[go: up one dir, main page]

CN107864476A - The access authentication method and terminal of a kind of wireless network - Google Patents

The access authentication method and terminal of a kind of wireless network Download PDF

Info

Publication number
CN107864476A
CN107864476A CN201711091954.8A CN201711091954A CN107864476A CN 107864476 A CN107864476 A CN 107864476A CN 201711091954 A CN201711091954 A CN 201711091954A CN 107864476 A CN107864476 A CN 107864476A
Authority
CN
China
Prior art keywords
terminal
information
wireless access
certified
biological information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711091954.8A
Other languages
Chinese (zh)
Inventor
钟花晓
李特炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Chuanggong Telecom Technology Co Ltd
Original Assignee
Shanghai Chuanggong Telecom Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Chuanggong Telecom Technology Co Ltd filed Critical Shanghai Chuanggong Telecom Technology Co Ltd
Priority to CN201711091954.8A priority Critical patent/CN107864476A/en
Publication of CN107864476A publication Critical patent/CN107864476A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0861Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the present invention provides a kind of access authentication method and terminal of wireless network, and wireless access end sends access authentication prompting message to terminal.Terminal starts the biological information obtaining widget related to access authentication prompting message and obtains biological information to be certified, then sends access authentication message to wireless access end, and access authentication message includes biological information to be certified.Wireless access end is when confirming that biological information to be certified is consistent with the biological information to prestore, it is allowed to which the terminal is linked into the wireless access end.Because wireless access end is by verifying that the biological information that terminal is sent determines whether that terminal accesses, therefore does not need user to be manually entered the password of complexity and complete certification, improve the convenience of terminal access wireless network.Because biological information is unique, thus using biological information as wireless network access authentication in a manner of there is higher security and nonrepeatability.

Description

The access authentication method and terminal of a kind of wireless network
Technical field
The present embodiments relate to WLAN technologies field, more particularly to a kind of access authentication side of wireless network Method and terminal.
Background technology
With WLAN technologies development and the popularization of personal intelligent terminal, user more and more passes through wireless heat Point is in terminal equipment access network.What is generally taken at present is manually to input password to complete certification.But needing to input It is very inconvenient by way of button inputs one by one when more complicated password is to complete certification.The password pre-set in addition Easily cracked or stolen by other people, so as to influence the security of WLAN.
The content of the invention
The embodiment of the present invention provides a kind of access authentication method and terminal of wireless network, for solving to lead in the prior art Cross be manually entered password access WLAN method operate inconvenient while security it is relatively low the problem of.
The embodiments of the invention provide a kind of access authentication method of wireless network, including:
Wireless access end sends access authentication prompting message to terminal;
The wireless access end receives the access authentication message that the terminal is sent, and the access authentication message includes treating The biological information of certification;
The wireless access end is confirming that the biological information to be certified is consistent with the biological information to prestore When, it is allowed to the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The wireless access end is confirming that the biological information to be certified is consistent with the biological information to prestore When, it is allowed to the terminal is linked into the wireless access end, including:
The wireless access end parses the access authentication message, obtains the attribute information of acoustic information to be certified, institute State attribute information and comprise at least sound characteristic;
The wireless access end confirms the sound of the sound characteristic and the acoustic information to prestore of the acoustic information to be certified When sound feature is consistent, it is allowed to which the terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
It is described to allow the terminal to be linked into before the wireless access end, in addition to:
The wireless access end confirms the sound of the sound-content and the acoustic information to prestore of the acoustic information to be certified Sound content is consistent.
The embodiments of the invention provide a kind of access authentication method of wireless network, including:
Terminal receives the access authentication prompting message that wireless access end is sent;
The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through institute State biological information obtaining widget and get biological information to be certified;
The terminal sends access authentication message to the wireless access end, and the access authentication message includes to be certified Biological information;
The terminal confirms the biological information to be certified and the biological characteristic to prestore at the wireless access end When information is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through institute State biological information obtaining widget and get biological information to be certified, including:
The terminal starts sound receiving part and receives acoustic information to be certified or the other equipment transmission that user sends Acoustic information to be certified.
The embodiments of the invention provide a kind of wireless access end, including:
Sending module, for sending access authentication prompting message to terminal;
Receiving module, the access authentication message sent for receiving the terminal, the access authentication message include treating The biological information of certification;
Processing module, for confirming that the biological information to be certified is consistent with the biological information to prestore When, it is allowed to the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The processing module is specifically used for:
The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information is at least Including sound characteristic;
When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, permit Perhaps described terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
The processing module is additionally operable to:
It is described to allow the terminal to be linked into before the wireless access end, confirm the sound of the acoustic information to be certified The sound-content of acoustic information of the sound content with prestoring is consistent.
The embodiments of the invention provide a kind of terminal, including:
Receiving module, for receiving the access authentication prompting message of wireless access end transmission;
Processing module, for starting the biological information obtaining widget related to the access authentication prompting message, and Biological information to be certified is got by the biological information obtaining widget;
Sending module, for sending access authentication message to the wireless access end, the access authentication message includes Biological information to be certified;
The processing module, at the wireless access end confirming the biological information to be certified and prestoring When biological information is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The processing module is specifically used for:
The acoustic information to be certified or other equipment that startup sound receiving part reception user sends send to be certified Acoustic information.
The embodiments of the invention provide a kind of computing device, including:
Memory, instructed for storage program;
Processor, for calling the programmed instruction stored in the memory, performed according to the program of acquisition any of the above-described Method described in.
The embodiments of the invention provide a kind of computer-readable storage medium, the computer-readable recording medium storage has calculating Machine executable instruction, the computer executable instructions are used to make computer perform the method described in any of the above-described.
The embodiment of the present invention shows that wireless access end sends access authentication prompting message to terminal.Terminal start with it is described The related biological information obtaining widget of access authentication prompting message, and obtained by the biological information obtaining widget To biological information to be certified, then access authentication message, the access authentication message are sent to the wireless access end Include biological information to be certified.Wireless access end is in the life for confirming the biological information to be certified and prestoring When thing characteristic information is consistent, it is allowed to which the terminal is linked into the wireless access end.Because terminal is obtained by biological information Take component retrieval to biological information to be certified and send biological information to be certified to wireless access end, then Determine whether that terminal accesses by wireless access end checking biological information, therefore do not need user to be manually entered the close of complexity Code completes certification, improves the convenience of terminal access wireless network.Because biological information is unique, therefore with biology Characteristic information has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, when biology is special When reference breath is acoustic information, multiple terminals can receive the same acoustic information that same user sends in synchronization, and pass through The acoustic information completes checking, therefore when many new users need to access wireless network, it can complete to verify simultaneously and access, enter One step improves the convenience of terminal access wireless network.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment Accompanying drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for this For the those of ordinary skill in field, without having to pay creative labor, it can also be obtained according to these accompanying drawings His accompanying drawing.
Fig. 1 is the embodiments of the invention provide a kind of system architecture schematic diagram;
Fig. 2 is a kind of schematic flow sheet of the access authentication method of wireless network provided in an embodiment of the present invention;
Fig. 3 is a kind of flow of the access authentication method of the wireless network of certification acoustic information provided in an embodiment of the present invention Schematic diagram;
Fig. 4 is the schematic flow sheet of the access authentication method of another wireless network provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation at wireless access end provided in an embodiment of the present invention;
Fig. 6 is a kind of structural representation of terminal provided in an embodiment of the present invention.
Embodiment
In order that the purpose of the present invention, technical scheme and beneficial effect are more clearly understood, below in conjunction with accompanying drawing and implementation Example, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only explaining this hair It is bright, it is not intended to limit the present invention.
Fig. 1 illustrates a kind of applicable system architecture schematic diagram of the embodiment of the present invention, as shown in figure 1, including nothing Line incoming end 101 and terminal 102, wireless access end 101 pass through wireless connection with terminal 102.Wireless access end 101 is included but not It is limited to wireless router, WAP, wireless network adapter, wireless bridge, radio network gateway, wireless authentication server.Eventually End 102 includes but is not limited to personal computer (personal computer, abbreviation PC), portable computer, palm PC It is (Personal Digital Assistant, abbreviation PDA), digital camera and video camera, plotter, projecting apparatus, scanner, multiple Print machine, printer, television set, refrigerator.
Based on the system architecture shown in Fig. 1, as shown in Fig. 2 a kind of access of wireless network provided in an embodiment of the present invention Authentication method, comprise the following steps:
Step S201, terminal send wireless access request to wireless access end.
Step S202, wireless access end send access authentication prompting message to terminal.
Step S203, terminal starts the biological information obtaining widget related to access authentication prompting message, and passes through Biological information obtaining widget gets biological information to be certified.
Step S204, terminal send access authentication message to wireless access end, and access authentication message includes to be certified Biological information.
Step S205, wireless access end are compared biological information to be certified with the biological information to prestore Compared with.
Step S206, wireless access end are confirming that biological information to be certified is consistent with the biological information to prestore When, sending allows the message of access to terminal.
Step S207, terminal are linked into wireless access end after the message for allowing access is received.
Specifically, in step s 201, the signal of terminal real-time reception wireless access end broadcast, and judge the broadcast received Whether the intensity of signal is more than predetermined threshold value, if being more than predetermined threshold value, wireless access request is sent to wireless access end.
For step S202 into step S204, access authentication prompting message is that wireless access end is receiving wirelessly connecing for terminal Transmission is to terminal after entering request, for biological information corresponding to prompt terminal input as access authentication message.Tool Body, biological information includes but is not limited to sound, iris, fingerprint, palmmprint, face phase.Terminal is carried receiving access authentication After showing message, it can also show that access authentication carries in the form of pop-up window with speech play access authentication prompting message Show message.For example when using finger print information as access authentication message, terminal is after access authentication prompting message is received Play the voice message terminal input finger print information of " finger print information please be input ".Such as recognize again using acoustic information as access When demonstrate,proving message, after access authentication prompting message is received, pop-up window is shown " please say authentication password " terminal.Further Ground, terminal start the biological information related to access authentication prompting message and obtained after access authentication prompt message is received Part is taken, and biological information to be certified is got by biological information obtaining widget.Such as biology to be certified When characteristic information is finger print information, starts fingerprint capturer and the finger print information of user is gathered by fingerprint capturer.It is to be certified Biological information when being acoustic information, start sound acquisition component (such as microphone) and simultaneously gathered by sound collection part The acoustic information of user.When biological information to be certified is iris information, starts iris photograph part and clapped by iris Take the photograph the iris information of part collection user.When biological information to be certified is face phase information, start camera and by taking the photograph As the face phase information of head collection user.After terminal obtains biological information to be certified by biological characteristic obtaining widget, Terminal sends access authentication message to wireless access end, and access authentication message includes biological information to be certified.
Step S205 has pre-saved biological information and has been used as judgement benchmark into step S207 in wireless access end, The biological information pre-saved is inputted by user in terminal and sent by terminal to wireless input.Wireless access end When confirming that biological information to be certified is consistent with the biological information to prestore, it is allowed to which terminal accesses, and does not otherwise allow Terminal accesses.The method for deciding whether to allow terminal to access to above-mentioned wireless access end with two specific examples below is said It is bright.It should be noted that the method that wireless access end decides whether to allow terminal to access in the embodiment of the present invention is not limited in Method described in following two examples.
For example, if biological information to be certified is finger print information, wireless access end carries out password when starting first Set, specially terminal gathers user A finger print information by fingerprint capturer and sent to wireless access end.Wireless access end User A finger print information is preserved as judgement benchmark.When user B terminal access authentication, terminal passes through fingerprint capturer Gather user B finger print information and send to wireless access end.Wireless access end is by the user B of reception finger print information with prestoring User A finger print information be compared, because the finger print information of user B finger print information and user A differs, then send not Allow the message of access to terminal, therefore user B terminal access failure.When user A terminal access authentication, terminal passes through finger Line collector collection user A finger print information is simultaneously sent to wireless access end.Wireless access end is believed by the user A of reception fingerprint Cease compared with the user A to prestore finger print information, due to the fingerprint that wireless access end receives and the finger print information phase that prestores Together, then the message for allowing to access is sent to terminal, therefore user A terminal is linked into wireless access end.
For example, if biological information to be certified is acoustic information, wireless access end carries out password when starting first Set, specially terminal gathers user M acoustic information by microphone and sent to wireless access end.Wireless access end will be used Family M acoustic information is preserved as judgement benchmark.When user N terminal access authentication, terminal gathers user N by microphone Acoustic information and send to wireless access end.Wireless access end is by the user N of reception acoustic information and the user M that prestores Acoustic information is compared, and because the acoustic information of user N acoustic information and user M differs, then sending does not allow to access Message to terminal, therefore user N terminal access failure.When user M terminal access authentication, terminal is gathered by microphone User M acoustic information is simultaneously sent to wireless access end, and wireless access end is by the user M of reception acoustic information and the use to prestore Family M acoustic information is compared, the user M received due to wireless access end acoustic information and the acoustic information phase that prestores Together, then the message for allowing to access is sent to terminal, therefore user M terminal is linked into wireless access end.
Because terminal gets biological information to be certified by biological information obtaining widget and will be to be certified Biological information send to wireless access end, end is then determined whether by wireless access end checking biological information Terminate into, therefore do not need user be manually entered complexity password complete certification, improve terminal access wireless network convenience. Because biological information is unique, thus using biological information as wireless network access authentication in a manner of have it is higher Security and nonrepeatability.
Alternatively, when biological information is acoustic information, the flow of the access authentication method of wireless network include with Lower step, as shown in Figure 3:
Step S301, terminal send wireless access request to wireless access end.
Step S302, wireless access end send access authentication prompting message to terminal.
Step S303, terminal start sound receiving part and receive acoustic information to be certified or the other equipment that user sends The acoustic information to be certified sent.
Step S304, terminal send access authentication message to wireless access end, and access authentication message includes to be certified Acoustic information.
Step S305, wireless access end parsing access authentication message, obtains the attribute information of acoustic information to be certified, belongs to Property information comprises at least sound characteristic.
Step S306, wireless access end is by the sound characteristic of acoustic information to be certified and the sound of acoustic information to prestore Feature is compared.
Step S307, wireless access end confirm the sound of the sound characteristic and the acoustic information to prestore of acoustic information to be certified When sound feature is consistent, sending allows the message of access to terminal.
Step S308, terminal are linked into wireless access end after the message for allowing access is received.
In specific implementation, wireless access end carries out password setting after initial start-up, and terminal passes through sound receiving part (ratio Such as microphone) receive the acoustic information that password owner sends and send to wireless access end.Wireless access end possesses password The acoustic information that person sends carries out the attribute information that parsing determines acoustic information, and the sound that attribute information includes acoustic information is special Sign.Sound characteristic is including at least the tone of sound, loudness, tone color, available for recognition code owner.The parsing of wireless access end is true After the attribute information for determining acoustic information, attribute information is preserved.When password owner needs to access wireless access end, lead to The sound receiving part input acoustic information of terminal is crossed, then terminal sends acoustic information to wireless access end.Wireless access Hold and the sound characteristic that acoustic information is determined in parsing is carried out to the acoustic information of password owner, then by the sound of password owner Sound feature is compared with the sound characteristic to prestore, because the sound characteristic of password owner is consistent with the sound characteristic to prestore, Therefore terminal corresponding to password owner is allowed to access wireless access end.
When non-password owner needs to access wireless access end, because the sound characteristic of non-password owner is gathered around with password The sound characteristic for the person of having is different, therefore wireless access end is parsed and judged to the acoustic information of non-password owner Afterwards, it may be determined that the sound characteristic of password owner of the sound characteristic of non-password owner with prestoring is inconsistent, therefore does not allow Non- password owner access.If not now password owner be secured user and password owner nearby, then non-password possesses The terminal of person can be received the acoustic information that password owner sends by sound receiving part and complete what wireless network accessed Certification.It should be noted that when non-password owner is multiple users, can be equal in terminal corresponding to multiple non-password owners After starting sound receiving part, acoustic information is sent by password owner, then terminal corresponding to multiple non-password owners is same When receive the acoustic information that sends of password owner and complete the certification of wireless network access, therefore needed in many non-password owners When accessing wireless network, it can complete to verify simultaneously and access, further increase the convenience of terminal access wireless network.If Non- password owner be secured user and password owner not nearby when, password owner can be believed by terminal recorded voice Cease and send to non-password owner, such as password owner and voice is sent to non-password owner by wechat.Alternatively, it is close Code owner by terminal recorded voice information and can be sent to each non-password owner, the terminal of non-password owner After acoustic information is received, recognizing for wireless network access directly can be completed according to the acoustic information of the password owner of reception Card.Alternatively, password owner by terminal recorded voice information and can be sent to one of them non-password owner, then By the acoustic information of the terminal plays password owner of the non-password owner, the terminal of other non-password owners starts sound Receiving part receives the acoustic information of the terminal plays of the non-password owner, the password then received according to sound receiving part The acoustic information of owner completes the access authentication of wireless network.Because the acoustic information of people is unique, therefore believed with sound Cease has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, terminal is connect by sound The acoustic information to be certified that the acoustic information to be certified or other equipment that receipts part reception user sends are sent is completed wireless The access authentication of network, wireless network is accessed so as to facilitate legal non-password owner.
Alternatively, the attribute information of acoustic information to be certified also includes sound-content.Recognize carrying out wireless network access During card, wireless access end first can enter the sound characteristic of acoustic information of the sound characteristic of acoustic information to be certified with prestoring Row compares.If the sound characteristic of acoustic information of the sound characteristic of acoustic information to be certified with prestoring is consistent, will be to be certified Acoustic information sound-content compared with the sound-content of the acoustic information to prestore, it is determined that acoustic information to be certified Acoustic information of the sound-content with prestoring sound-content it is consistent when, it is allowed to terminal accesses;Otherwise terminal is not allowed to access.Under Face is illustrated with combining specific implementation scene, and setting wireless access end has pre-saved password owner A acoustic information Attribute information, sound characteristic is password owner A sound characteristic in attribute information, and sound-content is " 123456 ".
For setting terminal after access authentication prompting message is received, password owner A have issued the sound of " ABCDEF " Information.Terminal receives password owner A acoustic information by microphone and sends acoustic information to wireless access end.Wirelessly After incoming end parses to the password owner A of reception acoustic information, determine that the sound characteristic of acoustic information is gathered around for password The person of having A sound characteristic, sound-content are " ABCDEF ".Then by the sound characteristic of password owner A acoustic information and in advance After the sound characteristic for the acoustic information deposited is compared, determines the sound characteristic of password owner A acoustic information and prestore The sound characteristic of acoustic information is consistent.Then further by the sound-content of password owner A acoustic information and the sound to prestore The sound-content of message breath is compared, the acoustic information for determining the sound-content of password owner A acoustic information and prestoring Sound-content it is inconsistent, then do not allow terminal access wireless access end.
For setting terminal after access authentication prompting message is received, password owner A have issued the sound of " 123456 " Information.Terminal receives password owner A acoustic information by microphone and sends acoustic information to wireless access end.Wirelessly After incoming end parses to the password owner A of reception acoustic information, determine that the sound characteristic of acoustic information is gathered around for password The person of having A sound characteristic, sound-content are " 123456 ".Then by the sound characteristic of password owner A acoustic information and in advance After the sound characteristic for the acoustic information deposited is compared, determines the sound characteristic of password owner A acoustic information and prestore The sound characteristic of acoustic information is consistent.Then further by the sound-content of password owner A acoustic information and the sound to prestore The sound-content of message breath is compared, the acoustic information for determining the sound-content of password owner A acoustic information and prestoring Sound-content it is consistent, then allow terminal to access wireless access end.
For setting terminal after access authentication prompting message is received, non-password owner B have issued the sound of " 123456 " Message ceases.Terminal receives non-password owner B acoustic information by microphone and sends acoustic information to wireless access end. After wireless access end parses to the non-password owner B of reception acoustic information, the sound characteristic for determining acoustic information is Non- password owner B sound characteristic, sound-content are " 123456 ".Then by the sound of non-password owner B acoustic information After sound feature is compared with the sound characteristic of the acoustic information to prestore, the sound of non-password owner B acoustic information is determined The sound characteristic of acoustic information of the feature with prestoring is inconsistent, then does not allow terminal access wireless access end.
Due to when carrying out wireless network access authentication according to acoustic information, the not only sound characteristic of certification acoustic information, The sound-content of acoustic information is verified simultaneously, therefore the precision of wireless access end access authentication can be improved, works as acoustic information in addition Sound characteristic it is ineligible when, do not allow terminal access wireless access end directly, without determining whether that sound is believed The sound-content of breath, so as to improve the efficiency of wireless network access authentication.
In order to preferably explain the embodiment of the present invention, describe the embodiment of the present invention with reference to specific implement scene and provide A kind of wireless network access authentication method, as shown in Figure 4.
Step S401, terminal send wireless access request to wireless access end.
Step S402, wireless access end send access authentication prompting message to terminal.
Step S403, the voice of terminal plays " acoustic information please be input ".
Step S404, terminal start microphone and receive the acoustic information to be certified that user sends.
Step S405, terminal send access authentication message to wireless access end, and access authentication message includes to be certified Acoustic information.
Step S406, wireless access end parsing access authentication message, obtain acoustic information to be certified sound characteristic and Sound-content.
Step S407, wireless access end is by the sound characteristic of acoustic information to be certified and the sound of acoustic information to prestore Feature is compared.
Step S408, judge whether sound characteristic is consistent, if unanimously, performing step S409, otherwise perform step S413.
Step S409, wireless access end is by the sound-content of acoustic information to be certified and the sound of acoustic information to prestore Content is compared.
Step S410, judge whether sound-content is consistent, if unanimously, performing step S411, otherwise perform step S413.
Step S411, wireless access end, which is sent, allows the message of access to terminal.
Step S412, terminal are linked into wireless access end after the message for allowing access is received.
Step S413, wireless access end, which is sent, does not allow the message of access to terminal.
Step S414, terminal show the prompting message of access failure after the message for not allowing access is received.
The embodiment of the present invention shows that wireless access end sends access authentication prompting message to terminal.Terminal start with it is described The related biological information obtaining widget of access authentication prompting message, and obtained by the biological information obtaining widget To biological information to be certified, then access authentication message, the access authentication message are sent to the wireless access end Include biological information to be certified.Wireless access end is in the life for confirming the biological information to be certified and prestoring When thing characteristic information is consistent, it is allowed to which the terminal is linked into the wireless access end.Because terminal is obtained by biological information Take component retrieval to biological information to be certified and send biological information to be certified to wireless access end, then Determine whether that terminal accesses by wireless access end checking biological information, therefore do not need user to be manually entered the close of complexity Code completes certification, improves the convenience of terminal access wireless network.Because biological information is unique, therefore with biology Characteristic information has higher security and nonrepeatability as the mode of wireless network access authentication.In addition, when biology is special When reference breath is acoustic information, multiple terminals can receive the same acoustic information that same user sends in synchronization, and pass through The acoustic information completes checking, therefore when many new users need to access wireless network, it can complete to verify simultaneously and access, enter One step improves the convenience of terminal access wireless network.
Based on identical technical concept, Fig. 5 it is exemplary show a kind of wireless access end provided in an embodiment of the present invention Structure, the wireless access end can perform the flow of the access authentication method of wireless network.
As shown in figure 5, the wireless access end includes:
Sending module 501, for sending access authentication prompting message to terminal;
Receiving module 503, the access authentication message sent for receiving the terminal, the access authentication message include Biological information to be certified;
Processing module 502, in the biological information one for confirming the biological information to be certified and prestoring During cause, it is allowed to which the terminal is linked into the wireless access end.
Alternatively, the biological information is acoustic information;
The processing module 502 is specifically used for:
The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information is at least Including sound characteristic;
When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, permit Perhaps described terminal is linked into the wireless access end.
Alternatively, the attribute information also includes sound-content;
The processing module 502 is additionally operable to:
It is described to allow the terminal to be linked into before the wireless access end, confirm the sound of the acoustic information to be certified The sound-content of acoustic information of the sound content with prestoring is consistent.
Based on identical technical concept, the structure for showing a kind of terminal provided in an embodiment of the present invention exemplary Fig. 6, The terminal can perform the flow of the access authentication method of wireless network.
As shown in fig. 6, the terminal includes:
Receiving module 601, for receiving the access authentication prompting message of wireless access end transmission;
Processing module 602, for starting the biological information obtaining widget related to the access authentication prompting message, And biological information to be certified is got by the biological information obtaining widget;
Sending module 603, for sending access authentication message to the wireless access end, wrapped in the access authentication message Include biological information to be certified;
The processing module 602, in the wireless access end confirmation biological information to be certified and in advance When the biological information deposited is consistent, the wireless access end is linked into.
Alternatively, the biological information is acoustic information;
The processing module 602 is specifically used for:
The acoustic information to be certified or other equipment that startup sound receiving part reception user sends send to be certified Acoustic information.
The embodiments of the invention provide a kind of computing device, the computing device is specifically as follows desktop computer, portable Computer, smart mobile phone, tablet personal computer, personal digital assistant (Personal Digital Assistant, PDA) etc..The meter Central processing unit (Center Processing Unit, CPU), memory, input-output apparatus etc. can be included by calculating equipment, Input equipment can include keyboard, mouse, touch-screen etc., and output equipment can include display device, such as liquid crystal display (Liquid Crystal Display, LCD), cathode-ray tube (Cathode Ray Tube, CRT) etc..
Memory, read-only storage (ROM) and random access memory (RAM) can be included, and provide and deposit to processor The programmed instruction and data stored in reservoir.In embodiments of the present invention, memory can be used for the access for storing wireless network The programmed instruction of authentication method;
Processor, for calling the programmed instruction stored in the memory, it is wireless to perform track according to the program of acquisition The access authentication method of network.
The embodiments of the invention provide a kind of computer-readable storage medium, the computer-readable recording medium storage has calculating Machine executable instruction, the computer executable instructions are used for the access authentication method for making the computer perform wireless network.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method or computer program product. Therefore, the present invention can be using the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Form.Deposited moreover, the present invention can use to can use in one or more computers for wherein including computer usable program code The shape for the computer program product that storage media is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
Although preferred embodiments of the present invention have been described, but those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So appended claims be intended to be construed to include it is excellent Select embodiment and fall into having altered and changing for the scope of the invention.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.

Claims (12)

  1. A kind of 1. access authentication method of wireless network, it is characterised in that including:
    Wireless access end sends access authentication prompting message to terminal;
    The wireless access end receives the access authentication message that the terminal is sent, and the access authentication message includes to be certified Biological information;
    The wireless access end permits when confirming that the biological information to be certified is consistent with the biological information to prestore Perhaps described terminal is linked into the wireless access end.
  2. 2. the method as described in claim 1, it is characterised in that the biological information is acoustic information;
    The wireless access end permits when confirming that the biological information to be certified is consistent with the biological information to prestore Perhaps described terminal is linked into the wireless access end, including:
    The wireless access end parses the access authentication message, obtains the attribute information of acoustic information to be certified, the category Property information comprises at least sound characteristic;
    The sound for the acoustic information that the wireless access end confirms the sound characteristic of the acoustic information to be certified and prestored is special When levying consistent, it is allowed to which the terminal is linked into the wireless access end.
  3. 3. method as claimed in claim 2, it is characterised in that the attribute information also includes sound-content;
    It is described to allow the terminal to be linked into before the wireless access end, in addition to:
    In the sound-content of the wireless access end confirmation acoustic information to be certified and the sound of the acoustic information to prestore Hold consistent.
  4. A kind of 4. access authentication method of wireless network, it is characterised in that including:
    Terminal receives the access authentication prompting message that wireless access end is sent;
    The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through the life Thing characteristic information acquisition unit part gets biological information to be certified;
    The terminal sends access authentication message to the wireless access end, and the access authentication message includes life to be certified Thing characteristic information;
    The terminal confirms the biological information to be certified and the biological information to prestore at the wireless access end When consistent, the wireless access end is linked into.
  5. 5. method as claimed in claim 4, it is characterised in that the biological information is acoustic information;
    The terminal starts the biological information obtaining widget related to the access authentication prompting message, and passes through the life Thing characteristic information acquisition unit part gets biological information to be certified, including:
    What the acoustic information to be certified or other equipment that the terminal startup sound receiving part reception user sends were sent treats The acoustic information of certification.
  6. A kind of 6. wireless access end, it is characterised in that including:
    Sending module, for sending access authentication prompting message to terminal;
    Receiving module, the access authentication message sent for receiving the terminal, the access authentication message includes to be certified Biological information;
    Processing module, for when confirming that the biological information to be certified is consistent with the biological information to prestore, permitting Perhaps described terminal is linked into the wireless access end.
  7. 7. wireless access end as claimed in claim 6, it is characterised in that the biological information is acoustic information;
    The processing module is specifically used for:
    The access authentication message is parsed, obtains the attribute information of acoustic information to be certified, the attribute information comprises at least Sound characteristic;
    When confirming that the sound characteristic of acoustic information of the sound characteristic of the acoustic information to be certified with prestoring is consistent, it is allowed to institute State terminal and be linked into the wireless access end.
  8. 8. wireless access end as claimed in claim 7, it is characterised in that the attribute information also includes sound-content;
    The processing module is additionally operable to:
    It is described to allow the terminal to be linked into before the wireless access end, in the sound for confirming the acoustic information to be certified The sound-content for holding the acoustic information with prestoring is consistent.
  9. A kind of 9. terminal, it is characterised in that including:
    Receiving module, for receiving the access authentication prompting message of wireless access end transmission;
    Processing module, for starting the biological information obtaining widget related to the access authentication prompting message, and pass through The biological information obtaining widget gets biological information to be certified;
    Sending module, for sending access authentication message to the wireless access end, the access authentication message includes waiting to recognize The biological information of card;
    The processing module, for confirming the biological information to be certified and the biology to prestore at the wireless access end When characteristic information is consistent, the wireless access end is linked into.
  10. 10. terminal as claimed in claim 9, it is characterised in that the biological information is acoustic information;
    The processing module is specifically used for:
    The sound to be certified that the acoustic information to be certified or other equipment that startup sound receiving part reception user sends are sent Message ceases.
  11. A kind of 11. computing device, it is characterised in that including:
    Memory, instructed for storage program;
    Processor, for calling the programmed instruction stored in the memory, 1 to 3 is required according to the program execution profit of acquisition The method described in method or any one of claim 4 to 5 described in any one.
  12. 12. a kind of computer-readable storage medium, it is characterised in that the computer-readable recording medium storage has computer can perform Instruction, the computer executable instructions be used for make computer perform claim require 1 to 3 any one described in method or right will Seek the method described in 4 to 5 any one.
CN201711091954.8A 2017-11-08 2017-11-08 The access authentication method and terminal of a kind of wireless network Pending CN107864476A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711091954.8A CN107864476A (en) 2017-11-08 2017-11-08 The access authentication method and terminal of a kind of wireless network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711091954.8A CN107864476A (en) 2017-11-08 2017-11-08 The access authentication method and terminal of a kind of wireless network

Publications (1)

Publication Number Publication Date
CN107864476A true CN107864476A (en) 2018-03-30

Family

ID=61699883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711091954.8A Pending CN107864476A (en) 2017-11-08 2017-11-08 The access authentication method and terminal of a kind of wireless network

Country Status (1)

Country Link
CN (1) CN107864476A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246133A (en) * 2018-10-19 2019-01-18 清华大学 A kind of network access verifying method based on bio-identification

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102083152A (en) * 2011-03-07 2011-06-01 宇龙计算机通信科技(深圳)有限公司 Method for switching hotspots in wireless local area network (WLAN) and terminal
CN102469621A (en) * 2010-10-29 2012-05-23 巴比禄股份有限公司 Wireless LAN system, communication device and method of sharing setting
CN102833824A (en) * 2012-08-30 2012-12-19 福建星网锐捷网络有限公司 Access method and device for wireless local area network and network equipment
US20130086665A1 (en) * 2011-09-30 2013-04-04 Time Warner Cable Inc. SYSTEM AND METHOD FOR CLONING A Wi-Fi ACCESS POINT
CN103119977A (en) * 2010-09-27 2013-05-22 雅马哈株式会社 Communication terminal, wireless device, provider server, and wireless communication system
CN103702398A (en) * 2013-12-23 2014-04-02 Tcl集团股份有限公司 Wireless AP (access point) selection method and system
CN103781190A (en) * 2012-10-17 2014-05-07 三星电子株式会社 Electronic apparatus and control method thereof
CN104125651A (en) * 2014-07-30 2014-10-29 常州和仕达电子科技有限公司 Accessing and roaming optimization method based on WLAN (wireless local area network) up and down asymmetric wireless link state
CN104469775A (en) * 2012-09-28 2015-03-25 华为技术有限公司 Wireless local area network access method, base station controller and user equipment
CN104980919A (en) * 2015-05-13 2015-10-14 小米科技有限责任公司 Method for acquiring network service information and equipment
CN105554755A (en) * 2015-12-30 2016-05-04 小米科技有限责任公司 Wireless network access method and device
CN106535195A (en) * 2016-12-21 2017-03-22 上海斐讯数据通信技术有限公司 Authentication method and device, and network connection method and system
WO2017086599A1 (en) * 2015-11-19 2017-05-26 삼성전자 주식회사 Wireless communication method using near field communication, and electronic device
CN107172620A (en) * 2017-03-30 2017-09-15 中国移动通信集团江苏有限公司 A kind of wireless local area network (WLAN) verification method and apparatus

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103119977A (en) * 2010-09-27 2013-05-22 雅马哈株式会社 Communication terminal, wireless device, provider server, and wireless communication system
CN102469621A (en) * 2010-10-29 2012-05-23 巴比禄股份有限公司 Wireless LAN system, communication device and method of sharing setting
CN102083152A (en) * 2011-03-07 2011-06-01 宇龙计算机通信科技(深圳)有限公司 Method for switching hotspots in wireless local area network (WLAN) and terminal
US20130086665A1 (en) * 2011-09-30 2013-04-04 Time Warner Cable Inc. SYSTEM AND METHOD FOR CLONING A Wi-Fi ACCESS POINT
CN102833824A (en) * 2012-08-30 2012-12-19 福建星网锐捷网络有限公司 Access method and device for wireless local area network and network equipment
CN104469775A (en) * 2012-09-28 2015-03-25 华为技术有限公司 Wireless local area network access method, base station controller and user equipment
CN103781190A (en) * 2012-10-17 2014-05-07 三星电子株式会社 Electronic apparatus and control method thereof
CN103702398A (en) * 2013-12-23 2014-04-02 Tcl集团股份有限公司 Wireless AP (access point) selection method and system
CN104125651A (en) * 2014-07-30 2014-10-29 常州和仕达电子科技有限公司 Accessing and roaming optimization method based on WLAN (wireless local area network) up and down asymmetric wireless link state
CN104980919A (en) * 2015-05-13 2015-10-14 小米科技有限责任公司 Method for acquiring network service information and equipment
WO2017086599A1 (en) * 2015-11-19 2017-05-26 삼성전자 주식회사 Wireless communication method using near field communication, and electronic device
CN105554755A (en) * 2015-12-30 2016-05-04 小米科技有限责任公司 Wireless network access method and device
CN106535195A (en) * 2016-12-21 2017-03-22 上海斐讯数据通信技术有限公司 Authentication method and device, and network connection method and system
CN107172620A (en) * 2017-03-30 2017-09-15 中国移动通信集团江苏有限公司 A kind of wireless local area network (WLAN) verification method and apparatus

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘晓辉: "《网络硬件设备完全技术宝典 第3版 网络管理典藏全新升级版本》", 31 January 2013 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246133A (en) * 2018-10-19 2019-01-18 清华大学 A kind of network access verifying method based on bio-identification

Similar Documents

Publication Publication Date Title
CN104270404B (en) A kind of login method and device based on terminal iidentification
CN104580125B (en) A kind of payment verification methods, devices and systems
CN113452662B (en) Conference establishment, conference establishment method, equipment, system and storage medium
CN104796385B (en) Terminal binding method, device and system
CN110874541A (en) Electronic ticket admission verification anti-counterfeiting system and method
CN117056892A (en) Secure authorization for access to private data in virtual reality
EP2779012A1 (en) Pro-Active Identity Verification For Authentication Of Transaction Initiated Via Non-Voice Channel
CN110266996B (en) Video conference control method and device and terminal equipment
CN111489172B (en) Qualification information authentication method, terminal and server
US9697346B2 (en) Method and apparatus for identifying and associating devices using visual recognition
CN109086582A (en) A kind of fingerprint verification method, terminal and computer readable storage medium
CN107767297A (en) A kind of user management method based on hosted platform, equipment and system
CN107766713B (en) Face template data entry control method and related products
CN105354459B (en) Information processing method and device and electronic equipment
CN109729067A (en) Voice punch card method, device, equipment and computer storage medium
CN114124591A (en) Speaking user selection method, device, electronic equipment and storage medium
CN106060027B (en) Method, apparatus, equipment and the system verified based on identifying code
CN111949959B (en) Authorization authentication method and device in Oauth protocol
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal
CN104915588B (en) The method for secret protection and device of electronic equipment
CN109474929B (en) Power consumption mode adjusting method and device, electronic equipment and computer readable storage medium
JP2022168244A (en) Ticket providing method and ticket providing system
CN107864476A (en) The access authentication method and terminal of a kind of wireless network
WO2025103134A1 (en) Risk assessment based on multi-party computation
CN106713681B (en) A kind of information processing method, device, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180330

RJ01 Rejection of invention patent application after publication