WO2018018780A1 - Access method and apparatus for controlling wifi access device, and storage medium - Google Patents

Access method and apparatus for controlling wifi access device, and storage medium Download PDF

Info

Publication number
WO2018018780A1
WO2018018780A1 PCT/CN2016/104862 CN2016104862W WO2018018780A1 WO 2018018780 A1 WO2018018780 A1 WO 2018018780A1 CN 2016104862 W CN2016104862 W CN 2016104862W WO 2018018780 A1 WO2018018780 A1 WO 2018018780A1
Authority
WO
WIPO (PCT)
Prior art keywords
access
type
access device
password
routing
Prior art date
Application number
PCT/CN2016/104862
Other languages
French (fr)
Chinese (zh)
Inventor
陈国强
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018018780A1 publication Critical patent/WO2018018780A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless network technologies, and in particular, to an access method and apparatus, and a storage medium for controlling a WiFi (Wireless Fidelity) access device.
  • WiFi Wireless Fidelity
  • general routers only provide simple access technology. Users do not distinguish between normal users (permanent) and temporary users, and because passwords (that is, access passwords) have only one type, they are easy to leak. To ensure password security, Therefore, the user needs to periodically change the password of the AP.
  • the embodiments of the present invention provide an access method, a device, and a storage medium for controlling a WiFi access device, which can be different for different types of access devices.
  • the processing method makes the password of the routing device not easy to be leaked, thereby improving the security of the routing device.
  • an embodiment of the present invention provides an access method for controlling a WiFi access device, where the method includes:
  • the routing device parses the first connection request to obtain an access password of the access device
  • the routing device determines whether the access password is correct.
  • the routing device determines the type of the access device
  • the routing device determines whether the type of the access device is the first type, and obtains a determination result
  • the routing device determines whether the access password is valid
  • the routing device establishes a connection with the access device.
  • an embodiment of the present invention provides an access device for controlling a WiFi access device, where the device includes:
  • a first receiving module configured to receive a first connection request of the access device
  • a first parsing module configured to parse the first connection request, to obtain an access password of the access device
  • the first determining module is configured to determine whether the access password is correct
  • a first determining module configured to determine a type of the access device if the access password is correct
  • the second determining module is configured to determine whether the type of the access device is the first type, and obtain a determination result
  • a third determining module configured to determine whether the access password is valid if the determining result indicates that the type of the access device is the first type
  • the first establishing module is configured to establish a connection with the access device if the access password is valid.
  • an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are configured to perform the control WiFi access device provided by the first aspect of the present invention. Access method.
  • An embodiment of the present invention provides a method and device for controlling access to a WiFi access device, and a storage medium, wherein the routing device receives a first connection request of the access device; the routing device parses the first connection request, and obtains a An access password of the access device; the routing device determines whether the access password is correct; if the access password is correct, the routing device determines a type of the access device; and the routing device determines the access If the type of the device is the first type, the judgment result is obtained; if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid; if the access password is The routing device establishes a connection with the access device. Therefore, different processing methods can be adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.
  • FIG. 1 is a schematic flowchart of an implementation method of controlling an access method of a WiFi access device according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to Embodiment 2 of the present invention
  • FIG. 3 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to Embodiment 3 of the present invention
  • FIG. 4 is a diagram showing a two-dimensional code of a temporary password according to an embodiment of the present invention.
  • FIG. 5 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 5 of the present invention.
  • FIG. 6 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 6 of the present invention.
  • FIG. 1 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to an embodiment of the present invention. As shown in Figure 1, the method includes:
  • Step S101 The routing device receives the first connection request of the access device.
  • the routing device may be a wireless router, and the first connection request carries an access password of the access device.
  • Step S102 the routing device parses the first connection request, and obtains an access password of the access device.
  • Step S103 the routing device determines whether the access password is correct.
  • Step S104 If the access password is correct, the routing device determines the type of the access device.
  • the routing device determines whether a corresponding field in the access password is the same as a field indicating a keyword of the first type access device
  • the routing device determines that the type of the access device is the first type of access device
  • the routing device determines that the type of the access device is the second type of access device.
  • the routing device determines The type of the access device is the first type, otherwise the routing device determines that the type of the access device is the second type.
  • Step S105 the routing device determines whether the type of the access device is the first type, and obtains a determination result
  • the first type is represented as a temporary user, such as a neighbor, a guest.
  • the second type is represented as a permanent user, such as a family member.
  • Step S106 if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid.
  • the step S106 further includes: if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is within a preset validity period;
  • the routing device determines that the access password is valid
  • the routing device determines that the access password is invalid.
  • Step S107 If the access password is valid, the routing device establishes a connection with the access device.
  • Step S108 the routing device saves the device information of the connected access device to the access device management list.
  • the device information includes: a name of the access device, a MAC address of the access device, an access password of the access device, an access time, an exit time, current state information, and the like.
  • Step S109 the routing device determines whether the access time of the access device reaches a preset limited time
  • the limited time may be set to 2 hours, 4 hours, 8 hours, or the like according to actual conditions.
  • Step S110 If the access time of the access device reaches a preset time limit, the routing device disconnects the connection with the access device.
  • Step S111 the routing device deletes information of the access device from the access device management list.
  • the routing device receives the first connection request of the access device; the routing device parses the first connection request to obtain an access password of the access device; and the routing device determines the access Whether the password is correct; if the access password is correct, the routing device determines the type of the access device; the routing device determines whether the type of the access device is the first type, and obtains a determination result; Indicates that the type of the access device is the first type, and the routing device determines whether the access password is valid; if the access password is valid, the routing device establishes a connection with the access device, so Different processing methods are adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.
  • FIG. 2 is a schematic flowchart of an implementation method for controlling an access method of a WiFi access device according to Embodiment 2 of the present invention. As shown in FIG. 2, the method includes :
  • Step S201 The routing device receives a second connection request sent by the access device.
  • the second connection request carries the identification information of the access device.
  • Step S202 the routing device parses the second connection request, and obtains identifier information of the access device.
  • Step S203 the routing device determines the type of the access device according to the identifier information of the access device.
  • step S203 further includes:
  • the routing device determines whether the identifier information of the access device is in an administrator list
  • the routing device determines that the type of the access device is the first type
  • the routing device determines that the type of the access device is the second type.
  • Step S204 the routing device determines whether the type of the access device is the first type, and obtains a determination result
  • Step S205 if the judgment result indicates that the type of the access device is the first type, the routing device generates a first password
  • the routing device generates a first password by using a key + original password + time stamp + random code 4 portion through an encryption algorithm, and the first password is unique.
  • the first password may be sent to the access device by using the routing device, or may be notified to a user of the access device by a manager of the routing device.
  • Step S206 if the judgment result indicates that the type of the access device is the second type, the routing device generates a second password.
  • the second password is different from the first password, and the validity period of the second password is greater than an expiration date of the first password.
  • the second password is generally a permanent password of the routing device.
  • FIG. 3 is a schematic flowchart of an implementation method for controlling a WiFi access device according to Embodiment 3 of the present invention. As shown in FIG. 3, the method includes:
  • Step S301 The STA (Station, the wireless station) initiates a connection establishment request, and requests to access the AP;
  • Step S302 determining whether the STA that initiated the setup request is a temporary user, if the accessed STA is not a temporary user, directly ending the process; if it is determined that the accessed STA is a temporary user, proceeding to the next step (step S303), the criterion for determining is temporary Is there a keyword T in the password entered by the user?
  • the password at the beginning is considered to be a temporary user access if there is a password starting with T, otherwise it is a permanent user access. (That is to say, if it is a permanent user, we will skip this process and exit directly; if it is a temporary user, we will trigger the next process);
  • Step S303 It is determined whether the temporary password of the temporary user of the current STA is correct or incorrect. If it is determined that the temporary password of the current temporary user is an error, the process directly ends; if it is determined that the temporary password of the current temporary user is correct, the next step is performed (step S304);
  • Step S304 Judging the availability of the temporary password (the feature 1 of the temporary password is that the temporary password can only be used once). Determine if the temporary password entered by the temporary user is available. If it is determined that the current temporary password has been used, the process directly ends, prompting the user that the password is incorrect; if it is determined that the current temporary password is available, then proceeds to step S305;
  • Step S305 The AP successfully accesses according to the temporary user access mode, and the current STA accesses the AP successfully, and the temporary user information is saved in the temporary user management list.
  • Step S306 The state of the temporary user is scanned in real time, and when the exit mechanism is reached (the temporary user limited time is reached, generally 2 hours, 8 hours, and 24 hours may be set) to trigger the temporary user kick-out mechanism. Temporary users will be disconnected for this connection. This is the end of the process.
  • the embodiment of the present invention provides a method for controlling the temporary access user, and the AP device can determine the normal user (permanent) and temporary user status by itself, and automatically control the temporary user connection. Enter and exit.
  • a temporary password generation and temporary user management module needs to be added on the AP side. Only the administrator user can control the AP to generate a temporary password, and the generated temporary password is used for temporary user access.
  • the STA enters the temporary password to access the AP
  • the AP performs password matching according to the temporary password access procedure.
  • the temporary user management module After the temporary user successfully accesses the AP device, the temporary user management module generates a list of information, including the access device name of the temporary user. Device MAC address, temporary password, access time, exit time, current status information, and so on.
  • the AP When the temporary user reaches the exit mechanism, the preset time (2 hours, 8 hours, 24 hours, etc.) is reached, and the AP will The temporary user is removed and the temporary user's information and the temporary password used at the time are deleted. Expired temporary passwords cannot be used again.
  • An embodiment of the present invention provides an access device for controlling a WiFi temporary user, where the device includes: an administrator user management module, a temporary password generation module, a temporary user management module, a password information matching module, and a user differentiation judgment module (normal user) Distinguish between temporary users and temporary users. among them:
  • the administrator user management module is configured to manage an administrator user. Set the administrator user management module on the management interface of the AP, and fill in the MAC address (Media Access Control) address of the access device (for example, 0C-12-B5-AC-ED-A2) to the administrator user management list. In it, it can be set as an administrator user, otherwise the MAC address in the administrator user management list is not a normal user. Only administrator users can manage the ability to generate temporary passwords. The temporary password generated by the AP can only be sent to the administrator user.
  • MAC address Media Access Control
  • the temporary password generating module is configured to generate a temporary password.
  • the temporary password has three basic characteristics: 1) the temporary password is unique and cannot be repeated; 2) the temporary password cannot be used again after being used. 3) Each temporary password can be connected to the AP.
  • the temporary password generation mechanism is mainly composed of a keyword T+original password+timestamp+random code 4 part, which ensures the uniqueness of the temporary password, and generates a temporary password after the encryption algorithm.
  • the generated temporary password form is: TX1X2X3X4X5X6X7X8X.
  • T represents a temporary password keyword configured to determine a temporary password and a normal password.
  • the X1X2X3X4X5X6X7X8X is an encrypted temporary password.
  • the STA accesses the background and decodes the temporary password. After the authentication is passed, the AP can access the AP.
  • the temporary password can only be obtained by the administrator user.
  • the administrator user can pass the password to the temporarily accessed user.
  • the temporary password can be sent in plain text or two-dimensional code (as shown in Figure 4).
  • the administrator user For the generation and acquisition of the temporary password, the administrator user needs to enter the device AP and set it in the AP. Click the temporary password generation menu, and the AP will automatically generate one or more temporary passwords and send them to the administrator user in plain text or two-dimensional code. After receiving the temporary password, the administrator user can pass it to the temporary user who needs to access.
  • the temporary user management module is configured to manage a state of temporary user access.
  • Temporary users refer to users who access using temporary passwords. All users accessing through temporary passwords will generate a management list in this module, including the user's access device name, device MAC (Media Access Control) address, temporary password, access time, exit time, current Status information, etc.
  • the temporary user management module automatically disconnects from the temporary user.
  • the user distinguishing determining module is configured to determine whether the access user is a permanent user or a temporary user.
  • the other is the automatic judgment mode: the user can set the AP other users except the user of the administrator account to be temporary users.
  • the administrator account can add the MAC information of the AP device's family and relatives' terminal devices.
  • the device that does not access the AP in the administrator list needs a temporary password. After accessing the AP, it is a temporary user; in the administrator list After the user accesses the AP, it is a permanent user. In both ways, users can choose according to the current environment.
  • the password matching module is configured to process password authentication reported by the STA to the AP.
  • the STA sends the reported password of the STA to the password matching module of the AP through the connection request packet.
  • the password matching module matches whether the password contained in the STA connection request packet is a normal password or a temporary password. If the password is matched to a normal password, the STA performs the normal procedure. In, if the match is a temporary password, follow the temporary The password process is accessed.
  • the matching principle of the temporary password is the password keyword T.
  • the beginning password format is: TX1X2X3X4X5X6X7X8X.
  • the temporary user kicks out the module, and is configured to trigger a mechanism when it is determined whether the temporary user has reached the temporary user kick-out mechanism, that is, when the condition is met.
  • the temporary user reaches the exit mechanism (the temporary user limited time is reached, generally 2 hours, 8 hours, 24 hours, etc.), the temporary user management module automatically exits the temporary user.
  • the temporary access user adopts an access mode different from the permanent user.
  • the temporary user accesses the AP by using a temporary password, and after the usage time or the number of uses, the temporary password is invalidated. , will not be able to access the AP again.
  • Normal users permanent users
  • the embodiment of the present invention well solves the control right of the administrator user to the WiFi device, and controls the control of the AP in the hands of the administrator user to prevent other STA devices from accessing the AP without consent.
  • FIG. 5 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 5 of the present invention.
  • the device 500 includes The first receiving module 501, the first analyzing module 502, the first determining module 503, the first determining module 504, the second determining module 505, the third determining module 506, the first establishing module 507, the first saving module 508, and the first The fifth determining module 509, the first disconnecting module 510 and the first deleting module 511, wherein:
  • the first receiving module 501 is configured to receive a first connection request of the access device
  • the first parsing module 502 is configured to parse the first connection request to obtain an access password of the access device.
  • the first determining module 503 is configured to determine whether the access password is correct.
  • the first determining module 504 is configured to determine a type of the access device if the access password is correct;
  • the second determining module 505 is configured to determine whether the type of the access device is the first type, and obtain a determination result
  • the third determining module 506 is configured to determine whether the access password is valid if the determining result indicates that the type of the access device is the first type;
  • the third determining module 506 further includes:
  • the first determining unit 5061 is configured to determine whether the access password is within a preset validity period if the determination result indicates that the type of the access device is the first type;
  • the second determining unit 5062 is configured to determine that the access password is valid if the access password is within the validity period
  • the third determining unit 5063 is configured to determine that the access password is invalid if the access password is not in the validity period.
  • the first establishing module 507 is configured to establish a connection with the access device if the access password is valid;
  • the first saving module 508 is configured to: if the type of the connected access device is the first type, save the device information of the connected access device to the access device management list, where the device information is at least The method includes: an access time of the access device;
  • the fifth determining module 509 is configured to determine whether the access time of the access device reaches a preset limited time
  • the first disconnecting module 510 is configured to disconnect the connection with the access device if the access time of the access device reaches a preset time limit
  • the first deleting module 511 is configured to delete device information of the access device from the access device management list.
  • FIG. 6 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 6 of the present invention.
  • the second determining module 601, the fourth determining module 602, the first generating module 603, and the second generating module 604 are:
  • the second determining module 601 is configured to determine a type of the access device
  • the second determining module 601 further includes:
  • the first receiving unit 6011 is configured to receive a second connection request sent by the access device.
  • the first parsing unit 6012 is configured to parse the second connection request, and obtain identifier information of the access device.
  • the first determining unit 6013 is configured to determine the type of the access device according to the identifier information of the access device.
  • the first determining unit 6013 further includes: a first determining subunit configured to determine whether the identification information of the access device is in an administrator list; and a second determining subunit configured to be if the access device If the identifier information is not in the administrator list, the type of the access device is determined to be a first type, and the third determining sub-unit is configured to: if the identifier information of the access device is in the administrator list, Then determining that the type of the access device is the second type.
  • the fourth determining module 602 is configured to determine whether the type of the access device is the first type, and obtain a determination result
  • the first generation module 603 is configured to generate a first password if the determination result indicates that the type of the access device is the first type.
  • the second generating module 604 is configured to generate a second password if the determining result indicates that the type of the access device is the second type;
  • the second password is different from the first password, and the validity period of the second password is greater than the validity period of the first password, where the first password is the temporary password in the foregoing embodiment, and the second password is The permanent password in the previous embodiment.
  • Each module included in the access device, each unit included in each module, and each subunit included in each unit may be implemented by a processor in a routing device; of course, it may also be implemented by a logic circuit.
  • the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
  • the foregoing access method for controlling the wireless fidelity WiFi access device is implemented in the form of a software function module, and is sold or used as an independent product, it may also be stored in one computer. Readable in storage media.
  • the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions.
  • a computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • program codes such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk.
  • the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are configured to execute the present invention.
  • embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
  • the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
  • the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
  • the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
  • the routing device receives the first connection request of the access device; the routing device parses the first connection request to obtain an access password of the access device; and the routing device determines the access Whether the password is correct; if the access password is correct, the routing device determines the type of the access device; the routing device determines whether the type of the access device is the first type, and obtains a determination result; Indicates that the type of the access device is the first type, and the routing device determines whether the access password is valid; if the access password is valid, the routing device establishes a connection with the access device, so Different processing methods are adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.

Abstract

Disclosed are an access method and apparatus for controlling a Wireless Fidelity (WiFi) access device, and a storage amount mechanism. The method comprises: a routing device receiving a first connection request of an access device; the routing device parsing the first connection request to obtain an access password of the access device; the routing device judging whether the access password is correct; if the access password is correct, the routing device determining the type of the access device; the routing device judging whether the type of the access device is a first type, and obtaining a judgement result; if the judgement result shows that the type of the access device is the first type, the routing device judging whether the access password is valid; and if the access password is valid, the routing device establishing a connection with the access device.

Description

一种控制WiFi接入设备的接入方法及装置、存储介质Access method and device for controlling WiFi access device, storage medium 技术领域Technical field
本发明涉及无线网络技术领域,尤其涉及一种控制WiFi(Wireless Fidelity,无线保真)接入设备的接入方法及装置、存储介质。The present invention relates to the field of wireless network technologies, and in particular, to an access method and apparatus, and a storage medium for controlling a WiFi (Wireless Fidelity) access device.
背景技术Background technique
随着计算机网络的发展,网络已经融入到人们生活的方方面面,无论是在家里、公司、商场还是餐厅我们都可以通过各种网络接入到互联网进行学习、工作以及娱乐。在生活中,我们已经养成了上网查阅资料、购物、聊天的习惯。现在我们的日常生活已经越来越离不开网络,为了满足人们随时随地上网的需求,无线上网技术应运而生,而最令人关注的就是WiFi技术了。日常生活中我们经常使用WiFi热点。经常会有临时用户接入某个AP(Access Point,访问点),由于是临时接入的方式,过后很多AP是不愿意该临时用户再次接入的,或者说临时用户也不愿意再接入这个AP,而且给临时用户提供AP的密码后,会有泄漏的风险,需要不断的修改密码。如果要解决这个问题,之前的做法大部分是需要重新修改AP的接入密码,这样每次操作不仅麻烦,而且AP的安全性也不高。目前一般路由器都只是提供简单的接入技术,用户不会区别正常用户(永久)和临时用户,而且由于密码(即接入密码)只有一种,所以很容易泄漏,为了保证密码的安全性,因此用户需要定期修改AP的密码。With the development of computer networks, the network has been integrated into all aspects of people's lives. Whether at home, in a company, in a shopping mall or in a restaurant, we can access the Internet through various networks for learning, work and entertainment. In life, we have developed the habit of accessing information, shopping, and chatting online. Nowadays, our daily life has become more and more inseparable from the Internet. In order to meet the needs of people surfing the Internet anytime and anywhere, wireless Internet technology has emerged, and the most interesting thing is WiFi technology. We often use WiFi hotspots in our daily lives. A temporary user accesses an AP (Access Point). Because it is a temporary access method, many APs are reluctant to access the temporary user again, or the temporary user is reluctant to access it. This AP, and the temporary password provided to the temporary user, there is a risk of leakage, and the password needs to be constantly changed. If you want to solve this problem, most of the previous practices need to re-edit the access password of the AP, so that each operation is not only troublesome, but also the security of the AP is not high. At present, general routers only provide simple access technology. Users do not distinguish between normal users (permanent) and temporary users, and because passwords (that is, access passwords) have only one type, they are easy to leak. To ensure password security, Therefore, the user needs to periodically change the password of the AP.
发明内容Summary of the invention
为解决现有存在的技术问题,本发明实施例提供一种控制WiFi接入设备的接入方法及装置、存储介质,能够针对不同类型的接入设备采取不同 的处理方法,使得路由设备的密码不易被泄露,进而提高了路由设备的安全性。In order to solve the existing technical problems, the embodiments of the present invention provide an access method, a device, and a storage medium for controlling a WiFi access device, which can be different for different types of access devices. The processing method makes the password of the routing device not easy to be leaked, thereby improving the security of the routing device.
为达到上述目的,本发明实施例的技术方案是这样实现的:To achieve the above objective, the technical solution of the embodiment of the present invention is implemented as follows:
第一方面,本发明实施例提供一种控制WiFi接入设备的接入方法,所述方法包括:In a first aspect, an embodiment of the present invention provides an access method for controlling a WiFi access device, where the method includes:
路由设备接收接入设备的第一连接请求;Receiving, by the routing device, a first connection request of the access device;
所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;The routing device parses the first connection request to obtain an access password of the access device;
所述路由设备判断所述接入密码是否正确;The routing device determines whether the access password is correct.
如果所述接入密码正确,所述路由设备确定接入设备的类型;If the access password is correct, the routing device determines the type of the access device;
所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;The routing device determines whether the type of the access device is the first type, and obtains a determination result;
如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;If the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid;
如果所述接入密码有效,所述路由设备与所述接入设备建立连接。If the access password is valid, the routing device establishes a connection with the access device.
第二方面,本发明实施例提供一种控制WiFi接入设备的接入装置,所述装置包括:In a second aspect, an embodiment of the present invention provides an access device for controlling a WiFi access device, where the device includes:
第一接收模块,配置为接收接入设备的第一连接请求;a first receiving module, configured to receive a first connection request of the access device;
第一解析模块,配置为解析所述第一连接请求,得到所述接入设备的接入密码;a first parsing module, configured to parse the first connection request, to obtain an access password of the access device;
第一判断模块,配置为判断所述接入密码是否正确;The first determining module is configured to determine whether the access password is correct;
第一确定模块,配置为如果所述接入密码正确,确定接入设备的类型;a first determining module, configured to determine a type of the access device if the access password is correct;
第二判断模块,配置为判断所述接入设备的类型是否为第一类型,得到判断结果;The second determining module is configured to determine whether the type of the access device is the first type, and obtain a determination result;
第三判断模块,配置为如果所述判断结果表明所述接入设备的类型为第一类型,判断所述接入密码是否有效; a third determining module, configured to determine whether the access password is valid if the determining result indicates that the type of the access device is the first type;
第一建立模块,配置为如果所述接入密码有效,与所述接入设备建立连接。The first establishing module is configured to establish a connection with the access device if the access password is valid.
第三方面,本发明实施例提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行本发明第一方面实施例提供的控制WiFi接入设备的接入方法。In a third aspect, an embodiment of the present invention provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are configured to perform the control WiFi access device provided by the first aspect of the present invention. Access method.
本发明实施例提供一种控制WiFi接入设备的接入方法及装置、存储介质,其中,路由设备接收接入设备的第一连接请求;所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;所述路由设备判断所述接入密码是否正确;如果所述接入密码正确,所述路由设备确定接入设备的类型;所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;如果所述接入密码有效,所述路由设备与所述接入设备建立连接,如此,能够针对不同类型的接入设备采取不同的处理方法,使得路由设备的密码不易被泄露,进而提高了路由设备的安全性。An embodiment of the present invention provides a method and device for controlling access to a WiFi access device, and a storage medium, wherein the routing device receives a first connection request of the access device; the routing device parses the first connection request, and obtains a An access password of the access device; the routing device determines whether the access password is correct; if the access password is correct, the routing device determines a type of the access device; and the routing device determines the access If the type of the device is the first type, the judgment result is obtained; if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid; if the access password is The routing device establishes a connection with the access device. Therefore, different processing methods can be adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.
附图说明DRAWINGS
图1为本发明实施例一控制WiFi接入设备的接入方法的实现流程示意图;FIG. 1 is a schematic flowchart of an implementation method of controlling an access method of a WiFi access device according to an embodiment of the present invention;
图2为本发明实施例二控制WiFi接入设备的接入方法的实现流程示意图;2 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to Embodiment 2 of the present invention;
图3为本发明实施例三控制WiFi接入设备的接入方法的实现流程示意图;3 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to Embodiment 3 of the present invention;
图4为本发明实施例临时密码的二维码图示;4 is a diagram showing a two-dimensional code of a temporary password according to an embodiment of the present invention;
图5为本发明实施例五控制WiFi接入设备的接入装置的组成结构示意图; 5 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 5 of the present invention;
图6为本发明实施例六控制WiFi接入设备的接入装置的组成结构示意图。FIG. 6 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 6 of the present invention.
具体实施方式detailed description
实施例一Embodiment 1
为解决背景技术中的技术问题,本发明实施例提供一种控制WiFi接入设备的接入方法,图1为本发明实施例一控制WiFi接入设备的接入方法的实现流程示意图,如图1所示,所述方法包括:In order to solve the technical problem in the background, the embodiment of the present invention provides a method for controlling access of a WiFi access device, and FIG. 1 is a schematic flowchart of implementing an access method for controlling a WiFi access device according to an embodiment of the present invention. As shown in Figure 1, the method includes:
步骤S101,路由设备接收接入设备的第一连接请求;Step S101: The routing device receives the first connection request of the access device.
这里,所述路由设备可以是无线路由器,所述第一连接请求中携带有所述接入设备的接入密码。Here, the routing device may be a wireless router, and the first connection request carries an access password of the access device.
步骤S102,所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;Step S102, the routing device parses the first connection request, and obtains an access password of the access device.
步骤S103,所述路由设备判断所述接入密码是否正确;Step S103, the routing device determines whether the access password is correct.
步骤S104,如果所述接入密码正确,所述路由设备确定接入设备的类型;Step S104: If the access password is correct, the routing device determines the type of the access device.
这里,如果所述接入密码正确,则所述路由设备判断所述接入密码中相应的字段是否与表示第一类型接入设备的关键字的字段相同;Here, if the access password is correct, the routing device determines whether a corresponding field in the access password is the same as a field indicating a keyword of the first type access device;
如果所述接入密码中相应的字段与表示第一类型接入设备的第一密码的关键字相同,则所述路由设备确定所述接入设备的类型为第一类型接入设备;If the corresponding field in the access password is the same as the keyword indicating the first password of the first type of access device, the routing device determines that the type of the access device is the first type of access device;
如果所述接入密码中相应的字段与表示第一型接入设备的第一密码的关键字不同,则所述路由设备确定所述接入设备的类型为第二类型接入设备。If the corresponding field in the access password is different from the keyword indicating the first password of the first type of access device, the routing device determines that the type of the access device is the second type of access device.
比如,表示第一类型接入设备的第一密码的关键字为T,且T为打头字母,则如果所述接入密码是T打头的接入密码,则所述路由设备确定所 述接入设备的类型为第一类型,否则所述路由设备确定所述接入设备的类型为第二类型。For example, if the keyword indicating the first password of the access device of the first type is T, and T is the initial letter, if the access password is the access password of the beginning of T, the routing device determines The type of the access device is the first type, otherwise the routing device determines that the type of the access device is the second type.
步骤S105,所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;Step S105, the routing device determines whether the type of the access device is the first type, and obtains a determination result;
这里,第一类型表示为临时用户,比如是邻居、客人。第二类型表示为永久用户,比如是家人。Here, the first type is represented as a temporary user, such as a neighbor, a guest. The second type is represented as a permanent user, such as a family member.
步骤S106,如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;Step S106, if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid.
这里,所述步骤S106进一步包括:如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否在预先设置的有效期内;Here, the step S106 further includes: if the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is within a preset validity period;
如果所述接入密码在所述有效期内,则所述路由设备确定所述接入密码有效;If the access password is within the validity period, the routing device determines that the access password is valid;
如果所述接入密码不在所述有效期内,则所述路由设备确定所述接入密码无效。If the access password is not within the validity period, the routing device determines that the access password is invalid.
步骤S107,如果所述接入密码有效,所述路由设备与所述接入设备建立连接;Step S107: If the access password is valid, the routing device establishes a connection with the access device.
步骤S108,所述路由设备将已连接的接入设备的设备信息保存到接入设备管理列表中;Step S108, the routing device saves the device information of the connected access device to the access device management list.
这里,所述设备信息包括:所述接入设备的名称、所述接入设备的MAC地址、所述接入设备的接入密码、接入时间、退出时间、当前状态信息等。Here, the device information includes: a name of the access device, a MAC address of the access device, an access password of the access device, an access time, an exit time, current state information, and the like.
步骤S109,所述路由设备判断所述接入设备的接入时间是否达到预设的限定时间;Step S109, the routing device determines whether the access time of the access device reaches a preset limited time;
这里,可以根据实际情况将所述限定时间设置为2小时、4小时、8小时等。 Here, the limited time may be set to 2 hours, 4 hours, 8 hours, or the like according to actual conditions.
步骤S110,如果所述接入设备的接入时间达到预设的限定时间,所述路由设备断开与所述接入设备之间的连接;Step S110: If the access time of the access device reaches a preset time limit, the routing device disconnects the connection with the access device.
步骤S111,所述路由设备从所述接入设备管理列表中删除所述接入设备的信息。Step S111, the routing device deletes information of the access device from the access device management list.
本发明实施例中,路由设备接收接入设备的第一连接请求;所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;所述路由设备判断所述接入密码是否正确;如果所述接入密码正确,所述路由设备确定接入设备的类型;所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;如果所述接入密码有效,所述路由设备与所述接入设备建立连接,如此,能够针对不同类型的接入设备采取不同的处理方法,使得路由设备的密码不易被泄露,进而提高了路由设备的安全性。In the embodiment of the present invention, the routing device receives the first connection request of the access device; the routing device parses the first connection request to obtain an access password of the access device; and the routing device determines the access Whether the password is correct; if the access password is correct, the routing device determines the type of the access device; the routing device determines whether the type of the access device is the first type, and obtains a determination result; Indicates that the type of the access device is the first type, and the routing device determines whether the access password is valid; if the access password is valid, the routing device establishes a connection with the access device, so Different processing methods are adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.
实施例二Embodiment 2
本发明实施例再提供一种控制WiFi接入设备的接入方法,图2为本发明实施例二控制WiFi接入设备的接入方法的实现流程示意图,如图2所示,所述方法包括:The embodiment of the present invention further provides an access method for controlling a WiFi access device, and FIG. 2 is a schematic flowchart of an implementation method for controlling an access method of a WiFi access device according to Embodiment 2 of the present invention. As shown in FIG. 2, the method includes :
步骤S201,路由设备接收所述接入设备发送的第二连接请求;Step S201: The routing device receives a second connection request sent by the access device.
这里,所述第二连接请求中携带有所述接入设备的标识信息。Here, the second connection request carries the identification information of the access device.
步骤S202,所述路由设备解析所述第二连接请求,获取所述接入设备的标识信息;Step S202, the routing device parses the second connection request, and obtains identifier information of the access device.
步骤S203,所述路由设备根据所述接入设备的标识信息,确定所述接入设备的类型;Step S203, the routing device determines the type of the access device according to the identifier information of the access device.
这里,步骤S203进一步包括:Here, step S203 further includes:
路由设备判断所述接入设备的标识信息是否在管理员列表中; The routing device determines whether the identifier information of the access device is in an administrator list;
如果所述接入设备的标识信息不在所述管理员列表中,则所述路由设备确定所述接入设备的类型为第一类型;If the identification information of the access device is not in the administrator list, the routing device determines that the type of the access device is the first type;
如果所述接入设备的标识信息在所述管理员列表中,则所述路由设备确定所述接入设备的类型为第二类型。If the identification information of the access device is in the administrator list, the routing device determines that the type of the access device is the second type.
步骤S204,所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;Step S204, the routing device determines whether the type of the access device is the first type, and obtains a determination result;
步骤S205,如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备生成第一密码;Step S205, if the judgment result indicates that the type of the access device is the first type, the routing device generates a first password;
这里,所述路由设备将关键字+原始密码+时间戳+随机码4部分经过加密算法生成第一密码,所述第一密码具有唯一性。所述第一密码可以通过所述路由设备发送给所述接入设备,也可以通过所述路由设备的管理者告诉所述接入设备的使用者。Here, the routing device generates a first password by using a key + original password + time stamp + random code 4 portion through an encryption algorithm, and the first password is unique. The first password may be sent to the access device by using the routing device, or may be notified to a user of the access device by a manager of the routing device.
步骤S206,如果所述判断结果表明所述接入设备的类型为第二类型,所述路由设备生成第二密码;Step S206, if the judgment result indicates that the type of the access device is the second type, the routing device generates a second password.
这里,所述第二密码与所述第一密码不同,且所述第二密码的有效期大于所述第一密码的有效期。第二密码一般为所述路由设备的永久密码。Here, the second password is different from the first password, and the validity period of the second password is greater than an expiration date of the first password. The second password is generally a permanent password of the routing device.
实施例三Embodiment 3
本发明实施例先提供一种控制WiFi临时用户的接入方法,图3为本发明实施例三控制WiFi接入设备的接入方法的实现流程示意图,如图3所示,所述方法包括:An embodiment of the present invention provides a method for controlling access to a WiFi temporary user. FIG. 3 is a schematic flowchart of an implementation method for controlling a WiFi access device according to Embodiment 3 of the present invention. As shown in FIG. 3, the method includes:
步骤S301:STA(Station,无线站点)发起建立连接请求,请求接入到AP中;Step S301: The STA (Station, the wireless station) initiates a connection establishment request, and requests to access the AP;
步骤S302:判断发起建立请求的STA是否为临时用户,如果接入的STA非临时用户直接结束流程;如果判断接入的STA为临时用户,则进行下一步(步骤S303),判断的标准为临时用户输入的密码中是否有关键字T 开头的密码,如果有T开头的密码则认为是临时用户接入,否则为永久用户接入。(也就是说如果是永久用户我们会跳过此流程直接退出;如果是临时用户我们才触发下一步流程);Step S302: determining whether the STA that initiated the setup request is a temporary user, if the accessed STA is not a temporary user, directly ending the process; if it is determined that the accessed STA is a temporary user, proceeding to the next step (step S303), the criterion for determining is temporary Is there a keyword T in the password entered by the user? The password at the beginning is considered to be a temporary user access if there is a password starting with T, otherwise it is a permanent user access. (That is to say, if it is a permanent user, we will skip this process and exit directly; if it is a temporary user, we will trigger the next process);
步骤S303:判断当前STA的临时用户的临时密码是正确的还是错误的。如果判断当前临时用户的临时密码是错误的直接结束流程;如果判断当前临时用户的临时密码是正确的则进行下一步(步骤S304);Step S303: It is determined whether the temporary password of the temporary user of the current STA is correct or incorrect. If it is determined that the temporary password of the current temporary user is an error, the process directly ends; if it is determined that the temporary password of the current temporary user is correct, the next step is performed (step S304);
步骤S304:判断临时密码的可用性(临时密码的特征1就是临时密码只能使用1次)。判断临时用户输入的临时密码是否可用。如果判断当前临时密码已经被使用过,直接结束流程,提示用户密码错误;如果判断当前临时密码可用则进入步骤S305;Step S304: Judging the availability of the temporary password (the feature 1 of the temporary password is that the temporary password can only be used once). Determine if the temporary password entered by the temporary user is available. If it is determined that the current temporary password has been used, the process directly ends, prompting the user that the password is incorrect; if it is determined that the current temporary password is available, then proceeds to step S305;
步骤S305:AP按照临时用户接入方式,成功接入,当前STA接入到成功连接AP,临时用户信息保存在临时用户管理列表中;Step S305: The AP successfully accesses according to the temporary user access mode, and the current STA accesses the AP successfully, and the temporary user information is saved in the temporary user management list.
步骤S306:实时扫描临时用户的状态,当达到退出机制时(到达临时用户限定时间,一般可以设置2小时、8小时、24小时)触发临时用户踢出机制。临时用户会被中断此次连接。到此流程结束。Step S306: The state of the temporary user is scanned in real time, and when the exit mechanism is reached (the temporary user limited time is reached, generally 2 hours, 8 hours, and 24 hours may be set) to trigger the temporary user kick-out mechanism. Temporary users will be disconnected for this connection. This is the end of the process.
为解决AP设备在临时用户接入的问题,本发明实施例提供一种控制临时接入用户的方法,所述AP设备能够自己判断正常用户(永久)和临时用户状态,并自动控制临时用户接入退出。In order to solve the problem that the AP device accesses the temporary user, the embodiment of the present invention provides a method for controlling the temporary access user, and the AP device can determine the normal user (permanent) and temporary user status by itself, and automatically control the temporary user connection. Enter and exit.
基于前述的实施例,可以看出需要在AP侧增加一个用于临时密码生成和临时用户管理模块。只有管理员用户可以控制AP生成临时密码,生成的临时密码用于临时用户接入使用。当STA输入临时密码接入AP时,AP会根据临时密码接入流程进行密码匹配,临时用户成功接入AP设备后,会在临时用户管理模块生产一列信息,包含临时用户的接入设备名称、设备MAC地址、临时密码、接入时间、退出时间、当前状态信息等。当临时用户达到退出机制时,达到预设时间(2小时、8小时、24小时等),AP会自 动剔除临时用户,并删除临时用户的信息和当时使用的临时密码。过期的临时密码不能再次使用。Based on the foregoing embodiments, it can be seen that a temporary password generation and temporary user management module needs to be added on the AP side. Only the administrator user can control the AP to generate a temporary password, and the generated temporary password is used for temporary user access. When the STA enters the temporary password to access the AP, the AP performs password matching according to the temporary password access procedure. After the temporary user successfully accesses the AP device, the temporary user management module generates a list of information, including the access device name of the temporary user. Device MAC address, temporary password, access time, exit time, current status information, and so on. When the temporary user reaches the exit mechanism, the preset time (2 hours, 8 hours, 24 hours, etc.) is reached, and the AP will The temporary user is removed and the temporary user's information and the temporary password used at the time are deleted. Expired temporary passwords cannot be used again.
实施例四Embodiment 4
本发明实施例先提供一种控制WiFi临时用户的接入装置,所述装置包括:管理员用户管理模块、临时密码生成模块、临时用户管理模块、密码信息匹配模块、用户区分判断模块(正常用户和临时用户区分)和临时用户踢出模块。其中:An embodiment of the present invention provides an access device for controlling a WiFi temporary user, where the device includes: an administrator user management module, a temporary password generation module, a temporary user management module, a password information matching module, and a user differentiation judgment module (normal user) Distinguish between temporary users and temporary users. among them:
所述管理员用户管理模块,配置为管理管理员用户。在AP的管理界面设置管理员用户管理模块,把接入设备的MAC(Media Access Control,媒体访问控制)地址(例如:0C-12-B5-AC-ED-A2)填写到管理员用户管理列表中,就可以设置为管理员用户,反之没有在管理员用户管理列表中的MAC地址就是普通用户。只有管理员用户才能管理生成临时密码功能。AP生成的临时密码也只能发给管理员用户。The administrator user management module is configured to manage an administrator user. Set the administrator user management module on the management interface of the AP, and fill in the MAC address (Media Access Control) address of the access device (for example, 0C-12-B5-AC-ED-A2) to the administrator user management list. In it, it can be set as an administrator user, otherwise the MAC address in the administrator user management list is not a normal user. Only administrator users can manage the ability to generate temporary passwords. The temporary password generated by the AP can only be sent to the administrator user.
所述临时密码生成模块,配置为生成临时密码。所述临时密码有3个基本特征:1)临时密码是唯一的,不能重复;2)临时密码使用后不能再次使用。3)每个临时密码都能接入AP。The temporary password generating module is configured to generate a temporary password. The temporary password has three basic characteristics: 1) the temporary password is unique and cannot be repeated; 2) the temporary password cannot be used again after being used. 3) Each temporary password can be connected to the AP.
这里,所述临时密码的生成机制:主要由关键字T+原始密码+时间戳+随机码4部分组成,保证临时密码的唯一性,经过加密算法后生成临时密码。生成的临时密码形式为:TX1X2X3X4X5X6X7X8X。T代表临时密码的关键字,配置为判断临时密码和普通密码。X1X2X3X4X5X6X7X8X为经过加密后的临时密码,STA接入后台会解码临时密码,验证通过后就能接入AP中。临时密码只能通过管理员用户获取,管理员用户再把密码传递给临时接入的用户,传递临时密码方式可以是明文或者二维码方式(如图4所示)Here, the temporary password generation mechanism is mainly composed of a keyword T+original password+timestamp+random code 4 part, which ensures the uniqueness of the temporary password, and generates a temporary password after the encryption algorithm. The generated temporary password form is: TX1X2X3X4X5X6X7X8X. T represents a temporary password keyword configured to determine a temporary password and a normal password. The X1X2X3X4X5X6X7X8X is an encrypted temporary password. The STA accesses the background and decodes the temporary password. After the authentication is passed, the AP can access the AP. The temporary password can only be obtained by the administrator user. The administrator user can pass the password to the temporarily accessed user. The temporary password can be sent in plain text or two-dimensional code (as shown in Figure 4).
对于临时密码的生成和获取需要管理员用户进入设备AP,在AP设置 中点击临时密码生成菜单,AP会自动产生1个或者多个临时密码,并以明文或者二维码方式传递给管理员用户。管理员用户收到临时密码后,可以传递给需要接入的临时用户。For the generation and acquisition of the temporary password, the administrator user needs to enter the device AP and set it in the AP. Click the temporary password generation menu, and the AP will automatically generate one or more temporary passwords and send them to the administrator user in plain text or two-dimensional code. After receiving the temporary password, the administrator user can pass it to the temporary user who needs to access.
所述临时用户管理模块,配置为管理临时用户接入的状态。临时用户指的是使用临时密码接入的用户。所有通过临时密码接入的用户都会在此模块中生产一个管理列表,包含用户的接入设备名称、设备MAC(Media Access Control,媒体访问控制)地址、临时密码、接入时间、退出时间、当前状态信息等。当临时用户达到退出机制时(到达临时用户限定时间),临时用户管理模块自动断开与临时用户之间的连接。The temporary user management module is configured to manage a state of temporary user access. Temporary users refer to users who access using temporary passwords. All users accessing through temporary passwords will generate a management list in this module, including the user's access device name, device MAC (Media Access Control) address, temporary password, access time, exit time, current Status information, etc. When the temporary user reaches the exit mechanism (to reach the temporary user limited time), the temporary user management module automatically disconnects from the temporary user.
所述用户区分判断模块,配置为判断接入用户是永久用户还是临时用户。对于临时用户的判断,有两种方式。1)一种是主动判断方式:AP设备的管理员人工判断接入用户是永久用户还是临时用户,并根据情况给被接入的用户永久密码还是临时密码。(这种判断一般是管理员用户主观人为判断,用户可以给自己的家人永久密码;给外来访客、邻居等临时密码。使用永久密码接入的就是永久用户密码永不过期,而使用临时密码接入的用户就是临时用户,密码会在一定周期内过期)。2)另一种是自动判断方式:用户可以设置AP除在管理员账户的用户外的其他用户都是临时用户。(管理员账户里面可以增加AP设备的家人、亲戚的终端设备MAC信息),不在管理员列表中的设备接入AP都需要临时密码,接入AP后都是临时用户;在管理员列表中的用户接入AP后都是永久用户。这两种方式用户都可以根据当前的环境选择。The user distinguishing determining module is configured to determine whether the access user is a permanent user or a temporary user. There are two ways to judge the casual user. 1) One is the active judgment mode: the administrator of the AP device manually determines whether the access user is a permanent user or a temporary user, and gives the accessed user a permanent password or a temporary password according to the situation. (This kind of judgment is generally judged by the administrator user subjectively, the user can give his family a permanent password; give temporary passwords to external visitors, neighbors, etc. The permanent password is never expired, but the temporary password is used. The incoming user is a temporary user and the password expires within a certain period of time). 2) The other is the automatic judgment mode: the user can set the AP other users except the user of the administrator account to be temporary users. (The administrator account can add the MAC information of the AP device's family and relatives' terminal devices. The device that does not access the AP in the administrator list needs a temporary password. After accessing the AP, it is a temporary user; in the administrator list After the user accesses the AP, it is a permanent user. In both ways, users can choose according to the current environment.
所述密码匹配模块,配置为处理STA上报给AP的密码鉴权。STA通过连接请求报文将STA的上报的密码给AP的密码匹配模块,密码匹配模块匹配STA连接请求报文里面包含的密码是正常密码还是临时密码,若匹配为正常密码就按照正常流程进行接入,若匹配为临时密码,就按照临时 密码的流程进行接入处理。例如:临时密码的匹配原则为密码关键字T开头密码格式为:TX1X2X3X4X5X6X7X8X。The password matching module is configured to process password authentication reported by the STA to the AP. The STA sends the reported password of the STA to the password matching module of the AP through the connection request packet. The password matching module matches whether the password contained in the STA connection request packet is a normal password or a temporary password. If the password is matched to a normal password, the STA performs the normal procedure. In, if the match is a temporary password, follow the temporary The password process is accessed. For example, the matching principle of the temporary password is the password keyword T. The beginning password format is: TX1X2X3X4X5X6X7X8X.
临时用户踢出模块,配置为当判断临时用户是否达到临时用户踢出机制,即符合条件时触发机制。当临时用户达到退出机制时(到达临时用户限定时间,一般可以设置2小时、8小时、24小时等参数),临时用户管理模块自动退出临时用户。The temporary user kicks out the module, and is configured to trigger a mechanism when it is determined whether the temporary user has reached the temporary user kick-out mechanism, that is, when the condition is met. When the temporary user reaches the exit mechanism (the temporary user limited time is reached, generally 2 hours, 8 hours, 24 hours, etc.), the temporary user management module automatically exits the temporary user.
在本发明实施例中,对临时接入的用户采用区别于永久用户的接入方式,在连接AP时,临时用户使用临时密码接入AP,到达使用时间或者使用次数后,临时密码就作废了,将不能再次接入AP。正常用户(永久用户)使用正常的密码不受限制,满足不同用户接入的需求。本发明实施例很好地解决了管理员用户对自己WiFi设备的控制权,将AP的控制权掌握在管理员用户自己手中,防止其他STA设备不经过同意接入AP。In the embodiment of the present invention, the temporary access user adopts an access mode different from the permanent user. When the AP is connected, the temporary user accesses the AP by using a temporary password, and after the usage time or the number of uses, the temporary password is invalidated. , will not be able to access the AP again. Normal users (permanent users) use normal passwords without restrictions to meet the needs of different users. The embodiment of the present invention well solves the control right of the administrator user to the WiFi device, and controls the control of the AP in the hands of the administrator user to prevent other STA devices from accessing the AP without consent.
实施例五Embodiment 5
本发明实施例提供一种控制WiFi接入设备的接入装置,图5为本发明实施例五控制WiFi接入设备的接入装置的组成结构示意图,如图5所示,所述装置500包括:第一接收模块501、第一解析模块502、第一判断模块503、第一确定模块504、第二判断模块505、第三判断模块506、第一建立模块507、第一保存模块508、第五判断模块509、第一断开模块510和第一删除模块511,其中:An embodiment of the present invention provides an access device for controlling a WiFi access device. FIG. 5 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 5 of the present invention. As shown in FIG. 5, the device 500 includes The first receiving module 501, the first analyzing module 502, the first determining module 503, the first determining module 504, the second determining module 505, the third determining module 506, the first establishing module 507, the first saving module 508, and the first The fifth determining module 509, the first disconnecting module 510 and the first deleting module 511, wherein:
所述第一接收模块501,配置为接收接入设备的第一连接请求;The first receiving module 501 is configured to receive a first connection request of the access device;
所述第一解析模块502,配置为解析所述第一连接请求,得到所述接入设备的接入密码;The first parsing module 502 is configured to parse the first connection request to obtain an access password of the access device.
所述第一判断模块503,配置为判断所述接入密码是否正确;The first determining module 503 is configured to determine whether the access password is correct.
所述第一确定模块504,配置为如果所述接入密码正确,确定接入设备的类型; The first determining module 504 is configured to determine a type of the access device if the access password is correct;
所述第二判断模块505,配置为判断所述接入设备的类型是否为第一类型,得到判断结果;The second determining module 505 is configured to determine whether the type of the access device is the first type, and obtain a determination result;
所述第三判断模块506,配置为如果所述判断结果表明所述接入设备的类型为第一类型,判断所述接入密码是否有效;The third determining module 506 is configured to determine whether the access password is valid if the determining result indicates that the type of the access device is the first type;
这里,所述第三判断模块506进一步包括:Here, the third determining module 506 further includes:
第一判断单元5061,配置为如果所述判断结果表明所述接入设备的类型为第一类型,判断所述接入密码是否在预先设置的有效期内;The first determining unit 5061 is configured to determine whether the access password is within a preset validity period if the determination result indicates that the type of the access device is the first type;
第二确定单元5062,配置为如果所述接入密码在所述有效期内,确定所述接入密码有效;The second determining unit 5062 is configured to determine that the access password is valid if the access password is within the validity period;
第三确定单元5063,配置为如果所述接入密码不在所述有效期内,确定所述接入密码无效。The third determining unit 5063 is configured to determine that the access password is invalid if the access password is not in the validity period.
所述第一建立模块507,配置为如果所述接入密码有效,与所述接入设备建立连接;The first establishing module 507 is configured to establish a connection with the access device if the access password is valid;
所述第一保存模块508,配置为如果已连接的接入设备的类型是第一类型,将已连接的接入设备的设备信息保存到接入设备管理列表中,其中,所述设备信息至少包括:所述接入设备的接入时间;The first saving module 508 is configured to: if the type of the connected access device is the first type, save the device information of the connected access device to the access device management list, where the device information is at least The method includes: an access time of the access device;
所述第五判断模块509,配置为判断所述接入设备的接入时间是否达到预设的限定时间;The fifth determining module 509 is configured to determine whether the access time of the access device reaches a preset limited time;
所述第一断开模块510,配置为如果所述接入设备的接入时间达到预设的限定时间,断开与所述接入设备之间的连接;The first disconnecting module 510 is configured to disconnect the connection with the access device if the access time of the access device reaches a preset time limit;
所述第一删除模块511,配置为从所述接入设备管理列表中删除所述接入设备的设备信息。The first deleting module 511 is configured to delete device information of the access device from the access device management list.
这里需要指出的是:以上控制WiFi接入设备的接入装置实施例的描述,与上述方法实施例的描述是类似的,具有同方法实施例相似的有益效果,因此不做赘述。对于本发明控制WiFi接入设备的接入装置实施例中未披露 的技术细节,请参照本发明方法实施例的描述而理解,为节约篇幅,因此不再赘述。It should be noted that the description of the foregoing embodiment of the access device for controlling the WiFi access device is similar to the description of the foregoing method embodiment, and has the same advantageous effects as the method embodiment, and thus is not described herein. Not disclosed in the embodiment of the access device for controlling the WiFi access device of the present invention. For technical details, please refer to the description of the method embodiment of the present invention, in order to save space, and therefore will not be described again.
实施例六Embodiment 6
本发明实施例再提供一种控制WiFi接入设备的接入装置,图6为本发明实施例六控制WiFi接入设备的接入装置的组成结构示意图,如图6所示,所述装置包括第二确定模块601、第四判断模块602、第一生成模块603和第二生成模块604:The embodiment of the present invention further provides an access device for controlling a WiFi access device, and FIG. 6 is a schematic structural diagram of a component of an access device for controlling a WiFi access device according to Embodiment 6 of the present invention. As shown in FIG. The second determining module 601, the fourth determining module 602, the first generating module 603, and the second generating module 604 are:
所述第二确定模块601,配置为确定接入设备的类型;The second determining module 601 is configured to determine a type of the access device;
这里,所述第二确定模块601进一步包括:Here, the second determining module 601 further includes:
第一接收单元6011,配置为接收所述接入设备发送的第二连接请求;The first receiving unit 6011 is configured to receive a second connection request sent by the access device.
第一解析单元6012,配置为解析所述第二连接请求,获取所述接入设备的标识信息;The first parsing unit 6012 is configured to parse the second connection request, and obtain identifier information of the access device.
第一确定单元6013,配置为根据所述接入设备的标识信息,确定所述接入设备的类型。The first determining unit 6013 is configured to determine the type of the access device according to the identifier information of the access device.
这里,所述第一确定单元6013进一步包括:第一判断子单元,配置为判断所述接入设备的标识信息是否在管理员列表中;第二确定子单元,配置为如果所述接入设备的标识信息不在所述管理员列表中,则确定所述接入设备的类型为第一类型;第三确定子单元,配置为如果所述接入设备的标识信息在所述管理员列表中,则确定所述接入设备的类型为第二类型。Here, the first determining unit 6013 further includes: a first determining subunit configured to determine whether the identification information of the access device is in an administrator list; and a second determining subunit configured to be if the access device If the identifier information is not in the administrator list, the type of the access device is determined to be a first type, and the third determining sub-unit is configured to: if the identifier information of the access device is in the administrator list, Then determining that the type of the access device is the second type.
所述第四判断模块602,配置为判断所述接入设备的类型是否为第一类型,得到判断结果;The fourth determining module 602 is configured to determine whether the type of the access device is the first type, and obtain a determination result;
所述第一生成模块603,配置为如果所述判断结果表明所述接入设备的类型为第一类型,生成第一密码。The first generation module 603 is configured to generate a first password if the determination result indicates that the type of the access device is the first type.
所述第二生成模块604,配置为如果所述判断结果表明所述接入设备的类型为第二类型,生成第二密码; The second generating module 604 is configured to generate a second password if the determining result indicates that the type of the access device is the second type;
这里,所述第二密码与所述第一密码不同,且所述第二密码的有效期大于所述第一密码的有效期,这里的第一密码即前述实施例中的临时密码,第二密码即前述实施例中的永久密码。Here, the second password is different from the first password, and the validity period of the second password is greater than the validity period of the first password, where the first password is the temporary password in the foregoing embodiment, and the second password is The permanent password in the previous embodiment.
这里需要指出的是:以上控制WiFi接入设备的接入装置实施例的描述,与上述方法实施例的描述是类似的,具有同方法实施例相似的有益效果,因此不做赘述。对于本发明控制WiFi接入设备的接入装置实施例中未披露的技术细节,请参照本发明方法实施例的描述而理解,为节约篇幅,因此不再赘述。It should be noted that the description of the foregoing embodiment of the access device for controlling the WiFi access device is similar to the description of the foregoing method embodiment, and has the same advantageous effects as the method embodiment, and thus is not described herein. For the technical details that are not disclosed in the embodiment of the access device for controlling the WiFi access device of the present invention, please refer to the description of the method embodiment of the present invention, and the details are not described herein.
本发明实施例提供的接入装置所包括的各模块、各模块所包括的各单元以及各单元所包括的各子单元都可以通过路由设备中的处理器来实现;当然也可通过逻辑电路实现;在实施的过程中,处理器可以为中央处理器(CPU)、微处理器(MPU)、数字信号处理器(DSP)或现场可编程门阵列(FPGA)等。Each module included in the access device, each unit included in each module, and each subunit included in each unit may be implemented by a processor in a routing device; of course, it may also be implemented by a logic circuit. In the process of implementation, the processor may be a central processing unit (CPU), a microprocessor (MPU), a digital signal processor (DSP), or a field programmable gate array (FPGA).
需要说明的是,本发明实施例中,如果以软件功能模块的形式实现上述的控制无线保真WiFi接入设备的接入方法,并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明实施例的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机、服务器、或者网络设备等)执行本发明各个实施例所述方法的全部或部分。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read Only Memory)、磁碟或者光盘等各种可以存储程序代码的介质。这样,本发明实施例不限制于任何特定的硬件和软件结合。It should be noted that, in the embodiment of the present invention, if the foregoing access method for controlling the wireless fidelity WiFi access device is implemented in the form of a software function module, and is sold or used as an independent product, it may also be stored in one computer. Readable in storage media. Based on such understanding, the technical solution of the embodiments of the present invention may be embodied in the form of a software product in essence or in the form of a software product stored in a storage medium, including a plurality of instructions. A computer device (which may be a personal computer, server, or network device, etc.) is caused to perform all or part of the methods described in various embodiments of the present invention. The foregoing storage medium includes various media that can store program codes, such as a USB flash drive, a mobile hard disk, a read only memory (ROM), a magnetic disk, or an optical disk. Thus, embodiments of the invention are not limited to any specific combination of hardware and software.
相应地,本发明实施例再提供一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令配置为执行本发明 实施例中控制无线保真WiFi接入设备的接入方法。Correspondingly, the embodiment of the present invention further provides a computer storage medium, where the computer storage medium stores computer executable instructions, and the computer executable instructions are configured to execute the present invention. An access method for controlling a wireless fidelity WiFi access device in an embodiment.
本领域内的技术人员应明白,本发明的实施例可提供为方法、系统、或计算机程序产品。因此,本发明可采用硬件实施例、软件实施例、或结合软件和硬件方面的实施例的形式。而且,本发明可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。Those skilled in the art will appreciate that embodiments of the present invention can be provided as a method, system, or computer program product. Accordingly, the present invention can take the form of a hardware embodiment, a software embodiment, or a combination of software and hardware. Moreover, the invention can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage and optical storage, etc.) including computer usable program code.
本发明是参照根据本发明实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (system), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or FIG. These computer program instructions can be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing device to produce a machine for the execution of instructions for execution by a processor of a computer or other programmable data processing device. Means for implementing the functions specified in one or more of the flow or in a block or blocks of the flow chart.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。The computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device. The apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device. The instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精 神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The above description is only the preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes can be made to the present invention. Where in the essence of the invention Any modifications, equivalent substitutions, improvements, etc. made within the principles of God and the principles are intended to be included within the scope of the present invention.
工业实用性Industrial applicability
本发明实施例中,路由设备接收接入设备的第一连接请求;所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;所述路由设备判断所述接入密码是否正确;如果所述接入密码正确,所述路由设备确定接入设备的类型;所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;如果所述接入密码有效,所述路由设备与所述接入设备建立连接,如此,能够针对不同类型的接入设备采取不同的处理方法,使得路由设备的密码不易被泄露,进而提高了路由设备的安全性。 In the embodiment of the present invention, the routing device receives the first connection request of the access device; the routing device parses the first connection request to obtain an access password of the access device; and the routing device determines the access Whether the password is correct; if the access password is correct, the routing device determines the type of the access device; the routing device determines whether the type of the access device is the first type, and obtains a determination result; Indicates that the type of the access device is the first type, and the routing device determines whether the access password is valid; if the access password is valid, the routing device establishes a connection with the access device, so Different processing methods are adopted for different types of access devices, so that the password of the routing device is not easily leaked, thereby improving the security of the routing device.

Claims (11)

  1. 一种控制无线保真WiFi接入设备的接入方法,所述方法包括:An access method for controlling a wireless fidelity WiFi access device, the method comprising:
    路由设备接收接入设备的第一连接请求;Receiving, by the routing device, a first connection request of the access device;
    所述路由设备解析所述第一连接请求,得到所述接入设备的接入密码;The routing device parses the first connection request to obtain an access password of the access device;
    所述路由设备判断所述接入密码是否正确;The routing device determines whether the access password is correct.
    如果所述接入密码正确,所述路由设备确定接入设备的类型;If the access password is correct, the routing device determines the type of the access device;
    所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;The routing device determines whether the type of the access device is the first type, and obtains a determination result;
    如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效;If the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is valid;
    如果所述接入密码有效,所述路由设备与所述接入设备建立连接。If the access password is valid, the routing device establishes a connection with the access device.
  2. 根据权利要求1中所述的方法,其中,所述方法还包括:The method of claim 1 wherein the method further comprises:
    路由设备确定接入设备的类型;The routing device determines the type of the access device;
    所述路由设备判断所述接入设备的类型是否为第一类型,得到判断结果;The routing device determines whether the type of the access device is the first type, and obtains a determination result;
    如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备生成第一密码。If the judgment result indicates that the type of the access device is the first type, the routing device generates a first password.
  3. 根据权利要求2中所述的方法,其中,所述路由设备确定接入设备的类型包括:The method according to claim 2, wherein the routing device determines the type of the access device comprises:
    路由设备接收所述接入设备发送的第二连接请求;Receiving, by the routing device, a second connection request sent by the access device;
    所述路由设备解析所述第二连接请求,获取所述接入设备的标识信息;The routing device parses the second connection request, and obtains identifier information of the access device;
    所述路由设备根据所述接入设备的标识信息,确定所述接入设备的类型。 The routing device determines the type of the access device according to the identification information of the access device.
  4. 根据权利要求3中所述的方法,其中,所述路由设备根据所述接入设备的标识信息,确定所述接入设备的类型包括:The method according to claim 3, wherein the routing device determines, according to the identification information of the access device, the type of the access device, including:
    路由设备判断所述接入设备的标识信息是否在管理员列表中;The routing device determines whether the identifier information of the access device is in an administrator list;
    如果所述接入设备的标识信息不在所述管理员列表中,则所述路由设备确定所述接入设备的类型为第一类型;If the identification information of the access device is not in the administrator list, the routing device determines that the type of the access device is the first type;
    如果所述接入设备的标识信息在所述管理员列表中,则所述路由设备确定所述接入设备的类型为第二类型。If the identification information of the access device is in the administrator list, the routing device determines that the type of the access device is the second type.
  5. 根据权利要求1中所述的方法,其中,所述方法还包括:The method of claim 1 wherein the method further comprises:
    如果已连接的接入设备的类型是第一类型,路由设备将已连接的接入设备的设备信息保存到接入设备管理列表中,其中,所述设备信息至少包括:所述接入设备的接入时间;If the type of the connected access device is the first type, the routing device saves the device information of the connected access device to the access device management list, where the device information includes at least: the access device Access time
    所述路由设备判断所述接入设备的接入时间是否达到预设的限定时间;The routing device determines whether the access time of the access device reaches a preset limited time;
    如果所述接入设备的接入时间达到预设的限定时间,所述路由设备断开与所述接入设备之间的连接;If the access time of the access device reaches a preset time limit, the routing device disconnects the connection with the access device;
    所述路由设备从所述接入设备管理列表中删除所述接入设备的信息。The routing device deletes information of the access device from the access device management list.
  6. 根据权利要求1中所述的方法,其中,所述如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否有效包括:The method according to claim 1, wherein if the judgment result indicates that the type of the access device is the first type, the routing device determining whether the access password is valid includes:
    如果所述判断结果表明所述接入设备的类型为第一类型,所述路由设备判断所述接入密码是否在预先设置的有效期内;If the judgment result indicates that the type of the access device is the first type, the routing device determines whether the access password is within a preset validity period;
    如果所述接入密码在所述有效期内,则所述路由设备确定所述接入密码有效;If the access password is within the validity period, the routing device determines that the access password is valid;
    如果所述接入密码不在所述有效期内,则所述路由设备确定所述接 入密码无效。If the access password is not within the validity period, the routing device determines the connection The password is invalid.
  7. 根据权利要求2中所述的方法,其中,所述方法还包括:The method of claim 2 wherein the method further comprises:
    如果所述判断结果表明所述接入设备的类型为第二类型,所述路由设备生成第二密码,其中,所述第二密码与所述第一密码不同,且所述第二密码的有效期大于所述第一密码的有效期。If the judgment result indicates that the type of the access device is the second type, the routing device generates a second password, where the second password is different from the first password, and the validity period of the second password Greater than the validity period of the first password.
  8. 一种控制无线保真WiFi接入设备的接入装置,所述装置包括:An access device for controlling a wireless fidelity WiFi access device, the device comprising:
    第一接收模块,配置为接收接入设备的第一连接请求;a first receiving module, configured to receive a first connection request of the access device;
    第一解析模块,配置为解析所述第一连接请求,得到所述接入设备的接入密码;a first parsing module, configured to parse the first connection request, to obtain an access password of the access device;
    第一判断模块,配置为判断所述接入密码是否正确;The first determining module is configured to determine whether the access password is correct;
    第一确定模块,配置为如果所述接入密码正确,确定接入设备的类型;a first determining module, configured to determine a type of the access device if the access password is correct;
    第二判断模块,配置为判断所述接入设备的类型是否为第一类型,得到判断结果;The second determining module is configured to determine whether the type of the access device is the first type, and obtain a determination result;
    第三判断模块,配置为如果所述判断结果表明所述接入设备的类型为第一类型,判断所述接入密码是否有效;a third determining module, configured to determine whether the access password is valid if the determining result indicates that the type of the access device is the first type;
    第一建立模块,配置为如果所述接入密码有效,与所述接入设备建立连接。The first establishing module is configured to establish a connection with the access device if the access password is valid.
  9. 根据权利要求8中所述的装置,其中,所述装置还包括:The device of claim 8 wherein said device further comprises:
    第二确定模块,配置为确定接入设备的类型;a second determining module, configured to determine a type of the access device;
    第四判断模块,配置为判断所述接入设备的类型是否为第一类型,得到判断结果;The fourth determining module is configured to determine whether the type of the access device is the first type, and obtain a determination result;
    第一生成模块,配置为如果所述判断结果表明所述接入设备的类型为第一类型,生成第一密码。The first generating module is configured to generate a first password if the determining result indicates that the type of the access device is the first type.
  10. 根据权利要求9中所述的装置,其中,所述第二确定模块包括: The apparatus according to claim 9, wherein said second determining module comprises:
    第一接收单元,配置为接收所述接入设备发送的第二连接请求;a first receiving unit, configured to receive a second connection request sent by the access device;
    第一解析单元,配置为解析所述第二连接请求,获取所述接入设备的标识信息;a first parsing unit, configured to parse the second connection request, and obtain identifier information of the access device;
    第一确定单元,配置为根据所述接入设备的标识信息,确定所述接入设备的类型。The first determining unit is configured to determine a type of the access device according to the identifier information of the access device.
  11. 一种计算机存储介质,所述计算机存储介质中存储有计算机可执行指令,该计算机可执行指令用于执行权利要求1至7任一项所述的控制无线保真WiFi接入设备的接入方法。 A computer storage medium storing computer executable instructions for executing the access method for controlling a wireless fidelity WiFi access device according to any one of claims 1 to 7 .
PCT/CN2016/104862 2016-07-25 2016-11-07 Access method and apparatus for controlling wifi access device, and storage medium WO2018018780A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610596222.3 2016-07-25
CN201610596222.3A CN107659936A (en) 2016-07-25 2016-07-25 A kind of cut-in method and device of control WiFi access devices

Publications (1)

Publication Number Publication Date
WO2018018780A1 true WO2018018780A1 (en) 2018-02-01

Family

ID=61015815

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/104862 WO2018018780A1 (en) 2016-07-25 2016-11-07 Access method and apparatus for controlling wifi access device, and storage medium

Country Status (2)

Country Link
CN (1) CN107659936A (en)
WO (1) WO2018018780A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616878B (en) * 2018-03-28 2021-03-26 努比亚技术有限公司 Encryption and decryption method, equipment and computer storage medium
CN110213760B (en) * 2019-04-29 2022-02-11 惠州Tcl移动通信有限公司 Router, mobile terminal, network connection method thereof and storage medium
CN111148095A (en) * 2020-01-03 2020-05-12 华为技术有限公司 Method for establishing Wi-Fi connection between terminal and wireless access point
CN112351424B (en) * 2020-07-28 2024-03-12 深圳Tcl新技术有限公司 Wireless networking management method, system, device and computer readable storage medium
CN112907788A (en) * 2021-01-25 2021-06-04 珠海格力电器股份有限公司 Door lock control method and device, door lock and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110273305A1 (en) * 2010-05-04 2011-11-10 Itron, Inc. Secure collector diagnostic portal activation
CN105163312A (en) * 2015-07-31 2015-12-16 中国联合网络通信集团有限公司 Wireless network access method and wireless network access device
CN105357740A (en) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 Wireless network access method and wireless access node

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101475282B1 (en) * 2010-12-20 2014-12-22 한국전자통신연구원 Key validity verifying method and sever for performing the same
CN104243250B (en) * 2014-08-18 2017-12-12 小米科技有限责任公司 Access authorization methods, device and equipment based on intelligent domestic system
CN105228149A (en) * 2015-09-29 2016-01-06 小米科技有限责任公司 Access point method of attachment, device and access point
CN105430764B (en) * 2015-12-30 2019-01-25 魅族科技(中国)有限公司 A kind of method and terminal connecting Wi-Fi Hotspot

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110273305A1 (en) * 2010-05-04 2011-11-10 Itron, Inc. Secure collector diagnostic portal activation
CN105163312A (en) * 2015-07-31 2015-12-16 中国联合网络通信集团有限公司 Wireless network access method and wireless network access device
CN105357740A (en) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 Wireless network access method and wireless access node

Also Published As

Publication number Publication date
CN107659936A (en) 2018-02-02

Similar Documents

Publication Publication Date Title
WO2018018780A1 (en) Access method and apparatus for controlling wifi access device, and storage medium
JP6320501B2 (en) Establishing a device-to-device communication session
US10681548B2 (en) Authenticating mobile devices
CN106664561B (en) System and method for securing pre-association service discovery
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
KR101031168B1 (en) Information processing device, and access control processing method
US8594632B1 (en) Device to-device (D2D) discovery without authenticating through cloud
TWI659300B (en) Method and device for providing equipment identification
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
CN102204304A (en) Support of multiple pre-shared keys in access point
US20080133775A1 (en) Method, Apparatus and Computer Program Product for Providing Intelligent Synchronization
US11070376B2 (en) Systems and methods for user-based authentication
EP2973148A1 (en) Identification delegation for devices
JP2004173148A (en) Information processing apparatus, server client system and method, and computer program
CN107196917B (en) Service response method and middleware thereof
CN104426835B (en) Login detection method, server, login detection device and system
JP2014509468A (en) Method and system for out-of-band delivery of wireless network credentials
WO2017080231A1 (en) Method of accessing wireless network and device utilizing same
US9413769B2 (en) Key management system for toll-free data service
EP1804415A1 (en) Method and apparatus for providing session key for WUSB security and method and apparatus for obtaining the session key
US20130288661A1 (en) Remote operation system, relay apparatus, mobile communication apparatus, in-terminal server control method, and relay processing method
JP2008146363A (en) Authentication method in computer network
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN109460647B (en) Multi-device secure login method
KR20140043836A (en) Communication system utilizing fingerprint information and use of the system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16910359

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16910359

Country of ref document: EP

Kind code of ref document: A1