Home network connection authentication method and device, electronic equipment and storage medium

A network connection and home network technology, applied in the field of electronic equipment, storage media, devices, and home network connection authentication methods, can solve the problem of poor user experience, WiFi is vulnerable to attack and cracking, and routers have no network management and security protection, etc. question

Inactive Publication Date: 2018-09-28
BEIJING KNOWNSEC INFORMATION TECH
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] When accessing the Internet by setting up a wireless network, the wireless network is more vulnerable to intrusion than the wired network, because the computer at the attacked end and the computer at the attacking end do not need to be connected on a network cable device, as long as the other party is within the effective range of your wireless router or repeater You can enter your internal network and access resources. If the data you transmit on the internal network is not encrypted, it is more likely that others will spy on your data privacy
[0003] Due to the vulnerability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Home network connection authentication method and device, electronic equipment and storage medium
  • Home network connection authentication method and device, electronic equipment and storage medium
  • Home network connection authentication method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0031] See image 3 , Is a home network connection authentication method applied to the above-mentioned network device 120 provided by an embodiment of the present invention. The following will combine image 3 Explain the steps involved.

[0032] Step S101: Receive a network connection request initiated by a mobile terminal.

[0033] When the mobile terminal turns on the WiFi broadcast and enters the range covered by the network of the home intranet, the network device can receive the WiFi broadcast information of the mobile terminal, that is, receive the network connection request initiated by the mobile terminal.

[0034] Step S102: Obtain the MAC address to be verified and the network connection history record from the network connection request.

[0035] The network device records and analyzes WiFi broadcast information (network connection request). Further, when the network device analyzes the network connection request, it obtains the MAC address to be verified and the network c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a home network connection authentication method and device, electronic equipment and a storage medium, belonging to the technical field of network security. The method includes the following steps: receiving a network connection request initiated by a mobile terminal; obtaining an MAC address to be verified and a network connection historical record from the network connection request; judging whether the MAC address to be verified and the network connection historical record are obtained correctly; when the MAC address to be verified and the network connection historical record are both obtained correctly, judging whether the mobile terminal has a network access authority based on the MAC address to be verified and the network connection historical record; and when the mobile terminal has the network access authority, allowing the mobile terminal to access a current network. The method adopts a fully-automatic verification mode, and thus the manpower cost of manual management can be reduced, the problem of security management of existing home networks can also be solved, and the security of network data can be improved.

Description

Technical field [0001] The invention belongs to the field of complete network technology, and specifically relates to a home network connection authentication method, device, electronic equipment and storage medium. Background technique [0002] When accessing the Internet by setting up a wireless network, the wireless network is more susceptible to intrusion than the wired network, because the computer on the attacked side and the computer on the attacking side do not need to be connected to the network cable device, as long as the other party is within the effective range of your wireless router or repeater Inside, you can enter your internal network and access resources. If the data you transmit on the internal network is not encrypted, you are more likely to be spied on your data privacy. [0003] Due to the vulnerability of WiFi, WiFi is easy to be attacked and cracked. There are also various cracking tools on the market. The emergence of Chuangwang will not only slow down the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W48/18H04L29/06H04W12/71
CPCH04L63/08H04L63/0876H04W12/06H04W48/18
Inventor 田春燕付鹏飞
Owner BEIJING KNOWNSEC INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products