WO2017054517A1 - 控制设备接入的方法、装置、接入网络的方法和电子设备 - Google Patents

控制设备接入的方法、装置、接入网络的方法和电子设备 Download PDF

Info

Publication number
WO2017054517A1
WO2017054517A1 PCT/CN2016/086016 CN2016086016W WO2017054517A1 WO 2017054517 A1 WO2017054517 A1 WO 2017054517A1 CN 2016086016 W CN2016086016 W CN 2016086016W WO 2017054517 A1 WO2017054517 A1 WO 2017054517A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital certificate
electronic device
access
network
valid
Prior art date
Application number
PCT/CN2016/086016
Other languages
English (en)
French (fr)
Inventor
王兵
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2017054517A1 publication Critical patent/WO2017054517A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • the present application relates to, but is not limited to, the field of electronic technologies, and in particular, to a method, an apparatus, a method for accessing a network, and an electronic device for controlling device access.
  • wireless LAN With the maturity of wireless fidelity WIFI technology, wireless LAN has largely replaced wired LAN. But there are exceptions. Many information technology IT companies still use wired LANs. This is mainly because of the concern that wireless devices outside the office area are connected to the wired LAN, which affects information security.
  • the current password and other authentication methods can only determine whether the device is allowed to access, and the coverage area of the access point is treated equally, and the device cannot be authenticated for the device.
  • the embodiments of the present invention provide a method, an apparatus, a method for accessing a network, and an electronic device, which can solve the current authentication method such as a password, and can only determine whether the device is allowed to access, and cannot target the area. The problem with the device performing permission verification.
  • a method of controlling device access includes:
  • the electronic device If it is detected that the electronic device enters the detection area, the electronic device is allowed to access the network.
  • allowing the electronic device to access the network includes:
  • the electronic device is denied access to the network.
  • the method further includes:
  • the digital certificate is delivered to the electronic device.
  • the verifying whether the digital certificate is valid includes:
  • Verifying by using a preset key, whether the signature information in the digital certificate is valid;
  • allowing the electronic device to access includes:
  • the electronic device If it is verified that the signature information in the digital certificate is valid, the electronic device is allowed to access.
  • allowing the electronic device to access includes:
  • the electronic device If the generated identification code matches the identification code pre-stored in the digital certificate, the electronic device is allowed to access.
  • the method further includes:
  • the digital certificate of the electronic device is logged off.
  • the method further includes:
  • the electronic device If the electronic device does not enter the detection area, the electronic device is denied access to the network.
  • a method of accessing a network comprising:
  • the method further includes:
  • the digital certificate is stored in a designated storage space.
  • a device for controlling device access comprising: a detection module and a processing module.
  • the detecting module is configured to detect whether the electronic device enters the detection area.
  • the processing module if it is detected that the electronic device enters the detection area, allows the electronic device to access the network; if it is detected that the electronic device does not enter the detection area, the electronic device is denied access to the network.
  • allowing the electronic device to access the network includes: acquiring the electronic device if the electronic device is detected to enter the detection area a digital certificate in the device; verifying whether the digital certificate is valid; allowing the electronic device to access the network if it is verified that the digital certificate is valid; rejecting the electronic device access if it is verified that the digital certificate is invalid The internet.
  • the device further includes: an obtaining module, a certificate generating module, and a sending module.
  • An obtaining module configured to acquire, before the processing module acquires the digital certificate in the device, identifier information of the electronic device in the detection range, where the identifier information is used Uniquely identifies the electronic device.
  • a certificate generating module configured to generate the digital certificate according to the identifier information, and add signature information to the digital certificate, where the signature information is used to identify a valid digital certificate.
  • the issuing module is configured to deliver the digital certificate to the electronic device.
  • the processing module verifying whether the digital certificate is valid includes:
  • the preset key is used to verify whether the signature information in the digital certificate is valid.
  • the processing module if it is verified that the digital certificate is valid, allowing the electronic device to access includes:
  • the electronic device If it is verified that the signature information in the digital certificate is valid, the electronic device is allowed to access.
  • the processing module if it is verified that the signature information in the digital certificate is valid, allowing the electronic device to access, if the verification of the signature information in the digital certificate is valid, acquiring the electronic
  • the identification information of the device is generated according to the identifier information, and the generated identification code is matched with the identifier code pre-stored in the digital certificate; if the generated identification code matches the identifier code pre-stored in the digital certificate, The electronic device is then allowed to access.
  • the detecting module is further configured to:
  • the processing module After the processing module allows the electronic device to access, it is detected whether the electronic device leaves the detection range, or whether the access time of the electronic device exceeds a valid duration set in the digital certificate.
  • the digital certificate of the electronic device is logged off.
  • processing module is further configured to:
  • the electronic device If the electronic device does not enter the detection area, the electronic device is denied access to the network.
  • An electronic device includes: a reporting module and an execution module.
  • the reporting module is configured to report the digital certificate stored by the network server to the network server when the triggering instruction is received, where the triggering instruction is an instruction received when the electronic device enters the detection area.
  • the execution module is configured to receive response information of the network server about the digital certificate, and access the network according to the response information.
  • the reporting module is further configured to: before the reporting module reports the digital certificate stored by the reporting server to the network server, when the instruction for reporting the identification information is received, the identification information of the identity is reported.
  • the execution module is further configured to receive the digital certificate generated by the network server according to the identification information; and store the digital certificate in a specified storage space.
  • a computer readable storage medium storing computer executable instructions that, when executed by a processor, implement the method of controlling device access and the method of accessing the network.
  • the access server may detect whether the electronic device enters the detection area, and if the electronic device detects that the electronic device enters the detection area, allows the electronic device to access the network, if it detects that the electronic device does not enter the network device. In the detection area, the access server will refuse to access the network of the device, so as to determine whether the electronic device is allowed to access according to whether the electronic device is in the detection area, thereby implementing a network access mode for authenticating the electronic device for a specific area. Improve the security of the network.
  • the access server after the electronic device enters the detection area, the access server generates a digital certificate according to the identification information of the electronic device, and sends the digital certificate to the corresponding electronic device, so that the electronic device enters the detection area.
  • the network certificate can be accessed according to the digital certificate, and the digital certificate is revoked when the electronic device leaves the detection area, so that the electronic device outside the detection area is prevented from accessing the network, thus fully ensuring that the network in the detection area is effectively utilized, and the detection is also ensured. The security of the network within the area.
  • FIG. 1 is a flowchart of a method for controlling device access according to an embodiment of the present invention
  • FIG. 2 is a flowchart of a method for accessing a network according to an embodiment of the present invention
  • FIG. 3 is a schematic structural diagram of an apparatus for controlling a device to access according to an embodiment of the present invention
  • FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
  • Embodiment 1 is a diagrammatic representation of Embodiment 1:
  • the embodiment of the present invention provides a method for controlling device access, and the method includes: detecting the electronic device (hereinafter referred to as Whether the device enters the detection area. If it detects that the device enters the detection area, it allows the device to access the network. If it detects that the device does not enter the detection area, it denies the device access to the network.
  • the detection area here includes the detection area. And detecting area boundaries. In this way, the network access mode for authenticating the device for a specific area is realized, and the security of the network is improved.
  • FIG. 1 is a flowchart of a method for accessing a control device according to an embodiment of the present invention, where the method includes steps S101-S103:
  • S102 If it is detected that the device enters the detection area, S102 is performed; if it is detected that the device does not enter the detection area, S103 is performed.
  • the foregoing method may be applied to an access server.
  • a detection device for detecting a distance may be set on the access server, and the detecting device may detect between the device and the access server.
  • Distance of course, the detection device can also be set in other bits
  • the detection device needs to be connected to the access server, so that the detecting device for detecting the distance can send a signal to the access server.
  • the detecting device detects whether the device enters the detection area by detecting the distance. If the detecting device detects that the device enters the detection area, the detecting device triggers the access server to allow the device to access the network; if the detecting device does not When the device is detected to enter the detection area, the detection device will not trigger the access server, and the access server will refuse the device to access the network.
  • the detecting device can also obtain the identification information of the device, and the identification information can be the media access control MAC address of the device or the hard disk information, etc., if The device enters the detection area, and the identification information of the device is transmitted to the access server, so that the access server can determine that the corresponding device is allowed to access. If the identification information of the device does not exist in the access server, The device will be denied access to the network.
  • the device determining the device inside and outside the detection area is implemented, so as to determine whether the device is allowed to access according to whether the device is in the detection area, thereby implementing a network access mode for authenticating the device for a specific area, and improving the network. Security.
  • the detecting device in order to enter the permission verification for ensuring access to the device, in the embodiment of the present invention, if a certain device enters the detection area, the detecting device can detect the device.
  • the detecting device may be a scanning device installed at the door of the Baogong Building, or other sensor device capable of detecting the distance, so that the detecting device can detect the approaching device when the device is approaching.
  • the detecting device When the detecting device detects that a device is in proximity, the detecting device acquires the identification information of the device in the detection scope, and the identification information is used to uniquely identify the device, where the identification information may be the SIM card information of the device identification module of the device, A combination of CPU information, hard disk information, CPU production date information, hard disk production date information, or a combination of information.
  • the access server obtains the identification information by using the detecting device, and the access server generates a digital certificate according to the obtained identification information, and signs the digital certificate, so that valid signature information exists on the digital certificate.
  • the access server is generating When the digital certificate is used, the access server generates an identification code based on the identification information.
  • the obtained identification information may be subjected to a message digest algorithm (English: Message Digest Algorithm, MD5 for short) to obtain an MD5 code.
  • MD5 Message Digest Algorithm
  • the access server then adds the MD5 code to the digital certificate. In this way, it is possible to determine whether the device fraudulently uses a digital certificate according to the MD5 code during verification.
  • the access server when the access server signs the digital certificate, the access server adds a valid time to the digital certificate, that is, the digital certificate starts from the generation, the digital certificate Will expire after a certain time, for example, the digital certificate is valid for 2 hours, then the digital certificate will expire after 2 hours of generation. This can avoid the waste of network resources and also ensure network security.
  • the access server After the device enters the detection area, and the access server generates the digital certificate, the access server sends the digital certificate to the device, and the access server can deliver the generated digital certificate to the corresponding identification information according to the obtained identification information. device of.
  • the access server will obtain the digital certificate of the device, and then the access server will verify whether the digital certificate is valid.
  • the verification process is as follows:
  • the electronic device obtains the signature information in the number, and then verifies whether the signature information in the digital certificate is valid based on the preset secret key, and if the signature information in the verification digital certificate is valid, the device is allowed to access; if the digital certificate is verified When the signature information is invalid, the device access will be denied.
  • the MD5 code in the digital certificate is parsed, and then the identification information of the device is obtained, based on the identifier of the device.
  • the information regenerates an MD5 code, and matches the newly generated MD5 code with the MD5 code in the digital certificate. If the newly generated MD5 code matches the MD5 code in the digital certificate, it is determined that the digital certificate is valid, if the newly generated MD5 is valid. When the code does not match the MD5 code in the digital certificate, it is determined that the digital certificate is fraudulent and it is determined that the digital certificate is invalid.
  • the matching of the MD5 code can ensure the security of the digital certificate and the security of the entire network.
  • the matching refers to the identical or similarity reaching a preset similar threshold, such as 90%, 95%.
  • the access server since the effective time can be added in the process of generating the digital certificate, when the access server verifies the validity of the digital certificate, the access server obtains the effective duration in the digital certificate. If the duration of use of the digital certificate exceeds the effective duration, the access server will determine that the digital certificate is an invalid digital certificate, if the duration of use of the digital certificate is Within the validity period, the access server will determine that the digital certificate is a valid digital certificate.
  • the access server determines whether to allow the device to access by acquiring the digital certificate of the device in the specified area, and determining the validity of the digital certificate, thereby implementing the authority verification for the different regional devices. The security of the network.
  • the access server determines that the digital certificate of the device is valid
  • the access server will pass through the device.
  • the identification information determines the digital certificate corresponding to the device, and then the access server will log out the digital certificate, so that the device outside the detection area will not be able to access the network, thereby ensuring that the network resources are not maliciously used by other devices, thereby improving the The stability and security of the network.
  • the access server detects that the validity period of the digital certificate in the device exceeds the set duration.
  • the access server will also log out the digital certificate, which can control the authority of the digital certificate, and can cancel the invalid digital certificate in time, which not only ensures the utilization of the digital certificate, but also improves the network security.
  • the access server after the access server enters the detection area, the access server generates a digital certificate according to the identification information of the device, and sends the digital certificate to the corresponding device, so as to enter the detection area.
  • the device can access the network according to the digital certificate, and the digital certificate is revoked when the device leaves the detection area, so as to avoid the device outside the detection area from accessing the network, thus fully ensuring that the network in the detection area is effectively utilized, and the detection is also ensured. The security of the network within the area.
  • Embodiment 2 is a diagrammatic representation of Embodiment 1:
  • FIG. 2 is a flowchart of a method for accessing a network according to an embodiment of the present invention, where the method includes steps S201-S202:
  • S201 When receiving the triggering instruction, report the digital certificate stored by the network server to the network server.
  • the triggering command is an instruction received when the electronic device enters the detection area.
  • the detection area when the electronic device enters a detection area, the detection area may be a detection area described in an embodiment, and may also be another specified detection area, when the electronic device enters the detection area.
  • the electronic device receives the instruction to report the identification information, and the electronic device reports the identification information of the electronic device based on the instruction, where the identifier may also be the identification information described in the first embodiment.
  • the network server After the electronic device reports its own identification information, the network server generates a digital certificate based on the identification information of the electronic device.
  • the implementation process of the network server to generate the digital certificate has been described in detail in the first embodiment, and details are not described herein again.
  • the network server After the network server generates a digital certificate corresponding to the electronic device, the network server delivers the digital certificate to the electronic device.
  • the electronic device After the electronic device receives the digital certificate issued by the network server, the electronic device stores the digital certificate in the designated storage space.
  • the electronic device when the electronic device enters an area that can access the network, that is, the area covered by the network server, the electronic device receives the triggering instruction, and the electronic device reports the digital certificate stored by the electronic server to the network server. After the server receives the digital certificate reported by the electronic device, the network server verifies the digital certificate.
  • the verification process is described in detail in the first embodiment, and details are not described herein again.
  • the network server When the digital certificate verification of the electronic device by the network server is passed, it may also be that when the digital certificate verification is valid, the network server will allow the electronic device to access the network.
  • the network server will reject the electronic device from accessing the network.
  • the method can enable the electronic device to selectively access the network for the area, so that not only the security of the access network but also the security of the electronic device itself can be improved.
  • the electronic device can also be more targeted to the network.
  • Embodiment 3 is a diagrammatic representation of Embodiment 3
  • FIG. 3 is a device for accessing the control device according to the embodiment of the present invention.
  • the device structure diagram includes: a detection module 301 and a processing module 302.
  • the detecting module 301 is configured to detect whether the electronic device enters the detection area.
  • the processing module 302 is configured to allow the electronic device to access the network if it is detected that the electronic device enters the detection area.
  • the processing module 302 if it is detected that the electronic device enters the detection area, allowing the electronic device to access the network includes: if detecting that the device enters the detection Within the area, obtaining a digital certificate in the electronic device; verifying whether the digital certificate is valid; if it is verified that the digital certificate is valid, allowing the device to access the network; if it is verified that the digital certificate is invalid, The electronic device (hereinafter referred to as a device) is denied access to the network.
  • the device further includes: an obtaining module, a certificate generating module, and a sending module.
  • an obtaining module configured to acquire, after the processing module acquires the digital certificate in the device, identifier information of the device in the detection range, where the identifier information is used to uniquely identify the device.
  • a certificate generating module configured to generate the digital certificate according to the identifier information, and add signature information to the digital certificate, where the signature information is used to identify a valid digital certificate.
  • the issuing module is configured to deliver the digital certificate to the device.
  • the processing module verifying whether the digital certificate is valid includes:
  • the preset key is used to verify whether the signature information in the digital certificate is valid.
  • the processing module if it is verified that the digital certificate is valid, allowing the electronic device to access includes:
  • the electronic device If it is verified that the signature information in the digital certificate is valid, the electronic device is allowed to access.
  • the processing module 302 if the digital certificate is verified When the signature information in the book is valid, allowing the electronic device to access includes: if it is verified that the signature information in the digital certificate is valid, acquiring the identification information of the device; and generating an identification code according to the identification information; And matching the generated identification code with the identification code pre-stored in the digital certificate; if the generated identification code matches the identification code pre-stored in the digital certificate, the device is allowed to access.
  • the detecting module is further configured to:
  • the processing module After the processing module allows the electronic device to access, it is detected whether the electronic device leaves the detection range, or whether the access time of the electronic device exceeds a valid duration set in the digital certificate.
  • the digital certificate of the electronic device is logged off.
  • processing module is further configured to:
  • the electronic device If the electronic device does not enter the detection area, the electronic device is denied access to the network.
  • Embodiment 4 is a diagrammatic representation of Embodiment 4:
  • FIG. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, where the electronic device includes : Reporting module 401 and execution module 402.
  • the reporting module 401 is configured to report the digital certificate stored by the network server to the network server when the triggering instruction is received.
  • the triggering command is an instruction received when the electronic device enters the detection area.
  • the executing module 402 is configured to receive response information of the network server about the digital certificate, and access the network according to the response information.
  • the reporting module 401 is further configured to report the identity information of the device when the reporting module reports the digital certificate stored by the reporting server to the network server.
  • the executing module 402 is further configured to receive the digital certificate generated by the network server according to the identifier information, and store the digital certificate in a specified storage space.
  • a computer readable storage medium storing computer executable instructions, the computer being executable A method of implementing said control device access when said row instructions are executed by a processor and said method of accessing a network.
  • all or part of the steps of the above embodiments may also be implemented by using an integrated circuit. These steps may be separately fabricated into individual integrated circuit modules, or multiple modules or steps may be fabricated into a single integrated circuit module. achieve.
  • the devices/function modules/functional units in the above embodiments may be implemented by a general-purpose computing device, which may be centralized on a single computing device or distributed over a network of multiple computing devices.
  • the device/function module/functional unit in the above embodiment When the device/function module/functional unit in the above embodiment is implemented in the form of a software function module and sold or used as a stand-alone product, it can be stored in a computer readable storage medium.
  • the above mentioned computer readable storage medium may be a read only memory, a magnetic disk or an optical disk or the like.
  • the access server may detect whether the electronic device enters the detection area, and if the electronic device detects that the electronic device enters the detection area, allows the electronic device to access the network, if it detects that the electronic device does not enter the network device. In the detection area, the access server will refuse to access the network of the device, so as to determine whether the electronic device is allowed to access according to whether the electronic device is in the detection area, thereby implementing a network access mode for authenticating the electronic device for a specific area. Improve the security of the network.
  • the access server After the electronic device enters the detection area, the access server generates a digital certificate according to the identification information of the electronic device, and sends the digital certificate to the corresponding electronic device, so that the electronic device entering the detection area can access the network according to the digital certificate. And when the electronic device leaves the detection area, the digital certificate is cancelled, and the electronic device outside the detection area is prevented from accessing the network, thereby fully ensuring that the network in the detection area is effectively utilized, and also ensuring the security of the network in the detection area. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种控制设备接入的方法、装置、接入网络的方法和电子设备,该控制设备接入的方法包括:检测电子设备是否进入到检测区域内,如果检测到电子设备进入到检测区域内,则允许电子设备接入网络。

Description

控制设备接入的方法、装置、接入网络的方法和电子设备 技术领域
本申请涉及但不限于电子技术领域,尤其涉及一种控制设备接入的方法、装置、接入网络的方法和电子设备。
背景技术
随着无线保真WIFI技术的成熟,无线局域网在很大程度上代替了有线局域网。但是也有例外,很多信息技术IT公司内部依然使用有线局域网。这主要是因为担心办公区域外的无线设备接入有线局域网,影响信息安全。
目前对接入点认证有很多验证方法,比如说通过秘钥验证或者是通过媒体访问控制(英文:Media Access Control,简称MAC)地址验证,通过秘钥可以较为直接的进行安全验证。
但是目前的密码等验证方式,只能确定设备是否被允许接入,对接入点覆盖区域都一视同仁,并不能针对区域对设备进行权限验证。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为了限制权利要求的保护范围。
本发明实施例提供了一种控制设备接入的方法、装置、接入网络的方法和电子设备,相关能够解决目前的密码等验证方式,只能确定设备是否被允许接入,不能针对区域对设备进行权限验证的问题。
一种控制设备接入的方法,包括:
检测电子设备是否进入到检测区域内;
如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络。
可选地,如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络包括:
如果检测到所述电子设备进入到检测区域内,则获取所述电子设备中的 数字证书;
验证所述数字证书是否有效;
如果验证出所述数字证书有效,则允许所述电子设备接入网络;
如果验证出所述数字证书无效,则拒绝所述电子设备接入网络。
可选地,所述方法还包括:
在获取所述电子设备中的数字证书之前,获取在所述检测范围内的所述电子设备的标识信息,其中,所述标识信息用于唯一标识所述电子设备;
根据所述标识信息,生成所述数字证书,并在所述数字证书中添加签名信息,其中,所述签名信息用于标识有效的数字证书;
将所述数字证书下发至所述电子设备。
可选地,所述验证所述数字证书是否有效包括:
获取所述数字证书中的签名信息;
采用预设秘钥验证所述数字证书中的签名信息是否有效;
所述如果验证出所述数字证书有效,则允许所述电子设备接入包括:
如果验证出所述数字证书中的签名信息有效,则允许所述电子设备接入。
可选地,所述如果验证出所述数字证书中的签名信息有效,则允许所述电子设备接入包括:
如果验证出所述数字证书中的签名信息有效,获取所述电子设备的标识信息;
根据所述标识信息,生成标识码;
将生成的标识码与所述数字证书中预存的标识码进行匹配;
如果生成的标识码与所述数字证书中预存的标识码匹配,则允许所述电子设备接入。
可选地,所述方法还包括:
在允许所述电子设备接入之后,检测所述电子设备是否离开所述检测范围,或者检测所述电子设备的接入时间是否超过数字证书中设定的有效时长;
如果所述电子设备已离开所述检测范围,或者所述电子设备的接入时间已超过数字证书中设定的有效时长,则注销所述电子设备的所述数字证书。
可选地,所述方法还包括:
如果所述电子设备未进入到检测区域,则拒绝所述电子设备接入网络。
一种接入网络的方法,所述方法包括:
在接收到触发指令时,向网络服务器上报自身存储的数字证书,其中,所述触发指令为电子设备进入到检测区域内时接收到的指令;
接收网络服务器关于数字证书的响应信息,并根据所述响应信息接入网络。
可选地,所述方法还包括:
在向网络服务器上报自身存储的数字证书之前,在接收到上报标识信息的指令时,上报自身的标识信息;
接收网络服务器根据所述标识信息生成的所述数字证书;
将所述数字证书存储在指定存储空间内。
一种控制设备接入的装置,所述装置包括:检测模块和处理模块。
检测模块,设置为检测电子设备是否进入到检测区域。
处理模块,如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络;如果检测到所述电子设备未进入到检测区域内,则拒绝所述电子设备接入网络。
可选地,所述处理模块如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络包括:如果检测到所述电子设备进入到检测区域内,则获取所述电子设备中的数字证书;验证所述数字证书是否有效;如果验证出所述数字证书有效,则允许所述电子设备接入网络;如果验证出所述数字证书无效,则拒绝所述电子设备接入网络。
可选地,所述装置还包括:获取模块、证书生成模块和下发模块。
获取模块,设置为在所述处理模块获取所述设备中的数字证书之前,获取在所述检测范围内的所述电子设备的标识信息,其中,所述标识信息用于 唯一标识所述电子设备。
证书生成模块,设置为根据所述标识信息,生成所述数字证书,并在所述数字证书中添加签名信息,其中,所述签名信息用于标识有效的数字证书。
下发模块,设置为将所述数字证书下发至所述电子设备。
可选地,
所述处理模块验证所述数字证书是否有效包括:
获取所述数字证书中的签名信息。
采用预设秘钥验证所述数字证书中的签名信息是否有效。
所述处理模块如果验证出所述数字证书有效,则允许所述电子设备接入包括:
如果验证出所述数字证书中的签名信息有效时,则允许所述电子设备接入。
可选地,所述处理模块如果验证出所述数字证书中的签名信息有效时,则允许所述电子设备接入包括:如果验证出所述数字证书中的签名信息有效,则获取所述电子设备的标识信息;根据所述标识信息,生成标识码;将生成的标识码与所述数字证书中预存的标识码进行匹配;如果生成的标识码与所述数字证书中预存的标识码匹配,则允许所述电子设备接入。
可选地,所述检测模块还设置为:
在所述处理模块允许所述电子设备接入之后,检测所述电子设备是否离开所述检测范围,或者检测所述电子设备的接入时间是否超过数字证书中设定的有效时长。
如果所述电子设备已离开所述检测范围,或者所述电子设备的接入时间已超过数字证书中设定的有效时长,则注销所述电子设备的所述数字证书。
可选地,所述处理模块还设置为:
如果所述电子设备未进入到所述检测区域,则拒绝所述电子设备接入网络。
一种电子设备,包括:上报模块和执行模块。
上报模块,设置为在接收到触发指令时,向网络服务器上报自身存储的数字证书,其中,所述触发指令为电子设备进入到检测区域内时接收到的指令。
执行模块,设置为接收网络服务器关于数字证书的响应信息,并根据所述响应信息接入网络。
可选地,所述上报模块,还设置为在所述上报模块向网络服务器上报自身存储的数字证书之前,在接收到上报标识信息的指令时,上报自身的标识信息。
所述执行模块,还设置为接收网络服务器根据所述标识信息生成的所述数字证书;将所述数字证书存储在指定存储空间内。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现所述的控制设备接入的方法以及所述的接入网络的方法。
本发明实施例的技术方案中,接入服务器可以检测电子设备是否进入到检测区域内,如果检测到电子设备进入到检测区域内,则允许电子设备接入网络,如果检测到电子设备未进入到检测区域内,则接入服务器将拒绝该设备接入网络,从而针对电子设备是否处于检测区域内来确定是否允许电子设备接入,进而实现了针对特定区域对电子设备进行权限验证的入网方式,提升了网络的安全性。
本发明实施例的技术方案中在电子设备进入到检测区域之后,接入服务器将根据电子设备的标识信息生成数字证书,并将数字证书下发至对应电子设备,从而使得进入检测区域的电子设备能够根据数字证书接入网络,并在电子设备离开检测区域时注销数字证书,避免检测区域外的电子设备接入网络,这样充分保证了检测区域内的网络被有效的利用,并且也保证了检测区域内的网络的安全性。
附图概述
图1为本发明实施例中一种控制设备接入的方法的流程图;
图2为本发明实施例中一种接入网络的方法的流程图;
图3为本发明实施例中一种控制设备接入的装置的结构示意图;
图4为本发明实施例中一种电子设备的结构示意图。
本发明的实施方式
下文中将结合附图对本发明的实施例进行详细说明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互任意组合。
实施例一:
为了解决相关技术中接入点覆盖区域都一视同仁,并不能针对区域对设备进行权限验证的问题,本发明实施例提供了一种控制设备接入的方法,该方法包括:检测电子设备(以下简称设备)是否进入到检测区域,如果检测到设备进入到检测区域时,允许设备接入网络,如果检测到设备未进入到检测区域时,则拒绝设备接入网络,这里的检测区域包括检测区域内部和检测区域边界。这样就实现了针对特定区域对设备进行权限验证的入网方式,提升了网络的安全性。
下面通过附图以及实施例对本发明实施例技术方案做详细的说明,应当理解,本发明实施例以及实施例中的技术特征只是对本发明实施例技术方案的说明,而不是限定,在不冲突的情况下,本发明实施例以及实施例中的技术特征可以相互组合。
如图1所示为本发明实施例中一种控制设备的接入方法的流程图,该方法包括步骤S101-S103:
S101,检测设备是否进入到检测区域。
如果检测到设备进入到检测区域,则执行S102;如果检测到设备未进入到检测区域,则执行S103。
S102,允许设备接入网络。
S103,拒绝设备接入网络。
在本发明实施例中,上述的方法可以应用到接入服务器中,在本发明实施例中该接入服务器上可以设置一个检测距离的检测装置,该检测装置可以检测设备与接入服务器之间的距离,当然,该检测装置也可以设置在其他位 置,但是该检测装置需要跟接入服务器连接,这样检测距离的检测装置可以将信号发送至接入服务器。
可选地,通过检测距离的检测装置检测设备是否进入到检测区域,如果该检测装置检测到设备进入到检测区域内,该检测装置将触发接入服务器允许该设备接入网络;如果检测装置未检测到设备进入到检测区域内,该检测装置将不会触发接入服务器,从而接入服务器将拒绝该设备接入网络。
当然,为了保证接入服务器能够确认那个设备能够被允许接入,因此,检测装置还可以获取到设备的标识信息,该标识信息可以是设备的媒体访问控制MAC地址或者是硬盘信息等,如果该设备进入到检测区域内,该设备的标识信息将被传输到接入服务器,从而接入服务器能够确定对应的设备将被允许接入,如果在接入服务器中不存在该设备的标识信息,则该设备将被拒绝接入网络。
在上述的实施例中,实现对检测区域内外的设备判定,从而针对设备是否处于检测区域内来确定是否允许设备接入,进而实现了针对特定区域对设备进行权限验证的入网方式,提升了网络的安全性。
可选地,在本发明实施例中,为了进入保证对设备接入的权限验证,本发明实施例中,如果是存在某一个设备进入到检测区域时,该检测装置就能够检测到该设备。比如说,该检测设备可以是安装在包公楼门口的扫描设备,或者是其他能够检测距离的传感器设备,这样设备接近时,该检测设备就能够检测到接近的设备。
在检测装置检测到有设备接近时,该检测装置将获取到检测范内的设备的标识信息,该标识信息用于唯一标识该设备,这里的标识信息可以是设备的客户识别模块SIM卡信息、中央处理器CPU信息、硬盘信息、CPU生产日期信息、硬盘生产日期信息中的一个信息或者多个信息的组合。
接入服务器将通过检测装置获取到该标识信息,接入服务器根据获取到的标识信息生成数字证书,并且会给该数字证书进行签名,从而数字证书上会存在有效的签名信息。
可选地,为了保证数字证书不会被其他设备冒用,该接入服务器在生成 数字证书时,接入服务器将基于标识信息生成标识码,比如说可以将得到的标识信息进行信息摘要算法(英文:Message Digest Algorithm,简称:MD5),得到MD5码。然后接入服务器将MD5码添加到数字证书中。这样在验证时可以根据MD5码来确定是设备是否冒用数字证书。
可选地,为了保证数字证书安全性,该接入服务器在对数字证书进行签名时,该接入服务器会在数字证书中添加有效时间,也就是说,该数字证书从生成开始,该数字证书将在一定时间之后失效,比如说该数字证书的有效时间为2小时,则该数字证书在生成2小时之后将失效。这样可以避免网络资源的浪费,并且也可以保证网络安全性。
在设备进入到检测区域,并且接入服务器生成了数字证书之后,接入服务器将数字证书下发至该设备,接入服务器可以根据得到的标识信息,将生成的数字证书下发至对应标识信息的设备。
如果设备请求接入网络时,接入服务器将获取到设备的数字证书,然后接入服务器将验证数字证书是否有效,验证过程如下:
该电子设备将获取到数字中的签名信息,然后基于预设秘钥验证数字证书中的签名信息是否有效,如果验证数字证书中的签名信息有效时,将允许设备接入;如果验证数字证书中的签名信息无效时,将拒绝设备接入。
可选地,在本发明实施例中,为了避免数字证书被冒用,因此在获取到设备的数字证书之后,解析出数字证书中的MD5码,然后获取到设备的标识信息,基于设备的标识信息重新生成一个MD5码,将新生成的MD5码与数字证书中的MD5码进行匹配,如果新生成的MD5码与数字证书中的MD5码匹配时,则确定数字证书有效,如果新生成的MD5码与数字证书中的MD5码不匹配时,则确定数字证书冒用,并确定数字证书无效。通过MD5码的匹配可以保证数字证书的安全性以及整个网络的安全性,这里,匹配是指完全相同或者相似度达到预设的相似阈值,如90%、95%。
可选地,在本发明实施例中,由于在数字证书的生成过程中可以添加有效时间,所以接入服务器在验证数字证书的有效性时,接入服务器将获取到数字证书中的有效时长,如果该数字证书的使用时长超过了有效时长时,接入服务器将确定该数字证书为无效数字证书,如果数字证书的使用时长在有 效时长内,则接入服务器将确定该数字证书为有效数字证书。
如果接入服务器验证数字证书有效时,接入服务器将允许设备接入网络,如果接入服务器验证数字证书无效时,接入服务器将拒绝设备接入网络。因此,在本发明实施例中,接入服务器通过获取指定区域内的设备的数字证书,并判定数字证书的有效性来确定是否允许设备接入,从而实现了针对不同区域设备进行权限验证,提升了网络的安全性。
可选地,在本发明实施例中,当设备进入到检测区域,并且接入服务器确定设备的数字证书有效之后,如果检测设备检测到该设备离开检测区域时,接入服务器将通过该设备的标识信息确定出该设备对应的数字证书,然后接入服务器将注销该数字证书,这样使得在检测区域外的设备将无法接入网络,从而保证了网络资源不会被其他设备恶意使用,提升了的网络的稳定性以及安全性。
当然,如果接入服务器检测到设备中的数字证书的有效时长超过了设定时长时。接入服务器也将注销该数字证书,这样可以控制数字证书的权限,并且可以在及时的注销无效的数字证书,不仅保证了数字证书的利用率,并且也提升了网络安全性。
总体来讲,在本发明实施例中,接入服务器在设备进入到检测区域之后,接入服务器将根据设备的标识信息生成数字证书,并将数字证书下发至对应设备,从而使得进入检测区域的设备能够根据数字证书接入网络,并在设备离开检测区域时注销数字证书,避免检测区域外的设备接入网络,这样充分保证了检测区域内的网络被有效的利用,并且也保证了检测区域内的网络的安全性。
实施例二:
本发明实施例还提供了一种接入网络的方法,如图2所示为本发明实施例中一种接入网络的方法的流程图,该方法包括步骤S201-S202:
S201,在接收到触发指令时,向网络服务器上报自身存储的数字证书。其中,所述触发指令为电子设备进入到检测区域内时接收到的指令。
S202,接收网络服务器关于数字证书的响应信息,并根据响应信息接入 网络。
在本发明实施例中,当电子设备进入到一个检测区域时,该检测区域可以是实施例一种所说明的检测区域,当然还可以是其他一个指定的检测区域,当电子设备进入到检测区域时,电子设备会接收到上报标识信息的指令,电子设备基于该指令上报自身的标识信息,这里的标识也可以是实施例一中所描述的标识信息。
在电子设备上报自身的标识信息之后,网络服务器将基于电子设备的标识信息生成数字证书,网络服务器生成数字证书的实施过程在实施例一中已经详细的说明,此处就不再赘述。
网络服务器生成对应该电子设备的数字证书之后,网络服务器将该数字证书下发至电子设备。
电子设备接收到网络服务器下发的数字证书之后,电子设备将该数字证书存储在指定存储空间内。
可选地,在电子设备进入到可以接入网络的区域时,也就是网络服务器所覆盖区域时,电子设备将接收到触发指令,此时电子设备将向网络服务器上报自身存储的数字证书,网络服务器接收到电子设备上报的数字证书之后,网络服务器将对数字证书进行验证,这里的验证过程在实施例一中已经详细的说明,此处就不再赘述。
在网络服务器对电子设备的数字证书验证通过时,也可以是数字证书验证有效时,网络服务器将允许电子设备接入网络。
如果网络服务器验证出该电子设备的数字证书无效时,网络服务器将拒绝电子设备接入网络。
通过该方法可以使得电子设备针对区域的选择性接入网络,这样不仅可以保证接入网络的安全性,也可以提升电子设备自身使用的安全性。另外,也使得电子设备可以更具有针对性的计入网络。
实施例三:
对应本发明实施例一中一种设备接入的方法,本发明实施例中还提供了一种设备接入的装置,如图3所示为本发明实施例中一种控制设备接入的装 置的结构示意图,该装置包括:检测模块301和处理模块302。
检测模块301,设置为检测电子设备是否进入到检测区域。
处理模块302,设置为如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络。
可选地,在本发明实施例中,所述处理模块302,如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络包括:如果检测到所述设备进入到检测区域内,则获取所述电子设备中的数字证书;验证所述数字证书是否有效;如果验证出所述数字证书有效,则允许所述设备接入网络;如果验证出所述数字证书无效,则拒绝所述电子设备(以下简称设备)接入网络。
可选地,在本发明实施例中,所述装置还包括:获取模块、证书生成模块和下发模块。
获取模块,设置为在所述处理模块获取所述设备中的数字证书之前,获取在所述检测范围内的所述设备的标识信息,所述标识信息用于唯一标识所述设备。
证书生成模块,设置为根据所述标识信息,生成所述数字证书,并在所述数字证书中添加签名信息,其中,所述签名信息用于标识有效的数字证书。
下发模块,设置为将所述数字证书下发至所述设备。
可选地,
所述处理模块验证所述数字证书是否有效包括:
获取所述数字证书中的签名信息。
采用预设秘钥验证所述数字证书中的签名信息是否有效。
所述处理模块如果验证出所述数字证书有效,则允许所述电子设备接入包括:
如果验证出所述数字证书中的签名信息有效时,则允许所述电子设备接入。
可选地,在本发明实施例中,所述处理模块302如果验证出所述数字证 书中的签名信息有效时,则允许所述电子设备接入包括:如果验证出所述数字证书中的签名信息有效,则获取所述设备的标识信息;根据所述标识信息,生成标识码;将生成的标识码与所述数字证书中预存的标识码进行匹配;如果生成的标识码与所述数字证书中预存的标识码匹配,则允许所述设备接入。
可选地,所述检测模块还设置为:
在所述处理模块允许所述电子设备接入之后,检测所述电子设备是否离开所述检测范围,或者检测所述电子设备的接入时间是否超过数字证书中设定的有效时长。
如果所述电子设备已离开所述检测范围,或者所述电子设备的接入时间已超过数字证书中设定的有效时长,则注销所述电子设备的所述数字证书。
可选地,所述处理模块还设置为:
如果所述电子设备未进入到所述检测区域,则拒绝所述电子设备接入网络。
实施例四:
对应本发明实施例二中的一种接入网络的方法,本发明实施例提供了一种电子设备,如图4所示为本发明实施例中一种电子设备的结构示意图,该电子设备包括:上报模块401和执行模块402。
上报模块401,设置为在接收到触发指令时,向网络服务器上报自身存储的数字证书。其中,所述触发指令为电子设备进入到检测区域内时接收到的指令。
执行模块402,设置为接收网络服务器关于数字证书的响应信息,并根据所述响应信息接入网络。
可选地,在本发明实施例中,上报模块401,还设置为在所述上报模块向网络服务器上报自身存储的数字证书之前,在接收到上报标识信息的指令时,上报自身的标识信息。
执行模块402,还设置为接收网络服务器根据所述标识信息生成的所述数字证书;将所述数字证书存储在指定存储空间内。
一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执 行指令被处理器执行时实现所述的控制设备接入的方法以及所述的接入网络的方法。
本领域普通技术人员可以理解上述实施例的全部或部分步骤可以使用计算机程序流程来实现,所述计算机程序可以存储于一个计算机可读存储介质中,所述计算机程序在相应的硬件平台上(如系统、设备、装置、器件等)执行,在执行时,包括方法实施例的步骤之一或其组合。
可选地,上述实施例的全部或部分步骤也可以使用集成电路来实现,这些步骤可以被分别制作成一个个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。
上述实施例中的装置/功能模块/功能单元可以采用通用的计算装置来实现,它们可以集中在单个的计算装置上,也可以分布在多个计算装置所组成的网络上。
上述实施例中的装置/功能模块/功能单元以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。上述提到的计算机可读取存储介质可以是只读存储器,磁盘或光盘等。
工业实用性
本发明实施例的技术方案中,接入服务器可以检测电子设备是否进入到检测区域内,如果检测到电子设备进入到检测区域内,则允许电子设备接入网络,如果检测到电子设备未进入到检测区域内,则接入服务器将拒绝该设备接入网络,从而针对电子设备是否处于检测区域内来确定是否允许电子设备接入,进而实现了针对特定区域对电子设备进行权限验证的入网方式,提升了网络的安全性。并且在电子设备进入到检测区域之后,接入服务器将根据电子设备的标识信息生成数字证书,并将数字证书下发至对应电子设备,从而使得进入检测区域的电子设备能够根据数字证书接入网络,并在电子设备离开检测区域时注销数字证书,避免检测区域外的电子设备接入网络,这样充分保证了检测区域内的网络被有效的利用,并且也保证了检测区域内的网络的安全性。

Claims (19)

  1. 一种控制设备接入的方法,包括:
    检测电子设备是否进入到检测区域内;
    如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络。
  2. 如权利要求1所述的控制设备接入的方法,所述如果检测到所述设备进入到检测区域内,则允许所述设备接入网络包括:
    如果检测到所述电子设备进入到检测区域内,则获取所述设备中的数字证书;
    验证所述数字证书是否有效;
    如果验证出所述数字证书有效,则允许所述设备接入网络;
    如果验证出所述数字证书无效,则拒绝所述设备接入网络。
  3. 如权利要求2所述的控制设备接入的方法,所述方法还包括:
    在获取所述电子设备中的数字证书之前,获取在所述检测范围内的所述电子设备的标识信息,其中,所述标识信息用于唯一标识所述电子设备;
    根据所述标识信息,生成所述数字证书,并在所述数字证书中添加签名信息,其中,所述签名信息用于标识有效的数字证书;
    将所述数字证书下发至所述电子设备。
  4. 如权利要求3所述的控制设备接入的方法,其中,
    所述验证所述数字证书是否有效包括:
    获取所述数字证书中的签名信息;
    采用预设秘钥验证所述数字证书中的签名信息是否有效;
    所述如果验证出所述数字证书有效,则允许所述电子设备接入包括:
    如果验证出所述数字证书中的签名信息有效,则允许所述电子设备接入。
  5. 如权利要求4所述的控制设备接入的方法,其中,所述如果验证出所述数字证书中的签名信息有效,则允许所述电子设备接入包括:
    如果验证出所述数字证书中的签名信息有效,获取所述电子设备的标识信息;
    根据所述标识信息,生成标识码;
    将生成的标识码与所述数字证书中预存的标识码进行匹配;
    如果生成的标识码与所述数字证书中预存的标识码匹配,则允许所述电子设备接入。
  6. 如权利要求5所述的控制设备接入的方法,所述方法还包括:
    在允许所述设备接入之后,检测所述电子设备是否离开所述检测范围,或者检测所述电子设备的接入时间是否超过数字证书中设定的有效时长;
    如果所述电子设备已离开所述检测范围,或者所述电子设备的接入时间已超过数字证书中设定的有效时长,则注销所述设备的所述数字证书。
  7. 如权利要求1所述的控制设备接入的方法,所述方法还包括:
    如果所述电子设备未进入到所述检测区域,则拒绝所述电子设备接入网络。
  8. 一种接入网络的方法,所述方法包括:
    在接收到触发指令时,向网络服务器上报自身存储的数字证书,其中,所述触发指令为电子设备进入到检测区域内时接收到的指令;
    接收网络服务器关于数字证书的响应信息,并根据所述响应信息接入网络。
  9. 如权利要求8所述的方法,所述方法还包括:
    在向网络服务器上报自身存储的数字证书之前,在接收到上报标识信息的指令时,上报自身的标识信息;
    接收网络服务器根据所述标识信息生成的所述数字证书;
    将所述数字证书存储在指定存储空间内。
  10. 一种控制设备接入的装置,所述装置包括:检测模块和处理模块;
    所述检测模块,设置为检测电子设备是否进入到检测区域;
    所述处理模块,如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络。
  11. 如权利要求10所述的控制设备接入的装置,所述处理模块如果检测到所述电子设备进入到检测区域内,则允许所述电子设备接入网络包括:如果检测到所述电子设备进入到检测区域内,则获取所述电子设备中的数字证书;验证所述数字证书是否有效;如果验证出所述数字证书有效,则允许所述设备接入网络;如果验证出所述数字证书无效,则拒绝所述电子设备接入网络。
  12. 如权利要求11所述的控制设备接入的装置,所述装置还包括:获取模块、证书生成模块和下发模块;
    所述获取模块,设置为在所述处理模块获取所述电子设备中的数字证书之前,获取在所述检测范围内的所述电子设备的标识信息,其中,所述标识信息用于唯一标识所述电子设备;
    所述证书生成模块,设置为根据所述标识信息,生成所述数字证书,并在所述数字证书中添加签名信息,其中,所述签名信息用于标识有效的数字证书;
    所述下发模块,设置为将所述数字证书下发至所述电子设备。
  13. 如权利要求12所述的控制设备接入的装置,其中,
    所述处理模块验证所述数字证书是否有效包括:
    获取所述数字证书中的签名信息;
    采用预设秘钥验证所述数字证书中的签名信息是否有效;
    所述处理模块如果验证出所述数字证书有效,则允许所述电子设备接入包括:
    如果验证出所述数字证书中的签名信息有效时,则允许所述电子设备接入。
  14. 如权利要求13所述的控制设备接入的装置,其中,所述处理模块如果验证出所述数字证书中的签名信息有效时,则允许所述电子设备接入包括:如果验证出所述数字证书中的签名信息有效,则获取所述电子设备的标识信 息;根据所述标识信息,生成标识码;将生成的标识码与所述数字证书中预存的标识码进行匹配;如果生成的标识码与所述数字证书中预存的标识码匹配,则允许所述电子设备接入。
  15. 如权利要求14所述的控制设备接入的装置,所述检测模块还设置为:
    在所述处理模块允许所述电子设备接入之后,检测所述电子设备是否离开所述检测范围,或者检测所述电子设备的接入时间是否超过数字证书中设定的有效时长;
    如果所述电子设备已离开所述检测范围,或者所述电子设备的接入时间已超过数字证书中设定的有效时长,则注销所述电子设备的所述数字证书。
  16. 如权利要求10所述的控制设备接入的装置,所述处理模块还设置为:
    如果所述电子设备未进入到所述检测区域,则拒绝所述电子设备接入网络。
  17. 一种电子设备,包括:上报模块和执行模块;
    所述上报模块,设置为在接收到触发指令时,向网络服务器上报自身存储的数字证书,其中,所述触发指令为电子设备进入到检测区域内时接收到的指令;
    所述执行模块,设置为接收网络服务器关于数字证书的响应信息,并根据所述响应信息接入网络。
  18. 如权利要求17所述的电子设备,所述上报模块,还设置为在所述上报模块向网络服务器上报自身存储的数字证书之前,在接收到上报标识信息的指令时,上报自身的标识信息;
    所述执行模块,还设置为接收网络服务器根据所述标识信息生成的所述数字证书;将所述数字证书存储在指定存储空间内。
  19. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令被处理器执行时实现权利要求1至7任意一项所述的控制设备接入的方法,以及权利要求8至9任意一项所述的接入网络的方法。
PCT/CN2016/086016 2015-09-30 2016-06-16 控制设备接入的方法、装置、接入网络的方法和电子设备 WO2017054517A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510639255.7A CN106559784A (zh) 2015-09-30 2015-09-30 控制设备接入的方法、装置以及接入网络的方法
CN201510639255.7 2015-09-30

Publications (1)

Publication Number Publication Date
WO2017054517A1 true WO2017054517A1 (zh) 2017-04-06

Family

ID=58417249

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/086016 WO2017054517A1 (zh) 2015-09-30 2016-06-16 控制设备接入的方法、装置、接入网络的方法和电子设备

Country Status (2)

Country Link
CN (1) CN106559784A (zh)
WO (1) WO2017054517A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374295A (zh) * 2007-08-21 2009-02-25 华为技术有限公司 选择接入网络的方法和终端
CN101784092A (zh) * 2009-01-16 2010-07-21 中兴通讯股份有限公司 一种基于地理信息系统实现无线网络接入的方法及终端
CN101895990A (zh) * 2010-06-13 2010-11-24 华为技术有限公司 无线接入方法、设备和系统
CN104159271A (zh) * 2013-05-15 2014-11-19 华为技术有限公司 边界控制方法、接入控制器和系统

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252434B (zh) * 2008-02-29 2011-12-21 北京中电华大电子设计有限责任公司 在无线局域网中实现手机接入认证的设备及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101374295A (zh) * 2007-08-21 2009-02-25 华为技术有限公司 选择接入网络的方法和终端
CN101784092A (zh) * 2009-01-16 2010-07-21 中兴通讯股份有限公司 一种基于地理信息系统实现无线网络接入的方法及终端
CN101895990A (zh) * 2010-06-13 2010-11-24 华为技术有限公司 无线接入方法、设备和系统
CN104159271A (zh) * 2013-05-15 2014-11-19 华为技术有限公司 边界控制方法、接入控制器和系统

Also Published As

Publication number Publication date
CN106559784A (zh) 2017-04-05

Similar Documents

Publication Publication Date Title
AU2016273890B2 (en) Controlling physical access to secure areas via client devices in a networked environment
US20200367059A1 (en) Multilayer access control for connected devices
US10826684B1 (en) System and method of validating Internet of Things (IOT) devices
CN110149328B (zh) 接口鉴权方法、装置、设备及计算机可读存储介质
US20160125180A1 (en) Near Field Communication Authentication Mechanism
JP2011522327A5 (zh)
US9268922B2 (en) Registration of devices in a digital rights management environment
CN108696356B (zh) 一种基于区块链的数字证书删除方法、装置及系统
US8504824B1 (en) One-time rotating key for third-party authentication
CN104202338A (zh) 一种适用于企业级移动应用的安全接入方法
US11409861B2 (en) Passwordless authentication
WO2022205963A1 (zh) 一种跨链访问控制方法和装置
CN113542214B (zh) 一种访问控制方法、装置、设备及机器可读存储介质
CN111935095A (zh) 一种源代码泄露监控方法、装置及计算机存储介质
JP2016516250A (ja) 回復機能を有し、かつ復元可能な動的装置識別
CN112583607A (zh) 一种设备访问管理方法、装置、系统及存储介质
US9154497B1 (en) Maintaining accountability of a shared password among multiple users
US8819427B2 (en) Device specific secure licensing
US20180176197A1 (en) Dynamic Data Protection System
CN110990853B (zh) 动态异构冗余的数据访问保护方法及装置
US20200137044A1 (en) System, server and method
CN111143808A (zh) 系统安全认证方法、装置及计算设备、存储介质
CN113872986B (zh) 配电终端认证方法、装置和计算机设备
WO2017054517A1 (zh) 控制设备接入的方法、装置、接入网络的方法和电子设备
CN114978677A (zh) 资产访问控制方法、装置、电子设备和计算机可读介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16850142

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16850142

Country of ref document: EP

Kind code of ref document: A1