CN116113012A - Access control method, device and system of wireless router and storage medium - Google Patents

Access control method, device and system of wireless router and storage medium Download PDF

Info

Publication number
CN116113012A
CN116113012A CN202310397554.9A CN202310397554A CN116113012A CN 116113012 A CN116113012 A CN 116113012A CN 202310397554 A CN202310397554 A CN 202310397554A CN 116113012 A CN116113012 A CN 116113012A
Authority
CN
China
Prior art keywords
terminal
network
white list
wireless router
terminals
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310397554.9A
Other languages
Chinese (zh)
Other versions
CN116113012B (en
Inventor
陈林招
彭水平
梁邦领
幸杰
黄春生
田忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microgrid Union Technology Chengdu Co ltd
Original Assignee
Microgrid Union Technology Chengdu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microgrid Union Technology Chengdu Co ltd filed Critical Microgrid Union Technology Chengdu Co ltd
Priority to CN202310397554.9A priority Critical patent/CN116113012B/en
Publication of CN116113012A publication Critical patent/CN116113012A/en
Application granted granted Critical
Publication of CN116113012B publication Critical patent/CN116113012B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/06Access restriction performed under specific conditions based on traffic conditions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to an access control method, device, system and storage medium of a wireless router, wherein the method comprises the steps of responding to an acquired disconnection or dormancy signal of a designated terminal, and starting a visitor network; responding to the acquired connection signal, requesting a terminal name from a terminal which sends a connection request, and sending a network password to the terminal which sends the connection request after acquiring the terminal name; adding the terminal name to the white list and allowing the terminals in the white list to join the network, calculating the fee by using a charging rule after the terminals in the white list join the network, and limiting the network speed of the terminals in the white list when the specified terminals are reconnected to the network or are changed from a dormant state to an active state. According to the access control method, the device, the system and the storage medium of the wireless router, the visitor is managed in a mode of automatically controlling access and limiting the number of terminals, and the user experience is improved and meanwhile benefits can be generated.

Description

Access control method, device and system of wireless router and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an access control method, device, system, and storage medium for a wireless router.
Background
WiFi sharing may use a WiFi network by joining other WiFi networks when it is desired to use the network but without WiFi network usage conditions. The current sharing mode is mostly third party sharing operation, and the sharing purpose is achieved by actively sharing or cracking the network password.
This approach has the advantage of being free, but in the actual process it is found that in non-profit situations, third parties need to make profit by other means, such as putting advertisements and forcing to watch advertisements, which can affect the user experience. The limited internet speed after joining the network and the inability to use the WiFi network after viewing the advertisement can severely impact the number of customer groups, and in the case of limited number of customer groups and potential atrophy, the profitability can become more difficult, which in turn can lead to the need to attempt the profitability by more means.
The WiFi sharing in the current market is only carried out by depending on WiFi sharing software (WiFi eidolon, wiFi master key, iFi password and the like), the principle of the sharing software is to memorize the WiFi names and the passwords corresponding to the WiFi names, and the mode has the advantages that anyone can obtain the passwords corresponding to the WiFi names and the WiFi names through the sharing software and then connect with the WiFi network.
The potential problems are mainly two of the following: the first is that operators sharing software lack a profit mode, and more of the current operators are to insert advertisements in a starting interface, a using interface and an operating interface of the sharing software, and meanwhile, to forcedly insert advertisements in the operating process. Advertisements can bring some benefit, but severely impact the user experience.
And secondly, the number of terminals connected to the WiFi network cannot be controlled, the bearing capacity of the terminal of one WiFi network is limited, and when the terminal exceeding the bearing capacity is connected to the WiFi network, the load surge of the WiFi network can be caused, so that the data flow of the terminal can be directly influenced. This problem overlaps the first one, resulting in a limited population of users using shared software, while also having a tendency to shrink. The reduced number of users in turn results in a more aggressive manner of earning by the operator, thus putting into a vicious circle.
Disclosure of Invention
The application provides an access control method, device and system of a wireless router and a storage medium, wherein visitors are managed in a mode of automatically controlling access and limiting the number of terminals, and benefits can be generated while user experience is improved.
The above object of the present application is achieved by the following technical solutions:
in a first aspect, the present application provides an access control method of a wireless router, including:
responding to the acquired disconnection or dormancy signals of the appointed terminal, and starting a visitor network;
responding to the acquired connection signal, requesting a terminal name from a terminal which sends a connection request, and sending a network password to the terminal which sends the connection request after acquiring the terminal name;
adding the terminal name into a white list and allowing terminals in the white list to be added into a network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
limiting the network speed of the terminal in the white list when the terminal is designated to be reconnected to the network or to be changed from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
In a possible implementation manner of the first aspect, adding the terminal name to the white list further includes:
checking the charge state of the account corresponding to the terminal; and
and allowing the terminal to enter a white list when the charge state is normal.
In a possible implementation manner of the first aspect, each terminal in the white list is assigned a traffic channel with a fixed maximum value, and when the sum of the fixed maximum values of the plurality of traffic channels is less than or equal to the traffic channel value of the guest network, a new terminal is no longer allowed to join the white list.
In a possible implementation manner of the first aspect, the method further includes:
starting timing after the terminal in the white list is converted from an active state to a dormant state; and
the terminal is removed from the white list after the timer reaches the set time.
In a possible implementation manner of the first aspect, the set time is determined by the guest network or is given by each terminal in the white list.
In a possible implementation manner of the first aspect, when the designated terminal reconnects to the network or changes from the dormant state to the active state, the fixed maximum value of the traffic channel of at least one terminal in the white list is adjusted, and at the same time, the charging rule of the terminal whose fixed maximum value of the traffic channel is adjusted.
In a possible implementation manner of the first aspect, the value of the number of terminals in the white list corresponding to the guest network is a fixed value;
when the number of terminals in the white list corresponding to the visitor network is equal to a fixed value, new terminals are not allowed to join the white list corresponding to the visitor network.
In a second aspect, the present application provides an access control apparatus of a wireless router, including:
the communication unit is used for responding to the acquired disconnection or dormancy signals of the appointed terminal and starting the visitor network;
an information acquisition unit for requesting a terminal name from a terminal that sent a connection request and transmitting a network password to the terminal that sent the connection request after acquiring the terminal name in response to the acquired connection signal;
the first processing unit is used for adding the terminal name into the white list and allowing the terminals in the white list to be added into the network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
a second processing unit, configured to limit a network speed of the terminal in the white list when the specified terminal is reconnected to the network or changes from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
In a third aspect, the present application provides an access control system for a wireless router, the system comprising:
one or more memories for storing instructions; and
one or more processors configured to invoke and execute the instructions from the memory, to perform the method for controlling access to a wireless router as described in the first aspect and any possible implementation of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium comprising:
a program which, when executed by a processor, performs an access control method for a wireless router as described in the first aspect and any possible implementation manner of the first aspect.
In a fifth aspect, the present application provides a computer program product comprising program instructions which, when executed by a computing device, perform an access control method of a wireless router as described in the first aspect and any possible implementation manner of the first aspect.
In a sixth aspect, the present application provides a chip system comprising a processor for implementing the functions involved in the above aspects, e.g. generating, receiving, transmitting, or processing data and/or information involved in the above methods.
The chip system can be composed of chips, and can also comprise chips and other discrete devices.
In one possible design, the system on a chip also includes memory to hold the necessary program instructions and data. The processor and the memory may be decoupled, provided on different devices, respectively, connected by wire or wirelessly, or the processor and the memory may be coupled on the same device.
Drawings
Fig. 1 is a schematic flow chart of steps of an access control method provided in the present application.
Fig. 2 is a schematic diagram of network condition usage of a designated terminal and a visitor provided in the present application.
Fig. 3 is a schematic flow chart of a check fee provided in the present application.
Fig. 4 is a schematic diagram of a bandwidth allocation manner provided in the present application.
Fig. 5 is a schematic diagram of another bandwidth allocation manner provided in the present application.
Fig. 6 is a schematic diagram of removing a terminal from a whitelist according to the present application.
Detailed Description
The technical solutions in the present application are described in further detail below with reference to the accompanying drawings.
Referring to fig. 1, the application discloses an access control method of a wireless router, which includes the following steps:
s101, responding to the acquired disconnection or dormancy signals of the appointed terminal, and starting a visitor network;
s102, responding to the acquired connection signal, requesting a terminal name from a terminal which sends a connection request, and sending a network password to the terminal which sends the connection request after acquiring the terminal name;
s103, adding the terminal name into a white list and allowing terminals in the white list to be added into a network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
s104, limiting the network speed of the terminal in the white list when the terminal is designated to be reconnected to the network or is changed from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
Firstly, it should be noted that the access control method of the wireless router disclosed in the present application is applied to the wireless router, and performs local control on the wireless router. When a visitor wants to join a visitor network started by the wireless router, the visitor is operated at a mobile phone end, and the mobile phone end and the wireless router conduct data communication through a cloud.
The identification of the wireless router uses an SN code or an MAC code, and the SN is the serial number of the router, namely the serial number of the wireless router when leaving the factory; the MAC code is a physical address of the wireless router, meaning media access control, or physical address, hardware address, used to define the location of the network device.
The operator realizes the benefits through the selling and managing cost of the hardware equipment. The mobile phone terminal is accessed through the WeChat applet, the WeChat applet can directly access the cloud, and meanwhile, the functions of pre-charging and deducting fees are realized by means of the functions of WeChat payment and wallet.
In step S101, in response to the acquired disconnection or dormancy signal of the designated terminal, the wireless router may start the visitor network, where the designated terminal refers to a terminal designated by the wireless router controller, and the designated terminal has a higher level of usage authority of the wireless router, and when the designated terminal is connected to the network of the wireless router and is in an active state, the wireless router first ensures network usage of the designated terminal.
Referring to fig. 2, for a guest network, it can be understood that a wireless router has both a use network and a guest network. The usage network is provided for the terminal usage specified by the wireless router controller, which has a fixed name and a fixed password, and the terminal accessing the usage network has a higher level of usage rights of the wireless network.
The guest network is a network provided for use by a guest, the name and password of which are uncertain, and the guest needs to apply from a WeChat applet and acquire the password, and access the guest network using the password after acquiring the password.
In step S102, the visitor searches for a nearby WiFi network that can be used and issues a connection request, and in response to the acquired connection signal, the wireless router requests a terminal name from the terminal that issues the connection request and sends a network password to the terminal that issues the connection request after acquiring the terminal name. The operation that the visitor will search for nearby available WiFi networks and make a connection request is performed by a mini-messenger.
And receiving the connection signal, requesting the terminal name by the wireless router to the terminal sending the connection request, and sending the network password to the terminal sending the connection request after acquiring the terminal name. The acquired terminal name is the name of the terminal used by the visitor, the name needs to be added into a white list of the wireless router, and the terminal entering the white list has the authority to access the visitor network.
In step S103, the wireless router adds the terminal name to the white list and allows the terminals in the white list to join the network, and the terminals in the white list calculate the fee using the charging rule after joining the guest network. The white listing means that the terminal used by the guest has the right to access the guest network, but the cost is not calculated at this time.
Only terminals in the white list use the charging rules to calculate the fee after joining the guest network. For example, a certain visitor's terminal enters a white list of wireless routers but does not access the visitor network, at which point no fee is calculated.
In step S104, when the designated terminal reconnects to the network or changes from the dormant state to the active state, the network speed of the terminal in the white list is limited, which serves to ensure that the wireless router controller designates the network usage right of the terminal. Or it can be understood that in any case, the application shares the redundant network resources on the premise of meeting the network usage of the terminal specified by the wireless router controller.
Meanwhile, in order to avoid the occurrence of the situation of "network rubbing", in the application, each broadcasting time period uses different network passwords and/or resets the whitelist. Here, assuming that a broadcast period is 24 hours, the network password of the wireless router is updated once every 24 hours, or the white list of the wireless router is reset once.
Of course, both modes (network password update and white list) may also be performed simultaneously. The purpose of the network password update and/or the white list is to avoid that the visitor's terminal occupies the service resources of the wireless router for a long time. It will be appreciated that the number of terminal connections of the wireless router is limited, since too many terminals are connected to the wireless router, which can cause overload of the wireless router and also affect the network access speed of each terminal.
Terminals connected with the wireless router but in a dormant state can be removed by means of network password updating and white list placement, so that resources of the wireless router can be distributed to terminals for network access.
Referring to fig. 3, in some examples, adding the terminal name to the white list further includes:
s201, checking the charge state of the account corresponding to the terminal; and
s202, allowing the terminal to add a white list when the fee state is normal.
The contents of step S201 and step S202 are to ensure that the visitor can pay the network usage fee in time. It should be understood that in this application, the operator may sell and manage the fee through the hardware device to achieve the benefit, the owner or manager of the wireless router earns the benefit by collecting the fee, and the visitor uses the visitor network by paying the fee.
Therefore, in step S201, it is necessary to check the charge status of the account corresponding to the terminal first, and allow the terminal to add to the white list when the charge status is normal, that is, the content in step S202. Otherwise, refusing the terminal with abnormal cost to add to the white list.
The abnormal cost refers to the condition that the terminal has arrears, for example, in the last use process, the cost generated by the use time exceeds the account balance to cause arrears. For this case, after checking the fee status, a reminder is sent out on the WeChat applet, and the visitor needs to recharge the account to change the fee status to normal, and after the fee status is normal, step S202 is continuously performed.
For the network usage situation of the terminals in the white list, the application is limited in such a way that each terminal in the white list is endowed with a traffic channel with a fixed maximum value, and when the sum of the fixed maximum values of a plurality of traffic channels is smaller than or equal to the traffic channel value of the visitor network, a new terminal is not allowed to be added into the white list.
From the above, it can be seen that the following two limiting modes are the flow channel limit and the terminal number limit, respectively. The traffic channel restriction may guarantee the network usage speed of each terminal accessing the guest network by assigning a traffic channel with a fixed maximum value to each terminal in the white list, or may be described as a bandwidth.
When a visitor accesses a visitor network by using terminals, the bandwidth belonging to the visitor is fixed, and at the same time, the number of terminals in the visitor network is fixed, and the terminals can be in an active state or a dormant state.
The method has the advantages that the speed of accessing the mobile internet by the terminals in the visitor network can be ensured due to the limitation of the bandwidth and the quantity, the delay phenomenon caused by the excessive quantity of the terminals in the visitor network can be avoided, and the visitor network can accommodate more terminals in the limited bandwidth.
In contrast to fig. 4 and 5, the flow channels can be managed in a stepped manner for a fixed maximum. For example, the guest network has ten units of bandwidth resources, and the ten units of bandwidth resources may be equally allocated to ten terminals, or the ten units of bandwidth resources may be unevenly allocated to multiple terminals.
The advantage of this approach is that the terminal can select the appropriate bandwidth resources and pay the corresponding usage fees according to the requirements. For example, a visitor uses the visitor's network to view the video, where a visitor selects to use, for example, five units of bandwidth resources, and a visitor who only chat may select to use, for example, one unit of bandwidth resources.
This way, the use requirements can be met with less effort for the visitor; more revenue can also be generated for the owner or manager of the wireless router.
Further, referring to fig. 6, the following steps are added:
s301, starting timing after a terminal in a white list is converted from an active state to a dormant state; and
s302, removing the terminal from the white list after the timing reaches the set time.
The content in step S301 and step S302 is a cost indication of controlling the guest. It should be appreciated that the present application uses a time charging approach to charging because the time charging approach is simpler than traffic charging and the wireless router does not need to spend more computing resources here.
However, the time charging is that the terminal of the visitor is connected with the wireless router but does not generate data transmission and reception, and this time, if still charging, inevitably leads to an increase in the use cost of the visitor. To solve this problem, a terminal in the white list starts to count when it is changed from an active state to a dormant state, and then is removed from the white list after the count reaches a set time.
Therefore, the connection between the terminal of the visitor and the wireless router can be automatically disconnected under the condition that the terminal of the visitor is connected with the wireless router but data receiving and transmitting are not generated, and the use cost of using the visitor network is controlled. Another advantage of using the set time is the ability to have other terminals that need to use the guest network join the guest network.
The purpose of using the set time is that a temporary disconnection may occur during use, in which case the terminal does not need to be removed from the whitelist.
In some suitable ways, the set time may be 15-30 minutes.
The set time can be determined by the visitor network or can be given by each terminal in the white list, for example, when the visitor uses the terminal to connect the visitor network, the password needs to be input, and the set time can be input in the process.
It should be noted that, of course, the visitor network is to make a call to the designated terminal, that is, when the designated terminal reconnects to the network or changes from the dormant state to the active state, the fixed maximum value of the traffic channel of at least one terminal in the white list is adjusted, and at the same time, the charging rule of the terminal whose fixed maximum value of the traffic channel is adjusted.
The adjustment here is to reduce the bandwidth of the traffic channel of at least one terminal, while the charging rules need to be adjusted. The design can ensure that the appointed terminal accesses the Internet and simultaneously distributes redundant bandwidth resources to the visitor network for use, and the situation that the appointed terminal cannot access the Internet or the access speed is too low is avoided.
In some examples, the whitelist corresponds to a fixed value of the number of terminals in the guest network;
when the number of terminals in the white list corresponding to the visitor network is equal to a fixed value, new terminals are not allowed to join the white list corresponding to the visitor network.
This can serve as a limitation of the number of terminals, since it was mentioned in the foregoing that one wireless router has a limited number of service terminals, by limiting the number of terminals in the guest network, the quality of service of the wireless router can be guaranteed, which is limited to be higher than the allocation rule of bandwidth resources.
When the number reaches the limit but the residual bandwidth resource exists, the part of bandwidth resource can be used as idle resource, allocated when the specified terminal needs to be used or freely allocated to the terminal in the visitor network for use, and then recovered when the specified terminal needs to be used.
The application also provides an access control device of the wireless router, which comprises:
the communication unit is used for responding to the acquired disconnection or dormancy signals of the appointed terminal and starting the visitor network;
an information acquisition unit for requesting a terminal name from a terminal that sent a connection request and transmitting a network password to the terminal that sent the connection request after acquiring the terminal name in response to the acquired connection signal;
the first processing unit is used for adding the terminal name into the white list and allowing the terminals in the white list to be added into the network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
a second processing unit, configured to limit a network speed of the terminal in the white list when the specified terminal is reconnected to the network or changes from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
Further, the method further comprises the following steps:
the verification unit is used for verifying the charge state of the account corresponding to the terminal; and
and the permission unit is used for permitting the terminal to be added into the white list when the fee state is normal.
Further, a traffic channel with a fixed maximum value is assigned to each terminal in the white list, and when the sum of the fixed maximum values of the traffic channels is less than or equal to the traffic channel value of the visitor network, a new terminal is not allowed to join the white list.
Further, the method further comprises the following steps:
the timing unit is used for starting timing after the terminal in the white list is converted from the active state to the dormant state; and
and the removing unit is used for removing the terminal from the white list after the timing reaches the set time.
Further, the set time is determined by the guest network or given by each terminal in the white list.
Further, when the designated terminal is reconnected to the network or is changed from the dormant state to the active state, the fixed maximum value of the traffic channel of at least one terminal in the white list is adjusted, and meanwhile, the charging rule of the terminal with the adjusted fixed maximum value of the traffic channel is adjusted.
Further, the number value of the terminals in the visitor network corresponding to the white list is a fixed value;
when the number of terminals in the white list corresponding to the visitor network is equal to a fixed value, new terminals are not allowed to join the white list corresponding to the visitor network.
In one example, the unit in any of the above apparatuses may be one or more integrated circuits configured to implement the above methods, for example: one or more application specific integrated circuits (application specific integratedcircuit, ASIC), or one or more digital signal processors (digital signal processor, DSP), or one or more field programmable gate arrays (field programmable gate array, FPGA), or a combination of at least two of these integrated circuit forms.
For another example, when the units in the apparatus may be implemented in the form of a scheduler of processing elements, the processing elements may be general-purpose processors, such as a central processing unit (central processing unit, CPU) or other processor that may invoke the program. For another example, the units may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Various objects such as various messages/information/devices/network elements/systems/devices/actions/operations/processes/concepts may be named in the present application, and it should be understood that these specific names do not constitute limitations on related objects, and that the named names may be changed according to the scenario, context, or usage habit, etc., and understanding of technical meaning of technical terms in the present application should be mainly determined from functions and technical effects that are embodied/performed in the technical solution.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, and are not repeated herein.
In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
It should also be understood that in various embodiments of the present application, first, second, etc. are merely intended to represent that multiple objects are different. For example, the first time window and the second time window are only intended to represent different time windows. Without any effect on the time window itself, the first, second, etc. mentioned above should not impose any limitation on the embodiments of the present application.
It is also to be understood that in the various embodiments of the application, terms and/or descriptions of the various embodiments are consistent and may be referenced to one another in the absence of a particular explanation or logic conflict, and that the features of the various embodiments may be combined to form new embodiments in accordance with their inherent logic relationships.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a computer-readable storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned computer-readable storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The application also provides an access control system of the wireless router, which comprises:
one or more memories for storing instructions; and
one or more processors configured to invoke and execute the instructions from the memory to perform the access control method for the wireless router as described above.
The present application also provides a computer program product comprising instructions that, when executed, cause the access control system to perform operations of the access control system corresponding to the above-described method.
The present application also provides a chip system comprising a processor for implementing the functions involved in the above, e.g. generating, receiving, transmitting, or processing data and/or information involved in the above method.
The chip system can be composed of chips, and can also comprise chips and other discrete devices.
The processor referred to in any of the foregoing may be a CPU, microprocessor, ASIC, or integrated circuit that performs one or more of the procedures for controlling the transmission of feedback information described above.
In one possible design, the system on a chip also includes memory to hold the necessary program instructions and data. The processor and the memory may be decoupled, and disposed on different devices, respectively, and connected by wired or wireless means, so as to support the chip system to implement the various functions in the foregoing embodiments. In the alternative, the processor and the memory may be coupled to the same device.
Optionally, the computer instructions are stored in a memory.
Alternatively, the memory may be a storage unit in the chip, such as a register, a cache, etc., and the memory may also be a storage unit in the terminal located outside the chip, such as a ROM or other type of static storage device, a RAM, etc., that may store static information and instructions.
It is to be understood that the memory in this application may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory.
The nonvolatile memory may be a ROM, a Programmable ROM (PROM), an Erasable Programmable ROM (EPROM), an electrically erasable programmable EPROM (EEPROM), or a flash memory.
The volatile memory may be RAM, which acts as external cache. There are many different types of RAM, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and direct memory bus RAM.
The embodiments of the present invention are all preferred embodiments of the present application, and are not intended to limit the scope of the present application in this way, therefore: all equivalent changes in structure, shape and principle of this application should be covered in the protection scope of this application.

Claims (10)

1. An access control method for a wireless router, comprising:
responding to the acquired disconnection or dormancy signals of the appointed terminal, and starting a visitor network;
responding to the acquired connection signal, requesting a terminal name from a terminal which sends a connection request, and sending a network password to the terminal which sends the connection request after acquiring the terminal name;
adding the terminal name into a white list and allowing terminals in the white list to be added into a network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
limiting the network speed of the terminal in the white list when the terminal is designated to be reconnected to the network or to be changed from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
2. The access control method of a wireless router according to claim 1, wherein adding a terminal name to a white list further comprises:
checking the charge state of the account corresponding to the terminal; and
and allowing the terminal to enter a white list when the charge state is normal.
3. The access control method of a wireless router according to claim 1, wherein each terminal in the whitelist is assigned a traffic channel having a fixed maximum value, and when the sum of the fixed maximum values of the plurality of traffic channels is equal to or less than the traffic channel value of the guest network, a new terminal is not allowed to join the whitelist.
4. The access control method of a wireless router according to claim 1 or 3, further comprising:
starting timing after the terminal in the white list is converted from an active state to a dormant state; and
the terminal is removed from the white list after the timer reaches the set time.
5. The access control method of a wireless router according to claim 4, wherein the set time is determined by the guest network or given by each terminal in a white list.
6. The access control method of a wireless router according to claim 3, wherein when a designated terminal reconnects to the network or changes from a dormant state to an active state, the fixed maximum value of the traffic channel of at least one terminal in the white list is adjusted, and at the same time, the charging rule of the terminal whose fixed maximum value of the traffic channel is adjusted.
7. The access control method of a wireless router according to claim 6, wherein the number of terminals in the white list corresponding to the visitor network is a fixed value;
when the number of terminals in the white list corresponding to the visitor network is equal to a fixed value, new terminals are not allowed to join the white list corresponding to the visitor network.
8. An access control apparatus for a wireless router, comprising:
the communication unit is used for responding to the acquired disconnection or dormancy signals of the appointed terminal and starting the visitor network;
an information acquisition unit for requesting a terminal name from a terminal that sent a connection request and transmitting a network password to the terminal that sent the connection request after acquiring the terminal name in response to the acquired connection signal;
the first processing unit is used for adding the terminal name into the white list and allowing the terminals in the white list to be added into the network, and calculating the cost by using a charging rule after the terminals in the white list are added into the network; and
a second processing unit, configured to limit a network speed of the terminal in the white list when the specified terminal is reconnected to the network or changes from the dormant state to the active state;
wherein each broadcast period uses a different network password and/or performs a reset process on the whitelist.
9. An access control system for a wireless router, the system comprising:
one or more memories for storing instructions; and
one or more processors to invoke and execute the instructions from the memory to perform the access control method of the wireless router of any of claims 1-7.
10. A computer-readable storage medium, the computer-readable storage medium comprising:
program which, when executed by a processor, is executed by an access control method of a wireless router according to any one of claims 1 to 7.
CN202310397554.9A 2023-04-14 2023-04-14 Access control method, device and system of wireless router and storage medium Active CN116113012B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310397554.9A CN116113012B (en) 2023-04-14 2023-04-14 Access control method, device and system of wireless router and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310397554.9A CN116113012B (en) 2023-04-14 2023-04-14 Access control method, device and system of wireless router and storage medium

Publications (2)

Publication Number Publication Date
CN116113012A true CN116113012A (en) 2023-05-12
CN116113012B CN116113012B (en) 2023-07-21

Family

ID=86254724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310397554.9A Active CN116113012B (en) 2023-04-14 2023-04-14 Access control method, device and system of wireless router and storage medium

Country Status (1)

Country Link
CN (1) CN116113012B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN105391846A (en) * 2015-10-12 2016-03-09 努比亚技术有限公司 Method and device for establishing shared network, and system
CN107148022A (en) * 2017-06-30 2017-09-08 腾讯科技(深圳)有限公司 A kind of anti-loiter network based reminding method and relevant device
CN107635203A (en) * 2017-09-22 2018-01-26 北京小米移动软件有限公司 Access the authentication method and device of wireless network
CN108156085A (en) * 2017-12-08 2018-06-12 上海斐讯数据通信技术有限公司 A kind of intelligent speed-limiting method and system of router
CN108834142A (en) * 2018-05-04 2018-11-16 深圳市彬讯科技有限公司 Wireless router and its connection authentication method
WO2019037350A1 (en) * 2017-08-22 2019-02-28 上海斐讯数据通信技术有限公司 Router and method for generating guest network password of router and system
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system
US20190207948A1 (en) * 2017-12-31 2019-07-04 Securing Sam Ltd. System and method for securing communication between devices on a network
CN111132047A (en) * 2019-11-14 2020-05-08 华为终端有限公司 Network connection method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN105391846A (en) * 2015-10-12 2016-03-09 努比亚技术有限公司 Method and device for establishing shared network, and system
CN107148022A (en) * 2017-06-30 2017-09-08 腾讯科技(深圳)有限公司 A kind of anti-loiter network based reminding method and relevant device
WO2019037350A1 (en) * 2017-08-22 2019-02-28 上海斐讯数据通信技术有限公司 Router and method for generating guest network password of router and system
CN107635203A (en) * 2017-09-22 2018-01-26 北京小米移动软件有限公司 Access the authentication method and device of wireless network
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system
CN108156085A (en) * 2017-12-08 2018-06-12 上海斐讯数据通信技术有限公司 A kind of intelligent speed-limiting method and system of router
US20190207948A1 (en) * 2017-12-31 2019-07-04 Securing Sam Ltd. System and method for securing communication between devices on a network
CN108834142A (en) * 2018-05-04 2018-11-16 深圳市彬讯科技有限公司 Wireless router and its connection authentication method
CN111132047A (en) * 2019-11-14 2020-05-08 华为终端有限公司 Network connection method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ZHEN CAO;ET AL: "Social Wi-Fi: hotspots sharing with online friends", 《2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL,INDOOR,AND MOBILE RADIO COMMUNICATIONS(PIMRC)》 *
姜璇: "家庭Wi-Fi安全共享平台的设计与实现", 《中国优秀硕士学位论文辑》 *

Also Published As

Publication number Publication date
CN116113012B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
US7802292B2 (en) Application of dynamic profiles to the allocation and configuration of network resources
US9781743B2 (en) Telecommunications network and method for time-based network access
US7191179B2 (en) Distributed profile storage and management in a telecommunication network
CN109462831B (en) Method, distribution server and system for accessing network by application program in mobile terminal
CN1929482B (en) Network business identification method and device
WO2021027478A1 (en) Sim card resource allocation method and system, terminal device, and storage medium
CN110944007B (en) Network access management method, system, device and storage medium
CN112492592A (en) Authorization method under multiple NRF scenes
CN112541724A (en) Distribution method and device, electronic equipment and storage medium
CN116113012B (en) Access control method, device and system of wireless router and storage medium
CN112202755B (en) Server distribution method, device, equipment and medium
CN115456709A (en) Equipment leasing method and device and electronic equipment
CN109525991B (en) Method, distribution server and system for network login
CN115348643A (en) Wi-Fi network access method and device and computer readable storage medium
CN109526009B (en) Communication method, mobile terminal and system
CN108924953B (en) AP management method and device
CN113810435A (en) CDN allocation method, device, terminal and medium
CN111935832A (en) Network resource allocation method and device and computer equipment
CN108769284A (en) A kind of domain name analytic method, server and system
US20240031784A1 (en) Enhanced charging in cellular communication networks
JP6888047B2 (en) Communication system, communication control device and communication control method
US8381263B1 (en) System, method, and computer program for allowing a non-chargeable event based on an authorization thereof
CN101656607A (en) Method, system and device for determining assertion sender
US20220070303A1 (en) Methods and nodes for maintaining a communication session for a subscriber
CN117083836A (en) Method, device and system for charge management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant