CN110831008A - Access equipment control method and related device - Google Patents

Access equipment control method and related device Download PDF

Info

Publication number
CN110831008A
CN110831008A CN201911067516.7A CN201911067516A CN110831008A CN 110831008 A CN110831008 A CN 110831008A CN 201911067516 A CN201911067516 A CN 201911067516A CN 110831008 A CN110831008 A CN 110831008A
Authority
CN
China
Prior art keywords
terminal
network access
constraint condition
access
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911067516.7A
Other languages
Chinese (zh)
Inventor
杨鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201911067516.7A priority Critical patent/CN110831008A/en
Publication of CN110831008A publication Critical patent/CN110831008A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses an access equipment control method, which is applied to first relay equipment, wherein the first relay equipment is accessed to a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless mode, the first relay equipment is in communication connection with a first terminal of a user owner user in a wireless high-fidelity Wi-Fi mode, and the method comprises the following steps: receiving a network access request from a second terminal; acquiring a network access constraint condition currently started by local terminal equipment; and judging that the second terminal meets the network access constraint condition, and accessing the second terminal. Therefore, the second terminal is accessed by judging that the second terminal meets the network access constraint condition, and the security of the local terminal equipment accessing the second terminal is improved so as to improve the security of wireless network access.

Description

Access equipment control method and related device
Technical Field
The present application relates to the field of wireless communications technologies, and in particular, to an access device control method and a related apparatus.
Background
With the development of network technology, the coverage area and network quality of mobile networks are also continuously improved, and the user scale is also large. People use networks more and more frequently, and network security is gradually emphasized. The use frequency of the wireless network becomes high, and the security of the wireless network is valued accordingly when the mass communication equipment is accessed.
In the aspect of access of mass communication equipment in the existing wireless network technology, the user privacy is leaked only by accessing a password into a wireless network, and the access control safety of the wireless communication equipment is not high and inconvenient.
Disclosure of Invention
The embodiment of the application provides an access device control method and a related device, aiming at improving the security of access device control in a wireless network.
In a first aspect, an embodiment of the present application provides an access device control method, which is applied to a first relay device, where the first relay device accesses a fourth-generation mobile communication technology 4G or a fifth-generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a user owner through a wireless high-fidelity Wi-Fi standard, where the method includes:
receiving a network access request from a second terminal;
acquiring a network access constraint condition which is currently started by home terminal equipment, wherein the network access constraint condition is used for limiting that the second terminal cannot directly perform network access through a password, and the network constraint condition comprises a user-defined constraint condition configured by a user through the first terminal;
and judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
In a second aspect, an access device control apparatus provided in an embodiment of the present application is applied to a first relay device, where the first relay device accesses a fourth-generation mobile communication technology 4G or a fifth-generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a user owner through a wireless high-fidelity Wi-Fi standard, and the apparatus includes:
a receiving unit for receiving a network access request from a second terminal;
an obtaining unit, configured to obtain a network access constraint condition currently enabled by a home device, where the network access constraint condition is used to limit that the second terminal cannot directly perform network access through a password, and the network constraint condition includes a user-defined constraint condition configured by a user through the first terminal;
and the processing unit is used for judging that the second terminal meets the network access constraint condition and accessing the second terminal.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in any one of the methods of the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. The method comprises the steps of receiving a network access request of a second terminal, obtaining a network access constraint condition started by the local terminal equipment at present, judging that the second terminal meets the network access constraint condition, and accessing the second terminal, so that the security of the local terminal equipment accessing the second terminal is improved, and the security of wireless network access is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is an exemplary architecture diagram of an access device control system provided in an embodiment of the present application;
fig. 2a is a schematic flowchart of an access device control method according to an embodiment of the present application;
fig. 2b is an interaction diagram of access device control according to an embodiment of the present application;
fig. 2c is an interaction diagram of another access device control provided in the embodiment of the present application;
fig. 3 is a schematic flowchart of another access device control method according to an embodiment of the present application;
fig. 4 is a flowchart illustrating a further method for controlling an access device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 6 is a block diagram illustrating functional units of an access device control apparatus according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic device according to the embodiments of the present application may be an electronic device with communication capability, and the electronic device may include various handheld devices with wireless communication function, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, and various forms of User Equipment (UE), Mobile Stations (MS), terminal devices (terminal device), and so on.
Currently, a router or a Customer Premises Equipment (CPE) device only has two schemes of enabling and not enabling, and Wi-Fi needs to be turned on when needed, and brute force cracking may exist when the Wi-Fi is turned on.
The following describes embodiments of the present application in detail.
Referring to fig. 1, fig. 1 is an exemplary architecture diagram of a wireless network system according to an embodiment of the present application, where the first relay device accesses a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a user owner through a wireless high-fidelity Wi-Fi system.
In order to solve the problem, an embodiment of the present application provides an access device control method, specifically as shown in fig. 2a, the method may include, but is not limited to, the following steps:
s201, receiving a network access request from a second terminal.
The execution subject of receiving the network access request from the second terminal is an electronic device, which may be a wireless communication device, such as a 4G Customer Premises Equipment (CPE) device or a 5G CPE device.
The network access request from the second terminal comprises request time, the equipment name of the second terminal and a request access password.
In particular implementations, the second terminal may be a communication capable electronic device that may include various wireless enabled handheld devices, vehicle mounted devices, wearable devices, computing devices or other processing devices connected to a wireless modem, as well as various forms of user equipment, mobile stations, terminal devices, and the like.
S202, obtaining a network access constraint condition which is currently started by the home terminal equipment, wherein the network access constraint condition is used for limiting that the second terminal cannot directly perform network access through a password, and the network constraint condition comprises a user-defined constraint condition configured by the user through the first terminal.
The first terminal may be a communication-capable electronic device, which may include various handheld devices with wireless communication capabilities, vehicle-mounted devices, wearable devices, computing devices or other processing devices connected to wireless modems, as well as various forms of user equipment, mobile stations, terminal devices, and so forth.
The network access constraints may be conditions including at least one of: the access mode comprises an access mode accessing the second terminal, a time period capable of being directly accessed, a second terminal capable of being accessed through a password and a second terminal prohibited from being accessed, wherein the access mode can be access through the password, direct access through a WPS key, direct access through a history access record and a distance between an access terminal and the current segment of equipment.
Wherein the network access constraints further comprise: the network type of the selected access. The network type may be a 4G network, and may be a 5G network.
The network access constraint condition may be factory setting, or may be server dynamic setting.
Wherein the custom constraint condition may include at least one of the following: the access mode comprises an access mode accessing the second terminal, a time period capable of being directly accessed, a second terminal capable of being accessed through a password and a second terminal prohibited from being accessed, wherein the access mode can be access through the password, direct access through a WPS key, direct access through a history access record and a distance between an access terminal and the current segment of equipment.
Wherein the custom constraint further comprises: the network type of the selected access. The network type may be a 4G network, and may be a 5G network.
In a specific implementation, the user may configure the custom constraint condition through a manner of a custom constraint condition configured by the first terminal, such as through an Application (APP) software management manner configured by the first terminal.
The embodiments of the present application will be described in detail below with reference to a specific example.
For example, in a home wireless network, in order to protect the security of private data of a user, the user can select an access mode of the home wireless network through the APP software control on a mobile phone: it is specified that the first user is allowed to directly access the home wireless network from 7 am to 9 am, and the first user is allowed to access the home wireless network through the password at other times. The mobile phone of the first user can directly access the home wireless network from 7 a.m. to 9 a.m., and the mobile phone of the first user needs to access the home wireless network through the password at other times except the period from 7 a.m. to 9 a.m.
S203, judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
In a specific implementation, when the second terminal meets the network access constraint condition, the electronic device accesses the second terminal. For example, the network access constraint condition is: designating that the second terminal can directly access the electronic device during a time period from 7 am to 9 am of each day; the electronic device is unable to access the second terminal during the time period of each day other than 7 am to 9 am. Thus, the electronic device may access the second terminal directly during the time period from 7 am to 9 am of each day. And when receiving an access application of a third terminal of the same terminal as the second terminal, judging that the third terminal does not meet the network access constraint condition and does not access the third terminal.
The specific steps of determining that the second terminal satisfies the network access constraint condition and accessing the second terminal are described in detail below by using a specific example.
For example, fig. 2b is an interaction diagram of access device control provided in an embodiment of the present application.
Fig. 2c is an interaction diagram of another access device control provided in the embodiment of the present application. It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. The method comprises the steps of receiving a network access request of a second terminal, obtaining a network access constraint condition from a first terminal started by local equipment at present, judging that the second terminal meets the network access constraint condition, and accessing the second terminal so as to improve the security of wireless network access.
In one possible example, the determining that the second terminal satisfies the network access constraint condition includes: acquiring historical access equipment information; judging whether the network access request is consistent with the historical access equipment information in comparison; and if so, judging that the second terminal meets the network access constraint condition.
Wherein the historical access device information comprises at least one of: the name of the historical access equipment, the historical access time and the historical access times.
In a specific implementation, the historical access device information is used to determine whether the second terminal satisfies the network access constraint condition.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Acquiring historical equipment information by receiving a network access request of a second terminal and acquiring a network access constraint condition which is started by local equipment at present, and judging whether the network access request is consistent with the historical access equipment information in comparison; and if so, judging that the second terminal meets the network access constraint condition, and accessing the second terminal. The safety of the access equipment is determined through the historical access information so as to improve the safety of wireless network access.
In one possible example, the determining whether the comparison between the network access request and the historical access device information is consistent includes: calculating the historical access times of the second terminal; judging whether the historical access times are larger than a first threshold value or not; if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
The first threshold may be factory setting, or may be set by the user through the APP of the first terminal.
In particular implementations, the first threshold may be 1, 2, 3, 4, 6, 5, 7, 10, 8, 15, 12, 20, 25, 30, 22, 28, 50, 40.
In a specific implementation, historical access times of the second terminal are calculated, wherein the historical access times comprise historical successful access times and historical unsuccessful access times; judging whether the historical access times are larger than a first threshold value or not; if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. The method comprises the steps that a network access request of a second terminal is received, and a network access constraint condition started currently by a local terminal device is obtained, so that the historical access times of the second terminal are calculated; judging whether the historical access times are larger than a first threshold value or not; if so, judging that the network access request is consistent with the historical access equipment information in comparison, judging that the second terminal meets the network access constraint condition, accessing the second terminal, and ensuring the security of the accessed second terminal so as to improve the security of wireless network access.
In one possible example, the determining that the second terminal satisfies the network access constraint condition includes: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining accessible equipment information according to the custom constraint condition; judging whether the network access request is consistent with the information comparison of the accessible equipment; and if so, judging that the second terminal meets the network access constraint condition.
The accessible device information includes terminal information that can be directly accessed to the electronic device and device information that prohibits access to the device.
The accessible device information comprises a terminal name of terminal information of the electronic device which is directly accessed or is forbidden to be accessed, corresponding access password information and corresponding time information which can be directly accessed.
In specific implementation, the specific steps of determining whether the comparison between the network access request and the accessible device information is consistent are as follows: determining equipment information of a second terminal according to the network access request; judging whether the equipment information of the second terminal is consistent with the accessible equipment information; and if so, judging that the second terminal meets the network access constraint condition.
The embodiments of the present application will be described in detail below with reference to a specific example.
For example, when the accessible device name of the accessible device information determined in the custom constraint condition is the device name "minuscule handset 1234" of the second terminal, the device information of the second terminal is determined according to the received network access request, and the device name "minuscule handset 1234" of the second terminal is determined according to the device information of the second terminal; judging that the equipment name of the second terminal is consistent with the name of the accessible equipment; and judging that the second terminal meets the network access constraint condition.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Determining accessible device information according to the custom constraint condition; judging whether the network access request is consistent with the information comparison of the accessible equipment; and if so, judging that the second terminal meets the network access constraint condition, and accessing the second terminal. And the security of the accessed second terminal is improved so as to improve the security of wireless network access.
In one possible example, the determining that the second terminal satisfies the network access constraint condition includes: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining a network access time period according to the user-defined constraint condition, wherein the network access time period is used for the second terminal to directly perform network access; acquiring a current time point; judging whether the current time point is in the network access time period or not; and if so, judging that the second terminal meets the network access constraint condition.
In a specific implementation, in a network access period in a custom constraint condition, when the electronic device receives a network access request from the second terminal, the electronic device directly accesses the second network terminal.
The embodiments of the present application will be described in detail below with reference to a specific example.
For example, the time period from 7 am to 9 am is set as the network access period in the custom constraint, and the time except the time period from 7 am to 9 am is the non-network access period. The electronic equipment receives the network access request from the second terminal at 8 o' clock of the morning
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Determining a network access time period according to the user-defined constraint condition, wherein the network access time period is used for the second terminal to directly perform network access; acquiring a current time point; judging whether the current time point is in the network access time period or not; if so, judging that the second terminal meets the network access constraint condition, accessing the second terminal, improving the flexibility of an access equipment mode, and improving the safety of the accessed second terminal so as to improve the safety of wireless network access.
In one possible example, the determining that the second terminal satisfies the network access constraint condition includes: acquiring a custom constraint condition from the first terminal; judging whether the second terminal is prohibited from performing network access through password access in the user-defined condition; if so, acquiring a Wi-Fi protected setup (WPS) key instruction, wherein the WPS key instruction is used for the second terminal to directly perform network access; and judging that the second terminal meets the network access constraint condition according to the WPS key instruction.
In specific implementation, a user-defined constraint condition from the first terminal is obtained; judging whether the second terminal is prohibited from performing network access through password access in the user-defined condition; if yes, obtaining a WPS key instruction; and judging that the second terminal meets the network access constraint condition according to the WPS key instruction.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Network access is carried out by judging whether the second terminal is forbidden to access through a password in the user-defined condition; if so, acquiring a Wi-Fi Protected Setup (WPS) key instruction, wherein the WPS key instruction is used for the second terminal to directly perform network access; and judging that the second terminal meets the network access constraint condition according to the WPS key instruction, accessing the second terminal, and improving the security of the accessed second terminal so as to improve the security of wireless network access.
In one possible example, the method further comprises: and if the second terminal is not successfully accessed under the condition that the second terminal meets the network access constraint condition, accessing the second terminal.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. The second terminal is accessed by receiving a network access request of the second terminal and acquiring a network access constraint condition which is currently started by the local terminal equipment and judging that the second terminal meets the network access constraint condition, and if the second terminal is not successfully accessed, the second terminal is accessed, so that the access efficiency of accessing the second terminal is improved.
Consistent with the embodiment shown in fig. 2a, please refer to fig. 3, where fig. 3 is another access device control method provided in the embodiment of the present application, and is applied to a first relay device, where the first relay device accesses a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a user owner through a wireless high-fidelity Wi-Fi standard, where the access device control method includes:
s301, receiving a network access request from the second terminal.
S302, obtaining a network access constraint condition which is currently started by the home terminal equipment, wherein the network access constraint condition is used for limiting that the second terminal cannot directly perform network access through a password, and the network constraint condition comprises a user-defined constraint condition configured by the user through the first terminal.
S303, obtaining historical access equipment information.
S304, calculating the historical access times of the second terminal.
S305, judging whether the historical access times are larger than a first threshold value.
S306, if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
And S307, judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
S308, if the second terminal is not successfully accessed under the condition that the second terminal is judged to meet the network access constraint condition, accessing the second terminal.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. The second terminal is accessed by receiving a network access request of the second terminal and acquiring a network access constraint condition which is currently started by the local terminal equipment and judging that the second terminal meets the network access constraint condition, and if the second terminal is not successfully accessed, the second terminal is accessed, so that the access efficiency of accessing the second terminal is improved.
Consistent with the embodiment shown in fig. 2a, please refer to fig. 4, where fig. 4 is still another access device control method provided in an embodiment of the present application, and is applied to a first relay device, where the first relay device accesses a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a user owner through a wireless high-fidelity Wi-Fi standard, where the access device control method includes:
s401, receiving a network access request from a second terminal.
S402, obtaining a self-defined network access constraint condition from the first terminal, wherein the network access constraint condition is used for limiting that the second terminal cannot directly access the network through the password, and the network constraint condition comprises the self-defined constraint condition configured by the user through the first terminal.
S403, determining accessible device information according to the self-defined network access constraint condition, and judging whether the network access request is consistent with the accessible device information in comparison.
And S404, if so, determining a network access time period according to the self-defined network access constraint condition, wherein the network access time period is used for the second terminal to directly perform network access.
S405, acquiring a current time point, and judging whether the current time point is in the network access time period.
And S406, if yes, judging whether the terminal is prohibited from performing network access through password access in the user-defined condition.
S407, judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
S408, if the second terminal is not successfully accessed under the condition that the second terminal is judged to meet the network access constraint condition, accessing the second terminal.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Determining a network access time period and whether the terminal is prohibited from performing network access through password access according to the customized network access constraint condition by acquiring the customized network access constraint condition from the first terminal; and judging that the second terminal meets the network access constraint condition according to whether the terminal is prohibited from performing network access through password access or not in the access network access time period, and accessing the second terminal. And improving the access efficiency of accessing the second terminal.
In one possible example, please refer to fig. 5, fig. 5 is a schematic structural diagram of an electronic device 500 according to an embodiment of the present application, and as shown in the figure, the electronic device 500 includes an application processor 510, a memory 520, a communication interface 530, and one or more programs 521, where the one or more programs 521 are stored in the memory 520 and configured to be executed by the application processor 510, and the one or more programs 521 include instructions for performing the following steps:
receiving a network access request from a second terminal;
acquiring a network access constraint condition which is currently started by home terminal equipment, wherein the network access constraint condition is used for limiting that the second terminal cannot directly perform network access through a password, and the network constraint condition comprises a user-defined constraint condition configured by a user through the first terminal;
and judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
In one possible example, in terms of the determination that the second terminal satisfies the network access constraint, the instructions in the program are specifically configured to: acquiring historical access equipment information; judging whether the network access request is consistent with the historical access equipment information in comparison; and if so, judging that the second terminal meets the network access constraint condition.
In one possible example, in the aspect of determining whether the comparison between the network access request and the historical access device information is consistent, the instructions in the program are specifically configured to perform the following operations: calculating the historical access times of the second terminal; judging whether the historical access times are larger than a first threshold value or not; if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
In one possible example, in terms of the determination that the second terminal satisfies the network access constraint, the instructions in the program are specifically configured to: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining accessible equipment information according to the custom constraint condition; judging whether the network access request is consistent with the information comparison of the accessible equipment; and if so, judging that the second terminal meets the network access constraint condition.
In one possible example, in terms of the determination that the second terminal satisfies the network access constraint, the instructions in the program are specifically configured to: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining a network access time period according to the user-defined constraint condition, wherein the network access time period is used for the second terminal to directly perform network access; acquiring a current time point; judging whether the current time point is in the network access time period or not; and if so, judging that the second terminal meets the network access constraint condition.
In one possible example, in terms of the determination that the second terminal satisfies the network access constraint, the instructions in the program are specifically configured to: acquiring a custom constraint condition from the first terminal; judging whether the second terminal is prohibited from performing network access through password access in the user-defined condition; if so, acquiring a Wi-Fi Protected Setup (WPS) key instruction, wherein the WPS key instruction is used for the second terminal to directly perform network access; and judging that the second terminal meets the network access constraint condition according to the WPS key instruction.
In one possible example, the instructions in the program are specifically for performing the following: and if the second terminal is not successfully accessed under the condition that the second terminal meets the network access constraint condition, accessing the second terminal.
It can be seen that the access device control method and the related apparatus described in the embodiments of the present application are applied to the first relay device. Determining a network access time period and whether the terminal is prohibited from performing network access through password access according to the customized network access constraint condition by acquiring the customized network access constraint condition from the first terminal; and judging that the second terminal meets the network access constraint condition according to whether the terminal is prohibited from performing network access through password access or not in the access network access time period, and accessing the second terminal. And improving the access efficiency of accessing the second terminal.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 6 is a block diagram illustrating functional units of an access device control apparatus 600 according to an embodiment of the present disclosure. An access device control apparatus 600 is applied to a first relay device, where the first relay device accesses a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless manner, and the first relay device is in communication connection with a first terminal of a householder user in a wireless high-fidelity Wi-Fi system, and the access device control apparatus includes: a receiving unit 601, an acquiring unit 602, and a processing unit 603.
The receiving unit 601 is configured to receive a network access request from a second terminal; the acquiring unit is configured to acquire a network access constraint condition currently enabled by a home device, where the network access constraint condition is used to limit that the second terminal cannot directly perform network access through a password, and the network constraint condition includes a user-defined constraint condition configured by a user through the first terminal; and the processing unit is used for judging that the second terminal meets the network access constraint condition and accessing the second terminal.
In a possible example, in terms of the determination that the second terminal satisfies the network access constraint condition, the processing unit 603 is specifically configured to: acquiring historical access equipment information; judging whether the network access request is consistent with the historical access equipment information in comparison; and if so, judging that the second terminal meets the network access constraint condition.
In a possible example, in the aspect of determining whether the comparison between the network access request and the historical access device information is consistent, the processing unit 603 is specifically configured to: calculating the historical access times of the second terminal; judging whether the historical access times are larger than a first threshold value or not; if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
In a possible example, in terms of the determination that the second terminal satisfies the network access constraint condition, the processing unit 603 is specifically configured to: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining accessible equipment information according to the custom constraint condition; judging whether the network access request is consistent with the information comparison of the accessible equipment; and if so, judging that the second terminal meets the network access constraint condition.
In a possible example, in terms of the determination that the second terminal satisfies the network access constraint condition, the processing unit 603 is specifically configured to: obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access; determining a network access time period according to the user-defined constraint condition, wherein the network access time period is used for the second terminal to directly perform network access; acquiring a current time point; judging whether the current time point is in the network access time period or not; and if so, judging that the second terminal meets the network access constraint condition.
In a possible example, in terms of the determination that the second terminal satisfies the network access constraint condition, the processing unit 603 is specifically configured to: acquiring a custom constraint condition from the first terminal; judging whether the second terminal is prohibited from performing network access through password access in the user-defined condition; if so, acquiring a Wi-Fi Protected Setup (WPS) key instruction, wherein the WPS key instruction is used for the second terminal to directly perform network access; and judging that the second terminal meets the network access constraint condition according to the WPS key instruction.
In one possible example, the processing unit 603 is specifically configured to: and if the second terminal is not successfully accessed under the condition that the second terminal meets the network access constraint condition, accessing the second terminal.
The access device control apparatus 600 may further include a storage unit 604 for storing program codes and data of the electronic device. The processing unit 603 may be a processor, the receiving unit 601 may be a touch display screen or a transceiver, and the storage unit 604 may be a memory.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. An access equipment control method is applied to first relay equipment, the first relay equipment is accessed to a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network in a wireless mode, the first relay equipment is in communication connection with a first terminal of a householder user in a wireless high fidelity Wi-Fi mode, and the method comprises the following steps:
receiving a network access request from a second terminal;
acquiring a network access constraint condition which is currently started by home terminal equipment, wherein the network access constraint condition is used for limiting that the second terminal cannot directly perform network access through a password, and the network constraint condition comprises a user-defined constraint condition configured by a user through the first terminal;
and judging that the second terminal meets the network access constraint condition, and accessing the second terminal.
2. The method of claim 1, wherein the determining that the second terminal satisfies the network access constraint condition comprises:
acquiring historical access equipment information;
judging whether the network access request is consistent with the historical access equipment information in comparison;
and if so, judging that the second terminal meets the network access constraint condition.
3. The method of claim 2, wherein the determining whether the network access request matches the historical access device information comprises:
calculating the historical access times of the second terminal;
judging whether the historical access times are larger than a first threshold value or not;
if yes, the network access request is judged to be consistent with the historical access equipment information in comparison.
4. The method of claim 1, wherein the determining that the second terminal satisfies the network access constraint condition comprises:
obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access;
determining accessible equipment information according to the custom constraint condition;
judging whether the network access request is consistent with the information comparison of the accessible equipment;
and if so, judging that the second terminal meets the network access constraint condition.
5. The method of claim 1, wherein the determining that the second terminal satisfies the network access constraint condition comprises:
obtaining a user-defined constraint condition from the first terminal, wherein the user-defined constraint condition is used for the second terminal to carry out network access;
determining a network access time period according to the user-defined constraint condition, wherein the network access time period is used for the second terminal to directly perform network access;
acquiring a current time point;
judging whether the current time point is in the network access time period or not;
and if so, judging that the second terminal meets the network access constraint condition.
6. The method of claim 1, wherein the determining that the second terminal satisfies the network access constraint condition comprises:
acquiring a custom constraint condition from the first terminal;
judging whether the second terminal is prohibited from performing network access through password access in the user-defined condition;
if so, acquiring a WPS key instruction for setting Wi-Fi safety protection, wherein the WPS key instruction is used for the second terminal to directly perform network access;
and judging that the second terminal meets the network access constraint condition according to the WPS key instruction.
7. The method according to any one of claims 1-6, further comprising:
and if the second terminal is not successfully accessed under the condition that the second terminal meets the network access constraint condition, accessing the second terminal.
8. An access device control apparatus, applied to a first relay device, where the first relay device wirelessly accesses a fourth generation mobile communication technology 4G or a fifth generation mobile communication technology 5G mobile communication network, and the first relay device is in communication connection with a first terminal of a householder user through a wireless high-fidelity Wi-Fi standard, the apparatus comprising:
a receiving unit for receiving a network access request from a second terminal;
an obtaining unit, configured to obtain a network access constraint condition currently enabled by a home device, where the network access constraint condition is used to limit that the second terminal cannot directly perform network access through a password, and the network constraint condition includes a user-defined constraint condition configured by a user through the first terminal;
and the processing unit is used for judging that the second terminal meets the network access constraint condition and accessing the second terminal.
9. An electronic device comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any of claims 1-7.
10. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-7.
CN201911067516.7A 2019-11-04 2019-11-04 Access equipment control method and related device Pending CN110831008A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911067516.7A CN110831008A (en) 2019-11-04 2019-11-04 Access equipment control method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911067516.7A CN110831008A (en) 2019-11-04 2019-11-04 Access equipment control method and related device

Publications (1)

Publication Number Publication Date
CN110831008A true CN110831008A (en) 2020-02-21

Family

ID=69552402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911067516.7A Pending CN110831008A (en) 2019-11-04 2019-11-04 Access equipment control method and related device

Country Status (1)

Country Link
CN (1) CN110831008A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918266A (en) * 2020-09-10 2020-11-10 Oppo广东移动通信有限公司 Communication connection method, device, storage medium and electronic equipment

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1924114A2 (en) * 2006-11-20 2008-05-21 Broadcom Corporation Wireless access point operation based upon historical information
CN102883320A (en) * 2012-09-18 2013-01-16 东莞宇龙通信科技有限公司 WiFi (Wireless Fidelity) authentication method and system thereof
CN103987130A (en) * 2014-05-16 2014-08-13 北京奇虎科技有限公司 Terminal access method, device and system based on WIFI equipment
CN104967997A (en) * 2015-05-28 2015-10-07 广东欧珀移动通信有限公司 Wireless network accessing method, Wi-Fi equipment, terminal equipment and system
CN105165065A (en) * 2013-05-03 2015-12-16 华为技术有限公司 Access control method and device
CN105554845A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Access method, router, and terminal
CN105636046A (en) * 2014-11-26 2016-06-01 中国电信股份有限公司 Credible access control method and system for WiFi device
CN105657712A (en) * 2016-01-06 2016-06-08 广东欧珀移动通信有限公司 Access control method and device of WiFi hotspot
CN106535196A (en) * 2016-11-30 2017-03-22 努比亚技术有限公司 Routing equipment, terminal and method for controlling WiFi access
CN106658496A (en) * 2015-10-31 2017-05-10 东莞酷派软件技术有限公司 WIFI access control method, related device and system
CN106982430A (en) * 2017-03-22 2017-07-25 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system based on user's use habit
CN107086999A (en) * 2013-09-13 2017-08-22 华为终端有限公司 Processing method, Wireless Communication Equipment and its processor of Wireless Communication Equipment
CN107466088A (en) * 2016-06-06 2017-12-12 西安中兴新软件有限责任公司 A kind of WiFi cut-in methods and device
CN107548063A (en) * 2017-09-14 2018-01-05 上海斐讯数据通信技术有限公司 A kind of method, apparatus and wireless router for automatically accessing AP
CN108064042A (en) * 2017-11-09 2018-05-22 捷开通讯(深圳)有限公司 Wireless connection method, wireless access point, terminal and the device with store function
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1924114A2 (en) * 2006-11-20 2008-05-21 Broadcom Corporation Wireless access point operation based upon historical information
CN102883320A (en) * 2012-09-18 2013-01-16 东莞宇龙通信科技有限公司 WiFi (Wireless Fidelity) authentication method and system thereof
CN105165065A (en) * 2013-05-03 2015-12-16 华为技术有限公司 Access control method and device
CN107086999A (en) * 2013-09-13 2017-08-22 华为终端有限公司 Processing method, Wireless Communication Equipment and its processor of Wireless Communication Equipment
CN103987130A (en) * 2014-05-16 2014-08-13 北京奇虎科技有限公司 Terminal access method, device and system based on WIFI equipment
CN105636046A (en) * 2014-11-26 2016-06-01 中国电信股份有限公司 Credible access control method and system for WiFi device
CN104967997A (en) * 2015-05-28 2015-10-07 广东欧珀移动通信有限公司 Wireless network accessing method, Wi-Fi equipment, terminal equipment and system
CN105554845A (en) * 2015-07-31 2016-05-04 宇龙计算机通信科技(深圳)有限公司 Access method, router, and terminal
CN106658496A (en) * 2015-10-31 2017-05-10 东莞酷派软件技术有限公司 WIFI access control method, related device and system
CN105657712A (en) * 2016-01-06 2016-06-08 广东欧珀移动通信有限公司 Access control method and device of WiFi hotspot
CN107466088A (en) * 2016-06-06 2017-12-12 西安中兴新软件有限责任公司 A kind of WiFi cut-in methods and device
CN106535196A (en) * 2016-11-30 2017-03-22 努比亚技术有限公司 Routing equipment, terminal and method for controlling WiFi access
CN106982430A (en) * 2017-03-22 2017-07-25 上海斐讯数据通信技术有限公司 A kind of portal authentication method and system based on user's use habit
CN107548063A (en) * 2017-09-14 2018-01-05 上海斐讯数据通信技术有限公司 A kind of method, apparatus and wireless router for automatically accessing AP
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system
CN108064042A (en) * 2017-11-09 2018-05-22 捷开通讯(深圳)有限公司 Wireless connection method, wireless access point, terminal and the device with store function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111918266A (en) * 2020-09-10 2020-11-10 Oppo广东移动通信有限公司 Communication connection method, device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US11689577B2 (en) Method and system for operating and monitoring permissions for applications in an electronic device
EP2416600A1 (en) Wi-fi access method, access point and wi-fi access system
CN108521644B (en) Network access method, equipment and system
US9420461B2 (en) Access authentication method and device for wireless local area network hotspot
JP6668407B2 (en) Terminal authentication method and apparatus used in mobile communication system
CN111464934B (en) Data transmission system, method and device
US20060111125A1 (en) Location-based authentication of wireless terminal
CN106412901B (en) Anti-network-rubbing wireless routing method and routing system
EP3675541B1 (en) Authentication method and device
CN102149092A (en) Method and device for processing user illegal access
CN112995895B (en) Network sharing method, device, terminal and computer readable storage medium
CN105323294A (en) Intelligent terminal authority control method and device
CN111770094B (en) Access control method of wireless network and related device
CN111031545A (en) Wireless network access control method and device, relay equipment and electronic equipment
CN110831008A (en) Access equipment control method and related device
KR20110052635A (en) Method for managing a telecommunication network and associated devices
CN110611913B (en) Wireless network access method, system management platform and access system for nuclear power plant
CN110267308B (en) Mobile access point management method and device, server and storage medium
CN105681352A (en) Wi-Fi access security control method and system
CN105472616B (en) Wireless access point connection method and electronic equipment
CN106851639B (en) WiFi access method and access point
CN106255173B (en) Wireless access method and routing device
CN108769989B (en) Wireless network connection method, wireless access device and equipment
KR101723957B1 (en) Network access controller for personal wireless router
CN112438058A (en) System message updating method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200221

RJ01 Rejection of invention patent application after publication