WO2016045359A1 - 一种鉴权方法、无线路由器及计算机存储介质 - Google Patents

一种鉴权方法、无线路由器及计算机存储介质 Download PDF

Info

Publication number
WO2016045359A1
WO2016045359A1 PCT/CN2015/076438 CN2015076438W WO2016045359A1 WO 2016045359 A1 WO2016045359 A1 WO 2016045359A1 CN 2015076438 W CN2015076438 W CN 2015076438W WO 2016045359 A1 WO2016045359 A1 WO 2016045359A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wireless router
confirmation
identifier information
access
Prior art date
Application number
PCT/CN2015/076438
Other languages
English (en)
French (fr)
Inventor
郭立志
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Priority to US15/514,552 priority Critical patent/US20170223539A1/en
Priority to EP15844315.0A priority patent/EP3200492A4/en
Publication of WO2016045359A1 publication Critical patent/WO2016045359A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity

Definitions

  • the present invention relates to the field of wireless routers, and in particular, to an authentication method, a wireless router, and a computer storage medium.
  • SSID Service Set Identifier
  • embodiments of the present invention are expected to provide an authentication method, a wireless router, and a computer storage medium.
  • an embodiment of the present invention provides an authentication method, which is applied to a wireless router, where the wireless router is provided with a confirmation key; the method includes: receiving a first wireless access request from the terminal, where the The first radio access request carries the identifier information that uniquely identifies the terminal; when the identifier information is not queried in the wireless router, determining that the terminal is the first access; receiving the preset time After confirming the confirmation operation triggered by the confirmation operation of the confirmation key, confirming that the terminal is legal and saving the identification information; wherein the identification information is used for Verifying the legitimacy of the terminal when the terminal requests access for the next time.
  • the method further includes: after the confirmation command triggered by the confirmation operation is not received within the preset time, determining that the terminal is illegal.
  • the method further includes: outputting prompt information, The user is prompted to perform the confirmation operation.
  • the method further includes: receiving a second radio access request from the terminal, where the second radio access request carries the identifier information
  • the identifier information is queried in the wireless router, it is determined that the terminal is not the first time to confirm that the terminal is legal.
  • an embodiment of the present invention provides a wireless router, including: a receiving unit, configured to receive a first wireless access request from a terminal, where the first wireless access request carries a unique identifier for the terminal And the determining unit is configured to: when the identifier information is not queried in the wireless router, determine that the terminal is the first access; and further configured to receive the confirmation key within a preset time After confirming the acknowledgement command triggered by the operation, confirming that the terminal is legal; the storage unit is configured to save the identifier information, where the identifier information is used to verify the legality of the terminal when the terminal requests access for the next time.
  • the determining unit is further configured to determine that the terminal is illegal after determining that the terminal is not in the preset time after receiving the confirmation command triggered by the confirmation operation.
  • the wireless router further includes: an output unit, configured to: after the determining unit determines that the terminal is the initial access, and receives the confirmation that the confirmation operation is triggered within the preset time Before the instruction, a prompt message is output to prompt the user to perform the confirmation operation.
  • the receiving unit is further configured to: after the storing, by the storage unit, the identifier information, receive a second radio access request from the terminal, where the second radio access request carries
  • the identification unit is further configured to: when the identifier information is queried in the wireless router, determine that the terminal is not first accessed, to confirm that the terminal is legal.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium includes a set of instructions that, when executed, cause at least one processor to execute the foregoing authentication method.
  • the authentication method, the wireless router and the computer storage medium provided by the embodiment of the present invention are provided with a confirmation key on the wireless router; then, the wireless router receives the first wireless access request from the terminal, and the first wireless access request carries The identification information of the terminal is uniquely identified, and the wireless router can determine that the terminal is the first access based on the identification information. Then, after receiving the confirmation command triggered by the confirmation operation of the confirmation key, the wireless router confirms the terminal within a preset time. If the identification information is legal and saved, then when the terminal requests to access the wireless router next time, the wireless router can confirm whether the terminal is legal according to the identification information.
  • FIG. 1 is a schematic flowchart diagram of an authentication method according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a method for a terminal to access a wireless router according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of a wireless router according to an embodiment of the present invention.
  • An embodiment of the present invention provides an authentication method, where the method is applied to a wireless router, where a wireless router is provided with a confirmation button, and the confirmation button may be a physical entity button or a display on a wireless router.
  • the virtual button in the confirmation prompt interface is displayed.
  • the confirmation button is a physical entity button
  • some wireless routers support the WiFi Protected Setup (WPS) function
  • WPS WiFi Protected Setup
  • FIG. 1 is a schematic flowchart of an authentication method according to an embodiment of the present invention. Referring to FIG. 1, the method includes:
  • S101 Receive a first radio access request from a terminal, where the first radio access request carries identifier information that uniquely identifies the terminal.
  • the terminal may send the identifier information that can uniquely identify the terminal to the wireless router.
  • the identifier information may be the identifier information such as the MAC address and the network port number of the physical network card of the terminal, and may be in other forms as long as the terminal can be uniquely identified.
  • the terminal when the terminal accesses the wireless router for the first time, the user needs to input the SSID and/or the security key. Then, the terminal may carry the SSID, the security key, and the foregoing identification information together in the first wireless access request and send the same to the first wireless access request.
  • Wireless Router when the terminal accesses the wireless router for the first time, the user needs to input the SSID and/or the security key. Then, the terminal may carry the SSID, the security key, and the foregoing identification information together in the first wireless access request and send the same to the first wireless access request.
  • the identifier information may be parsed, and then the wireless router queries whether the identifier information is saved. Due to The terminal is the first access, and the wireless router does not save the identifier information. Then, when the wireless router does not query the identifier information, it is confirmed that the terminal is the first access.
  • the method further includes: outputting the prompt information to prompt the user to perform the confirmation operation.
  • the wireless router may output the prompt information in an audible prompt or a visual prompt, for example, outputting the prompt information by outputting a voice prompt, outputting a prompt sound, blinking an LED light, or the like.
  • the wireless router may output the prompt information in an audible prompt or a visual prompt, for example, outputting the prompt information by outputting a voice prompt, outputting a prompt sound, blinking an LED light, or the like.
  • there may be other manners for outputting the prompt information which is not specifically limited in the embodiment of the present invention.
  • S103 After receiving the confirmation command triggered by the confirmation operation of the confirmation key within the preset time, confirm that the terminal is legal and save the identification information, wherein the identification information is used to verify the legality of the terminal when the terminal requests access for the next time.
  • the user can manually press the confirmation button on the wireless router.
  • the wireless router receives the confirmation command triggered by the confirmation operation of the confirmation button within the preset time. , confirm that the terminal is legal, and save the above identification information.
  • the method may further include: determining that the terminal is illegal after not receiving the confirmation instruction triggered by the confirmation operation within the preset time. At this time, the wireless router can prohibit the terminal from accessing.
  • the preset time may be 10s, 30s, 1min, etc., and may be set by a person skilled in the art according to actual needs, which is not specifically limited in the embodiment of the present invention.
  • the method may further include: receiving a second wireless access request from the terminal, where the second wireless access request carries the identifier Information; when the identification information is queried in the wireless router, it is determined that the terminal is not the first time access to determine that the terminal is legal; where N is an integer greater than or equal to 2.
  • the terminal accesses the wireless router again, the terminal sends the number to the wireless router.
  • the second wireless access request the request still carries the identifier information, and then the wireless router queries whether the identifier information is stored. Because the wireless router has saved the identifier information of the terminal during the first access of the terminal to the wireless router. Therefore, the wireless router can query the identification information of the terminal. At this time, the wireless router can determine that the terminal is not the first time access, and then determine that the terminal is legal.
  • the terminal when the terminal is not the first time to access the wireless router, the user still needs to input the SSID and the security key. Then, the terminal may carry the SSID, the security key, and the foregoing identification information together in the second wireless access request and send the same to the terminal.
  • Wireless Router when the terminal is not the first time to access the wireless router, the user still needs to input the SSID and the security key. Then, the terminal may carry the SSID, the security key, and the foregoing identification information together in the second wireless access request and send the same to the terminal. Wireless Router.
  • the wireless router can also verify the SSID and the security key. If the verification succeeds, the terminal normally accesses the wireless router. If the verification fails, the terminal cannot connect. Into the wireless router.
  • terminal A is to access wireless router B.
  • the identification information that uniquely identifies the terminal A is S.
  • FIG. 2 is a schematic flowchart of a method for a terminal to access a wireless router according to an embodiment of the present invention. Referring to FIG. 2, the method includes:
  • the wireless router B receives the wireless access request information that carries the SSID, the security key, and the S from the terminal A.
  • S202 The wireless router B queries whether it stores S in its internal; if yes, it jumps to S204; if not, it jumps to S203;
  • S203 The wireless router B determines that the terminal A is the first access; skips to S205;
  • the wireless router B determines that the terminal A is not the first time access; skip to S207;
  • the wireless router B prompts the user to confirm the operation by outputting a voice prompt “please press the confirm key”; if the confirmation command triggered by the confirmation operation performed by the user is received within 30 seconds, the jumper To S206; if within 30s, the confirmation command triggered by the confirmation operation performed by the user is not received, and the process proceeds to S209;
  • the wireless router B confirms that the terminal A is legal and saves the S;
  • S207 The wireless router B verifies the SSID and the security key; if the verification passes, skips to S208; if the verification fails, the process ends;
  • the terminal is the terminal that the owner of the wireless router allows to access the wireless router. In this way, the validity of the terminal requesting access is confirmed by the confirmation key, which greatly improves the security and reliability of the wireless router and avoids the access of the illegal user. Improve the user experience.
  • an embodiment of the present invention provides a wireless router that is consistent with the wireless router described in one or more of the above embodiments.
  • the wireless router includes: a receiving unit 31 configured to receive a first wireless access request from a terminal, where the first wireless access The request carries the identification information that uniquely identifies the terminal.
  • the determining unit 32 is configured to determine that the terminal is the first access when the identification information is not found in the wireless router, and is configured to receive the confirmation key within the preset time. After confirming the acknowledgement command triggered by the operation, the terminal is confirmed to be legal; the storage unit 33 is configured to save the identifier information, wherein the identifier information is used to verify the validity of the terminal when the terminal requests access for the next time.
  • the determining unit 32 is further configured to determine that the terminal is illegal after determining that the terminal has not received the confirmation command triggered by the confirmation operation within the preset time after determining that the terminal is the initial access.
  • the wireless router may further include: an output unit configured to determine the order After the terminal determines that the terminal is the initial access, and before receiving the confirmation command triggered by the confirmation operation within the preset time, the prompt information is output to prompt the terminal to be the first access.
  • the receiving unit 31 is further configured to: after the storage unit saves the identifier information, receive a second radio access request from the terminal, where the second radio access request carries the identifier information; the confirming unit 32 is further configured When the identifier information is queried in the wireless router, it is determined that the terminal is not the first time to confirm that the terminal is legal.
  • the receiving unit 31, the determining unit 32, the storage unit 33 and the output unit may be disposed in a processor such as a CPU or an ARM in a wireless router, and may also be disposed in a single chip microcomputer, a system level chip or an embedded controller.
  • a processor such as a CPU or an ARM in a wireless router
  • the example is not specifically limited.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the device is implemented in a flow chart A function specified in a block or blocks of a process or multiple processes and/or block diagrams.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes a set of instructions, when executed, causing at least one processor to execute the foregoing authentication method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种鉴权方法,该方法应用于无线路由器,所述无线路由器上设置有确认键;所述方法包括:接收来自终端的第一无线接入请求,其中,所述第一无线接入请求中携带有唯一标识所述终端的标识信息;当在所述无线路由器中未查询到所述标识信息时,确定所述终端为首次接入;在预设时间内接收到对所述确认键的确认操作触发的确认指令后,确认所述终端合法,保存所述标识信息,其中,所述标识信息用于在所述终端下次请求接入时验证所述终端的合法性。本发明同时还公开了一种无线路由器及计算机存储介质。

Description

一种鉴权方法、无线路由器及计算机存储介质 技术领域
本发明涉及无线路由器领域,尤其涉及一种鉴权方法、无线路由器及计算机存储介质。
背景技术
在传统方式下,用户新建一个无线网络时,在无线接入点手动设置服务集标识(SSID,Service Set Identifier)和安全密钥,然后在基站设备上验证密钥,以阻止“不速之客”的闯入。
但目前WiFi破解横行,一些WIFI共享软件使得终端一旦接入无线路由器,接入身份验证信息都形同虚设,再次接入的时候无需再次对接入身份验证信息进行验证,很容易遭到非法用户接入。
所以,现有技术中并不存在一种安全可靠的接入无线路由器的方案。
发明内容
有鉴于此,本发明实施例期望提供一种鉴权方法、无线路由器及计算机存储介质。
为达到上述目的,本发明实施例的技术方案是这样实现的:
第一方面,本发明实施例提供一种鉴权方法,应用于无线路由器,所述无线路由器上设置有确认键;所述方法包括:接收来自终端的第一无线接入请求,其中,所述第一无线接入请求中携带有唯一标识所述终端的标识信息;当在所述无线路由器中未查询到所述标识信息时,确定所述终端为首次接入;在预设时间内接收到对所述确认键的确认操作触发的确认指令后,确认所述终端合法,保存所述标识信息;其中,所述标识信息用于 在所述终端下次请求接入时验证所述终端的合法性。
上述方案中,在确定所述终端为首次接入之后,所述方法还包括:在所述预设时间内未接收到所述确认操作触发的确认指令后,确定所述终端非法。
上述方案中,在确定所述终端为首次接入之后,且在所述在预设时间内接收到对所述确认键的确认操作触发的确认指令之前,所述方法还包括:输出提示信息,以提示用户进行所述确认操作。
上述方案中,在所述保存所述标识信息之后,所述方法还包括:接收来自所述终端的第二无线接入请求,其中,所述第二无线接入请求中携带有所述标识信息;当在所述无线路由器中查询到所述标识信息时,确定所述终端为非首次接入,以确认所述终端合法。
第二方面,本发明实施例提供一种无线路由器,包括:接收单元,配置为接收来自终端的第一无线接入请求,其中,所述第一无线接入请求中携带有唯一标识所述终端的标识信息;确定单元,配置为当在所述无线路由器中未查询到所述标识信息时,确定所述终端为首次接入;还配置为在预设时间内接收到对所述确认键的确认操作触发的确认指令后,确认所述终端合法;存储单元,配置为保存所述标识信息,其中,所述标识信息用于在所述终端下次请求接入时验证所述终端的合法性。
上述方案中,所述确定单元,还配置为在确定所述终端为首次接入之后,在所述预设时间内未接收到所述确认操作触发的确认指令后,确定所述终端非法。
上述方案中,所述无线路由器,还包括:输出单元,配置为在所述确定单元确定所述终端为初次接入之后,且在在所述预设时间内接收到所述确认操作触发的确认指令之前,输出提示信息,以提示用户进行所述确认操作。
上述方案中,所述接收单元,还配置为在所述存储单元保存所述标识信息之后,接收来自所述终端的第二无线接入请求,其中,所述第二无线接入请求中携带有所述标识信息;所述确认单元,还配置为当在所述无线路由器中查询到所述标识信息时,确定所述终端为非首次接入,以确认所述终端合法。
第三方面,本发明实施例提供一种计算机存储介质,计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行上述的鉴权方法。
本发明实施例提供的鉴权方法、无线路由器及计算机存储介质,无线路由器上设置有确认键;那么,无线路由器接收到来自终端的第一无线接入请求,该第一无线接入请求中携带有唯一标识终端的标识信息,无线路由器基于该标识信息可以确定终端为首次接入,接下来,在预设时间内,无线路由器接收到对上述确认键的确认操作触发的确认指令后,确认终端合法并保存该标识信息,那么,当终端下一次请求接入无线路由器时,无线路由器就可以根据该标识信息确认终端是否合法。由于无线路由器放置位置的限制,并不是所有人都能够靠近无线路由器,并对确认键进行操作的,一般能够靠近无线路由器并对确认键进行操作的大多为合法用户,那么,他们的终端也就是无线路由器的拥有者允许接入无线路由器的终端,这样,通过确认键来确认请求接入的终端的合法性,大大提高了无线路由器的安全可靠程度,避免非法用户的接入,提高用户体验。
附图说明
图1为本发明实施例中的鉴权方法的流程示意图;
图2为本发明实施例中的终端接入无线路由器的方法的流程示意图;
图3为本发明实施例中的无线路由器的结构示意图。
具体实施方式
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述。
本发明实施例提供一种鉴权方法,该方法应用于无线路由器,其中,无线路由器上设置有确认键,这里所说的确认键可以为物理实体按键,也可以为无线路由器的显示屏上所显示的确认提示界面中的虚拟按键,当然,还可以有其它确认键形式,本发明实施例不做具体限定。
在实际应用中,当确认键为物理实体按键时,有些无线路由器支持WiFi保护设置(WPS,WiFi Protected Setup)功能,那么,该确认键可以与WPS按键复用。
图1为本发明实施例中的鉴权方法的流程示意图,参考图1所示,该方法包括:
S101:接收来自终端的第一无线接入请求,其中,第一无线接入请求中携带有唯一标识终端的标识信息;
具体来说,当用户首次使用终端接入无线路由器时,终端可以向无线路由器发送能够唯一标识终端的标识信息。
实际应用时,标识信息可以为终端的物理网卡的MAC地址、网络端口号等标识信息,当然,还可以有其它形式,只要能够唯一地标识终端即可,本发明实施例不做具体限定。
在实际应用中,终端首次接入无线路由器时,用户需要输入SSID和/或安全密钥,那么,终端可以将SSID、安全密钥以及上述标识信息一同携带在第一无线接入请求中发送给无线路由器。
S102:当在无线路由器中未查询到标识信息时,确定终端为首次接入;
具体来说,当无线路由器接收到第一无线接入请求之后,可以解析出上述标识信息,然后,在无线路由器中查询是否保存有该标识信息。由于 终端为首次接入,无线路由器是没有保存该标识信息的,那么,当无线路由器未查询到标识信息时,确认该终端为首次接入。
在实际应用中,为了提示用户可以对确认键进行确认操作,在S102之后,该方法还包括:输出提示信息,以提示用户进行确认操作。
可选地,无线路由器可以以听觉提示或者视觉提示的方式输出提示信息,比如通过输出语音提示、输出提示声音、闪烁LED灯等方式输出提示信息。当然,还可以有其它输出提示信息的方式,本发明实施例不做具体限定。
S103:在预设时间内接收到对确认键的确认操作触发的确认指令后,确认终端合法,保存标识信息,其中,标识信息用于在终端下次请求接入时验证终端的合法性。
具体来说,当确认为终端为首次接入之后,用户可以手动按下无线路由器上的确认键,此时,在预设时间内,无线路由器接收到了由对确认键的确认操作触发的确认指令,就确认终端合法,并保存上述标识信息。
实际应用时,如果用户在预设时间段内没有进行确认操作,那么,在S102之后,该方法还可以包括:在预设时间内未接收到确认操作触发的确认指令后,确定终端非法。此时,无线路由器可以禁止该终端接入。
在实际应用中,上述预设时间可以取10s、30s、1min等,本领域技术人员可根据实际需要自行设置,本发明实施例不做具体限定。
至此,对于终端首次接入无线路由器进行鉴权流程就完成了。
那么,终端第二次或者第N次请求接入无线路由器时,在S103之后,该方法还可以包括:接收来自终端的第二无线接入请求,其中,第二无线接入请求中携带有标识信息;当在无线路由器中查询到标识信息时,确定终端为非首次接入,以确定终端合法;这里,N为大于等于2的整数。
具体来说,当终端再次接入无线路由器时,终端向无线路由器发送第 二无线接入请求,该请求中仍然携带有上述标识信息,然后,无线路由器查询是否存储有该标识信息,由于在上述终端首次接入无线路由器的过程中,无线路由器已经将终端的标识信息保存了,所以,无线路由器能够查询到终端的标识信息,此时,无线路由器就能够确定终端为非首次接入,进而确定终端合法。
实际应用时,终端在非首次接入无线路由器时,用户还是需要输入SSID和安全密钥,那么,终端可以将SSID、安全密钥以及上述标识信息一同携带在第二无线接入请求中发送给无线路由器。
在上述一个或者多个实施例中,当无线路由器在确认终端合法之后,无线路由器还可以对SSID和安全密钥进行验证,如果验证成功,终端正常接入无线路由器,如果验证失败,终端无法接入无线路由器。
下面对应用了上述一个或者多个实施例所述的鉴权方案的接入无线路由器的方法进行说明。
例如,终端A要接入无线路由器B。其中,唯一标识终端A的标识信息为S。
图2为本发明实施例中的终端接入无线路由器的方法的流程示意图,参考图2所示,该方法包括:
S201:无线路由器B接收来自终端A的携带有SSID、安全密钥及S的无线接入请求信息;
S202:无线路由器B在其内部查询是否存储有S;若是,跳至S204;若否跳至S203;
S203:无线路由器B确定终端A为首次接入;跳至S205;
S204:无线路由器B确定终端A为非首次接入;跳至S207;
S205:无线路由器B通过输出语音提示“请按下确认键”,来提示用户进行确认操作;若在30s内接收到用户进行的确认操作触发的确认指令,跳 至S206;若在30s内未接收到用户进行的确认操作触发的确认指令,跳至S209;
S206:无线路由器B确认终端A合法,并保存S;
S207:无线路由器B验证SSID及安全密钥;若验证通过,跳至S208;若验证失败,流程结束;
S208:无线路由器B与终端A连接,流程结束;
S209:无线路由器B确认终端A非法,流程结束。
由上述可知,因为无线路由器放置位置的限制,并不是所有人都能够靠近无线路由器,并对确认键进行操作的,一般能够靠近无线路由器并对确认键进行操作的大多为合法用户,那么,他们的终端也就是无线路由器的拥有者允许接入无线路由器的终端,这样,通过确认键来确认请求接入的终端的合法性,大大提高了无线路由器的安全可靠程度,避免非法用户的接入,提高用户体验。
基于同一发明构思,本发明实施例提供一种无线路由器,该无线路由器与上述一个或者多个实施例所述的无线路由器一致。
图3为本发明实施例中的无线路由器的结构示意图,参考图3所示,该无线路由器包括:接收单元31,配置为接收来自终端的第一无线接入请求,其中,第一无线接入请求中携带有唯一标识终端的标识信息;确定单元32,配置为当在无线路由器中未查询到标识信息时,确定终端为首次接入;还配置为在预设时间内接收到对确认键的确认操作触发的确认指令后,确认终端合法;存储单元33,配置为保存标识信息,其中,标识信息用于在终端下次请求接入时验证终端的合法性。
实际应用时,确定单元32,还配置为在确定终端为初次接入之后,在预设时间内未接收到确认操作触发的确认指令后,确定终端非法。
实际应用时,无线路由器,还可以包括:输出单元,配置为在确定单 元确定终端为初次接入之后,且在在预设时间内接收到确认操作触发的确认指令之前,输出提示信息,以提示终端为初次接入。
实际应用时,接收单元31,还配置为在存储单元保存标识信息之后,接收来自终端的第二无线接入请求,其中,第二无线接入请求中携带有标识信息;确认单元32,还配置为当在无线路由器中查询到标识信息时,确定终端为非首次接入,以确认终端合法。
上述接收单元31、确定单元32、存储单元33及输出单元均可以设置在无线路由器中的CPU、ARM等处理器中,还可以设置在单片机、系统级芯片或者嵌入式控制器中,本发明实施例不做具体限定。
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其它可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其它可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其它可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个 流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其它可编程数据处理设备上,使得在计算机或其它可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其它可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
基于此,本发明实施例还提供一种计算机存储介质,所述计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行上述的鉴权方法。
以上所述,仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。

Claims (9)

  1. 一种鉴权方法,应用于无线路由器,所述无线路由器上设置有确认键;所述方法包括:
    接收来自终端的第一无线接入请求,其中,所述第一无线接入请求中携带有唯一标识所述终端的标识信息;
    当在所述无线路由器中未查询到所述标识信息时,确定所述终端为首次接入;
    在预设时间内接收到对所述确认键的确认操作触发的确认指令后,确认所述终端合法,保存所述标识信息;其中,所述标识信息用于在所述终端下次请求接入时验证所述终端的合法性。
  2. 根据权利要求1所述的方法,其中,在确定所述终端为首次接入之后,所述方法还包括:
    在所述预设时间内未接收到所述确认操作触发的确认指令后,确定所述终端非法。
  3. 根据权利要求1所述的方法,其中,在确定所述终端为首次接入之后,且在所述在预设时间内接收到对所述确认键的确认操作触发的确认指令之前,所述方法还包括:
    输出提示信息,以提示用户进行所述确认操作。
  4. 根据权利要求1所述的方法,其中,在所述保存所述标识信息之后,所述方法还包括:
    接收来自所述终端的第二无线接入请求,其中,所述第二无线接入请求中携带有所述标识信息;
    当在所述无线路由器中查询到所述标识信息时,确定所述终端为非首次接入,以确认所述终端合法。
  5. 一种无线路由器,包括:
    接收单元,配置为接收来自终端的第一无线接入请求,其中,所述第一无线接入请求中携带有唯一标识所述终端的标识信息;
    确定单元,配置为当在所述无线路由器中未查询到所述标识信息时,确定所述终端为首次接入;还配置为在预设时间内接收到对所述确认键的确认操作触发的确认指令后,确认所述终端合法;
    存储单元,配置为保存所述标识信息,其中,所述标识信息用于在所述终端下次请求接入时验证所述终端的合法性。
  6. 根据权利要求5所述的无线路由器,其中,所述确定单元,还配置为在确定所述终端为首次接入之后,在所述预设时间内未接收到所述确认操作触发的确认指令后,确定所述终端非法。
  7. 根据权利要求5所述的无线路由器,其中,所述无线路由器,还包括:输出单元,配置为在所述确定单元确定所述终端为初次接入之后,且在在所述预设时间内接收到所述确认操作触发的确认指令之前,输出提示信息,以提示用户进行所述确认操作。
  8. 根据权利要求5所述的无线路由器,其中,所述接收单元,还配置为在所述存储单元保存所述标识信息之后,接收来自所述终端的第二无线接入请求,其中,所述第二无线接入请求中携带有所述标识信息;
    所述确认单元,还配置为当在所述无线路由器中查询到所述标识信息时,确定所述终端为非首次接入,以确认所述终端合法。
  9. 一种计算机存储介质,计算机存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行如权利要求1至4任一项所述的鉴权方法。
PCT/CN2015/076438 2014-09-26 2015-04-13 一种鉴权方法、无线路由器及计算机存储介质 WO2016045359A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US15/514,552 US20170223539A1 (en) 2014-09-26 2015-04-13 Authentication method, wireless router and computer storage medium
EP15844315.0A EP3200492A4 (en) 2014-09-26 2015-04-13 Authentication method, wireless router and computer storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410505901.6A CN104284332A (zh) 2014-09-26 2014-09-26 一种鉴权方法及无线路由器
CN201410505901.6 2014-09-26

Publications (1)

Publication Number Publication Date
WO2016045359A1 true WO2016045359A1 (zh) 2016-03-31

Family

ID=52258708

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/076438 WO2016045359A1 (zh) 2014-09-26 2015-04-13 一种鉴权方法、无线路由器及计算机存储介质

Country Status (4)

Country Link
US (1) US20170223539A1 (zh)
EP (1) EP3200492A4 (zh)
CN (1) CN104284332A (zh)
WO (1) WO2016045359A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045692A1 (zh) * 2016-09-12 2018-03-15 中兴通讯股份有限公司 一种网络接入的方法、装置及系统
CN115102712A (zh) * 2022-05-17 2022-09-23 刘勇 一种增强的终端标识的方法、装置、电子设备及储存介质

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104284332A (zh) * 2014-09-26 2015-01-14 中兴通讯股份有限公司 一种鉴权方法及无线路由器
CN104796896B (zh) * 2015-04-29 2019-04-12 北京奇艺世纪科技有限公司 一种无线网络授权访问的方法、装置及系统
CN105721690A (zh) * 2016-01-27 2016-06-29 太仓市同维电子有限公司 一种手机App切换AP工作模式的方法
CN105812270A (zh) * 2016-03-09 2016-07-27 联想(北京)有限公司 一种信息处理方法和无线路由设备
CN108811043B (zh) * 2017-04-27 2022-06-10 中兴通讯股份有限公司 接入设备、认证服务器、终端设备接入控制方法及系统
CN107454001A (zh) * 2017-07-10 2017-12-08 魏喜荣 一种具备语音提醒和检测功能的路由器
CN108924839A (zh) * 2018-06-12 2018-11-30 上海康斐信息技术有限公司 一种基于wps的认证方法及智能设备及无线路由器及系统
CN110443990A (zh) * 2019-07-13 2019-11-12 恒大智慧科技有限公司 一种路由器及其防丢方法、计算机可读存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103079200A (zh) * 2011-10-26 2013-05-01 国民技术股份有限公司 一种无线接入的认证方法、系统及无线路由器
CN103188680A (zh) * 2011-12-28 2013-07-03 中国移动通信集团广东有限公司 无线网络的接入方法、装置与dhcp服务端
CN103796204A (zh) * 2012-11-02 2014-05-14 国基电子(上海)有限公司 使用按钮设置无线局域网的系统和方法
CN104284332A (zh) * 2014-09-26 2015-01-14 中兴通讯股份有限公司 一种鉴权方法及无线路由器

Family Cites Families (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003050641A (ja) * 2001-08-07 2003-02-21 Nec Corp プログラム管理システム、そのプログラム管理方法、及び情報管理プログラム
JP3691464B2 (ja) * 2002-07-30 2005-09-07 Tdk株式会社 無線アクセスポイント
JP2004343448A (ja) * 2003-05-15 2004-12-02 Matsushita Electric Ind Co Ltd 無線lanアクセス認証システム
DE102006008745A1 (de) * 2005-11-04 2007-05-10 Siemens Ag Verfahren und Server zum Bereitstellen eines Mobilitätsschlüssels
KR101223235B1 (ko) * 2006-11-16 2013-01-17 삼성전자주식회사 무선랜 단말의 와이브로 네트워크 연동 방법 및 그 시스템
KR100907507B1 (ko) * 2007-03-05 2009-07-14 삼성전자주식회사 무선 랜 단말의 bwa 네트워크 연동시 사용자 인증 방법및 그 시스템
US8769611B2 (en) * 2007-05-31 2014-07-01 Qualcomm Incorporated Methods and apparatus for providing PMIP key hierarchy in wireless communication networks
US9775096B2 (en) * 2007-10-08 2017-09-26 Qualcomm Incorporated Access terminal configuration and access control
EP2053886A3 (en) * 2007-10-26 2015-03-25 Hitachi, Ltd. Communication system and gateway apparatus
GB2459435A (en) * 2008-04-02 2009-10-28 Vodafone Plc Telecommunications network
WO2011124853A1 (fr) * 2010-04-08 2011-10-13 France Telecom Procede de controle d'un point d'acces d'une passerelle domestique d'un reseau domestique
CN101895962A (zh) * 2010-08-05 2010-11-24 华为终端有限公司 Wi-Fi接入方法、接入点及Wi-Fi接入系统
US8869248B2 (en) * 2010-08-16 2014-10-21 Blackberry Limited Communication system providing wireless authentication for private data access and related methods
KR101720043B1 (ko) * 2010-11-25 2017-03-28 에스케이텔레콤 주식회사 무선랜 환경에서의 인증 시스템 및 그 방법
US9462466B2 (en) * 2011-09-29 2016-10-04 Israel L'Heureux Gateway router supporting session hand-off and content sharing among clients of a local area network
CN103166931A (zh) * 2011-12-15 2013-06-19 华为技术有限公司 一种安全传输数据方法,装置和系统
CN103475667A (zh) * 2013-09-24 2013-12-25 小米科技有限责任公司 一种控制访问路由器的方法、装置及系统
FR3015168A1 (fr) * 2013-12-12 2015-06-19 Orange Procede d'authentification par jeton

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103079200A (zh) * 2011-10-26 2013-05-01 国民技术股份有限公司 一种无线接入的认证方法、系统及无线路由器
CN103188680A (zh) * 2011-12-28 2013-07-03 中国移动通信集团广东有限公司 无线网络的接入方法、装置与dhcp服务端
CN103796204A (zh) * 2012-11-02 2014-05-14 国基电子(上海)有限公司 使用按钮设置无线局域网的系统和方法
CN104284332A (zh) * 2014-09-26 2015-01-14 中兴通讯股份有限公司 一种鉴权方法及无线路由器

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP3200492A4 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045692A1 (zh) * 2016-09-12 2018-03-15 中兴通讯股份有限公司 一种网络接入的方法、装置及系统
CN107820251A (zh) * 2016-09-12 2018-03-20 中兴通讯股份有限公司 一种网络接入的方法、装置及系统
CN115102712A (zh) * 2022-05-17 2022-09-23 刘勇 一种增强的终端标识的方法、装置、电子设备及储存介质
CN115102712B (zh) * 2022-05-17 2024-04-16 刘勇 一种增强的终端标识的方法、装置、电子设备及储存介质

Also Published As

Publication number Publication date
US20170223539A1 (en) 2017-08-03
EP3200492A4 (en) 2017-10-25
EP3200492A1 (en) 2017-08-02
CN104284332A (zh) 2015-01-14

Similar Documents

Publication Publication Date Title
WO2016045359A1 (zh) 一种鉴权方法、无线路由器及计算机存储介质
EP3550783B1 (en) Internet of things device burning verification method and apparatus
TWI706262B (zh) 帳戶登錄方法、設備和伺服器
EP3346660B1 (en) Authentication information update method and device
US10460309B2 (en) Payment verification method, apparatus and system
TWI679550B (zh) 帳號登入方法及裝置
JP6574168B2 (ja) 端末識別方法、ならびにマシン識別コードを登録する方法、システム及び装置
TWI528301B (zh) 操作處理方法和裝置
WO2015062461A1 (en) Method and system for verifying user identity of an online application
WO2013097588A1 (zh) 应用程序登录方法、装置和移动终端
TW201737140A (zh) 判定認證能力之查詢系統及方法
TW201510761A (zh) 下載以及安裝客戶端的方法和設備
CN106357694B (zh) 一种访问请求处理方法及装置
TW201516910A (zh) 業務認證方法、系統及伺服器
WO2014183704A1 (zh) 一种软件注册的控制方法、认证服务器及终端
JP2012191270A (ja) 認証システム、端末装置、認証サーバ、およびプログラム
JP2020510924A5 (zh)
CN110661779A (zh) 基于区块链网络的电子证件管理方法、系统、设备及介质
WO2016150034A1 (zh) 一种虚拟sim卡的管理方法、装置和系统
JP2011523481A5 (zh)
WO2022105365A1 (zh) 设备控制的方法及系统、电子设备、及存储介质
US8819427B2 (en) Device specific secure licensing
CN104392168A (zh) 一种应用程序的验证方法
CN104349318A (zh) 无线局域网的自动认证方法、装置和系统
TW201430608A (zh) 單點登入系統及方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15844315

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 15514552

Country of ref document: US

REEP Request for entry into the european phase

Ref document number: 2015844315

Country of ref document: EP