WO2013117131A1 - 一种无线接入认证的方法及装置 - Google Patents

一种无线接入认证的方法及装置 Download PDF

Info

Publication number
WO2013117131A1
WO2013117131A1 PCT/CN2013/070886 CN2013070886W WO2013117131A1 WO 2013117131 A1 WO2013117131 A1 WO 2013117131A1 CN 2013070886 W CN2013070886 W CN 2013070886W WO 2013117131 A1 WO2013117131 A1 WO 2013117131A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
gateway device
new key
key
access authentication
Prior art date
Application number
PCT/CN2013/070886
Other languages
English (en)
French (fr)
Inventor
张凯
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Publication of WO2013117131A1 publication Critical patent/WO2013117131A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • H04W12/041Key generation or derivation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless communications, and in particular, to a method and apparatus for wireless access authentication. Background technique
  • WIFI wireless fidelity
  • the access key security of WIFI access points has also become a subject of research by technicians, due to the existing WIFI access points.
  • the initial key is factory-set or the vendor provides a completely random serial number for the WIFI access point's default key, and the general user will not modify these factory settings, and these keys are static, the user always With this key, as long as the hacker finds out the rules or attacks the WIFI access point in a traversal manner, it will have a greater impact on the security of the WIFI device, so that the user cannot normally use the WIFI device, and If the hacker is connected to the WIFI device, the user's interests cannot be guaranteed, which brings great inconvenience to the user. Summary of the invention
  • Embodiments of the present invention provide a method and apparatus for wireless access authentication to prevent a key from being broken.
  • a method for wireless access authentication including:
  • the first user equipment After determining that the feature word of the first user equipment is not pre-stored in the gateway device, and the first user equipment fails to access the gateway device by using the key for the first time,
  • an apparatus for providing wireless access authentication includes:
  • a determining unit configured to determine whether a feature word of the first user equipment is pre-stored in the gateway device, and whether the first user equipment attempts to access the gateway device by using the key for the first time;
  • a statistical recording unit which records and records the number of consecutive failures of the first user equipment access gateway device
  • a key generating unit configured to generate a new key after the number of times is greater than a preset first threshold
  • an authentication unit configured to perform WIFI by using the new key to the user equipment of the feature word not pre-preserved by the gateway device Access authentication.
  • the method and device for the wireless access authentication provided by the embodiment of the present invention generate a new key after determining that the number of times the user equipment and the gateway device in the gateway device fail to be pre-existed in the feature device is greater than the preset first threshold. And the WIFI access authentication is performed on the user equipment whose feature word is not pre-existing in the gateway device by using the new key, so that the key is prevented from being cracked by dynamically generating a new key.
  • FIG. 1 is a schematic flowchart of a method for wireless access authentication according to an embodiment of the present invention
  • FIG. 2 is a second schematic flowchart of a method for wireless access authentication according to an embodiment of the present invention
  • FIG. 4 is a schematic flowchart of a method for wireless access authentication according to an embodiment of the present invention
  • FIG. 5 is a schematic diagram of a device for wireless access authentication according to an embodiment of the present invention. One of the schematic diagrams;
  • FIG. 6 is a second schematic diagram of an apparatus for wireless access authentication according to an embodiment of the present invention. detailed description
  • the executor of the method is a gateway, and the gateway is used to provide protocol conversion when interworking between networks using different architectures or protocols. Facilities for network-compatible functions such as routing and data exchange.
  • the gateway can generally record the feature word of the device through which the data is sent for later use.
  • the feature word of the device is the device's "identity card", such as the physical address of the device (Media Access Control) , referred to as MAC) and so on.
  • the gateway device in this embodiment may be specifically a WIFI device or a wireless router.
  • the method is shown in Figure 1, including:
  • the first user equipment accessing the gateway device fails continuously. frequency.
  • the feature word may be a physical address (MAC) or an organization unique identifier (0UI) or a factory equipment serial number (SN) or an IP address.
  • MAC physical address
  • 0UI organization unique identifier
  • SN factory equipment serial number
  • IP address IP address
  • the MAC address of the first user equipment is matched with the MAC list in the gateway device or the MAC address pre-stored in the MAC list to determine the first If the MAC address of the user equipment is a pre-existing MAC address in the gateway device, if it is determined that the MAC address of the first user equipment is a pre-existing MAC address in the gateway device, the first user equipment is authenticated by the original user with the WIFI access authentication.
  • the key used by the user equipment and the gateway device to perform WIFI access authentication before the new key is generated; if it is determined that the MAC of the first user equipment is not pre-existing in the MAC of the gateway device, the first user equipment and the gateway are determined. If the device connection is successful, if the judgment is unsuccessful, the number of consecutive failures of the first user equipment access gateway device is counted and recorded.
  • the original key is 123456.
  • the user equipment attempts to connect with the gateway device, it is determined that the user equipment is a user equipment that does not pre-store the gateway device, and the user equipment and the gateway device are used for the first time. After the password connection of the non-123456 fails, the user is counted and recorded. The number of consecutive failures of the device/access gateway device.
  • the number is greater than the preset first threshold, generate a new key, and use the new key to perform WIFI access authentication on the user equipment whose feature word is not pre-existing in the gateway device.
  • the user equipment ⁇ access gateway device fails to be continuously failed 10 times in the above steps, and the preset first threshold is 8 times, and the number of consecutive failures of the user equipment is greater than the preset first.
  • the threshold value is 8
  • a new key 546213 is generated.
  • the user equipment B that is not pre-stored by the MAC device is connected to the gateway device after the user equipment, and the user equipment is generated by using the generated new key 546213. B performs WIFI access authentication. In this way, if an illegal user device attempts to crack the key and connects to the gateway device, the gateway will automatically change the key. Since the illegal user device has difficulty in knowing the new key, the confidentiality is effectively prevented. The key was cracked.
  • the method for determining the wireless access authentication provided by the embodiment of the present invention generates a new key after determining that the number of times the connection between the user equipment and the gateway device in the gateway device is not pre-existing is greater than the preset first threshold.
  • the new key performs WIFI access authentication on the user equipment whose feature word is not pre-existing in the gateway device, so that the key is prevented from being cracked by dynamically generating a new key.
  • the user equipment of the MAC pre-existing gateway device may also be performed by using the new key. WIFI access authentication.
  • the method further includes:
  • the user equipment is used as an example.
  • the user equipment in the gateway pre-existing gateway establishes a wireless connection with the gateway device through the original key
  • the user equipment attempts to connect to the gateway device, because the new device is not known.
  • the key 546213 is therefore not accessible to the gateway device by wireless access.
  • the user device C may send a message to the gateway device to view the new key, and the gateway device receives the new view from the user device C through the wireless port.
  • the new key 546213 is sent to the user equipment C in a wireless manner, and the user of the user equipment C then informs the user of the user equipment of the new key.
  • the user equipment can learn the new key and wirelessly connect to the gateway device through the user equipment C.
  • the user equipment that does not pre-store the MAC device is guaranteed to use the gateway device normally, and the dynamic A new key is generated to prevent the key from being cracked.
  • the method may further include: S105. Receive a new key view message of the user equipment by using a physical port.
  • the previous user equipment can also directly connect to the physical port of the gateway device, and send a message to the gateway device to view the new key.
  • the gateway device receives the new key message sent by the physical port, the physical device passes the physical The port sends a new key 546213 to the user equipment, so that the user equipment can connect to the gateway device by wireless after obtaining the new key.
  • the user equipment C can not only view the new key 546213 by wireless, but also It can be viewed on the physical port of the gateway device. In this way, the user device that does not pre-exist with the gateway device is guaranteed to use the gateway device normally.
  • the original key 123456 can also be set to be invalid, so that the key is more effectively prevented from being cracked.
  • the user equipment that initially authenticates the connection with the gateway device using the factory key is allowed to use the factory key to authenticate the connection with the gateway device, and the other original keys are set to be invalid, thus effectively preventing When the key is cracked, it also ensures that the user uses the gateway device normally.
  • the number of consecutive failures of the first user equipment access gateway device is counted and recorded in S101, and may be: counting and recording the first user equipment access gateway within a preset first time threshold. The number of consecutive failures of the device.
  • the first time threshold is preset to be 1 minute, and the user equipment can be counted and recorded. The number of times the connection with the gateway device is within 1 minute. If the number is greater than the preset first threshold, a new key is generated. In this way, it is more effective to determine whether the key needs to be changed, thereby further preventing the key from being cracked. .
  • the apparatus 50 for wireless access authentication provided by the embodiment of the present invention, as shown in FIG. 5, includes: a determining unit 501, configured to determine whether a feature word of the first user equipment is pre-stored in the gateway device, and the first user equipment is used for the first time. Whether the key attempts to access the gateway device is successful.
  • the feature word may be a physical address (MAC) or an organization unique identifier (OUI) or a factory equipment serial number (SN) or an IP address.
  • MAC physical address
  • OUI organization unique identifier
  • SN factory equipment serial number
  • IP address IP address
  • the determining unit 501 determines whether the user equipment is the user equipment of the MAC pre-existing gateway device, and determines that the user equipment and the gateway device are the first time. Whether the connection failed.
  • the statistics recording unit 502 collects and records the number of consecutive failures of the first user equipment access gateway device.
  • the original key is 123456.
  • the determining unit 501 determines that the user equipment is a user equipment that does not pre-exist with the gateway device, and determines that the user equipment fails to connect for the first time, the user equipment is logged and attempts to access the gateway. The number of consecutive failures of the device.
  • the key generation unit 503 is configured to generate a new key after the number of times is greater than a preset first threshold.
  • a preset first threshold is 8 times, so that the number of consecutive failures of the user equipment is greater than the preset first.
  • a threshold value generates a new key 546213.
  • the authentication unit 504 is configured to perform WIFI access authentication on the user equipment whose feature word is not pre-stored by the gateway device by using the new key.
  • the user equipment B that is not pre-stored by the MAC device is connected to the gateway device after the user equipment, and then performs WIFI on the user equipment B by using the generated new key 546213.
  • Access authentication in this way, if an illegal user device attempts to crack the key and connect to the gateway device, the gateway will automatically change the key to prevent the key from being cracked.
  • the device for determining the wireless access authentication provided by the embodiment of the present invention generates a new key after determining that the number of times the connection between the user equipment and the gateway device in the gateway device is not pre-existing is greater than a preset first threshold.
  • the new key performs WIFI access authentication for the user equipment of the gateway device that is not pre-existing in the feature device, so that the key is prevented from being cracked by dynamically generating a new key.
  • the authentication unit 504 is further configured to: after the determining unit 501 determines that the feature word of the user equipment that is trying to access the gateway device is pre-existing in the gateway device, pre-preserving the user equipment of the gateway device by using the new key Perform WIFI access authentication.
  • the user equipment C of the MAC pre-existing gateway device attempts to connect to the gateway device, the user equipment C is authenticated by the original key 123456. Of course, the user equipment C may also obtain the new key. Access is made to the gateway device using the new key 546213.
  • the device 50 further includes:
  • the receiving unit 505 is configured to receive, by using the wireless port, a new key view message from the feature device pre-existing the gateway device and successfully authenticating to the user equipment of the WIFI access point.
  • the sending module 506 is configured to send the new key to the user equipment.
  • the user equipment C in the gateway pre-existing gateway device and the gateway device are connected by using a wireless connection
  • the user equipment ⁇ attempts to connect to the gateway device, and since the new key 546213 is unknown, the wireless device cannot access the wireless device.
  • the user device C may send a message to the gateway device to view the new key.
  • the sending unit 506 updates the new message.
  • the key 546213 is sent to the user equipment C in a wireless manner, so that the user equipment can obtain the new key through the user equipment C, and then can connect to the gateway device through the wireless connection, so that the MAC address is guaranteed.
  • the user equipment that does not pre-store the gateway device normally uses the gateway device, and dynamically generates a new key to prevent the key from being cracked.
  • the receiving unit 505 is further configured to receive, by using a physical port, a new key view message of the user equipment.
  • the sending unit 506 is further configured to send the new key to the user equipment.
  • the previous user equipment can also directly connect to the physical port of the gateway device, and send a view new key message to the gateway device.
  • the receiving unit 505 receives the view new key message sent by the physical port
  • the receiving unit 505 sends the message.
  • the unit 506 sends a new key 546213 to the user equipment through the physical port, so that the user equipment can connect to the gateway device by wireless after obtaining the new key.
  • the user equipment C can not only view the new secret through wireless.
  • the key 546213 can also be viewed by accessing the physical port of the gateway device. In this way, the user device that does not pre-exist with the gateway device is normally used by the user device.
  • the original key 123456 can also be set to be invalid, so that the key is more effectively prevented from being cracked.
  • the statistical recording unit 502 is further configured to count and record the number of consecutive failures of the first user equipment access gateway device within a preset first time threshold.
  • the first time threshold is preset to be 1 minute, and the number of times the user equipment ⁇ counted and recorded by the statistical recording unit 502 is connected to the gateway device within 1 minute, if the number of times is greater than the preset first threshold, A new key is generated, which makes it more effective to determine whether the key needs to be changed, thereby further preventing the key from being cracked.
  • the storage medium may be a magnetic disk, an optical disk, a read-only memory (ROM), or a random access memory (RAM).

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

一种无线接入认证的方法及装置,涉及无线通信领域,以防止密钥被破解。该方法包括:在判断第一用户设备的特征字未预存在网关设备中,且所述第一用户设备首次使用密钥试图接入网关设备失败后,统计并记录所述第一用户设备接入网关设备连续失败的次数(S101);若所述次数大于预设的第一阈值,则生成新密钥,并通过新密钥对特征字未预存在网关设备的用户设备进行WIFI接入认证(S102)。

Description

一种无线接入认证的方法及装置
技术领域 本发明涉及无线通信领域, 尤其涉及一种无线接入认证的方法及装 置。 背景技术
随着无线通信的发展, 无线相容认证(wireless fidelity, 简称 WIFI )技术 越来越普遍, WIFI接入点接入密钥安全性也成为技术人员研究的课题, 由于 现有 WIFI 接入点的初始密钥都是出厂设置好的或者由厂商为 WIFI 接入点的 默认密钥提供一个完全随机的序列号, 并且一般用户不会修改这些出厂设置, 而且这些密钥都是一成不变的, 用户始终用这一密钥, 只要黑客发现其中的 规律或者以遍历的方法攻击 WIFI接入点,那么就会对 WIFI设备的安全性造成 较大影响, 这样一来, 无法保证用户正常使用 WIFI设备, 并且如果被黑客连 接到 WIFI设备上, 无法保证用户的利益, 为用户带来极大的不便。 发明内容
本发明的实施例提供一种无线接入认证的方法及装置, 以防止密钥被破 解。
为达到上述目的, 本发明的实施例釆用如下技术方案:
一方面, 提供一种无线接入认证的方法, 包括:
在判断第一用户设备的特征字未预存在网关设备中, 且所述第一用户设 备首次使用密钥试图接入网关设备失败后,
统计并记录所述第一用户设备接入网关设备连续失败的次数;
若所述次数大于预设的第一阔值, 则生成新密钥, 并通过所述新密钥对 特征字未预存在网关设备的用户设备进行 Wl F I接入认证。 一方面, 提供一种无线接入认证的装置, 包括:
判断单元, 用于判断第一用户设备的特征字是否预存在网关设备中, 以 及所述第一用户设备首次使用密钥试图接入网关设备是否成功;
统计记录单元, 统计并记录所述第一用户设备接入网关设备连续失败的 次数;
密钥生成单元, 用于在所述次数大于预设的第一阔值后, 生成新密钥; 认证单元, 用于通过所述新密钥对特征字未预存在网关设备的用户设备 进行 WIFI接入认证。
本发明实施例提供的无线接入认证的方法及装置, 在判断特征字未预存 在网关设备中的用户设备与网关设备连接失败的次数大于预设的第一阔值 后, 生成新密钥, 并通过该新密钥对特征字未预存在网关设备的用户设备进 行 WIFI接入认证, 这样一来, 以动态生成新密钥的方式, 防止了密钥被破解。 附图说明
为了更清楚地说明本发明实施例中的技术方案, 下面将对实施例描述中 所需要使用的附图作一简单地介绍, 显而易见地, 下面描述中的附图仅仅是 本发明的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动 性的前提下, 还可以根据这些附图获得其他的附图。
图 1为本发明实施例提供的无线接入认证的方法的流程示意图之一; 图 2为本发明实施例提供的无线接入认证的方法的流程示意图之二; 图 3为本发明实施例提供的无线接入认证的方法的流程示意图之三; 图 4为本发明实施例提供的无线接入认证的方法的流程示意图之四; 图 5为本发明实施例提供的无线接入认证的装置的示意图之一;
图 6为本发明实施例提供的无线接入认证的装置的示意图之二。 具体实施方式
下面将结合本发明实施例中的附图, 对本发明实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明一部分实施例, 而 不是全部的实施例。 基于本发明中的实施例, 本领域普通技术人员在没有做 出创造性劳动前提下所获得的所有其它实施例, 都属于本发明保护的范围。
本发明实施例提供的无线接入认证的方法, 在通常情况下, 本方法的执 行主体是网关, 网关为在釆用不同体系结构或协议的网络之间进行互通时, 用于提供协议转换、 路由选择、 数据交换等网络兼容功能的设施。 在有设备 通过网关传输数据时, 网关一般可以记录通过它发送数据的设备的特征字, 以备后用, 该设备的特征字是设备的 "身份证" , 如设备的物理地址(Media Access Control, 简称 MAC )等。 在本实施例中的网关设备可以具体为 WIFI 设备或者无线路由器等。 该方法如图 1所示, 包括:
S101 , 在判断第一用户设备的特征字未预存在网关设备中, 且第一用户 设备首次使用密钥试图接入网关设备失败后, 统计并记录该第一用户设备接 入网关设备连续失败的次数。
优选的, 该特征字可以为物理地址(MAC )或者组织唯一标识符(0UI ) 或者出厂设备序列号( SN )或者 IP地址,在本实施例中以 MAC为例进行说明。
具体的, 如图 2所示, 当第一用户设备首次与网关设备尝试连接时, 首先 将第一用户设备的 MAC与网关设备中 MAC清单或 MAC列表里预存的 MAC进 行匹配, 以判断第一用户设备的 MAC是否为预存在网关设备中的 MAC, 若判 断第一用户设备的 MAC是预存在网关设备中的 MAC, 则通过原密钥对第一用 户设备进行 WIFI接入认证, 该原密钥为生成新密钥之前, 用户设备与网关设 备进行 WIFI接入认证时使用的密钥; 若判断出第一用户设备的 MAC不是预存 在网关设备中的 MAC, 再判断第一用户设备与网关设备连接是否成功, 若判 断不成功, 则统计并记录第一用户设备接入网关设备连续失败的次数。
示例性的, 在本实施例中原密钥为 123456, 用户设备曱试图与网关设备 连接时, 在判断出用户设备曱为 MAC未预存在网关设备的用户设备, 并且用 户设备曱与网关设备首次使用非 123456的密码连接失败后, 统计并记录用户 设备曱接入网关设备连续失败的次数。
5102、 若该次数大于预设的第一阔值, 则生成新密钥, 并通过该新密钥 对特征字未预存在网关设备的用户设备进行 WIFI接入认证。
示例性的, 以上述步骤中统计出用户设备曱接入网关设备连续失败 10次 为例进行说明, 预设的第一阔值为 8次, 用户设备曱连续失败的次数大于预设 的第一阔值 8之后, 则生成新密钥 546213, 在生成新密钥后, MAC未预存在 网关设备的用户设备乙在用户设备曱之后也连接网关设备, 则通过生成的新 密钥 546213对用户设备乙进行 WIFI接入认证, 这样一来, 如果有非法用户设 备试图破解密钥与连接网关设备连接时, 网关会自动更改密钥, 由于非法用 户设备难以得知新密钥, 因此有效防止了密钥被破解。
本发明实施例提供的无线接入认证的方法, 在判断特征字未预存在网关 设备中的用户设备与网关设备连接失败的次数大于预设的第一阔值后, 生成 新密钥, 并通过该新密钥对特征字未预存在网关设备的用户设备进行 WIFI接 入认证, 这样一来, 以动态生成新密钥的方式, 防止了密钥被破解。
需要说明的是, 若判断试图接入网关设备的用户设备的 MAC预存在网关 设备中, 则在该设备得到新密钥后, 还可以通过新密钥对该 MAC预存在网关 设备的用户设备进行 WIFI接入认证。
更进一步的, 在生成新密钥后, 如图 3所示, 该方法还包括:
5103、 通过无线端口接收来自特征字预存在网关设备并且成功认证到 WIFI接入点的用户设备的新密钥查看消息。
5104、 发送该新密钥至该用户设备。
示例性的, 以上步骤中用户设备曱为例进行说明, MAC预存在网关设备 中的用户设备丙通过原密钥与网关设备建立无线连接后, 用户设备曱试图连 接该网关设备, 由于不知道新密钥 546213所以是不能通过无线接入到该网关 设备上, 但是, 用户设备丙可以向该网关设备发送一个查看新密钥的消息, 待该网关设备通过无线端口接收来自用户设备丙的查看新密钥消息后, 将该 新密钥 546213又通过无线方式发送给用户设备丙, 用户设备丙的用户再将新 密钥告诉用户设备曱的用户。 这样, 用户设备曱通过用户设备丙就可以得知 新密钥并无线连接到该网关设备上了, 这样一来, 既保证了 MAC未预存在网 关设备的用户设备正常使用该网关设备, 又动态生成了新密钥, 防止了密钥 被破解。
作为本发明另一实施方法, 在生成新密钥后, 如图 4所示, 还可以包括: S105、 通过物理端口接收用户设备的新密钥查看消息。
S106、 发送该新密钥至该用户设备。
示例性的, 上一用户设备曱还可以直接连接到网关设备的物理端口上, 向网关设备发送查看新密钥消息, 待该网关设备接收到物理端口发送的查看 新密钥消息后, 通过物理端口发送新密钥 546213给用户设备曱, 这样用户设 备曱在获得新密钥后就可以又通过无线连接到网关设备上了, 同样地, 用户 设备丙不仅可以通过无线查看新密钥 546213, 还可以通过接入到网关设备的 物理端口上进行查看, 这样一来, 也保证了 MAC未预存在网关设备的用户设 备正常使用该网关设备。
优选的, 待特征字预存在网关设备的用户设备全部使用了新密钥 546213 后, 还可以将原密钥 123456设置为无效, 这样一来, 更有效的防止了密钥被 破解。 使用了新密钥后, 允许最初使用出厂密钥与网关设备完成认证连接的用户设 备使用出厂密钥与网关设备进行认证连接, 而其他原密钥设置为无效, 这样 一来, 有效的防止了密钥被破解的同时, 还保证了用户正常使用网关设备。
优选的, 在 S 101中统计并记录所述第一用户设备接入网关设备连续失败 的次数, 还可以为: 统计并记录在预设的第一时间门限内所述第一用户设备 接入网关设备连续失败的次数。
示例性的, 预设该第一时间门限为 1分钟, 可以统计并记录用户设备曱在 1分钟内与网关设备连接的次数, 如果该次数大于预设的第一阔值, 则生成新 密钥, 这样, 更有效的判断了是否需要更改密钥, 从而进一步的防止了密钥 被破解。
本发明实施例提供的无线接入认证的装置 50, 如图 5所示, 包括, 判断单元 501 , 用于判断第一用户设备的特征字是否预存在网关设备中, 以及第一用户设备首次使用密钥试图接入网关设备是否成功。
优选的, 该特征字可以为物理地址(MAC )或者组织唯一标识符(OUI ) 或者出厂设备序列号( SN )或者 IP地址,在本实施例中以 MAC为例进行说明。
示例性的, 在本实施例中, 当用户设备曱首次试图与网关设备连接, 判 断单元 501判断该用户设备曱是否是 MAC预存在网关设备的用户设备,以及判 断该用户设备曱与网关设备首次连接是否失败。
统计记录单元 502 ,统计并记录该第一用户设备接入网关设备连续失败的 次数。
示例性的, 原密钥为 123456, 当判断单元 501判断用户设备曱为 MAC未 预存在网关设备的用户设备, 并且判断该用户设备曱首次连接失败后, 统计 并记录用户设备曱试图接入网关设备连续失败的次数。
密钥生成单元 503, 用于在该次数大于预设的第一阔值后, 生成新密钥。 示例性的,若统计记录单元 502中统计出用户设备曱接入网关设备连续失 败 10次, 预设的第一阔值为 8次, 这样, 用户设备曱连续失败的次数大于预设 的第一阔值, 则生成新密钥 546213。
认证单元 504,用于通过该新密钥对特征字未预存在网关设备的用户设备 进行 WIFI接入认证。
示例性的,在密钥生成单元 503生成新密钥后, MAC未预存在网关设备的 用户设备乙在用户设备曱之后也连接网关设备, 则通过生成的新密钥 546213 对用户设备乙进行 WIFI接入认证, 这样一来, 如果有非法用户设备试图破解 密钥与连接网关设备连接时, 网关会自动更改密钥, 以防止密钥被破解。 本发明实施例提供的无线接入认证的装置, 在判断特征字未预存在网关 设备中的用户设备与网关设备连接失败的次数大于预设的第一阔值后, 生成 新密钥, 并通过该新密钥对特征字未预存在网关设备的用户设备进行 WIFI的 接入认证, 这样一来, 以动态生成新密钥的方式, 防止了密钥被破解。
其中, 优选的, 认证单元 504, 还用于在判断单元 501判断试图接入网关 设备的用户设备的特征字预存在网关设备中后, 通过新密钥对该特征字预存 在网关设备的用户设备进行 WIFI接入认证。
示例性的, MAC预存在网关设备的用户设备丙试图连接到网关设备上, 则通过原密钥 123456对该用户设备丙进行 WIFI认证接入, 当然用户设备丙也 可以在得到新密钥后, 使用新密钥 546213与网关设备接入。
进一步的, 为了保证了特征字未预存在网关设备的用户设备正常使用该 网关设备, 如图 6所示, 该装置 50还包括:
接收单元 505 ,用于通过无线端口接收来自特征字预存在网关设备并且成 功认证到 WIFI接入点的用户设备的新密钥查看消息。
发送模块 506, 用于发送该新密钥至该用户设备。
示例性的, 当上述 MAC预存在网关设备中的用户设备丙与网关设备通过 无线连接后, 的用户设备曱试图连接该网关设备, 由于不知道新密钥 546213 所以是不能通过无线接入到该网关设备上, 但是, 用户设备丙可以向该网关 设备发送一个查看新密钥的消息,待该接收单元 505通过无线端口接收来自用 户设备丙的查看新密钥消息后, 发送单元 506将该新密钥 546213又通过无线 方式发送给用户设备丙, 这样, 用户设备曱可以通过用户设备丙得知新密钥 后, 就可以通过无线连接到该网关设备上了, 这样一来, 既保证了 MAC未预 存在网关设备的用户设备正常使用该网关设备, 又动态生成了新密钥, 防止 了密钥被破解。
更进一步的, 为了保证特征字未预存在网关设备的用户设备正常使用该 网关设备, 该装置 50中, 接收单元 505 , 还用于通过物理端口接收用户设备的新密钥查看消息。 发送单元 506, 还用于发送所述新密钥至所述用户设备。
示例性的, 上一用户设备曱还可以直接连接到网关设备的物理端口上, 向网关设备发送查看新密钥消息 ,待该接收单元 505接收到物理端口发送的查 看新密钥消息后, 发送单元 506通过物理端口发送新密钥 546213给用户设备 曱, 这样用户设备曱在获得新密钥后就可以又通过无线连接到网关设备上了, 同样地, 用户设备丙不仅可以通过无线查看新密钥 546213, 还可以通过接入 到网关设备的物理端口上进行查看, 这样一来, 也保证了 MAC未预存在网关 设备的用户设备正常使用该网关设备。
优选的, 待特征字预存在网关设备的用户设备全部使用了新密钥 546213 后, 还可以将原密钥 123456设置为无效, 这样一来, 更有效的防止了密钥被 破解。
优选的,为了更有效的判断是否需要更改密钥,统计记录单元 502还用于, 统计并记录在预设的第一时间门限内所述第一用户设备接入网关设备连续失 败的次数。
示例性的, 预设该第一时间门限为 1分钟, 统计记录单元 502统计并记录 的用户设备曱在 1分钟内与网关设备连接的次数, 如果该次数大于预设的第一 阔值, 则生成新密钥, 这样, 更有效的判断了是否需要更改密钥, 从而进一 步的防止了密钥被破解。
本领域普通技术人员可以理解实现上述实施例装置中的全部或部分流 程, 是可以通过计算机程序来指令相关的硬件来完成, 所述的程序可存储于 一计算机可读取存储介质中, 该程序在执行时, 可包括如上述各装置的实施 例的流程。其中,所述的存储介质可为磁碟、光盘、只读存储记忆体( Read-Only Memory, ROM )或随机存储记忆体( Random Access Memory, RAM )等。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不局限 于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易 想到的变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本发明的保 护范围应该以权利要求的保护范围为准。

Claims

权利要求书
1、 一种无线接入认证的方法, 其特征在于, 包括:
在判断第一用户设备的特征字未预存在网关设备中, 且所述第一用户设备 首次使用密钥试图接入网关设备失败后, 统计并记录所述第一用户设备接入网 关设备连续失败的次数;
若所述次数大于预设的第一阔值, 则生成新密钥, 并通过所述新密钥对特 征字未预存在网关设备的用户设备进行 WIFI接入认证。
2、 根据权利要求 1所述的无线接入认证的方法, 其特征在于, 还包括: 若判断试图接入网关设备的用户设备的特征字预存在网关设备中, 则通过 原密钥或者所述新密钥对所述特征字预存在网关设备的用户设备进行 WIFI接入 认证。
3、 根据权利要求 1所述的无线接入认证的方法, 其特征在于, 在所述生成 新密钥后, 还包括:
通过无线端口接收来自特征字预存在网关设备并且成功认证到 WIFI接入点 的用户设备的新密钥查看消息;
发送所述新密钥至所述用户设备。
4、 根据权利要求 1所述的无线接入认证的方法, 其特征在于, 在所述生成 新密钥后, 还包括:
通过物理端口接收用户设备的新密钥查看消息;
发送所述新密钥至所述用户设备。
5、 根据权利要求 1所述的无线接入认证的方法, 其特征在于, 统计并记录 所述第一用户设备接入网关设备连续失败的次数, 包括,
统计并记录在预设的第一时间门限内所述第一用户设备接入网关设备连续 失败的次数。
6、 根据权利要求 1 ~5任意所述的无线接入认证的方法, 其特征在于, 所述 特征字为物理地址(MAC )或者组织唯一标识符 (OUI )或者出厂设备序列号 ( SN )或者 IP地址。
7、 一种无线接入认证的装置, 其特征在于, 包括:
判断单元, 用于判断第一用户设备的特征字是否预存在网关设备中, 以及 所述第一用户设备首次使用密钥试图接入网关设备是否成功;
统计记录单元, 统计并记录所述第一用户设备接入网关设备连续失败的次 数;
密钥生成单元, 用于在所述次数大于预设的第一阔值后, 生成新密钥; 认证单元, 用于通过所述新密钥对特征字未预存在网关设备的用户设备进 行 WIFI接入认证。
8、 根据权利要求 7所述的无线接入认证的装置, 其特征在于,
认证单元, 还用于在判断单元判断试图接入网关设备的用户设备的特征字 预存在所述网关设备中后, 通过所述新密钥对所述特征字预存在网关设备的用 户设备进行 Wl F I接入认证。
9、 根据权利要求 7所述的无线接入认证的装置, 其特征在于, 还包括: 接收单元, 用于通过无线端口接收来自特征字预存在网关设备并且成功认 证到 Wl F I接入点的用户设备的新密钥查看消息;
发送单元, 用于发送所述新密钥至所述用户设备。
10、 根据权利要求 9所述的无线接入认证的装置, 其特征在于,
所述接收单元, 还用于通过物理端口接收用户设备的新密钥查看消息; 所述发送单元, 还用于发送所述新密钥至所述用户设备。
1 1、 根据权利要求 7所述的无线接入认证的装置, 其特征在于,
所述统计记录单元具体用于, 统计并记录在预设的第一时间门限内所述第 一用户设备接入网关设备连续失败的次数。
PCT/CN2013/070886 2012-02-08 2013-01-23 一种无线接入认证的方法及装置 WO2013117131A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201210027511.3A CN103249040B (zh) 2012-02-08 2012-02-08 一种无线接入认证的方法及装置
CN201210027511.3 2012-02-08

Publications (1)

Publication Number Publication Date
WO2013117131A1 true WO2013117131A1 (zh) 2013-08-15

Family

ID=48928206

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/070886 WO2013117131A1 (zh) 2012-02-08 2013-01-23 一种无线接入认证的方法及装置

Country Status (2)

Country Link
CN (1) CN103249040B (zh)
WO (1) WO2013117131A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104093148A (zh) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 一种基于蓝牙的wifi自动连接授权的方法
US9913315B2 (en) 2014-10-20 2018-03-06 Xiaomi Inc. Method and device for connection management
CN104333863B (zh) * 2014-10-20 2018-11-30 小米科技有限责任公司 连接管理方法及装置、电子设备
CN106341815B (zh) * 2015-07-17 2020-11-27 中兴通讯股份有限公司 一种无线连接方法、终端及ap
CN106454835A (zh) * 2015-08-04 2017-02-22 中兴通讯股份有限公司 一种无线接入方法及装置
CN106686590A (zh) * 2015-11-10 2017-05-17 中兴通讯股份有限公司 管制终端识别及管理方法、装置、无线接入点设备
CN105516093B (zh) * 2015-11-30 2018-10-12 上海斐讯数据通信技术有限公司 一种防蹭网的方法及路由器
CN105451225B (zh) * 2016-01-21 2020-02-21 上海斐讯数据通信技术有限公司 一种接入认证方法及接入认证设备
CN105610866A (zh) * 2016-02-18 2016-05-25 四川长虹电器股份有限公司 实现智能设备自动接入家庭无线局域网系统及方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068255A (zh) * 2007-06-14 2007-11-07 杭州华三通信技术有限公司 安全外壳协议应用中的用户认证方法及装置
CN101621800A (zh) * 2009-08-13 2010-01-06 北京星谷科技有限公司 无线终端与无线路由器之间的认证信息交换方法
CN101662771A (zh) * 2009-10-14 2010-03-03 中国电信股份有限公司 无线接入短信自动认证的实现方法和系统
CN101867912A (zh) * 2010-06-07 2010-10-20 华为终端有限公司 一种接入网络的认证方法及终端
CN102204307A (zh) * 2011-06-15 2011-09-28 华为技术有限公司 基于mac地址的wlan认证方法和装置
CN202014304U (zh) * 2011-04-22 2011-10-19 深圳市隆宇世纪科技有限公司 一种基于密码鉴权的手机隐私保护系统

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101378582B (zh) * 2007-08-29 2012-04-11 中国移动通信集团公司 用户识别模块、鉴权中心、鉴权方法及系统
CN100589131C (zh) * 2008-05-06 2010-02-10 北京握奇数据系统有限公司 一种含Mifare功能模块的智能卡及其数据更新方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101068255A (zh) * 2007-06-14 2007-11-07 杭州华三通信技术有限公司 安全外壳协议应用中的用户认证方法及装置
CN101621800A (zh) * 2009-08-13 2010-01-06 北京星谷科技有限公司 无线终端与无线路由器之间的认证信息交换方法
CN101662771A (zh) * 2009-10-14 2010-03-03 中国电信股份有限公司 无线接入短信自动认证的实现方法和系统
CN101867912A (zh) * 2010-06-07 2010-10-20 华为终端有限公司 一种接入网络的认证方法及终端
CN202014304U (zh) * 2011-04-22 2011-10-19 深圳市隆宇世纪科技有限公司 一种基于密码鉴权的手机隐私保护系统
CN102204307A (zh) * 2011-06-15 2011-09-28 华为技术有限公司 基于mac地址的wlan认证方法和装置

Also Published As

Publication number Publication date
CN103249040B (zh) 2017-04-26
CN103249040A (zh) 2013-08-14

Similar Documents

Publication Publication Date Title
WO2013117131A1 (zh) 一种无线接入认证的方法及装置
US10897709B2 (en) Wireless network authorization using a trusted authenticator
JP5629788B2 (ja) アクセス端末識別情報の認証の円滑化
JP6599341B2 (ja) 動的ネットワークアクセス管理のための方法、デバイスおよびシステム
US8392712B1 (en) System and method for provisioning a unique device credential
JP6386069B2 (ja) 接続管理方法、装置、電子設備、プログラム、及び記録媒体
US7672457B2 (en) Computer-readable recording medium recording a wireless communication authentication program
US8555344B1 (en) Methods and systems for fallback modes of operation within wireless computer networks
WO2017185913A1 (zh) 一种无线局域网认证机制的改进方法
KR20060049882A (ko) 무선 근거리 네트워크 관계용 디바이스 및 방법과, 이에대응하는 제품
CN1973495A (zh) 无线局域网关联的设备和方法及相应产品
CN104125567B (zh) 家庭基站接入网络侧的鉴权方法、装置及家庭基站
US20170289159A1 (en) Security support for free wi-fi and sponsored connectivity for paid wi-fi
US10924480B2 (en) Extended trust for onboarding
WO2015055807A1 (en) Method and network node device for controlling the run of technology specific push-button configuration sessions within a heterogeneous or homogeneous wireless network and heterogeneous or homogeneous wireless network
WO2013185709A1 (zh) 一种呼叫认证方法、设备和系统
JP4824100B2 (ja) 機器の種類に基づいたネットワーク管理方法、ネットワーク管理装置、プログラム
CN103780389A (zh) 基于端口认证的方法及网络设备
WO2015196679A1 (zh) 无线接入的鉴权方法及装置
WO2013152740A1 (zh) 用户设备的认证方法、装置及系统
CN115022850A (zh) 一种d2d通信的认证方法、装置、系统、电子设备及介质
CN109460647B (zh) 一种多设备安全登录的方法
CN106537962B (zh) 无线网络配置、接入和访问方法、装置及设备
JP7312279B2 (ja) モバイルネットワークアクセスシステム、方法、記憶媒体及び電子機器
KR102558821B1 (ko) 사용자 및 디바이스 통합 인증 시스템 및 그 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13746395

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 13746395

Country of ref document: EP

Kind code of ref document: A1