Disclosure of Invention
It is an object of the present application to provide a method for wireless connection pre-authorization for a user equipment.
According to an aspect of the present application, there is provided a method at an information-aware device for wireless connection pre-authorization of a user device, the method comprising:
acquiring equipment image information corresponding to user equipment;
determining MAC address information of the user equipment based on the equipment image information;
sending wireless connection pre-authorization request information about the user equipment to a corresponding network device or one or more wireless routing devices, wherein the wireless connection pre-authorization request information comprises the user equipment identification information.
According to another aspect of the present application, a method for performing wireless connection pre-authorization on a user equipment at a network equipment side is provided, wherein the method comprises:
receiving wireless connection pre-authorization request information about the user equipment, which is sent by an information sensing device, wherein the wireless connection pre-authorization request information comprises user equipment identification information of the user equipment;
determining one or more wireless routing devices corresponding to the information-aware device;
and sending the user equipment identification information to the one or more wireless routing devices.
According to an aspect of the present application, there is provided a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device, the method comprising:
receiving user equipment identification information of user equipment sent by network equipment;
and performing wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the present application, there is provided a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device, the method comprising:
receiving user equipment identification information of user equipment, which is sent by information sensing equipment corresponding to wireless routing equipment, wherein the information sensing equipment and the wireless routing equipment are deployed in the same physical space or belong to the same equipment provider;
and performing wireless connection pre-authorization on the user equipment identification information.
According to an aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, the method comprising:
the method comprises the steps that information perception equipment obtains equipment image information corresponding to user equipment, determines user equipment identification information of the user equipment based on the equipment image information, and sends wireless connection pre-authorization request information related to the user equipment to corresponding network equipment, wherein the wireless connection pre-authorization request information comprises the user equipment identification information;
the network equipment determines one or more wireless routing equipment corresponding to the information perception equipment and sends the user equipment identification information and the pre-authorization information to the one or more wireless routing equipment;
and the one or more wireless routing devices receive the user equipment identification information and carry out wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the present application, there is provided a method for wireless connection pre-authorization for a user equipment, the method comprising:
the method comprises the steps that information perception equipment obtains equipment image information corresponding to user equipment, determines user equipment identification information of the user equipment based on the equipment image information, and sends wireless connection pre-authorization request information related to the user equipment to one or more corresponding wireless routing devices, wherein the wireless connection pre-authorization request information comprises the user equipment identification information;
the one or more wireless routing devices receive the wireless connection pre-authorization request information and perform wireless connection pre-authorization on the MAC address information;
wherein the information-aware device and the one or more wireless routing devices are deployed in the same physical space or belong to the same device provider.
According to an aspect of the present application, there is provided an information-aware device for wireless connection pre-authorization of a user device, the information-aware device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring equipment image information corresponding to user equipment;
determining user equipment identification information of the user equipment based on the device image information;
sending wireless connection pre-authorization request information about the user equipment to a corresponding network device or one or more wireless routing devices, wherein the wireless connection pre-authorization request information comprises the user equipment identification information.
According to another aspect of the present application, there is provided a network device for wireless connection pre-authorization of a user equipment, the network device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving wireless connection pre-authorization request information about the user equipment, which is sent by an information sensing device, wherein the wireless connection pre-authorization request information comprises user equipment identification information of the user equipment;
determining one or more wireless routing devices corresponding to the information-aware device;
and sending the user equipment identification information to the one or more wireless routing devices.
According to an aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, the wireless routing device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving user equipment identification information of user equipment sent by network equipment;
and performing wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, the wireless routing device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving user equipment identification information of user equipment, which is sent by information sensing equipment corresponding to one or more wireless routing equipment, wherein the information sensing equipment and the one or more wireless routing equipment are deployed in the same physical space or belong to the same equipment provider;
and performing wireless connection pre-authorization on the user equipment identification information.
According to one aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
acquiring equipment image information corresponding to user equipment;
determining user equipment identification information of the user equipment based on the device image information;
sending wireless connection pre-authorization request information about the user equipment to a corresponding network device or one or more wireless routing devices, wherein the wireless connection pre-authorization request information comprises the user equipment identification information.
According to another aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving wireless connection pre-authorization request information about the user equipment, which is sent by an information sensing device, wherein the wireless connection pre-authorization request information comprises user equipment identification information of the user equipment;
determining one or more wireless routing devices corresponding to the information-aware device;
and sending the user equipment identification information to the one or more wireless routing devices.
According to one aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving user equipment identification information of user equipment sent by network equipment;
and performing wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving user equipment identification information of user equipment, which is sent by information sensing equipment corresponding to one or more wireless routing equipment, wherein the information sensing equipment and the one or more wireless routing equipment are deployed in the same physical space or belong to the same equipment provider;
and performing wireless connection pre-authorization on the user equipment identification information.
Compared with the prior art, the method for performing wireless connection pre-authorization on the user equipment can acquire the related information of the user equipment from the image information through the third-party equipment before the user equipment initiates the connection request, and perform wireless connection pre-authorization on the user equipment on the wireless access point or the wireless routing equipment to which the user equipment needs to be connected, so that the user can directly connect the equipment to the corresponding wireless access point or the corresponding wireless routing equipment, the process can be performed under the condition that the user does not sense, the operation time of the user is saved, and the use experience of the user is improved.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices, which may be suitable for use in the present application, are also encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
Fig. 1 illustrates a specific implementation scenario of a method for pre-authorizing a wireless connection for a user equipment according to an aspect of the present application, and fig. 2 illustrates a flowchart of the method for pre-authorizing a wireless connection for a user equipment based on the scenario. The method for pre-authorizing a wireless connection for a user equipment is described in detail below based on the scenario illustrated in fig. 1.
The information sensing device 102 obtains device image information corresponding to the user device 101 in step S11 (for example, by taking a picture or by reading a local and cloud picture, where the image includes a two-dimensional code, text information, and the like for obtaining user device identification information of the user device 101), determines user device identification information of the user device 101 based on the device image information in step S12, and sends wireless connection pre-authorization request information about the user device 101 to the corresponding network device 103 in step S13, where the wireless connection pre-authorization request information includes the user device identification information. After receiving the wireless connection pre-authorization request information sent by the information aware device 102 in step S21, the network device 103 determines the wireless routing device 104 corresponding to the information aware device 102 in step S22 (e.g., the wireless routing device 104 and the information aware device 102 communicate via wired/wireless network connection, or the wireless routing device 104 and the information aware device 102 correspond to the same user account name or user number in a network communication application), and sends the user device identification information of the user device 101 to the wireless routing device 104 in step S24 based on the user device identification information of the user device 101 in step S23; the user equipment identification information may be further queried for pre-authorization information of the user equipment identification information with respect to the wireless routing device 104 (or a wireless access point provided by the wireless routing device 104) (e.g., if the user equipment identification information exists in a pre-authorization device identification information list of the wireless routing device 104, or if the status of the user equipment identification in a device pre-authorization information list of the wireless routing device 104 is set to "pre-authorized", the pre-authorization information is "pre-authorization successful"), and the user equipment identification information of the user equipment 101 and the corresponding pre-authorization information are sent to the wireless routing device 104 in step S24. When the wireless router 104 receives the ue id information sent by the network device 103 in step S31, and inquires that the ue id information has been changed from the local ue id information list to "pre-authorization successful", the wireless router 104 performs wireless connection pre-authorization on the ue id information of the ue 101 in step S32; when the wireless router 104 receives the user equipment identification information sent by the network device 103 and the pre-authorization information of the user equipment 101 about the wireless router 104 in step S31, and the pre-authorization information contains "pre-authorization success", the wireless router 104 performs wireless connection pre-authorization on the user equipment identification information of the user equipment 101 in step S32. The wireless connection pre-authorization for the user equipment refers to that the wireless routing equipment acquires a user equipment identifier (such as a MAC address or other identification information) of the user equipment obtaining connection authorization in advance; when the wireless routing equipment receives a connection request or an authentication request from certain user equipment and the user equipment identification of the user equipment obtains connection authorization, the user equipment is allowed to access the network through the connection request or the authentication request of the user equipment.
The information sensing device 102 is a device that can obtain device image information corresponding to the user device 101, communicate with the network device 103 or the wireless routing device 104, and exchange data, and communicate with the network device 103 or the wireless routing device 104 through a wired or wireless network connection, for example. The device image information corresponding to the user device 101 includes any one of: 1) the graphic code information is used for acquiring the user equipment identification information; 2) image information containing the user equipment identification information; 3) visual characteristic image information of the user device (e.g., including, but not limited to, desktop layout, screen saver, facial image information of the bound user, wear condition of the device, etc.). The user equipment identification information of the user equipment 101 includes, but is not limited to: MAC address information, device identification information (such as IMEI, device serial number, etc.) of the user equipment 101, bluetooth identification information, user identification information of a user to which the user equipment 101 belongs (such as a user account of the user in a wireless connection application), and communication identification information of the user equipment 101 (such as a phone number corresponding to a phone card in the user equipment 101).
In some embodiments of the present application, after receiving the user equipment identification information of the user equipment 101 sent by the network device 103, the wireless routing device 104 may directly perform wireless connection pre-authorization on the user equipment identification information. For example, the configuration information for the wireless routing device 104 can include a switch for the owner of the wireless routing device 104 to select whether to enable the wireless connection pre-authorization function. If the wireless connection pre-authorization function of the wireless routing device 104 is not enabled, the wireless routing device 104 may not perform wireless connection pre-authorization on the user equipment identification information of the user equipment; if the wireless connection pre-authorization function of the wireless routing device 104 is in an enabled state, when the wireless routing device 104 receives the user device identification information of the user device 101 sent by the network device 103, and adds the user device identification information to the trusted device set of the wireless routing device 104, based on the trusted device set, the wireless routing device 104 may perform wireless connection pre-authorization on the user device identification information of the user device; if the wireless connection pre-authorization function of the wireless routing device 104 is not enabled, the wireless connection pre-authorization may not be performed on the user equipment identification information of the user equipment 101 even if the wireless routing device 104 detects that the user equipment 101 is included in the trusted device set. In addition, when there are multiple wireless routing devices 104, respective pre-authorized device trust device sets may be further respectively set to implement diversified and personalized rights management, for example, only a part of the multiple wireless routing devices 104 respond to the user device identification information sent by the network device 103 to perform wireless connection pre-authorization on the user device 101.
In other embodiments, the network device 103 further queries for pre-authorization information that identifies the user device 101 with respect to the wireless routing device 104 and sends the pre-authorization information to the wireless routing device 104, for example, the network device 103 may determine whether the user device 101 may be pre-authorized to connect to a wireless access point corresponding to the wireless routing device 104 based on the MAC address information query of the user device 101, so as to obtain the pre-authorization information (e.g., including success of pre-authorization, failure of pre-authorization, or no need for re-authorization); after the wireless routing device 104 receives the pre-authorization information and the MAC address of the user device 101 sent by the network device 103, if the pre-authorization information includes a successful pre-authorization, the wireless routing device 104 performs wireless connection pre-authorization on the MAC address of the user device 101, and accordingly, if the pre-authorization information includes a failed pre-authorization or does not need to repeat authorization, the wireless routing device 104 does not need to perform wireless connection pre-authorization on the MAC address device identification information of the user device 101. Further, in other embodiments, the pre-authorization information further includes pre-authorization valid period information corresponding to user equipment identification information of the user equipment; the wireless routing device 104 performs wireless connection pre-authorization on the user device identification information of the user device 101 based on the pre-authorization valid period information, for example, when the owner sets the pre-authorization valid period at the end of the wireless routing device 104 to 14: 00-18: 00 of saturday, and when the guest does the guest in the owner's house and the mobile phone of the guest is pre-authorized to be connected to the wireless router in the owner's house, the wireless router may only pre-authorize the mobile phone of the guest to be connected to the wireless router in 14: 00-18: 00 of saturday; if the user equipment is connected to the wireless router outside the pre-authorization validity period information, additional authorization or authentication is required. In addition, when there are multiple wireless routing devices 104, respective pre-authorization information may also be set respectively to implement diversified and personalized rights management, for example, only a part of the multiple wireless routing devices 104 respond to the user device identification information sent by the network device 103 to perform wireless connection pre-authorization on the user device 101, or the pre-authorization valid period is only valid for a part of the wireless routing devices, while other wireless routing devices keep pre-authorization for wireless connection of the user device 101, or keep pre-authorization for non-wireless connection of the user device 101.
In addition, in the present application, the information-aware device may perform wireless connection pre-authorization of the user equipment on one or more corresponding wireless routing devices.
In some embodiments, the information sensing device 102 is provided with a wired/wireless communication module for communicating with the network device 103, and a camera for acquiring device image information corresponding to the user device 101, where the device image information is a two-dimensional code image. After the information sensing device 102 acquires the two-dimensional code image through the camera thereof, the user device identification information of the user device 101 is acquired from the two-dimensional code image. For example, the information sensing device 102 directly extracts MAC address information of the user equipment 101 contained in the two-dimensional code image; or extracting an access address on the network contained in the two-dimensional code image and reading the MAC address information of the user equipment 101 according to the access address. The two-dimensional code for acquiring the user equipment identification information of the user equipment 101 may be generated by the user equipment 101 itself (for example, the two-dimensional code is presented through a display screen of the user equipment 101), may be generated in advance and manufactured as a physical card or drawn/printed on a physical carrier (for example, printed on the front or back of an identification card), and may also be presented by other equipment (for example, presented through display screens of user equipments of other users, or presented through a display screen of a hardware device of a network service provider). The information sensing device 102 sends the user device identification information of the user device 101 to the network device 103 (e.g., a network server), the network device 103 queries, in a local database or an accessible network database, the wireless routing device 104 that matches the user device identification of the user device 101, and whether the user device identification has a pre-authorization state in which the right is pre-authorized on the wireless routing device 104, and then sends the user device identification and the pre-authorization state to the corresponding wireless routing device 104. If the user device identification of user device 101 is authorized to be pre-authorized, wireless routing device 104 pre-authorizes the user device identification, for example, stores the user device identification (e.g., MAC address) in a pre-authorization list in a local or accessible database, or marks the user device identification (e.g., MAC address) in a user device identification (MAC address) list as "pre-authorization successful".
Thereafter, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101, and the user device identification of the user device 101 has been pre-authorized for wireless connection (for example, the corresponding MAC address exists in a pre-authorized MAC address list local to the wireless routing device 104), the wireless routing device 104 sends an authentication pass response message to the user device 101, so as to establish a wireless network connection between the user device 101 and the wireless routing device 104. The corresponding relationship between the user equipment and the network equipment or the wireless routing equipment may be determined by a matching relationship between the respective identification information, for example, if two pieces of equipment correspond to the same user account name or user number in the network communication application, the two pieces of equipment correspond to each other. Of course, the identification information (e.g. MAC address information) of another device may also be queried in the database according to the matching relationship based on the identification information (e.g. MAC address information) of one device.
For example, a company distributes an employee identification card to each employee, and the identification card is printed with a two-dimensional code image containing identification information of the employee and MAC address information of his mobile phone or laptop. Before an employee enters an office place, the identity recognition device scans the two-dimensional code image on the identity recognition card of the employee through the camera of the identity recognition device, so that the MAC address information of the mobile phone and the portable computer of the employee is obtained, and the MAC address information of the mobile phone and the portable computer of the employee is sent to a network server of a company. The network server inquires and determines the wireless router in the office according to the MAC address/addresses (for example, through the mapping relation between the wireless router and the user equipment; or firstly determines the employee number of the employee, then locates the office and finally matches the wireless router in the office); the network server inquires the connection authority of the employee to connect the mobile phone and the portable computer of the employee to the wireless router, and sends the MAC address information and the connection authority to the wireless router. The wireless router receives the MAC address information and the connection authority, and if the employee is authorized to connect the employee to the wireless router, the wireless router performs wireless connection pre-authorization on the MAC address information of the employee's mobile phone and the portable computer, for example, the MAC address information is added to a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or a pre-authorization state corresponding to the MAC address/MAC addresses is updated to be "pre-authorization successful" in the database local to the wireless router or accessible to the wireless router. When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In other embodiments, pre-authorizing the wireless connection for the user device 101 may be based on other user device identification information of the user device 101, including, but not limited to: the device identification information (such as IMEI, device serial number, etc.) of the user equipment 101, the bluetooth identification information, the user identification information of the user to which the user equipment 101 belongs (such as the user account of the user in the wireless connection application), and the communication identification information of the user equipment 101 (such as the phone number corresponding to the phone card in the user equipment 101). A method for enabling a user equipment 101 to access a network through a wireless routing device 104 is that a network device 103 queries user equipment identification information corresponding to the user equipment 101 based on device image information corresponding to the user equipment 101, and sends the user equipment identification information to the wireless routing device 104 for pre-authorization of wireless network access; after establishing the wireless connection between the user equipment 101 and the wireless routing device 104 (at this time, the user equipment 101 cannot access the network through the wireless routing device 104), the user equipment 101 sends the corresponding user equipment identification information to the wireless routing device 104 through the wireless connection with the wireless routing device 104 for verification, and if the user equipment identification information sent by the user equipment 101 is consistent with the user equipment identification information sent by the previous network device, the wireless routing device 104 allows the user equipment 101 to access the network.
In other embodiments, the information sensing device 102 collects an image of a text with user device identification information of the user device 101 through a camera of the information sensing device, and extracts text information from the image by performing Character Recognition (e.g., OCR) on the image, and identifies the user device identification information of the user device 101 therein. For example, after obtaining text information in an image, the information-perceiving device 102 determines the MAC address information of the user device 101 according to the format of the MAC address information (e.g., the MAC address is typically a 6-byte hexadecimal number such as 12:34:56:78:9A: BC, and the information-perceiving device 102 matches the recognized text information with the format) or according to keyword information in the text information (e.g., keywords such as "MAC", "WLAN MAC", etc. are detected in the text information). The text containing the MAC address information of the user equipment 101 may be generated by the user equipment 101 itself (for example, the text information is presented through a display screen of the user equipment 101), may be generated in advance and manufactured as a physical card or drawn/printed on a physical carrier (for example, printed on the front or back of an identification card), and may be presented by other equipment (for example, presented through display screens of user equipments of other users, or presented through a display screen of a hardware device of a network service provider). The information sensing device 102 sends the MAC address information of the user device 101 to the network device 103 (e.g., a network server), the network device 103 queries, in a local database or an accessible network database, the wireless routing device 104 with the MAC address matching the user device 101, and whether the MAC address has a pre-authorization status with a right to be pre-authorized on the wireless routing device 104, and then sends the MAC address and the pre-authorization status to the corresponding wireless routing device 104. If the MAC address of user device 101 is authorized to be pre-authorized, wireless routing device 104 pre-authorizes the MAC address, for example, by storing the MAC address in a pre-authorization list in a local or accessible database, or by marking the MAC address as "pre-authorization successful" in the MAC address list.
Thereafter, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101, and the user device identification of the user device 101 has been pre-authorized for wireless connection (for example, the corresponding MAC address exists in a pre-authorized MAC address list local to the wireless routing device 104), the wireless routing device 104 sends an authentication pass response message to the user device 101, so as to establish a wireless network connection between the user device 101 and the wireless routing device 104. The corresponding relationship between the user equipment and the network equipment or the wireless routing equipment may be determined by a matching relationship between the respective identification information, for example, if two pieces of equipment correspond to the same user account name or user number in the network communication application, the two pieces of equipment correspond to each other. Of course, the identification information (e.g. MAC address information) of another device may also be queried in the database according to the matching relationship based on the identification information (e.g. MAC address information) of one device.
For example, a company distributes an employee identification card to each employee, which is printed with text information containing the identity information of the employee and the MAC address information of his mobile phone or laptop. Before an employee enters an office, the identification device shoots text information on an identification card of the employee through a camera of the identification device, local OCR operation is carried out, or an image with the text information is sent to a network server, the network server carries out OCR operation, MAC address information of a mobile phone and a portable computer of the employee is obtained, and the MAC address information of the mobile phone and the portable computer of the employee is sent to a network server of a company. The network server inquires and determines the wireless router in the office according to the MAC address/addresses (for example, through the mapping relation between the wireless router and the user equipment; or firstly determines the employee number of the employee, then locates the office and finally matches the wireless router in the office); the network server inquires the connection authority of the employee to connect the mobile phone and the portable computer of the employee to the wireless router, and sends the MAC address information and the connection authority to the wireless router. The wireless router receives the MAC address information and the connection authority, and if the employee is authorized to connect the employee to the wireless router, the wireless router performs wireless connection pre-authorization on the MAC address information of the employee's mobile phone and the portable computer, for example, the MAC address information is added to a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or a pre-authorization state corresponding to the MAC address/MAC addresses is updated to be "pre-authorization successful" in the database local to the wireless router or accessible to the wireless router. When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In other embodiments, the information-perceiving device 102 captures, via its camera, a visual feature image about the user device 101 that contains visual features that can be identified (e.g., including, but not limited to, desktop layout, screen saver, facial image information of the bound user, wear conditions of the device, etc.), based on which the information-perceiving device 102 can match the respective user device 101. For example, the information sensing device 102 captures a facial image of a user of the user device 101, performs facial feature recognition on the user locally or in a cloud, matches a user identity (for example, matches a user account or a user number of the user in the system), further matches the user device 101 according to the user identity information, for example, queries device identification information such as a device number or a serial number of the user device 101 that matches the user account or the user number, and further queries MAC address information of the user device 101 according to the device identification information of the user device 101. The determination of the MAC address information of the user equipment 101 may also be performed based on a mapping relationship between the identity information of the user and the MAC address of the user equipment 101. These matching or querying operations may be performed based on tables or databases of information local to the information-aware device 102 or may be performed based on external databases (e.g., network databases) accessible to the information-aware device 102. For another example, when the information sensing device 102 detects a feature image in the acquired image (for example, local feature detection of the image is performed through an algorithm such as SIFT and SURF, and the image is matched with a preset feature image, and if the matching is successful, it is determined that a corresponding feature image is detected), for example, through visual image detection, an image mark (marker) in the captured image is detected, the device identification information of the user device 101 corresponding to the image mark is determined according to the image mark, and the MAC address information of the user device 101 is further determined.
For example, before a company employee enters an office, the identification device takes a facial image of the employee through a camera of the identification device, performs facial feature recognition, matches the employee number of the user, further matches MAC addresses of a mobile phone and a laptop registered by the employee, and sends the MAC address to a network server of the company. The network server inquires and determines the wireless router in the office according to the MAC address/addresses (for example, through the mapping relation between the wireless router and the user equipment; or firstly determines the employee number of the employee, then locates the office and finally matches the wireless router in the office); the network server inquires the connection authority of the employee to connect the mobile phone and the portable computer of the employee to the wireless router, and sends the MAC address information and the connection authority to the wireless router. The wireless router receives the MAC address information and the connection authority, and if the employee is authorized to connect the employee to the wireless router, the wireless router performs wireless connection pre-authorization on the MAC address information of the employee's mobile phone and the portable computer, for example, the MAC address information is added to a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or a pre-authorization state corresponding to the MAC address/MAC addresses is updated to be "pre-authorization successful" in the database local to the wireless router or accessible to the wireless router. When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In the above embodiment, the network device 103 includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of a plurality of servers. For example, the network device 103 may be a network server connected to and communicating with the information-aware device 102 and the wireless routing device 104 via a network, such as a network server shared by multiple wireless routing device providers (e.g., multiple shops); or a computer device, such as a personal computer separately located at a certain shop or a certain company, connected to the information aware device 102 and the wireless router 104 via a local area network.
Preferably, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101, and the user device identifier of the user device 101 is not pre-authorized for wireless connection (for example, the corresponding MAC address is not in the list of pre-authorized MAC addresses local to the wireless routing device 104), the wireless routing device 104 authenticates the wireless connection authentication request sent by the user device 101, for example, verifies the password information in the authentication request. If the password information is verified correctly, the wireless routing equipment 104 returns an authentication result to the user equipment 101 as authentication passing, and establishes wireless network connection between the user equipment 101 and the wireless routing equipment 104; otherwise, returning the authentication result as 'authentication failed'.
The information sensing device 102 is an electronic product, such as a smart phone or a tablet computer, which is installed with software for acquiring device image information corresponding to the user device 101; or a special purpose device with a camera whose hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, etc. In addition, those skilled in the art will appreciate that the foregoing is by way of example only, and that other devices, existing or hereafter developed, that may be suitable for use in the present application, are also intended to be encompassed by the present application and are hereby incorporated by reference.
Referring to fig. 3, according to another aspect of the present application, there is provided a method for wireless connection pre-authorization of a user equipment at an information-aware device side, the method including step S11, step S12, and step S13. In step S11, the information sensing device obtains device image information corresponding to the user device; in step S12, the information-aware device determines user device identification information for the user device based on the device image information; in step S13, the information aware device sends wireless connection pre-authorization request information about the user equipment to the corresponding network device, where the wireless connection pre-authorization request information includes the user equipment identification information.
Preferably, the device image information includes any one of: 1) the graphic code information is used for acquiring the user equipment identification information; 2) image information containing the user equipment identification information; 3) visual characteristic image information of the user device (e.g., including, but not limited to, desktop layout, screen saver, facial image information of the bound user, wear condition of the device, etc.). The graphic code image includes, but is not limited to, a barcode image, a two-dimensional code image, a three-dimensional code image, and other encoded images, and it should be understood by those skilled in the art that these encoded images are merely examples, and other encoded images that may exist or come into existence later are also included in the scope of the present application, and are included herein by reference.
Referring to fig. 4, in some embodiments, step S12 includes sub-step S12a and sub-step S12 b. In sub-step S12a, the information sensing device obtains the access address of the user equipment identification information by scanning the graphic code; in sub-step S12b, the information aware device reads the user equipment identification information according to the access address.
Referring to fig. 5, in some embodiments, in step S12, the information-aware device extracts text information from the image information by image character recognition, and extracts user device identification information of the user device from the text information according to user device identification format information or keyword information.
Referring to fig. 6, in some embodiments, step S12 includes sub-step S12a 'and sub-step S12 b'. In sub-step S12 a', the information-aware device queries a device database for device identification information of the user device according to the visual characteristic image information; in sub-step S12 b', the information aware device determines user equipment identification information for the user equipment from the device identification information.
Referring to fig. 7, according to another aspect of the present application, there is provided a method for performing wireless connection pre-authorization on a user equipment at a network equipment side, the method including step S21, step S22, step S23 and step S24. In step S21, the network device receives the ue identification information of the ue sent by the information sensing device; in step S22, the network device determines a wireless routing device corresponding to the information sensing device; in step S23, the network device determines pre-authorization information of the user equipment identification information with respect to the wireless routing device based on the user equipment identification information query; in step S24, the network device sends the ue identification information and the pre-authorization information to the wireless routing device.
Referring to fig. 8, according to another aspect of the present application, there is provided a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device, the method including steps S31 and S32. In step S31, the wireless routing device receives the user equipment identification information of the user equipment sent by the network device, and the pre-authorization information of the user equipment identification information about the wireless routing device; in step S32, if the pre-authorization information includes a successful pre-authorization, the wireless routing device performs a wireless connection pre-authorization on the user equipment identification information.
Referring to fig. 9, in some embodiments, the method further includes step S33. In step S33, when it is received that the user equipment sends a connection authentication request to the wireless access point corresponding to the wireless routing device and the user equipment identification information is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device sends authentication passing response information to the user equipment.
Preferably, if the user equipment identification information is not pre-authorized by wireless connection with respect to the wireless access point, the wireless routing equipment performs authentication processing on the connection authentication request, and sends corresponding authentication result information to the user equipment.
Fig. 10 illustrates a specific implementation scenario of a method for pre-authorizing a wireless connection for a user equipment according to an aspect of the present application, and fig. 11 illustrates a flowchart of the method for pre-authorizing a wireless connection for a user equipment based on the scenario. The method for pre-authorizing a wireless connection for a user equipment is described in detail below based on the scenario illustrated in fig. 1.
The information sensing device 102 obtains device image information corresponding to the user device 101 (for example, containing two-dimensional code, text information, etc. for obtaining the user device identification information of the user device 101) in step S11 ', determines the user device identification information of the user device 101 based on the device image information in step S12 ', and then sends the user device identification information to the corresponding wireless routing device 104 in step S13 '. When the wireless router 104 receives the user equipment identification information sent by the network device 103 and the pre-authorization information of the user equipment 101 about the wireless router 104 in step S41, and the pre-authorization information contains "pre-authorization success", the wireless router 104 performs wireless connection pre-authorization on the user equipment identification information of the user equipment 101 in step S42. The wireless connection pre-authorization of the user equipment means that the wireless routing equipment acquires a user equipment identifier of the user equipment obtaining connection authorization in advance; when the wireless routing equipment receives a connection request or an authentication request from certain user equipment and the user equipment identification of the user equipment obtains connection authorization, the user equipment is allowed to access the network through the connection request or the authentication request of the user equipment.
The information sensing device 102 is a device that can obtain device image information corresponding to the user device 101, communicate with the network device 103 or the wireless routing device 104, and exchange data, and communicate with the network device 103 or the wireless routing device 104 through a wired or wireless network connection, for example. The device image information corresponding to the user device 101 includes any one of: 1) the graphic code is used for acquiring the user equipment identification information; 2) image information containing the user equipment identification information; 3) visual characteristic image information of the user device (e.g., including, but not limited to, desktop layout, screen saver, facial image information of the bound user, wear condition of the device, etc.).
In some embodiments, the information sensing device 102 is provided with a wired/wireless communication module for communicating with the network device 103, and a camera for acquiring device image information corresponding to the user device 101, where the device image information is a two-dimensional code image. After the information sensing device 102 acquires the two-dimensional code image through the camera thereof, the user device identifier of the user device 101, for example, MAC address information, is acquired from the two-dimensional code image. For example, the information sensing device 102 directly extracts MAC address information of the user equipment 101 contained in the two-dimensional code image; or extracting an access address on the network contained in the two-dimensional code image and reading the MAC address information of the user equipment 101 according to the access address. The two-dimensional code for acquiring the MAC address information of the user equipment 101 may be generated by the user equipment 101 itself (for example, the two-dimensional code is presented through a display screen of the user equipment 101), may be generated in advance and manufactured as a physical card or drawn/printed on a physical carrier (for example, printed on the front or back of an identification card), and may also be presented by other devices (for example, presented through display screens of user equipments of other users, or presented through a display screen of a hardware device of a network service provider). The information-aware device 102 sends the MAC address information of the user device 101 to the wireless routing device 104; the wireless routing device 104 and the information-aware device 102 are deployed in the same physical space or belong to the same device provider, for example: both located on the same floor or in the same building, or both communicating through a wireless network connection, or connected to the same network server. Wireless routing device 104 preauthorizes the MAC address, such as storing the MAC address in a preauthorization list in a local or accessible database, or marking the MAC address as "preauthorization successful" in the MAC address list.
Thereafter, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101 and the user device identification information of the user device 101 is pre-authorized for wireless connection (for example, the corresponding MAC address exists in a pre-authorized MAC address list local to the wireless routing device 104), the wireless routing device 104 sends authentication passing response information to the user device 101, so as to establish a wireless network connection between the user device 101 and the wireless routing device 104. The corresponding relationship between the user equipment and the network equipment or the wireless routing equipment may be determined by a matching relationship between the respective identification information, for example, if two pieces of equipment correspond to the same user account name or user number in the network communication application, the two pieces of equipment correspond to each other. Of course, the identification information (e.g. MAC address information) of another device may also be queried in the database according to the matching relationship based on the identification information (e.g. MAC address information) of one device.
For example, a company distributes an employee identification card to each employee, and the identification card is printed with a two-dimensional code image containing identification information of the employee and MAC address information of his mobile phone or laptop. Before a staff enters an office, an identity recognition device scans a two-dimensional code image on an identity recognition card of the staff through a camera of the identity recognition device, so that MAC address information of a mobile phone and a portable computer of the staff is obtained, and the MAC address information of the mobile phone and the portable computer of the staff is sent to a wireless router in the office of the staff (for example, through a mapping relation between the wireless router and user equipment; or firstly determining the staff number of the staff, then positioning the office of the staff, and finally matching the wireless router in the office); the wireless router receives the MAC address information to perform wireless connection pre-authorization on the MAC address information of the mobile phone and the portable computer of the employee, for example, the MAC address information is added to a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or a pre-authorization state corresponding to the MAC address/MAC addresses is updated to be 'pre-authorization successful' in the database local to the wireless router or accessible to the wireless router. When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In other embodiments, the information sensing device 102 collects an image of a text with user device identification information of the user device 101 through a camera of the information sensing device, and extracts text information from the image by performing Character Recognition (e.g., OCR) on the image, and identifies the user device identification information of the user device 101 therein. For example, after obtaining text information in an image, the information-perceiving device 102 determines the MAC address information of the user device 101 according to the format of the MAC address information (e.g., the MAC address is typically a 6-byte hexadecimal number such as 12:34:56:78:9A: BC, and the information-perceiving device 102 matches the recognized text information with the format) or according to keyword information in the text information (e.g., keywords such as "MAC", "WLAN MAC", etc. are detected in the text information). The text containing the user device identification information of the user device 101 may be generated by the user device 101 itself (for example, the text information is presented through a display screen of the user device 101), may be generated in advance and manufactured as a physical card or drawn/printed on a physical carrier (for example, printed on the front or back of an identification card), and may be presented by other devices (for example, presented through display screens of user devices of other users, or presented through a display screen of a hardware device of a network service provider). The information-aware device 102 sends the user device identification information of the user device 101 to the wireless routing device 104; the wireless routing device 104 and the information-aware device 102 are deployed in the same physical space or belong to the same device provider, for example: both located on the same floor or in the same building, or both communicating through a wireless network connection, or connected to the same network server. The wireless routing device 104 preauthorizes the user device identification, such as by storing the user device identification (e.g., MAC address) in a preauthorization list in a local or accessible database, or by marking the user device identification (e.g., MAC address) as "preauthorization successful" in the user device identification (e.g., MAC address) list.
Thereafter, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101, and the user device identification of the user device 101 has been pre-authorized for wireless connection (for example, the corresponding MAC address exists in a pre-authorized MAC address list local to the wireless routing device 104), the wireless routing device 104 sends an authentication pass response message to the user device 101, so as to establish a wireless network connection between the user device 101 and the wireless routing device 104. The corresponding relationship between the user equipment and the network equipment or the wireless routing equipment may be determined by a matching relationship between the respective identification information, for example, if two pieces of equipment correspond to the same user account name or user number in the network communication application, the two pieces of equipment correspond to each other. Of course, the identification information (e.g. MAC address information) of another device may also be queried in the database according to the matching relationship based on the identification information (e.g. MAC address information) of one device.
For example, a company distributes an employee identification card to each employee, which is printed with text information containing the identity information of the employee and the MAC address information of his mobile phone or laptop. Before an employee enters an office, an identity recognition device shoots text information on an identity recognition card of the employee through a camera of the identity recognition device and carries out OCR operation locally, or an image with the text information is sent to a network server and is subjected to OCR operation by the network server, so that MAC address information of a mobile phone and a portable computer of the employee is obtained, and the MAC address information of the mobile phone and the portable computer of the employee is sent to a wireless router in an office of the employee (for example, through a mapping relation between the wireless router and user equipment; or firstly determining a employee number of the employee, then positioning the office of the employee, and finally matching the wireless router in the office); the wireless router receives the MAC address information, performs wireless connection pre-authorization on the MAC address information of the employee's mobile phone and the laptop, for example, adds the MAC address information into a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or updates the pre-authorization state corresponding to the MAC address/MAC addresses in the database local to the wireless router or accessible to the wireless router to be "pre-authorization successful". When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In other embodiments, the information-perceiving device 102 captures, via its camera, a visual feature image about the user device 101, the visual feature image containing visual features that can be identified, based on which the information-perceiving device 102 can match the respective user device 101. For example, the information sensing device 102 captures a facial image of a user of the user device 101, performs facial feature recognition on the user locally or in a cloud, matches a user identity (for example, matches a user account or a user number of the user in the system), further matches the user device 101 according to the user identity information, for example, queries device identification information such as a device number or a serial number of the user device 101 that matches the user account or the user number, and further queries MAC address information of the user device 101 according to the device identification information of the user device 101. The determination of the user equipment identification information of the user equipment 101 may also be performed based on a mapping relationship between the identity information of the user and the user equipment identification of the user equipment 101. These matching or querying operations may be performed based on tables or databases of information local to the information-aware device 102 or may be performed based on external databases (e.g., network databases) accessible to the information-aware device 102. For another example, when the information sensing device 102 detects a feature image in the acquired image (e.g., local feature detection of the image is performed through an algorithm such as SIFT and SURF, and the image is matched with a preset feature image, and if the matching is successful, it is determined that a corresponding feature image is detected), for example, through visual image detection, an image mark (marker) in the captured image is detected, the device identification information of the user device 101 corresponding to the image mark is determined according to the image mark, and the user device identification information of the user device 101 is further determined.
For example, before a company employee enters an office, the identity recognition device shoots a face image of the employee through a camera of the identity recognition device, carries out facial feature recognition, matches the employee number of the user, further matches MAC addresses of a mobile phone and a laptop registered by the employee, and sends the MAC address to a wireless router in the office of the identity recognition device (for example, through a mapping relation between the wireless router and user equipment; or firstly determines the employee number of the employee, then positions the office of the employee, and finally matches the wireless router in the office); the wireless router receives the MAC address information, performs wireless connection pre-authorization on the MAC address information of the employee's mobile phone and the laptop, for example, adds the MAC address information into a pre-authorization list in a database local to the wireless router or accessible to the wireless router, or updates the pre-authorization state corresponding to the MAC address/MAC addresses in the database local to the wireless router or accessible to the wireless router to be "pre-authorization successful". When the mobile phone or the portable computer of the employee sends a wireless network connection request or an authentication request to the wireless router, and the wireless router detects that the MAC address of the device sending the connection request or the authentication request is pre-authorized, the wireless router sends a message that the connection request passes or the authentication succeeds to the mobile phone or the portable computer, and establishes wireless network connection between the wireless router and the mobile phone/the portable computer.
In the above embodiment, the network device 103 includes, but is not limited to, a computer, a network host, a single network server, a plurality of network server sets, or a cloud of a plurality of servers. For example, the network device 103 may be a network server connected to and communicating with the information-aware device 102 and the wireless routing device 104 via a network, such as a network server shared by multiple wireless routing device providers (e.g., multiple shops); or a computer device, such as a personal computer separately located at a certain shop or a certain company, connected to the information aware device 102 and the wireless router 104 via a local area network.
Preferably, if the wireless routing device 104 receives the wireless connection authentication request sent by the user device 101, and the user device identification information of the user device 101 is not pre-authorized for wireless connection (for example, the corresponding MAC address is not in the pre-authorized MAC address list local to the wireless routing device 104), the wireless routing device 104 authenticates the wireless connection authentication request sent by the user device 101, for example, verifies the password information in the authentication request. If the password information is verified correctly, the wireless routing equipment 104 returns an authentication result to the user equipment 101 as authentication passing, and establishes wireless network connection between the user equipment 101 and the wireless routing equipment 104; otherwise, returning the authentication result as 'authentication failed'.
The information sensing device 102 is an electronic product, such as a smart phone or a tablet computer, which is installed with software for acquiring device image information corresponding to the user device 101; or a special purpose device with a camera whose hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, etc. In addition, those skilled in the art will appreciate that the foregoing is by way of example only, and that other devices, existing or hereafter developed, that may be suitable for use in the present application, are also intended to be encompassed by the present application and are hereby incorporated by reference.
Referring to fig. 12, according to another aspect of the present application, there is provided a method for wireless connection pre-authorization of a user equipment at an information-aware device side, the method including step S11 ', step S12 ' and step S13 '. In step S11', the information sensing device obtains device image information corresponding to the user device; in step S12', the information-aware device determines user device identification information for the user device based on the device image information; in step S13', the information-aware device sends the user equipment identification information to the corresponding network device or wireless routing device.
Referring to fig. 13, in some embodiments, step S12 ' includes sub-steps S12 ' a and S12 ' b. In sub-step S12' a, the information sensing device obtains the access address of the user equipment identification information by scanning the graphic code; in sub-step S12' b, the information-aware device reads the user equipment identification information according to the access address.
Referring to fig. 14, in some embodiments, in step S12', the information-aware device extracts text information from the image information by image character recognition, and extracts user device identification information of the user device from the text information according to user device identification format information or keyword information.
Referring to fig. 15, in some embodiments, step S12 ' includes sub-steps S12 ' a ' and S12 ' b '. In sub-step S12 'a', the information-aware device queries a device database for device identification information of the user device according to the visual characteristic image information; in S12 'b', the information-aware device determines user device identification information for the user device from the device identification information.
Referring to fig. 16, according to another aspect of the present application, there is provided a method for performing wireless connection pre-authorization on a user equipment at a wireless routing device, the method including steps S41 and S42. In step S41, a wireless routing device receives user equipment identification information of a user equipment, which is sent by a corresponding information aware device, where the information aware device and the wireless routing device are deployed in the same physical space or belong to the same equipment provider; in step S42, the wireless routing device performs wireless connection pre-authorization on the user equipment identification information.
Referring to fig. 17, in some embodiments, the method further includes step S43. In step S43, when it is received that the user equipment sends a connection authentication request to the wireless access point corresponding to the wireless routing device and the user equipment identification information is pre-authorized for wireless connection with respect to the wireless access point, the wireless routing device sends authentication passing response information to the user equipment.
Preferably, if the user equipment identification information is not pre-authorized by wireless connection with respect to the wireless access point, the wireless routing equipment performs authentication processing on the connection authentication request, and sends corresponding authentication result information to the user equipment.
According to an aspect of the present application, there is provided an information-aware device for wireless connection pre-authorization of a user device, the information-aware device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
acquiring equipment image information corresponding to user equipment;
determining user equipment identification information of the user equipment based on the device image information;
and sending the user equipment identification information to corresponding network equipment or wireless routing equipment.
According to another aspect of the present application, there is provided a network device for wireless connection pre-authorization of a user equipment, the network device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving user equipment identification information of user equipment sent by information sensing equipment;
determining wireless routing equipment corresponding to the information perception equipment;
determining pre-authorization information of the user equipment identification information with respect to the wireless routing device based on the user equipment identification information query;
and sending the user equipment identification information and the pre-authorization information to the wireless routing equipment.
According to an aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, the wireless routing device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving user equipment identification information of user equipment sent by network equipment, and pre-authorization information of the user equipment identification information about wireless routing equipment;
and if the pre-authorization information comprises successful pre-authorization, performing wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the present application, there is provided a wireless routing device for wireless connection pre-authorization for a user equipment, the wireless routing device comprising:
a processor; and
a memory arranged to store computer executable instructions that, when executed, cause the processor to:
receiving user equipment identification information of user equipment, which is sent by information sensing equipment corresponding to wireless routing equipment, wherein the information sensing equipment and the wireless routing equipment are deployed in the same physical space or belong to the same equipment provider;
and performing wireless connection pre-authorization on the user equipment identification information.
According to one aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
acquiring equipment image information corresponding to user equipment;
determining user equipment identification information of the user equipment based on the device image information;
and sending the user equipment identification information to corresponding network equipment or wireless routing equipment.
According to another aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving user equipment identification information of user equipment sent by information sensing equipment;
determining wireless routing equipment corresponding to the information perception equipment;
determining pre-authorization information of the user equipment identification information with respect to the wireless routing device based on the user equipment identification information query;
and sending the user equipment identification information and the pre-authorization information to the wireless routing equipment.
According to one aspect of the present application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving user equipment identification information of user equipment sent by network equipment, and pre-authorization information of the user equipment identification information about wireless routing equipment;
and if the pre-authorization information comprises successful pre-authorization, performing wireless connection pre-authorization on the user equipment identification information.
According to another aspect of the application, there is provided a computer-readable medium comprising instructions that, when executed, cause a system to:
receiving user equipment identification information of user equipment, which is sent by information sensing equipment corresponding to wireless routing equipment, wherein the information sensing equipment and the wireless routing equipment are deployed in the same physical space or belong to the same equipment provider;
and performing wireless connection pre-authorization on the user equipment identification information.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. In this case, the technical features in the embodiments of the present application may be arbitrarily combined with those in the other embodiments without causing contradiction or confusion. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.