WO2025059999A1 - Method, device, medium and apparatus for network security configuration - Google Patents
Method, device, medium and apparatus for network security configuration Download PDFInfo
- Publication number
- WO2025059999A1 WO2025059999A1 PCT/CN2023/120471 CN2023120471W WO2025059999A1 WO 2025059999 A1 WO2025059999 A1 WO 2025059999A1 CN 2023120471 W CN2023120471 W CN 2023120471W WO 2025059999 A1 WO2025059999 A1 WO 2025059999A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless adaptor
- webpage
- user terminal
- network apparatus
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to the technical field of network security, and specifically to a method, a device, a medium and an apparatus for network security configuration.
- a wireless adaptor is working at the same time in two network layers: TCP/IP layer and MAC layer.
- the TCP/IP layer is used to access a web server of the wireless adaptor itself (i.e. access a webpage of the wireless adaptor)
- the MAC layer is used to directly communicate with a network apparatus which is connected with the wireless adaptor.
- the wireless adaptor directly communicates with the network apparatus via the MAC layer. That is, the communication data are transmitted by a manner of passthrough.
- the wireless adaptor uses the MAC layer to communicate with the network apparatus via a manner of passthrough. Therefore, in a case when the default WiFi password is not modified, any user knowing the default WiFi password can directly access the webpage of the network apparatus via the wireless adapto r, which is not secure/safe.
- a method, a device, a medium and an apparatus for network security configuration are provided, which can improve the access security.
- a method for network security configuration is provided in an embodiment of the present invention.
- the method is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus, and the method comprises:
- the method as provided in the embodiment (s) of the present invention may further comprise: after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
- the method as provided in the embodiment (s) of the present invention may further comprise:
- the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
- the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor; and/or the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
- the step of obtaining a first IP address corresponding to the network apparatus comprises: using a detection message to obtain the network apparatuses in the current local area network where the wireless adaptor is positioned as well as the IP addresses of the network apparatuses; and using the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
- the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
- the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
- a first determination module used for: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password
- an address modification module used for: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;
- a first restarting module used for: performing restarting
- a password modification module used for: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
- an embodiment of the present invention provides a computer-readable storage medium. It is stored thereon with a computer program which, when being executed in a computer, makes the computer implement the method as provided in the first aspect.
- an embodiment of the present invention provides a calculation apparatus. It comprises a memory and a processor wherein the memory is stored therein with executable codes, and when the executable codes are executed by the processor, the method as provided in the first aspect is implemented.
- the wireless adaptor when the user terminal sends a webpage access request to the wireless adaptor for the first time, no matter which of the wireless adaptor and the network apparatus is the access target, the wireless adaptor will control the browser of the user terminal to jump to the password modification webpage in the first IP address such that the user can forcibly modify the WiFi password.
- the wireless adaptor even if access to the webpage of the wireless adaptor and access to the webpage of the network apparatus are implemented based on two different network layers, according to the method as provided in the embodiment (s) of the present invention, in a case when the user terminal sends a webpage access request to the wireless adaptor for the first time and the access target is the network apparatus, it is possible to ask the user to modify the default WiFi password.
- the mobile terminal of the user can not be in WiFi connection with the wireless adaptor. Therefore, the user can not access the webpage of the web server of the wireless adaptor, and also can not access the webpage of the web server of the network apparatus. Thus, the security for access can be improved.
- the wireless adaptor may be connected, via the RJ45 connector, with the network apparatus. This can improve stability and reliability of communication between the wireless adaptor and the network apparatus.
- the IP address of the wireless adaptor is restored to the original IP address.
- the user terminal will enter the webpage of the web server of the wireless adaptor, and in turn perform related configuration to the wireless adaptor, such that the user can normally configure other information of the wireless adaptor after the password is modified.
- Figure 1 is a connection diagram of a wireless adaptor, a user terminal and a network apparatus in an embodiment of the present invention
- Figure 3 is a block diagram of a device for network security configuration in an embodiment of the present invention.
- a method for network security configuration is provided in an embodiment of the present invention.
- the method is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus.
- a wireless adaptor 100 is connected with a user terminal 200 and a network apparatus 400, respectively.
- the wireless adaptor 100 may communicate with the user terminal 200, and also may communicate with the network apparatus 400.
- the wireless adaptor 100 is a communication medium between the user terminal 200 and the network apparatus 400.
- the wireless adaptor 100 has its own web server, and also the network apparatus 400 has its own web server.
- the user terminal 200 may access the web server of the wireless adaptor 100 and the web server of the network apparatus 400 by a browser.
- the user may input a first domain name in a browser of the user terminal 200 and thus can access the web server of the wireless adaptor 100.
- the user may input a second domain name in the browser of the user terminal 200 and thus can access the web server of the network apparatus 400. Therefore, the user terminal 200 can directly access a webpage provided by the web server of the wireless adaptor 100, and also can access a webpage provided by the web server of the network apparatus 400 via the wireless adaptor 100.
- the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor.
- the user can configure information of the wireless adaptor on the configuration webpage, such as configuring the channel, the bandwidth, the password, etc.
- the webpage (s) provided by the web server of the wireless adaptor it is also possible to show a topological structure of the wireless adaptor, and other information.
- the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
- the network apparatus is a server driving system
- the webpage provided by the web server of the server driving system comprises the information of various monitoring indexes of the server driving system such that the operators can know the state of the server driving system.
- the webpage (s) provided by the web server of the server driving system may further comprise some configuration items for the server driving system.
- the user terminal may be a mobile phone, a tablet computer, or other portable calculation/computing apparatuses.
- the network apparatus may be selected according to specific application circumstances.
- the network apparatus may be a server driving system.
- it may be another type of apparatus.
- the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
- the wireless adaptor may be connected, via the RJ45 connector, with the network apparatus.
- the RJ45 connector consists of a plug and a socket.
- the connector consisting of these two elements provides a physical connection manner and can improve stability and reliability of communication between the wireless adaptor and the network apparatus.
- the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
- the WiFi connection is provided between the wireless adaptor and the user terminal such that the user can use the user terminal to achieve remote access to the wireless adaptor and the network apparatus and achieve remote operation for network security configuration, providing convenience for the user.
- the method comprises the following steps S110 ⁇ S140:
- the wireless adaptor After the wireless adaptor is powered on, it is necessary to determine whether the current WiFi password in the wireless adaptor is the default password. If it is the default password, it means that the WiFi password is not modified and the subsequent S120 ⁇ S140 will be performed. If it is not the default password, it means that the WiFi password has been modified and thus it is not necessary to perform the subsequent S120 ⁇ S140.
- the IP address of the network apparatus is the first IP address
- the IP address of the wireless adaptor is the second IP address. If the current WiFi password in the wireless adaptor is still the default password, the IP address of the wireless adaptor will be modified to the first IP address such that the IP address of the wireless adaptor and that of the network apparatus are consistent.
- the browser of the user terminal will jump to the webpage corresponding to the first IP address.
- the browser of the user terminal will jump to the webpage corresponding to the first IP address.
- the step of obtaining a first IP address corresponding to the network apparatus in S120 may comprise:
- the wireless adaptor may use a detection message to obtain the network apparatuses in the current local area network as well as the IP addresses of the network apparatuses, and use the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
- the reason for choosing the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus is: it is only necessary to choose one network apparatus to perform password modification, and then the current WiFi password configured in the wireless adaptor will not be the default password any more, and thus it is not necessary to perform S110 ⁇ S140 again.
- the wireless adaptor performs restarting automatically. After the wireless adaptor is restarted, the modified IP address becomes effective.
- S140 after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
- the wireless adaptor may receive a webpage access request to the wireless adaptor, or may receive a webpage access request to the network apparatus. No matter which access request is received, the user terminal will jump to the password modification webpage of the first IP address such that the user can forcibly modify the password.
- the user After the password is modified, the user knows the modified WiFi password.
- the user terminal can be in WiFi connection with the wireless adaptor.
- the wireless adaptor knows, by the specific information in the webpage access request, that it is to access the webpage of the web server of the wireless adaptor, then the webpage of the web server of the wireless adaptor is accessed by the upper-layer TCP/IP layer.
- the user After the password is modified, the user knows the modified WiFi password.
- the user terminal can be in WiFi connection with the wire less adaptor.
- the wireless adaptor knows, by the specific information in the webpage access request, that it is to access the webpage of the web server of the network apparatus, then the webpage of the web server of the network apparatus is accessed by the lower-layer MAC layer.
- the user terminal can access the network apparatus only by the modified password and only when it is in WiFi connection with the wireless adaptor, significantly improving security for network access.
- the method as provided in the embodiment (s) of the present invention may further comprise:
- the IP address of the wireless adaptor is restored to the original IP address.
- the user terminal will enter the webpage of the web server of the wireless adaptor, and in turn perform related configuration to the wireless adaptor.
- the method as provided in the embodiment (s) of the present invention may further comprise:
- the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
- the current WiFi password is not the default password, it means that the WiFi password has been modified.
- normal access is available.
- the target webpage to be jumped by the user terminal is the webpage provided by the web server of the wireless adaptor.
- the target webpage to be jumped by the user terminal is the webpage provided by the web server of the network apparatus.
- the webpage provided by the web server of the wireless adaptor may comprise a configuration webpage for the wireless adaptor.
- the webpage provided by the web server of the network apparatus may comprise a state monitoring webpage for the network apparatus.
- the wireless adaptor when the user terminal sends a webpage access request to the wireless adaptor for the first time, no matter which of the wireless adaptor and the network apparatus is the access target, the wireless adaptor will control the browser of the user terminal to jump to the password modification webpage in the first IP address such that the user can forcibly modify the WiFi password.
- the wireless adaptor even if access to the webpage of the wireless adaptor and access to the webpage of the network apparatus are implemented based on two different network layers, according to the method as provided in the embodiment (s) of the present invention, in a case when the user terminal sends a webpage access request to the wireless adaptor for the first time and the access target is the network apparatus, it is possible to ask the user to modify the default WiFi password.
- the mobile terminal of the user can not be in WiFi connection with the wireless adaptor. Therefore, the user can not access the webpage of the web server of the wireless adaptor, and also can not access the webpage of the web server of the network apparatus. As can be seen, the security for access can be improved.
- a device for network security configuration is provided in an embodiment of the present invention.
- the device is arranged on a wireless adaptor which is connected to a user terminal and a network apparatus.
- the device 300 for network security configuration comprises:
- a first determination module 310 used for: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password
- an address modification module 320 used for: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;
- a first restarting module 330 used for: performing restarting
- a password modification module 340 used for: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
- the device may further comprise:
- an address restoring module used for: after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
- the device may further comprise:
- a jump controlling module used for: If the current WiFi password is not the default password, when the webpage access request sent from the user terminal is received, controlling the user terminal to jump to a target webpage corresponding to the webpage access request;
- the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
- the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor; and/or the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
- the address modification module is specifically used for:
- the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
- the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
- an embodiment of the present invention provides a computer-readable storage medium. It is stored thereon with computer instructions which, when being executed by the processor, make the processor perform the method as provided in the first aspect.
- the storage medium is stored thereon with software program codes for implementing the function (s) of any one of the above embodiments, such that a computer (or CPU or MPU) of the system or device can read and perform the program codes stored in the storage medium.
- the program codes read from the storage medium can, by themselves, achieve the function (s) of any one of the above embodiments. Therefore, the program codes and the storage medium storing the program codes constitute a portion of the present invention.
- the embodiments of the storage media for providing program codes comprise: floppy disk, hard disk, magneto-optical disk, optical disk (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW) , magnetic tape, non-volatile memory card and ROM.
- optical disk such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW
- magnetic tape such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW
- non-volatile memory card such as CD-ROM, CD-R, CD-RW, DVD-RAM, DVD-RW, DVD+RW
- ROM non-volatile memory card
- the program codes read from the storage medium is written into a storage provided in an extension board inserted in a computer or is written into a storage provided in an extension module connected with a computer. Then, the instructions based on the program codes make a CPU on the extension board or extension module perform a portion of or all the practical operations, thus achieving the function (s) of any one of the above embodiments.
- an embodiment of the present invention provides a calculation apparatus. It comprises a memory and a processor wherein the memory is stored therein with executable codes, and when the executable codes are executed by the processor, the method in any embodiment of the present invention is implemented.
- the functions as described in the present invention can be implemented by hardware, software, firmware, or any combination thereof.
- these functions can be stored in the computer-readable storage medium, or can be transmitted as one or more instructions or codes on the computer-readable storage medium.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
In embodiments of the present invention, a method, a device, a medium and an apparatus for network security configuration are provided. The method is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus, the method comprises: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password; if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address; performing restarting; and after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus. With the embodiments of the present invention, the access security can be improved.
Description
The present invention relates to the technical field of network security, and specifically to a method, a device, a medium and an apparatus for network security configuration.
Currently, a wireless adaptor is working at the same time in two network layers: TCP/IP layer and MAC layer. The TCP/IP layer is used to access a web server of the wireless adaptor itself (i.e. access a webpage of the wireless adaptor) , while the MAC layer is used to directly communicate with a network apparatus which is connected with the wireless adaptor. With consideration of security, when the user accesses a webpage of the wireless adaptor for the first time, the user will be asked to modify the default WiFi password of the wireless adaptor, wherein the modification to the password is achieved by the TCP/IP layer of the wireless adaptor. However, the wireless adaptor directly communicates with the network apparatus via the MAC layer. That is, the communication data are transmitted by a manner of passthrough. Therefore, when the user directly accesses a webpage of the network apparatus connected with the wireless adaptor, it is not possible to ask the user to modify the default WiFi password because the access to a webpage of the wireless adaptor and the access to a webpage of the network apparatus are achieved based on two different network layers.
However, the wireless adaptor uses the MAC layer to communicate with the network apparatus via a manner of passthrough. Therefore, in a case when the default WiFi password is not modified, any user knowing the default WiFi password can directly access the webpage of the network apparatus via the wireless adapto r, which is not secure/safe.
In the embodiments of the present invention, a method, a device, a medium and an apparatus for network security configuration are provided, which can improve the access security.
According to a first aspect, a method for network security configuration is provided in an embodiment of the present invention. The method is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus, and the method comprises:
after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password;
if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;
performing restarting; and
after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
In an embodiment, the method as provided in the embodiment (s) of the present invention may further comprise: after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
In an embodiment, the method as provided in the embodiment (s) of the present invention may further comprise:
If the current WiFi password is not the default password, when the webpage access request sent from the user terminal is received, controlling the user terminal to jump to a target webpage corresponding to the webpage access request; and
wherein if the webpage access request is for the wireless adaptor, the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
In an embodiment, the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor; and/or the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
In an embodiment, the step of obtaining a first IP address corresponding to the network apparatus comprises: using a detection message to obtain the network apparatuses in the current local area network where the wireless adaptor is positioned as well as the IP addresses of the network apparatuses; and using the IP address of
any one of the network apparatuses as the first IP address corresponding to the network apparatus.
In an embodiment, the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
In an embodiment, the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
According to a second aspect, a device for network security configuration is provided in an embodiment of the present invention. The device is arranged on a wireless adaptor which is connected to a user terminal and a network apparatus, and the device comprises:
a first determination module used for: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password;
an address modification module used for: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;
a first restarting module used for: performing restarting; and
a password modification module used for: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
According to a third aspect, an embodiment of the present invention provides a computer-readable storage medium. It is stored thereon with a computer program which, when being executed in a computer, makes the computer implement the method as provided in the first aspect.
According to a fourth aspect, an embodiment of the present invention provides a calculation apparatus. It comprises a memory and a processor wherein the memory is stored therein with executable codes, and when the executable codes are executed by the processor, the method as provided in the first aspect is implemented.
The method, device, medium and apparatus for network security configuration as provided in the embodiments of the present invention, individually or in combination, have at least the following technical effects:
(1) After the wireless adaptor is powered on, it is necessary to determine
whether the current WiFi password configured in the wireless adaptor is the default password; if so, it is to obtain a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address; restarting is performed to make the modified IP address effective; after restarting, when a webpage access request sent from the user terminal is received, it is to control the user terminal to jump to a password modification webpage of the fi rst IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus. As can be seen, when the user terminal sends a webpage access request to the wireless adaptor for the first time, no matter which of the wireless adaptor and the network apparatus is the access target, the wireless adaptor will control the browser of the user terminal to jump to the password modification webpage in the first IP address such that the user can forcibly modify the WiFi password. As can be seen, even if access to the webpage of the wireless adaptor and access to the webpage of the network apparatus are implemented based on two different network layers, according to the method as provided in the embodiment (s) of the present invention, in a case when the user terminal sends a webpage access request to the wireless adaptor for the first time and the access target is the network apparatus, it is possible to ask the user to modify the default WiFi password. After the WiFi password is modified, if a certain user does not know the modified WiFi password, the mobile terminal of the user can not be in WiFi connection with the wireless adaptor. Therefore, the user can not access the webpage of the web server of the wireless adaptor, and also can not access the webpage of the web server of the network apparatus. Thus, the security for access can be improved.
(2) In an embodiment, the wireless adaptor may be connected, via the RJ45 connector, with the network apparatus. This can improve stability and reliability of communication between the wireless adaptor and the network apparatus.
(3) In an embodiment, after the password is modified, the IP address of the wireless adaptor is restored to the original IP address. Thus, when the user inputs a domain name, corresponding to the wireless adaptor, into a browser of the user terminal, the user terminal will enter the webpage of the web server of the wireless adaptor, and in turn perform related configuration to the wireless adaptor, such that the user can normally configure other information of the wireless adaptor after the password is modified.
DESCRIPTION OF THE DRAWINGS
In order to explain the technical solutions in the embodiments of the present invention or in the prior art more clearly, the figures necessary to be used for description in the embodiments or in the prior art will be briefly introduced as below. Apparently, the figures for the description below are for some embodiments in the present invention. Based on these figures, those skilled in the art can obtain other figures without any inventive work.
Figure 1 is a connection diagram of a wireless adaptor, a user terminal and a network apparatus in an embodiment of the present invention;
Figure 2 is a flow chart of a method for network security configuration in an embodiment of the present invention; and
Figure 3 is a block diagram of a device for network security configuration in an embodiment of the present invention.
Reference Numerals:
DESCRIPTION OF EXEMPLARY EMBODIMENTS
In order to make the objective (s) , technical solutions and advantages of embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be described clearly and completely hereinafter in connection with the figures in the embodiments of the present invention. Apparently, the described embodiments are some embodiments in the present invention, rather than all embodiments. Any other embodiments obtained based on the embodiments in the present invention by those skilled in the art without any inventive
work will fall within the protection scope of the present invention.
In a first aspect, a method for network security configuration is provided in an embodiment of the present invention. The method is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus.
Referring to figure 1, a wireless adaptor 100 is connected with a user terminal 200 and a network apparatus 400, respectively. Thus, the wireless adaptor 100 may communicate with the user terminal 200, and also may communicate with the network apparatus 400. The wireless adaptor 100 is a communication medium between the user terminal 200 and the network apparatus 400. The wireless adaptor 100 has its own web server, and also the network apparatus 400 has its own web server. The user terminal 200 may access the web server of the wireless adaptor 100 and the web server of the network apparatus 400 by a browser. For example, the user may input a first domain name in a browser of the user terminal 200 and thus can access the web server of the wireless adaptor 100. The user may input a second domain name in the browser of the user terminal 200 and thus can access the web server of the network apparatus 400. Therefore, the user terminal 200 can directly access a webpage provided by the web server of the wireless adaptor 100, and also can access a webpage provided by the web server of the network apparatus 400 via the wireless adaptor 100.
Herein, the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor. Thus, the user can configure information of the wireless adaptor on the configuration webpage, such as configuring the channel, the bandwidth, the password, etc. Certainly, in the webpage (s) provided by the web server of the wireless adaptor, it is also possible to show a topological structure of the wireless adaptor, and other information.
Herein, the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus. For example, the network apparatus is a server driving system, and the webpage provided by the web server of the server driving system comprises the information of various monitoring indexes of the server driving system such that the operators can know the state of the server driving system. Certainly, the webpage (s) provided by the web server of the server driving system may further comprise some configuration items for the server driving system.
Herein, the user terminal may be a mobile phone, a tablet computer, or other portable calculation/computing apparatuses.
Herein, the network apparatus may be selected according to specific
application circumstances. For example, the network apparatus may be a server driving system. Certainly, it may be another type of apparatus.
In an embodiment, the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
That is, the wireless adaptor may be connected, via the RJ45 connector, with the network apparatus.
Herein, the RJ45 connector consists of a plug and a socket. The connector consisting of these two elements provides a physical connection manner and can improve stability and reliability of communication between the wireless adaptor and the network apparatus.
In an embodiment, the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
That is, the WiFi connection is provided between the wireless adaptor and the user terminal such that the user can use the user terminal to achieve remote access to the wireless adaptor and the network apparatus and achieve remote operation for network security configuration, providing convenience for the user.
Referring to figure 2, the method comprises the following steps S110~S140:
S110: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password.
That is, after the wireless adaptor is powered on, it is necessary to determine whether the current WiFi password in the wireless adaptor is the default password. If it is the default password, it means that the WiFi password is not modified and the subsequent S120~S140 will be performed. If it is not the default password, it means that the WiFi password has been modified and thus it is not necessary to perform the subsequent S120~S140.
S120: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address.
That is, the IP address of the network apparatus is the first IP address, and the IP address of the wireless adaptor is the second IP address. If the current WiFi password in the wireless adaptor is still the default password, the IP address of the wireless adaptor will be modified to the first IP address such that the IP address of the wireless adaptor and that of the network apparatus are consistent. Thus, after the user
inputs a first domain name, corresponding to the wireless adaptor, into a browser of the user terminal, the browser of the user terminal will jump to the webpage corresponding to the first IP address. After the user inputs a second domain name, corresponding to the network apparatus, into the browser of the user terminal, the browser of the user terminal will jump to the webpage corresponding to the first IP address.
In an embodiment, the step of obtaining a first IP address corresponding to the network apparatus in S120 may comprise:
using a detection message to obtain the network apparatuses in the current local area network where the wireless adaptor is positioned as well as the IP addresses of the network apparatuses; and using the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
That is, in the current local area network where the wireless adaptor is positioned, there may be many network apparatuses. The wireless adaptor may use a detection message to obtain the network apparatuses in the current local area network as well as the IP addresses of the network apparatuses, and use the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
Herein, the reason for choosing the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus is: it is only necessary to choose one network apparatus to perform password modification, and then the current WiFi password configured in the wireless adaptor will not be the default password any more, and thus it is not necessary to perform S110~S140 again.
S130: performing restarting.
That is, after the second IP address of the wireless adaptor is modified to the first IP address, the wireless adaptor performs restarting automatically. After the wireless adaptor is restarted, the modified IP address becomes effective.
S140: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
That is, after the wireless adaptor is restarted, the wireless adaptor may receive a webpage access request to the wireless adaptor, or may receive a webpage access request to the network apparatus. No matter which access request is received, the user terminal will jump to the password modification webpage of the first IP address
such that the user can forcibly modify the password.
After the password is modified, the user knows the modified WiFi password. The user terminal can be in WiFi connection with the wireless adaptor. In a case when the user terminal of the user sends a webpage access request to the wireless adaptor not for the first time and the wireless adaptor is the access target, the wireless adaptor knows, by the specific information in the webpage access request, that it is to access the webpage of the web server of the wireless adaptor, then the webpage of the web server of the wireless adaptor is accessed by the upper-layer TCP/IP layer.
After the password is modified, the user knows the modified WiFi password. The user terminal can be in WiFi connection with the wire less adaptor. In a case when the user terminal of the user sends a webpage access request to the wireless adaptor not for the first time and the network apparatus is the access target, the wireless adaptor knows, by the specific information in the webpage access request, that it is to access the webpage of the web server of the network apparatus, then the webpage of the web server of the network apparatus is accessed by the lower-layer MAC layer.
As can be seen, after the password is modified, only the user knows the WiFi password, and the user terminal can access the network apparatus only by the modified password and only when it is in WiFi connection with the wireless adaptor, significantly improving security for network access.
In an embodiment, the method as provided in the embodiment (s) of the present invention may further comprise:
after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
That is, after the password is modified, the IP address of the wireless adaptor is restored to the original IP address. Thus, when the user inputs a first domain name, corresponding to the wireless adaptor, into a browser of the user terminal, the user terminal will enter the webpage of the web server of the wireless adaptor, and in turn perform related configuration to the wireless adaptor.
In an embodiment, the method as provided in the embodiment (s) of the present invention may further comprise:
If the current WiFi password is not the default password, when the webpage access request sent from the user terminal is received, controlling the user terminal to jump to a target webpage corresponding to the webpage access request; and
wherein if the webpage access request is for the wireless adaptor, the target webpage is a webpage provided by a web server of the wireless adaptor; and if the
webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
That is, it the current WiFi password is not the default password, it means that the WiFi password has been modified. In this case, normal access is available. Specifically, if the webpage access request sent by the user terminal to the wireless adaptor is a webpage access request to the wireless adaptor, the target webpage to be jumped by the user terminal is the webpage provided by the web server of the wireless adaptor. If the webpage access request sent by the user terminal to the wireless adaptor is a webpage access request to the network apparatus, the target webpage to be jumped by the user terminal is the webpage provided by the web server of the network apparatus.
Herein, the webpage provided by the web server of the wireless adaptor may comprise a configuration webpage for the wireless adaptor.
Herein, the webpage provided by the web server of the network apparatus may comprise a state monitoring webpage for the network apparatus.
In summary, when the user terminal sends a webpage access request to the wireless adaptor for the first time, no matter which of the wireless adaptor and the network apparatus is the access target, the wireless adaptor will control the browser of the user terminal to jump to the password modification webpage in the first IP address such that the user can forcibly modify the WiFi password. As can be seen, even if access to the webpage of the wireless adaptor and access to the webpage of the network apparatus are implemented based on two different network layers, according to the method as provided in the embodiment (s) of the present invention, in a case when the user terminal sends a webpage access request to the wireless adaptor for the first time and the access target is the network apparatus, it is possible to ask the user to modify the default WiFi password. After the WiFi password is modified, if a certain user does not know the modified WiFi password, the mobile terminal of the user can not be in WiFi connection with the wireless adaptor. Therefore, the user can not access the webpage of the web server of the wireless adaptor, and also can not access the webpage of the web server of the network apparatus. As can be seen, the security for access can be improved.
In a second aspect, a device for network security configuration is provided in an embodiment of the present invention. The device is arranged on a wireless adaptor which is connected to a user terminal and a network apparatus.
Referring to figure 3, the device 300 for network security configuration
comprises:
a first determination module 310 used for: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password;
an address modification module 320 used for: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;
a first restarting module 330 used for: performing restarting; and
a password modification module 340 used for: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
In an embodiment, the device may further comprise:
an address restoring module used for: after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
In an embodiment, the device may further comprise:
a jump controlling module used for: If the current WiFi password is not the default password, when the webpage access request sent from the user terminal is received, controlling the user terminal to jump to a target webpage corresponding to the webpage access request; and
wherein if the webpage access request is for the wireless adaptor, the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
In an embodiment, the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor; and/or the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
In an embodiment, the address modification module is specifically used for:
using a detection message to obtain the network apparatuses in the current local area network where the wireless adaptor is positioned as well as the IP addresses of the network apparatuses; and using the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
In an embodiment, the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve
connection between the wireless adaptor and the network apparatus.
In an embodiment, the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
According to a third aspect, an embodiment of the present invention provides a computer-readable storage medium. It is stored thereon with computer instructions which, when being executed by the processor, make the processor perform the method as provided in the first aspect.
Specifically, it is possible to provide a system or a device equipped with the storage medium, the storage medium is stored thereon with software program codes for implementing the function (s) of any one of the above embodiments, such that a computer (or CPU or MPU) of the system or device can read and perform the program codes stored in the storage medium.
In this case, the program codes read from the storage medium can, by themselves, achieve the function (s) of any one of the above embodiments. Therefore, the program codes and the storage medium storing the program codes constitute a portion of the present invention.
The embodiments of the storage media for providing program codes comprise: floppy disk, hard disk, magneto-optical disk, optical disk (such as CD-ROM, CD-R, CD-RW, DVD-ROM, DVD-RAM, DVD-RW, DVD+RW) , magnetic tape, non-volatile memory card and ROM. Optionally, it is possible to use a communication network to download program codes from a server computer.
In addition, it should be clear that not only the program codes read by a computer but also an operation system operated on a computer by instructions based on the program codes can complete a portion of or all the practical operations, thus achieving the function (s) of any one of the above embodiments.
In addition, it is understandable that the program codes read from the storage medium is written into a storage provided in an extension board inserted in a computer or is written into a storage provided in an extension module connected with a computer. Then, the instructions based on the program codes make a CPU on the extension board or extension module perform a portion of or all the practical operations, thus achieving the function (s) of any one of the above embodiments.
It is understandable that the related explanation, specific implementation manner (s) , beneficial effect (s) , example (s) , and the like of the computer-readable storage medium as provided in the embodiments of the present invention may refer to the respective portions in the method (s) as provided in the first aspect, and will not be
described repeatedly herein.
According to a fourth aspect, an embodiment of the present invention provides a calculation apparatus. It comprises a memory and a processor wherein the memory is stored therein with executable codes, and when the executable codes are executed by the processor, the method in any embodiment of the present invention is implemented.
It is understandable that the related explanation, specific implementation manner (s) , beneficial effect (s) , example (s) , and the like of the calculation apparatus as provided in the embodiments of the present invention may refer to the respective portions in the method (s) as provided in the first aspect, and will not be described repeatedly herein.
The embodiments in the present description are described in a gradually progressive manner. The same or similar portions between different embodiments can be referred to each other. Each embodiment emphasizes in explaining the difference (s) with respect to other embodiment (s) . In particular, as the apparatus/device embodiments are substantially similar to the method embodiments, the description thereof is relatively simple, and the description of the method embodiments may be referred to for the related portions.
It is conceivable by those skilled in the art that in the above one or more examples, the functions as described in the present invention can be implemented by hardware, software, firmware, or any combination thereof. When it is implemented by software, these functions can be stored in the computer-readable storage medium, or can be transmitted as one or more instructions or codes on the computer-readable storage medium.
The embodiments in the present description are described in a gradually progressive manner. The same or similar portions between different embodiments can be referred to each other. Each embodiment emphasizes in explaining the difference (s) with respect to other embodiment (s) . In particular, as the apparatus/device embodiments are substantially similar to the method embodiments, the description thereof is relatively simple, and the description of the method embodiments may be referred to for the related portions.
With the above-described specific embodiments, the purposes, technical solutions and beneficial effects of the present invention are further explained in detail. It should be understood that the above description is only for specific embodiments in the present invention, not for defining the protection scope of the present invention. Any variation, equivalent substitution or improvement made based on the technical
solutions of the present invention will fall within the protection scope of the present invention.
Claims (10)
- A method for network security configuration, characterized in that it is implemented by a wireless adaptor which is connected to a user terminal and a network apparatus, the method comprises:after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password;if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;performing restarting; andafter restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
- The method according to claim 1, characterized in that it further comprises:after modifying the current WiFi password, restoring the IP address of the wireless adaptor to the second IP address.
- The method according to claim 1, characterized in that it further comprises:If the current WiFi password is not the default password, when the webpage access request sent from the user terminal is received, controlling the user terminal to jump to a target webpage corresponding to the webpage access request; andwherein if the webpage access request is for the wireless adaptor, the target webpage is a webpage provided by a web server of the wireless adaptor; and if the webpage access request is for the network apparatus, the target webpage is a webpage provided by a web server of the network apparatus.
- The method according to claim 3, characterized in that the webpage provided by the web server of the wireless adaptor comprises a configuration webpage for the wireless adaptor; and/or the webpage provided by the web server of the network apparatus comprises a state monitoring webpage for the network apparatus.
- The method according to claim 1, characterized in that the step of obtaining a first IP address corresponding to the network apparatus comprises: using a detection message to obtain the network apparatuses in the current local area network where the wireless adaptor is positioned as well as the IP addresses of the network apparatuses; and using the IP address of any one of the network apparatuses as the first IP address corresponding to the network apparatus.
- The method according to claim 1, characterized in that the wireless adaptor has a first interface, and the wireless adaptor uses the first interface to connect with an RJ45 connector to achieve connection between the wireless adaptor and the network apparatus.
- The method according to claim 1, characterized in that the wireless adaptor has a WiFi module, and the wireless adaptor uses the WiFi module to achieve WiFi connection with the user terminal.
- A device for network security configuration, characterized in that it is arranged on a wireless adaptor which is connected to a user terminal and a network apparatus, the device comprises:a first determination module used for: after power-on, determining whether a current WiFi password configured in the wireless adaptor is a default password;an address modification module used for: if so, obtaining a first IP address corresponding to the network apparatus, and modifying a second IP address corresponding to the wireless adaptor to the first IP address;a first restarting module used for: performing restarting; anda password modification module used for: after restarting, when a webpage access request sent from the user terminal is received, controlling the user terminal to jump to a password modification webpage of the first IP address such that the user can modify the current WiFi password on the user terminal; wherein the webpage access request is for the wireless adaptor or for the network apparatus.
- A computer-readable storage medium, characterized in that it is stored thereon with a computer program which, when being executed in a computer, makes the computer implement the method according to any one of claims 1-7.
- A calculation apparatus, characterized in that it comprises a memory and a processor wherein the memory is stored therein with executable codes, and when the executable codes are executed by the processor, the method according to any one of claims 1-7 is implemented.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/120471 WO2025059999A1 (en) | 2023-09-21 | 2023-09-21 | Method, device, medium and apparatus for network security configuration |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2023/120471 WO2025059999A1 (en) | 2023-09-21 | 2023-09-21 | Method, device, medium and apparatus for network security configuration |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2025059999A1 true WO2025059999A1 (en) | 2025-03-27 |
Family
ID=95073284
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2023/120471 Pending WO2025059999A1 (en) | 2023-09-21 | 2023-09-21 | Method, device, medium and apparatus for network security configuration |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2025059999A1 (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103354669A (en) * | 2013-06-26 | 2013-10-16 | 上海斐讯数据通信技术有限公司 | Internet access configuration method for wireless router |
CN103841220A (en) * | 2014-02-18 | 2014-06-04 | 北京奇虎科技有限公司 | Method and device for detecting safety of router through terminal |
CN104254070A (en) * | 2013-06-25 | 2014-12-31 | 中兴通讯股份有限公司 | WiFi access method, intelligent terminal and router equipment |
CN106055969A (en) * | 2016-05-18 | 2016-10-26 | 上海斐讯数据通信技术有限公司 | Login password prompt method and network equipment |
US20170026364A1 (en) * | 2014-04-02 | 2017-01-26 | Huawei Device Co., Ltd. | Method and router for accessing network |
-
2023
- 2023-09-21 WO PCT/CN2023/120471 patent/WO2025059999A1/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104254070A (en) * | 2013-06-25 | 2014-12-31 | 中兴通讯股份有限公司 | WiFi access method, intelligent terminal and router equipment |
CN103354669A (en) * | 2013-06-26 | 2013-10-16 | 上海斐讯数据通信技术有限公司 | Internet access configuration method for wireless router |
CN103841220A (en) * | 2014-02-18 | 2014-06-04 | 北京奇虎科技有限公司 | Method and device for detecting safety of router through terminal |
US20170026364A1 (en) * | 2014-04-02 | 2017-01-26 | Huawei Device Co., Ltd. | Method and router for accessing network |
CN106055969A (en) * | 2016-05-18 | 2016-10-26 | 上海斐讯数据通信技术有限公司 | Login password prompt method and network equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8285855B2 (en) | System, method and user interface for network status reporting | |
US5784555A (en) | Automation and dial-time checking of system configuration for internet | |
US7945707B2 (en) | Electrical device configuration system and method | |
JP2006217283A (en) | Data transfer method, data transfer program, information processing terminal device, and information system | |
US20070106715A1 (en) | Database server discovery using a configuration file | |
CN108206842B (en) | Cloud desktop remote access method and system | |
CN111049946B (en) | Portal authentication method, portal authentication system, electronic equipment and storage medium | |
US7254739B2 (en) | Error recovery in a client/server application using two independent sockets for communication | |
US20170311224A1 (en) | Method and apparatus for implementing network sharing | |
US6360267B1 (en) | Communication control apparatus, method, and computer readable storage medium for determining a relay apparatus on information | |
CN108540552A (en) | Device interconnection method, apparatus, system, device and storage medium | |
CN117135204A (en) | Data sending method and device, electronic equipment and storage medium | |
CN113038594A (en) | Network management registration method and device for MESH extended equipment | |
EP2294868B1 (en) | Seamless location aware network connectivity | |
WO2025059999A1 (en) | Method, device, medium and apparatus for network security configuration | |
CN106992893A (en) | Router management method and device | |
US8326919B1 (en) | Network address translation auto-discovery in data storage networks | |
CN113765936A (en) | Data transmission method, device, equipment and computer readable storage medium | |
CN114491328A (en) | Website access method, equipment, storage medium and device | |
US10375175B2 (en) | Method and apparatus for terminal application accessing NAS | |
JP2001202249A (en) | Information communication system and terminal device | |
CN114679485B (en) | Network connection method and device | |
CN114006955B (en) | Data processing method, device, equipment and readable storage medium | |
CN116048642A (en) | LLDP (LLDP) enabled state control method, LLDP enabled state control device and LLDP enabled state control medium | |
JP6605149B2 (en) | Method and apparatus for detecting shared terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 23952655 Country of ref document: EP Kind code of ref document: A1 |