WO2019037602A1 - 一种用于对用户设备进行无线连接预授权的方法与设备 - Google Patents

一种用于对用户设备进行无线连接预授权的方法与设备 Download PDF

Info

Publication number
WO2019037602A1
WO2019037602A1 PCT/CN2018/099544 CN2018099544W WO2019037602A1 WO 2019037602 A1 WO2019037602 A1 WO 2019037602A1 CN 2018099544 W CN2018099544 W CN 2018099544W WO 2019037602 A1 WO2019037602 A1 WO 2019037602A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
identification information
authorization
routing device
information
Prior art date
Application number
PCT/CN2018/099544
Other languages
English (en)
French (fr)
Inventor
程翰
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2019037602A1 publication Critical patent/WO2019037602A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Definitions

  • the present application relates to the field of communications, and in particular, to a technology for performing wireless connection pre-authorization on user equipment.
  • the authentication mode of the traditional router is passive. Users who request connection often need to provide an authentication password, and the wireless connection can be made after the authentication is passed.
  • a method for wirelessly pre-authorizing a user equipment at a wireless routing device comprising: acquiring short-range communication identification information of a user equipment; The information performs wireless connection pre-authorization on the user equipment identification information of the user equipment.
  • a method for performing wireless connection pre-authorization on a user equipment at a network device includes: acquiring user equipment identification information of a user equipment; determining, based on the user equipment identification information, The user equipment identification information is related to pre-authorization information of the wireless routing device; and the pre-authorization information is sent to the wireless routing device.
  • a method for wirelessly pre-authorizing a user equipment comprising: acquiring, by a wireless routing device, short-range communication identification information of a user equipment, and the short-range communication identification information Sending to the network device, the network device receiving the short-range communication identification information, determining user equipment identification information of the user equipment based on the short-range communication identification information query, and returning the user equipment identification information to the a wireless routing device; the wireless routing device receives the user equipment identification information, and performs wireless connection pre-authorization on the user equipment identification information of the user equipment.
  • a method for wirelessly pre-authorizing a user equipment comprising: acquiring, by a network device, device identification information of a user equipment, and determining the user equipment identification information, Pre-authorizing information of the wireless routing device, and transmitting the pre-authorization information to the wireless routing device; the wireless routing device receiving the user equipment identification information and the pre-authorization information; The authorization is successful, and the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • an apparatus for wirelessly pre-authorizing a user equipment comprising: a processor; and a memory arranged to store computer executable instructions, the executable instructions being When executed, the processor is configured to: obtain short-range communication identification information of the user equipment; perform wireless connection pre-authorization on the user equipment identification information of the user equipment based on the short-range communication identification information.
  • an apparatus for wirelessly pre-authorizing a user equipment comprising: a processor; and a memory arranged to store computer executable instructions, the executable instructions being When executed, the processor is configured to: obtain user equipment identification information of the user equipment; determine pre-authorization information of the user equipment identification information about the wireless routing device based on the user equipment identification information; and send the pre-authorization information to The wireless routing device.
  • a computer readable medium comprising instructions, when executed, causing a system to: acquire short-range communication identification information of a user equipment; and based on the short-range communication identification information The user equipment identification information of the user equipment performs wireless connection pre-authorization.
  • a computer readable medium comprising instructions that, when executed, cause a system to: obtain user equipment identification information of a user equipment; determine the said based on the user equipment identification information
  • the user equipment identification information is pre-authorization information about the wireless routing device; the pre-authorization information is sent to the wireless routing device.
  • the present application performs a wireless connection pre-authorization on the user equipment before the user equipment initiates a wireless connection to the wireless network, so that when the user equipment is connected to the wireless access point of the wireless routing device, Eliminating the cumbersome authentication process, which not only ensures the controllability of wireless network access, but also improves the efficiency of wireless connection and improves the user experience.
  • the solution may further renew the connection pre-authorization according to the short-distance communication identification information such as the Bluetooth address of the user equipment, or may perform the wireless connection pre-authorization after determining the other user equipment identification information based on the short-range communication identification information.
  • the wireless connection pre-authorization can also be assisted by the network device.
  • the application may continue to use the authentication method corresponding to the wireless access point to perform authentication processing on the wireless connection request of the user equipment, thereby better It is compatible with existing wireless access points, so that the solution can be deployed in a variable scale according to actual application scenarios, which improves system deployment efficiency and reduces the cost of ownership of the entire system.
  • FIG. 1 is a system topology diagram for performing wireless connection pre-authorization on a user equipment according to an embodiment of the present application
  • FIG. 2 is a flowchart of a method for wirelessly pre-authorizing a user equipment at a wireless routing device end according to an embodiment of the present application
  • FIG 3 shows the sub-steps of step S12 shown in Figure 2 in some embodiments
  • Figure 4 shows the sub-steps of step S12 shown in Figure 2 in some embodiments
  • FIG. 5 is a flowchart of a method for wirelessly pre-authorizing a user equipment at a network device end according to another embodiment of the present application
  • FIG. 6 illustrates a system method for wirelessly pre-authorizing a user equipment in accordance with an embodiment of the present application
  • FIG. 7 illustrates a system method for wireless connection pre-authorization of a user equipment according to another embodiment of the present application.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media, and information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • the device referred to in the present application includes but is not limited to a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network.
  • the user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can be operated by any operation.
  • System such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • ASIC application specific integrated circuit
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a plurality of servers; wherein the cloud is composed of a large number of computers or network servers based on Cloud Computing.
  • cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computers.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like.
  • the device may also be a program running on the user equipment, the network device, or the user equipment and the network device, the network device, the touch terminal, or the network device and the touch terminal integrated through the network.
  • FIG. 1 shows a typical application scenario of the application, where a user equipment accesses a network through a wireless routing device.
  • the wireless routing device can independently pre-authorize the wireless connection of the user equipment, or cooperate with the network device to pre-authorize the wireless connection of the user equipment.
  • the wireless routing device can obtain the user equipment by means of short-distance communication, such as Bluetooth scanning, NFC (Near Field Communication) scanning, and the like.
  • the short-distance communication identification information determines whether to perform wireless connection pre-authorization on the user equipment identification information based on the short-range communication identification information.
  • the wireless routing device In the case that the user equipment has obtained the pre-authorization for accessing the network through the wireless routing device, when the user equipment sends a connection authentication request to the wireless access point established by the wireless routing device, the wireless routing device directly establishes the user equipment through its authentication request. A wireless connection with the Internet based on the wireless access point.
  • the solution can be completed by the wireless routing device and the network device.
  • the wireless network system established by the wireless routing device herein includes a non-open wireless network system.
  • the short-range communication identification information of the user equipment may be the same information as the user equipment identification information; in some embodiments, the short-range communication identification information of the user equipment may be different information from the user equipment identification information.
  • step S11 the wireless routing device acquires the short-range communication identification information of the user equipment; in step S12, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information of the user equipment based on the short-range communication identification information. For example, the user holds the user equipment, the user is closer to the wireless routing device, and the wireless routing device has the capability of short-range communication (Bluetooth, NFC).
  • short-range communication Bluetooth, NFC
  • the wireless routing device obtains the short-range communication identification information (such as the Bluetooth MAC address) of the user equipment by using the short-range communication method; wherein, the wireless routing device may detect the short-distance communication identification information of the user equipment, or may be the user equipment passing the near-end
  • the distance communication method sends a short-range communication identifier to the wireless routing device.
  • the wireless routing device performs wireless connection pre-authorization on the user equipment identification information of the user equipment based on the short-range communication identification information; in some embodiments, the wireless connection pre-authorization may be a pre-authorization for the wireless routing device.
  • the user equipment identified by the user equipment identification information is authorized to access the network through all the wireless access points established by the wireless routing device; in some embodiments, the wireless connection pre-authorization may be wireless access established for the wireless routing device. Pre-authorization of the point, in which case the user equipment identified by the user equipment identification information can only access the network through the wireless access point defined by the pre-authorization.
  • the user equipment identification information includes a plurality of information capable of identifying the user equipment.
  • the user equipment identification information includes, but is not limited to, short-range communication identification information of the user equipment (such as Bluetooth MAC, etc.), MAC address information of the user equipment, device identification information of the user equipment (such as a serial number, etc.), and a user.
  • Application identification information (such as application account information) of the device, and communication identification information of the user device (such as the mobile phone number corresponding to the user device).
  • the short-range communication identification information of the user equipment may be provided by the user equipment to the wireless routing device by using short-range communication; the MAC address information of the user equipment may be in the process of establishing a handshake protocol between the user equipment and the wireless routing device.
  • the wireless routing device can turn off the MAC layer password verification (such as turning off the input password to connect the wireless routing device) so that any user equipment and the wireless routing device are between
  • the communication on the MAC layer can be implemented (that is, the user equipment can communicate with the wireless routing device, but the user equipment may not be able to access the Internet through the wireless routing device); the application identification information, the communication identification information, etc. of the user equipment may be in the user equipment.
  • the user equipment After establishing a handshake protocol with the wireless routing device and communicating with each other, the user equipment provides the wireless routing device.
  • the wireless routing device acquires the proximity communication identification information of the user equipment.
  • the wireless routing device has Bluetooth or NFC communication capability, and acquires short-range communication identification information of the user equipment within the range by scanning within the detection range.
  • the user equipment is connected to the wireless routing device by means of short-range communication, and transmits the short-range communication identification information of the user equipment to the wireless routing device, and the wireless routing device receives the short-range communication identification information sent by the user equipment.
  • short-range communication including Bluetooth
  • the wireless routing device can obtain the Bluetooth MAC information of the user equipment through Bluetooth scanning, or the user equipment sends the Bluetooth MAC information to the wireless routing device through the Bluetooth connected to the wireless routing device.
  • step S12 the wireless routing device performs wireless connection pre-authorization on the user equipment identification information of the user equipment based on the short-range communication identification information. For example, when the wireless routing device determines that the user equipment identification information of the user equipment can be pre-authorized, the user equipment identification information is pre-authorized by the wireless connection.
  • the short-range communication identification information and the user equipment identification information are the same information, and the wireless routing device directly performs wireless connection pre-authorization on the short-range communication identification information; in some embodiments, the short-range communication identification information and the user equipment The identification information is different information, and the wireless routing device first obtains the user equipment identification information corresponding to the short-range communication identification information, and then performs wireless connection pre-authorization on the obtained user equipment identification information.
  • the user holds the user equipment, and the user is closer to the wireless routing device, which has Bluetooth communication capabilities.
  • the wireless routing device acquires the Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment sends the Bluetooth MAC information to the wireless routing device through the Bluetooth connected to the wireless routing device.
  • the wireless routing device queries, according to the Bluetooth MAC information, the MAC (Media Access Control) address information of the user equipment corresponding to the Bluetooth MAC address in the database; if the query is obtained, further determines whether the MAC address information can be pre-authorized. If yes, the wireless connection pre-authorization is performed on the MAC address information.
  • the manner of performing wireless connection pre-authorization on the user equipment identification information may include various types, for example, adding user equipment identification information to a white list.
  • the method in this embodiment may further include the following steps S13 (not shown) and step S14 (not shown): in step S13, the user equipment is sent to the wireless access point corresponding to the wireless routing device.
  • the connection authentication request is sent; if the user equipment identification information of the user equipment is pre-authorized by the wireless connection with respect to the wireless access point in step S14, the wireless routing device sends the authentication approval response information to the user equipment.
  • the method of this embodiment may further include the following step S15 (not shown): if the user equipment identification information is not pre-authorized by the wireless connection with respect to the wireless access point, the wireless routing device pairs the connection.
  • the authentication request performs an authentication process, and sends corresponding authentication result information to the user equipment.
  • a connection authentication request is sent to a wireless access point corresponding to the wireless routing device, and the user equipment identification information is pre-authorized with respect to the wireless access point, such as the user.
  • the wireless routing device sends the authentication response information to the user equipment to directly establish a wireless connection between the user equipment and the wireless access point.
  • step S12 includes three sub-steps: step S121, step S122, and step S123.
  • step S121 the wireless routing device sends the short-range communication identification information to the network device; in step S122, the wireless routing device receives the pre-authorization information of the user equipment identification information returned by the network device with respect to the wireless routing device.
  • step S123 if the pre-authorization information includes pre-authorization success, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the user equipment identification information and the short-range communication identification information are the same information, and in step S122, the wireless routing device receives the pre-authorization information of the short-range communication identification information returned by the network device with respect to the wireless routing device; In some embodiments, the user equipment identification information and the short-range communication identification information are different information. In step S122, the wireless routing device receives the user equipment of the user equipment corresponding to the short-range communication identification information returned by the network device. Identification information, and pre-authorization information of the user equipment identification information regarding the wireless routing device.
  • the wireless routing device transmits the proximity communication identification information to the network device, the network device receives the short-range communication identification information, and determines the corresponding user equipment identification information regarding the wireless connection pre-authorization information of the wireless routing device;
  • the user equipment identification information and the short-range communication identification information are the same information, and the network device may directly determine the wireless connection status information of the short-range communication identification information about the wireless routing device; in some embodiments, the user equipment identification information and The short-distance communication identification information is different information, and the network device needs to determine corresponding user equipment identification information based on the short-range communication identification information, and determine the wireless connection pre-authorization information of the user equipment identification information about the wireless routing device.
  • the wireless connection pre-authorization information about the wireless routing device may be pre-authorization information relative to the wireless routing device, or may be pre-authorization information of the wireless access point established with respect to the wireless routing device.
  • the pre-authorization information may be pre-processed and stored by the network device, or may be generated by the network device according to the address of the user equipment identification information in real time. Subsequently, the network device returns the pre-authorization information (in some embodiments, user equipment identification information) of the user equipment identification information with respect to the wireless routing device to the wireless routing device, and the wireless routing device receives the pre-authorization information (in some embodiments) The user equipment identification information is also received. If the pre-authorization information includes the pre-authorization success, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the wireless routing device acquires Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment transmits Bluetooth MAC information to the wireless routing device through Bluetooth connected to the wireless routing device.
  • the wireless routing device sends the Bluetooth MAC information to the network device; the network device receives the Bluetooth MAC information, and queries to obtain the MAC address information of the user equipment corresponding to the Bluetooth MAC information, or generates the user equipment based on the Bluetooth MAC information based on a preset rule.
  • the wireless connection pre-authorization information may be pre-authorization information relative to the wireless routing device, or may be pre-authorization information of the wireless access point established with respect to the wireless routing device; wherein the pre-authorization may be pre-processed by the network device, It can be that the network device processes it in real time according to the MAC address.
  • the network device returns the MAC address information and pre-authorization information about the wireless routing device to the wireless routing device, and the wireless routing device receives the MAC address information and the pre-authorization information. If the pre-authorization information includes the pre-authorization success, the wireless routing device performs a wireless connection pre-authorization on the MAC address information. Then, when the user equipment sends a connection authentication request to the wireless access point established by the wireless routing device, the wireless routing device sends the authentication response information to the user equipment to directly establish the wireless between the user equipment and the Internet based on the wireless access point. connection.
  • step S12 includes sub-step S124 and sub-step S125.
  • step S124 the wireless routing device determines user equipment identification information of the user equipment based on the short-range communication identification information; in step S125, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the determination of the user equipment identification information and the wireless connection pre-authorization are both performed locally at the wireless routing device.
  • the wireless routing device determines the user equipment identification information of the user equipment locally based on the short-range communication identification information; for example, the wireless routing device locally queries the user equipment based on the short-range communication identification information.
  • User equipment identification information for example, the wireless routing device determines the user equipment identification information of the user equipment according to the short-range communication identification information and the device address allocation rule corresponding to the user equipment.
  • step S125 the wireless routing device performs a wireless connection pre-authorization on the user equipment identification information locally; for example, the wireless routing device verifies whether the user equipment identification information conforms to a preset rule, and if yes, advances the user equipment identification information. Authorization.
  • the wireless routing device acquires Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment transmits Bluetooth MAC information to the wireless routing device through Bluetooth connected to the wireless routing device.
  • the wireless routing device locally queries the corresponding application identification information according to the Bluetooth MAC information.
  • the wireless routing device verifies whether the application identification information conforms to a preset rule to verify whether the application identification information is a specific application; if yes, the wireless routing device pre-authorizes the application identification information.
  • the correspondence between the Bluetooth MAC information and the application identification information may be previously sent by the network device to the wireless routing device.
  • the determination of the user equipment identification information is implemented locally at the wireless routing device, and the wireless connection pre-authorization is implemented by the network device assisted wireless routing device.
  • the wireless routing device locally determines the user equipment identification information of the user equipment based on the short-range communication identification information; for example, the wireless routing device performs a local query based on the short-range communication identification information to obtain The user equipment identification information of the user equipment corresponding to the short-range communication identification information; and, for example, the wireless routing device determines the user equipment according to the short-range communication identification information and the device address allocation rule corresponding to the user equipment User equipment identification information.
  • step S125 the wireless routing device sends the user equipment identification information to the network device, and receives the pre-authorization information of the user equipment identification information returned by the network device with respect to the wireless routing device;
  • the information includes the pre-authorization success, and the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the wireless routing device acquires Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment transmits Bluetooth MAC information to the wireless routing device through Bluetooth connected to the wireless routing device.
  • the wireless routing device determines the user equipment identification information of the user equipment corresponding to the Bluetooth MAC information according to the Bluetooth MAC information and the device address allocation rule corresponding to the user equipment, such as the user equipment identification information of the user equipment and the Bluetooth MAC information.
  • the Bluetooth MAC address of the user equipment is 3C-15-C2-EA-1E-3B, and the corresponding MAC address is determined to be 3c:15:c2:ea:1e:3b.
  • the wireless routing device then sends the MAC address to the network device.
  • the network device After receiving the MAC address, the network device queries the wireless connection pre-authorization information of the MAC address about the wireless routing device, and returns the pre-authorization information to the wireless routing device, where the pre-authorization information may be a MAC address authorization corresponding to the wireless routing device.
  • the information may also be MAC address authorization information corresponding to the wireless access point established by the wireless routing device.
  • the wireless routing device receives the pre-authorization information. If the pre-authorization information includes the pre-authorization success, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the determination of the user equipment identification information is primarily performed by the network device, and the wireless connection pre-authorization is performed locally at the wireless routing device.
  • the wireless routing device sends the short-range communication identification information to the network device, and receives the user equipment identification information of the user equipment corresponding to the short-range communication identification information returned by the network device.
  • the wireless routing device locally performs wireless connection pre-authorization on the user equipment identification information.
  • the wireless routing device acquires Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment transmits Bluetooth MAC information to the wireless routing device through Bluetooth connected to the wireless routing device.
  • the wireless routing device sends the Bluetooth MAC information to the network device, and the network device receives the Bluetooth MAC information, and queries the database for the user equipment user equipment identification information corresponding to the Bluetooth MAC information or generates the user equipment based on the device address allocation rule corresponding to the user equipment.
  • MAC address subsequently, the network device returns the MAC address of the user device to the wireless routing device.
  • the wireless routing device locally verifies whether the MAC address sent by the network device meets the preset rule, and if yes, pre-authorizes the user equipment identification information.
  • FIG. 5 illustrates a method for wirelessly pre-authorizing a user equipment at a network device side, the method including steps S21, S22, and S23, in accordance with some embodiments of the present invention.
  • the network device acquires user equipment identity information of the user equipment; in step S22, the network device determines, according to the user equipment identity information, the pre-authorization information of the user equipment identity information about the wireless routing device; in step S23, the network device The pre-authorization information is sent to the wireless routing device.
  • the network device directly receives the user equipment identification information from the user equipment; in some embodiments, the network device receives the short-range communication identification information from the user equipment, and based on the short-range communication identification The information determines the user equipment identification information. In this case, in step S23, the network device may provide the user equipment identification information of the user equipment determined by the network device to the wireless routing device.
  • the wireless routing device acquires Bluetooth MAC information of the user equipment through Bluetooth scanning or the user equipment transmits Bluetooth MAC information to the wireless routing device through Bluetooth connected to the wireless routing device.
  • the wireless routing device sends Bluetooth MAC information to the network device.
  • the network device determines the MAC address information of the user equipment corresponding to the Bluetooth MAC address by using a query or a preset device address allocation rule, and determines that the MAC address information of the user equipment is related to the wireless routing device.
  • the pre-authorization information is wirelessly connected, and the MAC address information and pre-authorization information of the user equipment are returned to the wireless routing device.
  • the pre-authorization may be pre-processed by the network device, or may be processed by the network device according to the MAC address in real time.
  • FIG. 6 illustrates a method for wirelessly pre-authorizing a user equipment in accordance with an aspect of the present application, wherein the method includes:
  • the wireless routing device acquires the short-range communication identification information of the user equipment, and sends the short-range communication identification information to the network device;
  • the short-range communication identification information Receiving, by the network device, the short-range communication identification information, determining, according to the short-range communication identification information, user equipment identification information of the user equipment, and returning the user equipment identification information to the wireless routing device;
  • the wireless routing device receives the user equipment identification information, and performs wireless connection pre-authorization on the user equipment identification information of the user equipment.
  • FIG. 7 illustrates a method for wirelessly pre-authorizing a user equipment according to another aspect of the present application, wherein the method includes:
  • the wireless routing device acquires the short-range communication identification information of the user equipment, and sends the short-range communication identification information to the network device;
  • the short-range communication identification information Receiving, by the network device, the short-range communication identification information, determining, according to the short-range communication identification information, user equipment identification information of the user equipment, and pre-authorization information of the user equipment identification information about the wireless routing device And returning the user equipment identification information and the pre-authorization information to the wireless routing device;
  • the wireless routing device receives the user equipment identification information and the pre-authorization information
  • the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the form of computer program instructions in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., accordingly, the manner in which the computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the finger to execute the corresponding compiled program in the future, or the computer reads and executes the instruction, or the computer reads and installs the finger and executes the corresponding installation in the future. program.
  • the computer readable medium can be any available computer readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media that can be transferred from one system to another by communication signals including, for example, computer readable instructions, data structures, program modules or other data.
  • Communication media can include conductive transmission media such as cables and wires (eg, fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared.
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as modulated data signals in a wireless medium, such as a carrier wave or a similar mechanism, such as embodied in a portion of a spread spectrum technique.
  • modulated data signal refers to a signal whose one or more features are altered or set in such a manner as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • the computer readable storage medium may comprise, by way of example and not limitation, vols and non-volatile, implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data.
  • a computer readable storage medium includes, but is not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or later developed for storage in computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM)
  • nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请的目的是提供一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:获取用户设备的近距离通信标识信息;基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。本申请本方案旨在通过对用户设备进行预授权,用户设备向无线接入点发送连接请求时,直接通过认证建立用户设备与无线接入点间的无线连接,减少认证过程中繁琐的操作和所花的时间,大大提升用户的体验。

Description

一种用于对用户设备进行无线连接预授权的方法与设备 技术领域
本申请涉及通信领域,尤其涉及一种用于对用户设备进行无线连接预授权的技术。
背景技术
随着移动设备的普及及互联网的发展,人们在日常生活中越来越多的依赖于无线网络。公共无线网络安全性低,人们通常选择对无线网络进行连接认证来限制非法用户接入无线网络,从而保证其安全性。
移动设备连接无线网络时,往往需要路由设备的配合完成。传统路由器的鉴权方式是被动的,请求连接的用户往往需要提供认证密码,并且在认证通过后才能进行无线连接。
发明内容
本申请的一个目的是提供一种用于对用户设备进行无线连接预授权的方法与设备。
根据本申请的一个方面,提供了一种在无线路由设备端用于对用户设备进行无线连接预授权的方法,该方法包括:获取用户设备的近距离通信标识信息;基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种在网络设备端用于对用户设备进行无线连接预授权的方法,该方法包括:获取用户设备的用户设备标识信息;基于所述用户设备标识信息确定所述用户设备标识信息关于无线路由设备的预授权信息;将所述预授权信息发送至所述无线路由设备。
根据本申请的一个方面,提供了一种用于对用户设备进行无线连接 预授权的方法,该方法包括:无线路由设备获取用户设备的近距离通信标识信息,并将所述近距离通信标识信息发送至网络设备;所述网络设备接收所述近距离通信标识信息,基于所述近距离通信标识信息查询确定所述用户设备的用户设备标识信息,并将所述用户设备标识信息返回至所述无线路由设备;所述无线路由设备接收所述用户设备标识信息,并对所述用户设备的用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,该方法包括:网络设备获取用户设备的设备标识信息,并确定所述用户设备标识信息关于所述无线路由设备的预授权信息,并将所述预授权信息发送至所述无线路由设备;所述无线路由设备接收所述用户设备标识信息以及所述预授权信息;若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种用于对用户设备进行无线连接预授权的设备,该设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:获取用户设备的近距离通信标识信息;基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的设备,该设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行:获取用户设备的用户设备标识信息;基于所述用户设备标识信息确定所述用户设备标识信息关于无线路由设备的预授权信息;将所述预授权信息发送至所述无线路由设备。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行:获取用户设备的近距离通信标识信息;基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介 质,所述指令在被执行时使得系统进行:获取用户设备的用户设备标识信息;基于所述用户设备标识信息确定所述用户设备标识信息关于无线路由设备的预授权信息;将所述预授权信息发送至所述无线路由设备。
与现有技术相比,本申请通过在用户设备向无线网络发起无线连接之前,无线路由设备对用户设备进行无线连接预授权,使得后续该用户设备连接该无线路由设备的无线接入点时可免除繁琐的鉴权过程,从而既保证了无线网络访问的可控性,也提高了无线连接效率、改善了用户使用体验。而且,本方案还可以根据用户设备的蓝牙地址等近距离通信标识信息进行续签连接预授权,也可基于近距离通信标识信息来确定其他用户设备标识信息后进行无线连接预授权。此外,该无线连接预授权还可由网络设备协助执行。
此外,对于该用户设备未被无线连接预授权的无线接入点,本申请还可以继续使用该无线接入点对应的鉴权方式对该用户设备的无线连接请求进行认证处理,从而较好地兼容了现有的无线接入点,从而使得本方案可根据实际应用场景需要进行可变规模部署,提高了系统的部署效率并降低了整个系统的拥有成本。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种用于对用户设备进行无线连接预授权的系统拓扑图;
图2示出根据本申请一个实施例的一种在无线路由设备端对用户设备进行无线连接预授权的方法流程图;
图3示出图2中所示步骤S12在一些实施例中的子步骤;
图4示出图2中所示步骤S12在一些实施例中的子步骤;
图5示出根据本申请另一个实施例的一种在网络设备端对用户设备进行无线连接预授权的方法流程图;
图6示出根据本申请一个实施例的一种用于对用户设备进行无线连 接预授权的系统方法;
图7示出根据本申请另一个实施例的一种用于对用户设备进行无线连接预授权的系统方法。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体,可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字 信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。
图1示出了本申请的一个典型应用场景,用户设备通过无线路由设备来访问网络。无线路由设备可独立对用户设备进行无线连接预授权,或与网络设备协作对用户设备进行无线连接预授权。在用户设备尚未获得通过无线路由设备访问网络的预授权情况下,无线路由设备可通过近距离通信的方式,如蓝牙扫描、NFC(Near Field Communication,近距离无线通信技术)扫描等,获取用户设备的近距离通信标识信息,并基于该近距离通信标识信息确定是否对用户设备标识信息进行无线连接预授权。在用户设备已获得通过无线路由设备访问网络的预授权的情况下,当用户设备向该无线路由设备建立的无线接入点发送连接认证请求时,无线路由设备直接通过其认证请求,建立用户设备与基于该无线接入点的互联网之间的无线连接。本方案可由无线路由设备与网络设备配合完成,此处的无线路由设备建立的无线网络系统包括非开放式无线网络系统。在一些实施例中,用户设备的近距离通信标识信息可与用户设备标识信息为同一信息;在一些实施例中,用户设备的近距离通信标识信息可与用户设备标识信息为不同信息。
图2示出了根据本申请的一些实施例的在无线路由设备端用于对用户设备进行无线连接预授权的方法,该方法包括步骤S11和步骤S12。在步骤S11中,无线路由设备获取用户设备的近距离通信标识信息;在步骤S12中,无线路由设备基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。例如,用户持有用户设备,用户距离无线路由设备距离较近,无线路由设备具有近距离通信(蓝牙、NFC)能力。无线路由设备通过近距离通信方式获取到用户设备的近距离通信标识信息(如蓝牙MAC等);其中,可以是无线路由设备探查到用户设备的近距离通信标识信息,也可以是用户设备通过近距离通讯方式向无线路由设备发送近距离通信标识。随后,无线路由设备基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权;在一些实施例中,该无线连接预授权可以是针对无线路由设备的预授权,即该用户设备标识信息所标识的用户设备被授权通过该无线路由设备建立的所有无线接入点访问网络;在一些实施例中,该无线连接预授权可以是针对无线路由设备建立的无线接入点的预授权,在此情况下,该用户设备标识信息所标识的用户设备仅能通过所述预授权所限定的无线接入点访问网络。
用户设备标识信息包括多种能够标识用户设备的信息。在一些实施例中,用户设备标识信息包括但不限于用户设备的近距离通信标识信息(如蓝牙MAC等)、用户设备的MAC地址信息、用户设备的设备标识信息(如序列号等)、用户设备对应的应用标识信息(如应用账号信息)、用户设备的通信标识信息(如用户设备对应的手机号码等)。在一些实施例中,用户设备的近距离通信标识信息可由用户设备通过近距离通信的方式提供给无线路由设备;用户设备的MAC地址信息可在用户设备与无线路由设备建立握手协议的过程中,由用户设备提供给无线路由设备,在一些情况下,无线路由设备可关闭MAC层的密码验证(如关闭输入密码才能连接无线路由设备的功能),以使任何用户设备与无线路由设备之间均能实现在MAC层上的通信(即用户设备能够与无线路由设备之间通信,但用户设备可能无法通过无线路由设备访问互 联网);用户设备的应用标识信息、通信标识信息等,可在用户设备与无线路由设备建立握手协议并互相通信之后,由用户设备提供给无线路由设备。
在一些实施例中,在步骤S11中,无线路由设备获取用户设备的近距离通信标识信息。例如,无线路由设备具有蓝牙或NFC通信能力,在探测范围内通过扫描获取范围内用户设备的近距离通信标识信息。又例如,用户设备已经通过近距离通信方式连接到该无线路由设备,并向无线路由设备发送用户设备的近距离通信标识信息,无线路由设备接收该用户设备发送的近距离通信标识信息。以近距离通信包括蓝牙为例,无线路由设备可通过蓝牙扫描获取到用户设备的蓝牙MAC信息,或者,用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。
随后,在步骤S12中,无线路由设备基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。例如,当无线路由设备确定所述用户设备的用户设备标识信息可以被预授权时,对该用户设备标识信息进行无线连接预授权。在一些实施例中,近距离通信标识信息与用户设备标识信息为同一信息,无线路由设备直接对近距离通信标识信息进行无线连接预授权;在一些实施例中,近距离通信标识信息与用户设备标识信息为不同信息,无线路由设备先获得与近距离通信标识信息对应的用户设备标识信息,再对所获得的用户设备标识信息进行无线连接预授权。
例如,用户持有用户设备,用户距离无线路由设备较近,该无线路由设备具备蓝牙通信能力。无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备根据该蓝牙MAC信息,在数据库查询该蓝牙MAC信息对应的用户设备的MAC(Media Access Control,媒体访问控制)地址信息;若查询到,则进一步确定该MAC地址信息是否可以被预授权,若是,则对该MAC地址信息进行无线连接预授权。对用户设备标识信息进行无线连接预授权的方式可包括多 种,例如,将用户设备标识信息加入白名单等。
在步骤S12之后,本实施例的方法还可包括以下步骤S13(图未示)和步骤S14(图未示):在步骤S13中,接收用户设备向无线路由设备对应的无线接入点发送的连接认证请求;在步骤S14中若用户设备的用户设备标识信息相对该无线接入点已被无线连接预授权,则无线路由设备向所述用户设备发送认证通过响应信息。在一些实施例中,本实施例的方法还可包括以下步骤S15(图未示):若该用户设备标识信息相对该无线接入点未被无线连接预授权,则无线路由设备对所述连接认证请求进行认证处理,并向所述用户设备发送对应的认证结果信息。
例如,当接收到所述用户设备向所述无线路由设备对应的无线接入点发送连接认证请求,且所述用户设备标识信息相对所述无线接入点已被无线连接预授权,如该用户设备标识信息能够在用于指示已预授权的用户设备的白名单中查询到时,无线路由设备向所述用户设备发送认证通过响应信息,直接建立用户设备与无线接入点间的无线连接。
请参阅图3。在一些实施例中,步骤S12包括三个子步骤:步骤S121、步骤S122和步骤S123。在步骤S121中,无线路由设备将所述近距离通信标识信息发送至网络设备;在步骤S122中,无线路由设备接收所述网络设备返回的用户设备标识信息关于所述无线路由设备的预授权信息;在步骤S123中,若所述预授权信息包括预授权成功,无线路由设备对所述用户设备标识信息进行无线连接预授权。在一些实施例中,用户设备标识信息与近距离通信标识信息为同一信息,在步骤S122中,无线路由设备接收网络设备返回的近距离通信标识信息关于所述无线路由设备的预授权信息;在一些实施例中,用户设备标识信息与近距离通信标识信息为不同信息,在步骤S122中,无线路由设备接收所述网络设备返回的所述近距离通信标识信息对应的所述用户设备的用户设备标识信息,以及,所述用户设备标识信息关于所述无线路由设备的预授权信息。
在一些实施例中,无线路由设备将近距离通信标识信息发送至网络设备,网络设备接收该近距离通信标识信息,并确定相应的用户设备标 识信息关于无线路由设备的无线连接预授权信息;在一些实施例中,用户设备标识信息与近距离通信标识信息为同一信息,则网络设备可直接确定近距离通信标识信息关于无线路由设备的无线连接状态信息;在一些实施例中,用户设备标识信息与近距离通信标识信息为不同信息,则网络设备需要基于近距离通信标识信息确定对应的用户设备标识信息,并确定该用户设备标识信息关于无线路由设备的无线连接预授权信息。其中,关于无线路由设备的无线连接预授权信息可以是相对于无线路由设备的预授权信息,也可以是相对于无线路由设备建立的无线接入点的预授权信息。其中,预授权信息可以是网络设备预先处理并存储的,也可以是网络设备根据用户设备标识信息地址实时处理生成的。随后,网络设备将该用户设备标识信息关于无线路由设备的预授权信息(在一些实施例中还包括用户设备标识信息)返回至无线路由设备,无线路由设备接收该预授权信息(在一些实施例中还接收用户设备标识信息)。若预授权信息包括预授权成功,则无线路由设备对该用户设备标识信息进行无线连接预授权。
例如,无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备将蓝牙MAC信息发送至网络设备;网络设备接收该蓝牙MAC信息,并查询以得到该蓝牙MAC信息对应的用户设备的MAC地址信息,或基于预设规则来基于蓝牙MAC信息生成用户设备的MAC地址信息;并且,网络设备基于该MAC地址信息查询得到关于无线路由设备的无线连接预授权信息,或基于预设规则验证该用户设备标识信息是否可被预授权;其中,关于无线路由设备的无线连接预授权信息可以是相对于无线路由设备的预授权信息,也可以是相对于无线路由设备建立的无线接入点的预授权信息;其中,预授权可以是网络设备预先处理的,也可以是网络设备根据MAC地址实时处理的。随后,网络设备将该MAC地址信息以及关于无线路由设备的预授权信息返回至无线路由设备,无线路由设备接收该MAC地址信息及预授权信息。若预授权信息包括预授权成功,则无线路由设备对该MAC地址信息进 行无线连接预授权。之后,当用户设备向无线路由设备建立的无线接入点发送连接认证请求时,无线路由设备向用户设备发送认证通过响应信息,直接建立用户设备与基于该无线接入点的互联网之间的无线连接。
请参阅图4。在一些实施例中,近距离通信标识信息和用户设备标识信息为不同信息,步骤S12包括子步骤S124和子步骤S125。在步骤S124中,无线路由设备基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息;在步骤S125中,无线路由设备对所述用户设备标识信息进行无线连接预授权。
在一些实施例中,用户设备标识信息的确定和无线连接预授权均在无线路由设备本地进行。如在步骤S124中,无线路由设备在本地基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息;例如,无线路由设备在本地基于所述近距离通信标识信息查询所述用户设备的用户设备标识信息;又例如,无线路由设备根据近距离通信标识信息以及用户设备对应的设备地址分配规则,确定用户设备的用户设备标识信息。在步骤S125中,无线路由设备在本地对所述用户设备标识信息进行无线连接预授权;例如,无线路由设备验证用户设备标识信息是否符合预设规则,若符合,则对用户设备标识信息进行预授权。
例如,无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备根据该蓝牙MAC信息在本地查询到对应的应用标识信息。并且,无线路由设备验证该应用标识信息是否符合预设规则,以验证该应用标识信息是否为特定应用;若是,则无线路由设备对该应用标识信息进行预授权。蓝牙MAC信息与应用标识信息的对应关系可由网络设备预先发送给无线路由设备。
在一些实施例中,用户设备标识信息的确定在无线路由设备本地实现,无线连接预授权由网络设备辅助无线路由设备实现。如在步骤S124中,无线路由设备在本地基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息;例如,无线路由设备基于该近距离通信标识信息在本地进行查询,以获得与该该近距离通信标识信息对应的用户设备 的用户设备标识信息;又例如,无线路由设备根据所述近距离通信标识信息,以及所述用户设备对应的设备地址分配规则,确定所述用户设备的用户设备标识信息。在步骤S125中,无线路由设备将所述用户设备标识信息发送至网络设备,并接收所述网络设备返回的所述用户设备标识信息关于所述无线路由设备的预授权信息;若所述预授权信息包括预授权成功,无线路由设备对所述用户设备标识信息进行无线连接预授权。
例如,无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备根据该蓝牙MAC信息,以及用户设备对应的设备地址分配规则,确定该蓝牙MAC信息对应的用户设备的用户设备标识信息,如用户设备的用户设备标识信息与蓝牙MAC信息采用练号编写规则,则根据该用户设备蓝牙MAC信息为3C-15-C2-EA-1E-3B,确定其对应的MAC地址为3c:15:c2:ea:1e:3b。随后,无线路由设备将该MAC地址发送至网络设备。网络设备接收该MAC地址后,查询该MAC地址关于无线路由设备的无线连接预授权信息,并将预授权信息返回至无线路由设备,其中,预授权信息可以是与无线路由设备对应的MAC地址授权信息,也可以是与无线路由设备建立的无线接入点对应的MAC地址授权信息。无线路由设备接收该预授权信息,若该预授权信息包含预授权成功,则无线路由设备对用户设备标识信息进行无线连接预授权。
在一些实施例中,用户设备标识信息的确定主要由网络设备实现,无线连接预授权在无线路由设备本地进行。如在步骤S124中,无线路由设备将该近距离通信标识信息发送至网络设备,并接收所述网络设备返回的所述近距离通信标识信息对应的所述用户设备的用户设备标识信息。在步骤S125中,无线路由设备在本地对所述用户设备标识信息进行无线连接预授权。
例如,无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备将蓝牙MAC信息发送至网络设备,网络设 备接收该蓝牙MAC信息,并在数据库查询该蓝牙MAC信息对应的用户设备用户设备标识信息或基于与用户设备对应的设备地址分配规则生成用户设备的MAC地址;随后,网络设备将用户设备的MAC地址返回至无线路由设备。无线路由设备在本地验证网络设备发送的MAC地址是否符合预设规则,若符合,则对用户设备标识信息进行预授权。
图5示出了根据本发明一些实施例的在网络设备端用于对用户设备进行无线连接预授权的方法,该方法包括步骤S21、步骤S22和步骤S23。在步骤S21中,网络设备获取用户设备的用户设备标识信息;在步骤S22中,网络设备基于用户设备标识信息确定该用户设备标识信息关于无线路由设备的预授权信息;在步骤S23中,网络设备将预授权信息发送给无线路由设备。在步骤S21中,在一些实施例中,网络设备直接接收来自用户设备的用户设备标识信息;在一些实施例中,网络设备接收来自用户设备的近距离通信标识信息,并基于该近距离通信标识信息确定用户设备标识信息,在此情况下,在步骤S23中,网络设备可将其确定的用户设备的用户设备标识信息一并提供给无线路由设备。
例如,无线路由设备通过蓝牙扫描获取到用户设备的蓝牙MAC信息或者用户设备通过与无线路由设备连接的蓝牙向无线路由设备发送蓝牙MAC信息。无线路由设备将蓝牙MAC信息发送至网络设备。网络设备接收该蓝牙MAC信息后,通过查询或预设的设备地址分配规则确定与该确定该蓝牙MAC信息对应的用户设备的MAC地址信息,并确定该用户设备的MAC地址信息关于无线路由设备的无线连接预授权信息,并将用户设备的MAC地址信息和预授权信息返回至无线路由设备。其中,预授权可以是网络设备预先处理的,也可以是网络设备根据MAC地址实时处理的。
图6示出了根据本申请一个方面的一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
无线路由设备获取用户设备的近距离通信标识信息,并将所述近距离通信标识信息发送至网络设备;
所述网络设备接收所述近距离通信标识信息,基于所述近距离通信 标识信息查询确定所述用户设备的用户设备标识信息,并将所述用户设备标识信息返回至所述无线路由设备;
所述无线路由设备接收所述用户设备标识信息,并对所述用户设备的用户设备标识信息进行无线连接预授权。
图7示出了根据本申请另一个方面的一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
无线路由设备获取用户设备的近距离通信标识信息,并将所述近距离通信标识信息发送至网络设备;
所述网络设备接收所述近距离通信标识信息,基于所述近距离通信标识信息查询确定所述用户设备的用户设备标识信息,以及所述用户设备标识信息关于所述无线路由设备的预授权信息,并将所述用户设备标识信息及所述预授权信息返回至所述无线路由设备;
所述无线路由设备接收所述用户设备标识信息及所述预授权信息;
若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备标识信息进行无线连接预授权。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指今后再执 行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机读取并安装该指今后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限 定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (15)

  1. 一种在无线路由设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    获取用户设备的近距离通信标识信息;
    基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权。
  2. 根据权利要求1所述的方法,其中,所述方法还包括:
    接收所述用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求;
    若所述用户设备标识信息相对所述无线接入点已被无线连接预授权,向所述用户设备发送认证通过响应信息。
  3. 根据权利要求2所述的方法,其中,所述方法还包括:
    若所述用户设备标识信息相对所述无线接入点未被无线连接预授权,对所述连接认证请求进行认证处理,并向所述用户设备发送对应的认证结果信息。
  4. 根据权利要求1至3中任一项所述的方法,其中,基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权,包括:
    将所述近距离通信标识信息发送至网络设备;
    接收所述网络设备返回的关于所述无线路由设备的预授权信息;
    若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  5. 根据权利要求1至3中任一项所述的方法,其中,基于所述近距离通信标识信息对所述用户设备的用户设备标识信息进行无线连接预授权,包括:
    基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息;
    对所述用户设备标识信息进行无线连接预授权。
  6. 根据权利要求5所述的方法,其中,基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息,包括:
    将所述近距离通信标识信息发送至网络设备;
    接收所述网络设备返回的所述近距离通信标识信息对应的所述用户设备的用户设备标识信息。
  7. 根据权利要求5中所述的方法,其中,对所述用户设备标识信息进行无线连接预授权,包括:
    将所述用户设备标识信息发送至网络设备;
    接收所述网络设备返回的所述用户设备标识信息关于所述无线路由设备的预授权信息;
    若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  8. 根据权利要求5所述的方法,其中,基于所述近距离通信标识信息确定所述用户设备的用户设备标识信息,包括:
    根据所述近距离通信标识信息,以及所述用户设备对应的设备地址分配规则,确定所述用户设备的用户设备标识信息。
  9. 一种在网络设备端用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    获取用户设备的用户设备标识信息;
    基于所述用户设备标识信息确定所述用户设备标识信息关于无线路由设备的预授权信息;
    将所述预授权信息发送至所述无线路由设备。
  10. 根据权利要求9所述的方法,其中,获取用户设备的用户设备标识信息,包括:
    接收无线路由设备发送的、用户设备的近距离通信标识信息;
    基于所述近距离通信标识信息,确定所述用户设备的用户设备标识信息;
    将所述预授权信息发送至所述无线路由设备,包括:
    将用户设备标识信息和所述预授权信息返回至所述无线路由设备。
  11. 根据权利要求9所述的方法,其中,获取用户设备的用户设备标识信息,包括:接收无线路由设备发送的所述用户设备标识信息。
  12. 一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    无线路由设备获取用户设备的近距离通信标识信息,并将所述近距离通信标识信息发送至网络设备;
    所述网络设备接收所述近距离通信标识信息,基于所述近距离通信标识信息查询确定所述用户设备的用户设备标识信息,并将所述用户设备标识信息返回至所述无线路由设备;
    所述无线路由设备接收所述用户设备标识信息,并对所述用户设备的用户设备标识信息进行无线连接预授权。
  13. 一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    网络设备获取用户设备的设备标识信息,并确定所述用户设备标识信息关于所述无线路由设备的预授权信息,并将所述预授权信息发送至所述无线路由设备;
    所述无线路由设备接收所述预授权信息;
    若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备标识信息进行无线连接预授权。
  14. 一种用于对用户设备进行无线连接预授权的设备,其中,该设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行如权利要求1至11中任一项所述的操作。
  15. 一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行如权利要求1至11中任一项所述的操作。
PCT/CN2018/099544 2017-08-21 2018-08-09 一种用于对用户设备进行无线连接预授权的方法与设备 WO2019037602A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710720681.2A CN107396296A (zh) 2017-08-21 2017-08-21 一种用于对用户设备进行无线连接预授权的方法与设备
CN201710720681.2 2017-08-21

Publications (1)

Publication Number Publication Date
WO2019037602A1 true WO2019037602A1 (zh) 2019-02-28

Family

ID=60352696

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/099544 WO2019037602A1 (zh) 2017-08-21 2018-08-09 一种用于对用户设备进行无线连接预授权的方法与设备

Country Status (2)

Country Link
CN (1) CN107396296A (zh)
WO (1) WO2019037602A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396296A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
CN110087330B (zh) * 2019-04-25 2021-11-09 新华三技术有限公司 无线网络连接建立方法、无线接入设备及服务器
CN111866996B (zh) * 2020-07-24 2022-04-08 深圳创维数字技术有限公司 智能设备配网方法、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530589A (zh) * 2014-09-29 2016-04-27 樊明延 一种蓝牙信标装置、无线局域网终端认证接入系统和方法
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN107071776A (zh) * 2017-05-23 2017-08-18 上海斐讯数据通信技术有限公司 一种自动配网方法及其系统、一种服务器
CN107396296A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104159275B (zh) * 2014-07-17 2015-12-09 小米科技有限责任公司 网络连接方法及装置
CN106973425A (zh) * 2017-04-06 2017-07-21 上海掌门科技有限公司 一种连接无线接入点的方法与设备

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530589A (zh) * 2014-09-29 2016-04-27 樊明延 一种蓝牙信标装置、无线局域网终端认证接入系统和方法
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN107071776A (zh) * 2017-05-23 2017-08-18 上海斐讯数据通信技术有限公司 一种自动配网方法及其系统、一种服务器
CN107396296A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Also Published As

Publication number Publication date
CN107396296A (zh) 2017-11-24

Similar Documents

Publication Publication Date Title
US11336635B2 (en) Systems and methods for authenticating device through IoT cloud using hardware security module
US11477646B2 (en) Method and a device for performing wireless connection pre-authorization on a user device
CN107396364B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107517461B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2018223908A1 (zh) 一种用于连接隐藏无线接入点的方法与设备
WO2018205997A1 (zh) 一种用于连接无线接入点的方法与设备
JP2009188984A (ja) 短距離無線通信を用いたサービスのプロビジョニング
US20210105627A1 (en) Method and a device for authorizing a user equipment to connect to a wireless access point
CN107690175B (zh) 一种用于管理无线接入点的方法与设备
CN108650236B (zh) 一种用于检测ssl中间人攻击的方法与设备
WO2019037603A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037602A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019076282A1 (zh) 一种用于管理用户的方法与设备
WO2018233473A1 (zh) 一种用于配置无线路由设备的方法与设备
WO2019042122A1 (zh) 一种用于确定无线接入点的连接成功率信息的方法与设备
CN107333264B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN113010858B (zh) 一种用于在用户设备中登录应用的方法与设备
WO2019037598A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107404722B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037597A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US20200119919A1 (en) Electronic device authentication managing apparatus
CN108712744B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US20220216987A1 (en) Device and method for managing shared digital key
KR20200114074A (ko) 전자 디바이스를 인증하기 위한 방법 및 그에 따른 장치
KR20200059106A (ko) 디바이스가 디지털 키를 공유하는 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18848575

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 23.07.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18848575

Country of ref document: EP

Kind code of ref document: A1