determined for disabled user, the access request that the first user sends after refusal.
2. method according to claim 1, it is characterised in that methods described also includes:
The user profile of the first user is sent to second user, the second user is validated user.
3. method according to claim 2, it is characterised in that methods described also includes:
To determine that the first user is sent to the second user for the time of disabled user.
4. method according to claim 1, it is characterised in that when it is determined that disabled user quantity During more than Second Threshold, methods described also includes:
The quantity of disabled user is sent to the second user.
5. the method according to any one of Claims 1 to 4, it is characterised in that the reception first is used Before the access request that family sends, also include:
Setting second user is validated user.
6. a kind of Wireless Fidelity WiFi cipher safe protecting devices, it is characterised in that including:
Receiver module, the access request for receiving first user transmission, the access request is used to ask WiFi network is accessed, user profile and access pin comprising the first user in the access request;
Processing module, if different from the password of the WiFi network for the access pin, according to institute The user profile for stating first user obtains the access request that the first user sends in preset time period Number of times;
If the receiver module is additionally operable to the access request that the first user sends in preset time period Number of times is more than first threshold, it is determined that the first user is disabled user, and described first uses after refusal The access request that family sends.
7. device according to claim 6, it is characterised in that also include:
First sending module, it is described for the user profile of the first user to be sent into second user Second user is validated user.
8. device according to claim 7, it is characterised in that first sending module is additionally operable to To determine that the first user is sent to the second user for the time of disabled user.
9. device according to claim 6, it is characterised in that also include:
Second sending module, for when it is determined that the quantity of disabled user be more than Second Threshold when, will be illegal The quantity of user is sent to the second user.
10. the device according to any one of claim 6~9, it is characterised in that the processing module It is validated user to be additionally operable to set second user.
CN201510962042.8A 2015-12-21 2015-12-21 WiFi cipher safe protecting methods and device Pending CN106899967A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510962042.8A CN106899967A (en) 2015-12-21 2015-12-21 WiFi cipher safe protecting methods and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510962042.8A CN106899967A (en) 2015-12-21 2015-12-21 WiFi cipher safe protecting methods and device

Publications (1)

Publication Number Publication Date
CN106899967A true CN106899967A (en) 2017-06-27

Family

ID=59190675

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510962042.8A Pending CN106899967A (en) 2015-12-21 2015-12-21 WiFi cipher safe protecting methods and device

Country Status (1)

Country Link
CN (1) CN106899967A (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1298620A (en) * 1998-02-27 2001-06-06 艾利森电话股份有限公司 Authentication method and authentication device for secured communications between an ATM mobile terminal and an ATM access node of a wireless ATM radio communication network
CN101141259A (en) * 2007-10-22 2008-03-12 杭州华三通信技术有限公司 Method and device of access point equipment for preventing error access
CN101267662A (en) * 2007-03-15 2008-09-17 华为技术有限公司 A session rejection method, access network and access terminal
CN101296182A (en) * 2008-05-20 2008-10-29 华为技术有限公司 Data transmission control method and data transmission control device
CN101645817A (en) * 2008-08-05 2010-02-10 中兴通讯股份有限公司 Wireless network access system and method thereof for preventing illegal user from malicious access
CN102143552A (en) * 2010-11-24 2011-08-03 华为技术有限公司 Access processing method, base station and terminal
CN102256337A (en) * 2011-07-08 2011-11-23 杭州华三通信技术有限公司 Message processing method and equipment in wireless local area network (WLAN)
CN103458436A (en) * 2012-05-31 2013-12-18 中兴通讯股份有限公司 Method and device for detecting alive-keeping of link between AC and AP
CN104093151A (en) * 2014-07-30 2014-10-08 广东欧珀移动通信有限公司 Method and device for preventing Wi-Fi (Wireless-Fidelity) hot spot from being illegally accessed
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
WO2015196679A1 (en) * 2014-06-24 2015-12-30 中兴通讯股份有限公司 Authentication method and apparatus for wireless access

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1298620A (en) * 1998-02-27 2001-06-06 艾利森电话股份有限公司 Authentication method and authentication device for secured communications between an ATM mobile terminal and an ATM access node of a wireless ATM radio communication network
CN101267662A (en) * 2007-03-15 2008-09-17 华为技术有限公司 A session rejection method, access network and access terminal
CN101141259A (en) * 2007-10-22 2008-03-12 杭州华三通信技术有限公司 Method and device of access point equipment for preventing error access
CN101296182A (en) * 2008-05-20 2008-10-29 华为技术有限公司 Data transmission control method and data transmission control device
CN101645817A (en) * 2008-08-05 2010-02-10 中兴通讯股份有限公司 Wireless network access system and method thereof for preventing illegal user from malicious access
CN102143552A (en) * 2010-11-24 2011-08-03 华为技术有限公司 Access processing method, base station and terminal
CN102256337A (en) * 2011-07-08 2011-11-23 杭州华三通信技术有限公司 Message processing method and equipment in wireless local area network (WLAN)
CN103458436A (en) * 2012-05-31 2013-12-18 中兴通讯股份有限公司 Method and device for detecting alive-keeping of link between AC and AP
WO2015196679A1 (en) * 2014-06-24 2015-12-30 中兴通讯股份有限公司 Authentication method and apparatus for wireless access
CN104113934A (en) * 2014-07-25 2014-10-22 北京奇虎科技有限公司 Router accessing method for communication equipment and accessing system
CN104093151A (en) * 2014-07-30 2014-10-08 广东欧珀移动通信有限公司 Method and device for preventing Wi-Fi (Wireless-Fidelity) hot spot from being illegally accessed

Similar Documents

Publication Publication Date Title
US9992678B2 (en) Network locking or card locking method and device for a mobile terminal, terminal, SIM card, storage media
CN104700268B (en) A kind of method of mobile payment and mobile device
CN105119939B (en) The cut-in method and device, providing method and device and system of wireless network
US9516019B2 (en) Method, system and terminal for encrypting/decrypting application program on communication terminal
CN104601324B (en) A kind of verification method, terminal and system for application
CN104767713B (en) Account binding method, server and system
CN113711211A (en) First-factor contactless card authentication system and method
CN101815291A (en) Method and system for logging on client automatically
WO2015180690A1 (en) Method and device for reading verification information
CN105337997A (en) Log-in method of application client and relevant device
CN108228211B (en) Smart card, and method and system for safely updating data of smart card
CN106101064A (en) Account login method and device
CN106204003B (en) Method, device and system for safely transferring virtual resources
CN108156601A (en) A kind of method and device of locking SIM card
CN105184567A (en) Information processing method, processing device and mobile terminal
CN104980420B (en) A kind of method for processing business, device, terminal and server
KR20140045571A (en) Binding a removable module to an access terminal
CN106657154A (en) Wireless access method and system, WiFi platform and operator number taking platform
CN102413146B (en) Client authorized logon method based on dynamic codes
CN108123918A (en) A kind of account authentication login method and device
CN107359989A (en) Data ciphering method, safety chip and computer-readable recording medium
CN107358087B (en) The information storage means and device of Bluetooth chip for Bluetooth identities authentication device
CN104883341A (en) Application management device, terminal and application management method
CN106097486B (en) A kind of verification method of gate inhibition's password based on sonic transmissions and verification system
EP3336740A1 (en) Dynamic secure messaging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170627