WO2019037603A1 - 一种用于对用户设备进行无线连接预授权的方法与设备 - Google Patents

一种用于对用户设备进行无线连接预授权的方法与设备 Download PDF

Info

Publication number
WO2019037603A1
WO2019037603A1 PCT/CN2018/099547 CN2018099547W WO2019037603A1 WO 2019037603 A1 WO2019037603 A1 WO 2019037603A1 CN 2018099547 W CN2018099547 W CN 2018099547W WO 2019037603 A1 WO2019037603 A1 WO 2019037603A1
Authority
WO
WIPO (PCT)
Prior art keywords
user equipment
authorization
identification information
user
information
Prior art date
Application number
PCT/CN2018/099547
Other languages
English (en)
French (fr)
Inventor
程翰
Original Assignee
上海掌门科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海掌门科技有限公司 filed Critical 上海掌门科技有限公司
Publication of WO2019037603A1 publication Critical patent/WO2019037603A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Definitions

  • the present application relates to the field of communications, and in particular, to a technology for performing wireless connection pre-authorization on user equipment.
  • the authentication mode of the traditional router is passive, and the user requesting the connection often needs to provide an authentication password, and the wireless connection can be made after the authentication is passed. Moreover, the authentication process is cumbersome and time consuming, resulting in poor user experience.
  • a method for wirelessly pre-authorizing a second user equipment on a first user equipment side comprising:
  • a method for wirelessly pre-authorizing a second user equipment on a network device side comprising:
  • a method for wirelessly pre-authorizing a second user equipment at a wireless routing device comprising:
  • the user equipment identification information is pre-authorized by the wireless connection.
  • a method for wirelessly pre-authorizing a user equipment comprising:
  • the first user equipment acquires the pre-authorization information of the first user to perform the wireless connection pre-authorization on the second user equipment, and sends the pre-authorization information and the user equipment identification information of the second user equipment to the network device;
  • the network device receives the pre-authorization information and the user equipment identification information, and sends the pre-authorization information and the user equipment identification information of the second user equipment to one or more managed by the first user.
  • Wireless routing device ;
  • the one or more wireless routing devices receive the user equipment identification information and the pre-authorization information. If the pre-authorization information includes pre-authorization success, the user equipment identification information is pre-authorized by the wireless connection.
  • a method for wirelessly pre-authorizing a user equipment includes:
  • pre-authorization information of the first user to perform wireless connection pre-authorization on the second user equipment, and send the pre-authorization information and user equipment identification information of the second user equipment to one or more managed by the first user Wireless routing devices;
  • the one or more wireless routing devices receive the user equipment identification information and the pre-authorization information. If the pre-authorization information includes pre-authorization success, the user equipment identification information is pre-authorized by the wireless connection.
  • a first user equipment for performing wireless connection pre-authorization on a second user equipment where the first user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • a network device for performing wireless connection pre-authorization on a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • a wireless routing device for wirelessly pre-authorizing a user equipment, wherein the wireless routing device includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • the user equipment identification information is pre-authorized by the wireless connection.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the user equipment identification information is pre-authorized by the wireless connection.
  • the method for pre-authorizing a wireless connection of a user equipment can be used by a host device to a wireless routing device before a user equipment that needs to connect to a wireless access point or a wireless router initiates a connection request.
  • a user equipment identifier such as a MAC address
  • FIG. 1 is a specific implementation scenario of a method for performing wireless connection pre-authorization on a user equipment according to an embodiment of the present application
  • FIG. 2 shows a flow chart of a method for wirelessly pre-authorizing a user equipment based on the scenario shown in FIG. 1;
  • FIG. 3 is a flowchart of a method for performing wireless connection pre-authorization on a second user equipment at a first user equipment end according to another embodiment of the present application;
  • FIG. 4 is a flowchart of a method for performing wireless connection pre-authorization on a user equipment at a network device according to another embodiment of the present application
  • FIG. 5 is a flowchart of a method for wirelessly pre-authorizing a user equipment at a wireless routing device according to another embodiment of the present application.
  • FIG. 6 is a specific implementation scenario of a method for performing wireless connection pre-authorization on a user equipment according to another embodiment of the present application
  • FIG. 7 shows a flow chart of a method for wirelessly pre-authorizing a user equipment based on the scenario shown in FIG. 6;
  • FIG. 8 is a flowchart of a method for performing wireless connection pre-authorization on a second user equipment at a first user equipment end according to another embodiment of the present application;
  • FIG. 9 is a flowchart of a method for wirelessly pre-authorizing a user equipment on a wireless routing device according to another embodiment of the present application.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • the device referred to in the present application includes but is not limited to a user equipment, a network device, or a device formed by integrating a user equipment and a network device through a network.
  • the user equipment includes, but is not limited to, any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc., and the mobile electronic product can be operated by any operation.
  • System such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance, and the hardware includes but is not limited to a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • ASIC application specific integrated circuit
  • the network device includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a plurality of servers; wherein the cloud is composed of a large number of computers or network servers based on Cloud Computing.
  • cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computers.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like.
  • the device may also be a program running on the user equipment, the network device, or the user equipment and the network device, the network device, the touch terminal, or the network device and the touch terminal integrated through the network.
  • FIG. 1 illustrates a specific implementation scenario of a method for performing wireless connection pre-authorization on a user equipment according to an aspect of the present disclosure
  • FIG. 2 illustrates a wireless connection pre-authorization for a user equipment based on the scenario.
  • Method flow chart The method for performing wireless connection pre-authorization on the user equipment is described in detail below based on the scenario shown in FIG.
  • the first user equipment 101 obtains pre-authorization information that the user (ie, the first user) performs wireless connection pre-authorization on the second user equipment 102.
  • the input information of the first user on the first user equipment 101 is obtained, where the input information includes pre-authorization information for pre-authorizing the wireless connection of the second user equipment 102, for example, relative to a wireless routing device.
  • the pre-authorization information includes "pre-authorization success" or "pre-authorization”
  • the corresponding wireless routing device 104 receives the pre-authorization information for the second user equipment 102.
  • the wireless connection pre-authorization is performed; otherwise, the second user device 102 is not pre-authorized for wireless connection, for example, the wireless routing device 104 removes the second user device 102 from the pre-authorized device list).
  • the wireless connection pre-authorization of the user equipment refers to that the wireless routing device acquires the user equipment identifier (such as a MAC address) of the user equipment that obtains the connection authorization in advance; when the wireless routing device receives the connection request or authentication from a user equipment, Request, and the user equipment identifier of the user equipment has obtained the connection authorization, then the connection request or the authentication request by the user equipment.
  • the first user equipment 101 sends the pre-authorization information and the user equipment identification information of the second user equipment 102 to the network device 103.
  • One user equipment identification information eg, a Bluetooth identifier
  • the second user equipment 102 may also be used to determine another user equipment identifier (eg, a MAC address) of the second user equipment 102; the user equipment of the second user equipment 102
  • the identification information is provided by the wireless routing device 104 for wireless connection pre-authorization.
  • the network device 103 receives the pre-authorization information of the first user to perform the wireless connection pre-authorization on the second user equipment 102 and the user equipment identification information of the second user equipment 102, and then, in step S21; In step S22, the network device 103 sends the pre-authorization information and the user equipment identification information of the second user equipment 102 to the wireless routing device 104 managed by the first user.
  • the user equipment identification information may be obtained by the network equipment 103 by querying a local database, or querying other databases accessible by the network equipment 103.
  • the wireless routing device 104 receives the user equipment identification information of the second user equipment 102 sent by the network device 103, and the pre-authorization information of the user equipment identification information about the wireless routing device 104;
  • the authorization information includes the pre-authorization success.
  • the wireless routing device 104 performs a wireless connection pre-authorization on the user equipment identifier of the second user equipment 102.
  • the user equipment identification information of the user equipment 101 includes, but is not limited to, MAC address information, device identification information of the user equipment 101 (such as IMEI, device serial number, etc.), Bluetooth identification information, and user identification information of the user to which the user equipment 101 belongs. (such as the user account of the user in the wireless connection application), the communication identification information of the user equipment 101 (for example, the telephone number corresponding to the telephone card in the user equipment 101).
  • the wireless connection pre-authorization of the user equipment 101 may be performed based on other user equipment identification information of the user equipment 101, for example, but not limited to: device identification information of the user equipment 101 (eg, IMEI, device).
  • the serial number, etc., the Bluetooth identification information, the user identification information of the user to which the user equipment 101 belongs (such as the user account of the user in the wireless connection application), and the communication identification information of the user equipment 101 (for example, the telephone number corresponding to the telephone card in the user equipment 101) ).
  • a method for enabling the user equipment 101 to perform network access by the wireless routing device 104 is that the network device 103 queries the user equipment corresponding to the user equipment 101 based on the short-range communication identifier of the user equipment 101 (for example, a Bluetooth communication identifier or an NFC communication identifier).
  • the wireless routing device 104 may directly perform wireless connection pre-authorization on the user equipment identification information.
  • the configuration information of the wireless routing device 104 can include a switch for the owner of the wireless routing device 104 to select whether to enable the wireless connection pre-authorization function. If the wireless connection pre-authorization function of the wireless routing device 104 is not enabled, the wireless routing device 104 may not perform wireless connection pre-authorization on the user equipment identification information of the user equipment; if the wireless connection pre-authorization function of the wireless routing device 104 is enabled.
  • the wireless routing device 104 When the wireless routing device 104 receives the user equipment identification information of the user equipment 101 sent by the network device 103, and adds the user equipment identification information to the trusted device set of the wireless routing device 104, based on the trusted device set, the wireless routing device The wireless device pre-authorization function of the wireless device routing device 104 may be in an unenabled state, even if the wireless routing device 104 detects that the user device 101 is included in the trusted device set, It is also not possible to perform wireless connection pre-authorization on the user equipment identification information of the user equipment 101.
  • each of the pre-authorized device trusted device sets may be separately set to implement diversified and personalized rights management. For example, only a part of the multiple wireless routing devices 104 respond to the network device.
  • the user equipment identification information is transmitted by the user equipment 101, and the wireless connection pre-authorization is performed on the user equipment 101.
  • the network device 103 also queries the pre-authorization information determining the user device 101 relative to the wireless routing device 104 and transmits the pre-authorization information to the wireless routing device 104.
  • the network device 103 can be based on the user device 101.
  • the MAC address information query determines whether the user equipment 101 can be pre-authorized to connect to the wireless access point corresponding to the wireless routing device 104, thereby obtaining the pre-authorization information (including, for example, pre-authorization success, pre-authorization failure or no need for repeated authorization); wireless routing device After receiving the pre-authorization information sent by the network device 103 and the MAC address of the user equipment 101, if the pre-authorization information includes the pre-authorization success, the wireless routing device 104 performs a wireless connection pre-authorization on the MAC address of the user equipment 101.
  • the wireless routing device 104 does not need to perform wireless connection pre-authorization on the MAC address device identification information of the user equipment 101.
  • the pre-authorization information further includes pre-authorization valid period information corresponding to the user equipment identification information of the user equipment; and the wireless routing device 104 uses the pre-authorization valid period information to the user equipment 101.
  • the user equipment identification information is pre-authorized for the wireless connection. For example, the host sets the pre-authorization valid period on the wireless routing device 104 to 14:00 to 18:00 on Saturday, when the guest is a guest at the host, and the guest's mobile phone is pre-paid.
  • the wireless router can only pre-authorize the guest's mobile phone to connect to the wireless router from 14:00 to 18:00 on Saturday; if the user equipment is connected outside the pre-authorization valid period information A wireless router requires additional authorization or authentication.
  • respective pre-authorization information may be separately set to implement diversified and personalized rights management. For example, only a part of the plurality of wireless routing devices 104 are sent by the response network device 103.
  • User equipment identification information, and wireless connection pre-authorization to the user equipment 101, or the pre-authorization valid period is only valid for some of the wireless routing devices, while other wireless routing devices maintain pre-authorization for the user equipment 101 wireless connection, or keep the user Device 101 is not wirelessly connected for pre-authorization.
  • the information-aware device may perform wireless connection pre-authorization of the user equipment on one or more corresponding wireless routing devices.
  • the user equipment identification information of the second user equipment 102 includes, but is not limited to: 1) MAC address information of the second user equipment 102; 2) device identification information of the second user equipment 102; The Bluetooth identification information of the second user equipment 102; 4) the second user identification information of the second user to which the second user equipment 102 belongs.
  • the user equipment identification information includes the MAC address information of the second user equipment 102
  • the MAC address information can be directly sent to the wireless routing device 104 for the wireless routing device 104 to wirelessly access the second user equipment 102.
  • the connection pre-authorization (eg, adding the MAC address of the second user equipment 102 to the list of pre-authorized MAC addresses, or marking the MAC address of the second user equipment 102 as "pre-authorized" in the pre-authorization status list).
  • the user equipment identification information includes device identification information (eg, device serial number, IMEI, etc.) or Bluetooth identification information of the second user equipment 102
  • the network device 103 after receiving the device identification information or the Bluetooth identification information, First, the MAC address information corresponding to the device identification information or the Bluetooth identification information is first queried (for example, the network device is in a local database, or in other databases accessible thereto, according to the device identification information or the Bluetooth identifier of the second user device 102.
  • the information, matching the MAC address of the second user equipment 102); the device identification information or the Bluetooth identification information of the second user equipment 102 may be sent by the second user equipment 102 to the first user equipment 101, or read by the first user equipment 101, For example, through NFC (Near Field Communication) or Bluetooth.
  • the user equipment identification information includes the second user identification information of the second user to which the second user equipment 102 belongs (for example, the second user using the second user equipment 102 installs the wireless connection application on the second user equipment 102. And logging in through its own user account, or the second user registering his or her identity information in the wireless connection application.
  • the network device 103 After receiving the user equipment identification information of the second user equipment 102, the network device 103 first queries the second user.
  • the MAC address information corresponding to the second user equipment 102 for example, the network device is in the local database or in other databases accessible thereto, and matches the MAC of the second user equipment 102 according to the user account information or the identity information of the second user. address).
  • step S11 if the first user equipment detects the user equipment identification information of the second user equipment 102, the first user equipment acquires the first user to perform wireless connection pre-connection to the second user equipment.
  • Authorized pre-authorization information For example, when the first user equipment 101 detects the second user equipment 102 by means of NFC, Bluetooth, etc., the first user is obtained on the first user equipment 101 based on the NFC identification information of the second user equipment 102 or the pre-authorization of the Bluetooth communication address. For example, the first user clicks the “Pre-authorize” or “Cancel Pre-Authorization” button on the touch screen of the first user device 102, so that the corresponding pre-authorization information is “pre-authorization success” or “pre-authorization failure”.
  • the pre-authorization information includes pre-authorization information of the second user equipment 102 about the wireless routing device 104, and in step S12, the first user equipment 101 uses the pre-authorization information and the second user equipment.
  • User equipment identification information of 102 is transmitted to the network device 103.
  • the user equipment identification information of the wireless routing device 104 is included in the pre-authorization information, and the second user equipment 102 is pre-authorized by the wireless connection with respect to the wireless routing device 104; subsequently, the network device 103 is based on the wireless routing device 104.
  • the user equipment identification information is sent to the wireless routing device 104 by the pre-authorization information sent by the first user equipment 101.
  • the network device 103 after the network device 103 receives the pre-authorization information sent by the first user equipment 101 and the user equipment identification information of the second user equipment 102, the network device 103 first determines the wireless routing device 104 managed by the first user, and then The pre-authorization information and the user equipment identification information of the second user equipment 102 are sent to the wireless routing device 104 in step S22.
  • the pre-authorization information includes the user equipment identification information of the wireless routing device 104, and the wireless routing device 104 can determine the user equipment identification information according to the user equipment identification information; or the pre-authorization information includes the device identification information of the first user equipment 101 (for example, the MAC address information).
  • the network device 103 is based on the device identification information or the user of the first user device 101.
  • the identity information is used to query the MAC address information of the wireless routing device 104 according to the mapping relationship, thereby determining the wireless routing device 104.
  • the network device 103 after receiving the pre-authorization information sent by the first user equipment 101 and the user equipment identification information of the second user equipment 102, the network device 103 first verifies whether the first user has the management authority of the wireless routing device 104; If the verification is passed, the network device 103 sends the pre-authorization information and the user equipment identification information of the second user equipment to the wireless routing device 104. This verification operation enhances the security of the system and prevents unauthorized users from making changes to the system, thereby preventing unauthorized users from accessing the network through the wireless routing device.
  • the wireless routing device 104 For example, by checking whether the user account registered in the wireless connection application of the first user device on the first user device 101 matches the MAC address of the wireless routing device 104, or checking the MAC address of the first user device 101 and the wireless routing device. Whether the MAC address of 104 matches, to verify whether the first user has administrative rights to the wireless routing device 104.
  • the wireless access point provided by the wireless routing device 104 receives the connection authentication request sent by the second user equipment 102, and the user equipment identification information of the second user equipment 102 is relative to the wireless access point or The wireless routing device has been pre-authorized by the wireless connection, and the wireless routing device 104 returns the authentication pass response information to the second user device 102 and establishes the second user device 102 and the wireless routing device 104 (or the wireless access point provided) Wi-Fi connection between the rooms.
  • the wireless routing device 104 performs an authentication process on the connection authentication request sent by the second user equipment 102, and returns to the second user equipment 102.
  • the corresponding certification result For example, the wireless routing device 104 compares the password with the preset password according to the authentication password in the connection authentication request. If the two are consistent, the authentication succeeds, and the second user equipment 102 succeeds, otherwise the authentication fails.
  • the wireless connection pre-authorization may be performed for the wireless routing device or for the wireless access point provided by the wireless routing device.
  • the authentication type of the wireless routing device is non-open system authentication.
  • host A holds a mobile phone A and guest B holds a tablet computer B.
  • Guest B is going to be in the home of the owner A and tells him that he wants to connect his tablet B to the wireless router C in the owner's home.
  • the host A sends a pre-authorization request to the cloud server through the wireless connection application in the mobile phone A.
  • the pre-authorization request includes the user account information of the owner A, the MAC address information of the tablet B, the MAC address of the wireless router C, and the content is “ Pre-authorization information for pre-authorization success.
  • the MAC address information of Tablet B is notified to the owner A by the guest B in advance.
  • the cloud server After receiving the pre-authorization request sent by the host A through the mobile phone A, the cloud server obtains the MAC address information of the wireless router C included therein, and sends a pre-authorization request to the wireless router C according to the MAC address information.
  • the wireless router C After receiving the pre-authorization request, the wireless router C first checks whether the user account information of the owner A and the MAC address information of the wireless router C match in the cloud database; if the match, the owner A passes the authority verification (the right to the wireless router C) Pre-authorization control), wireless router C adds the MAC address of tablet B to the local or cloud MAC address list.
  • the electronic device After receiving the wireless connection request or the connection authentication request sent by the electronic device, check whether the MAC address of the device exists in the MAC address list, and if yes, request or connect the authentication request through the wireless connection, if not, according to the wireless
  • the authentication password in the connection request or connection authentication request is used for authentication processing, and the authentication result is returned to the device that sends the request.
  • a method for wirelessly pre-authorizing a second user equipment at a first user equipment side includes step S11 and step S12.
  • the first user equipment acquires pre-authorization information for the first user to perform wireless connection pre-authorization on the second user equipment; in step S12, the first user equipment uses the pre-authorization information and the second user equipment.
  • the user equipment identification information is sent to the network device or the wireless routing device managed by the first user.
  • a method for wirelessly pre-authorizing a second user equipment at a network device side includes step S21 and step S22.
  • the network device receives the pre-authorization information of the first user equipment for pre-authorizing the second user equipment, and the user equipment identification information of the second user equipment, in step S22.
  • the network device sends the pre-authorization information and the user equipment identification information of the second user equipment to the wireless routing device managed by the first user, where the user equipment identifier may be according to the second user equipment.
  • Other user equipment identification information is determined.
  • a method for wirelessly pre-authorizing a second user equipment at a wireless routing device includes step S31 and step S32.
  • the wireless routing device receives the user equipment identification information of the second user equipment sent by the network device or the first user equipment, and the pre-authorization information of the user equipment identification information about the wireless routing device; in step S32, if The pre-authorization information includes pre-authorization success, and the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • a method for wirelessly pre-authorizing a user equipment is provided.
  • FIG. 6 shows a flow chart of the method. The method will be described in detail below based on the scenario shown in FIG. 6.
  • the first user equipment 101 obtains pre-authorization information for the user (i.e., the first user) to perform wireless connection pre-authorization on the second user equipment 102.
  • the input information of the first user on the first user equipment 101 is obtained, where the input information includes pre-authorization information for pre-authorizing the wireless connection of the second user equipment 102, for example, relative to a wireless routing device.
  • the pre-authorization information includes "pre-authorization success" or "pre-authorization”
  • the corresponding wireless routing device 104 receives the pre-authorization information for the second user equipment 102.
  • the wireless connection pre-authorization is performed; otherwise, the second user device 102 is not pre-authorized for wireless connection, for example, the wireless routing device 104 removes the second user device 102 from the pre-authorized device list).
  • the wireless connection pre-authorization of the user equipment refers to that the wireless routing device acquires user equipment identification information (such as a MAC address) of the user equipment that obtains the connection authorization in advance; when the wireless routing device receives the connection request from a user equipment or The authentication request, and the user equipment identifier of the user equipment has obtained the connection authorization, and the connection request or the authentication request is passed through the user equipment.
  • the first user equipment 101 transmits the pre-authorization information and the user equipment identification information of the second user equipment 102 to the wireless routing device 104 managed by the first user.
  • the user equipment identification information may also be used to determine other user equipment identification information of the second user equipment 102.
  • the user equipment identification information of the second user equipment 102 is used by the wireless routing device 104 to perform wireless connection pre-authorization.
  • the management relationship between the first user and the first user device 101 can be embodied by the first user logging in the account in the application on the first user device 101.
  • the wireless routing device 104 receives the user equipment identification information of the second user equipment 102 sent by the first user equipment 101, and the pre-authorization information of the user equipment identification information about the wireless routing device 104;
  • the pre-authorization information includes pre-authorization success.
  • the wireless routing device 104 performs wireless connection pre-authorization on the user equipment identifier of the second user equipment 102.
  • the user equipment identification information of the second user equipment 102 includes, but is not limited to: 1) MAC address information of the second user equipment 102; 2) device identification information of the second user equipment 102; The Bluetooth identification information of the second user equipment 102; 4) the second user identification information of the second user to which the second user equipment 102 belongs.
  • the MAC address information may be directly sent to the wireless routing device 104 for the wireless routing device 104 to perform wireless connection pre-authorization on the second user equipment 102 ( For example, the MAC address of the second user equipment 102 is added to the list of pre-authorized MAC addresses, or the MAC address of the second user equipment 102 is marked as "pre-authorized" in the pre-authorization status list.
  • the wireless routing device 104 receives the device identification information or the Bluetooth identification information.
  • the wireless routing device is in a local database, or in other databases accessible thereto, according to the device identification information of the second user device 102 or
  • the Bluetooth identification information matches the MAC address of the second user equipment 102; the device identification information or the Bluetooth identification information of the second user equipment 102 may be sent by the second user equipment 102 to the first user equipment 101, or read by the first user equipment 101. Take, for example, through NFC (Near Field Communication) or Bluetooth.
  • the user equipment identification information includes the second user identification information of the second user to which the second user equipment 102 belongs (for example, the second user using the second user equipment 102 installs the wireless connection application on the second user equipment 102.
  • the wireless routing device 104 After receiving the user equipment identification information of the second user equipment 102, the wireless routing device 104 first queries and determines the second user.
  • the MAC address information corresponding to the second user identification information for example, the wireless routing device matches the second user equipment 102 according to the user account information or identity information of the second user in a local database or in other databases accessible thereto MAC address).
  • step S11' if the first user equipment detects the user equipment identification information of the second user equipment, the first user equipment acquires the first user to perform wireless connection pre-connection to the second user equipment.
  • Authorized pre-authorization information For example, when the first user equipment 101 detects the second user equipment 102 by means of NFC, Bluetooth, etc., the first user is obtained on the first user equipment 101 based on the NFC identification information of the second user equipment 102 or the pre-authorization of the Bluetooth communication address. For example, the first user clicks the “Pre-authorize” or “Cancel Pre-Authorization” button on the touch screen of the first user device 101, so that the corresponding pre-authorization information is “pre-authorization success” or “pre-authorization failure”.
  • the wireless routing device 104 transmits the pre-authorization information and user equipment related information (eg, MAC address information) of the second user equipment 102 to the wireless routing device managed by the first user. 104.
  • pre-authorization information and user equipment related information eg, MAC address information
  • the first user equipment 101 first determines the wireless routing device 104 managed by the first user; then in step S12', the first user equipment 101 uses the pre-authorization information and the second user equipment 102.
  • User equipment identification information is sent to the wireless routing device 104. For example, based on user identity information of the first user (eg, user account in a wireless connection application, mobile phone number, resident identification number, etc.) or device identification information of the first user device 101 (eg, MAC address, device serial number, IMEI, etc.)
  • the first user equipment 101 first requests the cloud server for the MAC address list of the wireless routing device that the first user matches.
  • the wireless routing device 104 receives the user equipment identification information of the second user equipment 102 sent by the first user equipment 101, and the pre-authorization of the user equipment identification information with respect to the wireless routing device 104.
  • the wireless routing device 104 first verifies whether the first user has the management authority of the wireless routing device. If the verification succeeds, and the pre-authorization information includes the pre-authorization success, the wireless routing device 104 The user equipment identification information is pre-authorized by the wireless connection. This verification operation enhances the security of the system and prevents unauthorized users from making changes to the system, thereby preventing unauthorized users from accessing the network through the wireless routing device.
  • the verification password in the pre-authorization information sent by the first user equipment 101 is consistent with the preset password, or checking the operation authority corresponding to the MAC address of the first user equipment 101, to verify whether the first user has wireless Administrative rights of routing device 104.
  • host A holds a mobile phone A and guest B holds a tablet computer B.
  • Guest B is going to be in the home of the owner A and tells him that he wants to connect his tablet B to the wireless router C in the owner's home.
  • the host A sends a pre-authorization request to the wireless router C through the wireless connection application in the mobile phone A.
  • the pre-authorization request includes the authority verification password of the owner A, the MAC address information of the tablet B, and the pre-authorization of the content is “pre-authorization success”.
  • Authorization information includes the authority verification password of the owner A, the MAC address information of the tablet B, and the pre-authorization of the content is “pre-authorization success”.
  • Authorization information includes the authority verification password of the owner A, the MAC address information of the tablet B, and the pre-authorization of the content is “pre-authorization success”.
  • Authorization information is notified to the owner A by the guest B in advance.
  • the wireless router C After receiving the pre-authorization request sent by the host A through the mobile phone A, the wireless router C first checks whether the authority verification password is consistent with the preset password; if they are consistent, the owner A passes the authority verification (the right to pre-authorize the wireless router C) Control), wireless router C adds the MAC address of tablet B to the local or cloud MAC address list. After receiving the wireless connection request or the connection authentication request sent by the electronic device, check whether the MAC address of the device exists in the MAC address list, and if yes, request or connect the authentication request through the wireless connection, if not, according to the wireless The authentication password in the connection request or connection authentication request is used for authentication processing, and the authentication result is returned to the device that sends the request.
  • a method for wirelessly pre-authorizing a second user equipment at a first user equipment side includes a step S11' and a step S12'.
  • the first user equipment acquires pre-authorization information for the first user to perform wireless connection pre-authorization on the second user equipment; in step S12', the first user equipment uses the pre-authorization information and the second The user equipment identification information of the user equipment is sent to the network device or the wireless routing device managed by the first user.
  • a method for wirelessly pre-authorizing a second user equipment at a wireless routing device includes a step S31' and a step S32'.
  • the wireless routing device receives the user equipment identification information of the second user equipment sent by the first user equipment, and the pre-authorization information of the user equipment identification information about the wireless routing device; in step S32', if The pre-authorization information includes the pre-authorization success, and the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
  • a first user equipment for performing wireless connection pre-authorization on a second user equipment where the first user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • a network device for performing wireless connection pre-authorization on a user equipment includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • a wireless routing device for wirelessly pre-authorizing a user equipment, wherein the wireless routing device includes:
  • a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the following operations:
  • the user equipment identification information is pre-authorized by the wireless connection.
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • a computer readable medium comprising instructions that, when executed, cause a system to:
  • the user equipment identification information is pre-authorized by the wireless connection.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the form of computer program instructions in a computer readable medium includes, but is not limited to, source files, executable files, installation package files, etc., accordingly, the manner in which the computer program instructions are executed by the computer includes but not Limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installation. program.
  • the computer readable medium can be any available computer readable storage medium or communication medium that can be accessed by a computer.
  • Communication media includes media that can be transferred from one system to another by communication signals including, for example, computer readable instructions, data structures, program modules or other data.
  • Communication media can include conductive transmission media such as cables and wires (eg, fiber optics, coaxial, etc.) and wireless (unguided transmission) media capable of propagating energy waves, such as acoustic, electromagnetic, RF, microwave, and infrared.
  • Computer readable instructions, data structures, program modules or other data may be embodied, for example, as modulated data signals in a wireless medium, such as a carrier wave or a similar mechanism, such as embodied in a portion of a spread spectrum technique.
  • modulated data signal refers to a signal whose one or more features are altered or set in such a manner as to encode information in the signal. Modulation can be analog, digital or hybrid modulation techniques.
  • the computer readable storage medium may comprise, by way of example and not limitation, vols and non-volatile, implemented in any method or technology for storing information such as computer readable instructions, data structures, program modules or other data.
  • a computer readable storage medium includes, but is not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disks, tapes, CDs, DVDs); or other currently known media or later developed for storage in computer systems Computer readable information/data used.
  • volatile memory such as random access memory (RAM, DRAM, SRAM)
  • nonvolatile memory such as flash memory, various read only memories (ROM, PROM, EPROM) , EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请的目的是提供一种用于对用户设备进行无线连接预授权的方法,该方法包括:第一用户设备获取第一用户对第二用户设备进行无线连接预授权的预授权信息,将所述预授权信息及所述第二用户设备的设备相关信息发送至网络设备;所述网络设备将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的无线路由设备;若所述预授权信息包括预授权成功,所述无线路由设备对所述用户设备标识信息进行无线连接预授权。本申请能在用户设备需要连接的无线接入点或无线路由设备上对该用户设备进行无线连接预授权,节省了用户的操作时间,提升了用户的使用体验。

Description

一种用于对用户设备进行无线连接预授权的方法与设备 技术领域
本申请涉及通信领域,尤其涉及一种用于对用户设备进行无线连接预授权的技术。
背景技术
随着移动设备的普及及互联网的发展,人们在日常生活中越来越多的依赖于无线网络。公共无线网络安全性低,人们通常选择对无线网络进行连接认证来限制非法用户接入无线网络,从而保证其安全性。
移动设备连接无线网络时,往往需要路由设备的配合完成。然而传统路由器的鉴权方式是被动的,请求连接的用户往往需要提供认证密码,并且在认证通过后才能进行无线连接。而且,该鉴权过程操作繁琐、耗时,导致用户体验差。
发明内容
本申请的一个目的是提供一种用于对用户设备进行无线连接预授权的方法。
根据本申请的一个方面,提供了一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法,该方法包括:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种在网络设备端用于对第二用户设备进行无线连接预授权的方法,该方法包括:
接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种在无线路由设备端用于对第二用户设备进行无线连接预授权的方法,该方法包括:
接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,该方法包括:
第一用户设备获取第一用户对第二用户设备进行无线连接预授权的预授权信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备;
所述网络设备接收所述预授权信息及所述用户设备标识信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备;
所述一个或多个无线路由设备接收所述用户设备标识信息及所述预授权信息,若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备;
所述一个或多个无线路由设备接收所述用户设备标识信息及所述预授权信息,若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种用于对第二用户设备进行无线连接预授权的第一用户设备,其中,该第一用户设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的网络设备,其中,该网络设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
与现有技术相比,本申请所提供的用于对用户设备进行无线连接预授权的方法能在需要连接无线接入点或无线路由器的用户设备发起连接请求之前,通过主人设备向无线路由设备发送用户设备的用户设备标识(例如MAC地址),并在该用户设备需要连接的无线接入点或无线路由设备上对该用户设备进行无线连接预授权,从而用户可以直接将其设备连接至相应的无线接入点或无线路由设备,并且此过程可在用户无感知的情况下进行,节省了用户的操作时间,提升了用户的使用体验。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出根据本申请一个实施例的一种用于对用户设备进行无线连接预授权的方法的具体实施场景;
图2示出基于图1所示场景的一种用于对用户设备进行无线连接预授权的方法流程图;
图3示出根据本申请另一个实施例的一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法流程图;
图4示出根据本申请另一个实施例的一种在网络设备端用于对用户设备进行无线连接预授权的方法流程图;
图5示出根据本申请另一个实施例的一种在无线路由设备端用于对用户设备进行无线连接预授权的方法流程图;
图6示出根据本申请另一个实施例的一种用于对用户设备进行无线连接预授权的方法的具体实施场景;
图7示出基于图6所示场景的一种用于对用户设备进行无线连接预授权的方法流程图;
图8示出根据本申请另一个实施例的一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法流程图;
图9示出根据本申请另一个实施例的一种在无线路由设备端用于对用户设备进行无线连接预授权的方法流程图;
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他 非传输介质,可用于存储可以被计算设备访问的信息。
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。
图1示出了根据本申请一个方面的一种用于对用户设备进行无线连接预授权的方法的具体实施场景,图2则示出了基于该场景的用于对用户设备进行无线连接预授权的方法流程图。以下基于图1所示场景,对该用于对用户设备进行无线连接预授权的方法进行详细描述。
在步骤S11中,第一用户设备101获取其用户(即第一用户)对第二用户设备102进行无线连接预授权的预授权信息。例如,获取第一用 户在第一用户设备101上的输入信息,其中该输入信息中包含对第二用户设备102进行无线连接预授权的预授权信息,例如相对于某台无线路由设备而言,第二用户设备102是否有权被预先授权(例如,预授权信息包括“预授权成功”或“可被预授权”,相应的无线路由设备104接收到该预授权信息后对第二用户设备102进行无线连接预授权;否则,不对第二用户设备102无线连接预授权,例如该无线路由设备104将第二用户设备102从预授权设备列表中移除)。其中,对用户设备进行无线连接预授权指的是,无线路由设备预先获取取得连接授权的用户设备的用户设备标识(例如MAC地址);当无线路由设备接收到来自某用户设备的连接请求或认证请求,并且该用户设备的用户设备标识已经取得连接授权,则通过该用户设备的连接请求或认证请求。
在步骤S12中,第一用户设备101将所述预授权信息及第二用户设备102的用户设备标识信息发送至网络设备103。其中,第二用户设备102的一项用户设备标识信息(例如蓝牙标识)还可用于确定第二用户设备102的另一项用户设备标识(例如MAC地址),;第二用户设备102的用户设备标识信息供无线路由设备104进行无线连接预授权。
而网络设备103在步骤S21中,接收第一用户设备101发送的第一用户对第二用户设备102进行无线连接预授权的预授权信息,以及第二用户设备102的用户设备标识信息;随后,在步骤S22中,网络设备103将所述预授权信息及第二用户设备102的用户设备标识信息发送至所述第一用户所管理的无线路由设备104。当所述用户设备标识信息是根据第二用户设备102的其他用户设备标识信息确定的,该用户设备标识信息可由网络设备103查询本地的数据库,或查询其可访问的其他数据库,进行匹配得到。
在此之后,在步骤S31中,无线路由设备104接收网络设备103发送的第二用户设备102的用户设备标识信息,以及该用户设备标识信息关于无线路由设备104的预授权信息;若所述预授权信息包括预授权成功,在步骤S32中,无线路由设备104对第二用户设备102的用户设备标识进行无线连接预授权。
在此,用户设备101的用户设备标识信息包括但不限于:MAC地址信息、用户设备101的设备标识信息(如IMEI、设备序列号等)、蓝牙标识信息、用户设备101所属用户的用户标识信息(如该用户在无线连接应用中的用户账号)、用户设备101的通信标识信息(例如用户设备101中电话卡对应的电话号码)。相应地,除MAC地址之外,对用户设备101进行无线连接预授权可基于用户设备101的其他用户设备标识信息进行,例如,包括但不限于:用户设备101的设备标识信息(如IMEI、设备序列号等)、蓝牙标识信息、用户设备101所属用户的用户标识信息(如该用户在无线连接应用中的用户账号)、用户设备101的通信标识信息(例如用户设备101中电话卡对应的电话号码)。一种使得用户设备101能够通过无线路由设备104进行网络访问的做法是,网络设备103基于用户设备101的近距离通信标识(例如蓝牙通信标识或NFC通信标识)查询用户设备101所对应的用户设备标识信息,并将该用户设备标识信息发送至无线路由设备104,进行无线网络访问的预先授权;在建立用户设备101与无线路由设备104之间的无线连接(此时用户设备101还不能通过无线路由设备104访问网络)后,用户设备101将相应的用户设备标识信息通过与无线路由设备104之间的无线连接发送至无线路由104进行验证,若用户设备101所发送的用户设备标识信息与之前网络设备所发送的用户设备标识信息相一致,则无线路由设备104允许用户设备101进行网络访问。
在本申请的一些实施例中,无线路由设备104收到网络设备103所发送的用户设备101的用户设备标识信息后,可以直接对该用户设备标识信息进行无线连接预授权。例如,无线路由设备104的配置信息可以包括一个开关,供无线路由设备104的主人选择是否启用无线连接预授权功能。若无线路由设备104的无线连接预授权功能未被启用,则无线路由设备104不可以对用户设备的用户设备标识信息进行无线连接预授权;若无线路由设备104的无线连接预授权功能处于启用状态,当无线路由设备104接收到网络设备103所发送的用户设备101的用户设备标识信息,将该用户设备标识信息加入到无线路由设备104的信任设备集 合,则基于该信任设备集合,无线路由设备104可以对用户设备的用户设备标识信息进行无线连接预授权;若无线路由设备104的无线连接预授权功能处于未启用状态,即便无线路由设备104检测到用户设备101包含于所述信任设备集合,亦不可对用户设备101的用户设备标识信息进行无线连接预授权。此外,当无线路由设备104有多台,还可分别设置各自的预授权设备信任设备集合,以实现多样化、个性化的权限管理,例如这多台无线路由设备104中,仅一部分响应网络设备103所发送的用户设备标识信息,而对用户设备101进行无线连接预授权。
在另一些实施例中,网络设备103还查询确定用户设备101相对于无线路由设备104的预授权信息,并向无线路由设备104发送该预授权信息,例如,网络设备103可以基于用户设备101的MAC地址信息查询确定用户设备101是否可以被预授权连接无线路由设备104对应的无线接入点,从而得到该预授权信息(例如包括预授权成功、预授权失败或无需重复授权);无线路由设备104收到网络设备103发送的所述预授权信息及用户设备101的MAC地址之后,若所述预授权信息包括预授权成功,无线路由设备104对用户设备101的MAC地址进行无线连接预授权,相应地,若所述预授权信息包括预授权失败或者无需重复授权,则所述无线路由设备104不必再对用户设备101的MAC地址设备标识信息进行无线连接预授权。进一步地,在另一些实施例中,所述预授权信息还包括所述用户设备的用户设备标识信息对应的预授权有效时段信息;无线路由设备104基于所述预授权有效时段信息对用户设备101的用户设备标识信息进行无线连接预授权,例如主人在无线路由设备104端设置预授权有效时段为周六的14:00~18:00,当客人在主人家中做客,并且客人的移动电话被预授权连接至主人家中的无线路由器,则无线路由器可以仅预授权客人的移动电话在周六14:00~18:00内连接无线路由器;若所述用户设备在该预授权有效时段信息之外连接无线路由器,则需要另外的授权或认证。此外,当无线路由设备104有多台,还可分别设置各自的预授权信息,以实现多样化、个性化的权限管理,例如这多台无线路由设备104中,仅一部分响应网络设备103所发送的用 户设备标识信息,而对用户设备101进行无线连接预授权,或者预授权有效时段仅对其中一部分无线路由设备有效,而其他无线路由设备保持对用户设备101无线连接预授权,或保持对用户设备101未无线连接预授权。
此外,在本申请中,信息感知设备可在一台或多台对应的无线路由设备上进行用户设备的无线连接预授权。
其中,在一些实施例中,第二用户设备102的用户设备标识信息包括(但不限于):1)第二用户设备102的MAC地址信息;2)第二用户设备102的设备标识信息;3)第二用户设备102的蓝牙标识信息;4)第二用户设备102所属第二用户的第二用户标识信息。在一些实施例中,当该用户设备标识信息包括第二用户设备102的MAC地址信息,该MAC地址信息可直接发送至无线路由设备104,以供无线路由设备104对第二用户设备102进行无线连接预授权(例如将第二用户设备102的MAC地址加入已被预授权MAC地址列表中,或者在预授权状态列表中将第二用户设备102的MAC地址标记为“已被预授权”)。又例如,当该用户设备标识信息包括第二用户设备102的设备标识信息(例如,设备序列号、IMEI等)或蓝牙标识信息,那么网络设备103在收到该设备标识信息或蓝牙标识信息之后,先查询确定设备标识信息或蓝牙标识信息对应的MAC地址信息(例如,网络设备在本地的数据库中,或在其可访问的其他数据库中,根据第二用户设备102的设备标识信息或蓝牙标识信息,匹配第二用户设备102的MAC地址);第二用户设备102的设备标识信息或蓝牙标识信息可由第二用户设备102发送至第一用户设备101,或由第一用户设备101读取,例如通过NFC(Near Field Communication,近场通信)或蓝牙等方式。再例如,当上述用户设备标识信息包括第二用户设备102所属第二用户的第二用户标识信息(例如,使用第二用户设备102的的第二用户在第二用户设备102上安装无线连接应用,并通过自己的用户账号登录,或第二用户在无线连接应用中登记自己的身份信息),网络设备103收到第二用户设备102的用户设备标识信息后,先查询确定第二用户的第二用户标识信息对应的 MAC地址信息(例如,网络设备在本地的数据库中,或在其可访问的其他数据库中,根据第二用户的用户账号信息或身份信息,匹配第二用户设备102的MAC地址)。
在一些实施例中,在步骤S11中,若第一用户设备检测到第二用户设备102的用户设备标识信息,所述第一用户设备获取第一用户对所述第二用户设备进行无线连接预授权的预授权信息。例如,当第一用户设备101通过NFC、蓝牙等方式检测到第二用户设备102,获取第一用户在第一用户设备101上基于第二用户设备102的NFC识别信息或蓝牙通信地址的预授权操作,例如第一用户在第一用户设备102的触摸屏上点击“进行预授权”或“取消预授权”按钮,从而对应的预授权信息为“预授权成功”或“预授权失败”。
此外,在一些实施例中,所述预授权信息包括第二用户设备102关于无线路由设备104的预授权信息,在步骤S12中,第一用户设备101将所述预授权信息及第二用户设备102的用户设备标识信息发送至网络设备103。例如,在预授权信息中包含无线路由设备104的用户设备标识信息,并且第二用户设备102是相对于该无线路由设备104被无线连接预授权的;后续,网络设备103根据无线路由设备104的用户设备标识信息,将第一用户设备101所发送的预授权信息发送至无线路由设备104。
在一些实施例中,网络设备103接收第一用户设备101发送的预授权信息及第二用户设备102的用户设备标识信息后,网络设备103首先确定第一用户所管理的无线路由设备104,然后再在步骤S22中将所述预授权信息及第二用户设备102的用户设备标识信息发送至无线路由设备104。例如,预授权信息包含无线路由设备104的用户设备标识信息,无线路由设备104根据该用户设备标识信息即可确定;或者,预授权信息包含第一用户设备101的设备标识信息(例如MAC地址信息、序列号、IMEI等)或第一用户的用户身份标识信息(例如无线连接应用中的用户账号、第一用户的身份信息等),网络设备103根据第一用户设备101的设备标识信息或用户身份标识信息,根据映射关系查询无线 路由设备104的MAC地址信息,从而确定无线路由设备104。
在一些实施例中,在接收第一用户设备101所发送的预授权信息及第二用户设备102的用户设备标识信息后,网络设备103首先验证第一用户是否具有无线路由设备104的管理权限;若验证通过,网络设备103再将所述预授权信息及所述第二用户设备的用户设备标识信息发送至无线路由设备104。该验证操作可增强系统的安全性,防止未经授权的用户对系统进行更改,从而阻止非法用户通过无线路由设备进行网络访问。例如,通过检查第一用户在第一用户设备101上的无线连接应用中所登录的用户账号,与无线路由设备104的MAC地址是否匹配,或检查第一用户设备101的MAC地址与无线路由设备104的MAC地址是否匹配,以验证第一用户是否具有无线路由设备104的管理权限。
在一些实施例中,在无线路由设备104所提供的无线接入点接收到第二用户设备102发送的连接认证请求,并且第二用户设备102的用户设备标识信息相对于该无线接入点或无线路由设备已经被无线连接预授权,则无线路由设备104向第二用户设备102返回认证通过响应信息,并建立第二用户设备102和无线路由设备104(或其提供的无线接入点)之间的无线网络连接。
优选地,若第二用户设备102的用户设备标识信息并未被无线连接预授权,无线路由设备104对第二用户设备102所发送的连接认证请求进行认证处理,并向第二用户设备102返回相应的认证结果。例如,无线路由设备104根据连接认证请求中的认证密码,与预设的密码进行比对,若二者一致则认证通过,第二用户设备102认证成功,否则认证失败。
其中,无线连接预授权可以是针对无线路由设备进行的,也可以是针对无线路由设备所提供的无线接入点提供的。此外,无线路由设备的认证类型为非开放系统认证。
例如,主人甲持有一台手机A,客人乙持有一台平板电脑B。客人乙即将到主人甲的家中做客,并告知希望将其平板电脑B连接至主人甲家中的无线路由器C。主人甲通过其手机A中的无线连接应用向云端服 务器发送预授权请求,该预授权请求中包含主人甲的用户账号信息、平板电脑B的MAC地址信息、无线路由器C的MAC地址以及内容为“预授权成功”的预授权信息。其中,平板电脑B的MAC地址信息由客人乙提前告知主人甲。云端服务器接收到主人甲通过手机A发送的预授权请求后,获取其中所包含的无线路由器C的MAC地址信息,并根据该MAC地址信息将预授权请求发送至无线路由器C。无线路由器C接收该预授权请求后,首先检查主人甲的用户账号信息与无线路由器C的MAC地址信息在云端数据库中是否匹配;若匹配,则主人甲通过权限验证(有权对无线路由器C进行预授权控制),无线路由器C将平板电脑B的MAC地址加入本地或云端的MAC地址列表中。之后若接收到电子设备发送的无线连接请求或连接认证请求,检查该设备的MAC地址是否存在于前述MAC地址列表中,若存在则通过该无线连接请求或连接认证请求,若不存在则根据无线连接请求或连接认证请求中的认证密码进行认证处理,并向发送请求的设备返回认证结果。
根据本申请的另一个方面,提供了一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法。请参考图3,该方法包括步骤S11和步骤S12。在步骤S11中,第一用户设备获取第一用户对第二用户设备进行无线连接预授权的预授权信息;在步骤S12中,第一用户设备将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种在网络设备端用于对第二用户设备进行无线连接预授权的方法。请参考图4,该方法包括步骤S21和步骤S22。在步骤S21中,网络设备接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;在步骤S22中,网络设备将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的无线路由设备,其中,所述用户设备标识可以是根据第二用户设备的其他用户设备标识信息确定的。
根据本申请的另一个方面,提供了一种在无线路由设备端用于对第 二用户设备进行无线连接预授权的方法。请参考图5,该方法包括步骤S31和步骤S32。在步骤S31中,无线路由设备接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;在步骤S32中,若所述预授权信息包括预授权成功,无线路由设备对所述用户设备标识信息进行无线连接预授权。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的方法,该方法的一个实施场景请参考图6。图7则示出了该方法的流程图。以下基于图6所示场景,对该方法进行详细描述。
在步骤S11’中,第一用户设备101获取其用户(即第一用户)对第二用户设备102进行无线连接预授权的预授权信息。例如,获取第一用户在第一用户设备101上的输入信息,其中该输入信息中包含对第二用户设备102进行无线连接预授权的预授权信息,例如相对于某台无线路由设备而言,第二用户设备102是否有权被预先授权(例如,预授权信息包括“预授权成功”或“可被预授权”,相应的无线路由设备104接收到该预授权信息后对第二用户设备102进行无线连接预授权;否则,不对第二用户设备102无线连接预授权,例如该无线路由设备104将第二用户设备102从预授权设备列表中移除)。其中,对用户设备进行无线连接预授权指的是,无线路由设备预先获取取得连接授权的用户设备的用户设备标识信息(例如MAC地址);当无线路由设备接收到来自某用户设备的连接请求或认证请求,并且该用户设备的用户设备标识已经取得连接授权,则通过该用户设备的连接请求或认证请求。
在步骤S12’中,第一用户设备101将所述预授权信息及第二用户设备102的用户设备标识信息发送至第一用户所管理的无线路由设备104。其中,用户设备标识信息还可用于确定第二用户设备102的其他用户设备标识信息;第二用户设备102的用户设备标识信息供无线路由设备104进行无线连接预授权。第一用户与第一用户设备101之间的管理关系可通过第一用户在第一用户设备101上的应用中登录账号体现。
在此之后,在步骤S31’中,无线路由设备104接收第一用户设备 101发送的第二用户设备102的用户设备标识信息,以及该用户设备标识信息关于无线路由设备104的预授权信息;若所述预授权信息包括预授权成功,在步骤S32’中,无线路由设备104对第二用户设备102的用户设备标识进行无线连接预授权。
其中,在一些实施例中,第二用户设备102的用户设备标识信息包括(但不限于):1)第二用户设备102的MAC地址信息;2)第二用户设备102的设备标识信息;3)第二用户设备102的蓝牙标识信息;4)第二用户设备102所属第二用户的第二用户标识信息。例如,当该用户设备标识信息包括第二用户设备102的MAC地址信息,该MAC地址信息可直接发送至无线路由设备104,以供无线路由设备104对第二用户设备102进行无线连接预授权(例如将第二用户设备102的MAC地址加入已被预授权MAC地址列表中,或者在预授权状态列表中将第二用户设备102的MAC地址标记为“已被预授权”)。又例如,当该用户设备标识信息包括第二用户设备102的设备标识信息(例如,设备序列号、IMEI等)或蓝牙标识信息,那么无线路由设备104在收到该设备标识信息或蓝牙标识信息之后,先查询确定设备标识信息或蓝牙标识信息对应的MAC地址信息(例如,无线路由设备在本地的数据库中,或在其可访问的其他数据库中,根据第二用户设备102的设备标识信息或蓝牙标识信息,匹配第二用户设备102的MAC地址);第二用户设备102的设备标识信息或蓝牙标识信息可由第二用户设备102发送至第一用户设备101,或由第一用户设备101读取,例如通过NFC(Near Field Communication,近场通信)或蓝牙等方式。再例如,当上述用户设备标识信息包括第二用户设备102所属第二用户的第二用户标识信息(例如,使用第二用户设备102的的第二用户在第二用户设备102上安装无线连接应用,并通过自己的用户账号登录,或第二用户在无线连接应用中登记自己的身份信息),无线路由设备104收到第二用户设备102的用户设备标识信息后,先查询确定第二用户的第二用户标识信息对应的MAC地址信息(例如,无线路由设备在本地的数据库中,或在其可访问的其他数据库中,根据第二用户的用户账号信息或身份信息,匹配第二 用户设备102的MAC地址)。
在一些实施例中,在步骤S11’中,若第一用户设备检测到第二用户设备的用户设备标识信息,所述第一用户设备获取第一用户对所述第二用户设备进行无线连接预授权的预授权信息。例如,当第一用户设备101通过NFC、蓝牙等方式检测到第二用户设备102,获取第一用户在第一用户设备101上基于第二用户设备102的NFC识别信息或蓝牙通信地址的预授权操作,例如第一用户在第一用户设备101的触摸屏上点击“进行预授权”或“取消预授权”按钮,从而对应的预授权信息为“预授权成功”或“预授权失败”。
在一些实施例中,在步骤S12’中,无线路由设备104将所述预授权信息及第二用户设备102的用户设备相关信息(例如MAC地址信息)发送至第一用户所管理的无线路由设备104。
其中,优选地,第一用户设备101首先确定所述第一用户所管理的无线路由设备104;随后在步骤S12’中,第一用户设备101将所述预授权信息及第二用户设备102的用户设备标识信息发送至无线路由设备104。例如,基于第一用户的用户身份信息(例如无线连接应用中的用户账号、手机号码、居民身份证号码等)或第一用户设备101的设备标识信息(例如MAC地址、设备序列号、IMEI等),第一用户设备101首先向云端服务器请求第一用户所匹配的无线路由设备的MAC地址列表。
在一些实施例中,在步骤S31’中,无线路由设备104接收第一用户设备101发送的第二用户设备102的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备104的预授权信息;在步骤S32’中,无线路由设备104首先验证所述第一用户是否具有所述无线路由设备的管理权限,若验证通过,且所述预授权信息包括预授权成功,无线路由设备104对所述用户设备标识信息进行无线连接预授权。该验证操作可增强系统的安全性,防止未经授权的用户对系统进行更改,从而阻止非法用户通过无线路由设备进行网络访问。例如,通过检查第一用户设备101所发送的预授权信息中的验证密码与预设密码是否一致,或检查第 一用户设备101的MAC地址所对应的操作权限,以验证第一用户是否具有无线路由设备104的管理权限。
例如,主人甲持有一台手机A,客人乙持有一台平板电脑B。客人乙即将到主人甲的家中做客,并告知希望将其平板电脑B连接至主人甲家中的无线路由器C。主人甲通过其手机A中的无线连接应用向无线路由器C发送预授权请求,该预授权请求中包含主人甲的权限验证密码、平板电脑B的MAC地址信息以及内容为“预授权成功”的预授权信息。其中,平板电脑B的MAC地址信息由客人乙提前告知主人甲。无线路由器C接收到主人甲通过手机A发送的预授权请求后,首先检查权限验证密码与预先设定的密码是否一致;若一致,则主人甲通过权限验证(有权对无线路由器C进行预授权控制),无线路由器C将平板电脑B的MAC地址加入本地或云端的MAC地址列表中。之后若接收到电子设备发送的无线连接请求或连接认证请求,检查该设备的MAC地址是否存在于前述MAC地址列表中,若存在则通过该无线连接请求或连接认证请求,若不存在则根据无线连接请求或连接认证请求中的认证密码进行认证处理,并向发送请求的设备返回认证结果。
根据本申请的另一个方面,提供了一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法。参考图8,该方法包括步骤S11’和步骤S12’。在步骤S11’中,第一用户设备获取第一用户对第二用户设备进行无线连接预授权的预授权信息;在步骤S12’中,第一用户设备将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种在无线路由设备端用于对第二用户设备进行无线连接预授权的方法。参考图9,该方法包括步骤S31’和步骤S32’。在步骤S31’中,无线路由设备接收第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;在步骤S32’中,若所述预授权信息包括预授权成功,无线路由设备对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种用于对第二用户设备进行无线连接预授权的第一用户设备,其中,该第一用户设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的网络设备,其中,该网络设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
处理器;以及
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行以下操作:
接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
根据本申请的一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
接收第一用户设备发送的、第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的无线路由设备。
根据本申请的另一个方面,提供了一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行以下操作:
接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。本领域技术人员应能理解,计算机程序指令在计算机可读介质中的存在形式包括但不限于源文件、可执行文件、安装包文件等,相应地,计算机程序指令被计算机执行的方式包括但不限于:该计算机直接执行该指令,或者该计算机编译该指令后再执行对应的编译后程序,或者该计算机读取并执行该指令,或者该计算机 读取并安装该指令后再执行对应的安装后程序。在此,计算机可读介质可以是可供计算机访问的任意可用的计算机可读存储介质或通信介质。
通信介质包括藉此包含例如计算机可读指令、数据结构、程序模块或其他数据的通信信号被从一个系统传送到另一系统的介质。通信介质可包括有导的传输介质(诸如电缆和线(例如,光纤、同轴等))和能传播能量波的无线(未有导的传输)介质,诸如声音、电磁、RF、微波和红外。计算机可读指令、数据结构、程序模块或其他数据可被体现为例如无线介质(诸如载波或诸如被体现为扩展频谱技术的一部分的类似机制)中的已调制数据信号。术语“已调制数据信号”指的是其一个或多个特征以在信号中编码信息的方式被更改或设定的信号。调制可以是模拟的、数字的或混合调制技术。
作为示例而非限制,计算机可读存储介质可包括以用于存储诸如计算机可读指令、数据结构、程序模块或其它数据的信息的任何方法或技术实现的易失性和非易失性、可移动和不可移动的介质。例如,计算机可读存储介质包括,但不限于,易失性存储器,诸如随机存储器(RAM,DRAM,SRAM);以及非易失性存储器,诸如闪存、各种只读存储器(ROM,PROM,EPROM,EEPROM)、磁性和铁磁/铁电存储器(MRAM,FeRAM);以及磁性和光学存储设备(硬盘、磁带、CD、DVD);或其它现在已知的介质或今后开发的能够存储供计算机系统使用的计算机可读信息/数据。
在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括 在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (18)

  1. 一种在第一用户设备端用于对第二用户设备进行无线连接预授权的方法,其中,该方法包括:
    获取第一用户对第二用户设备进行无线连接预授权的预授权信息;
    将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备。
  2. 根据权利要求1所述的方法,其中,所述用户设备标识信息包括以下至少任一项:
    所述第二用户设备的MAC地址信息;
    所述第二用户设备的设备标识信息;
    所述第二用户设备的蓝牙标识信息;
    所述第二用户设备所属第二用户的第二用户标识信息。
  3. 根据权利要求1所述的方法,其中,所述方法还包括:
    确定所述第一用户所管理的一个或多个无线路由设备;
    其中,所述将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备包括:
    将所述预授权信息及所述用户设备标识信息发送至所述一个或多个无线路由设备。
  4. 根据权利要求1或2所述的方法,其中,所述预授权信息包括所述第二用户设备关于一个或多个无线路由设备的预授权信息;
    其中,所述将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述第一用户所管理的一个或多个无线路由设备包括:
    将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备或所述一个或多个无线路由设备。
  5. 一种在网络设备端用于对第二用户设备进行无线连接预授权的方法,其中,该方法包括:
    接收第一用户设备发送的关于第一用户对第二用户设备进行无线连接预授权的预授权信息,以及所述第二用户设备的用户设备标识信息;
    将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备。
  6. 根据权利要求5所述的方法,其中,所述方法还包括:
    确定所述第一用户所管理的一个或多个无线路由设备;
    其中,所述将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备包括:
    将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述一个或多个无线路由设备。
  7. 根据权利要求5所述的方法,其中,所述预授权信息包括所述第二用户设备关于一个或多个无线路由设备的预授权信息;
    其中,所述将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备包括:
    将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述一个或多个无线路由设备。
  8. 根据权利要求7所述的方法,其中,所述将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述一个或多个无线路由设备包括:
    验证所述第一用户是否具有所述一个或多个无线路由设备的管理权限;
    若验证通过,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述一个或多个无线路由设备。
  9. 一种在无线路由设备端用于对第二用户设备进行无线连接预授权的方法,其中,该方法包括:
    接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
    若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  10. 根据权利要求9所述的方法,其中,所述方法还包括:
    当接收到所述第二用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求,且所述用户设备标识信息相对所述无线接入点已被无线连接预授权,向所述第二用户设备发送认证通过响应信息。
  11. 根据权利要求10所述的方法,其中,所述当接收到所述第二用户设备向所述无线路由设备对应的无线接入点发送的连接认证请求,且所述用户设备标识信息相对所述无线接入点已被无线连接预授权,向所述第二用户设备发送认证通过响应信息还包括:
    若所述用户设备标识信息相对所述无线接入点未被无线连接预授权,对所述连接认证请求进行认证处理,并向所述第二用户设备发送对应的认证结果信息。
  12. 根据权利要求10或11所述的方法,其中,所述接收网络设备或第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息包括:
    接收第一用户设备发送的第二用户设备的用户设备标识信息,以及所述用户设备标识信息关于无线路由设备的预授权信息;
    其中,所述若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权包括:
    验证所述第一用户是否具有所述无线路由设备的管理权限;
    若验证通过,若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  13. 一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    第一用户设备获取第一用户对第二用户设备进行无线连接预授权的预授权信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至网络设备;
    所述网络设备接收所述预授权信息及所述用户设备标识信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备;
    所述一个或多个无线路由设备接收所述用户设备标识信息及所述预授权信息,若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  14. 一种用于对用户设备进行无线连接预授权的方法,其中,该方法包括:
    获取第一用户对第二用户设备进行无线连接预授权的预授权信息,将所述预授权信息及所述第二用户设备的用户设备标识信息发送至所述第一用户所管理的一个或多个无线路由设备;
    所述一个或多个无线路由设备接收所述用户设备标识信息及所述预授权信息,若所述预授权信息包括预授权成功,对所述用户设备标识信息进行无线连接预授权。
  15. 一种用于对第二用户设备进行无线连接预授权的第一用户设
    备,其中,该第一用户设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求1至4中任一项所述方法的操作。
  16. 一种用于对用户设备进行无线连接预授权的网络设备,其中,该网络设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求5至8中任一项所述方法的操作。
  17. 一种用于对用户设备进行无线连接预授权的无线路由设备,其中,该无线路由设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器执行根据权利要求9至12中任一项所述方法的操作。
  18. 一种包括指令的计算机可读介质,所述指令在被执行时使得系统进行根据权利要求1至12中任一项所述方法的操作。
PCT/CN2018/099547 2017-08-21 2018-08-09 一种用于对用户设备进行无线连接预授权的方法与设备 WO2019037603A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710720229.6A CN107396362B (zh) 2017-08-21 2017-08-21 一种用于对用户设备进行无线连接预授权的方法与设备
CN201710720229.6 2017-08-21

Publications (1)

Publication Number Publication Date
WO2019037603A1 true WO2019037603A1 (zh) 2019-02-28

Family

ID=60353861

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/099547 WO2019037603A1 (zh) 2017-08-21 2018-08-09 一种用于对用户设备进行无线连接预授权的方法与设备

Country Status (2)

Country Link
CN (1) CN107396362B (zh)
WO (1) WO2019037603A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396362B (zh) * 2017-08-21 2021-07-23 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
CN110365618B (zh) * 2018-03-26 2022-06-03 阿里巴巴集团控股有限公司 网络登录方法及装置
CN112165706B (zh) * 2020-09-27 2023-03-24 维沃移动通信(杭州)有限公司 设备连接管理方法、装置及蓝牙设备
CN113946872B (zh) * 2021-12-20 2022-03-11 浙江太美医疗科技股份有限公司 数据库的操作方法、系统、装置及计算机可读介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103476030A (zh) * 2013-08-29 2013-12-25 小米科技有限责任公司 移动终端连接网络的方法、移动终端与终端设备
US20140068046A1 (en) * 2012-08-31 2014-03-06 Fujitsu Limited Network connecting method and electronic device
CN105338529A (zh) * 2015-11-18 2016-02-17 Tcl集团股份有限公司 一种无线网络连接方法及系统
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN107396362A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140068046A1 (en) * 2012-08-31 2014-03-06 Fujitsu Limited Network connecting method and electronic device
CN103476030A (zh) * 2013-08-29 2013-12-25 小米科技有限责任公司 移动终端连接网络的方法、移动终端与终端设备
CN105338529A (zh) * 2015-11-18 2016-02-17 Tcl集团股份有限公司 一种无线网络连接方法及系统
CN105873106A (zh) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 无线网络连接的处理方法、装置和设备
CN107396362A (zh) * 2017-08-21 2017-11-24 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备

Also Published As

Publication number Publication date
CN107396362B (zh) 2021-07-23
CN107396362A (zh) 2017-11-24

Similar Documents

Publication Publication Date Title
US11128612B1 (en) Zero-touch provisioning of IoT devices with multi factor authentication
US10965658B2 (en) Application program as key for authorizing access to resources
US11336635B2 (en) Systems and methods for authenticating device through IoT cloud using hardware security module
CN107396364B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2018205997A1 (zh) 一种用于连接无线接入点的方法与设备
AU2018250465A1 (en) Secondary device as key for authorizing access to resources
WO2019037603A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US11477646B2 (en) Method and a device for performing wireless connection pre-authorization on a user device
CN110113747B (zh) 一种用于连接隐藏无线接入点的方法与设备
JP2018503911A (ja) セキュアなデータ管理技術
US20210105627A1 (en) Method and a device for authorizing a user equipment to connect to a wireless access point
US20200245146A1 (en) Method and a device for performing wireless connection pre-authorization on a user device
US11595398B1 (en) Access control for named domain networking
US20150089632A1 (en) Application authentication checking system
WO2019037602A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107333264B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107396363B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
KR101836211B1 (ko) 전자 기기 인증 매니저 장치
WO2019037594A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
CN107396295B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US11949779B2 (en) Method and apparatus for registering shared key
CN107404722B (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019037598A1 (zh) 一种用于对用户设备进行无线连接预授权的方法与设备
US20200275256A1 (en) Management of a subscriber entity
KR102377045B1 (ko) 하드웨어 보안 모듈을 이용한 클라우드를 통한 IoT(Internet of Thing) 디바이스 인증 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18848576

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 23/07/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18848576

Country of ref document: EP

Kind code of ref document: A1