Disclosure of Invention
An object of the present application is to provide a method and apparatus for wireless connection pre-authorization for a user equipment.
According to an aspect of the present application, a method for performing wireless connection pre-authorization on a user equipment at a network equipment side is provided, wherein the method comprises:
determining a target wireless access point to be accessed by user equipment of a user according to the activity information of the user;
and sending the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment.
According to another aspect of the present application, a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device is provided, wherein the method comprises:
acquiring equipment identification information of user equipment sent by network equipment;
and performing wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, wherein the method comprises:
the network equipment determines a target wireless access point to be accessed by the user equipment of the user according to the activity information of the user;
the network equipment sends the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment;
the wireless routing equipment acquires equipment identification information of the user equipment sent by the network equipment;
and the wireless routing equipment performs wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of the method as described above.
According to yet another aspect of the present application, there is provided a network device for wireless connection pre-authorization for a user equipment, wherein the network device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
According to yet another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, wherein the wireless routing device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
Compared with the prior art, the network equipment in the application determines the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user, and sends the equipment identification information of the user equipment to the wireless routing equipment corresponding to the target wireless access point; after receiving the equipment identification information of the user equipment, the wireless routing equipment performs wireless connection pre-authorization on the user equipment based on the equipment identification information; because the user equipment of the user is pre-authorized, subsequently, the user is connected with the wireless access point corresponding to the wireless routing equipment through the user equipment without an authorization flow, the user does not need to perform complicated operation, the connection time is saved, and the user experience is optimized. Further, the activity information of the user may include historical activity information, current location information, and the like of the user, and accordingly, the network device may more intelligently determine a target wireless access point to which the user device of the user is to access, thereby providing a better wireless connection service for the user and improving user experience.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
Fig. 1 shows a topology of a system for wireless connection pre-authorization of a user equipment according to an embodiment of the present application, the system comprising a network device 1, a wireless routing device 2 and the user equipment.
Here, the network device 1 includes an electronic device capable of automatically performing numerical calculation and information processing according to instructions set or stored in advance, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a programmable gate array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device 1 includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. The wireless routing device 2 comprises a device capable of connecting local area networks and wide area networks; preferably, the wireless routing device 2 is capable of broadcasting a wireless access point to user devices within a certain distance range based on an 802.11 protocol cluster; preferably, the authentication type of the wireless routing device 2 is non-open system authentication. The user equipment includes, but is not limited to, any electronic product capable of performing human-computer interaction with a user, such as a smart phone, a tablet computer, a notebook computer, and the like; the electronic product can adopt any operating system, such as an android operating system, an iOS operating system, a Windows operating system and the like.
It will be appreciated by those skilled in the art that the number of various network elements shown in fig. 1 for simplicity only may be less than that in an actual network, but such omissions are clearly not to be premised on a clear and complete disclosure of the present invention.
Fig. 2 shows a flowchart of a method for performing wireless connection pre-authorization for a user equipment according to another embodiment of the present application, wherein the method includes steps S11 and S12 performed at the network equipment side, and steps S21 and S22 performed at the wireless routing equipment side.
Specifically, in step S11, the network device 1 determines a target wireless access point to which the user equipment of the user is to access according to the activity information of the user; in step S12, the network device 1 sends the device identification information of the user device to the wireless routing device 2 corresponding to the target wireless access point, so that the wireless routing device 2 performs wireless connection pre-authorization on the user device; in step S21, the wireless routing device 2 obtains the device identification information of the user equipment sent by the network device 1; in step S22, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information.
For example, assume that the activity information of the user includes: the user B is located at a certain office building place B at 9: 00-17: 00 of a working day, and is located at a certain cell place C at 18: 00-8: 00 of the next day; assuming that the current time is 8:45 of a working day, by using a big data analysis technology, the network device 1 can determine, according to the activity information of the user, that a target wireless access point to which a user device (such as a smart phone) carried by the user B intends to access is a wireless access point at the location B. Then, the network device 1 transmits the device identification information of the user device of the user B to the wireless routing device (such as the wireless routing device 2) at the place B. The device identification information includes, but is not limited to: MAC address information, device serial number information, bluetooth identification information, user account information, phone number information, and the like. The wireless routing device at site B then pre-authorizes the user device of user B for wireless connection based on the device identification information. Subsequently, when user B arrives at location B, since the user equipment of user B has been pre-authorized, the user equipment can connect to the wireless access point at location B without further authorization, thereby optimizing the user's wireless connection experience.
Preferably, the activity information of the user comprises at least any one of: historical activity information of the user; current location information of the user.
In one embodiment, the wireless routing device corresponding to the wireless access point generally has a fixed geographic location, and the user equipment can be connected to the corresponding wireless access point within a certain range near the wireless routing device. If the user equipment carried with the user is in a connection state with the wireless access point W at the time T, the area to which the wireless access point W belongs can be determined as the active area of the user at the time T. Therefore, the network device 1 can determine the historical activity information of the user according to the connection record information of the user connected to the wireless access point; the network device 1 may also determine the current location information of the user according to the wireless access point to which the user is currently connected. In other embodiments, the network device 1 may also determine the historical activity information of the user according to the consumption record information of the user; or, the network device 1 may also obtain GPS coordinate information uploaded by the user device at different time periods, thereby determining historical activity information of the corresponding user; the network device 1 may also obtain GPS coordinate information currently uploaded by the user device, thereby determining current location information of the corresponding user.
Preferably, the method further comprises: the network device 1 determines the pre-authorization information of the device identification information of the user device with respect to the wireless routing device corresponding to the target wireless access point; in step S12, the network device 1 sends the device identification information and the pre-authorization information to the wireless routing device 2, so that the wireless routing device 2 performs wireless connection pre-authorization on the user equipment; in step S21, the wireless routing device 2 receives the device identification information of the user equipment sent by the network device 1, and the pre-authorization information of the device identification information about the wireless routing device 2; in step S22, if the pre-authorization information includes a successful pre-authorization, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information.
For example, the network device 1 may determine whether the user device may be pre-authorized to connect to the wireless routing device corresponding to the target wireless access point based on the device identification information query of the user device, so as to obtain the pre-authorization information (e.g., including success of pre-authorization, failure of pre-authorization, or no need of repeated authorization). After the wireless routing device 2 receives the pre-authorization information and the device identification information of the user device sent by the network device 1, if the pre-authorization information includes a successful pre-authorization, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information of the user device. Correspondingly, if the pre-authorization information includes a pre-authorization failure or does not need to be authorized repeatedly, the wireless routing device 2 does not need to perform wireless connection pre-authorization on the device identification information of the user equipment any more.
Preferably, as shown in fig. 3, the method further includes a step S23 executed on the wireless routing device side. In step S23, when the wireless routing device 2 receives the connection authentication request sent by the user device to the wireless access point corresponding to the wireless routing device 2, and the device identification information is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device 2 sends authentication passing response information to the user device.
For example, it is assumed that when the user a arrives at a location near the wireless routing device 2, the user device may automatically transmit a connection authentication request to a wireless access point corresponding to the wireless routing device 2, or the user device may transmit a connection authentication request to a wireless access point corresponding to the wireless routing device 2 based on a manual operation of the user a. After receiving the connection authentication request, the wireless routing device 2 determines whether the user device is pre-authorized based on the device identification information of the user device, and if the device identification information of the user device is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device 2 returns authentication passing response information to the user device, and the user device can be successfully connected to the wireless access point corresponding to the wireless routing device 2.
In an embodiment, after establishing the wireless connection between the user equipment and the wireless routing device 2 (at this time, the user equipment cannot access the network through the wireless routing device 2 yet), the user equipment sends the corresponding device identification information to the wireless routing device 2 through the wireless connection for verification, and if the device identification information sent by the user equipment is consistent with the device identification information sent by the previous network device 1, the wireless routing device 2 allows the user equipment to perform network access.
Preferably, the step S23 further includes: and if the equipment identification information is not pre-authorized by wireless connection relative to the wireless access point, the wireless routing equipment 2 authenticates the connection authentication request and sends corresponding authentication result information to the user equipment.
In this embodiment, after receiving the connection authentication request sent by the user equipment, the wireless routing device 2 determines whether the user equipment is pre-authorized based on the device identification information of the user equipment, and if the device identification information of the user equipment is not pre-authorized by wireless connection with respect to the wireless access point, the wireless routing device 2 cannot directly return authentication passing response information to the user equipment, and the wireless routing device 2 needs to perform a conventional authentication process on the connection authentication request, and then sends corresponding authentication result information (for example, including authentication success or authentication failure) to the user equipment.
Preferably, the activity information of the user comprises historical activity information of the user; in step S11, the network device 1 determines future activity location information of the user according to the historical activity information of the user, and determines a target wireless access point to which the user device of the user intends to access according to the future activity location information.
For example, assume that the historical activity information of user B includes: the user B is located at a certain office building place B at 9: 00-17: 00 of each working day, and is located at a certain cell place C at 18: 00-8: 00 of the next day; assuming that the current time is 8:45 of a working day, by using a big data analysis technology, the network device 1 can determine that the future activity position information of the user B comprises a place B according to the historical activity information of the user B, and determine that a target wireless access point to be accessed by user equipment (such as a smart phone) carried by the user B is a wireless access point at the place B according to the future activity position information.
Preferably, in step S11, the network device 1 determines future activity location information of the user in future time period information according to the historical activity information of the user, and determines a target wireless access point to be visited by the user device of the user in the future time period information according to the future activity location information, wherein the distance between the target wireless access point and the future activity location information is smaller than or equal to distance threshold information; in step S12, the network device 1 sends the device identification information of the user device and the future time period information to the wireless routing device 2 corresponding to the target wireless access point, so that the wireless routing device 2 performs wireless connection pre-authorization on the user device; in step S21, the wireless routing device 2 obtains the device identification information of the user equipment and the corresponding future time period information sent by the network device 1; in step S21, the wireless routing device 2 performs wireless connection pre-authorization for the device identification information based on the future period information.
For example, assume that the historical activity information of user c includes: the user C is located at a certain movie city place D at a position of 15: 00-17: 00 per saturday, and by utilizing a big data analysis technology, the network equipment 1 can determine the future activity position information (such as the place D) of the user C in the future time period information (such as the saturday 15: 00-17: 00); the network device 1 determines a target wireless access point (e.g. a wireless access point less than or equal to 30 meters away from the location D) to be visited by the user device of the user c in the future time period information (e.g. saturday 15: 00-17: 00). After receiving the device identification information of the user equipment and the future time period information sent by the network device 1, the wireless routing device 2 at the location D performs wireless connection pre-authorization on the device identification information of the user equipment based on the future time period information, for example, the wireless routing device 2 at the location D pre-authorizes the user equipment of the user c to perform wireless connection on saturday 15: 00-17: 00.
Preferably, the method further comprises: when the wireless routing device 2 receives a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing device 2, and the connection authentication request is in the future period of time, the device identification information is pre-authorized by wireless connection relative to the wireless access point, and authentication passing response information is sent to the user equipment.
For example, assuming that the current time is saturday 15:03, the wireless routing device 2 at the local point D receives the connection authentication request sent by the user equipment of user c, and because the user equipment of user c is pre-authorized and the current time is within the future period information, the wireless routing device 2 sends the authentication passing response information to the user equipment of user c.
Preferably, the activity information of the user includes current location information of the user; in step S11, the network device 1 determines a target wireless access point to be accessed by the user device of the user according to the current location information of the user, where a distance between the target wireless access point and the current location information is less than or equal to distance threshold information.
For example, assume that the current location information of the user includes: the current GPS coordinates of the user equipment (such as a smart phone) of the user D are positioned in a coffee shop; the network device 1 may determine, according to the current location information of the user, that the target wireless access point to which the user device of the user includes a wireless access point near the coffee shop, for example, the network device 1 may determine a wireless access point less than or equal to 50 meters away from the coffee shop as the target wireless access point.
According to yet another aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, wherein the method comprises:
the network equipment determines a target wireless access point to be accessed by the user equipment of the user according to the activity information of the user;
the network equipment sends the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment;
the wireless routing equipment acquires equipment identification information of the user equipment sent by the network equipment;
and the wireless routing equipment performs wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of the method as described above.
According to yet another aspect of the present application, there is provided a network device for wireless connection pre-authorization for a user equipment, wherein the network device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
According to yet another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, wherein the wireless routing device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
Compared with the prior art, the network equipment in the application determines the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user, and sends the equipment identification information of the user equipment to the wireless routing equipment corresponding to the target wireless access point; after receiving the equipment identification information of the user equipment, the wireless routing equipment performs wireless connection pre-authorization on the user equipment based on the equipment identification information; because the user equipment of the user is pre-authorized, subsequently, the user is connected with the wireless access point corresponding to the wireless routing equipment through the user equipment without an authorization flow, the user does not need to perform complicated operation, the connection time is saved, and the user experience is optimized. Further, the activity information of the user may include historical activity information, current location information, and the like of the user, and accordingly, the network device may more intelligently determine a target wireless access point to which the user device of the user is to access, thereby providing a better wireless connection service for the user and improving user experience.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. The terms first, second, etc. are used to denote names, but not any particular order.