CN109246702A - The method and apparatus of WIFI cipher authentication - Google Patents
The method and apparatus of WIFI cipher authentication Download PDFInfo
- Publication number
- CN109246702A CN109246702A CN201811490626.XA CN201811490626A CN109246702A CN 109246702 A CN109246702 A CN 109246702A CN 201811490626 A CN201811490626 A CN 201811490626A CN 109246702 A CN109246702 A CN 109246702A
- Authority
- CN
- China
- Prior art keywords
- code data
- track
- terminal
- track code
- wifi
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of methods of WIFI cipher authentication, comprising: terminal acquisition trajectories code data;When the track code data is effective, the track code data is sent to access authentication equipment by the terminal, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein, when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.The invention also discloses a kind of devices of WIFI cipher authentication.The present invention passes through terminal acquisition trajectories code data, when in track, code data is effective, track code data is sent to access authentication equipment by terminal, provides a kind of method of completely new WIFI cipher authentication, realizes the cipher authentication process of efficient terminal access WIFI network.
Description
Technical field
The present invention relates to field of computer technology more particularly to the methods and WIFI cipher authentication of a kind of WIFI cipher authentication
Device.
Background technique
WIFI is a kind of technology for allowing electronic equipment to be connected to a WLAN (WLAN), is connected to wireless local area
Net is usually to have cryptoguard.Any equipment within the scope of WLAN can be connected by inputting correct password.
WIFI generally uses the mode of character type cipher authentication to log in, and login mode is relatively simple, and sign-in experience compares
Difference.As the safety of WIFI has been to be concerned by more and more people, in order to improve the safety of WIFI, character type password is set
It is very complicated, be not only difficult to remember, report it is also very inconvenient to other users, and other users take it is defeated after this password
Enter and also easily inputs by mistake.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill
Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of method of WIFI cipher authentication, the device of WIFI cipher authentication, purports
Solving character type WIFI password complicated in the prior art technical problem inconvenient to use.
To achieve the above object, the present invention provides a kind of method of WIFI cipher authentication, the WIFI cipher authentication method
Include the following steps:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication and set by the terminal
It is standby, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein when
When the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal
The step of access authentication equipment includes:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then the track code data is determined
Effectively, and by the track code data it is sent to the access authentication equipment.
Preferably, the terminal judges whether also to wrap after the step of collecting track code data within a preset time
It includes:
If the terminal does not collect track code data within a preset time, judge not collect track code data
Number whether be more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned
The step of receipt row acquisition trajectories code data.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal
After the step of access authentication equipment further include:
When certification of the track code data not over the access authentication equipment, judge to send track password number
According to number whether be more than preset times;
When the number for sending track code data is less than the preset times, the terminal return executes acquisition
The step of track code data.
Preferably, the method for the WIFI cipher authentication further include:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track password to be placed
Data are saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal
The step of access authentication equipment includes:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and will be described
Track code data is sent to the access authentication equipment.
To achieve the above object, the present invention also provides a kind of method of WIFI cipher authentication, the cipher authentication sides WIFI
Method includes the following steps:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI
Cipher authentication.
Preferably, the method for the WIFI cipher authentication further include:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment
Obtain the desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access
Track code data is arranged according to the request in authentication device.
In addition, the invention also includes a kind of device of WIFI cipher authentication, the device of the WIFI cipher authentication includes:
Capture program module is used for terminal acquisition trajectories code data;
Program module is sent, for when the track code data is effective, the terminal is by the track code data
It is sent to access authentication equipment, so that the access authentication equipment judges the track code data and desired guiding trajectory code data
Whether match, wherein when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI password
Certification.
In addition, the invention also includes a kind of device of WIFI cipher authentication, the device of the WIFI cipher authentication includes:
Program module is received, receives the track code data that terminal is sent for access authentication equipment;
Determining program module judges whether the track code data is close with desired guiding trajectory for the access authentication equipment
Code Data Matching;
Confirm program module, is used for when the track code data and desired guiding trajectory code data matching, then institute
It states access authentication equipment and confirms that the terminal passes through WIFI cipher authentication.
In addition, the invention also includes a kind of terminal, the terminal includes: memory, processor, acceleration transducer, again
Force snesor and the processing routine for being stored in the WIFI cipher authentication that can be run on the memory and on the processor, institute
State the step that WIFI cipher authentication method as described above is realized when the processing routine of WIFI cipher authentication is executed by the processor
Suddenly.
In addition, the access authentication equipment includes: memory, processor the invention also includes a kind of access authentication equipment
And it is stored in the processing routine for the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI is close
The processing routine of code authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the invention also includes a kind of WIFI cipher authentication system, the system comprises: terminal as described above and connect
Enter authentication device.
In addition, the invention also includes a kind of computer readable storage mediums, which is characterized in that the computer-readable storage
The processing routine of WIFI cipher authentication is stored on medium, it is real when the processing routine of the WIFI cipher authentication is executed by processor
Now the step of WIFI cipher authentication method of terminal as described above.
In addition, the invention also includes a kind of computer readable storage mediums, which is characterized in that the computer-readable storage
The processing routine of WIFI cipher authentication is stored on medium, it is real when the processing routine of the WIFI cipher authentication is executed by processor
Now the step of WIFI cipher authentication method of access authentication equipment as described above.
Method, terminal and the computer readable storage medium for a kind of WIFI cipher authentication that the embodiment of the present invention proposes, eventually
Acquisition trajectories code data is held, when the track code data is effective, the track code data is sent to by the terminal
Access authentication equipment, for the access authentication equipment judge the track code data and desired guiding trajectory code data whether
Match, wherein when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
The present invention is by terminal acquisition trajectories code data, and when in track, code data is effective, terminal is by track password number
According to access authentication equipment is sent to, a kind of method of completely new WIFI cipher authentication is provided, realizes efficient terminal access
The cipher authentication process of WIFI network.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram that the embodiment of the present invention is related to;
Fig. 2 is the access authentication device structure schematic diagram that the embodiment of the present invention is related to;
Fig. 3 is the flow diagram of the method first embodiment of WIFI cipher authentication of the present invention;
Fig. 4 is the flow diagram of the method second embodiment of WIFI cipher authentication of the present invention;
Fig. 5 is the flow diagram of the method 3rd embodiment of WIFI cipher authentication of the present invention;
Fig. 6 is the flow diagram of the method fourth embodiment of WIFI cipher authentication of the present invention;
Fig. 7 is the flow diagram of the 5th embodiment of method of WIFI cipher authentication of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are: terminal acquisition trajectories code data, in the track code data
When effective, the track code data is sent to access authentication equipment by the terminal, for access authentication equipment judgement
Whether the track code data and desired guiding trajectory code data match, wherein when the track code data and desired guiding trajectory
When code data matches, the terminal passes through WIFI cipher authentication.
Since in the prior art, in order to improve the safety of WIFI, character type password is set very complicated, is not only difficult to
Memory, reports also very inconvenient to other users, and other users take to input after this password and also easily input by mistake.
The present invention provides a solution, by terminal acquisition trajectories code data, when in track, code data is effective,
Track code data is sent to access authentication equipment by terminal, is provided a kind of method of completely new WIFI cipher authentication, is realized
The cipher authentication process of efficient terminal access WIFI network.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram that the embodiment of the present invention is related to.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, communication bus 1002, acceleration transducer
1003, gravity sensor 1004, memory 1005.Wherein, communication bus 1002 is logical for realizing the connection between these components
Letter, acceleration transducer 1003 and gravity sensor 1004 are used for acquisition trajectories code data.Memory 1005 can be high speed
RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005
It optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include operating system and WIFI in a kind of memory 1005 of computer storage medium
Cipher authentication processing routine.
In device shown in Fig. 1, processor 1001 can be used for that the WIFI password stored in memory 1005 is called to recognize
Processing routine is demonstrate,proved, and executes following operation:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication and set by the terminal
It is standby, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein when
When the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also
Execute following operation:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then the track code data is determined
Effectively, and by the track code data it is sent to the access authentication equipment.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also
Execute following operation:
If the terminal does not collect track code data within a preset time, judge not collect track code data
Number whether be more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned
The step of receipt row acquisition trajectories code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also
Execute following operation:
When certification of the track code data not over the access authentication equipment, judge to send track password number
According to number whether be more than preset times;
When the number for sending track code data is less than the preset times, the terminal return executes acquisition
The step of track code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also
Execute following operation:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track password to be placed
Data are saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also
Execute following operation:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and will be described
Track code data is sent to the access authentication equipment.
As shown in Fig. 2, Fig. 2 is the access authentication device structure schematic diagram that the embodiment of the present invention is related to.
As shown in Fig. 2, the access authentication equipment may include: processor 1001, such as CPU, communication bus 1002, storage
Device 1003.Wherein, communication bus 1002 is for realizing the connection communication between these components.Memory 1003 can be high speed
RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1003
It optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Fig. 2, as may include operating system and WIFI in a kind of memory 1003 of computer storage medium
Cipher authentication processing routine.
In device shown in Fig. 2, processor 1001 can be used for that the WIFI password stored in memory 1003 is called to recognize
Processing routine is demonstrate,proved, and executes following operation:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI
Cipher authentication.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1003, also
Execute following operation:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment
Obtain the desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access
Track code data is arranged according to the request in authentication device.
Referring to Fig. 3, first embodiment of the invention provides a kind of method of WIFI cipher authentication, which comprises
Step S10, terminal acquisition trajectories code data.
Macroscopical rail that the terminal track code data to be acquired generates when referring to terminal from solid space by movement
Mark data have directionality.Such as user's hand held terminal draws circle clockwise, or draws circle counterclockwise, this, which is two kinds, has difference
Macroscopical track of direction character.
During terminal is moved, terminal obtains each by self-contained motion sensor data collected
The three dimensional space coordinate point at a moment, motion sensor may include range sensor, gyroscope, gravity sensor, acceleration biography
Sensor, GPS etc.;Terminal is based on these sensing datas again and carries out track synthesis and amendment operation, to generate the macroscopic view of terminal
Track data.The macroscopical track data for being formed by terminal includes that course bearing information, trajectory shape information and track generate
Turning point information.Wherein, about course bearing information, since track is using the direction at the top of mobile phone as positive direction, water in space
Direction is not distinguished in flat and longitudinal direction, is thus horizontal drawn between circle and longitudinal up time clockwise in macroscopical track of mobile terminal
Bowlder is drawn, the track data of acquisition is consistent.
Step S20, when the track code data is effective, the track code data is sent to access by the terminal
Authentication device, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match,
Wherein, when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
When terminal collects track code data, need to judge whether track code data is effective, effective condition includes:
Whether collect whether track code data, track code data collected complete or track password number within a preset time
It is whether reasonable etc. according to corresponding trajectory shape.
When terminal judges whether to collect track code data within a preset time, if collecting within a preset time
Track code data then determines that track code data is effective, and track code data is sent to access authentication equipment.If not existing
Track code data is collected in preset time, then further judgement does not collect whether the number of track code data is more than pre-
If number.If the number for not collecting track code data is less than preset times, terminal, which returns to execute, starts acquisition trajectories
Effective track code data is sent to access authentication equipment again by the step of code data.
Access authentication equipment matches the track code data received and preset track code data, when the two
On the contrary timing sends track code data by the message of certification to terminal, then do not pass through and recognize to terminal transmission track code data
The message of card.When terminal does not pass through the certification of track code data, judge to send whether the number of track code data is more than pre-
If number;When the number for sending track code data is less than preset times, terminal, which returns, executes acquisition trajectories code data
The step of.
If the number for not collecting track code data has been more than preset times, or sends time of track code data
Number has been more than preset times, illustrates currently to be not suitable for carrying out login authentication using track pin mode, terminal needs to prompt user
Login authentication should be carried out with numerical ciphers, avoid user log-in authentication process duration too long.
It should be noted that traditional WIFI password is usually made of number, letter or symbol combination in the prior art
Character string, and be from the macroscopical track data generated when being moved in solid space in the present embodiment using terminal as WIFI
Password, for a kind of completely new WIFI cryptogram form.The data content of the WIFI password of traditional character style is fixed, such as
Password is " wind#123 ", and in the present embodiment with terminal from solid space by it is mobile when macroscopical track data for generating
When as WIFI password, though user using same movement mobile terminal, due to the dynamics of movement, speed, the difference of amplitude,
Even if will lead to, macroscopical track that terminal generates under the movement similarly acted is variant, the corresponding macroscopical track data generated
Variant, i.e., the data content of the WIFI password is not fixed yet.Macroscopical track number is received in WIFI access authentication equipment
According to form WIFI password when, both judged by calculating the similarity of macroscopical track data and preset track code data
Whether match, when similarity is more than preset threshold if think to match, the WIFI password is by certification, if similarity is lower than default
Then think to mismatch when threshold value, which does not pass through certification.
Further, when terminal to sensing data collected in moving process pre-processed to obtain coordinate information and
When velocity information, it is sent to access authentication equipment using coordinate information and velocity information as more original track code data,
It is responsible for doing further track to the track code data and synthesizing and correct operation by access authentication equipment, to mitigate terminal processes
Burden, accelerate track code data acquisition and transmission process.
It should be understood that the access authentication equipment in the present embodiment includes router, interchanger, gateway, mobile phone terminal etc.
The network access device for having authentication functions.
Next illustrate that user sends the tool of track code data access WIFI network using mobile phone by taking mobile phone terminal as an example
Body process.
User enters WIFI network linkage interface by clicking handset touch panel, from the WIFI hot spot list of interface display
WIFI hot spot to be connected is selected, the WIFI hot spot that interface prompt at this time should be to be connected is supported track password login and asked whether
It uses.
After user uses track password login according to the prompt selection at interface, interface prompt requires user to move in ten seconds
Machine start to form correct track password, and prompts to start to acquire.When cell phone forms track password to user in ten seconds
Afterwards, interface prompt track password acquires successfully and in password authentification.When password authentification success in interface prompt track is connected with WIFI
When middle, user completes the process of track cipher authentication using mobile phone.
When interface prompt track password authentification failure, user can according to the prompt at interface again cell phone to be formed
Track password.If the number that user sends track password has reached the upper limit, interface prompt user's input numerical ciphers, at this time user
Access WIFI network can be attempted by input numerical ciphers.
In the present embodiment, by terminal acquisition trajectories code data, when in track, code data is effective, terminal is by track
Code data is sent to access authentication equipment, provides a kind of method of completely new WIFI cipher authentication, realizes efficient end
Terminate the cipher authentication process into WIFI network.
Further, referring to Fig. 4, second embodiment of the invention provides a kind of WIFI cipher authentication based on first embodiment
Method, the present embodiment are further comprising the steps of:
Step S30, the terminal acquire track code data to be placed.
WIFI network manages setting circle that access management account and password log in WIFI access authentication equipment in terminal
Face carries out the setting of track code data, and as the desired guiding trajectory code data of access authentication equipment, other will use and be somebody's turn to do later
The transmitted track code data for certification of the user of WIFI network is matched with the desired guiding trajectory code data.
Step S40 acquires track code data to be placed again within a preset time.
Step S50, judges whether the track code data to be set acquired twice matches.
Step S60, if the code data matching in track to be set acquired twice, the terminal sends to be placed
Track code data is saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Track code data to be placed to guarantee management user's input is accurate, needs to input in total twice wait set
The track code data set, and when the track password to be placed inputted twice is consistent, terminal just thinks that this is to be placed
Track password is effective, and effective track password to be placed is sent to access authentication equipment and is saved, with completion pair
The setting of desired guiding trajectory code data.
Further, after managing user setting success desired guiding trajectory code data, terminal can be successful by setting
Desired guiding trajectory code data shows management user in a manner of visual.Such as it is generated and is corresponded to according to desired guiding trajectory code data
Track movement pictograph supporting paper, generate corresponding animation exemplary file, or generate corresponding video demonstration text
Part, these files can be shown at the terminal, play or be shared with other users, to help the proper use of track of user close
Code mode carries out login authentication.
In the present embodiment, track code data to be placed is acquired by terminal, and by terminal by track to be placed
Code data is sent to access authentication equipment, and the Initialize installation to desired guiding trajectory password is realized in access authentication equipment,
Authentication infrastructure is provided for track cipher authentication later.
Further, referring to Fig. 5, third embodiment of the invention provides a kind of WIFI cipher authentication based on first embodiment
Method, the present embodiment include: in step S20
Step S70, the terminal judge whether the track code data includes multiple tracks.
Step S80 then determines that the track code data is effective when the track code data includes multiple tracks,
And the track code data is sent to the access authentication equipment.
The track code data during cipher authentication when logging in connection for WIFI network can correspond to multiple rails
Mark, i.e. track combination.Such as can to draw circle clockwise plus one circle of picture counterclockwise, draw a triangle add one just
It is rectangular, or draw a heart and add number seven etc..
In order to guarantee that terminal can accurately identify track combination, it is desirable that user forms track password number in mobile terminal
According to when, between wanting between multiple tracks at regular intervals, which can be default value, can also be by user setting.
In the present embodiment, judge whether the track code data includes multiple tracks by terminal, when track password
Track code data is then sent to access authentication equipment when including multiple tracks by data, and improve track password cracks difficulty
Degree, to improve the reliability of WIFI cipher authentication.
Further, referring to Fig. 6, fourth embodiment of the invention provides a kind of method of WIFI cipher authentication, the present embodiment
The following steps are included:
Step S90, access authentication equipment receive the track code data that terminal is sent.
In this step, server end of the access authentication equipment as starting Wireless LAN WIFI hot spot, terminal are set
The standby client as WIFI network to be connected into.Begin listening for whether thering is terminal device to initiate the connection after the starting of access authentication equipment
Request obtains the track code data carried in connection request if receiving connection request.
Step S100, the access authentication equipment judge the track code data whether with desired guiding trajectory code data
Match.
Path matching needs while meeting following three matching condition: first is that the direction of track needs unanimously, including up time
Needle, counterclockwise etc.;Second is that the shape of track wants consistent or similar, including circle, triangle, square and heart etc.;Third is that rail
The number for the turning point that mark generates wants completely the same, such as circle has and no more than a turning point, triangle have and can only
Equal to 3 turning points, polygon and so on etc..
Step S110 then confirms the end when the track code data and desired guiding trajectory code data matching
End passes through WIFI cipher authentication.
In the present embodiment, the track code data that access authentication equipment is sent by receiving terminal, when track password number
According to confirmation terminal when the matching of desired guiding trajectory code data, by track cipher authentication, one kind is provided easily and fast for terminal
Access the mode of WIFI network.
Further, referring to Fig. 7, fifth embodiment of the invention provides a kind of WIFI cipher authentication based on fourth embodiment
Method, the present embodiment are further comprising the steps of:
Step S120, it is described to connect when the access authentication equipment receives the request of setting track code data of terminal
Enter authentication device and obtains the desired guiding trajectory code data number being arranged.
Step S130, when the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number
When, track code data is arranged according to the request in the access authentication equipment.
WIFI network manages setting circle that access management account and password log in WIFI access authentication equipment in terminal
Face carries out the setting of track code data.Access authentication equipment will manage the track code data of user setting as default rail
Mark code data carries out track code data and desired guiding trajectory code data that other users that access WIFI network send
Matching.
Access authentication equipment can permit the multiple and different track code data of management user setting, to meet dissimilarity
Not, the user of all ages and classes has the demand of different movement locus preferences.It can desired guiding trajectory code data in access authentication equipment
Number, for limiting the number of settable track code data.In the multiple desired guiding trajectory code datas of management user setting
When, access authentication equipment needs the track code data and multiple desired guiding trajectory code datas for sending the login user received
It is matched one by one, until successful match or all desired guiding trajectory code datas of traversal.
In the present embodiment, access authentication equipment is by being arranged track code data according to the request, and can permit
Multiple track passwords are set perhaps, while providing technology guarantee for user with track password login WIFI password, meet use
Family using track password when individual demand.
The invention also includes a kind of terminal, the terminal includes: memory, processor, acceleration transducer, gravity sensitive
Device and the processing routine for being stored in the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI
The processing routine of cipher authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the access authentication equipment includes: memory, processor the invention also includes a kind of access authentication equipment
And it is stored in the processing routine for the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI is close
The processing routine of code authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the invention also includes a kind of WIFI cipher authentication system, the system comprises: terminal as described above and connect
Enter authentication device.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium
On be stored with WIFI cipher authentication program, the WIFI cipher authentication program realizes WIFI as described above when being executed by processor
The step of cipher authentication method.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in one as described above
In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone,
Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of method of WIFI cipher authentication, which is characterized in that the method for the WIFI cipher authentication the following steps are included:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication equipment by the terminal, with
Judge whether the track code data and desired guiding trajectory code data match for the access authentication equipment, wherein when described
When track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
2. the method for WIFI cipher authentication as described in claim 1, which is characterized in that described to have in the track code data
When effect, the step of track code data is sent to access authentication equipment by the terminal, includes:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then determine that the track code data has
Effect, and the track code data is sent to the access authentication equipment.
3. the method for WIFI cipher authentication as claimed in claim 2, which is characterized in that the terminal judges whether when default
After interior the step of collecting track code data further include:
If the terminal does not collect track code data within a preset time, time for not collecting track code data is judged
Whether number is more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned to execute and be adopted
The step of collecting track code data.
4. the method for WIFI cipher authentication as described in claim 1, which is characterized in that described to have in the track code data
When effect, after the step of track code data is sent to access authentication equipment by the terminal further include:
When certification of the track code data not over the access authentication equipment, judge to send track code data
Whether number is more than preset times;
When the number for sending track code data is less than the preset times, the terminal, which returns, executes acquisition trajectories
The step of code data.
5. the method for WIFI cipher authentication as described in claim 1, which is characterized in that the method for the WIFI cipher authentication is also
Include:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track code data to be placed
It is saved to the access authentication equipment, to realize the Initialize installation to the track code data.
6. such as the method for WIFI cipher authentication described in any one of claim 1 to 5, which is characterized in that described in the track
When code data is effective, the step of track code data is sent to access authentication equipment by the terminal, includes:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and by the track
Code data is sent to the access authentication equipment.
7. a kind of method of WIFI cipher authentication, which is characterized in that the method for the WIFI cipher authentication includes:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI password
Certification.
8. the method for WIFI cipher authentication as claimed in claim 7, which is characterized in that the method for the WIFI cipher authentication is also
Include:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment is obtained
The desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access authentication
Track code data is arranged according to the request in equipment.
9. a kind of device of WIFI cipher authentication, which is characterized in that the device of the WIFI cipher authentication includes:
Capture program module is used for terminal acquisition trajectories code data;
Program module is sent, for when the track code data is effective, the terminal to send the track code data
To access authentication equipment, so that the access authentication equipment judges whether are the track code data and desired guiding trajectory code data
Matching, wherein when the track code data and desired guiding trajectory code data match, the terminal is recognized by WIFI password
Card.
10. a kind of device of WIFI cipher authentication, which is characterized in that the device of the WIFI cipher authentication includes:
Program module is received, receives the track code data that terminal is sent for access authentication equipment;
Determining program module, for the access authentication equipment judge the track code data whether with desired guiding trajectory password number
According to matching;
Confirm program module, is used for when the track code data and desired guiding trajectory code data matching, then it is described to connect
Enter authentication device and confirms that the terminal passes through WIFI cipher authentication.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811490626.XA CN109246702A (en) | 2018-12-06 | 2018-12-06 | The method and apparatus of WIFI cipher authentication |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811490626.XA CN109246702A (en) | 2018-12-06 | 2018-12-06 | The method and apparatus of WIFI cipher authentication |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109246702A true CN109246702A (en) | 2019-01-18 |
Family
ID=65073905
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811490626.XA Pending CN109246702A (en) | 2018-12-06 | 2018-12-06 | The method and apparatus of WIFI cipher authentication |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246702A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112235800A (en) * | 2020-10-16 | 2021-01-15 | 广州零世纪信息科技有限公司 | Authentication method, device, equipment and system based on motion trail |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634107A (en) * | 2012-08-24 | 2014-03-12 | 财团法人工业技术研究院 | Authentication method, password setting method and authentication system for electronic device |
CN103955337A (en) * | 2014-05-06 | 2014-07-30 | 北京金山安全软件有限公司 | Method and system for opening application program in mobile terminal |
CN105246042A (en) * | 2015-10-23 | 2016-01-13 | 中国联合网络通信集团有限公司 | Server login method, terminal and server |
KR101901913B1 (en) * | 2017-04-05 | 2018-09-27 | 주식회사 수퍼블리 | Method and Apparatus for motion authentication using motion sensor |
CN108763914A (en) * | 2018-04-27 | 2018-11-06 | 出门问问信息科技有限公司 | A kind of unlocking method and device of equipment screen locking |
-
2018
- 2018-12-06 CN CN201811490626.XA patent/CN109246702A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103634107A (en) * | 2012-08-24 | 2014-03-12 | 财团法人工业技术研究院 | Authentication method, password setting method and authentication system for electronic device |
CN103955337A (en) * | 2014-05-06 | 2014-07-30 | 北京金山安全软件有限公司 | Method and system for opening application program in mobile terminal |
CN105246042A (en) * | 2015-10-23 | 2016-01-13 | 中国联合网络通信集团有限公司 | Server login method, terminal and server |
KR101901913B1 (en) * | 2017-04-05 | 2018-09-27 | 주식회사 수퍼블리 | Method and Apparatus for motion authentication using motion sensor |
CN108763914A (en) * | 2018-04-27 | 2018-11-06 | 出门问问信息科技有限公司 | A kind of unlocking method and device of equipment screen locking |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112235800A (en) * | 2020-10-16 | 2021-01-15 | 广州零世纪信息科技有限公司 | Authentication method, device, equipment and system based on motion trail |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107730669B (en) | Access control method, system and computer readable storage medium | |
CN104796385B (en) | Terminal binding method, apparatus and system | |
WO2016169432A1 (en) | Identity authentication method and device, and terminal | |
CN104580117B (en) | Auth method, apparatus and system | |
CN106233796A (en) | The automatic subscriber registration of calculating equipment and unblock | |
CN103021038A (en) | Campus classroom attendance checking-in system and method for realizing attendance checking-in by using system | |
CN104700040B (en) | Authority control method and device | |
US10192042B2 (en) | User verifying method, terminal device, server and storage medium | |
CN104954343B (en) | Checking information processing method, server and system | |
CN106656944A (en) | Slide verification method and apparatus for hand-held mobile device | |
CN110336870A (en) | Method for building up, device, system and the storage medium in telecommuting O&M channel | |
WO2014161259A1 (en) | Verification code processing method, device, terminal and server | |
CN105635104A (en) | Providing access to restricted resources via a persistent authenticated device network | |
CN109981360A (en) | Internet of things equipment website activating method, device, system and storage medium | |
CN105101191B (en) | The method and device of wlan security mechanism setting | |
CN110175448A (en) | A kind of credible equipment login authentication method and the application system with authentication function | |
CN107318174A (en) | A kind of communication means, device and terminal | |
CN107104946A (en) | A kind of management system of computer laboratory | |
CN109407947A (en) | Interface alternation and its verification method, logging request generation and verification method and device | |
CN107682359A (en) | One kind is using register method, mobile terminal | |
CN105894634B (en) | A kind of identification system and method | |
JP5325919B2 (en) | Authentication apparatus and method | |
JP2011053969A (en) | Personal identification system in e-learning system | |
CN109246702A (en) | The method and apparatus of WIFI cipher authentication | |
WO2023197642A1 (en) | Identity verification method, device, storage medium, and program product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190118 |