CN106604278B - Multi-authority mobile network sharing method - Google Patents

Multi-authority mobile network sharing method Download PDF

Info

Publication number
CN106604278B
CN106604278B CN201611151684.0A CN201611151684A CN106604278B CN 106604278 B CN106604278 B CN 106604278B CN 201611151684 A CN201611151684 A CN 201611151684A CN 106604278 B CN106604278 B CN 106604278B
Authority
CN
China
Prior art keywords
client
user
internet
access
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611151684.0A
Other languages
Chinese (zh)
Other versions
CN106604278A (en
Inventor
陈杰
唐勇
庞涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xuancai Interactive Network Science And Technology Co ltd
Original Assignee
Xuancai Interactive Network Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xuancai Interactive Network Science And Technology Co ltd filed Critical Xuancai Interactive Network Science And Technology Co ltd
Priority to CN201611151684.0A priority Critical patent/CN106604278B/en
Publication of CN106604278A publication Critical patent/CN106604278A/en
Application granted granted Critical
Publication of CN106604278B publication Critical patent/CN106604278B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Abstract

A multi-authority mobile network sharing method comprises MAC address verification, login password verification, administrator confirmation and automatic monitoring of internet access behaviors. The method is characterized in that the set authority management of the login password is added on an application layer, the devices accessed to the shared network through different passwords are distinguished, different network use authorities are designed aiming at different login passwords, and the flow control of the access devices is realized. The method can directly realize the management of the access equipment through the setting of the application layer, so that the user can conveniently carry out personalized authority setting according to the self condition. The method can control the whole flow of the shared network and simultaneously meet the flow use requirement of the authorized specific equipment.

Description

Multi-authority mobile network sharing method
Technical Field
The invention relates to a wireless network sharing technology, in particular to a multi-authority mobile network sharing method.
Background
In the prior art, a wireless network sharing AP (Access Point, wireless Access node, wireless router network Access Point) can be set through a mobile phone, so as to implement wireless network sharing. After the sharing is set, other devices can be connected with the terminal through WiFi to be communicated with the Internet. However, in the prior art, when the WiFi connection is provided, the mobile phone connected to the WiFi network cannot distinguish the current connection between the mobile phone hotspot and the normal WiFi. Once a certain mobile phone starts a shared network, other intelligent devices connected with the mobile phone network shared AP all consider that the current connection environment is WiFi, and therefore operations such as data downloading and updating are performed in a background of the intelligent device by default according to settings in the WiFi environment, and a large amount of traffic is generated. And thus user traffic can typically only be managed from AP points that set up wireless network sharing.
In the existing user traffic management method, users are generally distinguished on a physical network level (MAC address) and a network routing (IP address) level by using a Wifi AP (access device), and an internet access authority is set. At the physical network level: each accessed communication module (such as a network card) has a unique hardware identification MAC address, and communication is carried out between the communication modules by the MAC address and the router address for identifying each other in a network layer. In WiFi access control, some terminals may be prohibited or allowed to access the AP by setting a black and white list of MAC addresses. At the network routing level: each communication terminal is assigned with an IP address, and data communication is carried out between the terminals through the matching relation between the IP addresses, so that in the Wifi access control, a black and white list of the IP addresses can be set to prohibit or allow other terminals to access the AP.
However, it is troublesome for the AP device to perform user identification and authentication through the MAC address or the IP address. Since this means that the AP administrator must already know the MAC address or IP address of the access device before communicating, and only then can the corresponding settings be made. This is clearly not reasonable. At an application layer where a user can easily perform a setting operation, the current technology can only perform network sharing confirmation through one WiFi access password. In this way, all access points can share WiFi indiscriminately, and the user cannot perform hierarchical weighted management on the accessed devices, and therefore cannot control traffic generated by the accessed devices.
Therefore, in order to facilitate the user to manage the traffic during the sharing period, there is an urgent need to provide a method for controlling each access device to use the network at the application layer. So as to limit the flow generated when some users access the shared AP network, and simultaneously control the access speed, the access duration and the like of the shared network.
Disclosure of Invention
In order to solve the defects in the prior art, the invention aims to provide a multi-authority mobile network sharing method.
The method distinguishes different clients through different access passwords, and inquires a user internet access authority configuration table according to the passwords to determine the internet access authority of the corresponding client. And limiting the access speed, the access duration and the like of the corresponding client according to the internet access authorities.
Firstly, in order to achieve the above object, a multi-authority mobile network sharing method is proposed, when a client requests a mobile network sharing an access point through a physical layer, a data link layer, a network layer, a transport layer, a session layer, a presentation layer and an application layer in sequence, the application layer processes according to the following steps:
firstly, a client sends a connection request to an access point; the client is equipment requesting to access a mobile network, and comprises a smart phone, a tablet, a computer, wearable equipment and the like; the access point is a terminal providing a mobile network sharing function and comprises wireless routing network access equipment such as a smart phone, a tablet, a computer and the like; the connection request comprises MAC address information and access password information of the client;
secondly, the access point analyzes the connection request, acquires a client MAC address, inquires whether the MAC address belongs to an address which allows network sharing in a user internet access permission configuration table or not according to the MAC address, judges whether the client is allowed to access, and if the client is allowed to access, the client is required to send a password and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for the client, a user internet access authority configuration table is inquired according to password information (namely an access password) sent by the client, and if the password information is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
Here, "matching" means that the MAC address, the password, and the usage of the shared network of the client are all consistent with the information in the user access permission table, that is, the MAC address of the client is marked in the user access permission configuration table as being allowed to access, the password provided by the client corresponds to the password stored in the user access permission configuration table by the MAC address, and the access behavior of the client, that is, the consumption of network resources (including traffic, duration, bandwidth, and corresponding statistical information) when using the shared mobile network, is all within the range allowed by the user access permission configuration table.
Further, in order to enable the user to manage the mobile network sharing more flexibly, in the third step, if the password information is matched with the user internet access permission configuration table, before jumping to the fourth step, the method further includes the following steps: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
Similarly, in the fifth step of the method, before rejecting and disconnecting the sharing of the client, the method further includes the following steps: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
Here, the two points "ask the user" may be provided for the user by means of a pop-up dialog box, or may be implemented by prompting the user to change the corresponding setting by the user himself.
Further, in the method, the information in the user internet access permission configuration table includes an MAC address, passwords, and user internet access permissions corresponding to the passwords.
The password may be automatically generated by the access point or may be set by the user himself.
The MAC address can correspond to a plurality of different passwords, and the user internet access authority is different among the different passwords corresponding to the MAC address. That is, the user can set different permissions for one client to perform flexible network sharing management.
The user internet access authority includes limitation of internet access flow, limitation of internet access time, limitation of occupied network bandwidth and the like. The user can flexibly set different user internet access authorities according to the characteristics of different devices, and the user can not influence the use of the mobile network by the user and bring unnecessary mobile data burden to the user due to network sharing while the mobile network sharing is provided.
Correspondingly, the internet access behavior of the user side monitored in the fourth step of the present invention includes internet access traffic, internet access time, network bandwidth occupation, and the like of the user side.
Correspondingly, the user internet behavior log in the fourth step includes the respective internet traffic, internet time, occupied network bandwidth and the like of each client and statistics of the information. Once, upon monitoring, it is found that the user side transcends the traffic limit, transcends the time limit, transcends the bandwidth limit, or the user side's corresponding log record of the internet behavior has shown that it transcends the mobile network resources (including traffic, time, and bandwidth) of the access point, it is prompted to disconnect its sharing with the access point.
Advantageous effects
The invention sets different passwords on the application layer, cooperates with the user Internet access authority configuration table, and judges whether to reject and disconnect the connection of the client by comparing whether the Internet access behavior of the client accords with the authority limit of the user Internet access authority configuration table to the client, thereby controlling the resources (including flow, time, bandwidth and the like) occupied by the client. In the method, the client only needs to set different access passwords on an application layer by himself or automatically through the access point, and different authorities can be distinguished by verifying the passwords sent by different clients. The method realizes the limitation of the mobile network sharing behaviors of different clients in an application layer, and simplifies the difficulty of managing the network sharing behaviors of the clients by users.
Meanwhile, the method is different from the existing method for distinguishing the user permission on the physical network or network routing level, and the internet access behavior of the client is monitored on the application layer. Because the data such as user internet traffic, internet time, occupied network bandwidth and the like can be accurately counted in the physical layer (the data are sensitive data concerned in use of the user), the invention measures the internet behavior of the client according to the data, and compares the internet behavior of the client with the authority limit in the user internet authority configuration table to determine whether the mobile network sharing can be carried out or not. The user internet access permission configuration table can fully utilize the statistical data of the application layer, monitor the internet access behavior of the client and realize corresponding permission division. Therefore, the network sharing method provided by the method is more suitable for the use habit of the user and is more specific to the sensitive data concerned by the user.
Furthermore, the method also provides an interface for the user to autonomously judge whether the client is allowed to use the shared network. The method can add the step of inquiring the user in the third step and the fifth step, so that the user can manage the sharing behavior of the mobile network more flexibly.
Furthermore, in order to more accurately manage the behavior of the client using the shared network, the invention designs the user internet access authority according to several sensitive factors (flow, time and bandwidth) in the user internet access authority configuration table and the corresponding monitoring process. In addition, the invention can set different passwords aiming at the equipment pointed by the same MAC address at an application layer, realize the control of different authorities and carry out accurate and flexible network sharing management. The network sharing management not only includes management of the internet traffic, the internet time and the occupied bandwidth of the client, but also includes limitation of information such as accumulated internet traffic and accumulated internet time of the client. In the method, the access point does not influence the use of the mobile network by the user when providing the mobile network sharing service, and the unnecessary mobile data burden of the access point caused by network sharing is also solved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
fig. 1 is a schematic diagram illustrating steps for implementing mobile network sharing according to the present invention.
Detailed Description
The preferred embodiments of the present invention will be described in conjunction with the accompanying drawings, and it will be understood that they are described herein for the purpose of illustration and explanation and not limitation.
Fig. 1 is a schematic diagram illustrating steps of a multi-rights mobile network sharing method according to the present invention. The left side of the graph is an AP (Access Point, wireless Access node, wireless router network Access Point, generally a mobile phone for setting wireless network sharing), and the right side is a client, that is, a device requesting to Access to a mobile network shared by the AP, including a smart phone, a tablet, a computer, a wearable device, and the like. The number of the clients can be multiple, but each client needs to perform the method when sharing the mobile network of the AP. In the method, when a client terminal passes through a physical layer, a data link layer, a network layer, a transmission layer, a session layer, a presentation layer and an application layer in sequence to request a mobile network sharing an access point, the application layer processes according to the following steps:
firstly, a client sends a connection request to an access point; the connection request comprises MAC address information and access password information of the client;
secondly, the access point analyzes the connection request, acquires a client MAC address, judges whether the client is allowed to be accessed according to the MAC address, if so, requires the client to send a password, and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for a client, a user internet access authority configuration table is inquired according to password information (namely an access password) sent by the client, and if the password information is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
Here, "matching" means that the MAC address, the password, and the usage of the shared network of the client are all consistent with the information in the user access permission table, that is, the MAC address of the client is marked in the user access permission configuration table as being allowed to access, the password provided by the client corresponds to the password stored in the user access permission configuration table by the MAC address, and the resources (including traffic, duration, bandwidth, statistical information thereof, and the like) consumed by the client when using the shared mobile network are all within the range allowed by the user access permission configuration table.
Specifically, the AP needs to be responsible for managing multiple passwords, each password corresponds to a different configuration of the internet access authority, which is specifically similar to the following table:
Figure BDA0001179860940000071
Figure BDA0001179860940000081
in order to increase the flexibility of network sharing management, the user internet access authority configuration table described in the method can usually manage a plurality of MAC addresses at the same time, one MAC address can correspond to a plurality of groups of passwords, and the user internet access authorities are different among different passwords corresponding to one MAC address.
When the client device requests to access the network, the AP firstly acquires the MAC address of the access device, checks the table and confirms, if the access device is allowed to access, the AP allocates the IP address to the client and the two parties carry out communication. Therefore, the MAC address can be used as a user ID to be bound with an access password provided by a user, and the internet access behavior of a certain access client is accurately managed. The same MAC address can correspond to a plurality of passwords, and users can use the passwords with different authorities to connect the AP on the same mobile terminal (such as a mobile phone). Namely, according to the following table:
Figure BDA0001179860940000082
when the client connects the AP end with the correct common password, the AP end allocates the Internet access permission with flow and bandwidth limitation according to the configuration corresponding to the password. The password, i.e. the access password, may be automatically generated by the access point or may be set by the user.
In order to improve the security, the administrator user of the AP may also choose to manually confirm whether to allow connection in a secondary confirmation manner, for example, when the client uses a password with a higher permission to connect, the AP end mobile phone device may pop up a dialog box to inquire whether the administrator user allows the connection, and after the permission, the AP may provide the client with an access permission without traffic and bandwidth limitation. Specifically, in the third step of the method, if the password information matches with the user internet access permission configuration table, before jumping to the fourth step, the following steps are added: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
Similarly, in the fifth step of the method, before rejecting and disconnecting the sharing of the client, the following steps may also be added: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
The two queries can require the user to perform secondary confirmation by adopting a pop-up window or a short message mode. Of course, this "secondary acknowledgement" may be turned off at the AP.
In the method, the items for detecting the client-side internet access permission comprise internet access flow, internet access time, occupied network bandwidth and other statistical data of the client-side. The authority can be combined in various ways, such as only limiting the connection duration or only limiting the connection bandwidth, and the like.
The user internet access permission configuration table can be used for permission configuration in an application in the form of an xml file. The following method can be specifically adopted:
< Classification Authority configuration Table >
< Authority configuration >
< password 123 > < password >
< Bandwidth > less than 200Kbps >
< Total flow > less than 200Mb >
[ right configuration ]
< Authority configuration >
< password abc </password >
< cumulative duration of Internet surfing > less than 1 hour >
< Total flow > less than 500Mb >
[ right configuration ]
< Authority configuration >
< password > super </password >
< Limit of Authority >
[ right configuration ]
</hierarchical rights configuration Table >
In the method, when the client-side internet behavior is monitored in real time, the following user internet behavior logs need to be updated synchronously:
Figure BDA0001179860940000101
every time the client breaks the sharing, the AP also needs to update the corresponding record in the log (see the following table specifically), and when a new connection occurs again, the AP first calculates whether the client has the right to continue using the network through the log.
Figure BDA0001179860940000111
Those of ordinary skill in the art will understand that: although the present invention has been described in detail with reference to the foregoing embodiments, it will be apparent to those skilled in the art that changes may be made in the embodiments and/or equivalents thereof without departing from the spirit and scope of the invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (9)

1. A multi-authority mobile network sharing method is characterized in that an application layer comprises the following steps:
firstly, a client sends a connection request to an access point;
secondly, the access point analyzes the connection request, obtains a client MAC address, queries a user Internet access permission configuration table in an application layer according to the MAC address, judges whether the client is allowed to access, if so, requires the client to send a password, and jumps to the third step; otherwise, jumping to the fifth step;
thirdly, an IP address is distributed for the client, a user internet access authority configuration table is inquired according to the password sent by the client, and if the password is matched with the user internet access authority configuration table, the fourth step is skipped; otherwise, jumping to the fifth step;
fourthly, the access point shares a mobile network with the client through the IP address, monitors the internet surfing behavior of the client, and jumps to the fifth step when the internet surfing behavior of the client is not matched with the user internet surfing authority configuration table; otherwise, continuing to monitor the internet behavior of the client, and updating a user internet behavior log according to the internet behavior of the client;
and fifthly, rejecting and disconnecting the sharing of the client.
2. The sharing method of multi-authority mobile network according to claim 1, wherein the third step, if the password matches with the user internet authority configuration table, further comprises the following steps before jumping to the fourth step: the access point inquires whether the client is allowed to share the mobile network or not to the user, and if the user is allowed, the access point jumps to the fourth step; otherwise, jumping to the fifth step.
3. The multi-authority mobile network sharing method according to claim 2, wherein the fifth step, before rejecting and disconnecting the sharing of the client, further comprises the steps of: the access point inquires whether the sharing with the client is allowed to be disconnected or not to the user, and if the sharing is allowed by the user, the access point is disconnected; otherwise, the sharing is maintained.
4. The sharing method of multi-authority mobile network according to any of claims 1 to 3, wherein the information in the user Internet access authority configuration table includes MAC address, password and user Internet access authority corresponding to each password.
5. The multi-rights mobile network sharing method of claim 4, wherein the password is automatically generated by an access point or generated by a user setting.
6. The sharing method of multi-authority mobile network according to claim 4, wherein the user's access authority is different between different passwords corresponding to one MAC address.
7. The sharing method of multi-authority mobile network according to claim 4, wherein the user's internet access authority includes limitation of internet access traffic, limitation of internet access time, and limitation of occupied network bandwidth.
8. The sharing method of multi-authority mobile network according to claim 1, wherein the internet behavior of the client monitored in the fourth step includes internet traffic, internet time and occupied network bandwidth of the client.
9. The sharing method of multi-authority mobile network according to claim 8, wherein the log of user internet behavior in the fourth step includes internet traffic, internet time, occupied network bandwidth and statistical information thereof of each client.
CN201611151684.0A 2016-12-14 2016-12-14 Multi-authority mobile network sharing method Active CN106604278B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611151684.0A CN106604278B (en) 2016-12-14 2016-12-14 Multi-authority mobile network sharing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611151684.0A CN106604278B (en) 2016-12-14 2016-12-14 Multi-authority mobile network sharing method

Publications (2)

Publication Number Publication Date
CN106604278A CN106604278A (en) 2017-04-26
CN106604278B true CN106604278B (en) 2020-10-13

Family

ID=58802370

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611151684.0A Active CN106604278B (en) 2016-12-14 2016-12-14 Multi-authority mobile network sharing method

Country Status (1)

Country Link
CN (1) CN106604278B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106789486B (en) * 2017-03-17 2020-08-04 杭州迪普科技股份有限公司 Method and device for detecting shared access, electronic equipment and computer readable storage medium
CN107592661B (en) * 2017-09-05 2021-01-26 深圳市盛路物联通讯技术有限公司 WIFI management method and Internet of things server
CN109548025B (en) * 2018-12-29 2022-12-30 上海掌门科技有限公司 Method and device for managing the use rights of a wireless access point provided by a routing device
CN115906187B (en) * 2023-02-22 2023-05-23 山东经伟晟睿数据技术有限公司 User permission control method and system combining function permission and interface permission

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571729A (en) * 2010-12-27 2012-07-11 方正宽带网络服务股份有限公司 Internet protocol version (IPV)6 network access authentication method, device and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102404725B (en) * 2011-11-08 2014-07-09 复旦大学 Method for safely building WiFi connection by SSID in application program
US9497623B2 (en) * 2012-05-25 2016-11-15 Nokia Technologies Oy Method and apparatus for guest access sharing
JP2014157461A (en) * 2013-02-15 2014-08-28 Star Micronics Co Ltd Network access control system, access control device, and access control program
CN105279423A (en) * 2014-06-12 2016-01-27 中兴通讯股份有限公司 Password management method and password management device
CN105704780A (en) * 2014-11-24 2016-06-22 中兴通讯股份有限公司 Wireless network access method and device
CN105357734B (en) * 2015-11-20 2019-04-16 小米科技有限责任公司 The method and device of control access WIFI hot spot
CN106101295A (en) * 2016-05-30 2016-11-09 上海斐讯数据通信技术有限公司 The method to set up of a kind of IP address lease time and wireless router

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571729A (en) * 2010-12-27 2012-07-11 方正宽带网络服务股份有限公司 Internet protocol version (IPV)6 network access authentication method, device and system

Also Published As

Publication number Publication date
CN106604278A (en) 2017-04-26

Similar Documents

Publication Publication Date Title
US20190363979A1 (en) Methods and apparatus to provide a consumer services cloud in a communications network
US9026082B2 (en) Terminal identifiers in a communications network
CN106604278B (en) Multi-authority mobile network sharing method
EP2733909B1 (en) Terminal control method and device, and terminal
US7590733B2 (en) Dynamic address assignment for access control on DHCP networks
US9130848B2 (en) Method and apparatus for enhancing QoS during home network remote access
CN105429933A (en) Access method of network equipment in local area network, access equipment and system
US20190222676A1 (en) Dynamic download and enforcement of network access role based on network login context
CN104780147A (en) BYOD access control method and device
CN107769978A (en) Management method, system, router and the server that a kind of terminal device networks
KR102014005B1 (en) Method of providing nomadic service through virtual residential gateway
CN105981416B (en) The method for managing several profiles in safety element
CN104754689A (en) Home gateway access management method and system
CN116888922A (en) Service authorization method, system and communication device
CN103392322B (en) Method for communication and components in a communications network
CN107659932B (en) Equipment access method and device
RU2005117334A (en) METHOD AND SYSTEM OF INSTALLING CONNECTION BETWEEN NETWORK ELEMENTS
CN106506495B (en) Terminal online control method and device
KR101682303B1 (en) Home device control system and control method thereof, home device included in the system and control method thereof
JP6766337B2 (en) Gateway device, communication control method, communication control system, and program
CN110417566B (en) Multi-head configuration method, device and system
WO2023011291A1 (en) Node scheduling method and apparatus, medium, and device
CN113891291B (en) Service opening method and device
US20210243308A1 (en) Method and system for implementing user defined policies in an intelligent network
US20240056485A1 (en) Systems and methods for network access control using distributed ledgers

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant