CN103997733B - A kind of WiFi access-in resources sharing method and system - Google Patents

A kind of WiFi access-in resources sharing method and system Download PDF

Info

Publication number
CN103997733B
CN103997733B CN201410234736.5A CN201410234736A CN103997733B CN 103997733 B CN103997733 B CN 103997733B CN 201410234736 A CN201410234736 A CN 201410234736A CN 103997733 B CN103997733 B CN 103997733B
Authority
CN
China
Prior art keywords
resource
resources
user
information
management platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410234736.5A
Other languages
Chinese (zh)
Other versions
CN103997733A (en
Inventor
李克
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201410234736.5A priority Critical patent/CN103997733B/en
Publication of CN103997733A publication Critical patent/CN103997733A/en
Application granted granted Critical
Publication of CN103997733B publication Critical patent/CN103997733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a kind of WiFi access-in resources sharing methods, resource user proposes resource request for utilization by the resource sharing client on user terminal to resource management platform, the position WiFi resource informations that resource management platform is reported according to the user terminal search available resources in its WiFi preserved resource information bank, and encrypted resource log-on message is sent to resource sharing client, which completes the secure log to target resource using encrypted login information.This mode makes the owner of each WiFi access-in resources other people can be supplied to use resource under the premise of ensureing its WiFi resource security and control, to realize making full use of for WiFi access-in resources.The present invention further simultaneously discloses a kind of WiFi access-in resources share system.

Description

A kind of WiFi access-in resources sharing method and system
Technical field
The invention belongs to mobile communication and mobile Internet field, more particularly to WiFi access points resource sharing method be System.
Background technology
With the extensive use of WiFi (also referred to as WLAN, IEEE802.11 series) technology, due to it is high with transmission rate, The low significant advantage of expense has become the important communication means in people's daily life.The trade company of public place, office space All largely deploy WiFi access devices (referred to herein as WiFi access-in resources) with family, commonly referred to as WiFi routers, WiFi access points (AP), and support WiFi access functions also to become on subscriber terminal equipment such as mobile phone, tablet computer, notebook Standard configuration greatly facilitates people and surfs the Internet whenever and wherever possible.But in general, for the sake of for safety, WiFi access devices can be all arranged Password avoids people without permission from using.But this also results in the waste of WiFi access-in resources simultaneously, has the people of use demand not These resources can be used.Although telecom operators also deploy a large amount of WiFi access devices, but still cannot accomplish to cover comprehensively Lid.Therefore, it is necessary to consider a kind of shared mechanism of the WiFi access-in resources of " all for one, I be everybody ", WiFi resources Owner is out used for other people by the resources contribution possessed, can freely be used when he needs with exchanging for Others contributes the access-in resource come, realizes win-win progress.
At present it has been proposed that a kind of share system is established, by establishing the form of alliance, by WiFi access-in resource owners Access device centralized management, and the member for distributing to alliance as needed freely uses.But this is to sacrifice resource owner Control and normal use to resource are cost.And it needs user to open webpage progress webpage login manually every time and recognizes The access device could be used after card, it is cumbersome.
Invention content
In view of this, proposed by the present invention a kind of for sharing WiFi (also referred to as WLAN, IEEE802.11 series) access money The method and system in source, the purpose is to the owner of each WiFi access-in resources can be allowed to ensure that its access information is safe and right The access information of its own WiFi access-in resources is shared with by resource management platform under the premise of the control of resource Other users, to realize making full use of for WiFi access-in resources.This method is realized simply, without to WiFi access-in resource equipment Hardware modifications, do not influence resource safety and resource owner to the control and normal use of resource, user's docking The login process for entering resource is automatically performed, without human intervention by software, has good realizability.
The embodiment of the present invention provides a kind of WiFi access-in resources share system, realizes making for efficient WiFi access-in resources With.
The embodiment of the present invention provides one kind for carrying out WiFi access-in resource sharing methods, realizes efficient WiFi accesses The use of resource.
In order to achieve the above objectives, technical scheme of the present invention is specifically realized in:
A kind of WiFi access-in resources sharing method, this method include:
Resources contribution person is by the resource sharing client on the user terminal with WiFi access capabilities to resource management Platform submits resource sharing application, resource management platform to be audited to it according to the application information that resources contribution person submits, and audit is logical Later by user information and resource information typing resource database and customer data base;
Resource user submits resource to make by the resource sharing client software on user terminal to resource management platform With application;
The user terminal current location inspection carried in the application information that resource management platform is submitted according to resource user The WiFi resource informations measured are compared with the information in resource database, if there is qualified available resources, then will Available resources basic information is pushed to the resource sharing client of resource user;
Signal of the resource sharing client based on each available resources of available resources basic information and user terminal current location Quality information generates available resources recommendation list and is presented to resource user;
Resource user chooses the WiFi access-in resources being desirable for, and resource selected by user is utilized by resource sharing client Encrypted login password carry out secure log;
The login of the resource is exited by resource sharing client after resource user's use and is removed on user terminal The resource login password, and this use is evaluated;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is put down by resource management Platform is according to predefined rule in relation to resource user, resources contribution person and being used in customer data base and resource database The information of resource is updated operation.
Further, the secure log specifically includes:Available money of the resource management platform to resource sharing client push The login password in source is the login password for having carried out encipherment protection, and the password is invisible to resource user, by resource sharing visitor Family end is decrypted encrypted login password according to identical Encryption Algorithm on resource management platform, and using the password to Corresponding resource automatically initiates and completes login process, and is automatically exited from when resource user exits use and log in the resource simultaneously The login password information of the resource is removed from the WiFi the Resources lists locally preserved.
Further, the resource sharing application can apply for that the WiFi access-in resources to be contributed are connected to interconnection using it It is completed on the user terminal of net.User terminal is first applied for that the WiFi access-in resources to be contributed are connected to internet by it, it should Resource sharing client on user terminal automatically records SSID, BSSID of the current connected WiFi access-in resources arrived and close Information and the contents as application information such as code, resources contribution person submit resource sharing application after supplementing other necessary informations.
Further, resource request for utilization can also be by resource sharing client according to the shifting acquired in real time on the subscriber terminal In the base station cell identification information of dynamic network (such as China Mobile GSM network) and the available resources offline database locally preserved Base station cell identification information is compared and whether automatic identification current location has available resources;If so, then being pushed to user Prompting message and available resources recommendation list;If user's selection uses some resource, the money is asked to resource management platform The encrypted login password in source is simultaneously automatically performed secure log.
Further, resource request for utilization periodically will can also in real time be adopted by resource sharing client from user terminal The base station cell identification information of the mobile network of collection uploads to resource management platform, and is compared with the information in resource database Pair and automatic identification current location whether have available resources;If so, then resource management platform pushes away available resources basic information Resource sharing client is given, prompting message and available resources recommendation list are pushed from client to user;If user selects Using some resource, then the secure log to the resource is automatically performed.
Further, the user terminal refers to the various forms of subscriber terminal equipments with WiFi access functions, including but It is not limited to smart mobile phone, tablet computer, PC machine etc..
Further, the content of the resource database includes but not limited to:WiFi access point resource SSID (Service Set Identifier) and BSSID (Basic Service Set Identifier), plaintext login password, encrypted step on Record password, resources contribution person account, resource use condition, history evaluation grade, whether pipe off, resource using details, The integrating of accumulative harvest, associated mobile network base station cell identity information set;
Wherein, resource use condition refers to the restricted informations such as available period, the maximum number of user for allowing while accessing;Resource Using details refer to the resource user account used every time, the SSID and BSSID of used resource, use date and time, Use peak rate, Mean Speed, the letter acquired during duration, in-service evaluation grade, the integral of harvest and this use Number average field-strength and present position mobile network base station cell identity information set etc.;Encrypted login password is put down by resource management The login password for the plaintext that platform is provided according to resources contribution person and the local cipher algorithm operation of setting obtain;History evaluation grade It is to be calculated by predefined rule according to each opinion rating used in nearest a period of time by resource management platform To and regularly update;Associated mobile network base station cell identity information set be by resource management platform according to nearest one section when Each time interior present position mobile network base station cell identity information set used is calculated by predefined rule And it regularly updates;Mobile network base station cell identity information refers to the base for the mobile communications network of the various standards of unique mark The information for cell of standing.
Further, the content of the customer data base includes but not limited to:Account, name, possessed resource SSID and BSSID, possessed resource resource use details, scores accumulated, remaining integral, integral usage record.
Wherein, integral usage record refer to each resource use date and time, used resource SSID and BSSID, duration, deduction integral etc. are used.
Further, the integral can be ideal money, integral score value.User can pass through account real money online The modes such as payment are supplemented with money and exchange integral for.
Further, available resources offline database refers to the SSID and BSSID of available resources, resource use condition, history Opinion rating, history Mean Speed, associated mobile network base station cell identity information set.
Further, the available resources basic information includes the SSID and BSSID of each available resources, history evaluation etc. Grade, history Mean Speed, current concurrent user number, encrypted login password;
Further, the available resources recommendation list includes that the SSID and BSSID of each available resources, resource history are commented Valence grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index.Respectively Available resources being ranked sequentially from high to low by combined recommendation index;
Wherein, combined recommendation index be according to resource history evaluation grade, history Mean Speed, current concurrent user number, Current signal strength, interference levels present are weighted the value obtained after summation by predefined weight.
Further, the mobile network base station identification information refers to being used for the various standards of unique mark (2G/3G/4G etc.) The information of the base station cell of mobile communications network, including but not limited to LAC (Location Area Code)/CI (cell ID), SID/NID/ CI, TAC/CI etc..
A kind of WiFi access-in resources share system, including:Resource management platform and setting resource in the user terminal point Enjoy client software;
The resource management platform, the resource sharing application submitted to resources contribution person is verified and is put in storage, to resource Database and customer data base are managed, and carry out permission examination & approval to the resource request for utilization of resource user, available resources are believed Breath inquiry carries out available resources automatic identification with distribution, based on mobile network base station cell identity information, and feelings are used according to resource Condition is updated the integral of resources contribution person and resource user, evaluates the use quality of resource, to resources contribution The account information of person and resource user are managed.
The resource sharing client, resources contribution person is used for carrying out the application of resource sharing and change, account information are looked into It askes, resource user is used for carrying out application, the account information inquiry that resource uses, and is based on mobile network base station cell identity information Progress available resources automatic identification and prompting, the removing to the secure log of available resources, use, evaluation and logon information, and The interaction of the related datas such as user information, resource information, integration information is carried out with resource management platform.
From said program as can be seen that the present invention will allow the owner of WiFi access-in resources to go out its resource sharing Come the people's use for needing to utilize the online of WiFi resources for other, and this use is not influence normally making for resource owner With with to the resource control, ensure that the login of WiFi resources carries out under the premise of controlled and safety, avoid not User through permission arbitrarily uses WiFi resources.That is, the present invention realizes the WiFi resources under controllable state Share, facilitates the WiFi access-in resources that user can utilize other people to contribute whenever and wherever possible and surf the Internet, realize WiFi access moneys The efficient utilization in source.
Description of the drawings
Fig. 1 is the structure chart of the WiFi access-in resource share systems of the embodiment of the present invention;
Fig. 2 is the flow chart of the resources contribution process of the WiFi access-in resource sharing methods of the embodiment of the present invention;
Fig. 3 is that the resource of the WiFi access-in resource sharing methods of the embodiment of the present invention uses the flow chart of process.
In attached drawing, the component names representated by each label are as follows:
101, user terminal, 102, resource sharing client, 103, resource management platform, 104, WiFi access-in resources, S1 ~S4, step, A, step, B1~B4, step, C1~C3, step, D1~D3, step, E~F, step.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention more comprehensible, develop simultaneously embodiment referring to the drawings, right The present invention is described in further detail.
The embodiment of the present invention is mainly embedded in resource sharing client software in the user terminal, and resource pipe is arranged beyond the clouds Platform, resources contribution person submits resource sharing application using resource sharing client to resource management platform, through resource management Relevant information is stored in the database of platform after platform audit, resource user utilizes resource sharing client to resource management Platform submits resource request for utilization, and resource management platform is according to the present position WiFi resource informations and database carried in application In resource match and after the approval, log-on message fed back to resource sharing client in a manner of encrypted, by visitor The secure log to target resource is completed at family end under controlled environment, and is discharged the resource after use and removed login Information.The present invention realizes sharing for the WiFi resources under controllable state, other can be utilized whenever and wherever possible by facilitating user The WiFi access-in resources online of people's contribution, realizes the efficient utilization of WiFi access-in resources.
Fig. 1 is the structure chart of the realization WiFi access-in resource share systems of the embodiment of the present invention, which includes:Resource pipe Platform 103 and user terminal 101 equipped with resource sharing client 102;Resource management platform 103 may be coupled to interconnection Net, and have from the addressable public network IP address of outer net;User terminal 101 has the ability for accessing internet;Resource management is flat Platform 103 is connected by wireless network and internet with the user terminal 101 equipped with resource sharing client 102;Resource sharing visitor It completes to step on to the safety of WiFi access-in resources 104 using the encrypted log-on message that resource management platform 103 is fed back in family end 102 Record.
The resource management platform 103 passes through the resource sharing client 102 in user terminal 101 to resources contribution person The resource sharing application of submission carries out audit and input database, is managed to resource database and customer data base, to money The resource request for utilization of source user carries out that permission examination & approval, available resource information inquiry and distribution, to be based on mobile network base station small Area's identification information carries out available resources automatic identification, according to resource service condition to the integral of resources contribution person and resource user It is updated, the use quality of resource is evaluated, the account information of resources contribution person and resource user are managed Deng.
The resource sharing client 102, resources contribution person are used for carrying out application and change, the account information of resource sharing Inquiry, resource user are used for carrying out application, the account information inquiry that resource uses, are believed based on mobile network base station cell ID Breath carries out available resources automatic identification and prompting, to the secure log of selected WiFi access-in resources 104, use, evaluation and The removing of log-on message, and carry out the related datas such as user information, resource information, integration information with resource management platform 103 Interaction.
The user terminal 101 can be any terminal device with WiFi access capabilities, including but not limited to carry Smart mobile phone, tablet computer, laptop of WiFi function etc..
The WiFi access-in resources 104 refer to that all IEEE802.11 series standards that meet (include but not limited to 802.11a/b/g/n/ac etc.) offer wireless access equipment, the commonly referred to as AP of WiFi (access point), WiFi routers.
The method that the embodiment of the present invention carries out resource sharing in above resource sharing system is explained below.Fig. 2 is The flow chart of the resources contribution process of the WiFi access-in resource sharing methods of the embodiment of the present invention, the specific steps are:
Step S1, resources contribution person carry out the registration of resource sharing system by the resource sharing client on user terminal And login;
Step S2, resource sharing application;
In this step, resources contribution person is submitted to resource management platform by the resource sharing client on user terminal and is provided Application is shared in source, submits essential information (including SSID, BSSID, plaintext in information comprising shared WiFi access-in resources Login password etc.), to the resource allow to use restrictive condition (including allow simultaneously access maximum number of user, allow to make Period etc.) and prove that he or she is the relevant evidential material of resource lawful owner;
In this step, the essential information of access-in resource can also be by resource sharing client automatic collection, with the proviso that money User terminal first will be connected to internet by source contribution person by the WiFi access-in resources shared.The advantage of doing so is that one Aspect can ensure that the access-in resource is available, and on the other hand, can also verify resources contribution person couple to a certain extent Legal the possessing property of the WiFi access-in resources.
Step S3, application information verification:The administrative staff of resource management platform audit application information;
Step S4, user information and resource information storage;
In this step, after application is by audit, system is by the user information of resources contribution person and resource information typing user Database and resource database.
The content of wherein resource database include WiFi access point resources SSID (Service Set Identifier) and BSSID (Basic Service Set Identifier), the login password of plaintext, encrypted login password, resources contribution person Account, resource use condition, history evaluation grade, whether pipe off, resource using details, accumulative harvest integral, close The mobile network base station cell identity information set of connection;
Wherein, the login password for the plaintext that encrypted login password is provided by resource management platform according to resources contribution person and The local cipher algorithm operation of setting obtains;
Wherein, resource use condition refers to the available period, allows while accessing the restricted informations such as maximum number of user;
Wherein, history evaluation grade is the evaluation etc. used according to each time in nearest a period of time by resource management platform Grade is calculated and is regularly updated by predefined rule;
Wherein, resource using details refer to the resource user account used every time, the SSID of used resource and BSSID, use date and time acquire using during duration, in-service evaluation grade, the integral of harvest and this use Peak rate, Mean Speed, signal averaging field strength and present position mobile network base station cell identity information set etc.;
Wherein, associated mobile network base station cell identity information set be by resource management platform according to nearest one section when Each time interior present position mobile network base station cell identity information set used is calculated by predefined rule And it regularly updates;
Wherein, mobile network base station cell identity information refers to the mobile communications network for the various standards of unique mark The information of base station cell;
The content of wherein customer data base includes account, name, the SSID of possessed resource and BSSID, possessed resource Resource using details, scores accumulated, remaining integral, (each resource use date and time are used integral usage record The SSID and BSSID of resource, duration, deduction integral etc. are used).
Resources contribution person can also login system carry out relevant information (for example allowing usage time interval) modification.When its is right The login password of the WiFi access-in resource equipment has done the update for answering active login system to carry out data after change, to avoid resource User's login failure when logging in the resource.If with existing password login failure, system can be recorded and be reminded to this Resources contribution person updates the data, and otherwise the resource information can pipe off, be forbidden to use.
Fig. 3 is that the resource of the WiFi access-in resource sharing methods of the embodiment of the present invention uses the flow chart of process, specific Step is:
Step A, resource user carry out the registration of resource sharing system by the resource sharing client on user terminal And login.
Step B1, resource user initiate request for utilization to resource sharing platform;
In this step, after initiating to apply, the WiFi switches that resource sharing client can detect user terminal first are No opening is opened if reminding user without if to scan the WiFi resource informations of present position.What resource user submitted All WiFi resource informations that the user terminal detects in current location (including each WiFi access moneys are carried in request for utilization SSID, the BSSID etc. in source).
Step B2 searches for available resources and uploads platform inquiry;
In this step, WiFi resource informations that resource management platform is submitted according to resource user in resource database Information is compared.
Step B3, platform return to available resources basic information;
In this step, if platform discovery has qualified available resources, by the basic information of these available resources It is (SSID and BSSID of each available resources, history evaluation grade, history Mean Speed, current concurrent user number, encrypted Login password etc.) it is pushed to the resource sharing client of resource user.
Step B4, selection target resource;
In this step, resource sharing client is based on each available money of available resources basic information and user terminal current location Signal quality (the signal strength and interference level) information in source generates available resources recommendation list and is presented to resource user, and The WiFi access-in resources being desirable for are chosen by resource user;
The available resources recommendation list includes the SSID and BSSID of each available resources, history evaluation grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index.Each available resources are by comprehensive It closes and recommends index being ranked sequentially from high to low.Wherein, combined recommendation index is average according to resource history evaluation grade, history Rate, current concurrent user number, current signal strength, interference levels present obtain after being weighted summation by predefined weight Value.
Step E, secure log target resource;
In this step, resource management platform is to carry out to the login password of the available resources of resource sharing client push The login password of encipherment protection, and the password is invisible to resource user, is used and resource management by resource sharing client Identical Encryption Algorithm is decrypted to obtain the login password of plaintext to encrypted login password in platform, and using the password to Corresponding target access-in resource automatically initiates and completes login process.
During resource user uses the resource, client will record duration, peak rate that this uses, flat The information such as equal rate, signal averaging field strength, the auxiliary reference evaluated as integral and calculating and use quality.
Step F, using finish backed off after random and evaluate and clearing;
In this step, the login of the resource is exited by resource sharing client after resource user's use and removes use The login password of the resource in the terminal of family, and this use is evaluated by resource user;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is put down by resource management Platform is according to predefined rule in relation to resource user, resources contribution person and being used in customer data base and resource database The information of resource is updated operation.
It is emphasized that from the selection for being submitted to completion target resource of resource request for utilization, in addition to the step B1 Except the realization method of~B4, also other two kinds of realization methods (for clarity, be referred to as herein " realization method 2 " and " realization method 3 "), it is described as follows respectively:
Realization method 2:Corresponding to step C1~C3 in Fig. 3.
Step C1, it is automatic to detect available resources and remind;
In this step, resource sharing client is downloaded available resources offline database from resource management platform first, is preserved It updates in the user terminal and periodically or non-periodically;The content of available resources offline database include available resources SSID and BSSID, resource use condition, history evaluation grade, history Mean Speed, associated mobile network base station cell identity information collection Close etc..From the point of view of information security, the login password of each resource will not be included in offline database.
Resource sharing client is according to the mobile network acquired in real time on the subscriber terminal in nearest a period of time (such as China Gsm cellular network) base station cell identification information (LAC (Location Area Code, Location Area Code) of such as GSM network and CI (Cell ID, cell ID)) set, with the base station cell identification information in the available resources offline database that locally preserves It is compared and whether automatic identification current location has available resources;If so, then pushing prompting message and available money to user Source recommendation list;
Step C2, resource user is according to the selection target resource from recommendation list itself is liked, by resource sharing client End notifies the target resource information of selection to resource management platform;
Step C3, resource management platform return to the secure log information of the corresponding target resource to resource sharing client (including encrypted login password).
Realization method 3:Corresponding to step D1~D3 in Fig. 3.
Step D1, resource sharing client are periodically small by the base station of the mobile network acquired in real time from user terminal Area's identification information uploads to resource management platform,
Step D2, resource management platform compare the base station cell identification information received with the information in resource database Pair and matching, to identify whether the current user terminal present position has available WiFi access-in resources;If so, then resource management Available resources basic information is pushed to resource sharing client by platform, and prompting message and available money are pushed from client to user Source recommendation list (contains the whole necessary informations completed needed for secure log);
Step D3, user use some resource according to personal like's selection.
In addition it is also necessary to, it is emphasized that the resource user can be resources contribution simultaneously person, naturally it is also possible to no The person that is resources contribution, the latter in this case, resource user can be by buying integral with modes such as on-line payments.
By the above embodiments as it can be seen that this of the present invention is embedded in resource sharing client in the user terminal, interconnecting The high in the clouds of net is arranged resource management platform, the resources contribution that the owners of WiFi resources is possessed by resource sharing client Integral is earned in the use for the resource be out managed by resource management platform, contributed it by others, there is WiFi resources The user of use demand then exchanges the use for the WiFi resources contributed other people for by its own integral.Meanwhile this The method of invention ensure that the use of resource does not interfere with safety (i.e. unauthorized access) and its owner of resource To the control and normal use of resource.To realize sharing for the WiFi resources under controllable state, facilitating user can It is surfed the Internet with the WiFi access-in resources for utilizing other people to contribute whenever and wherever possible, realizes the efficient utilization of WiFi access-in resources.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.
The content not being described in detail in the present patent application book belongs to the prior art well known to professional and technical personnel in the field.

Claims (1)

1. a kind of WiFi access-in resources sharing method, which is characterized in that this method includes:
Resources contribution person is by the resource sharing client on the user terminal with WiFi access capabilities to resource management platform Resource sharing application, resource management platform is submitted to be audited to it according to the application information that resources contribution person submits, after the approval By user information and resource information typing resource database and customer data base;
Resource user submits resource to use Shen by the resource sharing client software on user terminal to resource management platform Please;
The user terminal current location carried in the application information that resource management platform is submitted according to resource user detects WiFi resource informations be compared with the information in resource database, if there is qualified available resources, then will can be used Resource base information is pushed to the resource sharing client of resource user;
Signal quality of the resource sharing client based on each available resources of available resources basic information and user terminal current location Information generates available resources recommendation list and is presented to resource user;
Resource user chooses the WiFi access-in resources being desirable for, by resource sharing client adding using resource selected by user Close login password carries out secure log;
The login of the resource is exited by resource sharing client after resource user's use and removes being somebody's turn to do on user terminal The login password of resource, and this use is evaluated;
The resource that this is used is used details to upload resource management platform by resource sharing client, and is pressed by resource management platform According to it is predefined rule in customer data base and resource database in relation to resource user, resources contribution person and used resource Information be updated operation;
Further, the resource sharing application can carry out by the following method, and this method specifically includes:
User terminal is first applied for that the WiFi access-in resources to be contributed are connected to internet by it, the resource on the user terminal Share SSID, BSSID and password and as application information that client automatically records the current connected WiFi access-in resources arrived Content, resources contribution person submit resource sharing application;
Further, the secure log specifically includes:
Resource management platform is to have carried out stepping on for encipherment protection to the login password of the available resources of resource sharing client push Password is recorded, the password is invisible to resource user, is added according to identical on resource management platform by resource sharing client Encrypted login password is decrypted in close algorithm, and using the password to corresponding resource is automatically initiated and completed and is logged Journey, and automatically exited from when resource user exits use and log in the resource and removed from the WiFi the Resources lists locally preserved The login password information of the resource;
Further, the resource request for utilization and available resources push can also with the following method, and this method specifically includes:
Resource request for utilization can be by resource sharing client according to the base station of the mobile network acquired in real time on the subscriber terminal Cell identity information is compared simultaneously automatic with the base station cell identification information in the available resources offline database locally preserved Whether identification current location has available resources;If so, then pushing prompting message and available resources recommendation list to user;If User's selection uses some resource, then asks the encrypted login password of the resource to resource management platform and be automatically performed safe step on Record;Wherein, available resources offline database refers to the SSID and BSSID of available resources, resource use condition, history evaluation etc. Grade, history Mean Speed, associated mobile network base station cell identity information set;
Or
The mobile network that resource request for utilization periodically will can also in real time be acquired by resource sharing client from user terminal The base station cell identification information of network uploads to resource management platform, and is compared with the information in resource database and knows automatically Whether other current location has available resources;If so, then available resources basic information is pushed to resource point by resource management platform Client is enjoyed, prompting message and available resources recommendation list are pushed from client to user;If user's selection uses some money Source is then automatically performed the secure log to the resource;
Further, the content of the resource database includes:WiFi access point resources SSID and BSSID, the login of plaintext are close Whether code encrypted login password, resources contribution person account, resource use condition, history evaluation grade, pipes off, provides Source uses details, the integrating of accumulative harvest, associated mobile network base station cell identity information set;Wherein, resource uses item Part refers to the available period, allows while the maximum number of user of access;Resource refers to the resource user used every time using details Account, the SSID of used resource and BSSID, use date and time, using duration, the integral of in-service evaluation grade, harvest, And peak rate, Mean Speed, signal averaging field strength and the present position mobile network base station acquired during this use Cell identity information set;The login for the plaintext that encrypted login password is provided by resource management platform according to resources contribution person is close The local cipher algorithm operation of code and setting obtains;History evaluation grade is by resource management platform according in nearest a period of time Each opinion rating used be calculated and regularly update by predefined rule;Associated mobile network base station cell Identification information set is the present position mobile network's base used according to each time in nearest a period of time by resource management platform Cell identity information of standing set is calculated and is regularly updated by predefined rule;
Further, the content of the customer data base includes:Account, name, the SSID of possessed resource and BSSID, it is gathered around There is the resource of resource to use details, scores accumulated, remaining integral, integral usage record;Wherein, integral usage record refers to each The resource use date and time, the SSID of used resource and BSSID, use duration, deduct integral;
Further, the available resources basic information specifically includes:The SSID and BSSID of each available resources, history are commented Valence grade, history Mean Speed, current concurrent user number, encrypted login password;
Further, the available resources recommendation list specifically includes:The SSID and BSSID of each available resources, history are commented Valence grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present, combined recommendation index;Respectively Available resources being ranked sequentially from high to low by combined recommendation index;Wherein, combined recommendation index is according to resource history evaluation Grade, history Mean Speed, current concurrent user number, current signal strength, interference levels present are added by predefined weight The value obtained after power summation.
CN201410234736.5A 2014-05-30 2014-05-30 A kind of WiFi access-in resources sharing method and system Active CN103997733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410234736.5A CN103997733B (en) 2014-05-30 2014-05-30 A kind of WiFi access-in resources sharing method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410234736.5A CN103997733B (en) 2014-05-30 2014-05-30 A kind of WiFi access-in resources sharing method and system

Publications (2)

Publication Number Publication Date
CN103997733A CN103997733A (en) 2014-08-20
CN103997733B true CN103997733B (en) 2018-08-28

Family

ID=51311710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410234736.5A Active CN103997733B (en) 2014-05-30 2014-05-30 A kind of WiFi access-in resources sharing method and system

Country Status (1)

Country Link
CN (1) CN103997733B (en)

Families Citing this family (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721403B (en) * 2014-12-04 2019-01-11 阿里巴巴集团控股有限公司 For providing the method, equipment and system of wireless network resource
CN105992338B (en) * 2015-02-12 2019-12-24 阿里巴巴集团控股有限公司 Positioning method and device
CN106162818A (en) * 2015-04-09 2016-11-23 厦门众联世纪科技有限公司 The method unlocking WIFI hot spot
CN106376096B (en) * 2015-07-24 2020-02-14 腾讯科技(深圳)有限公司 Wireless network connection method and equipment thereof
CN106488539A (en) * 2015-09-02 2017-03-08 腾讯科技(深圳)有限公司 The processing method of WiFi resource and system in terminal
CN108124297B (en) * 2015-08-05 2021-09-28 上海尚往网络科技有限公司 Method and apparatus for providing access point information of wireless access point
CN105451180A (en) * 2015-12-25 2016-03-30 北京奇虎科技有限公司 Method and device for realizing WiFi connection
CN105873049B (en) * 2016-01-18 2017-12-22 上海连尚网络科技有限公司 A kind of method, equipment, system and storage medium for being used to share WAP
CN106231593A (en) * 2016-07-22 2016-12-14 乐视控股(北京)有限公司 Wi Fi cut-in method and device
CN106686688A (en) * 2016-12-28 2017-05-17 安徽云未科技有限公司 WiFi sharing system and method based on cloud platform
WO2018119789A1 (en) * 2016-12-28 2018-07-05 华为技术有限公司 Method for connecting to access point, terminal, and management server
CN107105477A (en) * 2017-05-26 2017-08-29 上海连尚网络科技有限公司 Share the method and apparatus of feedback or excitation information for providing WAP
CN109213907A (en) * 2017-06-29 2019-01-15 上海连尚网络科技有限公司 Method and apparatus for recommendation information
CN109413119B (en) * 2017-08-15 2021-07-27 腾讯科技(深圳)有限公司 Webpage sharing method and related equipment
CN107968880B (en) * 2017-11-13 2021-02-09 Oppo广东移动通信有限公司 Information management method, mobile terminal, and computer-readable storage medium
CN109451562A (en) * 2018-10-22 2019-03-08 上海连尚网络科技有限公司 Method and apparatus for sharing wireless network
CN109548025B (en) * 2018-12-29 2022-12-30 上海掌门科技有限公司 Method and device for managing the use rights of a wireless access point provided by a routing device
CN110677919B (en) * 2019-04-16 2021-06-08 上海尚往网络科技有限公司 Method and equipment for sharing and determining income based on wireless access point
CN110138792B (en) * 2019-05-21 2020-01-14 上海市疾病预防控制中心 Public health geographic data privacy removal processing method and system
CN111431854B (en) * 2020-02-23 2021-04-13 中国科学院信息工程研究所 Wi-Fi received signal strength-based double-factor authentication method and electronic device
CN113177697A (en) * 2021-04-09 2021-07-27 深圳市广和通无线股份有限公司 Cell access method, device, computer equipment and storage medium
CN114173427A (en) * 2021-11-26 2022-03-11 郑州阿帕斯数云信息科技有限公司 Wireless fidelity (WIFI) connection method, device and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103596121A (en) * 2013-10-30 2014-02-19 北京网河时代科技有限公司 Flow sharing method for wireless mobile networks

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8850052B2 (en) * 2008-09-30 2014-09-30 Apple Inc. System and method for simplified resource sharing

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103596121A (en) * 2013-10-30 2014-02-19 北京网河时代科技有限公司 Flow sharing method for wireless mobile networks

Also Published As

Publication number Publication date
CN103997733A (en) 2014-08-20

Similar Documents

Publication Publication Date Title
CN103997733B (en) A kind of WiFi access-in resources sharing method and system
CN1685694B (en) Session key management for public wireless lan supporitng multiple virtual operators
CN103988169B (en) Secure data based on tactful accordance is accessed
CN104994504B (en) With the safety of wireless network and automatically it connect
CN103987060B (en) Flow sharing platform
US9589064B2 (en) Method, device and system for recommending access IP address of server, server and storage medium
CN104767715B (en) Access control method and equipment
CN103959863B (en) For providing the method, mobile device and computer-readable medium that intelligent network accesses selection for portable radio
JP4722056B2 (en) Method and apparatus for personalization and identity management
US8495195B1 (en) Cookie preservation when switching devices
CN104247486B (en) The method and computing device of connection are established between the enterprise security circumference of equipment and enterprise
CN106134143A (en) Method, apparatus and system for dynamic network access-in management
CN107852410A (en) Dissect rogue access point
CN103596173A (en) Wireless network authentication method, client wireless network authentication device, and server wireless network authentication device
CN105723761A (en) Sharing of credentials for a wi-fi network based on social network contacts
CN107209659A (en) Mobile authentication in mobile virtual network
CN102497638A (en) Method, system and mobile terminal for accessing public wireless local area network quickly
CN107113596A (en) The system and method that serving grant polymerization is provided on multiple physics and virtual SIM card
CN105516977B (en) Exempt from password WiFi authentication method based on two-channel wireless router or AP
US8689303B1 (en) Cookie-handling gateway
CN106982430B (en) Portal authentication method and system based on user use habits
CN107454064A (en) A kind of visitor's authentication method and system based on public number
CN102427610A (en) Wireless router with built-in user management function, system and networking method thereof
CN105227592B (en) A kind of Internet architecture and implementation method
CN107454046A (en) The authentication method and device of striding equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant