CN106604278B - Multi-authority mobile network sharing method - Google Patents
Multi-authority mobile network sharing method Download PDFInfo
- Publication number
- CN106604278B CN106604278B CN201611151684.0A CN201611151684A CN106604278B CN 106604278 B CN106604278 B CN 106604278B CN 201611151684 A CN201611151684 A CN 201611151684A CN 106604278 B CN106604278 B CN 106604278B
- Authority
- CN
- China
- Prior art keywords
- client
- user
- internet
- access
- authority
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
Abstract
A multi-authority mobile network sharing method comprises MAC address verification, login password verification, administrator confirmation and automatic monitoring of internet access behaviors. The method is characterized in that the set authority management of the login password is added on an application layer, the devices accessed to the shared network through different passwords are distinguished, different network use authorities are designed aiming at different login passwords, and the flow control of the access devices is realized. The method can directly realize the management of the access equipment through the setting of the application layer, so that the user can conveniently carry out personalized authority setting according to the self condition. The method can control the whole flow of the shared network and simultaneously meet the flow use requirement of the authorized specific equipment.
Description
Technical Field
The invention relates to a wireless network sharing technology, in particular to a multi-authority mobile network sharing method.
Background
In the prior art, a wireless network sharing AP (Access Point, wireless Access node, wireless router network Access Point) can be set through a mobile phone, so as to implement wireless network sharing. After the sharing is set, other devices can be connected with the terminal through WiFi to be communicated with the Internet. However, in the prior art, when the WiFi connection is provided, the mobile phone connected to the WiFi network cannot distinguish the current connection between the mobile phone hotspot and the normal WiFi. Once a certain mobile phone starts a shared network, other intelligent devices connected with the mobile phone network shared AP all consider that the current connection environment is WiFi, and therefore operations such as data downloading and updating are performed in a background of the intelligent device by default according to settings in the WiFi environment, and a large amount of traffic is generated. And thus user traffic can typically only be managed from AP points that set up wireless network sharing.
In the existing user traffic management method, users are generally distinguished on a physical network level (MAC address) and a network routing (IP address) level by using a Wifi AP (access device), and an internet access authority is set. At the physical network level: each accessed communication module (such as a network card) has a unique hardware identification MAC address, and communication is carried out between the communication modules by the MAC address and the router address for identifying each other in a network layer. In WiFi access control, some terminals may be prohibited or allowed to access the AP by setting a black and white list of MAC addresses. At the network routing level: each communication terminal is assigned with an IP address, and data communication is carried out between the terminals through the matching relation between the IP addresses, so that in the Wifi access control, a black and white list of the IP addresses can be set to prohibit or allow other terminals to access the AP.
However, it is troublesome for the AP device to perform user identification and authentication through the MAC address or the IP address. Since this means that the AP administrator must already know the MAC address or IP address of the access device before communicating, and only then can the corresponding settings be made. This is clearly not reasonable. At an application layer where a user can easily perform a setting operation, the current technology can only perform network sharing confirmation through one WiFi access password. In this way, all access points can share WiFi indiscriminately, and the user cannot perform hierarchical weighted management on the accessed devices, and therefore cannot control traffic generated by the accessed devices.
Therefore, in order to facilitate the user to manage the traffic during the sharing period, there is an urgent need to provide a method for controlling each access device to use the network at the application layer. So as to limit the flow generated when some users access the shared AP network, and simultaneously control the access speed, the access duration and the like of the shared network.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a multi-authority mobile network sharing method.
The method distinguishes different clients through different access passwords, and inquires a user internet access authority configuration table according to the passwords to determine the internet access authority of the corresponding client. And limiting the access speed, the access duration and the like of the corresponding client according to the internet access authorities.
Firstly, in order to achieve the above object, a multi-authority mobile network sharing method is proposed, when a client requests a mobile network sharing an access point through a physical layer, a data link layer, a network layer, a transport layer, a session layer, a presentation layer and an application layer in sequence, the application layer processes according to the following steps:
firstly, a client sends a connection request to an access point; the client is equipment requesting to access a mobile network, and comprises a smart phone, a tablet, a computer, wearable equipment and the like; the access point is a terminal providing a mobile network sharing function and comprises wireless routing network access equipment such as a smart phone, a tablet, a computer and the like; the connection request comprises MAC address information and access password information of the client;
secondly, the access point analyzes the connection request, acquires a client MAC address, inquires whether the MAC address belongs to an address which allows network sharing in a user internet access permission configuration table or not according to the MAC address, judges whether the client is allowed to access, and if the client is allowed to access, the client is required to send a password and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for the client, a user internet access authority configuration table is inquired according to password information (namely an access password) sent by the client, and if the password information is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
Here, "matching" means that the MAC address, the password, and the usage of the shared network of the client are all consistent with the information in the user access permission table, that is, the MAC address of the client is marked in the user access permission configuration table as being allowed to access, the password provided by the client corresponds to the password stored in the user access permission configuration table by the MAC address, and the access behavior of the client, that is, the consumption of network resources (including traffic, duration, bandwidth, and corresponding statistical information) when using the shared mobile network, is all within the range allowed by the user access permission configuration table.
Further, in order to enable the user to manage the mobile network sharing more flexibly, in the third step, if the password information is matched with the user internet access permission configuration table, before jumping to the fourth step, the method further includes the following steps: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
Similarly, in the fifth step of the method, before rejecting and disconnecting the sharing of the client, the method further includes the following steps: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
Here, the two points "ask the user" may be provided for the user by means of a pop-up dialog box, or may be implemented by prompting the user to change the corresponding setting by the user himself.
Further, in the method, the information in the user internet access permission configuration table includes an MAC address, passwords, and user internet access permissions corresponding to the passwords.
The password may be automatically generated by the access point or may be set by the user himself.
The MAC address can correspond to a plurality of different passwords, and the user internet access authority is different among the different passwords corresponding to the MAC address. That is, the user can set different permissions for one client to perform flexible network sharing management.
The user internet access authority includes limitation of internet access flow, limitation of internet access time, limitation of occupied network bandwidth and the like. The user can flexibly set different user internet access authorities according to the characteristics of different devices, and the user can not influence the use of the mobile network by the user and bring unnecessary mobile data burden to the user due to network sharing while the mobile network sharing is provided.
Correspondingly, the internet access behavior of the user side monitored in the fourth step of the present invention includes internet access traffic, internet access time, network bandwidth occupation, and the like of the user side.
Correspondingly, the user internet behavior log in the fourth step includes the respective internet traffic, internet time, occupied network bandwidth and the like of each client and statistics of the information. Once, upon monitoring, it is found that the user side transcends the traffic limit, transcends the time limit, transcends the bandwidth limit, or the user side's corresponding log record of the internet behavior has shown that it transcends the mobile network resources (including traffic, time, and bandwidth) of the access point, it is prompted to disconnect its sharing with the access point.
Advantageous effects
The invention sets different passwords on the application layer, cooperates with the user Internet access authority configuration table, and judges whether to reject and disconnect the connection of the client by comparing whether the Internet access behavior of the client accords with the authority limit of the user Internet access authority configuration table to the client, thereby controlling the resources (including flow, time, bandwidth and the like) occupied by the client. In the method, the client only needs to set different access passwords on an application layer by himself or automatically through the access point, and different authorities can be distinguished by verifying the passwords sent by different clients. The method realizes the limitation of the mobile network sharing behaviors of different clients in an application layer, and simplifies the difficulty of managing the network sharing behaviors of the clients by users.
Meanwhile, the method is different from the existing method for distinguishing the user permission on the physical network or network routing level, and the internet access behavior of the client is monitored on the application layer. Because the data such as user internet traffic, internet time, occupied network bandwidth and the like can be accurately counted in the physical layer (the data are sensitive data concerned in use of the user), the invention measures the internet behavior of the client according to the data, and compares the internet behavior of the client with the authority limit in the user internet authority configuration table to determine whether the mobile network sharing can be carried out or not. The user internet access permission configuration table can fully utilize the statistical data of the application layer, monitor the internet access behavior of the client and realize corresponding permission division. Therefore, the network sharing method provided by the method is more suitable for the use habit of the user and is more specific to the sensitive data concerned by the user.
Furthermore, the method also provides an interface for the user to autonomously judge whether the client is allowed to use the shared network. The method can add the step of inquiring the user in the third step and the fifth step, so that the user can manage the sharing behavior of the mobile network more flexibly.
Furthermore, in order to more accurately manage the behavior of the client using the shared network, the invention designs the user internet access authority according to several sensitive factors (flow, time and bandwidth) in the user internet access authority configuration table and the corresponding monitoring process. In addition, the invention can set different passwords aiming at the equipment pointed by the same MAC address at an application layer, realize the control of different authorities and carry out accurate and flexible network sharing management. The network sharing management not only includes management of the internet traffic, the internet time and the occupied bandwidth of the client, but also includes limitation of information such as accumulated internet traffic and accumulated internet time of the client. In the method, the access point does not influence the use of the mobile network by the user when providing the mobile network sharing service, and the unnecessary mobile data burden of the access point caused by network sharing is also solved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram illustrating steps for implementing mobile network sharing according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Fig. 1 is a schematic diagram illustrating steps of a multi-rights mobile network sharing method according to the present invention. The left side of the graph is an AP (Access Point, wireless Access node, wireless router network Access Point, generally a mobile phone for setting wireless network sharing), and the right side is a client, that is, a device requesting to Access to a mobile network shared by the AP, including a smart phone, a tablet, a computer, a wearable device, and the like. The number of the clients can be multiple, but each client needs to perform the method when sharing the mobile network of the AP. In the method, when a client terminal passes through a physical layer, a data link layer, a network layer, a transmission layer, a session layer, a presentation layer and an application layer in sequence to request a mobile network sharing an access point, the application layer processes according to the following steps:
firstly, a client sends a connection request to an access point; the connection request comprises MAC address information and access password information of the client;
secondly, the access point analyzes the connection request, acquires a client MAC address, judges whether the client is allowed to be accessed according to the MAC address, if so, requires the client to send a password, and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for a client, a user internet access authority configuration table is inquired according to password information (namely an access password) sent by the client, and if the password information is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
Here, "matching" means that the MAC address, the password, and the usage of the shared network of the client are all consistent with the information in the user access permission table, that is, the MAC address of the client is marked in the user access permission configuration table as being allowed to access, the password provided by the client corresponds to the password stored in the user access permission configuration table by the MAC address, and the resources (including traffic, duration, bandwidth, statistical information thereof, and the like) consumed by the client when using the shared mobile network are all within the range allowed by the user access permission configuration table.
Specifically, the AP needs to be responsible for managing multiple passwords, each password corresponds to a different configuration of the internet access authority, which is specifically similar to the following table:
in order to increase the flexibility of network sharing management, the user internet access authority configuration table described in the method can usually manage a plurality of MAC addresses at the same time, one MAC address can correspond to a plurality of groups of passwords, and the user internet access authorities are different among different passwords corresponding to one MAC address.
When the client device requests to access the network, the AP firstly acquires the MAC address of the access device, checks the table and confirms, if the access device is allowed to access, the AP allocates the IP address to the client and the two parties carry out communication. Therefore, the MAC address can be used as a user ID to be bound with an access password provided by a user, and the internet access behavior of a certain access client is accurately managed. The same MAC address can correspond to a plurality of passwords, and users can use the passwords with different authorities to connect the AP on the same mobile terminal (such as a mobile phone). Namely, according to the following table:
when the client connects the AP end with the correct common password, the AP end allocates the Internet access permission with flow and bandwidth limitation according to the configuration corresponding to the password. The password, i.e. the access password, may be automatically generated by the access point or may be set by the user.
In order to improve the security, the administrator user of the AP may also choose to manually confirm whether to allow connection in a secondary confirmation manner, for example, when the client uses a password with a higher permission to connect, the AP end mobile phone device may pop up a dialog box to inquire whether the administrator user allows the connection, and after the permission, the AP may provide the client with an access permission without traffic and bandwidth limitation. Specifically, in the third step of the method, if the password information matches with the user internet access permission configuration table, before jumping to the fourth step, the following steps are added: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
Similarly, in the fifth step of the method, before rejecting and disconnecting the sharing of the client, the following steps may also be added: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
The two queries can require the user to perform secondary confirmation by adopting a pop-up window or a short message mode. Of course, this "secondary acknowledgement" may be turned off at the AP.
In the method, the items for detecting the client-side internet access permission comprise internet access flow, internet access time, occupied network bandwidth and other statistical data of the client-side. The authority can be combined in various ways, such as only limiting the connection duration or only limiting the connection bandwidth, and the like.
The user internet access permission configuration table can be used for permission configuration in an application in the form of an xml file. The following method can be specifically adopted:
< Classification Authority configuration Table >
< Authority configuration >
< password 123 > < password >
< Bandwidth > less than 200Kbps >
< Total flow > less than 200Mb >
[ right configuration ]
< Authority configuration >
< password abc </password >
< cumulative duration of Internet surfing > less than 1 hour >
< Total flow > less than 500Mb >
[ right configuration ]
< Authority configuration >
< password > super </password >
< Limit of Authority >
[ right configuration ]
</hierarchical rights configuration Table >
In the method, when the client-side internet behavior is monitored in real time, the following user internet behavior logs need to be updated synchronously:
every time the client breaks the sharing, the AP also needs to update the corresponding record in the log (see the following table specifically), and when a new connection occurs again, the AP first calculates whether the client has the right to continue using the network through the log.
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (9)
1. A multi-authority mobile network sharing method is characterized in that an application layer comprises the following steps:
firstly, a client sends a connection request to an access point;
secondly, the access point analyzes the connection request, obtains a client MAC address, queries a user Internet access permission configuration table in an application layer according to the MAC address, judges whether the client is allowed to access, if so, requires the client to send a password, and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for the client, a user internet access authority configuration table is inquired according to the password sent by the client, and if the password is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
2. The sharing method of multi-authority mobile network according to claim 1, wherein the third step, if the password matches with the user internet authority configuration table, further comprises the following steps before jumping to the fourth step: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
3. The multi-authority mobile network sharing method according to claim 2, wherein the fifth step, before rejecting and disconnecting the sharing of the client, further comprises the steps of: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
4. The sharing method of multi-authority mobile network according to any of claims 1 to 3, wherein the information in the user Internet access authority configuration table includes MAC address, password and user Internet access authority corresponding to each password.
5. The multi-rights mobile network sharing method of claim 4, wherein the password is automatically generated by an access point or generated by a user setting.
6. The sharing method of multi-authority mobile network according to claim 4, wherein the user's access authority is different between different passwords corresponding to one MAC address.
7. The sharing method of multi-authority mobile network according to claim 4, wherein the user's internet access authority includes limitation of internet access traffic, limitation of internet access time, and limitation of occupied network bandwidth.
8. The sharing method of multi-authority mobile network according to claim 1, wherein the internet behavior of the client monitored in the fourth step includes internet traffic, internet time and occupied network bandwidth of the client.
9. The sharing method of multi-authority mobile network according to claim 8, wherein the log of user internet behavior in the fourth step includes internet traffic, internet time, occupied network bandwidth and statistical information thereof of each client.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611151684.0A CN106604278B (en) | 2016-12-14 | 2016-12-14 | Multi-authority mobile network sharing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611151684.0A CN106604278B (en) | 2016-12-14 | 2016-12-14 | Multi-authority mobile network sharing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106604278A CN106604278A (en) | 2017-04-26 |
CN106604278B true CN106604278B (en) | 2020-10-13 |
Family
ID=58802370
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611151684.0A Active CN106604278B (en) | 2016-12-14 | 2016-12-14 | Multi-authority mobile network sharing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106604278B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106789486B (en) * | 2017-03-17 | 2020-08-04 | 杭州迪普科技股份有限公司 | Method and device for detecting shared access, electronic equipment and computer readable storage medium |
CN107592661B (en) * | 2017-09-05 | 2021-01-26 | 深圳市盛路物联通讯技术有限公司 | WIFI management method and Internet of things server |
CN109548025B (en) * | 2018-12-29 | 2022-12-30 | 上海掌门科技有限公司 | Method and device for managing the use rights of a wireless access point provided by a routing device |
CN115906187B (en) * | 2023-02-22 | 2023-05-23 | 山东经伟晟睿数据技术有限公司 | User permission control method and system combining function permission and interface permission |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571729A (en) * | 2010-12-27 | 2012-07-11 | 方正宽带网络服务股份有限公司 | Internet protocol version (IPV)6 network access authentication method, device and system |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102404725B (en) * | 2011-11-08 | 2014-07-09 | 复旦大学 | Method for safely building WiFi connection by SSID in application program |
US9497623B2 (en) * | 2012-05-25 | 2016-11-15 | Nokia Technologies Oy | Method and apparatus for guest access sharing |
JP2014157461A (en) * | 2013-02-15 | 2014-08-28 | Star Micronics Co Ltd | Network access control system, access control device, and access control program |
CN105279423A (en) * | 2014-06-12 | 2016-01-27 | 中兴通讯股份有限公司 | Password management method and password management device |
CN105704780A (en) * | 2014-11-24 | 2016-06-22 | 中兴通讯股份有限公司 | Wireless network access method and device |
CN105357734B (en) * | 2015-11-20 | 2019-04-16 | 小米科技有限责任公司 | The method and device of control access WIFI hot spot |
CN106101295A (en) * | 2016-05-30 | 2016-11-09 | 上海斐讯数据通信技术有限公司 | The method to set up of a kind of IP address lease time and wireless router |
-
2016
- 2016-12-14 CN CN201611151684.0A patent/CN106604278B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102571729A (en) * | 2010-12-27 | 2012-07-11 | 方正宽带网络服务股份有限公司 | Internet protocol version (IPV)6 network access authentication method, device and system |
Also Published As
Publication number | Publication date |
---|---|
CN106604278A (en) | 2017-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20190363979A1 (en) | Methods and apparatus to provide a consumer services cloud in a communications network | |
US9026082B2 (en) | Terminal identifiers in a communications network | |
CN106604278B (en) | Multi-authority mobile network sharing method | |
EP2733909B1 (en) | Terminal control method and device, and terminal | |
US7590733B2 (en) | Dynamic address assignment for access control on DHCP networks | |
US9130848B2 (en) | Method and apparatus for enhancing QoS during home network remote access | |
CN105429933A (en) | Access method of network equipment in local area network, access equipment and system | |
US20190222676A1 (en) | Dynamic download and enforcement of network access role based on network login context | |
CN104780147A (en) | BYOD access control method and device | |
CN107769978A (en) | Management method, system, router and the server that a kind of terminal device networks | |
KR102014005B1 (en) | Method of providing nomadic service through virtual residential gateway | |
CN105981416B (en) | The method for managing several profiles in safety element | |
CN104754689A (en) | Home gateway access management method and system | |
CN116888922A (en) | Service authorization method, system and communication device | |
CN103392322B (en) | Method for communication and components in a communications network | |
CN107659932B (en) | Equipment access method and device | |
RU2005117334A (en) | METHOD AND SYSTEM OF INSTALLING CONNECTION BETWEEN NETWORK ELEMENTS | |
CN106506495B (en) | Terminal online control method and device | |
KR101682303B1 (en) | Home device control system and control method thereof, home device included in the system and control method thereof | |
JP6766337B2 (en) | Gateway device, communication control method, communication control system, and program | |
CN110417566B (en) | Multi-head configuration method, device and system | |
WO2023011291A1 (en) | Node scheduling method and apparatus, medium, and device | |
CN113891291B (en) | Service opening method and device | |
US20210243308A1 (en) | Method and system for implementing user defined policies in an intelligent network | |
US20240056485A1 (en) | Systems and methods for network access control using distributed ledgers |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |