CN107241348A - Alarming method and system that a kind of router is logged in - Google Patents
Alarming method and system that a kind of router is logged in Download PDFInfo
- Publication number
- CN107241348A CN107241348A CN201710570095.4A CN201710570095A CN107241348A CN 107241348 A CN107241348 A CN 107241348A CN 201710570095 A CN201710570095 A CN 201710570095A CN 107241348 A CN107241348 A CN 107241348A
- Authority
- CN
- China
- Prior art keywords
- router
- module
- user
- connection equipment
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0815—Network architectures or network communication protocols for network security for authentication of entities providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Alarming method and system that a kind of router is logged in, are related to network safety filed, the alarming method of router of the present invention comprises the following steps, and ask response of step, wait the logging request for carrying username and password;Whether the protocol address interconnected between area judging step, the network for judging the connection equipment of transmission logging request belongs to local zone;Login authentication step, verifies username and password;Alarm step, adds blacklist, and hold user's transmission login alarm to router by connection equipment;User's operating procedure, judgement holds whether user carries out moving into white list operation to connection equipment;End step, ending request.The system of the alarming method of router of the present invention is realized based on the above method.The present invention forbids the connection equipment of non-local area domain addresses to conduct interviews and connect, and the connection equipment that there is potential safety hazard is just filtered out before password authentification, Router Security is lifted to greatest extent.
Description
Technical field
The present invention relates to network safety filed, and in particular to alarming method and system that a kind of router is logged in.
Background technology
Router, is each LAN, the equipment of wide area network in connection internet, is the hinge of internet, at present route
Device has been widely used for all trades and professions, and the product of various different class has turned into realizes connection inside various backbone networks, backbone
Internetworking and backbone network and the main force of internet interconnection business, are the network connection entrance of each family, router
Safety get married the main entrance of front yard network security.And it is something that hackers often do that the login of router, which is cracked, and
And always enjoy it, hackers generally carry out remote internet attack, particularly the login password of router crack and more
Change, router connection device data is not easy to be found at the moment, again and is followed the trail of exposed to hacker.
Therefore the login of router has become extremely important safely, also gradually strengthen in the prior art for logging in
The Chinese application documents of the safeguard protection of this process of router, such as Application No. CN201510810997.1 disclose a kind of nothing
Line router login management method, " receives the logging request of wireless terminal, and the wireless terminal is entered in the technical scheme
Row user name password authentification, if being verified, the nothing is determined according to the address interconnected between the network of the wireless terminal
The user property of line terminal ", is carrying out determined property and dangerous to the address interconnected between network again after being verified, is invading
The person of entering it is very possible when this period judged the address interconnected between network to the network equipment of connection route device or
Terminal is quickly invaded and stolen data or even cracks router for the determining program of the address interconnected between network, makes it
Can not be worked realization, allowed router to hold user and takeed for logging device safety, secondly, " ... judge that the login times are
It is no to be more than login times threshold value;If so, then refusing the wireless terminal logs in the wireless router, and by the wireless terminal
User property be revised as black list user ... carry out illegal log in and remind " when login times are more than login times threshold value
Carry out " drawing black " operation and illegal log in is reminded, in this case, invader may be before login times threshold value just route
Device is cracked, now, and this method for security protection is just invalid.
But most of invader does not have local zone address, this attribute information for invader is so accomplished by
Judged, decidedly forbid the connection of this kind of other regions domain browsing person, once it is found that directly being isolated, protection is whole
Router network, the connection equipment to local zone carries out encrypted message checking again, it is ensured that safety.
The content of the invention
The present invention provides the alarming method that a kind of router is logged in, and region is carried out to the connection equipment for attempting connection route device
Judge, forbid the connection equipment of non-local area domain addresses to conduct interviews and connect, just filtered out before password authentification hidden in the presence of safety
The connection equipment of trouble, lifts Router Security to greatest extent.
The present invention above-mentioned technical purpose technical scheme is that:The alarm that a kind of router is logged in
Method, it is characterised in that comprise the following steps,
S1 asks response of step, waits the logging request for carrying username and password;
Whether the protocol address interconnected between S2 area judging steps, the network for judging the connection equipment of transmission logging request
Belong to local zone, if so, then carrying out step S3, otherwise, carry out step S4;
S3 login authentication steps, verify username and password, if correctly, allowing connection equipment to log in router, carrying out
Step S6;
S4 alarm steps, add blacklist, and hold user's transmission login alarm to router by connection equipment;
S5 user's operating procedure, judgement holds whether user carries out moving into white list operation to connection equipment, if it is not, then solving
Except login alarm.
S6 end steps, ending request.
As a preference of the present invention, also have S1.1 list judgment steps between S1 and S2,
The hardware address of connection equipment to sending logging request is contrasted with the white and black list that has created, if
Hardware address belongs to white list, then allows connection equipment to log in router, carry out step S6;Otherwise, if hardware address belongs to black
List, then refusal connection equipment login router, carries out step S6.
As a preference of the present invention, also having S3.1 several judgment step in S3 login authentication steps, if user name and close
Code mistake, then judge whether connection equipment once repeatedly logged in, if it is not, being then back to step S1;If so, carrying out step S4.
As a preference of the present invention, also having S5.1 to whiten return to step in S5 user's operating procedure, if holder will draw
Rise in the connection equipment immigration white list for logging in alarm, be then back to step S1.
As a preference of the present invention, also having S3.0 directly to whiten judgment step before S3.1 several judgment steps, if user
Name and code error, then directly transmit and whiten signal to user is held, judge to hold whether user carries out directly whitening operation, if
It is then to be back to step S1;Otherwise, step S3.1 is carried out.
As a preference of the present invention, also having S5.2 emergency cut-off steps between S5 and S6, if holding user not to connection
Equipment carries out moving into white list operation, then judges to hold whether user carries out shutoff operation to router, if so, closing route
Device, cuts off and forbids all to connect equipment connection, otherwise, carry out step S6.
A kind of system of alarming method using above-mentioned router, wherein, including login module, adress analysis module, record
Enter module, authentication module, alarm modules, shifting name module, the adress analysis module connects the login module, the typing mould
Block, the authentication module connect the adress analysis module respectively, and the alarm modules connect the typing module, the shifting name
Module connects the alarm modules, and the login module is used for the password for registering connection equipment input, and password, connection equipment
Information is sent to adress analysis module, and the adress analysis module is used for the address for analyzing connection equipment, and the authentication module is used
In the correctness for judging password, the typing module is used to connection equipment is added blacklist and to alarm modules transmission believed
Number, the alarm modules are used for user's transmission alarm signal is held, and the shifting name module receiving holds subscriber signal and can be right
Connection equipment in blacklist carries out moving into white list operation.
As a preference of the present invention, also including search module, the search module is located at the authentication module and the record
Enter between module, the search module is used to inquire about the number of times that current connection devices are unsuccessfully logged in.
As a preference of the present invention, also include directly allowing module, it is described directly to allow module to be located at the authentication module
Between the search module, the direct permission module holds whether user allows current connection devices in checking for judgement
Router is directly connected in the case of failure.
As a preference of the present invention, also include closedown module, the closedown module connection shifting name module, the closing
Module is used for emergency cut-off router power supply.
Beneficial effect:
1st, the connection equipment in non-local region is just forbidden to access before checking password, the most intrusions of isolation are accessed,
The initial period of access request just lifts Router Security to greatest extent, does not allow malicious access person to have an opportunity to take advantage of.
2nd, for multiple login failure local zone connection equipment carry out draw black processing while, send login alarm with
Router owner is reminded, waits router to hold the further operation of user.
3rd, directly whitening judgment step is conducive to quick " allowing connection " in particular cases to operate, and improves whole route
The connection flexibility of device LAN, also improves practicality and the hommization of router LAN.
4th, the addition of emergency cut-off step causes router and router LAN to possess the function of emergency cut-off, it is to avoid
The hidden danger that router is cracked under dangerous situation, it is simple and direct in times of crisis to protect router and connected equipment,
Greatly improve the security of router and its LAN.
Brief description of the drawings
Fig. 1 is the system architecture schematic diagram of embodiment 1.
Fig. 2 is the system architecture schematic diagram of embodiment 2.
Fig. 3 is the system architecture schematic diagram of embodiment 3.
Embodiment
The following is specific embodiment of the invention and with reference to accompanying drawing, the technical scheme to invention is further described, but
The present invention is not limited to these embodiments.
Embodiment 1
In the technical program, compared to existing wireless router login management method, maximum technological improvement is to test
Before card username and password, agreement (MAC) address first to being interconnected between the network of the connection equipment for the connection that conducts interviews
Parsed, if current send agreement (MAC) address interconnected between the connection device network of connection request not to router
Belong in local zone, then router is directly drawn it black operation, this allow for most of network intrusions or
Router invasion is carried out by long-range attack, and the connection equipment of general home router is the end in local zone
End, such as notebook computer, personal smart mobile phone, therefore the connection equipment that remote request can be connected into local router LAN is seen
Work is " external malice visitor ", holds user while blacklist is added in advance to router and sends login alarm, login police
Report can be illustrated in the terminal that is connected in router LAN, such as PC or disconnected remote mobile
Equipment, such as smart mobile phone, such benefit be notify the very first time can management router equipment, and administration authority is not limited to
In in router LAN, if router holds user in other places, be able to must also be got home by mobile device Road by device whether
Log in or invade by other people, prevent it from continuing malicious access so as to which unknown registrant is pulled in into blacklist by mobile device
Login avoids router password from being cracked, or even notifies household to enhance your vigilance, closes router to protect connection equipment money in family
The safety of material;At the same time, it is also contemplated that non-local region connection equipment is known users, specifically, router holds use
Family works general ability domain net is route in family to access the personal computer being connected with router LAN, it is necessary to connect outside, so that
File or data, at this moment, router hold the connection equipment of user on hand and are considered as " other regions by router needed for obtaining
Domain " user and draw black, and send login alarm and be shown in router and hold user, at this moment, router holds user can be at this moment
Oneself connection equipment on hand is subjected to " immigration white list " operation, to allow to connect equipment access router LAN drawn game
User in the net of domain, realizes safeguard protection router and the flexibly effect of connection LAN.
It is the system architecture schematic diagram of embodiment 1 as shown in Figure 1.A kind of warning system of router, wherein, including log in
Module, adress analysis module, typing module, authentication module, alarm modules, shifting name module, adress analysis module connection log in mould
Block, typing module, authentication module difference link address analysis module, alarm modules connection typing module moves the connection police of name module
Module is reported, login module is used for the username and password for registering connection equipment input, and user name, password, connection equipment letter
Breath is sent to adress analysis module, and adress analysis module is used for the address for analyzing connection equipment, and authentication module is used to judge user
The correctness of name and password, typing module is used to adding blacklist and sending signal, alarm mould to alarm modules connection equipment
Block is used to, to user's transmission alarm signal is held, move name module and receive to hold subscriber signal and the connection that can be pointed in blacklist
Equipment carries out moving into white list operation.
Also include search module, search module is located between authentication module and typing module, search module is used to inquire about and worked as
The number of times that preceding connection equipment is unsuccessfully logged in.
Based on the warning system of above-mentioned router, the alarming method of router is implemented, is comprised the following steps,
S1 asks response of step
Login module waits the logging request for the external connection apparatus for carrying username and password, and login module can be one
One " activity " in the individual electronic equipment with logging program, such as Android (Android) application code, for connection equipment
A login interface is provided, the agreement interconnected between the network that connection equipment is obtained while equipment input password is connected
(MAC) address and hardware (IP) address, and send the rear to adress analysis module transmission data of logging request in connection equipment;
S1.1 list judgment steps
Adress analysis module to send the connection equipment of logging request hardware address and the prior white list created and
Blacklist is contrasted, and can realize function by hardware keyboards connection route device or mobile device connection route device, is permitted
Perhaps the typing of white and black list can be by the importing of data with existing file, can also be by way of being manually entered instantly
Write in router storage original paper, when address analysis module judges that connection device hardware address belongs in white list list, then
Password authentification is skipped, directly allows connection equipment to log in router and carries out network access, then carry out step S6;If connecting equipment
Hardware address be not belonging to white list, then proceed blacklist judgement, i.e., judge connection equipment hardware address whether belong to
Blacklist, if belonging to, directly refusal connection equipment logs in router, then carries out step S6;
S2 area judging steps
When address analysis module is judged as to the hardware address for connecting equipment neither white list user and be not blacklist
During user, the judgement of agreement (MAC) address interconnected between network is carried out, when the net for the connection equipment for judging to send logging request
When agreement (MAC) address interconnected between network belongs to local zone, step S3 is carried out, otherwise, S3 is skipped, carries out step S4;
S3 login authentication steps
It is judged as after the connection equipment of local zone, authentication module is just carried out to the logging request that connection equipment is sent
Checking, authentication module can be the electronic equipment being integrated in router for being written into Validation Code, and Validation Code can be scanned and obtained
The word string being input into password box is taken, then by the password inputted and router password match, if correctly, allowing connection to set
It is standby to log in router, then carry out step S6;
S3.1 several judgment step
When authentication module judges code error, error signal is sent to search module, search module can read road
Log-on message in the logon data file of device, inquiry logon data file, judges whether current connection devices are once multiple
Log in, if it is not, being then back to step S1;If so, carrying out step S4.
S4 alarm steps
When search module finds " passing unsuccessfully to log in history " of current connection devices in logon data file, letter is sent
Number to typing module, the attribute information of typing module record connection equipment, the agreement such as interconnected between hardware (IP) address, network
(MAC) address, device type etc., current connection devices are added after blacklist list, alarm modules, alarm mould are sent a signal to
Block can be made up of or positioned at road the alarm signal transmitter and the siren in family being integrated in router
The application program (APP) that user can only be in mobile phone is held by device, when there is new connection equipment to be added into blacklist, alarm signal hair
Send device to send signal, signal can be alerted device acquisition, network letter can also be sent by connecting equipment in router LAN
Number on router holder's smart mobile phone, on the one hand cause siren to send alarm to remind kinsfolk, on the other hand exist
Do not guarantee that siren is necessarily noticeable in family when being invaded in view of router in possible family, therefore send to smart mobile phone
Application program (APP) on, remind router to hold in user family router in time and logged in or intrusion by outside, to help road
User is held by device and makes respective handling in time.
S5 user's operating procedure
After alarm modules make alarm action, router, which is held, will appear from alarm feedback on the mobile device of user
Interface, if router holds user and carries out feedback operation, will send feedback signal to router, then move the reception pair of name module
Operating result in alarm feedback interface, moves name module and judges to hold whether user carries out moving into white list behaviour to connection equipment
Make, alarm is logged in if it is not, releasing;
S5.1 whitens return to step
The operating result for causing the connection equipment for logging in alarm to move into white list is believed if moving name module and receiving holder
Number, then release and log in alarm, and be back to step S1.
S6 end steps, ending request.
So far, the alarming method that a kind of router is logged in is realized, the attribute for connecting equipment is differentiated, if connection is set
Standby is black list user, then directly refuses its logging request;If it is not that black list user is non-local region to connect equipment
User, then hold user to router while blacklisting it and send login alarm, and wait router to hold user
Further processing;If connection equipment is not belonging to black list user and but belongs to local zone user, its login password is verified
Correctness, when password is correct, it is allowed to current connection devices connection route device LAN, when code error, continues to judge to work as
Preceding connection equipment whether there is the record of conventional login failure, when the number of times of login failure is reached or more than a certain setting number
During value, by current connection devices pipe off user while, by router to router hold user send log in police
Report, and wait router to hold the further processing of user;Router, which holds user, to be carried out to the login warning notice sent
Operation so that current connection devices move into white list from blacklist list, can also keep its state in blacklist list,
Terminate the connection request of the connection equipment.This refusal black list user attempts to access, forbids non-local zone user to access, right
The connection equipment of multiple logon attempt failure carries out drawing black and alarm processing Router Security guard method, it can be ensured that maximum
The lifting Router Security of limit.
Embodiment 2
As different from Example 1, in addition to directly allow module, directly allow module to be located at authentication module and search mould
Between block, directly allow module to be used for judgement and hold whether user allows current connection devices direct in the case of authentication failed
Connection route device.
It is illustrated in figure 2 the system schematic of embodiment 2.Directly allow module, as the term suggests it is to be used for local non-black
Name single user password authentification failure after directly " whitening " functional module.To run into kith and kin good for our durations in daily life
The visiting of visiting of friend, and be difficult to be cracked in order that obtaining home router password, we also can set password complex,
Surely disposably pass through so that relatives and friends differ when inputting password, if desired by the complicated multiple ability of Password Input
Be connected to router LAN, then may influence the mood of visitor, or because router password can not clearly be expressed and
It is also a kind of behavior for losing courtesy if causing visitor can not connect network.Therefore directly allow module to be that this kind of situation is carried
A kind of direct solution has been supplied, can be in route in visitor's password authentification mistake first without the inquiry of access times
Device is held points out whether the connection equipment to be moved into white list on the mobile terminal of user, if confirming to move into white list, carries out
Step S1.
The direct judgment step that directly whitens for allowing module to carry out is conducive to quick " allowing connection " in particular cases to grasp
Make, improve the connection flexibility of whole router LAN, also improve practicality and the hommization of router LAN.
Embodiment 3
As different from Example 2, in addition to closedown module, closedown module connection moves name module, and closedown module is used for tight
It is anxious to close router power supply.
When running into malice login or invading, when many, invader can be attacked by different terminals to be attached
Hit, be located at first similar to invader, router with being located at second, invader will not directly with first way address to second router enter
Row invasion is logged in, but carries out multiple attack by the ground of terminal third, Ding Di, penta ground ..., at this moment, merely will be non-local
User La Hei has not had essence and acted on, because after prohibiting the user of an address, invader can change address
Proceed to log in invasion, after changing many addresses, attempting multiple decryption, router may be invaded by invader
Enter.In view of the appearance of such situation, the emergency cut-off step that closedown module is provided will play the work of protection router LAN
With.Specific implementation is:Connection equipment is not carried out to move into white list operation if router holds user, use is held in judgement
Whether family carries out shutoff operation to router, if so, closing router, cuts off and forbids all to connect equipment connection, otherwise, enter
Row step S6.
The addition of emergency cut-off step causes router and router LAN to possess the function of emergency cut-off, it is to avoid danger
The hidden danger that router is cracked in the case of danger, it is simple and direct in times of crisis to protect router and connected equipment, pole
The earth improves the security of router and its LAN.
Specific embodiment described herein is only to spirit explanation for example of the invention.Technology neck belonging to of the invention
The technical staff in domain can be made various modifications or supplement to described specific embodiment or be replaced using similar mode
Generation, but without departing from the spiritual of the present invention or surmount scope defined in appended claims.
Claims (10)
1. the alarming method that a kind of router is logged in, it is characterised in that comprise the following steps,
S1 asks response of step, waits the logging request for carrying username and password;
Whether the protocol address interconnected between S2 area judging steps, the network for judging the connection equipment of transmission logging request belongs to
Local zone, if so, then carrying out step S3, otherwise, carries out step S4;
S3 login authentication steps, verify login password, if correctly, allowing connection equipment to log in router, carrying out step S6;
S4 alarm steps, add blacklist, and hold user's transmission login alarm to router by connection equipment;
S5 user's operating procedure, judgement holds whether user carries out moving into white list operation to connection equipment, is logged in if it is not, releasing
Alarm;
S6 end steps, ending request.
2. the alarming method that a kind of router according to claim 1 is logged in, it is characterised in that also have between S1 and S2
S1.1 list judgment steps, enter to sending the hardware address of connection equipment of logging request with the white and black list that has created
Row contrast, if hardware address belongs to white list, allows connection equipment to log in router, carries out step S6;Otherwise, if hardware
Location belongs to blacklist, then refusal connection equipment logs in router, carries out step S6.
3. the alarming method that a kind of router according to claim 2 is logged in, it is characterised in that in S3 login authentication steps
In also have S3.1 severals judgment step, if username and password mistake, judge to connect equipment whether once multiple login, if
It is no, then it is back to step S1;If so, carrying out step S4.
4. the alarming method that a kind of router according to claim 3 is logged in, it is characterised in that in S5 user's operating procedure
In also have S5.1 whiten return to step, if holder will cause log in alarm connection equipment move into white list in, release log in
Alarm, and it is back to step S1.
5. the alarming method that a kind of router according to claim 4 is logged in, it is characterised in that judge step in S3.1 number
There is S3.0 directly to whiten judgment step before rapid,
If username and password mistake, directly transmit and whiten signal to router and hold user, judgement holds whether user enters
Row directly whitens operation, if so, being then back to step S1;Otherwise, step S3.1 is carried out.
6. the alarming method that a kind of router according to claim 5 is logged in, it is characterised in that also have between S5 and S6
S5.2 emergency cut-off steps,
If router hold user not to connection equipment carry out move into white list operation, judgement hold user to router whether
Shutoff operation is carried out, if so, closing router, cuts off and forbids all to connect equipment connection, otherwise, carry out step S6.
7. a kind of warning system of one of use the claims 1-6 router, it is characterised in that including login module,
Location analysis module, typing module, authentication module, alarm modules, shifting name module, the adress analysis module connect the login mould
Block, the typing module, the authentication module connect the adress analysis module respectively, and the alarm modules connect the typing
Module, shifting name module connects the alarm modules, the login module be used for the user name for registering connection equipment input and
Password, and user name, password, connection facility information are sent to adress analysis module, the adress analysis module is used to analyze
The address of equipment is connected, the authentication module is used for the correctness for judging username and password, and the typing module is used for will even
Connect equipment add blacklist and to the alarm modules send signal, the alarm modules be used for hold user send alarm signal
Number, it is described to move the connection equipment immigration white list that name module receives to hold subscriber signal and be pointed in blacklist.
8. the warning system of a kind of router according to claim 7, it is characterised in that described also including search module
Search module is located between the authentication module and the typing module, and the search module is used to inquire about current connection devices mistake
Lose the number of times of login.
9. the warning system of a kind of router according to claim 8, it is characterised in that also including directly allowing module,
Described directly to allow module to be located between the authentication module and the search module, the direct permission module is held for judgement
Have whether user allows current connection devices to be directly connected to router in the case of authentication failed.
10. the warning system of a kind of router according to claim 9, it is characterised in that described also including closedown module
The closedown module connection shifting name module, the closedown module is used for emergency cut-off router power supply.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710570095.4A CN107241348A (en) | 2017-07-13 | 2017-07-13 | Alarming method and system that a kind of router is logged in |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710570095.4A CN107241348A (en) | 2017-07-13 | 2017-07-13 | Alarming method and system that a kind of router is logged in |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107241348A true CN107241348A (en) | 2017-10-10 |
Family
ID=59990565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710570095.4A Withdrawn CN107241348A (en) | 2017-07-13 | 2017-07-13 | Alarming method and system that a kind of router is logged in |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107241348A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449801A (en) * | 2018-05-11 | 2018-08-24 | 深圳市优克联新技术有限公司 | Method for connecting network, device, computer installation and computer readable storage medium |
CN108540497A (en) * | 2018-06-01 | 2018-09-14 | 深圳市彬讯科技有限公司 | Intelligent gateway and its connection control method |
CN109784031A (en) * | 2018-12-14 | 2019-05-21 | 北京奇安信科技有限公司 | A kind of account authentication process method and device |
CN111222112A (en) * | 2018-11-26 | 2020-06-02 | 珠海格力电器股份有限公司 | Intelligent terminal locking method and system and intelligent terminal |
CN112291786A (en) * | 2020-11-11 | 2021-01-29 | 深圳市友华通信技术有限公司 | Wireless access point control method, computer device, and storage medium |
CN113225306A (en) * | 2021-02-22 | 2021-08-06 | 北京神州慧安科技有限公司 | Safety protection system for industrial Internet of things data acquisition layer terminal equipment |
CN114866265A (en) * | 2021-01-20 | 2022-08-05 | 晶晨半导体(上海)股份有限公司 | Network connection method, router, administrator terminal device, and communication device |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008039227A1 (en) * | 2006-09-27 | 2008-04-03 | Multifactor Corporation | System and method for facilitating secure online transactions |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN105472610A (en) * | 2015-11-20 | 2016-04-06 | 上海斐讯数据通信技术有限公司 | Logging-in management method and apparatus of wireless router |
CN106162549A (en) * | 2015-05-19 | 2016-11-23 | 中兴通讯股份有限公司 | The processing method and processing device of access network |
CN106685843A (en) * | 2017-03-01 | 2017-05-17 | 西安交通大学城市学院 | Method for strengthening router safely |
CN106936854A (en) * | 2017-05-09 | 2017-07-07 | 成都市宏山科技有限公司 | For the safety system of router |
-
2017
- 2017-07-13 CN CN201710570095.4A patent/CN107241348A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2008039227A1 (en) * | 2006-09-27 | 2008-04-03 | Multifactor Corporation | System and method for facilitating secure online transactions |
CN103973711A (en) * | 2014-05-28 | 2014-08-06 | 中国农业银行股份有限公司 | Verification method and device |
CN106162549A (en) * | 2015-05-19 | 2016-11-23 | 中兴通讯股份有限公司 | The processing method and processing device of access network |
CN105472610A (en) * | 2015-11-20 | 2016-04-06 | 上海斐讯数据通信技术有限公司 | Logging-in management method and apparatus of wireless router |
CN106685843A (en) * | 2017-03-01 | 2017-05-17 | 西安交通大学城市学院 | Method for strengthening router safely |
CN106936854A (en) * | 2017-05-09 | 2017-07-07 | 成都市宏山科技有限公司 | For the safety system of router |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449801A (en) * | 2018-05-11 | 2018-08-24 | 深圳市优克联新技术有限公司 | Method for connecting network, device, computer installation and computer readable storage medium |
CN108449801B (en) * | 2018-05-11 | 2020-09-18 | 深圳市优克联新技术有限公司 | Network connection method, device, computer device and computer readable storage medium |
CN108540497A (en) * | 2018-06-01 | 2018-09-14 | 深圳市彬讯科技有限公司 | Intelligent gateway and its connection control method |
CN111222112A (en) * | 2018-11-26 | 2020-06-02 | 珠海格力电器股份有限公司 | Intelligent terminal locking method and system and intelligent terminal |
CN109784031A (en) * | 2018-12-14 | 2019-05-21 | 北京奇安信科技有限公司 | A kind of account authentication process method and device |
CN109784031B (en) * | 2018-12-14 | 2021-08-17 | 奇安信科技集团股份有限公司 | Account identity verification processing method and device |
CN112291786A (en) * | 2020-11-11 | 2021-01-29 | 深圳市友华通信技术有限公司 | Wireless access point control method, computer device, and storage medium |
CN114866265A (en) * | 2021-01-20 | 2022-08-05 | 晶晨半导体(上海)股份有限公司 | Network connection method, router, administrator terminal device, and communication device |
CN114866265B (en) * | 2021-01-20 | 2024-04-19 | 晶晨半导体(上海)股份有限公司 | Network connection method, router, administrator terminal device, and communication device |
CN113225306A (en) * | 2021-02-22 | 2021-08-06 | 北京神州慧安科技有限公司 | Safety protection system for industrial Internet of things data acquisition layer terminal equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107241348A (en) | Alarming method and system that a kind of router is logged in | |
US11836261B2 (en) | Secure credentials control method | |
CN108173822A (en) | Intelligent door lock management-control method, intelligent door lock and computer readable storage medium | |
US8549594B2 (en) | Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password | |
CN112487383B (en) | Computer system for guaranteeing information security and control method thereof | |
CN109618344B (en) | Safe connection method and device of wireless monitoring equipment | |
US20100169957A1 (en) | Weak password support in a multi-user environment | |
CN105939326A (en) | Message processing method and device | |
CN101216867A (en) | A logging-on process cipher protection method by means of background synchronization | |
CN109711126A (en) | A kind of computer information safe management system and method | |
CN105260657A (en) | Privacy protection method and device | |
CN107147627A (en) | A kind of network safety protection method and system based on big data platform | |
CN107809438A (en) | A kind of network authentication method, system and its user agent device used | |
CN105006045A (en) | NFC cell phone dynamic password entrance guard system and control method thereof | |
US20210157934A1 (en) | Portable communication peripheral, system for protecting a portable terminal, and communication method | |
CN107392008A (en) | Cipher management method, Password Management equipment and computer-readable recording medium | |
CN102833067B (en) | Trilateral authentication method and system and authentication state management method of terminal equipment | |
CN101854357B (en) | Method and system for monitoring network authentication | |
Shetty et al. | Survey of hacking techniques and it's prevention | |
CN115168830A (en) | Login method and login device for detecting user login environment | |
CN107018143A (en) | The monitoring system of defense for the APT monitoring defence platforms analyzed based on big data | |
CN113704061A (en) | Secret-related computer protection system | |
CN109788481B (en) | Method and device for preventing illegal access monitoring | |
JP2002245003A (en) | Security enhancement system using one time url | |
KR101955449B1 (en) | Method and system for protecting personal information infingement using division of authentication process and biometrics authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20201030 Address after: 318015 no.2-3167, zone a, Nonggang City, no.2388, Donghuan Avenue, Hongjia street, Jiaojiang District, Taizhou City, Zhejiang Province Applicant after: Taizhou Jiji Intellectual Property Operation Co.,Ltd. Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666 Applicant before: Phicomm (Shanghai) Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20171010 |
|
WW01 | Invention patent application withdrawn after publication |