WO2016062002A1 - 连接管理方法及装置、电子设备 - Google Patents

连接管理方法及装置、电子设备 Download PDF

Info

Publication number
WO2016062002A1
WO2016062002A1 PCT/CN2015/074944 CN2015074944W WO2016062002A1 WO 2016062002 A1 WO2016062002 A1 WO 2016062002A1 CN 2015074944 W CN2015074944 W CN 2015074944W WO 2016062002 A1 WO2016062002 A1 WO 2016062002A1
Authority
WO
WIPO (PCT)
Prior art keywords
preset
authentication
blacklist
risk
connection
Prior art date
Application number
PCT/CN2015/074944
Other languages
English (en)
French (fr)
Inventor
陈勇
黄秋志
董玉泉
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to JP2016554797A priority Critical patent/JP6386069B2/ja
Priority to RU2015123452A priority patent/RU2622876C2/ru
Priority to KR1020157013323A priority patent/KR101673238B1/ko
Priority to MX2015006487A priority patent/MX351455B/es
Priority to BR112015015259A priority patent/BR112015015259A2/pt
Priority to US14/806,889 priority patent/US9913315B2/en
Publication of WO2016062002A1 publication Critical patent/WO2016062002A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Definitions

  • the present invention relates to the field of communications technologies, and in particular, to a connection management method and apparatus, and an electronic device.
  • WIFI Wireless Fidelity
  • the network user uses the WIFI network normally, it may cause the occupation of wireless resources, so that the network resources available to each device are reduced, affecting the original user experience; however, since all devices need to access the same wireless router Therefore, the users of the network may also illegally access the devices in the WIFI network, and even cause problems such as privacy leakage of the original user and account security risks.
  • the related art proposes to authenticate the device requesting access to the WIFI network, that is, the user of the network needs to input the correct access password; however, by making a limited number of attempts to access the password, the network user can easily access the network.
  • the password is cracked, which cannot effectively prevent unauthorized access and access by users of the network.
  • the present disclosure provides a connection management method and apparatus, and an electronic device, to solve the technical problem that a wireless network in the related art is easily smashed.
  • connection management method including:
  • the preset risk processing operation is performed.
  • it also includes:
  • the connection establishment request is ignored, otherwise the wireless connection operation with the device is performed.
  • the performing the preset risk processing operation includes:
  • the performing the preset risk processing operation includes:
  • the performing the preset risk processing operation further includes:
  • the authentication operation of the device is suspended, or the authentication result of the device is set as the authentication failure.
  • a connection management apparatus including:
  • a statistical unit configured to count the number of authentication failures of the device within a preset time period when establishing a wireless connection with the device
  • an execution unit configured to perform a preset risk processing operation when the number of authentication failures is greater than or equal to a preset number of times threshold.
  • it also includes:
  • An obtaining unit configured to acquire identifier information of the device when receiving a connection establishment request sent by the device
  • the processing unit is configured to ignore the connection establishment request if the identifier information exists in a preset blacklist list, and otherwise perform a wireless connection operation with the device.
  • the execution unit includes:
  • a first adding subunit configured to add the identification information to the blacklist.
  • the execution unit includes:
  • An information sending subunit configured to send risk prompt information to a preset management terminal
  • a second adding subunit configured to add the identifier information to the blacklist according to a control instruction returned by the management terminal.
  • the execution unit further includes:
  • An authentication processing sub-unit configured to suspend an authentication operation on the device after the sending the risk prompt information, before receiving the control instruction, or set an authentication result of the device to an authentication failure .
  • an electronic device including:
  • a memory for storing processor executable instructions
  • processor is configured to:
  • the preset risk processing operation is performed.
  • the disclosure can accurately identify the "attempt" behavior of the network user to the authentication password, and perform risk processing operations in time to avoid the network user's cracking of the wireless network. Helps improve the security of your wireless network.
  • FIG. 1 is a flowchart of a connection management method according to an exemplary embodiment.
  • FIG. 2 is a schematic diagram of an application scenario of connection management according to an exemplary embodiment.
  • FIG. 3 is a flowchart of another connection management method according to an exemplary embodiment.
  • FIG. 4 is a schematic diagram of an application scenario of another connection management according to an exemplary embodiment.
  • FIG. 5 is a flowchart of another connection management method according to an exemplary embodiment.
  • FIG. 6 is a schematic diagram of an interface of connection management according to an exemplary embodiment.
  • FIG. 7 is a block diagram of a connection management apparatus according to an exemplary embodiment.
  • FIG. 8 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • FIG. 9 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • FIG. 10 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • FIG. 11 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • FIG. 12 is a schematic structural diagram of an apparatus for connection management according to an exemplary embodiment.
  • FIG. 1 is a flowchart of a connection management method according to an exemplary embodiment. As shown in FIG. 1 , the method is used in a wireless router, and includes the following steps.
  • step 102 when establishing a wireless connection with the device, the number of authentication failures of the device in the preset time period is counted.
  • the wireless router when the device accesses the wireless network established by the wireless router, the wireless router needs to perform identity authentication on the device, for example, it can determine whether the authentication password sent by the user through the device is correct. Therefore, "authentication failure" in the present disclosure may be caused by an incorrect authentication password.
  • the user when a device accesses a certain wireless network for the first time, the user needs to manually input authentication information such as an authentication password. If the authentication succeeds, the device can record the authentication used by the device. Password and used to access the same wireless network in the future. Therefore, in the case that the configuration of the wireless network has not changed, the connected device does not have an authentication failure event due to an incorrect authentication password, and the authentication password may be incorrect on the device that is accessed for the first time. happensing.
  • authentication information such as an authentication password
  • step 104 when the number of authentication failures is greater than or equal to the preset number of times threshold, a preset risk processing operation is performed.
  • the user when the authentication password is manually input by the user, the user may know the correct authentication password, and the user For normal users. However, the authentication may fail due to an input error. At this time, the user will correct the error in time, and the authentication failure will not be excessive. Or, the user may not know the correct authentication password, that is, the user is a network user, and the network user can only access the wireless network through continuous trial, thereby causing multiple authentication failures to be sent in a short time. event. Therefore, by monitoring the number of authentication failures occurring within a preset time period, the user identity can be effectively distinguished, and the risk of the network can be avoided.
  • the risk processing operation may include recording a device that fails multiple authentications into a blacklist, thereby denying the device to join the wireless network.
  • the risk processing operation may include notifying the normal user of the device identification information that has failed multiple authentications, and determining whether to record it to the blacklist by the normal user, or taking other processing methods.
  • the present disclosure can accurately identify the “attempt” behavior of the user password on the authentication password by performing statistics on the number of authentication failures of the device, and perform risk processing operations in time to avoid the user of the network.
  • the cracking of the wireless network helps to improve the security of the wireless network.
  • FIG. 2 is a schematic diagram of an application scenario of connection management according to an exemplary embodiment.
  • a wireless router and a wireless-enabled device such as device 1 are included, and device 1 initiates a connection request to the wireless router to join the wireless network established by the wireless router.
  • FIG. 3 is a flowchart of another connection management method according to an exemplary embodiment, including the following steps.
  • step 302 device 1 initiates a connection setup request to the wireless router.
  • the device 1 may be a notebook computer as shown in FIG. 2, or any other device that supports wireless communication, such as a smart phone, a tablet computer, or the like.
  • connection establishment request is only an overview of the operation of "request to establish a wireless connection”, and is not used to limit the number of interactions and the number of interactions during the operation.
  • step 304 the wireless router acquires the identification information of the device 1.
  • the identification information may be hardware information of the device 1, such as a MAC (Media Access Control) address, or other information used to distinguish and identify different devices.
  • MAC Media Access Control
  • the identifier information may be obtained in the connection establishment request sent by the device 1.
  • the identifier information is the MAC address of the device 1
  • the MAC address is the source MAC address of the packet from the device 1.
  • step 306 the identification information of the device 1 is matched with a preset blacklist.
  • step 308 if the identification information of the device 1 is not found in the blacklist, the wireless connection operation is performed between the out-of-order router and the device 1, otherwise the connection establishment request from the device 1 can be ignored, and the device 1 is rejected. Establish a wireless connection.
  • step 310 in the process of establishing a wireless connection between the wireless router and the device 1, whether the authentication succeeds, for example, whether the authentication password sent by the device 1 is correct; if the authentication fails, the number of authentication failures is counted.
  • step 312 when the number of authentication failures in the preset time period is greater than or equal to the preset number of times threshold, the identification information of the device 1 is added to the blacklist list, thereby solving the problem that the device 1 accesses the wireless router. Wi-Fi In the network.
  • the network user only when the user to which the device 1 belongs is a network user, that is, the user does not know the real authentication password, the network user needs to repeatedly try to guess the authentication password, and thus The multiple authentication failure events in a short period of time are clearly distinguished from the accidental input behaviors that occur by normal users, thereby distinguishing the behavior of the network and the corresponding devices.
  • the length of the preset time period may be set by the manufacturer or set by the user as needed, for example, 3 minutes.
  • the wireless router can automatically identify the network behavior by adding statistics on the authentication failure event in a short period of time, and add the network device to the blacklist to prevent the network device from joining the wireless router. In the wireless network, thus ensuring the normal use and high security of the wireless network.
  • FIG. 4 is a schematic diagram of another application scenario of connection management according to an exemplary embodiment.
  • a wireless router and two wireless-enabled devices such as device 1 and device 2 are included, and device 1 initiates a connection request to the wireless router to join the wireless network established by the wireless router.
  • Device 2 is a pre-configured management terminal.
  • FIG. 5 is a flowchart of another connection management method according to an exemplary embodiment, including the following steps.
  • step 502 device 1 initiates a connection setup request to the wireless router.
  • the device 1 may be a notebook computer as shown in FIG. 4, or any other device that supports wireless communication, such as a smart phone, a tablet computer, or the like.
  • connection establishment request is only an overview of the operation of "request to establish a wireless connection”, and is not used to limit the number of interactions and the number of interactions during the operation.
  • step 504 the wireless router acquires the identification information of the device 1.
  • the identification information may be hardware information of the device 1, such as a MAC address or the like, or other information used to distinguish and identify different devices.
  • the identifier information may be obtained in the connection establishment request sent by the device 1.
  • the identifier information is the MAC address of the device 1
  • the MAC address is the source MAC address of the packet from the device 1.
  • step 506 the identification information of the device 1 is matched with a preset blacklist.
  • step 508 if the identification information of the device 1 is not found in the blacklist, the wireless connection operation is performed between the out-of-order router and the device 1, otherwise the connection establishment request from the device 1 may be ignored, and the device 1 is rejected. Establish a wireless connection.
  • step 510 in the process of establishing a wireless connection between the wireless router and the device 1, whether the authentication succeeds, for example, whether the authentication password sent by the device 1 is correct; if the authentication fails, the number of authentication failures is counted.
  • step 512 when the number of authentication failures is greater than or equal to the preset number of times threshold, the wireless router sends the risk prompt information to the device 2.
  • FIG. 6 shows risk prompt information displayed on the screen interface of the device 2, such as “risk type”, “risk level”, “device information”, etc., for User is currently possible
  • the existing risk situation is analyzed; then, when the user determines that the current device (ie, device 1 shown in FIG. 4) is a network device and wants to prohibit it from joining the current wireless network, it may select "blacklist” or "ignore” "Other processing methods.”
  • the device 2 may be in a wireless network created by a wireless router, and the device 2 and the wireless router may perform information interaction based on the wireless network; as another exemplary embodiment, the device 2 If the device 2 and the wireless router can access the Internet separately and perform information exchange based on the Internet, the user of the device 2 can implement remote control, for example, during the company's work, the management home wireless network.
  • step 514 the wireless router receives a control command from device 2.
  • step 510 and step 514 that is, after the wireless router detects the network risk of the device 1, but has not received the returned control command, in order to prevent the device 1 from completing the wireless router during this period. If the authentication is performed, the authentication operation of the device 1 may be suspended, or the authentication result of the device 1 may be all set to the authentication failure, and the device 1 is prevented from accessing the wireless network.
  • step 516 if the control command returned by the device 2 corresponds to "join blacklist", the wireless router adds the identification information of the device 1 to the blacklist list; or if the control command returned by the device 2 corresponds to " Ignore, the wireless router can resume normal authentication operation on device 1.
  • the wireless router can automatically identify the behavior of the authentication network by using the statistics of the authentication failure event in a short period of time, and combine the simple interaction operation of the user to determine whether to add the “suspected network device” to the blacklist. In order to avoid the misjudgment of normal equipment while ensuring the normal use and high security of the wireless network.
  • the user can log in to the wireless router to cancel the recording of any device in the blacklist. Restore the misunderstood "network device" to "normal device”.
  • the present disclosure also provides an embodiment of the connection management apparatus.
  • FIG. 7 is a block diagram of a connection management apparatus according to an exemplary embodiment.
  • the apparatus includes a statistics unit 71 and an execution unit 72.
  • the statistics unit 71 is configured to count the number of authentication failures of the device within a preset time period when establishing a wireless connection with the device;
  • the executing unit 72 is configured to perform a preset risk processing operation when the number of authentication failures is greater than or equal to a preset number of times threshold.
  • the "attempt" behavior of the authentication password can be accurately identified by the user of the network, and the risk processing operation is performed in time to avoid the user of the network to the wireless network.
  • the crack helps to improve the security of the wireless network.
  • FIG. 8 is a block diagram of another connection management apparatus according to an exemplary embodiment, which is implemented.
  • the apparatus may further include: an obtaining unit 73 and a processing unit 74.
  • the obtaining unit 73 is configured to acquire the identifier information of the device when receiving the connection establishment request sent by the device;
  • the processing unit 74 is configured to ignore the connection establishment request if the identification information exists in a preset blacklist list, and otherwise perform a wireless connection operation with the device.
  • FIG. 9 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • the implementation unit 72 may include: first adding, based on the foregoing embodiment shown in FIG. Subunit 721.
  • the first adding subunit 721 is configured to add the identifier information to the blacklist.
  • FIG. 10 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • the implementation unit 72 may include: an information transmitter. Unit 722 and second add subunit 723.
  • the information sending subunit 722 is configured to send risk prompt information to the preset management terminal.
  • the second adding subunit 723 is configured to add the identification information to the blacklist according to a control instruction returned by the management terminal.
  • FIG. 11 is a block diagram of another connection management apparatus according to an exemplary embodiment.
  • the implementation unit 72 may further include: authentication on the basis of the foregoing embodiment shown in FIG. Processing subunit 724.
  • the authentication processing sub-unit 724 is configured to suspend the authentication operation of the device after the risk prompt information is sent, before receiving the control instruction, or set the authentication result of the device. Failure for authentication.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
  • connection management apparatus comprising: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to: when the wireless connection is established with the device, the device is counted The number of authentication failures in the preset time period; when the number of authentication failures is greater than or equal to the preset number of times threshold, the preset risk processing operation is performed.
  • the present disclosure also provides a terminal, the terminal including a memory, and one or more a program, wherein one or more programs are stored in a memory, and configured to be executed by one or more processors, the one or more programs comprising instructions for: establishing a wireless connection with the device, the statistical office The number of authentication failures of the device in the preset time period; when the number of authentication failures is greater than or equal to the preset number of times threshold, the preset risk processing operation is performed.
  • FIG. 12 is a block diagram of an apparatus 1200 for connection management, according to an exemplary embodiment.
  • device 1200 can be provided as a wireless router or as a smart terminal with wireless routing functionality.
  • apparatus 1200 includes a processing component 1222 that further includes one or more processors, and memory resources represented by memory 1232 for storing instructions executable by processing component 1222, such as an application.
  • An application stored in memory 1232 may include one or more modules each corresponding to a set of instructions.
  • the processing component 1222 is configured to execute instructions to perform the connection management method described above.
  • Apparatus 1200 can also include a power supply component 1226 configured to perform power management of apparatus 1200, a wired or wireless network interface 1250 configured to connect apparatus 1200 to the network, and an input/output (I/O) interface 1258.
  • Device 1200 can operate based on an operating system stored in memory 1232, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Transmitters (AREA)
  • Computer And Data Communications (AREA)

Abstract

本公开是关于连接管理方法及装置、电子设备,包括:与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。通过本公开的技术方案,可以识别出蹭网行为并予以及时处理,以规避蹭网风险。

Description

连接管理方法及装置、电子设备
本申请基于申请号为201410559632.1、申请日为2014/10/20的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本发明涉及通信技术领域,尤其涉及连接管理方法及装置、电子设备。
背景技术
随着网络技术的发展,越来越多的电子设备都具备无线连接功能,则通过加入无线路由器建立的WIFI(无线保真)网络,即可实现互联网访问以及设备之间的访问和控制。虽然无线连接技术给用户带来了使用上的便捷,但部分用户希望通过接入其他用户建立的WIFI网络,以避免产生WIFI网络的建立和维持所需的费用,即“蹭网”行为。
如果蹭网用户正常使用WIFI网络,可能会造成对无线资源的占用,使得每台设备可使用的网络资源降低、影响原始用户的使用体验;然而,由于所有的设备都需要接入同一台无线路由器,因而蹭网用户还可能对WIFI网络内的设备进行非法访问,甚至造成原始用户的隐私泄露、账户安全风险等问题。
为此,相关技术中提出了对请求接入WIFI网络的设备进行鉴权,即需要蹭网用户输入正确的访问密码;然而,通过对访问密码进行有限次数的尝试,蹭网用户很容易对访问密码实现破解,从而无法有效阻止蹭网用户的非法接入和访问。
发明内容
本公开提供连接管理方法及装置、电子设备,以解决相关技术中的无线网络容易被蹭网的技术问题。
根据本公开实施例的第一方面,提供一种连接管理方法,包括:
与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
可选的,还包括:
当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;
若所述标识信息存在于预设的黑名单列表中,则忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
可选的,所述执行预设的风险处理操作,包括:
将所述标识信息添加至所述黑名单中。
可选的,所述执行预设的风险处理操作,包括:
向预设的管理终端发送风险提示信息;
根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
可选的,所述执行预设的风险处理操作,还包括:
在发送所述风险提示信息之后、接收到所述控制指令之前,暂停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
根据本公开实施例的第二方面,提供一种连接管理装置,包括:
统计单元,用于与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
执行单元,用于当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
可选的,还包括:
获取单元,用于当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;
处理单元,用于在所述标识信息存在于预设的黑名单列表的情况下,忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
可选的,所述执行单元包括:
第一添加子单元,用于将所述标识信息添加至所述黑名单中。
可选的,所述执行单元包括:
信息发送子单元,用于向预设的管理终端发送风险提示信息;
第二添加子单元,用于根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
可选的,所述执行单元还包括:
鉴权处理子单元,用于在发送所述风险提示信息之后、接收到所述控制指令之前,暂停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
根据本公开实施例的第三方面,提供一种电子设备,包括:
处理器;
用于存储处理器可执行指令的存储器;
其中,所述处理器被配置为:
与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
本公开的实施例提供的技术方案可以包括以下有益效果:
本公开通过对设备的鉴权失败次数进行统计,可以准确识别出蹭网用户对鉴权密码的“尝试”行为,并通过及时执行风险处理操作,以避免蹭网用户对无线网络的破解,有助于提升无线网络的安全性。
应当理解的是,以上的一般描述和后文的细节描述仅是示例性和解释性的,并不能限制本公开。
附图说明
此处的附图被并入说明书中并构成本说明书的一部分,示出了符合本发明的实施例,并与说明书一起用于解释本发明的原理。
图1是根据一示例性实施例示出的一种连接管理方法的流程图。
图2是根据一示例性实施例示出的一种连接管理的应用场景示意图。
图3是根据一示例性实施例示出的另一种连接管理方法的流程图。
图4是根据一示例性实施例示出的另一种连接管理的应用场景示意图。
图5是根据一示例性实施例示出的另一种连接管理方法的流程图。
图6是根据一示例性实施例示出的一种连接管理的界面示意图。
图7是根据一示例性实施例示出的一种连接管理装置的框图。
图8是根据一示例性实施例示出的另一种连接管理装置的框图。
图9是根据一示例性实施例示出的另一种连接管理装置的框图。
图10是根据一示例性实施例示出的另一种连接管理装置的框图。
图11是根据一示例性实施例示出的另一种连接管理装置的框图。
图12是根据一示例性实施例示出的一种用于连接管理的装置的结构示意图。
具体实施方式
这里将详细地对示例性实施例进行说明,其示例表示在附图中。下面的描述涉及附图时,除非另有表示,不同附图中的相同数字表示相同或相似的要素。以下示例性实施例中所描述的实施方式并不代表与本发明相一致的所有实施方式。相反,它们仅是与如所附权利要求书中所详述的、本发明的一些方面相一致的装置和方法的例子。
图1是根据一示例性实施例示出的一种连接管理方法的流程图,如图1所示,该方法用于无线路由器中,包括以下步骤。
在步骤102中,与设备建立无线连接时,统计设备在预设时间段内的鉴权失败次数。
在本实施例中,设备在接入无线路由器建立的无线网络时,无线路由器需要对该设备进行身份鉴权,例如可以判断用户通过该设备发送的鉴权密码是否正确。因此,本公开中的“鉴权失败”可以由鉴权密码不正确所导致。
在本实施例中,当一台设备首次接入某个无线网络时,用户需要手动输入鉴权密码等鉴权信息;其中,如果鉴权成功,则设备可以通过记录下本次使用的鉴权密码,并用于以后接入相同的无线网络。因此,在无线网络的配置未发生改变的情况下,已连接过的设备不会由于鉴权密码不正确而出现鉴权失败事件,而可能在首次接入的设备上出现鉴权密码不正确的情况。
在步骤104中,当鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
在本实施例中,鉴权密码由用户手动输入时,用户可能知道正确的鉴权密码,该用户 为正常用户。但可能由于输入错误而导致鉴权失败,此时该用户必然会及时纠正错误,不会导致鉴权失败次数过多。或者,用户可能并不知道正确的鉴权密码,即该用户为蹭网用户,则该蹭网用户只能够通过不断尝试的方式来接入无线网络,从而导致在短时间发送多次鉴权失败事件。所以,通过监测预设时间段内发生的鉴权失败次数,即可有效区分用户身份,规避蹭网风险。
在本实施例中,作为一示例性实施方式,风险处理操作可以包括将多次鉴权失败的设备记录至黑名单中,从而拒绝该设备加入无线网络中。作为另一示例性实施方式,风险处理操作可以包括将多次鉴权失败的设备标识信息告知正常用户,并由正常用户决定是否将其记录至黑名单中,或采取其他处理方式。
由上述实施例可知,本公开通过对设备的鉴权失败次数进行统计,可以准确识别出蹭网用户对鉴权密码的“尝试”行为,并通过及时执行风险处理操作,以避免蹭网用户对无线网络的破解,有助于提升无线网络的安全性。
请参考图2,图2是根据一示例性实施例示出的一种连接管理的应用场景示意图。在图2所示的应用场景中,包括一无线路由器和一支持无线功能的设备,比如设备1,且设备1向无线路由器发起连接请求,以期加入无线路由器建立的无线网络中。对应于图2所示的应用场景,图3是根据一示例性实施例示出的另一种连接管理方法的流程图,包括以下步骤。
在步骤302中,设备1向无线路由器发起连接建立请求。
在本实施例中,设备1可以为图2所示的笔记本电脑,或者其他支持无线通信的任意设备,比如智能手机、平板电脑等。
在本实施例中,“连接建立请求”只是对“请求建立无线连接”这一操作的概述,而并不用于限制该操作过程中交互的报文名称及交互次数。
在步骤304中,无线路由器获取设备1的标识信息。
在本实施例中,标识信息可以设备1的硬件信息,比如MAC(Media Access Control,媒介访问控制)地址等,或者其他用于区分和识别不同设备的信息。
在本实施例中,可以在设备1发送的连接建立请求中,获取上述标识信息,比如当标识信息为设备1的MAC地址时,该MAC地址即来自设备1的报文的源MAC地址。
在步骤306中,将设备1的标识信息与预设的黑名单列表进行匹配。
在步骤308中,如果在黑名单列表中未查找到设备1的标识信息,则由无序路由器与设备1之间执行无线连接操作,否则可以忽略来自设备1的连接建立请求,拒绝与设备1建立无线连接。
在步骤310中,获取无线路由器与设备1之间建立无线连接的过程中,是否鉴权成功,比如设备1发送的鉴权密码是否正确;如果鉴权失败,则对鉴权失败次数进行统计。
在步骤312中,当预设时间段内的鉴权失败次数大于或等于预设次数阈值时,将设备1的标识信息添加至上述的黑名单列表中,从而解决设备1接入无线路由器创建的无线网 络中。
在本实施例中,只有当设备1所属用户为蹭网用户时,即该用户并不知道真正的鉴权密码,该蹭网用户需要通过反复尝试的方式,以期猜测出鉴权密码,因而会导致短时间内的多次鉴权失败事件,明显区分于正常用户偶然出现的误输入行为,从而区分出蹭网行为以及相应的设备。
在本实施例中,预设时间段的长度可以由厂商默认,或者由用户根据需要进行设置,比如3分钟。
在上述实施例中,无线路由器通过对短时间内的鉴权失败事件的统计,可以自动识别出蹭网行为,并将蹭网设备添加至黑名单中,以禁止该蹭网设备加入无线路由器创建的无线网络中,从而确保无线网络的正常使用和高安全性。
请参考图4,图4是根据一示例性实施例示出的另一种连接管理的应用场景示意图。在图4所示的应用场景中,包括一无线路由器和两台支持无线功能的设备,比如设备1和设备2,且设备1向无线路由器发起连接请求,以期加入无线路由器建立的无线网络中,而设备2是预先配置的管理终端。对应于图4所示的应用场景,图5是根据一示例性实施例示出的另一种连接管理方法的流程图,包括以下步骤。
在步骤502中,设备1向无线路由器发起连接建立请求。
在本实施例中,设备1可以为图4所示的笔记本电脑,或者其他支持无线通信的任意设备,比如智能手机、平板电脑等。
在本实施例中,“连接建立请求”只是对“请求建立无线连接”这一操作的概述,而并不用于限制该操作过程中交互的报文名称及交互次数。
在步骤504中,无线路由器获取设备1的标识信息。
在本实施例中,标识信息可以设备1的硬件信息,比如MAC地址等,或者其他用于区分和识别不同设备的信息。
在本实施例中,可以在设备1发送的连接建立请求中,获取上述标识信息;比如当标识信息为设备1的MAC地址时,该MAC地址即来自设备1的报文的源MAC地址。
在步骤506中,将设备1的标识信息与预设的黑名单列表进行匹配。
在步骤508中,如果在黑名单列表中未查找到设备1的标识信息,则由无序路由器与设备1之间执行无线连接操作,否则可以忽略来自设备1的连接建立请求,拒绝与设备1建立无线连接。
在步骤510中,获取无线路由器与设备1之间建立无线连接的过程中,是否鉴权成功,比如设备1发送的鉴权密码是否正确;如果鉴权失败,则对鉴权失败次数进行统计。
在步骤512中,当鉴权失败次数大于或等于预设次数阈值时,无线路由器向设备2发送风险提示信息。
在本实施例中,作为一示例性实施方式,图6示出了设备2的屏幕界面上显示出的风险提示信息,比如“风险类型”、“风险等级”、“设备信息”等,以供用户对当前可能 存在的风险状况进行分析;然后,在用户确定当前设备(即图4所示的设备1)为蹭网设备并且希望禁止其加入当前无线网络时,可以选择“加入黑名单”,或者选择“忽略”等处理方式。
在本实施例中,作为一示例性实施方式,设备2可以处于无线路由器创建的无线网络内,则设备2与无线路由器可以基于该无线网络进行信息交互;作为另一示例性实施方式,设备2可以不处于无线路由器创建的无线网络内,则设备2与无线路由器可以分别接入互联网内,并基于互联网进行信息交互,则设备2所属用户可以实现远程控制,比如在公司上班期间,管理家中的无线网络。
在步骤514中,无线路由器接收来自设备2的控制指令。
在本实施例中,在步骤510与步骤514之间,即无线路由器检测出设备1的蹭网风险之后、但尚未接收到返回的控制指令时,为避免设备1在此期间完成对无线路由器的破解,可以暂停对设备1的鉴权操作,或将对设备1的鉴权结果全部设置为鉴权失败,防止设备1接入无线网络中。
在步骤516中,若设备2返回的控制指令对应于“加入黑名单”,则无线路由器将设备1的标识信息添加至上述的黑名单列表中;或者,若设备2返回的控制指令对应于“忽略”,则无线路由器可以恢复对设备1的正常鉴权操作。
在上述实施例中,无线路由器通过对短时间内的鉴权失败事件的统计,可以自动识别出蹭网行为,并结合用户的简单交互操作,确定是否将“疑似蹭网设备”添加至黑名单中,从而在确保无线网络的正常使用和高安全性的同时,避免对正常设备的误判断。
此外,在图3和图5所示的实施例中,对于被添加至黑名单中的设备,若用户认为存在误判断,可以通过登录无线路由器,取消对黑名单中的任意设备的记录,从而将误判断的“蹭网设备”恢复为“正常设备”。
与前述的信息显示方法的实施例相对应,本公开还提供了连接管理装置的实施例。
图7是根据一示例性实施例示出的一种连接管理装置框图。参照图7,该装置包括统计单元71和执行单元72。
其中,统计单元71,被配置为与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
执行单元72,被配置为当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
在上述实施例中,通过对设备的鉴权失败次数进行统计,可以准确识别出蹭网用户对鉴权密码的“尝试”行为,并通过及时执行风险处理操作,以避免蹭网用户对无线网络的破解,有助于提升无线网络的安全性。
如图8所示,图8是根据一示例性实施例示出的另一种连接管理装置的框图,该实施 例在前述图7所示实施例的基础上,该装置还可以包括:获取单元73和处理单元74。
其中,获取单元73,被配置为当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;
处理单元74,被配置为在所述标识信息存在于预设的黑名单列表的情况下,忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
如图9所示,图9是根据一示例性实施例示出的另一种连接管理装置的框图,该实施例在前述图8所示实施例的基础上,执行单元72可以包括:第一添加子单元721。
其中,第一添加子单元721,被配置为将所述标识信息添加至所述黑名单中。
如图10所示,图10是根据一示例性实施例示出的另一种连接管理装置的框图,该实施例在前述图8所示实施例的基础上,执行单元72可以包括:信息发送子单元722和第二添加子单元723。
其中,信息发送子单元722,被配置为向预设的管理终端发送风险提示信息;
第二添加子单元723,被配置为根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
如图11所示,图11是根据一示例性实施例示出的另一种连接管理装置的框图,该实施例在前述图10所示实施例的基础上,执行单元72还可以包括:鉴权处理子单元724。
其中,鉴权处理子单元724,被配置为在发送所述风险提示信息之后、接收到所述控制指令之前,暂停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
关于上述实施例中的装置,其中各个模块执行操作的具体方式已经在有关该方法的实施例中进行了详细描述,此处将不做详细阐述说明。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本公开方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
相应的,本公开还提供一种连接管理装置,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
相应的,本公开还提供一种终端,所述终端包括有存储器,以及一个或者一个以上的 程序,其中一个或者一个以上程序存储于存储器中,且经配置以由一个或者一个以上处理器执行所述一个或者一个以上程序包含用于进行以下操作的指令:与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
图12是根据一示例性实施例示出的一种用于连接管理的装置1200的框图。例如,装置1200可以被提供为一无线路由器或具有无线路由功能的智能终端。参照图12,装置1200包括处理组件1222,其进一步包括一个或多个处理器,以及由存储器1232所代表的存储器资源,用于存储可由处理部件1222的执行的指令,例如应用程序。存储器1232中存储的应用程序可以包括一个或一个以上的每一个对应于一组指令的模块。此外,处理组件1222被配置为执行指令,以执行上述连接管理方法。
装置1200还可以包括一个电源组件1226被配置为执行装置1200的电源管理,一个有线或无线网络接口1250被配置为将装置1200连接到网络,和一个输入输出(I/O)接口1258。装置1200可以操作基于存储在存储器1232的操作***,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM或类似。
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本发明的其它实施方案。本申请旨在涵盖本发明的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本发明的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本发明的真正范围和精神由下面的权利要求指出。
应当理解的是,本发明并不局限于上面已经描述并在附图中示出的精确结构,并且可以在不脱离其范围进行各种修改和改变。本发明的范围仅由所附的权利要求来限制。

Claims (11)

  1. 一种连接管理方法,其特征在于,包括:
    与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
    当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
  2. 根据权利要求1所述的方法,其特征在于,还包括:
    当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;
    若所述标识信息存在于预设的黑名单列表中,则忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
  3. 根据权利要求2所述的方法,其特征在于,所述执行预设的风险处理操作,包括:
    将所述标识信息添加至所述黑名单中。
  4. 根据权利要求1或2所述的方法,其特征在于,所述执行预设的风险处理操作,包括:
    向预设的管理终端发送风险提示信息;
    根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
  5. 根据权利要求4所述的方法,其特征在于,所述执行预设的风险处理操作,还包括:
    在发送所述风险提示信息之后、接收到所述控制指令之前,暂停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
  6. 一种连接管理装置,其特征在于,包括:
    统计单元,用于与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
    执行单元,用于当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
  7. 根据权利要求6所述的装置,其特征在于,还包括:
    获取单元,用于当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;
    处理单元,用于在所述标识信息存在于预设的黑名单列表的情况下,忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
  8. 根据权利要求7所述的装置,其特征在于,所述执行单元包括:
    第一添加子单元,用于将所述标识信息添加至所述黑名单中。
  9. 根据权利要求6或7所述的装置,其特征在于,所述执行单元包括:
    信息发送子单元,用于向预设的管理终端发送风险提示信息;
    第二添加子单元,用于根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
  10. 根据权利要求9所述的装置,其特征在于,所述执行单元还包括:
    鉴权处理子单元,用于在发送所述风险提示信息之后、接收到所述控制指令之前,暂 停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
  11. 一种电子设备,其特征在于,包括:
    处理器;
    用于存储处理器可执行指令的存储器;
    其中,所述处理器被配置为:
    与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;
    当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
PCT/CN2015/074944 2014-10-20 2015-03-24 连接管理方法及装置、电子设备 WO2016062002A1 (zh)

Priority Applications (6)

Application Number Priority Date Filing Date Title
JP2016554797A JP6386069B2 (ja) 2014-10-20 2015-03-24 接続管理方法、装置、電子設備、プログラム、及び記録媒体
RU2015123452A RU2622876C2 (ru) 2014-10-20 2015-03-24 Способ, устройство и электронное устройство для управления соединениями
KR1020157013323A KR101673238B1 (ko) 2014-10-20 2015-03-24 연결 관리 방법, 장치, 전자 기기, 프로그램 및 저장매체
MX2015006487A MX351455B (es) 2014-10-20 2015-03-24 Metodo, aparato y dispositivo electronico para la administracion de conexion.
BR112015015259A BR112015015259A2 (pt) 2014-10-20 2015-03-24 método, aparelhos e dispositivo eletrônico para gerenciamento de conexão
US14/806,889 US9913315B2 (en) 2014-10-20 2015-07-23 Method and device for connection management

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410559632.1 2014-10-20
CN201410559632.1A CN104333863B (zh) 2014-10-20 2014-10-20 连接管理方法及装置、电子设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/806,889 Continuation US9913315B2 (en) 2014-10-20 2015-07-23 Method and device for connection management

Publications (1)

Publication Number Publication Date
WO2016062002A1 true WO2016062002A1 (zh) 2016-04-28

Family

ID=52408495

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/074944 WO2016062002A1 (zh) 2014-10-20 2015-03-24 连接管理方法及装置、电子设备

Country Status (8)

Country Link
EP (1) EP3013086B1 (zh)
JP (1) JP6386069B2 (zh)
KR (1) KR101673238B1 (zh)
CN (1) CN104333863B (zh)
BR (1) BR112015015259A2 (zh)
MX (1) MX351455B (zh)
RU (1) RU2622876C2 (zh)
WO (1) WO2016062002A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905366A (zh) * 2019-01-16 2019-06-18 平安科技(深圳)有限公司 终端设备安全验证方法、装置、可读存储介质及终端设备
CN111429260A (zh) * 2020-03-19 2020-07-17 重庆富民银行股份有限公司 用于风控***的用户体验提升方法及***

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9913315B2 (en) 2014-10-20 2018-03-06 Xiaomi Inc. Method and device for connection management
CN104333863B (zh) * 2014-10-20 2018-11-30 小米科技有限责任公司 连接管理方法及装置、电子设备
CN106686590A (zh) * 2015-11-10 2017-05-17 中兴通讯股份有限公司 管制终端识别及管理方法、装置、无线接入点设备
CN105516093B (zh) * 2015-11-30 2018-10-12 上海斐讯数据通信技术有限公司 一种防蹭网的方法及路由器
CN105871843A (zh) * 2016-03-31 2016-08-17 广州指点网络科技有限公司 智能控制用户连接数量的路由装置及应用方法
CN105959948A (zh) * 2016-04-26 2016-09-21 上海斐讯数据通信技术有限公司 一种无线密钥防暴力破解的方法和装置
CN106102066A (zh) * 2016-08-23 2016-11-09 上海斐讯数据通信技术有限公司 一种无线网络安全认证装置及其方法、一种路由器
CN106412884B (zh) * 2016-11-24 2020-02-04 北京小米移动软件有限公司 Wifi连接的管理方法及装置
CN106412911B (zh) * 2016-11-25 2019-07-30 宇龙计算机通信科技(深圳)有限公司 无线接入点监控方法、装置及电子设备
CN107360574A (zh) * 2017-06-16 2017-11-17 上海斐讯数据通信技术有限公司 一种终端设备管理方法、一种云控制器及一种无线接入点
KR102381758B1 (ko) * 2017-08-22 2022-04-04 현대자동차주식회사 차량의 헤드 유닛, 이를 포함하는 차량 및 차량의 제어 방법
CN107769978A (zh) * 2017-10-30 2018-03-06 上海斐讯数据通信技术有限公司 一种终端设备入网的管理方法、***、路由器及服务器
CN108494728B (zh) * 2018-02-07 2021-01-26 平安普惠企业管理有限公司 防止流量劫持的黑名单库创建方法、装置、设备及介质
CN109548020B (zh) * 2018-12-13 2022-08-12 网宿科技股份有限公司 鉴权失败后的补偿方法及装置、服务器、存储介质
US11616774B2 (en) * 2019-01-17 2023-03-28 Blackberry Limited Methods and systems for detecting unauthorized access by sending a request to one or more peer contacts
CN110213870A (zh) * 2019-06-27 2019-09-06 江苏宜达新材料科技股份有限公司 一种灯光控制方法、装置、计算机设备及存储介质
US11265325B2 (en) * 2019-07-22 2022-03-01 Whitestar Communications, Inc. Systems and methods of salutation protocol to communicate using a private overlay peer to peer network
EP3772842A1 (de) * 2019-08-07 2021-02-10 Siemens Aktiengesellschaft Erkennung von manipulierten clients eines leitsystems
CN110493786B (zh) * 2019-10-15 2020-01-07 北京翼辉信息技术有限公司 一种电子设备智能连接网络的方法、装置及存储介质
CN112333053B (zh) * 2020-06-02 2022-09-02 深圳Tcl新技术有限公司 防蹭网方法、装置、路由设备及存储介质
CN112804254B (zh) * 2021-02-07 2022-10-28 成都薯片科技有限公司 请求检测方法、装置、电子设备及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101226575A (zh) * 2008-01-28 2008-07-23 中兴通讯股份有限公司 应用程序的锁定方法
CN101355556A (zh) * 2007-07-26 2009-01-28 富士施乐株式会社 认证信息处理装置和认证信息处理方法
CN104333863A (zh) * 2014-10-20 2015-02-04 小米科技有限责任公司 连接管理方法及装置、电子设备

Family Cites Families (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020188868A1 (en) * 2001-06-12 2002-12-12 Budka Kenneth C. Method for protecting use of resources in a network
US7082117B2 (en) * 2002-08-12 2006-07-25 Harris Corporation Mobile ad-hoc network with intrusion detection features and related methods
US7783019B2 (en) * 2003-05-15 2010-08-24 Verizon Business Global Llc Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds
US7643442B1 (en) * 2003-06-30 2010-01-05 Cisco Systems, Inc. Dynamic QoS configuration based on transparent processing of session initiation messages
US8713626B2 (en) * 2003-10-16 2014-04-29 Cisco Technology, Inc. Network client validation of network management frames
JP2005184639A (ja) * 2003-12-22 2005-07-07 Fujitsu Ltd 接続管理システム、接続管理装置及び接続管理方法
KR100527634B1 (ko) * 2003-12-24 2005-11-09 삼성전자주식회사 휴대 인터넷 시스템에서 인증 및 인증 실패에 따른 기지국운용 방법
JP2005212436A (ja) * 2004-02-02 2005-08-11 Konica Minolta Business Technologies Inc ジョブ実行装置及びジョブ実行方法
JP2006018812A (ja) * 2004-06-04 2006-01-19 Kyocera Mita Corp ユーザ情報管理装置、制御プログラム及び制御方法
JP4315879B2 (ja) * 2004-09-06 2009-08-19 シャープ株式会社 無線通信装置
US8160046B2 (en) * 2004-12-22 2012-04-17 Qualcomm Incorporated Control channel assignment in a wireless communication network
JP2006270414A (ja) * 2005-03-23 2006-10-05 Kyocera Mita Corp 画像処理装置
US8272033B2 (en) * 2006-12-21 2012-09-18 International Business Machines Corporation User authentication for detecting and controlling fraudulent login behavior
US8019331B2 (en) * 2007-02-26 2011-09-13 Kineto Wireless, Inc. Femtocell integration into the macro network
JP5188189B2 (ja) * 2008-01-18 2013-04-24 富士通株式会社 認証システム、認証装置及びコンピュータプログラム
JP5278272B2 (ja) * 2009-09-29 2013-09-04 沖電気工業株式会社 ネットワーク通信装置及びその自動再接続方法
US8554912B1 (en) * 2011-03-14 2013-10-08 Sprint Communications Company L.P. Access management for wireless communication devices failing authentication for a communication network
KR101837711B1 (ko) * 2011-08-31 2018-03-12 에스케이텔레콤 주식회사 블랙리스트 인증 방식에 의한 단말 인증 시스템 및 방법
CN103249040B (zh) * 2012-02-08 2017-04-26 华为终端有限公司 一种无线接入认证的方法及装置
KR101425275B1 (ko) * 2012-10-05 2014-08-13 숭실대학교산학협력단 무선 액세스 포인트와 통신을 수행하는 단말장치 및 이의 통신 제어 방법
KR101953562B1 (ko) * 2012-12-04 2019-03-04 한국전자통신연구원 무선 침해 방지를 위한 무선 디바이스 분류 장치
US9344908B2 (en) * 2012-12-13 2016-05-17 Devicescape Software, Inc. Systems and methods for quality of experience measurement and wireless network recommendation
JP2014191510A (ja) * 2013-03-26 2014-10-06 Kyocera Document Solutions Inc ユーザー認証通知システム及び画像形成装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355556A (zh) * 2007-07-26 2009-01-28 富士施乐株式会社 认证信息处理装置和认证信息处理方法
CN101226575A (zh) * 2008-01-28 2008-07-23 中兴通讯股份有限公司 应用程序的锁定方法
CN104333863A (zh) * 2014-10-20 2015-02-04 小米科技有限责任公司 连接管理方法及装置、电子设备

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905366A (zh) * 2019-01-16 2019-06-18 平安科技(深圳)有限公司 终端设备安全验证方法、装置、可读存储介质及终端设备
CN109905366B (zh) * 2019-01-16 2022-03-22 平安科技(深圳)有限公司 终端设备安全验证方法、装置、可读存储介质及终端设备
CN111429260A (zh) * 2020-03-19 2020-07-17 重庆富民银行股份有限公司 用于风控***的用户体验提升方法及***

Also Published As

Publication number Publication date
RU2015123452A (ru) 2017-01-10
KR20160059458A (ko) 2016-05-26
JP2016541082A (ja) 2016-12-28
JP6386069B2 (ja) 2018-09-05
CN104333863B (zh) 2018-11-30
MX351455B (es) 2017-10-16
KR101673238B1 (ko) 2016-11-07
CN104333863A (zh) 2015-02-04
BR112015015259A2 (pt) 2017-07-11
RU2622876C2 (ru) 2017-06-20
MX2015006487A (es) 2016-06-28
EP3013086A1 (en) 2016-04-27
EP3013086B1 (en) 2021-09-15

Similar Documents

Publication Publication Date Title
WO2016062002A1 (zh) 连接管理方法及装置、电子设备
JP6599341B2 (ja) 動的ネットワークアクセス管理のための方法、デバイスおよびシステム
US10673834B2 (en) Establishing a trusted login procedure
US9913315B2 (en) Method and device for connection management
CN105635084B (zh) 终端认证装置及方法
WO2016202139A1 (zh) 跨平台的账号资源共享实现方法、装置及***
CN104767713B (zh) 账号绑定的方法、服务器及***
US20140020062A1 (en) Techniques for protecting mobile applications
CN108667699B (zh) 一种终端设备与网关设备间的互联方法和装置
JP6470597B2 (ja) キャプティブポータル対応のvpn通信端末、その通信制御方法及びそのプログラム
US20140298428A1 (en) Method for allowing user access, client, server, and system
CN103796278A (zh) 移动终端无线网络接入控制方法
KR20170074959A (ko) 신뢰된 단말기 검증 방법 및 장치
CN104113548A (zh) 一种认证报文处理方法及装置
CN108156169A (zh) 账号登录验证方法、***及计算机可读存储介质
US9235696B1 (en) User authentication using a portable mobile device
WO2017005163A1 (zh) 基于无线通信的安全认证装置
CN113271299A (zh) 一种登录方法和服务器
CN114647529A (zh) 用于使用另一设备修复不可操作的辅助设备的技术
WO2019091458A1 (zh) 无线连接方法、无线接入点、终端和具有存储功能的装置
WO2017080328A1 (zh) 终端用户状态获取方法、装置和***
CN114866247B (zh) 一种通信方法、装置、***、终端及服务器
WO2016026332A1 (zh) 登录处理方法、装置及***
KR101365889B1 (ko) 이동통신 단말기의 모바일 네트워크 보안 방법, 시스템 및 그 프로그램을 기록한 기록매체
CN107846410B (zh) 一种入网验证的方法和装置

Legal Events

Date Code Title Description
ENP Entry into the national phase

Ref document number: 20157013323

Country of ref document: KR

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 2016554797

Country of ref document: JP

Kind code of ref document: A

WWE Wipo information: entry into national phase

Ref document number: MX/A/2015/006487

Country of ref document: MX

ENP Entry into the national phase

Ref document number: 2015123452

Country of ref document: RU

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15853370

Country of ref document: EP

Kind code of ref document: A1

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112015015259

Country of ref document: BR

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 112015015259

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20150624

122 Ep: pct application non-entry in european phase

Ref document number: 15853370

Country of ref document: EP

Kind code of ref document: A1