CN105553675A - Method and apparatus for logging in router - Google Patents

Method and apparatus for logging in router Download PDF

Info

Publication number
CN105553675A
CN105553675A CN201610066596.4A CN201610066596A CN105553675A CN 105553675 A CN105553675 A CN 105553675A CN 201610066596 A CN201610066596 A CN 201610066596A CN 105553675 A CN105553675 A CN 105553675A
Authority
CN
China
Prior art keywords
terminal
router
random code
authorization token
binding relationship
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610066596.4A
Other languages
Chinese (zh)
Other versions
CN105553675B (en
Inventor
曹丁鹏
陈勇
王益冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201610066596.4A priority Critical patent/CN105553675B/en
Publication of CN105553675A publication Critical patent/CN105553675A/en
Application granted granted Critical
Publication of CN105553675B publication Critical patent/CN105553675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • G06K7/14Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation using light without selection of wavelength, e.g. sensing reflected white light
    • G06K7/1404Methods for optical code recognition
    • G06K7/1408Methods for optical code recognition the method being specifically adapted for the type of code
    • G06K7/14172D bar codes

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The disclosure relates to a method and an apparatus for logging in a router, and belongs to the technical field of a network. According to the disclosure, the router receives verification information sent by a second terminal with a binding relationship with the router, generates an authorization token when a second random code carried by the verification information is the same with a first random code generated by the router, and sends the authorization token to a first terminal sending a logging-in request, so that the first terminal can log in the router by the authorization token. Therefore, when a user forgets a password, the verification information is sent to the router by the second terminal bound with the router, then the router generates the authorization token for the first terminal which the user wants to log in currently on the basis of the binding relationship with the second terminal, and the first terminal can utilize the authorization token to carry out logging-in, so that a condition of acquiring a factory default password in a mode of restoring factory settings is avoided, and integrity of historical set data when the router is logged in is ensured.

Description

Log in method and the device of router
Technical field
The disclosure relates to networking technology area, particularly a kind of method and device logging in router.
Background technology
Along with the fast development of network technology, router extensively enters into huge numbers of families as network access equipment.When the terminal address of couple in router being carried out to limit power, or, routers distributing IP (InternetProtocol, procotol) mode of address is when arranging, user needs routers to manage, and in the process of routers management, needs login password.
In the related, router provides usually " resetting (reset) " button, when user forgets login password, can by triggering this button, make router factory reset, thus making the login password of router return to the password of default setting when dispatching from the factory, user is namely by the password login router of this default setting.
Summary of the invention
Disclosure embodiment provides a kind of method and the device that log in router.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, provide a kind of method logging in router, comprising:
When receiving the logging request that first terminal sends, generate pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receive the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
When according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and when described first random code and described second random code match, generate authorization token;
Described authorization token is sent to described first terminal, and described authorization token is used for described first terminal and logs in described router.
In the first possible implementation of the first aspect of disclosure embodiment, before the authorization information that described reception second terminal sends, described method also comprises:
Receive the bind request of described second terminal, described bind request carries the end message of described second terminal;
According to the end message of described second terminal, set up the binding relationship between described second terminal and described router.
In the implementation that the second of the first aspect of disclosure embodiment is possible, after described generation authorization token, described method also comprises:
When the first fixed time of arrival, described authorization token is set to inefficacy, described first fixed time is the time point apart from described authorization token rise time preset duration.
In the third possible implementation of the first aspect of disclosure embodiment, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and is obtained.
In the 4th kind of possible implementation of the first aspect of disclosure embodiment, described method also comprises:
When the second fixed time of arrival, described first random code is set to inefficacy, described second fixed time is the time point apart from described first random code rise time preset duration.
According to the second aspect of disclosure embodiment, provide a kind of device logging in router, comprising:
Generation module, for when receiving the logging request that first terminal sends, generates pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receiver module, for receiving the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
Described generation module is also for when according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and described first random code and described second random code are when matching, generate authorization token;
Sending module, for described authorization token is sent to described first terminal, described authorization token is used for described first terminal and logs in described router.
In the first possible implementation of the second aspect of disclosure embodiment, described receiver module is also for receiving the bind request of described second terminal, and described bind request carries the end message of described second terminal;
Described device also comprises:
Set up module, for the end message according to described second terminal, set up the binding relationship between described second terminal and described router.
In the implementation that the second of the second aspect of disclosure embodiment is possible, described device also comprises:
Configuration module, for when the first fixed time of arrival, described authorization token is set to inefficacy, and described first fixed time is the time point apart from described authorization token rise time preset duration.
In the third possible implementation of the second aspect of disclosure embodiment, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and is obtained.
In the 4th kind of possible implementation of the second aspect of disclosure embodiment, described configuration module is also for when the second fixed time of arrival, described first random code is set to inefficacy, and described second fixed time is the time point apart from described first random code rise time preset duration.
According to the third aspect of disclosure embodiment, provide a kind of device logging in router, comprising:
Processor;
For storing the memory of the executable instruction of described processor;
Wherein, described processor is used for:
When receiving the logging request that first terminal sends, generate pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receive the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
When according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and when described first random code and described second random code match, generate authorization token;
Described authorization token is sent to described first terminal, and described authorization token is used for described first terminal and logs in described router.
The technical scheme that disclosure embodiment provides can comprise following beneficial effect:
Router is by receiving the authorization information sent with second terminal self with binding relationship, when the second random code that authorization information is carried is identical with the first random code that self generates, generate authorization token, and be that the first terminal sending logging request sends this authorization token, first terminal can be logged in by this authorization token routers.So, when user forgets Password, authorization information is sent to this router by second terminal of binding with router, make router based on the binding relationship with the second terminal, for the current first terminal wanting to log in generates authorization token, make first terminal that this authorization token can be utilized to log in, thus avoid needing to obtain factory default by the mode of factory reset password is set, ensure that the integrality of history setting data when logging in router.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the disclosure.
Accompanying drawing explanation
Accompanying drawing to be herein merged in specification and to form the part of this specification, shows and meets embodiment of the present disclosure, and is used from specification one and explains principle of the present disclosure.
Figure 1A is the schematic diagram of a kind of implementation environment according to an exemplary embodiment.
Figure 1B is a kind of method flow diagram logging in router according to an exemplary embodiment.
Fig. 2 is a kind of method flow diagram logging in router according to another exemplary embodiment.
Fig. 3 is a kind of device block diagram logging in router according to an exemplary embodiment.
Fig. 4 is a kind of device block diagram logging in router according to another exemplary embodiment.
Fig. 5 is a kind of block diagram logging in the device 500 of router according to an exemplary embodiment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Execution mode described in following exemplary embodiment does not represent all execution modes consistent with the disclosure.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that aspects more of the present disclosure are consistent.
The method that disclosure embodiment provides, can by router as executive agent.First terminal involved in the present embodiment and the second terminal can be mobile phone, panel computer and computer etc.Wherein, the second terminal has the function of scanning patter mark, and the function of this scanning patter mark can by the realization that should be used for that the second terminal is installed.Please refer to Figure 1A, be the schematic diagram of a kind of implementation environment according to an exemplary embodiment, this implementation environment comprises mobile phone 110, computer 120 and router one 30.Can be established a communications link by wired mode or wireless mode respectively between mobile phone 110 and router one 30, between computer 120 and router one 30.Wherein, wireless mode can be comprised and being established a communications link by modes such as bluetooth (Bluetooth), Wi-Fi (WirelessFidelity, Wireless Fidelity).
Figure 1B is a kind of method flow diagram logging in router according to an exemplary embodiment.The method of this login router can comprise following several step:
In a step 101, when receiving the logging request that first terminal sends, generate pattern identification, the first random code that this pattern identification generates in this logs in for providing router.
In a step 102, receive the authorization information that the second terminal sends, this authorization information carries end message and second random code of the second terminal.
In step 103, when according to the end message of the second terminal and the binding relationship that stored, determine to possess binding relationship between the second terminal and router, and when the first random code and the second random code match, generate authorization token.
At step 104, authorization token is sent to first terminal, this authorization token is used for first terminal routers and logs in.
The method that disclosure embodiment provides, router is by receiving the authorization information sent with second terminal self with binding relationship, when the second random code that authorization information is carried is identical with the first random code that self generates, generate authorization token, and be that the first terminal sending logging request sends this authorization token, first terminal can be logged in by this authorization token routers.So, when user forgets Password, authorization information is sent to this router by second terminal of binding with router, make router based on the binding relationship with the second terminal, for the current first terminal wanting to log in generates authorization token, make first terminal that this authorization token can be utilized to log in, thus avoid needing to obtain factory default by the mode of factory reset password is set, ensure that the integrality of history setting data when logging in router.
Based on the above-mentioned method provided, in a kind of possible implementation, before the authorization information that described reception second terminal sends, described method also comprises: the bind request receiving described second terminal, and described bind request carries the end message of described second terminal; According to the end message of described second terminal, set up the binding relationship between described second terminal and described router.
Above by the binding relationship set up between the second terminal and router, the authorization information only having router only to send for this second terminal is authorized, improves the fail safe of router.
In the implementation that another kind is possible, after described generation authorization token, described method also comprises:
When the first fixed time of arrival, described authorization token is set to inefficacy, described first fixed time is the time point apart from described authorization token rise time preset duration.
Above by the term of validity arranging generated authorization token, make after the first fixed time, limit first terminal and again log in router by this authorization token, ensure that the fail safe of router.
In the implementation that another kind is possible, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and is obtained.
Above-mentioned second terminal, by scanning the mode of the pattern identification that first terminal shows, obtains the second random code, improves the convenience of operation.
In the implementation that another kind is possible, described method also comprises:
When the second fixed time of arrival, described first random code is set to inefficacy, described second fixed time is the time point apart from described first random code rise time preset duration.
Above by the term of validity arranging the first generated random code, making this first random code when there is no value, in time the first random code can be deleted, improve the fail safe of router.
Above-mentioned all alternatives, can adopt and combine arbitrarily formation embodiment of the present disclosure, this is no longer going to repeat them.
Fig. 2 is a kind of method flow diagram logging in router according to another exemplary embodiment.The method of this login router can comprise following several step:
In step 201, receive the bind request of the second terminal, this bind request carries the end message of the second terminal.
The method that disclosure embodiment provides, in order to the fail safe of router, carries out in the process of Default Value in routers, the second terminal can be set to the terminal with self with binding relationship by user in the router.
Particularly, the second terminal sends bind request to router, carries the end message of the second terminal in this bind request.Wherein, this end message can for the account logged in this second terminal, and also can be terminal iidentification, such as, the second terminal be millet account etc.Correspondingly, router receives the bind request that the second terminal sends.
In step 202., according to the end message of the second terminal, set up the binding relationship between the second terminal and router.
After router receives the end message of the second terminal, according to the end message of this second terminal and the physical address of the Router Distinguisher of self or router, set up the binding relationship between the second terminal.
When setting up binding relationship, if have multiple second terminal in family or office space, then can set up the binding relationship between multiple second terminal and router, that is to say, for router, multiple second terminal can be preserved to the binding relationship of a router.
Certainly, it should be noted that, the above-mentioned binding relationship set up between the second terminal and router, can also be realized by server.Particularly, the second terminal to server sends bind request, the mark of carried terminal information and router in this bind request.After server receives this bind request, according to the end message of the second terminal and the mark of router, set up the binding relationship between the second terminal and router.So, set up the binding relationship between the second terminal and router by server, can reduce the burden of this router, the disclosure does not do concrete restriction to this.Such as, the end message of the second terminal received is TerminalUser1, router be designated RouterN, then in the server, the binding relationship set up between the second terminal and this router is as shown in table 1 below.
Table 1
Bindings group Second end message The mark of router
n Terminal User1 Router N
It should be noted that, above-mentioned citing is only exemplary, and the binding relationship between the second terminal and router can also have other binding form, and the disclosure is not construed as limiting this.
In step 203, when receiving the logging request that first terminal sends, generate pattern identification, the first random code that this pattern identification generates in this logs in for providing router.
Wherein, established a communications link between first terminal and router by wired mode or wireless mode, user can open the login interface of router by first terminal.In a kind of possible implementation, login interface provides specified option, this specified option is used to indicate first terminal and sends logging request to router, that is, when detecting that user triggers this specified option, first terminal sends logging request to router.In the implementation that another kind is possible, when detecting that user opens the login interface of router, first terminal sends logging request to router, certainly, it should be noted that, in this case, if the account of the known login router of user and password, the account that then can directly utilize this known and password login router, namely do not need to be logged in by follow-up step.
When router receives this logging request, generate pattern identification, and return to first terminal, when first terminal receives this pattern identification, login interface shows this pattern identification.In a kind of possible implementation, this pattern identification can be Quick Response Code.Wherein, this pattern identification includes the first random code, this first random code by router when receiving logging request, stochastic generation.This first random code is used for router and verifies the authorization information that the second terminal sends, specifically can see step 205.
In a kind of possible implementation, when the second fixed time of arrival, the first random code is set to inefficacy, this second fixed time is the time point apart from the first random code rise time preset duration.Wherein, preset duration can be arranged by router default, also can by user's self-defined setting according to the actual requirements.
In above-mentioned possible implementation, after router generates the first random code, may within longer a period of time, the authorization information that this first random code is not used to the second terminal sends is verified, then can think that this first random code may have value no longer, such as, user have sent logging request by first terminal A and first terminal B respectively to router, in the router, upon receiving the registration request, generate first random code 12345 corresponding with first terminal A respectively, and first random code 25634 corresponding with first terminal B, but, if user finally only wants to log in router by first terminal A, the first then corresponding with first terminal A random code 12345 may be used to verify, and first random code 25634 corresponding with first terminal B can not be used to verify again.In the implementation that another kind is possible, the first random code has been used to checking.For the above-mentioned two kinds of possibility implementations provided, then can think that this first random code lost efficacy.Therefore, when generation the first random code, router obtains the rise time, and when after preset duration, when namely arriving for the second fixed time, this first random code is set to inefficacy by router.So, by arranging the valid expiration date of the first random code, the fail safe of router can be improved.
Such as, if the rise time of the first random code is 12 points, preset duration is 30 minutes, then in arrival 12: 30 timesharing, it is invalid that the first random code is set to by router.
In step 204, receive the authorization information that the second terminal sends, this authorization information carries end message and second random code of the second terminal.
The first random code provided in above-described embodiment and the second random code are only for distinguishing the random code that distinct device receives or sends, such as, first random code is the random code that router generates, and the second random code is the random code that the second terminal sends, that is to say, this second random code can be identical with the first random code, also can be different, under identical circumstances, the certain random code obtained for the pattern identification provided by scanning first terminal illustrating that this second terminal sends, and in different situations, illustrate that the second terminal sends different from the random code that first terminal provides, likely steal the situations such as chain.
Wherein, the second random code is carried out scanning by the second terminal to pattern identification shown on first terminal and is obtained, and such as, if this pattern identification is Quick Response Code, then the second random code carries out scanning acquisition by the second terminal to this Quick Response Code.At least carry the second random code in this authorization information, whether this second random code is used for router verification and mates with the first random code.
The end message of self and random code are generated authorization information, and this authorization information are sent to this router after getting random code by scanning patter mark by the second terminal, and correspondingly, router receives the authorization information that the second terminal sends.
In a kind of possible implementation, if set up binding relationship by server between the second terminal and router, the authorization information then receiving the second terminal transmission can also comprise: this authorization information also carries the mark of router, and the mark of this router is used for unique identification router.After second terminal obtains this authorization information, this authorization information is sent to server, wherein, the end message of the second terminal, the mark of router and the second random code is carried in this authorization information, wherein, the end message of the second terminal is for representing that whom this authorization information sent by, and whom the mark of router will send to for identifying this authorization information.After server receives this authorization information, according to the end message of the second terminal and the mark of router, judge whether there is binding relationship between the second terminal and router, if determine that there is binding relationship, then will be forwarded in router to authorization information, correspondingly, router receives the authorization information forwarded from server.Otherwise if determine not have binding relationship, this authorization information is not transmitted to router by server.
In step 205, when according to the end message of the second terminal and the binding relationship that stored, determine to possess binding relationship between the second terminal and router, and when the first random code and the second random code match, generate authorization token.
As described above, the binding relationship between the second terminal and router is prestored in router, router receives the authorization information that the second terminal sends, the end message carried according to this authorization information and this binding relationship, determine, between the second terminal and router, there is binding relationship, then think that received authorization information is the terminal transmission this router to administration authority, can authorize.
Particularly, router obtains the second random code from authorization information, judges whether this first random code and the second random code match, and when determining coupling, generates authorization token.Otherwise, do not generate authorization token.This authorization token is used to indicate router and allows first terminal to log in, and such as, authorization token can be token token.It is wherein, above-mentioned that to judge whether this first random code and the second random code match can be judge that whether the first random code is identical with the second random code.
In a kind of possible implementation, when the first fixed time of arrival, authorization token is set to inefficacy, this first fixed time is the time point apart from authorization token rise time preset duration.
In the process of practical application, if first terminal exits the login of router, then after a period of time has passed, if this authorization token is effective all the time, other user still can utilize this first terminal to log in this router, so, cannot ensure the fail safe of router.For this reason, when authorization token generates, router obtains the rise time, and after preset duration, namely arrives for the first fixed time, and this authorization token is set to inefficacy, and also, first terminal can not log in router by this authorization token again.If first terminal is wanted to log in router, need, again by the second terminal, to verify authorization information.So, the fail safe of router can be ensured.
In a kind of possible implementation, as described above, if the authorization information that router reception server sends, then when determining the first random code and the second random code matches, authorization token is generated.
In step 206, authorization token is sent to first terminal, this authorization token is used for first terminal routers and logs in.
After router generates authorization token, this authorization token is sent to first terminal, and so, first terminal is namely by this authorization token, and routers logs in.
In fact, when router is after first terminal generates authorization token, the logging status of first terminal directly can be converted to and log in.And after authorization token is sent to first terminal, first terminal can when at every turn to router sending controling instruction, all carry this authorization token, to make router when receiving the control command of carrying authorization token, respond the control command of this first terminal, this control command can comprise the modify instruction of routers setting, the switching command etc. of routers current operating conditions, and the disclosure is not specifically limited this.
In a kind of possible implementation, when first terminal receives authorization token, automatic routers logs in.In the implementation that another kind is possible, when first terminal receives authorization token, eject in current display interface and select dialog box, the option whether determining to log in router is provided in this selection dialog box, when first terminal detects that user triggers the option determining to log in router, this router is logged in.
The method that disclosure embodiment provides, router is by receiving the authorization information sent with second terminal self with binding relationship, when the second random code that authorization information is carried is identical with the first random code that self generates, generate authorization token, and be that the first terminal sending logging request sends this authorization token, first terminal can be logged in by this authorization token routers.So, when user forgets Password, authorization information is sent to this router by second terminal of binding with router, make router based on the binding relationship with the second terminal, for the current first terminal wanting to log in generates authorization token, make first terminal that this authorization token can be utilized to log in, thus avoid needing to obtain factory default by the mode of factory reset password is set, ensure that the integrality of history setting data when logging in router.
Following is disclosure device embodiment, may be used for performing disclosure embodiment of the method.For the details do not disclosed in disclosure device embodiment, please refer to disclosure embodiment of the method.
Fig. 3 is a kind of device block diagram logging in router according to an exemplary embodiment, and the device of this login router can pass through software, hardware or both combinations and realize.The device of this login router can comprise:
Generation module 310, for when receiving the logging request that first terminal sends, generates pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receiver module 320, for receiving the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
Described generation module 310, for when according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and when described first random code and described second random code match, generate authorization token;
Sending module 330, for described authorization token is sent to described first terminal, described authorization token is used for described first terminal and logs in described router.
The device that disclosure embodiment provides, router is by receiving the authorization information sent with second terminal self with binding relationship, when the second random code that authorization information is carried is identical with the first random code that self generates, generate authorization token, and be that the first terminal sending logging request sends this authorization token, first terminal can be logged in by this authorization token routers.So, when user forgets Password, authorization information is sent to this router by second terminal of binding with router, make router based on the binding relationship with the second terminal, for the current first terminal wanting to log in generates authorization token, make first terminal that this authorization token can be utilized to log in, thus avoid needing to obtain factory default by the mode of factory reset password is set, ensure that the integrality of history setting data when logging in router.
Based on the above-mentioned device provided, please refer to Fig. 4, in a kind of possible implementation, described receiver module 320 is also for receiving the bind request of described second terminal, and described bind request carries the end message of described second terminal;
Described device also comprises:
Set up module 340, for the end message according to described second terminal, set up the binding relationship between described second terminal and described router.
In the implementation that another kind is possible, described device also comprises:
Configuration module 350, for when the first fixed time of arrival, described authorization token is set to inefficacy, and described first fixed time is the time point apart from described authorization token rise time preset duration.
In the implementation that another kind is possible, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and is obtained.
In the implementation that another kind is possible, described configuration module 350 is also for when the second fixed time of arrival, and described first random code is set to inefficacy, and described second fixed time is the time point apart from described first random code rise time preset duration.
It should be noted is that, above-described embodiment provides the device logging in router when realizing the method logging in router, only be illustrated with the division of each functional module above-mentioned, in practical application, can distribute according to actual needs and by above-mentioned functions and be completed by different functional modules, content structure by equipment is divided into different functional modules, to complete all or part of function described above.In addition, about the device in above-described embodiment, wherein the concrete mode of modules executable operations has been described in detail in about the embodiment of the method, will not elaborate explanation herein.
Fig. 5 is a kind of block diagram logging in the device 500 of router according to an exemplary embodiment.Such as, device 500 may be provided in a router.With reference to Fig. 5, device 500 comprises processing components 522, and it comprises one or more processor further, and the memory resource representated by memory 532, such as, for storing the instruction that can be performed by processing unit 522, application program.The application program stored in memory 532 can comprise each module corresponding to one group of instruction one or more.In addition, processing components 522 is configured to perform instruction, to perform the method for above-mentioned Fig. 1 or the login router provided embodiment illustrated in fig. 2.
Device 500 can also comprise the power management that a power supply module 526 is configured to final controlling element 500, and a wired or wireless network interface 550 is configured to device 500 to be connected to network, and input and output (I/O) interface 558.Device 500 can operate the operating system based on being stored in memory 532, such as WindowsServer tM, MacOSX tM, Unix tM, Linux tM, FreeBSD tMor it is similar.
Those skilled in the art, at consideration specification and after putting into practice invention disclosed herein, will easily expect other embodiment of the present disclosure.The application is intended to contain any modification of the present disclosure, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present disclosure and comprised the undocumented common practise in the art of the disclosure or conventional techniques means.Specification and embodiment are only regarded as exemplary, and true scope of the present disclosure and spirit are pointed out by claim below.
Should be understood that, the disclosure is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendment and change not departing from its scope.The scope of the present disclosure is only limited by appended claim.

Claims (11)

1. log in a method for router, it is characterized in that, described method comprises:
When receiving the logging request that first terminal sends, generate pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receive the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
When according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and when described first random code and described second random code match, generate authorization token;
Described authorization token is sent to described first terminal, and described authorization token is used for described first terminal and logs in described router.
2. method according to claim 1, is characterized in that, before the authorization information that described reception second terminal sends, described method also comprises:
Receive the bind request of described second terminal, described bind request carries the end message of described second terminal;
According to the end message of described second terminal, set up the binding relationship between described second terminal and described router.
3. method according to claim 1, is characterized in that, after described generation authorization token, described method also comprises:
When the first fixed time of arrival, described authorization token is set to inefficacy, described first fixed time is the time point apart from described authorization token rise time preset duration.
4. method according to claim 1, is characterized in that, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and obtained.
5. method according to claim 1, is characterized in that, described method also comprises:
When the second fixed time of arrival, described first random code is set to inefficacy, described second fixed time is the time point apart from described first random code rise time preset duration.
6. log in a device for router, it is characterized in that, described device comprises:
Generation module, for when receiving the logging request that first terminal sends, generates pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receiver module, for receiving the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
Described generation module is also for when according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and described first random code and described second random code are when matching, generate authorization token;
Sending module, for described authorization token is sent to described first terminal, described authorization token is used for described first terminal and logs in described router.
7. device according to claim 6, is characterized in that, described receiver module is also for receiving the bind request of described second terminal, and described bind request carries the end message of described second terminal;
Described device also comprises:
Set up module, for the end message according to described second terminal, set up the binding relationship between described second terminal and described router.
8. device according to claim 6, is characterized in that, described device also comprises:
Configuration module, for when the first fixed time of arrival, described authorization token is set to inefficacy, and described first fixed time is the time point apart from described authorization token rise time preset duration.
9. device according to claim 6, is characterized in that, described second random code is carried out scanning by described second terminal to pattern identification shown on described first terminal and obtained.
10. device according to claim 6, it is characterized in that, described configuration module is also for when the second fixed time of arrival, and described first random code is set to inefficacy, and described second fixed time is the time point apart from described first random code rise time preset duration.
11. 1 kinds of devices logging in router, is characterized in that, comprising:
Processor;
For storing the memory of the executable instruction of described processor;
Wherein, described processor is used for:
When receiving the logging request that first terminal sends, generate pattern identification, the first random code that described pattern identification generates in this logs in for providing router;
Receive the authorization information that the second terminal sends, described authorization information carries end message and second random code of described second terminal;
When according to the end message of described second terminal and the binding relationship that stored, determine to possess binding relationship between described second terminal and described router, and when described first random code and described second random code match, generate authorization token;
Described authorization token is sent to described first terminal, and described authorization token is used for described first terminal and logs in described router.
CN201610066596.4A 2016-01-29 2016-01-29 Log in the method and device of router Active CN105553675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610066596.4A CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610066596.4A CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Publications (2)

Publication Number Publication Date
CN105553675A true CN105553675A (en) 2016-05-04
CN105553675B CN105553675B (en) 2019-05-10

Family

ID=55832618

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610066596.4A Active CN105553675B (en) 2016-01-29 2016-01-29 Log in the method and device of router

Country Status (1)

Country Link
CN (1) CN105553675B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391572A (en) * 2015-10-15 2016-03-09 上海寰创通信科技股份有限公司 Method for restoring factory configuration of equipment
CN106878002A (en) * 2016-07-05 2017-06-20 阿里巴巴集团控股有限公司 A kind of authority cancelling method and device
CN111935173A (en) * 2020-08-25 2020-11-13 南方电网科学研究院有限责任公司 Router login verification method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955174A (en) * 2014-03-25 2015-09-30 上海宽带技术及应用工程研究中心 Intelligent router and login method thereof
WO2015154488A1 (en) * 2014-09-09 2015-10-15 中兴通讯股份有限公司 Method and device for accessing router
CN105141537A (en) * 2015-10-16 2015-12-09 上海斐讯数据通信技术有限公司 Method of processing router login request by terminal and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955174A (en) * 2014-03-25 2015-09-30 上海宽带技术及应用工程研究中心 Intelligent router and login method thereof
WO2015154488A1 (en) * 2014-09-09 2015-10-15 中兴通讯股份有限公司 Method and device for accessing router
CN105141537A (en) * 2015-10-16 2015-12-09 上海斐讯数据通信技术有限公司 Method of processing router login request by terminal and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
不详: ""如何在手机和ipad上同时登入微信 微信同时登录IPAD教程"", 《跑跑车手机网》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105391572A (en) * 2015-10-15 2016-03-09 上海寰创通信科技股份有限公司 Method for restoring factory configuration of equipment
CN106878002A (en) * 2016-07-05 2017-06-20 阿里巴巴集团控股有限公司 A kind of authority cancelling method and device
WO2018006715A1 (en) * 2016-07-05 2018-01-11 阿里巴巴集团控股有限公司 Authority revoking method and device
TWI690819B (en) * 2016-07-05 2020-04-11 香港商阿里巴巴集團服務有限公司 Authority revocation method and device
CN106878002B (en) * 2016-07-05 2020-04-24 阿里巴巴集团控股有限公司 Permission revocation method and device
US11017065B2 (en) 2016-07-05 2021-05-25 Advanced New Technologies Co., Ltd. Authority revoking method and device
US11017063B2 (en) 2016-07-05 2021-05-25 Advanced New Technologies Co., Ltd. Authority revoking method and device
US11397797B2 (en) 2016-07-05 2022-07-26 Advanced New Technologies Co., Ltd. Authority revoking method and device
CN111935173A (en) * 2020-08-25 2020-11-13 南方电网科学研究院有限责任公司 Router login verification method and device

Also Published As

Publication number Publication date
CN105553675B (en) 2019-05-10

Similar Documents

Publication Publication Date Title
CN108881232B (en) Sign-on access method, apparatus, storage medium and the processor of operation system
US9596501B2 (en) Remote control processing method, device and system
CN110798471B (en) Air conditioner management method and related device
CN104601590A (en) Login method, server and mobile terminal
CN109121136A (en) Network insertion, terminal connection and verification method and terminal, gateway and system
CN101217367B (en) An operation right judgment system and method realized by introducing right judgment client end
US9548975B2 (en) Authentication method, authentication system, and service delivery server
CN104052775B (en) Right management method, device and the system of a kind of cloud platform service
CN105099985A (en) Login method and device of multiple applications
CN104980298A (en) Abnormity prompting method, device and system
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
CN105429979A (en) Cross-platform user certificating method and intelligent router, Internet surfing system
CN114189863B (en) Binding method and device of intelligent door lock, storage medium and electronic device
CN105722072A (en) Business authorization method, device, system and router
CN105553675A (en) Method and apparatus for logging in router
CN105488875A (en) Access control verification method and device
CN104796408A (en) Single-point live login method and single-point live login device
JP2009277024A (en) Connection control method, communication system and terminal
US20200187187A1 (en) Method for deactivating control channels and communication system for the communication of a user with groups of target devices
KR102062063B1 (en) System of collecting manufacturing facilities data and controlling the manufacturing facilities using iot communication with smart phone
CN111815332A (en) Equipment activation method, device and system
CN113422712B (en) Network distribution method, network distribution device, household equipment and computer readable storage medium
CN111918268B (en) Control method and device of intelligent equipment, electronic equipment and storage medium
CN110430572A (en) The communication means and its communication system of a kind of eUICC card, eUICC card and management platform
CN114338132B (en) Secret-free login method, client application, operator server and electronic equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant