WO2016062002A1 - 连接管理方法及装置、电子设备 - Google Patents
连接管理方法及装置、电子设备 Download PDFInfo
- Publication number
- WO2016062002A1 WO2016062002A1 PCT/CN2015/074944 CN2015074944W WO2016062002A1 WO 2016062002 A1 WO2016062002 A1 WO 2016062002A1 CN 2015074944 W CN2015074944 W CN 2015074944W WO 2016062002 A1 WO2016062002 A1 WO 2016062002A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- preset
- authentication
- blacklist
- risk
- connection
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/062—Pre-authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Definitions
- the present invention relates to the field of communications technologies, and in particular, to a connection management method and apparatus, and an electronic device.
- WIFI Wireless Fidelity
- the network user uses the WIFI network normally, it may cause the occupation of wireless resources, so that the network resources available to each device are reduced, affecting the original user experience; however, since all devices need to access the same wireless router Therefore, the users of the network may also illegally access the devices in the WIFI network, and even cause problems such as privacy leakage of the original user and account security risks.
- the related art proposes to authenticate the device requesting access to the WIFI network, that is, the user of the network needs to input the correct access password; however, by making a limited number of attempts to access the password, the network user can easily access the network.
- the password is cracked, which cannot effectively prevent unauthorized access and access by users of the network.
- the present disclosure provides a connection management method and apparatus, and an electronic device, to solve the technical problem that a wireless network in the related art is easily smashed.
- connection management method including:
- the preset risk processing operation is performed.
- it also includes:
- the connection establishment request is ignored, otherwise the wireless connection operation with the device is performed.
- the performing the preset risk processing operation includes:
- the performing the preset risk processing operation includes:
- the performing the preset risk processing operation further includes:
- the authentication operation of the device is suspended, or the authentication result of the device is set as the authentication failure.
- a connection management apparatus including:
- a statistical unit configured to count the number of authentication failures of the device within a preset time period when establishing a wireless connection with the device
- an execution unit configured to perform a preset risk processing operation when the number of authentication failures is greater than or equal to a preset number of times threshold.
- it also includes:
- An obtaining unit configured to acquire identifier information of the device when receiving a connection establishment request sent by the device
- the processing unit is configured to ignore the connection establishment request if the identifier information exists in a preset blacklist list, and otherwise perform a wireless connection operation with the device.
- the execution unit includes:
- a first adding subunit configured to add the identification information to the blacklist.
- the execution unit includes:
- An information sending subunit configured to send risk prompt information to a preset management terminal
- a second adding subunit configured to add the identifier information to the blacklist according to a control instruction returned by the management terminal.
- the execution unit further includes:
- An authentication processing sub-unit configured to suspend an authentication operation on the device after the sending the risk prompt information, before receiving the control instruction, or set an authentication result of the device to an authentication failure .
- an electronic device including:
- a memory for storing processor executable instructions
- processor is configured to:
- the preset risk processing operation is performed.
- the disclosure can accurately identify the "attempt" behavior of the network user to the authentication password, and perform risk processing operations in time to avoid the network user's cracking of the wireless network. Helps improve the security of your wireless network.
- FIG. 1 is a flowchart of a connection management method according to an exemplary embodiment.
- FIG. 2 is a schematic diagram of an application scenario of connection management according to an exemplary embodiment.
- FIG. 3 is a flowchart of another connection management method according to an exemplary embodiment.
- FIG. 4 is a schematic diagram of an application scenario of another connection management according to an exemplary embodiment.
- FIG. 5 is a flowchart of another connection management method according to an exemplary embodiment.
- FIG. 6 is a schematic diagram of an interface of connection management according to an exemplary embodiment.
- FIG. 7 is a block diagram of a connection management apparatus according to an exemplary embodiment.
- FIG. 8 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- FIG. 9 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- FIG. 10 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- FIG. 11 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- FIG. 12 is a schematic structural diagram of an apparatus for connection management according to an exemplary embodiment.
- FIG. 1 is a flowchart of a connection management method according to an exemplary embodiment. As shown in FIG. 1 , the method is used in a wireless router, and includes the following steps.
- step 102 when establishing a wireless connection with the device, the number of authentication failures of the device in the preset time period is counted.
- the wireless router when the device accesses the wireless network established by the wireless router, the wireless router needs to perform identity authentication on the device, for example, it can determine whether the authentication password sent by the user through the device is correct. Therefore, "authentication failure" in the present disclosure may be caused by an incorrect authentication password.
- the user when a device accesses a certain wireless network for the first time, the user needs to manually input authentication information such as an authentication password. If the authentication succeeds, the device can record the authentication used by the device. Password and used to access the same wireless network in the future. Therefore, in the case that the configuration of the wireless network has not changed, the connected device does not have an authentication failure event due to an incorrect authentication password, and the authentication password may be incorrect on the device that is accessed for the first time. happensing.
- authentication information such as an authentication password
- step 104 when the number of authentication failures is greater than or equal to the preset number of times threshold, a preset risk processing operation is performed.
- the user when the authentication password is manually input by the user, the user may know the correct authentication password, and the user For normal users. However, the authentication may fail due to an input error. At this time, the user will correct the error in time, and the authentication failure will not be excessive. Or, the user may not know the correct authentication password, that is, the user is a network user, and the network user can only access the wireless network through continuous trial, thereby causing multiple authentication failures to be sent in a short time. event. Therefore, by monitoring the number of authentication failures occurring within a preset time period, the user identity can be effectively distinguished, and the risk of the network can be avoided.
- the risk processing operation may include recording a device that fails multiple authentications into a blacklist, thereby denying the device to join the wireless network.
- the risk processing operation may include notifying the normal user of the device identification information that has failed multiple authentications, and determining whether to record it to the blacklist by the normal user, or taking other processing methods.
- the present disclosure can accurately identify the “attempt” behavior of the user password on the authentication password by performing statistics on the number of authentication failures of the device, and perform risk processing operations in time to avoid the user of the network.
- the cracking of the wireless network helps to improve the security of the wireless network.
- FIG. 2 is a schematic diagram of an application scenario of connection management according to an exemplary embodiment.
- a wireless router and a wireless-enabled device such as device 1 are included, and device 1 initiates a connection request to the wireless router to join the wireless network established by the wireless router.
- FIG. 3 is a flowchart of another connection management method according to an exemplary embodiment, including the following steps.
- step 302 device 1 initiates a connection setup request to the wireless router.
- the device 1 may be a notebook computer as shown in FIG. 2, or any other device that supports wireless communication, such as a smart phone, a tablet computer, or the like.
- connection establishment request is only an overview of the operation of "request to establish a wireless connection”, and is not used to limit the number of interactions and the number of interactions during the operation.
- step 304 the wireless router acquires the identification information of the device 1.
- the identification information may be hardware information of the device 1, such as a MAC (Media Access Control) address, or other information used to distinguish and identify different devices.
- MAC Media Access Control
- the identifier information may be obtained in the connection establishment request sent by the device 1.
- the identifier information is the MAC address of the device 1
- the MAC address is the source MAC address of the packet from the device 1.
- step 306 the identification information of the device 1 is matched with a preset blacklist.
- step 308 if the identification information of the device 1 is not found in the blacklist, the wireless connection operation is performed between the out-of-order router and the device 1, otherwise the connection establishment request from the device 1 can be ignored, and the device 1 is rejected. Establish a wireless connection.
- step 310 in the process of establishing a wireless connection between the wireless router and the device 1, whether the authentication succeeds, for example, whether the authentication password sent by the device 1 is correct; if the authentication fails, the number of authentication failures is counted.
- step 312 when the number of authentication failures in the preset time period is greater than or equal to the preset number of times threshold, the identification information of the device 1 is added to the blacklist list, thereby solving the problem that the device 1 accesses the wireless router. Wi-Fi In the network.
- the network user only when the user to which the device 1 belongs is a network user, that is, the user does not know the real authentication password, the network user needs to repeatedly try to guess the authentication password, and thus The multiple authentication failure events in a short period of time are clearly distinguished from the accidental input behaviors that occur by normal users, thereby distinguishing the behavior of the network and the corresponding devices.
- the length of the preset time period may be set by the manufacturer or set by the user as needed, for example, 3 minutes.
- the wireless router can automatically identify the network behavior by adding statistics on the authentication failure event in a short period of time, and add the network device to the blacklist to prevent the network device from joining the wireless router. In the wireless network, thus ensuring the normal use and high security of the wireless network.
- FIG. 4 is a schematic diagram of another application scenario of connection management according to an exemplary embodiment.
- a wireless router and two wireless-enabled devices such as device 1 and device 2 are included, and device 1 initiates a connection request to the wireless router to join the wireless network established by the wireless router.
- Device 2 is a pre-configured management terminal.
- FIG. 5 is a flowchart of another connection management method according to an exemplary embodiment, including the following steps.
- step 502 device 1 initiates a connection setup request to the wireless router.
- the device 1 may be a notebook computer as shown in FIG. 4, or any other device that supports wireless communication, such as a smart phone, a tablet computer, or the like.
- connection establishment request is only an overview of the operation of "request to establish a wireless connection”, and is not used to limit the number of interactions and the number of interactions during the operation.
- step 504 the wireless router acquires the identification information of the device 1.
- the identification information may be hardware information of the device 1, such as a MAC address or the like, or other information used to distinguish and identify different devices.
- the identifier information may be obtained in the connection establishment request sent by the device 1.
- the identifier information is the MAC address of the device 1
- the MAC address is the source MAC address of the packet from the device 1.
- step 506 the identification information of the device 1 is matched with a preset blacklist.
- step 508 if the identification information of the device 1 is not found in the blacklist, the wireless connection operation is performed between the out-of-order router and the device 1, otherwise the connection establishment request from the device 1 may be ignored, and the device 1 is rejected. Establish a wireless connection.
- step 510 in the process of establishing a wireless connection between the wireless router and the device 1, whether the authentication succeeds, for example, whether the authentication password sent by the device 1 is correct; if the authentication fails, the number of authentication failures is counted.
- step 512 when the number of authentication failures is greater than or equal to the preset number of times threshold, the wireless router sends the risk prompt information to the device 2.
- FIG. 6 shows risk prompt information displayed on the screen interface of the device 2, such as “risk type”, “risk level”, “device information”, etc., for User is currently possible
- the existing risk situation is analyzed; then, when the user determines that the current device (ie, device 1 shown in FIG. 4) is a network device and wants to prohibit it from joining the current wireless network, it may select "blacklist” or "ignore” "Other processing methods.”
- the device 2 may be in a wireless network created by a wireless router, and the device 2 and the wireless router may perform information interaction based on the wireless network; as another exemplary embodiment, the device 2 If the device 2 and the wireless router can access the Internet separately and perform information exchange based on the Internet, the user of the device 2 can implement remote control, for example, during the company's work, the management home wireless network.
- step 514 the wireless router receives a control command from device 2.
- step 510 and step 514 that is, after the wireless router detects the network risk of the device 1, but has not received the returned control command, in order to prevent the device 1 from completing the wireless router during this period. If the authentication is performed, the authentication operation of the device 1 may be suspended, or the authentication result of the device 1 may be all set to the authentication failure, and the device 1 is prevented from accessing the wireless network.
- step 516 if the control command returned by the device 2 corresponds to "join blacklist", the wireless router adds the identification information of the device 1 to the blacklist list; or if the control command returned by the device 2 corresponds to " Ignore, the wireless router can resume normal authentication operation on device 1.
- the wireless router can automatically identify the behavior of the authentication network by using the statistics of the authentication failure event in a short period of time, and combine the simple interaction operation of the user to determine whether to add the “suspected network device” to the blacklist. In order to avoid the misjudgment of normal equipment while ensuring the normal use and high security of the wireless network.
- the user can log in to the wireless router to cancel the recording of any device in the blacklist. Restore the misunderstood "network device" to "normal device”.
- the present disclosure also provides an embodiment of the connection management apparatus.
- FIG. 7 is a block diagram of a connection management apparatus according to an exemplary embodiment.
- the apparatus includes a statistics unit 71 and an execution unit 72.
- the statistics unit 71 is configured to count the number of authentication failures of the device within a preset time period when establishing a wireless connection with the device;
- the executing unit 72 is configured to perform a preset risk processing operation when the number of authentication failures is greater than or equal to a preset number of times threshold.
- the "attempt" behavior of the authentication password can be accurately identified by the user of the network, and the risk processing operation is performed in time to avoid the user of the network to the wireless network.
- the crack helps to improve the security of the wireless network.
- FIG. 8 is a block diagram of another connection management apparatus according to an exemplary embodiment, which is implemented.
- the apparatus may further include: an obtaining unit 73 and a processing unit 74.
- the obtaining unit 73 is configured to acquire the identifier information of the device when receiving the connection establishment request sent by the device;
- the processing unit 74 is configured to ignore the connection establishment request if the identification information exists in a preset blacklist list, and otherwise perform a wireless connection operation with the device.
- FIG. 9 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- the implementation unit 72 may include: first adding, based on the foregoing embodiment shown in FIG. Subunit 721.
- the first adding subunit 721 is configured to add the identifier information to the blacklist.
- FIG. 10 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- the implementation unit 72 may include: an information transmitter. Unit 722 and second add subunit 723.
- the information sending subunit 722 is configured to send risk prompt information to the preset management terminal.
- the second adding subunit 723 is configured to add the identification information to the blacklist according to a control instruction returned by the management terminal.
- FIG. 11 is a block diagram of another connection management apparatus according to an exemplary embodiment.
- the implementation unit 72 may further include: authentication on the basis of the foregoing embodiment shown in FIG. Processing subunit 724.
- the authentication processing sub-unit 724 is configured to suspend the authentication operation of the device after the risk prompt information is sent, before receiving the control instruction, or set the authentication result of the device. Failure for authentication.
- the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
- the device embodiments described above are merely illustrative, wherein the units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical units, ie may be located A place, or it can be distributed to multiple network units. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present disclosure. Those of ordinary skill in the art can understand and implement without any creative effort.
- connection management apparatus comprising: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to: when the wireless connection is established with the device, the device is counted The number of authentication failures in the preset time period; when the number of authentication failures is greater than or equal to the preset number of times threshold, the preset risk processing operation is performed.
- the present disclosure also provides a terminal, the terminal including a memory, and one or more a program, wherein one or more programs are stored in a memory, and configured to be executed by one or more processors, the one or more programs comprising instructions for: establishing a wireless connection with the device, the statistical office The number of authentication failures of the device in the preset time period; when the number of authentication failures is greater than or equal to the preset number of times threshold, the preset risk processing operation is performed.
- FIG. 12 is a block diagram of an apparatus 1200 for connection management, according to an exemplary embodiment.
- device 1200 can be provided as a wireless router or as a smart terminal with wireless routing functionality.
- apparatus 1200 includes a processing component 1222 that further includes one or more processors, and memory resources represented by memory 1232 for storing instructions executable by processing component 1222, such as an application.
- An application stored in memory 1232 may include one or more modules each corresponding to a set of instructions.
- the processing component 1222 is configured to execute instructions to perform the connection management method described above.
- Apparatus 1200 can also include a power supply component 1226 configured to perform power management of apparatus 1200, a wired or wireless network interface 1250 configured to connect apparatus 1200 to the network, and an input/output (I/O) interface 1258.
- Device 1200 can operate based on an operating system stored in memory 1232, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Quality & Reliability (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
- Transmitters (AREA)
- Computer And Data Communications (AREA)
Abstract
Description
Claims (11)
- 一种连接管理方法,其特征在于,包括:与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
- 根据权利要求1所述的方法,其特征在于,还包括:当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;若所述标识信息存在于预设的黑名单列表中,则忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
- 根据权利要求2所述的方法,其特征在于,所述执行预设的风险处理操作,包括:将所述标识信息添加至所述黑名单中。
- 根据权利要求1或2所述的方法,其特征在于,所述执行预设的风险处理操作,包括:向预设的管理终端发送风险提示信息;根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
- 根据权利要求4所述的方法,其特征在于,所述执行预设的风险处理操作,还包括:在发送所述风险提示信息之后、接收到所述控制指令之前,暂停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
- 一种连接管理装置,其特征在于,包括:统计单元,用于与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;执行单元,用于当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
- 根据权利要求6所述的装置,其特征在于,还包括:获取单元,用于当接收到所述设备发送的连接建立请求时,获取所述设备的标识信息;处理单元,用于在所述标识信息存在于预设的黑名单列表的情况下,忽略所述连接建立请求,否则执行与所述设备的无线连接操作。
- 根据权利要求7所述的装置,其特征在于,所述执行单元包括:第一添加子单元,用于将所述标识信息添加至所述黑名单中。
- 根据权利要求6或7所述的装置,其特征在于,所述执行单元包括:信息发送子单元,用于向预设的管理终端发送风险提示信息;第二添加子单元,用于根据所述管理终端返回的控制指令,将所述标识信息添加至所述黑名单中。
- 根据权利要求9所述的装置,其特征在于,所述执行单元还包括:鉴权处理子单元,用于在发送所述风险提示信息之后、接收到所述控制指令之前,暂 停对所述设备的鉴权操作,或将对所述设备的鉴权结果设置为鉴权失败。
- 一种电子设备,其特征在于,包括:处理器;用于存储处理器可执行指令的存储器;其中,所述处理器被配置为:与设备建立无线连接时,统计所述设备在预设时间段内的鉴权失败次数;当所述鉴权失败次数大于或等于预设次数阈值时,执行预设的风险处理操作。
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2016554797A JP6386069B2 (ja) | 2014-10-20 | 2015-03-24 | 接続管理方法、装置、電子設備、プログラム、及び記録媒体 |
RU2015123452A RU2622876C2 (ru) | 2014-10-20 | 2015-03-24 | Способ, устройство и электронное устройство для управления соединениями |
KR1020157013323A KR101673238B1 (ko) | 2014-10-20 | 2015-03-24 | 연결 관리 방법, 장치, 전자 기기, 프로그램 및 저장매체 |
MX2015006487A MX351455B (es) | 2014-10-20 | 2015-03-24 | Metodo, aparato y dispositivo electronico para la administracion de conexion. |
BR112015015259A BR112015015259A2 (pt) | 2014-10-20 | 2015-03-24 | método, aparelhos e dispositivo eletrônico para gerenciamento de conexão |
US14/806,889 US9913315B2 (en) | 2014-10-20 | 2015-07-23 | Method and device for connection management |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410559632.1 | 2014-10-20 | ||
CN201410559632.1A CN104333863B (zh) | 2014-10-20 | 2014-10-20 | 连接管理方法及装置、电子设备 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/806,889 Continuation US9913315B2 (en) | 2014-10-20 | 2015-07-23 | Method and device for connection management |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016062002A1 true WO2016062002A1 (zh) | 2016-04-28 |
Family
ID=52408495
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/074944 WO2016062002A1 (zh) | 2014-10-20 | 2015-03-24 | 连接管理方法及装置、电子设备 |
Country Status (8)
Country | Link |
---|---|
EP (1) | EP3013086B1 (zh) |
JP (1) | JP6386069B2 (zh) |
KR (1) | KR101673238B1 (zh) |
CN (1) | CN104333863B (zh) |
BR (1) | BR112015015259A2 (zh) |
MX (1) | MX351455B (zh) |
RU (1) | RU2622876C2 (zh) |
WO (1) | WO2016062002A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109905366A (zh) * | 2019-01-16 | 2019-06-18 | 平安科技(深圳)有限公司 | 终端设备安全验证方法、装置、可读存储介质及终端设备 |
CN111429260A (zh) * | 2020-03-19 | 2020-07-17 | 重庆富民银行股份有限公司 | 用于风控***的用户体验提升方法及*** |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9913315B2 (en) | 2014-10-20 | 2018-03-06 | Xiaomi Inc. | Method and device for connection management |
CN104333863B (zh) * | 2014-10-20 | 2018-11-30 | 小米科技有限责任公司 | 连接管理方法及装置、电子设备 |
CN106686590A (zh) * | 2015-11-10 | 2017-05-17 | 中兴通讯股份有限公司 | 管制终端识别及管理方法、装置、无线接入点设备 |
CN105516093B (zh) * | 2015-11-30 | 2018-10-12 | 上海斐讯数据通信技术有限公司 | 一种防蹭网的方法及路由器 |
CN105871843A (zh) * | 2016-03-31 | 2016-08-17 | 广州指点网络科技有限公司 | 智能控制用户连接数量的路由装置及应用方法 |
CN105959948A (zh) * | 2016-04-26 | 2016-09-21 | 上海斐讯数据通信技术有限公司 | 一种无线密钥防暴力破解的方法和装置 |
CN106102066A (zh) * | 2016-08-23 | 2016-11-09 | 上海斐讯数据通信技术有限公司 | 一种无线网络安全认证装置及其方法、一种路由器 |
CN106412884B (zh) * | 2016-11-24 | 2020-02-04 | 北京小米移动软件有限公司 | Wifi连接的管理方法及装置 |
CN106412911B (zh) * | 2016-11-25 | 2019-07-30 | 宇龙计算机通信科技(深圳)有限公司 | 无线接入点监控方法、装置及电子设备 |
CN107360574A (zh) * | 2017-06-16 | 2017-11-17 | 上海斐讯数据通信技术有限公司 | 一种终端设备管理方法、一种云控制器及一种无线接入点 |
KR102381758B1 (ko) * | 2017-08-22 | 2022-04-04 | 현대자동차주식회사 | 차량의 헤드 유닛, 이를 포함하는 차량 및 차량의 제어 방법 |
CN107769978A (zh) * | 2017-10-30 | 2018-03-06 | 上海斐讯数据通信技术有限公司 | 一种终端设备入网的管理方法、***、路由器及服务器 |
CN108494728B (zh) * | 2018-02-07 | 2021-01-26 | 平安普惠企业管理有限公司 | 防止流量劫持的黑名单库创建方法、装置、设备及介质 |
CN109548020B (zh) * | 2018-12-13 | 2022-08-12 | 网宿科技股份有限公司 | 鉴权失败后的补偿方法及装置、服务器、存储介质 |
US11616774B2 (en) * | 2019-01-17 | 2023-03-28 | Blackberry Limited | Methods and systems for detecting unauthorized access by sending a request to one or more peer contacts |
CN110213870A (zh) * | 2019-06-27 | 2019-09-06 | 江苏宜达新材料科技股份有限公司 | 一种灯光控制方法、装置、计算机设备及存储介质 |
US11265325B2 (en) * | 2019-07-22 | 2022-03-01 | Whitestar Communications, Inc. | Systems and methods of salutation protocol to communicate using a private overlay peer to peer network |
EP3772842A1 (de) * | 2019-08-07 | 2021-02-10 | Siemens Aktiengesellschaft | Erkennung von manipulierten clients eines leitsystems |
CN110493786B (zh) * | 2019-10-15 | 2020-01-07 | 北京翼辉信息技术有限公司 | 一种电子设备智能连接网络的方法、装置及存储介质 |
CN112333053B (zh) * | 2020-06-02 | 2022-09-02 | 深圳Tcl新技术有限公司 | 防蹭网方法、装置、路由设备及存储介质 |
CN112804254B (zh) * | 2021-02-07 | 2022-10-28 | 成都薯片科技有限公司 | 请求检测方法、装置、电子设备及存储介质 |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101226575A (zh) * | 2008-01-28 | 2008-07-23 | 中兴通讯股份有限公司 | 应用程序的锁定方法 |
CN101355556A (zh) * | 2007-07-26 | 2009-01-28 | 富士施乐株式会社 | 认证信息处理装置和认证信息处理方法 |
CN104333863A (zh) * | 2014-10-20 | 2015-02-04 | 小米科技有限责任公司 | 连接管理方法及装置、电子设备 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020188868A1 (en) * | 2001-06-12 | 2002-12-12 | Budka Kenneth C. | Method for protecting use of resources in a network |
US7082117B2 (en) * | 2002-08-12 | 2006-07-25 | Harris Corporation | Mobile ad-hoc network with intrusion detection features and related methods |
US7783019B2 (en) * | 2003-05-15 | 2010-08-24 | Verizon Business Global Llc | Method and apparatus for providing fraud detection using geographically differentiated connection duration thresholds |
US7643442B1 (en) * | 2003-06-30 | 2010-01-05 | Cisco Systems, Inc. | Dynamic QoS configuration based on transparent processing of session initiation messages |
US8713626B2 (en) * | 2003-10-16 | 2014-04-29 | Cisco Technology, Inc. | Network client validation of network management frames |
JP2005184639A (ja) * | 2003-12-22 | 2005-07-07 | Fujitsu Ltd | 接続管理システム、接続管理装置及び接続管理方法 |
KR100527634B1 (ko) * | 2003-12-24 | 2005-11-09 | 삼성전자주식회사 | 휴대 인터넷 시스템에서 인증 및 인증 실패에 따른 기지국운용 방법 |
JP2005212436A (ja) * | 2004-02-02 | 2005-08-11 | Konica Minolta Business Technologies Inc | ジョブ実行装置及びジョブ実行方法 |
JP2006018812A (ja) * | 2004-06-04 | 2006-01-19 | Kyocera Mita Corp | ユーザ情報管理装置、制御プログラム及び制御方法 |
JP4315879B2 (ja) * | 2004-09-06 | 2009-08-19 | シャープ株式会社 | 無線通信装置 |
US8160046B2 (en) * | 2004-12-22 | 2012-04-17 | Qualcomm Incorporated | Control channel assignment in a wireless communication network |
JP2006270414A (ja) * | 2005-03-23 | 2006-10-05 | Kyocera Mita Corp | 画像処理装置 |
US8272033B2 (en) * | 2006-12-21 | 2012-09-18 | International Business Machines Corporation | User authentication for detecting and controlling fraudulent login behavior |
US8019331B2 (en) * | 2007-02-26 | 2011-09-13 | Kineto Wireless, Inc. | Femtocell integration into the macro network |
JP5188189B2 (ja) * | 2008-01-18 | 2013-04-24 | 富士通株式会社 | 認証システム、認証装置及びコンピュータプログラム |
JP5278272B2 (ja) * | 2009-09-29 | 2013-09-04 | 沖電気工業株式会社 | ネットワーク通信装置及びその自動再接続方法 |
US8554912B1 (en) * | 2011-03-14 | 2013-10-08 | Sprint Communications Company L.P. | Access management for wireless communication devices failing authentication for a communication network |
KR101837711B1 (ko) * | 2011-08-31 | 2018-03-12 | 에스케이텔레콤 주식회사 | 블랙리스트 인증 방식에 의한 단말 인증 시스템 및 방법 |
CN103249040B (zh) * | 2012-02-08 | 2017-04-26 | 华为终端有限公司 | 一种无线接入认证的方法及装置 |
KR101425275B1 (ko) * | 2012-10-05 | 2014-08-13 | 숭실대학교산학협력단 | 무선 액세스 포인트와 통신을 수행하는 단말장치 및 이의 통신 제어 방법 |
KR101953562B1 (ko) * | 2012-12-04 | 2019-03-04 | 한국전자통신연구원 | 무선 침해 방지를 위한 무선 디바이스 분류 장치 |
US9344908B2 (en) * | 2012-12-13 | 2016-05-17 | Devicescape Software, Inc. | Systems and methods for quality of experience measurement and wireless network recommendation |
JP2014191510A (ja) * | 2013-03-26 | 2014-10-06 | Kyocera Document Solutions Inc | ユーザー認証通知システム及び画像形成装置 |
-
2014
- 2014-10-20 CN CN201410559632.1A patent/CN104333863B/zh active Active
-
2015
- 2015-03-24 WO PCT/CN2015/074944 patent/WO2016062002A1/zh active Application Filing
- 2015-03-24 RU RU2015123452A patent/RU2622876C2/ru active
- 2015-03-24 JP JP2016554797A patent/JP6386069B2/ja active Active
- 2015-03-24 KR KR1020157013323A patent/KR101673238B1/ko active IP Right Grant
- 2015-03-24 BR BR112015015259A patent/BR112015015259A2/pt not_active IP Right Cessation
- 2015-03-24 MX MX2015006487A patent/MX351455B/es active IP Right Grant
- 2015-10-13 EP EP15189579.4A patent/EP3013086B1/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101355556A (zh) * | 2007-07-26 | 2009-01-28 | 富士施乐株式会社 | 认证信息处理装置和认证信息处理方法 |
CN101226575A (zh) * | 2008-01-28 | 2008-07-23 | 中兴通讯股份有限公司 | 应用程序的锁定方法 |
CN104333863A (zh) * | 2014-10-20 | 2015-02-04 | 小米科技有限责任公司 | 连接管理方法及装置、电子设备 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109905366A (zh) * | 2019-01-16 | 2019-06-18 | 平安科技(深圳)有限公司 | 终端设备安全验证方法、装置、可读存储介质及终端设备 |
CN109905366B (zh) * | 2019-01-16 | 2022-03-22 | 平安科技(深圳)有限公司 | 终端设备安全验证方法、装置、可读存储介质及终端设备 |
CN111429260A (zh) * | 2020-03-19 | 2020-07-17 | 重庆富民银行股份有限公司 | 用于风控***的用户体验提升方法及*** |
Also Published As
Publication number | Publication date |
---|---|
RU2015123452A (ru) | 2017-01-10 |
KR20160059458A (ko) | 2016-05-26 |
JP2016541082A (ja) | 2016-12-28 |
JP6386069B2 (ja) | 2018-09-05 |
CN104333863B (zh) | 2018-11-30 |
MX351455B (es) | 2017-10-16 |
KR101673238B1 (ko) | 2016-11-07 |
CN104333863A (zh) | 2015-02-04 |
BR112015015259A2 (pt) | 2017-07-11 |
RU2622876C2 (ru) | 2017-06-20 |
MX2015006487A (es) | 2016-06-28 |
EP3013086A1 (en) | 2016-04-27 |
EP3013086B1 (en) | 2021-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2016062002A1 (zh) | 连接管理方法及装置、电子设备 | |
JP6599341B2 (ja) | 動的ネットワークアクセス管理のための方法、デバイスおよびシステム | |
US10673834B2 (en) | Establishing a trusted login procedure | |
US9913315B2 (en) | Method and device for connection management | |
CN105635084B (zh) | 终端认证装置及方法 | |
WO2016202139A1 (zh) | 跨平台的账号资源共享实现方法、装置及*** | |
CN104767713B (zh) | 账号绑定的方法、服务器及*** | |
US20140020062A1 (en) | Techniques for protecting mobile applications | |
CN108667699B (zh) | 一种终端设备与网关设备间的互联方法和装置 | |
JP6470597B2 (ja) | キャプティブポータル対応のvpn通信端末、その通信制御方法及びそのプログラム | |
US20140298428A1 (en) | Method for allowing user access, client, server, and system | |
CN103796278A (zh) | 移动终端无线网络接入控制方法 | |
KR20170074959A (ko) | 신뢰된 단말기 검증 방법 및 장치 | |
CN104113548A (zh) | 一种认证报文处理方法及装置 | |
CN108156169A (zh) | 账号登录验证方法、***及计算机可读存储介质 | |
US9235696B1 (en) | User authentication using a portable mobile device | |
WO2017005163A1 (zh) | 基于无线通信的安全认证装置 | |
CN113271299A (zh) | 一种登录方法和服务器 | |
CN114647529A (zh) | 用于使用另一设备修复不可操作的辅助设备的技术 | |
WO2019091458A1 (zh) | 无线连接方法、无线接入点、终端和具有存储功能的装置 | |
WO2017080328A1 (zh) | 终端用户状态获取方法、装置和*** | |
CN114866247B (zh) | 一种通信方法、装置、***、终端及服务器 | |
WO2016026332A1 (zh) | 登录处理方法、装置及*** | |
KR101365889B1 (ko) | 이동통신 단말기의 모바일 네트워크 보안 방법, 시스템 및 그 프로그램을 기록한 기록매체 | |
CN107846410B (zh) | 一种入网验证的方法和装置 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
ENP | Entry into the national phase |
Ref document number: 20157013323 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2016554797 Country of ref document: JP Kind code of ref document: A |
|
WWE | Wipo information: entry into national phase |
Ref document number: MX/A/2015/006487 Country of ref document: MX |
|
ENP | Entry into the national phase |
Ref document number: 2015123452 Country of ref document: RU Kind code of ref document: A |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15853370 Country of ref document: EP Kind code of ref document: A1 |
|
REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112015015259 Country of ref document: BR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 112015015259 Country of ref document: BR Kind code of ref document: A2 Effective date: 20150624 |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15853370 Country of ref document: EP Kind code of ref document: A1 |