CN112261653A - Method and equipment for managing shared users of wireless access point - Google Patents

Method and equipment for managing shared users of wireless access point Download PDF

Info

Publication number
CN112261653A
CN112261653A CN202010943512.7A CN202010943512A CN112261653A CN 112261653 A CN112261653 A CN 112261653A CN 202010943512 A CN202010943512 A CN 202010943512A CN 112261653 A CN112261653 A CN 112261653A
Authority
CN
China
Prior art keywords
information
access point
wireless access
user
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010943512.7A
Other languages
Chinese (zh)
Other versions
CN112261653B (en
Inventor
郑孝平
李致渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN202010943512.7A priority Critical patent/CN112261653B/en
Publication of CN112261653A publication Critical patent/CN112261653A/en
Application granted granted Critical
Publication of CN112261653B publication Critical patent/CN112261653B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application aims to provide a method and equipment for managing shared users of a wireless access point, wherein the method comprises the following steps: in response to an authority confirming triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, the first user equipment generates authority confirming code information corresponding to the authority confirming triggering operation; providing the authorization code information to a second user; and receiving the right confirming result information corresponding to the right confirming triggering operation sent by the server corresponding to the target application. The method and the device greatly simplify the operation steps of confirming the identity of the user sharing the wireless access point, and effectively ensure the identity rights and interests of the user sharing the wireless access point, so that more users are further encouraged to actively share the wireless access point, the equipment interconnection is promoted, the message acquisition efficiency is improved, and the user experience is improved.

Description

Method and equipment for managing shared users of wireless access point
Technical Field
The present application relates to the field of communications, and in particular, to a technique for managing shared users of wireless access points.
Background
With the development of internet technology, people have an increasing demand for wireless networks. Many merchants install wireless routing equipment in their places of business and share the connection information of the wireless access points corresponding to the wireless routing equipment, so that the customers can conveniently connect to the Internet.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for managing shared users of a wireless access point.
According to an aspect of the present application, a method for managing shared users of a wireless access point at a first user equipment is provided, where the method includes:
responding to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, and generating right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use of other user equipment;
providing the authorization code information to a second user;
and receiving the right confirming result information corresponding to the right confirming triggering operation sent by the server corresponding to the target application.
According to another aspect of the present application, a method for managing a shared user of a wireless access point at a second user equipment is provided, where the method includes:
scanning right code information provided by first user equipment through a target application, and extracting first wireless access point information and first user identification information from the right code information;
comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
According to another aspect of the present application, a method for managing shared users of a wireless access point at a server side is provided, and the method includes:
receiving matching result information which is sent by second user equipment and is about right-confirming code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the right-confirming code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application;
determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information;
and providing the right confirmation result information to the first user equipment corresponding to the first user identification information.
According to an aspect of the present application, there is provided a method for managing shared users of a wireless access point, the method comprising:
in response to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, the first user equipment generates right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared to the target application by the first user for connection and use of other user equipment; the first user equipment provides the authority code information to a second user;
the second user equipment scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information; comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; if yes, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information;
the server receives matching result information which is sent by the second user equipment and is about the authority code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the authority code information by the second user equipment; determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information, where the first user identification information is the identification information of the first user in the target application; providing the right confirmation result information to first user equipment corresponding to the first user identification information;
and the first user equipment receives the right confirmation result information corresponding to the right confirmation triggering operation sent by the server corresponding to the target application.
According to an aspect of the present application, there is provided an apparatus for managing shared users of a wireless access point, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
responding to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, and generating right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use of other user equipment;
providing the authorization code information to a second user;
and receiving the right confirming result information corresponding to the right confirming triggering operation sent by the server corresponding to the target application.
According to another aspect of the present application, there is provided an apparatus for managing shared users of a wireless access point, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
scanning right code information provided by first user equipment through a target application, and extracting first wireless access point information and first user identification information from the right code information;
comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
According to another aspect of the present application, there is provided an apparatus for managing shared users of a wireless access point, the apparatus comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving matching result information which is sent by second user equipment and is about right-confirming code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the right-confirming code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application;
determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information;
and providing the right confirmation result information to the first user equipment corresponding to the first user identification information.
According to one aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
responding to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, and generating right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use of other user equipment;
providing the authorization code information to a second user;
and receiving the right confirming result information corresponding to the right confirming triggering operation sent by the server corresponding to the target application.
According to another aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
scanning right code information provided by first user equipment through a target application, and extracting first wireless access point information and first user identification information from the right code information;
comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
According to another aspect of the application, there is provided a computer-readable medium storing instructions that, when executed, cause a system to:
receiving matching result information which is sent by second user equipment and is about right-confirming code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the right-confirming code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application;
determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information;
and providing the right confirmation result information to the first user equipment corresponding to the first user identification information.
According to an aspect of the present application, there is provided a first user equipment for managing shared users of a wireless access point, the first user equipment comprising:
a module, configured to generate, in response to a grant trigger operation initiated by a first user through a target application in first user equipment and related to a first wireless access point, grant code information corresponding to the grant trigger operation, where the grant code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use by other user equipment;
a second module for providing the authorization code information to a second user;
and the third module is used for receiving the right confirming result information corresponding to the right confirming triggering operation and sent by the server corresponding to the target application.
According to another aspect of the present application, there is provided a second user equipment for managing shared users of a wireless access point, the second user equipment comprising:
the first module is used for scanning the authorization code information provided by the first user equipment through the target application and extracting the first wireless access point information and the first user identification information from the authorization code information;
a second module, configured to compare whether the first wireless access point information and the wireless access point to which the second user equipment is currently connected are the same wireless access point; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
According to another aspect of the present application, there is provided a server for managing shared users of a wireless access point, the server including:
a third module, configured to receive matching result information about a weight-identifying code information, where the matching result information includes matching success information or matching failure information, and first wireless access point information and first user identification information, which are extracted from the weight-identifying code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application;
a third module, configured to determine, in response to the matching result information, right result information of the first user about a first wireless access point corresponding to the first wireless access point information;
and a third module, configured to provide the right confirmation result information to the first user equipment corresponding to the first user identification information.
Compared with the prior art, the method and the device have the advantages that the first user equipment initiates the authority confirmation of the wireless access point shared by the first user equipment in the target application, and the first user equipment provides the authority confirmation code information of the wireless access point generated in the target application to the second user. And the second user equipment scans the authorization code information through the target application for matching and sends matching result information to a server corresponding to the target application. The server determines the right confirming result information of the first user about the wireless access point according to the received matching result information and sends the right confirming result information to the first user equipment, so that the operation steps of confirming the identity of the user sharing the wireless access point are greatly simplified, the identity rights and interests of the user sharing the wireless access point are effectively guaranteed, more users are further encouraged to actively share the wireless access point, the equipment interconnection is promoted, the message obtaining efficiency is improved, and the user experience is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a system topology according to one embodiment of the present application;
fig. 2 is a flowchart illustrating a method for managing shared users of a wireless access point at a first user equipment according to an embodiment of the present application;
fig. 3 illustrates a user interface diagram for managing shared users of a wireless access point, according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating a method for managing shared users of a wireless access point at a second user equipment according to an embodiment of the present application;
fig. 5 is a flowchart illustrating a method for managing shared users of a wireless access point at a server according to an embodiment of the present application;
fig. 6 illustrates a flow diagram of a method for managing shared users of a wireless access point, according to one embodiment of the present application;
fig. 7 illustrates a first user equipment structure diagram for managing shared users of a wireless access point, according to an embodiment of the present application;
fig. 8 illustrates a second user equipment structure diagram for managing shared users of a wireless access point, according to an embodiment of the present application;
fig. 9 illustrates a server architecture diagram for managing shared users of a wireless access point, according to an embodiment of the present application;
FIG. 10 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include volatile Memory in a computer readable medium, Random Access Memory (RAM), and/or nonvolatile Memory such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 illustrates a system topology for managing shared users of a wireless access point, according to one embodiment of the present application. The system topological graph comprises a first user device, a second user device and a server. The first user equipment generates the authorization code information of the first wireless access point in the target application and provides the authorization code information to the second user equipment. And the second user equipment scans the right-confirming code information through the target application, extracts first wireless access point information and first user identification information, compares whether the first wireless access point information is the same as the currently connected wireless access point, determines corresponding matching result information and provides the matching result information to a server corresponding to the target application. And the server determines corresponding right confirming result information according to the matching result information and provides the right confirming result information to the first user equipment. The system determines whether the user corresponding to the first user equipment has the ownership information of the shared wireless access point or not by scanning the ownership code generated by the first user equipment through the second user equipment, greatly simplifies the operation steps of confirming the identity of the user sharing the wireless access point, and effectively ensures the identity rights of the user sharing the wireless access point, thereby further stimulating more users to actively share the wireless access point, promoting equipment interconnection, improving the message acquisition efficiency and improving the user experience.
Referring to the system shown in fig. 1, fig. 2 is a flowchart illustrating a method for managing shared users of a wireless access point at a first user equipment according to an embodiment of the present application, where the method includes steps S11, S12, and S13. In step S11, in response to an ack triggering operation initiated by a first user through a target application in a first user equipment with respect to a first wireless access point, the first user equipment generates ack code information corresponding to the ack triggering operation, where the ack code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection with other user equipments; in step S12, the first user device provides the authorization code information to the second user; in step S13, the first user equipment receives the authorization result information corresponding to the authorization triggering operation sent by the server corresponding to the target application.
In step S11, in response to an ack triggering operation initiated by a first user through a target application in a first user equipment with respect to a first wireless access point, the first user equipment generates ack code information corresponding to the ack triggering operation, where the ack code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection use by other user equipments. In some embodiments, the target application may be used for wireless access point sharing. If the first user shares the first wireless access point in the target application, the first user may initiate an affirmative triggering operation on the first wireless access point through a touch screen operation such as clicking, long pressing, or gesture in the target application, and confirm the identity of the first wireless access point manager in the target application, so as to clarify the identity of the first wireless access point manager in the target application.
In some embodiments, in response to a positive trigger action initiated by the first user through a target application in the first user device with respect to the first wireless access point, the first user device queries whether the first wireless access point can be positively authenticated. And if the first wireless access point is not authenticated, the first user equipment generates authentication code information corresponding to the authentication departure operation. And if the first wireless access point is authenticated, ignoring the authentication triggering operation, or displaying authenticated information of the first wireless access point or displaying prompt information of an authentication application in a window of the target application. The first user can initiate an entitlement complaint determination operation through the prompt information, the first user equipment sends entitlement complaint determination information submitted by the first user to the server, the server determines entitlement complaint result information of the first user about the first wireless access point according to the entitlement complaint determination information, and the server returns the entitlement complaint result information to the first user equipment, wherein the entitlement complaint determination information includes but is not limited to product characteristic information of wireless routing equipment corresponding to the first wireless access point, configuration information corresponding to the first wireless access point, and identity authentication information of the first user.
In some embodiments, in response to an authorization triggering operation initiated by a first user through a target application in a first user device, the first user device generates authorization code information corresponding to an authorization triggering operation according to first wireless access point information corresponding to a first wireless access point shared by the first user in the target application and first user identification information of the first user in the target application, where the authorization code information includes the first wireless access point information corresponding to the first wireless access point and the first user identification information of the first user in the target application. The first wireless access point information includes first wireless access point identification information and/or first wireless access point password information. The first user identification information comprises an identification which can uniquely distinguish the first user from other users, such as a user account number, a mobile phone number or a mailbox number of the first user in the target application. The authorization code information comprises a one-dimensional bar code or a two-dimensional code and other graphs which can record information.
It should be understood by those skilled in the art that the above mentioned identification code information such as one-dimensional bar code or two-dimensional code is only an example, and other existing or subsequent information carriers that carry information and can read the information by scanning may be applicable to this embodiment, and should be included in the scope of protection of this embodiment, and is incorporated herein by reference.
In step S12, the first user device provides the authorization code information to the second user. In some embodiments, the first user may present or project the privilege code information directly through the first user device so that a second user in the vicinity of the first user may scan the privilege code information through a target application in the second user device that the second user is using to assist in the first user's privilege. Or the first user provides the right code information to other users in the target application through the target application in the first user equipment. For example, the first user provides the authorization code information to other user equipment in the target application that has connected to the first wireless access point. Alternatively, the first user may send the authorization code information or the image containing the authorization code information to other users through other applications (e.g., social applications).
It will be understood by those skilled in the art that the above-listed methods of providing the authorization code information to the second user are only examples, and other existing or subsequent methods of providing information to other users may be applicable to this embodiment, and are included within the scope of the present embodiment and are incorporated herein by reference.
In step S13, the first user equipment receives the authorization result information corresponding to the authorization triggering operation sent by the server corresponding to the target application. In some embodiments, the right confirmation result information includes right confirmation success information of the first user with respect to the first wireless access point or right confirmation failure information of the first user with respect to the first wireless access point. The first user equipment may display the first user's authentication result information about the first wireless access point in a window of a target application. If the right confirmation result information comprises the right confirmation success information of the first user about the first wireless access point, the first user is a manager of the first wireless access point in the target application, and corresponding rights and interests can be configured for the first user in the target application. If the right confirmation result information comprises the right confirmation failure information of the first user about the first wireless access point, the first user fails in the right confirmation authentication, and the first user equipment can display prompt information in a window of a target application for prompting the first user to re-confirm the right or to apply to the right confirmation. The re-right-confirming means that the first user can initiate the right-confirming triggering operation again through the prompt message. The right-confirming complaint means that a first user can initiate a right-confirming complaint operation through the prompt information, first user equipment sends the right-confirming complaint information submitted by the first user to a server, a server end determines the right-confirming complaint result information of the first user about the first wireless access point according to the right-confirming complaint information, and the server end returns the right-confirming complaint result information to the first user equipment, wherein the right-confirming complaint information includes but is not limited to product characteristic information of wireless routing equipment corresponding to the first wireless access point, configuration information corresponding to the first wireless access point, and identity authentication information of the first user.
In some embodiments, the entitlement triggering operation comprises at least any one of: the first user performs a rights gain operation of the first wireless access point in a rights page of the target application; the first user performs the request-to-authenticate operation of the first wireless access point in a wireless access point page of the target application. In some embodiments, the first user includes one or more rights information corresponding to the first user in a rights page of the target application, wherein the rights information includes wireless access point information corresponding to the rights information. The first user performs a rights extraction operation on selected first rights information in a rights page of a target application, and the first user equipment generates right code information corresponding to the first rights information according to the first rights information, wherein the first rights information includes first wireless access point information corresponding to the first rights information, and the right code information includes the first wireless access point information and first user identification information of the first user in the target application.
In some embodiments, the request to grant permission to the first user comprises a request to grant permission to the first user from the first wireless access point. For example, one or more wireless access points currently scanned by the first user equipment, one or more wireless access points shared by the first user in the target application, or one or more wireless access points searched by the first user in the target application are shown in the wireless access point page. And the first user selects a first wireless access point through touch screen operation such as clicking, long pressing or gestures in a wireless access point page of the target application, and executes the request right-confirming operation of the first wireless access point.
In some embodiments, the right-determining triggering operation comprises the first user performing a rights gain operation for the first wireless access point in a rights page of the target application; the method further comprises the following steps: step S14 (not shown), if the right confirmation result information includes right confirmation success information of the first user about the first wireless access point, the first user equipment adds the right information corresponding to the first wireless access point to a user account corresponding to the first user identification information in the target application; otherwise, the right gain operation is ignored, or the right failure information of the first user about the first wireless access point is displayed in a window of the target application. For example, if the first user triggers the first wireless access point to determine the right through the right gain operation, when the right determination result information received by the first user equipment includes the right determination success information, the first user may gain the corresponding right, thereby ensuring the right of the right-determined user sharing the wireless access point in the target application. And if the right confirming result information received by the first user equipment comprises right confirming failure information, the first user cannot draw corresponding rights and interests, and the right confirming failure information or prompt information of the first user about the first wireless access point is displayed in a window of a target application of the first user equipment and used for prompting the first user to re-confirm the right or confirm the right and appeal. Here, the prompting message function is the same as or similar to the prompting message function in the step S13, and therefore, the description thereof is omitted and is incorporated herein by reference.
In some embodiments, the step S11 includes: responding to the right-confirming triggering operation which is initiated in a target application by a first user through first user equipment and is about a first wireless access point, and inquiring whether right information corresponding to the first wireless access point can be received by the first user equipment; and if the right information corresponding to the first wireless access point is in a to-be-received state, generating right code information corresponding to the right-determining triggering operation, wherein the right code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared to the target application by the first user and is used for connecting other user equipment. For example, the right-determining triggering operation includes that the first user performs a right getting operation of the first wireless access point in a right page of the target application, and in response to the right-determining triggering operation, the first user equipment may query, according to right information corresponding to the right getting operation, getting state information of the right information corresponding to the first wireless access point, and acquire the getting state information. If the right information corresponding to the first wireless access point is in a to-be-picked state, the first wireless access point is not yet subjected to right confirmation by other users to acquire the corresponding right information, and the first user equipment can continue to execute the right confirmation operation in the target application to generate the right code information corresponding to the right confirmation trigger operation.
In some embodiments, the step S11 further includes: if the right information corresponding to the first wireless access point is in the received state, presenting a right authentication page related to the first wireless access point in a current window of the target application; or, if the right information corresponding to the first wireless access point is in an expired state, ignoring the right-confirming triggering operation, or presenting the expired state information of the right information corresponding to the first wireless access point in a current window of the target application.
In some embodiments, the obtaining of the right information by the first user equipment includes that the right information corresponding to the first wireless access point is in a received state, that is, the right information corresponding to the first wireless access point is received by other users through right reception, or the first user has received the right information corresponding to the first wireless access point. In some embodiments, if the obtaining status information obtained by the first user equipment includes that the right information corresponding to the first wireless access point is in the obtained status, the first user equipment may further obtain the obtaining user information of the right information corresponding to the first wireless access point. The first user equipment can compare whether the information of the pickup user is the same as the first user identification information, if so, the first user is determined to have picked up the right information corresponding to the first wireless access point, otherwise, the first user equipment is determined that the right information corresponding to the first wireless access point is picked up by other users through right confirmation. Further, if the right information corresponding to the first wireless access point is in a received state and the received state is that the right information corresponding to the first wireless access point is received by other users through right determination, a right authentication page related to the first wireless access point is presented in a current window of the target application, so that the right information corresponding to the first wireless access point can be further determined to belong to through right authentication when the right reception disputes or the right information is falsely received by other users.
In some embodiments, there is a time limit for the first user to obtain the interest information corresponding to the first wireless access point in the target application. And if the time for the first user to initiate the right determining triggering operation of the first wireless access point is later than the right information receiving time limit corresponding to the first wireless access point, the first user equipment determines that the right information corresponding to the first wireless access point is in an expired state. And the first user equipment ignores the right confirmation triggering operation or presents the expiration state information of the right information corresponding to the first wireless access point in the current window of the target application.
In some embodiments, said presenting an entitlement authentication page for said first wireless access point in a current window of said target application further comprises: responding to the right authentication triggering operation of the first user on the first wireless access point in the right authentication page, and sending right authentication information submitted by the first user to the server by first user equipment; receiving right authentication result information of the first user about the first wireless access point, which is returned by the server based on the right authentication information; performing a rights handling operation with respect to the first wireless access point according to the rights authentication result information. Fig. 3 illustrates a user interface diagram for managing shared users of a wireless access point, according to an embodiment of the present application. In some embodiments, referring to the schematic user interface diagram shown in fig. 3, the first user uploads the right authentication information in the right authentication page through the first user equipment according to guidance in the right authentication page, where the right authentication information includes at least any one of product feature information of the wireless routing device corresponding to the first wireless access point, configuration information corresponding to the first wireless access point, and identity authentication information of the first user. In response to a right authentication triggering operation such as clicking, long-pressing, gesture and the like of the first user in the right authentication page (for example, clicking a "submit audit" button shown below in the user interface schematic diagram shown in fig. 3), the first user equipment sends right authentication information submitted by the first user to a server corresponding to a target application, and receives right authentication result information of the first user about the first wireless access point, which is returned by the server based on the right authentication information. Performing a rights handling operation with respect to the first wireless access point according to the rights authentication result information. And if the right authentication result information is that the right authentication is successful, adding the right information corresponding to the first wireless access point into a user account corresponding to the first user identification information in the target application. Further, if the right authentication result information is that the right authentication is successful, the server may cancel the right information corresponding to the first wireless access point owned by the previous user, and ensure the uniqueness of the right information corresponding to the wireless access point acquired by the first user through right confirmation. And if the right authentication result information is that the right authentication fails, sending right authentication failure prompt information to the first user.
In some embodiments, the step S11 includes: responding to an authority confirming triggering operation which is initiated by a first user through a target application in first user equipment and is related to a first wireless access point, if the identity type of the first user in the target application is a service provider, the first user equipment generates authority confirming code information corresponding to the authority confirming triggering operation, wherein the authority confirming code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared to the target application by the first user for being connected and used by other user equipment; otherwise, the right-confirming triggering operation is ignored. In some embodiments, the service provider shares the store's WiFi in a targeted application for an individual or organization engaged in business, e.g., the owner of coffee shop a. Only the user with the service provider identity type in the target application can perform wireless access point authentication, so that the service provider is stimulated to perform wireless access point sharing in the target application, and the wireless access point connection of common users is facilitated.
Referring to the system shown in fig. 1, fig. 4 shows a flow of a method for managing shared users of a wireless access point at a second user equipment according to an embodiment of the present application, where the method includes steps S21 and S22. In step S21, the second user equipment scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information; in step S22, the second user equipment compares whether the first wireless access point information and the wireless access point to which the second user equipment is currently connected are the same wireless access point; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
In step S21, the second user equipment scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information. In some embodiments, the second user equipment may directly scan the authorization code information displayed or projected by the first user equipment through the target application, or receive the authorization code information through the target application or other applications and scan the authorization code information through the target application, and extract the first wireless access point information and the first user identification information in the authorization code information. The first wireless access point information includes first wireless access point identification information, or the first wireless access point identification information and first wireless access point password information. The first user identification information comprises an identification which can uniquely distinguish the first user from other users, such as a user account number, a mobile phone number or a mailbox number of the first user in the target application.
In step S22, the second user equipment compares whether the first wireless access point information and the wireless access point to which the second user equipment is currently connected are the same wireless access point; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information. In some embodiments, in order to assist the first user in performing the authorization of the first wireless access point in the target application, the second user scans authorization code information provided by the first user through the target application in the second user equipment, and in response to an authorization code information scanning operation of the target application, the second user equipment compares whether the first wireless access point information and a wireless access point to which the second user equipment is currently connected are the same wireless access point, if yes, the second user equipment determines that the authorization code information is successfully matched, and sends the matching result information to a server corresponding to the target application, where the matching result information includes matching success information, the first wireless access point information, and the first user identification information. In some embodiments, the wireless connection between the second user equipment and the wireless access point to which the second user equipment is currently connected is established based on cryptographic information of the first wireless access point provided by the first user; for example, the first subscriber line informs the second subscriber of the password information of the first wireless access point face to face.
In some embodiments, the step S22 includes: if the second user equipment is connected with the wireless access point, the second user equipment compares the first wireless access point information with the wireless access point currently connected with the second user equipment to determine whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point; if the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point, the second user equipment sends matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; otherwise, ignoring the right-confirming code information, or sending matching result information corresponding to the right-confirming code information to the server, wherein the matching result information comprises matching failure information, the first wireless access point information and the first user identification information. In some embodiments, if the second user equipment is connected to another wireless access point, the second user equipment determines that matching result information corresponding to the right code information is matching failure information, that is, the second user fails to help the first user perform right determination on the first wireless access point in the target application. The second user equipment can display the matching failure prompt information in a current window of the target application. In some embodiments, the first wireless access point information further comprises cryptographic information for connecting the first wireless access point. After the second user equipment displays the matching failure prompt information in the current window of the target application, responding to the re-matching triggering operation of the second user, the second user equipment can request to establish wireless connection with a first wireless access point according to the password information, and if the wireless connection is successfully established, sending matching result information corresponding to the right confirmation code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; otherwise, ignoring the right-confirming code information, or sending matching result information corresponding to the right-confirming code information to the server, wherein the matching result information comprises matching failure information, the first wireless access point information and the first user identification information, and displaying matching failure prompt information in a current window of a target application.
In some embodiments, the first wireless access point information further comprises cryptographic information for connecting the first wireless access point; the step S22 further includes: if the second user equipment is not connected with the wireless access point, the second user equipment requests to establish wireless connection between the second user equipment and the first wireless access point by using the password information; if the wireless connection is successfully established, the second user equipment sends matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; otherwise, ignoring the right-confirming code information, or sending matching result information corresponding to the right-confirming code information to the server, wherein the matching result information comprises matching failure information, the first wireless access point information and the first user identification information. In some embodiments, after scanning the grant code information by the target application, the second user equipment detects whether the second user equipment is connected to the wireless access point, and if the second user equipment is not connected to the wireless access point, the second user equipment does not need to perform wireless access point comparison, and directly requests to establish wireless connection with the first wireless access point by using the password information of the first wireless access point extracted from the grant code information. If the wireless connection is successfully established, the second user equipment can determine that the matching is successful; otherwise, determining that the matching fails.
Referring to the system shown in fig. 1, fig. 5 shows a flow of a method for managing shared users of wireless access points at a server according to an embodiment of the present application, where the method includes steps S31, S32, and S33. In step S31, the server receives matching result information about the grant code information sent by the second user equipment, where the matching result information includes matching success information or matching failure information, and first wireless access point information and first user identification information extracted from the grant code information by the second user equipment, where the first user identification information is identification information of the first user in the target application; in step S32, the server determines, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point to which the first wireless access point information corresponds; in step S33, the server provides the right confirmation result information to the first user equipment corresponding to the first user identification information.
In step S31, the server receives matching result information about the grant code information sent by the second user equipment, where the matching result information includes matching success information or matching failure information, and first wireless access point information and first user identification information extracted from the grant code information by the second user equipment, where the first user identification information is identification information of the first user in the target application. In some embodiments, the first wireless access point information includes first wireless access point identification information, and the first user identification information includes identification information, such as a user account number, a mobile phone number, or a mailbox number of the first user in the target application, that can uniquely distinguish the user from other users in the target application identity. And the server determines the wireless access point which is determined to be authorized in the target application according to the first wireless access point information, and determines first user equipment which sends the authorization code information according to the first user identification information.
In step S32, in response to the matching result information, the server determines the authorization result information of the first user with respect to the first wireless access point to which the first wireless access point information corresponds. In some embodiments, the server determines, according to the matching result information, the authorization result information of the first user about the first wireless access point corresponding to the first wireless access point information. For example, if the matching result information includes that the number or the ratio of the successful matching information is greater than or equal to the corresponding threshold information, the server may determine that the right confirmation result information of the first user about the first wireless access point is successful in right confirmation; otherwise, determining the right confirming result information as the right confirming failure.
In step S33, the server provides the right confirmation result information to the first user equipment corresponding to the first user identification information. In some embodiments, the right confirmation result information includes right confirmation success information or right confirmation failure information. If the right-confirming result information includes the right-confirming failure information, the right-confirming result information may further include prompt information for prompting the first user to re-confirm the right or to apply for the right-confirming complaint. Here, the prompting message function is the same as or similar to the prompting message function in the step S13, and therefore, the description thereof is omitted and is incorporated herein by reference.
In some embodiments, the step S32 includes: step S321, in response to the matching result information, the server obtains one or more pieces of association matching result information associated with the weight-identifying code information, where each piece of association matching result information includes the first wireless access point information and the first user identification information, and the first user identification information is identification information of the first user in the target application; step S322, the server determines, according to the one or more association matching result information, the right result information of the first user about the first wireless access point corresponding to the first wireless access point information. In some embodiments, the server receives a plurality of matching results from different other user equipments, and extracts corresponding wireless access point information and user identification information from each matching result; then, the matching results are classified according to the wireless access point information and the user identification information in each matching result, the matching result information in the same class comprises the same wireless access point information and the same user identification information, wherein the classification comprising the matching result information is one or more associated matching result information associated with the weight-confirming code information. For example, the server queries, according to the first wireless access point information and the first user identification information in the matching result information, one or more pieces of association matching result information associated with the weight-identifying code information from a plurality of matching results that the server has received, where each piece of association matching result information also includes the first wireless access point information and the first user identification information.
In some embodiments, the server receives the authorization code information sent by the first user equipment, matches the first wireless access point information and the first user identification information in the authorization code information with the wireless access point information and the user identification information in the received multiple matching results, and obtains one or more associated matching result information associated with the authorization code information. In some embodiments, the server matches matching results received only within a certain time range, for example, matches first wireless access point information and first user identification information in the weight code information with a plurality of matching results received within a reception time range to obtain one or more associated matching result information associated with the weight code information; and directly neglecting a plurality of matching results received outside the receiving time range so as to reduce the waiting time and efficiently finish the authorization process of the first wireless access point.
In some embodiments, the step S322 includes: if the number or the ratio of the association matching results containing the matching success information in the one or more pieces of association matching result information is larger than the corresponding threshold information, the server determines that the right determining result information of the first user about the first wireless access point corresponding to the first wireless access point information is the right determining success information; otherwise, determining the right confirming result information as the right confirming failure information. In some embodiments, the server determines whether the number of association matching results including matching success information in one or more association matching result information received within a predetermined time range is greater than or equal to corresponding threshold information, and if so, determines that the authorization result information of the first user with respect to the first wireless access point is authorization success information; otherwise, determining the right confirming result information as the right confirming failure information. For example, within a predetermined time, the server may send the right confirmation success information to the first user as long as the associated matching result information including the matching success information satisfying the number threshold information is received, and it is considered that the number of the second users participating in assisting the right confirmation of the first user has reached the predetermined number.
In some embodiments, the server determines whether a ratio of association matching results including matching success information among one or more pieces of association matching result information received within a predetermined time range is greater than or equal to corresponding threshold information, and if the ratio is greater than or equal to the corresponding threshold information, determines that the authorization result information of the first user with respect to the first wireless access point is authorization success information; otherwise, determining the right confirming result information as the right confirming failure information. For example, the server determines that 10 pieces of association matching result information are received within a predetermined time range, where 8 pieces of association matching results include matching success information, and if the percentage of association matching results including matching success is 80% and is greater than the corresponding threshold information 70%, it is determined that the authorization result information of the first user with respect to the first wireless access point is authorization success information.
In some embodiments, the one or more associative matching results further satisfy at least any one of: wherein each associated matching result information further comprises identification information of the weight-determining code information; the connection starting time of each user equipment sending the association matching result information and the first wireless access point is later than the sharing time of the first user sharing the first access point in the target application; wherein the receiving time interval of any two associated matching result information is less than or equal to the receiving time interval threshold information; and each user equipment sending the association matching result information does not send other matching result information of the first wireless access point. In some embodiments, the association matching result information further includes identification information of the authorization code information, so as to ensure that the association matching result information can point to the same authorization code information when the first user initiates multiple authorization triggering operations on the first wireless access point. The server can determine the associated matching result information corresponding to the same right-confirming code information according to the right-confirming code identification information contained in the matching result information, so that the accuracy of sharing the right-confirming of the wireless access point is improved.
In some embodiments, the server further determines connection history information of the user according to device identification information of the user sending the matching result information, and determines the one or more association matching results according to the connection history information, where a connection start time of each user device sending the association matching result information and the first wireless access point is later than a sharing time of the first user sharing the first access point in the target application, so as to exclude a matching result that is not returned due to sharing by the first wireless access point of the first user. Here, the start connection time includes, but is not limited to: and the starting time of the current connection between the corresponding user equipment and the first wireless access point or the starting time of the first connection between the user equipment and the first wireless access point.
In some embodiments, in order to ensure timeliness of matching result information received by the server and corresponding to the first wireless access point authorization code information sent by the first user, the server further determines whether a receiving time interval of any two pieces of association matching result information is less than or equal to receiving time interval threshold information. For example, if the receiving time interval of the two pieces of association matching result information is greater than the receiving time interval threshold, at least one of the two pieces of association matching result information is removed to ensure that the one or more association matching results all correspond to the same piece of authorization code information, thereby improving the authorization accuracy.
In some embodiments, the server determines, according to the device identification information of the fourth user equipment UE4 that sends the association matching result, a plurality of pieces of history matching result information that are sent by the fourth user equipment in advance, and if there is a matching result that includes the first wireless access point information in the plurality of pieces of history matching result information, deletes the association matching result sent by the fourth user equipment from the one or more association matching results, so that each user equipment that sends the association matching result information does not send other matching result information of the first wireless access point in advance, that is, the fourth user equipment is involved in the process of determining the right of the first wireless access point for the first time, thereby improving the accuracy of determining the right.
In some embodiments, the method further includes step S34, where the server receives the right authentication information of the first user about the first wireless access point, which is sent by the first user equipment; determining rights authentication result information of the first user about the first wireless access point according to the rights authentication information; and sending the right authentication result information of the first user about the first wireless access point to the first user equipment. In some embodiments, if the right information of the first wireless access point corresponding to the first user is picked up, the first user may determine attribution of the right information corresponding to the first wireless access point by sending right authentication information of the first wireless access point to the server corresponding to the target application. The server receives right authentication information which is sent by first user equipment and is about the first wireless access point by the first user. And directly determining the right and interest authentication result information by the server according to the right and interest authentication information, wherein the right and interest authentication result information comprises the success of right and interest authentication or the failure of right and interest authentication.
In some embodiments, the rights authentication information includes at least any one of: product characteristic information of wireless routing equipment corresponding to the first wireless access point; configuration information corresponding to the first wireless access point; identity authentication information of the first user. In some embodiments, the rights and interests authentication information includes text, pictures, video, and the like in various forms. The product characteristic information of the wireless routing device corresponding to the first wireless access point comprises product or product characteristic information description of the wireless routing device. The identity authentication information of the first user comprises personal identity authentication information of the first user or authentication information of a service provider to which the first wireless access point belongs.
Fig. 6 is a flowchart illustrating a method for managing shared users of a wireless access point, according to an embodiment of the present application, the method including: step S11', in response to a right-determining triggering operation initiated by a first user through a target application in a first user equipment, the first user equipment generating right-determining code information corresponding to the right-determining triggering operation, where the right-determining code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection with other user equipments; step S12', the first user device providing the authorization code information to a second user; step S21', the second user equipment scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information; step S22', comparing whether the first wireless access point information and the wireless access point to which the second user equipment is currently connected are the same wireless access point; if yes, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; step S31', the server receives matching result information about the grant code information sent by the second user equipment, where the matching result information includes matching success information or matching failure information, and first wireless access point information and first user identification information extracted from the grant code information by the second user equipment; step S32', in response to the matching result information, determining the authorization result information of the first user about the first wireless access point corresponding to the first wireless access point information, where the first user identification information is the identification information of the first user in the target application; step S33', providing the right confirmation result information to the first user equipment corresponding to the first user identification information; step S13', the first user equipment receives the authorization result information corresponding to the authorization triggering operation sent by the server corresponding to the target application. Here, the specific implementation manners of steps S11 ', S12', S13 ', S21', S22 ', S31', S32 ', and S33' are respectively the same as or substantially the same as those of steps S11, S12, S13, S21, S22, S31, S32, and S33 in the foregoing embodiment, and therefore, the detailed description is omitted, and the steps are incorporated herein by reference.
Fig. 7 is a block diagram of a first ue for managing shared users of a wireless access point according to an embodiment of the present application, where the first ue includes a one-to-one module 11, a two-to-two module 12, and a three-to-one module 13. In response to a first user initiating an authorization triggering operation about a first wireless access point through a target application in first user equipment, a one-to-one module 11 generates authorization code information corresponding to the authorization triggering operation, where the authorization code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use by other user equipment; a secondary module 12 provides the authorization code information to a second user; a third module 13 receives the authorization result information corresponding to the authorization triggering operation sent by the server corresponding to the target application. Here, the specific embodiments of the one-to-one module 11, the two-to-two module 12, and the one-to-three module 13 shown in fig. 7 are the same as or similar to the specific embodiments of the step S11, the step S12, and the step S13, respectively, and therefore are not repeated herein and are included by reference.
In some embodiments, the first user equipment further comprises a quad module 14 (not shown). If the right confirmation result information includes the right confirmation success information of the first user about the first wireless access point, the fourth module 14 adds the right information corresponding to the first wireless access point to the user account corresponding to the first user identification information in the target application; otherwise, the right gain operation is ignored, or the right failure information of the first user about the first wireless access point is displayed in a window of the target application. Here, the specific implementation of the four modules 14 is the same as or similar to the step S14, and therefore, the detailed description thereof is omitted, and the detailed implementation is incorporated herein by reference.
Fig. 8 illustrates a second user equipment structure diagram for managing shared users of a wireless access point, according to an embodiment of the present application. The second user equipment comprises a first module 21 and a second module 22. The first-second module 21 scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information; the second module 22 compares whether the first wireless access point information and the wireless access point currently connected by the second user equipment are the same wireless access point; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information. Here, the corresponding embodiments of the first two modules 21 and the second two modules 22 shown in fig. 8 are the same as or similar to the embodiments of the steps S21 and S22, and therefore are not repeated herein and are included herein by reference.
Fig. 9 illustrates a server architecture diagram for managing shared users of a wireless access point, according to an embodiment of the present application. The server comprises a three-in-one module 31, a three-in-two module 32 and a three-in-three module 33. The third-to-first module 31 receives matching result information about a weight-ensuring code information, which is sent by a second user equipment, wherein the matching result information includes matching success information or matching failure information, and first wireless access point information and first user identification information, which are extracted from the weight-ensuring code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application; in response to the matching result information, the third and second module 32 determines the authorization result information of the first user about the first wireless access point corresponding to the first wireless access point information; the thirty-three module 33 provides the right confirmation result information to the first user equipment corresponding to the first user identification information. Here, the embodiments of the first three module 31, the second three module 32, and the third three module 33 shown in fig. 9 are the same as or similar to the embodiments of the step S31, the step S32, and the step S33, and therefore are not repeated herein and are included by reference.
In some embodiments, the triplex module includes a triplex-duplex unit 321 (not shown) and a triplex-duplex unit 322 (not shown). In response to the matching result information, the first-third-first unit 321 obtains one or more pieces of association matching result information associated with the weight-ensuring code information, where each piece of association matching result information includes the first wireless access point information and the first user identification information, and the first user identification information is identity identification information of the first user in the target application; the third, second and third unit 322 determines the right result information of the first user about the first wireless access point corresponding to the first wireless access point information according to the one or more association matching result information. Here, the embodiments of the first-third-first unit 321 and the second-third unit 322 are the same as or similar to the embodiments of the steps S321 and S322, respectively, and therefore are not repeated herein, and are included herein by reference.
In some embodiments, the server also includes a thirty-four module 34 (not shown). A third-fourth module 34 receives right authentication information, which is sent by first user equipment and is about the first wireless access point, of the first user; determining rights authentication result information of the first user about the first wireless access point according to the rights authentication information; and sending the right authentication result information of the first user about the first wireless access point to the first user equipment. Here, the specific implementation manner of the three-four module 34 is the same as or similar to that of the step S34, and therefore, the detailed description thereof is omitted and is incorporated herein by reference.
FIG. 10 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as shown in FIG. 10, the system 300 can be implemented as any of the devices in the various embodiments described. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of the device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, NVM/storage 320 may be accessible over a network via communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) (e.g., memory controller module 330) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including a touch screen display), a non-volatile memory port, multiple antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application also provides a computer program product, which when executed by a computer device, performs the method of any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (19)

1. A method at a first user equipment for managing shared users of a wireless access point, wherein the method comprises:
responding to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, and generating right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use of other user equipment;
providing the authorization code information to a second user;
and receiving the right confirming result information corresponding to the right confirming triggering operation sent by the server corresponding to the target application.
2. The method of claim 1, wherein the grant trigger operation comprises at least any one of:
the first user performs a rights gain operation of the first wireless access point in a rights page of the target application;
the first user performs the request-to-authenticate operation of the first wireless access point in a wireless access point page of the target application.
3. The method of claim 2, wherein the rights trigger operation comprises the first user performing a rights gain operation for the first wireless access point in a rights page of the target application;
the method further comprises the following steps:
if the right confirmation result information comprises right confirmation success information of the first user about the first wireless access point, adding right information corresponding to the first wireless access point to a user account corresponding to the first user identification information in the target application; if not, then,
ignoring the gain-of-right operation or displaying in a window of the target application an entitlement failure message of the first user with respect to the first wireless access point.
4. The method of claim 3, wherein the generating, in response to an authorization trigger operation initiated by a first user through a target application in a first user equipment with respect to a first wireless access point, authorization code information corresponding to the authorization trigger operation, wherein the authorization code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection with other user equipment comprises:
responding to a right triggering operation which is initiated in a target application by a first user through first user equipment and is about a first wireless access point, and inquiring whether right information corresponding to the first wireless access point can be taken;
and if the right information corresponding to the first wireless access point is in a to-be-received state, generating right code information corresponding to the right-determining triggering operation, wherein the right code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared to the target application by the first user and is used for connecting other user equipment.
5. The method of claim 4, wherein the generating, in response to an authorization trigger operation initiated by a first user through a target application in a first user equipment with respect to a first wireless access point, authorization code information corresponding to the authorization trigger operation, wherein the authorization code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection by other user equipments, further comprises:
if the right information corresponding to the first wireless access point is in the received state, presenting a right authentication page related to the first wireless access point in a current window of the target application; alternatively, the first and second electrodes may be,
if the right information corresponding to the first wireless access point is in an expired state, ignoring the right confirming triggering operation, or presenting the expired state information of the right information corresponding to the first wireless access point in a current window of the target application.
6. The method of claim 5, wherein the presenting of the rights authentication page for the first wireless access point in the current window of the target application further comprises:
sending the right authentication information submitted by the first user to the server in response to a right authentication triggering operation of the first user on the first wireless access point in the right authentication page;
receiving right authentication result information of the first user about the first wireless access point, which is returned by the server based on the right authentication information;
performing a rights handling operation with respect to the first wireless access point according to the rights authentication result information.
7. The method according to any one of claims 1 to 6, wherein the generating, in response to a right-confirming trigger operation initiated by a first user through a target application in a first user equipment with respect to a first wireless access point, right-confirming code information corresponding to the right-confirming trigger operation, where the right-confirming code information includes first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection with other user equipments includes:
responding to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is related to a first wireless access point, and if the identity type of the first user in the target application is a service provider, generating right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared by the first user to the target application for connection and use of other user equipment; otherwise, the right-confirming triggering operation is ignored.
8. A method at a second user equipment for managing shared users of a wireless access point, wherein the method comprises:
scanning right code information provided by first user equipment through a target application, and extracting first wireless access point information and first user identification information from the right code information;
comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; and if so, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information.
9. The method of claim 8, wherein the comparing whether the first wireless access point information and the wireless access point to which the second user equipment is currently connected are the same wireless access point; if yes, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information, and the matching result information comprises:
if the second user equipment is connected with the wireless access point, comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not;
if the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point, sending matching result information corresponding to the weight-determining code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; otherwise, ignoring the right-confirming code information, or sending matching result information corresponding to the right-confirming code information to the server, wherein the matching result information comprises matching failure information, the first wireless access point information and the first user identification information.
10. The method of claim 9, wherein the first wireless access point information further comprises password information for connecting the first wireless access point;
comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; if yes, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information, and the method further comprises the following steps:
if the second user equipment is not connected with the wireless access point, utilizing the password information to request to establish the wireless connection between the second user equipment and the first wireless access point;
if the wireless connection is successfully established, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information; otherwise, ignoring the right-confirming code information, or sending matching result information corresponding to the right-confirming code information to the server, wherein the matching result information comprises matching failure information, the first wireless access point information and the first user identification information.
11. A method at a server side for managing shared users of a wireless access point, wherein the method comprises:
receiving matching result information which is sent by second user equipment and is about right-confirming code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the right-confirming code information by the second user equipment, and the first user identification information is identity identification information of the first user in the target application;
determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information;
and providing the right confirmation result information to the first user equipment corresponding to the first user identification information.
12. The method of claim 11, wherein the determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point to which the first wireless access point information corresponds comprises:
responding to the matching result information, acquiring one or more pieces of association matching result information associated with the weight-ensuring code information, wherein each piece of association matching result information comprises the first wireless access point information and the first user identification information, and the first user identification information is the identity identification information of the first user in the target application;
and determining the authorization result information of the first user about the first wireless access point corresponding to the first wireless access point information according to the one or more pieces of association matching result information.
13. The method of claim 12, wherein the determining, according to the one or more association matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information comprises:
if the number or the ratio of the association matching results containing the matching success information in the one or more pieces of association matching result information is larger than the corresponding threshold information, determining that the right determining result information of the first user about the first wireless access point corresponding to the first wireless access point information is right determining success information; otherwise, determining the right confirming result information as the right confirming failure information.
14. The method of claim 12 or 13, wherein the one or more correlation matching results further satisfy at least any one of:
wherein each associated matching result information further comprises identification information of the weight-determining code information;
the connection starting time of each user equipment sending the association matching result information and the first wireless access point is later than the sharing time of the first user sharing the first access point in the target application;
wherein the receiving time interval of any two associated matching result information is less than or equal to the receiving time interval threshold information;
and each user equipment sending the association matching result information does not send other matching result information of the first wireless access point in advance.
15. The method of any of claims 11 to 14, wherein the method further comprises:
receiving right authentication information, which is sent by first user equipment and is about the first wireless access point, of the first user;
determining rights authentication result information of the first user about the first wireless access point according to the rights authentication information;
and sending the right authentication result information of the first user about the first wireless access point to the first user equipment.
16. The method of claim 15, wherein the rights authentication information includes at least any one of:
product characteristic information of wireless routing equipment corresponding to the first wireless access point;
configuration information corresponding to the first wireless access point;
identity authentication information of the first user.
17. A method for managing shared users of a wireless access point, wherein the method comprises:
in response to a right confirmation triggering operation which is initiated by a first user through a target application in first user equipment and is about a first wireless access point, the first user equipment generates right confirmation code information corresponding to the right confirmation triggering operation, wherein the right confirmation code information comprises first wireless access point information corresponding to the first wireless access point and first user identification information of the first user in the target application, and the first wireless access point is shared to the target application by the first user for connection and use of other user equipment; the first user equipment provides the authority code information to a second user;
the second user equipment scans the authorization code information provided by the first user equipment through the target application, and extracts the first wireless access point information and the first user identification information from the authorization code information; comparing whether the first wireless access point information and the wireless access point currently connected with the second user equipment are the same wireless access point or not; if yes, sending matching result information corresponding to the right-confirming code information to a server corresponding to the target application, wherein the matching result information comprises matching success information, the first wireless access point information and the first user identification information;
the server receives matching result information which is sent by the second user equipment and is about the authority code information, wherein the matching result information comprises matching success information or matching failure information, and first wireless access point information and first user identification information which are extracted from the authority code information by the second user equipment; determining, in response to the matching result information, the authorization result information of the first user with respect to the first wireless access point corresponding to the first wireless access point information, where the first user identification information is the identification information of the first user in the target application; providing the right confirmation result information to first user equipment corresponding to the first user identification information;
and the first user equipment receives the right confirmation result information corresponding to the right confirmation triggering operation sent by the server corresponding to the target application.
18. An apparatus for managing shared users of a wireless access point, the apparatus comprising:
a processor, and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 16.
19. A computer-readable medium storing instructions that, when executed by a computer, cause the computer to perform operations of any of the methods of claims 1-16.
CN202010943512.7A 2020-09-09 2020-09-09 Method and equipment for managing shared users of wireless access point Active CN112261653B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010943512.7A CN112261653B (en) 2020-09-09 2020-09-09 Method and equipment for managing shared users of wireless access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010943512.7A CN112261653B (en) 2020-09-09 2020-09-09 Method and equipment for managing shared users of wireless access point

Publications (2)

Publication Number Publication Date
CN112261653A true CN112261653A (en) 2021-01-22
CN112261653B CN112261653B (en) 2023-03-24

Family

ID=74231776

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010943512.7A Active CN112261653B (en) 2020-09-09 2020-09-09 Method and equipment for managing shared users of wireless access point

Country Status (1)

Country Link
CN (1) CN112261653B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472698A (en) * 2015-11-30 2016-04-06 小米科技有限责任公司 Wireless network access method and device
CN107659937A (en) * 2016-08-02 2018-02-02 上海掌门科技有限公司 The method and apparatus shared for realizing WAP
WO2018040524A1 (en) * 2016-09-05 2018-03-08 中兴通讯股份有限公司 Method and device for sharing hotspots
CN108601065A (en) * 2018-05-08 2018-09-28 上海连尚网络科技有限公司 A kind of method of wireless access point shared service
US20180343609A1 (en) * 2016-01-18 2018-11-29 Shanghai Lianshang Network Technology Co., Ltd. Method and device method and device for obtaining access information of shared wireless access point
CN108966230A (en) * 2018-06-29 2018-12-07 上海连尚网络科技有限公司 Share the method and apparatus of wireless access point

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105472698A (en) * 2015-11-30 2016-04-06 小米科技有限责任公司 Wireless network access method and device
US20180343609A1 (en) * 2016-01-18 2018-11-29 Shanghai Lianshang Network Technology Co., Ltd. Method and device method and device for obtaining access information of shared wireless access point
CN107659937A (en) * 2016-08-02 2018-02-02 上海掌门科技有限公司 The method and apparatus shared for realizing WAP
WO2018040524A1 (en) * 2016-09-05 2018-03-08 中兴通讯股份有限公司 Method and device for sharing hotspots
CN108601065A (en) * 2018-05-08 2018-09-28 上海连尚网络科技有限公司 A kind of method of wireless access point shared service
CN108966230A (en) * 2018-06-29 2018-12-07 上海连尚网络科技有限公司 Share the method and apparatus of wireless access point

Also Published As

Publication number Publication date
CN112261653B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
CN105530175B (en) Message processing method, device and system
US9992287B2 (en) Token-activated, federated access to social network information
US11361319B2 (en) Service processing method, apparatus, and system
CN111160845B (en) Service processing method and device
WO2015070732A1 (en) Access control system, authorization method and device thereof, and storage medium
US10417620B2 (en) User attribute value transfer method and terminal
CN107690175B (en) Method and equipment for managing wireless access point
CN108924833B (en) Method and equipment for authorizing user equipment to connect wireless access point
US20210136577A1 (en) Method and a device for wireless connection
US20190098004A1 (en) Universal id system and methods and biometric information
CN103532933A (en) Method of realizing client operation authorization through fingerprint confirmation, and intelligent terminal
CN105656627A (en) Identity verification method, device and system
TWI684149B (en) Interactive information processing method, device and system
CN104967586A (en) User identity authentication method, user identity authentication apparatus and user identity authentication system
CN107682250B (en) Method and equipment for executing social operation
US9516009B2 (en) Authenticating redirection service
CN107396364B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN106254319B (en) Light application login control method and device
WO2021184830A1 (en) Account number binding method and apparatus, and computer device and storage medium
CN111582981A (en) Method and device for riding
CN112073578B (en) Method and equipment for using or limiting application function in social application
CN110692072A (en) NFC initiated proxy communication
CN110266686B (en) Data sharing method, device, equipment and computer readable storage medium
CN112261653B (en) Method and equipment for managing shared users of wireless access point
WO2017129068A1 (en) Event execution method and device and system therefor

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant