CN109246702A - The method and apparatus of WIFI cipher authentication - Google Patents

The method and apparatus of WIFI cipher authentication Download PDF

Info

Publication number
CN109246702A
CN109246702A CN201811490626.XA CN201811490626A CN109246702A CN 109246702 A CN109246702 A CN 109246702A CN 201811490626 A CN201811490626 A CN 201811490626A CN 109246702 A CN109246702 A CN 109246702A
Authority
CN
China
Prior art keywords
code data
track
terminal
track code
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811490626.XA
Other languages
Chinese (zh)
Inventor
陈宜铭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Pocket Network Technology Co Ltd
Original Assignee
Shenzhen Pocket Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Pocket Network Technology Co Ltd filed Critical Shenzhen Pocket Network Technology Co Ltd
Priority to CN201811490626.XA priority Critical patent/CN109246702A/en
Publication of CN109246702A publication Critical patent/CN109246702A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods of WIFI cipher authentication, comprising: terminal acquisition trajectories code data;When the track code data is effective, the track code data is sent to access authentication equipment by the terminal, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein, when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.The invention also discloses a kind of devices of WIFI cipher authentication.The present invention passes through terminal acquisition trajectories code data, when in track, code data is effective, track code data is sent to access authentication equipment by terminal, provides a kind of method of completely new WIFI cipher authentication, realizes the cipher authentication process of efficient terminal access WIFI network.

Description

The method and apparatus of WIFI cipher authentication
Technical field
The present invention relates to field of computer technology more particularly to the methods and WIFI cipher authentication of a kind of WIFI cipher authentication Device.
Background technique
WIFI is a kind of technology for allowing electronic equipment to be connected to a WLAN (WLAN), is connected to wireless local area Net is usually to have cryptoguard.Any equipment within the scope of WLAN can be connected by inputting correct password.
WIFI generally uses the mode of character type cipher authentication to log in, and login mode is relatively simple, and sign-in experience compares Difference.As the safety of WIFI has been to be concerned by more and more people, in order to improve the safety of WIFI, character type password is set It is very complicated, be not only difficult to remember, report it is also very inconvenient to other users, and other users take it is defeated after this password Enter and also easily inputs by mistake.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of method of WIFI cipher authentication, the device of WIFI cipher authentication, purports Solving character type WIFI password complicated in the prior art technical problem inconvenient to use.
To achieve the above object, the present invention provides a kind of method of WIFI cipher authentication, the WIFI cipher authentication method Include the following steps:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication and set by the terminal It is standby, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein when When the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal The step of access authentication equipment includes:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then the track code data is determined Effectively, and by the track code data it is sent to the access authentication equipment.
Preferably, the terminal judges whether also to wrap after the step of collecting track code data within a preset time It includes:
If the terminal does not collect track code data within a preset time, judge not collect track code data Number whether be more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned The step of receipt row acquisition trajectories code data.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal After the step of access authentication equipment further include:
When certification of the track code data not over the access authentication equipment, judge to send track password number According to number whether be more than preset times;
When the number for sending track code data is less than the preset times, the terminal return executes acquisition The step of track code data.
Preferably, the method for the WIFI cipher authentication further include:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track password to be placed Data are saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Preferably, described when the track code data is effective, the track code data is sent to by the terminal The step of access authentication equipment includes:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and will be described Track code data is sent to the access authentication equipment.
To achieve the above object, the present invention also provides a kind of method of WIFI cipher authentication, the cipher authentication sides WIFI Method includes the following steps:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI Cipher authentication.
Preferably, the method for the WIFI cipher authentication further include:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment Obtain the desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access Track code data is arranged according to the request in authentication device.
In addition, the invention also includes a kind of device of WIFI cipher authentication, the device of the WIFI cipher authentication includes:
Capture program module is used for terminal acquisition trajectories code data;
Program module is sent, for when the track code data is effective, the terminal is by the track code data It is sent to access authentication equipment, so that the access authentication equipment judges the track code data and desired guiding trajectory code data Whether match, wherein when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI password Certification.
In addition, the invention also includes a kind of device of WIFI cipher authentication, the device of the WIFI cipher authentication includes:
Program module is received, receives the track code data that terminal is sent for access authentication equipment;
Determining program module judges whether the track code data is close with desired guiding trajectory for the access authentication equipment Code Data Matching;
Confirm program module, is used for when the track code data and desired guiding trajectory code data matching, then institute It states access authentication equipment and confirms that the terminal passes through WIFI cipher authentication.
In addition, the invention also includes a kind of terminal, the terminal includes: memory, processor, acceleration transducer, again Force snesor and the processing routine for being stored in the WIFI cipher authentication that can be run on the memory and on the processor, institute State the step that WIFI cipher authentication method as described above is realized when the processing routine of WIFI cipher authentication is executed by the processor Suddenly.
In addition, the access authentication equipment includes: memory, processor the invention also includes a kind of access authentication equipment And it is stored in the processing routine for the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI is close The processing routine of code authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the invention also includes a kind of WIFI cipher authentication system, the system comprises: terminal as described above and connect Enter authentication device.
In addition, the invention also includes a kind of computer readable storage mediums, which is characterized in that the computer-readable storage The processing routine of WIFI cipher authentication is stored on medium, it is real when the processing routine of the WIFI cipher authentication is executed by processor Now the step of WIFI cipher authentication method of terminal as described above.
In addition, the invention also includes a kind of computer readable storage mediums, which is characterized in that the computer-readable storage The processing routine of WIFI cipher authentication is stored on medium, it is real when the processing routine of the WIFI cipher authentication is executed by processor Now the step of WIFI cipher authentication method of access authentication equipment as described above.
Method, terminal and the computer readable storage medium for a kind of WIFI cipher authentication that the embodiment of the present invention proposes, eventually Acquisition trajectories code data is held, when the track code data is effective, the track code data is sent to by the terminal Access authentication equipment, for the access authentication equipment judge the track code data and desired guiding trajectory code data whether Match, wherein when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
The present invention is by terminal acquisition trajectories code data, and when in track, code data is effective, terminal is by track password number According to access authentication equipment is sent to, a kind of method of completely new WIFI cipher authentication is provided, realizes efficient terminal access The cipher authentication process of WIFI network.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram that the embodiment of the present invention is related to;
Fig. 2 is the access authentication device structure schematic diagram that the embodiment of the present invention is related to;
Fig. 3 is the flow diagram of the method first embodiment of WIFI cipher authentication of the present invention;
Fig. 4 is the flow diagram of the method second embodiment of WIFI cipher authentication of the present invention;
Fig. 5 is the flow diagram of the method 3rd embodiment of WIFI cipher authentication of the present invention;
Fig. 6 is the flow diagram of the method fourth embodiment of WIFI cipher authentication of the present invention;
Fig. 7 is the flow diagram of the 5th embodiment of method of WIFI cipher authentication of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The primary solutions of the embodiment of the present invention are: terminal acquisition trajectories code data, in the track code data When effective, the track code data is sent to access authentication equipment by the terminal, for access authentication equipment judgement Whether the track code data and desired guiding trajectory code data match, wherein when the track code data and desired guiding trajectory When code data matches, the terminal passes through WIFI cipher authentication.
Since in the prior art, in order to improve the safety of WIFI, character type password is set very complicated, is not only difficult to Memory, reports also very inconvenient to other users, and other users take to input after this password and also easily input by mistake.
The present invention provides a solution, by terminal acquisition trajectories code data, when in track, code data is effective, Track code data is sent to access authentication equipment by terminal, is provided a kind of method of completely new WIFI cipher authentication, is realized The cipher authentication process of efficient terminal access WIFI network.
As shown in Figure 1, Fig. 1 is the terminal structure schematic diagram that the embodiment of the present invention is related to.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU, communication bus 1002, acceleration transducer 1003, gravity sensor 1004, memory 1005.Wherein, communication bus 1002 is logical for realizing the connection between these components Letter, acceleration transducer 1003 and gravity sensor 1004 are used for acquisition trajectories code data.Memory 1005 can be high speed RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 It optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include operating system and WIFI in a kind of memory 1005 of computer storage medium Cipher authentication processing routine.
In device shown in Fig. 1, processor 1001 can be used for that the WIFI password stored in memory 1005 is called to recognize Processing routine is demonstrate,proved, and executes following operation:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication and set by the terminal It is standby, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, wherein when When the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also Execute following operation:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then the track code data is determined Effectively, and by the track code data it is sent to the access authentication equipment.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also Execute following operation:
If the terminal does not collect track code data within a preset time, judge not collect track code data Number whether be more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned The step of receipt row acquisition trajectories code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also Execute following operation:
When certification of the track code data not over the access authentication equipment, judge to send track password number According to number whether be more than preset times;
When the number for sending track code data is less than the preset times, the terminal return executes acquisition The step of track code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also Execute following operation:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track password to be placed Data are saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1005, also Execute following operation:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and will be described Track code data is sent to the access authentication equipment.
As shown in Fig. 2, Fig. 2 is the access authentication device structure schematic diagram that the embodiment of the present invention is related to.
As shown in Fig. 2, the access authentication equipment may include: processor 1001, such as CPU, communication bus 1002, storage Device 1003.Wherein, communication bus 1002 is for realizing the connection communication between these components.Memory 1003 can be high speed RAM memory is also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1003 It optionally can also be the storage device independently of aforementioned processor 1001.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Fig. 2, as may include operating system and WIFI in a kind of memory 1003 of computer storage medium Cipher authentication processing routine.
In device shown in Fig. 2, processor 1001 can be used for that the WIFI password stored in memory 1003 is called to recognize Processing routine is demonstrate,proved, and executes following operation:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI Cipher authentication.
Further, processor 1001 can call the WIFI cipher authentication processing routine stored in memory 1003, also Execute following operation:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment Obtain the desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access Track code data is arranged according to the request in authentication device.
Referring to Fig. 3, first embodiment of the invention provides a kind of method of WIFI cipher authentication, which comprises
Step S10, terminal acquisition trajectories code data.
Macroscopical rail that the terminal track code data to be acquired generates when referring to terminal from solid space by movement Mark data have directionality.Such as user's hand held terminal draws circle clockwise, or draws circle counterclockwise, this, which is two kinds, has difference Macroscopical track of direction character.
During terminal is moved, terminal obtains each by self-contained motion sensor data collected The three dimensional space coordinate point at a moment, motion sensor may include range sensor, gyroscope, gravity sensor, acceleration biography Sensor, GPS etc.;Terminal is based on these sensing datas again and carries out track synthesis and amendment operation, to generate the macroscopic view of terminal Track data.The macroscopical track data for being formed by terminal includes that course bearing information, trajectory shape information and track generate Turning point information.Wherein, about course bearing information, since track is using the direction at the top of mobile phone as positive direction, water in space Direction is not distinguished in flat and longitudinal direction, is thus horizontal drawn between circle and longitudinal up time clockwise in macroscopical track of mobile terminal Bowlder is drawn, the track data of acquisition is consistent.
Step S20, when the track code data is effective, the track code data is sent to access by the terminal Authentication device, so that the access authentication equipment judges whether the track code data and desired guiding trajectory code data match, Wherein, when the track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
When terminal collects track code data, need to judge whether track code data is effective, effective condition includes: Whether collect whether track code data, track code data collected complete or track password number within a preset time It is whether reasonable etc. according to corresponding trajectory shape.
When terminal judges whether to collect track code data within a preset time, if collecting within a preset time Track code data then determines that track code data is effective, and track code data is sent to access authentication equipment.If not existing Track code data is collected in preset time, then further judgement does not collect whether the number of track code data is more than pre- If number.If the number for not collecting track code data is less than preset times, terminal, which returns to execute, starts acquisition trajectories Effective track code data is sent to access authentication equipment again by the step of code data.
Access authentication equipment matches the track code data received and preset track code data, when the two On the contrary timing sends track code data by the message of certification to terminal, then do not pass through and recognize to terminal transmission track code data The message of card.When terminal does not pass through the certification of track code data, judge to send whether the number of track code data is more than pre- If number;When the number for sending track code data is less than preset times, terminal, which returns, executes acquisition trajectories code data The step of.
If the number for not collecting track code data has been more than preset times, or sends time of track code data Number has been more than preset times, illustrates currently to be not suitable for carrying out login authentication using track pin mode, terminal needs to prompt user Login authentication should be carried out with numerical ciphers, avoid user log-in authentication process duration too long.
It should be noted that traditional WIFI password is usually made of number, letter or symbol combination in the prior art Character string, and be from the macroscopical track data generated when being moved in solid space in the present embodiment using terminal as WIFI Password, for a kind of completely new WIFI cryptogram form.The data content of the WIFI password of traditional character style is fixed, such as Password is " wind#123 ", and in the present embodiment with terminal from solid space by it is mobile when macroscopical track data for generating When as WIFI password, though user using same movement mobile terminal, due to the dynamics of movement, speed, the difference of amplitude, Even if will lead to, macroscopical track that terminal generates under the movement similarly acted is variant, the corresponding macroscopical track data generated Variant, i.e., the data content of the WIFI password is not fixed yet.Macroscopical track number is received in WIFI access authentication equipment According to form WIFI password when, both judged by calculating the similarity of macroscopical track data and preset track code data Whether match, when similarity is more than preset threshold if think to match, the WIFI password is by certification, if similarity is lower than default Then think to mismatch when threshold value, which does not pass through certification.
Further, when terminal to sensing data collected in moving process pre-processed to obtain coordinate information and When velocity information, it is sent to access authentication equipment using coordinate information and velocity information as more original track code data, It is responsible for doing further track to the track code data and synthesizing and correct operation by access authentication equipment, to mitigate terminal processes Burden, accelerate track code data acquisition and transmission process.
It should be understood that the access authentication equipment in the present embodiment includes router, interchanger, gateway, mobile phone terminal etc. The network access device for having authentication functions.
Next illustrate that user sends the tool of track code data access WIFI network using mobile phone by taking mobile phone terminal as an example Body process.
User enters WIFI network linkage interface by clicking handset touch panel, from the WIFI hot spot list of interface display WIFI hot spot to be connected is selected, the WIFI hot spot that interface prompt at this time should be to be connected is supported track password login and asked whether It uses.
After user uses track password login according to the prompt selection at interface, interface prompt requires user to move in ten seconds Machine start to form correct track password, and prompts to start to acquire.When cell phone forms track password to user in ten seconds Afterwards, interface prompt track password acquires successfully and in password authentification.When password authentification success in interface prompt track is connected with WIFI When middle, user completes the process of track cipher authentication using mobile phone.
When interface prompt track password authentification failure, user can according to the prompt at interface again cell phone to be formed Track password.If the number that user sends track password has reached the upper limit, interface prompt user's input numerical ciphers, at this time user Access WIFI network can be attempted by input numerical ciphers.
In the present embodiment, by terminal acquisition trajectories code data, when in track, code data is effective, terminal is by track Code data is sent to access authentication equipment, provides a kind of method of completely new WIFI cipher authentication, realizes efficient end Terminate the cipher authentication process into WIFI network.
Further, referring to Fig. 4, second embodiment of the invention provides a kind of WIFI cipher authentication based on first embodiment Method, the present embodiment are further comprising the steps of:
Step S30, the terminal acquire track code data to be placed.
WIFI network manages setting circle that access management account and password log in WIFI access authentication equipment in terminal Face carries out the setting of track code data, and as the desired guiding trajectory code data of access authentication equipment, other will use and be somebody's turn to do later The transmitted track code data for certification of the user of WIFI network is matched with the desired guiding trajectory code data.
Step S40 acquires track code data to be placed again within a preset time.
Step S50, judges whether the track code data to be set acquired twice matches.
Step S60, if the code data matching in track to be set acquired twice, the terminal sends to be placed Track code data is saved to the access authentication equipment, to realize the Initialize installation to the track code data.
Track code data to be placed to guarantee management user's input is accurate, needs to input in total twice wait set The track code data set, and when the track password to be placed inputted twice is consistent, terminal just thinks that this is to be placed Track password is effective, and effective track password to be placed is sent to access authentication equipment and is saved, with completion pair The setting of desired guiding trajectory code data.
Further, after managing user setting success desired guiding trajectory code data, terminal can be successful by setting Desired guiding trajectory code data shows management user in a manner of visual.Such as it is generated and is corresponded to according to desired guiding trajectory code data Track movement pictograph supporting paper, generate corresponding animation exemplary file, or generate corresponding video demonstration text Part, these files can be shown at the terminal, play or be shared with other users, to help the proper use of track of user close Code mode carries out login authentication.
In the present embodiment, track code data to be placed is acquired by terminal, and by terminal by track to be placed Code data is sent to access authentication equipment, and the Initialize installation to desired guiding trajectory password is realized in access authentication equipment, Authentication infrastructure is provided for track cipher authentication later.
Further, referring to Fig. 5, third embodiment of the invention provides a kind of WIFI cipher authentication based on first embodiment Method, the present embodiment include: in step S20
Step S70, the terminal judge whether the track code data includes multiple tracks.
Step S80 then determines that the track code data is effective when the track code data includes multiple tracks, And the track code data is sent to the access authentication equipment.
The track code data during cipher authentication when logging in connection for WIFI network can correspond to multiple rails Mark, i.e. track combination.Such as can to draw circle clockwise plus one circle of picture counterclockwise, draw a triangle add one just It is rectangular, or draw a heart and add number seven etc..
In order to guarantee that terminal can accurately identify track combination, it is desirable that user forms track password number in mobile terminal According to when, between wanting between multiple tracks at regular intervals, which can be default value, can also be by user setting.
In the present embodiment, judge whether the track code data includes multiple tracks by terminal, when track password Track code data is then sent to access authentication equipment when including multiple tracks by data, and improve track password cracks difficulty Degree, to improve the reliability of WIFI cipher authentication.
Further, referring to Fig. 6, fourth embodiment of the invention provides a kind of method of WIFI cipher authentication, the present embodiment The following steps are included:
Step S90, access authentication equipment receive the track code data that terminal is sent.
In this step, server end of the access authentication equipment as starting Wireless LAN WIFI hot spot, terminal are set The standby client as WIFI network to be connected into.Begin listening for whether thering is terminal device to initiate the connection after the starting of access authentication equipment Request obtains the track code data carried in connection request if receiving connection request.
Step S100, the access authentication equipment judge the track code data whether with desired guiding trajectory code data Match.
Path matching needs while meeting following three matching condition: first is that the direction of track needs unanimously, including up time Needle, counterclockwise etc.;Second is that the shape of track wants consistent or similar, including circle, triangle, square and heart etc.;Third is that rail The number for the turning point that mark generates wants completely the same, such as circle has and no more than a turning point, triangle have and can only Equal to 3 turning points, polygon and so on etc..
Step S110 then confirms the end when the track code data and desired guiding trajectory code data matching End passes through WIFI cipher authentication.
In the present embodiment, the track code data that access authentication equipment is sent by receiving terminal, when track password number According to confirmation terminal when the matching of desired guiding trajectory code data, by track cipher authentication, one kind is provided easily and fast for terminal Access the mode of WIFI network.
Further, referring to Fig. 7, fifth embodiment of the invention provides a kind of WIFI cipher authentication based on fourth embodiment Method, the present embodiment are further comprising the steps of:
Step S120, it is described to connect when the access authentication equipment receives the request of setting track code data of terminal Enter authentication device and obtains the desired guiding trajectory code data number being arranged.
Step S130, when the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number When, track code data is arranged according to the request in the access authentication equipment.
WIFI network manages setting circle that access management account and password log in WIFI access authentication equipment in terminal Face carries out the setting of track code data.Access authentication equipment will manage the track code data of user setting as default rail Mark code data carries out track code data and desired guiding trajectory code data that other users that access WIFI network send Matching.
Access authentication equipment can permit the multiple and different track code data of management user setting, to meet dissimilarity Not, the user of all ages and classes has the demand of different movement locus preferences.It can desired guiding trajectory code data in access authentication equipment Number, for limiting the number of settable track code data.In the multiple desired guiding trajectory code datas of management user setting When, access authentication equipment needs the track code data and multiple desired guiding trajectory code datas for sending the login user received It is matched one by one, until successful match or all desired guiding trajectory code datas of traversal.
In the present embodiment, access authentication equipment is by being arranged track code data according to the request, and can permit Multiple track passwords are set perhaps, while providing technology guarantee for user with track password login WIFI password, meet use Family using track password when individual demand.
The invention also includes a kind of terminal, the terminal includes: memory, processor, acceleration transducer, gravity sensitive Device and the processing routine for being stored in the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI The processing routine of cipher authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the access authentication equipment includes: memory, processor the invention also includes a kind of access authentication equipment And it is stored in the processing routine for the WIFI cipher authentication that can be run on the memory and on the processor, the WIFI is close The processing routine of code authentication realizes the step of WIFI cipher authentication method as described above when being executed by the processor.
In addition, the invention also includes a kind of WIFI cipher authentication system, the system comprises: terminal as described above and connect Enter authentication device.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with WIFI cipher authentication program, the WIFI cipher authentication program realizes WIFI as described above when being executed by processor The step of cipher authentication method.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of method of WIFI cipher authentication, which is characterized in that the method for the WIFI cipher authentication the following steps are included:
Terminal acquisition trajectories code data;
When the track code data is effective, the track code data is sent to access authentication equipment by the terminal, with Judge whether the track code data and desired guiding trajectory code data match for the access authentication equipment, wherein when described When track code data and desired guiding trajectory code data match, the terminal passes through WIFI cipher authentication.
2. the method for WIFI cipher authentication as described in claim 1, which is characterized in that described to have in the track code data When effect, the step of track code data is sent to access authentication equipment by the terminal, includes:
The terminal judges whether to collect track code data within a preset time;
When the terminal collects track code data in the preset time, then determine that the track code data has Effect, and the track code data is sent to the access authentication equipment.
3. the method for WIFI cipher authentication as claimed in claim 2, which is characterized in that the terminal judges whether when default After interior the step of collecting track code data further include:
If the terminal does not collect track code data within a preset time, time for not collecting track code data is judged Whether number is more than preset times;
If the number for not collecting track code data is not above the preset times, the terminal is returned to execute and be adopted The step of collecting track code data.
4. the method for WIFI cipher authentication as described in claim 1, which is characterized in that described to have in the track code data When effect, after the step of track code data is sent to access authentication equipment by the terminal further include:
When certification of the track code data not over the access authentication equipment, judge to send track code data Whether number is more than preset times;
When the number for sending track code data is less than the preset times, the terminal, which returns, executes acquisition trajectories The step of code data.
5. the method for WIFI cipher authentication as described in claim 1, which is characterized in that the method for the WIFI cipher authentication is also Include:
The terminal acquires track code data to be placed;
Acquire track code data to be placed again within a preset time;
Judge whether the track code data to be set acquired twice matches;
If the code data matching in track to be set acquired twice, the terminal send track code data to be placed It is saved to the access authentication equipment, to realize the Initialize installation to the track code data.
6. such as the method for WIFI cipher authentication described in any one of claim 1 to 5, which is characterized in that described in the track When code data is effective, the step of track code data is sent to access authentication equipment by the terminal, includes:
The terminal judges whether the track code data includes multiple tracks;
When the track code data includes multiple tracks, then determine that the track code data is effective, and by the track Code data is sent to the access authentication equipment.
7. a kind of method of WIFI cipher authentication, which is characterized in that the method for the WIFI cipher authentication includes:
Access authentication equipment receives the track code data that terminal is sent;
The access authentication equipment judges whether the track code data matches with desired guiding trajectory code data;
When the track code data and the desired guiding trajectory code data match, then confirm that the terminal passes through WIFI password Certification.
8. the method for WIFI cipher authentication as claimed in claim 7, which is characterized in that the method for the WIFI cipher authentication is also Include:
When the access authentication equipment receives the request of setting track code data of terminal, the access authentication equipment is obtained The desired guiding trajectory code data number being arranged;
When the desired guiding trajectory code data number being arranged is less than desired guiding trajectory code data number, the access authentication Track code data is arranged according to the request in equipment.
9. a kind of device of WIFI cipher authentication, which is characterized in that the device of the WIFI cipher authentication includes:
Capture program module is used for terminal acquisition trajectories code data;
Program module is sent, for when the track code data is effective, the terminal to send the track code data To access authentication equipment, so that the access authentication equipment judges whether are the track code data and desired guiding trajectory code data Matching, wherein when the track code data and desired guiding trajectory code data match, the terminal is recognized by WIFI password Card.
10. a kind of device of WIFI cipher authentication, which is characterized in that the device of the WIFI cipher authentication includes:
Program module is received, receives the track code data that terminal is sent for access authentication equipment;
Determining program module, for the access authentication equipment judge the track code data whether with desired guiding trajectory password number According to matching;
Confirm program module, is used for when the track code data and desired guiding trajectory code data matching, then it is described to connect Enter authentication device and confirms that the terminal passes through WIFI cipher authentication.
CN201811490626.XA 2018-12-06 2018-12-06 The method and apparatus of WIFI cipher authentication Pending CN109246702A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811490626.XA CN109246702A (en) 2018-12-06 2018-12-06 The method and apparatus of WIFI cipher authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811490626.XA CN109246702A (en) 2018-12-06 2018-12-06 The method and apparatus of WIFI cipher authentication

Publications (1)

Publication Number Publication Date
CN109246702A true CN109246702A (en) 2019-01-18

Family

ID=65073905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811490626.XA Pending CN109246702A (en) 2018-12-06 2018-12-06 The method and apparatus of WIFI cipher authentication

Country Status (1)

Country Link
CN (1) CN109246702A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235800A (en) * 2020-10-16 2021-01-15 广州零世纪信息科技有限公司 Authentication method, device, equipment and system based on motion trail

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634107A (en) * 2012-08-24 2014-03-12 财团法人工业技术研究院 Authentication method, password setting method and authentication system for electronic device
CN103955337A (en) * 2014-05-06 2014-07-30 北京金山安全软件有限公司 Method and system for opening application program in mobile terminal
CN105246042A (en) * 2015-10-23 2016-01-13 中国联合网络通信集团有限公司 Server login method, terminal and server
KR101901913B1 (en) * 2017-04-05 2018-09-27 주식회사 수퍼블리 Method and Apparatus for motion authentication using motion sensor
CN108763914A (en) * 2018-04-27 2018-11-06 出门问问信息科技有限公司 A kind of unlocking method and device of equipment screen locking

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103634107A (en) * 2012-08-24 2014-03-12 财团法人工业技术研究院 Authentication method, password setting method and authentication system for electronic device
CN103955337A (en) * 2014-05-06 2014-07-30 北京金山安全软件有限公司 Method and system for opening application program in mobile terminal
CN105246042A (en) * 2015-10-23 2016-01-13 中国联合网络通信集团有限公司 Server login method, terminal and server
KR101901913B1 (en) * 2017-04-05 2018-09-27 주식회사 수퍼블리 Method and Apparatus for motion authentication using motion sensor
CN108763914A (en) * 2018-04-27 2018-11-06 出门问问信息科技有限公司 A kind of unlocking method and device of equipment screen locking

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112235800A (en) * 2020-10-16 2021-01-15 广州零世纪信息科技有限公司 Authentication method, device, equipment and system based on motion trail

Similar Documents

Publication Publication Date Title
CN107730669B (en) Access control method, system and computer readable storage medium
CN104796385B (en) Terminal binding method, apparatus and system
WO2016169432A1 (en) Identity authentication method and device, and terminal
CN104580117B (en) Auth method, apparatus and system
CN106233796A (en) The automatic subscriber registration of calculating equipment and unblock
CN103021038A (en) Campus classroom attendance checking-in system and method for realizing attendance checking-in by using system
CN104700040B (en) Authority control method and device
US10192042B2 (en) User verifying method, terminal device, server and storage medium
CN104954343B (en) Checking information processing method, server and system
CN106656944A (en) Slide verification method and apparatus for hand-held mobile device
CN110336870A (en) Method for building up, device, system and the storage medium in telecommuting O&M channel
WO2014161259A1 (en) Verification code processing method, device, terminal and server
CN105635104A (en) Providing access to restricted resources via a persistent authenticated device network
CN109981360A (en) Internet of things equipment website activating method, device, system and storage medium
CN105101191B (en) The method and device of wlan security mechanism setting
CN110175448A (en) A kind of credible equipment login authentication method and the application system with authentication function
CN107318174A (en) A kind of communication means, device and terminal
CN107104946A (en) A kind of management system of computer laboratory
CN109407947A (en) Interface alternation and its verification method, logging request generation and verification method and device
CN107682359A (en) One kind is using register method, mobile terminal
CN105894634B (en) A kind of identification system and method
JP5325919B2 (en) Authentication apparatus and method
JP2011053969A (en) Personal identification system in e-learning system
CN109246702A (en) The method and apparatus of WIFI cipher authentication
WO2023197642A1 (en) Identity verification method, device, storage medium, and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118