CN108966267B - Method and system for preventing network from being stolen for primary and secondary routes - Google Patents

Method and system for preventing network from being stolen for primary and secondary routes Download PDF

Info

Publication number
CN108966267B
CN108966267B CN201810602935.5A CN201810602935A CN108966267B CN 108966267 B CN108966267 B CN 108966267B CN 201810602935 A CN201810602935 A CN 201810602935A CN 108966267 B CN108966267 B CN 108966267B
Authority
CN
China
Prior art keywords
network
route
routing node
terminal device
signal information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810602935.5A
Other languages
Chinese (zh)
Other versions
CN108966267A (en
Inventor
何山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Special Art China Technology Co ltd
Original Assignee
Special Art China Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Special Art China Technology Co ltd filed Critical Special Art China Technology Co ltd
Priority to CN201810602935.5A priority Critical patent/CN108966267B/en
Publication of CN108966267A publication Critical patent/CN108966267A/en
Application granted granted Critical
Publication of CN108966267B publication Critical patent/CN108966267B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B17/00Monitoring; Testing
    • H04B17/30Monitoring; Testing of propagation channels
    • H04B17/309Measuring or estimating channel quality parameters
    • H04B17/318Received signal strength
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • Electromagnetism (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for preventing a mother-son route from being stolen, wherein the method comprises the following steps: s0., inquiring the signal information between the terminal equipment and each routing node from the terminal equipment according to the set frequency; s1, receiving signal information between terminal equipment and each routing node respectively; s2, judging whether the terminal equipment is the network rubbing equipment or not according to the signal information; the routing nodes include parent routes and child routes. The invention has the advantages of sufficient judgment condition, good judgment effect and the like.

Description

Method and system for preventing network from being stolen for primary and secondary routes
Technical Field
The invention belongs to the technical field of wireless communication, and particularly relates to a method and a system for preventing a mother-son route from being stolen.
Background
The router can provide a wireless network with a 2.4G frequency band and a wireless network with a 5G frequency band, and can correspondingly Set a wireless network name (SSID) and a password, a user terminal (such as a mobile phone) can select to connect the corresponding wireless network according to the SSID and input the corresponding password, and the corresponding wireless network is successfully connected after the password verification is passed.
In order to solve the problem of network handover, the inventor previously applied a network handover prevention device, system, and method for connecting a router [ application number: CN201610602986.9], detachably connect in a router, the router includes first connection module, first processing module and communication module, first connection module is used for connecting and prevents rubbing the net device, communication module is used for connecting external device, first processing module is used for handling communication module with external device's connection, prevent rubbing the net device and include: the second connecting module is used for connecting the router and is matched with the first connecting module; the second processing module is connected to the second connection module and used for processing the connection between the communication module and the external device; and the safety button is connected with the second processing module, when the first connection between the communication module and the external device is established through the first processing module and after the safety button of the anti-network-gramming device connected with the router is pressed and started, the second connection between the communication module and the external device is established through the second processing module, wherein the first connection limits Internet access, and the second connection opens Internet access.
According to the scheme, the purpose of preventing from being stolen by prompting the user to confirm the acquired identity information is achieved, but the scheme is mainly applied to the scene of one router and is not applicable to the scene of primary and secondary routes, the scheme needs manual confirmation of the user, the purpose of preventing from being stolen by the network needs to be achieved by an external device on the router, and the defects that the operation is complex, the intelligent degree is not high enough and the like exist.
The primary and secondary routes comprise a primary route and at least one secondary route, wherein the primary route is internally provided with a high-performance antenna and an independent signal amplifier and is responsible for Wi-Fi coverage of large parts of areas such as a living room, the secondary route is plug and play, the Wi-Fi configuration of the primary route can be automatically learned, and the user reconfiguration is not needed.
Primary and secondary routing is a complete set of solutions for large and medium-sized Wi-Fi coverage. The mother router is responsible for indoor dial-up networking and Wi-Fi coverage of most indoor areas. The sub-route is used for expanding Wi-Fi and further enhancing the coverage of a weak area or Wi-Fi dead corners of signals.
In general, the actual parent-child router application is shown in fig. 1, where the parent route is at the home-center location of the user and the child route is at the home-edge location. The network forced coverage of the home of the user can be enlarged due to the fact that the sub-router is close to the edge, but not negligibly, the coverage is enlarged, and meanwhile, the network of the sub-router can be rubbed by outsiders.
Disclosure of Invention
The invention aims to solve the problems and provides a method for preventing a master-slave route of a network-rubbing device from rubbing against a network;
another object of the present invention is to provide a system for preventing network handover of a parent route based on the above method.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for preventing a parent route from being stolen comprises the following steps:
s1, receiving signal information among routing nodes of terminal equipment;
s2, judging whether the terminal equipment is the network rubbing equipment or not according to the signal information;
the routing node includes a parent route and a child route.
In the above method for preventing a subnet from being stolen, before step S1, the method further includes:
s0., inquiring the signal information between the terminal device and each routing node from the terminal device according to the set frequency.
In the above method for preventing network congestion in the primary and secondary routes, in step S0, after receiving the query command, the terminal device sends the received signal information to the primary route and/or the secondary route through the wireless network.
In the above method for preventing network congestion by using a child-parent route, in step S1, the parent route and/or the child route receive signal information between the terminal device and the routing node.
In the above method for preventing network clash for primary and secondary routes, the signal information includes the MAC address of each routing node and the signal strength of each routing node signal received by the terminal device.
In the above method for preventing network from being stolen by using a primary-secondary route, in step S2, it is determined whether the terminal device is a network stealing device by using the following method:
s21, judging whether the number of routing nodes capable of receiving signals by the terminal equipment reaches a preset number, if so, executing a step S22, and if not, executing a step S23;
s22, judging whether the signal intensity of at least one routing node is greater than a first preset intensity or not, and if not, judging that the routing node is a network-stealing device;
and S23, judging whether the signal intensity of at least one routing node is greater than a second preset intensity, and if not, judging that the routing node is a network-rubbing device.
A system for preventing network from being stolen for a mother route and a son route comprises the mother route and the son route, wherein the mother route and/or the son route comprise a signal information receiving module and a network stealing judgment module,
the signal information receiving module is used for receiving signal information between the terminal equipment and each routing node;
the network-rubbing judging module is used for judging whether the terminal equipment is the network-rubbing equipment or not according to the signal information;
the routing nodes include parent routes and child routes.
In the above-mentioned system for preventing network congestion of primary and secondary routes, the secondary route and/or the primary route further include an inquiry request module, which is used for inquiring the signal information between the terminal device and each routing node according to the set frequency.
In the above system for preventing network from being rubbed by a primary and secondary route, the network-rubbing judgment module is specifically configured to judge whether the number of routing nodes that can receive signals by the terminal device reaches a preset number;
if yes, further judging whether the signal intensity of at least one routing node is greater than a first preset intensity, and if not, judging that the routing node is a network-off device;
if not, further judging whether the signal intensity of at least one routing node is greater than a second preset intensity, and if not, judging that the routing node is a network-rubbing device.
In the above-mentioned system for preventing network grazing of primary and secondary route, the system further comprises a terminal, and the terminal equipment comprises an information sending module for sending received signal information to the primary route and/or the secondary route through a wireless network.
Compared with the prior art, the invention has the following advantages: the characteristics of multiple routing nodes in a network environment formed by the primary and secondary routes can be utilized, whether the terminal equipment is the network rubbing equipment or not is judged according to the signal information of each routing node received by the terminal equipment, the judgment condition is sufficient, and a better judgment effect is achieved.
Drawings
FIG. 1 is a diagram of an actual primary and secondary router application scenario;
FIG. 2 is a flowchart of a first method according to a first embodiment of the present invention;
FIG. 3 is a flowchart of a method of the first embodiment of the present invention;
fig. 4 is a flowchart of a method for determining whether a terminal device is a network-attach device in the first embodiment of the present invention;
fig. 5 is a system block diagram of the second embodiment of the present invention.
Reference numerals: a routing node 3; a mother route 1; a signal information receiving module 11; a network rubbing judgment module 12; a query request module 13; sub-route 2; a terminal device 4; an information sending module 41.
Detailed Description
Although a flowchart may describe the operations as a sequential process, many of the operations can be performed in parallel, concurrently, or simultaneously. The order of the operations may be rearranged. A process may be terminated when its operations are completed, but may have additional steps not included in the figure. A process may correspond to a method, a function, a procedure, a subroutine, a subprogram, etc.
As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items. When an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of example embodiments. As used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used herein, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
The invention is used in the letter routing application scene, solves the problem that the network-gramming device can not be accurately judged in the prior art, and the like, and further describes the technical scheme of the invention by combining the following preferred embodiments of the invention with the accompanying drawings, but the invention is not limited to the embodiments.
Example one
Most of the existing wireless network applications only have one router, and when the terminal equipment is accessed into the router, the router can only judge whether the equipment is a network-rubbing mode through the signal intensity use range of the access equipment.
However, in the application of the primary and secondary routers, a method for judging the network-rubbing equipment by using the primary and secondary routers at the same time does not exist, the secondary router in the primary and secondary router is only used for expanding the network coverage node at present, so that the wireless coverage is wider, and actually, the position and the distance of the network-rubbing equipment are easier to judge due to a plurality of routing nodes in the application of the primary and secondary router, so that the network-rubbing equipment can be effectively prevented by using each routing node.
The embodiment discloses a method for preventing a master-slave route from being stolen from a network aiming at a scene of the master-slave route, as shown in fig. 2, the method comprises the following steps:
s1, receiving signal information between terminal equipment 4 and each routing node 3 respectively;
and S2, judging whether the terminal equipment 4 is a network rubbing equipment or not according to the signal information.
The routing node 3 here includes a parent route 1 and each child route 2 in the network, the number of the child routes 2 may be one, or two or more, and here, whether the terminal device 4 is a network-attach device is determined according to the signal strength of the parent route 1 and each child route 2 to the terminal device 4.
The signal information here includes the MAC address of each routing node 3 and the beacon signal strength of each routing node 3, and the MAC address of each routing node 3 corresponds to the beacon signal strength one to one.
Further, as shown in fig. 3, before step S1, the method further includes:
s0. inquire the terminal equipment 4 about the signal information between the terminal equipment 4 and each routing node 3 according to a set frequency.
When a terminal device 4 is connected to any one of the routing nodes 3, it indicates that it is connected to the network constructed by the child-parent route, and it will receive the beacon signal of the any routing node 3, and may also receive beacon signals sent by other routing nodes 3, and step S0 is used to request to query the signal strength and MAC address of each routing node 3beacon signal received by the terminal device 4 connected to the network.
And, in step S0, the terminal device 4, after receiving the query command, transmits the received signal information to the parent route 1 and/or the child route 2 via the wireless network.
Further, in step S1, the signal information between the terminal device 4 and the routing node 3 is received by the parent route 1 and/or the child route 2.
In this embodiment, the terminal device 4 sends the signal information to the female router 1, the female router 1 receives the signal information returned by the terminal device 4, and the female router 1 determines whether the terminal device 4 is a network gramming device according to the signal information. The terminal device 4 accessing the local network may or may not receive the signal of the parent route 1, but the terminal device 4 is connected to the wireless network through the local network at this time, so that the signal information can be transmitted to the parent route 1 by the wireless network.
It should be noted that: although SSIDs (wireless network names) of the routing nodes 3 of the wireless network built by the child-parent routing are the same, since hardware devices of the routing nodes 3 are different, MAC addresses included in beacon frames sent by the routing nodes 3 are different. Although the terminal device 4 receives the beacon signal of the same SSID, it can recognize which routing node 3 sent the beacon signal, and thus it can be used to count which routing node 3 received the beacon signal by the terminal device 4 and the signal strength of the beacon signal.
Therefore, when returning the received signal strength and the MAC address thereof to the parent router 1, the terminal device 4 can send two pieces of information, namely the MAC address of the received beacon frame and the beacon signal strength, so that the parent router 1 can perform statistics according to the MAC address and the signal strength after receiving the MAC address and the signal strength.
Because the strength of the beacon signal received by the terminal device 4 from each routing node 3 is inversely proportional to the distance between the terminal device 4 and the routing node 3, when the received signal is weaker, the terminal device 4 is farther from the routing node 3 which transmits the beacon signal, and meanwhile, the terminal device 4 receives fewer beacon signals of the routing nodes 3, the terminal device 4 is located at the periphery of the child-mother router 1 network, and the position of the terminal device 4 is also described from another angle.
The parent route 1 may select a period of time to count the signal strength of beacon signals received by the terminal device 4. For example, the parent route 1 continuously counts the situations of beacon signals received by each terminal device 4 within 24 hours, and records the situations in a mode of average signal strength, taking two child routes 2 as an example, the recording results are shown in the following table:
terminal device Mother route node Sub-routing node 1 Sub-routing node 2
Device 1 Is not received -65dbm Is not received
Device 2 -55dbm -50dbm -76dbm
Device n Is not received Is not received -60dbm
Specifically, as shown in fig. 4, in step S2, it is determined whether the terminal device 4 is a network skimming device by the following method:
s21, judging whether the number of routing nodes 3 capable of receiving beacon signals by the terminal equipment 4 reaches a preset number, if so, executing a step S22, and if not, executing a step S23;
s22, judging whether the signal intensity of at least one routing node is greater than a first preset intensity or not, and if not, judging that the routing node is a network-stealing device;
and S23, judging whether the signal intensity of at least one routing node 3 is greater than a second preset intensity, and if not, judging that the network is a network-rubbing device.
The following is a detailed description of the first preset intensity being-100 db, the preset number being 2, and the second preset intensity being-60 db:
when one terminal device 4 can receive only the beacon signal of one routing node 3 and the signal strength of the beacon signal is-70 db, then step S23 is executed because the number of routing nodes is less than the preset number;
and because the signal intensity of the signal is less than-60 db, the requirement that the signal intensity of at least one routing node 3 is greater than the second preset intensity is not met, so that the terminal device 4 is judged as a network-surfing device, and the data of the terminal device is not processed and forwarded.
When one terminal device 4 can receive beacon signals of two routing nodes 3, and beacon signal strengths of the two beacon signals are-110 db and-120 db, respectively, since the number of routing nodes reaches the preset number, step S22 is executed;
since both signal strengths are less than-100 db, the requirement that the signal strength of at least one routing node 3 is greater than the first preset strength is not satisfied, so that the terminal device 4 is determined as a network-stealing device and still does not process and forward its data. This situation can effectively prevent the network-gramming device that can receive two routing nodes 3 simultaneously from rubbing the network.
When one terminal device 4 can receive beacon signals of two routing nodes 3, and beacon signal strengths of the two beacon signals are-70 db and-110 db, respectively, since the number of routing nodes reaches the preset number, step S22 is executed;
since one of the two signals has a signal strength greater than-100 db, the requirement that the signal strength of at least one routing node 3 is greater than the first preset strength is met, and therefore the terminal device 4 is determined to be a non-network-gramming device.
In addition, the preset number may not be limited to 2, but may be other than 2, preferably a number greater than 1, and when the preset number is 1, the first preset value may be set to a larger number.
Typically, the second predetermined intensity is greater than the first predetermined intensity. The first preset intensity, the second preset intensity and the preset number can be set by a user according to needs or set by a manufacturer when the manufacturer leaves a factory.
In addition, whether the terminal device 4 is a network-surfing device can be judged by the following method:
s211, judging whether the signal intensity in the received signal information is greater than a third preset intensity, if so, judging that the received signal information is a non-network-rubbing device, otherwise, executing a step S22;
and S22, judging whether the number of the routing nodes 3 receiving the signals reaches a routing preset value, if so, judging that the routing nodes are non-network-rubbing equipment, and otherwise, judging that the routing nodes are network-rubbing equipment.
Example two
As shown in fig. 5, this embodiment discloses a system for preventing network congestion of a mother-son route, which includes a mother route 1 and a son route 2, where the mother route 1 includes a signal information receiving module 11 and a network congestion judging module 12, wherein,
a signal information receiving module 11, configured to receive signal information between the terminal device 4 and each routing node 3;
the network-swiping judging module 12 is used for judging whether the terminal device 4 is a network-swiping device according to the signal information;
likewise, routing node 3 includes a parent route 1 and various child routes 2 within the network.
Further, the parent route 1 herein further includes an inquiry request module 13, configured to inquire, to the terminal device 4, signal information between the terminal device 4 and each routing node 3 respectively according to a set frequency.
Specifically, the network handover judging module 12 is specifically configured to judge whether the number of routing nodes 3 that can receive signals by the terminal device 4 reaches a preset number;
if yes, further judging whether the signal intensity of at least one routing node is greater than a first preset intensity, and if not, judging that the routing node is a network-off device;
if not, further judging whether the signal intensity of at least one routing node 3 is greater than a second preset intensity, and if not, judging that the network is a network-rubbing device.
The system further comprises a terminal device 4, wherein the terminal device 4 comprises an information sending module 41, and is used for sending the received signal information to the mother route 1 through a wireless network.
The specific embodiments described herein are merely illustrative of the invention. Various modifications or additions may be made to the described embodiments or alternatives may be employed by those skilled in the art without departing from the spirit or ambit of the invention as defined in the appended claims.
Furthermore, although routing nodes 3 are used more here; a mother route 1; a signal information receiving module 11; a network rubbing judgment module 12; a query request module 13; sub-route 2; a terminal device 4; the information sending module 41, etc., but does not exclude the possibility of using other terms. These terms are used only for the purpose of more conveniently describing and explaining the essence of the present invention and they are to be construed as any additional limitation which is contrary to the spirit of the present invention.

Claims (9)

1. A method for preventing network setback of a mother-son route is characterized by comprising the following steps:
s1, receiving signal information between terminal equipment (4) and each routing node (3);
s2, judging whether the terminal equipment (4) is a network rubbing equipment or not according to the signal information;
the routing node (3) comprises a parent route (1) and one or more child routes (2);
receiving, by the parent route (1) and/or the child route (2), signal information between the terminal device (4) and the routing node (3).
2. The method for preventing phishing by a child-mother router according to claim 1, further comprising before step S1:
s0. inquires the terminal device (4) about the signal information between the terminal device (4) and each routing node (3) according to the set frequency.
3. The method of preventing network skimming according to claim 2, wherein in step S0, the terminal device (4) sends the received signal information to the primary route (1) and/or the secondary route (2) via the wireless network after receiving the query command.
4. The method of primary-secondary routing anti-walkthrough according to claim 1, wherein the signal information includes the MAC address of each routing node (3) and the signal strength of each routing node (3) signal received by the terminal device (4).
5. The method for preventing network from being stolen by a child-mother router according to claim 1, wherein in step S2, it is determined whether the terminal device (4) is a network stealing device by:
s21, judging whether the number of the routing nodes (3) capable of receiving signals by the terminal equipment (4) reaches a preset number, if so, executing step S22, otherwise, executing step S23;
s22, judging whether the signal intensity of at least one routing node is greater than a first preset intensity or not, and if not, judging that the routing node is a network-stealing device;
and S23, judging whether the signal intensity of at least one routing node (3) is greater than a second preset intensity, and if not, judging that the network is a network-rubbing device.
6. The system for preventing network from being stolen by the primary route and the secondary route comprises the primary route (1) and the secondary route (2), and is characterized in that the primary route (1) and/or the secondary route (2) comprise a signal information receiving module (11) and a network stealing judgment module (12), wherein,
the signal information receiving module (11) is used for receiving signal information between the terminal equipment (4) and each routing node (3);
the network-rubbing judging module (12) is used for judging whether the terminal equipment (4) is the network-rubbing equipment or not according to the signal information;
the routing node (3) comprises a parent route (1) and one or more child routes (2);
receiving, by the parent route (1) and/or the child route (2), signal information between the terminal device (4) and the routing node (3).
7. The system for preventing network skimming according to claim 6, wherein the child route (2) and/or the parent route (1) further comprises an inquiry request module (13) for inquiring the signal information between the terminal device (4) and each routing node (3) according to a set frequency to the terminal device (4).
8. The system for preventing network from being stolen according to a primary-secondary route of claim 6, wherein the network stealing judgment module (12) is specifically configured to judge whether the number of routing nodes (3) that the terminal device (4) can receive signals reaches a preset number;
if yes, further judging whether the signal intensity of at least one routing node is greater than a first preset intensity, and if not, judging that the routing node is a network-off device;
if not, further judging whether the signal intensity of at least one routing node (3) is greater than a second preset intensity, and if not, judging that the network-rubbing equipment is the network-rubbing equipment.
9. The system for preventing network skimming according to claim 6, wherein the system further comprises a terminal device (4), and the terminal device (4) comprises an information sending module (41) for sending the received signal information to the parent route (1) and/or the child route (2) through a wireless network.
CN201810602935.5A 2018-06-12 2018-06-12 Method and system for preventing network from being stolen for primary and secondary routes Active CN108966267B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810602935.5A CN108966267B (en) 2018-06-12 2018-06-12 Method and system for preventing network from being stolen for primary and secondary routes

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810602935.5A CN108966267B (en) 2018-06-12 2018-06-12 Method and system for preventing network from being stolen for primary and secondary routes

Publications (2)

Publication Number Publication Date
CN108966267A CN108966267A (en) 2018-12-07
CN108966267B true CN108966267B (en) 2022-08-09

Family

ID=64488532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810602935.5A Active CN108966267B (en) 2018-06-12 2018-06-12 Method and system for preventing network from being stolen for primary and secondary routes

Country Status (1)

Country Link
CN (1) CN108966267B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756944B (en) * 2019-01-29 2021-04-09 Oppo广东移动通信有限公司 Terminal, router, and method, device and system for controlling ad hoc network router

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1788264A (en) * 2003-05-13 2006-06-14 基永有限公司 System and method for routing packets in a wired or wireless network
CN103997535A (en) * 2014-05-30 2014-08-20 百度在线网络技术(北京)有限公司 User behavior collecting system and method, mother devices and child devices
CN104159271A (en) * 2013-05-15 2014-11-19 华为技术有限公司 Boundary control method and system, and access controller
CN104254070A (en) * 2013-06-25 2014-12-31 中兴通讯股份有限公司 WiFi access method, intelligent terminal and router equipment
CN106911596A (en) * 2017-02-13 2017-06-30 上海斐讯数据通信技术有限公司 A kind of multi-mode control bandwidth method and device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10117258B2 (en) * 2013-11-22 2018-10-30 Beijing Qihoo Technology Comapny Limited Wireless channel redistribution method and apparatus

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1788264A (en) * 2003-05-13 2006-06-14 基永有限公司 System and method for routing packets in a wired or wireless network
CN104159271A (en) * 2013-05-15 2014-11-19 华为技术有限公司 Boundary control method and system, and access controller
CN104254070A (en) * 2013-06-25 2014-12-31 中兴通讯股份有限公司 WiFi access method, intelligent terminal and router equipment
CN103997535A (en) * 2014-05-30 2014-08-20 百度在线网络技术(北京)有限公司 User behavior collecting system and method, mother devices and child devices
CN106911596A (en) * 2017-02-13 2017-06-30 上海斐讯数据通信技术有限公司 A kind of multi-mode control bandwidth method and device

Also Published As

Publication number Publication date
CN108966267A (en) 2018-12-07

Similar Documents

Publication Publication Date Title
KR101910477B1 (en) Control access point
US10219203B2 (en) Wireless local area network scanning method and wireless access point
US8818261B1 (en) Configuration of a network device
CN106900021B (en) VoWiFi call processing method and system for mobile terminal
CN105636237A (en) Network connection method, wireless device and system
KR102167933B1 (en) Method and apparatus for scanning access point in wileless system
CN105103626A (en) Wireless local area network (WLAN) selection rules
CN109041140B (en) Method for rapidly switching wireless network, intelligent hardware and terminal equipment
US20080107090A1 (en) Radio Frequency Firewall Coordination
EP3745682A1 (en) Wireless access system, configuration method and wireless routing device
AU2021417277B2 (en) Key identifier generation method, and related apparatus
CN105392185A (en) Intelligent equipment networking method and device, and system
CN104754761A (en) Wireless local area network connection processing method and wireless local area network connection processing device
CN115589624A (en) Communication method and device
CN106060878A (en) Relay method of device and repeater
CN108966267B (en) Method and system for preventing network from being stolen for primary and secondary routes
EP4207925A1 (en) Session establishment method and apparatus
CN106664558A (en) Method and apparatus for establishing connection
JP7328452B2 (en) Method for handling capabilities in a wireless network
CN105992208A (en) Wireless connection authentication method and wireless connection authentication device
CN104717706B (en) The smooth loaming method of WLAN and system and access point and access controller
JP3643824B2 (en) Wireless LAN system, network service providing method, and medium storing network service providing program
RU2767499C1 (en) Method of indicating authorization of terminal device, method of obtaining information on authorization of terminal device, method of indicating authorization identifier, method of obtaining authorization identifier and communication device
CN114268975A (en) Communication method and device
CN106658667A (en) Method and apparatus for rapid connection with embedded device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190509

Address after: 201616 No. 3666 Sixian Road, Songjiang District, Shanghai

Applicant after: PHICOMM (SHANGHAI) Co.,Ltd.

Address before: 610100 125 Longquan Street Park Road, Longquanyi District, Chengdu, Sichuan.

Applicant before: Sichuan fixun Information Technology Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201112

Address after: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant after: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

Address before: 201616 Shanghai city Songjiang District Sixian Road No. 3666

Applicant before: Phicomm (Shanghai) Co.,Ltd.

TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220712

Address after: 100000 a2181, second floor, Xueyuan Road, Dongsheng Science Park, Zhongguancun, No.18 Xueqing Road, Haidian District, Beijing

Applicant after: Special art (China) Technology Co.,Ltd.

Address before: Room 10242, No. 260, Jiangshu Road, Xixing street, Binjiang District, Hangzhou City, Zhejiang Province

Applicant before: Hangzhou Jiji Intellectual Property Operation Co.,Ltd.

GR01 Patent grant
GR01 Patent grant