WO2021248419A1 - 新密码的更新方法、装置和计算机设备 - Google Patents

新密码的更新方法、装置和计算机设备 Download PDF

Info

Publication number
WO2021248419A1
WO2021248419A1 PCT/CN2020/095680 CN2020095680W WO2021248419A1 WO 2021248419 A1 WO2021248419 A1 WO 2021248419A1 CN 2020095680 W CN2020095680 W CN 2020095680W WO 2021248419 A1 WO2021248419 A1 WO 2021248419A1
Authority
WO
WIPO (PCT)
Prior art keywords
new password
signal
beacon signal
client
router
Prior art date
Application number
PCT/CN2020/095680
Other languages
English (en)
French (fr)
Inventor
黄尚伟
Original Assignee
深圳市南方硅谷半导体有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市南方硅谷半导体有限公司 filed Critical 深圳市南方硅谷半导体有限公司
Priority to PCT/CN2020/095680 priority Critical patent/WO2021248419A1/zh
Publication of WO2021248419A1 publication Critical patent/WO2021248419A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • This application relates to the technical field of network equipment, in particular to a new password updating method, device, computer equipment and storage medium.
  • the main purpose of this application is to provide a new password update method, device, computer equipment and storage medium, aiming to overcome the current shortcomings that easily cause password leakage and the shortcomings that the updated password cannot be automatically obtained in an offline state.
  • this application provides a new password update method, which is applied to routers, and includes the following steps:
  • the encrypted new password is randomly added to a beacon signal to generate a target beacon signal, and when the target beacon signal is sent to the client, a designated frequency is sent Sonic signal.
  • the method includes:
  • the client is connected through a wireless network standard protocol, and the public key corresponding to the private key and the designated frequency information of the sound wave signal are sent to the client.
  • the step of randomly adding the encrypted new password to a beacon signal to generate a target beacon signal includes:
  • the beacon signal is periodically generated, and the encrypted new password is randomly added to one of the beacon signals to generate the target beacon signal, and the Vendor in the other beacon signals Randomly generate garbled information in the IE field.
  • the method includes:
  • the instruction to send a new password is triggered according to the re-sending password flag information added in the Probe Request packet.
  • the sound wave signal is a signal of a designated time length
  • the designated time length of the sound wave signal is a transmission period of the beacon signal.
  • This application also provides a method for updating a new password, which is applied to the client and includes the following steps:
  • the target beacon signal sent simultaneously with the sound wave signal is obtained, and the target beacon signal is decrypted by the preset public key to obtain a new password; wherein the new password is the client The new password to connect to the router.
  • the method further includes:
  • the router is connected through a wireless network standard protocol, and the public key sent by the router and the designated frequency information of the sound wave signal are received.
  • This application also provides a device for updating a new password, which is applied to a router, including:
  • An encryption unit configured to obtain a new password when the instruction to send a new password is triggered, and encrypt the new password with a private key; wherein the new password is a new password for the client to connect to the router;
  • the sending unit is configured to randomly add the encrypted new password to a beacon signal to generate a target beacon signal when periodically sending a beacon signal, and send the target beacon signal to the client at the same time , Send out the sound wave signal of the specified frequency.
  • the present application also provides a computer device, including a memory and a processor, the memory stores a computer program, and the processor implements the steps of any one of the above-mentioned methods when the computer program is executed by the processor.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the steps of any one of the methods described above are implemented.
  • the method, device, computer equipment, and storage medium for updating a new password include: when an instruction to send a new password is triggered, obtaining a new password, and encrypting the new password with a private key; wherein, the The new password is the new password for the client to connect to the router; when periodically sending beacon signals, the encrypted new password is randomly added to a beacon signal to generate a target beacon signal, and when sending the target signal When the beacon signal reaches the client, it sends out a sound wave signal of a specified frequency.
  • only a new encrypted password is randomly added to a beacon signal, and a sound wave signal is sent out at the same time as the identification of the beacon signal. Only when the sound wave signal is received at the same time, can the corresponding beacon signal be obtained. Analyze the new password to avoid the disclosure of the password.
  • Figure 1 is a schematic diagram of the steps of a new password updating method in an embodiment of the present application
  • FIG. 2 is a schematic diagram of the steps of a new password updating method in another embodiment of the present application.
  • Fig. 3 is a structural block diagram of a device for updating a new password in an embodiment of the present application
  • Figure 4 is a structural block diagram of a new password updating device in another embodiment of the present application.
  • FIG. 5 is a schematic block diagram of the structure of a computer device according to an embodiment of the application.
  • an embodiment of the present application provides a method for updating a new password, which is applied to a router, and includes the following steps:
  • Step S1 when the instruction to send a new password is triggered, obtain a new password, and encrypt the new password with a private key; wherein the new password is a new password for the client to connect to the router;
  • Step S2 When periodically sending a beacon signal, randomly add the encrypted new password to a beacon signal to generate a target beacon signal, and send the target beacon signal to the client at the same time as sending the target beacon signal to the client.
  • the sonic signal of the specified frequency When periodically sending a beacon signal, randomly add the encrypted new password to a beacon signal to generate a target beacon signal, and send the target beacon signal to the client at the same time as sending the target beacon signal to the client.
  • the sonic signal of the specified frequency When periodically sending a beacon signal, randomly add the encrypted new password to a beacon signal to generate a target beacon signal, and send the target beacon signal to the client at the same time as sending the target beacon signal to the client.
  • the above-mentioned router is a router that transmits WIFI hotspots
  • the above-mentioned client is a terminal device connected to the above-mentioned WIFI hotspot, such as various home appliances (air conditioners, lamps, mobile phones, etc.) of the Internet of Things.
  • the IoT device after the password for connecting to the router is set as a new password, if the IoT device needs to connect to the router again, it needs to obtain the new password and reset it.
  • the instruction to send a new password can be triggered by the user or automatically. For example, after the router’s password is set to the new password, it will be Trigger the above instructions.
  • the new password needs to be encrypted.
  • the router has a built-in encryption algorithm to obtain a pair of private and public keys.
  • the public key needs to be sent to the client in advance.
  • the private key is used to encrypt the new password.
  • the router may send the public key to the client in advance.
  • the router keeps sending beacon signals to the client periodically, that is, sending a beacon signal every preset time. Only one beacon signal is randomly selected, and the encrypted new password is added to the selected beacon signal to obtain a target beacon signal, and the target beacon signal is sent to the client. That is, in this embodiment, the above-mentioned new password is only added to a beacon signal, which avoids the defect that the password is likely to be leaked when the sealed packet is continuously sent. Further, in order to indicate that the target beacon signal has a new password, when the target beacon signal is sent, a sound wave signal with a designated frequency and a designated duration is sent. Generally, the sound wave signal of the specified frequency cannot be perceived by the human ear, that is, it will not cause interference to the user.
  • the above-mentioned sound wave signal can be a high-frequency signal (greater than 20000 Hz) or a low-frequency signal (less than 20 Hz). Using a low frequency below 20 Hz will require a long transmission time, while using a high-frequency signal can be transmitted quickly.
  • the above-mentioned sound wave signal is preferably a high-frequency signal (for example, 20000 Hz).
  • the above-mentioned high-frequency signal only needs to maintain 100ms (the cycle time of the above-mentioned beacon signal) to protect this beacon period synchronously. Just send 100ms to protect a beacon signal. If the sound wave signal is continuously emitted for a long period of time, the client cannot determine which beacon signal carries the new password, so it will not continuously generate and emit the sound wave signal.
  • the router sends the public key and the designated frequency information of the sound wave signal to the client in advance, and when the client listens to the sound wave signal on the designated frequency, it can obtain the corresponding target beacon signal. , So as to use the public key to decrypt, obtain the new password, and then use the new password to connect to the router.
  • a PDM audio transmitter is provided on the router, and a PDM audio receiver is provided on the client.
  • the method before the step S1 of obtaining a new password when the instruction to send a new password is triggered, and encrypting the new password with a private key, the method includes:
  • Step S10 connect the client through a wireless network standard protocol, and send the public key corresponding to the private key and the designated frequency information of the sound wave signal to the client.
  • the client before the router has changed the password, the client has the password of the WIFI hotspot originally obtained. At this time, the router connects with the client through the standard 802.11 communication protocol, and uses the WPA2 encryption method to connect the public
  • the key and the designated frequency information (such as 20000 Hz) of the sound wave signal are sent to the client. If the client can receive the public key and the designated frequency information of the sound wave signal, it indicates that the client is legal.
  • the step of randomly adding the encrypted new password to a beacon signal to generate a target beacon signal includes:
  • Step S20 the beacon signal is periodically generated, the encrypted new password is randomly added to one of the beacon signals to generate a target beacon signal, and the Vendor in the other beacon signals Randomly generate garbled information in the IE field.
  • the Vendor IE (vendor IE) field in the beacon signal is a field defined according to the standard. It is usually used to add information to each manufacturer. Each manufacturer can fill in what it wants to fill in. The data is usually filled with OUI, which is the manufacturer's own ID.
  • the Vendor of one of the beacon signals is randomly selected The encrypted new password is added to the IE field, and random garbled information is generated in the Vendor IE field of other beacon signals except the target beacon signal, making each beacon signal different, making it difficult for hackers Discover the real valid beacon signal (that is, the beacon signal with the new password).
  • the method before the step S1 of obtaining a new password when the instruction to send a new password is triggered, and encrypting the new password with a private key, the method includes:
  • Step S101 receiving a Probe Request packet sent by the client, wherein the Probe Request packet is added with an SSID;
  • Step S102 judging whether the SSID of the router is the same as the SSID added in the Probe Request packet;
  • Step S103 if they are the same, trigger the instruction to send a new password according to the re-sending password flag information added in the Probe Request packet.
  • the client if the client is offline, it cannot connect to the router whose password has been changed when it goes online again.
  • the above client generates a Probe Request (probe request) packet and transmit the Probe Request packet, where the Vendor of the Probe Request packet A Resend Password Flag is set in IE, and the SSID is added to the above Probe Request packet, which is the service set identifier of the router.
  • the router When the router scans the surrounding signals, it receives the Probe Request packet sent by the client, and parses the SSID from it, and compares the resolved SSID with the router’s real SSID to determine whether they are consistent. If the router’s SSID is sent by the client If the SSID in the Probe Request is the same, the router will respond with Probe Response (probe response frame) to inform the client that it has received the probe request from the client. And then continue to the above Probe The Request packet is parsed, and if the above-mentioned re-sending password flag information is parsed from the above-mentioned Probe Request packet, the above-mentioned instruction to send a new password can be triggered. In this embodiment, even if the above-mentioned client is offline, the new password of the router can also be obtained.
  • Probe Response probe response frame
  • an embodiment of the present application also provides a method for updating a new password, which is applied to the client and includes the following steps:
  • Step S1a receiving the beacon signal periodically sent by the router, and continuously monitoring whether there is a sound wave signal of the designated frequency;
  • Step S2a if it is monitored, acquire the target beacon signal sent simultaneously with the sound wave signal, and decrypt the target beacon signal with a preset public key to obtain a new password; wherein the new password is The new password for the client to connect to the router.
  • the IoT device after the password for connecting to the router is set as a new password, if the IoT device needs to connect to the router again, it needs to obtain the new password and reset it.
  • a PDM audio transmitter is provided on the router, and a PDM audio receiver is provided on the client.
  • the router keeps periodically sending a beacon signal to the client, that is, it sends a beacon signal every preset time. And an encrypted new password is added to one of the beacon signals, and at the same time a sound wave signal of a designated frequency is sent out while the beacon signal is sent.
  • the sound wave signal of the specified frequency cannot be perceived by the human ear, that is, it will not cause interference to the user.
  • the above-mentioned sound wave signal can be a high-frequency signal (greater than 20000 Hz) or a low-frequency signal (less than 20 Hz). Using a low frequency below 20 Hz will require a long transmission time, while using a high-frequency signal can be transmitted quickly.
  • the above-mentioned sound wave signal is preferably a high-frequency signal (for example, 20000 Hz).
  • the above-mentioned sound wave signal is a signal of a designated time length, and the above-mentioned designated time length is the same as the cycle time of the above-mentioned beacon signal transmission.
  • the router sends the public key and the designated frequency information of the sonic signal to the client in advance, and the client continuously monitors the sonic signal, and when it monitors the sonic signal of the specified frequency, it acquires the information sent simultaneously with the sonic signal.
  • the target beacon signal is decrypted by using the public key to obtain a new password. Using the new password, the client can reconnect to the router.
  • the method before the step S1a of receiving the beacon signal periodically sent by the router and continuously monitoring the sound wave signal of the specified frequency and the specified duration, the method further includes:
  • the router is connected through a wireless network standard protocol, and the public key sent by the router and the designated frequency information of the sound wave signal are received.
  • the router connects to the client through a standard 802.11 communication protocol, and sends the public key and the designated frequency information (for example, 20000 Hz) of the sound wave signal to the client through the WPA2 encryption method.
  • the client receives the public key and the designated frequency information of the sound wave signal and stores it. Even if the client is offline, it can also use the pre-stored public key and the designated frequency information of the sound wave signal.
  • the above-mentioned client is offline, and it cannot connect with the above-mentioned router whose password has been changed when it goes online again.
  • the above client generates a Probe Request (probe request) packet and transmit the Probe Request packet, where the Vendor of the Probe Request packet A Resend Password Flag is set in IE, and the SSID is added to the above Probe Request packet, which is the service set identifier of the router.
  • the router When the router scans the surrounding signals, it receives the Probe Request packet sent by the client, and parses the SSID from it, and compares the resolved SSID with the router’s real SSID to determine whether they are consistent. If the router’s SSID is sent by the client If the SSID in the Probe Request is the same, the router will respond with Probe Response (probe response frame) to inform the client that it has received the probe request from the client. And then continue to the above Probe The Request packet is parsed, and if the above-mentioned re-sending password flag information is parsed from the above-mentioned Probe Request packet, the above-mentioned instruction to send a new password can be triggered. In this embodiment, even if the above-mentioned client is offline, the new password of the router can also be obtained.
  • Probe Response probe response frame
  • an embodiment of the present application also provides a new password updating device, which is applied to a router, and includes:
  • the encryption unit 10 is configured to obtain a new password when an instruction to send a new password is triggered, and encrypt the new password with a private key; wherein the new password is a new password for the client to connect to the router;
  • the sending unit 20 is configured to randomly add the encrypted new password to a beacon signal to generate a target beacon signal when periodically sending a beacon signal, and send the target beacon signal to the client terminal. At the same time, a sound wave signal with a specified frequency is sent out.
  • the device for updating the new password further includes:
  • the connecting unit is configured to connect to the client through a wireless network standard protocol, and send the public key corresponding to the private key and the designated frequency information of the sound wave signal to the client.
  • the sending unit 20 is specifically configured to:
  • the beacon signal is periodically generated, and the encrypted new password is randomly added to one of the beacon signals to generate the target beacon signal, and the Vendor in the other beacon signals Randomly generate garbled information in the IE field.
  • the device for updating the new password further includes:
  • a receiving unit configured to receive a Probe Request packet sent by the client, wherein the Probe Request packet is added with an SSID;
  • the instruction to send a new password is triggered according to the re-sending password flag information added in the Probe Request packet.
  • the sound wave signal sent by the sending unit 20 is a signal of a designated time length, and the designated time length of the sound wave signal is a transmission period of the beacon signal.
  • the sound wave signal sent by the sending unit 20 is a high frequency signal.
  • the sending unit 20 sends out the sound wave signal of a specified frequency through a PDM audio transmitter set on the router.
  • an embodiment of the present application also provides a new password updating device, which is applied to the client terminal, and includes:
  • the monitoring unit 100 is configured to receive the beacon signal periodically sent by the router, and continuously monitor whether there is a sound wave signal of a specified frequency;
  • the decryption unit 200 is configured to obtain a target beacon signal sent simultaneously with the sound wave signal if it is monitored, and decrypt the target beacon signal with a preset public key to obtain a new password; wherein the new The password is a new password for the client to connect to the router.
  • an embodiment of the present application also provides a computer device.
  • the computer device may be a server, and its internal structure may be as shown in FIG. 5.
  • the computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus. Among them, the processor designed by the computer is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, a computer program, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage medium.
  • the database of the computer equipment is used to store new passwords, public keys, private keys, etc.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer program is executed by the processor to realize a new password update method.
  • the above new password update method, applied to routers, includes the following steps:
  • the encrypted new password is randomly added to a beacon signal to generate a target beacon signal, and when the target beacon signal is sent to the client, a designated frequency is sent Sonic signal.
  • the method before the step of acquiring the new password by the processor when the instruction to send the new password is triggered, and encrypting the new password with the private key, the method includes:
  • the client is connected through a wireless network standard protocol, and the public key corresponding to the private key and the designated frequency information of the sound wave signal are sent to the client.
  • randomly adding the encrypted new password to a beacon signal to generate a target beacon signal includes:
  • the beacon signal is periodically generated, and the encrypted new password is randomly added to one of the beacon signals to generate the target beacon signal, and the Vendor in the other beacon signals Randomly generate garbled information in the IE field.
  • the method before the step of acquiring the new password by the processor when the instruction to send the new password is triggered, and encrypting the new password with the private key, the method includes:
  • the instruction to send a new password is triggered according to the re-sending password flag information added in the Probe Request packet.
  • the sonic signal is a signal of a designated duration
  • the designated duration of the sonic signal is a transmission period of the beacon signal.
  • the above-mentioned new password update method applied to the client, includes the following steps:
  • the target beacon signal sent simultaneously with the sound wave signal is obtained, and the target beacon signal is decrypted by the preset public key to obtain a new password; wherein the new password is the client The new password to connect to the router.
  • the method before the step of the processor receiving the beacon signal periodically sent by the router and continuously monitoring the sound wave signal with a specified frequency and a specified duration, the method further includes:
  • the router is connected through a wireless network standard protocol, and the public key sent by the router and the designated frequency information of the sound wave signal are received.
  • FIG. 5 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • An embodiment of the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, a method for updating a new password is realized.
  • the computer-readable storage medium in this embodiment may be a volatile readable storage medium or a non-volatile readable storage medium.
  • the new password update method, device, computer equipment, and storage medium provided in the embodiments of this application include: when an instruction to send a new password is triggered, acquiring the new password, and pairing the new password with the private key
  • the new password is encrypted; wherein the new password is the new password for the client to connect to the router; when the beacon signal is sent periodically, the encrypted new password is randomly added to a beacon signal to generate a target beacon Signal, and when sending the target beacon signal to the client, a sound wave signal of a specified frequency is sent.
  • only a new encrypted password is randomly added to a beacon signal, and a sound wave signal is sent out at the same time as the identification of the beacon signal. Only when the sound wave signal is received at the same time, can the corresponding beacon signal be obtained. Analyze the new password to avoid the disclosure of the password.
  • Non-volatile memory may include read-only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual-rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种新密码的更新方法、装置和计算机设备,在发送新密码的指令被触发时,获取新密码,进行加密;将加密后的新密码随机添加至一个信标信号中生成目标信标信号,发送目标信标信号的同时,发出指定频率的音波信号。本申请随机在一个信标信号中添加有加密后的新密码,同时发出音波信号,避免密码的泄露。

Description

新密码的更新方法、装置和计算机设备 技术领域
本申请涉及网络设备技术领域,特别涉及一种新密码的更新方法、装置、计算机设备和存储介质。
背景技术
目前的家用WIFI路由器,在重新设定密码(Password)后,需要所有搭配的STA(WLAN中的客户端)也更新密码设定才能正常联机。在现在物联网的设备愈来愈多的情况下,要逐一完成每个客户端的密码设定,对使用者来说是个很大的工程。
为了解决这个问题,许多自动更新密码的技术被提出,其中通过一连串加密封包的传送,让各客户端解开封包后,解密出新的密码是最主要的解决方法。然而,由于发送的是一连串加密封包,则黑客只需要抓取到任意一个加密封包则可以获取到密码,容易造成密码的泄露;同时,在客户端脱机状态下,无法接收到更新密码后的加密封包,导致客户端重新启动联机时无法正常联机。
技术问题
本申请的主要目的为提供一种新密码的更新方法、装置、计算机设备和存储介质,旨在克服目前容易造成密码泄露的缺陷以及离线状态下无法自动获取更新后的密码的缺陷。
技术解决方案
为实现上述目的,本申请提供了一种新密码的更新方法,应用于路由器,包括以下步骤:
在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
进一步地,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
进一步地,所述周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号的步骤,包括:
周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
进一步地,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
进一步地,所述音波信号为指定时长的信号,且所述音波信号的指定时长为所述信标信号的发送周期。
本申请还提供了一种新密码的更新方法,应用于客户端,包括以下步骤:
接收路由器周期性发送的信标信号,并持续监听是否存在指定频率的音波信号;
若监听到,则获取与所述音波信号同时发送的目标信标信号,并通过预设的公钥对所述目标信标信号进行解密,得到新密码;其中所述新密码为所述客户端连接所述路由器的新密码。
进一步地,所述接收路由器周期性发送的信标信号,并持续监听是否存在指定频率的音波信号的步骤之前,还包括:
通过无线网络标准协议连接所述路由器,并接收所述路由器发送的公钥以及所述音波信号的指定频率信息。
本申请还提供了一种新密码的更新装置,应用于路由器,包括:
加密单元,用于在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
发送单元,用于周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
本申请还提供一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机程序,所述处理器执行所述计算机程序时实现上述任一项所述方法的步骤。
本申请还提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现上述任一项所述的方法的步骤。
有益效果
本申请提供的新密码的更新方法、装置、计算机设备和存储介质,包括:在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。本申请中,只随机在一个信标信号中添加有加密后的新密码,而且同时发出音波信号作为对该信标信号的标识,只有同时收到该音波信号时,才能从对应的信标信号中解析出新密码,避免密码的泄露。
附图说明
图1 是本申请一实施例中新密码的更新方法步骤示意图;
图2 是本申请另一实施例中新密码的更新方法步骤示意图;
图3 是本申请一实施例中新密码的更新装置结构框图;
图4 是本申请另一实施例中新密码的更新装置结构框图
图5 为本申请一实施例的计算机设备的结构示意框图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
本发明的最佳实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
参照图1,本申请一实施例中提供了一种新密码的更新方法,应用于路由器,包括以下步骤:
步骤S1,在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
步骤S2,周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
在本实施例中,上述路由器为发射WIFI热点的路由器,上述客户端为连接上述WIFI热点的终端设备,例如各种物联网的家居设备(空调、灯具、手机等)。
在本实施例中,当连接上述路由器的密码被设置为新密码之后,物联网设备若需要与上述路由器再次进行连接,则需要获取到上述新密码,并重新设定。
在本实施例中,如上述步骤S1所述的,上述发送新密码的指令可以由用户所触发,也可以是自动触发,例如,路由器的密码被设置为新密码之后,与客户端连接时则触发上述指令。
在本实施例中,为了避免新密码泄露,需要对该新密码进行加密,上述路由器中内置有加密算法,得到一对私钥以及公钥,其中公钥需要预先发送至上述客户端,而上述私钥则用于对上述新密码进行加密。具体地,路由器的密码在更新之前,上述客户端与上述路由器进行连接时,上述路由器可以预先将上述公钥发送至上述客户端。
如上述步骤S2所述的,上述路由器保持周期性发送信标信号至上述客户端,即每隔预设时间发送一个信标信号。从其中只随机选择出一个信标信号,并将上述加密后的所述新密码添加至选择出的信标信号中得到目标信标信号,并将该目标信标信号发送至客户端。即在本实施例中,上述新密码仅仅是添加在一个信标信号中,避免了目前连续发送加密封包时容易造成密码泄露的缺陷。进一步地,为了标示出上述目标信标信号中具有新密码,在发送上述目标信标信号的同时,发出一个指定频率指定时长的音波信号。通常地,该指定频率的音波信号无法被人耳所感知,即不会对用户造成干扰。上述音波信号可以是高频信号(大于20000Hz),也可以是低频信号(小于20Hz),使用20Hz以下的低频会需要较长的传送时间,而使用高频信号时则可以快速传送。
在本实施例中,上述音波信号优选高频信号(如20000Hz)。上述高频信号只需维持100ms(上述信标信号的周期时间),以同步保护这个信标周期,路由器只需要在携带有新密码的信标信号发送出时,同步产生音波信号即可,也就是只送100ms,以保护一个信标信号。如果持续长期的发出音波信号,则客户端无法确定哪一个信标信号携带有新密码,因此不会持续产生并发出音波信号。
应当理解的是,上述路由器预先将上述公钥以及音波信号的指定频率信息发送至上述客户端,当上述客户端在该指定频率上监听到上述音波信号时,则可以获取对应的目标信标信号,从而使用上述公钥进行解密,得到上述新密码,从而使用上述新密码连接上述路由器。
在本实施例中,上述路由器上设置有PDM音频发射器,上述客户端上设置有PDM音频接收器。
在一实施例中,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤S1之前,包括:
步骤S10,通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
在本实施例中,在路由器未更改密码之前,客户端具有原始获得的WIFI热点的密码,此时,上述路由器通过标准802.11通讯协议与上述客户端进行连接,并通过WPA2加密方法,将上述公钥以及音波信号的指定频率信息(如20000Hz)发送至所述客户端。若上述客户端可以接收到上述公钥以及音波信号的指定频率信息,则表明该客户端合法。
在一个实施例中,所述周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号的步骤,包括:
步骤S20,周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
在本实施例中,信标信号中的Vendor IE (供应商IE)字段是按标准定义的字段,通常是用来给各厂商自行添加信息的字段,每个厂商都可以填入自己想填的数据,通常填入的是OUI,也就是厂商自己的ID。在本实施例中,随机在其中一个信标信号的Vendor IE字段中添加加密后的新密码,同时在除目标信标信号之外的其它信标信号的Vendor IE字段中生成有随机的乱码信息,使得每一个信标信号都不相同,黑客便很难从中发现真正有效的信标信号(即携带有新密码的信标信号)。
在一实施例中,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤S1之前,包括:
步骤S101,接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
步骤S102,判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
步骤S103,若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
在本实施例中,若上述客户端处于脱机状态,则其重新上线时无法与上述已更改密码的路由器进行连接。此时,上述客户端产生一个Probe Request(探测请求)封包,并将该Probe Request封包发射出去,其中上述Probe Request封包的Vendor IE里设定一个Resend Password Flag(重新发送密码标志),且上述Probe Request封包中添加有SSID,该SSID为其路由器的服务集标识。
上述路由器在扫描周围信号时,接收到上述客户端发送的Probe Request封包,并从中解析出SSID,将解析出的SSID与路由器的真实SSID进行对比,判断是否一致,若路由器的SSID与客户端发出的Probe Request里的SSID相同,路由器则会进行Probe Response(探测响应帧)的响应,以告知上述客户端已接收到上述客户端的探测请求。进而继续对上述Probe Request封包进行解析,若从上述Probe Request封包中解析到上述重新发送密码标志信息,则可以触发上述发送新密码的指令。在本实施例中,即便上述客户端处于脱机状态,也同样可以获取到路由器的新密码。
参照图2,本申请一实施例中还提供了一种新密码的更新方法,应用于客户端,包括以下步骤:
步骤S1a,接收路由器周期性发送的信标信号,并持续监听是否存在指定频率的音波信号;
步骤S2a,若监听到,则获取与所述音波信号同时发送的目标信标信号,并通过预设的公钥对所述目标信标信号进行解密,得到新密码;其中所述新密码为所述客户端连接所述路由器的新密码。
在本实施例中,当连接上述路由器的密码被设置为新密码之后,物联网设备若需要与上述路由器再次进行连接,则需要获取到上述新密码,并重新设定。
在本实施例中,上述路由器上设置有PDM音频发射器,上述客户端上设置有PDM音频接收器。
上述路由器保持周期性发送信标信号至上述客户端,即每隔预设时间发送一个信标信号。且在其中一个信标信号中添加有加密后的新密码,同时在发送上述信标信号的同时发出一个指定频率的音波信号。通常地,该指定频率的音波信号无法被人耳所感知,即不会对用户造成干扰。上述音波信号可以是高频信号(大于20000Hz),也可以是低频信号(小于20Hz),使用20Hz以下的低频会需要较长的传送时间,而使用高频信号时则可以快速传送。在本实施例中,上述音波信号优选高频信号(如20000Hz)。其它实施例中,上述音波信号为指定时长的信号,且上述指定时长与上述发送信标信号的周期时间相同。
上述路由器预先将上述公钥以及音波信号的指定频率信息发送至上述客户端,上述客户端持续监听上述音波信号,当监听到上述指定频率的音波信号时,则获取与所述音波信号同时发送的目标信标信号,并通过上述公钥对所述目标信标信号进行解密,得到新密码,使用该新密码,客户端则可以重新连接上上述路由器。
在一个实施例中,所述接收路由器周期性发送的信标信号,并持续监听指定频率指定时长的音波信号的步骤S1a之前,还包括:
通过无线网络标准协议连接所述路由器,并接收所述路由器发送的公钥以及所述音波信号的指定频率信息。
在本实施例中,上述路由器通过标准802.11通讯协议与上述客户端进行连接,并通过WPA2加密方法,将上述公钥以及音波信号的指定频率信息(如20000Hz)发送至所述客户端。上述客户端接收公钥以及音波信号的指定频率信息并进行存储,即便上述客户端处于脱机状态,也可以使用上述预先存储的公钥以及音波信号的指定频率信息。
在本实施例中,上述客户端处于脱机状态,则其重新上线时无法与上述已更改密码的路由器进行连接。此时,上述客户端产生一个Probe Request(探测请求)封包,并将该Probe Request封包发射出去,其中上述Probe Request封包的Vendor IE里设定一个Resend Password Flag(重新发送密码标志),且上述Probe Request封包中添加有SSID,该SSID为其路由器的服务集标识。
上述路由器在扫描周围信号时,接收到上述客户端发送的Probe Request封包,并从中解析出SSID,将解析出的SSID与路由器的真实SSID进行对比,判断是否一致,若路由器的SSID与客户端发出的Probe Request里的SSID相同,路由器则会进行Probe Response(探测响应帧)的响应,以告知上述客户端已接收到上述客户端的探测请求。进而继续对上述Probe Request封包进行解析,若从上述Probe Request封包中解析到上述重新发送密码标志信息,则可以触发上述发送新密码的指令。在本实施例中,即便上述客户端处于脱机状态,也同样可以获取到路由器的新密码。
参照图3,本申请一实施例中还提供了一种新密码的更新装置,应用于路由器,包括:
加密单元10,用于在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
发送单元20,用于周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
在一实施例中,上述新密码的更新装置,还包括:
连接单元,用于通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
在一实施例中,所述发送单元20具体用于:
周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
在一实施例中,上述新密码的更新装置,还包括:
接收单元,用于接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
判断单元,用于判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
在一实施例中,所述发送单元20发送的音波信号为指定时长的信号,且所述音波信号的指定时长为所述信标信号的发送周期。
在一实施例中,所述发送单元20发送的音波信号为高频信号。
在一实施例中,所述发送单元20通过所述路由器上设置的PDM音频发射器发出指定频率的所述音波信号。
参照图4,本申请一实施例中还提供了一种新密码的更新装置,应用于客户端,包括:
监听单元100,用于接收路由器周期性发送的信标信号,并持续监听是否存在指定频率的音波信号;
解密单元200,用于若监听到,则获取与所述音波信号同时发送的目标信标信号,并通过预设的公钥对所述目标信标信号进行解密,得到新密码;其中所述新密码为所述客户端连接所述路由器的新密码。
在本实施例中,上述装置实施例中的各个单元的具体实现,请参照对应的上述方法实施例中所述,在此不再进行赘述。
参照图5,本申请实施例中还提供一种计算机设备,该计算机设备可以是服务器,其内部结构可以如图5所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设计的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储新密码、公钥、私钥等。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现一种新密码的更新方法。
上述新密码的更新方法,应用于路由器,包括以下步骤:
在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
在一实施例中,所述处理器在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
在一实施例中,所述处理器周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号的步骤,包括:
周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
在一实施例中,所述处理器在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
在一实施例中,所述音波信号为指定时长的信号,且所述音波信号的指定时长为所述信标信号的发送周期。
另一方面,上述新密码的更新方法,应用于客户端,包括以下步骤:
接收路由器周期性发送的信标信号,并持续监听是否存在指定频率的音波信号;
若监听到,则获取与所述音波信号同时发送的目标信标信号,并通过预设的公钥对所述目标信标信号进行解密,得到新密码;其中所述新密码为所述客户端连接所述路由器的新密码。
在一实施例中,所述处理器接收路由器周期性发送的信标信号,并持续监听指定频率指定时长的音波信号的步骤之前,还包括:
通过无线网络标准协议连接所述路由器,并接收所述路由器发送的公钥以及所述音波信号的指定频率信息。
本领域技术人员可以理解,图5中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定。
本申请一实施例还提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现一种新密码的更新方法。可以理解的是,本实施例中的计算机可读存储介质可以是易失性可读存储介质,也可以为非易失性可读存储介质。
综上所述,为本申请实施例中提供的新密码的更新方法、装置、计算机设备和存储介质,包括:在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。本申请中,只随机在一个信标信号中添加有加密后的新密码,而且同时发出音波信号作为对该信标信号的标识,只有同时收到该音波信号时,才能从对应的信标信号中解析出新密码,避免密码的泄露。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的和实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可以包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM通过多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双速据率SDRAM(SSRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其它变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其它要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、装置、物品或者方法中还存在另外的相同要素。
以上所述仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其它相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (15)

  1. 一种新密码的更新方法,应用于路由器,其特征在于,包括以下步骤:
    在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
    周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
  2. 根据权利要求1所述的新密码的更新方法,其特征在于,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
    通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
  3. 根据权利要求1所述的新密码的更新方法,其特征在于,所述周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号的步骤,包括:
    周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
  4. 根据权利要求1所述的新密码的更新方法,其特征在于,所述在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密的步骤之前,包括:
    接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
    判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
    若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
  5. 根据权利要求1所述的新密码的更新方法,其特征在于,所述音波信号为指定时长的信号,且所述音波信号的指定时长为所述信标信号的发送周期。
  6. 根据权利要求1所述的新密码的更新方法,其特征在于,所述音波信号为高频信号。
  7. 根据权利要求1所述的新密码的更新方法,其特征在于,所述路由器上设置有PDM音频发射器,用于发出指定频率的所述音波信号。
  8. 一种新密码的更新装置,应用于路由器,其特征在于,包括:
    加密单元,用于在发送新密码的指令被触发时,获取新密码,并通过私钥对所述新密码进行加密;其中,所述新密码为客户端连接所述路由器的新密码;
    发送单元,用于周期性发送信标信号时,将加密后的所述新密码随机添加至一个信标信号中生成目标信标信号,并在发送所述目标信标信号至所述客户端的同时,发出指定频率的音波信号。
  9. 根据权利要求8所述的新密码的更新装置,其特征在于,还包括:
    连接单元,用于通过无线网络标准协议连接所述客户端,并将所述私钥对应的公钥以及所述音波信号的指定频率信息发送至所述客户端。
  10. 根据权利要求8所述的新密码的更新装置,其特征在于,所述发送单元具体用于:
    周期性产出所述信标信号,将加密后的所述新密码随机添加至其中一个信标信号中生成目标信标信号,并在其它信标信号中的Vendor IE字段中随机生成乱码信息。
  11. 根据权利要求8所述的新密码的更新装置,其特征在于,还包括:
    接收单元,用于接收所述客户端发送的Probe Request封包,其中所述Probe Request封包中添加有SSID;
    判断单元,用于判断所述路由器的SSID与所述Probe Request封包中添加的SSID是否相同;
    若相同,则根据所述Probe Request封包中添加的重新发送密码标志信息触发发送新密码的指令。
  12. 根据权利要求8所述的新密码的更新装置,其特征在于,所述发送单元发送的音波信号为指定时长的信号,且所述音波信号的指定时长为所述信标信号的发送周期。
  13. 根据权利要求8所述的新密码的更新装置,其特征在于,所述发送单元发送的音波信号为高频信号。
  14. 根据权利要求8所述的新密码的更新装置,其特征在于,所述发送单元通过所述路由器上设置的PDM音频发射器发出指定频率的所述音波信号。
  15. 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机程序,其特征在于,所述处理器执行所述计算机程序时实现权利要求1至7中任一项所述方法的步骤。
PCT/CN2020/095680 2020-06-11 2020-06-11 新密码的更新方法、装置和计算机设备 WO2021248419A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/095680 WO2021248419A1 (zh) 2020-06-11 2020-06-11 新密码的更新方法、装置和计算机设备

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2020/095680 WO2021248419A1 (zh) 2020-06-11 2020-06-11 新密码的更新方法、装置和计算机设备

Publications (1)

Publication Number Publication Date
WO2021248419A1 true WO2021248419A1 (zh) 2021-12-16

Family

ID=78846736

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/095680 WO2021248419A1 (zh) 2020-06-11 2020-06-11 新密码的更新方法、装置和计算机设备

Country Status (1)

Country Link
WO (1) WO2021248419A1 (zh)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150221149A1 (en) * 2014-06-30 2015-08-06 Richard Brewster Main Wifi wallet payments and entry keys
CN106162647A (zh) * 2016-08-31 2016-11-23 海尔优家智能科技(北京)有限公司 一种智能设备配置入网方法和装置
CN106412960A (zh) * 2016-10-31 2017-02-15 公牛集团有限公司 一种实现Wi‑Fi配网的控制方法
CN108024321A (zh) * 2016-11-03 2018-05-11 联发科技股份有限公司 唤醒信号发送与接收的方法、接入点以及Wi-Fi装置
CN108901056A (zh) * 2018-06-21 2018-11-27 百度在线网络技术(北京)有限公司 用于交互信息的方法和装置
CN110225516A (zh) * 2018-03-01 2019-09-10 鸿合科技股份有限公司 一种无线网络的连接方法及系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150221149A1 (en) * 2014-06-30 2015-08-06 Richard Brewster Main Wifi wallet payments and entry keys
CN106162647A (zh) * 2016-08-31 2016-11-23 海尔优家智能科技(北京)有限公司 一种智能设备配置入网方法和装置
CN106412960A (zh) * 2016-10-31 2017-02-15 公牛集团有限公司 一种实现Wi‑Fi配网的控制方法
CN108024321A (zh) * 2016-11-03 2018-05-11 联发科技股份有限公司 唤醒信号发送与接收的方法、接入点以及Wi-Fi装置
CN110225516A (zh) * 2018-03-01 2019-09-10 鸿合科技股份有限公司 一种无线网络的连接方法及系统
CN108901056A (zh) * 2018-06-21 2018-11-27 百度在线网络技术(北京)有限公司 用于交互信息的方法和装置

Similar Documents

Publication Publication Date Title
US11576023B2 (en) Method and apparatus for providing a secure communication in a self-organizing network
US10601594B2 (en) End-to-end service layer authentication
KR100694219B1 (ko) 무선 단말에서의 액세스 포인트 데이터 전송 모드 감지장치 및 그 방법
US7990938B1 (en) Access point configuration
US8446843B2 (en) Rapid local address assignment for wireless communication networks
US11109230B2 (en) Network roaming protection method, related device, and system
US20140351887A1 (en) Authentication Method and Device for Network Access
KR20160078426A (ko) 무선 직접통신 네트워크에서 비대칭 키를 사용하여 아이덴티티를 검증하기 위한 방법 및 장치
JP2013534754A (ja) 通信システムにおいて加入者認証とデバイス認証とをバインドするための方法および装置
CN107567017B (zh) 无线连接系统、装置及方法
WO2021213463A1 (zh) 智能设备的配网方法及装置、电子设备、计算机可读介质
US10693633B2 (en) Timestamp based onboarding process for wireless devices
KR20160058491A (ko) 사용자 기기의 식별자에 기반하여 서비스를 제공하는 방법 및 장치
EP3111701A1 (en) Access point initiated neighbor report request
WO2015100974A1 (zh) 一种终端认证的方法、装置及系统
KR20150051568A (ko) 이동 통신 시스템 환경에서 프락시미티 기반 서비스 단말 간 발견 및 통신을 지원하기 위한 보안 방안 및 시스템
JP7263098B2 (ja) 端末、通信方法、および、プログラム
JP2024507208A (ja) セルラネットワークを動作させるための方法
WO2015192665A1 (zh) 基于临时mac地址的接入方法、装置及系统
CN111510991B (zh) 新密码的更新方法、装置、计算机设备和存储介质
WO2021248419A1 (zh) 新密码的更新方法、装置和计算机设备
JP2013247533A (ja) 無線lan通信システム、無線lan親機、無線lan子機、通信接続確立方法、及びプログラム
KR101658657B1 (ko) 네트워크 접속 보안 강화 시스템을 위한 단말장치 및 인증지원장치
JP2008244945A (ja) 無線接続環境設定システム、無線接続環境設定サーバ、情報端末、及び、プログラム
KR101783380B1 (ko) 네트워크 접속 보안 강화 시스템을 위한 단말장치 및 인증지원장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20940070

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 03/02/2023

122 Ep: pct application non-entry in european phase

Ref document number: 20940070

Country of ref document: EP

Kind code of ref document: A1