CN109756915B - Wireless network management method and system - Google Patents

Wireless network management method and system Download PDF

Info

Publication number
CN109756915B
CN109756915B CN201711073072.9A CN201711073072A CN109756915B CN 109756915 B CN109756915 B CN 109756915B CN 201711073072 A CN201711073072 A CN 201711073072A CN 109756915 B CN109756915 B CN 109756915B
Authority
CN
China
Prior art keywords
wireless network
visitor
information
authorization
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711073072.9A
Other languages
Chinese (zh)
Other versions
CN109756915A (en
Inventor
张元庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201711073072.9A priority Critical patent/CN109756915B/en
Publication of CN109756915A publication Critical patent/CN109756915A/en
Application granted granted Critical
Publication of CN109756915B publication Critical patent/CN109756915B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

A wireless network management system, comprising: the system comprises a control terminal, a network management server and a visitor terminal, wherein the network management server is connected with the control terminal and the visitor terminal; the control terminal is suitable for managing visitor control information of the wireless network and sending the visitor control information to the network management server; the network management server is suitable for sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network according to the visitor control information of the wireless network, or indicating the visitor terminal connected with the wireless network to disconnect the wireless network connection, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network. In this way, access management to the guest terminal of the wireless network is achieved.

Description

Wireless network management method and system
Technical Field
The present invention relates to, but not limited to, the field of communications technologies, and in particular, to a method and a system for managing a wireless network.
Background
At present, passwords of a wireless network are mainly informed to an opposite party in manners of dictation, writing and the like, and the method is easy to cause secondary propagation of the passwords to cause password leakage. Moreover, once the other party accesses the wireless network by using the acquired password, the password is remembered by the access device adopted by the other party, and the access device enters the coverage area of the wireless network to automatically connect the wireless network, while the owner of the wireless network may not know the information, but the owner of the wireless network may not want the private wireless network of the owner to be permanently used by others.
In response to the above problem, the owner of the wireless network can only solve it by modifying the password of the wireless network, which, however, causes the above problem to recur.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
The embodiment of the application provides a wireless network management method and system, which can realize access management of a visitor terminal of a wireless network.
In a first aspect, an embodiment of the present application provides a wireless network management system, including: the system comprises a control terminal, a network management server and a visitor terminal; the network management server is connected with the control terminal and the visitor terminal; the control terminal is suitable for managing visitor control information of a wireless network and sending the visitor control information to the network management server; the network management server is suitable for sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network according to the visitor control information of the wireless network, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
In an exemplary embodiment, the guest control information may include at least one of: the visitor information allowing authorization, the authorization mode information, the visitor information refusing authorization, the visitor information to be disconnected and connected with the wireless network.
In an exemplary embodiment, the network management server may be adapted to send authorization information indicating permission or denial of access to the wireless network to a guest terminal of the wireless network according to the guest control information of the wireless network by:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server sends the access authorization request to the control terminal when determining that the authorization mode of the visitor terminal is an approval authorization mode according to the visitor control information, and sends authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal.
In an exemplary embodiment, the network management server may include a server computing device, where the server computing device stores a correspondence between user information and device information of the guest terminal; the server computing device may be adapted to, when it is determined that the authorization-allowed user information exists according to the guest control information, actively issue authorization information indicating that access to the wireless network is allowed to a guest terminal corresponding to the authorization-allowed user information.
In an exemplary embodiment, the network management server may include a routing device, and the routing device may be adapted to issue authorization information indicating permission or denial of access to the wireless network to the guest terminal according to the guest control information when detecting that the guest terminal enters a coverage area of the wireless network.
In an exemplary embodiment, the network management server may be adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network by:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server inquires whether visitor information carried by the access authorization request is in visitor information which is allowed to be authorized and indicated by the visitor control information when determining that the authorization mode of the visitor terminal is an automatic authorization mode according to the visitor control information, and sends authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
In an exemplary embodiment, the authorization information indicating that access to the wireless network is allowed may carry a password of the wireless network.
In an exemplary embodiment, the guest terminal may be adapted to buffer the received authorization information after successfully accessing the wireless network, and determine whether to allow access to the wireless network according to the buffered authorization information after detecting the wireless network again.
In an exemplary embodiment, the network management server may be further adapted to transmit authorization information indicating denial of access to the wireless network to the guest terminal connected to the wireless network when it is determined that the authorization permission right of the guest terminal is terminated according to the guest control information;
the guest terminal may be adapted to disconnect the connection to the wireless network and delete the previously cached authorization information indicating permission to access the wireless network after receiving the authorization information indicating denial of access to the wireless network.
In a second aspect, an embodiment of the present application provides a wireless network management method, including:
and the control terminal manages visitor control information of the wireless network and sends the visitor control information to the network management server.
In an exemplary embodiment, the guest control information may include at least one of: the visitor information allowing authorization, the authorization mode information, the visitor information refusing authorization, the visitor information to be disconnected and connected with the wireless network.
In an exemplary embodiment, when the authorization manner indicated by the guest control information is an approval authorization manner, the method may further include:
the control terminal receives an access authorization request of a visitor terminal of the wireless network;
and returning authorization response information to the guest terminal according to at least one of the operation instruction, the guest information allowing authorization and the guest information refusing authorization.
In an exemplary embodiment, the visitor information may include at least one of: user information, device information of the guest terminal.
In a third aspect, an embodiment of the present application provides a wireless network management method, including:
the network management server side acquires visitor control information of the wireless network from the control terminal;
and according to the visitor control information of the wireless network, sending authorization information indicating permission or refusal of access to the wireless network to a visitor terminal of the wireless network, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
In an exemplary embodiment, the transmitting authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network may include:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server sends the access authorization request to a control terminal when determining that the authorization mode of the visitor terminal is an approval authorization mode according to the visitor control information, and sends authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal.
In an exemplary embodiment, the network management server may include a server computing device that stores a correspondence between user information and device information of the guest terminal;
the transmitting authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network may include:
and when determining that the user information allowing authorization exists according to the visitor control information of the wireless network, the server-side computing equipment actively issues authorization information indicating permission of accessing the wireless network to a visitor terminal corresponding to the user information allowing authorization.
In an exemplary embodiment, the network management server may include a routing device; the transmitting authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network may include:
and when detecting that the visitor terminal enters the coverage area of the wireless network, the routing equipment issues authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to the visitor control information of the wireless network.
In an exemplary embodiment, the transmitting authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network may include:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server inquires whether visitor information carried by the access authorization request is in the visitor information which is allowed to be authorized and indicated by the visitor control information when determining that the authorization mode of the visitor terminal is an automatic authorization mode according to the visitor control information, and sends authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
In an exemplary embodiment, the transmitting authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network may include:
for a guest terminal connected with the wireless network, the network management server sends authorization information indicating that the access to the wireless network is refused to the guest terminal connected with the wireless network when determining that the authorization permission of the guest terminal is terminated according to the guest control information; or actively disconnecting the wireless network connection of the visitor terminal.
In an exemplary embodiment, the authorization information indicating that the wireless network is allowed to be accessed may carry a password of the wireless network.
In a fourth aspect, an embodiment of the present application provides a wireless network management method, including:
the visitor terminal receives authorization information which is sent by a network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, uploading a network authorization request to a network management server, and receiving authorization information which is issued by the network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, obtaining the authorization information of the wireless network from a local cache;
and performing network connection according to the authorization information of the wireless network.
In an exemplary embodiment, the method may further include: after the visitor terminal is successfully connected with the wireless network, after receiving the authorization information which indicates that the wireless network is refused to be accessed and is sent by the network management server, the visitor terminal is disconnected with the wireless network, and deletes the authorization information which indicates that the local cache allows the wireless network to be accessed.
In an exemplary embodiment, the authorization information indicating that access to the wireless network is allowed may carry a password of the wireless network.
In a fifth aspect, an embodiment of the present application provides a terminal, including:
the display module is suitable for providing an interactive interface; the interactive interface comprises one of the following components: the visitor control information processing system comprises a setting interface of visitor control information of a wireless network and a processing interface of an access authorization request aiming at a visitor terminal.
In a sixth aspect, an embodiment of the present application provides a terminal, including: the device comprises a first communication unit, a first processor and a first memory; the first processor is connected with the first communication unit and the first memory; wherein the first memory stores a wireless network management program that, when read executed by the first processor, performs the following:
and managing visitor control information of a wireless network, and sending the visitor control information to a network management server through the first communication unit.
In a seventh aspect, an embodiment of the present application provides an apparatus, including: a second communication unit, a second processor and a second memory; the second processor is connected with the second communication unit and the second memory; wherein the second memory stores a wireless network management program that, when read and executed by the second processor, performs the following:
obtaining visitor control information of a wireless network from a control terminal through the second communication unit;
according to the visitor control information of the wireless network, sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network through the second communication unit, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
In an eighth aspect, an embodiment of the present application provides a terminal, including: a third processor and a third memory; wherein the third memory stores a wireless network management program that, when read executed by the third processor, performs the following:
receiving authorization information which is issued by a network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, uploading a network authorization request to a network management server, and receiving authorization information which is issued by the network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, acquiring the authorization information of the wireless network from a local cache;
and performing network connection according to the authorization information of the wireless network.
In a ninth aspect, an embodiment of the present application provides a computer-readable medium, which stores a wireless network management program, and the wireless network management program, when executed by a processor, implements the steps of the wireless network management method of the second aspect.
In a tenth aspect, an embodiment of the present application provides a computer-readable medium, which stores a wireless network management program, and the wireless network management program, when executed by a processor, implements the steps of the wireless network management method of the third aspect.
In an eleventh aspect, an embodiment of the present application provides a computer-readable medium, which stores a wireless network management program, and the wireless network management program, when executed by a processor, implements the steps of the wireless network management method of the fourth aspect.
In the embodiment of the application, the control terminal is suitable for managing visitor control information of a wireless network and sending the visitor control information to the network management server; the network management server is suitable for sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network according to the visitor control information of the wireless network, or indicating the visitor terminal connected with the wireless network to disconnect the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network. In this way, access management to the guest terminal of the wireless network is achieved.
In an exemplary embodiment, for unnecessary authorized or connected guest terminals, the control terminal may conveniently terminate access authorization of the guest terminals by updating guest control information of the wireless network, thereby disconnecting the wireless network connection of the guest terminals.
In an exemplary embodiment, for an unauthorized guest terminal, not only can authorization information allowing access to a wireless network be obtained through active application, but also the control terminal can actively invite or push the authorization information indicating the permission to access to the wireless network to the guest terminal through a network management server, so that the interactive experience between host and guest terminals is improved to a certain extent.
In an exemplary embodiment, after receiving the authorization information indicating that the wireless network is denied, the guest terminal may delete the authorization information indicating that the access to the wireless network is allowed, so as to effectively prevent the possibility that the password of the wireless network is unlimitedly shared.
Of course, not all of the above advantages need to be achieved at the same time in any one product embodying the present application.
Drawings
Fig. 1 is a schematic diagram of a wireless network management system according to an embodiment of the present application;
fig. 2 is an exemplary diagram of an interaction flow of a wireless network management system according to an embodiment of the present application;
fig. 3 is a diagram illustrating another example of an interaction flow of a wireless network management system according to an embodiment of the present application;
fig. 4 is a flowchart of a wireless network management method according to an embodiment of the present application;
fig. 5 is a schematic diagram of a wireless network management apparatus according to an embodiment of the present application;
fig. 6 is a schematic diagram of a terminal according to an embodiment of the present application;
fig. 7 is a flowchart of another wireless network management method according to an embodiment of the present application;
fig. 8 is a schematic diagram of another wireless network management apparatus according to an embodiment of the present application;
FIG. 9 is a schematic view of an apparatus provided by an embodiment of the present application;
fig. 10 is a flowchart of another wireless network management method according to an embodiment of the present application;
fig. 11 is a schematic diagram of another wireless network management apparatus according to an embodiment of the present application;
fig. 12 is a schematic diagram of another terminal provided in the embodiment of the present application.
Detailed Description
The embodiments of the present application will be described in detail below with reference to the accompanying drawings, and it should be understood that the embodiments described below are only for illustrating and explaining the present application and are not intended to limit the present application.
It should be noted that, if not conflicting, the embodiments and the features in the embodiments may be combined with each other and are within the scope of protection of the present application. Additionally, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
In some embodiments, a computing device executing the wireless network management method may include one or more processors (CPUs), input/output interfaces, network interfaces, and memories (memories).
The memory may include forms of volatile memory, Random Access Memory (RAM), and/or non-volatile memory in a computer-readable medium, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium. The memory may include module 1, module 2, … …, and module N (N is an integer greater than 2).
Computer readable media includes both permanent and non-permanent, removable and non-removable storage media. A storage medium may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 is a schematic diagram of a wireless network management system according to an embodiment of the present application. As shown in fig. 1, the wireless network management system provided in this embodiment includes: a control terminal 101, a network management server 102, and a guest terminal 103; the network management server 102 connects the control terminal 101 and the guest terminal 103.
The control terminal 101 is adapted to manage visitor control information of a wireless network and send the visitor control information to the network management server 102, and the network management server 102 is adapted to send authorization information indicating permission or rejection of access to the wireless network to the visitor terminal 103 of the wireless network according to the visitor control information of the wireless network, or instruct a visitor terminal connected to the wireless network to disconnect the wireless network, or disconnect the wireless network connection of the visitor terminal connected to the wireless network.
Illustratively, the control terminal 101 may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a wearable device, and a fixed terminal such as a desktop computer. The network management service 102 may include at least one of: a routing device (e.g., a router), a server computing device (e.g., a server) of a wireless network is provided. The guest terminal 103 may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a wearable device, and a fixed terminal such as a desktop computer. However, this is not limited to this.
In an exemplary embodiment, the control terminal 101 may manage guest control information of a wireless network owned by a user according to a user operation instruction through an interactive interface displayed by a web page by accessing the web page of the router; or, an Application program (APP) may be installed locally, and the visitor control information of the wireless network owned by the user may be managed according to the user operation instruction through an interactive interface provided by the APP. However, this is not limited in this application.
Illustratively, the guest control information of the wireless network may include at least one of: information of authorized visitors, information of authorized modes, information of visitors refusing authorization, and information of visitors of connected wireless networks to be disconnected. Wherein the visitor information may include at least one of: user information (e.g., user ID (Identifier), social account number of the user), device information (e.g., MAC (Media Access Control) address of the guest terminal) of the guest terminal.
Illustratively, the authorization means information may include: authorization mode information corresponding to the authorized visitor information, or authorization mode information corresponding to all visitor terminals of the wireless network. The authorization mode corresponding to the visitor information allowed to be authorized may include one of the following: an active authorization mode, an automatic authorization mode and an approval authorization mode; the active authorization mode means that the visitor terminal does not need to carry out authorization application, and the network management server determines whether to authorize the visitor terminal to access the wireless network according to the visitor control information; the automatic authorization mode means that after the visitor terminal applies for authorization, the network management server automatically determines whether the visitor terminal is authorized to access the wireless network according to at least one of visitor information allowing authorization and visitor information refusing authorization; the approval authorization mode refers to that after the visitor terminal applies for authorization, the control terminal determines whether the visitor terminal is authorized to access the wireless network according to at least one of approval operation instructions of a network owner, authorization-allowed visitor information and authorization-refused visitor information.
For example, the authorization mode information corresponding to all guest terminals of the wireless network may be an approval authorization mode, that is, the control terminal determines whether to authorize the guest terminals to access the wireless network.
Illustratively, the visitor control information may further include authorization duration information corresponding to a visitor allowed to be authorized, for example, for a visitor terminal, the visitor terminal may be set by the visitor control information to be authorized to access the wireless network in the last week. However, this is not limited in this application.
It should be noted that the visitor control information of the wireless network is not limited in the present application. In practical application, the visitor control information can be set according to actual requirements.
Illustratively, the network management server 102 may be adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network by:
after receiving an access authorization request of the guest terminal 103 to the wireless network, the network management server 102 sends the access authorization request to the control terminal 101 when determining that the authorization mode of the guest terminal 103 is an approval authorization mode according to the guest control information, and sends authorization information indicating permission or denial of access to the wireless network to the guest terminal 103 according to authorization response information fed back by the control terminal 101.
The access authorization request may carry information uniquely identifying the visitor terminal or information identifying a user of the visitor terminal. Illustratively, the access authorization request may carry at least one of the following information: user information (e.g., user Identification (ID), social account number of the user), device information (e.g., MAC address) of the guest terminal. However, this is not limited in this application.
Wherein the authorization response information is used for indicating information for allowing access or denying access. Illustratively, if the operation instruction of the network owner on the control terminal 101 is permission, the authorization response information carries indication information of permission of access, otherwise, the authorization response information carries indication information of denial of access. Then, the network management server 102 sends authorization information to the guest terminal 103 according to the authorization response information; for example, when the authorization response information carries indication information for denying access, authorization information for denying access to the wireless network is sent to the guest terminal 103, and when the authorization response information carries indication information for allowing access, authorization information for indicating allowing access to the wireless network is sent to the guest terminal 103 (for example, a password for carrying the wireless network, which may be encrypted or unencrypted). Illustratively, the control terminal 101 may also automatically determine whether to allow the guest terminal 103 to access the wireless network according to at least one of the authorization-allowed guest information and the authorization-denied guest information configured by the network owner. For example, when the visitor information carried in the access authorization request is the visitor information allowed to be authorized and configured by the network master, the control terminal 101 may feed back authorization response information carrying indication information of allowing authorization; when the visitor information carried by the access authorization request is not in the visitor information allowed to be authorized and configured by the network master, or is in the visitor information refused to be authorized, the control terminal 101 may feed back authorization response information carrying indication information of refusing authorization.
When the wireless network is provided with the password, the authorization information fed back by the network management server 102 may also carry the encrypted or unencrypted password when the visitor terminal 103 is instructed to allow access. At this time, after the guest terminal 103 receives the authorization information, it may automatically access the wireless network using the received password of the wireless network. When the wireless network does not set the password, the authorization information fed back by the network management server 102 may carry a private key password or authentication key information, and is only used to indicate whether to allow access or deny access. At this time, when the guest terminal 103 receives the authorization information indicating that the access is allowed, the wireless network may be directly connected. In an example where the wireless network does not set the password, the network management service 102 (e.g., a router) may set a white list of MAC addresses in which MAC addresses of guest terminals that are allowed to access are recorded, and the network management service 102 may notify the guest terminals out of the white list of disconnection or actively reject connection of the guest terminals when detecting that the guest terminals connect to the wireless network.
Illustratively, the network management server 102 may include a server computing device (e.g., a server in the cloud); the server side computing equipment stores the corresponding relation between the user information and the equipment information of the visitor terminal; the server-side computing device is suitable for actively sending authorization information indicating that the wireless network is allowed to be accessed to a visitor terminal corresponding to the authorization-allowed user information when the authorization-allowed user information is determined to exist according to the visitor control information of the wireless network.
For example, after the network owner sets the visitor control information of the wireless network on the control terminal 101, the visitor control information of the wireless network may be synchronized to the server at the cloud side through the router, and after the server at the cloud side is synchronized to the visitor control information of the wireless network, the authorization information indicating that the access to the wireless network is allowed may be actively pushed to the corresponding visitor terminal.
For example, after the guest terminal 103 enters the coverage area of the wireless network, before the guest terminal is not connected to the wireless network, the guest terminal can automatically pull (or update) the authorization information of the guest terminal in the wireless network from the server in the cloud through another network path (e.g., an operator network) according to the wireless network information, and then automatically attempt to connect to the wireless network according to the obtained authorization information.
For example, the server computing device stores a corresponding relationship between user information and device information of the guest terminal; when determining that the user information allowing authorization exists, the server-side computing device actively issues authorization information indicating permission of accessing the wireless network to the visitor terminal corresponding to the user information allowing authorization. The server-side computing device can determine the device information of the visitor terminal allowed to be authorized according to the visitor information allowed to be authorized and the corresponding relation between the user information of the visitor terminal and the device information, and actively issues the authorization information indicating that the visitor terminal is allowed to access the wireless network according to the device information of the visitor terminal allowed to be authorized.
Illustratively, the network management server may include a routing device adapted to issue authorization information indicating permission or denial of access to the wireless network to the guest terminal according to the guest control information of the wireless network upon detecting that the guest terminal enters a coverage area of the wireless network.
For example, the network management server may include a server computing device and a routing device, where the routing device may store visitor control information of a wireless network set by a network owner, and may obtain device information under a friend name of the network owner, for example, a correspondence between user information of a visitor terminal and the device information, from the server computing device in the cloud, and store the information synchronously; when the visitor terminal enters the coverage area of the wireless network, the visitor terminal may automatically try to connect to the wireless network, at this time, the routing device may query the visitor control information and the corresponding relationship between the user information and the device information of the visitor terminal according to the device information of the visitor terminal, determine whether the visitor terminal is authorized to access the wireless network, and send authorization information indicating permission or denial of access to the visitor terminal according to the query result. In this example, after the network master preferentially sets the visitor control information of the wireless network, the authorized visitor terminal is allowed to automatically connect to the wireless network as long as the authorized visitor terminal enters the coverage area of the wireless network.
It should be noted that after the guest terminal enters the coverage area of the wireless network, before the guest terminal is not connected to the wireless network, any one of the guest terminals may be selected (or actively switched by the guest terminal user) in the wireless network available around the guest terminal to attempt connection according to the signal strength and the historical authorization information, and at this time, there is no direct communication channel between the guest terminal and the router corresponding to the wireless network. In addition, all wireless network connection requests are initiatively initiated by the visitor terminal, the router does not directly send an instruction to the visitor terminal before the wireless network connection is successful, and after the visitor terminal is successfully connected with the wireless network, if a network owner resets visitor control information of the wireless network, because a communication link between the visitor terminal and the router of the wireless network is already established, at the moment, the router can send an instruction for disconnecting the wireless network connection to the visitor terminal, or directly disconnect the visitor terminal, so that the visitor terminal is prevented from being on the Internet for a long time.
Illustratively, the network management server 102 may be adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network by:
after receiving an access authorization request of a guest terminal 103 to a wireless network, the network management server 102, when determining that an authorization mode of the guest terminal 103 is an automatic authorization mode according to guest control information, queries whether guest information carried in the access authorization request is in guest information of authorization permission indicated by the guest control information, and sends authorization information indicating permission or refusal of access to the wireless network to the guest terminal 103 according to a query result.
Illustratively, authorization information indicating permission to access the wireless network may carry a password for the wireless network.
In an exemplary embodiment, the guest terminal 103 may be adapted to buffer the received authorization information after successful access to the wireless network, and determine whether to be allowed to access the wireless network based on the buffered authorization information when the wireless network is detected again.
Illustratively, the network management server 102 may be further adapted to transmit authorization information indicating denial of access to the wireless network to the guest terminal 103 connected to the wireless network when it is determined that the authorization permission right of the guest terminal 103 is terminated according to the guest control information; the guest terminal 103 may be adapted to disconnect the connection to the wireless network and delete the previously cached authorization information indicating permission to access the wireless network after receiving the authorization information indicating a denial of access to the wireless network.
The user of the guest terminal 103 does not perceive the password of the wireless network, and the guest terminal 103 may automatically parse the password after receiving the authorization information, and then perform wireless network access. Therefore, the possibility that the password of the wireless network is shared again without limit can be effectively prevented.
The present application is illustrated below by way of a number of examples.
Fig. 2 is an exemplary interaction flow diagram of a wireless network management system according to an embodiment of the present application. As shown in fig. 2, the wireless network management system provided by this example may include: control terminal, network management server and visitor terminal. In this example, the wireless network may be a WiFi network, and the WiFi network is provided with a password. In this example, the guest control information includes authorization configuration information, the authorization configuration information including at least one of: allowing authorized visitor information, refusing authorized visitor information and authorization mode information.
As shown in fig. 2, the wireless network management procedure of this embodiment includes:
s201, a user can open a Web page or APP on a control terminal (such as a smart phone) and enter a WiFi management interface;
s202, the control terminal acquires WiFi information; the WiFi information may include information uniquely identifying the WiFi network, such as a model, a MAC address, and the like of the WiFi network router.
S203, the control terminal registers the WiFi information with a network management server (e.g., a cloud server).
S204, the network management server stores WiFi information;
the control terminal sends the acquired WiFi information to the network management server, and the network management server records the relationship between the WiFi information and the user information of the network owner and then informs the control terminal.
And S205, after receiving the notification message of the network management service terminal, the control terminal confirms to become the owner of the WiFi network.
And S206, the user sets authorization configuration information on a WiFi management interface displayed by the control terminal. For example, the authorization mode of the WiFi network may be an approval authorization mode.
Illustratively, the control terminal may further obtain an authorized list of the WiFi network from the network management service side, where the authorized list includes guest information (e.g., user information or device information) that is set by the user on other devices or is set by the user on the current device before and allows authorization, and it should be noted that the authorized list may be empty when the user first registers as a WiFi owner. The user can set visitor information allowing authorization on the interactive interface of the control terminal.
It should be noted that the network owner may be multiple persons, and the change of the network owner may be realized by authorizing transfer of the management authority of the WiFi network, so that the identity between the visitor and the network owner may be changed. In addition, one or more control terminals used by one network owner can be adopted, and the network owner can adopt different control terminals to perform access authorization management on the WiFi network. However, this is not limited in this application.
For example, after obtaining the authorized list, the control terminal may display and set an authorization manner corresponding to each guest message, such as an automatic authorization manner or an active authorization manner. Alternatively, guest information may be added to the authorized list or deleted. For example, the user may add guest information that allows authorization, or may delete guest information that terminates authorization, or may set guest information that terminates authorization to an authorization prohibited state.
Illustratively, the guest control information may also include guest information of the connected wireless network to be disconnected. The network management server can also send the connected list to the control terminal. Wherein the connected list comprises visitor information which is connected to the WiFi network. In this way, the network owner can update the guest control information on the control terminal according to the connected list, for example, setting a guest terminal of a connected WiFi network to be disconnected. Then, the network management server may instruct the guest terminal connected to the WiFi network to disconnect the wireless network connection according to the guest information of the connected wireless network to be disconnected, or actively disconnect the wireless network connection of the guest terminal connected to the WiFi network.
Illustratively, the control terminal can also acquire visitor information which is tried to connect the WiFi network from a network management service terminal. Therefore, the network owner can update the authorization configuration information on the control terminal according to the visitor information which is tried to be connected with the WiFi network so as to add a visitor terminal which is allowed by authorization, and therefore the access terminal of the WiFi network is effectively managed.
And S207, the control terminal informs the updated authorization configuration information to the network management server.
S208, the network management server side stores the latest authorization configuration information.
It should be noted that, because the user may use different control terminals to set the authorization configuration information, the network management server may store the latest and most complete authorization configuration information, and the control terminal may obtain the latest authorization configuration information from the network management server for the user to further modify the authorization configuration information.
S209, the network management server side issues the authorization information according to the authorization configuration information.
For example, when the network management server (e.g., a server in the cloud) determines that the guest information allowed to be authorized exists according to the authorization configuration information, the authorization information indicating that the access to the WiFi network is allowed may be actively issued to the guest terminal corresponding to the guest information allowed to be authorized. In this example, the password of the WiFi network may be carried in the authorization information.
Illustratively, when detecting that a guest terminal corresponding to the authorized guest information enters the coverage area of the WiFi network, the router of the wireless network may issue authorization information indicating that the WiFi network is allowed to be accessed to the guest terminal.
Illustratively, after the guest terminal successfully connects to the wireless network, when the network management server (e.g., a router) determines that the authorization permission of the connected guest terminal is terminated according to the latest authorization configuration information, the network management server may issue authorization information indicating that the access to the WiFi network is denied to the guest terminal, and notify the guest terminal to actively disconnect, or the network management server may actively deny the wireless network connection of the guest terminal.
For example, assuming that a guest terminal has registered and bound social accounts (e.g., a mobile phone number, a mailbox, a microblog account number, a QQ, a micro signal, or the like) of a guest user (i.e., a friend of a host) on the same WiFi management platform (e.g., a public WiFi management server accessible by a public network), the host (i.e., a network owner) may set authorization permission or denial in a manner of adding a social account (not requiring the social account to have a friend relationship) of a friend, without requiring that the guest device must enter a WiFi coverage area first, that is, after the host presets an active authorization permission, the guest terminal implements a wireless network to the host for the first time, and can automatically network without requiring an authorization query. In this example, a network management service end (e.g., a WiFi management platform) may obtain and record terminal device information corresponding to a guest user, where one guest user may correspond to one or more terminal devices, and the network management service end may store a correspondence between the guest user and the terminal device information, and may store information of independent permission or rejection of wireless network access authorization for each terminal device, or may also store information of independent permission or rejection of wireless network access authorization for each guest user. After the owner performs preset active authorization permission on the visitor user, the network management server side can determine which terminal devices are authorized to be accessed according to the stored corresponding relation between the visitor user and the terminal device information, and actively issue authorization information indicating permission to be accessed to the terminal devices, so that the terminal devices can automatically network after accessing a wireless network owned by the owner.
Fig. 3 is a diagram illustrating another example of an interaction process of the wireless network management system according to the embodiment of the present application. As shown in fig. 3, the wireless network management system provided in this embodiment includes: control terminal, network management server and visitor terminal. In this embodiment, the wireless network is a WiFi network, for example, and the WiFi network is provided with a password. In this example, it is taken as an example that the guest control information includes authorization configuration information, where the authorization configuration information may include at least one of: allowed visitor information, refused-authorized visitor information and authorization mode information.
The present example illustrates the process of the guest terminal entering the WiFi coverage area to actively apply for access authorization.
As shown in fig. 3, the wireless network management procedure of this embodiment includes:
s301, the visitor terminal enters a WiFi coverage area;
s302, the visitor terminal acquires WiFi information; exemplarily, at least information such as a WiFi name (SSID), a router MAC address, an encryption type, and signal strength is obtained, and a matched unique WiFi network is determined in combination with the geographical location information; for the situation that the WiFi network sets the SSID broadcast (hidden SSID), the visitor terminal can only judge whether the WiFi coverage area is accessed through auxiliary information such as the geographical position.
S303, judging whether a communication network between the current visitor terminal and the network management server is available or not by the visitor terminal; if available, go to S304, and if not, go to S312.
S304, if the communication network between the guest terminal and the network management server (server in the cloud) is available, the guest terminal uploads an access authorization request to the network management server, where the access authorization request carries guest information (e.g., device information or user information) of the guest terminal.
S305, the network management server monitors an access authorization request of the visitor terminal, and then checks whether the authorization mode of the visitor terminal is an automatic authorization mode or not according to authorization configuration information of a WiFi network; if the authorization mode is automatic, S310 is executed, and if the authorization mode is approval, S306 is executed.
S306, if the authorization mode of the visitor terminal is configured to be an approval authorization mode, the network management server sends the access request of the visitor terminal to the control terminal;
s307, after receiving the access authorization request of the visitor terminal, the control terminal gives a request prompt on an interactive interface, allows or rejects authorization through user operation, and determines authorization response information according to a user operation result; or, for example, the control terminal may also determine authorization response information according to locally recorded authorization configuration information, for example, automatically determine whether the guest terminal that issued the access authorization request is allowed to access the WiFi network according to the guest information that allows authorization or the guest information that rejects authorization of the WiFi network.
S308, the control terminal sends authorization response information to the network management server;
s309, the network management server side stores the latest authorization configuration information according to the authorization response information. The network management server side can update the stored authorization configuration information according to the authorization response information, so that the stored authorization configuration information is in a latest state.
S310, the network management server side sends authorization information to the visitor terminal. The network management server determines whether the visitor terminal is allowed to access the WiFi network according to the authorization response information, and then notifies the visitor terminal by issuing the authorization information.
And if the authorization mode of the visitor terminal is configured to be an automatic authorization mode, the network management server side issues authorization information according to the latest authorization configuration information. In this example, if it is determined that the guest terminal is authorized to allow access, authorization information indicating that access to the WiFi network is allowed may be sent to the guest terminal, where a password of the WiFi network may be carried; if it is determined that the guest terminal is not authorized to allow access, authorization information indicating denial of access to the WiFi network may be sent to the guest terminal.
And S311, after the visitor terminal receives the authorization information issued by the network management server, storing the authorization information, and then executing S313.
S312, when the communication network between the visitor terminal and the network management server is unavailable, the visitor terminal can judge whether the authorization information of the WiFi network is cached locally, namely whether the information of the WiFi network is authorized to be accessed before; if so, S313 is performed, otherwise, S315 is performed.
S313, the visitor terminal judges whether the access to the WiFi network is allowed according to the authorization information;
if the access to the WiFi network is authorized, the guest terminal performs S314, i.e. automatically connects to the WiFi network according to the cached password. If the WiFi network is not authorized to be accessed, S315 is executed, that is, it is determined that the WiFi network connection fails. For the case of determining whether to grant according to the cached authorization information, while performing step S314 (the router needs to have a more complete authorization function support, such as MAC address restriction, etc.), the router (network management server) may grant or deny network access according to the actual latest authorization configuration information, or issue or update the new authorization configuration information after the guest terminal accesses the WiFi network (at this time, the network is temporarily available), and enter step S311 according to the new authorization configuration information.
After S315, the guest terminal may return to S302 to automatically attempt to access the next WiFi network.
And S316, after the visitor terminal is automatically connected with the WiFi network, the network management server can record the connection state of the visitor terminal. For example, the connected terminal information of the current WiFi network may be synchronized to the control terminal for its management.
It should be noted that, in practical implementation, the guest terminal needs to support the relevant WiFi access specification, or an application program capable of managing WiFi connection is installed in the guest terminal. For the mobile phone, due to the limitation of the device authority, the implementation is usually implemented by an operating system layer, or a system tool with higher management authority.
In the embodiments shown in fig. 2 and 3, the WiFi network is provided with a password. In other implementation manners, when the WiFi network does not set the password, the network management service end (router) may configure a white list of MAC addresses, that is, add the MAC address of the guest terminal allowed for authorization into the white list, and the network management service end issues authorization information allowed for authorization to the guest terminal in the white list and issues authorization information rejected for other guest terminals. Illustratively, the authorization information may include a private key password or authentication key information. After receiving the authorization information, the visitor terminal obtains whether the visitor terminal is allowed to access the WiFi network or not through information analysis.
In summary, according to the embodiment of the application, all people in the WiFi network can actively manage and maintain the current authorized and connected visitor information of the WiFi network in real time, so that the phenomenon of network rubbing can be effectively prevented; moreover, for unnecessary authorized or connected visitors, authorization can be conveniently terminated, and the connection of the corresponding terminal can be actively disconnected; for unauthorized visitors, in addition to applying for authorization from the owner of the WiFi network, the owner of the WiFi network can also actively invite and push authorization information of the WiFi network to the visitor, so that the network access process is more flexible and convenient, and the interactive experience between the visitors and the visitors can be enhanced to a certain extent.
Fig. 4 is a flowchart of a wireless network management method according to an embodiment of the present application. As shown in fig. 4, the wireless network management method provided in this embodiment includes:
s401, a control terminal manages visitor control information of a wireless network;
s402, sending the visitor control information to the network management server.
In S401, the control terminal may manage guest control information of a wireless network owned by the user according to the user operation instruction.
Illustratively, the guest control information may include at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and waiting to be disconnected with the wireless network.
Illustratively, when the authorization manner indicated by the guest control information is an approval authorization manner, the method of this embodiment may further include:
the method comprises the steps that a control terminal receives an access authorization request of a visitor terminal of a wireless network;
and returning authorization response information to the visitor terminal according to at least one of the operation instruction, the visitor information allowing authorization and the visitor information refusing authorization.
Illustratively, the guest information may include at least one of: user information, device information of the guest terminal.
Fig. 5 is a schematic diagram of a wireless network management apparatus according to an embodiment of the present application. As shown in fig. 5, the wireless network management apparatus provided in this embodiment is applied to a control terminal, and includes:
a management module 501 adapted to manage guest control information of a wireless network;
a first transmission module 502 adapted to send the guest control information to the network management server.
Illustratively, when the authorization manner indicated by the visitor control information is an approval authorization manner, the first transmission module 502 is further adapted to receive an access authorization request of a visitor terminal of the wireless network; and returning authorization response information to the visitor terminal according to at least one of the operation instruction, the visitor information allowing authorization and the visitor information refusing authorization.
Fig. 6 is a schematic diagram of a terminal according to an embodiment of the present application. As shown in fig. 6, the terminal provided in this embodiment includes: a first communication unit 603, a first processor 601, and a first memory 602; the first processor 601 connects the first communication unit 603 and the first memory 602; the first memory 602 stores a wireless network management program, which, when being read and executed by the first processor 601, performs the following operations: manages visitor control information of the wireless network, and transmits the visitor control information to the network management server through the first communication unit 603. The first processor 601 may include, but is not limited to, a processing device such as a Microprocessor (MCU) or a Programmable logic device (FPGA). The first memory 602 may be used to store software programs and modules of application software, such as program instructions or modules corresponding to the wireless network management method in this embodiment, and the first processor 601 executes various functional applications and data processing by running the software programs and modules stored in the memory, so as to implement the wireless network management method described above. The first memory 602 may include high-speed random access memory and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the first memory 602 may include memory located remotely from the first processor 601, and these remote memories may be connected to the terminals via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The first communication unit 603 can receive or transmit data via a network. In one example, the first communication unit 603 may be a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
For the related description of the wireless network management method, the wireless network management apparatus, and the terminal provided in this embodiment, reference may be made to the description of the control terminal in the foregoing system embodiment, and therefore, no further description is given herein.
Fig. 7 is a flowchart of another wireless network management method according to an embodiment of the present application. As shown in fig. 7, the wireless network management method provided in this embodiment includes:
s701, a network management server receives visitor control information of a wireless network from a control terminal;
s702, according to the visitor control information of the wireless network, sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network, or indicating the visitor terminal connected with the wireless network to disconnect the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
Exemplarily, S702 may include:
after receiving an access authorization request of a visitor terminal to the wireless network, the network management server sends the access authorization request to the control terminal when determining that the authorization mode of the visitor terminal is an approval authorization mode according to visitor control information, and sends authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal.
Illustratively, the network management server comprises a server computing device, wherein the server computing device can store the corresponding relation between the user information and the device information of the visitor terminal; s702 may include:
when determining that the user information allowing authorization exists according to the visitor control information of the wireless network, the server-side computing device actively issues authorization information indicating permission of accessing the wireless network to a visitor terminal corresponding to the user information allowing authorization.
Illustratively, the network management server may include a routing device; s702 may include:
when detecting that the visitor terminal enters the coverage area of the wireless network, the routing equipment issues authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to the visitor control information of the wireless network.
Exemplarily, S702 may include: after receiving an access authorization request of a visitor terminal to the wireless network, a network management server determines that the authorization mode of the visitor terminal is an automatic authorization mode according to visitor control information, inquires whether visitor information carried by the access authorization request is in visitor information which is allowed to be authorized and indicated by the visitor control information, and sends authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
Exemplarily, S702 may include: aiming at a visitor terminal connected with a wireless network, when determining that the authorization permission of the visitor terminal is terminated according to visitor control information, a network management server sends authorization information indicating that the visitor terminal connected with the wireless network refuses to access the wireless network; or the wireless network connection of the visitor terminal is actively disconnected.
Illustratively, authorization information indicating permission to access the wireless network carries a password for the wireless network.
Fig. 8 is a schematic diagram of another wireless network management apparatus according to an embodiment of the present application. As shown in fig. 8, the wireless network management apparatus provided in this embodiment is applied to a network management server, and includes:
a first obtaining module 801 adapted to obtain visitor control information of a wireless network from a control terminal;
a second transmission module 802, adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network according to the guest control information of the wireless network, or indicate the guest terminal of the connected wireless network to disconnect the wireless network, or disconnect the wireless network connection of the guest terminal of the connected wireless network.
Illustratively, the second transmission module 802 may be adapted to transmit authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network in accordance with the guest control information of the wireless network by at least one of:
after receiving an access authorization request of a visitor terminal to the wireless network, when the authorization mode of the visitor terminal is determined to be an approval authorization mode according to visitor control information, sending the access authorization request to a control terminal, and sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal;
when determining that the visitor information allowed to be authorized exists according to the visitor control information, actively sending authorization information indicating that the wireless network is allowed to be accessed to a visitor terminal corresponding to the visitor information allowed to be authorized;
when detecting that the visitor terminal enters the coverage area of the wireless network, issuing authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to the visitor control information;
after receiving an access authorization request of a visitor terminal to the wireless network, when the authorization mode of the visitor terminal is determined to be an automatic authorization mode according to visitor control information, inquiring whether visitor information carried by the access authorization request is in visitor information which is allowed to be authorized and indicated by the visitor control information, and sending authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
Fig. 9 is a schematic diagram of an apparatus provided in an embodiment of the present application. As shown in fig. 9, the apparatus provided in this embodiment includes: a second communication unit 903, a second processor 901 and a second memory 902; the second processor 901 is connected to the second communication unit 903 and the second memory 902; the second memory 902 stores a wireless network management program, and the wireless network management program performs the following operations when being read and executed by the second processor 901: acquiring visitor control information of the wireless network from the control terminal through the second communication unit 903; according to the guest control information of the wireless network, authorization information indicating permission or denial of access to the wireless network is transmitted to the guest terminal of the wireless network through the second communication unit 903, or the guest terminal connected to the wireless network is instructed to disconnect the wireless network connection, or the wireless network connection of the guest terminal connected to the wireless network is disconnected.
For the descriptions of the second processor, the second memory and the second communication unit in this embodiment, reference may be made to the descriptions of the first processor, the first memory and the first communication unit, which are not repeated herein.
For the related description of the wireless network management method, the wireless network management device, and the terminal provided in this embodiment, reference may be made to the description of the network management server in the foregoing system embodiment, and therefore, no further description is given herein.
Fig. 10 is a flowchart of another wireless network management method according to an embodiment of the present application. As shown in fig. 10, the wireless network management method provided in this embodiment includes:
s1001, a visitor terminal receives authorization information which is sent by a network management server and indicates permission or refusal of access to a wireless network; or after the wireless network is detected, uploading a network authorization request to the network management server, and receiving authorization information which indicates that the wireless network is allowed or refused to be accessed and is sent by the network management server; or after the wireless network is detected, acquiring the authorization information of the wireless network from a local cache;
and S1002, performing network connection according to the authorization information of the wireless network.
Exemplarily, the method may further include: after the visitor terminal is successfully connected with the wireless network, after receiving the authorization information which indicates that the access to the wireless network is refused and is sent by the network management server, the visitor terminal is disconnected with the wireless network and deletes the authorization information which indicates that the local cache allows the access to the wireless network.
Illustratively, authorization information indicating permission to access the wireless network may carry a password for the wireless network.
Fig. 11 is a schematic diagram of another wireless network management apparatus according to an embodiment of the present application. As shown in fig. 11, the wireless network management apparatus provided in this embodiment is applied to a guest terminal, and includes:
a second obtaining module 1101, adapted to receive authorization information that indicates permission or denial of access to the wireless network and is issued by the network management server; or after the wireless network is detected, uploading a network authorization request to the network management server, and receiving authorization information which indicates that the wireless network is allowed or refused to be accessed and is sent by the network management server; or after the wireless network is detected, acquiring the authorization information of the wireless network from a local cache;
the network connection module 1102 is adapted to perform network connection according to the authorization information of the wireless network.
Exemplarily, the apparatus of this embodiment may further include: and the processing module is suitable for disconnecting the connection with the wireless network and deleting the authorization information which is cached locally and indicates that the wireless network is allowed to be accessed after the authorization information which indicates that the wireless network is refused to be accessed and is sent by the network management server side is received after the wireless network is successfully connected.
Fig. 12 is a schematic diagram of a terminal according to an embodiment of the present application. As shown in fig. 12, the terminal provided in this embodiment includes: a third processor 1201 and a third memory 1202; the third memory 1202 stores a wireless network management program, which when read and executed by the third processor 1201 performs the following operations: receiving authorization information which is issued by a network management server and indicates permission or refusal of access to a wireless network; or after the wireless network is detected, uploading a network authorization request to a network management server, and receiving authorization information which indicates permission or refusal of access to the wireless network and is sent by the network management server; or after the wireless network is detected, acquiring the authorization information of the wireless network from a local cache; and performing network connection according to the authorization information of the wireless network.
Exemplarily, the terminal provided in this embodiment may further include: the third communication unit 1203 is adapted to implement communication with the network management server.
For the descriptions of the third processor, the third memory and the third communication unit in this embodiment, reference may be made to the descriptions of the first processor, the first memory and the first communication unit, which are not repeated herein.
For the related description of the wireless network management method, apparatus, and terminal provided in this embodiment, reference may be made to the description of the guest terminal in the above system embodiment, and therefore, no further description is given here.
In addition, the embodiment of the application also provides a terminal, which comprises a display module and a display module, wherein the display module is suitable for providing an interactive interface; one of the following is included on the interactive interface: the visitor control information processing system comprises a setting interface of visitor control information of a wireless network and a processing interface of an access authorization request aiming at a visitor terminal.
For the operation of the interactive interface, reference may be made to the description of the above system embodiment, and therefore, the description thereof is omitted here.
In addition, an embodiment of the present application further provides a computer readable medium, in which a wireless network management program is stored, and the wireless network management program, when executed by a processor, implements the steps of the wireless network management method provided in any of the above aspects.
One of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules or units in the apparatus disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules or units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the components may be implemented as software executed by a processor, such as a digital signal processor or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
The foregoing shows and describes the general principles and features of the present application, together with the advantages thereof. The present application is not limited to the above-described embodiments, and the embodiments and descriptions are only illustrative of the principles of the present application, and various changes and modifications can be made without departing from the spirit and scope of the present application, and these changes and modifications are intended to fall within the scope of the present application as claimed.

Claims (28)

1. A wireless network management system, comprising: the system comprises a control terminal, a network management server and a visitor terminal; the network management server is connected with the control terminal and the visitor terminal;
the control terminal is suitable for managing visitor control information of a wireless network and sending the visitor control information to the network management server; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage of the wireless network;
the network management server is suitable for sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network according to the visitor control information of the wireless network, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
2. The system of claim 1, wherein the network management server is adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network based on the guest control information of the wireless network by:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server sends the access authorization request to the control terminal when determining that the authorization mode of the visitor terminal is an approval authorization mode according to the visitor control information, and sends authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal.
3. The system of claim 1, wherein the network management server comprises a server computing device, and the server computing device stores a correspondence between user information and device information of the guest terminal; the server-side computing device is suitable for actively sending authorization information indicating permission of accessing the wireless network to a visitor terminal corresponding to the user information allowing authorization when determining that the user information allowing authorization exists according to the visitor control information.
4. The system of claim 1, wherein the network management server comprises a routing device, and the routing device is adapted to issue authorization information indicating permission or denial of access to the wireless network to the guest terminal according to the guest control information when detecting that the guest terminal enters a coverage area of the wireless network.
5. The system of claim 1, wherein the network management server is adapted to send authorization information indicating permission or denial of access to the wireless network to the guest terminal of the wireless network based on the guest control information of the wireless network by:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server inquires whether visitor information carried by the access authorization request is in visitor information which is allowed to be authorized and indicated by the visitor control information when determining that the authorization mode of the visitor terminal is an automatic authorization mode according to the visitor control information, and sends authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
6. The system according to any one of claims 2 to 5, wherein the authorization information indicating permission to access the wireless network carries a password of the wireless network.
7. The system of claim 1, wherein the guest terminal is adapted to buffer the received authorization information after successful access to the wireless network, and determine whether to allow access to the wireless network based on the buffered authorization information when the wireless network is detected again.
8. The system of claim 7, wherein the network management server is further adapted to transmit authorization information indicating denial of access to the wireless network to the guest terminal connected to the wireless network when it is determined from the guest control information that the authorization permission of the guest terminal is terminated;
and the visitor terminal is suitable for disconnecting the wireless network after receiving the authorization information indicating that the wireless network is refused to be accessed, and deleting the authorization information which is cached before and indicates that the wireless network is allowed to be accessed.
9. A wireless network management method, comprising:
the control terminal manages visitor control information of a wireless network and sends the visitor control information to a network management server;
the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage range of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage range of the wireless network.
10. The method of claim 9, wherein when the authorization manner indicated by the visitor control information is an approval authorization manner, the method further comprises:
the control terminal receives an access authorization request of a visitor terminal of the wireless network;
and returning authorization response information to the guest terminal according to at least one of the operation instruction, the guest information allowing authorization and the guest information refusing authorization.
11. The method of claim 9, wherein the visitor information comprises at least one of: user information, device information of the guest terminal.
12. A wireless network management method, comprising:
the network management server side acquires visitor control information of the wireless network from the control terminal; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage range of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned in the coverage range of the wireless network;
according to the visitor control information of the wireless network, sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
13. The method of claim 12, wherein sending authorization information indicating permission or denial of access to the wireless network to a guest terminal of the wireless network according to the guest control information of the wireless network comprises:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server sends the access authorization request to a control terminal when determining that the authorization mode of the visitor terminal is an approval authorization mode according to the visitor control information, and sends authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to authorization response information fed back by the control terminal.
14. The method of claim 12, wherein the network management server comprises a server computing device, and the server computing device stores a correspondence between user information and device information of the guest terminal;
the sending, to a guest terminal of the wireless network, authorization information indicating whether to allow or deny access to the wireless network according to the guest control information of the wireless network includes:
and when determining that the user information allowing authorization exists according to the visitor control information of the wireless network, the server-side computing equipment actively issues authorization information indicating permission of accessing the wireless network to a visitor terminal corresponding to the user information allowing authorization.
15. The method of claim 12, wherein the network management server comprises a routing device; the sending, to a guest terminal of the wireless network, authorization information indicating whether to allow or deny access to the wireless network according to the guest control information of the wireless network includes:
and when detecting that the visitor terminal enters the coverage area of the wireless network, the routing equipment issues authorization information indicating permission or refusal of access to the wireless network to the visitor terminal according to the visitor control information of the wireless network.
16. The method of claim 12, wherein sending authorization information indicating permission or denial of access to the wireless network to a guest terminal of the wireless network according to the guest control information of the wireless network comprises:
after receiving an access authorization request of the visitor terminal to the wireless network, the network management server inquires whether visitor information carried by the access authorization request is in visitor information which is allowed to be authorized and indicated by the visitor control information when determining that the authorization mode of the visitor terminal is an automatic authorization mode according to the visitor control information, and sends authorization information which indicates permission or refusal to access the wireless network to the visitor terminal according to an inquiry result.
17. The method of claim 12, wherein sending authorization information indicating permission or denial of access to the wireless network to a guest terminal of the wireless network according to the guest control information of the wireless network comprises:
for a guest terminal connected with the wireless network, the network management server sends authorization information indicating that the access to the wireless network is refused to the guest terminal connected with the wireless network when determining that the authorization permission of the guest terminal is terminated according to the guest control information; or actively disconnecting the wireless network connection of the visitor terminal.
18. The method according to any one of claims 12 to 16, wherein the authorization information indicating permission to access the wireless network carries a password of the wireless network.
19. A wireless network management method, comprising:
the visitor terminal receives authorization information which is sent by a network management server and indicates permission or refusal of access to the wireless network; or after detecting the wireless network, uploading a network authorization request to a network management server, and receiving authorization information which is issued by the network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, obtaining the authorization information of the wireless network from a local cache;
performing network connection according to the authorization information of the wireless network;
the authorization information of the wireless network is obtained by the network management server according to visitor control information; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage of the wireless network.
20. The method of claim 19, further comprising:
after the visitor terminal is successfully connected with the wireless network, after receiving the authorization information which indicates that the wireless network is refused to be accessed and is sent by the network management server, the visitor terminal is disconnected with the wireless network, and the authorization information which indicates that the wireless network is allowed to be accessed and is locally cached is deleted.
21. The method of claim 19 or 20, wherein the authorization information indicating permission to access the wireless network carries a password of the wireless network.
22. A terminal, comprising:
the display module is suitable for providing an interactive interface; the interactive interface comprises one of the following components: the system comprises a setting interface of visitor control information of a wireless network and a processing interface aiming at an access authorization request of a visitor terminal; wherein the visitor control information comprises at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage of the wireless network.
23. A terminal, comprising: the system comprises a first communication unit, a first processor and a first memory; the first processor is connected with the first communication unit and the first memory; wherein the first memory stores a wireless network management program that, when read and executed by the first processor, performs the following:
managing visitor control information of a wireless network and sending the visitor control information to a network management server through the first communication unit; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage range of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage range of the wireless network.
24. A wireless network management device, comprising: the second communication unit, the second processor and the second memory; the second processor is connected with the second communication unit and the second memory; wherein the second memory stores a wireless network management program that, when read executed by the second processor, performs the following:
obtaining visitor control information of a wireless network from a control terminal through the second communication unit; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage range of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned in the coverage range of the wireless network;
according to the visitor control information of the wireless network, sending authorization information indicating permission or refusal of access to the wireless network to the visitor terminal of the wireless network through the second communication unit, or indicating that the visitor terminal connected with the wireless network is disconnected from the wireless network, or disconnecting the wireless network connection of the visitor terminal connected with the wireless network.
25. A terminal, comprising: a third processor and a third memory; wherein the third memory stores a wireless network management program that, when read and executed by the third processor, performs the following:
receiving authorization information which is issued by a network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, uploading a network authorization request to a network management server, and receiving authorization information which is issued by the network management server and indicates permission or refusal of access to the wireless network; or after the wireless network is detected, obtaining the authorization information of the wireless network from a local cache;
performing network connection according to the authorization information of the wireless network;
the authorization information of the wireless network is obtained by the network management server according to visitor control information; the guest control information includes at least one of: allowing authorized visitor information, authorization mode information, refusing authorized visitor information, and visitor information to be disconnected and connected with the wireless network; the visitor control information is set under the condition that the visitor terminal is positioned outside the coverage of the wireless network, or the visitor control information is set under the condition that the visitor terminal is positioned within the coverage of the wireless network.
26. A computer-readable medium, in which a wireless network management program is stored, which, when being executed by a processor, carries out the steps of the wireless network management method according to any one of claims 9 to 11.
27. A computer-readable medium, in which a wireless network management program is stored, which, when being executed by a processor, carries out the steps of the wireless network management method according to any one of claims 12 to 18.
28. A computer-readable medium, in which a wireless network management program is stored, which when executed by a processor carries out the steps of the wireless network management method according to any one of claims 19 to 21.
CN201711073072.9A 2017-11-03 2017-11-03 Wireless network management method and system Active CN109756915B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711073072.9A CN109756915B (en) 2017-11-03 2017-11-03 Wireless network management method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711073072.9A CN109756915B (en) 2017-11-03 2017-11-03 Wireless network management method and system

Publications (2)

Publication Number Publication Date
CN109756915A CN109756915A (en) 2019-05-14
CN109756915B true CN109756915B (en) 2022-08-19

Family

ID=66399425

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711073072.9A Active CN109756915B (en) 2017-11-03 2017-11-03 Wireless network management method and system

Country Status (1)

Country Link
CN (1) CN109756915B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110167027B (en) * 2019-05-23 2022-04-05 上海尚往网络科技有限公司 Method, equipment and storage medium for acquiring access password of wireless access point
CN112153645B (en) * 2019-06-28 2024-06-21 北京奇虎科技有限公司 Method and device for preventing network from being rubbed and router
CN110351719B (en) * 2019-07-16 2023-03-14 深圳市信锐网科技术有限公司 Wireless network management method, system, electronic equipment and storage medium
CN110831008A (en) * 2019-11-04 2020-02-21 Oppo广东移动通信有限公司 Access equipment control method and related device
CN111083682A (en) * 2019-12-12 2020-04-28 深圳市高德信通信股份有限公司 Wireless network connection system
WO2021134344A1 (en) * 2019-12-30 2021-07-08 华为技术有限公司 Method for controlling communication access, ap and communication device
CN111866994B (en) * 2020-07-26 2021-02-05 广云物联网科技(广州)有限公司 Method and device for rapidly distributing network at hot spot
CN116056184B (en) * 2022-05-27 2023-11-07 荣耀终端有限公司 Network access method, system, electronic equipment and storage medium
CN116113012B (en) * 2023-04-14 2023-07-21 微网优联科技(成都)有限公司 Access control method, device and system of wireless router and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540128B (en) * 2014-12-26 2018-10-09 北京奇虎科技有限公司 The method, apparatus and system of wireless network access
CN107231338B (en) * 2016-03-25 2022-07-08 北京搜狗科技发展有限公司 Network connection method, device and device for network connection

Also Published As

Publication number Publication date
CN109756915A (en) 2019-05-14

Similar Documents

Publication Publication Date Title
CN109756915B (en) Wireless network management method and system
US11736292B2 (en) Access token management method, terminal, and server
CN108307674B (en) Method and equipment for guaranteeing terminal safety
CN108337677B (en) Network authentication method and device
US11824644B2 (en) Controlling electronically communicated resources
US10116583B2 (en) Controlling resources used by computing devices
CN107579958B (en) Data management method, device and system
CN104519020B (en) Manage method, server and the system of wireless network login password sharing function
US11075895B2 (en) Cloud operation interface sharing method, related device, and system
CN110602216A (en) Method and device for using single account by multiple terminals, cloud server and storage medium
KR101119206B1 (en) A system for controlled access to information contained in a terminal
US20140090034A1 (en) Smart plug or cradle
CN108293055A (en) Method, apparatus and system for authenticating to mobile network and for by the server of device authentication to mobile network
CN108200110A (en) A kind of data processing method, apparatus and system
CN106789843B (en) Method, PORTAL server and system for sharing internet access
CN110198540B (en) Portal authentication method and device
CN107396295B (en) Method and equipment for carrying out wireless connection pre-authorization on user equipment
CN106330899A (en) Private cloud device account management method and system, electronic device and server
GB2582617A (en) A computing device, method and system for controlling the accessibility of data
CN111416815B (en) Message processing method, electronic device and storage medium
US20180192281A1 (en) Method and apparatus for virtualizing sim card, terminal and network side device
US20160057223A1 (en) Method for processing data of a social network user
KR102247132B1 (en) Extended Authentication Method for Resource Access Control in a Cloud Environment Composed of Multiple Edge Servers
CN116015695A (en) Resource access method, system, device, terminal and storage medium
KR101160903B1 (en) Blacklist extracting system and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant