CN106899967A - WiFi cipher safe protecting methods and device - Google Patents
WiFi cipher safe protecting methods and device Download PDFInfo
- Publication number
- CN106899967A CN106899967A CN201510962042.8A CN201510962042A CN106899967A CN 106899967 A CN106899967 A CN 106899967A CN 201510962042 A CN201510962042 A CN 201510962042A CN 106899967 A CN106899967 A CN 106899967A
- Authority
- CN
- China
- Prior art keywords
- user
- access request
- wifi
- access
- disabled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of WiFi cipher safe protecting methods and device; by receiving the access request that first user sends; if access pin is different from the password of WiFi network, the user profile according to first user obtains the number of times of the access request that first user sends in preset time period;If the number of times of the access request that first user sends in preset time period is more than first threshold, it is determined that first user is disabled user, the access request that first user sends after rejection.Using such scheme, simple WiFi passwords can be set, that is, be easy to memory and input, there is the safety that can guarantee that WiFi passwords, improve Consumer's Experience.
Description
Technical field
The present invention relates to network technology, more particularly to a kind of Wireless Fidelity (Wireless Fidelity, abbreviation:
WIFI) cipher safe protecting method and device.
Background technology
WiFi is that one kind can be by PC, handheld device (such as flat board (PAD), mobile phone)
Terminal is wirelessly interconnected, it has also become a kind of presently the most popular network technology.
In order to ensure network security, usual user can set the access pin of WiFi, existing WiFi
The setting of password typically by numeral, letter and/or additional character the composition that be combined with each other, in order to protect
Card WiFi passwords are not cracked, and generally to set password very long, are difficult memory, even if also,
It is validated user when using WiFi network, also input password more long, once a character is defeated
Enter mistake, must re-enter, bother very much, Consumer's Experience is not high.
The content of the invention
Regarding to the issue above, the present invention provides a kind of WiFi cipher safe protecting methods and device, for gram
WiFi passwords are complicated more long in the prior art for clothes, are difficult to remember, be input into fallibility and Consumer's Experience not high scarce
Fall into.
In a first aspect, the present invention provides a kind of Wireless Fidelity WiFi cipher safe protecting methods, including:
The access request that first user sends is received, access request is used to ask to access WiFi network, accesses
User profile and access pin comprising first user in request;
If access pin is different from the password of WiFi network, user profile according to first user obtains the
The number of times of the access request that one user sends in preset time period;
If the number of times of the access request that first user sends in preset time period is more than first threshold, really
First user is determined for disabled user, the access request that first user sends after refusal.
Alternatively, method also includes:
The user profile of first user is sent to second user, second user is validated user.
Alternatively, method also includes:
To determine that first user is sent to second user for the time of disabled user.
Alternatively, when it is determined that disabled user quantity be more than Second Threshold when, method also includes:
The quantity of disabled user is sent to second user.
Alternatively, before receiving the access request that first user sends, also include:
Setting second user is validated user.
Second aspect, the present invention provides a kind of Wireless Fidelity WiFi cipher safe protecting devices, including:
Receiver module, the access request for receiving first user transmission, access request is used to ask to access
WiFi network, user profile and access pin comprising first user in access request;
Processing module, if different from the password of WiFi network for access pin, according to first user
User profile obtains the number of times of the access request that first user sends in preset time period;
If the number of times that receiver module is additionally operable to the access request that first user sends in preset time period is more than
First threshold, it is determined that first user is disabled user, the access request that first user sends after refusal.
Alternatively, also include:
First sending module, for the user profile of first user to be sent into second user, second user
It is validated user.
Alternatively, the first sending module is additionally operable to determine that first user is sent to for the time of disabled user
Second user.
Alternatively, also include:Second sending module is used to be more than second when the quantity of the disabled user for determining
During threshold value, the quantity of disabled user is sent to second user.
Alternatively, it is validated user that processing module is additionally operable to set second user.
WiFi cipher safe protecting methods and device that the present invention is provided, by receiving what first user sent
Access request, if access pin is different from the password of WiFi network, according to the user profile of first user
Obtain the number of times of the access request that first user sends in preset time period;If first user is when default
Between the number of times of access request that sends in section be more than first threshold, it is determined that first user is disabled user,
The access request that first user sends after rejection.Make use of the validated user in preset time period
The frequency for being manually entered password is more much lower by decoding the frequency of software input password than disabled user, so that,
The number of times of the access request sent in Preset Time according to first user determines whether to be disabled user, when for
During disabled user, the access request that first user sends after refusal is identified illegally in the time earlier
User, the trial for preventing it from carrying out password, so that, simple WiFi passwords are set, that is, it is easy to note
Recall with input, have the safety that can guarantee that WiFi passwords, improve Consumer's Experience.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to reality
The accompanying drawing to be used needed for example or description of the prior art is applied to be briefly described, it should be apparent that, below
Accompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art,
Without having to pay creative labor, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment one of the present invention;
Fig. 2 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment two of the present invention;
Fig. 3 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment three of the present invention;
Fig. 4 is the structural representation of WiFi cipher safe protectings device embodiment one of the present invention;
Fig. 5 is the structural representation of WiFi cipher safe protectings device embodiment two of the present invention;
Fig. 6 is the structural representation of WiFi cipher safe protectings device embodiment three of the present invention.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the invention, and
It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not doing
Go out the every other embodiment obtained under the premise of creative work, belong to the scope of protection of the invention.
Term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing,
(if present)s such as " the 3rd " " the 4 " is for distinguishing similar object, without for retouching
State specific order or precedence.It should be appreciated that the data for so using in the appropriate case can be mutual
Change, so that embodiments of the invention described herein for example can be with except illustrating or describing herein
Order beyond those is implemented.Additionally, term " comprising " and " having " and their any change
Shape, it is intended that covering is non-exclusive to be included, for example, contain the process of series of steps or unit,
Method, system, product or equipment are not necessarily limited to those steps clearly listed or unit, but can
Including it is not listing clearly or for these processes, method, product or equipment it is intrinsic other step
Rapid or unit.
In order to protect the safety of WiFi passwords, the password why user will set long and complexity comes
Overcome the risk being decrypted, because user is by existing code breaking software, it is close by exhaustion
Code possible all combinations are attempted breaking a code, in the case where signal is more satisfactory, usual 2
A password is attempted by second, therefore, if password is shorter or simple, it is easier to be decrypted.And
Usual validated user is manually entered password, and the time difference is had in input password twice, also, manually
The speed for being input into password is slower, therefore, the present invention is (soft using decoding with disabled user using validated user
The user of part) input password duration difference, identification disabled user as early as possible, stop disabled user
Decoding to password, so that, without setting long and complex password, it is easy to memory, improve user's body
Test.
Technical scheme is described in detail with specifically embodiment below.These have below
The embodiment of body can be combined with each other, may be in some embodiments for same or analogous concept or process
Repeat no more.
Fig. 1 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment one of the present invention, the present embodiment
Performed by the access point of WiFi network, the method for the present embodiment is as follows:
S101:The access request that first user sends is received, access request is used to ask to access WiFi network,
User profile and access pin comprising first user in access request.
First user then sends access request to access WiFi network to the access point of WiFi network,
Request accesses WiFi network, user profile and access pin comprising first user in access request.Wherein,
The user profile of first user can include the agreement interconnected between user name, the network of first user
(Internet Protocol, referred to as:IP) address and/or medium education (Media Access Control,
Referred to as:MAC) address etc..
Access point receives the access request of first user transmission.
S103:If access pin is different from the password of WiFi network, according to the user profile of first user
Obtain the number of times of the access request that first user sends in preset time period.
That is, access pin mistake, then according to the first user user profile same user of acquisition when default
Between the number of times of access request that sends in section, wherein, Preset Time is to be manually entered password hair according to user
Send what the most fast frequency of access request determined, for example:Validated user be manually entered password it is most fast 1 minute in
2 times, it is determined that Preset Time is 1 minute, and first threshold is 2 times, and Preset Time is it can also be provided that 1
The multiple of minute, correspondingly, first threshold will also be set to 2 identical multiple.Wherein, the WiFi
The password of network is set in advance by the manager of WiFi network, and is preserved in memory.
S105:If the number of times of the access request that first user sends in preset time period is more than first threshold,
Then determine that first user is disabled user, the access request that first user sends after refusal.
If the number of times of the access request that first user sends in preset time period is more than first threshold, explanation
First user carries out password attempt by decoding software again, is disabled user, first user hair after refusal
The access request sent.
Specifically, the IP address or MAC Address of the packet that can be sent according to first user determine
No is first user, it is also possible to which the user name in access request determines whether to be first user, if
It is the packet of first user transmission, then abandons and do not processed.
The present embodiment, by receiving the access request that first user sends, if access pin and WiFi network
Password it is different, then the user profile according to first user obtains first user and is sent in preset time period
Access request number of times;If the number of times of the access request that first user sends in preset time period is more than
First threshold, it is determined that first user is disabled user, the access that first user sends after rejection
Request.The frequency that make use of the validated user in preset time period to be manually entered password is led to than disabled user
The frequency for crossing decoding software input password is much lower, so that, sent in Preset Time according to first user
The number of times of access request determines whether to be disabled user, when for disabled user, first user after refusal
The access request of transmission, disabled user is identified in the time earlier, the trial for preventing it from carrying out password,
So as to, simple WiFi passwords are set, that is, it is easy to memory and input, can guarantee that WiFi passwords
Safety, improve Consumer's Experience.
Fig. 2 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment two of the present invention, Fig. 2 be
On the basis of embodiment illustrated in fig. 1, it is determined that after disabled user, further also include:S107 and
/ or the execution sequence of S109, S107 and S109 be not limited, it is as follows:
S107:The user profile of first user is sent to second user.
Wherein, second user is validated user.
The user profile of first user is sent to second user, second user can be known to be wanted to access it
The specifying information of the user of network, understands the information of disabled user, to be alerted or be investigated law duty
Appoint etc..
S109:To determine that first user is sent to second user for the time of disabled user.
Determine the illegal turn-on time of the time i.e. first user that first user is disabled user.
Second user can attempt accessing the time of its WiFi network according to first user, analyze first user
User profile, or, according to its trial access WiFi network time take correspondingly measure.
The present embodiment, by second user feed back first user user profile and/or first user it is non-
Method turn-on time, correspondingly measure is taken to be referred to for second user.Wherein, second user is usually
The manager or owner of the WiFi network, its password that can change WiFi network and configuration please
Seek blacklist of user etc..The information of the second user can pre-set and be stored in corresponding storage
Space, for subsequent calls.
Fig. 3 is the schematic flow sheet of WiFi cipher safe protecting methods embodiment three of the present invention, Fig. 3 be
On the basis of embodiment illustrated in fig. 1, when it is determined that disabled user quantity be more than Second Threshold when, enter one
Step ground also includes S111, as follows:
S111:The quantity of disabled user is sent to second user.
The present embodiment, second user is sent to by by the quantity of disabled user, to point out user illegally to use
The quantity at family is more, second user is changed password in time or in inapplicable network, closes access point,
To ensure network security.
On the basis of Fig. 1, Fig. 2 or embodiment illustrated in fig. 3, the access that first user sends is being received
Before request, also include:Setting second user is validated user, and second user typically refers to open the WiFi
The user of network account, second user refers to the mobile terminal bound with the account.
Fig. 4 is the structural representation of WiFi cipher safe protectings device embodiment one of the present invention, the present embodiment
Device include:Receiver module 401 and processing module 402, wherein, receiver module 401 is used to receive
The access request that first user sends, access request is used to ask to access WiFi network, is wrapped in access request
User profile and access pin containing first user;If processing module 402 is used for access pin and WiFi
The password of network is different, then the user profile according to first user obtains first user in preset time period
The number of times of the access request of transmission;If receiver module 401 is additionally operable to first user being sent out in preset time period
The number of times of the access request sent is more than first threshold, it is determined that first user is disabled user, rejection
The access request that first user sends afterwards.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 1,
Its realization principle is similar with technique effect, and here is omitted.
Fig. 5 is the structural representation of WiFi cipher safe protectings device embodiment two of the present invention, Fig. 5 be
On the basis of embodiment illustrated in fig. 4, further comprise:First sending module 403, for by first
The user profile of user is sent to second user, and second user is validated user.
First sending module 403 is additionally operable to determine that first user is sent to second for the time of disabled user
User.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 2,
Its realization principle is similar with technique effect, and here is omitted.
Fig. 6 is the structural representation of WiFi cipher safe protectings device embodiment three of the present invention, Fig. 6 be
On the basis of embodiment illustrated in fig. 4, further comprise:Second sending module 404 is used for when determination
When the quantity of disabled user is more than Second Threshold, the quantity of disabled user is sent to second user.
The device of the present embodiment, accordingly can be used to perform the technical scheme of embodiment of the method shown in Fig. 3,
Its realization principle is similar with technique effect, and here is omitted.
In above-mentioned each device embodiment kind, it is validated user that processing module 402 is additionally operable to set second user.
One of ordinary skill in the art will appreciate that:Realize all or part of step of above-mentioned each method embodiment
Suddenly can be completed by the related hardware of programmed instruction.Foregoing program can be stored in a computer can
In reading storage medium.The program upon execution, performs the step of including above-mentioned each method embodiment;And
Foregoing storage medium includes:ROM, RAM, magnetic disc or CD etc. are various can be with store program codes
Medium.
Finally it should be noted that:Various embodiments above is merely illustrative of the technical solution of the present invention, rather than right
Its limitation;Although being described in detail to the present invention with reference to foregoing embodiments, this area it is common
Technical staff should be understood:It can still modify to the technical scheme described in foregoing embodiments,
Or equivalent is carried out to which part or all technical characteristic;And these modifications or replacement, and
The scope of the essence disengaging various embodiments of the present invention technical scheme of appropriate technical solution is not made.
Claims (10)
1. a kind of Wireless Fidelity WiFi cipher safe protecting methods, it is characterised in that including:
The access request that first user sends is received, the access request is used to ask to access WiFi network,
User profile and access pin comprising the first user in the access request;
If the access pin is different from the password of the WiFi network, according to the use of the first user
The number of times of the access request that first user described in the acquisition of information of family sends in preset time period;
If the number of times of the access request that the first user sends in preset time period is more than first threshold,
The first user is then determined for disabled user, the access request that the first user sends after refusal.
2. method according to claim 1, it is characterised in that methods described also includes:
The user profile of the first user is sent to second user, the second user is validated user.
3. method according to claim 2, it is characterised in that methods described also includes:
To determine that the first user is sent to the second user for the time of disabled user.
4. method according to claim 1, it is characterised in that when it is determined that disabled user quantity
During more than Second Threshold, methods described also includes:
The quantity of disabled user is sent to the second user.
5. the method according to any one of Claims 1 to 4, it is characterised in that the reception first is used
Before the access request that family sends, also include:
Setting second user is validated user.
6. a kind of Wireless Fidelity WiFi cipher safe protecting devices, it is characterised in that including:
Receiver module, the access request for receiving first user transmission, the access request is used to ask
WiFi network is accessed, user profile and access pin comprising the first user in the access request;
Processing module, if different from the password of the WiFi network for the access pin, according to institute
The user profile for stating first user obtains the access request that the first user sends in preset time period
Number of times;
If the receiver module is additionally operable to the access request that the first user sends in preset time period
Number of times is more than first threshold, it is determined that the first user is disabled user, and described first uses after refusal
The access request that family sends.
7. device according to claim 6, it is characterised in that also include:
First sending module, it is described for the user profile of the first user to be sent into second user
Second user is validated user.
8. device according to claim 7, it is characterised in that first sending module is additionally operable to
To determine that the first user is sent to the second user for the time of disabled user.
9. device according to claim 6, it is characterised in that also include:
Second sending module, for when it is determined that the quantity of disabled user be more than Second Threshold when, will be illegal
The quantity of user is sent to the second user.
10. the device according to any one of claim 6~9, it is characterised in that the processing module
It is validated user to be additionally operable to set second user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510962042.8A CN106899967A (en) | 2015-12-21 | 2015-12-21 | WiFi cipher safe protecting methods and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510962042.8A CN106899967A (en) | 2015-12-21 | 2015-12-21 | WiFi cipher safe protecting methods and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106899967A true CN106899967A (en) | 2017-06-27 |
Family
ID=59190675
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510962042.8A Pending CN106899967A (en) | 2015-12-21 | 2015-12-21 | WiFi cipher safe protecting methods and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106899967A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1298620A (en) * | 1998-02-27 | 2001-06-06 | 艾利森电话股份有限公司 | Authentication method and authentication device for secured communications between an ATM mobile terminal and an ATM access node of a wireless ATM radio communication network |
CN101141259A (en) * | 2007-10-22 | 2008-03-12 | 杭州华三通信技术有限公司 | Method and device of access point equipment for preventing error access |
CN101267662A (en) * | 2007-03-15 | 2008-09-17 | 华为技术有限公司 | A session rejection method, access network and access terminal |
CN101296182A (en) * | 2008-05-20 | 2008-10-29 | 华为技术有限公司 | Data transmission control method and data transmission control device |
CN101645817A (en) * | 2008-08-05 | 2010-02-10 | 中兴通讯股份有限公司 | Wireless network access system and method thereof for preventing illegal user from malicious access |
CN102143552A (en) * | 2010-11-24 | 2011-08-03 | 华为技术有限公司 | Access processing method, base station and terminal |
CN102256337A (en) * | 2011-07-08 | 2011-11-23 | 杭州华三通信技术有限公司 | Message processing method and equipment in wireless local area network (WLAN) |
CN103458436A (en) * | 2012-05-31 | 2013-12-18 | 中兴通讯股份有限公司 | Method and device for detecting alive-keeping of link between AC and AP |
CN104093151A (en) * | 2014-07-30 | 2014-10-08 | 广东欧珀移动通信有限公司 | Method and device for preventing Wi-Fi (Wireless-Fidelity) hot spot from being illegally accessed |
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
WO2015196679A1 (en) * | 2014-06-24 | 2015-12-30 | 中兴通讯股份有限公司 | Authentication method and apparatus for wireless access |
-
2015
- 2015-12-21 CN CN201510962042.8A patent/CN106899967A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1298620A (en) * | 1998-02-27 | 2001-06-06 | 艾利森电话股份有限公司 | Authentication method and authentication device for secured communications between an ATM mobile terminal and an ATM access node of a wireless ATM radio communication network |
CN101267662A (en) * | 2007-03-15 | 2008-09-17 | 华为技术有限公司 | A session rejection method, access network and access terminal |
CN101141259A (en) * | 2007-10-22 | 2008-03-12 | 杭州华三通信技术有限公司 | Method and device of access point equipment for preventing error access |
CN101296182A (en) * | 2008-05-20 | 2008-10-29 | 华为技术有限公司 | Data transmission control method and data transmission control device |
CN101645817A (en) * | 2008-08-05 | 2010-02-10 | 中兴通讯股份有限公司 | Wireless network access system and method thereof for preventing illegal user from malicious access |
CN102143552A (en) * | 2010-11-24 | 2011-08-03 | 华为技术有限公司 | Access processing method, base station and terminal |
CN102256337A (en) * | 2011-07-08 | 2011-11-23 | 杭州华三通信技术有限公司 | Message processing method and equipment in wireless local area network (WLAN) |
CN103458436A (en) * | 2012-05-31 | 2013-12-18 | 中兴通讯股份有限公司 | Method and device for detecting alive-keeping of link between AC and AP |
WO2015196679A1 (en) * | 2014-06-24 | 2015-12-30 | 中兴通讯股份有限公司 | Authentication method and apparatus for wireless access |
CN104113934A (en) * | 2014-07-25 | 2014-10-22 | 北京奇虎科技有限公司 | Router accessing method for communication equipment and accessing system |
CN104093151A (en) * | 2014-07-30 | 2014-10-08 | 广东欧珀移动通信有限公司 | Method and device for preventing Wi-Fi (Wireless-Fidelity) hot spot from being illegally accessed |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9992678B2 (en) | Network locking or card locking method and device for a mobile terminal, terminal, SIM card, storage media | |
CN104700268B (en) | A kind of method of mobile payment and mobile device | |
CN105119939B (en) | The cut-in method and device, providing method and device and system of wireless network | |
US9516019B2 (en) | Method, system and terminal for encrypting/decrypting application program on communication terminal | |
CN104601324B (en) | A kind of verification method, terminal and system for application | |
CN104767713B (en) | Account binding method, server and system | |
CN113711211A (en) | First-factor contactless card authentication system and method | |
CN101815291A (en) | Method and system for logging on client automatically | |
WO2015180690A1 (en) | Method and device for reading verification information | |
CN105337997A (en) | Log-in method of application client and relevant device | |
CN108228211B (en) | Smart card, and method and system for safely updating data of smart card | |
CN106101064A (en) | Account login method and device | |
CN106204003B (en) | Method, device and system for safely transferring virtual resources | |
CN108156601A (en) | A kind of method and device of locking SIM card | |
CN105184567A (en) | Information processing method, processing device and mobile terminal | |
CN104980420B (en) | A kind of method for processing business, device, terminal and server | |
KR20140045571A (en) | Binding a removable module to an access terminal | |
CN106657154A (en) | Wireless access method and system, WiFi platform and operator number taking platform | |
CN102413146B (en) | Client authorized logon method based on dynamic codes | |
CN108123918A (en) | A kind of account authentication login method and device | |
CN107359989A (en) | Data ciphering method, safety chip and computer-readable recording medium | |
CN107358087B (en) | The information storage means and device of Bluetooth chip for Bluetooth identities authentication device | |
CN104883341A (en) | Application management device, terminal and application management method | |
CN106097486B (en) | A kind of verification method of gate inhibition's password based on sonic transmissions and verification system | |
EP3336740A1 (en) | Dynamic secure messaging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170627 |