WO2017088592A1 - 一种控制无线网络访问客户端的方法及系统 - Google Patents

一种控制无线网络访问客户端的方法及系统 Download PDF

Info

Publication number
WO2017088592A1
WO2017088592A1 PCT/CN2016/101399 CN2016101399W WO2017088592A1 WO 2017088592 A1 WO2017088592 A1 WO 2017088592A1 CN 2016101399 W CN2016101399 W CN 2016101399W WO 2017088592 A1 WO2017088592 A1 WO 2017088592A1
Authority
WO
WIPO (PCT)
Prior art keywords
access client
configuration information
wireless network
wireless device
wireless
Prior art date
Application number
PCT/CN2016/101399
Other languages
English (en)
French (fr)
Inventor
陈教滨
Original Assignee
上海斐讯数据通信技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海斐讯数据通信技术有限公司 filed Critical 上海斐讯数据通信技术有限公司
Publication of WO2017088592A1 publication Critical patent/WO2017088592A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection

Definitions

  • the present invention relates to the field of wireless network communication technologies, and in particular, to a method and system for controlling a wireless network to access a client.
  • wireless network communication technology people are more and more accustomed to using wireless networks for various activities, such as watching videos, shopping, and browsing the web.
  • people often connect to wireless networks through the wireless capabilities of wireless devices.
  • the wireless function of wireless devices is to forward broadband network signals through antennas to nearby access clients, such as laptops, smartphones, and all WIFI-enabled devices.
  • the access client often enters the password of the wireless network, and when the password is correct, the authentication succeeds, so that it can be connected to the wireless device, and the authentication fails to connect to the wireless device.
  • An object of the embodiments of the present invention is to provide a method and system for controlling a wireless network to access a client, which can control the number of access clients and avoid excessive use of wireless resources.
  • a method for controlling a wireless network access client includes:
  • a system for controlling a wireless network access client comprising:
  • An access client detecting unit configured to detect a signal strength of an access client associated with the wireless network interface, and obtain configuration information related to the access client;
  • a first determining unit configured to determine, when the configuration information related to the accessing client is not in the HASH table of the wireless device, whether the signal strength of the accessing client reaches a preset threshold
  • An information saving unit configured to: when a signal strength of the access client reaches the preset threshold, Saving configuration information related to the access client to the HASH table;
  • a communication establishing unit configured to allocate an ebtables rule for configuration information related to the access client and allow the access client to establish wireless communication with the wireless device.
  • a method and system for controlling a wireless network access client provided by an embodiment of the present invention, by setting a wireless signal threshold, automatically disconnecting an access client that is far away from the wireless device, thereby being better able to be closer to the wireless device. Access the client for service. This can limit the signal coverage of the wireless device, thereby limiting the number of access clients that are simultaneously connected to the wireless device, providing a better network experience for access clients connected to the wireless device, and avoiding excessive use of wireless resources.
  • FIG. 1 is a flowchart of a method for controlling a wireless network to access a client according to an embodiment of the present invention
  • FIG. 2 is a functional block diagram of a system for controlling a wireless network to access a client according to an embodiment of the present invention.
  • FIG. 1 is a flowchart of a method for controlling a wireless network to access a client according to an embodiment of the present invention.
  • the processes described below include multiple operations occurring in a particular order, it should be clearly understood that these processes can include more or fewer operations that can be performed sequentially or in parallel (eg, using a parallel processor or a multi-threaded environment).
  • the method may include:
  • S1 Detecting the signal strength of the access client associated with the wireless network interface and obtaining configuration information related to the access client.
  • the wireless device may not set a verification password, which may provide convenience for the user to connect to the wireless network.
  • the embodiment of the present invention may set the wireless device to establish a wireless connection with an access client that is closer to the distance, and interrupt the wireless connection with the remote access client, so that Limit the coverage of wireless devices, thereby controlling the number of access clients connected to the wireless device, avoiding excessive use of wireless resources and affecting the access experience of the client.
  • the access client may include various devices with a wireless communication module, such as a notebook computer, a smart phone, a tablet computer, a personal digital assistant, and the like.
  • an ioctl interface may be added in the wireless driver layer.
  • the ioctl is a function of the device driver to manage the I/O channel of the device.
  • the ioctl interface has the ability to read and write devices, and can control various hardware through device drivers, such as controlling the device to eject media, reporting errors, and changing the baud rate.
  • the signal strength of the access client associated with the wireless network interface and the configuration information associated with the access client may be detected in real time through the ioctl interface.
  • the signal strength of the access client detected in the embodiment of the present invention can be represented by a numerical value, for example, -50 dB.
  • the configuration information associated with the access client may include a MAC address of the access client and an interface number of a wireless network interface to which the access client is associated.
  • the access client's MAC address can be used to uniquely represent the access client.
  • the interface number of the wireless network interface can also uniquely represent the wireless network interface.
  • the configuration information associated with the access client includes a correspondence between the access client and the wireless network interface, so that related information of the access client can be monitored.
  • any access client that establishes a wireless connection with the wireless device is recorded in the HASH table of the wireless device.
  • configuration information such as the MAC address of the access client and the interface number of the wireless network interface to which the access client is associated may be recorded, so that the configuration information of the access client exists in the HASH table of the wireless device.
  • the access client can then establish a wireless connection with the wireless device so that the wireless device can be used by the wireless device.
  • the wireless device compares the configuration information with information in its own HASH table, when the accessing client is related to When the configuration information does not exist in the HASH table of the wireless device, it can be considered that the current access client does not establish a wireless connection with the wireless device. At this time, it may continue to determine whether the information strength of the access client reaches a preset threshold. When the signal strength of the access client reaches the preset threshold, configuration information related to the access client may be saved in the HASH table. In this way, the access client can be allowed to make a wireless connection with the wireless device.
  • the preset threshold may be preset by the administrator of the wireless device, and the size of the preset threshold may determine the size of the wireless device coverage.
  • the larger the preset threshold the stronger the signal strength of the required access client. That is, the closer the access client needs to the wireless device, the smaller the coverage of the wireless device.
  • the preset threshold may be set to, for example, -30 dB, so that when the signal strength of the access client reaches -30 dB, the configuration information related to the access client may be saved in the HASH table of the wireless device. .
  • the MAC address of the access client and the interface number of the wireless network interface to which the access client is associated may be recorded into the HASH table of the wireless device, so that the access client has the right to access the wireless device, and The wireless network is used by the wireless device.
  • the configuration information of the access client originally exists in the HASH table of the wireless device, it indicates that the access client has obtained the right to access the wireless device, and the wireless network can already be used by the wireless device. Then, at this time, the recording time of the configuration information related to the access client recorded in the HASH table of the wireless device can be updated and updated to the current system time. The significance of this is that the access to the client for wireless network usage can be monitored in real time. In some cases, although the access client obtains the rights of the wireless device, after using the wireless network for a period of time by the wireless device, the access client does not connect with the wireless device for a long time, if not the HASH table of the wireless device. If the recording time associated with the access client is updated, it is impossible to know whether the access client is currently in wireless communication with the wireless device.
  • S4 Allocating an ebtables rule for the configuration information related to the access client and allowing the access Ask the client to establish wireless communication with the wireless device.
  • the ebtables rule needs to be allocated for the configuration information.
  • the ebtables rule can be used as a configuration tool for filtering packets received by the wireless device.
  • a packet enters a wireless device, it needs to go through the five stages of PreRoute, Input, Forward, Output, and PostRoute. Each stage includes some nodes, each of which is a filter opportunity.
  • the wireless device's system can filter the data packet based on the ebtables rules assigned to the access client.
  • the filtering behavior of the ebtables rule may include four types, namely, ACCEPT, DROP, RETURE, and CONTINUE.
  • ACCEPT and DROP may be used to perform a tradeoff between the data packets of the access client.
  • the ACCEPT filtering behavior can be set for the access client whose signal strength reaches the preset threshold, so that the data packet of the access client can be allowed to interact with the wireless device through the wireless network interface, so that the wireless network can be used.
  • the ebtables rule may be pre-added to the wireless device to determine the conditions for the data packet to be accessed by the client.
  • the data packet at the wireless network interface can be discarded and the HASH table of the wireless device can be initialized, thereby completing the initialization process of the wireless device.
  • the wireless device After the wireless device is initialized, it can be detected whether the wireless network interface of the wireless device is turned on. When the wireless network interface is closed, the signal strength of the external access client cannot be detected, and the wireless network interface can be waited for. When the wireless network interface is enabled, the signal strength of the access client can be detected and the configuration information related to the access client can be obtained.
  • the configuration information of the access client that does not wirelessly connect with the wireless device for a long time may be configured from the wireless device. Deleted in the HASH table.
  • the embodiment of the present invention can traverse the configuration information recorded in the HASH table of the wireless device. Time, and compare the time of the configuration information with the current system time. When the difference between the time of the configuration information and the current system time is greater than a preset duration, the configuration information is deleted from the HASH table and the ebtables rule corresponding to the configuration information is deleted.
  • the preset duration may be preset for the administrator of the wireless device, for example, may be 5 minutes, so that when the difference between the time of the configuration information and the current system time is greater than 5 minutes, the preset time may be
  • the configuration information is deleted from the HASH table and the ebtables rule corresponding to the configuration information is deleted. In this way, the configuration information of the access client that does not establish a communication connection with the wireless device for a long time is deleted from the wireless device, thereby ensuring the real-time performance of the information in the HASH table and the expenditure for saving the HASH table.
  • a method for controlling a wireless network to access a client is provided by the embodiment of the present invention.
  • the access client that is far away from the wireless device is automatically disconnected, so that the distance wireless device can be better.
  • a closer access client performs the service. This can limit the signal coverage of the wireless device, thereby limiting the number of access clients that are simultaneously connected to the wireless device, providing a better network experience for access clients connected to the wireless device, and avoiding excessive use of wireless resources.
  • Embodiments of the present invention also provide a system for controlling a wireless network to access a client.
  • FIG. 2 is a schematic diagram of a system function module for controlling a wireless network to access a client according to an embodiment of the present invention. As shown in FIG. 2, the system includes:
  • the access client detecting unit 100 is configured to detect a signal strength of an access client associated with the wireless network interface, and obtain configuration information related to the access client;
  • the first determining unit 200 is configured to determine, when the configuration information related to the access client does not exist in the HASH table of the wireless device, whether the signal strength of the access client reaches a preset threshold;
  • the information storage unit 300 is configured to save configuration information related to the access client to the HASH table when the signal strength of the access client reaches the preset threshold;
  • the communication establishing unit 400 is configured to allocate an ebtables rule for the configuration information related to the access client and allow the access client to establish wireless communication with the wireless device.
  • the configuration information includes at least a MAC address of the access client and an interface number of the wireless network interface to which the access client is associated.
  • system further includes:
  • a time update unit configured to update a recording time of the configuration information in the HASH table when configuration information related to the access client exists in a HASH table of the wireless device.
  • the system before the accessing the client detecting unit 100, the system further includes:
  • An initialization unit configured to add an ebtables rule in the wireless device, discard the data packet at the wireless network interface, and initialize a HASH table of the wireless device;
  • An interface detecting unit is configured to detect whether the wireless network interface is enabled.
  • the system further includes:
  • a time comparison unit configured to traverse the time of the configuration information recorded in the HASH table of the wireless device, and compare the time of the configuration information with the current system time
  • a deleting unit configured to: when the difference between the time of the configuration information and the current system time is greater than a preset duration, delete the configuration information from the HASH table and the ebtables rule corresponding to the configuration information delete.
  • the system for controlling the wireless network accessing the client provided by the embodiment of the present invention automatically disconnects the access client that is far away from the wireless device by setting the wireless signal threshold, so that the distance wireless device can be better.
  • a closer access client performs the service. This can limit the signal coverage of the wireless device, thereby limiting the number of access clients that are simultaneously connected to the wireless device, providing a better network experience for access clients connected to the wireless device, and avoiding excessive use of wireless resources.
  • adjectives such as first and second may be used to distinguish one element or action from another element or action, and do not require or imply any actual such relationship or order.
  • Reference elements or parts or steps (etc.) should not be interpreted as It is limited to only one of the elements, components, or steps, and may be one or more of the elements, components, or steps.
  • the invention is applicable to a wide variety of general purpose or special purpose computer system environments or configurations.
  • the invention may be described in the general context of computer-executable instructions executed by a computer, such as a program module.
  • program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
  • the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
  • program modules can be located in both local and remote computer storage media including storage devices. While the invention has been described by the embodiments of the present invention, it will be understood that

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明提供一种控制无线网络访问客户端的方法及系统,其中,所述方法包括:检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中;为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。本发明实施例提供的一种控制无线网络访问客户端的方法及系统,能够控制访问客户端的数量,避免过度使用无线资源。

Description

一种控制无线网络访问客户端的方法及系统
本申请要求2015年11月27日提交的申请号为:201510847118.2、发明名称为“一种控制无线网络访问客户端的方法及系统”的中国专利申请的优先权,其全部内容合并在此。
技术领域
本发明涉及无线网络通信技术领域,特别涉及一种控制无线网络访问客户端的方法及系统。
背景技术
随着无线网络通信技术的不断发展,人们越来越习惯于利用无线网络进行各种活动,例如看视频,购物以及浏览网页等。目前,人们往往通过无线设备的无线功能连接上无线网络。无线设备的无线功能是将宽带网络信号通过天线转发给附近的访问客户端,例如笔记本电脑、智能手机以及所有带有WIFI功能的设备。
现有技术中,访问客户端往往通过输入无线网络的密码,当密码正确时则可以鉴权成功,从而可以连接到无线设备上,而鉴权失败就无法连接到无线设备上。
然而,通过上述方式进行无线网络的访问往往会有如下缺陷:
当某个区域人员比较密集时,例如在大型商场或者大型会议中,由于无线设备的数量较少,而使用无线网络的人员很多,这就造成无线资源的过度使用,导致无线资源的带宽不足以支持这些人员使用。因此,现有技术中一旦获知了无线设备的密码,便可以与无线设备进行连接,这样的方式往往会造 成无线资源的过度使用,最终导致访问客户端无法进行正常的网络通信。
应该注意,上面对技术背景的介绍只是为了方便对本发明的技术方案进行清楚、完整的说明,并方便本领域技术人员的理解而阐述的。不能仅仅因为这些方案在本发明的背景技术部分进行了阐述而认为上述技术方案为本领域技术人员所公知。
发明内容
本发明实施例的目的在于提供一种控制无线网络访问客户端的方法及系统,能够控制访问客户端的数量,避免过度使用无线资源。
本发明实施例提供的一种控制无线网络访问客户端的方法及系统是这样实现的:
一种控制无线网络访问客户端的方法,包括:
检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;
当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中;
为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。
一种控制无线网络访问客户端的系统,包括:
访问客户端检测单元,用于检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;
第一判断单元,用于当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
信息保存单元,用于当所述访问客户端的信号强度达到所述预设阈值时, 将与所述访问客户端相关的配置信息保存至所述HASH表中;
通信建立单元,用于为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。
本发明实施例提供的一种控制无线网络访问客户端的方法及系统,通过设置无线信号阈值,将距离无线设备较远的访问客户端自动断开连接,从而可以更好地为距离无线设备较近的访问客户端进行服务。这样从而可以限制无线设备的信号覆盖范围,从而限制同时连接至该无线设备的访问客户端的数量,为连接至该无线设备的访问客户端提供较好的网络体验,避免了无线资源的过度使用。
参照后文的说明和附图,详细公开了本发明的特定实施方式,指明了本发明的原理可以被采用的方式。应该理解,本发明的实施方式在范围上并不因而受到限制。在所附权利要求的精神和条款的范围内,本发明的实施方式包括许多改变、修改和等同。
针对一种实施方式描述和/或示出的特征可以以相同或类似的方式在一个或更多个其它实施方式中使用,与其它实施方式中的特征相组合,或替代其它实施方式中的特征。
应该强调,术语“包括/包含”在本文使用时指特征、整件、步骤或组件的存在,但并不排除一个或更多个其它特征、整件、步骤或组件的存在或附加。
附图说明
所包括的附图用来提供对本发明实施例的进一步的理解,其构成了说明书的一部分,用于例示本发明的实施方式,并与文字描述一起来阐释本发明的原理。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动性的前提下,还可以根据这些附图获得其他的附图。在附图中:
图1为本发明实施例提供的一种控制无线网络访问客户端的方法流程图;
图2为本发明实施例提供的一种控制无线网络访问客户端的系统的功能模块图。
具体实施方式
为了使本技术领域的人员更好地理解本发明中的技术方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其它实施例,都应当属于本发明保护的范围。
图1为本发明实施例提供的一种控制无线网络访问客户端的方法流程图。虽然下文描述流程包括以特定顺序出现的多个操作,但是应该清楚了解,这些过程可以包括更多或更少的操作,这些操作可以顺序执行或并行执行(例如使用并行处理器或多线程环境)。如图1所示,所述方法可以包括:
S1:检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息。
在本发明实施例中,无线设备可以不设置验证密码,这样可以为用户连接无线网络提供便利。另外,为了控制无线网络访问客户端的数量,本发明实施例可以将无线设备设定为与距离较近的访问客户端建立无线连接,而与距离较远的访问客户端中断无线连接,这样便可以限制无线设备的覆盖范围,从而控制连接至无线设备的访问客户端的数量,避免无线资源被过度使用,影响访问客户端的上网体验。
具体地,当无线设备的无线网络接口处于开启状态,以及访问客户端的无线功能同样处于开启状态时,访问客户端与无线网络接口之间会建立关联关系,该关联关系可以使得无线设备和访问客户端之间互相检测无线信号的强度,无线信号的强度越强,则表明无线设备与访问客户端的距离越近。尽管无线设备与访问客户端之间建立了关联关系,但这种关联关系仅仅具备相 互发现的功能,但并不支持访问客户端通过无线设备进行无线网络的使用。在本发明实施例中,所述访问客户端可以包括带有无线通信模块的各种设备,例如笔记本电脑,智能手机,平板电脑,个人数字助手等。
在本发明实施例中,可以在无线驱动层添加ioctl接口。所述ioctl是设备驱动程序中对设备的I/O通道进行管理的函数。ioctl接口具备读写设备的能力,能够通过设备驱动对各种硬件进行控制,例如可以控制设备弹出介质,报告错误,改变波特率等。
在本发明实施例中,可以通过所述ioctl接口实时检测关联至无线网络接口的访问客户端的信号强度以及获取与所述访问客户端相关联的配置信息。在本发明实施例中检测到的访问客户端的信号强度可以用数值进行表示,例如-50dB。所述与访问客户端相关联的配置信息可以包括所述访问客户端的MAC地址以及所述访问客户端关联至的无线网络接口的接口号。所述访问客户端的MAC地址可以用来唯一地表示所述访问客户端,同样地,所述无线网络接口的接口号同样可以同来唯一地表示所述无线网络接口。所述与访问客户端相关联的配置信息中包含了访问客户端与无线网络接口之间的对应关系,从而可以对访问客户端的相关信息进行监测。
S2:当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
S3:当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中。
在本发明实施例中,凡是与无线设备建立了无线连接的访问客户端均会被记录至无线设备的HASH表中。在无线设备的HASH表中,可以记录访问客户端的MAC地址以及所述访问客户端关联至的无线网络接口的接口号等配置信息,这样,只要访问客户端的配置信息存在于无线设备的HASH表中,那么该访问客户端便可以与无线设备建立无线连接,从而可以通过所述无线设备进行无线网络的使用。
因此,在本发明实施例中,当获取到与访问客户端相关的配置信息后,无线设备便会将该配置信息与自身的HASH表中的信息进行对比,当所述与访问客户端相关的配置信息不存在于无线设备的HASH表中时,便可以认为当前该访问客户端并没有与无线设备建立无线连接。此时,可以继续判断所述访问客户端的信息强度是否达到预设阈值。当所述访问客户端的信号强度达到所述预设阈值时,可以将与所述访问客户端相关的配置信息保存至所述HASH表中。这样,便可以允许所述访问客户端与无线设备进行无线连接。
所述预设阈值可以是无线设备的管理者预先设置的,该预设阈值的大小可以决定该无线设备覆盖范围的大小,该预设阈值越大,则说明需求的访问客户端的信号强度越强,也就是说需要访问客户端离无线设备越近,这样所述无线设备的覆盖范围就越小。在实际应用场景中,该预设阈值例如可以设置为-30dB,这样,当访问客户端的信号强度达到-30dB时,便可以将与该访问客户端相关的配置信息保存至无线设备的HASH表中。具体地,可以将该访问客户端的MAC地址以及该访问客户端关联至的无线网络接口的接口号记录至无线设备的HASH表中,从而使得该访问客户端具备了访问该无线设备的权限,可以通过该无线设备进行无线网络的使用。
另外,如果访问客户端的配置信息原本就存在于无线设备的HASH表中,则表明该访问客户端已经取得了访问无线设备的权限,已经可以通过该无线设备进行无线网络的使用。那么此时可以将无线设备的HASH表中记录的与该访问客户端相关的配置信息的记录时间进行更新,更新为当前的系统时间。这样做的意义在于,可以实时地监控访问客户端进行无线网络使用的情况。有些时候,尽管访问客户端获取了无线设备的权限,但是在通过无线设备使用过无线网络一段时长后,所述访问客户端便长时间不与该无线设备进行连接,如果不在无线设备的HASH表中更新与该访问客户端相关的记录时间,则无法得知该访问客户端当前是否与无线设备建立了无线通信。
S4:为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访 问客户端与无线设备建立无线通信。
在将与访问客户端相关的配置信息记录至无线设备的HASH表中后,还需要为该配置信息分配ebtables规则。所述ebtables规则可以作为无线设备接收到的数据包进行过滤的配置工具。在数据包进入无线设备时,需要经过PreRoute,Input,Forward,Output,PostRoute这五个阶段。每个阶段中包括了一些节点,每个节点就是一个过滤时机。当访问客户端的数据包行进到某个节点时,无线设备的系统就可以根据为该访问客客户端分配的ebtables规则对所述数据包进行过滤。
具体地,ebtables规则的过滤行为可以包括四种,即ACCEPT,DROP,RETURE以及CONTINUE,在本发明实施例中,可以采用ACCEPT和DROP,对访问客户端的数据包进行取舍。例如可以对信号强度达到预设阈值的访问客户端设置ACCEPT的过滤行为,从而可以允许该访问客户端的数据包通过无线网络接口,实现与无线设备的交互,从而可以进行无线网络的使用。
在本发明一优选实施例中,在无线设备对访问客户端进行信号检测和配置信息获取之前,可以在无线设备中预先添加ebtables规则,决定对于访问客户端的数据包进行取舍的条件。同时可以丢弃无线网络接口处的数据包以及初始化所述无线设备的HASH表,从而完成对无线设备的初始化过程。
在对无线设备进行初始化后,便可以检测所述无线设备的无线网络接口是否开启。当所述无线网络接口关闭时,则无法检测外部访问客户端的信号强度,此时便可以等待无线网络接口的开启。当无线网络接口开启后,便可以对访问客户端的信号强度进行检测以及获取与所述访问客户端相关的配置信息。
另外,在本发明另一优选实施例中,为了保证HASH表中信息的实时性以及为了节省HASH表的开支,可以将长时间不与无线设备进行无线连接的访问客户端的配置信息从无线设备的HASH表中删除。
具体地,本发明实施例可以遍历无线设备的HASH表中记录的配置信息 的时间,并将所述配置信息的时间与当前系统时间进行对比。当所述配置信息的时间与所述当前系统时间之间的差距大于预设时长时,将所述配置信息从所述HASH表中删除并将所述配置信息对应的ebtables规则删除。所述预设时长可以为无线设备的管理者预先设置的,例如可以为5分钟,这样,当所述配置信息的时间与所述当前系统时间之间的差距大于5分钟时,则可以将所述配置信息从所述HASH表中删除并将所述配置信息对应的ebtables规则删除。这样,与无线设备长时间不建立通信连接的访问客户端的配置信息便会从该无线设备中删除,从而可以保证HASH表中信息的实时性以及为了节省HASH表的开支。
由上可见,本发明实施例提供的一种控制无线网络访问客户端的方法,通过设置无线信号阈值,将距离无线设备较远的访问客户端自动断开连接,从而可以更好地为距离无线设备较近的访问客户端进行服务。这样从而可以限制无线设备的信号覆盖范围,从而限制同时连接至该无线设备的访问客户端的数量,为连接至该无线设备的访问客户端提供较好的网络体验,避免了无线资源的过度使用。
本发明实施例还提供一种控制无线网络访问客户端的系统。图2为本发明实施例提供的一种控制无线网络访问客户端的系统功能模块图。如图2所示,所述系统包括:
访问客户端检测单元100,用于检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;
第一判断单元200,用于当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
信息保存单元300,用于当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中;
通信建立单元400,用于为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。
其中,所述配置信息至少包括所述访问客户端的MAC地址以及所述访问客户端关联至的无线网络接口的接口号。
在本发明一优选实施例中,所述系统还包括:
时间更新单元,用于当与所述访问客户端相关的配置信息存在于无线设备的HASH表中时,在所述HASH表中更新所述配置信息的记录时间。
在本发明另一优选实施例中,在所述访问客户端检测单元100之前,所述系统还包括:
初始化单元,用于在无线设备中添加ebtables规则,丢弃无线网络接口处的数据包以及初始化所述无线设备的HASH表;
接口检测单元,用于检测所述无线网络接口是否开启。
在本发明另一优选实施例中,在通信建立单元400之后,所述系统还包括:
时间对比单元,用于遍历无线设备的HASH表中记录的配置信息的时间,并将所述配置信息的时间与当前系统时间进行对比;
删除单元,用于当所述配置信息的时间与所述当前系统时间之间的差距大于预设时长时,将所述配置信息从所述HASH表中删除并将所述配置信息对应的ebtables规则删除。
由上可见,本发明实施例提供的一种控制无线网络访问客户端的系统,通过设置无线信号阈值,将距离无线设备较远的访问客户端自动断开连接,从而可以更好地为距离无线设备较近的访问客户端进行服务。这样从而可以限制无线设备的信号覆盖范围,从而限制同时连接至该无线设备的访问客户端的数量,为连接至该无线设备的访问客户端提供较好的网络体验,避免了无线资源的过度使用。
在本说明书中,诸如第一和第二等这样的形容词仅可以用于将一个元素或动作与另一元素或动作进行区分,而不必要求或暗示任何实际的这种关系或顺序。在环境允许的情况下,参照元素或部件或步骤(等)不应解释为局 限于仅元素、部件、或步骤中的一个,而可以是元素、部件、或步骤中的一个或多个等。
上面对本发明的各种实施方式的描述以描述的目的提供给本领域技术人员。其不旨在是穷举的、或者不旨在将本发明限制于单个公开的实施方式。如上所述,本发明的各种替代和变化对于上述技术所属领域技术人员而言将是显而易见的。因此,虽然已经具体讨论了一些另选的实施方式,但是其它实施方式将是显而易见的,或者本领域技术人员相对容易得出。本社恩情旨在包括在此已经讨论过的本发明的所有替代、修改、和变化,以及落在上述申请的精神和范围内的其它实施方式。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
本发明可用于众多通用或专用的计算机系统环境或配置中。例如:个人计算机、服务器计算机、手持设备或便携式设备、平板型设备、多处理器系统、基于微处理器的系统、置顶盒、可编程的消费电子设备、网络PC、小型计算机、大型计算机、包括以上任何系统或设备的分布式计算环境等等。
本发明可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本发明,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。虽然通过实施例描绘了本发明,本领域普通技术人员知道,本发明有许多变形和变化而不脱离本发明的精神,希望所附的权利要求包括这些变形和变化而不脱离本发明的精神。

Claims (10)

  1. 一种控制无线网络访问客户端的方法,其特征在于,包括:
    检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;
    当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
    当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中;
    为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。
  2. 如权利要求1所述的一种控制无线网络访问客户端的方法,其特征在于,所述配置信息至少包括所述访问客户端的MAC地址以及所述访问客户端关联至的无线网络接口的接口号。
  3. 如权利要求1所述的一种控制无线网络访问客户端的方法,其特征在于,所述方法还包括:
    当与所述访问客户端相关的配置信息存在于无线设备的HASH表中时,在所述HASH表中更新所述配置信息的记录时间。
  4. 如权利要求1所述的一种控制无线网络访问客户端的方法,其特征在于,在所述检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息之前,所述方法还包括:
    在无线设备中添加ebtables规则,丢弃无线网络接口处的数据包以及初始化所述无线设备的HASH表;
    检测所述无线网络接口是否开启。
  5. 如权利要求1所述的一种控制无线网络访问客户端的方法,其特征在于,在允许所述访问客户端与无线设备建立无线通信之后,所述方法还包括:
    遍历无线设备的HASH表中记录的配置信息的时间,并将所述配置信息的时间与当前系统时间进行对比;
    当所述配置信息的时间与所述当前系统时间之间的差距大于预设时长时,将所述配置信息从所述HASH表中删除并将所述配置信息对应的ebtables规则删除。
  6. 一种控制无线网络访问客户端的系统,其特征在于,包括:
    访问客户端检测单元,用于检测关联至无线网络接口的访问客户端的信号强度并获取与所述访问客户端相关的配置信息;
    第一判断单元,用于当与所述访问客户端相关的配置信息不存在于无线设备的HASH表中时,判断所述访问客户端的信号强度是否达到预设阈值;
    信息保存单元,用于当所述访问客户端的信号强度达到所述预设阈值时,将与所述访问客户端相关的配置信息保存至所述HASH表中;
    通信建立单元,用于为与所述访问客户端相关的配置信息分配ebtables规则并允许所述访问客户端与无线设备建立无线通信。
  7. 如权利要求6所述的一种控制无线网络访问客户端的系统,其特征在于,所述配置信息至少包括所述访问客户端的MAC地址以及所述访问客户端关联至的无线网络接口的接口号。
  8. 如权利要求6所述的一种控制无线网络访问客户端的系统,其特征在于,所述系统还包括:
    时间更新单元,用于当与所述访问客户端相关的配置信息存在于无线设备的HASH表中时,在所述HASH表中更新所述配置信息的记录时间。
  9. 如权利要求6所述的一种控制无线网络访问客户端的系统,其特征在于,在所述访问客户端检测单元之前,所述系统还包括:
    初始化单元,用于在无线设备中添加ebtables规则,丢弃无线网络接口处的数据包以及初始化所述无线设备的HASH表;
    接口检测单元,用于检测所述无线网络接口是否开启。
  10. 如权利要求6所述的一种控制无线网络访问客户端的系统,其特征在于,在通信建立单元之后,所述系统还包括:
    时间对比单元,用于遍历无线设备的HASH表中记录的配置信息的时间,并将所述配置信息的时间与当前系统时间进行对比;
    删除单元,用于当所述配置信息的时间与所述当前系统时间之间的差距大于预设时长时,将所述配置信息从所述HASH表中删除并将所述配置信息对应的ebtables规则删除。
PCT/CN2016/101399 2015-11-27 2016-09-30 一种控制无线网络访问客户端的方法及系统 WO2017088592A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201510847118.2 2015-11-27
CN201510847118.2A CN105517099B (zh) 2015-11-27 2015-11-27 一种控制无线网络访问客户端的方法及系统

Publications (1)

Publication Number Publication Date
WO2017088592A1 true WO2017088592A1 (zh) 2017-06-01

Family

ID=55724653

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/101399 WO2017088592A1 (zh) 2015-11-27 2016-09-30 一种控制无线网络访问客户端的方法及系统

Country Status (2)

Country Link
CN (1) CN105517099B (zh)
WO (1) WO2017088592A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105517099B (zh) * 2015-11-27 2019-10-25 上海斐讯数据通信技术有限公司 一种控制无线网络访问客户端的方法及系统
CN107484037A (zh) * 2017-09-22 2017-12-15 上海斐讯数据通信技术有限公司 一种实现无线接入设备控制视频流的方法及系统
CN109362107B (zh) * 2018-11-12 2023-01-31 深圳市共进电子股份有限公司 无线中继器链路切换方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101253710A (zh) * 2005-08-30 2008-08-27 Lg电子株式会社 有效的无线资源管理的方法
WO2009075486A2 (en) * 2007-12-11 2009-06-18 Samsung Electronics Co., Ltd. Apparatus and method for controlling a terminal accessing a base station in broadband wireless communication system
CN101959282A (zh) * 2010-09-26 2011-01-26 杭州华三通信技术有限公司 无线局域网接入控制方法及其装置
CN104486763A (zh) * 2014-12-25 2015-04-01 北京海尔广科数字技术有限公司 一种无线接入设备及其实现接触式认证的方法
CN104540128A (zh) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 无线网络接入的方法、装置及系统
CN105517099A (zh) * 2015-11-27 2016-04-20 上海斐讯数据通信技术有限公司 一种控制无线网络访问客户端的方法及系统

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4011368B2 (ja) * 2002-02-27 2007-11-21 京セラ株式会社 無線通信システム及び無線通信方法
CN101534540B (zh) * 2009-04-20 2011-06-29 杭州华三通信技术有限公司 无线局域网络中探测帧的响应方法和设备
CN102036248B (zh) * 2010-12-23 2013-07-24 北京星网锐捷网络技术有限公司 拒绝服务攻击防御方法、系统、无线接入点及无线控制器
CN103781074B (zh) * 2014-02-08 2017-01-04 北京极科极客科技有限公司 无线局域网安全接入方法及设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101253710A (zh) * 2005-08-30 2008-08-27 Lg电子株式会社 有效的无线资源管理的方法
WO2009075486A2 (en) * 2007-12-11 2009-06-18 Samsung Electronics Co., Ltd. Apparatus and method for controlling a terminal accessing a base station in broadband wireless communication system
CN101959282A (zh) * 2010-09-26 2011-01-26 杭州华三通信技术有限公司 无线局域网接入控制方法及其装置
CN104486763A (zh) * 2014-12-25 2015-04-01 北京海尔广科数字技术有限公司 一种无线接入设备及其实现接触式认证的方法
CN104540128A (zh) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 无线网络接入的方法、装置及系统
CN105517099A (zh) * 2015-11-27 2016-04-20 上海斐讯数据通信技术有限公司 一种控制无线网络访问客户端的方法及系统

Also Published As

Publication number Publication date
CN105517099A (zh) 2016-04-20
CN105517099B (zh) 2019-10-25

Similar Documents

Publication Publication Date Title
EP3013086B1 (en) Method, apparatus and electronic device for connection management
US20180324182A1 (en) Network access control method and apparatus
US9198118B2 (en) Rogue wireless access point detection
US11528252B2 (en) Network device identification with randomized media access control identifiers
US9100303B2 (en) Methods, devices, and systems for allocating IP address
US9832802B2 (en) Facilitating communications via a mobile internet-enabled connection interface
US11075915B2 (en) System and method for securing communication between devices on a network
CN105635084A (zh) 终端认证装置及方法
US12009936B2 (en) Device identification and policy enforcement using power over ethernet (PoE)
US9967793B2 (en) Systems and methods for avoiding stalls in network connectivity at a computing device
US10078746B2 (en) Detecting unauthorized devices
KR102178305B1 (ko) IoT 네트워크 접근을 제어하는 보안 시스템
US20210385229A1 (en) Device zoning in a network gateway device
WO2017088592A1 (zh) 一种控制无线网络访问客户端的方法及系统
US20160269380A1 (en) Vpn communication terminal compatible with captive portals, and communication control method and program therefor
US11539731B2 (en) Dynamic hyper context-driven microsegmentation
US20130340046A1 (en) Wireless network client-authentication system and wireless network connection method thereof
US20180255074A1 (en) Managing data encrypting applications
CN104113548A (zh) 一种认证报文处理方法及装置
KR102310027B1 (ko) 결정 방법 및 대응하는 단말기, 컴퓨터 프로그램 제품 및 저장 매체
Malik et al. Using network traffic to verify mobile device forensic artifacts
WO2019062528A1 (zh) 接入控制方法及终端
US10708967B2 (en) Establishment of a connection between two local devices connected to different networks
US11218440B2 (en) Contiguous subnet IP address allocation
US10645085B2 (en) Device management across multiple operator networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16867819

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 16867819

Country of ref document: EP

Kind code of ref document: A1