CN114520977A - Router authentication method, router authentication device and storage medium - Google Patents

Router authentication method, router authentication device and storage medium Download PDF

Info

Publication number
CN114520977A
CN114520977A CN202011308527.2A CN202011308527A CN114520977A CN 114520977 A CN114520977 A CN 114520977A CN 202011308527 A CN202011308527 A CN 202011308527A CN 114520977 A CN114520977 A CN 114520977A
Authority
CN
China
Prior art keywords
information
verified
router
radio frequency
frequency signal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011308527.2A
Other languages
Chinese (zh)
Inventor
胡宝命
施晓光
胡云
冯毅
钱文轩
朱叶
孟宇
肖晓丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011308527.2A priority Critical patent/CN114520977A/en
Publication of CN114520977A publication Critical patent/CN114520977A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The application discloses a router authentication method, a device and a storage medium, which are helpful for improving the security of router authentication, and the method comprises the following steps: receiving a first radio frequency signal sent by a router; the first radio frequency signal is used for requesting to acquire first information to be verified; acquiring first information to be verified according to the first radio frequency signal; sending first information to be verified to a router; the first information to be verified is used for allowing the terminal equipment of the access router to access the network under the condition that the router determines that the first information to be verified passes verification.

Description

Router authentication method, router authentication device and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a router authentication method, apparatus, and storage medium.
Background
With the continuous development of communication technology, more and more users access the internet wirelessly by using mobile terminals, and at the moment, more and more requirements are imposed on the personalized functions of the wireless router.
However, in the wireless router in the prior art, the authentication method for the mobile terminal to access the network through the router is mostly as follows: the method includes the steps that a serial of secret keys are configured on a router configuration interface, a Service Set Identifier (SSID) of the router is found on a mobile terminal, and a corresponding secret key is input, so that the authentication mode has large potential safety hazards, tools for cracking wireless local area network (WIFI) passwords or equipment for stealing WIFI passwords exist on the market, or users do not neglect to leak the passwords, and therefore safety problems are caused.
Disclosure of Invention
The application provides a router authentication method, a router authentication device and a storage medium, which are beneficial to improving the security of router authentication.
In a first aspect, a router authentication method is provided, where the method includes: receiving a first radio frequency signal sent by a router; the first radio frequency signal is used for requesting to acquire first information to be verified; acquiring first to-be-verified information according to the first radio frequency signal; sending first information to be verified to a router; the first information to be verified is used for allowing the terminal equipment accessing the router to access the network under the condition that the router determines that the first information to be verified passes verification.
In the embodiment of the application, after the terminal device accesses the router, the terminal device does not directly access the network through the router, but needs to acquire the first information to be verified, and the terminal device is allowed to access the network through the router after the first information to be verified passes verification. Thereby improving the security of the router authentication.
In one possible implementation, the first information to be authenticated includes at least one of a character or biometric information.
In another possible implementation manner, the method further includes: acquiring second information to be verified; the second information to be verified comprises at least one of characters or biological information; determining that the second information to be verified passes verification; the obtaining of the first to-be-verified information according to the first radio frequency signal includes: and under the condition that the second information to be verified passes verification, acquiring the first information to be verified according to the first radio frequency signal.
Therefore, the second information to be verified is required to be verified before the first information to be verified is obtained, and the first information to be verified is obtained only when the second information to be verified passes verification, so that the security of using the router for authentication is further improved.
In another possible implementation manner, the obtaining of the second information to be verified includes: acquiring prompt information; acquiring second information to be verified input by a user; the determining that the second information to be verified passes the verification includes: acquiring password information corresponding to the password prompt information; and under the condition that the second information to be verified is matched with the password information, determining that the second information to be verified passes the verification.
Therefore, when the second information to be verified is verified, different prompt messages correspond to different password messages, and the second information to be verified is determined to pass the verification only under the condition that the password messages corresponding to the prompt messages are matched with the acquired second information to be verified, so that the security of the router authentication is further improved.
In another possible implementation manner, the obtaining of the second information to be verified includes: acquiring second information to be verified input by a user; the determining that the second information to be verified passes the verification includes: and under the condition that the second information to be verified is matched with the pre-stored verification information, determining that the second information to be verified passes the verification.
In another possible implementation manner, the method further includes: determining that the first radio frequency signal is verified; the obtaining of the first to-be-verified information according to the first radio frequency signal includes: and acquiring first to-be-verified information according to the first radio frequency signal under the condition that the first radio frequency signal is determined to be verified.
In a second aspect, a router authentication method is provided, and the method includes: receiving first information to be verified; and under the condition that the first information to be verified passes the verification, allowing the terminal equipment accessing the router to access the network.
Therefore, the terminal equipment does not directly access the network after accessing the router, but the terminal equipment accessing the router is allowed to access the network only when the first information to be verified passes the verification.
In one possible implementation manner, before receiving the first information to be verified, a first radio frequency signal is sent to the authorization device; the first radio frequency signal is used for requesting to acquire first information to be verified; the first information to be authenticated includes at least one of characters or biometric information.
In a third aspect, an authorization apparatus is provided, which is configured to perform any of the methods provided in any of the possible implementation manners of the first aspect to the first aspect.
According to a third aspect, in a first possible implementation manner of the third aspect, the authorization apparatus includes several functional modules, and the several functional modules are respectively configured to execute corresponding steps in any one of the methods provided by the first aspect.
According to a third aspect, in a second possible implementation manner of the third aspect, the authorization apparatus may include a processor configured to execute any of the methods provided in any of the possible implementation manners of the first aspect to the first aspect. The authorization apparatus may also include a memory for storing a computer program. To enable the processor to invoke the computer program for performing any of the methods provided in any of the possible implementations of the first aspect described above.
In a fourth aspect, there is provided a router operable to perform any of the methods provided in any of the possible implementations of the second aspect through the second aspect.
According to a fourth aspect, in a first possible implementation manner of the fourth aspect, the router includes several functional modules, and the several functional modules are respectively used for executing corresponding steps in any one of the methods provided by the second aspect.
According to a fourth aspect, in a second possible implementation manner of the fourth aspect, the router may include a processor configured to execute any one of the methods provided in any one of the possible implementation manners of the second aspect to the second aspect. The router may also include a memory for storing a computer program. To enable the processor to invoke the computer program for performing any of the methods provided in any of the possible implementations of the second aspect to the second aspect described above.
In a fifth aspect, the present application provides a chip system applied to a computer device, the chip system including one or more interface circuits and one or more processors. The interface circuit and the processor are interconnected through a line; the interface circuit is configured to receive signals from a memory of the computer device and to send the signals to the processor, the signals including computer instructions stored in the memory. When the processor executes the computer instructions, the computer device performs the method according to any one of the possible implementations of the first aspect to the first aspect, or performs the method according to any one of the possible implementations of the second aspect to the second aspect.
In a sixth aspect, the present application provides a computer-readable storage medium comprising computer instructions which, when executed on a computer device, cause the computer device to perform the method according to any one of the possible implementations of the first aspect to the first aspect, or the method according to any one of the possible implementations of the second aspect to the second aspect.
In a seventh aspect, the present application provides a computer program product comprising computer instructions that, when executed on a computer device, cause the computer device to perform the method according to any one of the possible implementations of the first aspect or the second aspect.
It is understood that any one of the authorization apparatus, the router, the computer readable storage medium, the computer program product or the chip system provided above may be applied to the corresponding method provided above, and therefore, the beneficial effects achieved by the method may refer to the beneficial effects in the corresponding method, and are not described herein again.
These and other aspects of the present application will be more readily apparent from the following description.
Drawings
Fig. 1 is a schematic structural diagram of a system to which the technical solution provided by the embodiment of the present application is applied;
fig. 2 is a schematic structural diagram of a computer device to which the technical solution provided by the embodiment of the present application is applied;
fig. 3 is a schematic flowchart of an initialization phase of a router authentication method according to an embodiment of the present application;
fig. 4 is a schematic flowchart of an authentication phase of a router authentication method according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a router according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an authorization apparatus according to an embodiment of the present application.
Detailed Description
In the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as an example, instance, or illustration. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the embodiments of the present application, "at least one" means one or more. "plurality" means two or more.
In the embodiment of the present application, "and/or" is only one kind of association relationship describing an association object, and indicates that three relationships may exist, for example, a and/or B may indicate: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
In an embodiment of the application, a combination comprises one or more objects.
The router authentication method provided in the embodiment of the present application may be applied to a system structure shown in fig. 1. The system includes at least one terminal device 10-1, a router 10-2, and an authorization apparatus 10-3. The terminal device 10-1 and the authorizing means 10-3 are connected to the router 10-2, respectively.
The terminal device 10-1 may be a terminal device such as a laptop, a mobile phone, a palmtop, a tablet computer, a desktop computer, an intelligent watch, or an intelligent glasses.
The router 10-2 may be any network access device.
The authorization apparatus 10-3 may be any electronic device capable of transmitting a signal.
The above-mentioned terminal device 10-1, router 10-2 and authorizing means 10-3 may all be implemented by an electronic device 20 as shown in fig. 2. Fig. 2 is a schematic structural diagram of an electronic device to which the technical solution provided in the embodiment of the present application is applied. The electronic device 20 shown in fig. 2 may comprise at least one processor 201, a communication line 202, a memory 203, at least one communication interface 204, and optionally, the electronic device 20 further comprises an output device 205 and/or an input device 206.
The processor 201 may be a general processing unit (CPU), a microprocessor, an application-specific integrated circuit (ASIC), or one or more ics for controlling the execution of programs in accordance with the present invention.
The communication link 202 may include at least one path, such as a data bus, and/or a control bus, for communicating information between the aforementioned components (e.g., the at least one processor 201, the communication link 202, the memory 203, and the at least one communication interface 204).
The communication interface 204 may be any device, such as a transceiver, for communicating with other devices or communication networks, such as Wide Area Networks (WAN), Local Area Networks (LAN), and the like.
The memory 203 may be, but is not limited to, a read-only memory (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disk storage, optical disk storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 203 may be separate and coupled to the processor 201 via the communication line 202. The memory 203 may also be integrated with the processor 201. The memory 203 provided by the embodiment of the present application generally includes a nonvolatile memory. The memory 203 is used for storing computer instructions for executing the scheme of the application, and is controlled by the processor 201 to execute. The processor 201 is configured to execute the computer instructions stored in the memory 203, thereby implementing the methods provided by the embodiments described below.
The storage 203 includes a memory and a hard disk.
The output device 205 is in communication with the processor 201 and may display information in a variety of ways. For example, the output device 205 may be a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display device, a Cathode Ray Tube (CRT) display device, a projector (projector), or the like.
The input device 206 is in communication with the processor 201 and may receive user input in a variety of ways. For example, the input device 206 may be a mouse, a keyboard, a touch screen device, or a sensing device, among others.
Optionally, the computer instructions in the embodiments of the present application may also be referred to as application program code or system, which is not specifically limited in the embodiments of the present application.
In one embodiment, the electronic device 20 may include a plurality of processors, and each of the processors may be a single-core (single-CPU) processor or a multi-core (multi-CPU) processor. A processor herein may refer to one or more devices, circuits, and/or processing cores for processing data (e.g., computer program instructions).
The electronic device shown in fig. 2 is merely an example, and does not limit the electronic device to which the embodiments of the present application are applicable. In actual implementation, the electronic device may include more or fewer devices or devices than those shown in fig. 2.
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The router authentication method provided by the application comprises two stages: an initialization phase and an authentication phase.
Fig. 3 is a flowchart illustrating an initialization phase of a router authentication method according to an embodiment of the present application. As shown in fig. 3, the method may include the steps of:
s100: the authorization device obtains password prompt information. Wherein the password hint information includes at least one of a picture, a sound, a character, or a geographic location.
Specifically, the authorization device obtains password prompt information input by the user or password prompt information selected by the user.
The authorization device can acquire the first password prompt message through a keyboard, a touch screen, a camera or a recording device (such as a microphone). The first password hint information includes: at least one of characters, pictures, sound or interface attributes (such as character color or background color in the interface).
It will be appreciated that the password prompt may be preset by the authorization device or may be user input.
In one example, the password prompt message is any one of preset pictures selected by the user, and the authorization device acquires the picture selected by the user as the password prompt message.
In another example, the password hint information is a geographic location (e.g., administrative region of China). The authorization device acquires an administrative region selected by a user.
S101: the authorization device generates identification information for each password hint.
Specifically, the authorization apparatus generates identification information for each acquired password hint information using a preset identification information generation method. In one example, the preset identification information generation method may sequentially generate the serial numbers. The preset identification information generation method comprises the steps of generating 1 for first password prompt information, generating 2 for second password prompt information and generating 3 for third password prompt information.
S102: the authorization device establishes a corresponding relationship between the identification information and the password prompt information.
Specifically, the authorization apparatus establishes a corresponding relationship between the generated identification information and the obtained password prompt information, and stores the corresponding relationship.
S103: the authorization means obtains the password information. Wherein, the password information is at least one of characters or biological information.
Specifically, the authorization device obtains password information input by a user, wherein characters comprise letters, numbers, operation symbols, punctuation marks, other symbols and some functional symbols. The biological information comprises fingerprint, voiceprint, iris or human face and other biological information.
S104: and the authorization device generates the corresponding relation between the acquired password prompt information and the password information.
Specifically, the authorization device generates and stores a corresponding relationship between the acquired password prompt information and the password information.
It is understood that the authorization apparatus may also generate a corresponding relationship between the identification information of the password hint information and the password information. In the setting stage, after the user starts the authorization device, the authorization device may repeatedly perform S100 to S102 to establish a corresponding relationship between a plurality of different password prompt messages and password messages.
The present application does not limit the execution steps of S101 to S102 and S103 to S104. Exemplary, S101 to S102 are executed after S103 to S104 are executed. The authorization apparatus is configured with the super password information before executing the above S100 to S104. The super password information may be preset, or may be sent by a receiving device. This is not limited in the embodiments of the present application.
Fig. 4 shows a schematic flowchart of an authentication phase of a router authentication method according to an embodiment of the present application. As shown in fig. 4, the method may include the steps of:
optionally, S200: the router responds to the network access request of the terminal equipment and sends a first radio frequency signal to the authorization device. The first radio frequency signal is used for requesting to acquire first information to be verified.
Specifically, when the router detects that the terminal device accesses the router, the router sends a first radio frequency signal to the authorization device.
S201: the authorization device acquires first information to be verified according to the first radio frequency signal. The first information to be authenticated includes at least one of characters or biometric information.
In a possible implementation manner, the authorization apparatus obtains the second information to be verified, and obtains the first information to be verified according to the first radio frequency signal when the second information to be verified passes verification.
Specifically, in a possible implementation manner, the authorization apparatus obtains the second information to be verified and verifies the second information to be verified through the following steps:
the method comprises the following steps: and the authorization device randomly acquires target identification information, wherein the target identification information is any one of the preset corresponding relations between the identification information and the password prompt information.
Step two: and the authorization device reads the prompt information corresponding to the target identification information according to the corresponding relation between the identification information and the password prompt information.
In one example, the reminder information obtained by the authorization device is a picture including bees.
It will be appreciated that the authorization means may choose to display the retrieved reminder information. For example, the authorization device displays a picture including bees. The authorization device may also choose not to display the retrieved reminder information. For example, the prompt message is location information of the authorized device. The authorization device acquires the current position, and the authorization device can select to display the current position or not display the current position.
Step three: and the authorization device acquires the second information to be verified input by the user. The second information to be verified is at least one of characters or biological information.
Specifically, the authorization apparatus obtains the second information to be verified input by the user through the input unit.
In one example, the authorization apparatus may acquire the second information to be authenticated, which is input by the user, through the message box.
In another example, the authorization apparatus may obtain the second information to be verified through a touch screen, a camera, a recording device (e.g., a microphone), or the like.
Step four: and the authorization device acquires the password information corresponding to the prompt information.
Specifically, the authorization device reads the password information corresponding to the prompt information read in the second step from the corresponding relationship between the prompt information and the password information.
Step five: and the authorization device judges whether the acquired password information is matched with the second information to be verified, and if so, the second information to be verified is determined to be verified. And if not, determining that the second information to be verified is not verified.
In another possible implementation manner, the authorization apparatus determines that the second information to be authenticated is authenticated by determining that the second information to be authenticated matches the pre-stored verification information.
Optionally, the authorization apparatus verifies the first radio frequency signal, and acquires and verifies the second information to be verified when the first radio frequency signal passes verification.
Specifically, the authorization device determines that the first radio frequency signal passes the verification when it is determined that the identification information included in the first radio frequency signal exists in the preset identification information.
Therefore, the authorization device can acquire and verify the second information to be verified only when the first radio frequency signal is verified, and the security of router authentication is further enhanced.
It should be noted that, in the embodiment of the present application, a trigger condition for the authorization apparatus to acquire the second to-be-authenticated information is not limited, in one possible implementation, the authorization apparatus acquires the second to-be-authenticated information after receiving the first radio frequency signal, and in another possible implementation, the authorization apparatus acquires the second to-be-authenticated information in response to an input operation of a user. In the embodiment of the present application, the router may also directly receive the second to-be-verified information sent by the authorization device, instead of sending the first radio frequency signal to the authorization device.
S202: the authorization device sends first information to be verified to the router.
S203: and the router allows the terminal equipment accessing the router to access the network under the condition that the first information to be verified passes the verification.
In the embodiment of the application, the terminal device is connected to the router through the conventional password verification and cannot directly access the network through the router, authorization of the authorization device and authentication of the router are required, and the router allows the terminal device to access the network through the router only after the authentication passes, so that the security of the router authentication is improved.
The scheme provided by the embodiment of the application is mainly introduced from the perspective of a method. To implement the above functions, it includes hardware structures and/or software modules for performing the respective functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the exemplary method steps described in connection with the embodiments disclosed herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the router may be divided into the functional modules according to the above method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Fig. 5 is a schematic structural diagram of a router according to an embodiment of the present application. The router 50 may be used to perform the functions performed by the router in any of the embodiments described above (e.g., the embodiment shown in fig. 4). The router 50 includes: a receiving module 501 and a determining module 502. The receiving module 501 is configured to receive first information to be verified; a determining module 502, configured to allow a terminal device accessing the router to access a network when it is determined that the first information to be verified passes verification. For example, in conjunction with fig. 4, the receiving module 501 may be configured to perform the receiving step in S202. The determination module 502 may be configured to perform S203.
Optionally, the first information to be verified includes at least one of a character and biometric information.
In one example, referring to fig. 2, the receiving function of the receiving module 501 may be implemented by the communication interface 204 in fig. 2. The determination module 502 described above may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for any explanation and beneficial effect description of the router 50 provided above, reference may be made to the corresponding method embodiment described above, and details are not repeated.
It should be noted that the actions performed by the modules are only specific examples, and the actions actually performed by the units refer to the actions or steps mentioned in the description of the embodiment based on fig. 4.
Fig. 6 is a schematic structural diagram of an authorization apparatus according to an embodiment of the present application. The authorizing means 60 may be used to perform the functions performed by the authorizing means in any of the above embodiments (e.g. the embodiments shown in fig. 3 and 4). The authorization apparatus 60 includes: a receiving module 601, an obtaining module 602 and a sending module 603. The receiving module 601 is configured to receive a first radio frequency signal sent by a router; the first radio frequency signal is used for requesting to acquire first information to be verified; an obtaining module 602, configured to obtain first information to be verified according to a first radio frequency signal; a sending module 603, configured to send first information to be verified to a router; the first information to be verified is used for allowing the terminal equipment accessing the router to access the network under the condition that the router determines that the first information to be verified passes verification. For example, with reference to fig. 4, the receiving module 601 may be configured to perform the receiving step in S200, the obtaining module 602 may be configured to perform S201, and the sending module 603 may be configured to perform S202.
Optionally, the first information to be verified includes at least one of a character and biometric information.
Optionally, the obtaining module 602 may be configured to obtain second information to be verified; the second information to be authenticated includes at least one of characters or biometric information. The authorization apparatus 60 further includes a determining module 604, configured to determine that the second information to be verified is verified; the obtaining module 602 is specifically configured to: and under the condition that the second information to be verified passes verification, acquiring the first information to be verified according to the first radio frequency signal.
Optionally, the obtaining module 602 is specifically configured to: acquiring prompt information; acquiring second information to be verified input by a user; acquiring password information corresponding to the password prompt information; the determining module 604 is specifically configured to determine that the second information to be verified passes the verification when the second information to be verified is matched with the password information.
Optionally, the obtaining module 602 is specifically configured to obtain second information to be verified input by the user; the determining module 604 is specifically configured to: and under the condition that the second information to be verified is matched with the pre-stored verification information, determining that the second information to be verified passes the verification.
Optionally, the determining module 604 is further configured to: determining that the first radio frequency signal is verified; the obtaining module 601 is specifically configured to: and under the condition that the first radio frequency signal passes the verification, acquiring first information to be verified according to the first radio frequency signal.
In one example, referring to fig. 2, the receiving function of the receiving module 601 and the sending function of the sending module 603 may be implemented by the communication interface 204 in fig. 2. The obtaining module 602 and the determining module 604 may be implemented by the processor 201 in fig. 2 calling a computer program stored in the memory 203.
For the detailed description of the above alternative modes, reference is made to the foregoing method embodiments, which are not described herein again. In addition, for the explanation and the description of the beneficial effects of any one of the authorization devices 60 provided above, reference may be made to the corresponding method embodiment described above, and details are not repeated.
It should be noted that the actions correspondingly performed by the modules are merely specific examples, and the actions actually performed by the units refer to the actions or steps mentioned in the description of the embodiment based on fig. 3 and fig. 4.
An embodiment of the present application further provides an electronic device, including: a memory and a processor; the memory is for storing a computer program, and the processor is for invoking the computer program to perform the actions or steps mentioned in any of the embodiments provided above.
Embodiments of the present application also provide a computer-readable storage medium, which stores a computer program, and when the computer program runs on a computer, the computer program causes the computer to execute the actions or steps mentioned in any of the embodiments provided above.
The embodiment of the application also provides a chip. Integrated in the chip are the circuits and one or more interfaces for implementing the functions of the router described above. Optionally, the functions supported by the chip may include processing actions in the embodiments described based on fig. 3 and fig. 4, which are not described herein again. Those skilled in the art will appreciate that all or part of the steps for implementing the above embodiments may be implemented by a program instructing the associated hardware to perform the steps. The program may be stored in a computer-readable storage medium. The above-mentioned storage medium may be a read-only memory, a random access memory, or the like. The processing unit or processor may be a central processing unit, a general purpose processor, an Application Specific Integrated Circuit (ASIC), a microprocessor (DSP), a Field Programmable Gate Array (FPGA) or other programmable logic device, a transistor logic device, a hardware component, or any combination thereof.
The embodiments of the present application also provide a computer program product containing instructions, which when executed on a computer, cause the computer to execute any one of the methods in the above embodiments. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application are all or partially generated upon loading and execution of computer program instructions on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). Computer-readable storage media can be any available media that can be accessed by a computer or can comprise one or more data storage devices, such as servers, data centers, and the like, that can be integrated with the media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It should be noted that the above devices for storing computer instructions or computer programs provided in the embodiments of the present application, such as, but not limited to, the above memories, computer readable storage media, communication chips, and the like, all have non-volatility (non-volatility).
Other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed application, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
Although the present application has been described in conjunction with specific features and embodiments thereof, various modifications and combinations can be made thereto without departing from the spirit and scope of the application. Accordingly, the specification and figures are merely exemplary of the present application as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the present application.

Claims (12)

1. A method of router authentication, the method comprising:
receiving a first radio frequency signal sent by a router; the first radio frequency signal is used for requesting to acquire first information to be verified;
acquiring the first information to be verified according to the first radio frequency signal;
sending the first information to be verified to the router; the first information to be verified is used for allowing the terminal equipment accessing the router to access the network under the condition that the router determines that the first information to be verified passes verification.
2. The method according to claim 1, wherein the first information to be authenticated includes at least one of a character or biometric information.
3. The method according to claim 1 or 2, characterized in that the method further comprises:
acquiring second information to be verified; the second information to be verified comprises at least one of characters or biological information;
determining that the second information to be verified passes verification;
the acquiring the first to-be-verified information according to the first radio frequency signal includes:
and under the condition that the second information to be verified passes verification, acquiring the first information to be verified according to the first radio frequency signal.
4. The method according to claim 3, wherein the obtaining the second information to be verified comprises:
acquiring prompt information;
acquiring second information to be verified input by a user;
the determining that the second information to be verified passes the verification comprises:
acquiring password information corresponding to the password prompt information;
and determining that the second information to be verified passes the verification under the condition that the second information to be verified is matched with the password information.
5. The method according to claim 3, wherein the obtaining the second information to be verified comprises:
acquiring second information to be verified input by a user;
the determining that the second information to be verified passes the verification comprises:
and determining that the second information to be verified passes the verification under the condition that the second information to be verified is matched with the pre-stored verification information.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
determining that the first radio frequency signal is verified;
the acquiring the first to-be-verified information according to the first radio frequency signal includes: and under the condition that the first radio frequency signal passes the verification, acquiring the first information to be verified according to the first radio frequency signal.
7. A method of router authentication, the method comprising:
receiving first information to be verified;
and allowing the terminal equipment accessing the router to access the network under the condition that the first information to be verified passes the verification.
8. The method of claim 7, wherein prior to receiving the first information to be authenticated, the method further comprises:
transmitting a first radio frequency signal to an authorization device; the first radio frequency signal is used for requesting to acquire the first information to be verified; the first information to be authenticated includes at least one of characters or biometric information.
9. An authorization device, comprising:
the receiving module is used for receiving a first radio frequency signal sent by the router; the first radio frequency signal is used for requesting to acquire first information to be verified;
the acquisition module is used for acquiring the first information to be verified according to the first radio frequency signal;
a sending module, configured to send the first to-be-verified information to the router; the first information to be verified is used for allowing the terminal equipment accessing the router to access the network under the condition that the router determines that the first information to be verified passes verification.
10. A router, comprising:
the receiving module is used for receiving first information to be verified;
and the determining module is used for allowing the terminal equipment accessed to the router to access the network under the condition that the first information to be verified passes the verification.
11. A computer device, comprising: a memory for storing a computer program and a processor for executing the computer program to perform the method of any one of claims 1-6 or to perform the method of claim 7 or 8.
12. A computer-readable storage medium, having stored thereon a computer program which, when run on a computer, causes the computer to perform the method of any one of claims 1-6, or causes the computer to perform the method of claim 7 or 8.
CN202011308527.2A 2020-11-20 2020-11-20 Router authentication method, router authentication device and storage medium Pending CN114520977A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011308527.2A CN114520977A (en) 2020-11-20 2020-11-20 Router authentication method, router authentication device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011308527.2A CN114520977A (en) 2020-11-20 2020-11-20 Router authentication method, router authentication device and storage medium

Publications (1)

Publication Number Publication Date
CN114520977A true CN114520977A (en) 2022-05-20

Family

ID=81595390

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011308527.2A Pending CN114520977A (en) 2020-11-20 2020-11-20 Router authentication method, router authentication device and storage medium

Country Status (1)

Country Link
CN (1) CN114520977A (en)

Similar Documents

Publication Publication Date Title
CN103975335B (en) Utilize the certification of two level ratifier
US9208339B1 (en) Verifying Applications in Virtual Environments Using a Trusted Security Zone
JP4733167B2 (en) Information processing apparatus, information processing method, information processing program, and information processing system
US9639676B2 (en) Login interface selection for computing environment user login
CN107431924B (en) Device theft protection associating device identifiers with user identifiers
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US11764961B2 (en) Techniques for using signed nonces to secure cloud shells
US8832606B2 (en) Wallpaper assignment for multi-user mobile device
CN109076072A (en) Web service picture password
US10873583B2 (en) Extensible framework for authentication
KR20140068964A (en) Resource access authorization
US20080022375A1 (en) Method and apparatus for using a cell phone to facilitate user authentication
WO2014108005A1 (en) Co-verification method, two-dimensional code generation method, and device and system therefor
US11038684B2 (en) User authentication using a companion device
KR20190069574A (en) Wireless network type detection method and apparatus, and electronic device
WO2023241060A1 (en) Data access method and apparatus
KR20130113785A (en) Method and server for user certification using voice information
KR101386363B1 (en) One-time passwords generator for generating one-time passwords in trusted execution environment of mobile device and method thereof
CN112286632B (en) Cloud platform, cloud platform management method and device, electronic equipment and storage medium
CN114520977A (en) Router authentication method, router authentication device and storage medium
JP2021152816A (en) Information processing system, information processing device, and program
CN114531683A (en) Router authentication method, router authentication device and storage medium
US20220400108A1 (en) Tokenizing authentication information
US11880449B2 (en) Temporary password for password reset
WO2018017019A1 (en) Personal security device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination