Nothing Special   »   [go: up one dir, main page]

CN112399345A - Network access method and device based on location encryption and readable storage medium - Google Patents

Network access method and device based on location encryption and readable storage medium Download PDF

Info

Publication number
CN112399345A
CN112399345A CN202011175962.2A CN202011175962A CN112399345A CN 112399345 A CN112399345 A CN 112399345A CN 202011175962 A CN202011175962 A CN 202011175962A CN 112399345 A CN112399345 A CN 112399345A
Authority
CN
China
Prior art keywords
network access
intelligent terminal
positioning information
network
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011175962.2A
Other languages
Chinese (zh)
Inventor
王阳
邹书强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sichuan Changhong Network Technology Co Ltd
Original Assignee
Sichuan Changhong Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sichuan Changhong Network Technology Co Ltd filed Critical Sichuan Changhong Network Technology Co Ltd
Priority to CN202011175962.2A priority Critical patent/CN112399345A/en
Publication of CN112399345A publication Critical patent/CN112399345A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a network access method, a device and a storage medium based on location encryption, wherein the method comprises the following steps: receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network; when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, and enabling the intelligent terminal to enter a key authentication mode; the invention solves the problem that the network access method in the prior art brings inconvenience to merchants and customers, prevents non-customers from occupying network broadband by encrypting the position, enables the customers in an effective range to log in without encryption, and improves the experience of the customers.

Description

Network access method and device based on location encryption and readable storage medium
Technical Field
The invention relates to the technical field of communication and network security, in particular to a network access method and device based on position encryption and a readable storage medium.
Background
At present, in some public places such as restaurants, coffee shops, cinemas and the like, merchants can install base station equipment to provide network services for customers, and when the wireless network standard based on 802.11 is used for authentication, two states, namely an open mode and an authentication mode comprising a wep wpa2, are followed, if encryption is not set, surrounding non-customers can occupy network bandwidth, the internet experience of the customers is influenced, and data can be intercepted by lawless persons more seriously; if the password is set to be encrypted for authentication, the customer needs to actively acquire the password each time, so that not only is the energy of the merchant shared, but also the experience of the customer is not facilitated.
Disclosure of Invention
Aiming at the defects in the prior art, the network access method, the device and the readable storage medium based on the position encryption solve the problem that the network access method in the prior art brings inconvenience to merchants and customers, prevent non-customers from occupying network broadband by means of the position encryption, enable the customers in an effective range to be free from secret login, and improve the experience of the customers.
In a first aspect, the present invention provides a network access method based on location encryption, which is applied to a base station, and the method includes: receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network; and when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, so that the intelligent terminal enters a key authentication mode.
Optionally, when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the smart terminal, so that the smart terminal enters a key authentication mode, where the method further includes: receiving a second network access request sent by the intelligent terminal, wherein the second network access request comprises a secret key of the target network; comparing the key of the target network with a preset key; and when the key of the target network is matched with a preset key, sending the authentication success response to the intelligent terminal, so that the intelligent terminal is accessed to the target network.
Optionally, before receiving the first network access request sent by the intelligent terminal, the method further includes: establishing connection with a map server; acquiring a plurality of image data of a target area, and enabling the map server to establish a planar map of the target area according to the plurality of image data; establishing a rectangular coordinate system in the planar map by taking a preset target point as an origin; and acquiring the preset coordinate system according to the rectangular coordinate system and the preset range.
Optionally, after sending an authentication success response to the intelligent terminal and enabling the intelligent terminal to successfully access the target network, the method further includes: sending a reporting positioning request to the intelligent terminal at regular time, so that the intelligent terminal sends second positioning information to the base station according to the reporting positioning request; judging whether the second positioning information exists in the preset coordinate system or not according to the second positioning information; and when the second positioning information does not exist in the preset coordinate system, disconnecting the connection with the intelligent terminal.
In a second aspect, the present invention provides a network access method based on location encryption, which is applied to an intelligent terminal, and the method includes: sending a first network access request to a base station of a target network, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position, and enabling the base station to generate a corresponding network access response according to the first positioning information in the first network access request; receiving a network access response sent by the base station; when the network access response is an authentication success response, accessing the target network; and entering a key authentication mode when the network access response is the key authentication response.
Optionally, when the network entry response is a key authentication response, after entering a key authentication mode, the method further includes: sending a second network access request to the base station, wherein the second network access request comprises a secret key of the target network, and the base station compares the secret key of the target network with a preset secret key; and when the key of the target network is matched with a preset key, receiving the authentication success response sent by the base station, and accessing the target network.
Optionally, before the sending the first network entry request to the base station of the target network, the method further includes: establishing connection with a map server; acquiring a first positioning image at the current position of a target area, wherein the first positioning image comprises a specific positioning icon; sending the first positioning image to the map server, so that the map server obtains the first positioning information of the intelligent terminal at the current position according to a specific positioning icon in the first positioning image; and receiving the first positioning information sent by the map server.
In a third aspect, the present invention provides a network access apparatus based on location-based encryption, which is applied to a base station, and the apparatus includes: the network access request receiving module is used for receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; the judging module is used for judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; the first sending module is used for sending an authentication success response to the intelligent terminal when the positioning information exists in the preset coordinate system, so that the intelligent terminal is accessed to a target network; and the second sending module is used for sending a key authentication response to the intelligent terminal when the first positioning information does not exist in the preset coordinate system, so that the intelligent terminal enters a key authentication mode.
In a fourth aspect, the present invention provides a network access device based on location-based encryption, which is characterized in that an intelligent terminal is applied, and the device includes: the network access request sending module is used for sending a first network access request to a base station of a target network, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position, and the base station generates a corresponding network access response according to the first positioning information in the first network access request; a network access response receiving module, configured to receive, by the intelligent terminal, a network access response sent by the base station; the network access module is used for accessing the target network when the network access response is an authentication success response; and the key authentication module is used for entering a key authentication mode when the network access response is the key authentication response.
In a fifth aspect, the present invention provides a readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of: receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network; and when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, so that the intelligent terminal enters a key authentication mode.
Compared with the prior art, the invention has the beneficial effects that:
according to the network access method based on the position encryption, a target data frame sent to a cloud server by an intelligent gateway is divided into a protocol data unit and a carrier data unit, the protocol data unit and the carrier data unit are analyzed by the cloud server in a separated mode step by step, so that the cloud server can perform matching judgment through a request type in the protocol data unit and carrier data of the carrier data unit, when the request type is matched with the carrier data, corresponding response is performed on a communication request, and the risk of responding to error data in the transmission process is effectively avoided; the target data frame comprises a plurality of reserved data units, the expandability of communication data is enhanced, and the target data frame can be suitable for data transmission under different mechanisms; therefore, the invention solves the problem of poor data communication compatibility between the intelligent gateway and the cloud server, and can enhance the expandability of communication data and the reliability and stability of data processing by standardizing the data frame format.
Drawings
Fig. 1 is a schematic flowchart illustrating a network access method based on location-based encryption according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of another location-based encryption network access method according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a planar rectangular coordinate system according to an embodiment of the present invention;
fig. 4 is a schematic flowchart illustrating a further location-based encryption network access method according to an embodiment of the present invention;
fig. 5 is a block diagram illustrating a network access device based on location encryption according to an embodiment of the present invention;
fig. 6 is a block diagram illustrating another network access device based on location-based encryption according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a schematic flowchart illustrating a network access method based on location-based encryption according to an embodiment of the present invention; as shown in fig. 1, when applied to a base station, the network access method based on location encryption specifically includes the following steps:
step S101, a first network access request sent by an intelligent terminal is received, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position.
In this embodiment, the execution main body includes a map server, a base station, and an intelligent terminal, where the map server may be connected to multiple base stations and multiple intelligent terminals, one base station manages one target network, one base station may be connected to multiple intelligent terminals, and one intelligent terminal may be connected to multiple base stations, but may only establish a connection relationship with one base station at the same time, so that one intelligent terminal needs to send a network access request to a base station in a specific network each time, and each network access request needs to include location information of the intelligent terminal at the current location.
Step S102, judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information, executing step S103 when the first positioning information exists in the preset coordinate system, and executing step S104 when the first positioning information does not exist in the preset coordinate system.
In this embodiment, a preset coordinate system is set in advance in the base station according to the current application environment, where location information included in the preset coordinate system is an effective location information point, the base station compares first location information acquired from a network access request with pre-stored effective location information, and it should be noted that the base station may receive network access requests sent from a plurality of different intelligent terminals at the same time, and acquire corresponding first location information from different network access requests respectively for comparison.
And step S103, sending an authentication success response to the intelligent terminal, so that the intelligent terminal is accessed to a target network.
Specifically, when the base station judges that the first positioning information exists in the preset coordinate system, the first positioning information is represented as a coordinate within an effective range, and a response of successful authentication is sent to the intelligent terminal, so that the intelligent terminal can be directly accessed to a corresponding target network without inputting a secret key, and convenience is brought to users and merchants.
Further, after the sending of the authentication success response to the intelligent terminal to enable the intelligent terminal to successfully access the target network, the method further includes: sending a reporting positioning request to the intelligent terminal at regular time, so that the intelligent terminal sends second positioning information to the base station according to the reporting positioning request; judging whether the second positioning information exists in the preset coordinate system or not according to the second positioning information; and when the second positioning information does not exist in the preset coordinate system, disconnecting the connection with the intelligent terminal.
It should be noted that, in order to enhance the effective management of the network and prevent the occurrence of a situation that a non-customer uses the network for a long time in another place after connecting the network in an effective range, after the intelligent terminal successfully accesses the target network, the base station may periodically send a reporting positioning request to the intelligent terminal for confirming whether the intelligent terminal is still within the range of the preset coordinate system; when the base station receives second positioning information sent by the intelligent terminal which is successfully connected, the second positioning information is compared with the preset coordinate system, when the second positioning information is not in the preset coordinate system, the intelligent terminal is disconnected, and when the second positioning information is in the preset coordinate system, the intelligent terminal is kept in the existing connection.
And step S104, sending a key authentication response to the intelligent terminal, and enabling the intelligent terminal to enter a key authentication mode.
Specifically, when the base station determines that the first positioning information does not exist in the preset coordinate system, the base station indicates that the first positioning information is not a coordinate within an effective range, and then sends a response of key authentication to the intelligent terminal, so that the intelligent terminal enters a key authentication mode, and can access the target network after a correct key of the target network needs to be input; the method is suitable for the users belonging to the store customers but needing to use the network outside the effective range, and further provides convenience and good experience for the customers.
Further, when the first positioning information does not exist in the preset coordinate system, a key authentication response is sent to the smart terminal, so that the smart terminal enters a key authentication mode, and the method further includes: receiving a second network access request sent by the intelligent terminal, wherein the second network access request comprises a secret key of the target network; comparing the key of the target network with a preset key; and when the key of the target network is matched with a preset key, sending the authentication success response to the intelligent terminal, so that the intelligent terminal is accessed to the target network.
It should be noted that, when the first positioning information does not exist in the preset coordinate system, the base station sends a key authentication response to the intelligent terminal, so that the intelligent terminal sends a second network access request of a key of a target network, the base station compares the key in the second network access request with a preset key, when the key of the target network matches the preset key, the intelligent terminal is accessed to the target network, and when the key of the target network does not match the preset key, the intelligent terminal is prohibited from accessing to the target network.
Compared with the prior art, the invention has the beneficial effects that:
the network access method based on the position encryption judges the positioning information sent by the intelligent terminal through the base station, if the positioning information is in an effective range preset by a merchant, the direct authentication is passed, so that the intelligent terminal can access a target network without providing a network key, and if the positioning information is not in the effective range preset by the merchant, a normal key authentication mode is entered; the problem that a network access method in the prior art brings inconvenience to merchants and customers is solved, non-customers are prevented from occupying network broadband through a position encryption mode, the customers in an effective range are free from secret login, and the experience of the customers is improved.
Fig. 2 is a schematic flowchart of another location-based encryption network access method according to an embodiment of the present invention; as shown in fig. 2, before the receiving of the first network access request sent by the intelligent terminal, the method further specifically includes the following steps:
step S201, establishing connection with a map server;
step S202, acquiring a plurality of image data of a target area, and enabling the map server to establish a planar map of the target area according to the plurality of image data;
step S203, establishing a rectangular coordinate system in the plane map by taking a preset target point as an origin;
and step S204, acquiring the preset coordinate system according to the rectangular coordinate system and the preset range.
It should be noted that, in this embodiment, the base station needs to preset a preset coordinate system before receiving the network access request of the terminal, and since the preset coordinate systems in different application scenes are not used, it is necessary to establish a map for each application scene, and then determine an effective coordinate system for a corresponding plane map. Firstly, a base station can establish communication connection with a map server through a corresponding web page or a mobile phone APP, and acquire field images of multiple directions and multiple dimensions in a target area to obtain multiple image data, wherein the base station with a camera shooting function can acquire the images, and the base station can acquire the multiple image data in a form of uploading field photos; secondly, the base station sends the image data to a map server through a web page or a mobile phone APP, so that the map server establishes a planar map according to the image data; then, the base station establishes a rectangular coordinate system with the base station or other target points as an origin in the plane map, and obtains a preset coordinate system governed by the base station by setting a preset boundary in the rectangular coordinate system. As shown in fig. 3, in this embodiment, a rectangular coordinate system is established with a base station as an origin, a dashed line frame is a preset boundary of the rectangular coordinate system, a range in the dashed line frame is an effective coordinate position, that is, a preset coordinate system, and the target network can be accessed without key authentication as long as the positioning information sent by the intelligent terminal belongs to the effective position within the dashed line frame; of course, the dashed box may adjust the corresponding range through the web page of the base station or the mobile APP.
In another network access method based on location encryption provided by the invention, a location information field is added in a probe request management frame of an intelligent terminal, and the information is acquired by a location module carried by a station, such as gps and the like; the base station side presets effective position information points in advance in a coordinate mode by taking the base station side as an origin, calculates and judges when position information carried by a probe request is received, and returns a return value whether the position information is effective or not through a probe response; when the intelligent terminal is located at the effective position, the base station can pass authentication of any secret key, and the data encryption mode is kept unchanged. The effective position can be set through a web management interface and a mobile phone app, the effective position can be set to the effective position in the coverage range in a mode of dragging an icon, and the common authentication mode is still reserved.
The method comprises the following concrete steps: (1) the base station equipment can set an effective position through a web and a mobile phone APP developed in a matching way. (2) The detection frame sent by the Station of the intelligent terminal carries position information. (3) The base station calculates the reasonable range of the probe frame carrying information of the station of the effective position; (4) if the specified legal position is identified, the direct authentication is passed, and if the specified legal position is not the preset position, the authentication is required to be passed through a common authentication mode.
For example, as shown in fig. 3, in a coffee shop, a base station is installed at a central location of the coffee shop, a coordinate location with the base station as an origin is set through an app or a location management interface, and is recorded and stored in a database of the base station, when a customer at a valid location initiates a connection request, location information carried in the network access request is calculated, if the location is within a certain range of the set value, all authentication keys are passed, so that the customer can quickly connect to the base station for internet access without key authentication when using the system, and if the location is not a valid location, authentication is required in a normal mode.
Fig. 4 is a schematic flow chart of another location-based encryption network access method according to an embodiment of the present invention, and as shown in fig. 4, when the location-based encryption network access method is applied to an intelligent terminal, the location-based encryption network access method further includes the following steps:
step S301, a first network access request is sent to a base station of a target network, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position, and the base station generates a corresponding network access response according to the first positioning information in the first network access request.
Step S302, receiving a network access response sent by the base station.
Step S303, determining whether the network access response is an authentication success response, executing step S304 when the network access response is the authentication success response, and executing step S305 when the network access response is not the authentication success response.
And step S304, accessing the target network.
Step S305, enter a key authentication mode.
Step S306, sending a second network access request to the base station, where the second network access request includes the key of the target network, so that the base station compares the key of the target network with a preset key.
Step S307, when the key of the target network is matched with a preset key, receiving the authentication success response sent by the base station, and accessing the target network.
In an embodiment of the present invention, before sending the first network entry request to the base station of the target network, the method further includes: establishing connection with a map server; acquiring a first positioning image at the current position of a target area, wherein the first positioning image comprises a specific positioning icon; sending the first positioning image to the map server, so that the map server obtains the first positioning information of the intelligent terminal at the current position according to a specific positioning icon in the first positioning image; and receiving the first positioning information sent by the map server.
It should be noted that, when the intelligent terminal needs to join the target network, it first needs to establish a connection with the map server, and obtains the positioning information of the current position by sending the positioning image of the current position to the map server; secondly, the intelligent terminal sends a network access request to a base station of a target network, wherein the network access request carries positioning information of the current position, so that the base station generates a corresponding network access response according to the positioning information and sends the network access response to the intelligent terminal; then, the intelligent terminal directly accesses the target network when judging that the network access response is a network access successful response, when the network access response is a network access key authentication mode, the intelligent terminal sends a network access request comprising a demon to a base station, the base station compares the key with a preset key, when the key is matched with the preset key, the intelligent terminal successfully accesses the target network, and when the key is not matched with the preset key, the base station rejects the access of the intelligent terminal; therefore, the embodiment of the invention solves the problem that the network access method in the prior art brings inconvenience to merchants and customers, prevents non-customers from occupying network broadband by encrypting the position, enables the customers in an effective range to log in without secret, and improves the experience of the customers.
Fig. 5 is a block diagram illustrating a network access device based on location encryption according to an embodiment of the present invention; as shown in fig. 5, the network access device based on location based encryption when applied to a base station includes:
a network access request receiving module 510, configured to receive a first network access request sent by an intelligent terminal, where the first network access request includes first positioning information of the intelligent terminal at a current location;
a determining module 520, configured to determine whether the first positioning information exists in a preset coordinate system according to the first positioning information;
a first sending module 530, configured to send an authentication success response to the intelligent terminal when the positioning information exists in the preset coordinate system, so that the intelligent terminal is accessed to a target network;
a second sending module 540, configured to send a key authentication response to the smart terminal when the first positioning information does not exist in the preset coordinate system, so that the smart terminal enters a key authentication mode.
In an embodiment of the invention, the apparatus further comprises: the second network access request access module is used for receiving a second network access request sent by the intelligent terminal, wherein the second network access request comprises a secret key of the target network; the comparison module is used for comparing the key of the target network with a preset key; and the third sending module is used for sending the authentication success response to the intelligent terminal when the key of the target network is matched with a preset key, so that the intelligent terminal is accessed to the target network.
In an embodiment of the invention, the apparatus further comprises: the connection establishing module is used for establishing connection with the map server; the map server is used for establishing a planar map of the target area according to the plurality of image data; the rectangular coordinate system establishing module is used for establishing a rectangular coordinate system in the planar map by taking a preset target point as an origin; and the preset coordinate system acquisition module is used for acquiring the preset coordinate system according to the rectangular coordinate system and the preset range.
In an embodiment of the invention, the apparatus further comprises: a reporting positioning request module, configured to send a reporting positioning request to the intelligent terminal at regular time, so that the intelligent terminal sends second positioning information to the base station according to the reporting positioning request; the second positioning information judging module is used for judging whether the second positioning information exists in the preset coordinate system or not according to the second positioning information; and the disconnection module is used for disconnecting the connection with the intelligent terminal when the second positioning information does not exist in the preset coordinate system.
Fig. 6 is a block diagram illustrating another network access device based on location-based encryption according to an embodiment of the present invention; as shown in fig. 6, the network access device based on location encryption when applied to the smart terminal includes:
a network access request sending module 610, configured to send a first network access request to a base station of a target network, where the first network access request includes first positioning information of the intelligent terminal at a current location, so that the base station generates a corresponding network access response according to the first positioning information in the first network access request;
a network access response receiving module 620, configured to receive, by the intelligent terminal, a network access response sent by the base station;
a network access module 630, configured to access the target network when the network access response is an authentication success response;
and the key authentication module 640 is configured to enter a key authentication mode when the network access response is a key authentication response.
In an embodiment of the invention, the apparatus further comprises: a second network access request sending module, configured to send a second network access request to the base station, where the second network access request includes a key of the target network, and the base station compares the key of the target network with a preset key; and the first receiving module is used for receiving the authentication success response sent by the base station and accessing the target network when the key of the target network is matched with a preset key.
In an embodiment of the invention, the apparatus further comprises: the first establishing module is used for establishing connection with a map server; the positioning image acquisition module is used for acquiring a first positioning image at the current position of a target area, wherein the first positioning image comprises a specific positioning icon; the positioning image sending module is used for sending the first positioning image to the map server, so that the map server obtains the first positioning information of the intelligent terminal at the current position according to a specific positioning icon in the first positioning image; and the positioning information receiving module is used for receiving the first positioning information sent by the map server.
In another embodiment of the present invention, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network; and when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, so that the intelligent terminal enters a key authentication mode.
In a further embodiment of the invention, a readable storage medium is provided, on which a computer program is stored which, when being executed by a processor, realizes the following steps: receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position; judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information; when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network; and when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, so that the intelligent terminal enters a key authentication mode.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a non-volatile computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the program is executed. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A network access method based on location encryption, applied to a base station, the method comprising:
receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position;
judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information;
when the first positioning information exists in the preset coordinate system, sending an authentication success response to the intelligent terminal, and enabling the intelligent terminal to access a target network;
and when the first positioning information does not exist in the preset coordinate system, sending a key authentication response to the intelligent terminal, so that the intelligent terminal enters a key authentication mode.
2. The location-based encryption network access method according to claim 1, wherein when the first location information does not exist in the preset coordinate system, after sending a key authentication response to the smart terminal to cause the smart terminal to enter a key authentication mode, the method further comprises:
receiving a second network access request sent by the intelligent terminal, wherein the second network access request comprises a secret key of the target network;
comparing the key of the target network with a preset key;
and when the key of the target network is matched with a preset key, sending the authentication success response to the intelligent terminal, so that the intelligent terminal is accessed to the target network.
3. The location-based encryption network access method according to claim 1, wherein before receiving the first network access request sent by the intelligent terminal, the method further comprises:
establishing connection with a map server;
acquiring a plurality of image data of a target area, and enabling the map server to establish a planar map of the target area according to the plurality of image data;
establishing a rectangular coordinate system in the planar map by taking a preset target point as an origin;
and acquiring the preset coordinate system according to the rectangular coordinate system and the preset range.
4. The location-based encryption network access method of claim 1, wherein after sending an authentication success response to the intelligent terminal to enable the intelligent terminal to successfully access a target network, the method further comprises:
sending a reporting positioning request to the intelligent terminal at regular time, so that the intelligent terminal sends second positioning information to the base station according to the reporting positioning request;
judging whether the second positioning information exists in the preset coordinate system or not according to the second positioning information;
and when the second positioning information does not exist in the preset coordinate system, disconnecting the connection with the intelligent terminal.
5. A network access method based on location encryption is applied to an intelligent terminal, and the method comprises the following steps:
sending a first network access request to a base station of a target network, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position, and enabling the base station to generate a corresponding network access response according to the first positioning information in the first network access request;
receiving a network access response sent by the base station;
when the network access response is an authentication success response, accessing the target network;
and entering a key authentication mode when the network access response is the key authentication response.
6. The location-based encryption network access method of claim 5, wherein when the network access response is a key authentication response, after entering a key authentication mode, the method further comprises:
sending a second network access request to the base station, wherein the second network access request comprises a secret key of the target network, and the base station compares the secret key of the target network with a preset secret key;
and when the key of the target network is matched with a preset key, receiving the authentication success response sent by the base station, and accessing the target network.
7. The location-based encryption network access method of claim 5, wherein prior to sending the first network-entry request to the base station of the target network, the method further comprises:
establishing connection with a map server;
acquiring a first positioning image at the current position of a target area, wherein the first positioning image comprises a specific positioning icon;
sending the first positioning image to the map server, so that the map server obtains the first positioning information of the intelligent terminal at the current position according to a specific positioning icon in the first positioning image;
and receiving the first positioning information sent by the map server.
8. A network access device based on location encryption, applied to a base station, the device comprising:
the network access request receiving module is used for receiving a first network access request sent by an intelligent terminal, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position;
the judging module is used for judging whether the first positioning information exists in a preset coordinate system or not according to the first positioning information;
the first sending module is used for sending an authentication success response to the intelligent terminal when the positioning information exists in the preset coordinate system, so that the intelligent terminal is accessed to a target network;
and the second sending module is used for sending a key authentication response to the intelligent terminal when the first positioning information does not exist in the preset coordinate system, so that the intelligent terminal enters a key authentication mode.
9. A network access device based on location encryption, characterized in that, an intelligent terminal is applied, the device comprises:
the network access request sending module is used for sending a first network access request to a base station of a target network, wherein the first network access request comprises first positioning information of the intelligent terminal at the current position, and the base station generates a corresponding network access response according to the first positioning information in the first network access request;
a network access response receiving module, configured to receive, by the intelligent terminal, a network access response sent by the base station;
the network access module is used for accessing the target network when the network access response is an authentication success response;
and the key authentication module is used for entering a key authentication mode when the network access response is the key authentication response.
10. A readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN202011175962.2A 2020-10-29 2020-10-29 Network access method and device based on location encryption and readable storage medium Pending CN112399345A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011175962.2A CN112399345A (en) 2020-10-29 2020-10-29 Network access method and device based on location encryption and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011175962.2A CN112399345A (en) 2020-10-29 2020-10-29 Network access method and device based on location encryption and readable storage medium

Publications (1)

Publication Number Publication Date
CN112399345A true CN112399345A (en) 2021-02-23

Family

ID=74598445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011175962.2A Pending CN112399345A (en) 2020-10-29 2020-10-29 Network access method and device based on location encryption and readable storage medium

Country Status (1)

Country Link
CN (1) CN112399345A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113115414A (en) * 2021-04-28 2021-07-13 深圳掌酷软件有限公司 Optimal network selection method and system based on intelligent terminal
CN114584304A (en) * 2022-04-25 2022-06-03 杭州海康威视数字技术股份有限公司 Edge equipment intelligent authentication method, system and equipment based on artificial disturbance
WO2023169131A1 (en) * 2022-03-07 2023-09-14 华为技术有限公司 Positioning method, apparatus, and computer-readable storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036239A (en) * 2009-09-27 2011-04-27 中国移动通信集团山东有限公司 Method for accessing wireless business terminal, device and system
US20140168685A1 (en) * 2010-09-17 2014-06-19 Printeron Inc. System and method for releasing print jobs based on location information
CN104023315A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Password input method and device based on geographical location information
US20180173883A1 (en) * 2016-12-15 2018-06-21 Blackberry Limited System for secure context-aware password management
CN108966140A (en) * 2018-05-25 2018-12-07 江西午诺科技有限公司 network control method, system, mobile terminal and storage medium
CN108966218A (en) * 2018-06-22 2018-12-07 四川斐讯信息技术有限公司 A kind of wireless network access method and system based on management terminal control
CN110716209A (en) * 2019-09-19 2020-01-21 浙江大华技术股份有限公司 Map construction method, map construction equipment and storage device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102036239A (en) * 2009-09-27 2011-04-27 中国移动通信集团山东有限公司 Method for accessing wireless business terminal, device and system
US20140168685A1 (en) * 2010-09-17 2014-06-19 Printeron Inc. System and method for releasing print jobs based on location information
CN104023315A (en) * 2014-06-20 2014-09-03 中科创达软件股份有限公司 Password input method and device based on geographical location information
US20180173883A1 (en) * 2016-12-15 2018-06-21 Blackberry Limited System for secure context-aware password management
CN108966140A (en) * 2018-05-25 2018-12-07 江西午诺科技有限公司 network control method, system, mobile terminal and storage medium
CN108966218A (en) * 2018-06-22 2018-12-07 四川斐讯信息技术有限公司 A kind of wireless network access method and system based on management terminal control
CN110716209A (en) * 2019-09-19 2020-01-21 浙江大华技术股份有限公司 Map construction method, map construction equipment and storage device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李强: "5G移动终端认证状态漫游和传递方法", 《电子科技大学学报》 *
陈慧岩 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113115414A (en) * 2021-04-28 2021-07-13 深圳掌酷软件有限公司 Optimal network selection method and system based on intelligent terminal
CN113115414B (en) * 2021-04-28 2021-11-26 深圳掌酷软件有限公司 Optimal network selection method and system based on intelligent terminal
WO2023169131A1 (en) * 2022-03-07 2023-09-14 华为技术有限公司 Positioning method, apparatus, and computer-readable storage medium
CN114584304A (en) * 2022-04-25 2022-06-03 杭州海康威视数字技术股份有限公司 Edge equipment intelligent authentication method, system and equipment based on artificial disturbance
CN114584304B (en) * 2022-04-25 2022-08-16 杭州海康威视数字技术股份有限公司 Edge equipment intelligent authentication method, system and equipment based on artificial disturbance

Similar Documents

Publication Publication Date Title
CN112399345A (en) Network access method and device based on location encryption and readable storage medium
CN104519020B (en) Manage method, server and the system of wireless network login password sharing function
US11863543B2 (en) Network device proximity-based authentication
US10757102B2 (en) Methods, apparatus, and systems for identity authentication
US9197639B2 (en) Method for sharing data of device in M2M communication and system therefor
CN103874065B (en) A kind of method and device for judging customer location exception
US20180041893A1 (en) Method and system of multi-terminal mapping to a virtual sim card
WO2018077053A1 (en) Authentication method and device for internet of things platform, and computer storage medium thereof
CN110266656B (en) Secret-free authentication identity identification method and device and computer equipment
CN111385274B (en) Cross-network service calling method and device, feature gateway and identity recognition system
CN102960005A (en) Authentication system and authentication method therefor in a wireless LAN environment
US20230063852A1 (en) Mobile network-based authentication system
CN107786937B (en) Method for realizing mobile terminal localization roaming, mobile terminal and roaming server
GB2520938A (en) Mobile device location
KR101910737B1 (en) System for checking communication quality according to position of user mobile and control method thereof
KR101912834B1 (en) Wlan auto registration system
CN110543751A (en) Data processing method and device and server
CN113225756B (en) Network residing method, device, terminal and computer readable storage medium
CN111417115B (en) Secret-free authentication method and system based on data link
CN113472895B (en) System, method, and storage medium for providing service portal
CN113079505B (en) User authentication method, core network side device and computer readable storage medium
CN111246387B (en) Method and system for acquiring position information by broadband network gateway
KR101395835B1 (en) Terminal device and authentication manageent apparatus, control method thereof
US20230198996A1 (en) Methods, communication device and system for handling access to a service of an authorization-requiring network
CN116436667A (en) Authority authentication method, system, device, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210223