CN109756915A - A kind of wireless network management method and system - Google Patents
A kind of wireless network management method and system Download PDFInfo
- Publication number
- CN109756915A CN109756915A CN201711073072.9A CN201711073072A CN109756915A CN 109756915 A CN109756915 A CN 109756915A CN 201711073072 A CN201711073072 A CN 201711073072A CN 109756915 A CN109756915 A CN 109756915A
- Authority
- CN
- China
- Prior art keywords
- visitor
- wireless network
- terminal
- information
- authorization
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
A kind of wireless network management system, comprising: controlling terminal, network management services end and visitor's terminal, wherein network management services end connects controlling terminal and visitor's terminal;The visitor that controlling terminal is suitable for managing wireless network controls information, and sends visitor's control information and give network management services end;Network management services end is suitable for controlling information according to the visitor of wireless network, the authorization message that instruction allows or refuses the access wireless network is sent to visitor's terminal of wireless network, or, it indicates that the visitor's terminal disconnection of wireless for having connected wireless network is connected to the network, or disconnects the wireless network connection for having connected visitor's terminal of wireless network.In this way, realizing the access-in management to visitor's terminal of wireless network.
Description
Technical field
The present invention relates to, but not limited to field of communication technology more particularly to a kind of wireless network management method and system.
Background technique
Currently, the password of wireless network mainly informs other side by the modes such as giving an oral account, writing, such method easily causes close
Code secondary propagation and cause password to reveal.Moreover, password is after once other side is using the password access wireless network known
It can be remembered by the access device that other side uses, the overlay area that the later access device enters the wireless network can connect automatically
The wireless network is connect, and the owner of the wireless network is possible and ignorant, however the owner of wireless network may not wish
The wireless network for hoping oneself privately owned can be permanently used by others.
In view of the above-mentioned problems, the owner of wireless network can only be solved by modifying the password of wireless network, however, this
It will lead to the above problem again to occur repeatedly.
Summary of the invention
It is the general introduction to the theme being described in detail herein below.This general introduction is not the protection model in order to limit claim
It encloses.
The embodiment of the present application provides a kind of wireless network management method and system, can be realized whole to the visitor of wireless network
The access-in management at end.
In a first aspect, the embodiment of the present application provides a kind of wireless network management system, comprising: controlling terminal, network management
Server-side and visitor's terminal;The network management services end connects the controlling terminal and visitor's terminal;Wherein, institute
Visitor's control information that controlling terminal is suitable for managing wireless network is stated, and sends the visitor and controls information to the network management
Server-side;The network management services end is suitable for controlling information according to the visitor of the wireless network, Xiang Suoshu wireless network
Visitor's terminal sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected the wireless network
Visitor's terminal disconnection of wireless of network is connected to the network, or disconnects the wireless network company for the visitor's terminal for having connected the wireless network
It connects.
In the exemplary embodiment, it may include at least one of following that the visitor, which controls information: allow the visit authorized
Visitor information, the visitor information for having connected the wireless network to be broken that objective information, authorization information, refusal authorize.
In the exemplary embodiment, the network management services end may be adapted in the following manner according to the nothing
The visitor of gauze network controls information, and visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse to access the nothing
The authorization message of gauze network:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network,
Information, which is controlled, according to the visitor determines that the authorization of visitor's terminal is when examining authorization, by the insertion authority
Request is sent to the controlling terminal, and the authorization response message fed back according to the controlling terminal, Xiang Suoshu visitor's terminal hair
Instruction is sent to allow or refuse to access the authorization message of the wireless network.
In the exemplary embodiment, the network management services end may include that server-side calculates equipment, the service
End calculates equipment and is stored with the user information of visitor's terminal and the corresponding relationship of facility information;The server-side calculates equipment can be with
Suitable for according to the visitor control information determine exist allow authorize user information when, actively to it is described allow authorize use
Information corresponding visitor's terminal in family, which issues instruction, allows to access the authorization message of the wireless network.
In the exemplary embodiment, the network management services end may include routing device, and the routing device can
It is suitable for when detecting that visitor's terminal enters the overlay area of the wireless network, information is controlled to described according to the visitor
Visitor's terminal issues the authorization message that instruction allows or refuses to access the wireless network.
In the exemplary embodiment, the network management services end may be adapted in the following manner according to the nothing
The visitor of gauze network controls information, and visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse to access the wireless network
The authorization message of network:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network,
When determining that the authorization of visitor's terminal is automatic authorization mode according to visitor control information, inquires the access and award
Whether the visitor information that power request carries is in the visitor information for allowing to authorize that the visitor controls information instruction, according to inquiry
As a result, sending the authorization message that instruction allows or refuses the access wireless network to visitor's terminal.
In the exemplary embodiment, the authorization message that the instruction allows to access the wireless network can carry described
The password of wireless network.
In the exemplary embodiment, visitor's terminal, may be adapted to after being successfully accessed the wireless network, docking
The authorization message received is cached, and after detecting the wireless network again, is believed according to the authorization of the caching
Breath determines whether to be allowed to access the wireless network.
In the exemplary embodiment, the network management services end can be adapted to controlling letter according to the visitor
When breath determines that the authorization permission of visitor's terminal terminates, sent to the visitor's terminal for having connected the wireless network
Indicate that refusal accesses the authorization message of the wireless network;
Visitor's terminal may be adapted in the authorization message for receiving the instruction refusal access wireless network
Afterwards, the instruction for disconnecting the connection in the wireless network, and caching before deleting allows to access the authorization letter of the wireless network
Breath.
Second aspect, the embodiment of the present application provide a kind of wireless network management method, comprising:
The visitor that controlling terminal manages wireless network controls information, and sends visitor's control information and take to network management
Business end.
In the exemplary embodiment, it may include at least one of following that the visitor, which controls information: allow the visit authorized
Visitor information, the visitor information for having connected the wireless network to be broken that objective information, authorization information, refusal authorize.
In the exemplary embodiment, when the authorization that the visitor controls information instruction is examination & approval authorization,
The above method can also include:
The controlling terminal receives the insertion authority request of visitor's terminal of the wireless network;
At least one of the visitor information authorized according to operational order, the visitor information for allowing to authorize and refusal, to
Visitor's terminal returns to authorization response message.
In the exemplary embodiment, the visitor information may include at least one of: user's letter of visitor's terminal
Breath, facility information.
The third aspect, the embodiment of the present application provide a kind of wireless network management method, comprising:
Network management services end controls information from the visitor that controlling terminal obtains wireless network;
Control information according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network send instruction allow or
Refusal accesses the authorization message of the wireless network, or instruction has connected visitor's terminal disconnection of wireless net of the wireless network
Network connection, or disconnect the wireless network connection for having connected visitor's terminal of the wireless network.
In the exemplary embodiment, described that information, Xiang Suoshu wireless network are controlled according to the visitor of the wireless network
Visitor's terminal send that instruction allows or refusal accesses the authorization message of the wireless network, may include:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network,
Information, which is controlled, according to the visitor determines that the authorization of visitor's terminal is when examining authorization, by the insertion authority
Request is sent to controlling terminal, and the authorization response message fed back according to the controlling terminal, and the transmission of Xiang Suoshu visitor's terminal refers to
Show that permission or refusal access the authorization message of the wireless network.
In the exemplary embodiment, the network management services end may include that server-side calculates equipment, the service
End calculates the user information of equipment storage visitor's terminal and the corresponding relationship of facility information;
Described to control information according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network sends instruction and permits
Perhaps or refusal accesses the authorization message of the wireless network, may include:
The server-side, which calculates equipment, to be allowed to authorize controlling information according to the visitor of the wireless network and determine to exist
When user information, actively to it is described allow the corresponding visitor's terminal of user information authorized issue instruction allow to access it is described wireless
The authorization message of network.
In the exemplary embodiment, the network management services end may include routing device;It is described according to the nothing
The visitor of gauze network controls information, and visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse to access the wireless network
The authorization message of network may include:
The routing device is when detecting that visitor's terminal enters the overlay area of the wireless network, according to described wireless
The visitor of network controls information and issues the authorization message that instruction allows or refuses the access wireless network to visitor's terminal.
In the exemplary embodiment, described that information, Xiang Suoshu wireless network are controlled according to the visitor of the wireless network
Visitor's terminal send that instruction allows or refusal accesses the authorization message of the wireless network, may include:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network,
When determining that the authorization of visitor's terminal is automatic authorization mode according to visitor control information, inquires the access and award
Whether the visitor information that power request carries is in the visitor information for allowing to authorize that the visitor controls information instruction, according to inquiry
As a result, sending the authorization message that instruction allows or refuses the access wireless network to visitor's terminal.
In the exemplary embodiment, described that information, Xiang Suoshu wireless network are controlled according to the visitor of the wireless network
Visitor's terminal send that instruction allows or refusal accesses the authorization message of the wireless network, may include:
For the visitor's terminal for having connected the wireless network, the network management services end is controlled according to the visitor
When information determines that the authorization permission of visitor's terminal terminates, sent out to the visitor's terminal for having connected the wireless network
The authorization message for sending instruction refusal to access the wireless network;Alternatively, actively disconnecting the wireless network connection of visitor's terminal.
In the exemplary embodiment, the authorization message that the instruction allows to access the wireless network can carry described
The password of wireless network.
Fourth aspect, the embodiment of the present application provide a kind of wireless network management method, comprising:
The instruction that visitor's terminal receiving network managing server-side issues allows or the authorization of the refusal access wireless network
Information;Alternatively, uploading network authorization request after detecting wireless network to network management services end, receiving the network
The instruction that management server end issues allows or the authorization message of the refusal access wireless network;Alternatively, detecting wireless network
After network, the authorization message of the wireless network is obtained from local cache;
It is connected to the network according to the authorization message of the wireless network.
In the exemplary embodiment, the above method can also include: that visitor's terminal is successfully connected the wireless network
After network, after receiving the instruction refusal that the network management services end is sent and accessing the authorization message of the wireless network,
The connection with the wireless network is disconnected, and the instruction for deleting local cache allows to access the authorization message of the wireless network.
In the exemplary embodiment, the authorization message that the instruction allows to access the wireless network can carry described
The password of wireless network.
5th aspect, the embodiment of the present application provide a kind of terminal, comprising:
Display module is adapted to provide for an interactive interface;It include following one: the visit of wireless network on the interactive interface
Visitor control information set interface, for visitor's terminal insertion authority request processing interface.
6th aspect, the embodiment of the present application provides a kind of terminal, comprising: the first communication unit, first processor and the
One memory;The first processor connects first communication unit and the first memory;Wherein, first storage
Device is stored with wireless network management program, and the wireless network management program is held when reading execution by the first processor
The following operation of row:
The visitor for managing wireless network controls information, and sends the visitor by first communication unit and control information
Give network management services end.
7th aspect, the embodiment of the present application provides a kind of equipment, comprising: the second communication unit, second processor and the
Two memories;The second processor connects second communication unit and the second memory;Wherein, second storage
Device is stored with wireless network management program, and the wireless network management program is held when reading execution by the second processor
The following operation of row:
Information is controlled from the visitor that controlling terminal obtains wireless network by second communication unit;
Information is controlled according to the visitor of the wireless network, the visit by second communication unit to the wireless network
Objective terminal sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected the wireless network
Visitor's terminal disconnection of wireless network connection, or disconnect have connected the wireless network visitor's terminal wireless network connect
It connects.
Eighth aspect, the embodiment of the present application provide a kind of terminal, comprising: third processor and third memory;Wherein,
The third memory is stored with wireless network management program, and the wireless network management program is read by the third processor
When taking execution, following operation is executed:
The instruction that receiving network managing server-side issues allows or the authorization message of the refusal access wireless network;Or
Person uploads network authorization request to network management services end, receives the network management services after detecting wireless network
The instruction issued is held to allow or refuse to access the authorization message of the wireless network;Alternatively, after detecting wireless network, from
Local cache obtains the authorization message of the wireless network;
It is connected to the network according to the authorization message of the wireless network.
9th aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored with wireless network management program, institute
The step of stating the wireless network management method that above-mentioned second aspect is realized when wireless network management program is executed by processor.
Tenth aspect, the embodiment of the present application provide a kind of computer-readable medium, are stored with wireless network management program, institute
The step of stating the wireless network management method that the above-mentioned third aspect is realized when wireless network management program is executed by processor.
Tenth on the one hand, and the embodiment of the present application provides a kind of computer-readable medium, is stored with wireless network management program,
The wireless network management program realizes the step of wireless network management method of above-mentioned fourth aspect when being executed by processor.
In the embodiment of the present application, the visitor that controlling terminal is suitable for managing wireless network controls information, and sends visitor's control
Information processed gives network management services end;Network management services end is suitable for controlling information according to the visitor of wireless network, to wireless network
Visitor's terminal of network sends the authorization message that instruction allows or refuses access wireless network, or instruction has connected wireless network
The network connection of visitor's terminal disconnection of wireless, or disconnect the wireless network connection for having connected visitor's terminal of wireless network.In this way,
Realize the access-in management to visitor's terminal of wireless network.
In the exemplary embodiment, for the unnecessary visitor's terminal for having authorized or having had connected, controlling terminal passes through
The visitor of more new wireless network controls information, terminates the insertion authority of these visitor's terminals with can be convenient, to disconnect these
The wireless network connection of visitor's terminal.
In the exemplary embodiment, for visitor's terminal of unauthorized, can not only be allowed by active application
The authorization message of wireless network is accessed, moreover, controlling terminal can also actively be invited by network management services end or push refers to
Showing allows the authorization message for accessing wireless network to give visitor's terminal, in this way, being improved between host and guest's terminal to a certain extent
Interactive Experience.
In the exemplary embodiment, visitor's terminal receive instruction refusal access wireless network authorization message it
Afterwards, the authorization message that the instruction of local cache can be allowed to access the wireless network is deleted, to effectively prevent wireless network
Password by without limitation shared again a possibility that.
Certainly, implement any product of the application it is not absolutely required to and meanwhile reach all of above advantage.
Detailed description of the invention
Fig. 1 is the schematic diagram of wireless network management system provided by the embodiments of the present application;
Fig. 2 is a kind of interaction flow exemplary diagram of wireless network management system provided by the embodiments of the present application;
Fig. 3 is another interaction flow exemplary diagram of wireless network management system provided by the embodiments of the present application;
Fig. 4 is a kind of flow chart of wireless network management method provided by the embodiments of the present application;
Fig. 5 is a kind of schematic diagram of wireless network management device provided by the embodiments of the present application;
Fig. 6 is a kind of schematic diagram of terminal provided by the embodiments of the present application;
Fig. 7 is the flow chart of another wireless network management method provided by the embodiments of the present application;
Fig. 8 is the schematic diagram of another wireless network management device provided by the embodiments of the present application;
Fig. 9 is a kind of schematic diagram of equipment provided by the embodiments of the present application;
Figure 10 is the flow chart of another wireless network management method provided by the embodiments of the present application;
Figure 11 is the schematic diagram of another wireless network management device provided by the embodiments of the present application;
Figure 12 is the schematic diagram of another terminal provided by the embodiments of the present application.
Specific embodiment
The embodiment of the present application is described in detail below in conjunction with attached drawing, it should be understood that embodiments described below is only
For instruction and explanation of the application, it is not used to limit the application.
It should be noted that each feature in the embodiment of the present application and embodiment can be tied mutually if do not conflicted
It closes, within the scope of protection of this application.In addition, though logical order is shown in flow charts, but in certain situations
Under, it can be with the steps shown or described are performed in an order that is different from the one herein.
In some embodiments, the calculating equipment for executing wireless network management method may include one or more processors
(CPU, Central Processing Unit), input/output interface, network interface and memory (memory).
Memory may include non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.Memory may include module 1, module 2 ... ..., module N (N is the integer greater than 2).
Computer-readable medium includes permanent and non-permanent, removable and non-movable storage medium.Storage medium
It can be accomplished by any method or technique information storage.Information can be the mould of computer readable instructions, data structure, program
Block or other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random-access is deposited
Reservoir (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, disk storage or other magnetic
Property storage equipment or any other non-transmission medium, can be used for storing and can be accessed by a computing device information.According to herein
Define, computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulation data
Signal and carrier wave.
Fig. 1 is the schematic diagram of wireless network management system provided by the embodiments of the present application.As shown in Figure 1, the present embodiment mentions
The wireless network management system of confession, comprising: controlling terminal 101, network management services end 102 and visitor's terminal 103;Wherein,
Network management services end 102 connects controlling terminal 101 and visitor's terminal 103.
Wherein, the visitor that controlling terminal 101 is suitable for managing wireless network controls information, and sends visitor and control information to net
Network management server end 102, network management services end 102 is suitable for controlling information according to the visitor of wireless network, to wireless network
Visitor's terminal 103 sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected wireless network
Visitor's terminal disconnection of wireless network connection, or disconnect have connected wireless network visitor's terminal wireless network connection.
Illustratively, controlling terminal 101 may include such as mobile phone, tablet computer, laptop, palm PC, a
Personal digital assistant (Personal Digital Assistant, PDA), portable media player (Portable Media
Player, PMP), the fixed terminals such as the mobile terminals, and desktop computer such as wearable device.Network management services end
102 may include at least one of: provide the routing device (for example, router) of wireless network, server-side calculates equipment (ratio
Such as, server).Visitor's terminal 103 may include such as mobile phone, tablet computer, laptop, palm PC, individual digital
Assistant (Personal Digital Assistant, PDA), portable media player (Portable Media Player,
PMP), the fixed terminals such as the mobile terminals such as wearable device, and desktop computer.However, the application to this and it is unlimited
It is fixed.
In the exemplary embodiment, controlling terminal 101 can pass through the web displaying by the webpage of access router
Interactive interface, according to a user operation instruction the visitor of wireless network that management user is possessed controls information;Alternatively, can be with
In locally-installed application program (APP, Application), the interactive interface provided by APP, according to a user operation instruction pipe
The visitor for the wireless network that reason user is possessed controls information.However, the application does not limit this.
Illustratively, it may include at least one of that the visitor of wireless network, which controls information: the visitor's letter for allowing to authorize
Visitor information, the visitor information for having connected wireless network to be broken that breath, authorization information, refusal authorize.Wherein, visitor
Information may include at least one of: the user information of visitor's terminal is (for example, User ID (Identifier, mark), user
Social account), facility information is (for example, the MAC (Media Access Control, medium access control) of visitor's terminal
Location).
Illustratively, authorization information may include: the corresponding authorization information of visitor information for allowing to authorize, or
Person, the corresponding authorization information of whole visitor's terminals of wireless network.Wherein, allow the corresponding authorization of visitor information authorized
Mode may include following one: Unsolicited Grant mode, automatic authorization mode, examination & approval authorization;Unsolicited Grant mode refers to visit
Objective terminal controls information according to visitor by network management services end and determines whether that visitor's terminal is authorized to connect without carrying out authorized application
Enter wireless network;After automatic authorization mode refers to that visitor's terminal carries out authorized application, by network management services end automatically according to permission
It is wireless that the visitor information of authorization determines whether to authorize visitor's terminal to access at least one in the visitor information of refusal authorization
Network;After examination & approval authorization refers to that visitor's terminal carries out authorized application, referred to by controlling terminal according to the review operation of network master
At least one in the visitor information of authorization and the visitor information of refusal authorization is enabled, allows, to determine whether to authorize visitor's terminal
Access wireless network.
Illustratively, the corresponding authorization information of whole visitor's terminals of wireless network can be examination & approval authorization,
Determined whether that visitor's terminal is authorized to access the wireless network by controlling terminal.
Illustratively, it can also include the corresponding authorization duration information of visitor for allowing to authorize that visitor, which controls information, for example,
For visitor's terminal, which can be set by visitor's control information and be authorized to access in nearest one week wirelessly
Network.However, the application does not limit this.
It is not limited it should be noted that the application controls information for the visitor of wireless network.In practical applications, may be used
Information is controlled so that visitor to be arranged according to actual needs.
Illustratively, network management services end 102 may be adapted to be controlled according to the visitor of wireless network in the following manner
Information sends the authorization message that instruction allows or refuses access wireless network to visitor's terminal of wireless network:
Network management services end 102 is after receiving visitor's terminal 103 to the insertion authority request of wireless network, according to this
Visitor controls information and determines that the authorization of visitor's terminal 103 is to be sent to the insertion authority request when examining authorization
Controlling terminal 101, and the authorization response message fed back according to controlling terminal 101 send instruction permission to visitor's terminal 103 or refuse
The authorization message of access wireless network absolutely.
Wherein, insertion authority request can carry the information of unique identification visitor's terminal or identify the user of visitor's terminal
Information.Illustratively, insertion authority request can carry at least one of information: the user information of visitor's terminal (for example,
User identifier (ID), the social account of user), facility information (for example, MAC Address).However, the application does not limit this.
Wherein, authorization response message is used to indicate the information for allowing to access or refuse access.Illustratively, if network master
Operational order in controlling terminal 101 is to allow, then authorization response message, which carries, allows the instruction information accessed otherwise to award
Weigh the instruction information that response message carries refusal access.Then, network management services end 102 is according to authorization response message, to visit
Objective terminal 103 sends authorization message;For example, when authorization response message carries the instruction information of refusal access, to visitor's terminal
103 send the authorization message of instruction refusal access wireless network, when authorization response message carries the instruction information for allowing to access,
Indicating the authorization message for allowing to access wireless network to the transmission of visitor's terminal 103, (for example, carrying the password of wireless network, this is close
Code can be by the way of being encrypted or unencrypted).Illustratively, what controlling terminal 101 can also be configured according to network master permits
At least one of in the visitor information of the visitor information and refusal authorization that authorize perhaps, it automatically determines whether to allow visitor's terminal 103
Access wireless network.For example, working as the visitor for allowing to authorize that the visitor information that insertion authority request carries is configured in network master
In information, then controlling terminal 101 can feed back the authorization response message for carrying and allowing the instruction information authorized;When insertion authority is asked
Ask the visitor information of carrying not in the visitor information for allowing to authorize of network master's configuration, alternatively, in the visitor of refusal authorization
In information, then controlling terminal 101 can feed back the authorization response message for carrying the instruction information of refusal authorization.
Wherein, when wireless network is provided with password, the authorization message that network management services end 102 is fed back is whole to visitor
When 103 instruction of end allows to access, the password being encrypted or unencrypted can also be carried.At this point, visitor's terminal 103 receives authorization letter
After breath, the wireless network can be accessed using the password of the wireless network received automatically.When wireless network be not provided with it is close
When code, the authorization message that network management services end 102 is fed back can carry private key cryptographic or authentication key information, be only used for indicating
Allow to access or refuse access.At this point, can directly connect when visitor's terminal 103 receives the authorization message that instruction allows to access
Connect the wireless network.In the example that wireless network is not provided with password, network management services end 102 (for example, router) can
The white list of MAC Address is arranged, wherein the MAC Address for visitor's terminal that record allows to access, then network management services end 102
When detecting that visitor's terminal except white list connects wireless network, it can notify that visitor's terminal disconnects or actively
Refuse the connection of visitor's terminal.
Illustratively, network management services end 102 may include that server-side calculates equipment (for example, the server in cloud);
Server-side calculates equipment and is stored with the user information of visitor's terminal and the corresponding relationship of facility information;Server-side calculates equipment and is suitable for
When determining the user information for existing and allowing to authorize according to the visitor of wireless network control information, actively to the user for allowing to authorize
The corresponding visitor's terminal of information, which issues instruction, allows to access the authorization message of wireless network.
For example, after the visitor that wireless network is arranged in network master in controlling terminal 101 controls information, the visit of wireless network
Visitor's control information can be controlled by the server of router synchronization to cloud, the visitor of server sync to the wireless network in cloud
After information processed, it actively can allow to access the authorization message of the wireless network to the push instruction of corresponding visitor's terminal.
For example, after visitor's terminal 103 enters the overlay area of wireless network, before connecting upper wireless network not yet,
Can automatically according to radio network information by other network paths (such as carrier network) from the server pull in cloud (or more
Newly) then according to the authorization message of acquisition, automatically attempt to connect the wireless network from the authorization message in the wireless network.
For example, server-side, which calculates equipment, is stored with the user information of visitor's terminal and the corresponding relationship of facility information;Service
End calculates equipment when determining the user information for existing and allowing to authorize, actively whole to the corresponding visitor of user information for allowing to authorize
End, which issues instruction, allows to access the authorization message of wireless network.Wherein, server-side calculating equipment can be according to the visit for allowing to authorize
The corresponding relationship of the user information and facility information of objective information and visitor's terminal determines the equipment for allowing the visitor's terminal authorized
Information, according to the facility information for the visitor's terminal for allowing to authorize, actively issuing instruction to above-mentioned visitor's terminal allows to access wirelessly
The authorization message of network.
Illustratively, network management services end may include routing device, and routing device is suitable for detecting visitor's terminal
When into the overlay area of wireless network, according to the visitor of the wireless network control information to visitor's terminal issue instruction allow or
Refusal accesses the authorization message of the wireless network.
For example, network management services end may include that server-side calculating equipment and routing device, routing device can save
The visitor of the wireless network of network master's setting controls information, while can calculate equipment from the server-side in cloud and get network
The facility information of the good friend of owner under one's name, for example, the corresponding relationship of the user information of visitor's terminal and facility information, and by these
Synchronizing information is saved;After visitor's terminal enters the overlay area of wireless network, visitor's terminal may the company of automatically attempting to
The wireless network is connect, at this point, routing device, which can inquire visitor according to the facility information of visitor's terminal, controls information and visitor
The user information of terminal and the corresponding relationship of facility information, determine whether visitor's terminal is authorized to the access wireless network, and
The authorization message that instruction allows or refusal accesses is sent to visitor's terminal according to query result.In this example, network master
After the visitor of preferential setting wireless network controls information, as long as allowing visitor's terminal of authorization into the area of coverage of wireless network
Domain, it can connect the wireless network automatically.
It should be noted that connecting upper wireless network not yet after visitor's terminal enters the overlay area of wireless network
Before, can in the available wireless network in its periphery according to signal strength and history authorization message select any one (or by
Visitor terminal user actively switches) it attempts to be attached, at this point, not having between visitor's terminal router corresponding with wireless network
There is direct communications conduit.In addition, all wireless network connection requests are actively initiated by visitor's terminal, in wireless network connection
Before success, router is issued not directly to visitor's terminal and is instructed, after being successfully connected wireless network for visitor's terminal, if net
The visitor that network owner resets the wireless network controls information, due to logical between visitor's terminal and the router of wireless network
Link is believed it has been established that at this point, router can send the instruction that disconnection of wireless is connected to the network to visitor's terminal, alternatively, directly
The connection for disconnecting visitor's terminal, to prevent the long-term loiter network of visitor's terminal.
Illustratively, network management services end 102 may be adapted to be controlled according to the visitor of wireless network in the following manner
Information sends the authorization message that instruction allows or refuses the access wireless network to visitor's terminal of the wireless network:
Network management services end 102 is after receiving visitor's terminal 103 to the insertion authority request of wireless network, according to visit
When visitor's control information determines that the authorization of visitor's terminal 103 is automatic authorization mode, inquire what insertion authority request carried
Whether visitor information is in the visitor information for allowing to authorize that the visitor controls information instruction, according to query result, to visitor's end
End 103 sends the authorization message that instruction allows or refuses to access the wireless network.
Illustratively, the password for allowing the authorization message for accessing wireless network that can carry the wireless network is indicated.
In the exemplary embodiment, visitor's terminal 103, may be adapted to after being successfully accessed wireless network, to receiving
Authorization message cached, after detecting the wireless network again, determine whether to be permitted according to the authorization message of caching
Perhaps the wireless network is accessed.
Illustratively, network management services end 102 can be adapted to determining visitor's terminal according to visitor's control information
When 103 authorization permission terminates, sending the access of instruction refusal to the visitor's terminal 103 for having connected the wireless network, this is wireless
The authorization message of network;Visitor's terminal 103 may be adapted in the authorization message for receiving the instruction refusal access wireless network
Afterwards, the instruction for disconnecting the connection in the wireless network, and caching before deleting allows to access the authorization message of the wireless network.
Wherein, the user of visitor's terminal 103 does not perceive the password of wireless network, and visitor's terminal 103 can connect
It after receiving authorization message, is parsed to obtain password automatically, then carries out wireless network access.It so, it is possible to effectively prevent
A possibility that password of wireless network is shared again without limitation.
The application is illustrated below by multiple examples.
Fig. 2 is a kind of interaction flow exemplary diagram of wireless network management system provided by the embodiments of the present application.Such as Fig. 2 institute
Show, the wireless network management system that this example provides may include: controlling terminal, network management services end and visitor's terminal.
In this example, wireless network can be WiFi network, and WiFi network is provided with password.In this example, visitor controls letter
Breath includes authorization configuration information, and authorization configuration information includes at least one of the following: that the visitor information for allowing to authorize, refusal authorize
Visitor information, authorization information.
As shown in Fig. 2, the wireless network management process of the present embodiment includes:
S201, user can open Web page or APP on controlling terminal (for example, smart phone), manage into WiFi
Interface;
S202, controlling terminal obtain WiFi information;Wherein, WiFi information may include the letter of unique identification WiFi network
Breath, for example, the model of WiFi network router, MAC Address etc..
S203, controlling terminal register WiFi information to network management services end (for example, the server in cloud).
S204, network management services end save WiFi information;
Wherein, the WiFi information that controlling terminal will acquire is sent to network management services end, network management services end record
Relationship between WiFi information and the user information of network master, then notifies controlling terminal.
After S205, controlling terminal receive the notification message at network management services end, confirmation becomes the owner of WiFi network.
S206, user carry out the setting of authorization configuration information in the WiFi administration interface that controlling terminal is shown.For example, can be with
The authorization of WiFi network is set for examination & approval authorization.
Illustratively, controlling terminal can also obtain the grant column list of the WiFi network from network management services end,
In, grant column list include that user has been arranged in other equipment or on current device before be set allow to award
The visitor information (for example, user information or facility information) of power, it should be noted that it is all to be registered as WiFi for the first time in user
When person, grant column list can be sky.The visitor information for allowing to authorize can be arranged in user on the interactive interface of controlling terminal.
It should be noted that network master can be multiple people, can be transferred the possession of between each other by authorization to WiFi network
Administration authority, the change of network master is realized, in this way, the identity between visitor and network master can convert.In addition, one
Controlling terminal used in network master may be one or more, and network master can be carried out using different controlling terminals
The insertion authority management of WiFi network.However, the application does not limit this.
Illustratively, controlling terminal can show after obtaining grant column list and wherein each visitor information is arranged
Corresponding authorization, for example, automatic authorization mode or Unsolicited Grant mode.Alternatively, visit can be increased newly on grant column list
Objective information, or delete visitor information.For example, user can add the visitor information for allowing to authorize, awarded alternatively, termination can be deleted
The visitor information of power, alternatively, setting authorization illegal state for the visitor information for terminating authorization.
Illustratively, it can also include the visitor information for having connected wireless network to be broken that visitor, which controls information,.Wherein,
Network management services end can also send to controlling terminal and have connected list.Wherein, have connected includes having been coupled in list
The visitor information of WiFi network.In this way, network master basis can have connected list update visitor control letter in controlling terminal
Breath, for example, the visitor's terminal for having connected WiFi network that setting is to be broken.Then, network management services end is according to be broken
The visitor information of wireless network is had connected, can indicate the visitor's terminal disconnection of wireless network connection for having connected the WiFi network,
Or actively disconnect the wireless network connection for having connected visitor's terminal of the WiFi network.
Illustratively, controlling terminal can also obtain the visit for once attempting to connect the WiFi network from network management services end
Objective information.In this way, network master can be awarded in controlling terminal according to the visitor information for once attempting connection WiFi network
The update of configuration information is weighed, with visitor's terminal that newly-increased authorization allows, to effectively manage the access terminal of WiFi network.
S207, controlling terminal notify updated authorization configuration information to give network management services end.
S208, network management services end save newest authorization configuration information.
It should be noted that since user can carry out the setting of authorization configuration information using different controlling terminals, because
This, network management services end can store newest most full authorization configuration information, and controlling terminal can be from network management services end
Newest authorization configuration information is obtained so that user carries out further operation modification.
S209, network management services end carry out issuing for authorization message according to authorization configuration information.
Illustratively, network management services end (for example, the server in cloud) determines to exist and permit according to authorization configuration information
When the visitor information authorized perhaps, actively the corresponding visitor's terminal of visitor information authorized can be allowed, which to issue instruction, to this allows to connect
Enter the authorization message of the WiFi network.In this example, the password of WiFi network can be carried in authorization message.
Illustratively, the router of wireless network is detecting the corresponding visitor's terminal entrance of visitor information for allowing to authorize
When the overlay area of WiFi network, instruction can be issued to visitor's terminal allows to access the authorization message of WiFi network.
Illustratively, after visitor's terminal is successfully connected wireless network, network management services end (for example, router) basis
Newest authorization configuration information, when determining that the authorization permission that there is the visitor's terminal having connected terminates, network management services
End can issue the authorization message that instruction refusal accesses the WiFi network to visitor's terminal, notify visitor's terminal actively company of disconnection
It connects, alternatively, network management services end can actively refuse the wireless network connection of visitor's terminal.
Illustratively, it is assumed that visitor's terminal is in same WiFi management platform (for example, the addressable public WiFi of a public network
Management server end) register and be bundled with social account (such as cell-phone number, mailbox, micro- of Guest User (i.e. the good friend of owner)
Rich account, QQ or WeChat ID etc.), then owner (i.e. network ownership) (can not require society by adding the social account of good friend
The number of handing over the accounts has friend relation) mode be arranged authorization allow or refusal, covered without requiring visitor device that must be introduced into WiFi
Lid range, can be after owner presets Unsolicited Grant permission, and visitor's terminal realizes the wireless network for the owner that visits for the first time, nothing
It need to inquire that authorization can network automatically.In this example, network management services end (for example, WiFi manages platform) is available simultaneously
Record the corresponding terminal device information of Guest User, wherein a Guest User can correspond to one or more terminal device, net
Network management server end can store the corresponding relationship between Guest User and terminal device information, and can set for every terminal
The standby information for saving independent wireless network insertion authority and allowing or refusing, alternatively, can also be saved for each Guest User
Independent wireless network insertion authority allows or the information of refusal.Carrying out default Unsolicited Grant to Guest User in owner allows it
Afterwards, which network management services end can determine according to the corresponding relationship between the Guest User and terminal device information of storage
Terminal device, which is authorized to, to be allowed to access, and the authorization message for indicating to allow to access actively is issued to these terminal devices, in order to
These terminal devices can network automatically after the wireless network that owner possesses is accessed.
Fig. 3 is another interaction flow exemplary diagram of wireless network management system provided by the embodiments of the present application.Such as Fig. 3 institute
Show, wireless network management system provided in this embodiment includes: controlling terminal, network management services end and visitor's terminal.This
In embodiment, wireless network is by taking WiFi network as an example, and WiFi network is provided with password.In this example, it is controlled and is believed with visitor
Breath is including for authorization configuration information, wherein authorization configuration information may include at least one of following: the visitor's letter for allowing to authorize
Breath, the visitor information of refusal authorization, authorization information.
Originally it illustrates visitor's terminal and enters the process that insertion authority is actively applied in the overlay area WiFi.
As shown in figure 3, the wireless network management process of the present embodiment includes:
S301, visitor's terminal enter the overlay area WiFi;
S302, visitor's terminal obtain WiFi information;Illustratively, WiFi title (SSID, Service Set is at least obtained
Identifier), the information such as router mac address, encryption type, signal strength, combining geographic location information are determined to phase
The unique WiFi network matched;The case where being provided with disabling SSID broadcast (hiding SSID) for WiFi network, visitor's terminal can only
By auxiliary informations such as geographical locations to determine whether entering the overlay area WiFi.
Currently whether the communication network between network management services end can be used for S303, the judgement of visitor's terminal;If available,
It executes S304 and executes S312 if unavailable.
If the communication network between S304, visitor's terminal and network management services end (server in cloud) is available, visit
Objective terminal uploads insertion authority request to network management services end, wherein carrying the visitor information of visitor's terminal (for example, equipment is believed
Breath or user information).
S305, network management services end monitor the insertion authority request of visitor's terminal, then according to the authorization of WiFi network
Configuration information checks whether the authorization of visitor's terminal is automatic authorization mode;If automatic authorization mode, then execute
S310 then executes S306 if examination & approval authorization.
If the authorization of S306, visitor's terminal are configured to examination & approval authorization, network management services end is whole by visitor
The access request at end is sent to controlling terminal;
S307, controlling terminal provide request in interactive interface and mention after the insertion authority request for receiving visitor's terminal
Show, allowed by user's operation or refuse to authorize, according to user's operation as a result, determining authorization response message;Alternatively, illustratively,
Controlling terminal can also determine authorization response message, for example, according to WiFi network according to the authorization configuration information of local record
Allow authorize visitor information or refusal authorization visitor information, automatically determine issue insertion authority request visitor's terminal whether
It is allowed to access WiFi network.
S308, controlling terminal send authorization response message and give network management services end;
S309, network management services end save newest authorization configuration information according to authorization response message.Wherein, network
Management server end according to authorization response message, can update the authorization configuration information of preservation, so that the authorization configuration information saved
In last state.
S310, network management services end are to visitor's terminal distributing authentication information.Wherein, network management services end is according to authorization
Response message, determines whether visitor's terminal is allowed to access WiFi network, then notifies that the visitor is whole by distributing authentication information
End.
If the authorization of visitor's terminal is configured to automatic authorization mode, network management services end is according to newest authorization
Configuration information, distributing authentication information.In this example, however, it is determined that visitor's terminal, which is authorized to, to be allowed to access, then can send instruction
The authorization message for accessing WiFi network is allowed to give visitor's terminal, wherein the password of WIFi network can be carried;If it is determined that visitor is whole
Hold it is uncommitted allow to access, then can send instruction refusal access WiFi network authorization message give visitor's terminal.
After S311, visitor's terminal receive the authorization message that network management services end issues, authorization message is saved, is then held
Row S313.
When S312, the communication network between visitor's terminal and network management services end are unavailable, visitor's terminal can be sentenced
Whether disconnected local is cached with the authorization message of the WiFi network, i.e., whether was authorized to the information for accessing the WiFi network before;
If it exists, then S313 is executed, otherwise, executes S315.
S313, visitor's terminal judge whether to be allowed to authorization access WiFi network according to authorization message;
If being authorized to allows to access WiFi network, visitor's terminal executes S314, i.e., is connected automatically according to the password of caching
WiFi network.If uncommitted allow to access WiFi network, S315 is executed, i.e. confirmation WiFi network connection failure.For root
Judge whether the case where authorization allows according to the authorization message of caching, (needs router to have more perfect while S314 is executed
Authorization function is supported, such as MAC Address limitation), router (network management services end) can match according to practical newest authorization
Confidence breath allows or refusal network insertion, or (at this time network temporarily can be used) issues after visitor's terminal accesses WiFi network
Or new authorization configuration information is updated, and S311 is entered according to new authorization configuration information.
After S315, visitor's terminal can return to S302, automatically attempt to access next WiFi network.
S316, after visitor's terminal connects WiFi network automatically, network management services end can recorde visitor's terminal
Connection status.For example, the end message that has connected of current WiFi network can be synchronized to controlling terminal, so that it carries out pipe
Reason.
It should be noted that in actual implementation, visitor's terminal needs support relevant WiFi access criteria or its equipment
In the application program that can manage WiFi connection is installed.For mobile phone, due to the limitation of equipment permission, usually by operating
System level is realized, or the system tool with higher management permission is relatively more reasonable to realize.
In Fig. 2 and embodiment shown in Fig. 3, WiFi network is provided with password.In other implementations, when WiFi net
When network is not provided with password, network management services end (router) can be configured with the white list of MAC Address, i.e., allow authorization
Visitor's terminal MAC Address be added white list in, visitor terminal of the network management services end into white list, which issues, to allow to award
The authorization message of power issues the authorization message of refusal authorization to other visitor's terminals.Illustratively, authorization message may include private
Key password or authentication key information.After visitor's terminal receives authorization message, by information parsing know oneself whether by
Allow to access WiFi network.
In conclusion by the embodiment of the present application, the owner of WiFi network can active real-time management WiFi network
The visitor information for currently having authorized and having had connected, and be maintained, the appearance of loiter network phenomenon can be effectively prevented;Moreover,
Visitor has been authorized or had connected for unnecessary, has terminated authorization with can be convenient, and actively disconnect the connection of corresponding terminal;It is right
In unauthorized visitor, other than the visitor can apply being authorized to the owner of WiFi network, WiFi network
Owner actively can also invite and push the authorization message of WiFi network to the visitor, keep its network insertion process more flexible more square
Just, the Interactive Experience between host and guest and to a certain extent can be enhanced.
Fig. 4 is a kind of flow chart of wireless network management method provided by the embodiments of the present application.As shown in figure 4, this implementation
The wireless network management method that example provides, comprising:
Visitor's control information of S401, controlling terminal management wireless network;
S402, transmission visitor control information and give network management services end.
In S401, controlling terminal can be according to a user operation instruction manage the visitor for the wireless network that user is possessed
Control information.
Illustratively, it may include at least one of following that visitor, which controls information: allow visitor information, the authorization of authorization
Visitor information, the visitor information for having connected the wireless network to be broken that information, refusal authorize.
Illustratively, when the authorization that visitor controls information instruction is examination & approval authorization, the method for the present embodiment
Can also include:
Controlling terminal receives the insertion authority request of visitor's terminal of wireless network;
At least one of the visitor information authorized according to operational order, the visitor information for allowing to authorize and refusal, to
Visitor's terminal returns to authorization response message.
Illustratively, visitor information may include at least one of: the user information of visitor's terminal, facility information.
Fig. 5 is a kind of schematic diagram of wireless network management device provided by the embodiments of the present application.As shown in figure 5, this implementation
The wireless network management device that example provides is applied to controlling terminal, comprising:
Management module 501, the visitor suitable for managing wireless network control information;
First transmission module 502 is suitable for sending visitor's control information and gives network management services end.
Illustratively, when the authorization that visitor controls information instruction is examination & approval authorization, the first transmission module
502, it is further adapted for receiving the insertion authority request of visitor's terminal of wireless network;According to operational order, the visitor for allowing to authorize letter
Breath and at least one of the visitor information of refusal authorization, return to authorization response message to visitor's terminal.
Fig. 6 is a kind of schematic diagram of terminal provided by the embodiments of the present application.As shown in fig. 6, terminal provided in this embodiment,
It include: the first communication unit 603, first processor 601 and first memory 602;First communication of the connection of first processor 601
Unit 603 and first memory 602;Wherein, first memory 602 is stored with wireless network management program, the wireless network pipe
Program is managed when reading execution by first processor 601, executes following operation: the visitor for managing wireless network controls information, and
Visitor's control information, which is sent, by the first communication unit 603 gives network management services end.Wherein, first processor 601 can wrap
It includes but is not limited to microprocessor (MCU, Microcontroller Unit) or programmable logic device (FPGA, Field
Programmable Gate Array) etc. processing unit.First memory 602 can be used for storing the software journey of application software
Sequence and module, such as the corresponding program instruction of wireless network management method or module in the present embodiment, first processor 601 is logical
Software program and module that operation is stored in memory are crossed, thereby executing various function application and data processing, i.e., in fact
Existing above-mentioned wireless network management method.First memory 602 may include high speed random access memory, may also include non-volatile deposit
Reservoir, such as one or more magnetic storage device, flash memory or other non-volatile solid state memories.In some instances,
First memory 602 may include the memory remotely located relative to first processor 601, these remote memories can pass through
It is connected to the network to above-mentioned terminal.The example of above-mentioned network includes but is not limited to internet, intranet, local area network, moves and lead to
Letter net and combinations thereof.
Wherein, the first communication unit 603 can receive or send data via a network.In an example,
One communication unit 603 can be radio frequency (Radio Frequency, referred to as RF) module, be used for wirelessly and mutually
Networking is communicated.
Related description about wireless network management method, apparatus provided in this embodiment and terminal is referred to above-mentioned system
Description in embodiment of uniting to controlling terminal, therefore repeated no more in this.
Fig. 7 is the flow chart of another wireless network management method provided by the embodiments of the present application.As shown in fig. 7, this implementation
The wireless network management method that example provides, comprising:
S701, network management services end control information from the visitor that controlling terminal receives wireless network;
S702, information is controlled according to the visitor of wireless network, send instruction permission to visitor's terminal of wireless network or refused
The authorization message of the wireless network is accessed absolutely, or instruction has connected visitor's terminal disconnection of wireless network connection of wireless network,
Or disconnect the wireless network connection for having connected visitor's terminal of wireless network.
Illustratively, S702 may include:
It is controlled after receiving visitor's terminal to the insertion authority request of the wireless network according to visitor at network management services end
When information processed determines the authorization of visitor's terminal to examine authorization, insertion authority request is sent to controlling terminal,
And the authorization response message fed back according to controlling terminal, instruction permission is sent to visitor's terminal or refusal accesses the wireless network
Authorization message.
Illustratively, network management services end includes that server-side calculates equipment, and server-side, which calculates equipment, can store visitor
The user information of terminal and the corresponding relationship of facility information;S702 may include:
Server-side calculates equipment and is determining the user information for existing and allowing to authorize according to the visitor of wireless network control information
When, actively allowing the corresponding visitor's terminal of user information authorized to issue instruction to this allows to access the authorization letter of wireless network
Breath.
Illustratively, network management services end may include routing device;S702 may include:
Routing device is controlled when detecting that visitor's terminal enters the overlay area of wireless network according to the visitor of wireless network
Information processed issues the authorization message that instruction allows or refuses the access wireless network to visitor's terminal.
Illustratively, to may include: network management services end connect the wireless network receiving visitor's terminal S702
After entering authorization requests, when determining that the authorization of visitor's terminal is automatic authorization mode according to visitor's control information, inquiry is connect
Enter the visitor information of authorization requests carrying whether in the visitor information for allowing to authorize that visitor controls information instruction, according to inquiry
As a result, sending the authorization message that instruction allows or refuses the access wireless network to visitor's terminal.
Illustratively, S702 may include: for the visitor's terminal for having connected wireless network, and network management services end is in root
It is whole to the visitor for having connected the wireless network when determining the authorization permission termination of visitor's terminal according to visitor's control information
End sends the authorization message that instruction refusal accesses the wireless network;Alternatively, actively disconnecting the wireless network connection of visitor's terminal.
Illustratively, the password for allowing the authorization message for accessing wireless network to carry the wireless network is indicated.
Fig. 8 is the schematic diagram of another wireless network management device provided by the embodiments of the present application.As shown in figure 8, this reality
The wireless network management device of example offer is provided, network management services end is applied to, comprising:
First obtains module 801, and the visitor suitable for obtaining wireless network from controlling terminal controls information;
Second transmission module 802, suitable for controlling information according to the visitor of the wireless network, the visitor to the wireless network is whole
End sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected visitor's terminal of wireless network
Disconnection of wireless network connection, or disconnect the wireless network connection for having connected visitor's terminal of wireless network.
Illustratively, the second transmission module 802 may be adapted to through at least one of mode according to the wireless network
Visitor controls information, believes to the authorization that visitor's terminal of the wireless network sends instruction permission or refuses to access the wireless network
Breath:
After receiving visitor's terminal to the insertion authority request of the wireless network, information is controlled according to visitor and determines the visit
When the authorization of objective terminal is examination & approval authorization, insertion authority request is sent to controlling terminal, and according to controlling terminal
The authorization response message of feedback sends the authorization message that instruction allows or refuses the access wireless network to visitor's terminal;
Information is controlled according to visitor, when determining the visitor information for existing and allowing to authorize, actively to the visitor for allowing to authorize
The corresponding visitor's terminal of information, which issues instruction, allows to access the authorization message of the wireless network;
When detecting that visitor's terminal enters the overlay area of wireless network, information is controlled under visitor's terminal according to visitor
Bristle with anger and shows that permission or refusal access the authorization message of the wireless network;
After receiving visitor's terminal to the insertion authority request of the wireless network, information is controlled according to visitor and determines the visit
When the authorization of objective terminal is automatic authorization mode, inquire whether the visitor information that insertion authority request carries is controlled in visitor
In the visitor information for allowing to authorize of information instruction processed, according to query result, instruction permission or refusal are sent to visitor's terminal
Access the authorization message of the wireless network.
Fig. 9 is a kind of schematic diagram of equipment provided by the embodiments of the present application.As shown in figure 9, equipment provided in this embodiment,
It include: the second communication unit 903, second processor 901 and second memory 902;Second communication of the connection of second processor 901
Unit 902 and second memory 902;Wherein, second memory 902 is stored with wireless network management program, the wireless network pipe
Manage program read by second processor 901 execute when, execute following operation: by the second communication unit 903 from controlling terminal
The visitor for obtaining wireless network controls information;Information is controlled according to the visitor of wireless network, passes through the second communication unit 903 to this
Visitor's terminal of wireless network sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected this
Visitor's terminal disconnection of wireless of wireless network is connected to the network, or disconnects the wireless network for having connected visitor's terminal of the wireless network
Network connection.
Explanation about the second processor of the present embodiment, second memory and the second communication unit is referred to above-mentioned
The explanation of first processor, first memory and the first communication unit, therefore repeated no more in this.
Related description about wireless network management method, apparatus provided in this embodiment and terminal is referred to above-mentioned system
Description in embodiment of uniting to network management services end, therefore repeated no more in this.
Figure 10 is the flow chart of another wireless network management method provided by the embodiments of the present application.As shown in Figure 10, originally
The wireless network management method that embodiment provides, comprising:
The instruction that S1001, visitor's terminal receiving network managing server-side issue allows or refusal accesses awarding for wireless network
Weigh information;Alternatively, uploading network authorization request after detecting wireless network to network management services end, receiving network pipe
The instruction that reason server-side issues allows or the authorization message of refusal access wireless network;Alternatively, after detecting wireless network,
The authorization message of wireless network is obtained from local cache;
S1002, it is connected to the network according to the authorization message of wireless network.
Illustratively, the above method can also include: that visitor's terminal is successfully connected after wireless network, receive network
After the instruction refusal that management server end is sent accesses the authorization message of the wireless network, the connection with the wireless network is disconnected, and
The instruction for deleting local cache allows to access the authorization message of the wireless network.
Illustratively, the authorization message that instruction allows to access the wireless network can carry the password of the wireless network.
Figure 11 is the schematic diagram of another wireless network management device provided by the embodiments of the present application.As shown in figure 11, originally
The wireless network management device that embodiment provides is applied to visitor's terminal, comprising:
Second obtains module 1101, and the instruction issued suitable for receiving network managing server-side allows or refuse access wireless network
The authorization message of network;Alternatively, uploading network authorization request after detecting wireless network to network management services end, receiving
The instruction that network management services end issues allows or the authorization message of refusal access wireless network;Alternatively, detecting wireless network
After network, the authorization message of wireless network is obtained from local cache;
Network connecting module 1102, suitable for being connected to the network according to the authorization message of wireless network.
Illustratively, the device of the present embodiment can also include: processing module, suitable for be successfully connected wireless network it
Afterwards, it after the instruction refusal for receiving the transmission of network management services end accesses the authorization message of the wireless network, disconnects and the nothing
The connection of gauze network, and the instruction for deleting local cache allows to access the authorization message of the wireless network.
Figure 12 is a kind of schematic diagram of terminal provided by the embodiments of the present application.As shown in figure 12, end provided in this embodiment
End, comprising: third processor 1201 and third memory 1202;Wherein, third memory 1202 is stored with wireless network pipe
Program is managed, which executes following operation: receiving network pipe when reading execution by third processor 1201
The instruction that reason server-side issues allows or the authorization message of refusal access wireless network;Alternatively, after detecting wireless network,
Network authorization request is uploaded to network management services end, the instruction that receiving network managing server-side issues allows or refusal access nothing
The authorization message of gauze network;Alternatively, obtaining the authorization message of wireless network from local cache after detecting wireless network;
It is connected to the network according to the authorization message of wireless network.
Illustratively, terminal provided in this embodiment can also include: third communication unit 1203, be adapted for carrying out and network
Communication between management server end.
Explanation about the third processor of the present embodiment, third memory and third communication unit is referred to above-mentioned
The explanation of first processor, first memory and the first communication unit, therefore repeated no more in this.
Related description about wireless network management method, apparatus provided in this embodiment and terminal is referred to above-mentioned system
Description in embodiment of uniting to visitor's terminal, therefore repeated no more in this.
In addition, the embodiment of the present application also provides a kind of terminal, including display module, it is adapted to provide for an interactive interface;It hands over
Include following one on mutual interface: the visitor of wireless network controls the set interface of information, for the insertion authority of visitor's terminal
The processing interface of request.
Operation about interactive interface is referred to the description of the above system embodiment, therefore repeats no more in this.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored with wireless network management program, the nothing
Line network supervisor realizes the step of wireless network management method that any of the above-described aspect provides when being executed by processor.
It will appreciated by the skilled person that whole or certain steps, system, dress in method disclosed hereinabove
Functional module or unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment
In, the division between functional module or unit referred in the above description not necessarily corresponds to the division of physical assemblies;For example,
One physical assemblies can have multiple functions or a function or step and can be executed by several physical assemblies cooperations.Certain
A little components or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or
Person is implemented as hardware, or is implemented as integrated circuit, such as specific integrated circuit.Such software can be distributed in computer
On readable medium, computer-readable medium may include computer storage medium (or non-transitory medium) and communication media (or
Fugitive medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information
Implement in any method or technique of (such as computer readable instructions, data structure, program module or other data) volatile
Property and non-volatile, removable and nonremovable medium.Computer storage medium includes but is not limited to RAM, ROM, EEPROM, sudden strain of a muscle
It deposits or other memory technologies, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage
Or other magnetic memory apparatus or any other Jie that can be used for storing desired information and can be accessed by a computer
Matter.In addition, known to a person of ordinary skill in the art be, communication media generally comprises computer readable instructions, data structure, journey
Other data in the modulated data signal of sequence module or such as carrier wave or other transmission mechanisms etc, and may include any
Information delivery media.
The advantages of basic principles and main features and the application of the application have been shown and described above.The application is not by upper
The limitation for stating embodiment, the above embodiments and description only describe the principles of the application, are not departing from the application
Under the premise of spirit and scope, the application be will also have various changes and improvements, these changes and improvements both fall within claimed
Within the scope of the application.
Claims (30)
1. a kind of wireless network management system characterized by comprising controlling terminal, network management services end and visitor are whole
End;The network management services end connects the controlling terminal and visitor's terminal;
Wherein, the visitor that the controlling terminal is suitable for managing wireless network controls information, and send the visitor control information to
The network management services end;
The network management services end is suitable for controlling information, the visitor of Xiang Suoshu wireless network according to the visitor of the wireless network
Terminal sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected the wireless network
The network connection of visitor's terminal disconnection of wireless, or disconnect the wireless network connection for having connected visitor's terminal of the wireless network.
2. system according to claim 1, which is characterized in that visitor's control information includes at least one of the following: fair
Perhaps the visitor information that authorizes, authorization information, refusal authorization visitor information, to be broken have connected the wireless network
Visitor information.
3. system according to claim 1, which is characterized in that the network management services end is suitable in the following manner
Information is controlled according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse
Access the authorization message of the wireless network:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network, according to
The visitor controls information and determines that the authorization of visitor's terminal is that when examining authorization, the insertion authority is requested
It is sent to the controlling terminal, and the authorization response message fed back according to the controlling terminal, the transmission of Xiang Suoshu visitor's terminal refers to
Show that permission or refusal access the authorization message of the wireless network.
4. system according to claim 1, which is characterized in that the network management services end includes that server-side calculating is set
Standby, the server-side calculates equipment and is stored with the user information of visitor's terminal and the corresponding relationship of facility information;The server-side
Equipment is calculated to be suitable for when determining the user information for existing and allowing to authorize according to visitor control information, actively to the permission
The corresponding visitor's terminal of the user information of authorization, which issues instruction, allows to access the authorization message of the wireless network.
5. system according to claim 1, which is characterized in that the network management services end includes routing device, described
Routing device is suitable for when detecting that visitor's terminal enters the overlay area of the wireless network, controls information according to the visitor
The authorization message that instruction allows or refuses the access wireless network is issued to visitor's terminal.
6. system according to claim 1, which is characterized in that the network management services end is suitable in the following manner
Information is controlled according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network, which sends instruction, allows or refuse access
The authorization message of the wireless network:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network, according to
When visitor's control information determines that the authorization of visitor's terminal is automatic authorization mode, inquires the insertion authority and ask
It asks the visitor information of carrying whether in the visitor information for allowing to authorize that the visitor controls information instruction, is tied according to inquiry
Fruit, Xiang Suoshu visitor's terminal send the authorization message that instruction allows or refuses to access the wireless network.
7. system according to any one of claim 3 to 6, which is characterized in that the instruction allows to access described wireless
The authorization message of network carries the password of the wireless network.
8. system according to claim 1, which is characterized in that visitor's terminal, suitable for be successfully accessed it is described wireless
After network, the authorization message received is cached, after detecting the wireless network again, according to described slow
The authorization message deposited determines whether to be allowed to access the wireless network.
9. system according to claim 8, which is characterized in that the network management services end is further adapted for according to
When visitor's control information determines that the authorization permission of visitor's terminal terminates, to the visit for having connected the wireless network
Objective terminal sends the authorization message that instruction refusal accesses the wireless network;
Visitor's terminal, suitable for disconnecting after receiving the instruction refusal and accessing the authorization message of the wireless network
The connection of the wireless network, and the instruction cached before deleting allows to access the authorization message of the wireless network.
10. a kind of wireless network management method characterized by comprising
The visitor that controlling terminal manages wireless network controls information, and sends the visitor and control information to network management services
End.
11. according to the method described in claim 10, it is characterized in that, visitor control information includes at least one of the following:
Allow the visitor information authorized, authorization information, refusal authorization visitor information, to be broken have connected the wireless network
Visitor information.
12. method described in 0 or 11 according to claim 1, which is characterized in that control the authorized party of information instruction in the visitor
When formula is examination & approval authorization, the method also includes:
The controlling terminal receives the insertion authority request of visitor's terminal of the wireless network;
According at least one of operational order, the visitor information for allowing to authorize and visitor information of refusal authorization, Xiang Suoshu
Visitor's terminal returns to authorization response message.
13. according to the method for claim 11, which is characterized in that the visitor information includes at least one of: visitor
The user information of terminal, facility information.
14. a kind of wireless network management method characterized by comprising
Network management services end controls information from the visitor that controlling terminal obtains wireless network;
Information is controlled according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse
The authorization message of the wireless network is accessed, or instruction has connected visitor's terminal disconnection of wireless network company of the wireless network
It connects, or disconnects the wireless network connection for having connected visitor's terminal of the wireless network.
15. according to the method for claim 14, which is characterized in that described controlled according to the visitor of the wireless network is believed
Breath, visitor's terminal of Xiang Suoshu wireless network send the authorization message that instruction allows or refuses to access the wireless network, comprising:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network, according to
The visitor controls information and determines that the authorization of visitor's terminal is that when examining authorization, the insertion authority is requested
It is sent to controlling terminal, and the authorization response message fed back according to the controlling terminal, Xiang Suoshu visitor's terminal sends instruction and permits
Perhaps or refusal accesses the authorization message of the wireless network.
16. according to the method for claim 14, which is characterized in that the network management services end includes that server-side calculating is set
Standby, the server-side calculates the user information of equipment storage visitor's terminal and the corresponding relationship of facility information;
It is described that information is controlled according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network send instruction allow or
Refusal accesses the authorization message of the wireless network, comprising:
The server-side calculates equipment and is determining the user for existing and allowing to authorize according to the visitor of wireless network control information
When information, actively issuing instruction to the corresponding visitor's terminal of user information for allowing authorization allows to access the wireless network
Authorization message.
17. according to the method for claim 14, which is characterized in that the network management services end includes routing device;Institute
It states and information is controlled according to the visitor of the wireless network, visitor's terminal of Xiang Suoshu wireless network, which sends instruction, to be allowed or refuse to connect
Enter the authorization message of the wireless network, comprising:
The routing device is when detecting that visitor's terminal enters the overlay area of the wireless network, according to the wireless network
Visitor control information and issue that instruction allows or refusal accesses the authorization message of the wireless network to visitor's terminal.
18. according to the method for claim 14, which is characterized in that described controlled according to the visitor of the wireless network is believed
Breath, visitor's terminal of Xiang Suoshu wireless network send the authorization message that instruction allows or refuses to access the wireless network, comprising:
The network management services end after receiving visitor's terminal to the request of the insertion authority of the wireless network, according to
When visitor's control information determines that the authorization of visitor's terminal is automatic authorization mode, inquires the insertion authority and ask
It asks the visitor information of carrying whether in the visitor information for allowing to authorize that the visitor controls information instruction, is tied according to inquiry
Fruit, Xiang Suoshu visitor's terminal send the authorization message that instruction allows or refuses to access the wireless network.
19. according to the method for claim 14, which is characterized in that described controlled according to the visitor of the wireless network is believed
Breath, visitor's terminal of Xiang Suoshu wireless network send the authorization message that instruction allows or refuses to access the wireless network, comprising:
For the visitor's terminal for having connected the wireless network, the network management services end is controlling information according to the visitor
When determining that the authorization permission of visitor's terminal terminates, sends and refer to the visitor's terminal for having connected the wireless network
Show that refusal accesses the authorization message of the wireless network;Alternatively, actively disconnecting the wireless network connection of visitor's terminal.
20. method described in any one of 4 to 18 according to claim 1, which is characterized in that the instruction allows to access the nothing
The authorization message of gauze network carries the password of the wireless network.
21. a kind of wireless network management method characterized by comprising
The instruction that visitor's terminal receiving network managing server-side issues allows or the authorization message of the refusal access wireless network;
Alternatively, uploading network authorization request to network management services end after detecting wireless network, the network management clothes are received
The instruction that business end issues allows or the authorization message of the refusal access wireless network;Alternatively, after detecting wireless network,
The authorization message of the wireless network is obtained from local cache;
It is connected to the network according to the authorization message of the wireless network.
22. according to the method for claim 21, which is characterized in that the method also includes:
Visitor's terminal is successfully connected after the wireless network, in the instruction for receiving the network management services end transmission
After refusal accesses the authorization message of the wireless network, the connection with the wireless network is disconnected, and delete the finger of local cache
Show the authorization message for allowing to access the wireless network.
23. the method according to claim 21 or 22, which is characterized in that the instruction allows to access the wireless network
Authorization message carries the password of the wireless network.
24. a kind of terminal characterized by comprising
Display module is adapted to provide for an interactive interface;It include following one on the interactive interface: visitor's control of wireless network
The set interface of information processed, for visitor's terminal insertion authority request processing interface.
25. a kind of terminal characterized by comprising the first communication unit, first processor and first memory;Described
One processor connects first communication unit and the first memory;Wherein, the first memory is stored with wireless network
Network management program, the wireless network management program execute following operation when reading execution by the first processor:
The visitor for managing wireless network controls information, and sends the visitor by first communication unit and control information to net
Network management server end.
26. a kind of equipment characterized by comprising the second communication unit, second processor and second memory;Described
Two processors connect second communication unit and the second memory;Wherein, the second memory is stored with wireless network
Network management program, the wireless network management program execute following operation when reading execution by the second processor:
Information is controlled from the visitor that controlling terminal obtains wireless network by second communication unit;
Information is controlled according to the visitor of the wireless network, the visitor by second communication unit to the wireless network is whole
End sends the authorization message that instruction allows or refuses to access the wireless network, or instruction has connected the visit of the wireless network
Objective terminal disconnection of wireless network connection, or disconnect the wireless network connection for having connected visitor's terminal of the wireless network.
27. a kind of terminal characterized by comprising third processor and third memory;Wherein, the third memory
It is stored with wireless network management program, the wireless network management program is executed when reading execution by the third processor
It operates below:
The instruction that receiving network managing server-side issues allows or the authorization message of the refusal access wireless network;Alternatively,
After detecting wireless network, network authorization request is uploaded to network management services end, is received under the network management services end
The instruction of hair allows or the authorization message of the refusal access wireless network;Alternatively, after detecting wireless network, from local
Caching obtains the authorization message of the wireless network;
It is connected to the network according to the authorization message of the wireless network.
28. a kind of computer-readable medium, which is characterized in that be stored with wireless network management program, the wireless network management
The step of wireless network management method as described in any one of claim 10 to 13 is realized when program is executed by processor.
29. a kind of computer-readable medium, which is characterized in that be stored with wireless network management program, the wireless network management
The step of wireless network management method as described in any one of claim 14 to 20 is realized when program is executed by processor.
30. a kind of computer-readable medium, which is characterized in that be stored with wireless network management program, the wireless network management
The step of wireless network management method as described in any one of claim 21 to 23 is realized when program is executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711073072.9A CN109756915B (en) | 2017-11-03 | 2017-11-03 | Wireless network management method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711073072.9A CN109756915B (en) | 2017-11-03 | 2017-11-03 | Wireless network management method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109756915A true CN109756915A (en) | 2019-05-14 |
CN109756915B CN109756915B (en) | 2022-08-19 |
Family
ID=66399425
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711073072.9A Active CN109756915B (en) | 2017-11-03 | 2017-11-03 | Wireless network management method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109756915B (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110167027A (en) * | 2019-05-23 | 2019-08-23 | 上海连尚网络科技有限公司 | A kind of method, equipment and storage medium obtaining wireless access point access pin |
CN110351719A (en) * | 2019-07-16 | 2019-10-18 | 深圳市信锐网科技术有限公司 | A kind of wireless network management method, system and electronic equipment and storage medium |
CN110831008A (en) * | 2019-11-04 | 2020-02-21 | Oppo广东移动通信有限公司 | Access equipment control method and related device |
CN111083682A (en) * | 2019-12-12 | 2020-04-28 | 深圳市高德信通信股份有限公司 | Wireless network connection system |
CN111866994A (en) * | 2020-07-26 | 2020-10-30 | 广云物联网科技(广州)有限公司 | Method and device for rapidly distributing network at hot spot |
CN112153645A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Anti-network-rubbing method and device and router |
WO2021134344A1 (en) * | 2019-12-30 | 2021-07-08 | 华为技术有限公司 | Method for controlling communication access, ap and communication device |
CN116056184A (en) * | 2022-05-27 | 2023-05-02 | 荣耀终端有限公司 | Network access method, system, electronic equipment and storage medium |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104540128A (en) * | 2014-12-26 | 2015-04-22 | 北京奇虎科技有限公司 | Method, device and system for wireless network access |
CN107231338A (en) * | 2016-03-25 | 2017-10-03 | 北京搜狗科技发展有限公司 | Method for connecting network, device and the device for network connection |
-
2017
- 2017-11-03 CN CN201711073072.9A patent/CN109756915B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104540128A (en) * | 2014-12-26 | 2015-04-22 | 北京奇虎科技有限公司 | Method, device and system for wireless network access |
CN107231338A (en) * | 2016-03-25 | 2017-10-03 | 北京搜狗科技发展有限公司 | Method for connecting network, device and the device for network connection |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110167027A (en) * | 2019-05-23 | 2019-08-23 | 上海连尚网络科技有限公司 | A kind of method, equipment and storage medium obtaining wireless access point access pin |
CN110167027B (en) * | 2019-05-23 | 2022-04-05 | 上海尚往网络科技有限公司 | Method, equipment and storage medium for acquiring access password of wireless access point |
CN112153645A (en) * | 2019-06-28 | 2020-12-29 | 北京奇虎科技有限公司 | Anti-network-rubbing method and device and router |
CN110351719A (en) * | 2019-07-16 | 2019-10-18 | 深圳市信锐网科技术有限公司 | A kind of wireless network management method, system and electronic equipment and storage medium |
CN110831008A (en) * | 2019-11-04 | 2020-02-21 | Oppo广东移动通信有限公司 | Access equipment control method and related device |
CN111083682A (en) * | 2019-12-12 | 2020-04-28 | 深圳市高德信通信股份有限公司 | Wireless network connection system |
WO2021134344A1 (en) * | 2019-12-30 | 2021-07-08 | 华为技术有限公司 | Method for controlling communication access, ap and communication device |
CN111866994A (en) * | 2020-07-26 | 2020-10-30 | 广云物联网科技(广州)有限公司 | Method and device for rapidly distributing network at hot spot |
CN116056184A (en) * | 2022-05-27 | 2023-05-02 | 荣耀终端有限公司 | Network access method, system, electronic equipment and storage medium |
CN116056184B (en) * | 2022-05-27 | 2023-11-07 | 荣耀终端有限公司 | Network access method, system, electronic equipment and storage medium |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
CN116113012B (en) * | 2023-04-14 | 2023-07-21 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109756915B (en) | 2022-08-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109756915A (en) | A kind of wireless network management method and system | |
CN108337677B (en) | Network authentication method and device | |
EP1679843B1 (en) | Security group management system | |
US8931034B2 (en) | System, method, and policy engine for granting temporary access to electronic content | |
CN103327084B (en) | The cloud storage system of a kind of public and private mixed distribution formula and cloud storage method | |
US9178915B1 (en) | Cookie preservation when switching devices | |
CN105723761A (en) | Sharing of credentials for a wi-fi network based on social network contacts | |
US8396220B2 (en) | System and method of mobile content sharing and delivery in an integrated network environment | |
CN109076087A (en) | It is shared to the outside based on group of electronic data | |
CN102428446B (en) | Data backup system | |
CN105471956A (en) | User safety control method of social network, social application tool and terminal | |
CN102394935A (en) | Wireless shared storage system and wireless shared storage method thereof | |
US20160028717A1 (en) | Method and device for controlling the access to digital content | |
CN108337210A (en) | Equipment configuration method and device, system | |
KR101119206B1 (en) | A system for controlled access to information contained in a terminal | |
CN103905514B (en) | Server, terminal device and network data access authority management method | |
CN110445873A (en) | A kind of cloud platform service cut-in method and Redirect Server | |
JP2006155108A (en) | Network service system using user tentative identifier | |
CN106559787A (en) | Method for network access, apparatus and system | |
CN102929947A (en) | Data processing method and device | |
US11405398B2 (en) | Information processing apparatus, information processing system, and information processing method | |
JP2014089571A (en) | Server device, content sharing system, program and application software | |
US8751673B2 (en) | Authentication apparatus, authentication method, and data using method | |
CN114760112A (en) | Wireless local area network-oriented intelligent household equipment network access method, system, equipment and storage medium | |
WO2019080314A1 (en) | Method for configuring authority in router, authority configuration system and router |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |