CN108632264B - Control method and device of internet access authority and server - Google Patents

Control method and device of internet access authority and server Download PDF

Info

Publication number
CN108632264B
CN108632264B CN201810384004.2A CN201810384004A CN108632264B CN 108632264 B CN108632264 B CN 108632264B CN 201810384004 A CN201810384004 A CN 201810384004A CN 108632264 B CN108632264 B CN 108632264B
Authority
CN
China
Prior art keywords
user terminal
user
internet access
wireless router
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810384004.2A
Other languages
Chinese (zh)
Other versions
CN108632264A (en
Inventor
郝兆旭
刘靖靖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou H3C Technologies Co Ltd
Original Assignee
Hangzhou H3C Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou H3C Technologies Co Ltd filed Critical Hangzhou H3C Technologies Co Ltd
Priority to CN201810384004.2A priority Critical patent/CN108632264B/en
Publication of CN108632264A publication Critical patent/CN108632264A/en
Application granted granted Critical
Publication of CN108632264B publication Critical patent/CN108632264B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure provides a method, an apparatus and a server for controlling an internet access authority, which relate to the technical field of communications, the method is applied to an authentication server, and the method comprises: receiving login information of a user terminal; starting timing operation corresponding to the user terminal according to the login information, and issuing an execution instruction of specified operation to the user terminal; when the time length of the timing operation corresponding to the user terminal is reached, judging whether the user terminal completes the specified operation; and informing the wireless router to control the internet access authority of the user terminal according to the judgment result. The method and the device can effectively reduce the misoperation phenomena such as forced network disconnection caused by different times of accessing different users to the network, and better improve the user experience.

Description

Control method and device of internet access authority and server
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for controlling an internet access permission, and a server.
Background
With the popularization of various application functions of mobile terminals such as mobile phones, more and more service providers popularize their products or services by attracting users' attention. Taking the popularization of the WeChat as an example, a service provider can popularize the product or service in a way of drawing the WeChat user to pay attention to the public number, so that the problem of how to pay attention to a certain public number by the WeChat user becomes a hotspot of the research in the industry.
In order to make a wechat user pay attention to a certain public number effectively, a technology for forcibly paying attention to the public number is provided in the prior art, the technology enables the user to pay attention to the public number within a certain time, and if the user does not pay attention to the public number, the access of the user to a network function is limited. In the technology of forcibly paying attention to the public number, a server presets an attention duration, checks whether a user currently accessed to a network pays attention to the specified public number or not by taking the attention duration as a period, and forces the user to disconnect the network if the fact that a certain user does not pay attention to the public number is checked.
In the above checking mode with the attention duration as periodicity, because the times at which the users access the network are different, no matter how the attention duration is adjusted, it is difficult to ensure that the user who just accesses has enough time to perform the attention operation, which results in poor user experience.
BRIEF SUMMARY OF THE PRESENT DISCLOSURE
In view of the above, an object of the present disclosure is to provide a method, an apparatus, and a server for controlling an internet access authority, which can solve the technical problem in the prior art that a control manner for the internet access authority of a user is not good.
In order to achieve the above purpose, the embodiments of the present disclosure adopt the following technical solutions:
in a first aspect, an embodiment of the present disclosure provides a method for controlling an internet access permission, where the method is applied to an authentication server, and the method includes: receiving login information of a user terminal; starting timing operation corresponding to the user terminal according to the login information, and issuing an execution instruction of specified operation to the user terminal; when the time length of the timing operation corresponding to the user terminal is reached, judging whether the user terminal completes the specified operation; and informing the wireless router to control the internet access authority of the user terminal according to the judgment result.
In a second aspect, an embodiment of the present disclosure further provides a device for controlling an internet access permission, where the device is disposed in an authentication server, and the device includes: the information receiving module is used for receiving login information of the user terminal; the timing starting module is used for starting the timing operation corresponding to the user terminal according to the login information and issuing an execution instruction of the specified operation to the user terminal; the judging module is used for judging whether the user terminal completes the specified operation or not when the time length of the timing operation corresponding to the user terminal is reached; and the authority control module is used for informing the wireless router to control the internet access authority of the user terminal according to the judgment result.
In a third aspect, an embodiment of the present disclosure provides a server, including a memory and a processor; the memory is for storing a program for enabling the processor to perform the method of the first aspect, the processor being configured for executing the program stored in the memory.
In a fourth aspect, embodiments of the present disclosure provide a computer storage medium storing computer software instructions for use in the method of the first aspect.
The disclosed embodiment provides a method, a device and a server for controlling the access authority, which can start the timing operation corresponding to a user terminal according to login information and issue an execution instruction of designated operation to the user terminal when the login information of the user terminal is received; and judging whether the user terminal completes the specified operation or not when the timing operation duration corresponding to the user terminal is reached, and further informing the wireless router to control the internet access authority of the user terminal according to the judgment result. Compared with the prior art that the internet access authority of the user terminal is controlled by adopting a periodic check mode with fixed time length, the embodiment of the disclosure can respectively time different user terminals, and the time length for executing the specified operation can be correspondingly set for the user terminal whenever the user terminal accesses the network.
Additional features and advantages of the disclosure will be set forth in the description which follows, or in part may be learned by the practice of the above-described techniques of the disclosure, or may be learned by practice of the disclosure.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present disclosure, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 shows a flowchart of a method for controlling an internet access permission according to an embodiment of the present disclosure;
fig. 2 is a flowchart illustrating another method for controlling internet access permission according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating another method for controlling internet access permission according to an embodiment of the present disclosure;
fig. 4 shows a block diagram of a control device for controlling an internet access authority according to an embodiment of the present disclosure;
fig. 5 is a block diagram illustrating a structure of another device for controlling internet access permission according to an embodiment of the present disclosure;
fig. 6 shows a schematic structural diagram of a server provided in an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the embodiments of the present disclosure will be described clearly and completely with reference to the accompanying drawings, and it is to be understood that the described embodiments are only a part of the embodiments of the present disclosure, but not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
Considering that the existing technology of forcibly paying attention to the public account does not distinguish the access time of the user, only the fixed time is uniformly set, so that the user accessing at the end of the fixed time hardly has enough time to pay attention to the operation, for example, the server sets the fixed time to be 10 minutes through a timer, the user starts to access the wireless router in 9 minutes and 30 seconds and executes the attention operation according to the instruction, when the user has not executed the attention operation, the timer has reached 10 minutes, and at this time, the server forcibly disconnects the network for the user who has not finished the attention operation, thereby causing misoperation. In order to improve this problem, embodiments of the present disclosure provide a method, an apparatus, and a server for controlling an internet access permission, which are described in detail below.
Referring to a flowchart of a method for controlling the internet access right shown in fig. 1, the method is applied to an authentication server, and the authentication server is connected to a wireless router, where the authentication server may specifically be a server of the wireless router, and specifically may be a server corresponding to an access provider or a manufacturer of the wireless router. The internet access authority of the user terminal can be controlled through the wireless router; the method comprises the following steps:
step S102, receiving the login information of the user terminal. The login information may include information such as an identity of the user terminal.
In one embodiment, the login information is that when the user terminal accesses the wireless router, the authentication server directly issues a login page to the user terminal, so that the login information of the user terminal is directly obtained through the login page.
The authentication server has various modes of obtaining login information through a login page, wherein one mode is that a user fills the login information in the login page so as to obtain the login information through the login page; the other way is that the login page is a quick access page, when the user terminal monitors that the quick access page is triggered by the user (for example, the user clicks a key access key on the quick access page, and at the moment, the user terminal triggers an acquisition request for sending login information to the third-party server), the third-party server issues the login information to a client of a third-party application of the user terminal, and the client of the third-party application can send the login information to the authentication server; in another mode, when the user terminal monitors that the quick access page is triggered by the user, the user terminal searches the login information which is stored in the local of the user terminal and is related to the third-party server according to a preset storage path, and directly sends the searched login information to the authentication server.
In another embodiment, in order to enable the user terminal to quickly access the wireless router, the access may be performed by a third-party server, such as when the user terminal initiates a WIFI access request, the authentication server redirects the user terminal to the third-party server associated with the authentication server, and the third-party server provides the user terminal with a quick access page. The login information is sent to the authentication server through the third-party server when the user terminal is accessed to the wireless router; the third-party server and the authentication server can directly set corresponding communication interfaces, and the required information is acquired by calling. The third-party server may be a WeChat server, a Taobao server, or a microblog server. For the convenience of understanding, the embodiment of the present disclosure provides a specific application example: when a user searches for available WIFI in the current environment through a user terminal, the user usually clicks a Service Set Identifier (SSID) corresponding to the WIFI displayed on an interface of the user terminal to request to access the WIFI, so as to obtain a WIFI internet access Service provided by the wireless router. When a user clicks the SSID (namely, initiates an access request), the wireless router triggers the authentication server to send an access instruction of the third-party server to the user terminal, so that the user terminal is accessed to the third-party server; when the user inputs the login information to access the third-party server, the third-party server can send the acquired login information of the user terminal to the authentication server.
And step S104, starting timing operation corresponding to the user terminal according to the login information, and issuing an execution instruction of specified operation to the user terminal.
The starting of the timing operation corresponding to the user terminal may specifically be: and determining the timing operation duration corresponding to the user terminal, and starting timing based on the timing operation duration.
In one embodiment, different login information corresponds to a timing operation duration; for example, the corresponding time keeping operation time is 10 minutes regardless of the type of user. In another embodiment, the timing operation durations corresponding to different login information are different; for example, for older users, the corresponding time-keeping operation period is 15 minutes, and for younger users, the corresponding time-keeping operation period is 10 minutes. The user type can be obtained from the login information, or can be determined by combining other technical means according to the login information. The manner of acquisition of the user type is not limited.
When an execution instruction of a specified operation is sent to a user terminal, in one embodiment, the authentication server directly sends the execution instruction of the specified operation to the user terminal; in another embodiment, the login information of the user terminal is sent to the authentication server by the third-party server, and the authentication server may issue an execution instruction of a specified operation to the user terminal through the third-party server. The execution instruction of the specified operation may be issued by pushing an execution page to the user terminal, so that the user completes the specified operation through the execution page. The specifying operation may include at least one of: paying attention to the specified user account, sharing the specified user account, and evaluating the specified user account;
for example, the focus specified account may specify a public number for focus, a blog user account for focus, a Taobao user account for focus, and so on; the sharing of the specified user account can be specified for sharing of a public number and the like; the evaluation-designated user account may be a public number designated for evaluation, a merchant account commented by the public, or the like. The method in this embodiment may interface with any third party, and the type of the third party is not limited.
And step S106, judging whether the user terminal completes the designated operation or not when the time-counting operation duration corresponding to the user terminal is reached.
The purpose of setting the timing operation duration for the user terminal is to provide the user terminal with the execution time for completing the specified operation, and the user terminal needs to actively complete the specified operation within the timing operation duration. When the time length of the timing operation is reached, it is necessary to determine whether the user terminal completes the designated operation. If the specified operation is related to the authentication server itself, such as the specified operation is an operation of filling in a questionnaire issued by the authentication server, or the specified operation is an operation of clicking a specified link (such as an advertisement link) issued by the authentication server, the authentication server can automatically query whether the user terminal completes the specified operation. If the specified operation is related to the third-party server, the authentication server may send a query request to the third-party server, and verify whether the user terminal completes the specified operation through the third-party server.
And step S108, informing the wireless router to control the internet access authority of the user terminal according to the judgment result. Under normal conditions, if the user terminal completes the designated operation, the authentication server informs the wireless router to provide the internet access service for the user terminal; otherwise, if the user terminal does not finish the designated operation within the timing operation duration, the authentication server informs the wireless router to limit the internet access service of the user terminal.
Compared with the prior art that the access time of the user is not considered, and the internet access authority of the user terminal is controlled only by adopting a periodic check mode with fixed time length, the method for controlling the internet access authority provided by the embodiment of the disclosure can respectively time different user terminals, and the time length for executing the specified operation can be correspondingly set for the user terminal whenever the user terminal accesses the network, so that whether the user terminal completes the specified operation or not is pertinently checked based on the time length of the timed operation corresponding to the user terminal. The control mode of the internet access authority is more reasonable and reliable, misoperation phenomena such as forced network disconnection and the like caused by different times of accessing different users to the network can be effectively reduced, and the user experience degree is better improved.
Taking an example that an authentication server is connected with a third-party server, see another flow chart of a method for controlling internet access authority shown in fig. 2, the method is applied to the authentication server, the authentication server is connected with a wireless router, and the authentication server is further connected with the third-party server, and the method includes:
step S202, receiving the login information of the user terminal sent by the third-party server.
In one embodiment, the user login information is related to a third-party server, and may specifically be registration information of the user terminal on the third-party server. The login information may include information such as a unique identifier of the user, a mobile phone number and a user name of the user registered in the third-party server, and may further include information such as a user gender, a user age, a city where the user is located, a province where the user is located, a country where the user is located, and other user information filled in by the user when the user is registered in the third-party server. In specific implementation, when a user initiates a WIFI access request to an authentication server, the authentication server may redirect the user terminal to a third-party server, and the third-party server obtains login information of the user and sends the obtained login information to the authentication server; the content of the login information sent by the third-party server to the authentication server can be represented by related parameters and arranged according to a preset parameter format, so that the login information is more simplified. Taking the third-party server as a wechat server as an example, the login information of the user terminal sent by the third-party server may include a unique value of a wechat account, a mobile phone number bound to the wechat account, a nickname of the wechat account, and wechat data filled in by the user. The unique value of the WeChat account is a parameter representing the unique identification of the user.
Step S204, the identity of the user terminal is extracted from the login information. The identity of the user terminal is also the unique identity of the user, such as the unique value of the WeChat account.
Step S206, adding the identity into a delay queue, and setting the timing operation duration corresponding to the identity. The timing operation duration is also a preset delay time.
Delay Queue (Delay Queue) is a data structure with a first-in first-out access mode of data. Specifically, the delay Queue may be implemented by a Blocking Queue (Blocking Queue), the sequence of elements in the Queue is determined by obtaining the delay time of an element that is enqueued, and the element in the delay Queue is taken out according to the delay time, and usually, the element with shorter delay time is preferentially dequeued from the end of the Queue.
In the embodiment of the present disclosure, the element in the delay queue is an identity of the user terminal, and each identity entering the delay queue corresponds to one timing operation duration. If the timing operation durations corresponding to different identity identifiers are the same, the timing operation duration corresponding to the identity identifier which firstly enters the delay queue firstly reaches, and the identity identifier firstly exits the queue. In one embodiment, only one delay queue is set, all the identifiers are stored in the delay queue, each identifier corresponds to one timing operation duration, and the identifier with the timing operation duration expired is preferentially taken out from the delay queue. In another embodiment, a plurality of delay queues may be set according to the types of the identifiers, each delay queue may store one type of identifier correspondingly, and a plurality of identifiers of the same type are sequentially arranged in the same delay queue according to the sequence of entering the delay queue, so that the authentication server can conveniently take out the identifier when the identifier arrives from the corresponding delay queue based on the type of the identifier. In this way, the timing operation durations corresponding to a plurality of identifiers of the same type can be set to be the same, so that the identifiers which enter the delay queue first are also preferentially listed, and the authentication server is convenient to take out the identifiers in the queue in sequence conveniently according to the actual sequence.
In order to set the timing operation duration corresponding to the user terminal more reasonably, the embodiment of the present disclosure may further consider the user type, and set the delay duration in a targeted manner based on the user type, which may be specifically executed with reference to the following steps:
(1) determining a user type corresponding to the user terminal according to the identity; the user type includes at least one of: region type, gender type, age type.
It can be understood that the identity contained in the login information has an association relationship with other information in the login information, once the identity of the user terminal is extracted, the information of other user terminals associated with the identity can be obtained, and if the login information contains the city, province and country where the user is located, and information associated with the identity such as the sex, age and the like of the user, the region type, sex type and age type corresponding to the user terminal can be determined based on the identity. The region types can be divided into various modes, such as domestic types and foreign types, and can also be divided into northern types and southern types; gender types are generally divided into male types, female types and gender unknown types; the age types may be divided into a child type, a teenager type, a middle-aged type, an elderly type, and the like, and of course, the age types may also be directly divided according to a preset age interval.
In practical applications, the user type may include only one of the above types, or may include the above multiple types at the same time; such as a user type may be the elderly + women type. Since the region type, the gender type, and the age type can be subdivided into subclasses, the user type can be a combination of the subclasses.
(2) And setting the timing operation duration corresponding to the identity identification according to the determined user type. Specifically, the time length setting table can be established in advance; determining the timing operation time length corresponding to the user type according to the time length setting table; wherein, the corresponding relation between the user type and the timing operation duration is established in the duration setting table. For example, for a user with an age type of the elderly, the corresponding timing operation duration is 15 minutes, and for a user with an age type of the teenager, the corresponding timing operation duration is 10 minutes. The time length experience value can also be set correspondingly for different region types based on region habits, such as setting the time length of the timing operation for foreign type users to be 15 minutes and setting the time length of the timing operation for domestic type users to be 10 minutes. For a user with a female gender type, the corresponding timing operation duration is 15 minutes, for a user with a male gender type, the corresponding timing operation duration is 10 minutes, for a user with an unknown gender type, the corresponding timing operation duration is 13 minutes, and the like. Since the user type may include a plurality of types of combinations, the time length setting table records the time length of the operation of the timer corresponding to each type of combination in detail. Specifically, the timing operation duration may be determined by comprehensive calculation with respect to a preset weight of each type and the timing operation duration corresponding to each type.
Step S208, when the time length of the timing operation corresponding to the user terminal is reached, whether the user terminal completes the designated operation is judged. If yes, go to step S210; if not, step S212 is performed. In specific implementation, whether an expired timing operation duration exists in the delay queue or not can be monitored, if so, the identity corresponding to the timing operation duration is extracted, and whether the user terminal corresponding to the identity completes the specified operation or not is judged.
Step S210, the wireless router is notified to provide the internet access service to the user terminal.
Step S212, the wireless router is informed to limit the internet access service of the user terminal.
In one embodiment, the step of notifying the wireless router to limit the internet access service of the user terminal may include at least one of:
(1) and sending an internet service notification of disconnecting the user terminal to the wireless router.
(2) And sending an internet access notification of the user terminal in a low-bandwidth access mode to the wireless router.
(3) And sending a time length notice that the user terminal is allowed to access the network to the wireless router.
The control method for the internet access authority provided by the embodiment of the disclosure can adopt a delay queue mode to respectively time different user terminals, and the authentication server can interact with the third-party server to judge whether the user terminal completes the designated operation within the set time duration of the timing operation, and provide internet access service for the user terminal when the user terminal completes the designated operation; and when the user terminal does not finish the designated operation, limiting the internet access service of the user terminal. The mode of adopting the delay queue can further ensure that the user terminal has more reasonable time to finish the designated operation whenever accessing the network, thereby reducing the misoperation phenomena such as forced network disconnection and the like caused by different times when different users access the network, and better improving the user experience.
For convenience of understanding, in the following, taking a third party server as a wechat server, and taking an operation designated as an operation focusing on designating a wechat public number as an example, refer to a flowchart of another method for controlling internet access authority shown in fig. 3, where the method is applied to an authentication server, the authentication server is connected to a wireless router, and the authentication server is further connected to the wechat server, and the method includes the following steps:
step S302, user login information sent by the WeChat server is received.
Optionally, the user login information is sent to the authentication server by the wireless router when the user terminal accesses the wireless router. The user login information may include an identity of the user terminal.
Step S304, adding the identity of the user terminal into the delay queue, and determining the forced attention time corresponding to the identity of the user terminal. Wherein, the forced attention time is the timing operation duration.
Step S306, when the forced attention time is reached, the id of the ue is taken out from the delay queue.
Step S308, based on the identity of the user terminal, inquiring the WeChat Server whether the user terminal pays attention to the specified WeChat public number; if yes, go to step S310; if not, step S312 is performed.
The WeChat public number is an application account number applied by a developer or a merchant on the WeChat public platform, and the merchant can realize all-around communication and interaction with a specific group on the WeChat platform through the public number, such as characters, pictures, voice or videos.
Step S310, sending a notification to the wireless router to continue providing the user terminal with the internet access service, so that the user terminal continues to access the internet.
Step S312, sending a notification to the wireless router to continue disconnecting the internet service of the user terminal, so as to force the user terminal to leave the network.
According to the control method for the internet access authority, forced attention time can be correspondingly set for each user terminal through the delay queues, so that the user terminals can finish attention operation of appointed WeChat public numbers in the forced attention time, misoperation phenomena such as forced network disconnection and the like caused by different times of accessing different users to a network are avoided, and user experience is improved well.
Corresponding to the above control method of the internet access authority, referring to the structural block diagram of the control device of the internet access authority provided in fig. 4, the device is disposed in the authentication server, the authentication server is connected with the wireless router, and the device includes:
an information receiving module 402, configured to receive login information of a user terminal;
a timing starting module 404, configured to start a timing operation corresponding to the user terminal according to the login information, and issue an execution instruction of a specified operation to the user terminal;
a judging module 406, configured to judge whether the user terminal completes the specified operation when the time length of the timing operation corresponding to the user terminal is reached;
and the authority control module 408 is configured to notify the wireless router to control the internet access authority of the user terminal according to the determination result.
The control device for the internet access authority can respectively time different user terminals, and can correspondingly set the time length for executing the designated operation for the user terminal whenever the user terminal accesses the network.
In an embodiment, referring to fig. 5, based on fig. 4, a block diagram of another control apparatus for controlling internet access permission is provided, where the timing starting module 404 includes:
an identifier extracting unit 4041, configured to extract an identity identifier of the user terminal from the login information;
the duration setting unit 4042 is configured to add the identity to the delay queue, and set a timing operation duration corresponding to the identity.
On this basis, the determining module 406 is configured to monitor whether there is an expired timing operation duration in the delay queue; if yes, extracting an identity corresponding to the timing operation duration; and judging whether the user terminal corresponding to the identity completes the specified operation or not.
In one embodiment, the duration setting unit 4042 is further configured to: determining a user type corresponding to the user terminal according to the login information; the user type includes at least one of: region type, gender type, age type; and setting the timing operation duration corresponding to the identity identification according to the determined user type.
As also shown in fig. 5, the right control module 408 includes:
an internet access providing unit 4081, configured to notify the wireless router to provide an internet access service to the user terminal if the determination result indicates that the user terminal has performed the specified operation;
the internet access limiting unit 4082 is configured to notify the wireless router to limit the internet access service of the user terminal if the determination result indicates that the user terminal does not perform the specified operation.
In an embodiment, the internet access limiting unit 4082 is configured to perform at least one of the following: (1) sending an internet service notification of disconnecting the user terminal to the wireless router; (2) sending an internet access notification of the user terminal in a low-bandwidth access mode to the wireless router; (3) and sending a time length notice that the user terminal is allowed to access the network to the wireless router.
The implementation principle and the generated technical effect of the control device for the internet access authority provided by the embodiment of the present disclosure are the same as those of the embodiment of the foregoing method, and for brief description, no part of the embodiment of the device is mentioned, and reference may be made to the corresponding contents in the embodiment of the foregoing method.
The embodiment of the present disclosure also provides a server, including a memory and a processor; the memory is used for storing programs for supporting the processor to execute the control method of the internet access authority, and the processor is configured to execute the programs stored in the memory.
Referring to fig. 6, a schematic diagram of a server is shown, the server includes a memory 100 and a processor 101; the memory 100 is configured to store one or more computer instructions, and the one or more computer instructions are executed by the processor to implement the method for controlling the internet access right.
Further, the server shown in fig. 6 further includes a bus 102 and a communication interface 103, and the processor 101, the communication interface 103, and the memory 100 are connected through the bus 102.
The Memory 100 may include a high-speed Random Access Memory (RAM) and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. The communication connection between the network element of the system and at least one other network element is realized through at least one communication interface 103 (which may be wired or wireless), and the internet, a wide area network, a local network, a metropolitan area network, and the like can be used. The bus 102 may be an ISA bus, PCI bus, EISA bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 6, but that does not indicate only one bus or one type of bus.
The processor 101 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 101. The Processor 101 may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA), or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The various methods, steps, and logic blocks disclosed in the embodiments of the present disclosure may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present disclosure may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 100, and the processor 101 reads the information in the memory 100, and completes the steps of the method of the foregoing embodiment in combination with the hardware thereof.
The embodiment of the disclosure further provides a computer storage medium, which is used for storing computer software instructions used for the control method of the internet access authority.
The method, the apparatus, and the computer program product of the server for controlling the internet access permission provided in the embodiments of the present disclosure include a computer-readable storage medium storing a program code, where instructions included in the program code may be used to execute the method described in the foregoing method embodiments, and specific implementation may refer to the method embodiments, and will not be described herein again.
In addition, in the description of the embodiments of the present disclosure, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meaning of the above terms in the present disclosure can be understood in specific instances by those of ordinary skill in the art.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Finally, it should be noted that: the above-mentioned embodiments are merely specific embodiments of the present disclosure, which are used for illustrating the technical solutions of the present disclosure and not for limiting the same, and the scope of the present disclosure is not limited thereto, and although the present disclosure is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive of the technical solutions described in the foregoing embodiments or equivalent technical features thereof within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present disclosure, and should be construed as being included therein. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (12)

1. A control method of internet access authority is applied to an authentication server, and the method comprises the following steps:
receiving login information of a user terminal;
starting timing operation corresponding to the user terminal according to the login information, and issuing an execution instruction of specified operation to the user terminal; wherein the specifying operation may include at least one of: paying attention to the specified user account, sharing the specified user account, and evaluating the specified user account;
when the time length of the timing operation corresponding to the user terminal is reached, judging whether the user terminal completes the specified operation;
informing a wireless router to control the internet access authority of the user terminal according to the judgment result;
the step of starting the timing operation corresponding to the user terminal according to the login information comprises the following steps: extracting the identity of the user terminal from the login information; and adding the identity into a delay queue, and setting the timing operation duration corresponding to the identity.
2. The method of claim 1,
the step of judging whether the user terminal completes the specified operation when the time length of the timing operation corresponding to the user terminal is reached comprises the following steps:
monitoring whether the time-delay queue has expired timing operation time;
if yes, extracting an identity corresponding to the timing operation duration;
and judging whether the user terminal corresponding to the identity mark completes the specified operation.
3. The method according to claim 1, wherein the step of setting the timing operation duration corresponding to the identity includes:
determining a user type corresponding to the user terminal according to the identity; the user type includes at least one of: region type, gender type, age type;
and setting the timing operation duration corresponding to the identity identification according to the determined user type.
4. The method according to claim 1, wherein the step of notifying the wireless router to control the internet access right of the user terminal according to the determination result comprises:
if the judgment result is that the user terminal has executed the specified operation, the wireless router is informed to provide internet access service for the user terminal;
and if the judgment result indicates that the user terminal does not execute the specified operation, the wireless router is informed to limit the internet access service of the user terminal.
5. The method of claim 4, wherein the step of notifying the wireless router to limit the internet-enabled service of the user terminal comprises at least one of:
sending an internet service notification for disconnecting the user terminal to the wireless router;
sending an internet access notification of the user terminal in a low bandwidth access mode to the wireless router;
and sending a time length notice that the user terminal is allowed to access the network to the wireless router.
6. The utility model provides a controlling means of networking authority, its characterized in that, the device sets up in authentication server, the device includes:
the information receiving module is used for receiving login information of the user terminal;
the timing starting module is used for starting the timing operation corresponding to the user terminal according to the login information and issuing an execution instruction of a specified operation to the user terminal; wherein the specifying operation may include at least one of: paying attention to the specified user account, sharing the specified user account, and evaluating the specified user account;
the judging module is used for judging whether the user terminal finishes the specified operation or not when the timing operation duration corresponding to the user terminal is reached;
the authority control module is used for informing the wireless router to control the internet access authority of the user terminal according to the judgment result;
the timing starting module comprises: an identifier extracting unit, configured to extract an identifier of the user terminal from the login information; and the time length setting unit is used for adding the identity into the delay queue and setting the timing operation time length corresponding to the identity.
7. The apparatus of claim 6, wherein the determining module is configured to monitor whether there is an expired timing operation duration in the delay queue; if yes, extracting an identity corresponding to the timing operation duration; and judging whether the user terminal corresponding to the identity mark completes the specified operation.
8. The apparatus of claim 6, wherein the duration setting unit is configured to:
determining a user type corresponding to the user terminal according to the identity; the user type includes at least one of: region type, gender type, age type;
and setting the timing operation duration corresponding to the identity identification according to the determined user type.
9. The apparatus of claim 6, wherein the rights control module comprises:
the internet access providing unit is used for informing the wireless router to provide internet access service for the user terminal if the judgment result shows that the user terminal executes the specified operation;
and the internet access limiting unit is used for informing the wireless router to limit the internet access service of the user terminal if the judgment result shows that the user terminal does not execute the specified operation.
10. The apparatus of claim 9, wherein the internet surfing restriction unit is configured to perform at least one of:
sending an internet service notification for disconnecting the user terminal to the wireless router;
sending an internet access notification of the user terminal in a low bandwidth access mode to the wireless router;
and sending a time length notice that the user terminal is allowed to access the network to the wireless router.
11. A server, comprising a memory and a processor; the memory is for storing a program that enables a processor configured to execute the program stored in the memory to perform the method of any one of claims 1 to 5.
12. A computer storage medium storing computer software instructions for use in the method of any one of claims 1 to 5.
CN201810384004.2A 2018-04-23 2018-04-23 Control method and device of internet access authority and server Active CN108632264B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810384004.2A CN108632264B (en) 2018-04-23 2018-04-23 Control method and device of internet access authority and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810384004.2A CN108632264B (en) 2018-04-23 2018-04-23 Control method and device of internet access authority and server

Publications (2)

Publication Number Publication Date
CN108632264A CN108632264A (en) 2018-10-09
CN108632264B true CN108632264B (en) 2021-08-06

Family

ID=63694616

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810384004.2A Active CN108632264B (en) 2018-04-23 2018-04-23 Control method and device of internet access authority and server

Country Status (1)

Country Link
CN (1) CN108632264B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073977A (en) * 2020-08-25 2020-12-11 深圳市虹鹏能源科技有限责任公司 Network control method and device for tunnel

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007174062A (en) * 2005-12-20 2007-07-05 Canon Inc Data communication apparatus, data communication system, data communication method, and program thereof
CN105357188A (en) * 2015-10-10 2016-02-24 努比亚技术有限公司 Method and server for realizing WIFI connection and mobile terminal
CN106973063A (en) * 2017-04-27 2017-07-21 新华三技术有限公司 Method for network authorization and device
CN107026860A (en) * 2017-04-01 2017-08-08 成都虫洞奇迹科技有限公司 Login authentication method, apparatus and system
CN107454064A (en) * 2017-07-11 2017-12-08 上海斐讯数据通信技术有限公司 A kind of visitor's authentication method and system based on public number
CN107949037A (en) * 2018-01-11 2018-04-20 北京小米移动软件有限公司 Method for network access, apparatus and system, storage medium

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU4082601A (en) * 2000-03-14 2001-09-24 Speed-Trap.Com Ltd. Monitoring and modifying services provided over a network
JP5197843B1 (en) * 2011-12-27 2013-05-15 株式会社東芝 Authentication linkage system and ID provider device
CN104135384B (en) * 2014-07-30 2018-06-12 上海斐讯数据通信技术有限公司 Access authority manages system and method
CN104243286A (en) * 2014-09-23 2014-12-24 上海佰贝科技发展有限公司 Method for achieving public wifi authentication through WeChat
TW201626755A (en) * 2015-01-14 2016-07-16 普易科技股份有限公司 Home control gateway and gateway control method thereof
CN106131079B (en) * 2016-08-29 2020-08-11 腾讯科技(北京)有限公司 Authentication method, system and proxy server
CN106789937A (en) * 2016-11-29 2017-05-31 上海斐讯数据通信技术有限公司 Application authentication method and its system in captive portals environment, wireless aps

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007174062A (en) * 2005-12-20 2007-07-05 Canon Inc Data communication apparatus, data communication system, data communication method, and program thereof
CN105357188A (en) * 2015-10-10 2016-02-24 努比亚技术有限公司 Method and server for realizing WIFI connection and mobile terminal
CN107026860A (en) * 2017-04-01 2017-08-08 成都虫洞奇迹科技有限公司 Login authentication method, apparatus and system
CN106973063A (en) * 2017-04-27 2017-07-21 新华三技术有限公司 Method for network authorization and device
CN107454064A (en) * 2017-07-11 2017-12-08 上海斐讯数据通信技术有限公司 A kind of visitor's authentication method and system based on public number
CN107949037A (en) * 2018-01-11 2018-04-20 北京小米移动软件有限公司 Method for network access, apparatus and system, storage medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"Login to Internet Websites by Next Generation Game Console";Mohammad Shirali-Shahreza;《2006 2nd IEEE/IFIP International Conference in Central Asia on Internet》;20070115;全文 *
一种基于微信识别的商用无线网络认证方法――以万舜云商办公楼为例;金海峰等;《电子技术与软件工程》;20171115(第22期);全文 *
微信认证实现集团WLAN应用;钟钒等;《成都大学学报(自然科学版)》;20160930(第03期);全文 *

Also Published As

Publication number Publication date
CN108632264A (en) 2018-10-09

Similar Documents

Publication Publication Date Title
CN108183950B (en) Method and device for establishing connection of network equipment
CN110830564B (en) CDN scheduling method, device, system and computer readable storage medium
RU2582573C2 (en) Method for user bandwidth notification
CN109152094B (en) Wireless network connection method for terminal
WO2022148254A1 (en) User information analysis result feedback method and device thereof
CN107645722B (en) Private network selective access method and system, public network MME, HSS and base station
CN109246741B (en) Wireless network connection method for terminal
CN110831038B (en) Network slice resource scheduling method and device
CN101674318A (en) Method for pushing data to mobile equipment at regular time
CN103810176A (en) Pre-fetching accessing method and device of webpage information
CN108901035B (en) Identification method and device for terminal of Internet of things
CN105165035B (en) Have both the multimedia message transmission of text message transmission
CN108632264B (en) Control method and device of internet access authority and server
CN104660482A (en) Method and device for pushing social network information
CN103503400B (en) redirection method, device and system
CN109451481A (en) The configuration method of network performance parameter and the method for determining province's electrical parameter
CN116761134A (en) Method and apparatus for location services
CN110545453A (en) content distribution method, device and system of content distribution network
CN106488449A (en) A kind of management method of Wireless Telecom Equipment and Wireless Telecom Equipment
CN111105789A (en) Awakening word obtaining method and device
CN103795748A (en) Method for downloading mobile internet website content information
CN110830935B (en) Policy control method, system and related equipment
CN105163335B (en) A kind of network access management method, server, mobile terminal and system
CN112004228B (en) Real person authentication method and system
US10142277B2 (en) Posting and consultation of messages by users of social networks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant