Wireless connection authentication method and device

A wireless connection and verification code technology, applied in the computer field, can solve the problems of inflexible use, inflexible and convenient password management of wireless connection devices, etc., and achieve the effect of improving the flexibility of use and increasing the difficulty.

Active Publication Date: 2016-07-06
VIVO MOBILE COMM CO LTD
7 Cites 1 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0006] 2. Not flexible enough to use
Therefore, for owner B, the password manag...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

1. For the password of the wireless connection device, it is automatically updated according to the time period, so that the password changes with time, and each password is only used for a period of time to change to a new password, and because the login password and The double verification method of the authority verification code makes it more difficult for the wireless connection device to be cracked by violence, and the wireless signal is not easy to be rubbed.
1. In the embodiment of the present invention, the password of the wireless connection device is automatically updated according to the time period, so that the password changes with time, and each password is only used for a period of time to change to a new password, and Due to the double verification method of the login password and the authority verification code, it is more difficult for the wireless connection device to be cracked by violence, and the wireless signal is not easy to be rubbed.
1. In the embodiment of the present invention, the password of the wireless connection device is automatically updated according to the time period, so that the password changes with time, and each password is only used for a period of time to change to a new password. The difficulty of cracking increases, and the wireless signal is not easy to be rubbed.
2. For the owner B of the wireless connection device, use the temporary user table to maintain the temporary login authority, and use the resident user table to maintain the resident login authority, so after the wireless connection device changes the login password, perform the login authority During maintenance, there is no need to traverse the identity information of each terminal, and the maintenance can be performed directly according to the nature of the table. The maintenance is simple and the calculation amount is low. In addition, the owner of the connected device does not need to p...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention discloses a wireless connection authentication method and device and belongs to the computer technical field. According to one embodiment of the invention, the wireless connection authentication method comprises the steps that: in a current time period, if received authority information of a terminal contains a login password and does not contain an authority authentication code, the terminal is allowed to perform login and is bestowed with a temporary login authority; if the received authority information of the terminal contains the login password and the authority authentication code, the terminal is allowed to perform login and is bestowed with a resident login authority; a new login password and an authority authentication code are generated so as to be used in a next time period; and after a wireless connection device uses the new login password, the terminal with the temporary login authority is removed from a login state, and the login state of the terminal with the resident login authority is maintained. With the wireless connection authentication method and device of the invention adopted, the security of the wireless connection device is high, the wireless connection device has little possibility of being cracked down by violent forces, wireless signals have little possibility of being squatted, operation is simple, and use is flexible.

Application Domain

Technology Topic

Image

  • Wireless connection authentication method and device
  • Wireless connection authentication method and device
  • Wireless connection authentication method and device

Examples

  • Experimental program(11)

Example Embodiment

[0088] Example one
[0089] Reference figure 1 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0090] Step 110: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.
[0091] In the embodiment of the present invention, for each time period, the wireless connection device obtains a login password used to log in to the wireless connection device in the current time period, and a permission verification code used to confirm the permission of the resident user.
[0092] The user can send authority information to the wireless connection device in any period of time, and the wireless connection device judges the received authority information according to the login password and the authority verification code.
[0093] In practical applications, the above judgment process is to match the authorization information sent by the terminal with the login password 000000 of the wireless connection device and the authorization verification code 111111.
[0094] In a specific implementation of the embodiment of the present invention, during initialization, the embodiment of the present invention generates a login password and a permission verification code used in the first time period. Then, during or at the end of each time period, the login password and authorization verification code used in the next time period are generated. For example, at the end of the first time period, the login password and authorization verification code used in the second time period are generated. By analogy, the login password and authorization verification code change with the time period.
[0095] In the embodiment of the present invention, it can be understood that when any terminal sends permission information to the wireless connection device at any time, the time period at that time can be understood as the aforementioned current time period.
[0096] For example, the initialization time of the wireless connection device is 12:00 and the time period is 2 hours. Then the terminal sends the login password to the wireless connection device at 12:30, and the current time period is 12:00-14:00. The next time period is 14:00-16:00; when the terminal sends the login password to the wireless connection device at 14:30, the current time period is 14:00-16:00, correspondingly, the next time period is 16 :00-18:00; the terminal sends the login password to the wireless connection device at 17:00, the current time period is 16:00-18:00, and correspondingly, the next time period is 18:00-20:00.
[0097] Of course, if the authority information sent by the terminal is received at the handover time of two time periods, the current time period may be a time period after the handover time. For example, if the above permission information is received at 14:00, the current time period can be 14:00-16:00.
[0098] It can be understood that in the embodiment of the present invention, the authority information sent by the user can be divided into two fields. The first field is the login password entered by the user, corresponding to the matching login password, and the second field is the authorization verification code entered by the user. Corresponding to the matching authority verification code. Among them, the second field can be empty. Of course, the matching objects of the first field and the second field can be exchanged as needed.
[0099] It can be understood that, in the embodiment of the present invention, the authority information sent by a certain terminal may include the aforementioned correct login password or other incorrect passwords. The authority information sent by the terminal may also include the aforementioned correct authority verification code, or Include other incorrect verification codes. In the embodiment of the present invention, in the current time period, the permission information sent by any terminal is matched according to the login password and the permission verification code in the current time period.
[0100] For the case of matching, take the aforementioned time period 12:00-14:00 as an example, the login password of the wireless connection device in this time period is 000000, and the authorization verification code in this time period is 111111, then there are at least the following Situation:
[0101] (1) The terminal sends permission information, including the login password 123456, without the permission verification code; after the wireless connection device receives the 123456, it matches the wireless connection device's login password 000000 and the permission verification code 111111, and it is found that they do not match. , Ignore the terminal connection.
[0102] (2) The terminal sends authority information, including the login password 000000, without authorization verification code; after the wireless connection device receives the 000000, it matches the wireless connection device's login password 000000 and the authorization verification code 111111, and finds that the login password is matched 000000, it is determined that terminal A has sent the correct login password without sending the authorization verification code.
[0103] (3) The terminal sends permission information, including the login password 000000 and the permission verification code 121212; after the wireless connection device receives the 000000 and 121212, it matches the wireless connection device's login password 000000 and the permission verification code 111111, and finds a match If the login password 000000 cannot match the authorization verification code, it is determined that the terminal A has sent the correct login password and the wrong authorization verification code.
[0104] (4) The terminal sends permission information, including the login password 000000 and the permission verification code 111111. After the wireless connection device receives the 000000 and 111111, it matches the wireless connection device's login password 000000 and the permission verification code 111111, and finds the match If the login password 000000 is also matched with the authorization verification code 111111, it is determined that the terminal A has sent the correct login password and authorization verification code.
[0105] (5) The terminal sends permission information, including the login password 222222 and the permission verification code 333333. After the wireless connection device receives the 222222, it matches the wireless connection device's login password 000000 and the permission verification code 111111, and finds that the login password does not match. 000000, the authorization verification code is no longer verified.
[0106] It can be understood that, in the embodiment of the present invention, if the received login password of the wireless connection device does not match the login password used in the current time period, the authorization verification code will no longer be matched.
[0107] Preferably, in order to facilitate the user to input the login password and the authorization verification code, without the user having to memorize them, and to reduce the user's memory burden, the embodiment of the present invention further includes before step 110:
[0108] Step 105: Obtain the login password and the authorization verification code for display according to the received trigger instruction.
[0109] In the embodiment of the present invention, the user can perform a trigger operation on the wireless connection device, so that the wireless connection device displays the login password and the authorization verification code in the current time period. The wireless connection device receives the trigger instruction according to the user's trigger operation, and then obtains the login password and authorization verification code in the current time period, and displays it on the display screen.
[0110] Of course, after a certain period of time, such as 30 seconds, the display can be stopped.
[0111] In order to avoid exposing both the login password and authorization verification code to the temporary user of the wireless connection device at one time, to prevent the temporary user from obtaining the login password and authorization verification code used in the current time period at one time, causing the temporary user to pass through the terminal Send both the login password and authorization verification code to the wireless connection device to obtain the permanent login authorization. Preferably, the above step 105 includes:
[0112] In sub-step 1051, if the first trigger instruction is received, the login password is obtained and displayed.
[0113] In the embodiment of the present invention, when the operator performs a wireless connection trigger operation on the wireless connection device for the first time, the wireless connection device receives the trigger instruction according to the trigger operation, and then obtains the login password in the current time period according to the trigger instruction, Then send the login password to the display screen of the wireless connection device for display. Temporary users can directly input the displayed login password in their terminal, and then send it to the wireless connection device.
[0114] It can be understood that, for the temporary user, since the user has already logged in the wireless connection device with the terminal according to the login password, the operator can no longer perform the triggering operation, and therefore does not need to show the authorization verification code to the temporary user.
[0115] In sub-step 1052, if the second trigger instruction is received within a predetermined time interval, the authorization verification code is acquired and displayed.
[0116] For resident users who need to log in for a long time, when the operator performs another trigger operation on the wireless connection device within a predetermined time interval, the wireless connection device receives the second trigger instruction according to the trigger operation, and then according to the second trigger operation. The trigger instruction obtains the authorization verification code in the current time period, and sends the authorization verification code to the display screen of the wireless connection device for display. Then the resident user can obtain the authorization verification code again from the display screen, and then send it to the wireless connection device together with the aforementioned login password.
[0117] It can be understood that, in the embodiment of the present invention, the user may send authority information including only the login password, or may send authority information including the login password and the authorization verification code.
[0118] Wherein, the aforementioned predetermined time interval can be set to 30 seconds, or can be set to be from the current moment to before the end of the current time period.
[0119] Of course, for a trigger operation exceeding a predetermined time interval, the embodiment of the present invention may consider that the first trigger instruction is received, and then the display of the login password in the current time period is triggered.
[0120] In practical applications, the embodiment of the present invention provides a connection authentication page for an unlogged terminal, that is, when a user connects to a wireless connection device, the unlogged terminal will jump to the connection authentication page, which can display two inputs Field, one of the input fields prompts for the login password, and the other input field prompts for the authorization verification code. Then the user can make corresponding input in the connection authentication page, and then click the login button to send the input information to the wireless connection device. Of course, the user can only enter the login password, or enter the login password and authorization verification code at the same time.
[0121] Further, it can be understood that any unauthenticated terminal can be directly connected to the wireless connection device of the embodiment of the present invention, but when the user wants to operate the terminal for networking or other operations, since the terminal is not given any login authority, Will go to the above connection authentication page for users to enter the login password and authorization verification code. If only the login password is verified, the unlogged terminal can perform networking or other operations, and is given temporary login authority; if the login password and authorization verification code are verified at the same time, the unlogged terminal can perform networking or other operations, and Be given permanent login authority.
[0122] Preferably, the authorization verification code used in the current time period is a login password to be used by the wireless connection device in the next time period.
[0123] It can be understood that, in the embodiment of the present invention, the authorization verification code used in each time period is the login password used in the next time period.
[0124] Taking the aforementioned time period 12:00-14:00 as an example, during 12:00-14:00, the login password of the wireless connection device 000000 and the authorization verification code 111111, and the authorization verification code 111111 is 14:00-16:00 The login password used in. From 14:00 to 16:00, the login password of the wireless connection device is 111111 and the authorization verification code 222222, and the authorization verification code 222222 is the login password used from 16:00 to 18:00. In other cases, the same applies.
[0125] Step 120: If the received authority information includes the login password but not the authority verification code, the terminal is allowed to log in, and the terminal is granted temporary login authority.
[0126] In the embodiments of the present invention, for the aforementioned (2) and (3) cases, the embodiments of the present invention can consider that the received authorization information of the terminal includes the login password but not the authorization verification code, because the case (2) wireless connection The device side does not receive the authorization verification code at all, and the received authorization verification code in case (3) is wrong, and the wireless connection device side can actually be understood as not receiving the authorization verification code. Then, in the above case, the aforementioned terminal is allowed to log in, and the aforementioned terminal is granted temporary log-in authority.
[0127] Step 130: If the received permission information includes a login password and a permission verification code, allow the terminal to log in, and give the terminal permanent login permission.
[0128] In the embodiment of the present invention, for the aforementioned (4) situation, the embodiment of the present invention considers that the authorization information of the received terminal includes the login password and the authorization verification code. In the above case, the aforementioned terminal is allowed to log in and the aforementioned terminal is granted permanent residence. Login permissions.
[0129] Step 140: Generate a new login password and a new authorization verification code for use in the next time period.
[0130] In each time period of the embodiment of the present invention, a new login password and a new authorization verification code can be generated. When the new login password and new authorization verification code are transferred to the next time period, the wireless connection device use.
[0131] In a specific implementation, the password of the first time period in the embodiment of the present invention is initialized, that is, obtained at the beginning of the first time period. At the end of the first time period, a new login password and a new authorization verification code are generated, then when the second time period is transferred, the wireless connection device uses the new login password and the new authorization verification code, thinking that it has not The logged-in terminal is granted temporary login authority or permanent login authority. At the end of the second time period, a new login password and a new authorization verification code are generated, then when the third time period is transferred, the wireless connection device uses the new login password and the new login password generated at the end of the second period. The new authority verification code grants temporary login authority or permanent login authority to the terminal that is not logged in. By analogy, the login password and authorization verification code of the wireless connection device change with the time period.
[0132] Of course, in each time period, generating a new login password and a new authorization verification code for use in the next time period can also be performed at other times, and the embodiment of the present invention is not limited to the end of each time period.
[0133] After the embodiment of the present invention generates a new login password and a new authorization verification code for use in the next time period, when entering the next time period, the new login password and authorization verification code are used in the next time period If the login password, or login password and authorization verification code sent by other terminals are received again in the next time period, step 110 may be entered for subsequent operations.
[0134] Taking the aforementioned time period 12:00-14:00 as an example, the time period is 2 hours, the login password of the wireless connection device in this time period is 000000, and the authorization verification code in this time period is 111111. Then at the end of the time period, a new login password 222222 and a new authorization verification code 333333 can be generated. Then when entering the time period of 14:00-16:00, the login password 222222 and the authorization verification code 333333 are used.
[0135] Preferably, the authorization verification code used in the current time period is a login password to be used by the wireless connection device in the next time period.
[0136] In the embodiment of the present invention, when the wireless connection device is initialized, the login password of the first time period is obtained, and the login password of the second time period is obtained as the authorization verification code in the first time period. For example, taking the aforementioned time period 12:00-14:00 as an example, the wireless connection device generates the login password 000000 in this time period, and at the same time generates the login password 111111 to be used from 14:00-16:00, and 111111 is regarded as 12:00 -14:00 Authority verification code used in.
[0137] It can be understood that the authorization verification code used in the current time period is the login password that will be used by the wireless connection device in the next time period. Then the authorization verification code used in each time period is the corresponding login password in the next time period.
[0138] For example, the login password used in the aforementioned 12:00-14:00 time period is 000000, and the authorization verification code used is 111111, where 111111 is the login password that will be used from 14:00-16:00. Then at the end of the 12:00-14:00 time period, change the login password 000000 of 12:00-14:00 to the authorization verification code 111111 used in 12:00-14:00, and the generation will be at 16:00 The login password 222222 used in -18:00. Then after entering 14:00-16:00, the login password used by the wireless connection device is 111111, and the authorization verification code used is 222222. In this way, at the end of each time period, the above operation process is executed cyclically.
[0139] The above process can reduce the amount of calculation of the wireless connection device, and can quickly switch the login password.
[0140] Of course, the dynamic password and the authorization verification code may also be generated in other forms, and may not be associated with the time period, which is not limited in the embodiment of the present invention.
[0141] In the embodiment of the present invention, when the login password is updated, the new login password can be automatically calculated and generated according to the dynamic password algorithm. The specific dynamic encryption algorithm is not limited in the embodiment of the present invention.
[0142] Step 150: After the wireless connection device uses the new login password, remove the terminal with temporary login authority from the login state, and maintain the login state of the terminal with permanent login authority.
[0143] In the embodiment of the present invention, because within or at the end of the current time period, a new login password and a new authorization verification code are generated for use in the next time period. Then when entering the next cycle, the login password of the wireless connection device will be updated, that is, the wireless connection device will adopt the new login password. After the login password is updated, the embodiment of the present invention removes the terminal with the temporary login authority from the login state, so that it can no longer log in to the wireless connection device in the next time period. The login status of the terminal with permanent login permission is maintained so that it can continue to log in to the wireless connection device in the next time period.
[0144] The wireless connection device in the embodiment of the present invention provides a login password and a permission verification code in each time period. Then, for the terminal that only sent the login password, the temporary login authority is granted; and for the terminal that enters the login password and authorization verification code at the same time, the permanent login authority is granted. After each login password is updated, the terminal with temporary login permission is removed from the login status of the wireless connected device. Regardless of how the password is modified, the terminal with permanent login permission can continue to maintain its connection to the wireless connected device. Login status. The embodiment of the present invention has at least one of the following advantages:
[0145] 1. In the embodiment of the present invention, the password of the wireless connection device is automatically updated according to the time period. In this way, the password changes with time. Each password is changed to a new password after only a period of time, and because of the login password The dual verification method with the authorization verification code makes it more difficult for wireless connected devices to be brutally cracked, and the wireless signal is not easy to be rubbed.
[0146] For example, with a 6-digit login password and authorization verification code, there are 36 possibilities for each of 26 letters plus 10 numbers. Then for a 6-digit password, there are 36 possibilities to the 6th power. Two 6-digit passwords have 36 12th power (4.7*1018) possibilities, and the difficulty of cracking is greatly improved. In addition, the embodiment of the present invention adopts two dynamic password verification methods, and the login password and the authorization verification code will change over time, and the security is higher. Suppose a terminal has cracked the login password, but the terminal will be recognized as a terminal with temporary login authority. After a period of time, after the login password is automatically updated, the login status of the terminal will be automatically removed.
[0147] 2. For the owner B of the wireless connection device, the owner B can make his terminal send the login password and authorization verification code to the wireless connection device to obtain the permanent login permission; and for the user A who temporarily uses the wireless connection device In other words, owner B can let user A's terminal only send the login password to obtain temporary login authority. Since the wireless connection device can automatically update the login password according to the time period, after the login password is updated, the wireless connection device automatically disconnects the login status of the terminal with temporary login authority, so that the terminal cannot continue to log in to the wireless connection device. Therefore, there is no need for owner B to actively modify the login password of the wireless connection device, and further there is no need for the owner to modify the login password of each terminal after the login password is automatically modified, so as to ensure that the terminal of owner B is always In the login state of the wireless connection device. This greatly facilitates the owner B of the wireless connection device without unnecessary operations, and improves the flexibility of use of the wireless connection device.
[0148] 3. Display the login password and authorization verification code, which can facilitate the user to input and reduce the user's memory burden.

Example Embodiment

[0149] Example two
[0150] On the basis of the first embodiment, the embodiment of the present invention uses a temporary user table in the wireless connection device to grant temporary login authority to the terminal of the temporary user, and uses the resident user table to grant the login authority of the resident user to the terminal of the resident user .
[0151] Reference figure 2 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0152] Step 210: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.
[0153] Step 220: If the received authorization information includes the login password but not the authorization verification code, the terminal is allowed to log in, and the terminal's identity information is written into the temporary user table preset in the wireless connection device .
[0154] In the embodiment of the present invention, a temporary user table is preset in the wireless connection device. For a terminal that includes a login password but not a permission verification code, the method of writing the terminal's identity information into the temporary user table is to give A preferred way for the above terminal to temporarily log in authority.
[0155] Wherein, the identity information of the terminal may include information such as a physical address.
[0156] Step 230: If the received authority information includes the login password and the authority verification code, the terminal is allowed to log in, and the terminal's identity information is written into the resident user table preset in the wireless connection device.
[0157] In the embodiment of the present invention, the resident user table is preset in the wireless connection device, and for the terminal that has sent the login password and the authorization verification code, the method of writing the identity information of the terminal into the above resident user table is to give A preferred method for the above terminal resident login authority.
[0158] Step 240: Generate a new login password and a new authorization verification code for use in the next time period.
[0159] Step 250: After the wireless connection device uses the new login password, clear the identity information of each terminal recorded in the temporary user table, and maintain the login status of the corresponding terminal for the identity information of the terminal in the resident user table .
[0160] In the embodiment of the present invention, two tables are set, one is a temporary user table and the other is a resident user table. Both the temporary user table and the resident user table are used to receive data packets sent by the terminal for subsequent processing. For example, when connecting to the Internet, the data packet sent by the terminal recorded in the user table is received, and then forwarded to the Internet, or when files are transmitted, the file sent by the terminal recorded in the user table is received.
[0161] Among them, the identity information of the terminal maintained in the temporary user table, at the end of each time period, the wireless connection device side clears the identity information recorded in the temporary user table. The identity information in the resident user table will be retained after the password is changed, and the login status of the terminal with the resident login authority will continue to be maintained.
[0162] The embodiment of the present invention has at least one of the following advantages:
[0163] 1. The password of the wireless connection device is automatically updated according to the time period, so the password changes with time, and each password is changed to a new password after only a period of time, and due to the login password and authorization verification code The dual authentication method makes it more difficult for wireless connected devices to be brutally cracked, and wireless signals are not easy to be rubbed.
[0164] 2. For owner B of the wireless connection device, the temporary user table is used to maintain the temporary login authority, and the resident user table is used to maintain the resident login authority. Then after the wireless connection device changes the login password, when the login authority is maintained, Without traversing the identity information of each terminal, it can be maintained directly according to the nature of the table, which is simple to maintain and low in calculation. And there is no need for the owner of the connection device to perform redundant operations, which improves the flexibility of use of the wireless connection device.

Example Embodiment

[0165] Example three
[0166] On the basis of the first embodiment, the embodiment of the present invention adopts a user table with a preset permission field. In the user table, temporary users’ terminals are given temporary login permissions in the form of temporary marks, and permanent users’ terminals are given permanent The form of resident mark gives its resident user the login authority.
[0167] Reference image 3 , Which shows a schematic flowchart of a wireless connection authentication method according to an embodiment of the present invention, which may specifically include:
[0168] Step 310: In the current time period, judge the permission information sent by any terminal according to the login password and the permission verification code used by the wireless connection device in the current time period.
[0169] Step 320: If the received authorization information includes the login password but not the authorization verification code, allow the terminal to log in, and write the terminal's identity information into the user table preset in the wireless connection device, And write a temporary user mark in the authority field corresponding to the identity information in the user table.
[0170] In the embodiment of the present invention, a user table is preset in the wireless connection device, and a permission field is preset in the user table. For the terminal that includes the login password but not the authorization verification code, the identity information of the terminal is written into the above user table, and the temporary user mark is written in the authorization field corresponding to the identity information in the above user table. A preferred way for the above terminal to temporarily log in authority.
[0171] Wherein, the identity information of the terminal may include information such as a physical address. In the embodiment of the present invention, a permission field is added to the normal user table, and the terminal's identity information is temporarily marked under this field. For example, setting 0 as a temporary mark indicates that the corresponding terminal identity information is a temporary login authority.
[0172] Step 330: If the received permission information includes a login password and a permission verification code, the terminal is allowed to log in, and the identity information of the terminal is written into the user table preset in the wireless connection device, and The authorization field corresponding to the identity information in the user table is written with a resident user mark.
[0173] In the embodiment of the present invention, in the embodiment of the present invention, a user table is preset in the wireless connection device, and a permission field is preset in the user table. For the terminal that has sent the login password and the authorization verification code, write the terminal's identity information into the above user table, and write the temporary user mark in the authorization field corresponding to the identity information in the above user table, which is to give the above terminal A preferred way of resident login authority.
[0174] As mentioned above, under the permission field of the above user table, the identity information of the terminal that needs to be given permanent login permission is marked as permanent. For example, setting 1 as the permanent mark indicates that the corresponding terminal identity information is permanent Login permissions.
[0175] Step 340: Generate a new login password and a new authorization verification code for use in the next time period.
[0176] Step 350: After the wireless connection device uses the new login password, it marks the identity information corresponding to the temporary user in the user table, removes the information from the user table, and controls the information of the terminal in the resident user table. Identity information to maintain the login status of the corresponding terminal.
[0177] In the embodiment of the present invention, a new authority field is preset in a user table, and for the identity information of the terminal, the temporary login authority and the permanent login authority are marked, and then after the password is updated, the user table is marked according to the authority, The identity information corresponding to the temporary login permission mark is deleted, and the identity information of the permanent login permission mark is retained. Since there is no identity information of the temporary login permission terminal in the user table, its login status is removed, and for the user table Resident users mark the corresponding identity information and maintain the login status of the corresponding terminal.
[0178] The embodiment of the present invention has at least one of the following advantages:
[0179] 1. The password of the wireless connection device is automatically updated according to the time period, so the password changes with time, and each password is changed to a new password after only a period of time, and due to the login password and authorization verification code The dual authentication method makes it more difficult for wireless connected devices to be brutally cracked, and wireless signals are not easy to be rubbed.
[0180] 2. For the owner B of the wireless connection device, a user table is used to maintain different login permissions through different values ​​of the permission field. Then, after the wireless connection device changes the login password, the user can only It can be maintained by traversing a user table, which maintains fewer user tables and occupies less system resources. And there is no need for the owner of the connection device to perform redundant operations, which improves the flexibility of use of the wireless connection device.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Method and device for identifying virus apk

Owner:BEIJING QIHOO TECH CO LTD

Classification and recommendation of technical efficacy words

  • Increase the difficulty
  • Increased flexibility of use

Method for generating picture verification codes and system thereof

InactiveCN101976430AReduce the chance of identical captchasIncrease the difficulty2D-image generationImage data processing detailsMachine identificationTheoretical computer science
Owner:SHENZHEN YUCHU NETWORK TECH CO LTD

Credible safety computer

InactiveCN101324912ASolve the problem of real-time encrypted storageIncrease the difficultyDigital data authenticationSecurity enhancementCard reader
Owner:706 INST SECOND RES INST OF CHINAAEROSPACE SCI & IND

Camera control method and device

Owner:LE SHI ZHI ZIN ELECTRONIC TECHNOLOGY (TIANJIN) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products