CN111294981A - Wireless network connection method - Google Patents

Wireless network connection method Download PDF

Info

Publication number
CN111294981A
CN111294981A CN202010144079.0A CN202010144079A CN111294981A CN 111294981 A CN111294981 A CN 111294981A CN 202010144079 A CN202010144079 A CN 202010144079A CN 111294981 A CN111294981 A CN 111294981A
Authority
CN
China
Prior art keywords
information
user identity
identification information
device identification
voiceprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010144079.0A
Other languages
Chinese (zh)
Other versions
CN111294981B (en
Inventor
刘咏晨
鄂宁宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TIANJIN YINGXUNTONG TECHNOLOGY Co.,Ltd.
Original Assignee
Zhengzhou Zhilixin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Zhilixin Information Technology Co ltd filed Critical Zhengzhou Zhilixin Information Technology Co ltd
Priority to CN202010144079.0A priority Critical patent/CN111294981B/en
Publication of CN111294981A publication Critical patent/CN111294981A/en
Application granted granted Critical
Publication of CN111294981B publication Critical patent/CN111294981B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a wireless network connection method, which comprises the steps of receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal; if the first equipment identification information is registered equipment identification information and the first user identification information is user identification information meeting requirements, generating first shared verification information and second shared verification information, sending the first shared verification information to the wireless terminal, and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time and the feedback information and the second shared verification information meet a second preset rule, establishing wireless network connection with the wireless terminal. Therefore, the security and reliability of the wireless connection can be improved by such a wireless connection process.

Description

Wireless network connection method
Technical Field
The invention relates to a wireless network connection method.
Background
With the development of information technology, mobile terminals such as mobile phones become indispensable tools for people to work and live in daily life, and as an important function of the mobile terminals, wireless network connection is very important. The existing wireless network connection mode is simple, the existing wireless network connection mode is directly connected with a cloud server, and the safety is poor.
Disclosure of Invention
The invention aims to provide a wireless network connection method, which is used for solving the problem of poor safety of the existing wireless network connection mode.
In order to solve the problems, the invention adopts the following technical scheme:
a wireless network connection method, comprising:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal;
judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not;
if the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information;
and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal.
Optionally, the determining whether the first device identification information is registered device identification information includes: establishing an equipment identification database, wherein the equipment identification database comprises at least two pieces of registered equipment identification information;
if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
Optionally, the first user identity information is audio information;
correspondingly, the determining whether the first user identity information is satisfactory user identity information includes:
acquiring first voiceprint information of a user sending the first user identity information according to the first user identity information;
establishing a user identity database, wherein the user identity database comprises at least two pieces of voiceprint information, and all the voiceprint information in the user identity database is the voiceprint information meeting the requirements;
if the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
Optionally, the first preset rule includes: generating feedback information which is the same as the first sharing verification information according to the first sharing verification information;
the second preset rule comprises: the feedback information and the second shared authentication information are the same data information.
The invention has the beneficial effects that: after receiving a wireless network connection request sent by a wireless terminal, not directly performing wireless network connection, but performing equipment identification and user identity authentication according to the wireless network connection request, if the equipment is registered equipment and the user identity meets the requirement, not immediately establishing the wireless network connection, but generating first shared authentication information and second shared authentication information, sending the first shared authentication information to the wireless terminal, and if receiving feedback information which is sent by the wireless terminal and is obtained by processing the first shared authentication information according to a first preset rule within a preset time, wherein the limit condition of setting time can improve the reliability and safety of the wireless network connection, prevent the wireless network connection from being invalid due to overlong delay time, and the received feedback information and the second shared authentication information meet a second preset rule, it means that the security requirement is met with the wireless terminal and a wireless network connection can be established, and then a wireless network connection with the wireless terminal is established. Therefore, the security and reliability of the wireless connection can be improved by such a wireless connection process.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
fig. 1 is a flow chart illustrating a wireless network connection method.
Detailed Description
The present embodiment provides a wireless network connection method, as shown in fig. 1, including:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal:
the execution main body of the wireless network connection method can be a cloud server and is used for performing wireless network connection with a wireless terminal; the wireless access device can also be a wireless access device, and the wireless access device is a connection device between the wireless terminal and the cloud server. In this embodiment, the execution main body of the wireless network connection method is a cloud server.
The cloud server receives a wireless network connection request sent by a wireless terminal, and the wireless network connection request sent by the wireless terminal comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal. The first device identification information of the wireless terminal is device identification information representing the wireless terminal, and may be a Media Access Control (MAC) address of the wireless terminal, or a Media Access Control (MAC) address, or a physical address or a hardware address, an International Mobile Equipment Identity (IMEI), a Mobile Equipment Identity (MEID), and the like, which is not limited in this embodiment. The user operating the wireless terminal may be a worker operating the wireless terminal for making a wireless network connection. The first user identity information of the user is related identity information of the user, such as: fingerprint information or audio information of the user.
Judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not:
for judging whether the first device identification information is registered device identification information, a specific implementation procedure is given as follows:
the cloud server establishes an equipment identification database, and the equipment identification database is stored in storage equipment in the cloud server. The device identification database comprises at least two pieces of registered device identification information, and the number of the registered device identification information in the device identification database is set according to actual needs, namely, each piece of device identification information in the device identification database is the device identification information which is registered in advance. Then, if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
For judging whether the first user identity information is the user identity information meeting the requirements, a specific implementation process is given as follows:
in this embodiment, the first user identity information is audio information, and the audio information may be acquired through a microphone on the mobile terminal.
Then, the cloud server obtains the first voiceprint information of the user sending the audio information according to the first user identity information, namely according to the audio information. In order to improve the recognition accuracy of the voiceprint information obtained by recognition, the audio signal may be some more representative sentences or words, such as: "Wireless network connection".
The cloud server establishes a user identity database, and the user identity database is stored in a storage device in the cloud server. The user identity database comprises at least two pieces of voiceprint information, the number of the voiceprint information in the user identity database is set according to actual needs, each piece of voiceprint information in the user identity database is voiceprint information meeting requirements, the voiceprint information meeting the requirements means that the voiceprint information meets the requirements and the user corresponding to the voiceprint information meeting the requirements can be a holder of the wireless terminal. All the voiceprint information in the user identity database is voiceprint information which is obtained by inputting and identifying in advance. If the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
If the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information:
if the first device identification information is registered device identification information and the first user identification information is user identification information meeting requirements (that is, the first voiceprint information is voiceprint information meeting requirements), the cloud server generates first shared verification information and second shared verification information, the first shared verification information and the second shared verification information are two same data information, and the first shared verification information and the second shared verification information may be a set string of characters, such as: a string of characters, which is composed of a plurality of binary digits 0 and 1 by a corresponding arrangement order, is similar to an authentication code.
The cloud server sends first sharing verification information to the wireless terminal.
If feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal:
and after receiving the first sharing verification information, the wireless terminal processes the first sharing verification information according to a first preset rule to obtain feedback information. The first preset rule is set by actual conditions, such as: generating the same feedback information as the first shared verification information according to the first shared verification information, that is, the first shared verification information and the feedback information are the same data information, or generating the feedback information opposite to the first shared verification information according to the first shared verification information, where the first shared verification information is an negation rule, for example: the first shared authentication information is 1010, and the generated feedback information is 0101.
Wireless terminal transmits the feedback information who generates to the high in the clouds server, predetermines a data reception time, for example 10s, if the feedback information that wireless terminal sent is received to the high in the clouds server in this predetermined time, then whether comparison feedback information and second share verification information accord with the second and predetermine the rule, and in this embodiment, the second is predetermine the rule and is included: the feedback information and the second shared verification information are the same data information, and if the feedback information and the second shared verification information accord with a second preset rule, subsequent wireless network connection is carried out. That is to say, if the cloud server receives the feedback information sent by the wireless terminal within the preset time, and the feedback information and the second shared verification information conform to the second preset rule, the wireless network connection between the cloud server and the wireless terminal is established.
An example is given below:
the first shared verification information and the second shared verification information are both 1010, and feedback information identical to the first shared verification information is generated according to the first shared verification information, and the feedback information is 1010. The second preset rule includes data information that the feedback information is the same as the second shared authentication information. Then, if the cloud server receives the feedback information 1010 sent by the wireless terminal within the preset time (10 s), and the feedback information 1010 and the second shared verification information conform to a second preset rule, establishing a wireless network connection between the cloud server and the wireless terminal.
The above-mentioned embodiments are merely illustrative of the technical solutions of the present invention in a specific embodiment, and any equivalent substitutions and modifications or partial substitutions of the present invention without departing from the spirit and scope of the present invention should be covered by the claims of the present invention.

Claims (4)

1. A wireless networking method, comprising:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal;
judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not;
if the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information;
and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal.
2. The wireless network connection method according to claim 1, wherein the determining whether the first device identification information is registered device identification information includes: establishing an equipment identification database, wherein the equipment identification database comprises at least two pieces of registered equipment identification information;
if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
3. The wireless networking method of claim 1, wherein the first subscriber identity information is audio information;
correspondingly, the determining whether the first user identity information is satisfactory user identity information includes:
acquiring first voiceprint information of a user sending the first user identity information according to the first user identity information;
establishing a user identity database, wherein the user identity database comprises at least two pieces of voiceprint information, and all the voiceprint information in the user identity database is the voiceprint information meeting the requirements;
if the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
4. The wireless network connection method according to claim 1, wherein the first preset rule comprises: generating feedback information which is the same as the first sharing verification information according to the first sharing verification information;
the second preset rule comprises: the feedback information and the second shared authentication information are the same data information.
CN202010144079.0A 2020-03-04 2020-03-04 Wireless network connection method Active CN111294981B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010144079.0A CN111294981B (en) 2020-03-04 2020-03-04 Wireless network connection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010144079.0A CN111294981B (en) 2020-03-04 2020-03-04 Wireless network connection method

Publications (2)

Publication Number Publication Date
CN111294981A true CN111294981A (en) 2020-06-16
CN111294981B CN111294981B (en) 2021-04-16

Family

ID=71026937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010144079.0A Active CN111294981B (en) 2020-03-04 2020-03-04 Wireless network connection method

Country Status (1)

Country Link
CN (1) CN111294981B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660401A (en) * 2013-11-15 2015-05-27 深圳市腾讯计算机系统有限公司 Authentication method, authentication system and terminal
US20170310640A1 (en) * 2014-09-26 2017-10-26 Fortinet, Inc. Mobile hotspot managed by access controller
CN109033801A (en) * 2018-07-25 2018-12-18 努比亚技术有限公司 Method, mobile terminal and the storage medium of application program verification user identity
CN110177111A (en) * 2019-06-06 2019-08-27 北京芯盾时代科技有限公司 A kind of Information Authentication method, system and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104660401A (en) * 2013-11-15 2015-05-27 深圳市腾讯计算机系统有限公司 Authentication method, authentication system and terminal
US20170310640A1 (en) * 2014-09-26 2017-10-26 Fortinet, Inc. Mobile hotspot managed by access controller
CN109033801A (en) * 2018-07-25 2018-12-18 努比亚技术有限公司 Method, mobile terminal and the storage medium of application program verification user identity
CN110177111A (en) * 2019-06-06 2019-08-27 北京芯盾时代科技有限公司 A kind of Information Authentication method, system and device

Also Published As

Publication number Publication date
CN111294981B (en) 2021-04-16

Similar Documents

Publication Publication Date Title
CN102523213B (en) Server and terminal authenticating method and server and terminal
US12096207B2 (en) Network access authentication method and device
AU2015323425B2 (en) Systems and methods for identifying mobile devices
CN104580260B (en) A kind of safety method suitable for Intelligent terminal for Internet of things
CN112231748B (en) Desensitization processing method and device, storage medium and electronic device
CN104580261A (en) Safety method applicable to wireless internet of things
WO2015106728A1 (en) Data processing method and system
WO2018128237A1 (en) Identity authentication system and user equipment utilizing user usage pattern analysis
CN108810835B (en) Method and device for associating one number with multiple terminals, terminal and storage medium
CN104901808A (en) Voiceprint authentication system and method based on time type dynamic password
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN111294981B (en) Wireless network connection method
CN106685914B (en) Information verification method, server and client
CN104580262B (en) A kind of safety method suitable for wireless Internet of Things
US12041457B2 (en) Gateway apparatus for radio over IP network
CN115767538A (en) Information verification method, information processing method, device and equipment
CN114499951A (en) Identity authentication information cracking method and device and electronic equipment
CN109362079B (en) Data processing method and device
CN110248326B (en) Data processing method and device
CN109246105B (en) Communication method and system for preventing information leakage
CN106936840B (en) Information prompting method and device
KR101941770B1 (en) Authentication Method using portable device
CN110751033A (en) Offline login method and related product
CN106912032A (en) A kind of information processing method, system, client and server
CN112992158A (en) Identity authentication method and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210330

Address after: 300110 6-3-801, Xinda garden, Baidi Road, Nankai District, Tianjin (Science and Technology Park)

Applicant after: TIANJIN YINGXUNTONG TECHNOLOGY Co.,Ltd.

Address before: No.102, South Building, No.1 Incubation Park, Henan National University Science and Technology Park, No.11, Changchun Road, high tech Industrial Development Zone, Zhengzhou City, Henan Province, 450000

Applicant before: ZHENGZHOU ZHILIXIN INFORMATION TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant