CN114640996A - Access method, device, system and medium of wireless network - Google Patents

Access method, device, system and medium of wireless network Download PDF

Info

Publication number
CN114640996A
CN114640996A CN202210272361.6A CN202210272361A CN114640996A CN 114640996 A CN114640996 A CN 114640996A CN 202210272361 A CN202210272361 A CN 202210272361A CN 114640996 A CN114640996 A CN 114640996A
Authority
CN
China
Prior art keywords
terminal
access
router
identity information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210272361.6A
Other languages
Chinese (zh)
Inventor
刘森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Wingtech Electronic Technology Co Ltd
Original Assignee
Xian Wingtech Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Wingtech Electronic Technology Co Ltd filed Critical Xian Wingtech Electronic Technology Co Ltd
Priority to CN202210272361.6A priority Critical patent/CN114640996A/en
Publication of CN114640996A publication Critical patent/CN114640996A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Abstract

The application relates to a wireless network access method, a device, a system and a medium, wherein the method is applied to a first terminal and comprises the following steps: responding to the received identity information of the second terminal sent by the router, and judging whether the identity information meets a preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the router verifies that the network access password sent by the second terminal is correct; and if so, sending an access permission instruction to the router so as to enable the router to permit the second terminal to access the wireless network. The method and the device can effectively improve the reliability and the safety of network access.

Description

Access method, device, system and medium of wireless network
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method, an apparatus, a system, and a medium for accessing a wireless network.
Background
Most intelligent devices such as mobile phones, tablet computers and intelligent wearable devices have a function of accessing a wireless network. For example, the intelligent device can access a wireless local area network through a Wi-Fi router, and the Wi-Fi router is fast in signal transmission and does not need wiring harness connection, so that the application is quite popular.
If the intelligent device needs to access the wireless local area network corresponding to the router, most of the intelligent devices need to correctly input a network access password (such as a Wi-Fi password), but the password is very easy to crack, and especially under the condition that password cracking tools are layered endlessly nowadays, the mode of accessing the wireless network based on the password has poor reliability, so that the network is easily used illegally by others, and even a lawbreaker obtains sensitive information from the network, so that the network security is poor.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a wireless network access method, device, system and medium capable of improving network access reliability and security.
The embodiment of the application provides an access method of a wireless network, which is applied to a first terminal and comprises the following steps:
responding to the received identity information of the second terminal sent by the router, and judging whether the identity information meets a preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the router verifies that the network access password sent by the second terminal is correct;
and if so, sending an access permission instruction to the router so as to enable the router to permit the second terminal to access the wireless network.
In one embodiment, the step of determining whether the identity information meets a preset access condition includes:
judging whether the second terminal and the first terminal have an association relation or not according to the identity information;
if so, determining that the identity information meets the preset access condition.
In one embodiment, the identity information comprises an MDN number of the second terminal; judging whether the second terminal and the first terminal have an association relation according to the identity information, wherein the step comprises the following steps:
searching whether the MDN number of the second terminal is recorded in the address book of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation; alternatively, the first and second electrodes may be,
and searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the identity information comprises a user name of the second terminal; judging whether the second terminal and the first terminal have an association relation according to the identity information, wherein the step comprises the following steps:
and searching whether the user name of the second terminal is recorded in the specified application of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the method further comprises:
and if the identity information does not accord with the preset access condition, initiating an abnormal access prompt on an interface of the first terminal, wherein the abnormal access prompt is used for indicating the failure of the second terminal to access the wireless network and the reason of the access failure.
In one embodiment, the method further comprises:
if the identity information does not accord with the preset access condition, initiating a query message for judging whether the second terminal is allowed to access the network or not on the interface of the first terminal;
and when a user instruction for allowing the second terminal to access the network is received, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network.
In one embodiment, the method further comprises:
responding to the received complaint request forwarded by the router, and displaying the complaint request on an interface of the first terminal; wherein the appeal request is sent by the second terminal to the router if the second terminal is denied access to the wireless network;
and in response to receiving a complaint passing instruction issued by a user aiming at the complaint request, sending an access allowing instruction to the router so as to allow the router to allow the second terminal to access the wireless network.
The embodiment of the present application further provides an access apparatus for a wireless network, which is applied to a first terminal, and includes:
the condition judgment module is used for responding to the received identity information of the second terminal sent by the router and judging whether the identity information meets the preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the network access password sent by the second terminal is verified to be correct;
and the instruction sending module is used for sending an access permission instruction to the router if the second terminal is consistent with the wireless network, so that the router allows the second terminal to access the wireless network.
The embodiment of the application also provides an access system of a wireless network, which comprises a first terminal, a router and a second terminal;
the second terminal is used for sending a network access request to the router, wherein the network access request carries a network access password and the identity information of the second terminal;
the router is used for sending the identity information of the second terminal to the first terminal under the condition that the network access password is verified to be correct;
the first terminal is used for executing the access method of the wireless network when receiving the identity information of the second terminal sent by the router.
The embodiment of the present application further provides a computer-readable storage medium, where the storage medium stores a computer program, and the computer program is used to execute the method for accessing a wireless network provided by the embodiment of the present application.
According to the access method, the device, the system and the medium for the wireless network, provided by the embodiment of the application, the second terminal can send a network access request (carrying the network access password and the identity information of the second terminal) to the router, the router sends the network access request to the first terminal under the condition that the network access password is verified to be correct, and the first terminal can judge whether the identity information meets the preset access condition or not when receiving the identity information of the second terminal sent by the router; and if so, sending an access permission instruction to the router so that the router permits the second terminal to access the wireless network. In the above manner, the second terminal is not directly allowed to access the network under the condition that the router verifies that the password is correct, but the first terminal is further required to verify the identity information of the second terminal, that is, the terminal is permitted to access the network only by double verification of the network access password and the identity information, so that the reliability and the safety of network access can be effectively improved.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present application, nor do they limit the scope of the present application. Other features of the present application will become apparent from the following description.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a schematic structural diagram of an access system of a wireless network in one embodiment;
FIG. 2 is a schematic interface diagram of a second terminal in one embodiment;
FIG. 3 is a schematic interface diagram of a second terminal in one embodiment;
fig. 4 is a flow diagram illustrating a method for accessing a wireless network in one embodiment;
FIG. 5 is an interaction diagram of an access method of a wireless network according to an embodiment;
fig. 6 is a schematic structural diagram of an access device of a wireless network in one embodiment;
FIG. 7 is a block diagram of a computer device in one embodiment.
Detailed Description
In order that the above-mentioned objects, features and advantages of the present application may be more clearly understood, the solution of the present application will be further described below. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, but the present application may be practiced in other ways than those described herein; it is to be understood that the embodiments described in this specification are only some embodiments of the present application and not all embodiments.
The method for accessing a wireless network provided in the embodiment of the present application may be applied to an access system of a wireless network shown in fig. 1, where the access system includes a first terminal 100, a router 102, and a second terminal 104. The first terminal 100 may interact with the router 102 and the router 102 may interact with the second terminal 104. The first terminal 100 is a device for managing a router (may also be referred to as a management device of the router), and can set parameters such as a network access password and an operation mode of the router, and manage the router 102. The second terminal 104 is a device requesting to access a wireless network (also referred to as a requester device for short), for example, the wireless network may be a wireless local area network corresponding to a router, and a process of requesting to access the wireless local area network by the second terminal 104 may also be referred to as a process of requesting to connect to Wi-Fi in practical applications. The first terminal 100 and the second terminal 104 may be devices having a capability of connecting to a wireless network, such as a mobile phone, a tablet computer, a smart robot, a portable wearable device, and the like. Router 102 may also be referred to as a WiFi router.
The embodiment of the present application provides the main functions of each device in the access system of the wireless network, and specifically, the second terminal 104 is configured to send a network access request to the router, where the network access request carries a network access password and identity information of the second terminal. The router 102 is configured to send the identity information of the second terminal to the first terminal 100 if the network access password is verified to be correct. The first terminal 100 is configured to perform the access method of the wireless network according to the embodiment of the present application upon receiving the identity information of the second terminal sent by the router 102, for example, it may further perform discrimination verification on the identity information of the second terminal, so as to decide whether to allow the second terminal to access the wireless network.
In the access system of the wireless network, the second terminal is not directly allowed to access the network under the condition that the router verifies that the password is correct, but the first terminal is required to further verify the identity information of the second terminal, namely the terminal is allowed to access the network only through double verification of the network access password and the identity information, so that the reliability and the safety of network access can be effectively improved.
For convenience of understanding, the embodiment of the present application provides an application scenario, for example, a user a has a router in a home, and sets a corresponding wireless local area network through the router, specifically, the user a sets a network access password, other parameters, and the like of the router through a terminal a thereof, and the terminal a, that is, the aforementioned first terminal, can access the wireless local area network. And if user B goes to user a's home for a guest, user B wants to connect to user a's WiFi, user B is required to initiate a network access request through its terminal B, i.e. the aforementioned second terminal, as shown in fig. 2, the terminal interface can display names of various accessible wireless local area networks, user B can click the name of the wireless local area network to be accessed, suppose that the name of the wireless local area network corresponding to the router of user a is "ZQ-GUEST", and user B selects the network to be accessed to the ZQ-GUEST, terminal B may further display an interface as shown in fig. 3, if the terminal B joins the lan, a password and identity information need to be input, and a prompt about the identity information that needs to be filled in, such as inputting information that can indicate an identity, such as a mobile phone number, a name, a nickname, and the like, may be further set in the interface, where the identity information is also regarded as the identity information of the second terminal. After the user B fills in the password and the identity information according to the indication, the user B clicks 'joining', namely, a network access request carrying the network access password and the identity information is initiated, after the router of the user A receives the request, the network access password is firstly verified, if the verification is passed, the identity information of the terminal B is continuously sent to the terminal A, the terminal A can automatically verify the identity information of the terminal B, for example, whether the identity information meets preset access conditions or not is judged, if the identity information meets the preset access conditions, the router is informed to allow the terminal B to access a wireless local area network named 'ZQ-GUEST', the terminal B is successfully networked, and the Wi-Fi signal is provided.
In an embodiment, as shown in fig. 4, an access method of a wireless network is provided, and this embodiment is mainly illustrated by applying the method to the first terminal 100 in fig. 1. As shown in fig. 4, the method mainly includes the following steps S402 to S404:
step S402, responding to the received identity information of the second terminal sent by the router, judging whether the identity information meets the preset access condition.
As described above, the second terminal is a terminal that sends a network access request to the router, the network access request carries the network access password and the identity information of the second terminal, and the identity information is sent to the first terminal by the router when the router verifies that the network access password sent by the second terminal is correct. The identity information of the second terminal may be, for example, an MDN Number (Mobile Directory Number) of the second terminal, that is, a Mobile phone Number of the second terminal, or may also be, for example, a user name of the second terminal, where the user name may be a name, a nickname, a virtual name for specifying an application, and the like, which is not limited herein.
After receiving the identity information of the second terminal, the first terminal can automatically verify the identity information without the need that the user of the first terminal spends time to verify the identity information. In a specific implementation example, the first terminal may determine whether the second terminal and the first terminal have an association relationship according to the identity information; if so, determining that the identity information meets the preset access condition. For example, if the second terminal and the first terminal have been recorded with interaction such as a telephone or some social platform, it is confirmed that the second terminal and the first terminal have an association relationship. In other words, it is determined whether the second terminal and the first terminal have an association relationship, that is, whether there is a contact (acquaintance) between the user (requester) of the second terminal and the user (manager) of the first terminal. Only when the second terminal and the first terminal have an association relationship (namely, the manager and the requester have a contact), the second terminal is permitted to access the network, so that the security of network access is effectively guaranteed, and the situation that the second terminal directly accesses the network by cracking the password by illegal personnel is prevented.
And step S404, if the first terminal and the second terminal are matched, sending an access permission instruction to the router so that the router permits the second terminal to access the wireless network.
In addition, if not, a reject access instruction may be sent to the router to cause the router to reject the second terminal from accessing the wireless network.
In the method, the second terminal is not directly allowed to access the network under the condition that the router verifies that the password is correct, but the first terminal is required to further verify the identity information of the second terminal, namely the terminal is allowed to access the network only through double verification of the network access password and the identity information, so that the reliability and the safety of network access can be effectively improved.
For convenience of understanding, the following two ways of determining whether the second terminal and the first terminal have an association relationship according to the identity information are provided in the embodiments of the present application:
the first method is as follows: the identity information comprises an MDN number of the second terminal; the step of determining whether the second terminal and the first terminal have the association relationship according to the identity information may be implemented by using the following (1) or (2):
(1) and searching whether the address book of the first terminal records the MDN number of the second terminal, and if so, determining that the second terminal and the first terminal have an association relation. That is, if the mobile phone number of the second terminal is included in the address book of the first terminal, it indicates that the user of the first terminal is acquainted with the user of the second terminal, and therefore, it can be directly recognized that the first terminal and the second terminal have an association relationship.
(2) And searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation. The above-mentioned specified historical period may be, for example, the first 24 hours, the first 30 days, the first 60 days, or the like since the identity information of the second terminal is received, and the historical period may be flexibly defined according to the requirement. If a communication record (such as a telephone record or a short message record) exists between the first terminal and the second terminal in the specified historical period, the interaction between the user of the first terminal and the user of the second terminal is indicated, and therefore the first terminal and the second terminal can also be directly considered to have the association relationship.
In practical applications, it can be determined that the first terminal and the second terminal have an association relationship when one of the above-mentioned conditions (1) and (2) is present.
The second method comprises the following steps: the identity information comprises a user name of the second terminal; the step of judging whether the second terminal and the first terminal have the association relation or not according to the identity information comprises the following steps: and searching whether the user name of the second terminal is recorded in the appointed application of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation.
The user name of the second terminal may be a real name of the user of the second terminal, or may be a nickname used by the user of the second terminal in software applications such as a certain social platform. If the received identity information comprises a user name, it may be looked up whether the user name is recorded in a specified application of the first terminal, such as looking up whether the user name is in a friend list of social application a. In practical applications, the number of the designated applications may be one or more, such as an address book application, a social platform application, a game application, and the like, which is not limited herein. If the user name is recorded in the designated application, the user of the first terminal and the user of the second terminal are interacted, so that the first terminal and the second terminal can be directly considered to have the association relationship.
In summary, the first terminal can determine whether an association relationship exists between the second terminal and the first terminal according to the identity information, and the second terminal is permitted to access the wireless network only when the association relationship exists, so that a person irrelevant to the user of the first terminal is prevented from illegally accessing the network, and the network security can be effectively guaranteed to a certain extent.
In some embodiments, the first terminal may further perform the following operations: and if the identity information does not accord with the preset access condition, initiating an abnormal access prompt on an interface of the first terminal, wherein the abnormal access prompt is used for indicating the failure of the second terminal to access the wireless network and the reason of the access failure. That is, the first terminal may initiate a prompt to a user (administrator) of the first terminal when it is determined that the identity information does not meet the preset access condition, so as to remind the administrator of paying attention to the abnormal access condition, so as to take corresponding measures. In practical application, when the identity information meets the preset access condition, the interface of the first terminal may also initiate an access prompt to remind a user of the first terminal that new equipment is currently accessed to the wireless network, and the identity information and/or the terminal type of the second terminal may also be displayed in the access prompt, so that the user of the first terminal can clearly know the current network access condition.
In other embodiments, the first terminal may further perform the following operations: if the identity information does not accord with the preset access condition, initiating a query message for judging whether the second terminal is allowed to access the network or not on the interface of the first terminal; and when receiving a user instruction for allowing the second terminal to access the network, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network. When the identity information does not accord with the preset access condition, the first terminal can also actively inquire whether the second terminal is allowed to access, the user of the first terminal has the highest-level authority, and the second terminal can also be allowed to access the network according to the actual condition under the condition that the identity information does not accord with the access condition. In addition, the user of the first terminal can also limit network parameters such as downloading speed and uploading speed corresponding to the second terminal by sending a control instruction to the router.
In practical application, when the identity information does not meet the preset access condition, the interface of the first terminal may initiate an abnormal access prompt and/or an inquiry message, which may be flexibly set according to actual requirements.
In addition, although the identity information of the second terminal is rejected to access without meeting the preset access condition, the user of the second terminal still wants to access the network, and may further initiate a complaint request, the user of the second terminal may fill out a complaint reason, and initiate the complaint request carrying the complaint reason by triggering the complaint button, and the router may forward the complaint request to the first terminal after receiving the complaint request, and the first terminal may perform the following operations: responding to the received complaint request forwarded by the router, and displaying the complaint request on an interface of the first terminal; wherein the complaint request is sent to the router by the second terminal under the condition that the second terminal is refused to access the wireless network; the complaint request needs to be judged by a user of the first terminal, and the first terminal can send an access permission instruction to the router in response to receiving a complaint passing instruction issued by the user for the complaint request, so that the router allows the second terminal to access the wireless network. Through the mode, an additional complaint channel is provided, so that the user experience can be effectively improved.
For convenience of understanding, based on the foregoing embodiments, the present embodiment provides an interaction diagram of an access method of a wireless network as shown in fig. 5, which illustrates an interaction scenario of a first terminal, a router, and a second terminal, and the following description is provided:
step S502, the second terminal sends a network access request carrying a network access password and identity information of the second terminal to the router;
step S504, the router verifies whether the network access password is correct. Specifically, the router may compare the network access password with a pre-stored legal password, and if the comparison is consistent, it indicates that the network access password is correct. Step S506a or step S506b is performed according to the verification result.
Step S506a, correctly sending the identity information of the second terminal to the first terminal.
In step S506b, a reject access message is incorrectly returned to the second terminal.
Step S508, the second terminal determines whether the identity information meets a preset access condition. Step S510a or step S510b is executed according to the discrimination condition.
Step S510a, if yes, an access permission instruction is sent to the router. Then, step S512a is executed, in which the router opens a network interface for the second terminal, and allows the second terminal to access the wireless network.
Step S510b, it is not complied with sending the access denial instruction to the router. Then, step S512b is executed, in which the router returns an access rejection message to the second terminal, and rejects the second terminal to access the wireless network.
After the second terminal receives the denial of access message, the complaint request can be reinitiated in anticipation that the user of the first terminal can authorize the second terminal to access the network. In addition, when the first terminal sends the access permission instruction or the access rejection instruction, the first terminal can display corresponding messages on an interface of the first terminal so as to inform a user of the first terminal of knowing the current situation, and the user of the first terminal can also directly issue a request for permitting the second terminal to access the network according to the requirement to authorize the second terminal to access the network.
To sum up, the access method for the wireless network provided in the embodiment of the present application does not directly allow the second terminal to access the network when the router verifies that the password is correct, but further verifies the identity information of the second terminal by the first terminal, that is, the terminal is permitted to access the network only by the double verification of the network access password and the identity information, so that the reliability and the security of network access can be effectively improved.
Corresponding to the foregoing access method of the wireless network, an embodiment of the present disclosure further provides an access apparatus of a wireless network, referring to a schematic structural diagram of an access apparatus of a wireless network shown in fig. 6, where the apparatus is applicable to a first terminal, and includes:
a condition determining module 602, configured to respond to the received identity information of the second terminal sent by the router, and determine whether the identity information meets a preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the network access password sent by the second terminal is verified to be correct;
and an instruction sending module 604, configured to send an access permission instruction to the router if the second terminal is determined to be the first terminal.
In the device, the second terminal is not directly allowed to access the network under the condition that the router verifies that the password is correct, but the first terminal is required to further verify the identity information of the second terminal, namely the terminal is allowed to access the network only through double verification of the network access password and the identity information, so that the reliability and the safety of network access can be effectively improved.
In some embodiments, the condition determining module 602 is specifically configured to determine whether the second terminal and the first terminal have an association relationship according to the identity information; if so, determining that the identity information meets the preset access condition.
In some embodiments, the identity information comprises an MDN number of the second terminal; the condition determining module 602 is specifically configured to search whether an MDN number of the second terminal is recorded in an address book of the first terminal, and if the MDN number of the second terminal is found, determine that an association relationship exists between the second terminal and the first terminal; or, searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation.
In some embodiments, the identity information comprises a user name of the second terminal; the condition determining module 602 is specifically configured to search whether a user name of the second terminal is recorded in the specified application of the first terminal, and if the user name of the second terminal is found, determine that an association relationship exists between the second terminal and the first terminal.
In some embodiments, the apparatus further includes an abnormal access prompting module, configured to initiate an abnormal access prompt on an interface of the first terminal if the identity information does not meet the preset access condition, where the abnormal access prompt is used to indicate that the second terminal fails to access the wireless network and a reason for the access failure.
In some embodiments, the apparatus further includes a query module, configured to initiate a query message on an interface of the first terminal whether to allow the second terminal to access a network if the identity information does not meet the preset access condition; and when a user instruction for allowing the second terminal to access the network is received, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network.
In some embodiments, the apparatus further comprises:
the complaint display module is used for responding to the received complaint request forwarded by the router and displaying the complaint request on an interface of the first terminal; wherein the appeal request is sent by the second terminal to the router if the second terminal is denied access to the wireless network;
and the complaint passing module is used for responding to a complaint passing instruction issued by a user aiming at the complaint request, and sending an access allowing instruction to the router so that the router allows the second terminal to access the wireless network.
For specific limitations of the access device of the wireless network, reference may be made to the above limitations of the access method of the wireless network, which are not described herein again.
The access device of the wireless network provided in the embodiments of the present application has the beneficial effects of the access method of the wireless network provided in any embodiments of the present application, and details are not repeated here.
The modules in the access device of the wireless network can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 7. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, Near Field Communication (NFC) or other technologies. The computer program is executed by a processor to implement an access method of a wireless network. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the access means of the wireless network provided in the present application may be implemented in the form of a computer program, which is executable on a computer device as shown in fig. 7. The memory of the computer device may store various program modules constituting the access means of the wireless network, such as the condition determining module 602 and the instruction transmitting module 604 shown in fig. 6. The computer program constituted by the program modules causes the processor to execute the steps of the wireless network access method according to the embodiments of the present application described in the present specification.
For example, the computer device shown in fig. 7 may perform the step of determining whether the identity information meets the preset access condition in response to receiving the identity information of the second terminal sent by the router by the condition determining module 602 in the access apparatus of the wireless network shown in fig. 6. The computer device may execute the step of sending an access permission instruction to the router to allow the second terminal to access the wireless network if the condition determining module 602 is met.
In one embodiment, a computer device is provided, which may be a first terminal, comprising a memory storing a computer program and a processor implementing the following steps when the computer program is executed: responding to the received identity information of the second terminal sent by the router, and judging whether the identity information meets a preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the router verifies that the network access password sent by the second terminal is correct; and if so, sending an access permission instruction to the router so as to enable the router to permit the second terminal to access the wireless network.
In one embodiment, the processor, when executing the computer program, further performs the steps of: judging whether the second terminal and the first terminal have an association relation or not according to the identity information; if so, determining that the identity information meets the preset access condition.
In one embodiment, the processor, when executing the computer program, further performs the steps of: searching whether the MDN number of the second terminal is recorded in the address book of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation; or, searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and searching whether the user name of the second terminal is recorded in the specified application of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the processor when executing the computer program further performs the steps of: and if the identity information does not accord with the preset access condition, initiating an abnormal access prompt on an interface of the first terminal, wherein the abnormal access prompt is used for indicating the failure of the second terminal to access the wireless network and the reason of the access failure.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the identity information does not accord with the preset access condition, initiating a query message for judging whether the second terminal is allowed to access the network or not on the interface of the first terminal; and when a user instruction for allowing the second terminal to access the network is received, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network.
In one embodiment, the processor when executing the computer program further performs the steps of: responding to the received complaint request forwarded by the router, and displaying the complaint request on an interface of the first terminal; wherein the appeal request is sent by the second terminal to the router if the second terminal is denied access to the wireless network; and in response to receiving a complaint passing instruction issued by a user aiming at the complaint request, sending an access allowing instruction to the router so as to allow the router to allow the second terminal to access the wireless network.
According to the computer equipment provided by the embodiment of the application, the terminal is permitted to access the network only by the double verification of the network access password and the identity information, so that the network access reliability and the network access safety can be effectively improved.
In one embodiment, there is provided a computer readable storage medium having a computer program stored thereon, the computer readable storage medium being applicable to a first terminal, the computer program realizing the following steps when executed by a processor: and responding to the received identity information of the second terminal sent by the router, judging whether the identity information meets the preset access condition, and if so, sending an access permission instruction to the router so that the router allows the second terminal to access the wireless network. The second terminal is a terminal sending a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the network access password sent by the second terminal is verified to be correct.
In one embodiment, the computer program when executed by the processor further performs the steps of: judging whether the second terminal and the first terminal have an association relation or not according to the identity information; if so, determining that the identity information meets the preset access condition.
In one embodiment, the computer program when executed by the processor further performs the steps of: searching whether the address book of the first terminal records the MDN number of the second terminal, and if so, determining that the second terminal and the first terminal have an association relation; or, searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the computer program when executed by the processor further performs the steps of: and searching whether the user name of the second terminal is recorded in the specified application of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation.
In one embodiment, the computer program when executed by the processor further performs the steps of: and if the identity information does not accord with the preset access condition, initiating an abnormal access prompt on an interface of the first terminal, wherein the abnormal access prompt is used for indicating the failure of the second terminal to access the wireless network and the reason of the access failure.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the identity information does not accord with the preset access condition, initiating a query message for judging whether the second terminal is allowed to access the network or not on the interface of the first terminal; and when a user instruction for allowing the second terminal to access the network is received, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network.
In one embodiment, the computer program when executed by the processor further performs the steps of: responding to the received complaint request forwarded by the router, and displaying the complaint request on an interface of the first terminal; wherein the appeal request is sent by the second terminal to the router if the second terminal is denied access to the wireless network; and in response to receiving a complaint passing instruction issued by a user aiming at the complaint request, sending an access allowing instruction to the router so as to allow the router to allow the second terminal to access the wireless network.
The computer-readable storage medium provided by the embodiment of the application requires double verification of the network access password and the identity information to permit the terminal to access the network, so that the reliability and the security of network access can be effectively improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM is available in many forms, such as Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), and the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is specific and detailed, but not to be understood as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An access method of a wireless network, applied to a first terminal, includes:
responding to the received identity information of the second terminal sent by the router, and judging whether the identity information meets a preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the router verifies that the network access password sent by the second terminal is correct;
and if so, sending an access permission instruction to the router so as to enable the router to permit the second terminal to access the wireless network.
2. The method of claim 1, wherein the step of determining whether the identity information meets a predetermined access condition comprises:
judging whether the second terminal and the first terminal have an association relation or not according to the identity information;
if so, determining that the identity information meets the preset access condition.
3. The method of claim 2, wherein the identity information comprises an MDN number of the second terminal; judging whether the second terminal and the first terminal have an association relation according to the identity information, wherein the step comprises the following steps:
searching whether the MDN number of the second terminal is recorded in the address book of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation; alternatively, the first and second electrodes may be,
and searching whether the first terminal records a communication record based on the MDN number of the second terminal in a specified historical time period, and if so, determining that the second terminal and the first terminal have an association relation.
4. The method of claim 2, wherein the identity information comprises a user name of the second terminal; judging whether the second terminal and the first terminal have an association relation according to the identity information, wherein the step comprises the following steps:
and searching whether the user name of the second terminal is recorded in the specified application of the first terminal, and if so, determining that the second terminal and the first terminal have an association relation.
5. The method according to any one of claims 1 to 4, further comprising:
and if the identity information does not accord with the preset access condition, initiating an abnormal access prompt on an interface of the first terminal, wherein the abnormal access prompt is used for indicating the failure of the second terminal to access the wireless network and the reason of the access failure.
6. The method according to any one of claims 1 to 4, further comprising:
if the identity information does not accord with the preset access condition, initiating a query message for judging whether the second terminal is allowed to access the network or not on the interface of the first terminal;
and when a user instruction for allowing the second terminal to access the network is received, sending an access allowing instruction to the router so as to enable the router to allow the second terminal to access the wireless network.
7. The method of claim 1, further comprising:
responding to the received complaint request forwarded by the router, and displaying the complaint request on an interface of the first terminal; wherein the appeal request is sent by the second terminal to the router if the second terminal is denied access to the wireless network;
and in response to receiving a complaint passing instruction issued by a user aiming at the complaint request, sending an access allowing instruction to the router so as to allow the router to allow the second terminal to access the wireless network.
8. An access device of a wireless network, applied to a first terminal, includes:
the condition judgment module is used for responding to the received identity information of the second terminal sent by the router and judging whether the identity information meets the preset access condition; the second terminal is a terminal which sends a network access request to the router, the network access request carries a network access password and identity information of the second terminal, and the identity information is sent to the first terminal by the router under the condition that the router verifies that the network access password sent by the second terminal is correct;
and the instruction sending module is used for sending an access permission instruction to the router if the second terminal is consistent with the wireless network, so that the router allows the second terminal to access the wireless network.
9. An access system of a wireless network is characterized by comprising a first terminal, a router and a second terminal;
the second terminal is used for sending a network access request to the router, wherein the network access request carries a network access password and identity information of the second terminal;
the router is used for sending the identity information of the second terminal to the first terminal under the condition that the network access password is verified to be correct;
the first terminal is used for executing the access method of the wireless network according to any one of claims 1 to 7 when receiving the identity information of the second terminal sent by the router.
10. A computer-readable storage medium, characterized in that the storage medium stores a computer program for executing the method of accessing a wireless network according to any one of the preceding claims 1 to 7.
CN202210272361.6A 2022-03-18 2022-03-18 Access method, device, system and medium of wireless network Pending CN114640996A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210272361.6A CN114640996A (en) 2022-03-18 2022-03-18 Access method, device, system and medium of wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210272361.6A CN114640996A (en) 2022-03-18 2022-03-18 Access method, device, system and medium of wireless network

Publications (1)

Publication Number Publication Date
CN114640996A true CN114640996A (en) 2022-06-17

Family

ID=81949156

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210272361.6A Pending CN114640996A (en) 2022-03-18 2022-03-18 Access method, device, system and medium of wireless network

Country Status (1)

Country Link
CN (1) CN114640996A (en)

Similar Documents

Publication Publication Date Title
US10063547B2 (en) Authorization authentication method and apparatus
US10635793B2 (en) Restricted accounts on a mobile platform
KR102047902B1 (en) Message management methods, devices, and storage media
US9542540B2 (en) System and method for managing application program access to a protected resource residing on a mobile device
US10673985B2 (en) Router-host logging
US20200336309A1 (en) Access Token Management Method, Terminal, and Server
CN108710528B (en) Desktop cloud virtual machine access and control method, device, equipment and storage medium
CN104052775B (en) Right management method, device and the system of a kind of cloud platform service
CN104025539A (en) Methods And Apparatus To Facilitate Single Sign-On Services
US10993090B2 (en) Network access method, apparatus, and system
RU2651159C1 (en) Method and device for marking unknown number
WO2017088548A1 (en) Communication method based on social identity, and server
CN112532653B (en) Method and device for managing third-party account
CN108009439B (en) Resource request method, device and system
CN113489689B (en) Authentication method and device for access request, storage medium and electronic equipment
CN109756469B (en) Public account management method and device and computer readable storage medium
WO2018196153A1 (en) Open authorization-based method, device, and terminal
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium
CN112560006A (en) Single sign-on method and system under multi-application system
CN109474626B (en) Network authentication method and device based on SNS
CN114640996A (en) Access method, device, system and medium of wireless network
CN112685719B (en) Single sign-on method, device, system, computer equipment and storage medium
KR102111160B1 (en) Login service system and method for providing login service using the same
JP2009122898A (en) Community communication network, communication control method, user terminal, terminal control method, and program
CN111416815A (en) Message processing method, electronic device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination