CN108419236A - A kind of method for connecting network and equipment - Google Patents

A kind of method for connecting network and equipment Download PDF

Info

Publication number
CN108419236A
CN108419236A CN201810121229.9A CN201810121229A CN108419236A CN 108419236 A CN108419236 A CN 108419236A CN 201810121229 A CN201810121229 A CN 201810121229A CN 108419236 A CN108419236 A CN 108419236A
Authority
CN
China
Prior art keywords
message
hot spot
router
door lock
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810121229.9A
Other languages
Chinese (zh)
Other versions
CN108419236B (en
Inventor
彭磊
宋德超
陈道远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201810121229.9A priority Critical patent/CN108419236B/en
Publication of CN108419236A publication Critical patent/CN108419236A/en
Application granted granted Critical
Publication of CN108419236B publication Critical patent/CN108419236B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Abstract

This application involves a kind of method for connecting network and equipment, solve problem of data safety existing for home network.This method includes:Receive the encrypted message from the first user;According to the encrypted message, determine that first user is temporary visitor;First message is sent to router, the first message carrying includes the log-on message of the encrypted message, wherein, the first message is used to indicate the first hot spot that the router creates Wi Fi, and using the log-on message as the log-on message of first hot spot, first hot spot passes through the Wi Fi connections for first user.

Description

A kind of method for connecting network and equipment
Technical field
This application involves field of communication technology, more particularly to a kind of method for connecting network and equipment.
Background technology
Currently, user is typically to be configured in advance to the router of home-network linkups, created by router wireless Fidelity (Wireless-Fidelity, Wi-Fi) hot spot so that user can use mobile terminal device to connect Wi-Fi Hotspot, To carry out data access.And when there is visitor's arrival, if visitor needs to connect network, usual way is to connect kinsfolk The account and password of the Wi-Fi Hotspot connect inform visitor so that visitor is also connected to the Wi-Fi Hotspot.
As it can be seen that according to current mode, visitor and kinsfolk are attached to the same Wi-Fi Hotspot.And family at The Wi-Fi Hotspot that member accesses may provide some privacy webpages, such as kinsfolk wishes to maintain secrecy to certain webpages, only Allow kinsfolk to access, then webpage can be configured so that the Wi-Fi that such webpage can only be connected by kinsfolk Hot spot accesses, and visitor and kinsfolk may be connected to the same Wi-Fi Hotspot, then visitor can also pass through the Wi-Fi Hot spot accesses to these webpages, and leading to home network, there are potential safety problems.
Invention content
The embodiment of the present application provides a kind of method for connecting network, to improve the safety of home network.
In a first aspect, a kind of method for connecting network is provided, including:
Receive the encrypted message from the first user;
According to the encrypted message, determine that first user is temporary visitor;
First message is sent to router, the first message carrying includes the log-on message of the encrypted message, wherein The first message is used to indicate the first hot spot that the router creates Wi-Fi, and using the log-on message as described the The log-on message of one hot spot, first hot spot pass through the Wi-Fi connection for first user.
Optionally, after determining that first user is temporary visitor, further include:
Determine that intelligent door lock is opened, to allow first user to enter.
Optionally, the method further includes:
After closing the intelligent door lock, the operation for opening the intelligent door lock is received, determines the intelligent door lock It is again turned on;
Second message is sent to the router, the second message is used to indicate the router and has detected whether equipment Connect first hot spot.
Second aspect provides a kind of control method of Wi-Fi Hotspot, including:
Router receives the second message from intelligent door lock;
The router detects whether that equipment connects the first heat of the router according to the instruction of the second message Point;
In the case where determining that no equipment connects first hot spot, first hot spot is closed.
Optionally, the method further includes:
The router receives the first message from intelligent door lock, and the first message carries log-on message;
The router creates first hot spot, and believes using the log-on message as the login of first hot spot Breath.
The third aspect provides a kind of intelligent door lock, including:
Transmit-Receive Unit, for receiving the encrypted message from the first user;
Processing unit, for according to the encrypted message, determining that first user is temporary visitor;
The Transmit-Receive Unit is additionally operable to send first message to router, and the first message carrying includes the password The log-on message of information, wherein the first message is used to indicate the first hot spot that the router creates Wi-Fi, and with institute Log-on message of the log-on message as first hot spot is stated, first hot spot passes through the Wi- for first user Fi connections.
Optionally, the processing unit is additionally operable to determine that intelligent door lock is opened, to allow first user to enter.
Optionally, the Transmit-Receive Unit is additionally operable to after closing the intelligent door lock, is received for opening the intelligent door The operation of lock determines that the intelligent door lock is again turned on;
The Transmit-Receive Unit is additionally operable to send second message to the router, and the second message is used to indicate described Router has detected whether that equipment connects first hot spot.
Fourth aspect provides a kind of router, including:
Transmit-Receive Unit, for receiving the second message from intelligent door lock;
Processing unit, for according to the instruction of the second message, detecting whether that equipment connects the of the router One hot spot;
The processing unit is additionally operable in the case where determining that no equipment connects first hot spot, closes described the One hot spot.
Optionally, the Transmit-Receive Unit is additionally operable to receive the first message from intelligent door lock, and the first message carries Log-on message;
The processing unit is additionally operable to create first hot spot, and using the log-on message as first hot spot Log-on message.
In the embodiment of the present application, if it is determined that the first user is temporary visitor, it indicates that router creates the first hot spot, the One hot spot is interim hot spot, and the first user may be connected to the first hot spot, without being connected to same hot spot with kinsfolk, and face When visitor when being accessed by the first hot spot, can not may just access can only be connected by kinsfolk set by kinsfolk The secrecy webpage that hot spot accesses, to improve the safety of home network.
Description of the drawings
Fig. 1 is a kind of flow chart of method for connecting network provided by the embodiments of the present application;
Fig. 2 is a kind of schematic diagram of intelligent door lock provided by the embodiments of the present application;
Fig. 3 is a kind of structural schematic diagram of router provided by the embodiments of the present application.
Specific implementation mode
In order to keep the purpose, technical scheme and advantage of the embodiment of the present application clearer, below in conjunction with attached drawing to this Shen Please embodiment be described in further detail.
The embodiment of the present application is described mainly in combination with intelligent door lock and two aspect of router, and intelligent door lock and router all may be used To be arranged in user family.Wherein, intelligent door lock is in access control system for the intelligent execution unit locked a door, and intelligent door lock can be with It is opened by password, the type of password includes at least one in face information, character information, finger print information and acoustic information Kind.The password of intelligent door lock can be arranged in kinsfolk so that the password that intelligent door lock can only be arranged according to kinsfolk is opened. When intelligent door lock receives encrypted message input by user, the encrypted message of reception can be verified to determine user identity, Authentication allows user to enter after passing through.
Router is a kind of device that can support that the network connection of LAN subscriber is shared, is permitted by way of creating hot spot Family allowable connects hot spot by terminal device, so that terminal device, which is added in LAN, carries out data access.
As shown in Figure 1, the embodiment of the present application provides a kind of method for connecting network, the flow of this method is described below.
Step 101, intelligent door lock receive the encrypted message from the first user.
In the embodiment of the present application, when there is temporary visitor arrival, kinsfolk can first inform temporary visitor intelligent door lock Encrypted message, by allow temporary visitor by inputting encrypted message to intelligent door lock in a manner of enter room.And visitor is made Encrypted message can be different with the common encrypted message for opening intelligent door lock that kinsfolk uses, visit The encrypted message that visitor uses is, for example, temporary password information, is served only for temporary visitor use.For example, the encrypted message that visitor uses It is intelligent door lock Administrator, intelligent door lock administrator is, for example, the arbitrary family that password setting can be carried out to intelligent door lock Front yard member, intelligent door lock can generate a temporary password information according to the setting of intelligent door lock administrator, for example, intelligent door lock administrator Inputting the temporary password information to the cipher inputting keyboard of intelligent door lock, then intelligent door lock stores the temporary password information, alternatively, Intelligent door lock administrator is communicated by the wireless communication module of terminal device with intelligent door lock, such as is transmitted to intelligent door lock Temporary password information, then intelligent door lock store the temporary password information.After intelligent door lock obtains temporary password information, if really Surely it is the temporary password information to have encrypted message input by user, then intelligent door lock can be opened.
Step 102, intelligent door lock determine that first user is temporary visitor according to the encrypted message.
Such as intelligent door lock receives the encrypted message from the first user, verifies the encrypted message of reception, if verification is true Surely the encrypted message received is common encrypted message, then shows that the first user is kinsfolk, and if verification determines reception Encrypted message is temporary password information, then shows that the first user is temporary visitor.
Step 103, intelligent door lock send first message to router, then router receives first message, wherein described the The carrying of one message includes the log-on message of the encrypted message, and the first message is used to indicate the router and creates Wi-Fi The first hot spot, and using the log-on message as the log-on message of first hot spot, first hot spot is for described the One user passes through the Wi-Fi connection.
If the first user is kinsfolk, intelligent door lock need to only execute the operation of unlatching, and if the first user is to face When visitor, intelligent door lock execute opening operation to allow the first user to enter while, can also to router send first Message, first message may indicate that router creates the first hot spot and used to temporary visitor.
Step 104, router create the first hot spot according to first message, and using the log-on message as described first The log-on message of hot spot.
Router can create the first hot spot after receiving first message.Optionally, first message carries log-on message, logs in The temporary password information that information is for example inputted including the first user connects the first hot spot, router for the ease of the first user The temporary password information can be directly disposed as to the login password of the first hot spot, then temporary visitor is opened in input temporary password information It opens intelligent door lock to enter after room, the temporary password information can be continuing with as login password to connect the first hot spot, from And wireless network is accessed by the first hot spot.It is relatively simple without remembering other passwords for the first user.
And router other than the login password of the first hot spot is arranged, also needs the first heat of setting when creating the first hot spot The login account of point.
For example, intelligent door lock can generate temporary account, intelligent door lock at random after determining that the first user is temporary visitor In sending the log-on message entrained by first message to router, other than including temporary password information, can also include The temporary account, then for router after receiving first message, this for directly including by the log-on message that first message carries is interim Account is set as the login account of the first hot spot, and sets the temporary password information that log-on message includes to the first hot spot Login password no longer needs to that other login accounts are additionally arranged for router, reduces the realization difficulty of router.
Alternatively, after receiving first message, facing for the first hot spot can be automatically generated when creating the first hot spot for router When account, be exactly the login account of the first hot spot by the temporary account.
Wherein, wireless communication module, the communication that wireless communication module is supported can be set in intelligent door lock and router Agreement is, for example, Wi-Fi, or can be other short-range communication protocols, then intelligent door lock and router can pass through channel radio Module is believed to be communicated.
It is described below how the first user carries out network connection after intelligent door lock is opened with entrance family.
If the first user is kinsfolk, the kinsfolk in the embodiment of the present application is stepping on for the hot spot of known Wi-Fi Record the user of account and login password, therefore the first user is after entering room, can be searched for by terminal device known to The hot spot login account of Wi-Fi, then connects the hot spot of Wi-Fi, thereby using family by login password known to input Network carries out data access, this known login password and previously mentioned common encrypted message may be the same or different. That is, for kinsfolk, the password of the hot spot for logging in Wi-Fi and password for opening intelligent door lock can phases Together, it can also be different, the embodiment of the present application is not restricted;
If the first user is temporary visitor, the first user passes through the first heat of terminal device search after entering room The temporary login account of point, such as it is " casual user " that the first user, which searches temporary login account, then the first user can lead to Input is crossed for opening the temporary password information of intelligent door lock to connect the first hot spot, thereby using the wireless network of the first hot spot To carry out data access.It is exactly to use for logging in the password of the first hot spot of Wi-Fi that is, for temporary visitor In the temporary password for opening intelligent door lock.
In the embodiment of the present application, temporary visitor is in addition to including the first user, it is also possible to including multiple users, such as One user enters after family, and also user accesses to family as temporary visitor request, that is to say, that intelligent door lock exists After encrypted message of the reception from the first user, it is also possible to receive the encrypted message from second user.So, second user The encrypted message of input can be identical with the first encrypted message input by user, i.e., what kinsfolk informed temporary visitor can To be the same encrypted message, all visitors input when carrying out home visiting is all the same encrypted message, to open Intelligent door lock.
And intelligent door lock instruction router create the first hot spot after, if receiving the password from second user again Information, and determine that the encrypted message of second user input is also temporary password information, then intelligent door lock is in addition to executing opening operation So that second user is entered except room, first message can also be sent to router again, is used to indicate router and creates the first heat Point.And router is after receiving first message, if having created the first hot spot, router, which no longer needs to execute, creates the first heat The operation of point.And second user enters the mode of the first hot spot of connection after room, and the side of the first hot spot is connect with the first user Formula is identical, not described here any more.
It is noted that step 104 is optional step, it is not necessary to execution.
Step 105, intelligent door lock send second message to the router, then router receives second message, and described the Two message are used to indicate the router and have detected whether that equipment connects first hot spot.
For example, intelligent door lock allows the first user to enter room after determining that the first user is temporary visitor, used first After family enters, intelligent door lock is closed.Later, if intelligent door lock receives the operation for opening intelligent door lock again, Intelligent door lock is again turned on, and before receiving this opening operation, intelligent door lock does not receive encrypted message, it can thus be assumed that this Opening operation is the use for the operation of intelligent door lock being opened inside room, that is, have user to withdraw from a room, and withdraw from a room Family is likely to be visitor.Therefore, if intelligent door lock is again turned on, second message, second message can be sent to router It may be used to indicate router and detected whether that equipment connects the first hot spot.
Step 106, router detect whether that equipment connects the first hot spot of the router according to second message.
Step 107, router determine that no equipment connects first hot spot, close first hot spot.
Router has detected whether that equipment connects the first hot spot, if it is determined that have equipment company after receiving second message Connecing the first hot spot, then router can continue to keep the first hot spot, and if it is determined that without equipment the first hot spot of connection, show own Visitor all left, the first hot spot does not have user's use at this time, and in order to save Internet resources, router can close the first heat Point.That is, in the embodiment of the present application, router can also close the first hot spot other than creating the first hot spot.
In addition, after router closes the first hot spot, intelligent door lock receives the encrypted message of user and determines the use again Family is temporary visitor, and first message is sent to router, and instruction router creates hot spot, after router receives first message, because To have created the first hot spot before, therefore router need to only reopen the first hot spot, new without re-creating Hot spot reduces the workload of router.
Based on above-described embodiment, as shown in fig.2, the embodiment of the present application provides a kind of intelligent door lock, the intelligent door lock packet Include Transmit-Receive Unit 21, processing unit 22.
Transmit-Receive Unit 21, for receiving the encrypted message from the first user;
Processing unit 22, for according to the encrypted message, determining that first user is temporary visitor;
The Transmit-Receive Unit 21 is additionally operable to send first message to router, and the first message carrying includes described close The log-on message of code information, wherein the first message is used to indicate the first hot spot that the router creates Wi-Fi, and with Log-on message of the log-on message as first hot spot, first hot spot pass through described for first user Wi-Fi connection.
Optionally, the processing unit 22 is additionally operable to determine that intelligent door lock is opened, to allow first user to enter.
Optionally, the Transmit-Receive Unit 21 is additionally operable to after closing the intelligent door lock, is received for opening the intelligence The operation of door lock determines that the intelligent door lock is again turned on;
The Transmit-Receive Unit 21 is additionally operable to send second message to the router, and the second message is used to indicate institute It states router and has detected whether that equipment connects first hot spot.
Based on above-described embodiment, as shown in fig.3, the embodiment of the present application provides a kind of router, which includes receiving Bill member 31, processing unit 32.
Wherein, Transmit-Receive Unit 31, for receiving the second message from intelligent door lock;
Processing unit 32 detects whether that equipment connects the router for the instruction according to the second message First hot spot;
The processing unit 32 is additionally operable in the case where determining that no equipment connects first hot spot, described in closing First hot spot.
Optionally, the Transmit-Receive Unit 31 is additionally operable to receive the first message from intelligent door lock, and the first message is taken Band log-on message;
The processing unit 32 is additionally operable to create first hot spot, and using the log-on message as first heat The log-on message of point.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, the application can be used in one or more wherein include computer usable program code computer The computer program production implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
Although the preferred embodiment of the application has been described, created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the application range.
Obviously, those skilled in the art can carry out the embodiment of the present application various modification and variations without departing from this Shen Please embodiment spirit and scope.In this way, if these modifications and variations of the embodiment of the present application belong to the application claim And its within the scope of equivalent technologies, then the application is also intended to include these modifications and variations.

Claims (10)

1. a kind of method for connecting network, which is characterized in that including:
Receive the encrypted message from the first user;
According to the encrypted message, determine that first user is temporary visitor;
First message is sent to router, the first message carrying includes the log-on message of the encrypted message, wherein described First message is used to indicate the first hot spot that the router creates Wireless Fidelity Wi-Fi, and using the log-on message as institute The log-on message of the first hot spot is stated, first hot spot passes through the Wi-Fi connection for first user.
2. the method as described in claim 1, which is characterized in that after determining that first user is temporary visitor, also wrap It includes:
Determine that intelligent door lock is opened, to allow first user to enter.
3. method as claimed in claim 2, which is characterized in that the method further includes:
After closing the intelligent door lock, the operation for opening the intelligent door lock is received, determines the intelligent door lock again It opens;
Second message is sent to the router, the second message is used to indicate the router and has detected whether equipment connection First hot spot.
4. a kind of control method of Wireless Fidelity Wi-Fi Hotspot, which is characterized in that including:
Router receives the second message from intelligent door lock;
The router detects whether that equipment connects the first hot spot of the router according to the instruction of the second message;
In the case where determining that no equipment connects first hot spot, first hot spot is closed.
5. method as claimed in claim 4, which is characterized in that the method further includes:
The router receives the first message from intelligent door lock, and the first message carries log-on message;
The router creates first hot spot, and using the log-on message as the log-on message of first hot spot.
6. a kind of intelligent door lock, which is characterized in that including:
Transmit-Receive Unit, for receiving the encrypted message from the first user;
Processing unit, for according to the encrypted message, determining that first user is temporary visitor;
The Transmit-Receive Unit is additionally operable to send first message to router, and the first message carrying includes the encrypted message Log-on message, wherein the first message is used to indicate the first hot spot that the router creates Wireless Fidelity Wi-Fi, and Using the log-on message as the log-on message of first hot spot, first hot spot passes through described for first user Wi-Fi connection.
7. intelligent door lock as described in claim 1, which is characterized in that
The processing unit is additionally operable to determine that intelligent door lock is opened, to allow first user to enter.
8. intelligent door lock as claimed in claim 2, which is characterized in that
Institute's Transmit-Receive Unit is additionally operable to after closing the intelligent door lock, receives the operation for opening the intelligent door lock, is determined The intelligent door lock is again turned on;
The Transmit-Receive Unit is additionally operable to send second message to the router, and the second message is used to indicate the routing Device has detected whether that equipment connects first hot spot.
9. a kind of router, which is characterized in that including:
Transmit-Receive Unit, for receiving the second message from intelligent door lock;
Processing unit detects whether that equipment connects the first heat of the router for the instruction according to the second message Point;
The processing unit is additionally operable in the case where determining that no equipment connects first hot spot, closes first heat Point.
10. router as claimed in claim 2, which is characterized in that
The Transmit-Receive Unit is additionally operable to receive the first message from intelligent door lock, and the first message carries log-on message;
The processing unit is additionally operable to create first hot spot, and stepping on using the log-on message as first hot spot Record information.
CN201810121229.9A 2018-02-07 2018-02-07 Network connection method and equipment Active CN108419236B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810121229.9A CN108419236B (en) 2018-02-07 2018-02-07 Network connection method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810121229.9A CN108419236B (en) 2018-02-07 2018-02-07 Network connection method and equipment

Publications (2)

Publication Number Publication Date
CN108419236A true CN108419236A (en) 2018-08-17
CN108419236B CN108419236B (en) 2021-06-04

Family

ID=63126918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810121229.9A Active CN108419236B (en) 2018-02-07 2018-02-07 Network connection method and equipment

Country Status (1)

Country Link
CN (1) CN108419236B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109215194A (en) * 2018-08-30 2019-01-15 蚌埠中科工业设备有限公司 A kind of access control system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011110132A2 (en) * 2011-04-25 2011-09-15 华为技术有限公司 Method for controlling wireless router, and wireless router
CN103200618A (en) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 Wireless local area network (WLAN) hotspot function control method and device
CN104038402A (en) * 2014-06-11 2014-09-10 普联技术有限公司 Method for realizing visitor network, and wireless router
CN104936179A (en) * 2015-06-08 2015-09-23 广东美的暖通设备有限公司 Method and system for controlling electric appliance to access router
CN106761000A (en) * 2016-12-21 2017-05-31 深圳大学 The external control system of intelligent door lock and method
CN106973424A (en) * 2017-03-28 2017-07-21 维沃移动通信有限公司 The creation method and terminal of a kind of WAP
CN107371163A (en) * 2017-07-28 2017-11-21 歌尔股份有限公司 A kind of method and apparatus for controlling access wireless network
CN107403489A (en) * 2017-04-12 2017-11-28 来德凯摩株式会社 Intelligent door lock system and intelligent door lock unlocking method
CN107466037A (en) * 2017-09-06 2017-12-12 上海斐讯数据通信技术有限公司 A kind of login method and system of router guest network

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011110132A2 (en) * 2011-04-25 2011-09-15 华为技术有限公司 Method for controlling wireless router, and wireless router
CN103200618A (en) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 Wireless local area network (WLAN) hotspot function control method and device
CN104038402A (en) * 2014-06-11 2014-09-10 普联技术有限公司 Method for realizing visitor network, and wireless router
CN104936179A (en) * 2015-06-08 2015-09-23 广东美的暖通设备有限公司 Method and system for controlling electric appliance to access router
CN106761000A (en) * 2016-12-21 2017-05-31 深圳大学 The external control system of intelligent door lock and method
CN106973424A (en) * 2017-03-28 2017-07-21 维沃移动通信有限公司 The creation method and terminal of a kind of WAP
CN107403489A (en) * 2017-04-12 2017-11-28 来德凯摩株式会社 Intelligent door lock system and intelligent door lock unlocking method
CN107371163A (en) * 2017-07-28 2017-11-21 歌尔股份有限公司 A kind of method and apparatus for controlling access wireless network
CN107466037A (en) * 2017-09-06 2017-12-12 上海斐讯数据通信技术有限公司 A kind of login method and system of router guest network

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109215194A (en) * 2018-08-30 2019-01-15 蚌埠中科工业设备有限公司 A kind of access control system

Also Published As

Publication number Publication date
CN108419236B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN107005442B (en) Method and apparatus for remote access
KR101361161B1 (en) System and method for reinforcing authentication using context information for mobile cloud
JP5784827B2 (en) Authentication system via two communication devices
CA2736582C (en) Authorization of server operations
CN109067937B (en) Terminal access control method, device, equipment, system and storage medium
CN105162777B (en) A kind of wireless network login method and device
US20080022354A1 (en) Roaming secure authenticated network access method and apparatus
CN105516980B (en) A kind of wireless sensor network token authentication method based on Restful frameworks
JP6337642B2 (en) Method for securely accessing a network from a personal device, personal device, network server, and access point
US20200265438A1 (en) Systems and methods for estimating authenticity of local network of device initiating remote transaction
CN104270250B (en) WiFi internets online connection authentication method based on asymmetric whole encryption
CN101986598B (en) Authentication method, server and system
CN105101206A (en) Automatic WIFI accessing method and system of device
US11025592B2 (en) System, method and computer-accessible medium for two-factor authentication during virtual private network sessions
US20140344910A1 (en) System and method for single-sign-on in virtual desktop infrastructure environment
KR101252787B1 (en) Security management system with multiple gateway servers and method thereof
KR20190030317A (en) IoT Security System Based on the BlockChain and Security Method thereof
US20220255929A1 (en) Systems and methods for preventing unauthorized network access
KR20220019834A (en) Method and system for authenticating transmission of secure credentials to a device
US20210243188A1 (en) Methods and apparatus for authenticating devices
CN107950003A (en) Dual user certification
CN108419236A (en) A kind of method for connecting network and equipment
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
KR101502999B1 (en) Authentication system and method using one time password
KR101319570B1 (en) Method for connection certification between pc and server, relay device and computer readable recording medium applying the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant