CN103997733B - A kind of WiFi access-in resources sharing method and system - Google Patents
A kind of WiFi access-in resources sharing method and system Download PDFInfo
- Publication number
- CN103997733B CN103997733B CN201410234736.5A CN201410234736A CN103997733B CN 103997733 B CN103997733 B CN 103997733B CN 201410234736 A CN201410234736 A CN 201410234736A CN 103997733 B CN103997733 B CN 103997733B
- Authority
- CN
- China
- Prior art keywords
- resource
- resources
- user
- information
- management platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a kind of WiFi access-in resources sharing methods, resource user proposes resource request for utilization by the resource sharing client on user terminal to resource management platform, the position WiFi resource informations that resource management platform is reported according to the user terminal search available resources in its WiFi preserved resource information bank, and encrypted resource log-on message is sent to resource sharing client, which completes the secure log to target resource using encrypted login information.This mode makes the owner of each WiFi access-in resources other people can be supplied to use resource under the premise of ensureing its WiFi resource security and control, to realize making full use of for WiFi access-in resources.The present invention further simultaneously discloses a kind of WiFi access-in resources share system.
Description
Technical field
The invention belongs to mobile communication and mobile Internet field, more particularly to WiFi access points resource sharing method be
System.
Background technology
With the extensive use of WiFi (also referred to as WLAN, IEEE802.11 series) technology, due to it is high with transmission rate,
The low significant advantage of expense has become the important communication means in people's daily life.The trade company of public place, office space
All largely deploy WiFi access devices (referred to herein as WiFi access-in resources) with family, commonly referred to as WiFi routers,
WiFi access points (AP), and support WiFi access functions also to become on subscriber terminal equipment such as mobile phone, tablet computer, notebook
Standard configuration greatly facilitates people and surfs the Internet whenever and wherever possible.But in general, for the sake of for safety, WiFi access devices can be all arranged
Password avoids people without permission from using.But this also results in the waste of WiFi access-in resources simultaneously, has the people of use demand not
These resources can be used.Although telecom operators also deploy a large amount of WiFi access devices, but still cannot accomplish to cover comprehensively
Lid.Therefore, it is necessary to consider a kind of shared mechanism of the WiFi access-in resources of " all for one, I be everybody ", WiFi resources
Owner is out used for other people by the resources contribution possessed, can freely be used when he needs with exchanging for
Others contributes the access-in resource come, realizes win-win progress.
At present it has been proposed that a kind of share system is established, by establishing the form of alliance, by WiFi access-in resource owners
Access device centralized management, and the member for distributing to alliance as needed freely uses.But this is to sacrifice resource owner
Control and normal use to resource are cost.And it needs user to open webpage progress webpage login manually every time and recognizes
The access device could be used after card, it is cumbersome.
Invention content
In view of this, proposed by the present invention a kind of for sharing WiFi (also referred to as WLAN, IEEE802.11 series) access money
The method and system in source, the purpose is to the owner of each WiFi access-in resources can be allowed to ensure that its access information is safe and right
The access information of its own WiFi access-in resources is shared with by resource management platform under the premise of the control of resource
Other users, to realize making full use of for WiFi access-in resources.This method is realized simply, without to WiFi access-in resource equipment
Hardware modifications, do not influence resource safety and resource owner to the control and normal use of resource, user's docking
The login process for entering resource is automatically performed, without human intervention by software, has good realizability.
The embodiment of the present invention provides a kind of WiFi access-in resources share system, realizes making for efficient WiFi access-in resources
With.
The embodiment of the present invention provides one kind for carrying out WiFi access-in resource sharing methods, realizes efficient WiFi accesses
The use of resource.
In order to achieve the above objectives, technical scheme of the present invention is specifically realized in:
A kind of WiFi access-in resources sharing method, this method include:
Resources contribution person is by the resource sharing client on the user terminal with WiFi access capabilities to resource management
Platform submits resource sharing application, resource management platform to be audited to it according to the application information that resources contribution person submits, and audit is logical
Later by user information and resource information typing resource database and customer data base;
Resource user submits resource to make by the resource sharing client software on user terminal to resource management platform
With application;
The user terminal current location inspection carried in the application information that resource management platform is submitted according to resource user
The WiFi resource informations measured are compared with the information in resource database, if there is qualified available resources, then will
Available resources basic information is pushed to the resource sharing client of resource user;
Signal of the resource sharing client based on each available resources of available resources basic information and user terminal current location
Quality information generates available resources recommendation list and is presented to resource user;
Resource user chooses the WiFi access-in resources being desirable for, and resource selected by user is utilized by resource sharing client
Encrypted login password carry out secure log;
The login of the resource is exited by resource sharing client after resource user's use and is removed on user terminal
The resource login password, and this use is evaluated;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is put down by resource management
Platform is according to predefined rule in relation to resource user, resources contribution person and being used in customer data base and resource database
The information of resource is updated operation.
Further, the secure log specifically includes:Available money of the resource management platform to resource sharing client push
The login password in source is the login password for having carried out encipherment protection, and the password is invisible to resource user, by resource sharing visitor
Family end is decrypted encrypted login password according to identical Encryption Algorithm on resource management platform, and using the password to
Corresponding resource automatically initiates and completes login process, and is automatically exited from when resource user exits use and log in the resource simultaneously
The login password information of the resource is removed from the WiFi the Resources lists locally preserved.
Further, the resource sharing application can apply for that the WiFi access-in resources to be contributed are connected to interconnection using it
It is completed on the user terminal of net.User terminal is first applied for that the WiFi access-in resources to be contributed are connected to internet by it, it should
Resource sharing client on user terminal automatically records SSID, BSSID of the current connected WiFi access-in resources arrived and close
Information and the contents as application information such as code, resources contribution person submit resource sharing application after supplementing other necessary informations.
Further, resource request for utilization can also be by resource sharing client according to the shifting acquired in real time on the subscriber terminal
In the base station cell identification information of dynamic network (such as China Mobile GSM network) and the available resources offline database locally preserved
Base station cell identification information is compared and whether automatic identification current location has available resources;If so, then being pushed to user
Prompting message and available resources recommendation list;If user's selection uses some resource, the money is asked to resource management platform
The encrypted login password in source is simultaneously automatically performed secure log.
Further, resource request for utilization periodically will can also in real time be adopted by resource sharing client from user terminal
The base station cell identification information of the mobile network of collection uploads to resource management platform, and is compared with the information in resource database
Pair and automatic identification current location whether have available resources;If so, then resource management platform pushes away available resources basic information
Resource sharing client is given, prompting message and available resources recommendation list are pushed from client to user;If user selects
Using some resource, then the secure log to the resource is automatically performed.
Further, the user terminal refers to the various forms of subscriber terminal equipments with WiFi access functions, including but
It is not limited to smart mobile phone, tablet computer, PC machine etc..
Further, the content of the resource database includes but not limited to:WiFi access point resource SSID (Service
Set Identifier) and BSSID (Basic Service Set Identifier), plaintext login password, encrypted step on
Record password, resources contribution person account, resource use condition, history evaluation grade, whether pipe off, resource using details,
The integrating of accumulative harvest, associated mobile network base station cell identity information set;
Wherein, resource use condition refers to the restricted informations such as available period, the maximum number of user for allowing while accessing;Resource
Using details refer to the resource user account used every time, the SSID and BSSID of used resource, use date and time,
Use peak rate, Mean Speed, the letter acquired during duration, in-service evaluation grade, the integral of harvest and this use
Number average field-strength and present position mobile network base station cell identity information set etc.;Encrypted login password is put down by resource management
The login password for the plaintext that platform is provided according to resources contribution person and the local cipher algorithm operation of setting obtain;History evaluation grade
It is to be calculated by predefined rule according to each opinion rating used in nearest a period of time by resource management platform
To and regularly update;Associated mobile network base station cell identity information set be by resource management platform according to nearest one section when
Each time interior present position mobile network base station cell identity information set used is calculated by predefined rule
And it regularly updates;Mobile network base station cell identity information refers to the base for the mobile communications network of the various standards of unique mark
The information for cell of standing.
Further, the content of the customer data base includes but not limited to:Account, name, possessed resource SSID and
BSSID, possessed resource resource use details, scores accumulated, remaining integral, integral usage record.
Wherein, integral usage record refer to each resource use date and time, used resource SSID and
BSSID, duration, deduction integral etc. are used.
Further, the integral can be ideal money, integral score value.User can pass through account real money online
The modes such as payment are supplemented with money and exchange integral for.
Further, available resources offline database refers to the SSID and BSSID of available resources, resource use condition, history
Opinion rating, history Mean Speed, associated mobile network base station cell identity information set.
Further, the available resources basic information includes the SSID and BSSID of each available resources, history evaluation etc.
Grade, history Mean Speed, current concurrent user number, encrypted login password;
Further, the available resources recommendation list includes that the SSID and BSSID of each available resources, resource history are commented
Valence grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index.Respectively
Available resources being ranked sequentially from high to low by combined recommendation index;
Wherein, combined recommendation index be according to resource history evaluation grade, history Mean Speed, current concurrent user number,
Current signal strength, interference levels present are weighted the value obtained after summation by predefined weight.
Further, the mobile network base station identification information refers to being used for the various standards of unique mark (2G/3G/4G etc.)
The information of the base station cell of mobile communications network, including but not limited to LAC (Location Area Code)/CI (cell ID), SID/NID/
CI, TAC/CI etc..
A kind of WiFi access-in resources share system, including:Resource management platform and setting resource in the user terminal point
Enjoy client software;
The resource management platform, the resource sharing application submitted to resources contribution person is verified and is put in storage, to resource
Database and customer data base are managed, and carry out permission examination & approval to the resource request for utilization of resource user, available resources are believed
Breath inquiry carries out available resources automatic identification with distribution, based on mobile network base station cell identity information, and feelings are used according to resource
Condition is updated the integral of resources contribution person and resource user, evaluates the use quality of resource, to resources contribution
The account information of person and resource user are managed.
The resource sharing client, resources contribution person is used for carrying out the application of resource sharing and change, account information are looked into
It askes, resource user is used for carrying out application, the account information inquiry that resource uses, and is based on mobile network base station cell identity information
Progress available resources automatic identification and prompting, the removing to the secure log of available resources, use, evaluation and logon information, and
The interaction of the related datas such as user information, resource information, integration information is carried out with resource management platform.
From said program as can be seen that the present invention will allow the owner of WiFi access-in resources to go out its resource sharing
Come the people's use for needing to utilize the online of WiFi resources for other, and this use is not influence normally making for resource owner
With with to the resource control, ensure that the login of WiFi resources carries out under the premise of controlled and safety, avoid not
User through permission arbitrarily uses WiFi resources.That is, the present invention realizes the WiFi resources under controllable state
Share, facilitates the WiFi access-in resources that user can utilize other people to contribute whenever and wherever possible and surf the Internet, realize WiFi access moneys
The efficient utilization in source.
Description of the drawings
Fig. 1 is the structure chart of the WiFi access-in resource share systems of the embodiment of the present invention;
Fig. 2 is the flow chart of the resources contribution process of the WiFi access-in resource sharing methods of the embodiment of the present invention;
Fig. 3 is that the resource of the WiFi access-in resource sharing methods of the embodiment of the present invention uses the flow chart of process.
In attached drawing, the component names representated by each label are as follows:
101, user terminal, 102, resource sharing client, 103, resource management platform, 104, WiFi access-in resources, S1
~S4, step, A, step, B1~B4, step, C1~C3, step, D1~D3, step, E~F, step.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, develop simultaneously embodiment referring to the drawings, right
The present invention is described in further detail.
The embodiment of the present invention is mainly embedded in resource sharing client software in the user terminal, and resource pipe is arranged beyond the clouds
Platform, resources contribution person submits resource sharing application using resource sharing client to resource management platform, through resource management
Relevant information is stored in the database of platform after platform audit, resource user utilizes resource sharing client to resource management
Platform submits resource request for utilization, and resource management platform is according to the present position WiFi resource informations and database carried in application
In resource match and after the approval, log-on message fed back to resource sharing client in a manner of encrypted, by visitor
The secure log to target resource is completed at family end under controlled environment, and is discharged the resource after use and removed login
Information.The present invention realizes sharing for the WiFi resources under controllable state, other can be utilized whenever and wherever possible by facilitating user
The WiFi access-in resources online of people's contribution, realizes the efficient utilization of WiFi access-in resources.
Fig. 1 is the structure chart of the realization WiFi access-in resource share systems of the embodiment of the present invention, which includes:Resource pipe
Platform 103 and user terminal 101 equipped with resource sharing client 102;Resource management platform 103 may be coupled to interconnection
Net, and have from the addressable public network IP address of outer net;User terminal 101 has the ability for accessing internet;Resource management is flat
Platform 103 is connected by wireless network and internet with the user terminal 101 equipped with resource sharing client 102;Resource sharing visitor
It completes to step on to the safety of WiFi access-in resources 104 using the encrypted log-on message that resource management platform 103 is fed back in family end 102
Record.
The resource management platform 103 passes through the resource sharing client 102 in user terminal 101 to resources contribution person
The resource sharing application of submission carries out audit and input database, is managed to resource database and customer data base, to money
The resource request for utilization of source user carries out that permission examination & approval, available resource information inquiry and distribution, to be based on mobile network base station small
Area's identification information carries out available resources automatic identification, according to resource service condition to the integral of resources contribution person and resource user
It is updated, the use quality of resource is evaluated, the account information of resources contribution person and resource user are managed
Deng.
The resource sharing client 102, resources contribution person are used for carrying out application and change, the account information of resource sharing
Inquiry, resource user are used for carrying out application, the account information inquiry that resource uses, are believed based on mobile network base station cell ID
Breath carries out available resources automatic identification and prompting, to the secure log of selected WiFi access-in resources 104, use, evaluation and
The removing of log-on message, and carry out the related datas such as user information, resource information, integration information with resource management platform 103
Interaction.
The user terminal 101 can be any terminal device with WiFi access capabilities, including but not limited to carry
Smart mobile phone, tablet computer, laptop of WiFi function etc..
The WiFi access-in resources 104 refer to that all IEEE802.11 series standards that meet (include but not limited to
802.11a/b/g/n/ac etc.) offer wireless access equipment, the commonly referred to as AP of WiFi (access point), WiFi routers.
The method that the embodiment of the present invention carries out resource sharing in above resource sharing system is explained below.Fig. 2 is
The flow chart of the resources contribution process of the WiFi access-in resource sharing methods of the embodiment of the present invention, the specific steps are:
Step S1, resources contribution person carry out the registration of resource sharing system by the resource sharing client on user terminal
And login;
Step S2, resource sharing application;
In this step, resources contribution person is submitted to resource management platform by the resource sharing client on user terminal and is provided
Application is shared in source, submits essential information (including SSID, BSSID, plaintext in information comprising shared WiFi access-in resources
Login password etc.), to the resource allow to use restrictive condition (including allow simultaneously access maximum number of user, allow to make
Period etc.) and prove that he or she is the relevant evidential material of resource lawful owner;
In this step, the essential information of access-in resource can also be by resource sharing client automatic collection, with the proviso that money
User terminal first will be connected to internet by source contribution person by the WiFi access-in resources shared.The advantage of doing so is that one
Aspect can ensure that the access-in resource is available, and on the other hand, can also verify resources contribution person couple to a certain extent
Legal the possessing property of the WiFi access-in resources.
Step S3, application information verification:The administrative staff of resource management platform audit application information;
Step S4, user information and resource information storage;
In this step, after application is by audit, system is by the user information of resources contribution person and resource information typing user
Database and resource database.
The content of wherein resource database include WiFi access point resources SSID (Service Set Identifier) and
BSSID (Basic Service Set Identifier), the login password of plaintext, encrypted login password, resources contribution person
Account, resource use condition, history evaluation grade, whether pipe off, resource using details, accumulative harvest integral, close
The mobile network base station cell identity information set of connection;
Wherein, the login password for the plaintext that encrypted login password is provided by resource management platform according to resources contribution person and
The local cipher algorithm operation of setting obtains;
Wherein, resource use condition refers to the available period, allows while accessing the restricted informations such as maximum number of user;
Wherein, history evaluation grade is the evaluation etc. used according to each time in nearest a period of time by resource management platform
Grade is calculated and is regularly updated by predefined rule;
Wherein, resource using details refer to the resource user account used every time, the SSID of used resource and
BSSID, use date and time acquire using during duration, in-service evaluation grade, the integral of harvest and this use
Peak rate, Mean Speed, signal averaging field strength and present position mobile network base station cell identity information set etc.;
Wherein, associated mobile network base station cell identity information set be by resource management platform according to nearest one section when
Each time interior present position mobile network base station cell identity information set used is calculated by predefined rule
And it regularly updates;
Wherein, mobile network base station cell identity information refers to the mobile communications network for the various standards of unique mark
The information of base station cell;
The content of wherein customer data base includes account, name, the SSID of possessed resource and BSSID, possessed resource
Resource using details, scores accumulated, remaining integral, (each resource use date and time are used integral usage record
The SSID and BSSID of resource, duration, deduction integral etc. are used).
Resources contribution person can also login system carry out relevant information (for example allowing usage time interval) modification.When its is right
The login password of the WiFi access-in resource equipment has done the update for answering active login system to carry out data after change, to avoid resource
User's login failure when logging in the resource.If with existing password login failure, system can be recorded and be reminded to this
Resources contribution person updates the data, and otherwise the resource information can pipe off, be forbidden to use.
Fig. 3 is that the resource of the WiFi access-in resource sharing methods of the embodiment of the present invention uses the flow chart of process, specific
Step is:
Step A, resource user carry out the registration of resource sharing system by the resource sharing client on user terminal
And login.
Step B1, resource user initiate request for utilization to resource sharing platform;
In this step, after initiating to apply, the WiFi switches that resource sharing client can detect user terminal first are
No opening is opened if reminding user without if to scan the WiFi resource informations of present position.What resource user submitted
All WiFi resource informations that the user terminal detects in current location (including each WiFi access moneys are carried in request for utilization
SSID, the BSSID etc. in source).
Step B2 searches for available resources and uploads platform inquiry;
In this step, WiFi resource informations that resource management platform is submitted according to resource user in resource database
Information is compared.
Step B3, platform return to available resources basic information;
In this step, if platform discovery has qualified available resources, by the basic information of these available resources
It is (SSID and BSSID of each available resources, history evaluation grade, history Mean Speed, current concurrent user number, encrypted
Login password etc.) it is pushed to the resource sharing client of resource user.
Step B4, selection target resource;
In this step, resource sharing client is based on each available money of available resources basic information and user terminal current location
Signal quality (the signal strength and interference level) information in source generates available resources recommendation list and is presented to resource user, and
The WiFi access-in resources being desirable for are chosen by resource user;
The available resources recommendation list includes the SSID and BSSID of each available resources, history evaluation grade, history
Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index.Each available resources are by comprehensive
It closes and recommends index being ranked sequentially from high to low.Wherein, combined recommendation index is average according to resource history evaluation grade, history
Rate, current concurrent user number, current signal strength, interference levels present obtain after being weighted summation by predefined weight
Value.
Step E, secure log target resource;
In this step, resource management platform is to carry out to the login password of the available resources of resource sharing client push
The login password of encipherment protection, and the password is invisible to resource user, is used and resource management by resource sharing client
Identical Encryption Algorithm is decrypted to obtain the login password of plaintext to encrypted login password in platform, and using the password to
Corresponding target access-in resource automatically initiates and completes login process.
During resource user uses the resource, client will record duration, peak rate that this uses, flat
The information such as equal rate, signal averaging field strength, the auxiliary reference evaluated as integral and calculating and use quality.
Step F, using finish backed off after random and evaluate and clearing;
In this step, the login of the resource is exited by resource sharing client after resource user's use and removes use
The login password of the resource in the terminal of family, and this use is evaluated by resource user;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is put down by resource management
Platform is according to predefined rule in relation to resource user, resources contribution person and being used in customer data base and resource database
The information of resource is updated operation.
It is emphasized that from the selection for being submitted to completion target resource of resource request for utilization, in addition to the step B1
Except the realization method of~B4, also other two kinds of realization methods (for clarity, be referred to as herein " realization method 2 " and
" realization method 3 "), it is described as follows respectively:
Realization method 2:Corresponding to step C1~C3 in Fig. 3.
Step C1, it is automatic to detect available resources and remind;
In this step, resource sharing client is downloaded available resources offline database from resource management platform first, is preserved
It updates in the user terminal and periodically or non-periodically;The content of available resources offline database include available resources SSID and
BSSID, resource use condition, history evaluation grade, history Mean Speed, associated mobile network base station cell identity information collection
Close etc..From the point of view of information security, the login password of each resource will not be included in offline database.
Resource sharing client is according to the mobile network acquired in real time on the subscriber terminal in nearest a period of time (such as China
Gsm cellular network) base station cell identification information (LAC (Location Area Code, Location Area Code) of such as GSM network and
CI (Cell ID, cell ID)) set, with the base station cell identification information in the available resources offline database that locally preserves
It is compared and whether automatic identification current location has available resources;If so, then pushing prompting message and available money to user
Source recommendation list;
Step C2, resource user is according to the selection target resource from recommendation list itself is liked, by resource sharing client
End notifies the target resource information of selection to resource management platform;
Step C3, resource management platform return to the secure log information of the corresponding target resource to resource sharing client
(including encrypted login password).
Realization method 3:Corresponding to step D1~D3 in Fig. 3.
Step D1, resource sharing client are periodically small by the base station of the mobile network acquired in real time from user terminal
Area's identification information uploads to resource management platform,
Step D2, resource management platform compare the base station cell identification information received with the information in resource database
Pair and matching, to identify whether the current user terminal present position has available WiFi access-in resources;If so, then resource management
Available resources basic information is pushed to resource sharing client by platform, and prompting message and available money are pushed from client to user
Source recommendation list (contains the whole necessary informations completed needed for secure log);
Step D3, user use some resource according to personal like's selection.
In addition it is also necessary to, it is emphasized that the resource user can be resources contribution simultaneously person, naturally it is also possible to no
The person that is resources contribution, the latter in this case, resource user can be by buying integral with modes such as on-line payments.
By the above embodiments as it can be seen that this of the present invention is embedded in resource sharing client in the user terminal, interconnecting
The high in the clouds of net is arranged resource management platform, the resources contribution that the owners of WiFi resources is possessed by resource sharing client
Integral is earned in the use for the resource be out managed by resource management platform, contributed it by others, there is WiFi resources
The user of use demand then exchanges the use for the WiFi resources contributed other people for by its own integral.Meanwhile this
The method of invention ensure that the use of resource does not interfere with safety (i.e. unauthorized access) and its owner of resource
To the control and normal use of resource.To realize sharing for the WiFi resources under controllable state, facilitating user can
It is surfed the Internet with the WiFi access-in resources for utilizing other people to contribute whenever and wherever possible, realizes the efficient utilization of WiFi access-in resources.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.
The content not being described in detail in the present patent application book belongs to the prior art well known to professional and technical personnel in the field.
Claims (1)
1. a kind of WiFi access-in resources sharing method, which is characterized in that this method includes:
Resources contribution person is by the resource sharing client on the user terminal with WiFi access capabilities to resource management platform
Resource sharing application, resource management platform is submitted to be audited to it according to the application information that resources contribution person submits, after the approval
By user information and resource information typing resource database and customer data base;
Resource user submits resource to use Shen by the resource sharing client software on user terminal to resource management platform
Please;
The user terminal current location carried in the application information that resource management platform is submitted according to resource user detects
WiFi resource informations be compared with the information in resource database, if there is qualified available resources, then will can be used
Resource base information is pushed to the resource sharing client of resource user;
Signal quality of the resource sharing client based on each available resources of available resources basic information and user terminal current location
Information generates available resources recommendation list and is presented to resource user;
Resource user chooses the WiFi access-in resources being desirable for, by resource sharing client adding using resource selected by user
Close login password carries out secure log;
The login of the resource is exited by resource sharing client after resource user's use and removes being somebody's turn to do on user terminal
The login password of resource, and this use is evaluated;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is pressed by resource management platform
According to it is predefined rule in customer data base and resource database in relation to resource user, resources contribution person and used resource
Information be updated operation;
Further, the resource sharing application can carry out by the following method, and this method specifically includes:
User terminal is first applied for that the WiFi access-in resources to be contributed are connected to internet by it, the resource on the user terminal
Share SSID, BSSID and password and as application information that client automatically records the current connected WiFi access-in resources arrived
Content, resources contribution person submit resource sharing application;
Further, the secure log specifically includes:
Resource management platform is to have carried out stepping on for encipherment protection to the login password of the available resources of resource sharing client push
Password is recorded, the password is invisible to resource user, is added according to identical on resource management platform by resource sharing client
Encrypted login password is decrypted in close algorithm, and using the password to corresponding resource is automatically initiated and completed and is logged
Journey, and automatically exited from when resource user exits use and log in the resource and removed from the WiFi the Resources lists locally preserved
The login password information of the resource;
Further, the resource request for utilization and available resources push can also with the following method, and this method specifically includes:
Resource request for utilization can be by resource sharing client according to the base station of the mobile network acquired in real time on the subscriber terminal
Cell identity information is compared simultaneously automatic with the base station cell identification information in the available resources offline database locally preserved
Whether identification current location has available resources;If so, then pushing prompting message and available resources recommendation list to user;If
User's selection uses some resource, then asks the encrypted login password of the resource to resource management platform and be automatically performed safe step on
Record;Wherein, available resources offline database refers to the SSID and BSSID of available resources, resource use condition, history evaluation etc.
Grade, history Mean Speed, associated mobile network base station cell identity information set;
Or
The mobile network that resource request for utilization periodically will can also in real time be acquired by resource sharing client from user terminal
The base station cell identification information of network uploads to resource management platform, and is compared with the information in resource database and knows automatically
Whether other current location has available resources;If so, then available resources basic information is pushed to resource point by resource management platform
Client is enjoyed, prompting message and available resources recommendation list are pushed from client to user;If user's selection uses some money
Source is then automatically performed the secure log to the resource;
Further, the content of the resource database includes:WiFi access point resources SSID and BSSID, the login of plaintext are close
Whether code encrypted login password, resources contribution person account, resource use condition, history evaluation grade, pipes off, provides
Source uses details, the integrating of accumulative harvest, associated mobile network base station cell identity information set;Wherein, resource uses item
Part refers to the available period, allows while the maximum number of user of access;Resource refers to the resource user used every time using details
Account, the SSID of used resource and BSSID, use date and time, using duration, the integral of in-service evaluation grade, harvest,
And peak rate, Mean Speed, signal averaging field strength and the present position mobile network base station acquired during this use
Cell identity information set;The login for the plaintext that encrypted login password is provided by resource management platform according to resources contribution person is close
The local cipher algorithm operation of code and setting obtains;History evaluation grade is by resource management platform according in nearest a period of time
Each opinion rating used be calculated and regularly update by predefined rule;Associated mobile network base station cell
Identification information set is the present position mobile network's base used according to each time in nearest a period of time by resource management platform
Cell identity information of standing set is calculated and is regularly updated by predefined rule;
Further, the content of the customer data base includes:Account, name, the SSID of possessed resource and BSSID, it is gathered around
There is the resource of resource to use details, scores accumulated, remaining integral, integral usage record;Wherein, integral usage record refers to each
The resource use date and time, the SSID of used resource and BSSID, use duration, deduct integral;
Further, the available resources basic information specifically includes:The SSID and BSSID of each available resources, history are commented
Valence grade, history Mean Speed, current concurrent user number, encrypted login password;
Further, the available resources recommendation list specifically includes:The SSID and BSSID of each available resources, history are commented
Valence grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index;Respectively
Available resources being ranked sequentially from high to low by combined recommendation index;Wherein, combined recommendation index is according to resource history evaluation
Grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present are added by predefined weight
The value obtained after power summation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410234736.5A CN103997733B (en) | 2014-05-30 | 2014-05-30 | A kind of WiFi access-in resources sharing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410234736.5A CN103997733B (en) | 2014-05-30 | 2014-05-30 | A kind of WiFi access-in resources sharing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103997733A CN103997733A (en) | 2014-08-20 |
CN103997733B true CN103997733B (en) | 2018-08-28 |
Family
ID=51311710
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410234736.5A Active CN103997733B (en) | 2014-05-30 | 2014-05-30 | A kind of WiFi access-in resources sharing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103997733B (en) |
Families Citing this family (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105721403B (en) * | 2014-12-04 | 2019-01-11 | 阿里巴巴集团控股有限公司 | For providing the method, equipment and system of wireless network resource |
CN105992338B (en) * | 2015-02-12 | 2019-12-24 | 阿里巴巴集团控股有限公司 | Positioning method and device |
CN106162818A (en) * | 2015-04-09 | 2016-11-23 | 厦门众联世纪科技有限公司 | The method unlocking WIFI hot spot |
CN106376096B (en) * | 2015-07-24 | 2020-02-14 | 腾讯科技(深圳)有限公司 | Wireless network connection method and equipment thereof |
CN106488539A (en) * | 2015-09-02 | 2017-03-08 | 腾讯科技(深圳)有限公司 | The processing method of WiFi resource and system in terminal |
CN108124297B (en) * | 2015-08-05 | 2021-09-28 | 上海尚往网络科技有限公司 | Method and apparatus for providing access point information of wireless access point |
CN105451180A (en) * | 2015-12-25 | 2016-03-30 | 北京奇虎科技有限公司 | Method and device for realizing WiFi connection |
CN105873049B (en) * | 2016-01-18 | 2017-12-22 | 上海连尚网络科技有限公司 | A kind of method, equipment, system and storage medium for being used to share WAP |
CN106231593A (en) * | 2016-07-22 | 2016-12-14 | 乐视控股(北京)有限公司 | Wi Fi cut-in method and device |
CN106686688A (en) * | 2016-12-28 | 2017-05-17 | 安徽云未科技有限公司 | WiFi sharing system and method based on cloud platform |
WO2018119789A1 (en) * | 2016-12-28 | 2018-07-05 | 华为技术有限公司 | Method for connecting to access point, terminal, and management server |
CN107105477A (en) * | 2017-05-26 | 2017-08-29 | 上海连尚网络科技有限公司 | Share the method and apparatus of feedback or excitation information for providing WAP |
CN109213907A (en) * | 2017-06-29 | 2019-01-15 | 上海连尚网络科技有限公司 | Method and apparatus for recommendation information |
CN109413119B (en) * | 2017-08-15 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Webpage sharing method and related equipment |
CN107968880B (en) * | 2017-11-13 | 2021-02-09 | Oppo广东移动通信有限公司 | Information management method, mobile terminal, and computer-readable storage medium |
CN109451562A (en) * | 2018-10-22 | 2019-03-08 | 上海连尚网络科技有限公司 | Method and apparatus for sharing wireless network |
CN109548025B (en) * | 2018-12-29 | 2022-12-30 | 上海掌门科技有限公司 | Method and device for managing the use rights of a wireless access point provided by a routing device |
CN110677919B (en) * | 2019-04-16 | 2021-06-08 | 上海尚往网络科技有限公司 | Method and equipment for sharing and determining income based on wireless access point |
CN110138792B (en) * | 2019-05-21 | 2020-01-14 | 上海市疾病预防控制中心 | Public health geographic data privacy removal processing method and system |
CN111431854B (en) * | 2020-02-23 | 2021-04-13 | 中国科学院信息工程研究所 | Wi-Fi received signal strength-based double-factor authentication method and electronic device |
CN113177697A (en) * | 2021-04-09 | 2021-07-27 | 深圳市广和通无线股份有限公司 | Cell access method, device, computer equipment and storage medium |
CN114173427A (en) * | 2021-11-26 | 2022-03-11 | 郑州阿帕斯数云信息科技有限公司 | Wireless fidelity (WIFI) connection method, device and system |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103596121A (en) * | 2013-10-30 | 2014-02-19 | 北京网河时代科技有限公司 | Flow sharing method for wireless mobile networks |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8850052B2 (en) * | 2008-09-30 | 2014-09-30 | Apple Inc. | System and method for simplified resource sharing |
-
2014
- 2014-05-30 CN CN201410234736.5A patent/CN103997733B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103596121A (en) * | 2013-10-30 | 2014-02-19 | 北京网河时代科技有限公司 | Flow sharing method for wireless mobile networks |
Also Published As
Publication number | Publication date |
---|---|
CN103997733A (en) | 2014-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103997733B (en) | A kind of WiFi access-in resources sharing method and system | |
CN1685694B (en) | Session key management for public wireless lan supporitng multiple virtual operators | |
CN103988169B (en) | Secure data based on tactful accordance is accessed | |
CN104994504B (en) | With the safety of wireless network and automatically it connect | |
CN103987060B (en) | Flow sharing platform | |
US9589064B2 (en) | Method, device and system for recommending access IP address of server, server and storage medium | |
CN104767715B (en) | Access control method and equipment | |
CN103959863B (en) | For providing the method, mobile device and computer-readable medium that intelligent network accesses selection for portable radio | |
JP4722056B2 (en) | Method and apparatus for personalization and identity management | |
US8495195B1 (en) | Cookie preservation when switching devices | |
CN104247486B (en) | The method and computing device of connection are established between the enterprise security circumference of equipment and enterprise | |
CN106134143A (en) | Method, apparatus and system for dynamic network access-in management | |
CN107852410A (en) | Dissect rogue access point | |
CN103596173A (en) | Wireless network authentication method, client wireless network authentication device, and server wireless network authentication device | |
CN105723761A (en) | Sharing of credentials for a wi-fi network based on social network contacts | |
CN107209659A (en) | Mobile authentication in mobile virtual network | |
CN102497638A (en) | Method, system and mobile terminal for accessing public wireless local area network quickly | |
CN107113596A (en) | The system and method that serving grant polymerization is provided on multiple physics and virtual SIM card | |
CN105516977B (en) | Exempt from password WiFi authentication method based on two-channel wireless router or AP | |
US8689303B1 (en) | Cookie-handling gateway | |
CN106982430B (en) | Portal authentication method and system based on user use habits | |
CN107454064A (en) | A kind of visitor's authentication method and system based on public number | |
CN102427610A (en) | Wireless router with built-in user management function, system and networking method thereof | |
CN105227592B (en) | A kind of Internet architecture and implementation method | |
CN107454046A (en) | The authentication method and device of striding equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |