CN107864476A - The access authentication method and terminal of a kind of wireless network - Google Patents
The access authentication method and terminal of a kind of wireless network Download PDFInfo
- Publication number
- CN107864476A CN107864476A CN201711091954.8A CN201711091954A CN107864476A CN 107864476 A CN107864476 A CN 107864476A CN 201711091954 A CN201711091954 A CN 201711091954A CN 107864476 A CN107864476 A CN 107864476A
- Authority
- CN
- China
- Prior art keywords
- terminal
- information
- wireless access
- certified
- biological information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 36
- 238000012545 processing Methods 0.000 claims description 25
- 230000005540 biological transmission Effects 0.000 claims description 5
- 238000012790 confirmation Methods 0.000 claims description 2
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 238000005516 engineering process Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 239000004973 liquid crystal related substance Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Health & Medical Sciences (AREA)
- Biomedical Technology (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the present invention provides a kind of access authentication method and terminal of wireless network, and wireless access end sends access authentication prompting message to terminal.Terminal starts the biological information obtaining widget related to access authentication prompting message and obtains biological information to be certified, then sends access authentication message to wireless access end, and access authentication message includes biological information to be certified.Wireless access end is when confirming that biological information to be certified is consistent with the biological information to prestore, it is allowed to which the terminal is linked into the wireless access end.Because wireless access end is by verifying that the biological information that terminal is sent determines whether that terminal accesses, therefore does not need user to be manually entered the password of complexity and complete certification, improve the convenience of terminal access wireless network.Because biological information is unique, thus using biological information as wireless network access authentication in a manner of there is higher security and nonrepeatability.
Description
Technical field
The present embodiments relate to WLAN technologies field, more particularly to a kind of access authentication side of wireless network
Method and terminal.
Background technology
With WLAN technologies development and the popularization of personal intelligent terminal, user more and more passes through wireless heat
Point is in terminal equipment access network.What is generally taken at present is manually to input password to complete certification.But needing to input
It is very inconvenient by way of button inputs one by one when more complicated password is to complete certification.The password pre-set in addition
Easily cracked or stolen by other people, so as to influence the security of WLAN.
The content of the invention
The embodiment of the present invention provides a kind of access authentication method and terminal of wireless network, for solving to lead in the prior art
Cross be manually entered password access WLAN method operate inconvenient while security it is relatively low the problem of.
The embodiments of the invention provide a kind of access authentication method of wireless network, including:
Wireless access end sends access authentication prompting message to terminal;
The wireless access end receives the access authentication message that the terminal is sent, and the access authentication message includes treating
The biological information of certification;
The wireless access end is confirming that the biological information to be certified is consistent with the biological information to prestore
When, it is allowed to the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The wireless access end is confirming that the biological information to be certified is consistent with the biological information to prestore
When, it is allowed to the terminal is linked into the wireless access end, including:
The wireless access end parses the access authentication message, obtains the attribute information of acoustic information to be certified, institute
State attribute information and comprise at least sound characteristic;
The wireless access end confirms the sound of the sound characteristic and the acoustic information to prestore of the acoustic information to be certified
When sound feature is consistent, it is allowed to which the terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
It is described to allow the terminal to be linked into before the wireless access end, in addition to:
The wireless access end confirms the sound of the sound-content and the acoustic information to prestore of the acoustic information to be certified
Sound content is consistent.
The embodiments of the invention provide a kind of access authentication method of wireless network, including:
Terminal receives the access authentication prompting message that wireless access end is sent;
The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through institute
State biological information obtaining widget and get biological information to be certified;
The terminal sends access authentication message to the wireless access end, and the access authentication message includes to be certified
Biological information;
The terminal confirms the biological information to be certified and the biological characteristic to prestore at the wireless access end
When information is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through institute
State biological information obtaining widget and get biological information to be certified, including:
The terminal starts sound receiving part and receives acoustic information to be certified or the other equipment transmission that user sends
Acoustic information to be certified.
The embodiments of the invention provide a kind of wireless access end, including:
Sending module, for sending access authentication prompting message to terminal;
Receiving module, the access authentication message sent for receiving the terminal, the access authentication message include treating
The biological information of certification;
Processing module, for confirming that the biological information to be certified is consistent with the biological information to prestore
When, it is allowed to the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The processing module is specifically used for:
The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information is at least
Including sound characteristic;
When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, permit
Perhaps described terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
The processing module is additionally operable to:
It is described to allow the terminal to be linked into before the wireless access end, confirm the sound of the acoustic information to be certified
The sound-content of acoustic information of the sound content with prestoring is consistent.
The embodiments of the invention provide a kind of terminal, including:
Receiving module, for receiving the access authentication prompting message of wireless access end transmission;
Processing module, for starting the biological information obtaining widget related to the access authentication prompting message, and
Biological information to be certified is got by the biological information obtaining widget;
Sending module, for sending access authentication message to the wireless access end, the access authentication message includes
Biological information to be certified;
The processing module, at the wireless access end confirming the biological information to be certified and prestoring
When biological information is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The processing module is specifically used for:
The acoustic information to be certified or other equipment that startup sound receiving part reception user sends send to be certified
Acoustic information.
The embodiments of the invention provide a kind of computing device, including:
Memory, instructed for storage program;
Processor, for calling the programmed instruction stored in the memory, performed according to the program of acquisition any of the above-described
Method described in.
The embodiments of the invention provide a kind of computer-readable storage medium, the computer-readable recording medium storage has calculating
Machine executable instruction, the computer executable instructions are used to make computer perform the method described in any of the above-described.
The embodiment of the present invention shows that wireless access end sends access authentication prompting message to terminal.Terminal start with it is described
The related biological information obtaining widget of access authentication prompting message, and obtained by the biological information obtaining widget
To biological information to be certified, then access authentication message, the access authentication message are sent to the wireless access end
Include biological information to be certified.Wireless access end is in the life for confirming the biological information to be certified and prestoring
When thing characteristic information is consistent, it is allowed to which the terminal is linked into the wireless access end.Because terminal is obtained by biological information
Take component retrieval to biological information to be certified and send biological information to be certified to wireless access end, then
Determine whether that terminal accesses by wireless access end checking biological information, therefore do not need user to be manually entered the close of complexity
Code completes certification, improves the convenience of terminal access wireless network.Because biological information is unique, therefore with biology
Characteristic information has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, when biology is special
When reference breath is acoustic information, multiple terminals can receive the same acoustic information that same user sends in synchronization, and pass through
The acoustic information completes checking, therefore when many new users need to access wireless network, it can complete to verify simultaneously and access, enter
One step improves the convenience of terminal access wireless network.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this
For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawings
His accompanying drawing.
Fig. 1 is the embodiments of the invention provide a kind of system architecture schematic diagram;
Fig. 2 is a kind of schematic flow sheet of the access authentication method of wireless network provided in an embodiment of the present invention;
Fig. 3 is a kind of flow of the access authentication method of the wireless network of certification acoustic information provided in an embodiment of the present invention
Schematic diagram;
Fig. 4 is the schematic flow sheet of the access authentication method of another wireless network provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation at wireless access end provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal provided in an embodiment of the present invention.
Embodiment
In order that the purpose of the present invention, technical scheme and beneficial effect are more clearly understood, below in conjunction with accompanying drawing and implementation
Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only explaining this hair
It is bright, it is not intended to limit the present invention.
Fig. 1 illustrates a kind of applicable system architecture schematic diagram of the embodiment of the present invention, as shown in figure 1, including nothing
Line incoming end 101 and terminal 102, wireless access end 101 pass through wireless connection with terminal 102.Wireless access end 101 is included but not
It is limited to wireless router, WAP, wireless network adapter, wireless bridge, radio network gateway, wireless authentication server.Eventually
End 102 includes but is not limited to personal computer (personal computer, abbreviation PC), portable computer, palm PC
It is (Personal Digital Assistant, abbreviation PDA), digital camera and video camera, plotter, projecting apparatus, scanner, multiple
Print machine, printer, television set, refrigerator.
Based on the system architecture shown in Fig. 1, as shown in Fig. 2 a kind of access of wireless network provided in an embodiment of the present invention
Authentication method, comprise the following steps:
Step S201, terminal send wireless access request to wireless access end.
Step S202, wireless access end send access authentication prompting message to terminal.
Step S203, terminal starts the biological information obtaining widget related to access authentication prompting message, and passes through
Biological information obtaining widget gets biological information to be certified.
Step S204, terminal send access authentication message to wireless access end, and access authentication message includes to be certified
Biological information.
Step S205, wireless access end are compared biological information to be certified with the biological information to prestore
Compared with.
Step S206, wireless access end are confirming that biological information to be certified is consistent with the biological information to prestore
When, sending allows the message of access to terminal.
Step S207, terminal are linked into wireless access end after the message for allowing access is received.
Specifically, in step s 201, the signal of terminal real-time reception wireless access end broadcast, and judge the broadcast received
Whether the intensity of signal is more than predetermined threshold value, if being more than predetermined threshold value, wireless access request is sent to wireless access end.
For step S202 into step S204, access authentication prompting message is that wireless access end is receiving wirelessly connecing for terminal
Transmission is to terminal after entering request, for biological information corresponding to prompt terminal input as access authentication message.Tool
Body, biological information includes but is not limited to sound, iris, fingerprint, palmmprint, face phase.Terminal is carried receiving access authentication
After showing message, it can also show that access authentication carries in the form of pop-up window with speech play access authentication prompting message
Show message.For example when using finger print information as access authentication message, terminal is after access authentication prompting message is received
Play the voice message terminal input finger print information of " finger print information please be input ".Such as recognize again using acoustic information as access
When demonstrate,proving message, after access authentication prompting message is received, pop-up window is shown " please say authentication password " terminal.Further
Ground, terminal start the biological information related to access authentication prompting message and obtained after access authentication prompt message is received
Part is taken, and biological information to be certified is got by biological information obtaining widget.Such as biology to be certified
When characteristic information is finger print information, starts fingerprint capturer and the finger print information of user is gathered by fingerprint capturer.It is to be certified
Biological information when being acoustic information, start sound acquisition component (such as microphone) and simultaneously gathered by sound collection part
The acoustic information of user.When biological information to be certified is iris information, starts iris photograph part and clapped by iris
Take the photograph the iris information of part collection user.When biological information to be certified is face phase information, start camera and by taking the photograph
As the face phase information of head collection user.After terminal obtains biological information to be certified by biological characteristic obtaining widget,
Terminal sends access authentication message to wireless access end, and access authentication message includes biological information to be certified.
Step S205 has pre-saved biological information and has been used as judgement benchmark into step S207 in wireless access end,
The biological information pre-saved is inputted by user in terminal and sent by terminal to wireless input.Wireless access end
When confirming that biological information to be certified is consistent with the biological information to prestore, it is allowed to which terminal accesses, and does not otherwise allow
Terminal accesses.The method for deciding whether to allow terminal to access to above-mentioned wireless access end with two specific examples below is said
It is bright.It should be noted that the method that wireless access end decides whether to allow terminal to access in the embodiment of the present invention is not limited in
Method described in following two examples.
For example, if biological information to be certified is finger print information, wireless access end carries out password when starting first
Set, specially terminal gathers user A finger print information by fingerprint capturer and sent to wireless access end.Wireless access end
User A finger print information is preserved as judgement benchmark.When user B terminal access authentication, terminal passes through fingerprint capturer
Gather user B finger print information and send to wireless access end.Wireless access end is by the user B of reception finger print information with prestoring
User A finger print information be compared, because the finger print information of user B finger print information and user A differs, then send not
Allow the message of access to terminal, therefore user B terminal access failure.When user A terminal access authentication, terminal passes through finger
Line collector collection user A finger print information is simultaneously sent to wireless access end.Wireless access end is believed by the user A of reception fingerprint
Cease compared with the user A to prestore finger print information, due to the fingerprint that wireless access end receives and the finger print information phase that prestores
Together, then the message for allowing to access is sent to terminal, therefore user A terminal is linked into wireless access end.
For example, if biological information to be certified is acoustic information, wireless access end carries out password when starting first
Set, specially terminal gathers user M acoustic information by microphone and sent to wireless access end.Wireless access end will be used
Family M acoustic information is preserved as judgement benchmark.When user N terminal access authentication, terminal gathers user N by microphone
Acoustic information and send to wireless access end.Wireless access end is by the user N of reception acoustic information and the user M that prestores
Acoustic information is compared, and because the acoustic information of user N acoustic information and user M differs, then sending does not allow to access
Message to terminal, therefore user N terminal access failure.When user M terminal access authentication, terminal is gathered by microphone
User M acoustic information is simultaneously sent to wireless access end, and wireless access end is by the user M of reception acoustic information and the use to prestore
Family M acoustic information is compared, the user M received due to wireless access end acoustic information and the acoustic information phase that prestores
Together, then the message for allowing to access is sent to terminal, therefore user M terminal is linked into wireless access end.
Because terminal gets biological information to be certified by biological information obtaining widget and will be to be certified
Biological information send to wireless access end, end is then determined whether by wireless access end checking biological information
Terminate into, therefore do not need user be manually entered complexity password complete certification, improve terminal access wireless network convenience.
Because biological information is unique, thus using biological information as wireless network access authentication in a manner of have it is higher
Security and nonrepeatability.
Alternatively, when biological information is acoustic information, the flow of the access authentication method of wireless network include with
Lower step, as shown in Figure 3:
Step S301, terminal send wireless access request to wireless access end.
Step S302, wireless access end send access authentication prompting message to terminal.
Step S303, terminal start sound receiving part and receive acoustic information to be certified or the other equipment that user sends
The acoustic information to be certified sent.
Step S304, terminal send access authentication message to wireless access end, and access authentication message includes to be certified
Acoustic information.
Step S305, wireless access end parsing access authentication message, obtains the attribute information of acoustic information to be certified, belongs to
Property information comprises at least sound characteristic.
Step S306, wireless access end is by the sound characteristic of acoustic information to be certified and the sound of acoustic information to prestore
Feature is compared.
Step S307, wireless access end confirm the sound of the sound characteristic and the acoustic information to prestore of acoustic information to be certified
When sound feature is consistent, sending allows the message of access to terminal.
Step S308, terminal are linked into wireless access end after the message for allowing access is received.
In specific implementation, wireless access end carries out password setting after initial start-up, and terminal passes through sound receiving part (ratio
Such as microphone) receive the acoustic information that password owner sends and send to wireless access end.Wireless access end possesses password
The acoustic information that person sends carries out the attribute information that parsing determines acoustic information, and the sound that attribute information includes acoustic information is special
Sign.Sound characteristic is including at least the tone of sound, loudness, tone color, available for recognition code owner.The parsing of wireless access end is true
After the attribute information for determining acoustic information, attribute information is preserved.When password owner needs to access wireless access end, lead to
The sound receiving part input acoustic information of terminal is crossed, then terminal sends acoustic information to wireless access end.Wireless access
Hold and the sound characteristic that acoustic information is determined in parsing is carried out to the acoustic information of password owner, then by the sound of password owner
Sound feature is compared with the sound characteristic to prestore, because the sound characteristic of password owner is consistent with the sound characteristic to prestore,
Therefore terminal corresponding to password owner is allowed to access wireless access end.
When non-password owner needs to access wireless access end, because the sound characteristic of non-password owner is gathered around with password
The sound characteristic for the person of having is different, therefore wireless access end is parsed and judged to the acoustic information of non-password owner
Afterwards, it may be determined that the sound characteristic of password owner of the sound characteristic of non-password owner with prestoring is inconsistent, therefore does not allow
Non- password owner access.If not now password owner be secured user and password owner nearby, then non-password possesses
The terminal of person can be received the acoustic information that password owner sends by sound receiving part and complete what wireless network accessed
Certification.It should be noted that when non-password owner is multiple users, can be equal in terminal corresponding to multiple non-password owners
After starting sound receiving part, acoustic information is sent by password owner, then terminal corresponding to multiple non-password owners is same
When receive the acoustic information that sends of password owner and complete the certification of wireless network access, therefore needed in many non-password owners
When accessing wireless network, it can complete to verify simultaneously and access, further increase the convenience of terminal access wireless network.If
Non- password owner be secured user and password owner not nearby when, password owner can be believed by terminal recorded voice
Cease and send to non-password owner, such as password owner and voice is sent to non-password owner by wechat.Alternatively, it is close
Code owner by terminal recorded voice information and can be sent to each non-password owner, the terminal of non-password owner
After acoustic information is received, recognizing for wireless network access directly can be completed according to the acoustic information of the password owner of reception
Card.Alternatively, password owner by terminal recorded voice information and can be sent to one of them non-password owner, then
By the acoustic information of the terminal plays password owner of the non-password owner, the terminal of other non-password owners starts sound
Receiving part receives the acoustic information of the terminal plays of the non-password owner, the password then received according to sound receiving part
The acoustic information of owner completes the access authentication of wireless network.Because the acoustic information of people is unique, therefore believed with sound
Cease has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, terminal is connect by sound
The acoustic information to be certified that the acoustic information to be certified or other equipment that receipts part reception user sends are sent is completed wireless
The access authentication of network, wireless network is accessed so as to facilitate legal non-password owner.
Alternatively, the attribute information of acoustic information to be certified also includes sound-content.Recognize carrying out wireless network access
During card, wireless access end first can enter the sound characteristic of acoustic information of the sound characteristic of acoustic information to be certified with prestoring
Row compares.If the sound characteristic of acoustic information of the sound characteristic of acoustic information to be certified with prestoring is consistent, will be to be certified
Acoustic information sound-content compared with the sound-content of the acoustic information to prestore, it is determined that acoustic information to be certified
Acoustic information of the sound-content with prestoring sound-content it is consistent when, it is allowed to terminal accesses;Otherwise terminal is not allowed to access.Under
Face is illustrated with combining specific implementation scene, and setting wireless access end has pre-saved password owner A acoustic information
Attribute information, sound characteristic is password owner A sound characteristic in attribute information, and sound-content is " 123456 ".
For setting terminal after access authentication prompting message is received, password owner A have issued the sound of " ABCDEF "
Information.Terminal receives password owner A acoustic information by microphone and sends acoustic information to wireless access end.Wirelessly
After incoming end parses to the password owner A of reception acoustic information, determine that the sound characteristic of acoustic information is gathered around for password
The person of having A sound characteristic, sound-content are " ABCDEF ".Then by the sound characteristic of password owner A acoustic information and in advance
After the sound characteristic for the acoustic information deposited is compared, determines the sound characteristic of password owner A acoustic information and prestore
The sound characteristic of acoustic information is consistent.Then further by the sound-content of password owner A acoustic information and the sound to prestore
The sound-content of message breath is compared, the acoustic information for determining the sound-content of password owner A acoustic information and prestoring
Sound-content it is inconsistent, then do not allow terminal access wireless access end.
For setting terminal after access authentication prompting message is received, password owner A have issued the sound of " 123456 "
Information.Terminal receives password owner A acoustic information by microphone and sends acoustic information to wireless access end.Wirelessly
After incoming end parses to the password owner A of reception acoustic information, determine that the sound characteristic of acoustic information is gathered around for password
The person of having A sound characteristic, sound-content are " 123456 ".Then by the sound characteristic of password owner A acoustic information and in advance
After the sound characteristic for the acoustic information deposited is compared, determines the sound characteristic of password owner A acoustic information and prestore
The sound characteristic of acoustic information is consistent.Then further by the sound-content of password owner A acoustic information and the sound to prestore
The sound-content of message breath is compared, the acoustic information for determining the sound-content of password owner A acoustic information and prestoring
Sound-content it is consistent, then allow terminal to access wireless access end.
For setting terminal after access authentication prompting message is received, non-password owner B have issued the sound of " 123456 "
Message ceases.Terminal receives non-password owner B acoustic information by microphone and sends acoustic information to wireless access end.
After wireless access end parses to the non-password owner B of reception acoustic information, the sound characteristic for determining acoustic information is
Non- password owner B sound characteristic, sound-content are " 123456 ".Then by the sound of non-password owner B acoustic information
After sound feature is compared with the sound characteristic of the acoustic information to prestore, the sound of non-password owner B acoustic information is determined
The sound characteristic of acoustic information of the feature with prestoring is inconsistent, then does not allow terminal access wireless access end.
Due to when carrying out wireless network access authentication according to acoustic information, the not only sound characteristic of certification acoustic information,
The sound-content of acoustic information is verified simultaneously, therefore the precision of wireless access end access authentication can be improved, works as acoustic information in addition
Sound characteristic it is ineligible when, do not allow terminal access wireless access end directly, without determining whether that sound is believed
The sound-content of breath, so as to improve the efficiency of wireless network access authentication.
In order to preferably explain the embodiment of the present invention, describe the embodiment of the present invention with reference to specific implement scene and provide
A kind of wireless network access authentication method, as shown in Figure 4.
Step S401, terminal send wireless access request to wireless access end.
Step S402, wireless access end send access authentication prompting message to terminal.
Step S403, the voice of terminal plays " acoustic information please be input ".
Step S404, terminal start microphone and receive the acoustic information to be certified that user sends.
Step S405, terminal send access authentication message to wireless access end, and access authentication message includes to be certified
Acoustic information.
Step S406, wireless access end parsing access authentication message, obtain acoustic information to be certified sound characteristic and
Sound-content.
Step S407, wireless access end is by the sound characteristic of acoustic information to be certified and the sound of acoustic information to prestore
Feature is compared.
Step S408, judge whether sound characteristic is consistent, if unanimously, performing step S409, otherwise perform step S413.
Step S409, wireless access end is by the sound-content of acoustic information to be certified and the sound of acoustic information to prestore
Content is compared.
Step S410, judge whether sound-content is consistent, if unanimously, performing step S411, otherwise perform step S413.
Step S411, wireless access end, which is sent, allows the message of access to terminal.
Step S412, terminal are linked into wireless access end after the message for allowing access is received.
Step S413, wireless access end, which is sent, does not allow the message of access to terminal.
Step S414, terminal show the prompting message of access failure after the message for not allowing access is received.
The embodiment of the present invention shows that wireless access end sends access authentication prompting message to terminal.Terminal start with it is described
The related biological information obtaining widget of access authentication prompting message, and obtained by the biological information obtaining widget
To biological information to be certified, then access authentication message, the access authentication message are sent to the wireless access end
Include biological information to be certified.Wireless access end is in the life for confirming the biological information to be certified and prestoring
When thing characteristic information is consistent, it is allowed to which the terminal is linked into the wireless access end.Because terminal is obtained by biological information
Take component retrieval to biological information to be certified and send biological information to be certified to wireless access end, then
Determine whether that terminal accesses by wireless access end checking biological information, therefore do not need user to be manually entered the close of complexity
Code completes certification, improves the convenience of terminal access wireless network.Because biological information is unique, therefore with biology
Characteristic information has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, when biology is special
When reference breath is acoustic information, multiple terminals can receive the same acoustic information that same user sends in synchronization, and pass through
The acoustic information completes checking, therefore when many new users need to access wireless network, it can complete to verify simultaneously and access, enter
One step improves the convenience of terminal access wireless network.
Based on identical technical concept, Fig. 5 it is exemplary show a kind of wireless access end provided in an embodiment of the present invention
Structure, the wireless access end can perform the flow of the access authentication method of wireless network.
As shown in figure 5, the wireless access end includes:
Sending module 501, for sending access authentication prompting message to terminal;
Receiving module 503, the access authentication message sent for receiving the terminal, the access authentication message include
Biological information to be certified;
Processing module 502, in the biological information one for confirming the biological information to be certified and prestoring
During cause, it is allowed to which the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The processing module 502 is specifically used for:
The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information is at least
Including sound characteristic;
When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, permit
Perhaps described terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
The processing module 502 is additionally operable to:
It is described to allow the terminal to be linked into before the wireless access end, confirm the sound of the acoustic information to be certified
The sound-content of acoustic information of the sound content with prestoring is consistent.
Based on identical technical concept, the structure for showing a kind of terminal provided in an embodiment of the present invention exemplary Fig. 6,
The terminal can perform the flow of the access authentication method of wireless network.
As shown in fig. 6, the terminal includes:
Receiving module 601, for receiving the access authentication prompting message of wireless access end transmission;
Processing module 602, for starting the biological information obtaining widget related to the access authentication prompting message,
And biological information to be certified is got by the biological information obtaining widget;
Sending module 603, for sending access authentication message to the wireless access end, wrapped in the access authentication message
Include biological information to be certified;
The processing module 602, in the wireless access end confirmation biological information to be certified and in advance
When the biological information deposited is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The processing module 602 is specifically used for:
The acoustic information to be certified or other equipment that startup sound receiving part reception user sends send to be certified
Acoustic information.
The embodiments of the invention provide a kind of computing device, the computing device is specifically as follows desktop computer, portable
Computer, smart mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) etc..The meter
Central processing unit (Center Processing Unit, CPU), memory, input-output apparatus etc. can be included by calculating equipment,
Input equipment can include keyboard, mouse, touch-screen etc., and output equipment can include display device, such as liquid crystal display
(Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT) etc..
Memory, read-only storage (ROM) and random access memory (RAM) can be included, and provide and deposit to processor
The programmed instruction and data stored in reservoir.In embodiments of the present invention, memory can be used for the access for storing wireless network
The programmed instruction of authentication method;
Processor, for calling the programmed instruction stored in the memory, it is wireless to perform track according to the program of acquisition
The access authentication method of network.
The embodiments of the invention provide a kind of computer-readable storage medium, the computer-readable recording medium storage has calculating
Machine executable instruction, the computer executable instructions are used for the access authentication method for making the computer perform wireless network.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method or computer program product.
Therefore, the present invention can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware
Form.Deposited moreover, the present invention can use to can use in one or more computers for wherein including computer usable program code
The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product
Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram
Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided
The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce
A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real
The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to
Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or
The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted
Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or
The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one
The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation
Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent
Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention
God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies
Within, then the present invention is also intended to comprising including these changes and modification.
Claims (12)
- A kind of 1. access authentication method of wireless network, it is characterised in that including:Wireless access end sends access authentication prompting message to terminal;The wireless access end receives the access authentication message that the terminal is sent, and the access authentication message includes to be certified Biological information;The wireless access end permits when confirming that the biological information to be certified is consistent with the biological information to prestore Perhaps described terminal is linked into the wireless access end.
- 2. the method as described in claim 1, it is characterised in that the biological information is acoustic information;The wireless access end permits when confirming that the biological information to be certified is consistent with the biological information to prestore Perhaps described terminal is linked into the wireless access end, including:The wireless access end parses the access authentication message, obtains the attribute information of acoustic information to be certified, the category Property information comprises at least sound characteristic;The sound for the acoustic information that the wireless access end confirms the sound characteristic of the acoustic information to be certified and prestored is special When levying consistent, it is allowed to which the terminal is linked into the wireless access end.
- 3. method as claimed in claim 2, it is characterised in that the attribute information also includes sound-content;It is described to allow the terminal to be linked into before the wireless access end, in addition to:In the sound-content of the wireless access end confirmation acoustic information to be certified and the sound of the acoustic information to prestore Hold consistent.
- A kind of 4. access authentication method of wireless network, it is characterised in that including:Terminal receives the access authentication prompting message that wireless access end is sent;The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through the life Thing characteristic information acquisition unit part gets biological information to be certified;The terminal sends access authentication message to the wireless access end, and the access authentication message includes life to be certified Thing characteristic information;The terminal confirms the biological information to be certified and the biological information to prestore at the wireless access end When consistent, the wireless access end is linked into.
- 5. method as claimed in claim 4, it is characterised in that the biological information is acoustic information;The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through the life Thing characteristic information acquisition unit part gets biological information to be certified, including:What the acoustic information to be certified or other equipment that the terminal startup sound receiving part reception user sends were sent treats The acoustic information of certification.
- A kind of 6. wireless access end, it is characterised in that including:Sending module, for sending access authentication prompting message to terminal;Receiving module, the access authentication message sent for receiving the terminal, the access authentication message includes to be certified Biological information;Processing module, for when confirming that the biological information to be certified is consistent with the biological information to prestore, permitting Perhaps described terminal is linked into the wireless access end.
- 7. wireless access end as claimed in claim 6, it is characterised in that the biological information is acoustic information;The processing module is specifically used for:The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information comprises at least Sound characteristic;When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, it is allowed to institute State terminal and be linked into the wireless access end.
- 8. wireless access end as claimed in claim 7, it is characterised in that the attribute information also includes sound-content;The processing module is additionally operable to:It is described to allow the terminal to be linked into before the wireless access end, in the sound for confirming the acoustic information to be certified The sound-content for holding the acoustic information with prestoring is consistent.
- A kind of 9. terminal, it is characterised in that including:Receiving module, for receiving the access authentication prompting message of wireless access end transmission;Processing module, for starting the biological information obtaining widget related to the access authentication prompting message, and pass through The biological information obtaining widget gets biological information to be certified;Sending module, for sending access authentication message to the wireless access end, the access authentication message includes waiting to recognize The biological information of card;The processing module, for confirming the biological information to be certified and the biology to prestore at the wireless access end When characteristic information is consistent, the wireless access end is linked into.
- 10. terminal as claimed in claim 9, it is characterised in that the biological information is acoustic information;The processing module is specifically used for:The sound to be certified that the acoustic information to be certified or other equipment that startup sound receiving part reception user sends are sent Message ceases.
- A kind of 11. computing device, it is characterised in that including:Memory, instructed for storage program;Processor, for calling the programmed instruction stored in the memory, 1 to 3 is required according to the program execution profit of acquisition The method described in method or any one of claim 4 to 5 described in any one.
- 12. a kind of computer-readable storage medium, it is characterised in that the computer-readable recording medium storage has computer can perform Instruction, the computer executable instructions be used for make computer perform claim require 1 to 3 any one described in method or right will Seek the method described in 4 to 5 any one.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711091954.8A CN107864476A (en) | 2017-11-08 | 2017-11-08 | The access authentication method and terminal of a kind of wireless network |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201711091954.8A CN107864476A (en) | 2017-11-08 | 2017-11-08 | The access authentication method and terminal of a kind of wireless network |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107864476A true CN107864476A (en) | 2018-03-30 |
Family
ID=61699883
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201711091954.8A Pending CN107864476A (en) | 2017-11-08 | 2017-11-08 | The access authentication method and terminal of a kind of wireless network |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107864476A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109246133A (en) * | 2018-10-19 | 2019-01-18 | 清华大学 | A kind of network access verifying method based on bio-identification |
Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN102083152A (en) * | 2011-03-07 | 2011-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Method for switching hotspots in wireless local area network (WLAN) and terminal |
| CN102469621A (en) * | 2010-10-29 | 2012-05-23 | 巴比禄股份有限公司 | Wireless LAN system, communication device and method of sharing setting |
| CN102833824A (en) * | 2012-08-30 | 2012-12-19 | 福建星网锐捷网络有限公司 | Access method and device for wireless local area network and network equipment |
| US20130086665A1 (en) * | 2011-09-30 | 2013-04-04 | Time Warner Cable Inc. | SYSTEM AND METHOD FOR CLONING A Wi-Fi ACCESS POINT |
| CN103119977A (en) * | 2010-09-27 | 2013-05-22 | 雅马哈株式会社 | Communication terminal, wireless device, provider server, and wireless communication system |
| CN103702398A (en) * | 2013-12-23 | 2014-04-02 | Tcl集团股份有限公司 | Wireless AP (access point) selection method and system |
| CN103781190A (en) * | 2012-10-17 | 2014-05-07 | 三星电子株式会社 | Electronic apparatus and control method thereof |
| CN104125651A (en) * | 2014-07-30 | 2014-10-29 | 常州和仕达电子科技有限公司 | Accessing and roaming optimization method based on WLAN (wireless local area network) up and down asymmetric wireless link state |
| CN104469775A (en) * | 2012-09-28 | 2015-03-25 | 华为技术有限公司 | Wireless local area network access method, base station controller and user equipment |
| CN104980919A (en) * | 2015-05-13 | 2015-10-14 | 小米科技有限责任公司 | Method for acquiring network service information and equipment |
| CN105554755A (en) * | 2015-12-30 | 2016-05-04 | 小米科技有限责任公司 | Wireless network access method and device |
| CN106535195A (en) * | 2016-12-21 | 2017-03-22 | 上海斐讯数据通信技术有限公司 | Authentication method and device, and network connection method and system |
| WO2017086599A1 (en) * | 2015-11-19 | 2017-05-26 | 삼성전자 주식회사 | Wireless communication method using near field communication, and electronic device |
| CN107172620A (en) * | 2017-03-30 | 2017-09-15 | 中国移动通信集团江苏有限公司 | A kind of wireless local area network (WLAN) verification method and apparatus |
-
2017
- 2017-11-08 CN CN201711091954.8A patent/CN107864476A/en active Pending
Patent Citations (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103119977A (en) * | 2010-09-27 | 2013-05-22 | 雅马哈株式会社 | Communication terminal, wireless device, provider server, and wireless communication system |
| CN102469621A (en) * | 2010-10-29 | 2012-05-23 | 巴比禄股份有限公司 | Wireless LAN system, communication device and method of sharing setting |
| CN102083152A (en) * | 2011-03-07 | 2011-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Method for switching hotspots in wireless local area network (WLAN) and terminal |
| US20130086665A1 (en) * | 2011-09-30 | 2013-04-04 | Time Warner Cable Inc. | SYSTEM AND METHOD FOR CLONING A Wi-Fi ACCESS POINT |
| CN102833824A (en) * | 2012-08-30 | 2012-12-19 | 福建星网锐捷网络有限公司 | Access method and device for wireless local area network and network equipment |
| CN104469775A (en) * | 2012-09-28 | 2015-03-25 | 华为技术有限公司 | Wireless local area network access method, base station controller and user equipment |
| CN103781190A (en) * | 2012-10-17 | 2014-05-07 | 三星电子株式会社 | Electronic apparatus and control method thereof |
| CN103702398A (en) * | 2013-12-23 | 2014-04-02 | Tcl集团股份有限公司 | Wireless AP (access point) selection method and system |
| CN104125651A (en) * | 2014-07-30 | 2014-10-29 | 常州和仕达电子科技有限公司 | Accessing and roaming optimization method based on WLAN (wireless local area network) up and down asymmetric wireless link state |
| CN104980919A (en) * | 2015-05-13 | 2015-10-14 | 小米科技有限责任公司 | Method for acquiring network service information and equipment |
| WO2017086599A1 (en) * | 2015-11-19 | 2017-05-26 | 삼성전자 주식회사 | Wireless communication method using near field communication, and electronic device |
| CN105554755A (en) * | 2015-12-30 | 2016-05-04 | 小米科技有限责任公司 | Wireless network access method and device |
| CN106535195A (en) * | 2016-12-21 | 2017-03-22 | 上海斐讯数据通信技术有限公司 | Authentication method and device, and network connection method and system |
| CN107172620A (en) * | 2017-03-30 | 2017-09-15 | 中国移动通信集团江苏有限公司 | A kind of wireless local area network (WLAN) verification method and apparatus |
Non-Patent Citations (1)
| Title |
|---|
| 刘晓辉: "《网络硬件设备完全技术宝典 第3版 网络管理典藏全新升级版本》", 31 January 2013 * |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109246133A (en) * | 2018-10-19 | 2019-01-18 | 清华大学 | A kind of network access verifying method based on bio-identification |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN104270404B (en) | A kind of login method and device based on terminal iidentification | |
| CN104580125B (en) | A kind of payment verification methods, devices and systems | |
| CN113452662B (en) | Conference establishment, conference establishment method, equipment, system and storage medium | |
| CN104796385B (en) | Terminal binding method, device and system | |
| CN110874541A (en) | Electronic ticket admission verification anti-counterfeiting system and method | |
| CN117056892A (en) | Secure authorization for access to private data in virtual reality | |
| EP2779012A1 (en) | Pro-Active Identity Verification For Authentication Of Transaction Initiated Via Non-Voice Channel | |
| CN110266996B (en) | Video conference control method and device and terminal equipment | |
| CN111489172B (en) | Qualification information authentication method, terminal and server | |
| US9697346B2 (en) | Method and apparatus for identifying and associating devices using visual recognition | |
| CN109086582A (en) | A kind of fingerprint verification method, terminal and computer readable storage medium | |
| CN107767297A (en) | A kind of user management method based on hosted platform, equipment and system | |
| CN107766713B (en) | Face template data entry control method and related products | |
| CN105354459B (en) | Information processing method and device and electronic equipment | |
| CN109729067A (en) | Voice punch card method, device, equipment and computer storage medium | |
| CN114124591A (en) | Speaking user selection method, device, electronic equipment and storage medium | |
| CN106060027B (en) | Method, apparatus, equipment and the system verified based on identifying code | |
| CN111949959B (en) | Authorization authentication method and device in Oauth protocol | |
| CN107948970A (en) | System of real name method of network entry, system and the mobile terminal of subordinate terminal | |
| CN104915588B (en) | The method for secret protection and device of electronic equipment | |
| CN109474929B (en) | Power consumption mode adjusting method and device, electronic equipment and computer readable storage medium | |
| JP2022168244A (en) | Ticket providing method and ticket providing system | |
| CN107864476A (en) | The access authentication method and terminal of a kind of wireless network | |
| WO2025103134A1 (en) | Risk assessment based on multi-party computation | |
| CN106713681B (en) | A kind of information processing method, device, terminal and server |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180330 |
|
| RJ01 | Rejection of invention patent application after publication |