CN111294981A - Wireless network connection method - Google Patents
Wireless network connection method Download PDFInfo
- Publication number
- CN111294981A CN111294981A CN202010144079.0A CN202010144079A CN111294981A CN 111294981 A CN111294981 A CN 111294981A CN 202010144079 A CN202010144079 A CN 202010144079A CN 111294981 A CN111294981 A CN 111294981A
- Authority
- CN
- China
- Prior art keywords
- information
- user identity
- identification information
- device identification
- voiceprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/11—Allocation or use of connection identifiers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention relates to a wireless network connection method, which comprises the steps of receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal; if the first equipment identification information is registered equipment identification information and the first user identification information is user identification information meeting requirements, generating first shared verification information and second shared verification information, sending the first shared verification information to the wireless terminal, and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time and the feedback information and the second shared verification information meet a second preset rule, establishing wireless network connection with the wireless terminal. Therefore, the security and reliability of the wireless connection can be improved by such a wireless connection process.
Description
Technical Field
The invention relates to a wireless network connection method.
Background
With the development of information technology, mobile terminals such as mobile phones become indispensable tools for people to work and live in daily life, and as an important function of the mobile terminals, wireless network connection is very important. The existing wireless network connection mode is simple, the existing wireless network connection mode is directly connected with a cloud server, and the safety is poor.
Disclosure of Invention
The invention aims to provide a wireless network connection method, which is used for solving the problem of poor safety of the existing wireless network connection mode.
In order to solve the problems, the invention adopts the following technical scheme:
a wireless network connection method, comprising:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal;
judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not;
if the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information;
and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal.
Optionally, the determining whether the first device identification information is registered device identification information includes: establishing an equipment identification database, wherein the equipment identification database comprises at least two pieces of registered equipment identification information;
if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
Optionally, the first user identity information is audio information;
correspondingly, the determining whether the first user identity information is satisfactory user identity information includes:
acquiring first voiceprint information of a user sending the first user identity information according to the first user identity information;
establishing a user identity database, wherein the user identity database comprises at least two pieces of voiceprint information, and all the voiceprint information in the user identity database is the voiceprint information meeting the requirements;
if the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
Optionally, the first preset rule includes: generating feedback information which is the same as the first sharing verification information according to the first sharing verification information;
the second preset rule comprises: the feedback information and the second shared authentication information are the same data information.
The invention has the beneficial effects that: after receiving a wireless network connection request sent by a wireless terminal, not directly performing wireless network connection, but performing equipment identification and user identity authentication according to the wireless network connection request, if the equipment is registered equipment and the user identity meets the requirement, not immediately establishing the wireless network connection, but generating first shared authentication information and second shared authentication information, sending the first shared authentication information to the wireless terminal, and if receiving feedback information which is sent by the wireless terminal and is obtained by processing the first shared authentication information according to a first preset rule within a preset time, wherein the limit condition of setting time can improve the reliability and safety of the wireless network connection, prevent the wireless network connection from being invalid due to overlong delay time, and the received feedback information and the second shared authentication information meet a second preset rule, it means that the security requirement is met with the wireless terminal and a wireless network connection can be established, and then a wireless network connection with the wireless terminal is established. Therefore, the security and reliability of the wireless connection can be improved by such a wireless connection process.
Drawings
In order to more clearly illustrate the technical solution of the embodiment of the present invention, the drawings needed to be used in the embodiment will be briefly described as follows:
fig. 1 is a flow chart illustrating a wireless network connection method.
Detailed Description
The present embodiment provides a wireless network connection method, as shown in fig. 1, including:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal:
the execution main body of the wireless network connection method can be a cloud server and is used for performing wireless network connection with a wireless terminal; the wireless access device can also be a wireless access device, and the wireless access device is a connection device between the wireless terminal and the cloud server. In this embodiment, the execution main body of the wireless network connection method is a cloud server.
The cloud server receives a wireless network connection request sent by a wireless terminal, and the wireless network connection request sent by the wireless terminal comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal. The first device identification information of the wireless terminal is device identification information representing the wireless terminal, and may be a Media Access Control (MAC) address of the wireless terminal, or a Media Access Control (MAC) address, or a physical address or a hardware address, an International Mobile Equipment Identity (IMEI), a Mobile Equipment Identity (MEID), and the like, which is not limited in this embodiment. The user operating the wireless terminal may be a worker operating the wireless terminal for making a wireless network connection. The first user identity information of the user is related identity information of the user, such as: fingerprint information or audio information of the user.
Judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not:
for judging whether the first device identification information is registered device identification information, a specific implementation procedure is given as follows:
the cloud server establishes an equipment identification database, and the equipment identification database is stored in storage equipment in the cloud server. The device identification database comprises at least two pieces of registered device identification information, and the number of the registered device identification information in the device identification database is set according to actual needs, namely, each piece of device identification information in the device identification database is the device identification information which is registered in advance. Then, if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
For judging whether the first user identity information is the user identity information meeting the requirements, a specific implementation process is given as follows:
in this embodiment, the first user identity information is audio information, and the audio information may be acquired through a microphone on the mobile terminal.
Then, the cloud server obtains the first voiceprint information of the user sending the audio information according to the first user identity information, namely according to the audio information. In order to improve the recognition accuracy of the voiceprint information obtained by recognition, the audio signal may be some more representative sentences or words, such as: "Wireless network connection".
The cloud server establishes a user identity database, and the user identity database is stored in a storage device in the cloud server. The user identity database comprises at least two pieces of voiceprint information, the number of the voiceprint information in the user identity database is set according to actual needs, each piece of voiceprint information in the user identity database is voiceprint information meeting requirements, the voiceprint information meeting the requirements means that the voiceprint information meets the requirements and the user corresponding to the voiceprint information meeting the requirements can be a holder of the wireless terminal. All the voiceprint information in the user identity database is voiceprint information which is obtained by inputting and identifying in advance. If the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
If the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information:
if the first device identification information is registered device identification information and the first user identification information is user identification information meeting requirements (that is, the first voiceprint information is voiceprint information meeting requirements), the cloud server generates first shared verification information and second shared verification information, the first shared verification information and the second shared verification information are two same data information, and the first shared verification information and the second shared verification information may be a set string of characters, such as: a string of characters, which is composed of a plurality of binary digits 0 and 1 by a corresponding arrangement order, is similar to an authentication code.
The cloud server sends first sharing verification information to the wireless terminal.
If feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal:
and after receiving the first sharing verification information, the wireless terminal processes the first sharing verification information according to a first preset rule to obtain feedback information. The first preset rule is set by actual conditions, such as: generating the same feedback information as the first shared verification information according to the first shared verification information, that is, the first shared verification information and the feedback information are the same data information, or generating the feedback information opposite to the first shared verification information according to the first shared verification information, where the first shared verification information is an negation rule, for example: the first shared authentication information is 1010, and the generated feedback information is 0101.
Wireless terminal transmits the feedback information who generates to the high in the clouds server, predetermines a data reception time, for example 10s, if the feedback information that wireless terminal sent is received to the high in the clouds server in this predetermined time, then whether comparison feedback information and second share verification information accord with the second and predetermine the rule, and in this embodiment, the second is predetermine the rule and is included: the feedback information and the second shared verification information are the same data information, and if the feedback information and the second shared verification information accord with a second preset rule, subsequent wireless network connection is carried out. That is to say, if the cloud server receives the feedback information sent by the wireless terminal within the preset time, and the feedback information and the second shared verification information conform to the second preset rule, the wireless network connection between the cloud server and the wireless terminal is established.
An example is given below:
the first shared verification information and the second shared verification information are both 1010, and feedback information identical to the first shared verification information is generated according to the first shared verification information, and the feedback information is 1010. The second preset rule includes data information that the feedback information is the same as the second shared authentication information. Then, if the cloud server receives the feedback information 1010 sent by the wireless terminal within the preset time (10 s), and the feedback information 1010 and the second shared verification information conform to a second preset rule, establishing a wireless network connection between the cloud server and the wireless terminal.
The above-mentioned embodiments are merely illustrative of the technical solutions of the present invention in a specific embodiment, and any equivalent substitutions and modifications or partial substitutions of the present invention without departing from the spirit and scope of the present invention should be covered by the claims of the present invention.
Claims (4)
1. A wireless networking method, comprising:
receiving a wireless network connection request sent by a wireless terminal, wherein the wireless network connection request comprises first equipment identification information of the wireless terminal and first user identity information of a user operating the wireless terminal;
judging whether the first equipment identification information is registered equipment identification information or not, and judging whether the first user identity information is qualified user identity information or not;
if the first equipment identification information is registered equipment identification information and the first user identity information is user identity information meeting requirements, generating first shared verification information and second shared verification information and sending the first shared verification information to the wireless terminal; wherein the first shared authentication information and the second shared authentication information are two same data information;
and if feedback information obtained by processing the first shared verification information according to a first preset rule and sent by the wireless terminal is received within a preset time, and the feedback information and the second shared verification information accord with a second preset rule, establishing wireless network connection with the wireless terminal.
2. The wireless network connection method according to claim 1, wherein the determining whether the first device identification information is registered device identification information includes: establishing an equipment identification database, wherein the equipment identification database comprises at least two pieces of registered equipment identification information;
if the first device identification information is one of the device identification information in the device identification database, the first device identification information is registered device identification information; if the first device identification information is not any device identification information in the device identification database, the first device identification information is not registered device identification information.
3. The wireless networking method of claim 1, wherein the first subscriber identity information is audio information;
correspondingly, the determining whether the first user identity information is satisfactory user identity information includes:
acquiring first voiceprint information of a user sending the first user identity information according to the first user identity information;
establishing a user identity database, wherein the user identity database comprises at least two pieces of voiceprint information, and all the voiceprint information in the user identity database is the voiceprint information meeting the requirements;
if the first voiceprint information is certain voiceprint information in the user identity database, the first voiceprint information is the voiceprint information meeting the requirement; and if the first voiceprint information is not any voiceprint information in the user identity database, the first voiceprint information is not the voiceprint information meeting the requirement.
4. The wireless network connection method according to claim 1, wherein the first preset rule comprises: generating feedback information which is the same as the first sharing verification information according to the first sharing verification information;
the second preset rule comprises: the feedback information and the second shared authentication information are the same data information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010144079.0A CN111294981B (en) | 2020-03-04 | 2020-03-04 | Wireless network connection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010144079.0A CN111294981B (en) | 2020-03-04 | 2020-03-04 | Wireless network connection method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111294981A true CN111294981A (en) | 2020-06-16 |
CN111294981B CN111294981B (en) | 2021-04-16 |
Family
ID=71026937
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010144079.0A Active CN111294981B (en) | 2020-03-04 | 2020-03-04 | Wireless network connection method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111294981B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660401A (en) * | 2013-11-15 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | Authentication method, authentication system and terminal |
US20170310640A1 (en) * | 2014-09-26 | 2017-10-26 | Fortinet, Inc. | Mobile hotspot managed by access controller |
CN109033801A (en) * | 2018-07-25 | 2018-12-18 | 努比亚技术有限公司 | Method, mobile terminal and the storage medium of application program verification user identity |
CN110177111A (en) * | 2019-06-06 | 2019-08-27 | 北京芯盾时代科技有限公司 | A kind of Information Authentication method, system and device |
-
2020
- 2020-03-04 CN CN202010144079.0A patent/CN111294981B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104660401A (en) * | 2013-11-15 | 2015-05-27 | 深圳市腾讯计算机系统有限公司 | Authentication method, authentication system and terminal |
US20170310640A1 (en) * | 2014-09-26 | 2017-10-26 | Fortinet, Inc. | Mobile hotspot managed by access controller |
CN109033801A (en) * | 2018-07-25 | 2018-12-18 | 努比亚技术有限公司 | Method, mobile terminal and the storage medium of application program verification user identity |
CN110177111A (en) * | 2019-06-06 | 2019-08-27 | 北京芯盾时代科技有限公司 | A kind of Information Authentication method, system and device |
Also Published As
Publication number | Publication date |
---|---|
CN111294981B (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102523213B (en) | Server and terminal authenticating method and server and terminal | |
US12096207B2 (en) | Network access authentication method and device | |
AU2015323425B2 (en) | Systems and methods for identifying mobile devices | |
CN104580260B (en) | A kind of safety method suitable for Intelligent terminal for Internet of things | |
CN112231748B (en) | Desensitization processing method and device, storage medium and electronic device | |
CN104580261A (en) | Safety method applicable to wireless internet of things | |
WO2015106728A1 (en) | Data processing method and system | |
WO2018128237A1 (en) | Identity authentication system and user equipment utilizing user usage pattern analysis | |
CN108810835B (en) | Method and device for associating one number with multiple terminals, terminal and storage medium | |
CN104901808A (en) | Voiceprint authentication system and method based on time type dynamic password | |
CN109150864B (en) | Anti-cheating method and device based on secondary authentication | |
CN111294981B (en) | Wireless network connection method | |
CN106685914B (en) | Information verification method, server and client | |
CN104580262B (en) | A kind of safety method suitable for wireless Internet of Things | |
US12041457B2 (en) | Gateway apparatus for radio over IP network | |
CN115767538A (en) | Information verification method, information processing method, device and equipment | |
CN114499951A (en) | Identity authentication information cracking method and device and electronic equipment | |
CN109362079B (en) | Data processing method and device | |
CN110248326B (en) | Data processing method and device | |
CN109246105B (en) | Communication method and system for preventing information leakage | |
CN106936840B (en) | Information prompting method and device | |
KR101941770B1 (en) | Authentication Method using portable device | |
CN110751033A (en) | Offline login method and related product | |
CN106912032A (en) | A kind of information processing method, system, client and server | |
CN112992158A (en) | Identity authentication method and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210330 Address after: 300110 6-3-801, Xinda garden, Baidi Road, Nankai District, Tianjin (Science and Technology Park) Applicant after: TIANJIN YINGXUNTONG TECHNOLOGY Co.,Ltd. Address before: No.102, South Building, No.1 Incubation Park, Henan National University Science and Technology Park, No.11, Changchun Road, high tech Industrial Development Zone, Zhengzhou City, Henan Province, 450000 Applicant before: ZHENGZHOU ZHILIXIN INFORMATION TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |