CN109548025B - Method and device for managing the use rights of a wireless access point provided by a routing device - Google Patents

Method and device for managing the use rights of a wireless access point provided by a routing device Download PDF

Info

Publication number
CN109548025B
CN109548025B CN201910057760.9A CN201910057760A CN109548025B CN 109548025 B CN109548025 B CN 109548025B CN 201910057760 A CN201910057760 A CN 201910057760A CN 109548025 B CN109548025 B CN 109548025B
Authority
CN
China
Prior art keywords
wireless
token information
token
information
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910057760.9A
Other languages
Chinese (zh)
Other versions
CN109548025A (en
Inventor
吕治严
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Publication of CN109548025A publication Critical patent/CN109548025A/en
Application granted granted Critical
Publication of CN109548025B publication Critical patent/CN109548025B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application aims to provide a method for managing the use authority of a wireless access point provided by a routing device, wherein the method comprises the following steps: the wireless routing equipment generates one or more first token information and issues the one or more first token information; the method comprises the steps that user equipment establishes wireless connection between the user equipment and a wireless access point provided by wireless routing equipment, and sends an authentication request to the wireless routing equipment; the wireless routing equipment receives an authentication request sent by the user equipment after the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and authorized to use the wireless connection; and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request. The autonomy of the wireless routing equipment is realized.

Description

Method and device for managing the use rights of a wireless access point provided by a routing device
Priority of CN 201811640068.0
Technical Field
The present application relates to the field of communications, and in particular, to a technique for managing usage rights of a wireless access point provided by a routing device.
Background
With the development of the times, people have increasingly kept away from the network. Generally, a user connects a wireless access point provided by a wireless routing device through a corresponding user device to realize networking function. The wireless connection process comprises three processes of scanning, authentication and connection. The authentication comprises password authentication and EAP account password authentication, or for an open network, a Captive Net Work authentication technology is used, related authentication is carried out by jumping to a cloud network, and after the authentication, the cloud control router passes through the internet access equipment.
In the prior art, the authentication process is complicated, the authentication efficiency is low, and the user experience is not high.
Disclosure of Invention
An object of the present application is to provide a method and device for managing the usage right of a wireless access point provided by a routing device.
According to one aspect of the application, a method for managing the use authority of a wireless access point provided by a routing device at a wireless routing device side is provided, and the method comprises the following steps:
generating one or more first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
issuing the one or more first token information;
receiving an authentication request sent by user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, wherein the authentication request comprises second token information;
and if one of the one or more first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection.
According to another aspect of the present application, a method for managing, at a network device side, a usage right of a wireless access point provided by a routing device is provided, where the method includes:
receiving one or more first token information sent by a wireless routing device, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
establishing or updating a token information base according to the mapping relation between the wireless routing equipment and the one or more first token information;
receiving a token query request sent by user equipment;
inquiring from the token information base to obtain second token information corresponding to the token inquiry request;
and sending the second token information to the user equipment.
According to another aspect of the present application, a method for managing, at a user equipment side, a usage right of a wireless access point provided by a routing device is provided, where the method includes:
establishing wireless connection between user equipment and a wireless access point provided by wireless routing equipment;
sending an authentication request to the wireless routing device, wherein the authentication request comprises second token information corresponding to the wireless routing device;
and receiving authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, a method for managing, at a wireless routing device side, a usage right of a wireless access point provided by a routing device is provided, where the method includes:
generating one or more first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
issuing the one or more first token information;
receiving a connection request which is sent by user equipment and is about a wireless access point provided by the wireless routing equipment, wherein the connection request comprises second token information;
and if one of the one or more first token information is matched with the second token information, authorizing to establish the wireless connection between the user equipment and the wireless access point.
According to another aspect of the present application, a method for managing, at a user equipment side, a usage right of a wireless access point provided by a routing device is provided, where the method includes:
sending a connection request about a wireless access point provided by a wireless routing device to the wireless routing device, wherein the connection request comprises second token information;
and receiving connection result information returned by the wireless routing equipment based on the connection request.
According to one aspect of the application, a method for managing the use authority of a wireless access point provided by a routing device is provided, wherein the method comprises the following steps:
generating one or more first token information by the wireless routing equipment, wherein each first token information is used for authorizing the access to a wireless access point provided by the wireless routing equipment and issuing the one or more first token information;
the method comprises the steps that user equipment establishes wireless connection between the user equipment and a wireless access point provided by wireless routing equipment, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises second token information corresponding to the wireless routing equipment;
the wireless routing equipment receives an authentication request sent by the user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and is authorized to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, a method for managing usage rights of a wireless access point provided by a routing device is provided, wherein the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device and issuing the one or more pieces of first token information to a corresponding network device;
the network equipment receives one or more pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the one or more pieces of first token information;
user equipment sends a token query request to the network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point connected with the user equipment;
the network equipment receives a token query request sent by the user equipment, queries from the token information base to obtain second token information corresponding to the token query request, wherein the second token information is matched with the access point identification information or the MAC address information, and sends the second token information to the user equipment;
the user equipment receives second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information;
the wireless routing equipment receives an authentication request sent by the user equipment after the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and authorized to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, a method for managing usage rights of a wireless access point provided by a routing device is provided, wherein the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device and issuing the one or more pieces of first token information to a corresponding network device;
the network equipment receives one or more pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the one or more pieces of first token information;
user equipment sends a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment;
the network equipment receives a token query request sent by the user equipment, queries from the token information base to obtain one or more wireless access points and second token information corresponding to each wireless access point, wherein each wireless access point is matched with the token query request, and sends the one or more wireless access points and the second token information corresponding to each wireless access point to the user equipment;
the user equipment receives second token information which is returned by the network equipment, corresponds to one or more wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request, and wireless connection between the user equipment and one wireless access point of the one or more wireless access points is established;
the user equipment sends an authentication request to the wireless routing equipment providing the wireless access point, wherein the authentication request comprises second token information corresponding to the wireless access point;
the wireless routing equipment receives an authentication request sent by the user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, wherein the authentication request comprises second token information, and if one of the one or more pieces of first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, a method for managing usage rights of a wireless access point provided by a routing device is provided, wherein the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, and if a wireless connection is established between a user device and the wireless access point provided by the wireless routing device, the one or more pieces of first token information are sent to the user device through the wireless connection;
the user equipment receives one or more pieces of first token information sent by the wireless routing equipment by using the wireless connection, selects and determines second token information corresponding to the wireless routing equipment from the one or more pieces of first token information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information corresponding to the wireless routing equipment;
the wireless routing equipment receives an authentication request sent by the user equipment, wherein the authentication request comprises second token information, and the second token information is selected from the one or more first token information;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, a method for managing usage rights of a wireless access point provided by a routing device is provided, wherein the method includes:
generating one or more first token information by the wireless routing equipment, wherein each first token information is used for authorizing the access to a wireless access point provided by the wireless routing equipment and issuing the one or more first token information;
the user equipment sends a connection request about a wireless access point provided by the wireless routing equipment to the wireless routing equipment, wherein the connection request comprises second token information;
the wireless routing equipment receives a connection request which is sent by the user equipment and relates to a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the wireless routing equipment authorizes the establishment of wireless connection between the user equipment and the wireless access point;
and the user equipment receives connection result information returned by the wireless routing equipment based on the connection request.
According to an aspect of the present application, there is provided a wireless routing device for managing usage rights of a wireless access point provided by the routing device, the device comprising:
a module for generating one or more first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
a second module for issuing the one or more first token information;
a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information;
and a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if one of the one or more first token information matches the second token information.
According to an aspect of the present application, there is provided a network device for managing usage rights of a wireless access point provided by a routing device, the device comprising:
a module, configured to receive one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device;
a second module, configured to establish or update a token information base according to a mapping relationship between the wireless routing device and the one or more first token information;
and a second module and a third module, which are used for receiving the token query request sent by the user equipment. The token query request comprises access point identification information or MAC address information of a wireless access point scanned by user equipment, or current address information of the user equipment;
a second module and a fourth module, which are used for inquiring and obtaining one or more wireless access points and second token information corresponding to each wireless access point from the token information base, wherein each wireless access point is matched with the token inquiry request;
and a twenty-five module, configured to send the one or more wireless access points and the second token information corresponding to each wireless access point to the user equipment.
According to one aspect of the application, a user device for managing the use right of a wireless access point provided by a routing device is provided, and the device comprises:
the third module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment;
a third module and a second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device;
and the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request.
According to another aspect of the present application, there is provided a wireless routing device for managing usage rights of a wireless access point provided by the routing device, the device comprising:
a first module configured to generate one or more first token information, wherein each first token information is used to authorize access to a wireless access point provided by the wireless routing device;
a first and second module for issuing the one or more first token information;
a first third module, configured to receive a connection request sent by a user equipment and related to a wireless access point provided by the wireless routing device, where the connection request includes second token information;
a fourth module, configured to authorize establishment of a wireless connection between the user equipment and the wireless access point if one of the one or more pieces of first token information matches the second token information.
According to another aspect of the present application, there is provided a user equipment for managing usage rights of a wireless access point provided by a routing device, the user equipment comprising:
a third module, configured to send a connection request to a wireless routing device regarding a wireless access point provided by the wireless routing device, where the connection request includes second token information;
and a third module, configured to receive connection result information returned by the wireless routing device based on the connection request.
According to an aspect of the present application, there is provided an apparatus for managing usage rights of a wireless access point provided by a routing apparatus, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the operations of any of the methods described above.
According to another aspect of the application, there is provided a computer readable medium comprising instructions that when executed cause a system to perform the operations of any of the methods described above.
Compared with the prior art, the self-control authorization authentication of the wireless routing equipment is realized by issuing one or more first token information by the wireless routing equipment, and each first token information is used for authorizing access to the wireless access point provided by the wireless routing equipment. If the user equipment has established wireless connection, the user equipment obtains authentication authorization by sending an authentication request comprising second token information to the wireless routing equipment, wherein the authentication request comprises the second token information, and if one of the one or more first token information is matched with the second token information, the authentication is passed; and if the user equipment does not establish wireless connection currently, the user equipment obtains authentication authorization by sending a connection request to the wireless routing equipment, wherein the connection request comprises second token information, and if one of the one or more first token information is matched with the second token information, the authentication is passed. The wireless routing equipment can determine whether the authentication is passed through by verifying whether the second token information sent by the user equipment is matched with the first token information generated by the user equipment, so that the wireless routing equipment has an autonomous function and controls the access of the terminal. The user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology diagram for managing usage rights of a wireless access point provided by a routing device according to one embodiment of the application;
FIG. 2 illustrates a system topology diagram for managing usage rights of wireless access points provided by a routing device according to another embodiment of the present application;
FIG. 3 illustrates a flow diagram of a method for managing device interactions for usage rights coordination of wireless access points provided by a routing device, according to one embodiment of the present application;
FIG. 4 illustrates a flow diagram of a method for managing device interactions for cooperation of usage rights of a wireless access point provided by a routing device according to another embodiment of the present application;
FIG. 5 illustrates a flow diagram of a method for managing device interactions for cooperation of usage rights of a wireless access point provided by a routing device according to another embodiment of the present application;
FIG. 6 illustrates a flow diagram of a method for managing device interactions for cooperation of usage rights of a wireless access point provided by a routing device according to another embodiment of the present application;
fig. 7 is a flowchart illustrating a method for managing device interactions for usage rights coordination of wireless access points provided by a routing device according to another embodiment of the present application;
fig. 8 is a system block diagram illustrating the components of a device for managing the cooperation of usage rights of wireless access points provided by a routing device according to an embodiment of the present application;
fig. 9 is a system block diagram illustrating the cooperation of devices for managing the usage rights of wireless access points provided by a routing device according to another embodiment of the present application;
fig. 10 is a system block diagram illustrating the components of a device for managing the cooperation of usage rights of wireless access points provided by a routing device according to another embodiment of the present application;
fig. 11 is a system block diagram illustrating the cooperation of devices for managing the usage rights of wireless access points provided by a routing device according to another embodiment of the present application;
fig. 12 is a system block diagram illustrating the components of a device for managing the cooperation of usage rights of wireless access points provided by a routing device according to another embodiment of the present application;
fig. 13 is a flowchart illustrating a method for managing usage rights of a wireless access point provided by a routing device at a wireless routing device according to an embodiment of the present application;
fig. 14 is a flowchart illustrating a method for managing usage rights of a wireless access point provided by a routing device at a network device according to an embodiment of the present application;
fig. 15 shows a flowchart of a method for managing usage rights of a wireless access point provided by a routing device at a user equipment side according to an embodiment of the present application;
fig. 16 is a flowchart illustrating a method for managing usage rights of a wireless access point provided by a routing device at a wireless routing device according to another embodiment of the present application;
fig. 17 shows a flowchart of a method for managing usage rights of a wireless access point provided by a routing device at a user equipment side according to another embodiment of the present application;
FIG. 18 illustrates a block diagram of a wireless routing device managing usage rights for wireless access points provided by the routing device in accordance with one embodiment of the present application;
FIG. 19 illustrates a block diagram of a network device that manages usage rights for wireless access points provided by a routing device in accordance with one embodiment of the present application;
FIG. 20 illustrates a block diagram of a user device for managing usage rights of a wireless access point provided by a routing device in accordance with one embodiment of the present application;
FIG. 21 illustrates a block diagram of a wireless routing device managing usage rights of wireless access points provided by the routing device, according to another embodiment of the present application;
FIG. 22 illustrates a block diagram of a user device for managing usage rights of a wireless access point provided by a routing device in accordance with another embodiment of the present application;
FIG. 23 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase-Change Memory (PCM), programmable Random Access Memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash Memory or other Memory technologies, compact Disc Read-Only Memory (CD-ROM), digital Versatile Disc (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in the present application includes, but is not limited to, a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or network servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
A token is a special frame that can control a station to occupy the medium to distinguish data frames from other control frames.
The Token method (Token granting) is also called a license method, the Token method used for the Ring-type structure lan is called a Token Ring access control method (Token Ring), and the Token method used for the Bus-type structure lan is called a Token Bus access control method (Token Bus).
The basic idea of the token method is: a unique token (a code consisting of one or more binary digits) is sent from one node to another, and only the node that obtains the token has the right to send the packet. When a station is ready to send message information, it first waits for the arrival of a token, and when it detects that a token passing by it is an empty token, it can send information in units of "frame", and sets the token busy to send information to the next station. The next station forwards the information which passes through the station but does not belong to the information accepted by the station. Since there are no idle tokens in the ring, other stations that wish to transmit must wait.
The receiving process comprises the following steps: each station detects the information passing through the station at any time, when the destination address appointed by the information packet is the same as the address of the station, the information packet is continuously forwarded while all relevant information is copied, and the frame information on the ring is recovered by the original sending point after surrounding the ring for one circle. Working in this way, the transmission is always under the control of the source station, and only after the source station sending the information packet gives up the transmission right to put the token in "null", other stations get the token and have the opportunity to send their own information.
The method and the device realize intelligent passing authentication of the wireless routing equipment based on a token mechanism so as to realize a self-controllable authorization authentication mode of the wireless routing equipment. The following describes a method and a device for managing the usage right of a wireless access point provided by a routing device in detail with reference to the accompanying drawings and specific embodiments.
Fig. 1 illustrates a typical scenario of the present application, in which a user equipment and a wireless routing device may perform interactive cooperation through direct communication (such as connection establishment in a wired or wireless manner) between the two devices, and the user equipment and a network device and the wireless routing device perform interactive cooperation through establishment of communication connection with the network device. Here, the user device includes, but is not limited to, a computing device such as a smartphone, a tablet, a personal computer, and the like.
Referring to the system shown in fig. 1, in order to further illustrate the solution of one embodiment of the present application, the following description is made in conjunction with fig. 4 and 9 from the perspective of interaction of the devices and the perspective of the devices.
Fig. 4 shows a flowchart of a method for managing device interaction of usage rights of a wireless access point provided by a routing device, where the method is applicable to the system shown in fig. 1, where the flowchart of the method includes interactions among the wireless routing device, a network device, and a user device, and the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device and issuing the one or more pieces of first token information to a corresponding network device;
the network equipment receives one or more pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the one or more pieces of first token information;
user equipment sends a token query request to the network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point connected with the user equipment;
the network equipment receives a token query request sent by the user equipment, queries from the token information base to obtain second token information corresponding to the token query request, wherein the second token information is matched with the access point identification information or the MAC address information, and sends the second token information to the user equipment;
the user equipment receives second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information;
and the wireless routing equipment receives an authentication request sent by the user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and is authorized to use the wireless connection.
Referring to the schematic diagram of the device shown in fig. 9, the wireless routing device includes a module, a second module, a third module, and a fourth module.
Specifically, a module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
A second module for issuing the one or more first token information to corresponding network devices.
And a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information.
And a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if there is one of the one or more first token information matches the second token information.
The network device is provided with a token information base. In some embodiments, the token information base includes one or more token information, and each token information corresponds to a wireless routing device. For example, the token information corresponds to identification information of the wireless routing device (e.g., access point identification information or MAC address of a wireless access point provided by the wireless routing device). In some embodiments, the token information base includes one or more wireless routing devices and one or more first token information. Wherein a mapping relationship exists between the one or more wireless routing devices and the one or more first token information. For example, the wireless routing device a generates one or more first token information a, and a mapping relationship exists between identification information of the wireless routing device a (for example, access point identification information or MAC address of a wireless access point provided by the wireless routing device) and the one or more first token information a. Referring to the schematic block diagram shown in fig. 9, the network device includes two-in-one modules, two-in-two modules, two-in-three modules, two-in-four modules, and two-in-five modules.
Specifically, the first module is configured to receive one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
And the second module is used for establishing or updating a token information base according to the mapping relation between the wireless routing equipment and the one or more first token information.
And the second module and the third module are used for receiving a token query request sent by user equipment. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected.
And a fourth module, configured to query the token information base to obtain second token information corresponding to the token query request, where the second token information is matched with the access point identification information or the MAC address information.
And a twenty-five module, configured to send the second token information to the user equipment.
The user device includes, but is not limited to, a computing device such as a smart phone, a tablet computer, and a personal computer. The user equipment comprises a three-in-one module, a three-in-two module and a three-in-three module.
Specifically, the module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment.
A third-second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device, and in this embodiment, the third-second module includes a third-second-first sub-module, a third-second sub-module, and a third-second-third sub-module; wherein,
a third-second-first sub-module, configured to send a token query request to a corresponding network device, where the token query request includes access point identification information (e.g., SSID) or MAC address information of a wireless access point to which the user equipment is connected.
And the third sub-module, the second sub-module and the third sub-module are used for receiving second token information which is returned by the network equipment and is matched with the access point identification information or the MAC address information.
And the third-second-third sub-module is used for sending an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information.
And the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request.
Here, for the above example corresponding to each device in fig. 9, please refer to the following example corresponding to the method in fig. 4, which is not described herein again.
Referring to the method shown in fig. 4, the method includes a method for managing the usage right of the wireless access point provided by the routing device at the wireless routing device end, a method for managing the usage right of the wireless access point provided by the routing device at the network device end, and a method for managing the usage right of the wireless access point provided by the routing device at the user device end.
The method for managing the use authority of the wireless access point provided by the routing equipment at the wireless routing equipment end comprises the steps of S101, S102, S103 and S104;
the method for managing the wireless access point provided by the wireless routing device at the network device end comprises the steps of S201, S202, S203, S204 and S205;
the method for managing the use authority of the wireless access point provided by the routing equipment at the user equipment end comprises a step S301, a step S302 and a step 303; step S302 in the present embodiment includes step S3021, step S3022, and step S3023.
Specifically, in step S101, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. The first token information includes a code consisting of one or more bit binary digits. In some embodiments, the first token information is randomly generated, e.g., a random number generated by a password generator or a random number generator; in other embodiments, the first token information is a fixed code set by a user. In some embodiments, a wireless routing device provides one or more wireless access points. When the wireless routing device provides a plurality of wireless access points and generates a plurality of first token information. In some embodiments, the first token information and the wireless access points are in a one-to-one correspondence, for example, one first token information corresponds to an authorization to access one wireless access point; in other embodiments, the plurality of first token information and the plurality of wireless access points are in a one-to-many relationship, for example, one first token information corresponds to several wireless access points in the plurality of wireless access points being authorized. Of course, those skilled in the art should understand that the authorization relationship between the first token information and the wireless access point is only an example, and other existing or future authorization relationships may be applicable to the present application, and are included in the scope of the present application and are included by reference.
In step S102, the wireless routing device issues the one or more first token information to the corresponding network device. In some embodiments, the wireless routing device issues, by the network device, the one or more first token information generated by the wireless routing device. For example, the wireless routing device sends the generated one or more first token information to the corresponding network device. In some embodiments, the network device comprises a management device corresponding to the wireless routing device; in other embodiments, the network device comprises a third party platform, a third party network device, or a system provided with a token information base. In some embodiments, the network device is only a device that stores the one or more first token information issued by the wireless routing device.
In step S201, a network device receives one or more pieces of first token information sent by a wireless routing device, where each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device. In some embodiments, the network device receives one or more first token information sent by the wireless routing device and obtains identification information of the wireless routing device (e.g., access point identification information or MAC address of a wireless access point provided by the wireless routing device).
In step S202, the network device establishes or updates a token information base according to a mapping relationship between the wireless routing device and the one or more first token information. In some embodiments, when receiving the one or more first token information sent by the wireless routing device, the network device determines a mapping relationship between the wireless routing device and the one or more first token information according to identification information of the wireless routing device (e.g., access point identification information or MAC address of a wireless access point provided by the wireless routing device), and establishes a token information base based on the mapping relationship, for example, if the wireless routing device a generates the one or more first token information a, a mapping relationship exists between the identification information of the wireless routing device a (e.g., access point identification information or MAC address of a wireless access point provided by the wireless routing device) and the one or more first token information a. In other embodiments, a token information base is provided in the network device. The token information base includes one or more token information, a mapping relationship exists between each token information and the wireless routing device, and the network device updates the token information base after receiving one or more first token information sent by the wireless routing device (for example, the token information base adds the first token information and stores the mapping relationship between the first token information and the wireless routing device).
In step S301, the user equipment establishes a wireless connection between the user equipment and a wireless access point provided by the wireless routing device. In some embodiments, the user device has established a wireless connection with a wireless access point provided by the wireless routing device.
In step S3021, the user equipment transmits a token query request to a corresponding network device, where the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected. In some embodiments, the user device achieves the purpose of using the wireless access point provided by the wireless routing device by sending a token query request to the corresponding network device. In some embodiments, the user device is already establishing a wireless connection with a wireless access point provided by the wireless routing device. The token inquiry request includes access point identification information (e.g., SSID) or MAC address information of a wireless access point to which the user equipment is connected.
In step S203, the network device receives a token query request sent by a user device. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected. And the access point identification information or the MAC address information of the wireless access point is used for identifying the wireless routing equipment so that the network equipment can inquire whether second token information corresponding to the wireless routing equipment exists in the token information base.
In step S204, the network device queries from the token information base to obtain second token information corresponding to the token query request, where the second token information is matched with the access point identification information or the MAC address information. In some embodiments, the second token information comprises a code of one or more bit binary digits. The token information base comprises one or more token information, and a mapping relation exists between each token information and the wireless routing equipment. The network device may query whether there is a corresponding wireless routing device in a token information base according to the access point identification information or the MAC address information of the wireless access point to which the user device is connected. If the corresponding wireless routing device exists, the corresponding second token information can be determined according to the mapping relation between the wireless routing device and the token information.
In some embodiments, the network device is provided with a token information base, and the token information base comprises one or more pieces of token information. The network device manages the one or more token information through a token information base. For example, if the network device includes a management device corresponding to the wireless routing device, the token information base includes one or more pieces of first token information generated by the wireless routing device. The network device may set usage rights for the one or more first token information for gratuitous or gratuitous use based on a setting of a user (e.g., an administrative user of the wireless routing device). For example, the network device queries the token information base for the second token information based on the token query request of the user device, which is free, requires a certain fee payment, or is based on points. For another example, the network device is a third-party platform, a third-party network device, or a system provided with a token information base, where the token information base includes one or more token information. And each token information corresponds to a wireless routing device. The network device may set the usage rights for the one or more token information for free or paid use based on a setting of a user (e.g., an administrative user for each wireless routing device). For example, the network device queries the token information base for the second token information based on the token query request of the user device, which is free, requires a certain fee payment, or is based on points. In some embodiments, the user device obtains the second token information by paying a consideration; in other embodiments, the user device pays a price to the network device where the second token information is stored when the first token information is invalidated (e.g., beyond a single longest connection duration).
Here, it should be noted that the first token information is token information generated by a wireless routing device and used for authorizing access to a wireless access point provided by the wireless routing device; the second token information is token information obtained by the network device through inquiring in a token information base based on access point identification information or MAC address information of a wireless access point connected with the user device. In some embodiments, the second token information does not have authorized access rights. That is, the first token information and the second token information are only used to distinguish that the token information is generated by the wireless routing device and sent to the network device by the user equipment, respectively.
In step S205, the network device sends the second token information to the user equipment. In some embodiments, if there is second token information in the token information base, where the second token information matches access point identification information or MAC address information included in a token query request sent by a user equipment, a network device sends the second token information to the user equipment.
In step S3022, the ue receives second token information that matches the access point identification information or the MAC address information and is returned by the network device. In some embodiments, the user equipment receives the second token information, and the second token information is sent as authentication information to the corresponding wireless routing device for authentication.
In step S3023, the user equipment transmits an authentication request to the wireless routing device, wherein the authentication request includes the second token information. In some embodiments, the user equipment obtains the second token information matching the access point identification information or the MAC address of the connected wireless access point by sending a token query request to the network equipment. Further, the user equipment sends an authentication request to the wireless routing equipment with the mapping relation of the second token information. Wherein the authentication request includes the second token information. The second token information is used for authenticating whether the wireless routing equipment comprises the first token information matched with the second token information or not so as to acquire the use right of the wireless access point provided by the wireless routing equipment.
In step S103, the wireless routing device receives an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information. In some embodiments, the wireless routing device receives an authentication request sent by a user equipment, wherein the authentication request includes the second token information.
In step S104, if one of the one or more first token information matches the second token information, the user equipment is authenticated through the authentication request and authorized to use the wireless connection. In some embodiments, the wireless routing device is configured to authenticate an authentication request sent by a user equipment. For example, a wireless routing device generates one or more first token information that is used to authorize access to a wireless access point provided by the wireless routing device. When the authentication is passed, the user equipment can be authorized to use the wireless access point provided by the wireless routing device. In some embodiments, the second token information included in the authentication request sent by the user equipment by the authentication rule of the wireless routing equipment is included in one or more first token information generated and issued by the wireless routing equipment.
In step 303, the user equipment receives authentication result information returned by the wireless routing device based on the authentication request. In some embodiments, the authentication result information includes first token information that matches the second token information and exists in the wireless routing device, and the user device can use the wireless access point provided by the wireless routing device through the first token information if the authentication is passed, for example, the user obtains the usage right of the wireless access point provided by the wireless routing device by inputting the first token information; in other embodiments, the authentication result information includes prompt information that no token information is available, for example, if one or more first token information generated by the wireless routing device does not match the second token information, the authentication is not passed, and the user device may not use the wireless access point provided by the wireless routing device.
One embodiment of the cooperative interaction among the wireless routing device, the network device and the user equipment is described above with reference to fig. 4 and 9, and another embodiment of the cooperative interaction among the wireless routing device, the network device and the user equipment is described below with reference to fig. 5 and 10.
Fig. 5 shows a flowchart of a method for managing device interaction of usage rights of a wireless access point provided by a routing device, where the method is applicable to the system shown in fig. 1, where the flowchart of the method includes interactions among the wireless routing device, a network device, and a user device, and the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device and issuing the one or more pieces of first token information to a corresponding network device;
the network equipment receives one or more pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the one or more pieces of first token information;
user equipment sends a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment;
the network equipment receives a token query request sent by the user equipment, queries from the token information base to obtain one or more wireless access points and second token information corresponding to each wireless access point, wherein each wireless access point is matched with the token query request, and sends the one or more wireless access points and the second token information corresponding to each wireless access point to the user equipment;
the user equipment receives second token information which is returned by the network equipment, corresponds to one or more wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request, and wireless connection between the user equipment and one wireless access point of the one or more wireless access points is established;
the user equipment sends an authentication request to wireless routing equipment providing the wireless access point, wherein the authentication request comprises second token information corresponding to the wireless access point;
the wireless routing equipment receives an authentication request sent by the user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, wherein the authentication request comprises second token information, and if one of the one or more pieces of first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection.
Referring to the schematic diagram of the device shown in fig. 10, the wireless routing device includes a module, a second module, a third module, and a fourth module;
specifically, a module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
A second module for issuing the one or more first token information to corresponding network devices.
And a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information.
And a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if there is one of the one or more first token information matches the second token information.
With continued reference to the schematic device diagram shown in fig. 10, the network device includes two-to-one modules, two-to-two modules, two-to-three modules, two-to-four modules, and two-to-five modules;
specifically, the first module is configured to receive one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
And the second module is used for establishing or updating a token information base according to the mapping relation between the wireless routing equipment and the one or more first token information.
And a second module and a third module, which are used for receiving the token query request sent by the user equipment. The token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment.
And the second module and the fourth module are used for inquiring and obtaining one or more wireless access points and second token information corresponding to each wireless access point from the token information base, wherein each wireless access point is matched with the token inquiry request.
And a twenty-five module, configured to send the one or more wireless access points and the second token information corresponding to each wireless access point to the user equipment.
With continued reference to the schematic device diagram shown in fig. 10, the user equipment includes a first-third module, a second-third module, and a third-third module; the three-one module comprises three one-one sub-modules, three two sub-modules and three one-three sub-modules;
specifically, the three-in-one module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment; wherein,
and the three one-to-one submodules are used for sending a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by user equipment, or current address information of the user equipment.
And the third and second sub-modules are used for receiving second token information which is returned by the network equipment, corresponds to one or more wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request.
And the three-in-three sub-module is used for establishing the wireless connection between the user equipment and one of the one or more wireless access points.
And a third module and a second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device.
And the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request.
Here, for the above example corresponding to each device in fig. 10, please refer to the following example corresponding to the method in fig. 5, which is not described herein again.
Referring to the method shown in fig. 5, in this embodiment, the method includes a method for managing the usage right of the wireless access point provided by the routing device at the wireless routing device end, a method for managing the usage right of the wireless access point provided by the routing device at the network device end, and a method for managing the usage right of the wireless access point provided by the routing device at the user device end. Wherein,
the method for managing the use authority of the wireless access point provided by the routing equipment at the wireless routing equipment end comprises the steps of S101, S102, S103 and S104;
the method for managing the wireless access point provided by the wireless routing device at the network device end comprises the steps of S201, S202, S203, S204 and S205;
the method for managing the use authority of the wireless access point provided by the routing equipment at the user equipment end comprises a step S301, a step S302 and a step 303; step S301 in this embodiment includes step S3011, step S3012, and step S3013.
Specifically, in step S101, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
In step S102, the wireless routing device issues the one or more first token information to the corresponding network device.
In step S201, the network device receives one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
In step S202, the network device establishes or updates a token information base according to the mapping relationship between the wireless routing device and the one or more first token information.
In step S3011, the user equipment sends a token query request to a corresponding network device, where the token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment. In some embodiments, the user device has not yet connected to a wireless access point, and the user device scans for one or more wireless access points. In some embodiments, the one or more wireless access points are each provided by a different wireless routing device; in other embodiments, the one or more wireless access points are provided by the same wireless routing device. The user equipment sends a token query request to a corresponding network device, wherein the token query request includes access point identification information (e.g., SSID) or MAC address information of a wireless access point scanned by the user equipment. In some embodiments, the token query request includes current address information of the user device, e.g., current location information obtained by the user device based on a positioning technology (e.g., GPS).
In step S203, the network device receives a token query request sent by the user equipment. The token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment. In some embodiments, the access point identification information or the MAC address information of the wireless access point is used for the network device to query the corresponding second token information in the token information base; in some embodiments, the current address information is used for the network device to query a nearby wireless access point in the current address information, and further, the network device obtains access point identification information or MAC address information of the nearby wireless access point, and queries corresponding second token information in a token information base based on the nearby wireless access point to obtain second token information in the vicinity of the user device.
In step S204, the network device queries and obtains one or more wireless access points and second token information corresponding to each wireless access point from the token information base, where each wireless access point matches the token query request. In some embodiments, a token information base is provided in the network device. The token information base comprises one or more token information. And each token information corresponds to a wireless access point. And determining the corresponding wireless routing equipment according to the access point identification information or the MAC address information of the wireless access point. In some embodiments, the token query request sent by the user equipment to the network equipment includes access point identification information or MAC address information of the wireless access point scanned by the user equipment; the network equipment queries a corresponding wireless access point in a token information base according to the access point identification information or the MAC address information; further, determining corresponding second token information according to the inquired wireless access point; in other embodiments, a user device sends a token query request to a network device, where the token query request includes current address information of the user device, the network device queries a nearby wireless access point based on the current address information (e.g., determined by querying a mapping relationship between access point identification information and location information (e.g., buildings and business circles) of the user device), and obtains access point identification information or MAC address information of the nearby wireless access point, and further determines a corresponding wireless access point in a token information base based on the access point identification information or MAC address information, and determines second token information corresponding to the wireless access point.
In step S205, the network device sends the one or more wireless access points and second token information corresponding to each wireless access point to the user equipment. In some embodiments, the network device queries, according to a token query request sent by a user device, a token information base to obtain a wireless access point corresponding to access point identification information or MAC address information included in the token query request, and sends the wireless access point and second token information corresponding to the wireless access point to the user device. So that the user equipment sends an authentication request to the corresponding wireless routing equipment based on the wireless access point and the second token information.
In step S3012, the user equipment receives second token information corresponding to one or more wireless access points and each wireless access point returned by the network device, where each wireless access point matches the token query request. In some embodiments, the wireless access point returned by the network device is used for the user equipment to establish a wireless connection with the wireless access point. In some embodiments, the second token information returned by the network device and received by the user device is access point identification information of a wireless access point scanned by the user device, or second token information corresponding to a wireless access point matched with MAC address information; in some embodiments, the second token information returned by the network device and received by the user device is access point identification information of a nearby wireless access point queried by current address information of the user device, or second token information corresponding to a wireless access point with MAC address information matching.
In step S3013, the ue establishes a wireless connection between the ue and one of the one or more wireless access points. In some embodiments, the user equipment establishes a wireless connection based on the wireless access point returned by the network equipment for sending an authentication request to the corresponding wireless routing device.
In step S302, the user equipment sends an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device.
In step S103, the wireless routing device receives an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information.
In step S104, if one of the one or more first token information matches the second token information, the user equipment is authenticated by the authentication request and authorized to use the wireless connection.
In step 303, the user equipment receives authentication result information returned by the wireless routing device based on the authentication request.
For the description of step S101, step S102, step S201, step S202, step S302, step S103, step S104 and step S303 in the embodiment corresponding to fig. 5, please refer to the description in the embodiment corresponding to fig. 4. And will not be described herein.
Fig. 2 illustrates another exemplary scenario of the present application, in which a user equipment and a wireless routing device may perform interactive cooperation through direct communication between the two devices (e.g., establishing a connection in a wired or wireless manner, etc.). Here, the user device includes, but is not limited to, a computing device such as a smartphone, a tablet, a personal computer, and the like.
Referring to the system shown in fig. 2, in order to further explain the scheme of the embodiment of the present application, the following description is made in terms of interaction between devices and devices in conjunction with fig. 3 and 8.
Fig. 3 shows a flowchart of a method for managing device interaction of usage rights of a wireless access point provided by a routing device, where the method is applicable to the system shown in fig. 2, where the method flowchart includes interaction between a wireless routing device and a user device, and the method includes:
generating one or more first token information by the wireless routing equipment, wherein each first token information is used for authorizing the access to a wireless access point provided by the wireless routing equipment and issuing the one or more first token information;
the method comprises the steps that user equipment establishes wireless connection between the user equipment and a wireless access point provided by wireless routing equipment, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises second token information corresponding to the wireless routing equipment;
the wireless routing equipment receives an authentication request sent by the user equipment after the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and authorized to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
Referring to the schematic diagram of the device shown in fig. 8, the wireless routing device includes a module, a second module, a third module, and a fourth module.
Specifically, a module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
A second module for issuing the one or more first token information.
And a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information.
And a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if one of the one or more first token information matches the second token information.
Referring to the schematic device diagram shown in fig. 8, the ue includes three-in-one modules, three-in-two modules, and three-in-three modules.
Specifically, the module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment.
And a third module and a second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device.
And the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request.
Here, for the above example corresponding to each device in fig. 8, please refer to the following example corresponding to the method in fig. 3, which is not described herein again.
Referring to the method shown in fig. 3, in this embodiment, the method includes a method for managing, at a wireless routing device side, the usage right of the wireless access point provided by the routing device, and a method for managing, at a user device side, the usage right of the wireless access point provided by the routing device. Wherein,
the method for managing the use authority of the wireless access point provided by the routing equipment at the wireless routing equipment end comprises the steps of S101, S102, S103 and S104;
the method for managing the use authority of the wireless access point provided by the routing equipment at the user equipment end comprises a step S301, a step S302 and a step 303;
specifically, in step S101, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
In step S102, the wireless routing device issues the one or more first token information. In some embodiments, the wireless routing device issues the one or more first token information online by sending the one or more first token information to the network device, as in the corresponding embodiments of fig. 4 and 5 described above; in other embodiments, the wireless routing device performs offline publishing by posting the first token information or a two-dimensional code containing the first token information in the vicinity of the wireless routing device, so as to directly implement interactive cooperation between the user equipment and the wireless routing device, for example, the embodiment shown in fig. 3.
In step S301, the user equipment establishes a wireless connection between the user equipment and a wireless access point provided by the wireless routing device. For example, the wireless routing device provides a wireless access point X with which the user device establishes a wireless connection.
In step S302, the user equipment sends an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device. In some embodiments, the user device obtains the second token information, for example, by scanning a two-dimensional code that includes some second token information. The user equipment sends an authentication request to the wireless routing equipment corresponding to the currently connected wireless access point X, wherein the authentication request comprises second token information obtained by scanning of the user equipment. Of course, those skilled in the art should understand that the above-mentioned operation of obtaining the second token information is only an example, and other existing or future operations, such as those that may be applied to the present application, are also included in the scope of the present application and are included by reference. For example, the user sends an authentication request to the corresponding wireless routing device by entering the second token information.
In step S103, the wireless routing device receives an authentication request sent by the user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information. In some embodiments, the wireless routing device obtains the authentication request sent by the user equipment to query whether there is corresponding first token information based on second token information included in the authentication request.
In step S104, if one of the one or more first token information matches the second token information, the user equipment is authenticated through the authentication request and authorized to use the wireless connection. In some embodiments, the wireless routing device generates one or more first token information. The first token information is used to authorize access to a wireless access point provided by the wireless routing device. If the second token information sent by the user equipment matches the first token information generated by the wireless routing device (for example, the second token information is included in the one or more first token information), the authentication is passed. The wireless routing device sends authentication result information to the user equipment. For example, the prompt information that the authentication passed and the first token information. The user equipment can establish a wireless connection with a wireless access point provided by the wireless routing device. In some embodiments, the wireless routing device may set the usage rights for the one or more first token information for gratuitous or gratuitous use based on a setting of a user (e.g., an administrative user of the wireless routing device). For example, the wireless routing device authorizing based on an authentication request sent by the user device is based on being free of charge, requiring a fee to be paid, or based on points. In some embodiments, the user device obtains the second token information by paying a consideration; in other embodiments, the user device pays a consideration to the wireless routing device when the first token information is invalidated (e.g., beyond a single longest connection duration).
In step S303, the user equipment receives authentication result information returned by the wireless routing device based on the authentication request. In some embodiments, the user equipment receives authentication result information sent by the wireless routing device. For example, the wireless routing device sends authentication result information including prompt information for passing authentication and first token information to the user equipment, and the user equipment can establish wireless connection with a wireless access point provided by the wireless routing device based on the first token information. For another example, the authentication fails, and the wireless routing device sends a prompt message to the user equipment that includes the authentication fails.
With continued reference to the system shown in fig. 2, another embodiment of the cooperative interaction of the user equipment with the wireless routing device is described below with reference to fig. 6 and 11. To further illustrate aspects of embodiments of the present application, reference is made below to fig. 6 and 11 from the perspective of interaction between devices and from the perspective of devices.
Fig. 6 shows a flowchart of a method for managing device interaction of usage rights of a wireless access point provided by a routing device, where the method is applicable to the system shown in fig. 2, where the flowchart of the method includes interaction between the wireless routing device and a user device, and the method includes:
the method comprises the steps that a wireless routing device generates one or more pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, and if a wireless connection is established between a user device and the wireless access point provided by the wireless routing device, the one or more pieces of first token information are sent to the user device through the wireless connection;
the user equipment receives one or more pieces of first token information sent by the wireless routing equipment by using the wireless connection, selects and determines second token information corresponding to the wireless routing equipment from the one or more pieces of first token information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information corresponding to the wireless routing equipment;
the wireless routing equipment receives an authentication request sent by the user equipment, wherein the authentication request comprises second token information, and the second token information is selected from the one or more first token information.
Referring to the schematic diagram of the device shown in fig. 11, the wireless routing device includes a one-to-one module, a two-to-two module, a three-to-three module, and a four-to-four module.
Specifically, a module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
A second module, configured to send the one or more first token information to the user equipment through a wireless connection if the user equipment has established the wireless connection with a wireless access point provided by the wireless routing device.
A third module, configured to receive an authentication request sent by the user equipment, where the authentication request includes second token information, and the second token information is selected from the one or more first token information.
And a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if there is one of the one or more first token information matches the second token information.
Referring to the schematic device diagram shown in fig. 11, the ue includes three-in-one modules, three-in-two modules, and three-in-three modules.
Specifically, the module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment.
And a third module and a second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device.
And the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request.
Here, for the example corresponding to each device in fig. 11, please refer to the following example corresponding to the method in fig. 6, which is not described herein again.
Referring to the method shown in fig. 6, the method includes a method for managing the usage right of the wireless access point provided by the routing device at the wireless routing device side and a method for managing the usage right of the wireless access point provided by the routing device at the user device side. Wherein,
the method for managing the use authority of the wireless access point provided by the routing equipment at the wireless routing equipment end comprises the steps of S101, S102, S103 and S104;
the method for managing the use authority of the wireless access point provided by the routing equipment at the user equipment end comprises a step S301, a step S302 and a step 303; wherein, the step S302 includes a step S3021, a step S3022, and a step S3023.
Specifically, in step S101, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device.
In step S301, the user equipment establishes a wireless connection between the user equipment and a wireless access point provided by the wireless routing device. For example, the user device establishes a wireless connection with a wireless access point provided by the wireless routing device by entering a wireless access password.
In step S102, if the user equipment and the wireless access point provided by the wireless routing device have established a wireless connection, the one or more first token information are sent to the user equipment through the wireless connection. In some embodiments, the user obtains the first token information by scanning a two-dimensional code including the first token information, such as the embodiment corresponding to fig. 5 described above; in other embodiments, the user device and the wireless access point provided by the wireless routing device have established a wireless connection, and the wireless routing device sends the one or more first token information generated by the wireless routing device to the user device via the wireless connection, so that the user device uses the first token information to authenticate the usage right of the wireless access point provided by the wireless routing device.
In step S3021, the user equipment receives one or more first token information sent by the wireless routing device using the wireless connection, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. In some embodiments, the user equipment receives one or more first token information sent by the wireless routing device to the user equipment over a wireless connection.
In step S3022, the user equipment selects, from the one or more first token information, second token information that determines that the wireless routing device corresponds to. Here, the first token information and the second token information are only used for distinguishing that the token information is generated by the wireless routing device and that the token information is transmitted by the user equipment. In some embodiments, the user device presents the one or more first token information, e.g., the user device presents a prompt for currently available wireless access points and presents corresponding first token information, and the user selects to determine a certain first token information as the second token information; in other embodiments, the wireless routing device sends one or more first token information to the user device, and the user device automatically selects one of the confirmations as the second token information based on the one or more first token information, for example, the user device randomly selects one of the first token information as the second token information.
In step S3022, the user equipment transmits an authentication request to the wireless routing device, where the authentication request includes the second token information corresponding to the wireless routing device. In some embodiments, after the user equipment receives the one or more pieces of first token information sent by the wireless routing device, the user manually selects or the user equipment automatically selects one of the pieces of first token information as the second token information. Further, the user equipment sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information.
In step S103, the wireless routing device receives an authentication request sent by the user equipment, where the authentication request includes second token information, where the second token information is selected from the one or more first token information. In some embodiments, the wireless routing device receives an authentication request sent by the user device, wherein the second token information in the authentication request is determined by the user or the user device selected from one or more first token information.
In step S104, if one of the one or more first token information matches the second token information, the wireless routing device authenticates that the authentication request passes and authorizes the user device to use the wireless connection.
In step 303, the user equipment receives authentication result information returned by the wireless routing device based on the authentication request.
For the above description of step S101, step S302, step S104 and step S303 in the embodiment corresponding to fig. 6, please refer to the description in the embodiment corresponding to fig. 4. And will not be described herein.
With continued reference to the system shown in fig. 2, another embodiment of the cooperative interaction of the user equipment with the wireless routing device is described below with reference to fig. 7 and 12. To further illustrate aspects of embodiments of the present application, reference is made below to fig. 7 and 12 from the perspective of device interaction and device perspective.
Fig. 7 is a flowchart of a method for managing device interaction of usage rights of a wireless access point provided by a routing device, where the method is applicable to the system shown in fig. 2, where the method flowchart includes interaction between a wireless routing device and a user device, and the method includes:
generating one or more first token information by the wireless routing equipment, wherein each first token information is used for authorizing the access to a wireless access point provided by the wireless routing equipment and issuing the one or more first token information;
the user equipment sends a connection request about a wireless access point provided by the wireless routing equipment to the wireless routing equipment, wherein the connection request comprises second token information;
the wireless routing equipment receives a connection request which is sent by the user equipment and is about a wireless access point provided by the wireless routing equipment, and if one of the one or more pieces of first token information is matched with the second token information, the wireless routing equipment authorizes the establishment of wireless connection between the user equipment and the wireless access point;
and the user equipment receives connection result information returned by the wireless routing equipment based on the connection request.
Referring to the schematic device diagram shown in fig. 12, the wireless routing device includes a first module, a first second module, a first third module, and a first fourth module.
Specifically, the first module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device;
a first and second module for issuing the one or more first token information;
a first third module, configured to receive a connection request sent by a user equipment and related to a wireless access point provided by the wireless routing device, where the connection request includes second token information;
a fourth module, configured to authorize establishment of a wireless connection between the user equipment and the wireless access point if one of the one or more first token information matches the second token information.
The user equipment comprises a third first module and a third second module.
Specifically, the apparatus includes a third module for sending a connection request about a wireless access point provided by a wireless routing device to the wireless routing device, wherein the connection request includes second token information;
and a third module, configured to receive connection result information returned by the wireless routing device based on the connection request.
Here, for the above example corresponding to each device in fig. 12, please refer to the following example corresponding to the method in fig. 7, which is not described herein again.
Referring to the method shown in fig. 7, in this embodiment, the method includes a method for managing, at a wireless routing device side, the usage right of the wireless access point provided by the routing device, and a method for managing, at a user device side, the usage right of the wireless access point provided by the routing device. Wherein,
the method for managing the use authority of the wireless access point provided by the routing equipment at the wireless routing equipment end comprises the steps of S11, S12, S13 and S15;
specifically, in step S11, one or more first token information is generated, where each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
issuing the one or more first token information in step S12;
in step S13, receiving a connection request sent by a user equipment and related to a wireless access point provided by the wireless routing device, where the connection request includes second token information; in some embodiments, a wireless connection has been established between the user equipment and a wireless access point provided by the wireless routing device, and the user equipment sends an authentication request to the wireless routing device through the wireless connection, where the authentication request includes the second token information, for example, in the embodiments corresponding to fig. 3 and fig. 6; in other embodiments, the user equipment has not established a wireless connection with the wireless access point, at this time, the user equipment may perform an authorization operation by sending a connection request to the wireless access point provided by the wireless routing device, where the connection request includes the second token information.
In step S15, if one of the one or more first token information matches the second token information, the user equipment is authorized to establish a wireless connection with the wireless access point.
The method for managing the use authority of the wireless access point provided by the routing equipment at the user equipment end comprises the steps S31 and S33.
In step S31, sending a connection request about a wireless access point provided by a wireless routing device to the wireless routing device, wherein the connection request includes second token information; in some embodiments, a wireless connection has been established between a user equipment and a wireless access point provided by a wireless routing device, and the user equipment sends an authentication request to the wireless routing device through the wireless connection, where the authentication request includes second token information, for example, in the embodiments corresponding to fig. 3 and fig. 6; in other embodiments, the user equipment has not established a wireless connection with the wireless access point, at this time, the user equipment may perform an authorization operation by sending a connection request to the wireless access point provided by the wireless routing device, where the connection request includes the second token information. In some embodiments, the wireless routing device may set the usage rights for the one or more first token information for gratuitous or gratuitous use based on a setting of a user (e.g., an administrative user of the wireless routing device). For example, the wireless routing device authorizing based on a connection request sent by the user device is based on being free of charge, requiring a fee to be paid, or based on points.
In step S33, connection result information returned by the wireless routing device based on the connection request is received.
For the description of step S11, step S12, step S15 and step S33 in the embodiment corresponding to fig. 7, reference is made to the description of step S101, step S102, step S105 and step S303 in the embodiment corresponding to fig. 3. And will not be described in detail herein.
A detailed embodiment of a method and an apparatus for managing usage rights of a wireless access point provided by a routing device according to the present application is described above with reference to fig. 1 to 12. Wherein,
fig. 4 and fig. 9 correspond to an embodiment in which the wireless routing device, the network device, and the user equipment cooperate with each other to achieve the purpose of managing the usage right of the wireless access point provided by the routing device. In this embodiment, the wireless routing device issues the one or more pieces of first token information generated by the wireless routing device to the network device, and the network device saves the one or more pieces of first token information by establishing or updating a token information base. The token information base comprises a plurality of token information, and the plurality of token information are stored through network equipment so as to realize flexible calling of the plurality of token information. And the user equipment inquires whether the corresponding second token information exists or not by sending a token inquiry request to the network equipment. Further, if the second token information exists in the token information base, the network device sends the second token information to the user device. The user equipment sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information. In this embodiment, the user equipment sends an authentication request to a corresponding wireless routing device based on access point identification information or AMC address information of a wireless access point to which the user equipment is connected, so as to obtain that the wireless routing device passes authentication.
Fig. 5 and fig. 10 correspond to the interaction among the wireless routing device, the network device and the user equipment in another embodiment, so as to achieve the purpose of managing the usage right of the wireless access point provided by the routing device. In this embodiment, the wireless routing device issues the one or more pieces of first token information generated by the wireless routing device to the network device, and the network device saves the one or more pieces of first token information by establishing or updating a token information base. The token information base comprises a plurality of token information, and the plurality of token information are stored through network equipment, so that the plurality of token information can be flexibly called. And the user equipment inquires whether the corresponding second token information exists or not by sending a token inquiry request to the network equipment. Further, if the second token information exists in the token information base, the network device sends the second token information to the user device. The user equipment sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information. In this embodiment, the user equipment sends an authentication request to a corresponding wireless routing device based on access point identification information or AMC address information of a wireless access point to which the user equipment is connected, or current address information of the user equipment. In this embodiment, the network device may query, in the token information base, token information of a wireless access point corresponding to access point identification information or AMC address information through access point identification information or AMC address information of the wireless access point to which the user equipment is connected; second token information in the vicinity of the user equipment can be queried in a token information base by means of the current address information of the user equipment.
Fig. 3 and fig. 8 correspond to an embodiment in which the wireless routing device and the user equipment cooperate with each other to achieve the purpose of managing the usage right of the wireless access point provided by the routing device. In this embodiment, one or more first token information generated by the wireless routing device may be published offline, e.g., a two-dimensional code including the first token information is posted. In some embodiments, the issuing of the first token information may be performed by way of a paid issue. For example, the user may spend a certain fee to obtain the first token information. And the user sends an authentication request to the wireless routing equipment through the obtained first token information, wherein the authentication request comprises second token information. The second token information is used only to distinguish that the token information is sent by the user equipment to the wireless routing device. So as to obtain the authentication pass of the wireless routing device through the token information.
Fig. 6 and fig. 11 correspond to an example of interaction and cooperation between a wireless routing device and a user equipment in another embodiment to achieve the purpose of managing the usage right of a wireless access point provided by the routing device. In this embodiment, a wireless connection has been established between the user device and a wireless access point provided by the wireless routing device. And the wireless routing equipment directly sends the generated one or more pieces of first token information to the user equipment through the wireless connection. The user equipment sends an authentication request to the wireless routing equipment based on the received one or more pieces of first token information. So as to obtain the authentication pass of the wireless routing device through the token information.
Fig. 7 and fig. 12 correspond to the interaction and cooperation between the wireless routing device and the user equipment in another embodiment to achieve the purpose of managing the usage right of the wireless access point provided by the routing device. In this embodiment, the user equipment has not established a wireless connection at present, for example, the user equipment sends a connection request of a wireless access point to a corresponding wireless routing device based on the wireless access point scanned by the user equipment. Wherein the connection request includes second token information. The wireless routing device determines whether any of the one or more first token information generated by the wireless routing device matches the second token information based on the connection request. So as to obtain the authentication pass of the wireless routing device through the token information.
The method and apparatus for managing the usage right of the wireless access point provided by the routing apparatus according to the present application are described above from the perspective of the system method with reference to fig. 4 and 9, fig. 5 and 10, fig. 3 and 8, fig. 6 and 11, fig. 7 and fig. 12, respectively. The method and apparatus for managing the usage right of the wireless access point provided by the routing device according to the present application will be described in terms of the wireless routing device, the network device and the user equipment with reference to fig. 13 to 17. It should be noted that the embodiments corresponding to fig. 13 to 17 described below are all adapted to the embodiments corresponding to fig. 1 to 12 described above.
As shown in fig. 13, a method for managing the usage right of a wireless access point provided by a routing device at a wireless routing device side includes step S101, step S102, step S103, and step S104. In step S101, a wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device; in step S102, the wireless routing device issues the one or more first token information; in step S103, the wireless routing device receives an authentication request sent by the user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information; in step S104, if one of the one or more first token information matches the second token information, the user equipment is authenticated through the authentication request and authorized to use the wireless connection.
Specifically, in step S101, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. The first token information includes a code consisting of one or more bit binary digits. In some embodiments, the first token information is randomly generated, e.g., a random number generated by a password generator or a random number generator; in other embodiments, the first token information is a fixed code set by a user. In some embodiments, a wireless routing device provides one or more wireless access points. When the wireless routing device provides a plurality of wireless access points and generates a plurality of first token information. In some embodiments, the first token information and the wireless access points are in a one-to-one correspondence, for example, one first token information corresponds to an authorization to access one wireless access point; in some embodiments, the first token information and the wireless access points are in a one-to-many relationship, for example, one first token information corresponds to several wireless access points among the wireless access points. Of course, those skilled in the art will appreciate that the above-described authorization relationship between the first token information and the wireless access point is merely an example, and other existing or future authorization relationships may be suitable for the present application, and are included within the scope of the present application and are incorporated by reference herein.
In step S102, the wireless routing device issues the one or more first token information. In some embodiments, the wireless routing device issues the one or more first token information it generates to the network device, e.g., the wireless routing device sends the one or more first token information it generates to the corresponding network device. In other embodiments, the wireless routing device issues the one or more first token information generated by the wireless routing device offline, for example, by posting a two-dimensional code that includes the one or more first token information by the user. Of course, those skilled in the art will appreciate that the above-described operations relating to issuing the first token information are merely examples, and that other operations now or later that may occur, such as may be suitable for use in the present application, are also within the scope of the present application and are incorporated herein by reference.
In step S103, the wireless routing device receives an authentication request sent by the user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information. In some embodiments, the user device requests authentication through and uses the wireless access point provided by the wireless routing device by sending an authentication request to the wireless routing device. And the authentication request comprises second token information. In some embodiments, the second token information is obtained by the user equipment from the network device, for example, the wireless routing device issues the generated token information to the network device, and the user equipment obtains the corresponding token information (second token information) by sending a token query request to the network device; in other embodiments, the second token information is obtained by the user by scanning a code or in other offline manners, for example, the user makes the first token information generated by the wireless routing device into a two-dimensional code, and the other users acquire the first token information by scanning the code and send an authentication request to the wireless routing device, where the authentication request includes the second token information, and the second token information is the first token information obtained by scanning the code by the user, where the token information sent by the user device to the wireless routing device and the token information generated by the wireless routing device are only distinguished.
In step S104, if one of the one or more first token information matches the second token information, the user equipment is authenticated through the authentication request and authorized to use the wireless connection. In some embodiments, when the second token information is included in the one or more first token information generated by the wireless routing device, the wireless routing device verifies that the authentication request passes, and the user device can connect using a wireless access point provided by the wireless routing device.
In some embodiments, to further enable autonomy of wireless routing devices. The step S104 includes detecting whether the authentication request satisfies token configuration information corresponding to one of the one or more first token information if the one of the one or more first token information matches the second token information; and if so, authenticating the authentication request and authorizing the user equipment to use the wireless connection. In some embodiments, the first token information corresponds with token configuration information, e.g., the wireless routing device sets the corresponding token configuration information for each first token information when generating the one or more first token information. In some embodiments, the token configuration information is used to detect whether an authentication request sent by the user equipment meets a condition that authentication passes. For example, the token configuration information includes allowed connection period information corresponding to the first token information, for example, a wireless access point authorized to access by the first token information is allowed to connect only in a period of "9-11; for another example, the token configuration information includes remaining available connection duration information corresponding to the first token information, for example, the total duration of the allowed connection of the wireless access point authorized to be accessed by the first token information is 12 hours, the wireless routing device determines the remaining connection duration of the wireless access point authorized to be accessed by the first token information by recording the connection duration of the wireless access point authorized to be accessed by the first token information, and when the remaining duration is 0, the authorized access is stopped. In some embodiments, the token configuration information is generated based on settings of an administrative user of the wireless routing device; in other embodiments, the token configuration information is owned by the wireless routing device itself, e.g., set by a vendor setting when the wireless routing device is manufactured. In this embodiment, the authorized access right of the wireless routing device is further increased by configuring token configuration information for one or more pieces of first token information, for example, the token configuration information corresponding to the first token information is also required to satisfy a certain condition in addition to requiring that second token information in an authentication request sent by the user device is matched with the first token information.
In some embodiments, the step S101 further includes: and obtaining token configuration information corresponding to at least one of the one or more first token information set by the management user of the wireless routing equipment. In some embodiments, the token configuration information is set by an administrative user of the wireless routing device. For example, the administrative user sets the connection allowed period information corresponding to the first token information as needed. For example, in a period "22-00-5. The administrative user may upload the token configuration information to the wireless routing device to increase authorized access to the first token information. In this embodiment, the administrative user can set the token configuration information as needed. In some embodiments, the usage strength of the wireless routing device is increased, for example, if the usage frequency of a wireless access point authorized to be accessed by certain first token information is higher in a time period "6. For example, the administrative user sets the allowed connection period corresponding to the first token information to "22.
In some embodiments, the step S101 includes a step S1011 (not shown) and a step S1012 (not shown). In step S1011, the wireless routing device obtains sharing request information, which is submitted by a management user of the wireless routing device and is about a wireless access point provided by the wireless routing device; in step S1012, the wireless routing device generates one or more first token information according to the sharing request information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. In some embodiments, the sharing request information is sent to the wireless routing device as a first token information generation instruction, and the wireless routing device generates one or more pieces of first token information after receiving the sharing request information uploaded by a management user; in some embodiments, the sharing request information includes sharing configuration information set by the management user and related to the wireless access point provided by the wireless routing device, for example, the management user sets sharing configuration information corresponding to the first token information when uploading the sharing request information, and the wireless routing device generates corresponding token configuration information according to the sharing configuration information. In this embodiment, the wireless routing device generates corresponding first token information by obtaining sharing request information (the sharing request information includes sharing configuration information) uploaded by a management user. Authorized access authority management of the wireless routing device is achieved. When a management user wants to share the wireless access point provided by the wireless routing device, the management user uploads the sharing request information to the wireless routing device to generate corresponding first token information, and when other users obtain the first token information, the management user can connect and use the wireless access point provided by the wireless routing device.
In some embodiments, the sharing request information includes sharing configuration information set by the management user and about a wireless access point provided by the wireless routing device; wherein the step S1012 includes: generating one or more first token information and token configuration information corresponding to each first token information according to the sharing request information, wherein each first token information and the token configuration information corresponding to the first token information are used for authorizing access to a wireless access point provided by the wireless routing device, and the token configuration information corresponding to each first token information is determined based on the sharing configuration information; wherein the step 104 comprises: if one of the one or more first token information is matched with the second token information, detecting whether the authentication request meets token configuration information corresponding to the one first token information; and if so, authenticating the authentication request and authorizing the user equipment to use the wireless connection. In some embodiments, the sharing request information includes sharing configuration information, and the sharing configuration information is set by an administrative user. It should be noted that the administrative user includes an owner or user of the wireless routing device, or other users, and no limitation is imposed on the administrative user. In some embodiments, the sharing request information is set for payment by the administrative user. For example, the user needs to pay to obtain the share.
For example, the management user a wants to share the wireless access point provided by the wireless routing device a owned by the management user a. The management user A uploads sharing request information to the wireless routing device a to realize sharing use of the wireless access point provided by the wireless routing device a. When the management user A uploads the sharing request information, the use permission of the wireless access point provided by the wireless routing equipment can be set in a mode of setting sharing configuration information. For example, the duration that the management user a allows other users to connect to the wireless access point (for example, wifi 1) provided by the wireless routing device a is 12 hours, and the wifi1 corresponds to the first token information i. The management user a may set the available connection duration of the first token information i to 12 hours when setting the sharing configuration information. The wireless routing device a determines the remaining available connection duration information by recording and calculating the connected duration of the wifi1, and further stops the authorized access of the first token information i to the wifi1 when the remaining available connection duration information is 0.
In some embodiments, the token configuration information comprises at least any one of: the connection allowing period information corresponding to the first token information; the remaining available connection duration information corresponding to the first token information; the device type information which is allowed to be accessed and corresponds to the first token information; and the first token information corresponds to the identification information of the wireless access point allowing access.
For example, the one of the first token information corresponds to the allowed connection period information. The connection permission period information includes division of an arbitrary period, for example, a period "9-11. When one or more pieces of first token information generated by the wireless routing equipment is matched with the received second token information, the wireless routing equipment further detects whether the token configuration information of the corresponding first token information meets the condition. For example, whether the time when the user equipment connects to the wireless access point authorized to be accessed by the first token information is within the allowed connection period information, if yes, the authentication is passed, and if not, the authentication is different.
For another example, the remaining available connection duration information corresponding to the one first token information. And the wireless routing equipment determines the remaining available connection time length information by recording and calculating the connected time length information of the wireless access point corresponding to the first token information. For example, when there is a match between one or more pieces of first token information generated by the wireless routing device and the received second token information, the wireless routing device further detects whether the token configuration information of the corresponding first token information satisfies a condition. For example, whether the remaining available connection duration for the user equipment to connect to the wireless access point authorized to be accessed by the first token information is greater than 0 is determined, if yes, the authentication is passed, and if not, the authentication is different.
For another example, the first token information corresponds to device type information allowed to be accessed. For example, to prevent possible virus spread or bandwidth occupation. The management user only allows the ios user equipment or the Android user equipment to connect with the wireless access point provided by the wireless routing equipment, and the management user can enable the wireless routing equipment to generate corresponding token configuration information in a mode of setting the equipment type information allowed to be accessed in the shared configuration information.
For another example, the first token information corresponds to the allowed access wireless access point identification information. For example, in some embodiments, the wireless routing device provides one or more wireless access points to which the first token information generated by the wireless routing device may authorize access. The management user can set the wireless access point which the management user wants to share according to the requirement. For example, the first token information authorizes access to a plurality of wireless access points (e.g., wifi1, wifi2, wifi3, etc.). The wireless access point that the management user wishes to share is wifi2. The management user may set the wifi2 as a wireless access point allowing access when setting the sharing configuration information, and the token configuration information generated by the wireless routing device includes the access point identification information of the wifi2. The wireless routing equipment can authorize the user equipment to connect with the wifi2 according to the wifi2 access point identification information in the token configuration information corresponding to the first token information.
Of course, those skilled in the art should understand that the token configuration information described above is merely an example, and other existing or future token configuration information that may be available, such as may be applicable, is included within the scope of the present application and is included by reference.
In some embodiments, the step S102 includes: and the wireless routing equipment issues the one or more pieces of first token information to corresponding network equipment. In some embodiments, the wireless routing device sends the one or more first token information generated by the wireless routing device to a network device, and the network device stores the one or more first token information as an intermediate device, so that the user device searches corresponding token information from the network device. In some embodiments, the token information can be queried for value through storage of the network device, for example, a user needs to pay a certain fee or other price-balancing manner to query the corresponding token information from the network device.
In some embodiments, the step S102 includes: if the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, sending the one or more first token information to the user equipment through the wireless connection; wherein the step S103 includes: receiving an authentication request sent by the user equipment, wherein the authentication request comprises second token information, and the second token information is selected from the one or more first token information.
Specifically, in step S102, if the user equipment and the wireless access point provided by the wireless routing device have established a wireless connection, the one or more first token information are sent to the user equipment through the wireless connection. In some embodiments, the user obtains the first token information by scanning a two-dimensional code including the first token information, for example, the embodiment corresponding to fig. 5 described above; in other embodiments, the user device and the wireless access point provided by the wireless routing device have established a wireless connection, and the wireless routing device sends the one or more first token information generated by the wireless routing device to the user device via the wireless connection, so that the user device uses the first token information to authenticate the usage right of the wireless access point provided by the wireless routing device.
In step S103, an authentication request sent by the user equipment is received, where the authentication request includes second token information, where the second token information is selected from the one or more first token information. In some embodiments, the wireless routing device receives an authentication request sent by the user device, wherein the second token information in the authentication request is determined by the user or the user device selected from one or more first token information.
In some embodiments, the method further comprises: and when the actual use state information of the user equipment using the wireless connection exceeds the use threshold information of the first token information, disconnecting the wireless connection. In some embodiments, the actual usage state information includes, but is not limited to, cumulative usage duration information, single usage duration information, and allowed usage period information of the wireless access point provided by the user equipment connecting to the wireless routing device. In some embodiments, the usage threshold information includes, but is not limited to, cumulative maximum usage time information, single maximum usage time information, allowed usage period information.
For example, the usage threshold information includes single maximum usage period information of 1 hour. The wireless routing device generates a plurality of first token information. And the user equipment sends an authentication request to the wireless routing equipment, wherein the authentication request comprises second token information. The wireless routing equipment inquires to obtain the first token information in the plurality of pieces of first token information, wherein the first token information is matched with the second token information. The wireless routing device authorizes the user device to connect to a wireless access point (e.g., wifi 1) authorized for access using the first token information. The user equipment is connected with the wifi1 based on the authentication request. When the service time of the user equipment connected with the wifi1 for a single time exceeds 1 hour, the wireless routing equipment automatically disconnects the wireless connection between the wifi1 and the user equipment.
As shown in fig. 14, a method for managing the usage right of a wireless access point provided by a routing device at a network device side includes step S201, step S202, step S203, and step S204. In step S201, a network device receives one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device; in step S202, the network device establishes or updates a token information base according to a mapping relationship between the wireless routing device and the one or more first token information; in step S203, the network device receives a token query request sent by the user equipment; in step S204, the network device queries from the token information base to obtain second token information corresponding to the token query request; in step S205, the network device sends the second token information to the user equipment.
Specifically, in step S201, the network device receives one or more first token information sent by the wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. In some embodiments, the wireless routing device issues the one or more first token information it generates to a network device that receives the first token information sent by the wireless routing device.
In step S202, the network device establishes or updates a token information base according to the mapping relationship between the wireless routing device and the one or more first token information. In some embodiments, the network device receives first token information sent by the wireless routing device, and according to a mapping relationship between the first token information and the wireless routing device. For example, a mapping relationship exists between the MAC address of the wireless routing device and the first token information generated and transmitted by the wireless routing device. And the network equipment stores the one or more first token information in a token information base according to the mapping relation. In some embodiments, a token information base in the network device stores first token information generated and sent by a plurality of wireless routing devices, wherein a mapping relationship exists between each wireless routing device and each first token information. For example, a mapping relationship exists between identification information (e.g., a MAC address) of the wireless routing device and the first token information, so that the network device queries the corresponding first token information in the token information base according to the wireless routing device.
In step S203, the network device receives a token query request sent by the user device. In some embodiments, a token information base is provided in the network device. In order to obtain the first token information to connect to the wireless access point provided by the corresponding wireless routing device, the user device sends a token query request to the network device to obtain the first token information. In some embodiments, the user device has established a wireless connection over which the user device sends a token query request to the network device. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected, so that the network equipment queries a token information base for corresponding token information.
In step S204, the network device queries from the token information base to obtain second token information corresponding to the token query request. In some embodiments, the token information base stores a plurality of token information, wherein each token information has a mapping relation with its corresponding wireless routing device. And the network equipment queries corresponding second token information from the token information base according to the token query request sent by the user equipment. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected, and the network equipment queries corresponding second token information in a token information base according to the access point identification information or MAC address information of the wireless access point. For example, a plurality of token information are stored in the token information base, a mapping relationship exists between each token information and the wireless routing device, the network device finds the corresponding wireless routing device in the token information base according to the access point identification information or the MAC address information of the wireless access point to which the user device is connected, further finds the token information corresponding to the wireless routing device, and sends the token information to the user device as second token information.
In step S205, the network device sends the second token information to the user equipment. In some embodiments, the network device sends the token information queried according to the token query request sent by the user device to the user device as the second token information, so that the user device sends the authentication request to the corresponding wireless routing device.
In some embodiments, the token query request comprises access point identification information or MAC address information of a wireless access point to which the user device is connected; wherein the step S204 includes: and querying from the token information base to obtain second token information corresponding to the token query request, wherein the second token information is matched with the access point identification information or the MAC address information. In some embodiments, the second token information comprises a code of one or more bit binary digits. The token information base comprises one or more token information, and a mapping relation exists between each token information and the wireless routing equipment. The network device may query whether there is a corresponding wireless routing device in a token information base according to the access point identification information or the MAC address information of the wireless access point to which the user device is connected. If the corresponding wireless routing device exists, the corresponding second token information can be determined according to the mapping relation between the wireless routing device and the token information.
In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment; wherein the step S204 includes: inquiring from the token information base to obtain one or more wireless access points and second token information corresponding to each wireless access point, wherein each wireless access point is matched with the token inquiry request; wherein the step S205 includes: and sending the one or more wireless access points and second token information corresponding to each wireless access point to the user equipment.
Specifically, in step S204, one or more wireless access points and second token information corresponding to each wireless access point are queried and obtained from the token information base, where each wireless access point matches with the token query request. In some embodiments, a token information base is provided in the network device. The token information base comprises one or more token information. And each token information corresponds to a wireless access point. And determining the corresponding wireless routing equipment according to the access point identification information or the MAC address information of the wireless access point. In some embodiments, the token query request sent by the user equipment to the network equipment includes access point identification information or MAC address information of the wireless access point scanned by the user equipment; the network equipment inquires a corresponding wireless access point in a token information base according to the access point identification information or the MAC address information; further, determining corresponding second token information according to the inquired wireless access point; in other embodiments, a user device sends a token query request to a network device, where the token query request includes current address information of the user device, the network device queries a nearby wireless access point based on the current address information (e.g., determined by querying a mapping relationship between access point identification information and location information (e.g., buildings and business circles) of the user device), and obtains access point identification information or MAC address information of the nearby wireless access point, and further determines a corresponding wireless access point in a token information base based on the access point identification information or MAC address information, and determines second token information corresponding to the wireless access point.
In step S205, the one or more wireless access points and the second token information corresponding to each wireless access point are sent to the user equipment. In some embodiments, the network device queries, according to a token query request sent by a user device, a token information base to obtain a wireless access point corresponding to access point identification information or MAC address information included in the token query request, and sends the wireless access point and second token information corresponding to the wireless access point to the user device. So that the user equipment sends an authentication request to the corresponding wireless routing equipment based on the wireless access point and the second token information.
As shown in fig. 15, a method for managing the usage right of a wireless access point provided by a routing device at a user equipment side, wherein the method includes step S301, step S302 and step S303. In step S301, the user equipment establishes a wireless connection between the user equipment and a wireless access point provided by the wireless routing device; in step S302, the user equipment sends an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device; in step S303, the user equipment receives authentication result information returned by the wireless routing device based on the authentication request. Here, please refer to the embodiment corresponding to fig. 3 for descriptions of step S301, step S302, and step S303 in this embodiment, which will not be described herein.
In some embodiments, the step 302 includes: sending a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point connected with the user equipment; receiving second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information; transmitting an authentication request to the wireless routing device, wherein the authentication request includes the second token information. Here, please refer to the embodiment corresponding to fig. 4 for describing step S302 in this embodiment, which is not described herein again.
In some embodiments, the step S301 includes: sending a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by user equipment, or current address information of the user equipment; receiving second token information which is returned by the network equipment, corresponds to one or more wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request; establishing a wireless connection for the user equipment with one of the one or more wireless access points; wherein the step S302 includes: and sending an authentication request to the wireless routing equipment providing the wireless access point, wherein the authentication request comprises second token information corresponding to the wireless access point. Here, please refer to the embodiment corresponding to fig. 5 for describing step S302 in this embodiment, which is not described herein again.
In some embodiments, the step S302 includes: receiving one or more first token information sent by the wireless routing device using the wireless connection, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device; selecting second token information corresponding to the wireless routing device from the one or more first token information; sending an authentication request to the wireless routing device, wherein the authentication request includes the second token information corresponding to the wireless routing device. Here, please refer to an embodiment corresponding to fig. 6 for an introduction of step 302 in this embodiment, which is not described herein again.
As shown in fig. 16, a method for managing the usage right of a wireless access point provided by a routing device at a wireless routing device end includes step S11, step S12, step S13 and step S14. In step S11, the wireless routing device generates one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device; in step S12, the wireless routing device issues the one or more first token information; in step S13, the wireless routing device receives a connection request sent by a user equipment and related to a wireless access point provided by the wireless routing device, where the connection request includes second token information; in step S14, if one of the one or more first token information matches the second token information, authorizing establishment of a wireless connection between the user equipment and the wireless access point. Here, please refer to the embodiment corresponding to fig. 7 for descriptions of step 11, step 12, step 13, and step 14 in this embodiment, which will not be described herein.
As shown in fig. 17, a method for managing the usage right of a wireless access point provided by a routing device at a user equipment end, wherein the method includes step S31 and step S33. In step S31, the user equipment sends a connection request about a wireless access point provided by the wireless routing device to the wireless routing device, wherein the connection request includes second token information; in step S33, the user equipment receives connection result information returned by the wireless routing device based on the connection request. Here, please refer to the embodiment corresponding to fig. 7 for describing step 31 and step 33 in this embodiment, which is not described herein again.
The method for managing the usage right of the wireless access point provided by the routing device of the present application is introduced from the perspective of the method above, and the device for managing the usage right of the wireless access point provided by the routing device of the present application is further introduced from the perspective of the device next.
As shown in fig. 18, a wireless routing device for managing the usage right of a wireless access point provided by a routing device at a wireless routing device end includes a module, and a module. A module for generating one or more first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device; a second module for issuing the one or more first token information; a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information; and a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if there is one of the one or more first token information matches the second token information.
Specifically, a module is configured to generate one or more first token information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. The first token information includes a code consisting of one or more bit binary digits. In some embodiments, the first token information is randomly generated, e.g., a random number generated by a password generator or a random number generator; in other embodiments, the first token information is a fixed code set by a user. In some embodiments, a wireless routing device provides one or more wireless access points. When the wireless routing device provides a plurality of wireless access points and generates a plurality of first token information. In some embodiments, the first token information and the wireless access points are in a one-to-one correspondence, for example, one first token information corresponds to an authorization to access one wireless access point; in some embodiments, the first token information and the wireless access points are in a one-to-many relationship, for example, one first token information corresponds to several wireless access points among the wireless access points. Of course, those skilled in the art will appreciate that the above-described authorization relationship between the first token information and the wireless access point is merely an example, and other existing or future authorization relationships may be suitable for the present application, and are included within the scope of the present application and are incorporated by reference herein.
A second module for issuing the one or more first token information. In some embodiments, the wireless routing device issues the one or more first token information it generates to the network device, e.g., the wireless routing device sends the one or more first token information it generates to the corresponding network device. In other embodiments, the wireless routing device issues the one or more first token information generated by the wireless routing device offline, for example, by posting a two-dimensional code that includes the one or more first token information by the user. Of course, those skilled in the art should understand that the above-mentioned operation related to issuing the first token information is only an example, and other existing or future operations, such as may be applicable to the present application, are also included in the scope of the present application and are included by reference.
And a third module, configured to receive an authentication request sent by a user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information. In some embodiments, the user device requests authentication by sending an authentication request to the wireless routing device and using a wireless access point provided by the wireless routing device. And the authentication request comprises second token information. In some embodiments, the second token information is obtained by the user equipment from the network device, for example, the wireless routing device issues the generated token information to the network device, and the user equipment obtains the corresponding token information (second token information) by sending a token query request to the network device; in other embodiments, the second token information is obtained by the user through code scanning or other offline manners, for example, the user makes the first token information generated by the wireless routing device into a two-dimensional code, and the other users obtain the first token information through code scanning of the two-dimensional code and send an authentication request to the wireless routing device, where the authentication request includes the second token information, which is the first token information obtained by code scanning of the user, where the token information sent by the user device to the wireless routing device and the token information generated by the wireless routing device are only distinguished.
And a fourth module, configured to authenticate the authentication request and authorize the user equipment to use the wireless connection if one of the one or more first token information matches the second token information. In some embodiments, when the second token information is included in the one or more first token information generated by the wireless routing device, the wireless routing device verifies that the authentication request passes, and the user device can connect to use a wireless access point provided by the wireless routing device.
In some embodiments, the fourth module is configured to, if one of the one or more first token information matches the second token information, detect whether the authentication request satisfies token configuration information corresponding to the one first token information; and if so, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection. In some embodiments, the first token information corresponds with token configuration information, e.g., the wireless routing device sets the corresponding token configuration information for each first token information when generating the one or more first token information. In some embodiments, the token configuration information is used to detect whether an authentication request sent by the user equipment meets a condition that authentication passes. For example, the token configuration information includes allowed connection period information corresponding to the first token information, for example, a wireless access point authorized to access by the first token information is only allowed to connect within a period of "9-11; for another example, the token configuration information includes remaining available connection duration information corresponding to the first token information, for example, the total duration of the allowed connection of the wireless access point authorized to be accessed by the first token information is 12 hours, the wireless routing device determines the remaining connection duration of the wireless access point authorized to be accessed by the first token information by recording the connection duration of the wireless access point authorized to be accessed by the first token information, and when the remaining duration is 0, the authorized access is stopped. In some embodiments, the token configuration information is generated based on settings of an administrative user of the wireless routing device; in other embodiments, the token configuration information is owned by the wireless routing device itself, e.g., established by a vendor setting when the wireless routing device is manufactured. In this embodiment, the authorized access right of the wireless routing device is further increased by configuring token configuration information for one or more pieces of first token information, for example, except that the second token information in the authentication request sent by the user device is required to be matched with the first token information, the token configuration information corresponding to the first token information is also required to satisfy a certain condition.
In some embodiments, the one-to-one module is configured to obtain token configuration information corresponding to at least one first token information of the one or more first token information set by the management user of the wireless routing device. In some embodiments, the token configuration information is set by an administrative user of the wireless routing device. For example, the administrative user sets the connection allowed period information corresponding to the first token information as needed. For example, in a period "22-00-5. The administrative user may upload the token configuration information to the wireless routing device to increase authorized access to the first token information. In this embodiment, the administrative user can set the token configuration information as needed. In some embodiments, the usage strength of the wireless routing device is increased, for example, if a wireless access point authorized to access by a certain first token information is used more frequently in a time period "6. For example, the management user sets the allowed connection period corresponding to the first token information to "22.
In some embodiments, the one-to-one modules include one-to-one module (not shown) and one-to-two module (not shown). The one-to-one module is used for acquiring sharing request information which is submitted by a management user of the wireless routing equipment and is related to the wireless access point provided by the wireless routing equipment; and a one-to-two module, configured to generate one or more pieces of first token information according to the sharing request information, where each piece of first token information is used to authorize access to a wireless access point provided by the wireless routing device. In some embodiments, the sharing request information is sent to the wireless routing device as a first token information generation instruction, and the wireless routing device generates one or more pieces of first token information after receiving the sharing request information uploaded by a management user; in some embodiments, the sharing request information includes sharing configuration information set by the management user and related to the wireless access point provided by the wireless routing device, for example, the management user sets sharing configuration information corresponding to the first token information when uploading the sharing request information, and the wireless routing device generates corresponding token configuration information according to the sharing configuration information. In this embodiment, the wireless routing device generates corresponding first token information by obtaining sharing request information (the sharing request information includes sharing configuration information) uploaded by a management user. Authorized access authority management of the wireless routing device is achieved. When a management user wants to share the wireless access point provided by the wireless routing device, the management user uploads the sharing request information to the wireless routing device to generate corresponding first token information, and when other users obtain the first token information, the management user can connect and use the wireless access point provided by the wireless routing device.
In some embodiments, the sharing request information includes sharing configuration information set by the management user and about a wireless access point provided by the wireless routing device; wherein the step S1012 includes: generating one or more pieces of first token information and token configuration information corresponding to each piece of first token information according to the sharing request information, wherein each piece of first token information and the token configuration information corresponding to the first token information are used for authorizing access to a wireless access point provided by the wireless routing device, and the token configuration information corresponding to each piece of first token information is determined based on the sharing configuration information; wherein the step 104 comprises: if one of the one or more first token information is matched with the second token information, detecting whether the authentication request meets token configuration information corresponding to the one of the one or more first token information; and if so, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection. In some embodiments, the sharing request information includes sharing configuration information, and the sharing configuration information is set by an administrative user. It should be noted that the administrative user includes an owner or user of the wireless routing device, or other users, and no limitation is imposed on the administrative user. In some embodiments, the sharing request information is set for payment by the administrative user. For example, the user needs to pay to obtain the share.
For example, the management user a wants to share the wireless access point provided by the wireless routing device a owned by the management user a. The management user A uploads sharing request information to the wireless routing device a to realize sharing use of the wireless access point provided by the wireless routing device a. When the management user A uploads the sharing request information, the use permission of the wireless access point provided by the wireless routing equipment can be set in a mode of setting sharing configuration information. For example, the duration that the management user a allows other users to connect to the wireless access point (for example, wifi 1) provided by the wireless routing device a is 12 hours, and the wifi1 corresponds to the first token information i. The management user a may set the available connection duration of the first token information i to 12 hours when setting the sharing configuration information. The wireless routing device a determines the remaining available connection duration information by recording and calculating the connected duration of the wifi1, and further stops the authorized access of the first token information i to the wifi1 when the remaining available connection duration information is 0.
In some embodiments, the token configuration information comprises at least any one of: the connection permission period information corresponding to the first token information; the remaining available connection duration information corresponding to the first token information; the device type information which is allowed to be accessed and corresponds to the first token information; and the first token information corresponds to the identification information of the wireless access point allowing access.
For example, the one of the first token information corresponds to the allowed connection period information. The connection allowed period information includes division of an arbitrary period, for example, a period "9-11. When one or more pieces of first token information generated by the wireless routing equipment is matched with the received second token information, the wireless routing equipment further detects whether the token configuration information of the corresponding first token information meets the condition. For example, whether the time when the user equipment connects to the wireless access point authorized to be accessed by the first token information is within the allowed connection period information, if yes, the authentication is passed, and if not, the authentication is different.
For another example, the remaining available connection duration information corresponding to the one first token information. And the wireless routing equipment determines the remaining available connection time length information by recording and calculating the connected time length information of the wireless access point corresponding to the first token information. For example, when there is a match between one or more pieces of first token information generated by the wireless routing device and the received second token information, the wireless routing device further detects whether the token configuration information of the corresponding first token information satisfies a condition. For example, whether the remaining available connection duration of the user equipment connecting to the wireless access point authorized to be accessed by the first token information is greater than 0 is judged, if yes, the authentication is passed, and if not, the authentication is different.
For another example, the first token information corresponds to device type information allowed to be accessed. For example, to prevent possible virus transmission or bandwidth occupation. The management user only allows the ios user equipment or the Android user equipment to connect with the wireless access point provided by the wireless routing equipment, and the management user can enable the wireless routing equipment to generate corresponding token configuration information in a mode of setting the equipment type information allowed to be accessed in the shared configuration information.
For another example, the first token information corresponds to the allowed access wireless access point identification information. For example, in some embodiments, the wireless routing device provides one or more wireless access points to which the first token information generated by the wireless routing device may authorize access. The management user can set the wireless access point which the management user wants to share according to the requirement. For example, the first token information authorizes access to a plurality of wireless access points (e.g., wifi1, wifi2, wifi3, etc.). The wireless access point that the management user wishes to share is wifi2. The management user may set the wifi2 as a wireless access point allowing access when setting the sharing configuration information, and the token configuration information generated by the wireless routing device includes the access point identification information of the wifi2. The wireless routing equipment can authorize the user equipment to connect with the wifi2 according to the wifi2 access point identification information in the token configuration information corresponding to the first token information.
Of course, those skilled in the art will appreciate that the above described token configuration information is merely exemplary, and that other existing or future token configuration information, as may be suitable for use in the present application, is also within the scope of the present application and is hereby incorporated by reference.
In some embodiments, the second module is configured to issue the one or more first token information to corresponding network devices. In some embodiments, the wireless routing device sends the one or more first token information generated by the wireless routing device to a network device, and the network device stores the one or more first token information as an intermediate device so that the user device can search the corresponding token information from the network device. In some embodiments, the token information can be queried for value through storage of the network device, for example, a user needs to pay a certain fee or other price-balancing manner to query the corresponding token information from the network device.
In some embodiments, the second module is configured to send the one or more first token information to the user equipment through a wireless connection if the user equipment and a wireless access point provided by the wireless routing device have established the wireless connection; the third module is configured to receive an authentication request sent by the user equipment, where the authentication request includes second token information, and the second token information is selected from the one or more first token information.
Specifically, the second module is configured to send the one or more first token information to the user equipment through a wireless connection if the user equipment and a wireless access point provided by the wireless routing device have established the wireless connection. In some embodiments, the user obtains the first token information by scanning a two-dimensional code including the first token information, for example, the embodiment corresponding to fig. 5 described above; in other embodiments, the user device and the wireless access point provided by the wireless routing device have established a wireless connection, and the wireless routing device sends the one or more first token information generated by the wireless routing device to the user device via the wireless connection, so that the user device uses the first token information to authenticate the usage right of the wireless access point provided by the wireless routing device.
A third module, configured to receive an authentication request sent by the user equipment, where the authentication request includes second token information, and the second token information is selected from the one or more first token information. In some embodiments, the wireless routing device receives an authentication request sent by the user device, wherein the second token information in the authentication request is determined by the user or the user device selected from one or more first token information.
In some embodiments, the apparatus further includes a fifth module (not shown) for disconnecting the wireless connection when the actual usage state information of the user equipment using the wireless connection exceeds the usage threshold information of the first token information. In some embodiments, the actual usage state information includes, but is not limited to, cumulative usage duration information, single usage duration information, and allowed usage period information of the wireless access point provided by the user equipment connecting to the wireless routing device. In some embodiments, the usage threshold information includes, but is not limited to, cumulative maximum usage duration information, single maximum usage duration information, allowed usage period information.
For example, the usage threshold information includes single maximum usage period information of 1 hour. The wireless routing device generates a plurality of first token information. And the user equipment sends an authentication request to the wireless routing equipment, wherein the authentication request comprises second token information. The wireless routing equipment inquires to obtain the first token information in the plurality of pieces of first token information, wherein the first token information is matched with the second token information. The wireless routing device authorizes the user device to connect to a wireless access point (e.g., wifi 1) authorized for access using the first token information. The user equipment is connected with the wifi1 based on the authentication request. When the service life of the user equipment connected with the wifi1 for a single time exceeds 1 hour, the wireless routing equipment automatically disconnects the wireless connection between the wifi1 and the user equipment.
As shown in fig. 19, a network device for managing the usage right of a wireless access point provided by a routing device, wherein the method includes two modules to one module, two modules to two modules, two modules to three modules, two modules to four modules, and two modules to five modules. A module, configured to receive one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device; a second module, configured to establish or update a token information base according to a mapping relationship between the wireless routing device and the one or more first token information; a second module and a third module, which are used for receiving a token query request sent by user equipment; a second module and a fourth module, which are used for inquiring and obtaining second token information corresponding to the token inquiry request from the token information base; and a twenty-five module, configured to send the second token information to the user equipment.
Specifically, the first module is configured to receive one or more first token information sent by a wireless routing device, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device. In some embodiments, the wireless routing device issues the one or more first token information it generates to a network device, which receives the first token information sent by the wireless routing device.
And the second module is used for establishing or updating a token information base according to the mapping relation between the wireless routing equipment and the one or more first token information. In some embodiments, the network device receives first token information sent by the wireless routing device, and according to a mapping relationship between the first token information and the wireless routing device. For example, a mapping relationship exists between the MAC address of the wireless routing device and the first token information generated and transmitted by the wireless routing device. And the network equipment stores the one or more first token information in a token information base according to the mapping relation. In some embodiments, a token information base in the network device stores first token information generated and sent by a plurality of wireless routing devices, wherein a mapping relationship exists between each wireless routing device and each first token information. For example, a mapping relationship exists between identification information (e.g., a MAC address) of the wireless routing device and the first token information, so that the network device queries the token information base for the corresponding first token information according to the wireless routing device.
And the second module and the third module are used for receiving a token query request sent by user equipment. In some embodiments, a token information base is provided in the network device. In order to obtain the first token information to connect with the wireless access point provided by the corresponding wireless routing device, the user device sends a token query request to the network device to obtain the first token information. In some embodiments, the user device has established a wireless connection over which the user device sends a token query request to the network device. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected, so that the network equipment queries a token information base for corresponding token information.
And the second and fourth modules are used for inquiring from the token information base to obtain second token information corresponding to the token inquiry request. In some embodiments, the token information base stores a plurality of token information, wherein each token information has a mapping relation with its corresponding wireless routing device. And the network equipment queries corresponding second token information from the token information base according to the token query request sent by the user equipment. In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected, and the network equipment queries corresponding second token information in a token information base according to the access point identification information or MAC address information of the wireless access point. For example, a plurality of token information are stored in the token information base, a mapping relationship exists between each token information and the wireless routing device, the network device finds the corresponding wireless routing device in the token information base according to the access point identification information or the MAC address information of the wireless access point to which the user device is connected, further finds the token information corresponding to the wireless routing device, and sends the token information to the user device as second token information.
And a twenty-five module, configured to send the second token information to the user equipment. In some embodiments, the network device sends the token information queried according to the token query request sent by the user device to the user device as the second token information, so that the user device sends the authentication request to the corresponding wireless routing device.
In some embodiments, the token query request comprises access point identification information or MAC address information of a wireless access point to which the user equipment is connected; and the second and fourth modules are used for querying the token information base to obtain second token information corresponding to the token query request, wherein the second token information is matched with the access point identification information or the MAC address information. In some embodiments, the second token information comprises a code of one or more bit binary digits. The token information base comprises one or more token information, and a mapping relation exists between each token information and the wireless routing equipment. The network device may query whether there is a corresponding wireless routing device in a token information base according to the access point identification information or the MAC address information of the wireless access point to which the user device is connected. If the corresponding wireless routing device exists, the corresponding second token information can be determined according to the mapping relation between the wireless routing device and the token information.
In some embodiments, the token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment; the second module and the fourth module are used for inquiring and obtaining one or more wireless access points and second token information corresponding to each wireless access point from the token information base, wherein each wireless access point is matched with the token inquiry request; and the second-fifth module is used for sending the one or more wireless access points and second token information corresponding to each wireless access point to the user equipment.
Specifically, the second module and the fourth module are configured to obtain one or more wireless access points and second token information corresponding to each wireless access point from the token information base through query, where each wireless access point matches the token query request. In some embodiments, a token information base is provided in the network device. The token information base comprises one or more pieces of token information. And each token information corresponds to a wireless access point. And determining the corresponding wireless routing equipment according to the access point identification information or the MAC address information of the wireless access point. In some embodiments, the token query request sent by the user equipment to the network equipment includes access point identification information or MAC address information of the wireless access point scanned by the user equipment; the network equipment inquires a corresponding wireless access point in a token information base according to the access point identification information or the MAC address information; further, determining corresponding second token information according to the inquired wireless access point; in other embodiments, a user device sends a token query request to a network device, where the token query request includes current address information of the user device, the network device queries a nearby wireless access point based on the current address information (e.g., determined by querying a mapping relationship between access point identification information and location information (e.g., buildings and business circles) of the user device), and obtains access point identification information or MAC address information of the nearby wireless access point, and further determines a corresponding wireless access point in a token information base based on the access point identification information or MAC address information, and determines second token information corresponding to the wireless access point.
And a twenty-five module, configured to send the one or more wireless access points and the second token information corresponding to each wireless access point to the user equipment. In some embodiments, the network device queries, according to a token query request sent by the user device, a token information base to obtain a wireless access point corresponding to access point identification information or MAC address information included in the token query request, and sends the wireless access point and second token information corresponding to the wireless access point to the user device. So that the user equipment sends an authentication request to the corresponding wireless routing equipment based on the wireless access point and the second token information.
As shown in fig. 20, a user equipment for managing the usage right of a wireless access point provided by a routing device includes three modules, one module, two modules, and three modules. The third module is used for establishing wireless connection between the user equipment and a wireless access point provided by the wireless routing equipment; a third module and a second module, configured to send an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device; and the third module is used for receiving authentication result information returned by the wireless routing equipment based on the authentication request. For the description of the first three module, the second three module, and the third three module in this embodiment, please refer to fig. 6 and the corresponding embodiment of fig. 11, which are not repeated herein.
In some embodiments, the third module and the second module are configured to send a token query request to a corresponding network device, where the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected; receiving second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information; transmitting an authentication request to the wireless routing device, wherein the authentication request includes the second token information. Please refer to fig. 4 and the embodiment corresponding to fig. 9 for the description of the third module and the second module in this embodiment, which are not repeated herein.
In some embodiments, the apparatus includes a third module, configured to send a token query request to a corresponding network device, where the token query request includes access point identification information or MAC address information of a wireless access point scanned by a user device, or current address information of the user device; receiving second token information which is returned by the network equipment, corresponds to one or more wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request; establishing a wireless connection for the user equipment with one of the one or more wireless access points; the third module and the second module are configured to send an authentication request to the wireless routing device providing the one wireless access point, where the authentication request includes second token information corresponding to the one wireless access point. For the description of the first three modules and the second three modules in this embodiment, please refer to fig. 5 and the corresponding embodiment of fig. 10, which are not described herein again.
In some embodiments, the third module is configured to receive one or more first token information sent by the wireless routing device using the wireless connection, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device; selecting second token information corresponding to the wireless routing device from the one or more first token information; sending an authentication request to the wireless routing device, wherein the authentication request includes the second token information corresponding to the wireless routing device. Please refer to fig. 6 and fig. 11 for an embodiment of describing three or two modules in this embodiment, which is not described herein again.
As shown in fig. 21, a wireless routing device for managing usage rights of wireless access points provided by the routing device, wherein the method includes a first module, a first second module, a first third module, and a first fourth module. A first module configured to generate one or more first token information, wherein each first token information is used to authorize access to a wireless access point provided by the wireless routing device; a first and second module for issuing the one or more first token information; a first third module, configured to receive a connection request sent by a user equipment and related to a wireless access point provided by the wireless routing device, where the connection request includes second token information; a fourth module, configured to authorize establishment of a wireless connection between the user equipment and the wireless access point if one of the one or more first token information matches the second token information. Here, please refer to fig. 7 and fig. 12 for descriptions of the first module, the first second module, the first third module, and the first fourth module in this embodiment, which are not repeated herein.
As shown in fig. 22, a user equipment for managing the usage right of a wireless access point provided by a routing device, wherein the user equipment comprises a third first module and a third second module. A third module, configured to send a connection request to a wireless routing device about a wireless access point provided by the wireless routing device, where the connection request includes second token information; and a third module, configured to receive connection result information returned by the wireless routing device based on the connection request. Please refer to fig. 7 and fig. 12 for descriptions of the third module and the third module in this embodiment, which are not repeated herein.
The present application also provides a computer readable storage medium having stored thereon computer code which, when executed, performs a method as in any one of the preceding.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
FIG. 23 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 23, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR 4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more hard disk drive(s) (HDD (s)), one or more Compact Disc (CD) drive(s), and/or one or more Digital Versatile Disc (DVD) drive (s)).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, as an Application Specific Integrated Circuit (ASIC), a general purpose computer or any other similar hardware device. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. As such, the software programs (including associated data structures) of the present application can be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the forms of computer program instructions that reside on a computer-readable medium include, but are not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital, or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, feRAM); and magnetic and optical storage devices (hard disk, magnetic tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not to denote any particular order.

Claims (25)

1. A method for managing the use authority of a wireless access point provided by a routing device at the end of the wireless routing device is provided, wherein the method comprises the following steps:
generating a plurality of first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device, and the first token information is randomly generated or is a fixed code set by a user;
issuing the plurality of first token information;
receiving an authentication request sent by user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, wherein the authentication request comprises second token information, and the second token information is obtained by the user equipment from network equipment inquiry or is selected from the plurality of first token information obtained from the wireless routing equipment after establishing the wireless connection;
and if one of the plurality of first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection.
2. The method of claim 1, wherein the authenticating passes the authentication request and authorizes the user equipment to use the wireless connection if one of the plurality of first token information matches the second token information, comprising:
if one of the plurality of first token information is matched with the second token information, detecting whether the authentication request meets token configuration information corresponding to the one of the first token information;
and if so, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection.
3. The method of claim 2, wherein the generating a plurality of first token information, each of the first token information for authorizing access to a wireless access point provided by the wireless routing device, further comprises:
and obtaining token configuration information corresponding to at least one piece of first token information in the plurality of pieces of first token information set by the management user of the wireless routing equipment.
4. The method of claim 1, wherein the generating a plurality of first token information, each first token information for authorizing access to a wireless access point provided by the wireless routing device, comprises:
acquiring sharing request information which is submitted by a management user of wireless routing equipment and is about a wireless access point provided by the wireless routing equipment;
and generating a plurality of pieces of first token information according to the sharing request information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device.
5. The method of claim 4, wherein the sharing request information includes sharing configuration information set by the management user about a wireless access point provided by the wireless routing device;
wherein, the generating a plurality of first token information according to the sharing request information, where each first token information is used to authorize access to a wireless access point provided by the wireless routing device, includes:
generating a plurality of first token information and token configuration information corresponding to each first token information according to the sharing request information, wherein each first token information and the token configuration information corresponding to the first token information are used for authorizing access to a wireless access point provided by the wireless routing device, and the token configuration information corresponding to each first token information is determined based on the sharing configuration information;
if one of the plurality of first token information is matched with the second token information, detecting whether the authentication request meets token configuration information corresponding to the one of the plurality of first token information; if yes, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection, and the method comprises the following steps:
if one of the plurality of pieces of first token information is matched with the second token information, detecting whether the authentication request meets token configuration information corresponding to the one piece of first token information; and if so, authenticating the authentication request and authorizing the user equipment to use the wireless connection.
6. The method of claim 2, 3 or 5, wherein the token configuration information comprises at least any one of:
the connection permission period information corresponding to the first token information;
the remaining available connection duration information corresponding to the first token information;
the device type information which is allowed to be accessed and corresponds to the first token information;
and the first token information corresponds to the identification information of the wireless access point allowing access.
7. The method of claim 1, wherein said issuing the plurality of first token information comprises:
and issuing the plurality of pieces of first token information to corresponding network equipment.
8. The method of claim 1, wherein said issuing the plurality of first token information comprises:
if the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, sending the plurality of pieces of first token information to the user equipment through the wireless connection;
wherein the receiving an authentication request sent by the user equipment after establishing a wireless connection with a wireless access point provided by the wireless routing device, where the authentication request includes second token information, includes:
receiving an authentication request sent by the user equipment, wherein the authentication request comprises second token information, and the second token information is selected from the plurality of first token information.
9. The method of claim 1, wherein the method further comprises:
and when the actual use state information of the user equipment using the wireless connection exceeds the use threshold information of the first token information, disconnecting the wireless connection.
10. A method for managing the use authority of a wireless access point provided by a routing device at a network device side is disclosed, wherein the method comprises the following steps:
receiving a plurality of first token information sent by a wireless routing device, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device, and the first token information is a fixed code randomly generated or set by a user;
establishing or updating a token information base according to the mapping relation between the wireless routing equipment and the plurality of first token information;
receiving a token query request sent by user equipment;
inquiring from the token information base to obtain second token information corresponding to the token inquiry request;
and sending the second token information to the user equipment, wherein the user equipment sends an authentication request to the wireless routing equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, the authentication request comprises the second token information, and if one of the plurality of first token information is matched with the second token information, the wireless routing equipment passes the authentication request and authorizes the user equipment to use the wireless connection.
11. The method of claim 10, wherein the token query request includes access point identification information or MAC address information of a wireless access point to which the user equipment is connected;
wherein, the obtaining of the second token information corresponding to the token query request from the token information base includes:
and inquiring from the token information base to obtain second token information corresponding to the token inquiry request, wherein the second token information is matched with the access point identification information or the MAC address information.
12. The method of claim 10, wherein the token query request includes access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment;
wherein, the obtaining of the second token information corresponding to the token query request from the token information base includes:
inquiring and acquiring a plurality of wireless access points and second token information corresponding to each wireless access point from the token information base, wherein each wireless access point is matched with the token inquiry request;
wherein the sending the second token information to the user equipment comprises:
and sending the plurality of wireless access points and second token information corresponding to each wireless access point to the user equipment.
13. A method for managing the use authority of a wireless access point provided by a routing device at a user equipment end, wherein the method comprises the following steps:
establishing wireless connection between user equipment and a wireless access point provided by wireless routing equipment;
sending an authentication request to the wireless routing device, wherein the authentication request includes second token information corresponding to the wireless routing device, and the second token information is obtained by the user equipment through inquiry of network equipment or is selected from a plurality of pieces of first token information obtained from the wireless routing device after the wireless connection is established;
and receiving authentication result information returned by the wireless routing equipment based on the authentication request, wherein if one of the plurality of first token information is matched with the second token information, the wireless routing equipment authenticates that the user equipment passes the authentication request and authorizes the user equipment to use the wireless connection, and the first token information is a fixed code randomly generated or set by a user.
14. The method of claim 13, wherein the sending an authentication request to the wireless routing device, wherein the authentication request includes second token information corresponding to the wireless routing device, comprises:
sending a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point connected with the user equipment;
receiving second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information;
transmitting an authentication request to the wireless routing device, wherein the authentication request includes the second token information.
15. The method of claim 13, wherein the establishing a wireless connection between the user equipment and a wireless access point provided by the wireless routing device comprises:
sending a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by user equipment, or current address information of the user equipment;
receiving second token information which is returned by the network equipment, corresponds to the plurality of wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request;
establishing a wireless connection between the user equipment and one of the plurality of wireless access points;
sending an authentication request to the wireless routing device, where the authentication request includes second token information corresponding to the wireless routing device, and the method includes:
and sending an authentication request to the wireless routing equipment providing the wireless access point, wherein the authentication request comprises second token information corresponding to the wireless access point.
16. The method of claim 13, wherein the sending an authentication request to the wireless routing device, wherein the authentication request includes second token information corresponding to the wireless routing device, comprises:
receiving a plurality of first token information sent by the wireless routing device by using the wireless connection, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device;
selecting second token information corresponding to the wireless routing device from the plurality of first token information;
sending an authentication request to the wireless routing device, wherein the authentication request includes the second token information corresponding to the wireless routing device.
17. A method for managing, at a wireless routing device side, wireless connections of wireless access points provided by a routing device, wherein the method comprises:
generating a plurality of first token information, wherein each first token information is used for authorizing access to a wireless access point provided by the wireless routing device, and the first token information is randomly generated or is a fixed code set by a user;
issuing the plurality of first token information;
receiving a connection request sent by a user device and about a wireless access point provided by the wireless routing device, wherein the connection request comprises second token information, and the second token information is obtained by the user device from a network device query;
and if one of the plurality of pieces of first token information is matched with the second token information, authorizing the establishment of the wireless connection between the user equipment and the wireless access point.
18. A method for managing, at a user equipment side, a wireless connection of a wireless access point provided by a routing device, wherein the method comprises:
sending a connection request about a wireless access point provided by a wireless routing device to the wireless routing device, wherein the connection request comprises second token information, and the second token information is obtained by the user device from a network device query;
and receiving connection result information returned by the wireless routing equipment based on the connection request, wherein if one of the plurality of first token information is matched with the second token information, the wireless routing equipment authorizes the establishment of the wireless connection between the user equipment and the wireless access point, and the first token information is a fixed code randomly generated or set by a user.
19. A method of managing usage rights of a wireless access point provided by a routing device, wherein the method comprises:
the method comprises the steps that a wireless routing device generates a plurality of pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, the first token information is generated randomly or is a fixed code set by a user, and the plurality of pieces of first token information are issued;
the method comprises the steps that user equipment establishes wireless connection between the user equipment and a wireless access point provided by wireless routing equipment, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises second token information corresponding to the wireless routing equipment, and the second token information is obtained by inquiring from network equipment by the user equipment or is selected from a plurality of first token information obtained from the wireless routing equipment after the wireless connection is established;
the wireless routing equipment receives an authentication request sent by the user equipment after establishing wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
20. A method of managing usage rights of a wireless access point provided by a routing device, wherein the method comprises:
the method comprises the steps that a wireless routing device generates a plurality of pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, the first token information is generated randomly or is a fixed code set by a user, and the plurality of pieces of first token information are issued to corresponding network devices;
the network equipment receives a plurality of pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the plurality of pieces of first token information;
user equipment sends a token query request to the network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point connected with the user equipment;
the network equipment receives a token query request sent by the user equipment, queries from the token information base to obtain second token information corresponding to the token query request, wherein the second token information is matched with the access point identification information or the MAC address information, and sends the second token information to the user equipment;
the user equipment receives second token information which is returned by the network equipment and matched with the access point identification information or the MAC address information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information;
the wireless routing equipment receives an authentication request sent by the user equipment after the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, and if one of the plurality of pieces of first token information is matched with the second token information, the user equipment is authenticated to pass the authentication request and is authorized to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
21. A method of managing usage rights of a wireless access point provided by a routing device, wherein the method comprises:
the method comprises the steps that a wireless routing device generates a plurality of pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, the first token information is generated randomly or is a fixed code set by a user, and the plurality of pieces of first token information are issued to corresponding network devices;
the network equipment receives a plurality of pieces of first token information sent by the wireless routing equipment, and establishes or updates a token information base according to the mapping relation between the wireless routing equipment and the plurality of pieces of first token information;
the method comprises the steps that user equipment sends a token query request to corresponding network equipment, wherein the token query request comprises access point identification information or MAC address information of a wireless access point scanned by the user equipment, or current address information of the user equipment;
the network equipment receives a token query request sent by the user equipment, queries and obtains a plurality of wireless access points and second token information corresponding to each wireless access point from the token information base, wherein each wireless access point is matched with the token query request, and sends the plurality of wireless access points and the second token information corresponding to each wireless access point to the user equipment;
the user equipment receives second token information which is returned by the network equipment, corresponds to the plurality of wireless access points and each wireless access point, wherein each wireless access point is matched with the token query request, and wireless connection between the user equipment and one wireless access point in the plurality of wireless access points is established;
the user equipment sends an authentication request to the wireless routing equipment providing the wireless access point, wherein the authentication request comprises second token information corresponding to the wireless access point;
the wireless routing equipment receives an authentication request sent by the user equipment after the user equipment establishes wireless connection with a wireless access point provided by the wireless routing equipment, wherein the authentication request comprises second token information, and if one of the plurality of first token information is matched with the second token information, the authentication passes the authentication request and authorizes the user equipment to use the wireless connection;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
22. A method of managing usage rights of a wireless access point provided by a routing device, wherein the method comprises:
the method comprises the steps that a wireless routing device generates a plurality of pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, the first token information is generated randomly or is a fixed code set by a user, and if the wireless connection between the user device and the wireless access point provided by the wireless routing device is established, the plurality of pieces of first token information are sent to the user device through the wireless connection;
the user equipment receives a plurality of pieces of first token information sent by the wireless routing equipment by using the wireless connection, selects and determines second token information corresponding to the wireless routing equipment from the plurality of pieces of first token information, and sends an authentication request to the wireless routing equipment, wherein the authentication request comprises the second token information corresponding to the wireless routing equipment;
the wireless routing equipment receives an authentication request sent by the user equipment, wherein the authentication request comprises second token information, and the second token information is selected from the plurality of first token information;
and the user equipment receives authentication result information returned by the wireless routing equipment based on the authentication request.
23. A method of managing wireless connectivity of wireless access points provided by a routing device, wherein the method comprises:
the method comprises the steps that a wireless routing device generates a plurality of pieces of first token information, wherein each piece of first token information is used for authorizing access to a wireless access point provided by the wireless routing device, the first token information is generated randomly or is a fixed code set by a user, and the plurality of pieces of first token information are issued;
the user equipment sends a connection request about a wireless access point provided by the wireless routing equipment to the wireless routing equipment, wherein the connection request comprises second token information, and the second token information is obtained by the user equipment from a network equipment query;
the wireless routing equipment receives a connection request which is sent by the user equipment and is about a wireless access point provided by the wireless routing equipment, and if one of the plurality of first token information is matched with the second token information, the wireless routing equipment authorizes the establishment of the wireless connection between the user equipment and the wireless access point;
and the user equipment receives connection result information returned by the wireless routing equipment based on the connection request.
24. An apparatus for managing usage rights of a wireless access point provided by a routing device, wherein the apparatus comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed by the processor, cause the method of any one of claims 1 to 18 to be performed.
25. A computer readable medium storing instructions that, when executed by a processor, cause the method of any of claims 1 to 18 to be performed.
CN201910057760.9A 2018-12-29 2019-01-22 Method and device for managing the use rights of a wireless access point provided by a routing device Active CN109548025B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811640068 2018-12-29
CN2018116400680 2018-12-29

Publications (2)

Publication Number Publication Date
CN109548025A CN109548025A (en) 2019-03-29
CN109548025B true CN109548025B (en) 2022-12-30

Family

ID=65838057

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910057760.9A Active CN109548025B (en) 2018-12-29 2019-01-22 Method and device for managing the use rights of a wireless access point provided by a routing device

Country Status (1)

Country Link
CN (1) CN109548025B (en)

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997733A (en) * 2014-05-30 2014-08-20 李克 WiFi access resource sharing method and system

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9742775B2 (en) * 2014-07-01 2017-08-22 Google Inc. Wireless local area network access
CN107566325A (en) * 2016-07-01 2018-01-09 中兴通讯股份有限公司 Access the method and device of network
CN106604278B (en) * 2016-12-14 2020-10-13 炫彩互动网络科技有限公司 Multi-authority mobile network sharing method
CN109246800B (en) * 2017-06-08 2020-07-10 上海连尚网络科技有限公司 Wireless connection method and device
CN107979841B (en) * 2017-08-02 2020-11-03 上海连尚网络科技有限公司 Method and equipment for inquiring authentication information of wireless access point
CN107396295B (en) * 2017-08-21 2020-08-28 上海掌门科技有限公司 Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN108848505B (en) * 2018-07-10 2021-05-07 上海尚往网络科技有限公司 Wireless connection method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103997733A (en) * 2014-05-30 2014-08-20 李克 WiFi access resource sharing method and system

Also Published As

Publication number Publication date
CN109548025A (en) 2019-03-29

Similar Documents

Publication Publication Date Title
US8171529B2 (en) Secure subscriber identity module service
CN107567021B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
KR101081331B1 (en) Cloud printing system using mobile terminal and method thereof
CN104767715A (en) Network access control method and equipment
CN111742531B (en) Profile information sharing
CN107517461B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN110049040A (en) To the methods, devices and systems of the control authority authorization of smart machine
US11057819B2 (en) Physical web beacon, client and proxy
CN109413759B (en) Method and equipment for wireless connection
WO2020001377A1 (en) Method and device for authorizing user equipment to connect to wireless access point
US20120022968A1 (en) Using a first network to control access to a second network
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN110113747B (en) Method and equipment for connecting hidden wireless access point
CN103548392B (en) For providing the method and apparatus of network access to attachment device
US10038729B1 (en) Cooperative network access
US9455972B1 (en) Provisioning a mobile device with a security application on the fly
CN107396362B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN112689277B (en) Method, device and system for configuring network for equipment
CN107396296A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN109548025B (en) Method and device for managing the use rights of a wireless access point provided by a routing device
CN107396295B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
US11178534B2 (en) Management of a subscriber entity
CN109743237B (en) Authentication method of APP and gateway
US20220182496A1 (en) Blockchain for communication of subscriber data records between public land mobile networks
CN108696918A (en) A kind of method and apparatus for establishing wireless connection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant