CN107517461B - Method and equipment for carrying out wireless connection pre-authorization on user equipment - Google Patents

Method and equipment for carrying out wireless connection pre-authorization on user equipment Download PDF

Info

Publication number
CN107517461B
CN107517461B CN201710720676.1A CN201710720676A CN107517461B CN 107517461 B CN107517461 B CN 107517461B CN 201710720676 A CN201710720676 A CN 201710720676A CN 107517461 B CN107517461 B CN 107517461B
Authority
CN
China
Prior art keywords
user
equipment
information
wireless
user equipment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710720676.1A
Other languages
Chinese (zh)
Other versions
CN107517461A (en
Inventor
程翰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zongzhang Technology Group Co.,Ltd.
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201710720676.1A priority Critical patent/CN107517461B/en
Publication of CN107517461A publication Critical patent/CN107517461A/en
Priority to PCT/CN2018/099343 priority patent/WO2019037596A1/en
Priority to US16/796,965 priority patent/US20200245146A1/en
Application granted granted Critical
Publication of CN107517461B publication Critical patent/CN107517461B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/062Pre-authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请的目的是提供一种用于对用户设备进行���线连接预授权的方法与设备。与现有技术相比,本申请中的网���设备���������户的���动信息确定所述用户的用户设备拟访问的目标无线接入点,并将所述用户设备的设备标识信息发送至所述目标无线接入点对应的无线路由设备;所述无线路由设备收到所述用户设备的设备标识信息之后,基于该设备标识信息对所述用户设备进行无线连接预授权;因为所述用户的用户设备已被预授权,后续,所述用户通过该用户设备连接所述无线路由设备对应的无线接入点,无需再经过授权流程,用户无需进行繁琐的操作,节省了连接时间,优化了用户体验。

Figure 201710720676

The purpose of this application is to provide a method and device for pre-authorizing a wireless connection to a user equipment. Compared with the prior art, the network device in the present application determines the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user, and sends the device identification information of the user equipment to the target wireless access point. The wireless routing device corresponding to the access point; after receiving the device identification information of the user equipment, the wireless routing device pre-authorizes the wireless connection to the user equipment based on the device identification information; because the user equipment of the user has been After being pre-authorized, the user connects to the wireless access point corresponding to the wireless routing device through the user equipment, without going through the authorization process, and the user does not need to perform tedious operations, which saves connection time and optimizes user experience.

Figure 201710720676

Description

Method and equipment for carrying out wireless connection pre-authorization on user equipment
Technical Field
The present application relates to the field of communications, and in particular, to a technique for performing wireless connection pre-authorization for a user equipment.
Background
With the development of the pervasive internet of mobile devices, people increasingly rely on wireless networks in daily life. Public wireless networks have low security, and people usually choose to perform connection authentication encryption on the wireless networks to limit illegal users from accessing the wireless networks, so that the security of the wireless networks is ensured.
When the mobile device is connected with the encrypted wireless network, the matching of the routing device is often required to be completed. However, the authentication and authorization method of the traditional router is passive, and the method requires that a hotspot owner provides an authentication password to a user who wants to request connection, and authentication is performed in some way or after authentication is passed, authorization is completed and wireless connection is performed. In the process, the authentication and authorization process and the process of using the network by the user are serial processes, so that the user operation is complicated, time is consumed, the authorization time is long, and the authorization user experience is poor.
Disclosure of Invention
An object of the present application is to provide a method and apparatus for wireless connection pre-authorization for a user equipment.
According to an aspect of the present application, a method for performing wireless connection pre-authorization on a user equipment at a network equipment side is provided, wherein the method comprises:
determining a target wireless access point to be accessed by user equipment of a user according to the activity information of the user;
and sending the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment.
According to another aspect of the present application, a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device is provided, wherein the method comprises:
acquiring equipment identification information of user equipment sent by network equipment;
and performing wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, wherein the method comprises:
the network equipment determines a target wireless access point to be accessed by the user equipment of the user according to the activity information of the user;
the network equipment sends the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment;
the wireless routing equipment acquires equipment identification information of the user equipment sent by the network equipment;
and the wireless routing equipment performs wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of the method as described above.
According to yet another aspect of the present application, there is provided a network device for wireless connection pre-authorization for a user equipment, wherein the network device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
According to yet another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, wherein the wireless routing device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
Compared with the prior art, the network equipment in the application determines the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user, and sends the equipment identification information of the user equipment to the wireless routing equipment corresponding to the target wireless access point; after receiving the equipment identification information of the user equipment, the wireless routing equipment performs wireless connection pre-authorization on the user equipment based on the equipment identification information; because the user equipment of the user is pre-authorized, subsequently, the user is connected with the wireless access point corresponding to the wireless routing equipment through the user equipment without an authorization flow, the user does not need to perform complicated operation, the connection time is saved, and the user experience is optimized. Further, the activity information of the user may include historical activity information, current location information, and the like of the user, and accordingly, the network device may more intelligently determine a target wireless access point to which the user device of the user is to access, thereby providing a better wireless connection service for the user and improving user experience.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 illustrates a system topology for wireless connection pre-authorization for a user equipment according to one embodiment of the present application;
fig. 2 shows a flow diagram of a method for wireless connection pre-authorization of a user equipment according to another embodiment of the present application;
fig. 3 is a flowchart illustrating a method for authenticating a connection of a user equipment by a wireless routing device according to another embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
Fig. 1 shows a topology of a system for wireless connection pre-authorization of a user equipment according to an embodiment of the present application, the system comprising a network device 1, a wireless routing device 2 and the user equipment.
Here, the network device 1 includes an electronic device capable of automatically performing numerical calculation and information processing according to instructions set or stored in advance, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a programmable gate array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device 1 includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. The wireless routing device 2 comprises a device capable of connecting local area networks and wide area networks; preferably, the wireless routing device 2 is capable of broadcasting a wireless access point to user devices within a certain distance range based on an 802.11 protocol cluster; preferably, the authentication type of the wireless routing device 2 is non-open system authentication. The user equipment includes, but is not limited to, any electronic product capable of performing human-computer interaction with a user, such as a smart phone, a tablet computer, a notebook computer, and the like; the electronic product can adopt any operating system, such as an android operating system, an iOS operating system, a Windows operating system and the like.
It will be appreciated by those skilled in the art that the number of various network elements shown in fig. 1 for simplicity only may be less than that in an actual network, but such omissions are clearly not to be premised on a clear and complete disclosure of the present invention.
Fig. 2 shows a flowchart of a method for performing wireless connection pre-authorization for a user equipment according to another embodiment of the present application, wherein the method includes steps S11 and S12 performed at the network equipment side, and steps S21 and S22 performed at the wireless routing equipment side.
Specifically, in step S11, the network device 1 determines a target wireless access point to which the user equipment of the user is to access according to the activity information of the user; in step S12, the network device 1 sends the device identification information of the user device to the wireless routing device 2 corresponding to the target wireless access point, so that the wireless routing device 2 performs wireless connection pre-authorization on the user device; in step S21, the wireless routing device 2 obtains the device identification information of the user equipment sent by the network device 1; in step S22, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information.
For example, assume that the activity information of the user includes: the user B is located at a certain office building place B at 9: 00-17: 00 of a working day, and is located at a certain cell place C at 18: 00-8: 00 of the next day; assuming that the current time is 8:45 of a working day, by using a big data analysis technology, the network device 1 can determine, according to the activity information of the user, that a target wireless access point to which a user device (such as a smart phone) carried by the user B intends to access is a wireless access point at the location B. Then, the network device 1 transmits the device identification information of the user device of the user B to the wireless routing device (such as the wireless routing device 2) at the place B. The device identification information includes, but is not limited to: MAC address information, device serial number information, bluetooth identification information, user account information, phone number information, and the like. The wireless routing device at site B then pre-authorizes the user device of user B for wireless connection based on the device identification information. Subsequently, when user B arrives at location B, since the user equipment of user B has been pre-authorized, the user equipment can connect to the wireless access point at location B without further authorization, thereby optimizing the user's wireless connection experience.
Preferably, the activity information of the user comprises at least any one of: historical activity information of the user; current location information of the user.
In one embodiment, the wireless routing device corresponding to the wireless access point generally has a fixed geographic location, and the user equipment can be connected to the corresponding wireless access point within a certain range near the wireless routing device. If the user equipment carried with the user is in a connection state with the wireless access point W at the time T, the area to which the wireless access point W belongs can be determined as the active area of the user at the time T. Therefore, the network device 1 can determine the historical activity information of the user according to the connection record information of the user connected to the wireless access point; the network device 1 may also determine the current location information of the user according to the wireless access point to which the user is currently connected. In other embodiments, the network device 1 may also determine the historical activity information of the user according to the consumption record information of the user; or, the network device 1 may also obtain GPS coordinate information uploaded by the user device at different time periods, thereby determining historical activity information of the corresponding user; the network device 1 may also obtain GPS coordinate information currently uploaded by the user device, thereby determining current location information of the corresponding user.
Preferably, the method further comprises: the network device 1 determines the pre-authorization information of the device identification information of the user device with respect to the wireless routing device corresponding to the target wireless access point; in step S12, the network device 1 sends the device identification information and the pre-authorization information to the wireless routing device 2, so that the wireless routing device 2 performs wireless connection pre-authorization on the user equipment; in step S21, the wireless routing device 2 receives the device identification information of the user equipment sent by the network device 1, and the pre-authorization information of the device identification information about the wireless routing device 2; in step S22, if the pre-authorization information includes a successful pre-authorization, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information.
For example, the network device 1 may determine whether the user device may be pre-authorized to connect to the wireless routing device corresponding to the target wireless access point based on the device identification information query of the user device, so as to obtain the pre-authorization information (e.g., including success of pre-authorization, failure of pre-authorization, or no need of repeated authorization). After the wireless routing device 2 receives the pre-authorization information and the device identification information of the user device sent by the network device 1, if the pre-authorization information includes a successful pre-authorization, the wireless routing device 2 performs wireless connection pre-authorization on the device identification information of the user device. Correspondingly, if the pre-authorization information includes a pre-authorization failure or does not need to be authorized repeatedly, the wireless routing device 2 does not need to perform wireless connection pre-authorization on the device identification information of the user equipment any more.
Preferably, as shown in fig. 3, the method further includes a step S23 executed on the wireless routing device side. In step S23, when the wireless routing device 2 receives the connection authentication request sent by the user device to the wireless access point corresponding to the wireless routing device 2, and the device identification information is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device 2 sends authentication passing response information to the user device.
For example, it is assumed that when the user a arrives at a location near the wireless routing device 2, the user device may automatically transmit a connection authentication request to a wireless access point corresponding to the wireless routing device 2, or the user device may transmit a connection authentication request to a wireless access point corresponding to the wireless routing device 2 based on a manual operation of the user a. After receiving the connection authentication request, the wireless routing device 2 determines whether the user device is pre-authorized based on the device identification information of the user device, and if the device identification information of the user device is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device 2 returns authentication passing response information to the user device, and the user device can be successfully connected to the wireless access point corresponding to the wireless routing device 2.
In an embodiment, after establishing the wireless connection between the user equipment and the wireless routing device 2 (at this time, the user equipment cannot access the network through the wireless routing device 2 yet), the user equipment sends the corresponding device identification information to the wireless routing device 2 through the wireless connection for verification, and if the device identification information sent by the user equipment is consistent with the device identification information sent by the previous network device 1, the wireless routing device 2 allows the user equipment to perform network access.
Preferably, the step S23 further includes: and if the equipment identification information is not pre-authorized by wireless connection relative to the wireless access point, the wireless routing equipment 2 authenticates the connection authentication request and sends corresponding authentication result information to the user equipment.
In this embodiment, after receiving the connection authentication request sent by the user equipment, the wireless routing device 2 determines whether the user equipment is pre-authorized based on the device identification information of the user equipment, and if the device identification information of the user equipment is not pre-authorized by wireless connection with respect to the wireless access point, the wireless routing device 2 cannot directly return authentication passing response information to the user equipment, and the wireless routing device 2 needs to perform a conventional authentication process on the connection authentication request, and then sends corresponding authentication result information (for example, including authentication success or authentication failure) to the user equipment.
Preferably, the activity information of the user comprises historical activity information of the user; in step S11, the network device 1 determines future activity location information of the user according to the historical activity information of the user, and determines a target wireless access point to which the user device of the user intends to access according to the future activity location information.
For example, assume that the historical activity information of user B includes: the user B is located at a certain office building place B at 9: 00-17: 00 of each working day, and is located at a certain cell place C at 18: 00-8: 00 of the next day; assuming that the current time is 8:45 of a working day, by using a big data analysis technology, the network device 1 can determine that the future activity position information of the user B comprises a place B according to the historical activity information of the user B, and determine that a target wireless access point to be accessed by user equipment (such as a smart phone) carried by the user B is a wireless access point at the place B according to the future activity position information.
Preferably, in step S11, the network device 1 determines future activity location information of the user in future time period information according to the historical activity information of the user, and determines a target wireless access point to be visited by the user device of the user in the future time period information according to the future activity location information, wherein the distance between the target wireless access point and the future activity location information is smaller than or equal to distance threshold information; in step S12, the network device 1 sends the device identification information of the user device and the future time period information to the wireless routing device 2 corresponding to the target wireless access point, so that the wireless routing device 2 performs wireless connection pre-authorization on the user device; in step S21, the wireless routing device 2 obtains the device identification information of the user equipment and the corresponding future time period information sent by the network device 1; in step S21, the wireless routing device 2 performs wireless connection pre-authorization for the device identification information based on the future period information.
For example, assume that the historical activity information of user c includes: the user C is located at a certain movie city place D at a position of 15: 00-17: 00 per saturday, and by utilizing a big data analysis technology, the network equipment 1 can determine the future activity position information (such as the place D) of the user C in the future time period information (such as the saturday 15: 00-17: 00); the network device 1 determines a target wireless access point (e.g. a wireless access point less than or equal to 30 meters away from the location D) to be visited by the user device of the user c in the future time period information (e.g. saturday 15: 00-17: 00). After receiving the device identification information of the user equipment and the future time period information sent by the network device 1, the wireless routing device 2 at the location D performs wireless connection pre-authorization on the device identification information of the user equipment based on the future time period information, for example, the wireless routing device 2 at the location D pre-authorizes the user equipment of the user c to perform wireless connection on saturday 15: 00-17: 00.
Preferably, the method further comprises: when the wireless routing device 2 receives a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing device 2, and the connection authentication request is in the future period of time, the device identification information is pre-authorized by wireless connection relative to the wireless access point, and authentication passing response information is sent to the user equipment.
For example, assuming that the current time is saturday 15:03, the wireless routing device 2 at the local point D receives the connection authentication request sent by the user equipment of user c, and because the user equipment of user c is pre-authorized and the current time is within the future period information, the wireless routing device 2 sends the authentication passing response information to the user equipment of user c.
Preferably, the activity information of the user includes current location information of the user; in step S11, the network device 1 determines a target wireless access point to be accessed by the user device of the user according to the current location information of the user, where a distance between the target wireless access point and the current location information is less than or equal to distance threshold information.
For example, assume that the current location information of the user includes: the current GPS coordinates of the user equipment (such as a smart phone) of the user D are positioned in a coffee shop; the network device 1 may determine, according to the current location information of the user, that the target wireless access point to which the user device of the user includes a wireless access point near the coffee shop, for example, the network device 1 may determine a wireless access point less than or equal to 50 meters away from the coffee shop as the target wireless access point.
According to yet another aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, wherein the method comprises:
the network equipment determines a target wireless access point to be accessed by the user equipment of the user according to the activity information of the user;
the network equipment sends the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment;
the wireless routing equipment acquires equipment identification information of the user equipment sent by the network equipment;
and the wireless routing equipment performs wireless connection pre-authorization on the equipment identification information.
According to yet another aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of the method as described above.
According to yet another aspect of the present application, there is provided a network device for wireless connection pre-authorization for a user equipment, wherein the network device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
According to yet another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, wherein the wireless routing device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described above.
Compared with the prior art, the network equipment in the application determines the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user, and sends the equipment identification information of the user equipment to the wireless routing equipment corresponding to the target wireless access point; after receiving the equipment identification information of the user equipment, the wireless routing equipment performs wireless connection pre-authorization on the user equipment based on the equipment identification information; because the user equipment of the user is pre-authorized, subsequently, the user is connected with the wireless access point corresponding to the wireless routing equipment through the user equipment without an authorization flow, the user does not need to perform complicated operation, the connection time is saved, and the user experience is optimized. Further, the activity information of the user may include historical activity information, current location information, and the like of the user, and accordingly, the network device may more intelligently determine a target wireless access point to which the user device of the user is to access, thereby providing a better wireless connection service for the user and improving user experience.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (14)

1. A method at a network device for pre-authorizing a user equipment for wireless connection, wherein the method comprises:
determining a target wireless access point to be accessed by user equipment of a user according to the activity information of the user;
sending the device identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment, wherein after receiving a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing equipment, the wireless routing equipment determines whether the user equipment is pre-authorized or not based on the device identification information, and if the device identification information is pre-authorized by wireless connection relative to the wireless access point, the wireless routing equipment sends authentication passing response information to the user equipment; and if the equipment identification information is not pre-authorized by wireless connection relative to the wireless access point, authenticating the connection authentication request, and sending corresponding authentication result information to the user equipment, wherein the authentication result information comprises authentication success or authentication failure.
2. The method of claim 1, wherein the method further comprises:
determining pre-authorization information of the equipment identification information of the user equipment about wireless routing equipment corresponding to the target wireless access point;
wherein, the sending the device identification information of the user equipment to the wireless routing device corresponding to the target wireless access point for the wireless routing device to perform wireless connection pre-authorization on the user equipment includes:
and sending the equipment identification information and the pre-authorization information to the wireless routing equipment so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment.
3. The method of claim 1, wherein the activity information of the user comprises at least any one of:
historical activity information of the user;
current location information of the user.
4. The method of any of claims 1-3, wherein the activity information of the user includes historical activity information of the user;
wherein, the determining the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user comprises:
determining future activity position information of the user according to the historical activity information of the user;
and determining a target wireless access point to be accessed by the user equipment of the user according to the future activity position information.
5. The method of claim 4, wherein the determining a target wireless access point to which the user equipment of the user is to access based on activity information of the user further comprises:
determining future activity position information of the user in future time period information according to the historical activity information of the user;
determining a target wireless access point to which the user equipment of the user is about to access in the future time period information according to the future activity position information, wherein the distance between the target wireless access point and the future activity position information is less than or equal to distance threshold information;
wherein, the sending the device identification information of the user equipment to the wireless routing device corresponding to the target wireless access point for the wireless routing device to perform wireless connection pre-authorization on the user equipment includes:
and sending the equipment identification information of the user equipment and the future period information to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment.
6. The method of any of claims 1-3, wherein the activity information of the user includes current location information of the user;
wherein, the determining the target wireless access point to be accessed by the user equipment of the user according to the activity information of the user comprises:
and determining a target wireless access point to be accessed by user equipment of the user according to the current position information of the user, wherein the distance between the target wireless access point and the current position information is less than or equal to distance threshold information.
7. A method at a wireless routing device for performing wireless connection pre-authorization on a user equipment, wherein the method comprises:
acquiring equipment identification information of user equipment sent by network equipment;
performing wireless connection pre-authorization on the equipment identification information;
when a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing equipment is received, determining whether the user equipment is pre-authorized or not based on the equipment identification information, and if the equipment identification information is pre-authorized by wireless connection relative to the wireless access point, sending authentication passing response information to the user equipment; and if the equipment identification information is not pre-authorized by wireless connection relative to the wireless access point, authenticating the connection authentication request, and sending corresponding authentication result information to the user equipment, wherein the authentication result information comprises authentication success or authentication failure.
8. The method of claim 7, wherein the obtaining the device identification information of the user equipment sent by the network device comprises:
receiving equipment identification information of user equipment sent by network equipment, and pre-authorization information of the equipment identification information about wireless routing equipment;
wherein the performing of the wireless connection pre-authorization for the device identification information includes:
and if the pre-authorization information comprises successful pre-authorization, performing wireless connection pre-authorization on the equipment identification information.
9. The method of claim 7, wherein the obtaining the device identification information of the user equipment sent by the network device comprises:
acquiring equipment identification information of user equipment and corresponding future time period information sent by network equipment;
wherein the performing of the wireless connection pre-authorization for the device identification information includes:
performing wireless connection pre-authorization for the device identification information based on the future time period information.
10. The method of claim 9, wherein the method further comprises:
and when a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing equipment is received, and the connection authentication request is pre-authorized in the future period of time by the equipment identification information relative to the wireless access point through wireless connection, sending authentication passing response information to the user equipment.
11. A method for wireless connection pre-authorization for a user equipment, wherein the method comprises:
the network equipment determines a target wireless access point to be accessed by the user equipment of the user according to the activity information of the user;
the network equipment sends the equipment identification information of the user equipment to wireless routing equipment corresponding to the target wireless access point so that the wireless routing equipment can carry out wireless connection pre-authorization on the user equipment;
the wireless routing equipment acquires equipment identification information of the user equipment sent by the network equipment;
the wireless routing equipment performs wireless connection pre-authorization on the equipment identification information;
when the wireless routing equipment receives a connection authentication request sent by the user equipment to a wireless access point corresponding to the wireless routing equipment, determining whether the user equipment is pre-authorized or not based on the equipment identification information, and if the equipment identification information is pre-authorized by wireless connection relative to the wireless access point, sending authentication passing response information to the user equipment; and if the equipment identification information is not pre-authorized by wireless connection relative to the wireless access point, authenticating the connection authentication request, and sending corresponding authentication result information to the user equipment, wherein the authentication result information comprises authentication success or authentication failure.
12. A computer-readable medium comprising instructions that, when executed, cause a system to perform the operations of any of the methods of claims 1-11.
13. A network device for wireless connection pre-authorization for a user device, wherein the network device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 1 to 6.
14. A wireless routing device for wireless connection pre-authorization for a user device, wherein the wireless routing device comprises:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to perform the method of any of claims 7 to 10.
CN201710720676.1A 2017-08-21 2017-08-21 Method and equipment for carrying out wireless connection pre-authorization on user equipment Active CN107517461B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201710720676.1A CN107517461B (en) 2017-08-21 2017-08-21 Method and equipment for carrying out wireless connection pre-authorization on user equipment
PCT/CN2018/099343 WO2019037596A1 (en) 2017-08-21 2018-08-08 Method and device for carrying out wireless connection pre-authorization for user equipment
US16/796,965 US20200245146A1 (en) 2017-08-21 2020-02-21 Method and a device for performing wireless connection pre-authorization on a user device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710720676.1A CN107517461B (en) 2017-08-21 2017-08-21 Method and equipment for carrying out wireless connection pre-authorization on user equipment

Publications (2)

Publication Number Publication Date
CN107517461A CN107517461A (en) 2017-12-26
CN107517461B true CN107517461B (en) 2021-08-27

Family

ID=60723485

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710720676.1A Active CN107517461B (en) 2017-08-21 2017-08-21 Method and equipment for carrying out wireless connection pre-authorization on user equipment

Country Status (3)

Country Link
US (1) US20200245146A1 (en)
CN (1) CN107517461B (en)
WO (1) WO2019037596A1 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107517461B (en) * 2017-08-21 2021-08-27 上海掌门科技有限公司 Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN108495316B (en) * 2018-04-10 2021-02-23 上海连尚网络科技有限公司 Wireless connection method and device
CN108696918B (en) * 2018-06-29 2021-04-13 连尚(新昌)网络科技有限公司 Method, apparatus and medium for establishing wireless connection
CN108668237B (en) * 2018-06-29 2020-07-31 连尚(新昌)网络科技有限公司 Method and equipment for maintaining wireless connection of user equipment
CN108901057B (en) * 2018-06-29 2021-05-11 上海尚往网络科技有限公司 Method, apparatus and medium for establishing wireless connection
US11997486B2 (en) * 2019-12-20 2024-05-28 Lenovo (Singapore) Pte. Ltd Method and system of providing WiFi credentials through remote invitations

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162777A (en) * 2015-08-13 2015-12-16 腾讯科技(深圳)有限公司 Wireless network login method and device
CN106658666A (en) * 2015-10-29 2017-05-10 上海连尚网络科技有限公司 Method and device for building wireless connection
CN107071865A (en) * 2016-12-07 2017-08-18 广东欧珀移动通信有限公司 Method and device for fast wireless fidelity connection

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101400089A (en) * 2007-09-29 2009-04-01 华为技术有限公司 Method, network entity and terminal for switching between heterogeneous wireless networks
CN101568108B (en) * 2008-04-21 2011-12-21 华为技术有限公司 Switching method and equipment between heteroid systems
US9107131B2 (en) * 2009-08-18 2015-08-11 Tti Inventions D Llc Pre registration/pre authentication in wireless networks
CN104853353B (en) * 2015-05-13 2019-02-05 Oppo广东移动通信有限公司 Access authentication method and device for wireless access point
CN106302373A (en) * 2015-06-25 2017-01-04 中兴通讯股份有限公司 A kind of connection control method and terminal
CN105392178B (en) * 2015-10-29 2017-10-31 上海连尚网络科技有限公司 A kind of method and apparatus for being used to obtain the access information of WAP
CN106804056A (en) * 2015-11-26 2017-06-06 上海连尚网络科技有限公司 A kind of method and apparatus for providing the access information of WAP
CN105357726B (en) * 2015-12-11 2018-07-03 江苏鑫软图无线技术股份有限公司 LTE fast switch over method based on downlink timing offset and target BS pre-authorization
CN106102061A (en) * 2016-06-07 2016-11-09 北京小米移动软件有限公司 Method for connecting network and device
CN107517461B (en) * 2017-08-21 2021-08-27 上海掌门科技有限公司 Method and equipment for carrying out wireless connection pre-authorization on user equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105162777A (en) * 2015-08-13 2015-12-16 腾讯科技(深圳)有限公司 Wireless network login method and device
CN106658666A (en) * 2015-10-29 2017-05-10 上海连尚网络科技有限公司 Method and device for building wireless connection
CN107071865A (en) * 2016-12-07 2017-08-18 广东欧珀移动通信有限公司 Method and device for fast wireless fidelity connection

Also Published As

Publication number Publication date
WO2019037596A1 (en) 2019-02-28
CN107517461A (en) 2017-12-26
US20200245146A1 (en) 2020-07-30

Similar Documents

Publication Publication Date Title
CN107517461B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN107567021B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN108924833B (en) A method and device for authorizing user equipment to connect to a wireless access point
CN108307674A (en) A method and device for ensuring terminal security
US11057821B2 (en) Method and device for connecting to hidden wireless access point
WO2016101730A1 (en) Method, apparatus and system for wireless network access
US20220131685A1 (en) Method and apparatus for registering shared key
CN107396364B (en) A method and device for pre-authorizing wireless connection to user equipment
CN107396362B (en) A method and device for pre-authorizing wireless connection to user equipment
WO2019037598A1 (en) Method and device for carrying out wireless connection pre-authorization for user equipment
WO2019037594A1 (en) Method and device for pre-authorizing wireless connection for user equipment
CN109890027B (en) Method and apparatus for determining security risk information of target wireless access point
CN107333264B (en) A method and device for pre-authorizing wireless connection to user equipment
CN108696918B (en) Method, apparatus and medium for establishing wireless connection
WO2019037602A1 (en) Wireless connection pre-authorization method and device for user equipment
CN107396295B (en) A method and device for pre-authorizing wireless connection to user equipment
CN107404722B (en) A method and device for pre-authorizing wireless connection to user equipment
US11776340B2 (en) Electronic device authentication method, and apparatus according thereto
CN108712744B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN112270559B (en) Method and equipment for stimulating users to share wireless access points
CN111629421B (en) Method and equipment for managing wireless access point
CN109831588B (en) Method and equipment for setting target prompt tone

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: Room 80536, Shanghai

Patentee after: Shanghai Zongzhang Technology Group Co.,Ltd.

Country or region after: China

Address before: Room 80536, Shanghai

Patentee before: SHANGHAI ZHANGMEN SCIENCE AND TECHNOLOGY Co.,Ltd.

Country or region before: China

CP03 Change of name, title or address