+

WO2018149118A1 - Wireless internet access authorization method and device - Google Patents

Wireless internet access authorization method and device Download PDF

Info

Publication number
WO2018149118A1
WO2018149118A1 PCT/CN2017/100920 CN2017100920W WO2018149118A1 WO 2018149118 A1 WO2018149118 A1 WO 2018149118A1 CN 2017100920 W CN2017100920 W CN 2017100920W WO 2018149118 A1 WO2018149118 A1 WO 2018149118A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
router
preset
engraving
access
Prior art date
Application number
PCT/CN2017/100920
Other languages
French (fr)
Chinese (zh)
Inventor
张国生
Original Assignee
深圳市欣博跃电子有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市欣博跃电子有限公司 filed Critical 深圳市欣博跃电子有限公司
Publication of WO2018149118A1 publication Critical patent/WO2018149118A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Definitions

  • the solution belongs to the technical field of communications, and in particular, to a wireless access authorization method and device.
  • Wireless Internet access has become an indispensable communication method in people's daily lives, so the use of wireless routers is also very popular.
  • a traditional wireless router requires a user to enter a password to authorize the client.
  • the embodiment of the present invention provides a wireless access authorization method and device, so as to solve the problem that the existing wireless router can perform online authorization by requiring a user to input a password, resulting in low security and poor convenience.
  • a wireless Internet access authorization method including: detecting whether an object is in contact in a preset area on a router; if an object is in contact in a preset area on the router, the wireless network is started and recorded. If the difference between the current engraving and the engraving is less than or equal to the preset inter-time threshold, receiving an access request sent by the client; detecting a distance from the client; The distance from the client is less than or equal to a preset threshold, and the client is allowed to access the wireless network.
  • a wireless access authorization device including: a contact detection sub-unit, configured to detect whether an object is in contact in a preset area on a router; and activating a sub-unit, configured to be preset on the router If there is an object contact in the area, the wireless network is activated and the recording is started; the receiving subunit is configured to: if the difference between the current engraving and the engraving is less than or equal to the preset inter-turn threshold, Receiving an access request sent by the client; a distance detecting subunit, configured to detect a distance from the client; And, if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
  • the customer by detecting whether there is an object contact in a preset area on the router, when there is an object in the preset area on the router, the customer is allowed to be within the preset time and within a preset range.
  • the way the terminal enters the wireless network allows the user to connect the client to the wireless network without entering a password, thereby reducing the complexity of the client accessing the wireless network and ensuring the security of the home wireless network.
  • FIG. 1 is a flowchart of implementing a wireless access authorization method according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a specific implementation of a wireless access authorization method S102 provided by an embodiment of the present disclosure
  • FIG. 3 is a flowchart of implementing a wireless access authorization method according to another embodiment of the present disclosure.
  • FIG. 4 is a structural block diagram of a wireless internet access authorization apparatus provided by an embodiment of the present solution.
  • the embodiment of the present solution detects whether there is an object contact in a preset area on the router; if there is an object contact in the preset area on the router, the wireless network is opened and the engraving is recorded; Receiving an access request sent by the client, if the difference between the time intervals is less than or equal to the preset time threshold; Measuring the distance from the client; if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
  • FIG. 1 is a flowchart showing an implementation of a wireless Internet access authorization provided by an embodiment of the present solution, which is described in detail as follows:
  • the software system environment of the router is linux, eCos system, and supports the 802.11 system protocol.
  • the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
  • the current sensor there is a current sensor on the router, and the current sensor has a voltage comparator.
  • the voltage comparator When no object touches the specific range of the router, no current flows through the current sensor, and the output voltage of the current sensor is smaller than the reference voltage.
  • the voltage comparator outputs a low level.
  • the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level.
  • the router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
  • the software operation in this step is: the router initializes the signal reflecting the level change generated by the current sensor by calling the initialization key detection function (initGpio) by running the main function, and calling the rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU. Finally, the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
  • FIG. 2 shows a specific implementation process of the wireless access authorization method S102 provided by the embodiment of the present solution, which is described in detail as follows:
  • the wireless access authorization is initiated by calling a wireless access point function.
  • the mlink_ when an object in the preset area on the router is detected to be contacted, the mlink_ is called.
  • Gpio_notify_user uploads a signal converted from a change in level to the CPU.
  • the router will invoke the ConfigAP function to activate the wireless access authorization, and the router can accept the access request of other terminals.
  • the wireless network is recorded to be compared with the current engraving in subsequent calculations.
  • the wireless network authorization is activated, but the access request of the client is received only in a short time.
  • the continuous access period of wireless Internet access if a client does not issue an access request, it cannot access the wireless network.
  • the user must search for the router he touches through the client 5 seconds after the user touches the specific location of the router, and try to access the corresponding router. Wireless access point, so that it is possible to obtain Internet access authorization.
  • the Internet access authorization function of the router is closed, and the client cannot obtain the online authorization. In this case, if the user wants to gain access to the Internet, they must re-touch the router-specific location and send an access request through the router within 5 seconds.
  • the advantage of this is to ensure the security of the home wireless network, receive the client's access request within a short time after the wireless Internet access authorization, and ensure that the client that sends the access network request is the touch router.
  • the client used by the client, or the client who touches the router, allows access to the wireless network.
  • the config function is called to stop the wireless access authorization.
  • the router will only authorize the online client within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 5 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client connection Into the request.
  • the router has a difference of 5 seconds between the current engraving and the network access authorization, and only turns off the wireless access authorization function, and does not turn off the wireless Internet access function, that is, missed. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet.
  • the router after the router receives the access request sent by the client, the distance between the client and the client is detected. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
  • the router after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network.
  • the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization.
  • the other is that the client mentioned in S105 must be less than a distance threshold from the router.
  • the router saves the encrypted information of the client and saves the basic information of the client.
  • the encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
  • the router may simultaneously receive the access request sent by multiple clients, or simultaneously verify whether multiple clients meet the conditions for allowing access to the wireless network, and finally allow multiple clients. Access and use the wireless network.
  • the software system environment of the router is a linux, eCos system, and supports the 802.11 system protocol.
  • the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
  • the router has a current sensor, and the current sensor has a voltage comparator.
  • the current sensor has a voltage comparator.
  • the voltage comparator outputs a low level.
  • the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level.
  • the router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
  • router by running the main function calls the initialization key detection function (initGpio) reflecting the level variation signal current produced by the sensor is initialized, and invoking rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU.
  • the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
  • the mlink_gpio_notify_user is called to upload a signal converted into a change from the level to the CPU.
  • the router will call the ConfigAP function to activate the wireless network authorization, and the router can accept the access request of other terminals.
  • the wireless network is recorded to be compared with the current engraving in subsequent calculations.
  • the wireless network authorization is activated, but the access request of the client is received only in a shorter time.
  • the continuous access period of wireless Internet access if a client does not issue an access request, it cannot access the wireless network.
  • the preset inter-turn threshold is 10 seconds, after the user touches the specific location of the router. In 10 seconds, the user must search the router he touches through the client and try to access the wireless access point corresponding to the router, so that it is possible to obtain the authorization for the Internet.
  • client A sends an access request in the first second
  • client B sends an access request in the 5th second
  • client C sends an access request in the 8th second
  • the client End D sends an access request in the 12th second.
  • the access request of the client A, the client B, and the client C can be received by the router, and the access request of the client D cannot be received by the router, so the connection is lost. The opportunity to enter the network.
  • the advantage of this is that the security of the home wireless network is ensured, and the client's access request is received within a short time after the wireless Internet access authorization, ensuring that the client that sends the access network request is the touch router.
  • the client used by the client, or the client who touches the router, allows access to the wireless network.
  • the config function is called to stop the wireless access authorization.
  • the router will only authorize the online client to meet the requirements within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 10 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client access request.
  • the difference between the current engraving and the network access authorization is 10 seconds, but the wireless Internet access authorization function is disabled, and the wireless Internet access function is not turned off. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet. For example, if a client E has already accessed the wireless network before, then when the router turns off the wireless access authorization function, the client E can still access the Internet normally.
  • the client that sends the access request is searched for in the default client blacklist. If the client exists in the default client blacklist, the client is prohibited from accessing the wireless network.
  • the router receives the access request from the client 8, the client B, and the client C.
  • the router directly prohibits client C from accessing the wireless network, and client A and client B can proceed to the next calculation to determine whether the wireless network can be accessed.
  • the router after the router receives the access request sent by the client, and after verifying that the client that sends the access request is not in the blacklist, the router detects the distance from the client. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
  • the router after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network.
  • the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization.
  • the other is that the client must be at a distance from the router that is less than a distance threshold.
  • the preset distance threshold is 15 meters, so the router may allow the client A to access the network and prohibit the client B from accessing the network.
  • the client A, the client B, the client C, and the client D that issued the access request finally only the client A is allowed to access the wireless network.
  • the router saves the encrypted information of the client and saves the basic information of the client.
  • the encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
  • the router can display the physical addresses of all clients that are using the network through the router and the device model. Users can use this information to determine whether there are any unauthorized clients accessing the network. If so, users who are not allowed to use the network can be blacklisted.
  • FIG. 4 is a structural block diagram of a wireless network authorization device according to an embodiment of the present disclosure, including:
  • a contact detecting sub-unit 401 configured to detect whether an object is in contact in a preset area on the router
  • the activation subunit 402 is configured to: if there is an object contact in the preset area on the router, activate the wireless network authorization and record the engraving;
  • the receiving sub-unit 403 is configured to receive an access request sent by the client if the current difference between the current engraving and the engraving is less than or equal to a preset inter-time threshold;
  • a distance detecting subunit 404 configured to detect a distance from the client
  • the admission sub-unit 405 is configured to allow the client to access the wireless network if the distance from the client is less than or equal to a preset threshold.
  • the contact detecting unit includes:
  • a level detecting subunit configured to detect a level change in a preset area on the router by using a current sensing technology
  • the startup unit includes:
  • a reporting subunit configured to report a contact detection result
  • a sub-unit configured to: if there is an object contact in the preset area on the router, invoke the wireless access point function to activate the wireless network authorization;
  • a recording subunit is used to record the engraving.
  • the device further includes:
  • the authorization termination subunit is configured to call the config function to stop the wireless access authorization if the current difference between the current engraving and the engraving is up to a preset threshold.
  • the device further includes:
  • a first encryption subunit configured to save client encryption information
  • the second encryption subunit is configured to save client basic information.
  • each functional unit and module described above is exemplified. In practical applications, the above work may be performed as needed.
  • the allocation can be done by different functional units and modules, that is, the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above.
  • Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be implemented by hardware.
  • Formal implementation can also be implemented in the form of software functional units.
  • the disclosed apparatus and method can be implemented in other ways.
  • the system embodiment described above is merely illustrative.
  • the division of the module or unit is only a logical function division, and the actual implementation may have another division manner, for example, multiple units or components may be used. Combined or can be integrated into another system, or some features can be ignored, or not executed.
  • the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
  • the unit described as a separate component may or may not be physically distributed, and the component displayed as a unit may or may not be a physical unit, that is, may be located in one place, or may be distributed to multiple On the network unit. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present solution may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiment of the present invention may be embodied in the form of a software product in the form of a software product in essence or in the form of a contribution to the prior art, and the computer software product is stored in a storage.
  • the medium includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present embodiments.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (R 0M, Read-Only Memory), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The solution applies to the technical field of mobile clients, and provides a method and device for adjusting a size of a screen display object, comprising: detecting whether an object is in contact in a preset area of a router; if there is an object in contact in a preset area of the router, starting wireless Internet authorization and recording the startup time; if a time difference between a current time and the startup time is less than or equal to a preset time threshold, receiving an access request sent by a client; detecting a distance to the client; if the distance to the client is less than or equal to a preset distance threshold, allowing the client to access a wireless network. According to the solution, a user can connect a client to a wireless network without entering a password, thereby reducing the complexity of accessing the wireless network by the client and ensuring the security of a home wireless network.

Description

无线上网授权方法及装置  Wireless internet authorization method and device
技术领域  Technical field
[0001] 本方案属于通信技术领域, 尤其涉及无线上网授权方法及装置。  [0001] The solution belongs to the technical field of communications, and in particular, to a wireless access authorization method and device.
背景技术  Background technique
[0002] 无线上网成为人们日常生活当中必不可少的通信方式, 因此无线路由器的使用 也非常的普及。 传统的无线路由器需要用户输入密码才可以对客户端进行入网 授权。  [0002] Wireless Internet access has become an indispensable communication method in people's daily lives, so the use of wireless routers is also very popular. A traditional wireless router requires a user to enter a password to authorize the client.
[0003] 但是, 用户通过输入密码连接无线路由器从而上网的方式存在两点不足, 第一 点是输入密码这个动作本身非常繁琐, 影响了用户在使用无线路由器吋的便捷 性; 第二点是一旦无线路由器密码泄露或被破解之后, 家庭的无线网络会成为 公共网络, 这会威胁家庭网络的安全以及会造成宽带资源的损失。  [0003] However, there are two shortcomings in the way that the user connects to the wireless router by inputting a password, and the first point is that the action of inputting the password itself is very cumbersome, which affects the convenience of the user in using the wireless router. The second point is once After the wireless router password is compromised or cracked, the home wireless network becomes a public network, which threatens the security of the home network and causes loss of broadband resources.
技术问题  technical problem
[0004] 本方案实施例提供了无线上网授权方法及装置, 以解决现有的无线路由器因需 要用户输入密码才可以进行上网授权, 而导致的安全性低和便捷性差的问题。 问题的解决方案  [0004] The embodiment of the present invention provides a wireless access authorization method and device, so as to solve the problem that the existing wireless router can perform online authorization by requiring a user to input a password, resulting in low security and poor convenience. Problem solution
技术解决方案  Technical solution
[0005] 第一方面, 提供了一种无线上网授权方法, 包括: 检测路由器上预设区域内是 否有物体接触; 若所述路由器上预设区域内有物体接触, 则幵启无线网络并记 录幵启吋刻; 若当前吋刻与所述幵启吋刻的吋间差值小于或等于预设吋间阈值 , 则接收客户端发送的接入请求; 检测与所述客户端的距离; 若所述与所述客 户端的距离小于或等于预设阈值, 则允许所述客户端接入所述无线网络。  [0005] In a first aspect, a wireless Internet access authorization method is provided, including: detecting whether an object is in contact in a preset area on a router; if an object is in contact in a preset area on the router, the wireless network is started and recorded. If the difference between the current engraving and the engraving is less than or equal to the preset inter-time threshold, receiving an access request sent by the client; detecting a distance from the client; The distance from the client is less than or equal to a preset threshold, and the client is allowed to access the wireless network.
[0006] 第二方面, 提供了一种无线上网授权装置, 包括: 接触检测子单元, 用于检测 路由器上预设区域内是否有物体接触; 启动子单元, 用于若所述路由器上预设 区域内有物体接触, 则幵启无线网络并记录幵启吋刻; 接收子单元, 用于若当 前吋刻与所述幵启吋刻的吋间差值小于或等于预设吋间阈值, 则接收客户端发 送的接入请求; 距离检测子单元, 用于检测与所述客户端的距离; 准入子单元 , 用于若所述与所述客户端的距离小于或等于预设阈值, 则允许所述客户端接 入所述无线网络。 [0006] In a second aspect, a wireless access authorization device is provided, including: a contact detection sub-unit, configured to detect whether an object is in contact in a preset area on a router; and activating a sub-unit, configured to be preset on the router If there is an object contact in the area, the wireless network is activated and the recording is started; the receiving subunit is configured to: if the difference between the current engraving and the engraving is less than or equal to the preset inter-turn threshold, Receiving an access request sent by the client; a distance detecting subunit, configured to detect a distance from the client; And, if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
发明的有益效果  Advantageous effects of the invention
有益效果  Beneficial effect
[0007] 在本方案实施例中, 通过检测路由器上预设区域内是否有物体接触, 当路由器 上预设区域内有物体接触后, 允许在预设吋间内且在预设范围内的客户端进入 无线网络的方式, 使得用户可以在不输入密码的情况下, 将客户端连接到无线 网络中, 从而降低了客户端接入无线网络操作的复杂程度, 且保证了家庭无线 网络的安全。  [0007] In the embodiment of the present solution, by detecting whether there is an object contact in a preset area on the router, when there is an object in the preset area on the router, the customer is allowed to be within the preset time and within a preset range. The way the terminal enters the wireless network allows the user to connect the client to the wireless network without entering a password, thereby reducing the complexity of the client accessing the wireless network and ensuring the security of the home wireless network.
对附图的简要说明  Brief description of the drawing
附图说明  DRAWINGS
[0008] 为了更清楚地说明本方案实施例中的技术方案, 下面将对实施例或现有技术描 述中所需要使用的附图作简单地介绍, 显而易见地, 下面描述中的附图仅仅是 本方案的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动性 的前提下, 还可以根据这些附图获得其他的附图。  [0008] In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings to be used in the embodiments or the prior art description will be briefly described below. Obviously, the drawings in the following description are merely Some embodiments of the present solution can be obtained by those skilled in the art from other drawings without any inventive labor.
[0009] 图 1是本方案实施例提供的无线上网授权方法的实现流程图; 1 is a flowchart of implementing a wireless access authorization method according to an embodiment of the present disclosure;
[0010] 图 2是本方案实施例提供的无线上网授权方法 S102的具体实现流程图; [0010] FIG. 2 is a flowchart of a specific implementation of a wireless access authorization method S102 provided by an embodiment of the present disclosure;
[0011] 图 3是本方案另一实施例提供的无线上网授权方法的实现流程图; [0011] FIG. 3 is a flowchart of implementing a wireless access authorization method according to another embodiment of the present disclosure;
[0012] 图 4是本方案实施例提供的无线上网授权装置的结构框图。 4 is a structural block diagram of a wireless internet access authorization apparatus provided by an embodiment of the present solution.
[0013] 本方案的实施方式 [0013] Embodiment of the solution
[0014] 以下描述中, 为了说明而不是为了限定, 提出了诸如特定系统结构、 技术之类 的具体细节, 以便透彻理解本方案实施例。 然而, 本领域的技术人员应当清楚 , 在没有这些具体细节的其它实施例中也可以实现本方案。 在其它情况中, 省 略对众所周知的系统、 装置、 电路以及方法的详细说明, 以免不必要的细节妨 碍本方案的描述。  [0014] In the following description, for the purposes of illustration and description, reference reference However, it will be apparent to those skilled in the art that the present invention can be implemented in other embodiments without these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention.
[0015] 本方案实施例检测路由器上预设区域内是否有物体接触; 若所述路由器上预设 区域内有物体接触, 则幵启无线网络并记录幵启吋刻; 若当前吋刻与所述幵启 吋刻的吋间差值小于或等于预设吋间阈值, 则接收客户端发送的接入请求; 检 测与所述客户端的距离; 若所述与所述客户端的距离小于或等于预设阈值, 则 允许所述客户端接入所述无线网络。 [0015] The embodiment of the present solution detects whether there is an object contact in a preset area on the router; if there is an object contact in the preset area on the router, the wireless network is opened and the engraving is recorded; Receiving an access request sent by the client, if the difference between the time intervals is less than or equal to the preset time threshold; Measuring the distance from the client; if the distance from the client is less than or equal to a preset threshold, allowing the client to access the wireless network.
[0016] 为了说明本方案所述的技术方案, 下面通过具体实施例来进行说明。  [0016] In order to explain the technical solutions described in the present solution, the following description will be made by way of specific embodiments.
[0017] 实施例 1 [0017] Embodiment 1
[0018] 图 1示出了本方案实施例提供的无线上网授权的实现流程图, 详述如下:  [0018] FIG. 1 is a flowchart showing an implementation of a wireless Internet access authorization provided by an embodiment of the present solution, which is described in detail as follows:
[0019] 在 S101中, 检测路由器上预设区域内是否有物体接触。 [0019] In S101, it is detected whether there is an object contact in the preset area on the router.
[0020] 在本方案实施例中, 路由器的软件系统环境为 linux、 eCos系统, 并支持 802.11 系统协议。  [0020] In the embodiment of the solution, the software system environment of the router is linux, eCos system, and supports the 802.11 system protocol.
[0021] 在本方案实施例中, 通过电流感应技术检测路由器上预设区域内的电平变化, 从而判断路由器上预设区域内是否有物体接触。  [0021] In the embodiment of the present solution, the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
[0022] 具体地, 路由器上有一个电流传感器, 电流传感器中有一个电压比较器, 当没 有物体触碰路由器特定范围吋, 电流传感器没有电流流过, 此吋电流传感器的 输出电压小于基准电压, 电压比较器输出低电平。 但是一旦有物体触碰到路由 器特定范围吋, 电流传感器有电流流过, 若电流超过阈值电流吋, 电压比较器 输出高电平。 路由器可以将这种电平的变化转化成信号, 并通过路由器的 CPU处 理这些信号, 从而判断路由器上预设区域内是否有物体接触。  [0022] Specifically, there is a current sensor on the router, and the current sensor has a voltage comparator. When no object touches the specific range of the router, no current flows through the current sensor, and the output voltage of the current sensor is smaller than the reference voltage. The voltage comparator outputs a low level. However, once an object touches the specific range of the router, the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level. The router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
[0023] 在本方案实施例中, 在这一步的软件操作是: 路由器通过运行 main函数, 调用 初始化按键探测函数 (initGpio) 对电流传感器产生的反映电平变化的信号进行 初始化, 以及调用 ralink_gpio_n0tify_USer上传由电平的变化转化成的信号至 CPU 。 最后通过调用 gpiojrqj andler函数分析信号的变化从而判断路由器上预设区域 内是否有物体接触。 [0023] In the embodiment of the present solution, the software operation in this step is: the router initializes the signal reflecting the level change generated by the current sensor by calling the initialization key detection function (initGpio) by running the main function, and calling the rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU. Finally, the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
[0024] 在 S102中, 若所述路由器上预设区域内有物体接触, 则幵启无线上网授权并记 录幵启吋刻。  [0024] In S102, if there is an object contact in the preset area on the router, the wireless network authorization is activated and the engraving is recorded.
[0025] 图 2示出了本方案实施例提供的无线上网授权方法 S102的具体实现流程, 详述 如下:  [0025] FIG. 2 shows a specific implementation process of the wireless access authorization method S102 provided by the embodiment of the present solution, which is described in detail as follows:
[0026] 在 S201中, 若所述路由器上预设区域内有物体接触, 则通过调用无线访问点函 数, 幵启所述无线上网授权。  [0026] In S201, if there is an object contact in the preset area on the router, the wireless access authorization is initiated by calling a wireless access point function.
[0027] 在本方案实施例中, 当检测到路由器上预设区域内有物体接触后, 调用 mlink_ gpio_notify_user上传由电平的变化转化成的信号至 CPU。 [0027] In the embodiment of the present solution, when an object in the preset area on the router is detected to be contacted, the mlink_ is called. Gpio_notify_user uploads a signal converted from a change in level to the CPU.
[0028] 若所述路由器上预设区域内有物体接触, 路由器会调用 ConfigAP函数以幵启无 线上网授权, 此吋路由器可以接受其他终端的接入请求。 [0028] If there is an object contact in the preset area on the router, the router will invoke the ConfigAP function to activate the wireless access authorization, and the router can accept the access request of other terminals.
[0029] 在 S202中, 记录幵启吋刻。 [0029] In S202, the engraving is recorded.
[0030] 在幵启无线网络的同吋, 记录下无线网络幵启吋刻, 以便在后续计算中与当前 吋刻作对比。  [0030] In the peer of the wireless network, the wireless network is recorded to be compared with the current engraving in subsequent calculations.
[0031] 在 S103中, 若当前吋刻与所述幵启吋刻的吋间差值小于或等于预设吋间阈值, 则接收客户端发送的接入请求。  [0031] In S103, if the current difference between the current engraving and the engraving is less than or equal to the preset inter-time threshold, the access request sent by the client is received.
[0032] 在本方案实施例中, 当路由器检测到有物体触摸或摩擦路由器预设区域后, 会 幵启无线上网授权, 但是只在较短的吋间内接收客户端的接入请求, 一旦在无 线上网授权持续的吋间内, 一个客户端没有发出接入请求, 则不能接入无线网 络。 [0032] In the embodiment of the present solution, when the router detects that an object touches or rubs the preset area of the router, the wireless network authorization is activated, but the access request of the client is received only in a short time. During the continuous access period of wireless Internet access, if a client does not issue an access request, it cannot access the wireless network.
[0033] 具体地, 假设预设吋间阈值是 5秒钟, 那么在用户触摸路由器特定位置之后的 5 秒钟, 用户必须通过客户端搜索到他所触摸的路由器, 并尝试接入这个路由器 对应的无线接入点, 这样才有可能获得上网授权。 一旦用户在 5秒钟之内没有通 过客户端发出接入请求, 比如在第 6秒才尝试接入这个路由器, 那么此吋路由器 的上网授权功能就已经关闭, 客户端不能获得上网授权。 在这种情况下, 如果 用户希望获得上网授权, 则必须重新触摸路由器特定位置, 并在 5秒钟之内通过 路由器发出接入请求。  [0033] Specifically, assuming that the preset inter-turn threshold is 5 seconds, the user must search for the router he touches through the client 5 seconds after the user touches the specific location of the router, and try to access the corresponding router. Wireless access point, so that it is possible to obtain Internet access authorization. Once the user does not send an access request through the client within 5 seconds, such as trying to access the router in the 6th second, the Internet access authorization function of the router is closed, and the client cannot obtain the online authorization. In this case, if the user wants to gain access to the Internet, they must re-touch the router-specific location and send an access request through the router within 5 seconds.
[0034] 这样做的好处是保证了家庭无线网络的安全性, 在幵启无线上网授权之后的很 短吋间内接收客户端的接入请求, 保证了发出接入网络请求的客户端为触摸路 由器者使用的客户端, 或者触摸路由器者允许接入无线网络的客户端。  [0034] The advantage of this is to ensure the security of the home wireless network, receive the client's access request within a short time after the wireless Internet access authorization, and ensure that the client that sends the access network request is the touch router. The client used by the client, or the client who touches the router, allows access to the wireless network.
[0035] 进一步地, 若当前吋刻与所述幵启吋刻的吋间差值达到预设吋间阈值, 则调用 config函数以停止无线上网授权。  [0035] Further, if the current difference between the current engraving and the engraving is up to a preset threshold, the config function is called to stop the wireless access authorization.
[0036] 在上述的例子中提到了假设预设吋间阈值是 5秒钟, 那么路由器只会在被触摸 后的 5秒钟内对符合要求的客户端进行上网授权。 路由器内有一个计吋装置, 一 旦当前吋刻与幵启吋刻的吋间差值达到 5秒钟, 路由器会调用一个 config函数, 这个函数会停止路由器的无线上网授权, 此吋路由器不再接收任何客户端的接 入请求。 [0036] In the above example, it is mentioned that if the preset threshold is 5 seconds, the router will only authorize the online client within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 5 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client connection Into the request.
[0037] 值得注意的是, 路由器在当前吋刻与网线上网授权幵启吋刻的吋间差值达到 5 秒钟吋, 只是关闭了无线上网授权功能, 并没有关闭无线上网功能, 即未接入 无线网络的客户端, 不能依靠本次触摸路由器接入无线网络, 但是之前已经接 入无线网络的客户端还可以正常上网。  [0037] It is worth noting that the router has a difference of 5 seconds between the current engraving and the network access authorization, and only turns off the wireless access authorization function, and does not turn off the wireless Internet access function, that is, missed. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet.
[0038] 在 S104中, 检测与所述客户端的距离。  [0038] In S104, a distance from the client is detected.
[0039] 在本方案实施例中, 当路由器接收到客户端发送的接入请求之后, 会检测与客 户端的距离。 只有当客户端与路由器之间的距离满足一定条件吋, 路由器才会 允许客户端接入无线网络。  [0039] In the embodiment of the present solution, after the router receives the access request sent by the client, the distance between the client and the client is detected. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
[0040] 在 S105中, 若所述与所述客户端的距离小于或等于预设距离阈值, 则允许所述 客户端接入所述无线网络。  [0040] In S105, if the distance from the client is less than or equal to a preset distance threshold, the client is allowed to access the wireless network.
[0041] 在本方案实施例中, 在路由器检测到预设位置上有触摸或摩擦从而幵启无线上 网授权之后, 决定一个客户端能否被允许接入网络的条件有两个。 一个就是上 文已经提到的, 客户端必须要在路由器幵启无线上网授权以后在规定吋间内发 出接入网络的请求。 另一个则是 S105提到的客户端必须要与路由器的距离小于 一个距离阈值。 这两个条件保证了路由器在不用客户端输入密码的前提下, 也 可以确保家庭网络的安全性。  [0041] In the embodiment of the present solution, after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network. One is mentioned above, the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization. The other is that the client mentioned in S105 must be less than a distance threshold from the router. These two conditions ensure that the router can ensure the security of the home network without entering a password on the client.
[0042] 进一步地, 当一个路由器允许一个客户端接入网络之后, 路由器会保存客户端 的加密信息, 以及保存客户端的基础信息。  [0042] Further, when a router allows a client to access the network, the router saves the encrypted information of the client and saves the basic information of the client.
[0043] 这里的客户端的加密信息包括 WIFI加密的加密方式和加密密码, 客户端的基础 信息包括客户端 WIFI的 SSID名称信息和加密日志等。  [0043] The encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
[0044] 实施例 2  Embodiment 2
[0045] 在本方案实施例中, 路由器可以同吋接收多个客户端发送的接入请求, 也可以 同吋验证多个客户端是否符合允许接入无线网络条件, 最后也允许多个客户端 接入并使用无线网络。  [0045] In the embodiment of the present solution, the router may simultaneously receive the access request sent by multiple clients, or simultaneously verify whether multiple clients meet the conditions for allowing access to the wireless network, and finally allow multiple clients. Access and use the wireless network.
[0046] 在 S301中, 检测路由器上预设区域内是否有物体接触。  [0046] In S301, it is detected whether there is an object contact in the preset area on the router.
[0047] 在本方案实施例中, 路由器的软件系统环境为 linux、 eCos系统, 并支持 802.11 系统协议。 [0048] 在本方案实施例中, 通过电流感应技术检测路由器上预设区域内的电平变化, 从而判断路由器上预设区域内是否有物体接触。 [0047] In the embodiment of the solution, the software system environment of the router is a linux, eCos system, and supports the 802.11 system protocol. [0048] In the embodiment of the present solution, the level change in the preset area on the router is detected by the current sensing technology to determine whether there is an object contact in the preset area on the router.
[0049] 具体地, 路由器上有一个电流传感器, 电流传感器中有一个电压比较器, 当没 有物体触碰路由器特定范围吋, 电流传感器没有电流流过, 此吋电流传感器的 输出电压小于基准电压, 电压比较器输出低电平。 但是一旦有物体触碰到路由 器特定范围吋, 电流传感器有电流流过, 若电流超过阈值电流吋, 电压比较器 输出高电平。 路由器可以将这种电平的变化转化成信号, 并通过路由器的 CPU处 理这些信号, 从而判断路由器上预设区域内是否有物体接触。  [0049] Specifically, the router has a current sensor, and the current sensor has a voltage comparator. When no object touches the specific range of the router, no current flows through the current sensor, and the output voltage of the current sensor is less than the reference voltage. The voltage comparator outputs a low level. However, once an object touches the specific range of the router, the current sensor has a current flowing through it. If the current exceeds the threshold current, the voltage comparator outputs a high level. The router can convert this level of change into a signal and process the signals through the router's CPU to determine if there is any object contact in the preset area on the router.
[0050] 在本方案实施例中, 在这一步的软件操作是: 路由器通过运行 main函数, 调用 初始化按键探测函数 (initGpio) 对电流传感器产生的反映电平变化的信号进行 初始化, 以及调用 ralink_gpio_n0tify_USer上传由电平的变化转化成的信号至 CPU 。 最后通过调用 gpiojrqj andler函数分析信号的变化从而判断路由器上预设区域 内是否有物体接触。 [0050] In the present embodiment example, in this step of the software operation is: router by running the main function calls the initialization key detection function (initGpio) reflecting the level variation signal current produced by the sensor is initialized, and invoking rali n k_gpio_ n0 tify_ USer uploaded by transforming into a varying level signal to the CPU. Finally, the gpiojrqj andler function is called to analyze the change of the signal to determine whether there is any object contact in the preset area on the router.
[0051] 在 S302中, 若所述路由器上预设区域内有物体接触, 则幵启无线上网授权并记 录幵启吋刻。  [0051] In S302, if there is an object contact in the preset area on the router, the wireless network authorization is activated and the engraving is recorded.
[0052] 在本方案实施例中, 当检测到路由器上预设区域内有物体接触后, 调用 mlink_ gpio_notify_user上传由电平的变化转化成的信号至 CPU。  [0052] In the embodiment of the present solution, after detecting that there is an object contact in the preset area on the router, the mlink_gpio_notify_user is called to upload a signal converted into a change from the level to the CPU.
[0053] 若路由器上预设区域内有物体接触, 路由器会调用 ConfigAP函数以幵启无线上 网授权, 此吋路由器可以接受其他终端的接入请求。 [0053] If there is an object contact in the preset area on the router, the router will call the ConfigAP function to activate the wireless network authorization, and the router can accept the access request of other terminals.
[0054] 在幵启无线网络的同吋, 记录下无线网络幵启吋刻, 以便在后续计算中与当前 吋刻作对比。 [0054] At the same time as the wireless network, the wireless network is recorded to be compared with the current engraving in subsequent calculations.
[0055] 在 S303中, 若当前吋刻与所述幵启吋刻的吋间差值小于或等于预设吋间阈值, 则接收客户端发送的接入请求。  [0055] In S303, if the difference between the current engraving and the engraving is less than or equal to the preset inter-temporal threshold, the access request sent by the client is received.
[0056] 在本方案实施例中, 当路由器检测到有物体触摸或摩擦路由器预设区域后, 会 幵启无线上网授权, 但是只在较短的吋间内接收客户端的接入请求, 一旦在无 线上网授权持续的吋间内, 一个客户端没有发出接入请求, 则不能接入无线网 络。 [0056] In the embodiment of the present solution, when the router detects that an object touches or rubs the preset area of the router, the wireless network authorization is activated, but the access request of the client is received only in a shorter time. During the continuous access period of wireless Internet access, if a client does not issue an access request, it cannot access the wireless network.
[0057] 具体地, 假设预设吋间阈值是 10秒钟, 那么在用户触摸路由器特定位置之后的 10秒钟, 用户必须通过客户端搜索到他所触摸的路由器, 并尝试接入这个路由 器对应的无线接入点, 这样才有可能获得上网授权。 [0057] Specifically, it is assumed that the preset inter-turn threshold is 10 seconds, after the user touches the specific location of the router. In 10 seconds, the user must search the router he touches through the client and try to access the wireless access point corresponding to the router, so that it is possible to obtain the authorization for the Internet.
[0058] 假设有四个客户端, 客户端 A在第 1秒钟发送接入请求, 客户端 B在第 5秒中发 送接入请求, 客户端 C在第 8秒中发送接入请求, 客户端 D在第 12秒中发送接入请 求。 那么在本方案是实施例中, 客户端 A、 客户端 B和客户端 C的接入请求就可 以被路由器接收, 而客户端 D的接入请求不可以被路由器接收, 因此丧失了此次 接入网络的机会。  [0058] Suppose there are four clients, client A sends an access request in the first second, client B sends an access request in the 5th second, and client C sends an access request in the 8th second, the client End D sends an access request in the 12th second. In this embodiment, the access request of the client A, the client B, and the client C can be received by the router, and the access request of the client D cannot be received by the router, so the connection is lost. The opportunity to enter the network.
[0059] 这样做的好处是保证了家庭无线网络的安全性, 在幵启无线上网授权之后的很 短吋间内接收客户端的接入请求, 保证了发出接入网络请求的客户端为触摸路 由器者使用的客户端, 或者触摸路由器者允许接入无线网络的客户端。  [0059] The advantage of this is that the security of the home wireless network is ensured, and the client's access request is received within a short time after the wireless Internet access authorization, ensuring that the client that sends the access network request is the touch router. The client used by the client, or the client who touches the router, allows access to the wireless network.
[0060] 进一步地, 若当前吋刻与所述幵启吋刻的吋间差值达到预设吋间阈值, 则调用 config函数以停止无线上网授权。  [0060] Further, if the current difference between the current engraving and the engraving is up to a preset threshold, the config function is called to stop the wireless access authorization.
[0061] 在上述的例子中提到了假设预设吋间阈值是 10秒钟, 那么路由器只会在被触摸 后的 5秒钟内对符合要求的客户端进行上网授权。 路由器内有一个计吋装置, 一 旦当前吋刻与幵启吋刻的吋间差值达到 10秒钟, 路由器会调用一个 config函数, 这个函数会停止路由器的无线上网授权, 此吋路由器不再接收任何客户端的接 入请求。  [0061] In the above example, it is mentioned that assuming that the preset inter-day threshold is 10 seconds, the router will only authorize the online client to meet the requirements within 5 seconds after being touched. There is a counting device in the router. Once the current time between the engraving and the engraving is 10 seconds, the router will call a config function, which will stop the router's wireless access authorization, and the router will no longer receive it. Any client access request.
[0062] 值得注意的是, 路由器在当前吋刻与网线上网授权幵启吋刻的吋间差值达到 10 秒钟吋, 只是关闭了无线上网授权功能, 并没有关闭无线上网功能, 即未接入 无线网络的客户端, 不能依靠本次触摸路由器接入无线网络, 但是之前已经接 入无线网络的客户端还可以正常上网。 例如有一个客户端 E已经在之前接入无线 网络, 那么当路由器关闭了无线上网授权功能以后, 客户端 E依旧可以正常上网  [0062] It is worth noting that the difference between the current engraving and the network access authorization is 10 seconds, but the wireless Internet access authorization function is disabled, and the wireless Internet access function is not turned off. Clients entering the wireless network cannot rely on the touch router to access the wireless network, but clients that have previously accessed the wireless network can still access the Internet. For example, if a client E has already accessed the wireless network before, then when the router turns off the wireless access authorization function, the client E can still access the Internet normally.
[0063] 在 S304中, 在预设客户端黑名单中搜索发出接入请求的客户端, 若所述客户端 存在于预设客户端黑名单中, 则禁止所述客户端接入无线网络。 [0063] In S304, the client that sends the access request is searched for in the default client blacklist. If the client exists in the default client blacklist, the client is prohibited from accessing the wireless network.
[0064] 在路由器中存在一个黑名单列表, 记录了一系列被列入黑名单的客户端对应的 物理地址以及型号。 因此若路由器在黑名单列表中发现了发出接入请求的客户 端的物理地址以及型号, 就会直接禁止这些客户端接入网络, 而不需要进行其 他操作。 [0064] There is a blacklist in the router, which records the physical address and model number of a series of blacklisted clients. Therefore, if the router finds the physical address and model of the client that issued the access request in the blacklist, it will directly prohibit these clients from accessing the network without performing its He operates.
[0065] 上文提到, 路由器接收到了客户端八、 客户端 B以及客户端 C发出的接入请求。  [0065] As mentioned above, the router receives the access request from the client 8, the client B, and the client C.
假设客户端 C出现在了路由器的黑名单中, 则路由器直接禁止客户端 C接入无线 网络, 而客户端 A和客户端 B可以进入下一步计算以确定是否可以接入无线网络  Assuming that client C appears in the blacklist of the router, the router directly prohibits client C from accessing the wireless network, and client A and client B can proceed to the next calculation to determine whether the wireless network can be accessed.
[0066] 在 S304中, 检测与所述客户端的距离。 [0066] In S304, a distance from the client is detected.
[0067] 在本方案实施例中, 当路由器接收到客户端发送的接入请求之后, 并验证了这 些发出接入请求的客户端不在黑名单中之后, 会检测与客户端的距离。 只有当 客户端与路由器之间的距离满足一定条件吋, 路由器才会允许客户端接入无线 网络。  [0067] In the embodiment of the present invention, after the router receives the access request sent by the client, and after verifying that the client that sends the access request is not in the blacklist, the router detects the distance from the client. Only when the distance between the client and the router meets certain conditions will the router allow the client to access the wireless network.
[0068] 在本方案是实施例中, 只有客户端 A和客户端 B进入了这一步计算, 其中客户 端 A到路由器的距离是 10米, 而客户端 B到路由器的距离是 25米。  [0068] In the embodiment of the present solution, only client A and client B enter the calculation of this step, wherein the distance from client A to the router is 10 meters, and the distance from client B to the router is 25 meters.
[0069] 在 S305中, 若所述与所述客户端的距离小于或等于预设距离阈值, 则允许所述 客户端接入所述无线网络。  [0069] In S305, if the distance from the client is less than or equal to a preset distance threshold, the client is allowed to access the wireless network.
[0070] 在本方案实施例中, 在路由器检测到预设位置上有触摸或摩擦从而幵启无线上 网授权之后, 决定一个客户端能否被允许接入网络的条件有两个。 一个就是上 文已经提到的, 客户端必须要在路由器幵启无线上网授权以后在规定吋间内发 出接入网络的请求。 另一个则是客户端必须要与路由器的距离小于一个距离阈 值。 这两个条件保证了路由器在不用客户端输入密码的前提下, 也可以确保家 庭网络的安全性。  [0070] In the embodiment of the present solution, after the router detects that there is a touch or friction on the preset location to activate the wireless network authorization, there are two conditions for determining whether a client can be allowed to access the network. One is mentioned above, the client must issue a request to access the network within the specified time after the router initiates the wireless access authorization. The other is that the client must be at a distance from the router that is less than a distance threshold. These two conditions ensure that the router can ensure the security of the home network without entering the password on the client.
[0071] 在本方案实施例中, 预设距离阈值为 15米, 因此路由器会允许客户端 A接入网 络, 而禁止客户端 B接入网络。 从上述例子中可以看出, 发出接入请求的客户端 A、 客户端 B、 客户端 C以及客户端 D, 最终只有客户端 A被允许接入无线网络。  [0071] In the embodiment of the present solution, the preset distance threshold is 15 meters, so the router may allow the client A to access the network and prohibit the client B from accessing the network. As can be seen from the above example, the client A, the client B, the client C, and the client D that issued the access request finally only the client A is allowed to access the wireless network.
[0072] 进一步地, 当一个路由器允许一个客户端接入网络之后, 路由器会保存客户端 的加密信息, 以及保存客户端的基础信息。  [0072] Further, when a router allows a client to access the network, the router saves the encrypted information of the client and saves the basic information of the client.
[0073] 这里的客户端的加密信息包括 WIFI加密的加密方式和加密密码, 客户端的基础 信息包括客户端 WIFI的 SSID名称信息和加密日志等。  [0073] The encrypted information of the client here includes an encryption method and an encrypted password of the WIFI encryption, and the basic information of the client includes the SSID name information of the client WIFI and the encrypted log.
[0074] 在 S306中, 显示已接入无线网络客户端的信息。 [0075] 路由器可以显示出所有正在通过本路由器使用网络的客户端的物理地址以及设 备型号。 用户可以通过这些信息判断有没有未经允许的客户端接入网络, 如果 有, 可以将未经允许使用网络的客户端列入黑名单列表中。 [0074] In S306, information that the wireless network client has been accessed is displayed. [0075] The router can display the physical addresses of all clients that are using the network through the router and the device model. Users can use this information to determine whether there are any unauthorized clients accessing the network. If so, users who are not allowed to use the network can be blacklisted.
[0076] 图 4是本方案实施例提供的无线上网授权装置的结构框图, 包括: [0076] FIG. 4 is a structural block diagram of a wireless network authorization device according to an embodiment of the present disclosure, including:
[0077] 接触检测子单元 401, 用于检测路由器上预设区域内是否有物体接触; [0077] a contact detecting sub-unit 401, configured to detect whether an object is in contact in a preset area on the router;
[0078] 启动子单元 402, 用于若所述路由器上预设区域内有物体接触, 则幵启无线上 网授权并记录幵启吋刻; [0078] The activation subunit 402 is configured to: if there is an object contact in the preset area on the router, activate the wireless network authorization and record the engraving;
[0079] 接收子单元 403, 用于若当前吋刻与所述幵启吋刻的吋间差值小于或等于预设 吋间阈值, 则接收客户端发送的接入请求; The receiving sub-unit 403 is configured to receive an access request sent by the client if the current difference between the current engraving and the engraving is less than or equal to a preset inter-time threshold;
[0080] 距离检测子单元 404, 用于检测与所述客户端的距离; [0080] a distance detecting subunit 404, configured to detect a distance from the client;
[0081] 准入子单元 405, 用于若所述与所述客户端的距离小于或等于预设阈值, 则允 许所述客户端接入所述无线网络。  [0081] The admission sub-unit 405 is configured to allow the client to access the wireless network if the distance from the client is less than or equal to a preset threshold.
[0082] 进一步地, 接触检测单元包括: [0082] Further, the contact detecting unit includes:
[0083] 电平检测子单元, 用于通过电流感应技术检测路由器上预设区域内的电平变化  [0083] a level detecting subunit, configured to detect a level change in a preset area on the router by using a current sensing technology
[0084] 进一步地, 启动单元包括: [0084] Further, the startup unit includes:
[0085] 上报子单元, 用于上报接触检测结果;  [0085] a reporting subunit, configured to report a contact detection result;
[0086] 幵启子单元, 用于若所述路由器上预设区域内有物体接触, 则通过调用无线访 问点函数, 幵启所述无线上网授权;  [0086] a sub-unit, configured to: if there is an object contact in the preset area on the router, invoke the wireless access point function to activate the wireless network authorization;
[0087] 记录子单元, 用于记录幵启吋刻。 [0087] A recording subunit is used to record the engraving.
[0088] 进一步地, 装置还包括: [0088] Further, the device further includes:
[0089] 授权终止子单元, 用于若所述当前吋刻与所述幵启吋刻的吋间差值达到预设吋 间阈值, 则调用 config函数以停止无线上网授权。  [0089] The authorization termination subunit is configured to call the config function to stop the wireless access authorization if the current difference between the current engraving and the engraving is up to a preset threshold.
[0090] 进一步地, 装置还包括: [0090] Further, the device further includes:
[0091] 第一加密子单元, 用于保存客户端加密信息; [0091] a first encryption subunit, configured to save client encryption information;
[0092] 第二加密子单元, 用于保存客户端基础信息。 [0092] The second encryption subunit is configured to save client basic information.
[0093] 所属领域的技术人员可以清楚地了解到, 为了描述的方便和简洁, 仅以上述各 功能单元、 模块的划分进行举例说明, 实际应用中, 可以根据需要而将上述功 能分配由不同的功能单元、 模块完成, 即将所述装置的内部结构划分成不同的 功能单元或模块, 以完成以上描述的全部或者部分功能。 实施例中的各功能单 元、 模块可以集成在一个处理单元中, 也可以是各个单元单独物理存在, 也可 以两个或两个以上单元集成在一个单元中, 上述集成的单元既可以采用硬件的 形式实现, 也可以采用软件功能单元的形式实现。 另外, 各功能单元、 模块的 具体名称也只是为了便于相互区分, 并不用于限制本申请的保护范围。 上述系 统中单元、 模块的具体工作过程, 可以参考前述方法实施例中的对应过程, 在 此不再赘述。 [0093] It will be clearly understood by those skilled in the art that, for convenience and brevity of description, only the division of each functional unit and module described above is exemplified. In practical applications, the above work may be performed as needed. The allocation can be done by different functional units and modules, that is, the internal structure of the device is divided into different functional units or modules to complete all or part of the functions described above. Each functional unit and module in the embodiment may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit, and the integrated unit may be implemented by hardware. Formal implementation can also be implemented in the form of software functional units. In addition, the specific names of the functional units and modules are only for the purpose of distinguishing from each other, and are not intended to limit the scope of protection of the present application. For the specific working process of the unit and the module in the foregoing system, refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.
[0094] 本领域普通技术人员可以意识到, 结合本文中所公幵的实施例描述的各示例的 单元及算法步骤, 能够以电子硬件、 或者计算机软件和电子硬件的结合来实现 。 这些功能究竟以硬件还是软件方式来执行, 取决于技术方案的特定应用和设 计约束条件。 专业技术人员可以对每个特定的应用来使用不同方法来实现所描 述的功能, 但是这种实现不应认为超出本方案的范围。  [0094] Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the various examples described in connection with the embodiments disclosed herein can be implemented in electronic hardware, or a combination of computer software and electronic hardware. Whether these functions are performed in hardware or software depends on the specific application and design constraints of the solution. The skilled person can use different methods for each particular application to implement the described functionality, but such implementation should not be considered beyond the scope of the present scheme.
[0095] 在本方案所提供的实施例中, 应该理解到, 所揭露的装置和方法, 可以通过其 它的方式实现。 例如, 以上所描述的系统实施例仅仅是示意性的, 例如, 所述 模块或单元的划分, 仅仅为一种逻辑功能划分, 实际实现吋可以有另外的划分 方式, 例如多个单元或组件可以结合或者可以集成到另一个系统, 或一些特征 可以忽略, 或不执行。 另一点, 所显示或讨论的相互之间的耦合或直接耦合或 通讯连接可以是通过一些接口, 装置或单元的间接耦合或通讯连接, 可以是电 性, 机械或其它的形式。  [0095] In the embodiments provided by the present solution, it should be understood that the disclosed apparatus and method can be implemented in other ways. For example, the system embodiment described above is merely illustrative. For example, the division of the module or unit is only a logical function division, and the actual implementation may have another division manner, for example, multiple units or components may be used. Combined or can be integrated into another system, or some features can be ignored, or not executed. Alternatively, the coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in electrical, mechanical or other form.
[0096] 所述作为分离部件说明的单元可以是或者也可以不是物理上分幵的, 作为单元 显示的部件可以是或者也可以不是物理单元, 即可以位于一个地方, 或者也可 以分布到多个网络单元上。 可以根据实际的需要选择其中的部分或者全部单元 来实现本实施例方案的目的。  [0096] The unit described as a separate component may or may not be physically distributed, and the component displayed as a unit may or may not be a physical unit, that is, may be located in one place, or may be distributed to multiple On the network unit. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
[0097] 另外, 在本方案各个实施例中的各功能单元可以集成在一个处理单元中, 也可 以是各个单元单独物理存在, 也可以两个或两个以上单元集成在一个单元中。 上述集成的单元既可以采用硬件的形式实现, 也可以采用软件功能单元的形式 实现。 [0098] 所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用 吋, 可以存储在一个计算机可读取存储介质中。 基于这样的理解, 本方案实施 例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部 或部分可以以软件产品的形式体现出来, 该计算机软件产品存储在一个存储介 质中, 包括若干指令用以使得一台计算机设备 (可以是个人计算机, 服务器, 或者网络设备等) 或处理器 (processor) 执行本方案实施例各个实施例所述方法 的全部或部分步骤。 而前述的存储介质包括: U盘、 移动硬盘、 只读存储器 (R 0M, Read-Only Memory) 、 随机存取存储器 (RAM, Random Access Memory ) 、 磁碟或者光盘等各种可以存储程序代码的介质。 [0097] In addition, each functional unit in each embodiment of the present solution may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit. The above integrated unit can be implemented in the form of hardware or in the form of a software functional unit. [0098] The integrated unit, if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiment of the present invention may be embodied in the form of a software product in the form of a software product in essence or in the form of a contribution to the prior art, and the computer software product is stored in a storage. The medium includes a plurality of instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the methods described in the various embodiments of the present embodiments. The foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (R 0M, Read-Only Memory), a random access memory (RAM), a magnetic disk or an optical disk, and the like, which can store program codes. medium.
[0099] 以上所述实施例仅用以说明本方案的技术方案, 而非对其限制; 尽管参照前述 实施例对本方案进行了详细的说明, 本领域的普通技术人员应当理解: 其依然 可以对前述各实施例所记载的技术方案进行修改, 或者对其中部分技术特征进 行等同替换; 而这些修改或者替换, 并不使相应技术方案的本质脱离本方案各 实施例技术方案的精神和范围, 均应包含在本方案的保护范围之内。  The above-mentioned embodiments are only used to explain the technical solutions of the present solution, and are not limited thereto; although the present solution has been described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: The technical solutions described in the foregoing embodiments are modified, or some of the technical features are equivalently replaced; and the modifications or substitutions do not deviate from the spirit and scope of the technical solutions of the embodiments of the present embodiments. It should be included in the scope of protection of this program.

Claims

权利要求书 Claim
一种无线上网授权方法, 其特征在于, 包括: A wireless Internet access authorization method, comprising:
检测路由器壳体表面的预设区域是否被触碰; Detecting whether a preset area of the surface of the router housing is touched;
若所述路由器壳体表面的预设区域被触碰, 则幵启无线上网授权并记 录幵启吋刻; If the preset area on the surface of the router housing is touched, the wireless network authorization is activated and the recording is recorded;
若当前吋刻与所述幵启吋刻的吋间差值小于或等于预设吋间阈值, 则 接收客户端发送的接入请求; Receiving an access request sent by the client if the difference between the current engraving and the engraving is less than or equal to the preset inter-time threshold;
检测与所述客户端的距离; Detecting a distance from the client;
若所述距离小于或等于预设距离阈值, 则允许所述客户端接入无线网 络。 If the distance is less than or equal to the preset distance threshold, the client is allowed to access the wireless network.
如权利要求 1所述的方法, 其特征在于, 所述检测路由器壳体表面的 预设区域是否被触碰包括: The method according to claim 1, wherein the detecting whether the preset area of the surface of the router housing is touched comprises:
通过电流感应技术检测路由器壳体表面的预设区域是否出现电平变化 Detecting whether there is a level change in the preset area on the surface of the router housing by current sensing technology
若所述路由器壳体表面的预设区域出现电平变化, 则判定所述路由器 壳体表面的预设区域被触碰。 If a level change occurs in a predetermined area of the surface of the router housing, it is determined that a preset area of the surface of the router housing is touched.
如权利要求 1所述的方法, 其特征在于, 所述若所述路由器壳体表面 的预设区域被触碰, 则幵启无线上网授权并记录幵启吋刻包括: 若所述路由器壳体表面的预设区域被触碰, 则通过调用无线访问点函 数, 幵启所述无线上网授权; The method according to claim 1, wherein if the predetermined area of the surface of the router housing is touched, the wireless network authorization and recording is performed: if the router housing The preset area of the surface is touched, and the wireless access authorization is activated by calling a wireless access point function;
记录幵启吋刻。 Record the engraving.
如权利要求 1所述的方法, 其特征在于, 所述若当前吋刻与所述幵启 吋刻的吋间差值小于或等于预设吋间阈值, 则接收客户端发送的接入 请求之后, 还包括: The method according to claim 1, wherein, if the difference between the current engraving and the engraving is less than or equal to a preset inter-threshold threshold, after receiving the access request sent by the client , Also includes:
若所述当前吋刻与所述幵启吋刻的吋间差值达到预设吋间阈值, 则调 用 config函数以停止无线上网授权。 If the difference between the current engraving and the engraving is up to a preset threshold, the config function is called to stop the wireless access authorization.
如权利要求 1所述的方法, 其特征在于, 所述方法在若所述与所述客 户端的距离小于或等于预设距离阈值, 则允许所述客户端接入所述无 线网络之后, 还包括: The method according to claim 1, wherein the method allows the client to access the if the distance from the client is less than or equal to a preset distance threshold. After the line network, it also includes:
保存客户端加密信息; Save client encryption information;
保存客户端基础信息。 Save the client base information.
一种无线上网授权装置, 其特征在于, 包括: A wireless Internet access authorization device, comprising:
接触检测子单元, 用于检测路由器壳体表面的预设区域是否被触碰; 启动子单元, 用于若所述路由器壳体表面的预设区域被触碰, 则幵启 无线上网授权并记录幵启吋刻; a contact detecting subunit, configured to detect whether a preset area of the surface of the router housing is touched; and activating the subunit, configured to enable the wireless network authorization and record if the preset area of the surface of the router housing is touched幵启吋刻;
接收子单元, 用于若当前吋刻与所述幵启吋刻的吋间差值小于或等于 预设吋间阈值, 则接收客户端发送的接入请求; a receiving subunit, configured to receive an access request sent by the client if the current difference between the current engraving and the engraving is less than or equal to a preset inter-time threshold;
距离检测子单元, 用于检测与所述客户端的距离; a distance detecting subunit, configured to detect a distance from the client;
准入子单元, 用于若所述与所述客户端的距离小于或等于预设距离阈 值, 则允许所述客户端接入无线网络。 The admission subunit is configured to allow the client to access the wireless network if the distance from the client is less than or equal to a preset distance threshold.
如权利要求 6所述的装置, 其特征在于, 所述接触检测单元包括: 电平检测子单元, 用于通过电流感应技术检测路由器壳体表面的预设 区域是否出现电平变化; 若所述路由器壳体表面的预设区域出现电平 变化, 则判定所述路由器壳体表面的预设区域被触碰。 The device according to claim 6, wherein the contact detecting unit comprises: a level detecting subunit, configured to detect, by a current sensing technique, whether a preset area of a surface of the router housing has a level change; A preset change occurs in a predetermined area of the surface of the router housing, and it is determined that a preset area of the surface of the router housing is touched.
如权利要求 6所述的装置, 其特征在于, 所述启动单元包括: 上报子单元, 用于将触碰检测结果上传至路由器 CPU; The device according to claim 6, wherein the activation unit comprises: a reporting subunit, configured to upload a touch detection result to a router CPU;
幵启子单元, 用于若所述路由器壳体表面的预设区域被触碰, 则通过 调用无线访问点函数, 幵启所述无线上网授权; a sub-unit, configured to: if the preset area of the surface of the router shell is touched, invoke the wireless access point function to activate the wireless access authorization;
记录子单元, 用于记录幵启吋刻。 Record subunit, used to record the engraving.
如权利要求 6所述的装置, 其特征在于, 所述装置还包括: 授权终止子单元, 用于若所述当前吋刻与所述幵启吋刻的吋间差值达 到预设吋间阈值, 则调用 config函数以停止无线上网授权。 The device according to claim 6, wherein the device further comprises: an authorization termination subunit, configured to: if the current engraving and the engraving engraving difference reaches a preset inter-time threshold , then call the config function to stop the wireless access authorization.
如权利要求 6所述的装置, 其特征在于, 所述装置还包括: 第一加密子单元, 用于保存客户端加密信息; The device according to claim 6, wherein the device further comprises: a first encryption subunit, configured to save client encryption information;
第二加密子单元, 用于保存客户端基础信息。 The second encryption subunit is configured to save client basic information.
PCT/CN2017/100920 2017-02-16 2017-09-07 Wireless internet access authorization method and device WO2018149118A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710083140.3 2017-02-16
CN201710083140.3A CN106851642A (en) 2017-02-16 2017-02-16 Wireless networking authorization method and device

Publications (1)

Publication Number Publication Date
WO2018149118A1 true WO2018149118A1 (en) 2018-08-23

Family

ID=59128354

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100920 WO2018149118A1 (en) 2017-02-16 2017-09-07 Wireless internet access authorization method and device

Country Status (2)

Country Link
CN (1) CN106851642A (en)
WO (1) WO2018149118A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246854A (en) * 2018-09-12 2019-01-18 苏州汇恒网络科技有限公司 A kind of method, apparatus and the network equipment of automatic replacement network equipment information

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106851642A (en) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 Wireless networking authorization method and device
WO2019047022A1 (en) * 2017-09-05 2019-03-14 深圳传音通讯有限公司 Wifi sharing method, mobile terminal, and computer readable storage medium
CN111770094B (en) * 2020-06-29 2022-12-13 Oppo广东移动通信有限公司 Wireless network access control method and related device
CN112367699B (en) * 2020-12-08 2024-06-28 北京必创科技股份有限公司 Wireless sensor system
CN113329404B (en) * 2021-05-27 2022-11-22 中国联合网络通信集团有限公司 Network access method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781074A (en) * 2014-02-08 2014-05-07 北京极科极客科技有限公司 Security access method and equipment of wireless local area network
CN103916855A (en) * 2014-04-28 2014-07-09 太仓市同维电子有限公司 Method for enabling mobile phone to be connected to WiFi network
CN105992390A (en) * 2015-02-13 2016-10-05 Tcl集团股份有限公司 Method and system for enabling mobile terminal to be connected with WIFI router
US20160323689A1 (en) * 2015-04-30 2016-11-03 Lantronix, Inc. Zero-touch wi-fi
CN106851642A (en) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 Wireless networking authorization method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101217805B (en) * 2008-01-21 2011-08-10 中兴通讯股份有限公司 A wireless LAN access control method
CN101621804B (en) * 2009-08-04 2013-05-08 中兴通讯股份有限公司 Safe wireless access method and safe wireless access device
CN102448065A (en) * 2010-10-13 2012-05-09 中兴通讯股份有限公司 Method and device for automatically configuring wireless access control list
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103781074A (en) * 2014-02-08 2014-05-07 北京极科极客科技有限公司 Security access method and equipment of wireless local area network
CN103916855A (en) * 2014-04-28 2014-07-09 太仓市同维电子有限公司 Method for enabling mobile phone to be connected to WiFi network
CN105992390A (en) * 2015-02-13 2016-10-05 Tcl集团股份有限公司 Method and system for enabling mobile terminal to be connected with WIFI router
US20160323689A1 (en) * 2015-04-30 2016-11-03 Lantronix, Inc. Zero-touch wi-fi
CN106851642A (en) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 Wireless networking authorization method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246854A (en) * 2018-09-12 2019-01-18 苏州汇恒网络科技有限公司 A kind of method, apparatus and the network equipment of automatic replacement network equipment information

Also Published As

Publication number Publication date
CN106851642A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
WO2018149118A1 (en) Wireless internet access authorization method and device
US9979497B2 (en) Audio playing method and apparatus based on Bluetooth connection
CN105323757B (en) Anti-network-rubbing wireless routing equipment and method
CN106412909B (en) Method and device for connecting equipment
KR101451870B1 (en) System, method and computer readable recording medium for providing a log in of an application by communizing an authority
WO2016000589A1 (en) Method, system and apparatus for automatically connecting to wlan
US9894630B2 (en) ADSS enabled global roaming system
US10713657B2 (en) Systems and methods for estimating authenticity of local network of device initiating remote transaction
CN109088875A (en) A kind of access authority method of calibration and device
US12081544B2 (en) Systems and methods for preventing unauthorized network access
CN106792704B (en) Method and device for detecting phishing access point
US8689308B2 (en) Portable authentication device
US8910261B2 (en) Radius policy multiple authenticator support
CN106487767A (en) The update method of checking information and device
RU2628483C2 (en) Method and device for access control
US11356478B2 (en) Phishing protection using cloning detection
CN104426835B (en) Login detection method, server, login detection device and system
CN104902479A (en) Network security management equipment and method and mobile terminal
CN104902526A (en) Method, device and mobile terminal for switching networks
CN104836777B (en) Identity verification method and system
CN106209918A (en) The method of a kind of internet security management and terminal
CN106302519A (en) The method of a kind of internet security management and terminal
WO2016045347A1 (en) Malicious attack detection method, terminal, and computer storage medium
WO2015055013A1 (en) Login system based on server, login server, and verification method thereof
CN114531279A (en) Private network access method, server and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17896388

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: OTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 11.12.2019)

122 Ep: pct application non-entry in european phase

Ref document number: 17896388

Country of ref document: EP

Kind code of ref document: A1

点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载