WO2015196664A1 - 防蹭网的无线路由设备、方法和计算机存储介质 - Google Patents

防蹭网的无线路由设备、方法和计算机存储介质 Download PDF

Info

Publication number
WO2015196664A1
WO2015196664A1 PCT/CN2014/089278 CN2014089278W WO2015196664A1 WO 2015196664 A1 WO2015196664 A1 WO 2015196664A1 CN 2014089278 W CN2014089278 W CN 2014089278W WO 2015196664 A1 WO2015196664 A1 WO 2015196664A1
Authority
WO
WIPO (PCT)
Prior art keywords
mac address
black
terminal device
white list
module
Prior art date
Application number
PCT/CN2014/089278
Other languages
English (en)
French (fr)
Inventor
岳宗鹤
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2015196664A1 publication Critical patent/WO2015196664A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Definitions

  • the present invention relates to the field of networks, and in particular, to a wireless routing device, method and computer storage medium for a flood prevention network.
  • the existing wireless routing device mainly refers to a device that converts a wired broadband signal into a WIFI signal.
  • a mobile terminal such as a tablet computer, a smart phone, or a notebook establishes a connection through a WIFI and a wireless router
  • the wired broadband access to the Internet can be accessed.
  • MIFI is a portable broadband wireless device that is the size of a mobile phone and combines the functions of a modem, a router and an access point.
  • An internal modem provides access to a wireless signal, and an internal router can share this connection between multiple users and wireless devices.
  • WIFI ⁇ network by accessing the WIFI network by means of cracking passwords and other means to achieve the purpose of free use of broadband
  • WIFI ⁇ network Due to the limitation of the security of WIFI itself, WIFI ⁇ network (by accessing the WIFI network by means of cracking passwords and other means to achieve the purpose of free use of broadband) is increasing.
  • Most of the existing WIFI routing backends are connected to wired broadband networks. These broadband networks are generally billed monthly and do not limit traffic. Therefore, the harm of the network is not very large, but the use of 3G/4G wireless broadband is used.
  • MIFI such wireless broadband is generally charged according to traffic, and the network is meant to be stolen by others, and the legitimate users of MIFI will suffer great economic losses.
  • Embodiments of the present invention are directed to providing a wireless routing device, method, and computer storage medium to reduce the probability of a network phenomenon occurring.
  • a wireless routing device for a flood prevention network includes a WIFI module, a black and white list management module, and a routing control module.
  • the WIFI module is configured to receive a connection request of the terminal device, and extract a MAC address of the terminal device, and send a MAC address to the black and white list management module when detecting that the MAC address exists in the black and white list;
  • the black and white list management module is configured to perform legality authentication on the MAC address sent by the WIFI module, enable the whitelist verification function, determine whether the MAC address exists in the whitelist, and determine that the MAC address exists in the white list. When the MAC address does not exist in the whitelist, the determination is invalid; or the blacklist verification function is enabled to determine whether the MAC address is in the blacklist. When the MAC address is blacklisted, the determination is invalid; when the MAC address does not exist. When it is in the blacklist, the judgment is legal;
  • the routing control module is configured to establish a WIFI connection with the terminal device after the black and white list management module determines that the MAC address is legal; and disconnect the WIFI connection of the terminal device after the black and white list management module determines that the MAC address is invalid.
  • the WIFI module is further configured to set up a WIFI hotspot, perform identity verification on the terminal device, and receive a connection request of the terminal device when the verification succeeds.
  • the wireless routing device of the flood prevention network further comprises a 3G/4G wireless broadband module.
  • the 3G/4G wireless broadband module is configured to establish a 3G/4G connection with the wireless broadband
  • the routing control module is further configured to establish a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module.
  • the wireless routing device of the flood prevention network further includes a display module and a user operation module.
  • the display module is configured to display a device name and a corresponding MAC address of the terminal device
  • the user operation module is configured to select a device name and a corresponding MAC address of the terminal device displayed by the display module and join the black and white list pre-stored by the wireless routing device.
  • the wireless routing device of the flood prevention network further includes a reminding module
  • the reminding module is configured to remind the user to join the terminal device that is not added to the black and white list. Black and white list.
  • the display module is configured to display the device name and the corresponding MAC address of the terminal device when the MAC address does not exist in the black and white list.
  • a second aspect of the embodiments of the present invention provides a wireless routing method for a flood prevention network.
  • the wireless routing method of the flood prevention network includes the following steps:
  • the WIFI module receives the connection request of the terminal device, and extracts the MAC address of the terminal device. If it is detected that the MAC address exists in the black and white list, the MAC address is sent to the black and white list management module.
  • the blacklist and whitelist management module performs legality authentication on the MAC address sent by the WIFI module, and enables the whitelist verification function to determine whether the MAC address exists in the whitelist. If the MAC address exists in the whitelist, the determination is legal; If the MAC address does not exist in the whitelist, the judgment is invalid. If the blacklist is enabled, the MAC address is judged to be in the blacklist. If the MAC address is in the blacklist, the judgment is invalid. If the MAC address is not valid, the MAC address is not valid. If there is a blacklist, the judgment is legal;
  • the routing control module establishes a WIFI connection with the terminal device after the black and white list management module determines that the MAC address is legal; and disconnects the WIFI connection of the terminal device after the black and white list management module determines that the MAC address is invalid.
  • the WIFI module receives the connection request of the terminal device, extracts the MAC address of the terminal device, and determines whether the MAC address already exists in the black and white list pre-stored by the wireless routing device, and if the MAC address is detected to exist in the In the black and white list, before the step of sending the MAC address to the black and white list management module, the method further includes:
  • the WIFI module sets up a WIFI hotspot to authenticate the terminal device. If the verification is successful, the connection request of the terminal device is received.
  • the routing control module establishes a WIFI connection with the terminal device after the black and white list management module determines that the MAC address is legal; and determines the MAC address in the black and white list management module.
  • the method further includes:
  • 3G/4G wireless broadband module establishes 3G/4G connection with wireless broadband
  • the routing control module establishes a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module.
  • the wireless routing method of the flood prevention network further includes:
  • the display module displays the device name and corresponding MAC address of the terminal device
  • the user operation module selects and adds the device name and the corresponding MAC address of the terminal device displayed by the display module to the black and white list pre-stored by the wireless routing device.
  • the display module is configured to display the device name and the corresponding MAC address of the terminal device when the MAC address does not exist in the black and white list.
  • the wireless routing method of the flood prevention network further includes:
  • the reminder module reminds the user to add the terminal device that has not been added to the black and white list to the black and white list.
  • the third aspect of the embodiments of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, wherein the computer executable instructions are used in at least one of the methods of the second aspect of the embodiments of the present invention. one.
  • the wireless routing device of the anti-smashing network includes a WIFI module, a black and white list management module, and a routing control module, wherein the WIFI module performs legal connection according to whether the MAC address exists in the black and white list.
  • sexual authentication, and finally control the WIFI connection according to the legality certification can effectively avoid the illegal access of the users who frequently carry out the network, and has the advantages of low operation threshold and convenient use.
  • FIG. 1 is a schematic structural diagram of a wireless routing device of a flood prevention network according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a wireless routing method for a flood prevention network according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a wireless routing device according to an embodiment of the present invention.
  • the wireless routing device and method for providing a flood prevention network can prevent the illegal user from accessing by obtaining the MAC address of the terminal device and determining whether the legitimate user is located in the black and white list by using the MAC address, thereby reducing the access of the illegal user.
  • the phenomenon of smashing the net can prevent the illegal user from accessing by obtaining the MAC address of the terminal device and determining whether the legitimate user is located in the black and white list by using the MAC address, thereby reducing the access of the illegal user.
  • the phenomenon of smashing the net can be used to prevent the illegal user from accessing by obtaining the MAC address of the terminal device and determining whether the legitimate user is located in the black and white list by using the MAC address
  • FIG. 1 is a schematic diagram of functional modules of a wireless routing device of a flood prevention network.
  • the wireless routing device of the flood prevention network includes WIFI. a module 40, a black and white list management module 30, and a routing control module 20, wherein
  • the WIFI module 40 is configured to receive a connection request of the terminal device, extract a MAC address of the terminal device, and determine whether the MAC address is already present in the black and white list pre-stored by the wireless routing device, and if the MAC address is detected to exist in the black and white list
  • the MAC address is sent to the black and white list management module 30. Whether the MAC address is already in the black and white list pre-stored by the wireless routing device may be, whether the MAC address is in the black and white list, or the MAC address is matched with the MAC address in the black and white list.
  • the specific structure of the WIFI module may generally include a WIFI interface that provides WIFI connection and WIFI communication.
  • the WIFI module may further include a processing structure having an information processing function; the processing structure may include a storage medium and a processor; the storage medium may be a storage medium such as a ROM or a flash, and the storage medium is further a non-transitory storage medium
  • the black and white list is stored.
  • the black and white list can be divided into two parts, one part is a white list and the other part is a black list.
  • the user in the whitelist is a legal user, and the user in the blacklist is an illegal user.
  • the processor may be an electronic component having processing capabilities such as an application processor AP, a digital signal processor DSP, a microprocessor MCU, or a programmable array PLC. Generally, it may be a low power processing chip integrated with the WIFI interface.
  • the WIFI module 40 of this embodiment is configured with at least one of a whitelist verification function and a blacklist verification function.
  • the WIFI module 40 is configured to receive the connection request of the terminal device to be accessed, and obtain the real MAC address of the terminal device, and determine whether the MAC address already exists in the black and white list pre-stored by the wireless routing device, if it is detected If the MAC address is in the black and white list, the black and white list management module 30 enables the black and white list verification function; if the MAC address is not detected in the black and white list, the display module 50 displays the device name and corresponding MAC of the terminal device.
  • the user operation module 60 selects the device name and corresponding MAC address of the terminal device displayed by the display module 50 and adds it to the black and white list; or does not select, does not add the device name and corresponding MAC address of the terminal device.
  • the wireless routing device establishes a WIFI connection with the terminal device, and when the terminal device requests access, the user may also prompt the user to set a black and white list, wherein the terminal device may be a smart phone, a tablet computer or a laptop computer. .
  • the verification process of the whitelist verification function includes:
  • the determination is legal; when the MAC address is not in the white list, the determination is invalid.
  • the verification process of the blacklist verification function includes:
  • the MAC address is in the blacklist.
  • the determination is invalid.
  • the determination is legal.
  • a new MAC address connection request is included in the wireless routing device, if it is not in the black and white list, it is convenient for the user to check by displaying the MAC address to determine whether it is a legitimate access terminal device or an illegal connection. Enter the terminal device. For example, the MAC address of the terminal device A is not in the black and white list. The user can view the MAC address through the display module. If the current user does not authorize other users to log in, the user may be considered as an illegal user to ignore the message or add the MAC address. In the blacklist, terminal device A cannot pass the MAC address. Adding a certificate to a legitimate user and connecting to a wireless router device can obviously reduce the network phenomenon.
  • the user If the user sees the MAC address of the terminal device owned by the friend or family member through the display module, the user can be authenticated as a legitimate user by adding the MAC address to the whitelist. In this way, it is not necessary to set a black and white list to improve the efficiency of intercepting the network phenomenon.
  • the blacklist and whitelist management module 30 may be configured to perform legality authentication on the MAC address sent by the WIFI module 40. If the whitelist authentication function is enabled, it is determined whether the MAC address exists in the whitelist, and if the MAC address exists in the whitelist. If the MAC address is not in the whitelist, the judgment is invalid. If the blacklist is enabled, the MAC address is judged to be in the blacklist. If the MAC address is in the blacklist, the judgment is invalid. If the MAC address does not exist in the blacklist, the decision is legal.
  • the black and white list management module 30 of the flood prevention network mentioned in this embodiment may be configured to perform legality authentication on the MAC address sent by the WIFI module 40, and the black and white list management module 30 enables the black and white list verification function on the accessed terminal device. If the whitelist authentication function is enabled, the blacklist management module 30 determines whether the MAC address exists in the whitelist. If the MAC address exists in the whitelist, the determination is legal; if the MAC address is If the blacklist is not in the whitelist, the blacklist verification function is enabled. If the blacklist is enabled, the MAC address is determined to be invalid. If the MAC address is in the blacklist, the blacklist is invalid. If the MAC address does not exist in the blacklist, the decision is legal.
  • the length of the MAC address is 48 bits (6 bytes), usually expressed as 12 hexadecimal numbers, separated by a colon every 2 hexadecimal numbers, such as: 08:00:20:0A:8C: 6D is a MAC address, where the first 6 hexadecimal numbers 08:00:20 represent the number of the network hardware manufacturer, which is assigned by the IEEE (Istitute of Electrical and Electronics Engineers), and the last 3 digits 16
  • the radix 0A:8C:6D represents the serial number of a network product (such as a network card) manufactured by the manufacturer. Every network manufacturer must ensure that it is made Each Ethernet device created has the same first three bytes and a different last three bytes.
  • each Ethernet device in the world has a unique MAC address, so each terminal device can be uniquely identified by a MAC address.
  • the corresponding terminal can be known.
  • the device for example, the user wants to establish a WIFI connection to a specific terminal device, and the MAC address corresponding to the terminal device is 08:00:20:0A:8C:6D, and the user only needs to have the MAC address 08:00:20:0A.
  • the terminal device corresponding to 6D is set to be whitelisted; if the device is not required to establish a WIFI connection, the terminal device corresponding to the MAC address 08:00:20:0A:8C:6D can be set as a blacklist. .
  • the wireless routing device of the flood prevention network sets the black and white list of the terminal device, simply select the terminal device name on the touch screen, click the MAC address corresponding to the terminal device name, and complete the black and white list selection on the touch screen. If you want to change the blacklist and whitelist of the terminal devices that have already been added, you only need to click the terminal device again to complete the black and white list switching, which is quick and convenient, and can realize instant control.
  • the routing control module 20 may be configured to establish a WIFI connection with the terminal device after the black and white list management module 30 determines that the MAC address is legal; and disconnect the terminal device after the black and white list management module 30 determines that the MAC address is invalid. WIFI connection.
  • the specific structure of the black and white list management module 30 and the routing control module 20 may also correspond to a processor connected to a storage medium, and the control module 20 or black and white is implemented by executing executable code stored in the storage medium.
  • the routing control module 20 of the wireless routing device of the flood prevention network mentioned in this embodiment performs on-off control of the terminal device WIFI connection. If the black-and-white list management module 30 determines that the MAC address is legal, the wireless establishment of the terminal device and the flood prevention network is established. The WIFI connection of the routing device; if the black and white list management module 30 determines that the MAC address is invalid, disconnect the WIFI connection between the terminal device and the wireless routing device of the flood prevention network.
  • the wireless routing device of the anti-smashing network includes the WIFI module 40, the black and white list management module 30, and the routing control module 20, wherein the WIFI module 40 is configured as a receiving terminal.
  • the connection request of the device extracts the MAC address of the terminal device, and determines whether the MAC address already exists in the black and white list pre-stored by the wireless routing device. If it is detected that the MAC address exists in the black and white list, the MAC address is sent. Giving the black and white list management module 30;
  • the black and white list management module 30 may be configured to perform legality authentication on the MAC address sent by the WIFI module 40. If the whitelist authentication function is enabled, determine whether the MAC address exists in the whitelist, if the MAC address exists. If the MAC address is not in the whitelist, the judgment is invalid. If the blacklist is enabled, the MAC address is blacklisted. If the MAC address is blacklisted, If the MAC address does not exist in the blacklist, the judgment is legal;
  • the routing control module 20 is configured to establish a WIFI connection with the terminal device after the black and white list management module 30 determines that the MAC address is legal; and disconnect the terminal device after the black and white list management module 30 determines that the MAC address is invalid. WIFI connection.
  • the wireless routing device provided by the anti-smashing network provided in this embodiment has the beneficial effects of supporting real-time setting of black and white lists, low operation threshold and convenient use.
  • the WIFI module 40 may be configured to set up a WIFI hotspot to perform identity verification on the terminal device, and if the verification succeeds, receive a connection request of the terminal device.
  • the wireless routing device of the flood prevention network first performs identity verification on the terminal device, and performs initial screening on the terminal device. For example, the terminal device only finds the SSID of the WIFI hotspot, and can correctly send the password to send the WIFI connection request, thereby reducing
  • the black and white list management module 30 sets the burden of the black and white list to facilitate user operations.
  • the wireless routing device of the flood prevention network further includes a 3G/4G wireless broadband module 10,
  • the 3G/4G wireless broadband module 10 can be configured to establish a 3G/4G connection with the wireless broadband;
  • the routing control module 20 may be further configured to establish a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module 10.
  • the routing control module 10 establishes a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module, and the 3G/4G wireless is used.
  • the broadband signal is converted into a WIFI signal, which can realize portable WIFI, greatly simplifying the setting steps, and the hardware is small, flexible and easy to carry.
  • the wireless routing device of the flood prevention network further includes a display module 50 and a user operation module 60.
  • the display module 50 is configured to display a device name of the terminal device and a corresponding MAC address
  • the user operation module 60 is configured to select the device name and the corresponding MAC address of the terminal device displayed by the display module 60 and join the black and white list pre-stored by the wireless routing device.
  • the display module 50 of the embodiment is an LCD screen
  • the user operation module 60 is a touch screen or a keyboard or a voice receiving identifier.
  • the WIFI module 40 receives the connection request of the terminal device to be accessed, and acquires the real MAC address of the terminal device. And determining whether the MAC address exists in the black and white list. If the MAC address is detected in the black and white list, the black and white list management module 30 enables the black and white list verification function; if the MAC address is not detected, it exists in the black and white list.
  • the display module 50 displays the device name and the corresponding MAC address of the terminal device; the user operation module 60 selects the device name and corresponding MAC address of the terminal device displayed by the display module 50 and adds it to the black and white list, or does not Select, do not add the device name and corresponding MAC address of the terminal device to the black and white list to establish a WIFI connection.
  • the wireless routing device of the flood prevention network further includes a reminding module 70,
  • the reminding module 70 can be configured to remind the user to add the terminal device that has not been added to the black and white list to the black and white list.
  • the reminding module 70 in this embodiment promptly reminds the terminal device that is not set or newly applied to send the connection request to the wireless routing device of the flood prevention network to further prevent the terminal device from illegally smashing the network.
  • this embodiment further provides another wireless router, where the router includes a processor 302, a display 305, a storage medium 304, and at least one WIFI interface 301; the processor 302, the display 305, and the storage medium. Both 304 and external communication interface 301 are connected by a bus 303.
  • the processor 302 can be an electronic component having processing functions such as an application processor, a microprocessor, a central processing unit, a digital signal processor, or a programmable logic array.
  • the storage medium 304 stores computer executable instructions and the black and white list; the processor 302 executes the computer executable instructions stored in the storage medium 304 to control the WIFI interface 301 and the display 305 to execute a map. Steps in 2.
  • the display 305 may correspond to a display module, and the processor may correspond to a structure such as a routing control module, a black and white list management module, and a reminder module; the display may be connected to the processor and the like through a bus as shown in FIG. It can also be connected via the Internet such as wired or wireless.
  • FIG. 1 The technical solutions described in the embodiments of the present invention may be implemented, specifically as shown in FIG. 1 , FIG. 2 and FIG. 3 .
  • the embodiment further provides a wireless routing method without a flood prevention network, and the wireless routing method of the flood prevention network includes the following steps:
  • Step S200 The WIFI module receives the connection request of the terminal device, extracts the MAC address of the terminal device, and determines whether the MAC address already exists in the black and white list pre-stored by the wireless routing device, and if the MAC address is detected to exist in the black and white list
  • the MAC address is sent to the black and white list management module.
  • the step of interrupting the MAC address is already in the black and white list pre-stored by the wireless routing device, and may be a query operation for querying whether the MAC address is in the black and white list, or may be the MAC address and the black ranking list.
  • the MAC address is matched to the judgment operation.
  • the WIFI module of the embodiment After receiving the connection request of the terminal device to be accessed, the WIFI module of the embodiment obtains the real MAC address of the terminal device, and determines whether the MAC address already exists in the black and white list pre-stored by the wireless routing device, if the MAC is detected. If the address exists in the black and white list, the black and white list management module enables the black and white list verification function; if not checked If the MAC address is found in the black and white list, the display module displays the device name and the corresponding MAC address of the terminal device; the user operation module selects the device name and corresponding MAC address of the terminal device displayed by the display module and adds the MAC address.
  • the device name and the corresponding MAC address of the terminal device are not added to the black and white list.
  • the wireless routing device establishes a WIFI connection with the terminal device, and the terminal device requests access for the next time.
  • the user will also be prompted to set a black and white list, where the terminal device can be a smartphone, tablet or laptop.
  • Step S300 The blacklist and whitelist management module performs legality authentication on the MAC address sent by the WIFI module. If the whitelist authentication function is enabled, it is determined whether the MAC address exists in the whitelist. If the MAC address exists in the whitelist, If the MAC address is not in the whitelist, the judgment is invalid. If the blacklist is enabled, the MAC address is judged to be in the blacklist. If the MAC address is in the blacklist, the judgment is invalid. If the MAC address does not exist in the blacklist, the decision is legal.
  • the black and white list management module enables the black and white list for the accessed terminal device, and immediately authenticates the validity of the MAC address, if the black and white list If the management module enables the whitelist authentication function, it first determines whether the MAC address exists in the whitelist. If the MAC address exists in the whitelist, the determination is legal; if the MAC address does not exist in the whitelist, the determination is illegal; If the blacklist verification function is enabled, the blacklist verification function is used to determine whether the MAC address is in the blacklist. If the MAC address is in the blacklist, the determination is invalid.
  • the length of the MAC address is 48 bits (6 bytes), usually expressed as 12 hexadecimal numbers, separated by a colon every 2 hexadecimal numbers, such as: 08:00:20:0A:8C: 6D is a MAC address, where the first 6 hexadecimal numbers 08:00:20 represent the number of the network hardware manufacturer, which is assigned by the IEEE (Istitute of Electrical and Electronics Engineers), and the last 3 digits 16 0A: 8C: 6D A serial number representing a network product (such as a network card) manufactured by the manufacturer.
  • each network manufacturer must ensure that each Ethernet device it manufactures has the same first three bytes and a different last three bytes. In this way, each Ethernet device in the world has a unique MAC address, so each terminal device can be uniquely identified by a MAC address. As long as the MAC address of each terminal device is obtained, the corresponding terminal can be known.
  • the device for example, the user wants to establish a WIFI connection to a specific terminal device, and the MAC address corresponding to the terminal device is 08:00:20:0A:8C:6D, and the user only needs to have the MAC address 08:00:20:0A.
  • the terminal device corresponding to 6D is set to be whitelisted; if the device is not required to establish a WIFI connection, the terminal device corresponding to the MAC address 08:00:20:0A:8C:6D can be set as a blacklist. .
  • the wireless routing device of the flood prevention network sets the black and white list of the terminal device, simply select the terminal device name on the touch screen, click the MAC address corresponding to the terminal device name, and complete the black and white list selection on the touch screen. If you want to change the blacklist and whitelist of the terminal devices that have already been added, you only need to click the terminal device again to complete the black and white list switching, which is quick and convenient, and can realize instant control.
  • Step S400 The routing control module establishes a WIFI connection with the terminal device after the black and white list management module determines that the MAC address is legal; and disconnects the WIFI connection of the terminal device after the black and white list management module determines that the MAC address is invalid.
  • the routing control module of the wireless routing device of the flood prevention network mentioned in this embodiment performs on-off control on the terminal device WIFI connection. If the black-and-white list management module determines that the MAC address is legal, the wireless routing device of the terminal device and the flood prevention network is established. If the blacklist management module determines that the MAC address is invalid, disconnect the WIFI connection between the terminal device and the wireless routing device of the flood prevention network.
  • the wireless routing method of the tamper-proof network mentioned in this embodiment includes: Step S200: The WIFI module receives a connection request of the terminal device, extracts a MAC address of the terminal device, and determines whether the MAC address is already present in the wireless routing device. In the black and white list, if it is detected that the MAC address exists in the black and white list, the MAC address is sent to the black and white list management. Step S300: The black and white list management module performs legality authentication on the MAC address sent by the WIFI module. If the whitelist authentication function is enabled, it is determined whether the MAC address exists in the whitelist, if the MAC address exists in the whitelist. If the MAC address is not in the whitelist, the judgment is invalid.
  • the MAC address is judged to be in the blacklist. If the MAC address is in the blacklist, the decision is not If the MAC address does not exist in the blacklist, the determination is legal; in step S400, the routing control module establishes a WIFI connection with the terminal device after the black and white list management module determines that the MAC address is legal; and the black and white list management module determines After the MAC address is invalid, the WIFI connection of the terminal device is disconnected.
  • the utility model provides the wireless routing method of the flood prevention network, which can realize the beneficial effect of setting a black and white list in real time, has low operation threshold and is convenient to use.
  • the wireless routing method of the anti-smashing network further includes: before the step S200:
  • Step S100 The WIFI module sets up a WIFI hotspot to perform identity verification on the terminal device, and if the verification succeeds, receives a connection request of the terminal device.
  • the wireless routing device of the flood prevention network first performs identity verification on the terminal device, and performs initial screening on the terminal device. For example, the terminal device only finds the SSID of the WIFI hotspot, and can correctly send the password to send the WIFI connection request, thereby reducing
  • the black and white list management module sets the burden of the black and white list, which is convenient for the user to operate.
  • step S400 the method further includes:
  • Step S500 the 3G/4G wireless broadband module establishes a 3G/4G connection with the wireless broadband; the routing control module establishes a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module.
  • the routing control module establishes a route between the WIFI connection established by the terminal device and the 3G/4G wireless broadband connection established by the 3G/4G wireless broadband module, and the 3G/4G wireless broadband is used.
  • the signal is converted into a WIFI signal, which can realize portable WIFI, greatly Simplify the setup steps, and the hardware is small, flexible and easy to carry.
  • the wireless routing method of the flood prevention network further includes:
  • Step S600 The display module displays the device name and the corresponding MAC address of the terminal device; the user operation module selects and adds the device name and the corresponding MAC address of the terminal device displayed by the display module to the black and white list pre-stored by the wireless routing device.
  • the display module of the embodiment is an LCD screen, and the user operation module is a touch screen.
  • the WIFI module After receiving the connection request of the terminal device to be accessed, the WIFI module obtains the real MAC address of the terminal device, and determines whether the MAC address already exists in the black and white list. If the MAC address is detected in the black and white list, the black and white list management module enables the black and white list verification function; if the MAC address is not detected in the black and white list, the display module displays the device name and corresponding of the terminal device.
  • the user operation module selects the device name and corresponding MAC address of the terminal device displayed by the display module and adds it to the black and white list, or does not select, and does not add the device name and corresponding MAC address of the terminal device to black and white. In the list, establish a WIFI connection.
  • the wireless routing method of the flood prevention network further includes:
  • Step S700 The reminding module prompts the user to add the terminal device that has not been added to the black and white list to the black and white list.
  • the reminding module described in this embodiment promptly reminds the terminal device that is not set or newly applied to send a connection request to the wireless routing device of the flood prevention network to further prevent the terminal device from illegally smashing the network.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are used in at least one of the methods in the embodiment of the present method, as shown in FIG. 1 .
  • the storage medium includes: a mobile storage device, a read-only memory (ROM), a random access memory (RAM), and a magnetic disk. Or a medium such as an optical disc that can store program code, which in some embodiments is a non-transitory storage medium.

Abstract

一种防蹭网的无线路由设备、方法和计算机存储介质,该设备包括WIFI模块(40)、黑白名单管理模块(30)和路由控制模块(20),其中,WIFI模块(40),配置为接收终端设备的连接请求,提取该终端设备的MAC地址,并判断该MAC地址是否已经存在黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块(30);黑白名单管理模块(30),配置为于WIFI模块(40)发送的MAC地址进行合法性认证;所述路由控制模块(20),配置为在所述黑白名单管理模块(30)判定MAC地址合法后与该终端设备建立WIFI连接。

Description

防蹭网的无线路由设备、方法和计算机存储介质 技术领域
本发明涉及网络领域,尤其涉及防蹭网的无线路由设备、方法和计算机存储介质。
背景技术
现有的无线路由设备主要是指把有线宽带信号转化成WIFI信号的设备,平板电脑、智能手机、笔记本等移动终端通过WIFI与无线路由建立连接之后,就可以接入有线宽带访问互联网。MIFI是一个便携式宽带无线装置,大小相当于一只手机,集调制解调器、路由器和接入点三者功能于一身。内置调制解调器可接入一个无线信号,内部路由器可在多个用户和无线设备间共享这一连接。
由于WIFI本身安全性存在局限,WIFI蹭网(通过破解密码等手段接入他方的WIFI网络,以达到免费使用宽带的目的)的情况越来越多。现有的WIFI路由后端绝大多数是接入有线宽带网络,这种宽带网络一般都是包月计费,不限制流量,所以蹭网的危害并不是很大,但是在使用3G/4G无线宽带的MIFI的情况下,这种无线宽带一般是按照流量进行计费的,被蹭网就意味着被别人盗用流量,MIFI合法用户将遭受很大的经济损失。
故如何防止WIFI蹭网是现有技术亟待解决的一个问题。
发明内容
本发明实施例期望在于提供一种无线路由设备、方法和计算机存储介质,以降低蹭网现象发生的几率。
本发明实施例第一方面提供的一种防蹭网的无线路由设备,所述防蹭 网的无线路由设备包括WIFI模块、黑白名单管理模块和路由控制模块,
所述WIFI模块,配置为接收终端设备的连接请求,提取该终端设备的MAC地址,当检测到该MAC地址存在于该黑白名单时,将MAC地址发送给所述黑白名单管理模块;
所述黑白名单管理模块,配置为对所述WIFI模块发送的MAC地址进行合法性认证,启用白名单验证功能,判断该MAC地址是否存在于白名单中,当该MAC地址存在白名单时判定合法;当该MAC地址不存在白名单时判定不合法;或者启用黑名单验证功能,判断该MAC地址是否存在黑名单中,当该MAC地址存在黑名单时,判定不合法;当该MAC地址不存在黑名单中时,判定合法;
所述路由控制模块,配置为在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。
优选地,所述WIFI模块,还配置为设立WIFI热点,对终端设备进行身份验证,当验证成功时接收该终端设备的连接请求。
优选地,所述防蹭网的无线路由设备还包括3G/4G无线宽带模块,
所述3G/4G无线宽带模块,配置为与无线宽带建立3G/4G连接;
所述路由控制模块,还配置为在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由。
优选地,所述防蹭网的无线路由设备还包括显示模块和用户操作模块,
所述显示模块,配置为显示该终端设备的设备名称和相应MAC地址;
所述用户操作模块,配置为将显示模块显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
优选地,所述防蹭网的无线路由设备还包括提醒模块,
所述提醒模块,配置为提醒用户将未加入黑白名单的该终端设备加入 黑白名单中。
优选地,所述显示模块,配置为当该MAC地址不存在于该黑白名单中时,显示该终端设备的设备名称和相应MAC地址。
本发明实施例第二方面提供一种防蹭网的无线路由方法,所述防蹭网的无线路由方法包括步骤:
WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块;
黑白名单管理模块对所述WIFI模块发送的MAC地址进行合法性认证,启用白名单验证功能,判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;或者启用黑名单验证功能,则判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法;
路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。
优选地,所述WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,并判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块的步骤之前还包括:
WIFI模块设立WIFI热点,对终端设备进行身份验证,如果验证成功,则接收该终端设备的连接请求。
优选地,所述路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地 址不合法后断开该终端设备的WIFI连接的步骤之后还包括:
3G/4G无线宽带模块与无线宽带建立3G/4G连接;
路由控制模块在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由。
优选地,所述防蹭网的无线路由方法还包括:
显示模块显示该终端设备的设备名称和相应MAC地址;
用户操作模块将显示模块显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
优选地,
所述显示模块,配置为当该MAC地址不存在于该黑白名单中时,显示该终端设备的设备名称和相应MAC地址。
优选地,所述防蹭网的无线路由方法还包括:
提醒模块提醒用户将未加入黑白名单的该终端设备加入黑白名单中。
本发明实施例第三方面还提供了一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于本发明实施例第二方面所述方法的至少其中之一。
本发明实施例提供防蹭网的无线路由设备包括WIFI模块、黑白名单管理模块和路由控制模块,其中,所述WIFI模块,通过接收终端设备的连接请求,依据MAC地址是否存在黑白名单中进行合法性认证,并最终根据合法性认证控制WIFI连接,能够有效的避免经常进行蹭网的用户的非法接入,具有操作门槛低而且使用方便的好处。
附图说明
图1为本发明实施例提供的一种防蹭网的无线路由设备结构示意图;
图2为本发明实施例提供的一种防蹭网的无线路由方法的流程示意图;
图3为本发明实施例提供的一种无线路由设备的结构示意图。
具体实施方式
以下结合附图对本发明的优选实施例进行详细说明,应当理解,以下所说明的优选实施例仅用于说明和解释本发明,并不用于限定本发明。本发明实施例所述的提供防蹭网的无线路由设备和方法,通过获取终端设备的MAC地址,通过MAC地址来确定是否位于黑白名单中的合法用户,来防止非法用户的接入,从而减少蹭网的现象。
本发明实施例提供防蹭网的无线路由设备,参照图1,图1为防蹭网的无线路由设备一实施例的功能模块示意图,在一实施例中,防蹭网的无线路由设备包括WIFI模块40、黑白名单管理模块30和路由控制模块20,其中,
WIFI模块40,可配置为接收终端设备的连接请求,提取终端设备的MAC地址,并判断MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给黑白名单管理模块30。该断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,可以是查询所述MAC地址是否在黑白名单中,可以是将所述MAC地址与黑白名单中的MAC地址进行匹配。
所述WIFI模块的具体结构通常可包括提供WIFI连接和WIFI通信的WIFI接口。所述WIFI模块还可包括具有信息处理功能的处理结构;所述处理结构可以包括存储介质和处理器;所述存储介质可以是ROM或flash等存储介质,所述存储介质进一步为非瞬间存储介质,存储有所述黑白名单。所述黑白名单可分为两部分,一部分是白名单,另一部分是黑名单。白名单中的用户为合法用户,黑名单中的用户为非法用户。
所述处理器可以是应用处理器AP、数字信号处理器DSP、微处理器MCU或可编程阵列PLC等具有处理能力的电子元器件。通常可以是与所述WIFI接口集成设置的低功耗处理芯片。
本实施例的WIFI模块40配置有白名单验证功能和黑名单验证功能的其中至少一种。所述WIFI模块40可配置为接收待接入的终端设备的连接请求后,并获取终端设备的真实MAC地址,判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于黑白名单中,则所述黑白名单管理模块30启用黑白名单验证功能;如果未检测到该MAC地址存在于黑白名单中,则显示模块50显示该终端设备的设备名称和相应MAC地址;用户操作模块60选择所述显示模块50显示的该终端设备的设备名称和相应MAC地址并将其加入黑白名单中;或者不予选择,不将该终端设备的设备名称和相应MAC地址加入黑白名单中,此时,该无线路由设备与该终端设备建立WIFI连接,该终端设备下次请求接入时,还会提示用户设置黑白名单,其中终端设备可以是智能手机、平板电脑或笔记本电脑。
其中,所述白名单验证功能的验证过程包括:
判断该MAC地址是否存在于白名单中;
当该MAC地址存在白名单中时判定合法;当该MAC地址不存在白名单中时判定不合法。
所述黑名单验证功能的验证过程包括:
判断该MAC地址是否存在黑名单中,当该MAC地址存在黑名单时判定不合法;当该MAC地址不存在黑名单时判定合法。
这样当包括一个新的MAC地址连接请求接入到所述无线路由设备时,若不在黑白名单中,通过向显示所述MAC地址,方便用户查看,确定这是一个合法接入终端设备还是非法接入终端设备。例如终端设备A的MAC地址没有在所述黑白名单中,用户通过显示模块可以查看到所述MAC地址,若当前用户没有授权其他用户登录,可以认为是非法用户忽略此消息或将该MAC地址添加到黑名单中,这样终端设备A无法通过MAC地址的 添加认证为合法用户,从而无法连接到无线路由设备,显然可以减少蹭网现象。若用户通过显示模块查看到MAC地址为其朋友或家人拥有的终端设备的MAC地址,可以通过将该MAC地址添加到白名单中,将该终端设备认证为合法用户。且采用这种方式无需设置好黑白名单,提升拦截蹭网现象的效率。
所述黑白名单管理模块30,可配置为对所述WIFI模块40发送的MAC地址进行合法性认证,如果启用白名单验证功能,则判断MAC地址是否存在于白名单中,如果MAC地址存在白名单中,则判定合法;如果MAC地址不存在白名单中,则判定不合法;如果启用黑名单验证功能,则判断MAC地址是否存在黑名单中,如果MAC地址存在黑名单中,则判定不合法;如果MAC地址不存在黑名单中,则判定合法。
本实施例提及的防蹭网的黑白名单管理模块30可配置为对所述WIFI模块40发送的MAC地址进行合法性认证,黑白名单管理模块30对接入的终端设备启用黑白名单验证功能,对MAC地址即时进行合法性认证,如果黑白名单管理模块30启用白名单验证功能,则首先判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;如果黑白名单管理模块30启用黑名单验证功能,则首先判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法。MAC地址的长度为48位(6个字节),通常表示为12个16进制数,每2个16进制数之间用冒号隔开,如:08:00:20:0A:8C:6D就是一个MAC地址,其中前6位16进制数08:00:20代表网络硬件制造商的编号,它由IEEE(Istitute of Electrical and Electronics Engineers,电气与电子工程师协会)分配,而后3位16进制数0A:8C:6D代表该制造商所制造的某个网络产品(如网卡)的系列号。每个网络制造商必须确保它所制 造的每个以太网设备都具有相同的前三字节以及不同的后三个字节。这样就可保证世界上每个以太网设备都具有唯一的MAC地址,所以每一台终端设备都能以MAC地址进行唯一标识,只要获取每一台终端设备的MAC地址,即可知晓对应的终端设备,比如说用户想要对一特定终端设备的建立WIFI连接,而该终端设备对应的MAC地址为08:00:20:0A:8C:6D,用户只要将MAC地址08:00:20:0A:8C:6D对应的终端设备设为白名单即可实现;如果不需要该设备建立WIFI连接,只要将MAC地址08:00:20:0A:8C:6D对应的终端设备设置为黑名单即可。防蹭网的无线路由设备对终端设备进行黑白名单设置时,只需在触屏上选中该终端设备名称,点击该终端设备名称所对应的MAC地址,在触摸屏上即可完成黑白名单选择,如果想对已经加入的终端设备进行黑白名单更改,只需再次点击该终端设备即可完成黑白名单切换,快捷方便,并且可以实现即时控制。
所述路由控制模块20,可配置为在所述黑白名单管理模块30判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块30判定MAC地址不合法后断开该终端设备的WIFI连接。
所述黑白名单管理模块30和路由控制模块20的具体结构同样可对应于处理器,所述处理器连接有存储介质,通过执行存储介质内存储的可执行代码来实现所述控制模块20或黑白名单管理模块30的具体结构。本实施例提及的防蹭网的无线路由设备的路由控制模块20对终端设备WIFI连接进行通断控制,如果黑白名单管理模块30判定MAC地址合法,则建立该终端设备与防蹭网的无线路由设备的WIFI连接;如果黑白名单管理模块30判定MAC地址不合法,则断开该终端设备与防蹭网的无线路由设备的WIFI连接。
本实施例提供防蹭网的无线路由设备包括WIFI模块40、黑白名单管理模块30和路由控制模块20,其中,所述WIFI模块40,配置为接收终端 设备的连接请求,提取该终端设备的MAC地址,并判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块30;
所述黑白名单管理模块30,可配置为对所述WIFI模块40发送的MAC地址进行合法性认证,如果启用白名单验证功能,则判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;如果启用黑名单验证功能,则判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法;
所述路由控制模块20,配置为在所述黑白名单管理模块30判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块30判定MAC地址不合法后断开该终端设备的WIFI连接。本实施例提供的防蹭网的无线路由设备所能实现的有益效果为支持即时设置黑白名单,操作门槛低而且使用方便。
进一步参照图1,所述WIFI模块40,还可配置为设立WIFI热点,对终端设备进行身份验证,如果验证成功,则接收终端设备的连接请求。
本实施例提供防蹭网的无线路由设备对终端设备首先进行身份验证,对终端设备进行初次筛选,比如说终端设备只有找到WIFI热点的SSID,并且正确输入密码才可以发送WIFI连接请求,从而减少黑白名单管理模块30设置黑白名单的负担,方便用户操作。
进一步参照图1,所述防蹭网的无线路由设备还包括3G/4G无线宽带模块10,
所述3G/4G无线宽带模块10,可配置为与无线宽带建立3G/4G连接;
所述路由控制模块20,还可配置为在终端设备建立的WIFI连接和3G/4G无线宽带模块10建立的3G/4G无线宽带连接两者之间建立路由。
本实施例的防蹭网的无线路由设备,路由控制模块10在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由,将3G/4G无线宽带信号转化为WIFI信号,可实现随身WIFI,大大简化设置步骤,且硬件小、灵活易携带。
进一步参照图1,所述防蹭网的无线路由设备还包括显示模块50和用户操作模块60,
所述显示模块50,可配置为显示终端设备的设备名称和相应MAC地址;
所述用户操作模块60,可配置为将显示模块60显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
本实施例的显示模块50为LCD屏幕,用户操作模块60为触摸屏或键盘或语音接收识别器等结构,WIFI模块40接收待接入的终端设备的连接请求后,并获取终端设备的真实MAC地址,判断该MAC地址是否已经存在黑白名单中,如果检测到该MAC地址存在于黑白名单中,则所述黑白名单管理模块30启用黑白名单验证功能;如果未检测到该MAC地址存在于黑白名单中,则显示模块50显示该终端设备的设备名称和相应MAC地址;用户操作模块60选择所述显示模块50显示的该终端设备的设备名称和相应MAC地址并将其加入黑白名单中,或者不予选择,不将该终端设备的设备名称和相应MAC地址加入黑白名单中,建立WIFI连接。
所述防蹭网的无线路由设备还包括提醒模块70,
所述提醒模块70,可配置为提醒用户将未加入黑白名单的该终端设备加入黑白名单中。
本实施例所述的提醒模块70,对暂未设置或者新申请的终端设备向该防蹭网的无线路由设备发送连接请求时,实时进行提醒,以进一步防止终端设备非法蹭网。
如图3所示,本实施例还提供了另一种无线路由器,所述路由器包括处理器302、显示器305、存储介质304以及至少一个WIFI接口301;所述处理器302、显示器305、存储介质304以及外部通信接口301均通过总线303连接。所述处理器302可为应用处理器、微处理器、中央处理器、数字信号处理器或可编程逻辑阵列等具有处理功能的电子元器件。所述存储介质304上存储有计算机可执行指令及所述黑白名单;所述处理器302执行所述存储介质304中存储的所述计算机可执行指令可控制所述WIFI接口301、显示器305执行图2中的步骤。
所述显示器305可对应于显示模块,所述处理器可对应路由控制模块、黑白名单管理模块以及提醒模块等结构;所述显示器可以如图3所示的通过总线与所述处理器等结构相连,也可以通过有线或无线等互联网进行连接。
可执行本发明实施例中所述的技术方案,具体如图1、图2以及图3所示的方案。
本实施例进一步提供一种无防蹭网的无线路由方法,所述防蹭网的无线路由方法包括步骤:
步骤S200、WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,并判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块。该步骤中断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,可以是一个查询所述MAC地址是否在黑白名单中的查询操作,还可以是将所述MAC地址与黑排名单中的MAC地址进行匹配的判断操作。本实施例的WIFI模块接收待接入的终端设备的连接请求后,并获取终端设备的真实MAC地址,判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于黑白名单中,则所述黑白名单管理模块启用黑白名单验证功能;如果未检 测到该MAC地址存在于黑白名单中,则显示模块显示该终端设备的设备名称和相应MAC地址;用户操作模块选择所述显示模块显示的该终端设备的设备名称和相应MAC地址并将其加入黑白名单中;或者不予选择,不将该终端设备的设备名称和相应MAC地址加入黑白名单中,此时,该无线路由设备与该终端设备建立WIFI连接,该终端设备下次请求接入时,还会提示用户设置黑白名单,其中终端设备可以是智能手机、平板电脑或笔记本电脑。
步骤S300、黑白名单管理模块对所述WIFI模块发送的MAC地址进行合法性认证,如果启用白名单验证功能,则判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;如果启用黑名单验证功能,则判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法。
本实施例提及的防蹭网的无线路由设备的WIFI模块与终端设备建立WIFI连接后,黑白名单管理模块对接入的终端设备启用黑白名单,对MAC地址即时进行合法性认证,如果黑白名单管理模块启用白名单验证功能,则首先判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;如果黑白名单管理模块启用黑名单验证功能,则首先判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法。MAC地址的长度为48位(6个字节),通常表示为12个16进制数,每2个16进制数之间用冒号隔开,如:08:00:20:0A:8C:6D就是一个MAC地址,其中前6位16进制数08:00:20代表网络硬件制造商的编号,它由IEEE(Istitute of Electrical and Electronics Engineers,电气与电子工程师协会)分配,而后3位16进制数0A:8C:6D 代表该制造商所制造的某个网络产品(如网卡)的系列号。每个网络制造商必须确保它所制造的每个以太网设备都具有相同的前三字节以及不同的后三个字节。这样就可保证世界上每个以太网设备都具有唯一的MAC地址,所以每一台终端设备都能以MAC地址进行唯一标识,只要获取每一台终端设备的MAC地址,即可知晓对应的终端设备,比如说用户想要对一特定终端设备的建立WIFI连接,而该终端设备对应的MAC地址为08:00:20:0A:8C:6D,用户只要将MAC地址08:00:20:0A:8C:6D对应的终端设备设为白名单即可实现;如果不需要该设备建立WIFI连接,只要将MAC地址08:00:20:0A:8C:6D对应的终端设备设置为黑名单即可。防蹭网的无线路由设备对终端设备进行黑白名单设置时,只需在触屏上选中该终端设备名称,点击该终端设备名称所对应的MAC地址,在触摸屏上即可完成黑白名单选择,如果想对已经加入的终端设备进行黑白名单更改,只需再次点击该终端设备即可完成黑白名单切换,快捷方便,并且可以实现即时控制。
步骤S400、路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。
本实施例提及的防蹭网的无线路由设备的路由控制模块对终端设备WIFI连接进行通断控制,如果黑白名单管理模块判定MAC地址合法,则建立该终端设备与防蹭网的无线路由设备的WIFI连接;如果黑白名单管理模块判定MAC地址不合法,则断开该终端设备与防蹭网的无线路由设备的WIFI连接。
本实施例提及的防蹭网的无线路由方法,包括;步骤S200、WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,并判断该MAC地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理 模块;步骤S300、黑白名单管理模块对所述WIFI模块发送的MAC地址进行合法性认证,如果启用白名单验证功能,则判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;如果启用黑名单验证功能,则判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法;步骤S400、路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。本实施例提供防蹭网的无线路由方法所能实现的有益效果为支持即时设置黑白名单,操作门槛低而且使用方便。
进一步参见图2,所述的防蹭网的无线路由方法,所述步骤S200之前还包括:
步骤S100、WIFI模块设立WIFI热点,对终端设备进行身份验证,如果验证成功,则接收该终端设备的连接请求。
本实施例提供防蹭网的无线路由设备对终端设备首先进行身份验证,对终端设备进行初次筛选,比如说终端设备只有找到WIFI热点的SSID,并且正确输入密码才可以发送WIFI连接请求,从而减少黑白名单管理模块设置黑白名单的负担,方便用户操作。
进一步参见图2,所述步骤S400之后还包括:
步骤S500、3G/4G无线宽带模块与无线宽带建立3G/4G连接;路由控制模块在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由。
本实施例的防蹭网的无线路由设备,路由控制模块在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由,将3G/4G无线宽带信号转化为WIFI信号,可实现随身WIFI,大大 简化设置步骤,且硬件小、灵活易携带。
进一步参见图2,所述防蹭网的无线路由方法还包括:
步骤S600、显示模块显示该终端设备的设备名称和相应MAC地址;用户操作模块将显示模块显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
本实施例的显示模块为LCD屏幕,用户操作模块为触摸屏,WIFI模块接收待接入的终端设备的连接请求后,并获取终端设备的真实MAC地址,判断该MAC地址是否已经存在黑白名单中,如果检测到该MAC地址存在于黑白名单中,则所述黑白名单管理模块启用黑白名单验证功能;如果未检测到该MAC地址存在于黑白名单中,则显示模块显示该终端设备的设备名称和相应MAC地址;用户操作模块选择所述显示模块显示的该终端设备的设备名称和相应MAC地址并将其加入黑白名单中,或者不予选择,不将该终端设备的设备名称和相应MAC地址加入黑白名单中,建立WIFI连接。
进一步参见图2,所述防蹭网的无线路由方法还包括:
步骤S700、提醒模块提醒用户将未加入黑白名单的该终端设备加入黑白名单中。
本实施例所述的提醒模块,对暂未设置或者新申请的终端设备向该防蹭网的无线路由设备发送连接请求时,实时进行提醒,以进一步防止终端设备非法蹭网。
本发明实施例还提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,所述计算机可执行指令用于本法实施例所述方法的至少其中之一,如图1所示的方法。
所述存储介质包括:移动存储设备、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟 或者光盘等各种可以存储程序代码的介质,在一些实施例中所述存储介质为非瞬间存储介质。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡按照本发明原理所作的修改,都应当理解为落入本发明的保护范围。

Claims (12)

  1. 一种防蹭网的无线路由设备,所述防蹭网的无线路由设备包括WIFI模块、黑白名单管理模块和路由控制模块,其中,
    所述WIFI模块,配置为接收终端设备的连接请求,提取该终端设备的MAC地址,当检测到该MAC地址存在于黑白名单时将MAC地址发送给所述黑白名单管理模块;
    所述黑白名单管理模块,配置为对所述WIFI模块发送的MAC地址进行合法性认证,启用白名单验证功能,判断该MAC地址是否存在于白名单中,当该MAC地址存在白名单中时判定合法;当该MAC地址不存在白名单中时判定不合法;或启用黑名单验证功能,判断该MAC地址是否存在黑名单中,当该MAC地址存在黑名单时判定不合法;当该MAC地址不存在黑名单时判定合法;
    所述路由控制模块,配置为在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。
  2. 如权利要求1所述的防蹭网的无线路由设备,其中,所述WIFI模块,还配置为设立WIFI热点,对终端设备进行身份验证,当验证成功时接收该终端设备的连接请求。
  3. 如权利要求1或2所述的防蹭网的无线路由设备,其中,所述防蹭网的无线路由设备还包括3G/4G无线宽带模块,
    所述3G/4G无线宽带模块,用于与无线宽带建立3G/4G连接;
    所述路由控制模块,还配置为在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由。
  4. 如权利要求1或2所述的防蹭网的无线路由设备,其中,所述防蹭网的无线路由设备还包括显示模块和用户操作模块,
    所述显示模块,配置为显示该终端设备的设备名称和相应MAC地址;
    所述用户操作模块,配置为将显示模块显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
  5. 如权利要求1至4任一项所述的防蹭网的无线路由设备,其中,所述防蹭网的无线路由设备还包括提醒模块,
    所述提醒模块,配置为提醒用户将未加入黑白名单的该终端设备加入黑白名单中。
  6. 根据权利要求4任一项所述的防蹭网的无线路由设备,其中,
    所述显示模块,配置为当该MAC地址不存在于该黑白名单中时,显示该终端设备的设备名称和相应MAC地址。7、一种防蹭网的无线路由方法,所述防蹭网的无线路由方法包括步骤:
    WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块;
    黑白名单管理模块对所述WIFI模块发送的MAC地址进行合法性认证,启用白名单验证功能,判断该MAC地址是否存在于白名单中,如果该MAC地址存在白名单中,则判定合法;如果该MAC地址不存在白名单中,则判定不合法;或者启用黑名单验证功能,判断该MAC地址是否存在黑名单中,如果该MAC地址存在黑名单中,则判定不合法;如果该MAC地址不存在黑名单中,则判定合法;
    路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接。
  7. 如权利要求7所述的防蹭网的无线路由方法,其中,所述WIFI模块接收终端设备的连接请求,提取该终端设备的MAC地址,并判断该MAC 地址是否已经存在于该无线路由设备预存的黑白名单中,如果检测到该MAC地址存在于该黑白名单中,则将MAC地址发送给所述黑白名单管理模块的步骤之前还包括:
    WIFI模块设立WIFI热点,对终端设备进行身份验证,如果验证成功,则接收该终端设备的连接请求。
  8. 如权利要求7或8所述的防蹭网的无线路由方法,其中,所述路由控制模块在所述黑白名单管理模块判定MAC地址合法后与该终端设备建立WIFI连接;在所述黑白名单管理模块判定MAC地址不合法后断开该终端设备的WIFI连接的步骤之后还包括:
    3G/4G无线宽带模块与无线宽带建立3G/4G连接;
    路由控制模块在终端设备建立的WIFI连接和3G/4G无线宽带模块建立的3G/4G无线宽带连接两者之间建立路由。
  9. 如权利要求7或8所述的防蹭网的无线路由方法,其中,所述防蹭网的无线路由方法还包括:
    显示模块显示该终端设备的设备名称和相应MAC地址;
    用户操作模块将显示模块显示的该终端设备的设备名称和相应MAC地址选中并加入该无线路由设备预存的黑白名单中。
  10. 如权利要求7至10任一项所述的防蹭网的无线路由方法,其中,所述防蹭网的无线路由方法还包括:
    提醒模块提醒用户将未加入黑白名单的该终端设备加入黑白名单中。
  11. 如权利要求10所述的防蹭网的无线路由方法,其中,
    所述显示模块显示该终端设备的设备名称和相应MAC地址,包括:
    当该MAC地址不存在于该黑白名单中时,显示该终端设备的设备名称和相应MAC地址。
  12. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执 行指令,所述计算机可执行指令用于执行权利要求7至12所述方法的至少其中之一。
PCT/CN2014/089278 2014-06-27 2014-10-23 防蹭网的无线路由设备、方法和计算机存储介质 WO2015196664A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410301959.9A CN105323757B (zh) 2014-06-27 2014-06-27 防蹭网的无线路由设备和方法
CN201410301959.9 2014-06-27

Publications (1)

Publication Number Publication Date
WO2015196664A1 true WO2015196664A1 (zh) 2015-12-30

Family

ID=54936614

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/089278 WO2015196664A1 (zh) 2014-06-27 2014-10-23 防蹭网的无线路由设备、方法和计算机存储介质

Country Status (2)

Country Link
CN (1) CN105323757B (zh)
WO (1) WO2015196664A1 (zh)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933285A (zh) * 2016-03-31 2016-09-07 广州指点网络科技有限公司 支持应用程序的智能开关路由信息热点终端及应用方法
CN107819768A (zh) * 2017-11-15 2018-03-20 厦门安胜网络科技有限公司 服务端主动断开非法长连接的方法、终端设备及存储介质
CN109982359A (zh) * 2019-04-29 2019-07-05 四川英得赛克科技有限公司 一种采用多无线热点监测技术的无线热点监测装置及其方法
CN110620751A (zh) * 2018-06-20 2019-12-27 深圳市云猫信息技术有限公司 一种wifi路由终端、接入网关及其认证方法、认证系统
CN113365272A (zh) * 2021-05-10 2021-09-07 荣耀终端有限公司 一种防蹭网方法及系统
CN114257407A (zh) * 2021-11-17 2022-03-29 广东电网有限责任公司 基于白名单的设备连接控制方法、装置、计算机设备
CN114598519A (zh) * 2022-03-02 2022-06-07 深圳市吉祥腾达科技有限公司 一种支持终端不掉线设置黑白名单的方法及系统

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105871843A (zh) * 2016-03-31 2016-08-17 广州指点网络科技有限公司 智能控制用户连接数量的路由装置及应用方法
CN107635229A (zh) * 2016-07-15 2018-01-26 中兴通讯股份有限公司 一种wifi共享的方法和装置
CN106101294B (zh) * 2016-08-30 2019-09-27 许洞云 一种网络连接管理方法及装置
CN106533945A (zh) * 2016-09-23 2017-03-22 深圳创维数字技术有限公司 一种基于智能路由器的终端类型自动识别的方法及系统
CN106412901B (zh) * 2016-10-28 2020-02-04 上海斐讯数据通信技术有限公司 一种防蹭网无线路由方法及路由系统
CN107094088B (zh) * 2016-11-10 2020-11-27 腾讯科技(深圳)有限公司 蹭网设备识别方法、装置、系统和计算机可读存储介质
CN106603422A (zh) * 2016-12-09 2017-04-26 上海斐讯数据通信技术有限公司 一种无线路由器防蹭网方法及无线路由器
CN106658507A (zh) * 2016-12-16 2017-05-10 上海斐讯数据通信技术有限公司 一种无线网络连接方法及无线设备
CN106961434B (zh) * 2017-03-21 2020-10-16 南京大学 一种为无线设备进行指纹建模及识别的方法
CN107148021A (zh) * 2017-05-27 2017-09-08 上海斐讯数据通信技术有限公司 一种无线接入认证方法及一种无线接入设备
CN107295518A (zh) * 2017-07-28 2017-10-24 中科创达软件科技(深圳)有限公司 一种无线连接方法及系统、终端设备
CN108924911B (zh) * 2018-07-27 2021-07-06 维沃移动通信有限公司 一种启动wifi热点共享网络的方法及装置
CN112153645A (zh) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 防蹭网方法和装置、路由器
CN111586891B (zh) * 2020-04-30 2022-07-01 上海尚往网络科技有限公司 网络连接的方法、装置、电子设备及介质
CN112333053B (zh) * 2020-06-02 2022-09-02 深圳Tcl新技术有限公司 防蹭网方法、装置、路由设备及存储介质
CN112040488A (zh) * 2020-09-10 2020-12-04 安徽师范大学 基于mac地址和信道状态双层指纹的非法设备识别方法
CN112995156B (zh) * 2021-02-09 2023-05-26 江苏信息职业技术学院 一种无线网络安全检测装置及方法
CN114338074B (zh) * 2021-11-09 2023-08-01 国网浙江省电力有限公司宁波供电公司 一种配电终端ip白名单自动检测方法及检测系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711110A (zh) * 2012-05-24 2012-10-03 中兴通讯股份有限公司 一种管理Wi-Fi网络的方法和无线路由器
CN103476089A (zh) * 2013-09-10 2013-12-25 深圳市双赢伟业科技股份有限公司 一种无线路由器及其接入方法
CN103619018A (zh) * 2013-11-21 2014-03-05 北京奇虎科技有限公司 一种无线网络访问权限的检测方法,装置及路由器
CN103856941A (zh) * 2012-12-05 2014-06-11 腾讯科技(深圳)有限公司 无线网络监控方法及相关装置

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103260159B (zh) * 2012-02-20 2016-08-24 宇龙计算机通信科技(深圳)有限公司 身份识别方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102711110A (zh) * 2012-05-24 2012-10-03 中兴通讯股份有限公司 一种管理Wi-Fi网络的方法和无线路由器
CN103856941A (zh) * 2012-12-05 2014-06-11 腾讯科技(深圳)有限公司 无线网络监控方法及相关装置
CN103476089A (zh) * 2013-09-10 2013-12-25 深圳市双赢伟业科技股份有限公司 一种无线路由器及其接入方法
CN103619018A (zh) * 2013-11-21 2014-03-05 北京奇虎科技有限公司 一种无线网络访问权限的检测方法,装置及路由器

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105933285B (zh) * 2016-03-31 2018-10-12 广州指点网络科技有限公司 支持应用程序的智能开关路由信息热点终端及应用方法
CN105933285A (zh) * 2016-03-31 2016-09-07 广州指点网络科技有限公司 支持应用程序的智能开关路由信息热点终端及应用方法
CN107819768A (zh) * 2017-11-15 2018-03-20 厦门安胜网络科技有限公司 服务端主动断开非法长连接的方法、终端设备及存储介质
CN107819768B (zh) * 2017-11-15 2020-07-31 厦门安胜网络科技有限公司 服务端主动断开非法长连接的方法、终端设备及存储介质
CN110620751A (zh) * 2018-06-20 2019-12-27 深圳市云猫信息技术有限公司 一种wifi路由终端、接入网关及其认证方法、认证系统
CN109982359B (zh) * 2019-04-29 2023-10-17 四川英得赛克科技有限公司 一种采用多无线热点监测技术的无线热点监测装置及其方法
CN109982359A (zh) * 2019-04-29 2019-07-05 四川英得赛克科技有限公司 一种采用多无线热点监测技术的无线热点监测装置及其方法
CN113365272A (zh) * 2021-05-10 2021-09-07 荣耀终端有限公司 一种防蹭网方法及系统
CN113365272B (zh) * 2021-05-10 2022-07-15 荣耀终端有限公司 一种防蹭网方法及系统
CN114257407B (zh) * 2021-11-17 2023-09-19 广东电网有限责任公司 基于白名单的设备连接控制方法、装置、计算机设备
CN114257407A (zh) * 2021-11-17 2022-03-29 广东电网有限责任公司 基于白名单的设备连接控制方法、装置、计算机设备
CN114598519A (zh) * 2022-03-02 2022-06-07 深圳市吉祥腾达科技有限公司 一种支持终端不掉线设置黑白名单的方法及系统
CN114598519B (zh) * 2022-03-02 2024-04-12 深圳市和为顺网络技术有限公司 一种支持终端不掉线设置黑白名单的方法及系统

Also Published As

Publication number Publication date
CN105323757A (zh) 2016-02-10
CN105323757B (zh) 2020-09-15

Similar Documents

Publication Publication Date Title
WO2015196664A1 (zh) 防蹭网的无线路由设备、方法和计算机存储介质
US11310239B2 (en) Network connection method, hotspot terminal and management terminal
US8594632B1 (en) Device to-device (D2D) discovery without authenticating through cloud
US9420461B2 (en) Access authentication method and device for wireless local area network hotspot
JP6668407B2 (ja) 移動通信システムに用いられる端末認証方法及び装置
US9179314B2 (en) Secure and automatic connection to wireless network
US8869252B2 (en) Methods, apparatuses, and computer program products for bootstrapping device and user authentication
US9894630B2 (en) ADSS enabled global roaming system
CN103607712B (zh) 无线网络的接入方法和装置
CN110611905A (zh) 信息共享方法、终端设备、存储介质及计算机程序产品
US20160242033A1 (en) Communication service using method and electronic device supporting the same
WO2015027712A1 (zh) 移动终端连接网络的方法、移动终端与终端设备
JP2012530311A5 (zh)
WO2014086252A1 (zh) 关联设备的方法、装置及系统
WO2011106956A1 (zh) 移动终端及其数据共享方法
CN105898743B (zh) 一种网络连接方法、装置及系统
CN104581727A (zh) 设备连接方法、装置及ap端电子设备
CN108683690A (zh) 鉴权方法、用户设备、鉴权装置、鉴权服务器和存储介质
WO2016188053A1 (zh) 一种无线网络接入方法、装置及计算机存储介质
WO2017084456A1 (zh) Wifi热点的处理方法、装置及系统
WO2016015510A1 (zh) 用于移动通信系统中的终端认证方法和装置
MX2015004797A (es) Dispositivos y metodo para controlar acceso a una cuenta.
WO2018152820A1 (zh) 建立连接的方法和装置
CN105357224B (zh) 一种智能家居网关注册、移除方法及系统
WO2015196679A1 (zh) 无线接入的鉴权方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14895603

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14895603

Country of ref document: EP

Kind code of ref document: A1