WO2019037585A1 - 一种用于对用户设备进行无线连接预授权的方法与设备 - Google Patents

一种用于对用户设备进行无线连接预授权的方法与设备 Download PDF

Info

Publication number
WO2019037585A1
WO2019037585A1 PCT/CN2018/098513 CN2018098513W WO2019037585A1 WO 2019037585 A1 WO2019037585 A1 WO 2019037585A1 CN 2018098513 W CN2018098513 W CN 2018098513W WO 2019037585 A1 WO2019037585 A1 WO 2019037585A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
wireless
authorization
information
identification information
Prior art date
Application number
PCT/CN2018/098513
Other languages
English (en)
French (fr)
Inventor
程翰
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2019037585A1 publication Critical patent/WO2019037585A1/zh
Priority to US16/796,964 priority Critical patent/US11477646B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals

Definitions

  • the present application relates to the field of communications, and in particular, to a technology for performing wireless connection pre-authorization on user equipment.
  • the authentication mode of the traditional router is that the mode of the actuator is passive.
  • the hotspot owner needs to provide the authentication password to the user who wants to request the connection, and can complete the authorization after the authentication is passed or authenticated in a certain way.
  • Wireless connections In the process, the authentication authorization process and the process of using the network by the user are serial processes, and the user operation is cumbersome, time consuming, and the authorization time is long, resulting in poor authorized user experience.
  • a method for wirelessly pre-authorizing a user equipment at a user equipment end includes:
  • the wireless connection pre-authorization request of the user equipment is sent to the network device.
  • a method for wirelessly pre-authorizing a user equipment on a network device side includes:
  • a method for wirelessly pre-authorizing a user equipment at a wireless routing device includes:
  • the device identification information of the user equipment is pre-authorized by the wireless connection.
  • a method for wirelessly pre-authorizing a user equipment includes:
  • the user equipment sends a wireless connection pre-authorization request to the network device
  • the wireless routing device performs wireless connection pre-authorization on the device identification information of the user equipment.
  • a computer readable medium comprising instructions which, when executed, cause a system to perform the operations of the method as described above.
  • a user equipment for performing wireless connection pre-authorization on a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • a network device for performing wireless connection pre-authorization on a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • a wireless routing device for wirelessly pre-authorizing a user equipment, wherein the wireless routing device includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • the user equipment in the present application sends a wireless connection pre-authorization request to the network device; after receiving the network device, determining the device identification information of the user equipment according to the device identification information of the user equipment.
  • the wireless connection pre-authorization requesting the pre-authorization information of the corresponding wireless routing device, and transmitting the device identification information of the user equipment to the wireless routing device, and the device identification information of the user equipment is related to the wireless routing device Pre-authorization information; if the pre-authorization information includes pre-authorization success, the wireless routing device performs wireless connection pre-authorization on the device identification information of the user equipment; because the user equipment has been pre-authorized, the user passes through the The user equipment is connected to the wireless access point corresponding to the wireless routing device, and the user does not need to perform the cumbersome operation, which saves the connection time and optimizes the user experience.
  • the wireless connection pre-authorization request may include target address information, identification information of the target wireless access point, target time period information, and the like, and the user may select the target address information, the identification information of the target wireless access point, the target time period information, and the like.
  • the wireless connection pre-authorization request is initiated to the network device to provide more convenience for user operations.
  • FIG. 1 is a system topology diagram for performing wireless connection pre-authorization on a user equipment according to an embodiment of the present application
  • FIG. 2 is a flowchart of a method for performing wireless connection pre-authorization on a user equipment according to another embodiment of the present application
  • FIG. 3 is a flowchart of a method for performing connection authentication on a user equipment by a wireless routing device according to still another embodiment of the present application.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • FIG. 1 illustrates a system topology diagram for wireless connection pre-authorization of a user equipment, including a user equipment 1, a network device 2, and a wireless routing device 3, in accordance with an embodiment of the present application.
  • the user equipment 1 includes, but is not limited to, any electronic product that can perform human-computer interaction with the user, such as a smart phone, a tablet computer, a notebook computer, etc.; the electronic product can be operated by any operating system, such as android. System, iOS operating system, Windows operating system, etc.
  • the network device 2 includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance, and the hardware thereof includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC), a programmable gate array. (FPGA), digital processor (DSP), embedded devices, etc.
  • the network device 2 includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a plurality of servers; wherein the cloud is composed of a large number of computers or network servers based on Cloud Computing.
  • cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computers.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like.
  • the wireless routing device 3 includes a device capable of connecting to each local area network and a wide area network; preferably, the wireless routing device 3 is capable of broadcasting a wireless access point to user equipment within a certain distance range based on the 802.11 protocol cluster; preferably, The authentication type of the wireless routing device 2 is non-open system authentication.
  • FIG. 2 is a flowchart of a method for performing wireless connection pre-authorization on a user equipment according to another embodiment of the present application, where the method includes steps S11 and S12 performed on the user equipment side, at the network device end. Step S21, step S22, and step S23 are performed, and steps S31 and S32 are performed on the wireless routing device side.
  • step S11 the user equipment 1 sends a wireless connection pre-authorization request of the user equipment 1 to the network device 2; in step S21, the network device 2 acquires a wireless connection pre-authorization request sent by the user equipment 1; in step S22, the network device Determining, according to the device identification information of the user equipment 1, the pre-authorization information of the device identification information of the user equipment 1 with respect to the wireless routing device 3 corresponding to the wireless connection pre-authorization request; in step S23, the network device 2 The wireless routing device 3 transmits the device identification information of the user equipment 1 and the pre-authorization information of the device identification information of the user equipment 1 with respect to the wireless routing device; in step S31, the wireless routing device 3 receives the information sent by the network device 2 Device identification information of the user equipment 1 and pre-authorization information of the device identification information of the user equipment 1 with respect to the wireless routing device 3; in step S32, if the pre-authorization information includes pre-authorization success, the wireless routing device 3 The device identification information of the user
  • the wireless routing device 3 belongs to the work unit of user A
  • user A will go to the work unit.
  • the user A can send the wireless connection pre-authorization request to the network device 2 through the user equipment 1, and then the network device 2 sends the wireless connection pre-authorization request to the wireless routing device 3 based on the wireless connection pre-authorization request.
  • the pre-authorization information and the device identification information of the user equipment 1 are used by the wireless routing device 3 to perform wireless connection pre-authorization on the user equipment 1 according to the device identification information of the user equipment 1.
  • the user A arrives at a location near the wireless routing device 3 (for example, the wireless routing device 3 belongs to the work unit of the user A, the user A arrives at the work unit) because the user equipment 1 held by the user A
  • the user equipment 1 can be pre-authorized, and the user equipment 1 can connect to the wireless access point corresponding to the wireless routing device 3 without authorization, thereby optimizing the wireless connection experience of the user A.
  • the wireless connection pre-authorization request further includes device identification information of the user equipment 1.
  • the device identification information includes but is not limited to: MAC address information, device serial number information, Bluetooth identification information, user account information, phone number information, and the like.
  • the network device 2 may extract the device identification information of the user equipment 1 from the wireless connection pre-authorization request.
  • the network device 2 determines the device identification information of the user equipment 1 according to the device identification information of the user equipment 1 Pre-authorization information of the wireless routing device 3 corresponding to the wireless connection pre-authorization request, that is, the network device 2 needs to determine which wireless routing device (for example, the wireless routing device 3) the user equipment 1 requests to be pre-authorized to connect to, It is also possible to determine, based on the device identification information query, whether the user equipment 1 can be pre-authorized to connect to the wireless routing device, thereby obtaining the pre-authorization information (including, for example, pre-authorization success, pre-authorization failure, or no need for repeated authorization).
  • the user equipment 1 may not need to be re-authorized to connect to the wireless routing device 3; of course, in practice The user equipment 1 can also be pre-authorized to connect to the wireless routing device 3.
  • the wireless routing device 3 receives the pre-authorization information sent by the network device 2 and the device identification information of the user equipment 1, if the pre-authorization information includes pre-authorization success, the wireless routing The device 3 performs wireless connection pre-authorization on the device identification information of the user equipment 1.
  • the wireless routing device 3 does not need to perform wireless connection pre-authorization on the device identification information of the user equipment 1.
  • the wireless connection pre-authorization request includes at least one of: target address information corresponding to the wireless connection pre-authorization request; target time-period information corresponding to the wireless connection pre-authorization request; the wireless connection pre-authorization request Device identification information and/or access point identification information of the corresponding target wireless access point.
  • the wireless routing device 3 is located in the coffee shop X, and if the user B is going to the coffee shop X, the user B can open the specific on the user equipment 1.
  • An application eg, an application that provides a wireless connection service
  • user B may submit the address of the coffee shop X (ie, the target address information) through the specific application, or user B may submit the wireless routing device 3 correspondingly through the specific application.
  • Device identification information such as BSSID
  • access point identification information such as SSID
  • user B when sending the wireless connection pre-authorization request, user B can submit the coffee shop X through the specific application. Address (ie, the target address information) and the target time period information.
  • the step S11 includes: the user equipment 1 detects device identification information and/or access point identification information of the target wireless access point; the user equipment 1 sends a wireless connection pre-authorization request of the user equipment 1 to the network device 2, where The wireless connection pre-authorization request includes device identification information and/or access point identification information of the target wireless access point corresponding to the wireless connection pre-authorization request.
  • user B may input a target wireless access point (a wireless access point corresponding to the wireless routing device 3) in a specific application on the user equipment 1.
  • the user equipment 1 first detects the device identification information and/or the access point identification information of the target wireless access point according to the information input by the user B, and then sends the wireless connection pre-authorization request to the network device 2.
  • the wireless connection pre-authorization request includes target address information corresponding to the wireless connection pre-authorization request.
  • the step S22 includes: the network device 2 queries the wireless routing device 3 corresponding to the wireless connection pre-authorization request according to the target address information; and determines the device identifier of the user device 1 according to the device identification information of the user device 1. Information regarding pre-authorization information of the wireless routing device 3.
  • user B may input target address information (such as coffee shop X) in a specific application on the user device 1, and then the user device 1 transmits the wireless connection pre-network to the network device 2.
  • Target address information such as coffee shop X
  • the network device 2 After receiving the wireless connection pre-authorization request, the network device 2 first determines, according to the target address information, which wireless routing devices (such as the wireless routing device 3) in the vicinity of the coffee shop X, and then based on the device identification information. The query determines whether the user equipment 1 can be pre-authorized to connect to the wireless routing device.
  • the wireless connection pre-authorization request further includes target time period information corresponding to the wireless connection pre-authorization request; the device identification information of the user equipment 1 is related to the pre-authorization information of the wireless routing device 3 in the target time period. Valid within the information.
  • the user equipment 1 transmits the wireless to the network device 2
  • the user B can refer to the target time period information through a specific application on the user equipment 1.
  • the network device 2 may pre-authorize the user equipment 1 to connect to the wireless access point corresponding to the wireless routing device 3 in the target time period information.
  • the wireless routing device 3 allows the user equipment 1 to wirelessly connect only in the target time period information according to the pre-authorization information sent by the network device 2. If the user equipment 1 connects to the wireless access point corresponding to the wireless routing device 3 outside the target time period information, additional authorization or authentication is required.
  • the method further includes step S33 performed on the wireless routing device end, and the step S12 includes step S121 and step S122.
  • step S121 the user equipment 1 sends a connection authentication request to the wireless access point corresponding to the wireless routing device 3; in step S33, when the wireless routing device 3 receives the wireless corresponding to the wireless routing device 3 by the user equipment 1 a connection authentication request sent by the access point, and the device identification information of the user equipment 1 is pre-authorized with respect to the wireless access point, and the wireless routing device 3 sends the authentication response information to the user equipment 1
  • step S122 when the wireless access point that receives the connection authentication request is the wireless access point that is permitted to connect, the user equipment 1 receives the authentication returned by the wireless routing device 3 that provides the wireless access point. Response information.
  • the user equipment 1 can automatically send a connection authentication request to the wireless access point corresponding to the wireless routing device 3.
  • the user equipment 1 may send a connection authentication request to the wireless access point corresponding to the wireless routing device 3 based on the manual operation of the user A.
  • the wireless routing device 3 After receiving the connection authentication request, the wireless routing device 3 determines whether the user equipment 1 has been pre-authorized based on the device identification information of the user equipment 1, if the device identification information of the user equipment 1 is relative to the The wireless access point 3 has been pre-authorized by the wireless connection, and the wireless routing device 3 returns the authentication pass response information to the user equipment 1, and the user equipment 1 can successfully connect to the wireless access corresponding to the wireless routing device 3. point.
  • the user equipment 1 after the wireless connection between the user equipment 1 and the wireless routing device 3 is established (the user equipment 1 cannot access the network through the wireless routing device 3 at this time), the user equipment 1 will respond accordingly.
  • the device identification information is sent to the wireless routing device 3 for verification by the wireless connection. If the device identification information sent by the user device 1 is consistent with the device identification information sent by the network device 2, the wireless routing device 3 The user equipment is allowed to access the network.
  • the pre-authorization information is valid in the target time period information; the step S33 includes: when the wireless routing device 3 receives the user equipment 1 to send a connection authentication request to the wireless access point corresponding to the wireless routing device 3 And the connection authentication request is within the target time period information, the device identification information of the user equipment 1 is pre-authorized with respect to the wireless access point, and the wireless routing device 3 is to the user equipment 1 Send authentication through response message.
  • the wireless connection pre-authorization request sent by the user equipment 1 to the network device 2 includes the target time period information; after receiving the wireless connection pre-authorization request, the network device 2 may only pre-authorize the The user equipment 1 connects the wireless access point corresponding to the wireless routing device 3 in the target time period information.
  • the wireless routing device 3 receives the pre-authorization information sent by the network device 2, and the pre-authorization information is valid in the target time period information.
  • the step S33 further includes: if the device identification information of the user equipment 1 is not pre-authorized by the wireless connection with respect to the wireless access point, the wireless routing device 3 performs authentication processing on the connection authentication request, And transmitting corresponding authentication result information to the user equipment 1.
  • the wireless routing device 3 determines, according to the device identification information of the user equipment 1, whether the user equipment 1 has been pre-authorized. If the device identification information of the user equipment 1 is not pre-authorized by the wireless connection point, the wireless routing device 3 cannot directly return the authentication response information to the user equipment 1, the wireless routing device. The normal authentication process is performed on the connection authentication request, and then the corresponding authentication result information is sent to the user equipment 1 (including, for example, authentication success or authentication failure).
  • the method further includes: the user equipment 1 transmits one or more wireless access points scanned by the user equipment 1 to the network device 2; the network device 2 receives the information sent by the user equipment 1 The one or more wireless access points scanned by the user equipment 1; the network device 2 determines, according to the device identification information of the user equipment 1, device identification information of the user equipment 1 with respect to the one or more wireless connections Pre-authorization information of the in-point; the network device 2 returns, to the user equipment 1, pre-authorization information of the device identification information of the user equipment 1 with respect to the one or more wireless access points; the user equipment 1 receives The device identification information of the user equipment 1 returned by the network device 2 is relative to the pre-authorization information of the one or more wireless access points.
  • the user C holds the user equipment 1. If the user C needs to connect to the wireless network through the user equipment 1, the user C can open a specific application on the user equipment 1 (for example, an application that can provide a wireless connection service)
  • the user equipment 1 transmits the scanned wireless access points W1, W2, W3, W4 to the network device 2 based on the operation of the user C (for example, clicking "one-click inquiry").
  • the network device 2 After receiving the wireless access points W1, W2, W3, and W4, the network device 2 determines, according to the device identification information of the user equipment 1, whether the user equipment 1 has been pre-authorized to connect to the wireless access points W1, W2.
  • the network device 2 will identify the device identification of the user equipment 1
  • the pre-authorization information of the information with respect to each wireless access point is returned to the user equipment 1.
  • the wireless access points W1, W2, W3, W4 can be presented by the specific application, and whether each wireless access point has been pre-authorized by the wireless connection.
  • the step S12 includes: the user equipment 1 identifies the wireless access point that is permitted to connect according to the pre-authorization information; and automatically connects a preferred wireless access point among the wireless access points that are permitted to connect.
  • the user equipment 1 in the wireless access points W1, W2, W3, and W4 scanned by the user equipment 1, the user equipment 1 has been pre-authorized to connect to the wireless access points W1 and W4, and is not pre-authorized.
  • Wireless access points W2, W3; the user equipment 1 determines a preferred wireless access point from the wireless access points W1, W4 (eg, according to signal strength, network speed, etc.), and to the preferred wireless access point Initiate an automatic connection.
  • the method further comprises: the user equipment 1 sends an automatic connection request to the network device 2; the network device 2 receives an automatic connection request sent by the user equipment 1; the network device 2 is based on the automatic connection Determining a preferred wireless access point, wherein geographic location information of the preferred wireless access point matches geographic location information of the user equipment 1, and the preferred wireless access point is the wireless connected to the license An access point; the network device 2 returns the preferred wireless access point to the user equipment 1; the user equipment 1 receives a preferred wireless access point returned by the network device 2; the user equipment 1 automatically connects The preferred wireless access point.
  • the user device 1 transmits an automatic connection request to the network device 2 based on the operation of the user C.
  • the network device 2 determines, by querying from the vicinity of the current geographic location where the user equipment 1 is located (eg, according to signal strength, network speed, etc.) that the user equipment 1 has been Pre-authorized preferred wireless access point, then the network device 2 returns the preferred wireless access point to the user equipment 1 so that the user equipment 1 initiates an automatic connection to the preferred wireless access point.
  • a method for wirelessly pre-authorizing a user equipment includes:
  • the user equipment sends a wireless connection pre-authorization request to the network device
  • the wireless routing device performs wireless connection pre-authorization on the device identification information of the user equipment.
  • a computer readable medium comprising instructions which, when executed, cause a system to perform the operations of the method as described above.
  • a user equipment for performing wireless connection pre-authorization on a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • a network device for wirelessly pre-authorizing a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • a wireless routing device for wirelessly pre-authorizing a user equipment, wherein the wireless routing device includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method as described above.
  • the user equipment in the present application sends a wireless connection pre-authorization request to the network device; after receiving the network device, determining the device identification information of the user equipment according to the device identification information of the user equipment.
  • the wireless connection pre-authorization requesting the pre-authorization information of the corresponding wireless routing device, and transmitting the device identification information of the user equipment to the wireless routing device, and the device identification information of the user equipment is related to the wireless routing device Pre-authorization information; if the pre-authorization information includes pre-authorization success, the wireless routing device performs wireless connection pre-authorization on the device identification information of the user equipment; because the user equipment has been pre-authorized, the user passes through the The user equipment is connected to the wireless access point corresponding to the wireless routing device, and the user does not need to perform the cumbersome operation, which saves the connection time and optimizes the user experience.
  • the wireless connection pre-authorization request may include target address information, identification information of the target wireless access point, target time period information, and the like, and the user may select the target address information, the identification information of the target wireless access point, the target time period information, and the like.
  • the wireless connection pre-authorization request is initiated to the network device to provide more convenience for user operations.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application can be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the form of computer program instructions in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., accordingly, the manner in which the computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installation. program.
  • the computer readable medium can be any available computer readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media that can be transferred from one system to another by communication signals including, for example, computer readable instructions, data structures, program modules or other data.
  • Communication media can include conductive transmission media such as cables and wires (eg, fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared.
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as modulated data signals in a wireless medium, such as a carrier wave or a similar mechanism, such as embodied in a portion of a spread spectrum technique.
  • modulated data signal refers to a signal whose one or more features are altered or set in such a manner as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • the computer readable storage medium may comprise, by way of example and not limitation, vols and non-volatile, implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data.
  • a computer readable storage medium includes, but is not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or later developed for storage in computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM)
  • nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请的目的是提供一种用于对用户设备进行无线连接预授权的方法与设备。与现有技术相比,本申请中的用户设备向网络设备发送无线连接预授权请求;所述网络设备收到后,根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息,并向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权;后续,所述用户设备连接所述无线接入点,无需再经过授权流程,用户无需进行繁琐的操作,节省了连接时间,优化了用户体验。

Description

一种用于对用户设备进行无线连接预授权的方法与设备 技术领域
本申请涉及通信领域,尤其涉及一种用于对用户设备进行无线连接预授权的技术。
背景技术
随着移动设备的普及互联网的发展,人们在日常生活中越来越多的依赖于无线网络。公共无线网络安全性低,人们通常选择对无线网络进行连接认证加密来限制非法用户接入无线网络,从而保证其安全性。
移动设备连接加密无线网络时,往往需要路由设备的配合完成。然而传统路由器的鉴授权方式是被动器的方式是被动的,需要热点主人向想要请求连接的用户往往需要提供认证密码,并且在或者通过一定的方式通过认证才能认证通过后完成授权并才能进行无线连接。在此过程中而且,该鉴权授权过程与用户使用网络的流程为串行流程,用户操作繁琐、耗时,授权时间长,导致授权用户体验差。
发明内容
本申请的一个目的是提供一种用于对用户设备进行无线连接预授权的方法与设备。
根据本申请的一个方面,提供了一种在用户设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
向网络设备发送用户设备的无线连接预授权请求。
根据本申请的另一个方面,提供了一种在网络设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
获取用户设备发送的无线连接预授权请求;
根据所述用户设备的设备标识信息确定所述用户设备的设备标识信 息关于所述无线连接预授权请求对应的无线路由设备的预授权信息;
向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息。
根据本申请的又一个方面,提供了一种在无线路由设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
接收网络设备发送的用户设备的设备标识信息,以及所述用户设备的设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备的设备标识信息进行无线连接预授权。
根据本申请的再一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
用户设备向网络设备发送无线连接预授权请求;
所述网络设备获取所述用户设备发送的无线连接预授权请求;
所述网络设备根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息;
所述网络设备向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;
所述无线路由设备接收网络设备发送的所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如上所述方法的操作。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连接预授权的用户设备,其中,该用户设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连接预授权的网络设备,其中,该网络设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
与现有技术相比,本申请中的用户设备向网络设备发送无线连接预授权请求;所述网络设备收到后,根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息,并向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权;因为所述用户设备已被预授权,后续,用户通过所述用户设备连接所述无线路由设备对应的无线接入点,无需再经过授权流程,用户无需进行繁琐的操作,节省了连接时间,优化了用户体验。进一步地,所述无线连接预授权请求可以包括目标地址信息、目标无线接入点的标识信息、目标时段信息等,用户可以选择目标地址信息、目标无线接入点的标识信息、目标时段信息等向所述网络设备发起所述无线连接预授权请求,从而为用户操作提供更多的便利。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述, 本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种用于对用户设备进行无线连接预授权的系统拓扑图;
图2示出根据本申请另一个实施例的一种用于对用户设备进行无线连接预授权的方法流程图;
图3示出根据本申请又一个实施例的一种无线路由设备对用户设备进行连接认证的方法流程图。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
图1示出根据本申请一个实施例的一种用于对用户设备进行无线连接预授权的系统拓扑图,该系统包括用户设备1、网络设备2和无线路由设备3。
在此,所述用户设备1包括但不限于任何一种可与用户进行人机交 互的电子产品,例如智能手机、平板电脑、笔记本电脑等;所述电子产品可以采用任意操作系统,如android操作系统、iOS操作系统、Windows操作系统等。所述网络设备2包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程门阵列(FPGA)、数字处理器(DSP)、嵌入式设备等。所述网络设备2包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。所述无线路由设备3包括一种能够连接各局域网、广域网的设备;优选地,所述无线路由设备3能够基于802.11协议簇向一定距离范围内的用户设备广播无线接入点;优选地,所述无线路由设备2的认证类型为非开放系统认证。
本领域技术人员应能理解,图1中仅为简明起见而示出的各类网络元素的数量可能小于一个实际网络中的数量,但这种省略无疑地是以不会影响对本发明进行清楚、充分的公开为前提的。
图2示出根据本申请另一个实施例的一种用于对用户设备进行无线连接预授权的方法流程图,其中,该方法包括在用户设备端执行的步骤S11和步骤S12,在网络设备端执行的步骤S21、步骤S22和步骤S23,以及在无线路由设备端执行的步骤S31和步骤S32。
具体地,步骤S11中,用户设备1向网络设备2发送用户设备1的无线连接预授权请求;步骤S21中,网络设备2获取用户设备1发送的无线连接预授权请求;步骤S22中,网络设备2根据所述用户设备1的设备标识信息确定所述用户设备1的设备标识信息关于所述无线连接预授权请求对应的无线路由设备3的预授权信息;步骤S23中,网络设备2向所述无线路由设备3发送所述用户设备1的设备标识信息,以及所述用户设备1的设备标识信息关于所述无线路由设备的预授权信息;步 骤S31中,无线路由设备3接收网络设备2发送的用户设备1的设备标识信息,以及所述用户设备1的设备标识信息关于无线路由设备3的预授权信息;步骤S32中,若所述预授权信息包括预授权成功,无线路由设备3对所述用户设备1的设备标识信息进行无线连接预授权;步骤S12中,当位于基于所述无线连接预授权请求而被许可连接的无线接入点的覆盖范围内时,用户设备1连接所述无线接入点。
例如,假设用户甲持有所述用户设备1,若用户甲将要去所述无线路由设备3附近的地点(比如,所述无线路由设备3属于用户甲的工作单位所有,用户甲将要去工作单位上班),用户甲可通过所述用户设备1向所述网络设备2发送所述无线连接预授权请求,然后,所述网络设备2基于所述无线连接预授权请求向所述无线路由设备3发送所述预授权信息及所述用户设备1的设备标识信息,所述无线路由设备3根据所述用户设备1的设备标识信息对所述用户设备1进行无线连接预授权。后续,当用户甲到达所述无线路由设备3附近的地点(比如,所述无线路由设备3属于用户甲的工作单位所有,用户甲到达工作单位),因为用户甲持有的所述用户设备1已经被预授权,所述用户设备1无需再经过授权,就可连接所述无线路由设备3对应的无线接入点,从而优化了用户甲的无线连接体验。
优选地,所述无线连接预授权请求还包括所述用户设备1的设备标识信息。所述设备标识信息包括但不限于:MAC地址信息、设备序列号信息、蓝牙标识信息、用户账号信息、电话号码信息等。所述网络设备2收到所述用户设备1发送的所述无线连接预授权请求之后,可以从所述无线连接预授权请求提取出所述用户设备1的设备标识信息。
在上例中,所述网络设备2收到所述用户设备1发送的所述无线连接预授权请求之后,根据所述用户设备1的设备标识信息确定所述用户设备1的设备标识信息关于所述无线连接预授权请求对应的无线路由设备3的预授权信息,即,所述网络设备2需确定所述用户设备1请求被预授权连接哪个无线路由设备(例如所述无线路由设备3),还可以基于设备标识信息查询确定所述用户设备1是否可以被预授权连接该无线 路由设备,从而得到所述预授权信息(例如包括预授权成功、预授权失败或无需重复授权)。若所述用户设备1此前已被预授权连接所述无线路由设备3,且该预授权尚未失效,则可以无需重新预授权所述用户设备1连接所述无线路由设备3;当然,在实践中,也可以重新预授权所述用户设备1连接所述无线路由设备3。
在上例中,所述无线路由设备3收到所述网络设备2发送的所述预授权信息及所述用户设备1的设备标识信息之后,若所述预授权信息包括预授权成功,无线路由设备3对所述用户设备1的设备标识信息进行无线连接预授权。相应地,若所述预授权信息包括预授权失败或者无需重复授权,则所述无线路由设备3不必再对所述用户设备1的设备标识信息进行无线连接预授权。
优选地,所述无线连接预授权请求包括以下至少任一项:所述无线连接预授权请求对应的目标地址信息;所述无线连接预授权请求对应的目标时段信息;所述无线连接预授权请求对应的目标无线接入点的设备标识信息和/或接入点标识信息。
例如,假设用户乙持有所述用户设备1,本例中假设所述无线路由设备3位于咖啡店X内,若用户乙将要去咖啡店X,用户乙可以打开所述用户设备1上的特定应用(例如可提供无线连接服务的应用),通过该特定应用向所述网络设备2发送所述无线连接预授权请求。在发送所述无线连接预授权请求时,用户乙可以通过该特定应用提交咖啡店X的地址(即所述目标地址信息),或者,用户乙可以通过该特定应用提交所述无线路由设备3对应的无线接入点(即所述目标无线接入点)的设备标识信息(如BSSID)和/或接入点标识信息(如SSID)。若用户乙将要于周六10:00~11:00(即所述目标时段信息)在咖啡店X内,在发送所述无线连接预授权请求时,用户乙可以通过该特定应用提交咖啡店X的地址(即所述目标地址信息)及所述目标时段信息。
优选地,所述步骤S11包括:用户设备1检测目标无线接入点的设备标识信息和/或接入点标识信息;用户设备1向网络设备2发送用户设备1的无线连接预授权请求,其中,所述无线连接预授权请求包括所述 无线连接预授权请求对应的目标无线接入点的设备标识信息和/或接入点标识信息。
例如,接上例,用户乙可以在所述用户设备1上的特定应用中输入目标无线接入点(所述无线路由设备3对应的无线接入点)。所述用户设备1先根据用户乙输入的信息检测目标无线接入点的设备标识信息和/或接入点标识信息,再向所述网络设备2发送所述无线连接预授权请求。
优选地,所述无线连接预授权请求包括所述无线连接预授权请求对应的目标地址信息。所述步骤S22包括:网络设备2根据所述目标地址信息查询确定所述无线连接预授权请求对应的无线路由设备3;根据所述用户设备1的设备标识信息确定所述用户设备1的设备标识信息关于所述无线路由设备3的预授权信息。
例如,接上例,用户乙可以在所述用户设备1上的特定应用中输入目标地址信息(比如咖啡店X),然后,所述用户设备1向所述网络设备2发送所述无线连接预授权请求。所述网络设备2收到所述无线连接预授权请求之后,先根据所述目标地址信息查询确定咖啡店X附近有哪些无线路由设备(例如有所述无线路由设备3),再基于设备标识信息查询确定所述用户设备1是否可以被预授权连接该无线路由设备。
优选地,所述无线连接预授权请求还包括所述无线连接预授权请求对应的目标时段信息;所述用户设备1的设备标识信息关于所述无线路由设备3的预授权信息在所述目标时段信息内有效。
例如,接上例,若用户乙将要于周六10:00~11:00(即所述目标时段信息)在咖啡店X内,在所述用户设备1向所述网络设备2发送所述无线连接预授权请求时,用户乙可以通过所述用户设备1上的特定应用提所述目标时段信息。所述网络设备2收到所述无线连接预授权请求之后,可以仅预授权所述用户设备1在所述目标时段信息内连接所述无线路由设备3对应的无线接入点。所述无线路由设备3根据所述网络设备2发送的预授权信息,仅在所述目标时段信息内允许所述用户设备1无线连接。若所述用户设备1在所述目标时段信息之外连接所述无线路由 设备3对应的无线接入点,则需要另外的授权或认证。
优选地,如图3所示,所述方法还包括在无线路由设备端执行的步骤S33,所述步骤S12包括步骤S121和步骤S122。
在步骤S121中,用户设备1向无线路由设备3对应的无线接入点发送连接认证请求;步骤S33中,当无线路由设备3接收到所述用户设备1向所述无线路由设备3对应的无线接入点发送的连接认证请求,且所述用户设备1的设备标识信息相对所述无线接入点已被无线连接预授权,所述无线路由设备3向所述用户设备1发送认证通过响应信息;在步骤S122中,当接收所述连接认证请求的无线接入点为所述被许可连接的无线接入点时,用户设备1接收提供所述无线接入点的无线路由设备3返回的认证响应信息。
例如,假设用户甲持有所述用户设备1,当用户甲到达所述无线路由设备3附近的地点,所述用户设备1可以自动向无线路由设备3对应的无线接入点发送连接认证请求,或者,所述用户设备1可以基于用户甲的手动操作向无线路由设备3对应的无线接入点发送连接认证请求。所述无线路由设备3收到所述连接认证请求之后,基于所述用户设备1的设备标识信息确定所述用户设备1是否已被预授权,若所述用户设备1的设备标识信息相对所述无线接入点已被无线连接预授权,则所述无线路由设备3向所述用户设备1返回认证通过响应信息,所述用户设备1可以成功连接上所述无线路由设备3对应的无线接入点。
在一个实施例中,在建立所述用户设备1与无线路由设备3之间的无线连接(此时所述用户设备1还不能通过无线路由设备3访问网络)后,所述用户设备1将相应的设备标识信息通过该无线连接发送至所述无线路由设备3进行验证,若所述用户设备1所发送的设备标识信息与之前网络设备2所发送的设备标识信息相一致,则无线路由设备3允许所述用户设备进行网络访问。
优选地,所述预授权信息在目标时段信息内有效;所述步骤S33包括:当无线路由设备3接收到所述用户设备1向所述无线路由设备3对应的无线接入点发送连接认证请求,且所述连接认证请求在所述目标时 段信息内、所述用户设备1的设备标识信息相对所述无线接入点已被无线连接预授权,所述无线路由设备3向所述用户设备1发送认证通过响应信息。
例如,所述用户设备1向所述网络设备2发送的所述无线连接预授权请求包括所述目标时段信息;所述网络设备2收到所述无线连接预授权请求之后,可以仅预授权所述用户设备1在所述目标时段信息内连接所述无线路由设备3对应的无线接入点。所述无线路由设备3收到所述网络设备2发送的预授权信息,所述预授权信息在目标时段信息内有效。
优选地,所述步骤S33还包括:若所述用户设备1的设备标识信息相对所述无线接入点未被无线连接预授权,所述无线路由设备3对所述连接认证请求进行认证处理,并向所述用户设备1发送对应的认证结果信息。
在本实施例中,所述无线路由设备3收到所述用户设备1发送的所述连接认证请求之后,基于所述用户设备1的设备标识信息确定所述用户设备1是否已被预授权,若所述用户设备1的设备标识信息相对所述无线接入点未被无线连接预授权,则所述无线路由设备3不能直接向所述用户设备1返回认证通过响应信息,所述无线路由设备3需对所述连接认证请求进行常规的认证处理,然后,向所述用户设备1发送对应的认证结果信息(例如包括认证成功或认证失败)。
优选地,所述方法还包括:用户设备1将所述用户设备1扫描到的一个或多个无线接入点发送到所述网络设备2;所述网络设备2接收所述用户设备1发送的所述用户设备1扫描到的一个或多个无线接入点;所述网络设备2根据所述用户设备1的设备标识信息确定所述用户设备1的设备标识信息相对该一个或多个无线接入点的预授权信息;所述网络设备2向所述用户设备1返回所述用户设备1的设备标识信息相对所述一个或多个无线接入点的预授权信息;所述用户设备1接收所述网络设备2返回的所述用户设备1的设备标识信息相对所述一个或多个无线接入点的预授权信息。
例如,假设用户丙持有所述用户设备1,若用户丙需要通过所述用户设备1连接无线网络,用户丙可以打开所述用户设备1上的特定应用(例如可提供无线连接服务的应用),基于用户丙的操作(例如点击“一键查询”)所述用户设备1将扫描到的无线接入点W1、W2、W3、W4发送到所述网络设备2。所述网络设备2收到无线接入点W1、W2、W3、W4之后,根据所述用户设备1的设备标识信息确定所述用户设备1是否已被预授权连接无线接入点W1、W2、W3、W4;假设所述用户设备1已被预授权连接无线接入点W1、W4,未被预授权连接无线接入点W2、W3;所述网络设备2将所述用户设备1的设备标识信息相对各无线接入点的预授权信息返回至所述用户设备1。所述用户设备1收到后,优选地,可以通过该特定应用呈现无线接入点W1、W2、W3、W4,并呈现各无线接入点是否已被无线连接预授权。
优选地,所述步骤S12包括:用户设备1根据所述预授权信息识别所述被许可连接的无线接入点;自动连接所述被许可连接的无线接入点中的优选无线接入点。
例如,接上例,所述用户设备1扫描到的无线接入点W1、W2、W3、W4中,所述用户设备1已被预授权连接无线接入点W1、W4,未被预授权连接无线接入点W2、W3;所述用户设备1从无线接入点W1、W4中(例如根据信号强弱、网速高低等)确定一个优选无线接入点,并向该优选无线接入点发起自动连接。
优选地,所述方法还包括:用户设备1向所述网络设备2发送自动连接请求;所述网络设备2接收所述用户设备1发送的自动连接请求;所述网络设备2基于所述自动连接请求确定优选无线接入点,其中,所述优选无线接入点的地理位置信息与所述用户设备1的地理位置信息相匹配,且所述优选无线接入点为所述被许可连接的无线接入点;所述网络设备2向所述用户设备1返回所述优选无线接入点;所述用户设备1接收所述网络设备2返回的优选无线接入点;所述用户设备1自动连接所述优选无线接入点。
例如,用户丙打开所述用户设备1上的特定应用之后,基于用户丙 的操作所述用户设备1向所述网络设备2发送自动连接请求。所述网络设备2收到所述自动连接请求之后,通过查询从所述用户设备1所在的当前地理位置附近,(例如根据信号强弱、网速高低等)确定一个所述用户设备1已被预授权的优选无线接入点,然后,所述网络设备2向所述用户设备1返回该优选无线接入点,以便所述用户设备1向该优选无线接入点发起自动连接。
根据本申请的再一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
用户设备向网络设备发送无线连接预授权请求;
所述网络设备获取所述用户设备发送的无线连接预授权请求;
所述网络设备根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息;
所述网络设备向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;
所述无线路由设备接收网络设备发送的所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权。
根据本申请的又一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如上所述方法的操作。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连接预授权的用户设备,其中,该用户设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连 接预授权的网络设备,其中,该网络设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
根据本申请的又一个方面,提供了一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如上所述的方法。
与现有技术相比,本申请中的用户设备向网络设备发送无线连接预授权请求;所述网络设备收到后,根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息,并向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权;因为所述用户设备已被预授权,后续,用户通过所述用户设备连接所述无线路由设备对应的无线接入点,无需再经过授权流程,用户无需进行繁琐的操作,节省了连接时间,优化了用户体验。进一步地,所述无线连接预授权请求可以包括目标地址信息、目标无线接入点的标识信息、目标时段信息等,用户可以选择目标地址信息、目标无线接入点的标识信息、目标时段信息等向所述网络设备发起所述无线连接预授权请求,从而为用户操作提供更多的便利。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤 或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (21)

  1. 一种在用户设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    向网络设备发送用户设备的无线连接预授权请求,其中,所述无线连接预授权请求包括所述用户设备的设备标识信息;
    当位于基于所述无线连接预授权请求而被许可连接的无线接入点的覆盖范围内时,连接所述无线接入点。
  2. 根据权利要求1所述的方法,其中,所述当位于基于所述无线连接预授权请求而被许可连接的无线接入点的覆盖范围内时,连接所述无线接入点,包括:
    向无线路由设备对应的无线接入点发送连接认证请求;
    当接收所述连接认证请求的无线接入点为所述被许可连接的无线接入点时,接收提供所述无线接入点的无线路由设备返回的认证响应信息。
  3. 根据权利要求1所述的方法,其中,所述方法还包括:
    将所述用户设备扫描到的一个或多个无线接入点发送到所述网络设备;
    接收所述网络设备返回的所述用户设备的设备标识信息相对所述一个或多个无线接入点的预授权信息。
  4. 根据权利要求3所述的方法,其中,所述当位于基于所述无线连接预授权请求而被许可连接的无线接入点的覆盖范围内时,连接所述无线接入点,包括:
    根据所述预授权信息识别所述被许可连接的无线接入点;
    自动连接所述被许可连接的无线接入点中的优选无线接入点。
  5. 根据权利要求1所述的方法,其中,所述方法还包括:
    向所述网络设备发送自动连接请求;
    接收所述网络设备返回的优选无线接入点,其中,所述优选无线接入点的地理位置信息与所述用户设备的地理位置信息相匹配,且所述优 选无线接入点为所述被许可连接的无线接入点;
    自动连接所述优选无线接入点。
  6. 根据权利要求1至5中任一项所述的方法,其中,所述无线连接预授权请求包括以下至少任一项:
    所述无线连接预授权请求对应的目标地址信息;
    所述无线连接预授权请求对应的目标时段信息;
    所述无线连接预授权请求对应的目标无线接入点的设备标识信息和/或接入点标识信息。
  7. 根据权利要求6所述的方法,其中,所述无线连接预授权请求包括所述无线连接预授权请求对应的目标无线接入点的设备标识信息和/或接入点标识信息时,所述向网络设备发送用户设备的无线连接预授权请求,包括:
    检测目标无线接入点的设备标识信息和/或接入点标识信息;
    向网络设备发送用户设备的无线连接预授权请求,其中,所述无线连接预授权请求包括所述无线连接预授权请求对应的目标无线接入点的设备标识信息和/或接入点标识信息。
  8. 一种在网络设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    获取用户设备发送的无线连接预授权请求;
    根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息;
    向所述无线路由设备发送所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息。
  9. 根据权利要求8所述的方法,其中,所述无线连接预授权请求包括所述无线连接预授权请求对应的目标地址信息;
    其中,所述根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息,包括:
    根据所述目标地址信息查询确定所述无线连接预授权请求对应的无 线路由设备;
    根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线路由设备的预授权信息。
  10. 根据权利要求9所述的方法,其中,所述无线连接预授权请求还包括所述无线连接预授权请求对应的目标时段信息;所述用户设备的设备标识信息关于所述无线路由设备的预授权信息在所述目标时段信息内有效。
  11. 根据权利要求8至10中任一项所述的方法,其中,所述方法还包括:
    接收所述用户设备发送的所述用户设备扫描到的一个或多个无线接入点;
    根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息相对该一个或多个无线接入点的预授权信息;
    向所述用户设备返回所述用户设备的设备标识信息相对该一个或多个无线接入点的预授权信息。
  12. 根据权利要求8至10中任一项所述的方法,其中,所述方法还包括:
    接收所述用户设备发送的自动连接请求;
    基于所述自动连接请求确定优选无线接入点,其中,所述优选无线接入点的地理位置信息与所述用户设备的地理位置信息相匹配,且所述用户设备的设备标识信息相对所述优选无线接入点已被无线连接预授权;
    向所述用户设备返回所述优选无线接入点。
  13. 一种在无线路由设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    接收网络设备发送的用户设备的设备标识信息,以及所述用户设备的设备标识信息关于无线路由设备的预授权信息;
    若所述预授权信息包括预授权成功,对所述用户设备的设备标识信息进行无线连接预授权。
  14. 根据权利要求13所述的方法,其中,所述方法还包括:
    当接收到所述用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求,且所述用户设备的设备标识信息相对所述无线接入点已被无线连接预授权,向所述用户设备发送认证通过响应信息。
  15. 根据权利要求14所述的方法,其中,所述预授权信息在目标时段信息内有效;
    其中,所述当接收到所述用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求,且所述用户设备的设备标识信息相对所述无线接入点已被无线连接预授权,向所述用户设备发送认证通过响应信息,包括:
    当接收到所述用户设备向所述无线路由设备对应的无线接入点发送连接认证请求,且所述连接认证请求在所述目标时段信息内、所述用户设备的设备标识信息相对所述无线接入点已被无线连接预授权,向所述用户设备发送认证通过响应信息。
  16. 根据权利要求14或15所述的方法,其中,所述当接收到所述用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求,且所述用户设备的设备标识信息相对所述无线接入点已被无线连接预授权,向所述用户设备发送认证通过响应信息,还包括:
    若所述用户设备的设备标识信息相对所述无线接入点未被无线连接预授权,对所述连接认证请求进行认证处理,并向所述用户设备发送对应的认证结果信息。
  17. 一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    用户设备向网络设备发送无线连接预授权请求;
    所述网络设备获取所述用户设备发送的无线连接预授权请求;
    所述网络设备根据所述用户设备的设备标识信息确定所述用户设备的设备标识信息关于所述无线连接预授权请求对应的无线路由设备的预授权信息;
    所述网络设备向所述无线路由设备发送所述用户设备的设备标识信 息,以及所述用户设备的设备标识信息关于所述无线路由设备的预授权信息;
    所述无线路由设备接收网络设备发送的所述用户设备的设备标识信息,以及所述用户设备的设备标识信息关于无线路由设备的预授权信息;
    若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备的设备标识信息进行无线连接预授权。
  18. 一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如权利要求1至17中任一项所述方法的操作。
  19. 一种用于对用户设备进行无线连接预授权的用户设备,其中,该用户设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求1至7中任一项所述的方法。
  20. 一种用于对用户设备进行无线连接预授权的网络设备,其中,该网络设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求8至12中任一项所述的方法。
  21. 一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求13至16中任一项所述的方法。
PCT/CN2018/098513 2017-08-21 2018-08-03 一种用于对用户设备进行无线连接预授权的方法与设备 WO2019037585A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/796,964 US11477646B2 (en) 2017-08-21 2020-02-21 Method and a device for performing wireless connection pre-authorization on a user device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710720677.6 2017-08-21
CN201710720677.6A CN107567021B (zh) 2017-08-21 2017-08-21 一种用于对用户设备进行无线连接预授权的方法与设备

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/796,964 Continuation US11477646B2 (en) 2017-08-21 2020-02-21 Method and a device for performing wireless connection pre-authorization on a user device

Publications (1)

Publication Number Publication Date
WO2019037585A1 true WO2019037585A1 (zh) 2019-02-28

Family

ID=60976202

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/098513 WO2019037585A1 (zh) 2017-08-21 2018-08-03 一种用于对用户设备进行无线连接预授权的方法与设备

Country Status (3)

Country Link
US (1) US11477646B2 (zh)
CN (1) CN107567021B (zh)
WO (1) WO2019037585A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107567021B (zh) 2017-08-21 2021-08-27 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
CN108495316B (zh) * 2018-04-10 2021-02-23 上海连尚网络科技有限公司 一种无线连接方法及设备
CN108901057B (zh) * 2018-06-29 2021-05-11 上海尚往网络科技有限公司 一种用于建立无线连接的方法、设备以及介质
CN108696918B (zh) * 2018-06-29 2021-04-13 连尚(新昌)网络科技有限公司 一种用于建立无线连接的方法、设备以及介质
CN108848505B (zh) * 2018-07-10 2021-05-07 上海尚往网络科技有限公司 一种无线连接方法及设备
US11997486B2 (en) * 2019-12-20 2024-05-28 Lenovo (Singapore) Pte. Ltd Method and system of providing WiFi credentials through remote invitations

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076671A1 (en) * 2005-09-30 2007-04-05 Cisco Technology, Inc. System and method for network infrastructure driven context setup to facilitate roaming
CN104363631A (zh) * 2014-10-24 2015-02-18 小米科技有限责任公司 无线路由器的连接方法、装置和系统
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN106489284A (zh) * 2014-07-01 2017-03-08 谷歌公司 无线局域网接入
CN107396364A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
CN107567021A (zh) * 2017-08-21 2018-01-09 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130282903A1 (en) * 2012-04-20 2013-10-24 Research In Motion Limited Method, system and apparatus for accessing a communications network
GB2502289A (en) * 2012-05-22 2013-11-27 Ibm Advertising geographic location of neighbouring public APs with access denial message from private AP
CN102932793A (zh) * 2012-11-15 2013-02-13 北京易和迅科技有限公司 基于二维码的无线网络认证方法和系统
CN104093147A (zh) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 一种近距离wifi自动连接授权的方法
CN104159275B (zh) * 2014-07-17 2015-12-09 小米科技有限责任公司 网络连接方法及装置
EP3070900A1 (en) * 2015-03-16 2016-09-21 Thomson Licensing Method and system of access of a mobile terminal to information in an area
CN105873237A (zh) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 一种用于建立无线连接的方法与设备
CN105162777B (zh) * 2015-08-13 2019-11-19 腾讯科技(深圳)有限公司 一种无线网络登录方法及装置
CN105142144A (zh) * 2015-08-13 2015-12-09 邹民勇 一种安全网络连接方法及系统
CN106658666B (zh) * 2015-10-29 2022-01-04 上海尚往网络科技有限公司 一种用于建立无线连接的方法与设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070076671A1 (en) * 2005-09-30 2007-04-05 Cisco Technology, Inc. System and method for network infrastructure driven context setup to facilitate roaming
CN106489284A (zh) * 2014-07-01 2017-03-08 谷歌公司 无线局域网接入
CN104363631A (zh) * 2014-10-24 2015-02-18 小米科技有限责任公司 无线路由器的连接方法、装置和系统
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN107396364A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
CN107567021A (zh) * 2017-08-21 2018-01-09 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Also Published As

Publication number Publication date
US20200196149A1 (en) 2020-06-18
US11477646B2 (en) 2022-10-18
CN107567021B (zh) 2021-08-27
CN107567021A (zh) 2018-01-09

Similar Documents

Publication Publication Date Title
WO2019037585A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107396364B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107517461B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN108566656B (zh) 一种用于检测无线网络安全的方法与设备
WO2018223908A1 (zh) 一种用于连接隐藏无线接入点的方法与设备
WO2018205997A1 (zh) 一种用于连接无线接入点的方法与设备
WO2019062666A1 (zh) 一种实现安全访问内部网络的系统、方法和装置
CN107690175B (zh) 一种用于管理无线接入点的方法与设备
CN103685267A (zh) 数据访问方法及装置
CN108650236B (zh) 一种用于检测ssl中间人攻击的方法与设备
WO2019037603A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US9565165B2 (en) System and method for controlling virtual private network access
WO2020001377A1 (zh) 一种用于授权用户设备连接无线接入点的方法与设备
WO2019042122A1 (zh) 一种用于确定无线接入点的连接成功率信息的方法与设备
US11032272B2 (en) Mobile number verification for mobile network-based authentication
WO2018233473A1 (zh) 一种用于配置无线路由设备的方法与设备
WO2019037602A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107333264B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037598A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107396363B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037594A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107404722B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107396295B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US11283881B1 (en) Management and protection of internet of things devices
CN108881410A (zh) 一种地图应用网关控制系统及其实现地图服务的方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18849298

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23.07.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18849298

Country of ref document: EP

Kind code of ref document: A1