CN107820251B - Network access method, device and system - Google Patents

Network access method, device and system Download PDF

Info

Publication number
CN107820251B
CN107820251B CN201610820698.0A CN201610820698A CN107820251B CN 107820251 B CN107820251 B CN 107820251B CN 201610820698 A CN201610820698 A CN 201610820698A CN 107820251 B CN107820251 B CN 107820251B
Authority
CN
China
Prior art keywords
verified
information
sound information
access
sound
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610820698.0A
Other languages
Chinese (zh)
Other versions
CN107820251A (en
Inventor
曾慧鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201610820698.0A priority Critical patent/CN107820251B/en
Priority to PCT/CN2017/000061 priority patent/WO2018045692A1/en
Publication of CN107820251A publication Critical patent/CN107820251A/en
Application granted granted Critical
Publication of CN107820251B publication Critical patent/CN107820251B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/082Access security using revocation of authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Abstract

The invention provides a method, a device and a system for network access, which start access verification by triggering a key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the sound information to be verified is the same as the collected sound information; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result, solving the safety problem existing in the process of accessing the network access equipment to the user terminal in the wps technology, and achieving the effect of safely accessing the user terminal by the network access equipment.

Description

Network access method, device and system
Technical Field
The present invention relates to the field of communications, and in particular, to a method, an apparatus, and a system for network access.
Background
With the gradual maturity of wireless network technology, the wireless high fidelity wifi technology is widely applied to the market gradually, wherein how to safely and quickly access the user terminal to the network under the wifi network becomes a problem of wide attention in the industry.
In the existing wifi access technology, when a user terminal is connected to wifi, a password is firstly acquired, password verification is further performed between the user terminal and a network access device, and the user terminal is accessed to a wifi network under the condition that the password verification is successful. However, in the process of accessing the wifi network, at least three steps are required to access the user terminal to the wifi network, and the execution steps are too complicated.
In order to solve the problem of cumbersome access process in the existing WiFi access technology, related technologies propose a WiFi Protected Setup (wps) technology, that is, fig. 1 is a flow chart for implementing the wps technology provided in related technologies, as shown in fig. 1, a network access device (i.e., a router in fig. 1) and a user terminal (i.e., a terminal such as a mobile phone in fig. 1) need to press an access button, after the network access device receives an access request of the user terminal, the network access device sends a password to the user terminal, and then the user terminal accesses a network where the network access device is located according to the password. Although the wps technology is simple and convenient, the possibility that other people cut into the time window of wps exists, for example, outdoor incoherent people, neighbors, public places and other wps are prone to mistakenly accessing hot spots or the hot spots enable incoherent equipment to access a local area network, and potential safety hazards exist easily for common home users who are not familiar with the function safety risk.
wps can only connect one device at a time in terms of solving the safety problem, that is, fig. 2 is an implementation flow chart of a wps technology provided in the related art, as shown in fig. 2, the current wps technology requires manual access to wps for 2 × N (N is the number of devices) times when connecting a plurality of devices, and the efficiency is very low, that is, after a hotspot to be connected and a base station use the wps function, the inherent low access threshold of wps cannot identify the distance of the other side, because the transmission distance of general wifi is far, a remote user can easily access to a network to bring a potential safety hazard, so that the wps can only access one device at a time in design, if ten devices are accessed, a button is pressed for 2 × 10, and it can be known that the wps technology in the related art is not suitable for large-scale temporary networking. If a local area network is required to be assembled when a friend of a table wants to quickly establish the local area network to play a mobile phone online game, access authentication between each mobile phone and the network access device is required (that is, each mobile phone and the network access device need to obtain access permission by pressing a key at the same time), which is inconvenient.
Aiming at the problem of safety in the related art caused by the fact that network access equipment is accessed into a user terminal in the wps technology, an effective solution is not provided at present.
Disclosure of Invention
The embodiment of the invention provides a method, a device and a system for network access, which at least solve the problem of safety in the process of accessing network access equipment into a user terminal in the wps technology.
According to an embodiment of the present invention, there is provided a system for network access, including: the network access equipment is used for starting access verification through triggering of the key, receiving voice information to be verified sent by the user terminal, judging whether the voice information to be verified is the same as the voice information collected by the network access equipment when the voice information to be verified is received, and sending a corresponding access response message according to a judgment result; and the user terminal is used for starting an access request at the same time point with the network access equipment through triggering of the key, acquiring the sound information to be verified, sending the sound information to be verified to the network access equipment, receiving an access response message returned by the network access equipment, and executing corresponding operation according to the access response message.
Optionally, the network access device includes: the system comprises a first communication module and a first processor, wherein the first communication module is used for receiving voice information to be verified sent by a user terminal; the first processor is connected with the first communication module and used for judging whether the voice information to be verified is the same as the voice information collected when the voice information to be verified is received; the first communication module is further used for sending an access response message carrying the access key under the condition that the judgment result is yes; the first processor is further configured to receive an authentication request sent by the user terminal according to the access key, and access the user terminal to the network if the authentication is successful.
Optionally, the first communication module is further configured to receive sound information to be verified, sent by at least one user terminal; the first processor is also used for judging whether the received sound information to be verified is the same as the sound information collected when the sound information to be verified is received; the first communication module is further configured to send an access response message carrying the access key to at least one user terminal if the determination result is yes; and the first processor is also used for receiving an authentication request sent by at least one user terminal according to the access key and accessing the at least one user terminal to the network under the condition of successful authentication.
Optionally, the user terminal includes: the second communication module is used for receiving an access response message returned by the network access equipment; the second processor is used for analyzing the access response message and acquiring the access key carried in the access response message; the second communication module is further configured to send an authentication request according to the access key, where the authentication request is used to instruct the network access device to access the user terminal to a network where the network access device is located.
According to another embodiment of the present invention, there is provided a method of network access, including: starting access verification by triggering a key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the sound information to be verified is the same as the collected sound information; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result.
Optionally, the collecting the sound information includes: judging whether the sound information collected at the first time point is greater than a preset collection threshold value or not; and under the condition that the judgment result is yes, recording the sound information from the first time point, and when the sound information is smaller than a preset acquisition threshold value, finishing recording.
Further, optionally, after collecting the sound information, the method for network access provided in the embodiment of the present application further includes: converting the sound information from a preset first type information type into a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal; acquiring sound characteristics in the second sound information, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level; and recording the time and the sound characteristics of the collected sound information.
Optionally, the receiving the to-be-verified sound information sent by the user terminal includes: and after the collection of the voice information is finished, receiving the voice information to be verified sent by the user terminal within a preset verification time interval.
Further, optionally, the receiving of the to-be-verified sound information sent by the user terminal includes: and receiving the voice information to be verified sent by at least one user terminal.
Optionally, the determining whether the sound information to be verified is the same as the collected sound information includes: and judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information.
Further, optionally, the determining whether the sound feature in the sound information to be verified is the same as the sound feature of the collected sound information includes: matching the received voice information to be verified sent by at least one user terminal with the voice characteristics of the collected voice information one by one; and judging whether the sound information to be verified sent by at least one user terminal is the same as the sound characteristics of the collected sound information.
Optionally, sending an access response message corresponding to the determination result to the user terminal according to the determination result includes: if the judgment result is yes, sending an access response message carrying an access key to the user terminal; and under the condition that the judgment result is negative, sending an access response message for rejecting the access to the user terminal.
Further, optionally, sending the access response message carrying the access key to the user terminal includes: and sending an access response message carrying the access key to at least one user terminal.
Optionally, after sending an access response message carrying an access key to the user terminal, the method for network access provided in the embodiment of the present application further includes: receiving an authentication request carrying an access key sent by a user terminal; verifying the verification request; and in case of successful verification, accessing the user terminal into the network.
According to another embodiment of the present invention, another method for network access is provided, including: starting an access request by triggering a key; collecting sound information to be verified, and sending the sound information to be verified to network access equipment; receiving an access response message returned by the network access equipment; and executing corresponding operation according to the access response message.
Optionally, sending the to-be-verified sound information to the network access device includes: extracting sound features in the sound information to be verified, wherein the sound features at least comprise at least one of the following: tone, loudness, or volume level; converting the voice information to be verified from a preset first type information type to a second type information type according to the voice characteristics to obtain second converted voice information, wherein the first type information type is an analog signal, and the second type information type is a digital signal; and sending the voice information to be verified to the network access equipment.
Optionally, the performing the corresponding operation according to the access response message includes: under the condition that the access response message carries the access key, generating an authentication request according to the access key, wherein the authentication request is used for indicating the network access equipment to access the user terminal to the network where the network access equipment is located; an authentication request is sent to the network access device.
According to another embodiment of the present invention, there is provided an apparatus for network access, including: the verification starting module is used for starting access verification by triggering a key; the acquisition module is used for acquiring voice information and receiving the voice information to be verified sent by the user terminal; the judging module is used for judging whether the sound information to be verified is the same as the collected sound information or not; and the sending module is used for sending an access response message corresponding to the judgment result to the user terminal according to the judgment result.
According to another embodiment of the present invention, there is provided another apparatus for network access, including: the access starting module is used for starting an access request by triggering a key; the information acquisition module is used for acquiring the voice information to be verified and sending the voice information to be verified to the network access equipment; the receiving module is used for receiving an access response message returned by the network access equipment; and the message response module is used for executing corresponding operation according to the access response message.
According to still another embodiment of the present invention, there is also provided a storage medium. The storage medium is configured to store program code for performing the steps of: starting access verification by triggering a key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the sound information to be verified is the same as the collected sound information; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result.
Optionally, the storage medium is further arranged to store program code for performing the steps of: judging whether the sound information collected at the first time point is greater than a preset collection threshold value or not; and under the condition that the judgment result is yes, recording the sound information from the first time point, and when the sound information is smaller than a preset acquisition threshold value, finishing recording.
Optionally, the storage medium is further arranged to store program code for performing the steps of: after collecting the sound information, the method for network access provided by the embodiment of the present application further includes: converting the sound information from a preset first type information type into a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal; acquiring sound characteristics in the second sound information, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level; and recording the time and the sound characteristics of the collected sound information.
Optionally, the storage medium is further arranged to store program code for performing the steps of: the receiving of the voice information to be verified sent by the user terminal comprises the following steps: and after the collection of the voice information is finished, receiving the voice information to be verified sent by the user terminal within a preset verification time interval.
Further, optionally, the storage medium is further configured to store program code for performing the steps of: the receiving of the voice information to be verified sent by the user terminal comprises the following steps: and receiving the voice information to be verified sent by at least one user terminal.
Optionally, the storage medium is further arranged to store program code for performing the steps of: judging whether the sound information to be verified is the same as the collected sound information comprises the following steps: and judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information.
Further, optionally, the storage medium is further configured to store program code for performing the steps of: judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information comprises the following steps: matching the received voice information to be verified sent by at least one user terminal with the voice characteristics of the collected voice information one by one; and judging whether the sound information to be verified sent by at least one user terminal is the same as the sound characteristics of the collected sound information.
Optionally, the storage medium is further configured to store program code for performing the steps of: sending an access response message corresponding to the judgment result to the user terminal according to the judgment result comprises: if the judgment result is yes, sending an access response message carrying an access key to the user terminal; and under the condition that the judgment result is negative, sending an access response message for rejecting the access to the user terminal.
Further, optionally, the storage medium is further configured to store program code for performing the steps of: sending an access response message carrying an access key to a user terminal includes: and sending an access response message carrying the access key to at least one user terminal.
Optionally, the storage medium is further configured to store program code for performing the steps of: after sending an access response message carrying an access key to a user terminal, the method for network access provided by the embodiment of the present application further includes: receiving an authentication request carrying an access key sent by a user terminal; verifying the verification request; and in case of successful verification, accessing the user terminal into the network.
According to the invention, access verification is started by triggering the key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the voice information to be verified is the same as the voice information or not; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a flow chart of an implementation of the wps technique provided in the related art;
FIG. 2 is a flow chart of an implementation of a wps technique provided in the related art;
fig. 3 is a schematic structural diagram of a system for network access according to an embodiment of the present invention;
fig. 4 is a schematic view of communication interaction between a network access device and a user terminal in a network access system according to an embodiment of the present invention;
fig. 5 is a schematic diagram of communication interaction between a network access device and a user terminal in another network access system according to an embodiment of the present invention;
fig. 6 is a flow chart of a method of network access according to an embodiment of the invention;
fig. 7 is a schematic diagram of triggering collection of sound information in the method of network access according to the embodiment of the present invention;
fig. 8 is a schematic diagram illustrating comparison of sound characteristics in a network access method according to an embodiment of the present invention;
fig. 9 is a flow chart of a method of network access according to an embodiment of the present invention;
fig. 10 is a block diagram of an apparatus for network access according to an embodiment of the present invention;
fig. 11 is a block diagram of an apparatus for network access according to an embodiment of the present invention.
Detailed Description
The invention will be described in detail hereinafter with reference to the accompanying drawings in conjunction with embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The technical terms related to the embodiments of the present application are specifically as follows:
wifi protection setting technology: WiFi Protected Setup, wps for short;
the network access equipment: the Access Point (AP) device may be referred to herein as an Access Point (AP) device; or, a routing device with a sound collection device, or a mobile terminal with a wireless hotspot function.
Example 1
Fig. 3 is a schematic structural diagram of a system for network access according to an embodiment of the present invention. As shown in fig. 3, a system for network access provided in an embodiment of the present application includes:
the network access equipment 32 is used for starting access verification through triggering of a key, receiving voice information to be verified sent by a user terminal, judging whether the voice information to be verified is the same as voice information collected by the network access equipment when the voice information to be verified is received, and sending a corresponding access response message according to a judgment result;
the user terminal 34 is configured to start an access request at the same time point as the network access device through triggering of a key, collect sound information to be verified, send the sound information to be verified to the network access device, receive an access response message returned by the network access device, and execute a corresponding operation according to the access response message.
Specifically, the network access system provided in the embodiment of the present application upgrades the existing wps technology, that is, as shown in fig. 4, fig. 4 is a schematic view of communication interaction between a network access device and a user terminal in the network access system according to the embodiment of the present invention. The network access device 32 provided in the embodiment of the present application in fig. 4 may be a router carrying a mic device (a microphone, or a collection device with a radio receiving function), and the user terminal 34 may be one or a combination of at least two of a smart phone, a tablet computer, a laptop computer, a handheld business device, and an intelligent wearable device.
In this embodiment of the present application, as shown in fig. 4, the network access device 32 takes the router in fig. 4 as an example, and the user terminal 34 takes a smart phone as an example for description, specifically, the system for network access provided in this embodiment of the present application is as follows:
step1, the router and the smart phone trigger an access verification process for the router and an access request process for the smart phone by pressing keys on the device;
step2, after the router and the smart phone press the key, at this time, the router and the smart phone are in a sound collection stage;
step3, when the router and the smart phone collect the sound, the router records the sound characteristic and the collection time; the smart phone records the collected sound characteristics and the sound collection time, and sends the collected sound characteristics and the sound collection time to the router as sound information to be verified;
step4, the router receives the voice information to be verified sent by the smart phone, and verifies the voice information to be verified and the collected voice information (namely the voice characteristics and the collection time recorded in Step 3);
step5, sending an access response message carrying an access key to the smart phone under the condition of successful verification; under the condition of failure in verification, the smart phone is refused to be accessed;
step6, after receiving an access response message carrying an access key, the smart phone sends a verification request message carrying the access key to the router;
step7, after receiving the authentication request message sent by the smart phone, the router accesses the smart phone to the network where the router is located through the authentication password.
In summary, after the wps button is pressed, both sides enter a voice monitoring mode, quantize the voice characteristics including the pitch of the voice and the size of the voice into sampled pcm data by monitoring the voice characteristics, perform characteristic extraction, and record time. The recorded terminal initiates a request, and sends the audio characteristic data acquired by the recorded terminal to the router, and the router judges whether the request is legal or not through data analysis and comparison.
The network access system provided by the embodiment of the application aims to achieve the aim of simple and effective authentication, and the terminal far away from the router cannot obtain the same sound characteristics including the sound size, tone and time, and basically cannot forge the request.
It should be noted that the network access device provided in the embodiment of the present application may be a router having a sound collection function, or a mobile terminal having a wireless hotspot, so as to implement the network access system provided in the embodiment of the present application, which is not limited specifically.
In the network access system provided by the embodiment of the application, access verification is started by triggering the key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the voice information to be verified is the same as the voice information or not; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
Optionally, the network access device 32 includes: the system comprises a first communication module and a first processor, wherein the first communication module is used for receiving voice information to be verified sent by a user terminal 34; the first processor is connected with the first communication module and used for judging whether the voice information to be verified is the same as the voice information collected when the voice information to be verified is received; the first communication module is further used for sending an access response message carrying the access key under the condition that the judgment result is yes; the first processor is further configured to receive an authentication request sent by the user terminal 34 according to the access key, and access the user terminal 34 to the network if the authentication is successful.
Specifically, referring to fig. 4, still taking the network access device 32 as an example, taking a smart phone as an example of the user terminal 34, when the user terminal 34 is a smart phone, the router receives, through the first communication module, to-be-verified voice information sent by the smart phone, and determines, through the first processor, whether the to-be-verified voice information is the same as voice information collected when the to-be-verified voice information is received, and when the determination result is yes, sends, through the first communication module, an access response message carrying an access key to the smart phone, receives an authentication request sent by the smart phone according to the access key, and when the authentication is successful, accesses the smart phone to the network where the router is located.
Optionally, the first communication module is further configured to receive sound information to be verified, sent by at least one user terminal; the first processor is also used for judging whether the received sound information to be verified is the same as the sound information collected when the sound information to be verified is received; the first communication module is further configured to send an access response message carrying the access key to at least one user terminal if the determination result is yes; and the first processor is also used for receiving an authentication request sent by at least one user terminal according to the access key and accessing the at least one user terminal to the network under the condition of successful authentication.
Specifically, different from fig. 4, the network access system provided in the embodiment of the present application may further include a situation that a plurality of user terminals access the network access device as shown in fig. 5, fig. 5 is a schematic view of communication interaction between the network access device and the user terminal in another network access system according to the embodiment of the present invention. In fig. 5, the network access device 32 may be an access hotspot AP, or a mobile phone with a wireless hotspot function, or a router with a sound collection function, and the station a, the station B, and the station C may be the user terminal 34 in this embodiment, referring to fig. 5, after the AP, the station a, the station B, and the station C all press the button, the user terminal collects a sound "Go |! At the AP side, the AP receives at least one to-be-verified sound information (that is, including sound characteristics and time) reported by a station through the first communication module, the AP compares the to-be-verified sound information reported by each station with the sound information collected by the AP through the first processor, determines whether the two are the same, sends an access response message carrying an access key to each station through the first communication module under the same condition, receives a verification request carrying the access key sent by each station through the first processor, and accesses at least one station to a network where the AP is located through verification.
It should be noted here that the sound information in the embodiment of the present application includes speech information and other sound, for example, the speech information may include: the ringing information with verification characteristics, such as connection, access, go and the like, which is spoken by a user; other ringing sounds may include: the sound information including the verification feature at a short distance such as the sound generated by a clapper, a finger, or a clapper.
The principle of the network access system provided by the embodiment of the application is that the terminal far away from the router cannot obtain the same sound characteristics including the sound size, tone and time, and the request cannot be forged basically, so as to achieve the purpose of simple and effective authentication, therefore, the sound information to be verified and the sound information in the embodiment of the application are not limited to the content for verification, and the network where the network access equipment is located can be accessed only in order to achieve the purpose that the sound characteristics are the same within the recordable range at the same time, thereby avoiding the occurrence of an unsafe event that the network where the network access equipment is located can be accessed by pressing a key as long as the signal of the network access equipment is searched in the related technology no matter how far or near, and the network access system provided by the embodiment of the application avoids the possibility of forging the request through the verification method of the sound characteristics and the acquisition time, the security is improved, and under the condition that a plurality of user terminals are accessed to the network access equipment, the user terminals only need to trigger the voice information to be verified according to one voice information, and the network access equipment gradually compares the voice information to be verified, under the condition that the comparison results are consistent, the user terminal which sends the voice information to be verified is uniformly sent with the access response message carrying the access key, and finally the user terminal which sends the verification request according to the access key is uniformly verified, the user terminal which is successfully verified is accessed to the network where the network access equipment is positioned, the access efficiency when a plurality of user terminals are accessed to the network access equipment is improved, the process that each user terminal needs to be independently matched and verified with the network access equipment in the related technology is avoided, the security is improved, and meanwhile, the efficiency of the user terminal accessing the network where the network access equipment is located is improved.
Optionally, the user terminal 34 includes: a second communication module and a second processor, wherein the second communication module is configured to receive an access response message returned by the network access device 32; the second processor is used for analyzing the access response message and acquiring the access key carried in the access response message; the second communication module is further configured to send an authentication request according to the access key, where the authentication request is used to instruct the network access device 32 to access the user terminal 334 to the network where the network access device 34 is located. Specifically, on the user terminal 34 side, after receiving the access response message returned by the network access device 32 through the second communication module, the user terminal 34 analyzes the access response message through the second processor, obtains the access key carried in the access response message, sends the authentication request according to the access key through the second communication module, and accesses the network where the network access device 32 is located through the authentication request.
In summary, in the window period after wps is pressed by a plurality of user terminals, only any voice command needs to be simply sent, for example, "connect", "hello" and "feed", and then the mobile phone with the pressed button can be connected together as long as the mobile phone can hear the voice, so that the operation is simple, fast and safe.
Example 2
In this embodiment, a method for operating the system for network access is provided, and fig. 6 is a flowchart of a method for network access according to an embodiment of the present invention, as shown in fig. 6, the flowchart includes the following steps:
step S602, starting access verification by triggering a key;
step S604, collecting sound information and receiving sound information to be verified sent by a user terminal;
step S606, judging whether the sound information to be verified is the same as the collected sound information;
step S608, sending an access response message corresponding to the determination result to the user terminal according to the determination result.
Specifically, in the system for network access provided in embodiment 1, at the network access device side, the key in the embodiment of the present application is based on the wps technology, and starts access verification by triggering a route, or accessing a hotspot AP, or a key on a mobile terminal having a wireless hotspot function, which is different from the related art.
As can be seen from fig. 4, after the wps button is pressed, both sides enter a voice monitoring mode, and feature extraction is performed and time is recorded by monitoring voice features including the pitch of the voice and the size of the voice, quantizing them into sampled pcm data. The recorded terminal initiates a request, and sends the audio characteristic data acquired by the recorded terminal to the router, and the router judges whether the request is legal or not through data analysis and comparison. The terminal far away from the router can not obtain the same sound characteristics including the sound size, tone and time, and basically can not forge the request, thereby achieving the purpose of simple and effective authentication.
In the network access method provided by the embodiment of the application, access verification is started by triggering the key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the voice information to be verified is the same as the voice information or not; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
Optionally, the collecting the sound information in step S604 includes:
step1, judging whether the sound information collected at the first time point is larger than a preset collection threshold value;
step2, when the judgment result is yes, recording the sound information from the first time point, and when the sound information is smaller than the preset collection threshold, ending the recording.
Specifically, referring to fig. 7, fig. 7 is a schematic diagram of triggering and collecting voice information in a network access method according to an embodiment of the present invention, and as shown in fig. 7, two parts of operations for voice recognition are specifically as follows:
1. voice detection and collection:
and setting a mic sampling threshold, starting recording above the mic sampling threshold, and ending recording below the mic sampling threshold. And (4) within 1 second after the recording is finished, the terminal sends an instruction in the period, the AP terminal analyzes the instruction, and the AP exits the pairing period after the period.
2. The basic features of speech:
the voice can be expanded from frequency and time domains in two dimensions through an existing voice analysis algorithm, and the characteristics of the voice are presented in a graphical mode. Fig. 8 is a schematic diagram of sound characteristic comparison in the method of network access according to the embodiment of the present invention, as shown in fig. 8, the abscissa from left to right in fig. 8 is the time lapse direction, and the frequency is high and low from top to bottom, and the shorter the line indicates the greater the loudness. The frequency of the sound at any moment and the loudness of the various frequencies can be read through this figure. The patterns obtained by two starts are shown in the figure, the two patterns are basically matched from the aspect of the graph, and the sound characteristics acquired by the AP and the sound characteristics sent by the terminal are compared by using the existing software algorithm to obtain whether the results are similar or not.
Further, optionally, after the sound information is collected in step S604, the method for network access provided in the embodiment of the present application further includes:
step S605, converting the sound information from a preset first type information type to a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal;
step S607, acquiring the sound characteristics in the second sound information, wherein the sound characteristics at least include at least one of the following: tone, loudness, or volume level;
and step S609, recording the time and the sound characteristics of the collected sound information.
It should be noted that the second type of information in the embodiment of the present application may be Pulse Code Modulation (pcm) information, because the network access device in the embodiment of the present application collects voice information by collecting an analog signal, and quantizes the collected voice information into pcm information to extract voice features, that is, the pitch, loudness and volume of the voice.
Optionally, the receiving of the to-be-verified sound information sent by the user terminal in step S604 includes:
step1, after the collection of the voice information is finished, receiving the voice information to be verified sent by the user terminal within a preset verification time interval.
In the embodiment of the application, the preset verification time can be set to be 1 second, if the preset verification time exceeds the preset threshold, the receiving of the voice message to be verified is refused, and the voice message to be verified sent by the user terminal received within 1 second is used for comparing with the voice message collected by the network access equipment.
It should be noted that, the preset authentication time interval in the embodiment of the present application is only described with 1 second as an example, and is not limited specifically to the method for implementing the network access provided in the embodiment of the present application.
Further, optionally, the Step1, receiving the to-be-verified voice message sent by the user terminal, includes:
step A, receiving voice information to be verified sent by at least one user terminal.
Here, step a provided in the embodiment of the present application corresponds to fig. 5 in embodiment 1, that is, in a case where multiple user terminals access a network where the network access device is located, the network access device receives to-be-authenticated sound information sent by at least one user terminal.
Optionally, the step S606 of determining whether the sound information to be verified is the same as the collected sound information includes:
and Step1, judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information.
Further, optionally, the Step1, the determining whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information includes:
step A, matching the received voice information to be verified sent by at least one user terminal with the voice characteristics of the collected voice information one by one;
and step B, judging whether the voice information to be verified sent by at least one user terminal is the same as the voice characteristics of the collected voice information.
Specifically, corresponding to Step a in Step1 in Step S604, when multiple user terminals access the network in which the network access device is located, the network access device performs sound feature matching on the received to-be-verified sound information sent by each user terminal and the sound information collected by the network access device one by one, and determines whether the sound feature in the to-be-verified sound information sent by each user terminal is the same as the sound feature of the sound information.
Optionally, the step S608 of sending the access response message corresponding to the determination result to the user equipment according to the determination result includes:
step1, if the judgment result is yes, sending an access response message carrying the access key to the user terminal;
step2, if the judgment result is negative, sends an access response message for rejecting the access to the user terminal.
Further, optionally, the Step1 in the Step S608 of sending the access response message carrying the access key to the user terminal includes:
step A, sending an access response message carrying an access key to at least one user terminal.
In summary, in the process of authenticating multiple user terminals, referring to fig. 5, the method for network access provided in the embodiment of the present application specifically includes:
after many wps buttons are pressed, the equipment enters the voice monitoring mode, and after any voice command is sent, each equipment carries out feature extraction and records time by monitoring voice features, including the tone of the voice and the size of the voice, and quantizing the voice features into sampled pcm data. After the analysis of the station terminal is completed, a password request is sent to the AP, the characteristics and the time of the recorded sound are provided, and the AP judges whether the request is legal or not through data analysis and comparison.
After the AP receives the voice command, within a fixed time window (for example, 300 ms), for example, the obtained voice feature authentication requests are compared one by one and are authenticated, and according to an authentication result, a pass station can obtain a password issued by the AP, and then the station can immediately initiate an authentication connection flow using the password, which is concurrent, so that the speed and efficiency of connection are not affected by the number of terminals.
The terminal far away from the AP can not obtain the same sound characteristics including the sound size, tone and time, and basically can not forge the request, so the method is safe, can be accessed only by the near terminal and pressing the button, and is quick and safe.
It should be noted that, in the process of accessing multiple user terminals to the network access device, in the embodiment of the present application, to implement concurrent processing, each user terminal does not need to report the to-be-verified sound information of the respective user terminal separately, that is, in the process of collecting sound, as long as any user of each user terminal speaks or makes sound, as long as each user terminal collects the sound and uses the sound as the to-be-verified sound information, and at the network access device side, by verifying the to-be-verified sound information reported by each user terminal, a key (i.e., a password in fig. 4 and 5) is issued in a unified manner, so that the network access device concurrently processes the problem of accessing multiple user terminals.
Optionally, after sending, at Step1 in Step S608, an access response message carrying an access key to the user terminal, the method for network access provided in the embodiment of the present application further includes:
step3, receiving a verification request carrying an access key sent by a user terminal;
step4, verifying the verification request;
step5, in case of successful verification, the user terminal is accessed to the network.
It should be noted that, the network access method provided in the embodiment of the present application does not need to extract a preset access voice command, and only needs to compare the voice characteristics with the acquisition time of the voice acquired after the key is triggered, so that the data storage pressure and the data processing pressure of the network access device are reduced.
Example 3
In this embodiment, a method for operating the system for network access in embodiment 1 is provided, and fig. 9 is a flowchart of a method for network access according to an embodiment of the present invention, as shown in fig. 9, the flowchart includes the following steps:
step S902, starting an access request by triggering a key;
step S904, collecting the voice information to be verified, and sending the voice information to be verified to the network access equipment;
step S906, receiving an access response message returned by the network access equipment;
step S908, execute corresponding operations according to the access response message.
Specifically, corresponding to the user terminal in the network access system provided in embodiment 1, the user terminal in this embodiment may at least include: smart phones, tablet computers, handheld business, notebook computers and intelligent wearable devices. In the embodiment of the present application, a smart phone (hereinafter referred to as a mobile phone) is taken as an example for description, in the embodiment of the present application, after a key is pressed, a mobile phone collects sound information, that is, a user speaks or makes a sound at this time, the mobile phone collects the sound, and sends the sound as sound information to a network access device in a form of sound information to be verified, and after the network access device returns an access response message, corresponding operation is executed according to the access response message.
Wherein, the button in this application embodiment is the button that triggers wps connection.
In the network access method provided by the embodiment of the application, the access request is started by triggering the key; collecting sound information, and sending the sound information to network access equipment as sound information to be verified; receiving an access response message returned by the network access equipment; and executing corresponding operation according to the access response message. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
Optionally, the sending the to-be-verified sound information to the network access device in step S904 includes:
step1, extracting sound characteristics in the sound information to be verified, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level;
step2, converting the voice information to be verified from a preset first type of information type to a second type of information type according to the voice characteristics to obtain second converted voice information, wherein the first type of information type is an analog signal, and the second type of information type is a digital signal;
and Step3, sending the voice information to be verified to the network access equipment.
Specifically, corresponding to the process of processing the voice information by the network access device in embodiment 2, at the user terminal side, still taking a mobile phone as an example, the mobile phone collects voice by collecting an analog signal, and converts the analog signal into a digital signal, that is, in Step2 in this embodiment, the process of converting the first type of information into the second type of information is performed, where the second type of information is a pcm signal in this embodiment. And after the voice information is converted into a pcm signal, the converted voice information is used as the voice information to be verified and sent to the network access equipment.
Optionally, the step S908, performing corresponding operations according to the access response message includes:
step1, generating a verification request according to the access key under the condition that the access response message carries the access key, wherein the verification request is used for instructing the network access device to access the user terminal to the network where the network access device is located;
step2, sending an authentication request to the network access device.
Specifically, when the network access device is successfully authenticated, the access response message received by the user terminal carries an access key, that is, a password shown in fig. 4 and 5, and the user terminal generates an authentication request according to the password and sends the authentication request to the network access device, so that the network access device authenticates the authentication request and accesses the user terminal to the network where the network access device is located.
Through the above description of the embodiments, those skilled in the art can clearly understand that the method according to the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but the former is a better implementation mode in many cases. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
Example 4
In this embodiment, a device for network access is further provided, where the device is used to implement the foregoing embodiments and preferred embodiments, and details of the description already made are omitted. As used below, the term "module" may be a combination of software and/or hardware that implements a predetermined function. Although the means described in the embodiments below are preferably implemented in software, an implementation in hardware, or a combination of software and hardware is also possible and contemplated.
Fig. 10 is a block diagram of a network access apparatus according to an embodiment of the present invention, and on a network access device side, as shown in fig. 10, the apparatus includes:
a verification start module 1002, configured to start access verification by triggering a key;
the acquisition module 1004 is used for acquiring voice information and receiving voice information to be verified sent by the user terminal;
the judging module 1006 is configured to judge whether the sound information to be verified is the same as the collected sound information;
a sending module 1008, configured to send an access response message corresponding to the determination result to the user terminal according to the determination result.
In the network access device provided by the embodiment of the application, access verification is started by triggering the key; collecting sound information and receiving sound information to be verified sent by a user terminal; judging whether the voice information to be verified is the same as the voice information or not; and sending an access response message corresponding to the judgment result to the user terminal according to the judgment result. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
Example 5
Fig. 11 is a block diagram of a network access apparatus according to an embodiment of the present invention, and on a user terminal side, as shown in fig. 11, the apparatus includes:
an access starting module 1102, configured to start an access request by triggering a key;
the information acquisition module 1104 is configured to acquire sound information to be verified and send the sound information to be verified to the network access device;
a receiving module 1106, configured to receive an access response message returned by the network access device;
the message response module 1108 is configured to execute a corresponding operation according to the access response message.
In the network access device provided by the embodiment of the application, the access request is started by the trigger key; collecting sound information, and sending the sound information to network access equipment as sound information to be verified; receiving an access response message returned by the network access equipment; and executing corresponding operation according to the access response message. Therefore, the safety problem existing in the process of accessing the network access equipment into the user terminal in the wps technology can be solved, and the effect of safely accessing the user terminal by the network access equipment is achieved.
It should be noted that, the above modules may be implemented by software or hardware, and for the latter, the following may be implemented, but not limited to: the modules are all positioned in the same processor; alternatively, the modules are respectively located in different processors in any combination.
Example 6
The embodiment of the invention also provides a storage medium. Alternatively, in the present embodiment, the storage medium may be configured to store program codes for performing the following steps:
s1, starting access verification by triggering a key;
s2, collecting voice information, and receiving the voice information to be verified sent by the user terminal;
s3, judging whether the sound information to be verified is the same as the collected sound information;
and S4, sending an access response message corresponding to the judgment result to the user terminal according to the judgment result.
Optionally, the storage medium is further arranged to store program code for performing the steps of:
s1, judging whether the sound information collected at the first time point is larger than a preset collection threshold value;
and S2, when the judgment result is yes, starting recording the sound information from the first time point, and when the sound information is smaller than a preset acquisition threshold value, ending recording.
Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Optionally, in this embodiment, after the processor executes, according to the program code stored in the storage medium, after acquiring the sound information, the method for network access provided in this embodiment further includes: converting the sound information from a preset first type information type into a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal; acquiring sound characteristics in the second sound information, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level; and recording the time and the sound characteristics of the collected sound information.
Optionally, in this embodiment, the executing, by the processor, according to the program code stored in the storage medium, the receiving of the to-be-authenticated sound information sent by the user terminal includes: and after the collection of the voice information is finished, receiving the voice information to be verified sent by the user terminal within a preset verification time interval.
Optionally, in this embodiment, the executing, by the processor, according to the program code stored in the storage medium, the receiving of the to-be-authenticated sound information sent by the user terminal includes: and receiving the voice information to be verified sent by at least one user terminal.
Optionally, in this embodiment, the processor executing, according to the program code stored in the storage medium, the judgment whether the sound information to be verified is the same as the collected sound information includes: and judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information.
Optionally, in this embodiment, the processor, according to the program code stored in the storage medium, executing the determining whether the sound feature in the sound information to be verified is the same as the sound feature of the collected sound information includes: matching the received voice information to be verified sent by at least one user terminal with the voice characteristics of the collected voice information one by one; and judging whether the sound information to be verified sent by at least one user terminal is the same as the sound characteristics of the collected sound information.
Optionally, in this embodiment, the executing, by the processor according to the program code stored in the storage medium, the sending, to the ue, the access response message corresponding to the determination result according to the determination result includes: if the judgment result is yes, sending an access response message carrying an access key to the user terminal; and under the condition that the judgment result is negative, sending an access response message for rejecting the access to the user terminal.
Optionally, in this embodiment, the executing, by the processor according to the program code stored in the storage medium, the sending the access response message carrying the access key to the user terminal includes: and sending an access response message carrying the access key to at least one user terminal.
Optionally, in this embodiment, after the processor executes, according to the program code stored in the storage medium, to send an access response message carrying an access key to the user terminal, the method for network access provided in this embodiment of the present application further includes: receiving an authentication request carrying an access key sent by a user terminal; verifying the verification request; and in case of successful verification, accessing the user terminal into the network.
Optionally, the specific examples in this embodiment may refer to the examples described in the above embodiments and optional implementation manners, and this embodiment is not described herein again.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and alternatively, they may be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, and in some cases, the steps shown or described may be performed in an order different than that described herein, or they may be separately fabricated into individual integrated circuit modules, or multiple ones of them may be fabricated into a single integrated circuit module. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (26)

1. A system for network access, comprising:
the network access equipment is used for starting access verification through triggering of a key, receiving to-be-verified sound information sent by a user terminal, judging whether the to-be-verified sound information is the same as sound information collected by the network access equipment when the to-be-verified sound information is received, and sending a corresponding access response message according to a judgment result;
the user terminal is used for starting an access request by triggering a key at the same time point with the network access equipment, acquiring the sound information to be verified, sending the sound information to be verified to the network access equipment, receiving the access response message returned by the network access equipment, and executing corresponding operation according to the access response message;
wherein, judging whether the voice information to be verified is the same as the voice information collected by the network access device when receiving the voice information to be verified includes: and judging whether the acquisition time of the voice information to be verified is the same as the acquisition time of the voice information acquired by the network access equipment when the voice information to be verified is received.
2. The system of claim 1, wherein the network access device comprises: a first communication module and a first processor, wherein,
the first communication module is used for receiving the voice information to be verified sent by the user terminal;
the first processor is connected with the first communication module and used for judging whether the voice information to be verified is the same as the voice information collected when the voice information to be verified is received;
the first communication module is further configured to send the access response message carrying the access key if the determination result is yes;
the first processor is further configured to receive an authentication request sent by the user terminal according to the access key, and access the user terminal to a network if authentication is successful.
3. The system of claim 2,
the first communication module is further configured to receive the to-be-verified sound information sent by at least one user terminal;
the first processor is further configured to determine whether the received voice information to be verified is the same as the voice information collected when the voice information to be verified is received;
the first communication module is further configured to send the access response message carrying an access key to at least one user terminal if the determination result is yes;
the first processor is further configured to receive an authentication request sent by at least one user terminal according to the access key, and access the at least one user terminal to a network if authentication is successful.
4. The system according to claim 2, wherein the user terminal comprises: a second communication module and a second processor, wherein,
the second communication module is configured to receive the access response message returned by the network access device;
the second processor is configured to parse the access response message, and acquire an access key carried in the access response message;
the second communication module is further configured to send an authentication request according to the access key, where the authentication request is used to instruct the network access device to access the user terminal to a network where the network access device is located.
5. A method of network access, comprising:
starting access verification by triggering a key;
collecting sound information and receiving sound information to be verified sent by a user terminal;
judging whether the sound information to be verified is the same as the collected sound information;
sending an access response message corresponding to the judgment result to the user terminal according to the judgment result;
wherein, judging whether the sound information to be verified is the same as the collected sound information comprises: and judging whether the acquisition time of the sound information to be verified is the same as the acquisition time of the acquired sound information.
6. The method of claim 5, wherein the collecting sound information comprises:
judging whether the sound information collected at the first time point is greater than a preset collection threshold value or not;
and if so, starting to record the sound information from the first time point, and ending recording when the sound information is smaller than the preset acquisition threshold.
7. The method of claim 5 or 6, wherein after said collecting sound information, the method further comprises:
converting the sound information from a preset first type information type into a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal;
acquiring sound characteristics in the second sound information, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level;
and recording the time for acquiring the sound information and the sound characteristics.
8. The method of claim 6, wherein the receiving the voice information to be verified sent by the user terminal comprises:
and after the voice information collection is finished, receiving the voice information to be verified sent by the user terminal within a preset verification time interval.
9. The method of claim 8, wherein the receiving the voice information to be verified sent by the user terminal comprises:
and receiving the voice information to be verified sent by at least one user terminal.
10. The method of claim 7, wherein the determining whether the voice information to be verified is the same as the collected voice information comprises:
and judging whether the sound characteristics in the sound information to be verified are the same as the sound characteristics of the collected sound information.
11. The method of claim 10, wherein the determining whether the sound feature of the sound information to be verified is the same as the sound feature of the collected sound information comprises:
matching the sound information to be verified sent by at least one received user terminal with the sound characteristics of the collected sound information one by one;
and judging whether the sound information to be verified sent by at least one user terminal is the same as the sound characteristics of the collected sound information.
12. The method according to claim 5 or 10, wherein said sending an access response message corresponding to the determination result to the ue according to the determination result comprises:
if the judgment result is yes, sending the access response message carrying the access key to the user terminal;
and under the condition that the judgment result is negative, sending the access response message for rejecting the access to the user terminal.
13. The method of claim 12, wherein the sending the access response message carrying an access key to the ue comprises:
and sending the access response message carrying the access key to at least one user terminal.
14. The method of claim 12, wherein after the sending the access response message carrying the access key to the user terminal, the method further comprises:
receiving an authentication request carrying the access key sent by the user terminal;
verifying the verification request;
and if the verification is successful, accessing the user terminal into a network.
15. A method of network access, comprising:
starting an access request by triggering a key;
collecting sound information to be verified, and sending the sound information to be verified to network access equipment;
receiving an access response message returned by the network access equipment;
executing corresponding operation according to the access response message;
the accessing response message is sent according to a determination result, where determining, by the network access device, whether the sound information to be verified is the same as the sound information collected by the network access device when the sound information to be verified is received, where determining whether the sound information to be verified is the same as the sound information collected by the network access device when the sound information to be verified is received includes: and judging whether the acquisition time of the voice information to be verified is the same as the acquisition time of the voice information acquired by the network access equipment when the voice information to be verified is received.
16. The method of claim 15, wherein sending the voice message to be authenticated to a network access device comprises:
extracting sound features in the sound information to be verified, wherein the sound features at least comprise at least one of the following: tone, loudness, or volume level;
converting the voice information to be verified from a preset first type information type to a second type information type according to the voice characteristics to obtain converted second voice information, wherein the first type information type is an analog signal, and the second type information type is a digital signal;
and sending the voice information to be verified to the network access equipment.
17. The method of claim 15, wherein the performing the corresponding operation according to the access response message comprises:
under the condition that the access response message carries an access key, generating an authentication request according to the access key, wherein the authentication request is used for indicating the network access equipment to access a user terminal to a network where the network access equipment is located;
sending the authentication request to the network access device.
18. An apparatus for network access, comprising:
the verification starting module is used for starting access verification by triggering a key;
the acquisition module is used for acquiring voice information and receiving the voice information to be verified sent by the user terminal;
the judging module is used for judging whether the sound information to be verified is the same as the collected sound information or not;
a sending module, configured to send an access response message corresponding to the determination result to the user terminal according to the determination result;
the judging module is used for judging whether the sound information to be verified is the same as the collected sound information or not in the following mode: and judging whether the acquisition time of the sound information to be verified is the same as the acquisition time of the acquired sound information.
19. An apparatus for network access, comprising:
the access starting module is used for starting an access request by triggering a key;
the information acquisition module is used for acquiring the voice information to be verified and sending the voice information to be verified to the network access equipment;
a receiving module, configured to receive an access response message returned by the network access device;
the message response module is used for executing corresponding operation according to the access response message;
the accessing response message is sent according to a determination result, where determining, by the network access device, whether the sound information to be verified is the same as the sound information collected by the network access device when the sound information to be verified is received, where determining whether the sound information to be verified is the same as the sound information collected by the network access device when the sound information to be verified is received includes: and judging whether the acquisition time of the voice information to be verified is the same as the acquisition time of the voice information acquired by the network access equipment when the voice information to be verified is received.
20. A method of network access, comprising:
starting access verification by triggering a key;
collecting sound information and receiving a plurality of pieces of sound information to be verified sent by a plurality of user terminals;
judging whether the plurality of pieces of sound information to be verified are respectively the same as the collected sound information;
sending an access response message corresponding to the judgment result to the plurality of user terminals according to the judgment result;
wherein the determining whether the plurality of pieces of sound information to be verified are respectively the same as the collected sound information includes: and judging whether the acquisition time of the sound information to be verified is the same as the acquisition time of the acquired sound information.
21. The method of claim 20, wherein the collecting voice information comprises:
judging whether the sound information collected at the first time point is greater than a preset collection threshold value or not;
and if so, starting to record the sound information from the first time point, and ending recording when the sound information is smaller than the preset acquisition threshold.
22. The method of claim 20 or 21, wherein after said collecting voice information, the method further comprises:
converting the sound information from a preset first type information type into a second type information type to obtain second converted sound information, wherein the first type information type is an analog signal, and the second type information type is a digital signal;
acquiring sound characteristics in the second sound information, wherein the sound characteristics at least comprise at least one of the following: tone, loudness, or volume level;
and recording the time for acquiring the sound information and the sound characteristics.
23. The method of claim 21, wherein the receiving the plurality of voice information to be verified sent by the plurality of user terminals comprises:
and after the voice information collection is finished, receiving the voice information to be verified sent by the user terminals within a preset verification time interval.
24. The method of claim 22, wherein the determining whether the sound information to be verified is respectively the same as the collected sound information comprises:
and judging whether a plurality of sound characteristics in the sound information to be verified are respectively the same as the sound characteristics of the collected sound information.
25. The method according to claim 20 or 24, wherein said sending the access response message corresponding to the determination result to the plurality of ues according to the determination result comprises:
if the judgment result is yes, sending the access response message carrying the access key to the user terminal corresponding to the to-be-verified sound information which is the same as the acquired sound information;
and under the condition that the judgment result is negative, sending the access response message for refusing access to the user terminal corresponding to the voice information to be verified, which is different from the acquired voice information.
26. The method of claim 25, wherein after sending the access response message carrying an access key to a user terminal corresponding to the to-be-verified voice information that is the same as the collected voice information, the method further comprises:
receiving a verification request carrying the access key and sent by a user terminal corresponding to the to-be-verified sound information which is the same as the collected sound information;
verifying the verification request;
and under the condition of successful verification, accessing the user terminal corresponding to the to-be-verified voice information which is the same as the acquired voice information into a network.
CN201610820698.0A 2016-09-12 2016-09-12 Network access method, device and system Active CN107820251B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610820698.0A CN107820251B (en) 2016-09-12 2016-09-12 Network access method, device and system
PCT/CN2017/000061 WO2018045692A1 (en) 2016-09-12 2017-01-03 Method, apparatus, and system for network access

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610820698.0A CN107820251B (en) 2016-09-12 2016-09-12 Network access method, device and system

Publications (2)

Publication Number Publication Date
CN107820251A CN107820251A (en) 2018-03-20
CN107820251B true CN107820251B (en) 2021-09-03

Family

ID=61561693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610820698.0A Active CN107820251B (en) 2016-09-12 2016-09-12 Network access method, device and system

Country Status (2)

Country Link
CN (1) CN107820251B (en)
WO (1) WO2018045692A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112637846B (en) * 2020-12-24 2022-12-30 青岛海尔科技有限公司 Hotspot connection method and device
CN113596835A (en) * 2021-06-25 2021-11-02 青岛海尔科技有限公司 Network connection method, device, storage medium and electronic device
CN115150833A (en) * 2022-09-05 2022-10-04 北京珞安科技有限责任公司 Network access control system and method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700839A (en) * 2015-02-26 2015-06-10 深圳市中兴移动通信有限公司 Method and device for collecting multichannel sound, cellphone and system

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284332A (en) * 2014-09-26 2015-01-14 中兴通讯股份有限公司 Authentication method and wireless router
CN104408345A (en) * 2014-11-21 2015-03-11 中国联合网络通信集团有限公司 Method and device for checking identity and server
CN104618391B (en) * 2015-02-25 2020-04-24 联想(北京)有限公司 Access control method and electronic equipment
CN104869497B (en) * 2015-03-24 2018-12-11 广东欧珀移动通信有限公司 A kind of the wireless network setting method and device of WIFI speaker
CN105304088B (en) * 2015-11-10 2020-02-14 华为技术有限公司 Method and device for controlling access

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104700839A (en) * 2015-02-26 2015-06-10 深圳市中兴移动通信有限公司 Method and device for collecting multichannel sound, cellphone and system

Also Published As

Publication number Publication date
WO2018045692A1 (en) 2018-03-15
CN107820251A (en) 2018-03-20

Similar Documents

Publication Publication Date Title
US10462130B2 (en) Authentication method and device
CN103236094B (en) Gate control system and the method with mobile terminal unblock access control equipment
US20190149987A1 (en) Secondary device setup
CN104159228B (en) The method and system that a kind of Wi Fi show and connected
CN110474879B (en) Identity recognition preprocessing method, identity recognition method, and equipment and system thereof
CN107820251B (en) Network access method, device and system
CN107533598B (en) Input method and device of login password of application program and terminal
KR102179085B1 (en) Non-contact based user authentification method
CN104869497A (en) Wireless network setting method and apparatus of WIFI sound box
WO2015032196A1 (en) Method for mobile network to automatically establish connection, and terminal
CN104754469A (en) Automatic starting pairing method and device for wireless microphone
WO2016134587A1 (en) Wifi connection verification method, wifi hotspot device and terminal
CN105704602A (en) Intelligent configuration method, device and earphone
CN104253818A (en) Server and terminal authentication method, server, terminal
CN110636485A (en) Bluetooth automatic connection method and method for initiating Bluetooth connection
KR102351491B1 (en) Security management system using user mobile terminal and method thereof
CN105873047A (en) Wireless local area network user authentication method and system, and terminal device
CN112235612A (en) Multi-user multi-terminal breakpoint continuous playing method, device, equipment and medium
CN107172620B (en) Wireless local area network authentication method and device
US20180039767A1 (en) Voiceprint-recognition-based security protection method and device
CN104010060A (en) Method and electronic device for recognizing identity of incoming caller
CN109040050B (en) Data interaction method and related product
CN114915439A (en) E-commerce platform identity verification method and device, electronic equipment and storage medium
EP3059731B1 (en) Method and apparatus for automatically sending multimedia file, mobile terminal, and storage medium
US20170230929A1 (en) Terminal, server, and user identification system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant