CN112637844A - Security authentication method, device, equipment and medium - Google Patents

Security authentication method, device, equipment and medium Download PDF

Info

Publication number
CN112637844A
CN112637844A CN202011485992.3A CN202011485992A CN112637844A CN 112637844 A CN112637844 A CN 112637844A CN 202011485992 A CN202011485992 A CN 202011485992A CN 112637844 A CN112637844 A CN 112637844A
Authority
CN
China
Prior art keywords
wireless
mobile terminal
verification code
request
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011485992.3A
Other languages
Chinese (zh)
Inventor
王付荣
宋德超
张军
邱园
鄢辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202011485992.3A priority Critical patent/CN112637844A/en
Publication of CN112637844A publication Critical patent/CN112637844A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a security authentication method, a security authentication device, security authentication equipment and a security authentication medium, which are used for solving the problem that the security of connection of intelligent equipment cannot be ensured in the prior art. According to the embodiment of the invention, the target verification code is generated only when the server receives the notification information that the wireless network connection request sent by the mobile terminal passes the verification, and when the server receives the request carrying the verification code sent by the mobile terminal, the authentication is carried out according to the verification code carried in the request and the target verification code, so that the wireless network and verification code double verification is carried out on the mobile terminal connected with the intelligent equipment, the safety when the intelligent equipment is connected is ensured, and the user experience is improved.

Description

Security authentication method, device, equipment and medium
Technical Field
The present invention relates to the field of account security technologies, and in particular, to a security authentication method, apparatus, device, and medium.
Background
In recent years, along with the leakage of information data, the case that the privacy of a user is leaked is compared with the case that the privacy of the user is leaked, at present, when the user uses the intelligent device, the user can be connected with the intelligent device through set application software to further control the intelligent device, and as the user is connected with the intelligent device through the set application software, the non-differentiated control can be realized, but the safety in connection cannot be ensured.
Therefore, the prior art proposes that a mobile terminal is connected with a wireless network for security authentication, and if the mobile terminal and the wireless network are successfully distributed, the intelligent device connected with the wireless network can be controlled without distinction.
Disclosure of Invention
The invention provides a security authentication method, a security authentication device, security authentication equipment and a security authentication medium, which are used for solving the problem that the security of connection of intelligent equipment cannot be ensured in the prior art.
In a first aspect, an embodiment of the present invention provides a security authentication method, where the method includes:
receiving notification information that a wireless network connection request sent by a mobile terminal passes verification, wherein the wireless network connection request carries a wireless name and a wireless password;
generating and sending a target verification code;
and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
Further, the method further comprises:
and if the received verification code is different from the target verification code, returning response information of connection failure to the mobile terminal.
Further, before receiving the request carrying the verification code sent by the mobile terminal, the method further includes:
and sending a Service Set Identifier (SSID) of the intelligent equipment to be connected to the mobile terminal so that the mobile terminal establishes connection with the intelligent equipment of the SSID.
In a second aspect, an embodiment of the present invention further provides a security authentication method, where the method includes:
sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and sending a request carrying a verification code, and establishing connection with the intelligent equipment when the request passes the verification.
Further, before the sending the request carrying the verification code, the method further includes:
receiving a Service Set Identifier (SSID) sent by a server after the wireless network connection request passes verification;
and matching with the corresponding intelligent equipment according to the SSID.
Further, the matching with the corresponding smart device according to the SSID includes:
and broadcasting a distribution network request containing the SSID.
Further, the method further comprises:
if no wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password exists, receiving response information of networking failure;
and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
Further, before the sending the wireless network connection request, the method further includes:
receiving starting operation of application software for controlling the intelligent equipment, and starting the application software;
and displaying a setting page, and receiving the input wireless name and the wireless password.
In a third aspect, an embodiment of the present invention provides a security authentication apparatus, where the apparatus includes:
the mobile terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving notification information that a wireless network connection request sent by the mobile terminal passes verification, and the wireless network connection request carries a wireless name and a wireless password;
the processing module is used for generating and sending a target verification code; and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
Further, the processing module is specifically configured to return response information of connection failure to the mobile terminal if the received verification code is different from the target verification code.
Further, the apparatus further comprises:
and the sending module is used for sending the service set identifier SSID of the intelligent equipment to be connected to the mobile terminal so as to establish connection between the mobile terminal and the intelligent equipment of the SSID.
In a fourth aspect, an embodiment of the present invention provides a security authentication apparatus, where the apparatus includes:
the wireless network connection module is used for sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and the processing module is used for sending a request carrying the verification code and establishing connection with the intelligent equipment when the request passes the verification.
Further, the processing module is specifically configured to receive a service set identifier SSID sent by the server after the verification of the wireless network connection request is passed; and matching with the corresponding intelligent equipment according to the SSID.
Further, the processing module is specifically configured to broadcast a distribution network request including the SSID.
Further, the processing module is specifically configured to receive response information of a networking failure if there is no wireless network corresponding to the target wireless name and the target wireless password that are consistent with the wireless name and the wireless password; and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
Further, the processing module is specifically configured to receive a start operation of application software that controls the smart device, and start the application software; the input wireless name and wireless password are received.
In a fifth aspect, an embodiment of the present invention provides an electronic device, where the electronic device includes at least a processor and a memory, and the processor is configured to execute any one of the above steps of security authentication when executing a computer program stored in the memory.
In a sixth aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores a computer program, and the computer program, when executed by a processor, performs any of the above steps of secure authentication.
According to the embodiment of the invention, the target verification code is generated only when the server receives the notification information that the wireless network connection request sent by the mobile terminal passes the verification, and when the server receives the request carrying the verification code sent by the mobile terminal, the authentication is carried out according to the verification code carried in the request and the target verification code, so that the wireless network and verification code double verification is carried out on the mobile terminal connected with the intelligent equipment, the safety when the intelligent equipment is connected is ensured, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
Fig. 1 is a schematic diagram of a security authentication process according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating a detailed implementation process of verification code authentication in the security authentication according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a security authentication process according to an embodiment of the present invention;
fig. 4 is a detailed schematic diagram of the matching between the mobile terminal and the intelligent device according to the embodiment of the present invention;
fig. 5 is a schematic diagram illustrating a detailed implementation process of the security authentication according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a security identification device according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a security identification device according to an embodiment of the present invention;
fig. 8 is an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to improve the security when connecting the intelligent device, the embodiment of the invention provides a security authentication method, a security authentication device and a security authentication medium.
Example 1:
fig. 1 is a schematic diagram of a security authentication process provided in an embodiment of the present invention, where the process includes the following steps:
s101: and receiving notification information that the wireless network connection request sent by the mobile terminal passes the verification, wherein the wireless network connection request carries a wireless name and a wireless password.
In order to realize control over the intelligent device, the mobile terminal first needs to be in network connection with a wireless network where the intelligent device is located. Specifically, when the network is accessed, firstly, the intelligent device to be controlled is selected based on the mobile terminal, after the intelligent device to be controlled is determined, the notification information connected with the intelligent device is sent to the server corresponding to the intelligent device through the network where the intelligent device is located, in order to realize the sending of the notification information, the mobile terminal can display an input interface for a wireless name and a wireless password of a wireless network, receive the wireless name and the wireless password input at the interface, and carry the received wireless name and the received wireless password in a wireless network connection request for sending.
And when the router corresponds to the wireless name and the wireless password, the router sends notification information that the wireless network connection request sent by the mobile terminal passes the verification to a server corresponding to the intelligent equipment.
In order to improve the security of authentication, after the server receives the verification information that the wireless network connection request passes the verification, the server sends the SSID of the intelligent device to be connected to the mobile terminal.
S102: and generating and sending the target verification code.
In order to realize the verification of the mobile terminal, in the embodiment of the invention, the server generates the target verification code after receiving the notification information, and sends the generated target verification code to the corresponding equipment by adopting the communication mode according to the communication mode stored in advance. The communication mode can be a mobile phone number, a mailbox or an IP address.
S103: and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
In order to improve the security of authentication, when a mobile terminal is connected with intelligent equipment, after wireless network authentication is passed, the mobile terminal sends a request carrying a verification code to a server, after the server receives the request sent by the mobile terminal, the server obtains the verification code carried in the request, judges according to the verification code carried in the request and a target verification code stored in advance, judges whether the received verification code is consistent with the target verification code, and if so, confirms that the mobile terminal passes the authentication, so that the mobile terminal is connected with the intelligent equipment.
According to the embodiment of the invention, the target verification code is generated only when the server receives the notification information that the wireless network connection request sent by the mobile terminal passes the verification, and when the server receives the request carrying the verification code sent by the mobile terminal, the authentication is carried out according to the verification code carried in the request and the target verification code, so that the wireless network and verification code double verification is carried out on the mobile terminal connected with the intelligent equipment, the safety when the intelligent equipment is connected is ensured, and the user experience is improved.
Example 2:
in order to improve the user experience, on the basis of the above embodiment, in the embodiment of the present invention, the method further includes:
and if the received verification code is different from the target verification code, returning response information of connection failure to the mobile terminal.
In the embodiment of the invention, the verification code sent by the mobile terminal is obtained according to the received request carrying the verification code, the judgment is carried out according to the verification code and the target verification code, and if the verification code is inconsistent with the target verification code, the server returns response information of connection failure to the mobile terminal.
The response information of the connection failure may be a preset identifier or a preset text, and specifically, what the content of the response information of the connection failure is not limited herein.
To implement control on the intelligent device, on the basis of the foregoing embodiments, in an embodiment of the present invention, before receiving the request carrying the verification code sent by the mobile terminal, the method further includes:
and sending a Service Set Identifier (SSID) of the intelligent equipment to be connected to the mobile terminal so that the mobile terminal establishes connection with the intelligent equipment of the SSID.
In order to realize the connection between the mobile terminal and the intelligent device corresponding to the SSID, after the server receives the verification information that the wireless network connection request passes the verification, the server sends the SSID of the intelligent device to be connected to the mobile terminal.
And the connection between the intelligent equipment and the mobile terminal based on the SSID can not realize the control of the mobile terminal on the intelligent equipment, and is only a false connection.
Fig. 2 is a schematic diagram of a detailed implementation process of verification code authentication in the security authentication provided in the embodiment of the present invention, where the process includes:
s201: and starting.
S202: the server sends and saves the target verification code.
S203: whether the server receives a request carrying the verification code within a set time is judged, if yes, S204 is executed, and if not, S205 is executed.
S204: the server judges whether the verification code carried by the request is consistent with the target verification code, if so, the S206 is executed, and if not, the S205 is executed.
S205: and returning response information of connection failure to the mobile terminal.
S206: and the mobile terminal passes the authentication.
Example 3:
fig. 3 is a schematic diagram of a security authentication process according to an embodiment of the present invention, where the process includes the following steps:
s301: and sending a wireless network connection request, wherein the wireless name and the wireless password are carried in the wireless network connection request.
The security authentication method provided by the embodiment of the invention is applied to the mobile terminal.
In order to realize control over the intelligent device, the mobile terminal first needs to be in network connection with a wireless network where the intelligent device is located. Specifically, when the network is accessed, firstly, the intelligent device to be controlled is selected based on the mobile terminal, after the intelligent device to be controlled is determined, the notification information connected with the intelligent device is sent to the server corresponding to the intelligent device through the network where the intelligent device is located, in order to realize the sending of the notification information, the mobile terminal can display an input interface for a wireless name and a wireless password of a wireless network, receive the wireless name and the wireless password input at the interface, and carry the received wireless name and the received wireless password in a wireless network connection request for sending.
And in order to realize the connection between the mobile terminal and the intelligent equipment to be connected, the mobile terminal receives the SSID of the intelligent equipment to be connected, which is sent by the server, after the wireless network connection verification is passed.
S302: and sending a request carrying a verification code, and establishing connection with the intelligent equipment when the request passes the verification.
In order to improve the security of authentication, after the mobile terminal is matched with the intelligent device, the mobile terminal sends a request carrying a verification code to the server, the server performs verification code authentication based on the request sent by the mobile terminal, and if the verification code passes the verification, the mobile terminal is connected with the intelligent device. The connection establishment at this time means that the mobile terminal can control the connected intelligent device.
Example 4:
to implement control on the intelligent device, on the basis of the foregoing embodiments, in an embodiment of the present invention, before sending the request carrying the verification code, the method further includes:
receiving a Service Set Identifier (SSID) sent by a server after the wireless network connection request passes verification;
and matching with the corresponding intelligent equipment according to the SSID.
In order to realize the connection between the mobile terminal and the intelligent device to be connected, the mobile terminal receives the SSID of the intelligent device to be connected, which is sent by the server, after the wireless network connection verification is passed.
Because the mobile terminal is connected with the intelligent device based on the SSID of the intelligent device when the connection with the intelligent device is realized, the mobile terminal can be matched with the corresponding intelligent device according to the SSID, in order to ensure the safety of authentication, the realization of the matching of the mobile terminal and the intelligent device means that the connection with the intelligent device cannot be realized, the realization of the matching at the moment is equivalent to a false connection, and the control of the mobile terminal on the intelligent device cannot be realized.
In order to accurately authenticate when the mobile terminal is connected to the smart device, on the basis of the foregoing embodiments, in an embodiment of the present invention, the matching, according to the SSID, with the corresponding smart device includes:
and broadcasting a distribution network request containing the SSID.
In order to realize the connection between the mobile terminal and the intelligent device, in the embodiment of the invention, the mobile terminal broadcasts the distribution network request containing the SSID after receiving the SSID sent by the server, at the moment, if the intelligent device is in a hybrid mode, all network data packets can be monitored, the distribution network request is acquired through a user data packet protocol (UDP), and after the SSID corresponding to the intelligent device is captured, the matching between the mobile terminal and the intelligent device is realized. In addition, in order to ensure the security of authentication, the realization of matching between the mobile terminal and the intelligent device means that the connection with the intelligent device cannot be realized, and the realization of matching at the moment is equivalent to a false connection and cannot realize the control of the mobile terminal on the intelligent device.
In order to improve the user experience, on the basis of the foregoing embodiments, in an embodiment of the present invention, the method further includes:
if no wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password exists, receiving response information of networking failure;
and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
In the embodiment of the present invention, there may be a case where the wireless name and the wireless password carried in the wireless network connection request sent by the mobile terminal are inconsistent with the target wireless name and the target wireless password stored in the router, where the inconsistency refers to inconsistency between the wireless name and the target wireless name and/or inconsistency between the wireless password and the target wireless password, and in order to improve user experience, when the inconsistency is detected, the mobile terminal may receive response information of a networking failure. The response information of the networking failure may be a preset identification symbol or a preset text, and specifically, what the content of the response information of the networking failure is not limited herein.
In order to improve user experience, when inconsistency is detected, it is determined that authentication fails, and the mobile terminal receives response information of connection failure sent by the server, where the response information may be a preset identification symbol or a preset character, and specifically, why the response information is contained is not limited herein.
In the embodiment of the invention, in order to avoid wasting resources, a set time period is saved in advance, and if a request carrying a verification code sent by a mobile terminal is not received in the set time period, the mobile terminal authentication is determined to fail. If the accuracy of the authentication is to be guaranteed, the time period can be set for a long time, and if the efficiency of the authentication is to be guaranteed, the time period can be set for a short time, specifically, the preset time period can be flexibly set.
Example 5:
in order to accurately authenticate when the mobile terminal is connected to the smart device, on the basis of the foregoing embodiments, in an embodiment of the present invention, before the sending the wireless network connection request, the method further includes:
receiving starting operation of application software for controlling the intelligent equipment, and starting the application software;
and displaying a setting page, and receiving the input wireless name and the wireless password.
In order to realize the control of the intelligent equipment, in the embodiment of the invention, the application software for controlling the intelligent equipment is pre-installed in the mobile terminal, and when the mobile terminal controls the intelligent equipment, the connection between the mobile terminal and the intelligent equipment is realized through the application software. Specifically, when the mobile terminal receives a starting operation of application software for controlling the intelligent device, the application software is started, the setting page is displayed, the input wireless name and the wireless password are received in the setting page, and the received wireless name and the received wireless password are carried in the wireless network connection request to be sent.
If the wireless network authentication fails, the setting page of the application software displays response information of networking failure; if the wireless network authentication is passed, the server receives notification information that the wireless network connection request sent by the router passes the verification, the server sends the generated target verification code to corresponding equipment in a communication mode according to a pre-stored communication mode, the application software displays a setting page, the input verification code is received on the setting page, and the mobile terminal sends the request carrying the verification code.
And if the verification code authentication fails, the setting page of the application software displays response information of connection failure. If the verification code passes the authentication, the setting page of the application software shows response information of successful connection, and the connected intelligent equipment can be controlled on the setting page of the application software.
Fig. 4 is a detailed schematic diagram of the mobile terminal and the intelligent device provided in the embodiment of the present invention when connecting.
S401: and starting.
S402: and the mobile terminal sends notification information for connecting with the intelligent equipment to the server.
S403: the mobile terminal displays a setting interface and receives the input wireless name and the wireless password.
S404: the mobile terminal sends a wireless network connection request.
S405: and if so, executing S406, otherwise, executing S407.
S406: the wireless network connection request is authenticated, and the server receives the notification message that the wireless network connection request is authenticated, and performs S408.
S407: the mobile terminal receives response information of the networking failure.
S408: and the server sends the SSID of the intelligent equipment to be connected to the mobile terminal.
S409: and the mobile terminal broadcasts a distribution network request containing the SSID.
S410: the intelligent device starts a promiscuous mode to monitor all network data packets.
S411: the intelligent device acquires the distribution network request through the UDP and captures the SSID broadcast by the mobile terminal.
S412: and the mobile terminal is matched with the intelligent equipment.
S413: and (6) ending.
Example 6:
in order to improve user experience, on the basis of the above embodiments, in the embodiment of the present invention, the smart device includes a reset button.
If the wireless network connected with the intelligent equipment needs to be replaced, the intelligent equipment needs to be reconnected. Therefore, in order to facilitate reconnection, a reset operation is input on the smart device, and the reset operation may be implemented by a reset key, where the reset key may be a hardware key or a software key, and the reset operation may be a preset operation, for example, an operation performed by clicking two times or other operations, and how to reset the smart device is specifically described, which is not limited herein.
After the wireless network connected with the intelligent equipment is replaced, the WiFi module in the intelligent equipment searches for wireless network information. And when the intelligent equipment needs to be connected with a wireless network, sending a wireless network request. After receiving a wireless network request carrying a connection request, the router judges a wireless name and a wireless password carried in the wireless network request, realizes the connection with the network when the wireless name and the wireless password corresponding to the router correspond to the wireless name and the wireless password, and sends notification information of successful connection of the intelligent equipment to a server corresponding to the intelligent equipment.
In the embodiment of the present invention, after receiving the reset of the smart device, it is equivalent to performing an initialization operation on the smart device, so that the smart device enters the promiscuous mode, and after entering the promiscuous mode and the smart device is successfully reset, the intelligent device is displayed in a set manner, which indicates that the smart device is successfully reset, where the display manner may be a WiFi slow flash, and how to specifically indicate that the reset is successful is not limited herein.
In order to realize the control of the intelligent device, on the basis of the above embodiments, in the embodiment of the present invention, the intelligent device is in a promiscuous mode.
The wireless network distribution comprises two distribution network modes: a manual network distribution (AP mode network distribution) and an automatic network distribution (i.e. the promiscuous mode includes STA mode and AP mode mixed), wherein the STA mode is a basic network configuration mode and is composed of an AP and a plurality of STAs. The AP of the feature point of the STA mode is in the central position, mutual communication between the STAs is forwarded through the AP, and data interaction with the WiFi module can be achieved through proper setting in the STA mode. In the AP mode, the AP, namely the wireless access point, is a creator of a wireless network and a central node of the network, and when the wireless access point works in the AP mode, intelligent equipment such as a mobile phone, a computer and the like can be directly connected with a WiFi module, and the success rate of a distribution network in the AP mode is high.
The promiscuous mode means that the network card can receive all data passing through the network card, and the data packet is received no matter whether the destination address of the data stream is the network card or not, so in the embodiment of the present invention, the intelligent device is in the promiscuous mode.
Example 7:
the following describes the security procedure provided by the embodiment of the present invention in detail with reference to a specific embodiment.
Fig. 5 is a schematic diagram of a detailed implementation process of the security authentication provided in the embodiment of the present invention, where the process includes:
s501: and starting.
S502: and the mobile terminal sends notification information for connecting with the intelligent equipment to the server.
S503: the mobile terminal displays a setting interface and receives the input wireless name and the wireless password.
S504: the mobile terminal sends a wireless network connection request.
S505: and whether a wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password carried by the wireless network connection request exists. If yes, go to step S506, otherwise go to step S507.
S506: the wireless network connection request is authenticated, and the server receives the notification message that the wireless network connection request is authenticated, and performs S508.
S507: the mobile terminal receives response information of the networking failure.
S508: and the server sends the SSID of the intelligent equipment to be connected to the mobile terminal. The server generates and transmits the target verification code.
And the server transmits the generated target verification code to the corresponding equipment by adopting a communication mode according to the communication mode saved in advance.
S509: and the mobile terminal broadcasts a distribution network request containing the SSID.
S510: the intelligent device starts a promiscuous mode to monitor all network data packets.
S511: the intelligent device obtains the distribution network request through a User Datagram Protocol (UDP). The SSID broadcast by the mobile terminal is captured.
S512: and the mobile terminal is matched with the intelligent equipment.
S513: the mobile terminal sends a request carrying the verification code to the server.
S514: whether the server receives a request carrying the verification code within a set time is judged, if yes, S515 is executed, and if not, S516 is executed.
S515: and judging whether the verification code carried by the request is consistent with the target verification code, if so, executing S517, and if not, executing S516.
S516: the server returns response information of connection failure to the mobile terminal.
S517: and the mobile terminal passes the authentication.
Example 8:
fig. 6 is a schematic structural diagram of a security identification device according to an embodiment of the present invention, where the security identification device includes:
a receiving module 601, configured to receive notification information that a wireless network connection request sent by a mobile terminal passes verification, where the wireless network connection request carries a wireless name and a wireless password;
a processing module 602, configured to generate and send a target verification code; and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
In a possible implementation manner, the processing module 602 is specifically configured to return response information of connection failure to the mobile terminal if the received verification code is different from the target verification code.
In a possible embodiment, the apparatus further comprises:
a sending module 603, configured to send a service set identifier SSID of an intelligent device to be connected to the mobile terminal, so that the mobile terminal establishes a connection with the intelligent device of the SSID.
Fig. 7 is a schematic structural diagram of a security identification device according to an embodiment of the present invention, where the security identification device includes:
a sending module 701, configured to send a wireless network connection request, where the wireless network connection request carries a wireless name and a wireless password;
the processing module 702 is configured to send a request carrying a verification code, and establish a connection with the smart device when the request passes the verification.
In a possible implementation manner, the processing module 702 is specifically configured to receive a service set identifier SSID sent by a server after a verification of a wireless network connection request is passed; and matching with the corresponding intelligent equipment according to the SSID.
In a possible implementation, the processing module 702 is specifically configured to broadcast a distribution network request including the SSID.
In a possible implementation manner, the processing module 702 is specifically configured to receive response information of a networking failure if there is no wireless network corresponding to a target wireless name and a target wireless password that are consistent with the wireless name and the wireless password; and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
In a possible implementation manner, the processing module 702 is specifically configured to receive a start operation of application software for controlling the smart device, and start the application software; the input wireless name and wireless password are received.
Example 9:
on the basis of the foregoing embodiments, an embodiment of the present invention further provides an electronic device, as shown in fig. 8, including: the system comprises a processor 801, a communication interface 802, a memory 803 and a communication bus 804, wherein the processor 801, the communication interface 802 and the memory 803 are communicated with each other through the communication bus 804.
The memory 803 has stored therein a computer program which, when executed by the processor 801, causes the processor 801 to perform the steps of:
receiving notification information that a wireless network connection request sent by a mobile terminal passes verification, wherein the wireless network connection request carries a wireless name and a wireless password;
generating and sending a target verification code;
and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
In one possible embodiment, the method further comprises:
and if the received verification code is different from the target verification code, returning response information of connection failure to the mobile terminal.
In a possible implementation manner, before receiving the request carrying the verification code sent by the mobile terminal, the method further includes:
and sending a Service Set Identifier (SSID) of the intelligent equipment to be connected to the mobile terminal so that the mobile terminal establishes connection with the intelligent equipment of the SSID.
On the basis of the above embodiments, an embodiment of the present invention further provides an electronic device, including: the system comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory are communicated with each other through the communication bus.
Sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and sending a request carrying a verification code, and establishing connection with the intelligent equipment when the request passes the verification.
In a possible implementation manner, before the sending the request carrying the verification code, the method further includes:
receiving a Service Set Identifier (SSID) sent by a server after the wireless network connection request passes verification;
and matching with the corresponding intelligent equipment according to the SSID.
In a possible implementation, the matching with the corresponding smart device according to the SSID includes:
and broadcasting a distribution network request containing the SSID.
In one possible embodiment, the method further comprises:
if no wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password exists, receiving response information of networking failure;
and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
In a possible implementation, before the sending the wireless network connection request, the method further includes:
receiving starting operation of application software for controlling the intelligent equipment, and starting the application software;
and displaying a setting page, and receiving the input wireless name and the wireless password.
Because the principle of the electronic device for solving the problem is similar to that of the communication method, the implementation of the electronic device may refer to the implementation of the method, and repeated details are not repeated.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 802 is used for communication between the above-described electronic apparatus and other apparatuses.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a central processing unit, a Network Processor (NP), and the like; but may also be a Digital instruction processor (DSP), an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
Example 10:
on the basis of the foregoing embodiments, the present invention further provides a computer-readable storage medium, in which a computer program executable by a processor is stored, and when the program runs on the processor, the processor is caused to execute the following steps:
receiving notification information that a wireless network connection request sent by a mobile terminal passes verification, wherein the wireless network connection request carries a wireless name and a wireless password;
generating and sending a target verification code;
and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
In one possible embodiment, the method further comprises:
and if the received verification code is different from the target verification code, returning response information of connection failure to the mobile terminal.
In a possible implementation manner, before receiving the request carrying the verification code sent by the mobile terminal, the method further includes:
and sending a Service Set Identifier (SSID) of the intelligent equipment to be connected to the mobile terminal so that the mobile terminal establishes connection with the intelligent equipment of the SSID.
On the basis of the foregoing embodiments, the present invention further provides a computer-readable storage medium, in which a computer program executable by a processor is stored, and when the program runs on the processor, the processor is caused to execute the following steps:
sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and sending a request carrying a verification code, and establishing connection with the intelligent equipment when the request passes the verification.
In a possible implementation manner, before the sending the request carrying the verification code, the method further includes:
receiving a Service Set Identifier (SSID) sent by a server after the wireless network connection request passes verification;
and matching with the corresponding intelligent equipment according to the SSID.
In a possible implementation, the matching with the corresponding smart device according to the SSID includes:
and broadcasting a distribution network request containing the SSID.
In one possible embodiment, the method further comprises:
if no wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password exists, receiving response information of networking failure;
and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
In a possible implementation, before the sending the wireless network connection request, the method further includes:
receiving starting operation of application software for controlling the intelligent equipment, and starting the application software;
and displaying a setting page, and receiving the input wireless name and the wireless password.
Because the principle of the computer readable medium for solving the problem is similar to the audio and video data sharing method, after the processor executes the computer program in the computer readable medium, the steps implemented may refer to the other embodiments, and repeated parts are not described again.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (18)

1. A method of secure authentication, the method comprising:
receiving notification information that a wireless network connection request sent by a mobile terminal passes verification, wherein the wireless network connection request carries a wireless name and a wireless password;
generating and sending a target verification code;
and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
2. The method of claim 1, further comprising:
and if the received verification code is different from the target verification code, returning response information of connection failure to the mobile terminal.
3. The method according to claim 1, wherein before receiving the request carrying the verification code sent by the mobile terminal, the method further comprises:
and sending a Service Set Identifier (SSID) of the intelligent equipment to be connected to the mobile terminal so that the mobile terminal establishes connection with the intelligent equipment of the SSID.
4. A method of secure authentication, the method comprising:
sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and sending a request carrying a verification code, and establishing connection with the intelligent equipment when the request passes the verification.
5. The method of claim 4, wherein before sending the request carrying the authentication code, the method further comprises:
receiving a Service Set Identifier (SSID) sent by a server after the wireless network connection request passes verification;
and matching with the corresponding intelligent equipment according to the SSID.
6. The method of claim 5, wherein the matching with a corresponding smart device according to the SSID comprises:
and broadcasting a distribution network request containing the SSID.
7. The method of claim 4, further comprising:
if no wireless network corresponding to the target wireless name and the target wireless password which are consistent with the wireless name and the wireless password exists, receiving response information of networking failure;
and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
8. The method of claim 4, wherein prior to sending the wireless network connection request, the method further comprises:
receiving starting operation of application software for controlling the intelligent equipment, and starting the application software;
and displaying a setting page, and receiving the input wireless name and the wireless password.
9. A security authentication apparatus, characterized in that the apparatus comprises:
the mobile terminal comprises a receiving module, a sending module and a receiving module, wherein the receiving module is used for receiving notification information that a wireless network connection request sent by the mobile terminal passes verification, and the wireless network connection request carries a wireless name and a wireless password;
the processing module is used for generating and sending a target verification code; and receiving a request which is sent by the mobile terminal and carries a verification code, and determining that the mobile terminal passes the authentication if the verification code carried in the request is the same as the target verification code.
10. The apparatus of claim 9, wherein the processing module is specifically configured to return a response message of connection failure to the mobile terminal if the received verification code is different from the target verification code.
11. The apparatus of claim 9, further comprising:
and the sending module is used for sending the service set identifier SSID of the intelligent equipment to be connected to the mobile terminal so as to establish connection between the mobile terminal and the intelligent equipment of the SSID.
12. A security authentication apparatus, characterized in that the apparatus comprises:
the wireless network connection module is used for sending a wireless network connection request, wherein a wireless name and a wireless password are carried in the wireless network connection request;
and the processing module is used for sending a request carrying the verification code and establishing connection with the intelligent equipment when the request passes the verification.
13. The apparatus according to claim 12, wherein the processing module is specifically configured to receive a service set identifier SSID sent by the server after the verification of the wireless network connection request is passed; and matching with the corresponding intelligent equipment according to the SSID.
14. The apparatus according to claim 13, wherein the processing module is specifically configured to broadcast a distribution network request including the SSID.
15. The apparatus according to claim 12, wherein the processing module is specifically configured to receive a response message of a networking failure if there is no wireless network corresponding to a target wireless name and a target wireless password that are consistent with the wireless name and the wireless password; and if the sent verification code is different from the target verification code corresponding to the intelligent equipment generated by the server, receiving response information of connection failure returned by the server.
16. The apparatus according to claim 12, wherein the processing module is specifically configured to receive a start operation of application software that controls the smart device, and start the application software; the input wireless name and wireless password are received.
17. An electronic device, characterized in that the electronic device comprises at least a processor and a memory, the processor being adapted to perform the steps of the secure authentication of any of claims 1-8 when executing a computer program stored in the memory.
18. A computer-readable storage medium, characterized in that it stores a computer program which, when executed by a processor, performs the steps of the secure authentication of any of claims 1-8.
CN202011485992.3A 2020-12-16 2020-12-16 Security authentication method, device, equipment and medium Pending CN112637844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011485992.3A CN112637844A (en) 2020-12-16 2020-12-16 Security authentication method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011485992.3A CN112637844A (en) 2020-12-16 2020-12-16 Security authentication method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN112637844A true CN112637844A (en) 2021-04-09

Family

ID=75313818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011485992.3A Pending CN112637844A (en) 2020-12-16 2020-12-16 Security authentication method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN112637844A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114079925A (en) * 2021-11-16 2022-02-22 珠海格力电器股份有限公司 Binding method and binding system of intelligent device and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN105682093A (en) * 2014-11-20 2016-06-15 中兴通讯股份有限公司 Wireless network access method and access device, and client
CN106254189A (en) * 2016-09-13 2016-12-21 四川长虹电器股份有限公司 A kind of WiFi distribution method
CN106375979A (en) * 2016-05-30 2017-02-01 深圳市美贝壳科技有限公司 Method for finding states of intelligent devices in LAN rapidly
CN108809914A (en) * 2017-05-05 2018-11-13 国民技术股份有限公司 Access control method, device, terminal and Internet of Things house system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN105682093A (en) * 2014-11-20 2016-06-15 中兴通讯股份有限公司 Wireless network access method and access device, and client
CN106375979A (en) * 2016-05-30 2017-02-01 深圳市美贝壳科技有限公司 Method for finding states of intelligent devices in LAN rapidly
CN106254189A (en) * 2016-09-13 2016-12-21 四川长虹电器股份有限公司 A kind of WiFi distribution method
CN108809914A (en) * 2017-05-05 2018-11-13 国民技术股份有限公司 Access control method, device, terminal and Internet of Things house system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114079925A (en) * 2021-11-16 2022-02-22 珠海格力电器股份有限公司 Binding method and binding system of intelligent device and terminal
CN114079925B (en) * 2021-11-16 2023-10-03 珠海格力电器股份有限公司 Binding method and binding system for intelligent equipment and terminal

Similar Documents

Publication Publication Date Title
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
US10595193B2 (en) Method of provisioning a subscriber profile for a secure module
CN105703938B (en) Equipment configuration method, configuration device and management equipment
CN106658659B (en) Method and device for accessing intelligent terminal equipment to Internet
US9066326B2 (en) Automatic user notification, with quick response (QR) code generation following failed NFC device pairing
US11096051B2 (en) Connection establishment method, device, and system
CN110602692B (en) Data updating method and device and electronic equipment
EP3340668A1 (en) Profile processing method, profile processing apparatus, user terminal and euicc
CN110809308A (en) Method and device for automatically connecting IOT device and WIFI router
US20160315773A1 (en) Method and apparatus for providing information
CN107567017B (en) Wireless connection system, device and method
EP3013100A1 (en) Method and device for releasing ssid in wlan
CN103974376A (en) Network connection assisting system and method
CN106453370B (en) Method and device for registering IPC (inter-programmable logic controller) to NVR (network video recorder)
CN105791235B (en) Configuration information downloading method and equipment
CN108135022B (en) Equipment control method, device, terminal and computer readable storage medium
CN105307235A (en) Hotspot sharing method, device and system
CN108966363B (en) Connection establishing method and device
WO2018045805A1 (en) Network registration method and device
CN110719583B (en) Communication method and device
US20130035066A1 (en) Method and Apparatus for Machine Communication
WO2018196463A1 (en) Method and apparatus for network access, storage medium, and processor
US20170127472A1 (en) Method and wireless device for controlling disconnection of a wireless device in a wi-fi direct group of a wireless network
CN113810427B (en) Penetration testing method, terminal equipment and storage medium
CN112637844A (en) Security authentication method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210409

RJ01 Rejection of invention patent application after publication