WO2015149303A1 - 一种接入网络的方法及路由器 - Google Patents

一种接入网络的方法及路由器 Download PDF

Info

Publication number
WO2015149303A1
WO2015149303A1 PCT/CN2014/074638 CN2014074638W WO2015149303A1 WO 2015149303 A1 WO2015149303 A1 WO 2015149303A1 CN 2014074638 W CN2014074638 W CN 2014074638W WO 2015149303 A1 WO2015149303 A1 WO 2015149303A1
Authority
WO
WIPO (PCT)
Prior art keywords
list
access
access password
device identification
terminal device
Prior art date
Application number
PCT/CN2014/074638
Other languages
English (en)
French (fr)
Inventor
佟爽
姚超群
朱永红
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to PCT/CN2014/074638 priority Critical patent/WO2015149303A1/zh
Priority to EP14888053.7A priority patent/EP3113419B1/en
Priority to JP2016560357A priority patent/JP6424235B2/ja
Priority to US15/301,292 priority patent/US10178091B2/en
Priority to CN201480003336.1A priority patent/CN104870068B/zh
Publication of WO2015149303A1 publication Critical patent/WO2015149303A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • H04L63/0846Network architectures or network communication protocols for network security for authentication of entities using passwords using time-dependent-passwords, e.g. periodically changing passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/64Hybrid switching systems
    • H04L12/6418Hybrid transport
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a method and a router for accessing a network. Background technique
  • Most routers generally protect the network by "encrypting”. That is: all terminal devices need to input the access password when accessing the network through the router. If the access password input by the user matches the preset preset access password, the terminal device is allowed to access the network. However, in the current routers, a single preset access password is set to protect the network, which results in lower security of the router. Summary of the invention
  • Embodiments of the present invention provide a method and a router for accessing a network, which are used to improve the security of a router.
  • a first aspect of the embodiments of the present invention provides an apparatus for accessing a network, including:
  • An obtaining module configured to obtain an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device;
  • a matching module configured to match an access password obtained by the acquiring module with each preset access password in an access password list that stores at least two preset access passwords;
  • a determining module configured to determine, when the matching module matches the access password and a preset access password in the access password list, whether the device identifier is bound to the preset access password
  • the device identifier list is saved with at least one device identifier; and when it is determined that the preset access password is bound to the device identifier list, it is determined whether the device identifier of the terminal device exists in the device identifier list;
  • a processing module configured to allow the terminal device to access the network when the determining module determines that the device identifier exists in the device identification list.
  • the processing module is configured to: when the determining module determines the preset access password unbound device identifier list, permit the terminal device Access to the network.
  • the acquiring module is further configured to acquire the terminal when the terminal device accesses the network by using a preset access password of the unbound device identifier list.
  • the device identifier of the device is saved to the temporary device identifier list, where the temporary device identifier list is used for the temporary storage device identifier;
  • the determining module is further configured to determine whether the total number of device identifiers in the temporary device identifier list reaches a predetermined threshold
  • the processing module is further configured to: add, when the determining module determines that the total number of device identifiers in the temporary device identifier list reaches a predetermined threshold, add some or all device identifiers in the temporary device identifier list to the binding The device identifier list is added to the restricted access list, and the terminal device corresponding to the device identifier in the restricted access list is denied access to the network.
  • the processing module is further configured to: when the device identifier does not exist in the device identifier list, reject the terminal device from accessing the network.
  • the processing module is further configured to periodically modify a preset access password of the unbound device identifier list.
  • a second aspect of the embodiment of the present invention provides a router, including:
  • One or more processors are One or more processors;
  • the one or more programs are stored in the memory, and the one or more programs are executed by the one or more processors; the one or more programs are Configure to perform the following steps: Obtaining an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device;
  • the access password is matched with each preset access password in the access password list, where at least two preset access passwords are stored in the access password list;
  • the access password matches a preset access password in the access password list, it is determined whether the preset access password is bound to the device identifier list, and the device identifier list stores at least one device identifier; When the device identifier list is bound, it is determined whether the device identifier of the terminal device exists in the device identifier list;
  • the terminal device When it is determined that the device identifier exists in the device identification list, the terminal device is allowed to access the network.
  • the one or more programs are further executed:
  • the terminal device When the preset access password is not bound to the device identification list, the terminal device is allowed to access the network.
  • the one or more programs are further configured to perform the steps:
  • the device identifier of the terminal device is obtained, and the obtained device identifier is saved in the temporary device identifier list, and the Whether the total number of device identifiers in the temporary device identifier list reaches a predetermined threshold value, and when the total number of device identifiers reaches a predetermined threshold value, add some or all device identifiers in the temporary device identifier list to the bound device identifier list. Or, added to the restricted access list, where the terminal device corresponding to the device identifier in the restricted access list is denied access to the network, and the temporary device identifier list is used for the temporary storage device identifier.
  • the one or more programs are further configured to perform the steps:
  • the terminal device is denied access to the network.
  • the one or more programs are further configured to perform the steps:
  • a third aspect of the embodiments of the present invention provides a method for accessing a network, including:
  • the terminal device Obtaining an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device;
  • the access password is matched with a preset access password in the access password list, it is determined whether the preset access password is bound to the device identifier list, and the device identifier list stores at least one device.
  • the preset access password is bound to the device identifier list, determining whether the device identifier of the terminal device exists in the device identifier list;
  • the terminal device When it is determined that the device identifier exists in the device identification list, the terminal device is allowed to access the network.
  • the method further includes:
  • the terminal device When the preset access password is not bound to the device identifier list, the terminal device is allowed to access the network.
  • the terminal device is allowed to access the network. Also includes:
  • the method further includes:
  • the terminal device is denied access to the network.
  • the method further includes:
  • An embodiment of the present invention provides an apparatus for accessing a network, where the apparatus includes: an obtaining module, configured to acquire an access request message sent by a terminal device; and a matching module, configured to save the access password and save at least two pre- Setting each preset access password in the access password list of the access password to be matched; determining, when the matching module matches the access password and matching a preset access password in the access password list, determining Whether the preset access password is bound to the device identifier list of the device identifier; and when it is determined that the preset access password is bound to the device identifier list, it is determined whether the device identifier of the terminal device exists in the device identifier list; The method is configured to allow the terminal device to access the network when the determining module determines that the device identifier exists in the device identifier list.
  • the device can be configured to bind the device password of the common terminal device of the user to the simple preset access password in the access password by setting the access password list.
  • the terminal device that is commonly used by the user can access the network easily and conveniently; the more complicated preset access password in the access password list is used to restrict the terminal device that is not commonly used by the user to access the network, thereby improving the security performance of the router.
  • An embodiment of the present invention provides a method for accessing a network, where the method includes: acquiring an access request message sent by a terminal device; and selecting an access password and an access password list that stores at least two preset access passwords Each preset access password is matched; if the access password matches a preset access password in the access password list, it is determined whether the preset access password is bound to the device identification list; When the device identifier list is bound, it is determined whether the device identifier of the terminal device exists in the bound device identifier list. When it is determined that the device identifier exists in the device identifier list, the terminal device is allowed to access the network.
  • multiple preset access passwords can be used to control access of different terminal devices in the router, that is, the user's common terminal device can be accessed through a relatively simple preset access password.
  • the terminal device that is not used by the user is accessed through a more complex preset access password. This not only improves the security of the router, but also enables the terminal device commonly used by the user to access the network simply and conveniently, thereby improving the user experience.
  • FIG. 1 is a schematic structural diagram of an apparatus for accessing a network according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for accessing a network according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a router according to an embodiment of the present invention. detailed description
  • first preset access password and the second preset access password may be used in the embodiment of the present invention to describe the preset access password set in the router, the preset access password should not be limited. These terms. These terms are only used to distinguish multiple preset access codes from each other.
  • the first preset access password may also be referred to as a second preset access password without departing from the scope of the embodiments of the present invention.
  • the second preset access password may also be referred to as a first A default access password.
  • word "if” as used herein may be interpreted as "when” or "when" or “in response to a determination” or "in response to" Detection”.
  • FIG. 1 is a schematic structural diagram of an apparatus for accessing a network according to an embodiment of the present invention, where the device includes :
  • the obtaining module 101 is configured to obtain an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device;
  • the matching module 102 is configured to match the access password acquired by the obtaining module 101 with each preset access password in the access password list, where the access password list stores at least two preset access passwords;
  • the determining module 103 is configured to determine, when the matching module 102 matches the access password, with a preset access password in the access password list, whether the preset access password is bound to the device identifier list, and the device identifier list is At least one device identifier is saved in the middle;
  • the determining module 103 is further configured to: determine, when the preset access password is bound to the device identifier list, whether the device identifier of the terminal device exists in the device identifier list;
  • the processing module 104 is configured to allow the terminal device to access the network when the determining module 103 determines that the device identifier exists in the device identifier list.
  • an access password is set in the router.
  • the first preset access password and the second preset access password may be set in the setting interface of the router. After the first preset access password is set, the first preset password may be bound to the device identifier list in the router setting interface, and the device identifier of the terminal device commonly used by the user may be saved in the device identifier list.
  • the device identifier of the terminal device may be the hardware address of the terminal device (English: Media Access Control abbreviation: MAC) or the identifier of the terminal device, and the device identifier of the terminal device is not specifically limited in the embodiment of the present invention, as long as it is
  • the device ID that uniquely identifies the terminal device can be saved to the device ID list.
  • Table 1 shows the default access password bound to the MAC address of the terminal device:
  • the preset access password bound to the device identification list is set to a relatively simple password.
  • the first preset access password in Table 1 is "123", which is convenient for users to remember and input. Obviously, using the first preset access password directly causes the router to be less secure.
  • the first preset access password is bound with a device identifier list
  • the router receives the When the access password is matched by the default access password, the router determines whether the device identifier of the terminal device exists in the device identifier list bound to the first preset access password, and if the device identifier is not in the first preset access In the device ID list of the password binding, the router will reject the terminal device access; when the device identifier is in the device identifier list bound by the first preset access password, the router allows the terminal device to access the router.
  • the terminal device that is not commonly used by the user is managed by using the second preset access password, and the second preset access password is set to enable the terminal device that is not commonly used by the user to access the network, so the second preset access is performed.
  • the password is set to a more complicated password.
  • "Ia2b3c4d5e" set in Table 1 is the second preset access password.
  • the second preset access password is a password for the terminal device that is not commonly used by the user to access the network. Therefore, the second preset access password does not need to be bound to the device identifier list (as shown in Table 1), as long as the router receives the terminal.
  • the router will allow the terminal device to access.
  • the processing module 104 in the router may perform the following adjustment on the second preset access password in Table 1:
  • the processing module 104 in the router saves the second preset access password modified by the user in real time, for example, changing the second preset access password in Table 1 from "Ia2b3c4d5e," to
  • the processing module 104 in the router periodically modifies the second preset access password, that is, the processing module 104 in the router randomly generates a relatively complex access password, and then, as long as the specified time is reached, then The original second preset access password is replaced by the randomly generated access password.
  • the newly set preset access password can be viewed at any time in the router setting interface.
  • the processing module 104 can replace the alternate preset access password with the original second preset access password, for example, it will be set in the router.
  • the alternate preset access password "mlm2m3m4m5m6" or “ ⁇ ” replaces "Ia2b3c4d5e,” in Table 1.
  • these alternate preset access passwords may also be a periodic replacement of the second preset access password.
  • the replacement of the second preset access password does not change the first preset access password, thereby ensuring the second preset access.
  • the security of the password also enables the terminal device commonly used by the user to access the network through a relatively simple first preset access password.
  • the obtaining module 101 in the router first acquires The access request message sent by the terminal saves the access password and the device identifier of the terminal device in the access request message.
  • the matching module 102 in the router will retrieve the access password list, and match the access password in the access request message with each preset access password in the access password list. If the matching module 102 matches the result, the terminal is the terminal. When the access password sent by the device does not match each preset access password in the access password list, the router denies the terminal device access.
  • the determining module 103 determines whether the preset access password matching the access password is tied. A list of device IDs is fixed. If the preset access password is not bound to the device identifier list, the processing module 103 allows the terminal device to access the network, for example, sent by the terminal device.
  • the access request message includes the second preset access password "Ia2b3c4d5e" in Table 1, and the router will allow the terminal device to access the network.
  • the router obtains the device identifier of the terminal device by using the access request message sent by the acquiring module 101, that is, the MAC address of the terminal device.
  • the address module then the determining module 103 in the router determines whether the device identifier of the terminal device exists in the device identifier list. If the device identifier of the terminal device does not exist in the device identifier list, the processing module 104 denies the terminal device from accessing the network. If present, the processing module 104 allows the terminal device to access the network.
  • the access password sent by the terminal device is the first preset access password "123" in Table 1.
  • the router obtains the MAC address of the terminal device through the obtaining module 101, and the determining module 103 in the router also The device identifier list bound to the first preset access password "123" is retrieved. If the determining module 103 determines that the MAC address of the terminal device and the MAC1 address in the device identifier list are the same MAC address, then the router The processing module 104 allows the terminal device to access the network; if the MAC address of the terminal device does not match any of the MAC addresses in the device identification list, the processing module 104 will reject the terminal device from accessing the network.
  • the simple preset access password is bound to the device identifier of the user's common terminal device, so that the user terminal device can easily and conveniently access the network;
  • the complex preset access password restricts the terminal devices that are not commonly used by users to access the network, thereby effectively ensuring the security of the network, that is, improving the security of the router while ensuring the user experience.
  • the password can be replaced periodically, and it does not affect the default access password of the user's common terminal device. This not only ensures the security of the router to the network, but also avoids the replacement of the access password in the router. The user is given a cumbersome operation of entering a password, which improves the user experience.
  • the acquiring module 101 in the router acquires the device identifier of the terminal device, and saves the obtained device identifier to the temporary device identifier.
  • Table 2 shows the list, as shown in Table 2:
  • the terminal device accesses the network through the second preset access password
  • the terminal device is a terminal device that is not commonly used by the user
  • the obtaining module 101 in the router obtains the second preset access password.
  • the device identifier of the terminal device that accesses the network and saves the device identifier obtained by the terminal device to the temporary device identifier list, such as MAC4 and MAC5 in Table 2.
  • the determining module 103 in the router periodically determines whether the total number of device identifiers stored in the temporary identification list reaches a predetermined threshold, and the predetermined threshold may be set to a positive integer of 1, 2, 3 or the like.
  • the processing module 104 in the router processes the temporary device identification list, and there are three processing methods:
  • the first mode the processing module 104 in the router directly deletes part or all of the device identifiers in the temporary device identifier list;
  • the processing module 104 in the router transfers part or all of the device identifiers in the temporary device identification list to the device identification list bound to the first preset access password. Certainly, the terminal device corresponding to the device identifier transferred from the temporary device identifier list to the device identifier list can access the router through the first preset access password.
  • the terminal device corresponding to the device identifier in the newly created device identifier list can access the network through the bound preset access password.
  • the user can conveniently manage the terminal device commonly used by the user and the terminal device that is not commonly used by the user to access the network through the preset access password.
  • the fourth mode the processing module 104 in the router sets a restricted access list, and adds some or all device identifiers in the temporary device identifier list to the restricted access list, and the terminal corresponding to the device identifier in the restricted access list
  • the processing module 104 in the router determines that the device identifier of the terminal device exists in the restricted access list, the router will reject the terminal device from accessing the network, which may further Improve router protection for network security.
  • the device identifiers in the temporary device identifier list can be added or deleted in the device identifier list of the router, so that the terminal devices can use the simpler first preset access password.
  • Network of course, for some terminal devices that users suspect that there are security risks, they can be added to the restricted access list, which can effectively prevent other dangerous terminal devices from accessing the router, thereby improving the security of the router. protection.
  • a plurality of preset access passwords may be set in the access password list, and each preset access password may be bound to the device identifier list, and the device identifiers of the same terminal device may exist in different In the device identification list, as shown in Table 3:
  • the preset access password that is not bound to the device identifier list may correspond to a temporary device identifier list, and the temporary device identifier list has the same function as the temporary device identifier list in Table 2.
  • the preset access password bound to the device identifier list may be set to be empty, that is, as long as the device identifier list exists in the router, and the device identifier of the terminal device requesting access to the network exists. In the device identification list, if the terminal device does not send any access password, the router still allows the terminal device to access.
  • the embodiment of the present invention provides a method for accessing a network, where the method includes: acquiring an access request message sent by the terminal device, where the access request message is The access password and the device identifier of the terminal device are included; the access password is matched with each preset access password in the access password list, wherein at least two preset accesses are stored in the access password list.
  • the access password matches a preset access password in the access password list, it is determined whether the preset access password is bound to the device identifier list; when the preset access password is bound to the device identifier list, Determining whether the device identifier of the terminal device exists in the device identifier list; when the device identifier exists in the device identifier list, allowing the terminal device to access the network.
  • the access password list including at least two preset access passwords may be set in the router, and the simple preset access password is bound to the device identifier of the terminal device commonly used by the user.
  • the terminal device commonly used by the user can access the network easily and conveniently; the terminal device that is not commonly used by the user is restricted from accessing the network through a relatively complicated preset access password, thereby effectively ensuring network security.
  • an access password is set in the router.
  • the first preset access password and the second preset access password may be set in the setting interface of the router.
  • the first preset password may be bound to the device identifier list in the router setting interface, and the device identifier of the terminal device commonly used by the user may be saved in the device identifier list.
  • the device identifier at the location may be the hardware address of the terminal device (English: Media Access Control abbreviation: MAC) or the name of the terminal device and In the embodiment of the present invention, the device identifier of the terminal device is not specifically limited.
  • the device identifier that can uniquely identify the terminal device can be saved in the device identifier list. Table 4 shows the MAC address of the terminal device bound to the default access password:
  • the default access password bound to the device identification list is set to a simple password.
  • the first preset access password in Table 4 is "123", which is convenient for users to remember and input. Obviously, only setting the first preset access password may result in lower security of the router.
  • the first preset access password is bound with a device identifier list
  • the router receives the When the access password is matched by the default access password, the router determines whether the device identifier of the terminal device exists in the device identifier list bound to the first preset access password, and if the device identifier is not in the first preset access In the device ID list of the password binding, the router will reject the terminal device access; if the device identifier is in the device identifier list bound to the first preset access password, the router allows the terminal device to access the router.
  • the terminal device that is not commonly used by the user is managed by using the second preset access password.
  • the second preset access password is set to enable the terminal device that is not commonly used by the user to access the network.
  • the access password is set to a more complex password, such as "Ia2b3c4d5e" in Table 4, which is the second default access password.
  • the second preset access password is used to allow non-users to access the network.
  • the password so the second preset access password does not need to be bound to the device identifier list (as shown in Table 4), as long as the router receives the second preset access password in the access request message sent by the terminal device.
  • the router will allow access to the terminal device. Further, in order to ensure the security of the network, the router can adjust the second preset access password in Table 4 as follows:
  • the router will save the second preset access password modified by the user in real time.
  • the second preset access password in Table 4 is changed from "1 a 2b3c4d5e, replaced or modified to "abcdefgh";
  • the router periodically modifies the second preset access password, that is, as long as the specified time is reached, the router will randomly generate a more complex access password, and then replace the original with the randomly generated access password.
  • the second preset access password of course, after the second preset access password is modified, the preset access password for replacing the second preset access password can be viewed at any time through the setting interface of the router.
  • the processing module 104 can replace the alternate preset access password with the original second preset access password, for example, the standby pre-set that is set in the router. Replace the access password "mlm2m3m4m5m6" or " ⁇ " with "Ia2b3c4d5e,” in Table 1. Of course, these alternate preset access passwords may also be a periodic replacement of the second preset access password.
  • FIG. 2 is a flowchart of a method for access management of a router according to an embodiment of the present invention, where the method includes:
  • the router obtains an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device.
  • the router matches the access password with each preset access password in the access password list, where the access password list stores at least two preset access passwords, if the access password and the access password If the preset access passwords match, the process proceeds to S203; if the access password does not match any of the preset access passwords, then the process proceeds to S206;
  • the router determines whether the preset access password is bound to the device identifier list, if bound, enters S204, if not bound, proceeds to S205;
  • the router determines whether the device identifier of the terminal device exists in the device identifier list, if yes, enters S205, if not, proceeds to S206;
  • the router allows the terminal device to access the network
  • the router rejects the terminal device from accessing the network.
  • the router After receiving the access request message sent by the terminal device, the router will retrieve the access password list, and each of the access password and the access password list in the access request message sent by the terminal device The preset access password is matched. If the access password in the access request message sent by the terminal device does not match all the preset access passwords in the access password list, the router rejects the terminal device from accessing the network.
  • the router determines the preset access password in the access password list that matches the access password. Whether the device identification list is bound. If the preset access password is not bound to the device identifier list, the terminal device is allowed to access the network. For example, the access request message sent by the terminal device includes the second preset access password in the table 4, Ia2b3c4d5e. , at this time, the router will allow the terminal device to access.
  • the router If the device access list is bound to the preset access password that matches the access password, the router also obtains the device identifier in the access request message, where the device identifier can be the MAC address of the terminal device, and the router determines the device of the terminal device. Whether the identifier exists in the bound device identifier list. If it does not exist, the terminal device is denied access to the network. If yes, the terminal device is allowed to access the network. For example, the access password in the access request message sent by the terminal device is the first preset access password "123" in Table 4. At this time, the router acquires the MAC address of the terminal device, and the router also retrieves the first a preset access password "123," a bound device identification list.
  • the router If it is determined that the MAC address of the terminal device is the same as the MAC1 address in the device identification list, the router allows the terminal device to connect. If the MAC address of the terminal device does not match all the MAC addresses in the device identification list, the router will reject the terminal device access.
  • the simple preset access password is bound to the device identifier of the user's common terminal device, so that the user terminal device can easily and conveniently access the network;
  • Complex preset access passwords restrict access to the network by non-user-used terminal devices, which greatly improves router security performance while ensuring user experience.
  • it does not affect the access password of the user's common terminal equipment. This not only ensures the security of the router to the network, but also reduces the terminal commonly used by the user due to the replacement of the access password in the router.
  • the device brings a cumbersome operation of password input, which improves the user experience.
  • the router acquires the device identifier of the terminal device, and saves the obtained device identifier to the temporary device identifier list, such as a table. 5 shows:
  • the router acquires the device identifier of the terminal device that accesses the network through the second preset access password, and saves the acquired device identifier.
  • the temporary access password list such as MAC4 and MAC5 in Table 5.
  • the router periodically determines whether the total number of device identifiers stored in the temporary identifier list corresponding to the second access password reaches a predetermined threshold, and the predetermined threshold may be set to 1, 2, 3, etc. A positive integer.
  • a temporary device identification list corresponding to the second preset access password When the total number of device IDs in the device reaches a predetermined threshold, the router will process the list of temporary device IDs. There are three ways to handle this:
  • the router directly deletes some or all of the device identifiers in the temporary device identifier list;
  • the second mode The router transfers part or all of the device identifiers in the temporary device identifier list to the device identifier list bound to the first preset access password. Certainly, the terminal device corresponding to the device identifier transferred from the temporary device identifier list to the device identifier list can access the router through the first preset access password.
  • the router re-creates a device identification list, and binds the newly created device identification list to a newly set preset access password, and then transfers some or all device identifiers in the temporary device identification list to the newly created device.
  • the terminal device corresponding to the device identifier in the newly created device identifier list can access the network through the newly set preset access password, which is convenient for the user to use the preset access password for the user. The access of the terminal device and the terminal device that is not commonly used by the user is effectively managed.
  • the fourth mode is: setting a restricted access list in the router, adding part or all of the device identifiers in the temporary device identifier list to the restricted access list, and sending the pre-receptions in the terminal device corresponding to the device identifier in the restricted access list
  • the router determines that the device identifier of the terminal device exists in the restricted access list, the router will refuse to access the terminal device to the network, which can further improve the protection of the network security of the router.
  • the device identifiers in the temporary device identifier list can be added or deleted in the device identifier list of the router, so that the terminal devices can use the simpler first preset access password.
  • Network of course, for some terminal devices that users suspect that there are security risks, they can be added to the restricted access list, which can effectively prevent other dangerous terminal devices from accessing the router, thereby improving the security of the router. protection.
  • multiple preset access passwords may be set in the access password list, and each preset access password may be bound to the device identifier list, and the device identifier of the same terminal device may exist in different devices.
  • Table 6 Default access password device identification list
  • the preset access password without the binding device identifier list may correspond to a temporary device identification list, and the temporary device identification list has the same function as the temporary device identification list in Table 5 above.
  • the preset access password bound to the device identifier list may be set to be empty, that is, as long as the device identifier list exists in the router, and the device identifier of the terminal device requesting access to the network exists. In the device identification list, if the terminal device does not send any access password, the router still allows the terminal device to access the network.
  • a router is provided in the embodiment of the present invention.
  • a schematic diagram of a router in the embodiment includes: one or more Processors;
  • the one or more programs are stored in the memory, and the one or more programs are executed by the one or more processors; the one or more programs are The configuration is as follows: Obtain an access request message sent by the terminal device, where the access request message includes an access password and a device identifier of the terminal device; and the access password is matched with each preset access password in the access password list. In the access password list, at least two preset access passwords are stored; when the access password matches a preset access password in the access password list, it is determined whether the preset access password is bound.
  • the device identifier list is saved with at least one device identifier; when the preset access password is bound to the device identifier list, it is determined whether the device identifier of the terminal device exists in the device identifier list; When the list is identified, the terminal device is allowed to access the network.
  • the one or more programs are further configured to perform the steps:
  • the terminal device When the preset access password is not bound to the device identifier list, the terminal device is allowed to access the network. Further, the one or more programs are further configured to perform the steps:
  • the temporary device identifier list is used for temporarily storing the device identifier; determining whether the total number of device identifiers in the temporary device identifier list reaches a predetermined threshold; If the total number of device identifiers reaches a predetermined threshold, add some or all device identifiers in the temporary device identifier list to the bound device identifier list, or add to the restricted access list, where the device in the access list is restricted. The terminal device corresponding to the identity will be denied access to the network.
  • the one or more programs are further configured to perform the steps:
  • the terminal device is denied access to the network.
  • the one or more programs are further configured to perform the steps:
  • These computer program instructions can also be stored in a bootable computer or other programmable data processing device.
  • a computer readable memory that operates in a particular manner, causing instructions stored in the computer readable memory to produce an article of manufacture comprising instruction means implemented in one or more flows and/or block diagrams of the flowchart The function specified in the box or in multiple boxes.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.

Abstract

本发明实施例中提供了一种接入网络的方法及路由器,该装置包括:获取模块,用于获取终端设备发送的接入密码;匹配模块,用于将接入密码与保存有至少两个预设接入密码的接入密码列表中的每个预设接入密码进行匹配;判定模块,用于在接入密码与接入密码列表中的一预设接入密码匹配时,判定预设接入密码是否绑定了设备标识列表,并在预设接入密码绑定了设备标识列表时,判定终端设备的设备标识是否存在于绑定的设备标识列表中;处理模块,用于在判定出设备标识存在于设备标识列表中时,允许终端设备接入网络。这样路由器可以通过不同的预设接入密码来管理不同的接入终端设备,提升路由器安全性能。

Description

一种接入网络的方法及路由器
技术领域
本发明涉及通信技术领域, 尤其涉及一种接入网络的方法及路由器。 背景技术
随着技术的不断发展进步, 手机、 平板等智能终端日益普及, 人们对无 线网络的需求越来越迫切, 路由器作为接入网络的一项必备设备, 也逐渐走 进人们的生活。
多数路由器一般通过 "加密 "方式来保护网络安全。 即: 所有终端设备要通 过路由器接入网络时都需要输入接入密码, 若是用户输入的接入密码与预先 设定的预设接入密码匹配时, 终端设备才被允许接入网络。 但是目前路由器 中都是设置单一的预设接入密码来对网络进行保护, 这样导致路由器的安全 性较低。 发明内容
本发明实施例提供了一种接入网络的方法及路由器, 用以提高路由器的 安全性。
其具体的技术方案如下:
本发明实施例第一方面提供了一种接入网络的装置, 包括:
获取模块, 用于获取终端设备发送的接入请求消息, 所述接入请求消息 包括接入密码和所述终端设备的设备标识;
匹配模块, 用于将所述获取模块获取的接入密码与保存有至少两个预设 接入密码的接入密码列表中的每个预设接入密码进行匹配;
判定模块, 用于在所述匹配模块匹配出接入密码与所述接入密码列表中 的一个预设接入密码匹配时, 判定与所述预设接入密码是否绑定了设备标识 列表, 所述设备标识列表保存有至少一个设备标识; 并在判定出预设接入密 码绑定了设备标识列表时, 判定终端设备的设备标识是否存在于设备标识列 表中;
处理模块, 用于在所述判定模块判定出所述设备标识存在于所述设备标 识列表中时, 允许所述终端设备接入网络。
结合第一方面, 在第一种可能的实现方式中, 所述处理模块, 具体用于 在所述判定模块判定出所述预设接入密码未绑定设备标识列表时, 允许所述 终端设备接入网络。
结合第一方面, 在第二种可能的实现方式中, 所述获取模块, 还用于在 所述终端设备通过未绑定设备标识列表的预设接入密码接入网络时, 获取所 述终端设备的设备标识, 并将获取的所述设备标识保存至临时设备标识列表 中, 所述临时设备标识列表用于临时存储设备标识;
所述判定模块, 还用于判定所述临时设备标识列表中的设备标识总数是 否达到预定阔值;
所述处理模块, 还用于在所述判定模块判定出所述临时设备标识列表中 的设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或者全 部设备标识添加至绑定的所述设备标识列表中, 或添加至限制接入列表中, 其中所述限制接入列表中的设备标识对应的终端设备将被拒绝接入网络。
结合第一方面, 在第三种可能的实现方式中, 所述处理模块, 还用于在 所述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接入网络。
结合第一方面, 在第四种可能的实现方式中, 所述处理模块, 还用于周 期性的修改未绑定设备标识列表的预设接入密码。
本发明实施例第二方面提供了一种路由器, 包括:
一个或多个处理器;
存储器, 以及一个或多个程序; 所述一个或多个程序存储在所述存储器 中, 并由所述一个或多个处理器执行所述一个或多个程序; 所述一个或多个 程序被配置为执行如下步骤: 获取终端设备发送的接入请求消息, 接入请求消息包括接入密码和终端 设备的设备标识;
将接入密码与接入密码列表中的每个预设接入密码进行匹配, 其中, 接 入密码列表中保存有至少两个预设接入密码;
当接入密码与接入密码列表中的一个预设接入密码匹配时, 判定预设接 入密码是否绑定了设备标识列表, 设备标识列表保存有至少一个设备标识; 当预设接入密码绑定了设备标识列表时, 判定终端设备的设备标识是否 存在于设备标识列表中;
在判定出设备标识存在于设备标识列表中时, 允许终端设备接入网络。 结合第二方面, 在第一种可能的实现方式中, 所述一个或多个程序还执 行:
当所述预设接入密码未绑定设备标识列表时, 允许所述终端设备接入网 络。
结合第二方面, 在第二种可能的实现方式中, 所述一个或多个程序还被 配置为执行步骤:
在所述终端设备通过未绑定设备标识列表的预设接入密码接入网络时, 获取所述终端设备的设备标识, 并将获取的所述设备标识保存至临时设备标 识列表中, 判定所述临时设备标识列表中的设备标识总数是否达到预定阔值, 在设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或者全 部设备标识添加至绑定的所述设备标识列表中, 或者添加至限制接入列表中, 其中所述限制接入列表中的设备标识对应的终端设备将被拒绝接入网络, 所 述临时设备标识列表用于临时存储设备标识。
结合第二方面, 在第三种可能的实现方式中, 所述一个或多个程序还被 配置为执行步骤:
在所述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接 入网络。 结合第二方面, 在第四种可能的实现方式中, 所述一个或多个程序还被 配置为执行步骤:
周期性的修改未绑定设备标识列表的预设接入密码。
本发明实施例第三方面提供了一种接入网络的方法, 包括:
获取终端设备发送的接入请求消息, 所述接入请求消息包括接入密码和 所述终端设备的设备标识;
将所述接入密码与保存有至少两个预设接入密码的接入密码列表中的每 个预设接入密码进行匹配;
当所述接入密码与所述接入密码列表中的一个预设接入密码匹配时, 判 定所述预设接入密码是否绑定了设备标识列表, 所述设备标识列表保存有至 少一个设备标识;
当所述预设接入密码绑定了设备标识列表时, 判定所述终端设备的设备 标识是否存在于所述设备标识列表中;
在判定出所述设备标识存在于所述设备标识列表中时, 允许所述终端设 备接入网络。
结合第三方面, 在第一种可能的实现方式中, 还包括:
当所述预设接入密码未绑定设备标识列表时, 则允许所述终端设备接入 网络。
结合第三方面中的第一种可能的实现方式, 在第二种可能的实现方式中, 在当所述预设接入密码未绑定设备标识列表时, 允许所述终端设备接入网络 之后, 还包括:
获取所述终端设备的设备标识, 并将获取的所述设备标识保存至临时设 备标识列表中, 所述临时设备标识列表用于临时存储设备标识;
判定所述临时设备标识列表中的设备标识总数是否达到预定阔值; 若设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或 者全部设备标识添加至绑定的所述设备标识列表中, 或者添加至限制接入列 表中, 其中, 所述限制接入列表中的设备标识对应的终端设备将被拒绝接入 网络。
结合第三方面, 在第三种可能的实现方式中, 还包括:
在所述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接 入网络。
结合第三方面, 在第四种可能的实现方式中, 还包括:
周期性的修改未绑定设备标识列表的预设接入密码。
本发明实施例中提供了一种接入网络的装置, 该装置包括: 获取模块, 用于获取终端设备发送的接入请求消息; 匹配模块, 用于将接入密码与保存 有至少两个预设接入密码的接入密码列表中的每个预设接入密码进行匹配; 判定模块, 用于匹配模块匹配出接入密码与接入密码列表中的一预设接入密 码匹配时, 判定预设接入密码是否绑定了设备标识的设备标识列表; 并在判 定出预设接入密码绑定了设备标识列表时, 判定终端设备的设备标识是否存 在于设备标识列表中; 处理模块, 用于在判定模块判定出设备标识存在于设 备标识列表中时, 允许终端设备接入网络。 也就是说本发明实施例所提供的 控制接入装置中, 该装置通过设置接入密码列表, 可以实现将接入密码中较 简单的预设接入密码绑定用户常用终端设备的设备标识, 这样用户常用终端 设备能够简单方便的接入网络; 通过接入密码列表中较复杂的预设接入密码 来限制非用户常用的终端设备接入网络, 提升了路由器安全性能。
本发明实施例中提供了一种接入网络的方法, 该方法包括: 获取终端设 备发送的接入请求消息; 将接入密码与保存有至少两个预设接入密码的接入 密码列表中的每个预设接入密码匹配; 若接入密码与接入密码列表中的一个 预设接入密码匹配时, 判定预设接入密码是否绑定了设备标识列表; 在预设 接入密码绑定了设备标识列表时, 判定终端设备的设备标识是否存在于绑定 的设备标识列表中; 在判定出设备标识存在于设备标识列表中时, 允许终端 设备接入网络。 这样在路由器中可以通过多个预设接入密码来控制不同的终 端设备的接入, 即: 用户常用终端设备可以通过较简单的预设接入密码接入, 而非用户常用的终端设备通过较复杂的预设接入密码接入, 这样不仅提升了 路由器的安全性, 也使得用户常用的终端设备能够简单便捷的接入网络, 提 升了用户体验。 附图说明
图 1 为本发明实施例中一种接入网络的装置的结构示意图;
图 2为本发明实施例中一种接入网络的方法的流程图;
图 3 为本发明实施例中一种路由器的结构示意图。 具体实施方式
在本发明实施例中使用的术语是仅仅出于描述特定实施例的目的, 而非 旨在限制本发明。 在本发明实施例和所附权利要求书中所使用的单数形式的 "一种"、 "所述" 和 "该" 也旨在包括多数形式, 除非上下文清楚地表示其 他含义。 还应当理解, 本文中使用的术语 "和 /或" 是指并包含一个或多个相 关联的列出项目的任何或所有可能组合。
应当理解, 尽管在本发明实施例中可能釆用术语第一预设接入密码、 第 二预设接入密码描述路由器中设置的预设接入密码, 但这预设接入密码不应 限于这些术语。 这些术语仅用来将多个预设接入密码彼此区分开。 例如, 在 不脱离本发明实施例范围的情况下, 第一预设接入密码也可以被称为第二预 设接入密码, 类似地, 第二预设接入密码也可以被称为第一预设接入密码。 取决于语境, 如在此所使用的词语 "如果" 可以被解释成为 "在 ... ...时" 或 "当 ... ...时" 或 "响应于确定" 或 "响应于检测"。 类似地, 取决于语境, 短语 "如果确定" 或 "如果检测(陈述的条件或事件)" 可以被解释成为 "当确 定时" 或 "响应于确定" 或 "当检测(陈述的条件或事件)时" 或 "响应于检测 (陈述的条件或事件)"
一实施例: 为了解决路由器的安全性较低的问题, 本发明实施例提供了一种接入网 络的装置, 如图 1所示为本发明实施例中一种接入网络的装置的结构示意图, 该装置包括:
获取模块 101 , 用于获取终端设备发送的接入请求消息,接入请求消息包 括接入密码和终端设备的设备标识;
匹配模块 102,用于将获取模块 101获取的接入密码与接入密码列表中的 每个预设接入密码进行匹配, 该接入密码列表中保存有至少两个预设接入密 码;
判定模块 103 ,用于在匹配模块 102匹配出接入密码与所述接入密码列表 中的一个预设接入密码匹配时, 判定预设接入密码是否绑定了设备标识列表, 设备标识列表中保存有至少一个设备标识;
判定模块 103还用于在判定出预设接入密码绑定了设备标识列表时, 判 定终端设备的设备标识是否存在于设备标识列表中;
处理模块 104,用于在判定模块 103判定出设备标识存在于设备标识列表 中时, 允许终端设备接入网络。
在使用路由器之前, 为了保证网络的安全性, 都会在路由器中设置接入 密码, 在本发明实施例中在路由器的设置界面中可以设置第一预设接入密码 和第二预设接入密码, 其中, 在设置第一预设接入密码之后, 在路由器设置 界面中可以将第一预设密码与设备标识列表绑定, 在设备标识列表中可以保 存用户常用的终端设备的设备标识, 此处的设备标识可以是终端设备的硬件 地址(英文: Media Access Control 简称: MAC )或者是终端设备的名称以及 型号等标识, 在本发明实施例中不具体限定标识终端设备的设备标识, 只要 是能够唯一标识终端设备的设备标识都可以保存到设备标识列表中。 表 1所 示为预设接入密码绑定了终端设备的 MAC地址:
预设接入密码 设备标识列表
MAC1 123 MAC2
MAC3
Ia2b3c4d5e 表 1
一般来讲, 绑定了设备标识列表的预设接入密码都设置为较为简单的密 码, 如表 1中第一预设接入密码为" 123", 这样可以方便用户记忆和输入。 显 然直接使用第一预设接入密码会导致路由器安全性较低, 因此在本发明实施 例中第一预设接入密码绑定了一个设备标识列表, 在路由器接收到终端设备 发送的与第一预设接入密码匹配的接入密码时, 路由器将确定终端设备的设 备标识是否存在于第一预设接入密码绑定的设备标识列表中, 若是设备标识 未在于第一预设接入密码绑定的设备标识列表中, 则路由器将拒绝终端设备 接入; 在设备标识在于第一预设接入密码绑定的设备标识列表中时, 路由器 允许终端设备接入到路由器。
对于非用户常用的终端设备则使用第二预设接入密码进行管理, 设置的 第二预设接入密码是为了让非用户常用的终端设备也能够接入网络, 因此第 二预设接入密码设置为较复杂的密码, 如表 1中设置的 "Ia2b3c4d5e" 即为第 二预设接入密码。 由于第二预设接入密码是让非用户常用的终端设备接入网 络的密码, 所以第二预设接入密码不需要绑定设备标识列表(如表 1所示 ), 只要路由器接收到终端设备发送的接入请求消息中包含了第二预设接入密码 时, 路由器将允许终端设备接入。
进一步, 为了保证网络的安全性, 路由器中的处理模块 104可以对表 1 中的第二预设接入密码进行如下的调整:
第一种, 路由器中的处理模块 104将实时的保存用户修改的第二预设接 入密码, 比如说将表 1中的第二预设接入密码从" Ia2b3c4d5e,,修改为
"abcdefgh"; 第二种, 路由器中的处理模块 104周期性的修改第二预设接入密码, 也 就是说只要到了指定的时间, 该路由器中的处理模块 104将随机生成一个较 为复杂的接入密码, 然后用随机生成的接入密码替换原来的第二预设接入密 码, 当然, 第二预设接入密码修改之后, 在路由器的设置界面中可以随时查 看新设置的预设接入密码。
第三种, 若是路由器处理模块 104中设置了备用预设接入密码, 该处理 模块 104还可以将备用预设接入密码替换原来的第二预设接入密码, 比如说 将在路由器中设置的备用预设接入密码 "mlm2m3m4m5m6"或者 "οθοθοθοθο" 替换表 1中的" Ia2b3c4d5e,,。当然这些备用预设接入密码也可以是按周期的替 换第二预设接入密码。
这里需要说明的是, 即使第二预设接入密码进行随时的更换, 第二预设 接入密码的更换也并不会改变第一预设接入密码, 这样既保证第二预设接入 密码的安全性, 同时也使得用户常用的终端设备能够通过较为简单的第一预 设接入密码接入网络。
当在路由器中设置并保存好预设接入密码以及与预设接入密码绑定的设 备标识列表之后, 若是终端设备向路由器发送了接入请求消息时, 路由器中 的获取模块 101将首先获取到终端发送的接入请求消息, 在接入请求消息中 保存了接入密码和终端设备的设备标识。
路由器中匹配模块 102将调取接入密码列表, 并将接入请求消息中的接 入密码与接入密码列表中的每个预设接入密码进行匹配, 若是匹配模块 102 匹配的结果是终端设备发送的接入密码与接入密码列表中的每个预设接入密 码都不匹配时, 则路由器拒绝终端设备接入。
若是匹配模块 102匹配的结果是终端设备发送的接入密码与接入密码列 表中的一个预设接入密码匹配时, 则判定模块 103将确定与接入密码匹配的 预设接入密码是否绑定了设备标识列表。 若是该预设接入密码未绑定设备标 识列表, 则处理模块 103允许该终端设备接入网络, 比如说终端设备发送的 接入请求消息中包含了表 1中的第二预设接入密码" Ia2b3c4d5e,,,此时路由器 将允许终端设备接入网络。
若是与接入密码匹配的预设接入密码绑定了设备标识列表, 路由器将通 过获取模块 101在终端设备发送的接入请求消息中获取到该终端设备的设备 标识, 即: 终端设备的 MAC地址, 然后路由器中的判定模块 103将判定该终 端设备的设备标识是否存在于设备标识列表中, 若是终端设备的设备标识不 存在于设备标识列表中, 则处理模块 104拒绝该终端设备接入网络, 若存在, 则处理模块 104允许该终端设备接入网络。
例如, 终端设备发送的接入密码为表 1中的第一预设接入密码" 123", 此 时该路由器将通过获取模块 101获取到终端设备的 MAC地址,同时路由器中 的判定模块 103还将调取与第一预设接入密码" 123"绑定的设备标识列表, 若 判定模块 103确定该终端设备的 MAC地址与设备标识列表中的 MAC1地址 为同一 MAC地址时, 则路由器中的处理模块 104允许终端设备接入网络; 若 是终端设备的 MAC地址与设备标识列表中的任何一个 MAC地址都不匹配 时, 则处理模块 104将拒绝终端设备接入网络。
在本发明实施例中通过在路由器中设置接入密码列表, 将较简单的预设 接入密码绑定用户常用终端设备的设备标识, 这样用户常用终端设备能够简 单方便的接入网络; 通过较复杂的预设接入密码来限制非用户常用的终端设 备接入网络, 从而有效的保证网络的安全性, 也就是说在保证用户体验的情 况下, 提升了路由器的安全性。 密码可以周期性的更换, 并且也不会影响到用户常用终端设备的预设接入密 码, 这样不仅保证了路由器对网络的安全性的提升, 同时也避免了因路由器 中接入密码的更换而给用户带来输入密码的繁瑣操作, 提升了用户的使用体 验。 进一步, 在本发明实施例中若是终端设备通过第二预设接入密码接入网 络时, 该路由器中的获取模块 101将获取终端设备的设备标识, 并将得到的 设备标识保存至临时设备标识列表中, 如表 2所示:
Figure imgf000013_0001
表 2
具体来讲, 若是终端设备通过第二预设接入密码接入网络, 则说明该终 端设备为非用户常用的终端设备, 此时路由器中的获取模块 101将获取通过 第二预设接入密码接入网络的终端设备的设备标识, 并将该终端设备获取到 的设备标识保存至临时设备标识列表中, 比如表 2中的 MAC4以及 MAC5。
路由器在工作的过程中, 路由器中判定模块 103会周期性的判定临时标 识列表中保存的设备标识总数是否达到预定阔值, 此处的预定阔值可以设置 为 1、 2、 3等正整数。 当临时设备标识列表中的设备标识总数达到预定阔值 时, 该路由器中的处理模块 104将对该临时设备标识列表进行处理, 这里可 以有三种处理方式:
第一种方式: 路由器中的处理模块 104直接删除临时设备标识列表中的 部分或者全部设备标识;
第二种方式: 路由器中的处理模块 104将临时设备标识列表中的部分或 者全部设备标识转移到与第一预设接入密码绑定的设备标识列表中。 当然从 临时设备标识列表转移至设备标识列表中的设备标识对应的终端设备将可以 通过第一预设接入密码接入到路由器。
第三种方式: 路由器中的处理模块 104重新创建一设备标识列表, 并且 将新创建的设备标识列表绑定一个新设置的预设接入密码, 然后将临时设备 标识列表中的部分或者全部设备标识转移至新创建的设备标识列表中, 此时 新创建的设备标识列表中的设备标识对应的终端设备可以通过绑定的预设接 入密码接入网络, 这样可以方便用户通过预设接入密码对用户常用的终端设 备以及非用户常用的终端设备接入网络进行有效的管理。
第四种方式: 路由器中的处理模块 104设置限制接入列表, 将临时设备 标识列表中的部分或者全部设备标识添加到限制接入列表中, 当在限制接入 列表中的设备标识对应的终端设备发送包含预设接入密码的接入请求消息 时, 路由器中的处理模块 104确定终端设备的设备标识存在于限制接入列表 中时, 路由器将拒绝这些终端设备接入网络, 这样可以进一步的提升路由器 对网络安全的保护。
通过上述的四种对临时设备标识列表中设备标识的处理, 在路由器的设 备标识列表中可以添加或者是删除设备标识, 从而这些终端设备就可以使用 较为简单的第一预设接入密码接入网络, 当然对于一些用户怀疑存在安全隐 患的终端设备, 可以将其添加到限制接入列表中, 从而可以有效的避免其他 存在危险的终端设备接入到路由器中, 进而提升了路由器对网络安全的保护。
当然, 在本发明实施例中接入密码列表中可以设置多个预设接入密码, 每个预设接入密码都可以绑定设备标识列表, 并且同一终端设备的设备标识 可以存在于不同的设备标识列表中, 比如表 3所示:
Figure imgf000014_0001
当然, 没有绑定设备标识列表的预设接入密码可以对应一个临时设备标 识列表, 该临时设备标识列表与表 2中的临时设备标识列表的功能完全相同。
另外, 在本发明实施例中绑定了设备标识列表的预设接入密码可以设置 为空, 也就是说只要在路由器中存在设备标识列表, 并且请求接入网络的终 端设备的设备标识存在于设备标识列表中, 则终端设备在没有发送任何接入 密码的情况下, 路由器仍然允许终端设备接入。
另一实施例:
为了解决当前路由器的接入密码便捷性以及安全性问题, 本发明实施例 中提供了一种接入网络的方法, 该方法包括: 获取终端设备发送的接入请求 消息, 在该接入请求消息中包括了接入密码和终端设备的设备标识; 将接入 密码与接入密码列表中的每个预设接入密码进行匹配, 其中, 接入密码列表 中保存有至少两个预设接入密码; 若接入密码与接入密码列表中的一个预设 接入密码匹配时, 判定预设接入密码是否绑定了设备标识列表; 在预设接入 密码绑定了设备标识列表时, 判定终端设备的设备标识是否存在于设备标识 列表中; 在设备标识存在于设备标识列表中时, 允许终端设备接入网络。
通过本发明实施例中的方法, 路由器中可以设置包含了至少两个预设接 入密码的接入密码列表, 通过将较简单的预设接入密码绑定用户常用的终端 设备的设备标识, 这样用户常用的终端设备能够简单方便的接入网络; 通过 较复杂的预设接入密码来限制非用户常用的终端设备接入网络, 从而有效的 保证网络的安全性。
下面通过具体的实施例对该方法进行说明。
在使用路由器之前, 为了保证网络的安全性, 都会在路由器中设置接入 密码, 在本发明实施例中在路由器的设置界面中可以设置第一预设接入密码 和第二预设接入密码, 其中, 在设置第一预设接入密码之后, 在路由器设置 界面中可以将第一预设密码与设备标识列表绑定, 在设备标识列表中可以保 存用户常用的终端设备的设备标识, 此处的设备标识可以是终端设备的硬件 地址(英文: Media Access Control 简称: MAC )或者是终端设备的名称以及 型号等标识, 在本发明实施例中不具体限定标识终端设备的设备标识, 只要 是能够唯一标识终端设备的设备标识都可以保存到设备标识列表中。 表 4所 示为预设接入密码绑定了终端设备的 MAC地址:
Figure imgf000016_0001
表 4
一般来讲, 绑定了设备标识列表的预设接入密码都设置为较为简单的密 码, 表 4中第一预设接入密码就为" 123", 这样可以方便用户记忆和输入。 显 然只是设置第一预设接入密码会导致路由器安全性较低, 因此在本发明实施 例中第一预设接入密码绑定了一个设备标识列表, 在路由器接收到终端设备 发送的与第一预设接入密码匹配的接入密码时, 路由器将确定终端设备的设 备标识是否存在于第一预设接入密码绑定的设备标识列表中, 若是设备标识 未在于第一预设接入密码绑定的设备标识列表中, 则路由器将拒绝终端设备 接入; 若设备标识在于第一预设接入密码绑定的设备标识列表中时, 路由器 才允许终端设备接入到路由器。
对于非用户常用的终端设备则使用第二预设接入密码进行管理, 此时设 置的第二预设接入密码是为了让非用户常用的终端设备也能够接入网络, 因 此第二预设接入密码设置为较复杂的密码, 如表 4中设置的" Ia2b3c4d5e,, 即 为第二预设接入密码。 由于第二预设接入密码是让非用户常用的终端设备接 入网络的密码, 所以该第二预设接入密码就不需要绑定设备标识列表(如表 4 所示 ) , 只要路由器接收到终端设备发送的接入请求消息中包含了第二预设接 入密码时, 路由器将允许终端设备接入。 进一步, 为了保证网络的安全性, 路由器可以对表 4中的第二预设接入 密码进行如下的调整:
第一种,路由器将实时保存用户修改的第二预设接入密码, 比如说将表 4 中的第二预设接入密码从 "1 a2b3c4d5e,,更换或者修改为" abcdefgh";
第二种, 路由器周期性的修改第二预设接入密码, 也就是说只要到了指 定的时间, 该路由器将随机生成一较为复杂的接入密码, 然后用随机生成的 接入密码替换原来的第二预设接入密码, 当然, 第二预设接入密码修改之后, 通过路由器的设置界面能够随时查看替换第二预设接入密码的预设接入密 码。
第三种, 若是路由器中设置了备用预设接入密码, 该处理模块 104还可 以将备用预设接入密码替换原来的第二预设接入密码, 比如说将在路由器中 设置的备用预设接入密码 "mlm2m3m4m5m6" 或者 "οθοθοθοθο" 替换表 1 中的" Ia2b3c4d5e,,。当然这些备用预设接入密码也可以是按周期的替换第二预 设接入密码。
这里需要说明的是, 即使第二预设接入密码进行随时的更换, 第二预设 接入密码的更换也并不会改变第一接入密码, 这样既保证第二预设接入密码 的安全性, 同时也使得用户常用的终端设备能够通过较为简单的第一预设接 入密码接入网络。
当用户在路由器中设置并保存好预设接入密码以及预设接入密码绑定的 设备标识列表之后, 若路由器接收到终端设备发送的接入请求消息时, 路由 器将按照图 2所示的流程执行, 图 2所示为本发明实施例中一种路由器的接 入管理方法的流程图, 该方法包括:
5201 , 路由器获取终端设备发送的接入请求消息, 接入请求消息中包含 了接入密码以及终端设备的设备标识;
5202, 路由器将接入密码与接入密码列表中的每个预设接入密码进行匹 配, 其中, 接入密码列表中保存有至少两个预设接入密码, 若接入密码与一 个预设接入密码匹配, 则进入 S203; 若接入密码与任何一个预设接入密码都 不匹配, 则进入 S206;
5203 , 路由器判定预设接入密码是否绑定了设备标识列表, 若绑定, 进 入 S204, 若未绑定, 进入 S205;
5204, 路由器判定终端设备的设备标识是否存在于设备标识列表中, 若 存在, 进入 S205 , 若不存在, 进入 S206;
5205 , 路由器允许终端设备接入网络;
5206, 路由器拒绝终端设备接入网络。
具体来讲, 路由器中接收到终端设备发送的接入请求消息之后, 将调取 接入密码列表, 并将终端设备发送的接入请求消息中的接入密码与接入密码 列表中的每个预设接入密码匹配, 若是终端设备发送的接入请求消息中的接 入密码与接入密码列表中的所有预设接入密码都不匹配时, 则路由器拒绝终 端设备接入网络。
若是终端设备发送的接入请求消息中的接入密码与接入密码列表中的一 个预设接入密码匹配时, 则路由器将确定接入密码列表中与接入密码匹配的 预设接入密码是否绑定了设备标识列表。 若是该预设接入密码未绑定设备标 识列表, 则允许该终端设备接入网络, 比如说终端设备发送的接入请求消息 中包含了表 4中的第二预设接入密码" Ia2b3c4d5e,,,此时路由器将允许终端设 备接入。
若是与接入密码匹配的预设接入密码绑定了设备标识列表, 路由器还将 获取在接入请求消息中的设备标识, 该设备标识可以为终端设备的 MAC地 址, 路由器判定终端设备的设备标识是否存在于绑定的设备标识列表中, 若 是不存在, 则拒绝该终端设备接入网络, 若存在, 则允许该终端设备接入网 络。 例如, 终端设备发送的接入请求消息中的接入密码为表 4中的第一预设 接入密码" 123", 此时该路由器获取终端设备的 MAC地址, 同时路由器还将 调取与第一预设接入密码" 123,,绑定的设备标识列表, 若确定该终端设备的 MAC地址与设备标识列表中的 MAC1地址相同时,则路由器允许终端设备接 入; 若是终端设备的 MAC地址与设备标识列表中的所有 MAC地址都不匹配 时, 则路由器将拒绝终端设备接入。
在本发明实施例中通过在路由器中设置接入密码列表, 将较简单的预设 接入密码绑定用户常用终端设备的设备标识, 这样用户常用终端设备能够简 单方便的接入网络; 通过较复杂的预设接入密码来限制非用户常用的终端设 备接入网络, 这样在保证用户体验的情况下, 极大的提升了路由器安全性能。 周期性的更换, 并且也不会影响到用户常用终端设备的接入密码, 这样不仅 保证了路由器对网络的安全性的提升, 同时也减少因路由器中接入密码的更 换而给用户常用的终端设备带来密码输入的繁瑣操作, 提升了用户的使用体 验。
另外, 在本发明实施例中若是终端设备通过第二预设接入密码接入网络 时, 该路由器将获取终端设备的设备标识, 并将得到的设备标识保存至临时 设备标识列表中, 如表 5所示:
Figure imgf000019_0001
表 5
具体来讲, 若是终端设备通过第二预设接入密码接入网络, 此时路由器 将获取通过第二预设接入密码接入网络的终端设备的设备标识, 并将获取到 的设备标识保存至临时接入密码列表中, 比如表 5中的 MAC4以及 MAC5。
路由器在工作的过程中, 路由器将周期性的判定第二接入密码对应的临 时标识列表中保存的设备标识总数是否达到预定阔值, 此处的预定阔值可以 设置为 1、 2、 3等正整数。 当与第二预设接入密码对应的临时设备标识列表 中的设备标识总数达到预定阔值时, 该路由器将对该临时设备标识列表进行 处理, 这里可以有三种处理方式:
第一种方式: 路由器直接删除临时设备标识列表中的部分或者全部设备 标识;
第二种方式: 路由器将临时设备标识列表中的部分或者全部设备标识转 移到与第一预设接入密码绑定的设备标识列表中。 当然从临时设备标识列表 转移至设备标识列表中的设备标识对应的终端设备将可以通过第一预设接入 密码接入到路由器。
第三种方式: 路由器重新创建一设备标识列表, 并且将新创建的设备标 识列表绑定一个新设置的预设接入密码, 然后将临时设备标识列表中的部分 或者全部设备标识转移至新创建的设备标识列表中, 此时新创建的设备标识 列表中的设备标识对应的终端设备可以通过新设置的预设接入密码接入网 络, 这样可以方便用户通过预设接入密码对用户常用的终端设备以及非用户 常用的终端设备的接入进行有效的管理。
第四种方式: 路由器中设置限制接入列表, 将临时设备标识列表中的部 分或者全部设备标识添加到限制接入列表中, 当在限制接入列表中的设备标 识对应的终端设备发送包含预设接入密码的接入请求消息时, 路由器确定终 端设备的设备标识存在于限制接入列表中时, 路由器将拒绝这些终端设备接 入网络, 这样可以进一步的提升路由器对网络安全的保护。
通过上述的四种对临时设备标识列表中设备标识的处理, 在路由器的设 备标识列表中可以添加或者是删除设备标识, 从而这些终端设备就可以使用 较为简单的第一预设接入密码接入网络, 当然对于一些用户怀疑存在安全隐 患的终端设备, 可以将其添加到限制接入列表中, 从而可以有效的避免其他 存在危险的终端设备接入到路由器中, 进而提升了路由器对网络安全的保护。
当然, 在本发明实施例中接入密码列表中可以设置多个预设接入密码, 每个预设接入密码都可以绑定设备标识列表, 同一终端设备的设备标识可以 存在于不同的设备标识列表中, 比如表 6所示: 预设接入密码 设备标识列表
MAC1
123 MAC2
MAC3
Ia2b3c4d5e
MAC1
012345 MAC3
MAC7
表 6 当然, 没有绑定设备标识列表的预设接入密码可以对应一个临时设备标 识列表, 该临时设备标识列表与上表 5中的临时设备标识列表的功能完全相 同。
另外, 在本发明实施例中绑定了设备标识列表的预设接入密码可以设置 为空, 也就是说只要在路由器中存在设备标识列表, 并且请求接入网络的终 端设备的设备标识存在于设备标识列表中, 则终端设备在没有发送任何接入 密码的情况下, 路由器仍然允许终端设备接入网络。
另一实施例:
为了解决当前路由器的接入密码便捷性以及安全性问题, 本发明实施例 中提供了一种路由器, 如图 3所示为本实施例中一种路由器的结构示意图, 该路由器包括: 一个或多个处理器;
存储器, 以及一个或多个程序; 所述一个或多个程序存储在所述存储器 中, 并由所述一个或多个处理器执行所述一个或多个程序; 所述一个或多个 程序被配置执行如下步骤: 获取终端设备发送的接入请求消息, 接入请求消息包括接入密码和终端 设备的设备标识; 将接入密码与接入密码列表中的每个预设接入密码进行匹 配, 其中, 接入密码列表中保存有至少两个预设接入密码; 当接入密码与接 入密码列表中的一个预设接入密码匹配时, 判定预设接入密码是否绑定了设 备标识列表, 设备标识列表保存有至少一个设备标识; 当预设接入密码绑定 了设备标识列表时, 判定终端设备的设备标识是否存在于设备标识列表中; 在判定出设备标识存在于设备标识列表中时, 允许终端设备接入网络。
进一步, 所述一个或多个程序还被配置为执行步骤:
当预设接入密码未绑定设备标识列表时, 则允许终端设备接入网络。 进一步, 所述一个或多个程序还被配置为执行步骤:
获取所述终端设备的设备标识, 并将获取的设备标识保存至临时设备标 识列表中, 临时设备标识列表用于临时存储设备标识; 判定临时设备标识列 表中的设备标识总数是否达到预定阔值; 若设备标识总数达到预定阔值时, 将临时设备标识列表中的部分或者全部设备标识添加至绑定的设备标识列表 中, 或者添加至限制接入列表中, 其中, 限制接入列表中的设备标识对应的 终端设备将被拒绝接入网络。
进一步, 所述一个或多个程序还被配置为执行步骤:
在设备标识未存在于设备标识列表中时, 拒绝终端设备接入网络。
进一步, 所述一个或多个程序还被配置执行步骤:
周期性的修改未绑定设备标识列表的预设接入密码。
本发明是参照根据本发明实施例的方法、 设备(系统)、 和计算机程序产 品的流程图和 /或方框图来描述的。 应理解可由计算机程序指令实现流程图 和 /或方框图中的每一流程和 /或方框、 以及流程图和 /或方框图中的流程 和 /或方框的结合。 可提供这些计算机程序指令到通用计算机、 专用计算机、 嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器, 使得通 过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流 程图一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的 装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设 备以特定方式工作的计算机可读存储器中, 使得存储在该计算机可读存储器 中的指令产生包括指令装置的制造品, 该指令装置实现在流程图一个流程或 多个流程和 /或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上, 使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的 处理, 从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图 一个流程或多个流程和 /或方框图一个方框或多个方框中指定的功能的步 骤。
尽管已描述了本发明的优选实施例, 但本领域内的技术人员一旦得知了 基本创造性概念, 则可对这些实施例作出另外的变更和修改。 所以, 所附权 利要求意欲解释为包括优选实施例以及落入本发明范围的所有变更和修改。 发明的精神和范围。 这样, 倘若本发明的这些修改和变型属于本发明权利要 求及其等同技术的范围之内, 则本发明也意图包含这些改动和变型在内。

Claims

权 利 要 求
1、 一种接入网络的装置, 其特征在于, 包括:
获取模块, 用于获取终端设备发送的接入请求消息, 所述接入请求消息 包括接入密码和所述终端设备的设备标识;
匹配模块, 用于将所述获取模块获取的接入密码与接入密码列表中的每 个预设接入密码进行匹配, 其中, 所述接入密码列表中保存有至少两个预设 接入密码;
判定模块, 用于在所述匹配模块匹配出接入密码与所述接入密码列表中 的一个预设接入密码匹配时, 判定与所述预设接入密码是否绑定了设备标识 列表, 所述设备标识列表保存有至少一个设备标识; 并在预设接入密码绑定 了设备标识列表时, 判定终端设备的设备标识是否存在于设备标识列表中; 处理模块, 用于在所述判定模块判定出所述设备标识存在于所述设备标 识列表中时, 允许所述终端设备接入网络。
2、 如权利要求 1所示的装置, 其特征在于, 所述处理模块, 具体用于在 所述判定模块判定出所述预设接入密码未绑定设备标识列表时, 允许所述终 端设备接入网络。
3、 如权利要求 1所述的装置, 其特征在于, 所述获取模块, 还用于在所 述终端设备通过未绑定设备标识列表的预设接入密码接入网络时, 获取所述 终端设备的设备标识, 并将获取的所述设备标识保存至临时设备标识列表中, 所述临时设备标识列表用于临时存储设备标识;
所述判定模块, 还用于判定所述临时设备标识列表中的设备标识总数是 否达到预定阔值;
所述处理模块, 还用于在所述判定模块判定出所述临时设备标识列表中 的设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或者全 部设备标识添加至绑定的所述设备标识列表中, 或添加至限制接入列表中, 其中所述限制接入列表中的设备标识对应的终端设备将被拒绝接入网络。
4、 如权利要求 1所述的装置, 其特征在于, 所述处理模块, 还用于在所 述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接入网络。
5、 如权利要求 1所述的装置, 其特征在于, 所述处理模块, 还用于周期 性的修改未绑定设备标识列表的预设接入密码。
6、 一种路由器, 其特征在于, 包括一个或多个处理器, 存储器, 以及一 个或多个程序; 所述一个或多个程序存储在所述存储器中, 并由所述一个或 多个处理器从所述存储器中调用并执行所述一个或多个程序;
所述一个或多个程序被配置为执行如下步骤:
获取终端设备发送的接入请求消息, 接入请求消息包括接入密码和终端 设备的设备标识;
将接入密码与接入密码列表中的每个预设接入密码进行匹配, 其中, 接 入密码列表中保存有至少两个预设接入密码;
当接入密码与接入密码列表中的一个预设接入密码匹配时, 判定预设接 入密码是否绑定了设备标识列表, 设备标识列表保存有至少一个设备标识; 当预设接入密码绑定了设备标识列表时, 判定终端设备的设备标识是否存在 于设备标识列表中;
在判定出设备标识存在于设备标识列表中时, 允许终端设备接入网络。
7、 如权利要求 6所述的路由器, 其特征在于, 所述一个或多个程序还被 配置为执行步骤:
当所述预设接入密码未绑定设备标识列表时, 允许所述终端设备接入网 络。
8、 如权利要求 6所述的路由器, 其特征在于, 所述一个或多个程序还被 配置为执行步骤:
在所述终端设备通过未绑定设备标识列表的预设接入密码接入网络时, 获取所述终端设备的设备标识, 并将获取的所述设备标识保存至临时设备标 识列表中, 判定所述临时设备标识列表中的设备标识总数是否达到预定阔值, 在设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或者全 部设备标识添加至绑定的所述设备标识列表中, 或者添加至限制接入列表中, 其中所述限制接入列表中的设备标识对应的终端设备将被拒绝接入网络, 所 述临时设备标识列表用于临时存储设备标识。
9、 如权利要求 6所述的路由器, 其特征在于, 所述一个或多个程序还被 配置为执行步骤:
在所述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接 入网络。
10、 如权利要求 6所述的路由器, 其特征在于, 所述一个或多个程序还 被配置为执行步骤:
周期性的修改未绑定设备标识列表的预设接入密码。
11、 一种接入网络的方法, 其特征在于, 包括:
获取终端设备发送的接入请求消息, 所述接入请求消息包括接入密码和 所述终端设备的设备标识;
将所述接入密码与接入密码列表中的每个预设接入密码进行匹配, 其中, 所述接入密码列表中保存有至少两个预设接入密码;
当所述接入密码与所述接入密码列表中的一个预设接入密码匹配时, 判 定所述预设接入密码是否绑定了设备标识列表, 所述设备标识列表保存有至 少一个设备标识;
当所述预设接入密码绑定了设备标识列表时, 判定所述终端设备的设备 标识是否存在于所述设备标识列表中;
在判定出所述设备标识存在于所述设备标识列表中时, 允许所述终端设 备接入网络。
12、 如权利要求 11所述的方法, 其特征在于, 还包括:
当所述预设接入密码未绑定设备标识列表时, 则允许所述终端设备接入 网络。
13、 如权利要求 12所述的方法, 其特征在于, 在当所述预设接入密码未 绑定设备标识列表时, 则允许所述终端设备接入网络之后, 还包括: 获取所述终端设备的设备标识, 并将获取的所述设备标识保存至临时设 备标识列表中, 所述临时设备标识列表用于临时存储设备标识;
判定所述临时设备标识列表中的设备标识总数是否达到预定阔值; 若设备标识总数达到预定阔值时, 将所述临时设备标识列表中的部分或 者全部设备标识添加至绑定的所述设备标识列表中, 或者添加至限制接入列 表中, 其中, 所述限制接入列表中的设备标识对应的终端设备将被拒绝接入 网络。
14、 如权利要求 11所述的方法, 其特征在于, 还包括:
在所述设备标识未存在于所述设备标识列表中时, 拒绝所述终端设备接 入网络。
15、 如权利要求 11所述的方法, 其特征在于, 还包括:
周期性的修改未绑定设备标识列表的预设接入密码。
PCT/CN2014/074638 2014-04-02 2014-04-02 一种接入网络的方法及路由器 WO2015149303A1 (zh)

Priority Applications (5)

Application Number Priority Date Filing Date Title
PCT/CN2014/074638 WO2015149303A1 (zh) 2014-04-02 2014-04-02 一种接入网络的方法及路由器
EP14888053.7A EP3113419B1 (en) 2014-04-02 2014-04-02 Network accessing method and router
JP2016560357A JP6424235B2 (ja) 2014-04-02 2014-04-02 ネットワークにアクセスするための方法及びルータ
US15/301,292 US10178091B2 (en) 2014-04-02 2014-04-02 Method and router for accessing network
CN201480003336.1A CN104870068B (zh) 2014-04-02 2014-04-02 一种接入网络的方法及路由器

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/074638 WO2015149303A1 (zh) 2014-04-02 2014-04-02 一种接入网络的方法及路由器

Publications (1)

Publication Number Publication Date
WO2015149303A1 true WO2015149303A1 (zh) 2015-10-08

Family

ID=53915180

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/074638 WO2015149303A1 (zh) 2014-04-02 2014-04-02 一种接入网络的方法及路由器

Country Status (5)

Country Link
US (1) US10178091B2 (zh)
EP (1) EP3113419B1 (zh)
JP (1) JP6424235B2 (zh)
CN (1) CN104870068B (zh)
WO (1) WO2015149303A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106550363A (zh) * 2015-09-21 2017-03-29 中兴通讯股份有限公司 一种终端接入方法、终端、网络设备和无线网络
CN105228149A (zh) * 2015-09-29 2016-01-06 小米科技有限责任公司 接入点连接方法、装置及接入点
CN105847058A (zh) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 一种无线密码设置方法及装置
CN105897705A (zh) * 2016-03-31 2016-08-24 乐视控股(北京)有限公司 一种网关设备的连接方法和装置
CN107404720B (zh) * 2016-05-18 2021-11-23 荣耀终端有限公司 一种无线设置信息重置的方法及相关设备
CN106453349B (zh) * 2016-10-31 2019-06-14 北京小米移动软件有限公司 账号登录方法及装置
EP3628126A1 (en) * 2017-06-30 2020-04-01 Rovi Guides, Inc. Methods and systems for generating notifications based on the interests of guests
CN109936845B (zh) * 2017-12-19 2022-09-06 九阳股份有限公司 一种智能设备配网方法和装置
CN110958665B (zh) * 2018-09-27 2022-06-14 九阳股份有限公司 一种家电设备接入路由器网络的方法以及家电设备

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080051061A1 (en) * 2006-08-22 2008-02-28 Nec Infrontia Corporation Authentication system and authentication method for performing authentication of wireless terminal
CN101237325A (zh) * 2008-03-12 2008-08-06 杭州华三通信技术有限公司 以太网接入认证方法和下线认证方法以及以太网设备
CN101668325A (zh) * 2008-09-03 2010-03-10 中国移动通信集团上海有限公司 一种准入控制方法、设备及系统
CN102624913A (zh) * 2012-03-20 2012-08-01 深圳世纪华辰科技有限公司 数据推送方法及使用该方法的终端设备和服务器

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000099464A (ja) * 1998-09-22 2000-04-07 Hitachi Software Eng Co Ltd パスワード有効期限管理方法
US8266266B2 (en) * 1998-12-08 2012-09-11 Nomadix, Inc. Systems and methods for providing dynamic network authorization, authentication and accounting
CN100464336C (zh) * 2005-06-14 2009-02-25 华为技术有限公司 一种控制系统帐号权限的方法
JP2007208759A (ja) * 2006-02-03 2007-08-16 Alaxala Networks Corp Macアドレスとユーザ認証を組み合わせた認証セキュリティシステム
US7979912B1 (en) * 2007-04-18 2011-07-12 Sprint Spectrum L.P. Method and system for verifying network credentials
CN103297408B (zh) 2012-03-02 2016-04-06 腾讯科技(深圳)有限公司 登录方法和装置以及终端、网络服务器
CN103415016A (zh) 2013-07-05 2013-11-27 惠州Tcl移动通信有限公司 一种移动wifi热点连接处理方法及系统
US9763094B2 (en) * 2014-01-31 2017-09-12 Qualcomm Incorporated Methods, devices and systems for dynamic network access administration

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080051061A1 (en) * 2006-08-22 2008-02-28 Nec Infrontia Corporation Authentication system and authentication method for performing authentication of wireless terminal
CN101237325A (zh) * 2008-03-12 2008-08-06 杭州华三通信技术有限公司 以太网接入认证方法和下线认证方法以及以太网设备
CN101668325A (zh) * 2008-09-03 2010-03-10 中国移动通信集团上海有限公司 一种准入控制方法、设备及系统
CN102624913A (zh) * 2012-03-20 2012-08-01 深圳世纪华辰科技有限公司 数据推送方法及使用该方法的终端设备和服务器

Also Published As

Publication number Publication date
EP3113419B1 (en) 2020-12-23
US20170026364A1 (en) 2017-01-26
EP3113419A4 (en) 2017-03-08
US10178091B2 (en) 2019-01-08
JP6424235B2 (ja) 2018-11-14
CN104870068B (zh) 2018-09-07
CN104870068A (zh) 2015-08-26
EP3113419A1 (en) 2017-01-04
JP2017511657A (ja) 2017-04-20

Similar Documents

Publication Publication Date Title
WO2015149303A1 (zh) 一种接入网络的方法及路由器
US8918841B2 (en) Hardware interface access control for mobile applications
US8650620B2 (en) Methods and apparatus to control privileges of mobile device applications
TW201603602A (zh) 一種無線上網流量控制的方法和裝置
CN106899604B (zh) 数据包过滤规则的处理方法及装置
JP6096376B2 (ja) アクセス制御方法、装置、プログラム、及び記録媒体
RU2016136668A (ru) Кэширование зашифрованного содержимого
CN110968848B (zh) 基于用户的权限管理方法、装置及计算设备
WO2020107446A1 (zh) 攻击者信息的获取方法、装置、设备和存储介质
US20130024944A1 (en) Confidential information leakage prevention system, confidential information leakage prevention method and confidential information leakage prevention program
US20170303065A1 (en) Method and device for creating subscription resource
WO2014012501A1 (en) Method and system for running encrypted files
WO2014180392A1 (zh) 一种基于m2m的信息处理方法和m2m业务平台
CN110399736A (zh) 一种分布式文件系统权限管理方法及相关组件
WO2019037521A1 (zh) 安全检测的方法、装置、系统以及服务器
US20200045048A1 (en) Data Leakage and Information Security Using Access Control
CN112286911B (zh) 数据库管理方法及装置、设备、存储介质
JP2015114837A (ja) アクセス制御装置、プログラム及びアクセス制御システム
CN103034811A (zh) 一种文件处理的方法、系统及装置
US9794261B2 (en) Method and apparatus for controlling access to a server
CN112019358A (zh) 网络配置方法、装置、设备和系统
KR20120071221A (ko) 무선 네트워크 연결 장치 및 방법
CN106537962A (zh) 无线网络配置、接入和访问方法、装置及设备
WO2015157935A1 (zh) 一种流表项管理方法及设备
CN110417615B (zh) 校验开关控制方法、装置、设备及计算机可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14888053

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014888053

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014888053

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2016560357

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: 15301292

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: IDP00201607416

Country of ref document: ID