Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for router security access and control

A secure access and router technology, applied in the transmission system, user identity/authority verification, electrical components, etc., can solve the problems of router malicious login, user security threat, authentication information easily cracked or stolen, etc., to improve access , Improve the effect of user experience

Active Publication Date: 2019-09-13
LEADCORE TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] A major feature of smart routing is that it can log in remotely through a mobile terminal, and then users can remotely control the smart routing at home through the Internet. At this time, the security of smart router access control is very important. The current smart routing remote access Password authentication is used for entry, and the authentication information is easily cracked or stolen, resulting in malicious login and control of the router, which will bring unimaginable threats to user security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for router security access and control
  • Method and system for router security access and control
  • Method and system for router security access and control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, various embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in each claim of the present application can be realized.

[0043] The first embodiment of the present invention relates to a method for router security access and control, the specific process is as follows figure 1 shown.

[0044] In step 101, the terminal and the router acquire legal application programs through the server and install them locally.

[0045] Among them, the serve...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the field of intelligent household and discloses a router security access and control method and a system. According to the technical scheme of the invention, a terminal sends the first authentication information and a public key to a router for registration. After the registration is finished, the terminal encrypts the second authentication information by utilizing a private key corresponding to the public key. The encrypted second authentication information is sent to the router to be decrypted, and then the second authentication information and the first authentication information are compared to complete the access authentication. After the access authentication is successfully done, the terminal encrypts a control instruction by utilizing the private key. After that, the control instruction is sent to the router to be decrypted and executed. Therefore, the access authentication is completed by utilizing the public key of the terminal and the first authentication information, so that the terminal can be safely and reliably connected with the router to control the router. As a result, the access control security of the router is greatly improved. Meanwhile, the user experience is improved.

Description

technical field [0001] The invention relates to the field of smart home, in particular to a method and system for safely accessing and controlling a router. Background technique [0002] Whether in the era of the Internet or the mobile Internet, the competition for traffic entry is always the top priority of Internet companies. Today, this kind of battle has spread to routers, and Internet companies have begun to land first with the concept of smart routers. [0003] With the continuous maturity of the entire intelligent routing system, in the future, intelligent routing will serve as a mobile Internet portal and a home information center, affecting people's lives. Since it is a home data center, a smart router may store a large amount of family data and personal data, involving a large amount of private information. It is self-evident to have a good home smart router entrance. [0004] A major feature of smart routing is that it can log in remotely through a mobile termi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 齐普张晓楠
Owner LEADCORE TECH