[go: up one dir, main page]

CN113645054B - Wireless network device configuration method and system - Google Patents

Wireless network device configuration method and system Download PDF

Info

Publication number
CN113645054B
CN113645054B CN202110520516.9A CN202110520516A CN113645054B CN 113645054 B CN113645054 B CN 113645054B CN 202110520516 A CN202110520516 A CN 202110520516A CN 113645054 B CN113645054 B CN 113645054B
Authority
CN
China
Prior art keywords
mobile terminal
network device
wireless network
interception
management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110520516.9A
Other languages
Chinese (zh)
Other versions
CN113645054A (en
Inventor
曾庆初
杨沙
杨显湖
高华辰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yichen Shenzhen Technology Co ltd
Original Assignee
Yichen Shenzhen Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yichen Shenzhen Technology Co ltd filed Critical Yichen Shenzhen Technology Co ltd
Priority to CN202110520516.9A priority Critical patent/CN113645054B/en
Publication of CN113645054A publication Critical patent/CN113645054A/en
Application granted granted Critical
Publication of CN113645054B publication Critical patent/CN113645054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0889Techniques to speed-up the configuration process
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种无线网络设备配置方法及系统,所述方法包括:第一移动终端通过扫描无线网络设备上的第一标识码,获得无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码,根据第一WiFi名称及第一WiFi密码接入无线网络设备提供的无线局域网;第一移动终端获取用户设置的网络配置信息,向第一管理地址发送携带有第一管理账号密码及网络配置信息的配置请求;无线网络设备根据第一管理账号密码对配置请求验证通过后应用网络配置信息。如此,通过移动终端扫描设置在无线网络设备上的标识码,使移动终端自动地完成无线网络设备的WiFi接入、网络配置等动作,不需要用户进行大量复杂的手动操作,可以提高无线网络设备配置的效率,减少了配置出错的可能性。

This application provides a wireless network device configuration method and system. The method includes: the first mobile terminal through scanning the first identification code on the wireless network device, obtaining the first WIFI name, the first WIFI password, the first management address and the first management account password of the wireless network device. The network configuration information sends a configuration request with the first management account password and network configuration information to the first management address; the wireless network device is based on the first management account password to verify the configuration request to verify the post -application network configuration information. In this way, by scanning the identification code set on the wireless network device by the mobile terminal, the mobile terminal automatically completes actions such as WiFi access and network configuration of the wireless network device, without requiring the user to perform a large number of complicated manual operations, which can improve the efficiency of wireless network device configuration and reduce the possibility of configuration errors.

Description

无线网络设备配置方法及系统Wireless network device configuration method and system

技术领域technical field

本申请涉及网络设备技术领域,具体而言,涉及一种无线网络设备配置方法及系统。The present application relates to the technical field of network equipment, and in particular, to a wireless network equipment configuration method and system.

背景技术Background technique

随着网络信息技术的普及和发展,宽带网络覆盖越来越广,使用无线无线网络设备接入宽带是目前十分普遍的终端设备上网形式。在使用无线无线网络设备接入宽带网络前,通常需要对无线无线网络设备进行一系列配置,如配置WiFi名称、WiFi密码、设备管理账号、设备管理密码、拨号上网账号、拨号上网密码等。With the popularization and development of network information technology, broadband network coverage is getting wider and wider. Using wireless network equipment to access broadband is currently a very common form of terminal equipment accessing the Internet. Before using a wireless network device to access a broadband network, it is usually necessary to perform a series of configurations on the wireless network device, such as configuring the WiFi name, WiFi password, device management account, device management password, dial-up account, dial-up password, etc.

在传统无线无线网络设备配置方法中,通常需要先使用终端设备通过有线或者无线方式接入无线无线网络设备,然后根据管理地址打开无线网络设备管理页面,然后在管理页面进行一些列配置。完成一次配置操作的操作动作复杂、操作链较长,操作过程对非专业的普通用户不友好,即使是专业的网络装维人员配置效率也较低。In the traditional wireless network device configuration method, it is usually necessary to use a terminal device to access the wireless network device through wired or wireless means, then open the wireless network device management page according to the management address, and then perform some configurations on the management page. The operations to complete a configuration operation are complicated, the operation chain is long, and the operation process is not friendly to non-professional ordinary users. Even professional network installation and maintenance personnel have low configuration efficiency.

发明内容Contents of the invention

为了克服现有技术中的上述不足,本申请的目的在于提供一种无线网络设备配置方法,所述方法包括:In order to overcome the above-mentioned deficiencies in the prior art, the purpose of this application is to provide a wireless network device configuration method, the method comprising:

第一移动终端通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码;The first mobile terminal obtains the first WiFi name, the first WiFi password, the first management address and the first management account password pre-stored in the wireless network device by scanning the first identification code on the wireless network device;

所述第一移动终端根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网;The first mobile terminal accesses the wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password;

所述第一移动终端响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址或第二管理账号密码;The first mobile terminal responds to user operations and obtains network configuration information set by the user, the network configuration information including the updated second WiFi name, second WiFi password, second management address or second management account password;

所述第一移动终端向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求;The first mobile terminal sends a configuration request carrying the first management account password and the network configuration information to the first management address;

所述无线网络设备根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后应用所述网络配置信息。The wireless network device verifies the configuration request according to the pre-stored password of the first management account, and applies the network configuration information after the verification is passed.

在一种可能的实现方式中,所述第一移动终端通过扫描无线网络设备上的第一标识码,获得所述无线网络设备初始的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码的步骤,包括:In a possible implementation manner, the first mobile terminal obtains the initial first WiFi name, first WiFi password, first management address and first management account password of the wireless network device by scanning the first identification code on the wireless network device, including:

第一移动终端通过扫描无线网络设备上的第一标识码,获得无线网络设备的身份标识;The first mobile terminal obtains the identity of the wireless network device by scanning the first identification code on the wireless network device;

所述第一移动终端向服务器发送登录信息获取请求,所述登录信息获取请求携带有所述无线网络设备的身份标识;The first mobile terminal sends a login information acquisition request to the server, and the login information acquisition request carries the identity of the wireless network device;

所述服务器根据接收到的登录信息获取请求中的所述无线网络设备的身份标识查找与所述无线网络设备对应的所述第一WiFi名称、所述第一WiFi密码、所述第一管理地址及所述第一管理账号密码发送给所述第一移动终端。The server searches for the first WiFi name, the first WiFi password, the first management address and the first management account password corresponding to the wireless network device according to the identity of the wireless network device in the received login information acquisition request and sends them to the first mobile terminal.

在一种可能的实现方式中,所述方法还包括:In a possible implementation, the method further includes:

所述服务器预先记录有购买所述无线网络设备的用户的身份标识与所述无线网络设备的身份标识的对应关系;The server pre-records the corresponding relationship between the identity of the user who purchased the wireless network device and the identity of the wireless network device;

所述第一移动终端向服务器发送登录信息获取请求的步骤,包括:The step of the first mobile terminal sending a login information acquisition request to the server includes:

所述第一移动终端向服务器发送携带有在所述第一移动终端上登录的用户的身份标识及所述无线网络设备的身份标识的登录信息获取请求;The first mobile terminal sends a login information acquisition request carrying the identity of the user logged in on the first mobile terminal and the identity of the wireless network device to the server;

所述服务器根据接收到的登录信息获取请求中的所述无线网络设备的身份标识查找所述无线网络设备初始的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端的步骤,包括:The server searches for the initial first WiFi name, first WiFi password, first management address and first management account password of the wireless network device according to the identity of the wireless network device in the received login information acquisition request and sends them to the first mobile terminal, including:

所述服务器根据预存的所述对应关系验证所述登录信息获取请求中的用户的身份标识与所述无线网络设备的身份标识是否相符;The server verifies whether the identity of the user in the login information acquisition request matches the identity of the wireless network device according to the pre-stored correspondence;

若相符,则查找与所述无线网络设备的身份标识对应的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端。If they match, search for the first WiFi name, first WiFi password, first management address and first management account password corresponding to the identity of the wireless network device and send them to the first mobile terminal.

在一种可能的实现方式中,所述方法还包括:In a possible implementation, the method further includes:

所述第一移动终端获取第二移动终端的通信标识、网络使用时间及限速策略;The first mobile terminal acquires the communication identification, network usage time and speed limit policy of the second mobile terminal;

所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息;The first mobile terminal encrypts the communication identification of the second mobile terminal, the network usage time and the speed limit policy according to the second management account password to obtain encrypted information;

所述第一移动终端根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码;The first mobile terminal generates a second identification code according to the encrypted information and the second management address of the wireless network device;

所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息;The second mobile terminal obtains the second management address and the encrypted information by scanning the second identification code, and sends networking configuration information carrying the encrypted information to the second management address;

所述无线网络设备根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略;The wireless network device decrypts the encrypted information in the received networking configuration information according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time, and the speed limit policy;

所述无线网络设备根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度。The wireless network device adds the second mobile terminal to a whitelist allowing the Internet access according to the communication identifier of the second mobile terminal, and limits the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

在一种可能的实现方式中,所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息的步骤,包括:In a possible implementation manner, the step of the first mobile terminal encrypting the communication identification of the second mobile terminal, the network usage time, and the speed limit policy according to the second management account password to obtain encrypted information includes:

所述第一移动终端获取当前时间作为授权时间;The first mobile terminal obtains the current time as the authorization time;

所述第一移动终端使用所述第二管理账号密码对所述授权时间、所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得所述加密信息;The first mobile terminal uses the second management account password to encrypt the authorization time, the communication identification of the second mobile terminal, the network usage time and the speed limit policy to obtain the encrypted information;

所述无线网络设备根据所述第二管理账号密码对接收到的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略的步骤,包括:The wireless network device decrypts the received encrypted information according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time and the speed limit policy, including:

所述无线网络设备根据所述第二管理账号密码对本次接收到的所述联网配置信息中的加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间、所述限速策略及所述授权时间;The wireless network device decrypts the encrypted information in the networking configuration information received this time according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time, the speed limit policy and the authorization time;

所述无线网络设备检测是否曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息;The wireless network device detects whether it has ever received historical networking configuration information with the same authorization time as the networking configuration information received this time;

若是,则不对本次的所述联网配置信息进行处理;If so, the networking configuration information described this time will not be processed;

若否,则将本次接收到的联网配置信息记录为历史联网配置信息,然后再执行将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度的步骤。If not, then record the networking configuration information received this time as historical networking configuration information, and then perform the step of adding the second mobile terminal to the whitelist of allowing Internet access, and limiting the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit strategy.

在一种可能的实现方式中,在第一移动终端获取第二移动终端的通信标识、网络使用时间及限速策略的步骤之前,所述方法还包括:In a possible implementation, before the first mobile terminal acquires the communication identification, network usage time and speed limit policy of the second mobile terminal, the method further includes:

所述第二移动终端通过扫描设置于所述无线网络设备上的第一标识码,获得所述无线网络设备的身份标识及服务器的地址;The second mobile terminal obtains the identity of the wireless network device and the address of the server by scanning the first identification code set on the wireless network device;

所述第二移动终端根据所述服务器的地址将所述无线网络设备发送联网申请信息,所述联网申请信息包括所述第二移动终端的通信标识及所述无线网络设备的身份标识。The second mobile terminal sends the wireless network device networking application information according to the address of the server, and the networking application information includes the communication identifier of the second mobile terminal and the identity identifier of the wireless network device.

所述服务器根据所述无线网络设备的身份标识查找对该无线网络设备具有管理权限的第一移动终端,并将所述联网申请信息发送至所述第一移动终端。The server searches for a first mobile terminal having management authority for the wireless network device according to the identity of the wireless network device, and sends the networking application information to the first mobile terminal.

在一种可能的实现方式中,所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息的步骤,包括:In a possible implementation manner, the step of the second mobile terminal obtaining the second management address and the encrypted information by scanning the second identification code, and sending the networking configuration information carrying the encrypted information to the second management address includes:

所述第一移动终端根据所述加密信息、所述无线网络设备的第二WiFi名称、第二WiFi密码及第二管理地址生成所述第二标识码;The first mobile terminal generates the second identification code according to the encrypted information, the second WiFi name of the wireless network device, the second WiFi password, and the second management address;

所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息的步骤,包括:The step of obtaining the second management address and the encrypted information by the second mobile terminal by scanning the second identification code includes:

所述第二移动终端通过扫描所述第二标识码,获得所述第二WiFi名称、所述第二WiFi密码、所述第二管理地址及所述加密信息;The second mobile terminal obtains the second WiFi name, the second WiFi password, the second management address and the encrypted information by scanning the second identification code;

所述第二移动终端根据所述第二WiFi名称及所述第二WiFi密码接入所述无线网络设备提供的无线局域网,并通过所述无线局域网向所述第二管理地址发送携带有所述加密信息的联网配置信息。The second mobile terminal accesses the wireless local area network provided by the wireless network device according to the second WiFi name and the second WiFi password, and sends networking configuration information carrying the encrypted information to the second management address through the wireless local area network.

在一种可能的实现方式中,所述无线网络设备还与网络安全服务器通信连接,所述方法还包括:In a possible implementation manner, the wireless network device is also communicatively connected to a network security server, and the method further includes:

所述无线网络设备在接收到更新当前的所述网络配置信息的未知信息访问请求时,在所述未知信息访问请求与信任白名单中的白名单成员不匹配时进行拦截,并在拦截的同时将所述未知信息访问请求中的访问配置信息发送给所述网络安全服务器;When the wireless network device receives an unknown information access request for updating the current network configuration information, it intercepts when the unknown information access request does not match a whitelist member in the trusted white list, and sends the access configuration information in the unknown information access request to the network security server while intercepting;

所述网络安全服务器获取所述访问配置信息中的每个访问配置属性所对应的历史网络事件集合,并所述历史网络事件集合中查找到与所述无线网络设备的路由运行环境相关的目标网络攻击事件后,基于所述目标网络攻击事件的预设更新策略更新所述无线网络设备在所述网络安全服务器上的路由安全防护策略,基于更新后的所述路由安全防护策略,在所述无线网络设备的虚拟安全防护环境中模拟网络安全攻击事件信息;The network security server acquires a set of historical network events corresponding to each access configuration attribute in the access configuration information, and after finding a target network attack event related to the routing operation environment of the wireless network device in the set of historical network events, update the routing security protection policy of the wireless network device on the network security server based on the preset update policy of the target network attack event, and simulate network security attack event information in the virtual security protection environment of the wireless network device based on the updated routing security protection policy;

获取所述无线网络设备的虚拟安全防护环境中针对所述网络安全攻击事件信息响应的多个响应拦截行为的响应拦截行为对象,并获取与所述多个响应拦截行为相关的多个历史拦截扩展跟踪行为,任一历史拦截扩展跟踪行为包括扩展跟踪对象和扩展跟踪路径集合;Obtaining response interception behavior objects of multiple response interception behaviors in response to the network security attack event information in the virtual security protection environment of the wireless network device, and acquiring multiple historical interception extension tracking behaviors related to the multiple response interception behaviors, any historical interception extension tracking behavior includes an extension tracking object and an extension tracking path set;

根据每个历史拦截扩展跟踪行为的扩展跟踪对象和多个响应拦截行为的响应拦截行为对象,确定每个历史拦截扩展跟踪行为所属的响应拦截行为;According to the extended tracking object of each historical interception extended tracking action and the response interception action objects of multiple response interception actions, determine the response interception behavior to which each historical interception extended tracking action belongs;

根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合以及每个历史拦截扩展跟踪行为所属的响应拦截行为,对所述多个历史拦截扩展跟踪行为进行分簇处理,得到多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为;According to the set of extended tracing paths of each historical interception extended tracing behavior and the response interception behavior to which each historical interception extended tracing behavior belongs, the multiple historical interception extended tracing behaviors are clustered to obtain the response interception behaviors to which the multiple historical interception extended tracing behavior clusters respectively belong;

根据多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为,确定所述多个历史拦截扩展跟踪行为中每个扩展跟踪行为所属的响应拦截行为,并为每个扩展跟踪行为和每个扩展跟踪行为所属的响应拦截行为建立关联关系后,基于建立的关联关系信息对所述路由安全防护策略进行扩展更新,以将扩展更新后的所述路由安全防护策略发送给所述无线网络设备进行自动响应配置。According to the response interception behaviors to which the plurality of historical interception extended tracking behavior clusters respectively belong, determine the response interception behavior to which each extended tracking behavior in the plurality of historical interception extended tracking behaviors belongs, and after establishing an association relationship between each extended tracking behavior and the response interception behavior to which each extended tracking behavior belongs, perform an extended update on the routing security protection policy based on the established association relationship information, so as to send the expanded and updated routing security protection policy to the wireless network device for automatic response configuration.

本申请还提供一种无线网络设备配置系统,所述系统包括第一移动终端及无线网络设备;The present application also provides a wireless network device configuration system, the system includes a first mobile terminal and a wireless network device;

所述第一移动终端用于通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码;The first mobile terminal is used to obtain the first WiFi name, first WiFi password, first management address and first management account password pre-stored by the wireless network device by scanning the first identification code on the wireless network device;

所述第一移动终端还用于根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网;The first mobile terminal is also used to access the wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password;

所述第一移动终端还用于响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址及第二管理账号密码;The first mobile terminal is also used to respond to user operations and obtain network configuration information set by the user, the network configuration information including the updated second WiFi name, second WiFi password, second management address and second management account password;

所述第一移动终端还用于向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求;The first mobile terminal is further configured to send a configuration request carrying the first management account password and the network configuration information to the first management address;

所述无线网络设备用于根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后使用所述第二WiFi名称、第二WiFi密码、第二管理地址及第二管理账号密码替换所述第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码。The wireless network device is configured to verify the configuration request according to the pre-stored first management account password, and replace the first WiFi name, first WiFi password, first management address and first management account password with the second WiFi name, second WiFi password, second management address and second management account password after the verification is passed.

在一种可能的实现方式中,所述系统还包括第二移动终端;In a possible implementation manner, the system further includes a second mobile terminal;

所述第一移动终端还用于获取所述第二移动终端的通信标识、网络使用时间及限速策略;The first mobile terminal is also used to obtain the communication identification, network usage time and speed limit policy of the second mobile terminal;

所述第一移动终端还用于根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息;The first mobile terminal is further configured to encrypt the communication identification of the second mobile terminal, the network usage time, and the speed limit policy according to the second management account password to obtain encrypted information;

所述第一移动终端还用于根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码;The first mobile terminal is further configured to generate a second identification code according to the encrypted information and the second management address of the wireless network device;

所述第二移动终端用于通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息;The second mobile terminal is configured to obtain the second management address and the encrypted information by scanning the second identification code, and send networking configuration information carrying the encrypted information to the second management address;

所述无线网络设备还用于根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略;The wireless network device is further configured to decrypt the encrypted information in the received networking configuration information according to the second management account password, and obtain the communication identification of the second mobile terminal, the network usage time, and the speed limit policy;

所述无线网络设备还用于根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度。The wireless network device is further configured to add the second mobile terminal to a whitelist for allowing Internet access according to the communication identifier of the second mobile terminal, and limit the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

相对于现有技术而言,本申请具有以下有益效果:Compared with the prior art, the present application has the following beneficial effects:

本申请提供的无线网络设备配置方法及系统,通过移动终端扫描设置在无线网络设备上的标识码,使移动终端自动地完成无线网络设备的WiFi接入、网络配置等动作,不需要用户进行大量复杂的手动操作,从而可以提高无线网络设备配置的效率,减少了配置出错的可能性。The wireless network device configuration method and system provided by this application enable the mobile terminal to automatically complete actions such as WiFi access and network configuration of the wireless network device by scanning the identification code set on the wireless network device by the mobile terminal, without requiring the user to perform a large number of complicated manual operations, thereby improving the efficiency of wireless network device configuration and reducing the possibility of configuration errors.

附图说明Description of drawings

为了更清楚地说明本申请实施例的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,应当理解,以下附图仅示出了本申请的某些实施例,因此不应被看作是对范围的限定,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他相关的附图。In order to more clearly illustrate the technical solutions of the embodiments of the present application, the accompanying drawings used in the embodiments will be briefly introduced below. It should be understood that the following drawings only show some embodiments of the present application, and therefore should not be regarded as limiting the scope. For those of ordinary skill in the art, other related drawings can also be obtained according to these drawings without creative work.

图1为本申请实施例提供的无线网络设备配置系统的示意图之一;FIG. 1 is one of schematic diagrams of a wireless network device configuration system provided in an embodiment of the present application;

图2为本申请实施例提供的无线网络设备配置方法的示意图之一;FIG. 2 is one of schematic diagrams of a wireless network device configuration method provided in an embodiment of the present application;

图3为本申请实施例提供的无线网络设备配置系统的示意图之二;FIG. 3 is the second schematic diagram of the wireless network device configuration system provided by the embodiment of the present application;

图4为本申请实施例提供的无线网络设备配置方法的示意图之二。FIG. 4 is a second schematic diagram of a method for configuring a wireless network device provided by an embodiment of the present application.

具体实施方式Detailed ways

为使本申请实施例的目的、技术方案和优点更加清楚,下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。通常在此处附图中描述和示出的本申请实施例的组件可以以各种不同的配置来布置和设计。In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

因此,以下对在附图中提供的本申请的实施例的详细描述并非旨在限制要求保护的本申请的范围,而是仅仅表示本申请的选定实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

应注意到:相似的标号和字母在下面的附图中表示类似项,因此,一旦某一项在一个附图中被定义,则在随后的附图中不需要对其进行进一步定义和解释。It should be noted that like numerals and letters denote similar items in the following figures, therefore, once an item is defined in one figure, it does not require further definition and explanation in subsequent figures.

在本申请的描述中,术语“第一”、“第二”、“第三”等仅用于区分描述,而不能理解为指示或暗示相对重要性。In the description of the present application, the terms "first", "second", "third" and so on are only used for distinguishing descriptions, and cannot be understood as indicating or implying relative importance.

在本申请的描述中,还需要说明的是,除非另有明确的规定和限定,术语“设置”、“安装”、“相连”、“连接”应做广义理解,例如,可以是固定连接,也可以是可拆卸连接,或一体地连接;可以是机械连接,也可以是电连接;可以是直接相连,也可以通过中间媒介间接相连,可以是两个元件内部的连通。对于本领域的普通技术人员而言,可以具体情况理解上述术语在本申请中的具体含义。In the description of the present application, it should also be noted that, unless otherwise specified and limited, the terms "installation", "installation", "connection" and "connection" should be understood in a broad sense, for example, it may be a fixed connection, a detachable connection, or an integral connection; it may be a mechanical connection or an electrical connection; it may be a direct connection or an indirect connection through an intermediary, or it may be an internal connection between two components. Those of ordinary skill in the art can understand the specific meanings of the above terms in this application in specific situations.

请参见图1,图1为本实施例提供的一种无线网络设备配置系统的示意图,该系统可以包括用户使用的第一移动终端200及无线网络设备100。Please refer to FIG. 1 . FIG. 1 is a schematic diagram of a wireless network device configuration system provided in this embodiment. The system may include a first mobile terminal 200 and a wireless network device 100 used by a user.

所述第一移动终端200可以为具有无线局域网(Wireless Local Area Network,WLAN)通信功能的移动终端。所述第一移动终端200还可以具有图像采集模块,该图像采集模块可以被用于扫描标识码(如二维码、条形码等)。例如,所述第一移动终端200可以是智能手机、平板电脑、具有扫码功能笔记本电脑、个人电脑等。所述无线网络设备100可以为具有WLAN功能的无线网络设备100。The first mobile terminal 200 may be a mobile terminal having a wireless local area network (Wireless Local Area Network, WLAN) communication function. The first mobile terminal 200 may also have an image acquisition module, and the image acquisition module may be used to scan identification codes (such as two-dimensional codes, barcodes, etc.). For example, the first mobile terminal 200 may be a smart phone, a tablet computer, a notebook computer with a code scanning function, a personal computer, and the like. The wireless network device 100 may be a wireless network device 100 with a WLAN function.

在上述场景中,本实施例还提供一种无线网络设备配置方法,请参照图2,下面对该方法的各个步骤进行详细解释。In the above scenario, this embodiment also provides a wireless network device configuration method, please refer to FIG. 2 , and each step of the method will be explained in detail below.

步骤S110,第一移动终端通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码。Step S110, the first mobile terminal obtains the first WiFi name, first WiFi password, first management address and first management account password pre-stored in the wireless network device by scanning the first identification code on the wireless network device.

在本实施例中,出售无线网络设备的商家在出售无线网络设备之前,可以在无线网络设备上粘贴与该无线网络设备相关的第一标识码(如二维码、条形码等)。In this embodiment, before selling the wireless network device, the merchant who sells the wireless network device may paste a first identification code (such as a QR code, a barcode, etc.) related to the wireless network device on the wireless network device.

在一种可能的实现方式中,所述第一标识码中可以携带有所述无线网络设备的预存的(即初始的)第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码。购买了无线网络设备的用户可以通过其第一移动终端扫描所述无线网络设备上的第一标识码,从而解析获得所述第一WiFi名称、所述第一WiFi密码、所述第一管理地址及所述第一管理账号密码。In a possible implementation manner, the first identification code may carry a pre-stored (that is, initial) first WiFi name, first WiFi password, first management address, and first management account password of the wireless network device. The user who purchased the wireless network device can scan the first identification code on the wireless network device through his first mobile terminal, thereby analyzing and obtaining the first WiFi name, the first WiFi password, the first management address and the first management account password.

例如,从所述第一标识码中识别获得信息可以如下:For example, the information obtained from the identification of the first identification code may be as follows:

ssid1=test1&wifipwd=abcd1234&username=user&userpwd=ccabcd&ip=192.168.10.1&productname=xxx&mac=aabbccdd1122&vendor=ysz&model=wifi&date=2021.2.20ssid1=test1&wifipwd=abcd1234&username=user&userpwd=ccabcd&ip=192.168.10.1&productname=xxx&mac=aabbccdd1122&vendor=ysz&model=wifi&date=2021.2.20

其中,“&”用于进行字段分割,ssid字段为所述第一WiFi名称,wifipwd字段为所述第一WiFi密码,username字段和userpwd字段为所述第一管理账号密码,ip字段为所述第一管理地址。其他字段可以用于记录包括厂家名称、无线网络设备MAC地址、无线网络设备模式、时间等信息。Wherein, "&" is used for field segmentation, the ssid field is the first WiFi name, the wifipwd field is the first WiFi password, the username field and userpwd field are the first management account password, and the ip field is the first management address. Other fields can be used to record information including manufacturer name, MAC address of wireless network device, mode of wireless network device, time and so on.

在另一种可能的实现方式中,出售无线网络设备的商家可以在出售无线网络设备之前记录每个无线网络设备初始的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码与该无线网络设备的身份标识的对应关系。所述身份标识可以为所述无线网络设备序列号、唯一设备标识、MAC地址等。In another possible implementation, the merchant who sells the wireless network device may record the correspondence between each wireless network device's initial first WiFi name, first WiFi password, first management address, first management account password and the identity of the wireless network device before selling the wireless network device. The identity identifier may be the serial number of the wireless network device, a unique device identifier, a MAC address, and the like.

所述第一标识码中可以携带有所述无线网络设备的身份标识及路由出售无线网络设备的商家的服务器地址。购买了无线网络设备的用户可以通过其第一移动终端扫描所述无线网络设备上的第一标识码,从而向所述服务器发送携带有所述无线网络设备的身份标识的登录信息获取请求。所述服务器根据接收到的登录信息获取请求中的所述无线网络设备的身份标识查找与所述无线网络设备对应的所述第一WiFi名称、所述第一WiFi密码、所述第一管理地址及所述第一管理账号密码发送给所述第一移动终端。The first identification code may carry the identity of the wireless network device and the server address of the merchant that sells the wireless network device. A user who has purchased a wireless network device may scan the first identification code on the wireless network device through his first mobile terminal, so as to send a login information acquisition request carrying the identity of the wireless network device to the server. The server searches for the first WiFi name, the first WiFi password, the first management address and the first management account password corresponding to the wireless network device according to the identity of the wireless network device in the received login information acquisition request and sends them to the first mobile terminal.

进一步地,为了避免非法用户恶意获取所述服务器预存的无线网络设备信息,在本实施例中,所述服务器可以预先记录有购买所述无线网络设备的用户的身份标识与所述无线网络设备的身份标识的对应关系。Further, in order to prevent illegal users from maliciously obtaining the wireless network device information prestored in the server, in this embodiment, the server may pre-record the correspondence between the identity of the user who purchased the wireless network device and the identity of the wireless network device.

所述第一移动终端向服务器发送登录信息获取请求时,可以向服务器发送携带有在所述第一移动终端上登录的用户的身份标识及所述无线网络设备的身份标识的登录信息获取请求。When the first mobile terminal sends a login information acquisition request to the server, it may send a login information acquisition request carrying the identity of the user logged in on the first mobile terminal and the identity of the wireless network device to the server.

然后,所述服务器根据预存的所述对应关系验证所述登录信息获取请求中的用户的身份标识与所述无线网络设备的身份标识是否相符;若相符,则查找与所述无线网络设备的身份标识对应的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端。Then, the server verifies whether the identity of the user in the login information acquisition request matches the identity of the wireless network device according to the pre-stored correspondence; if they match, then search for the first WiFi name corresponding to the identity of the wireless network device, the first WiFi password, the first management address, and the first management account password and send them to the first mobile terminal.

所述第一移动终端在获取到所述第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端后,即可以开始执行步骤S120。After the first mobile terminal obtains the first WiFi name, the first WiFi password, the first management address and the first management account password and sends them to the first mobile terminal, it can begin to execute step S120.

步骤S120,所述第一移动终端根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网。Step S120, the first mobile terminal accesses the wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password.

在本实施例中,所述无线网络设备在首次上电时,会按照预存的第一WiFi名称及第一WiFi密码提供无线局域网。所述第一移动终端在通过步骤S110获得所述第一WiFi名称及第一WiFi密码后,即可接入无线网络设备提供的无线局域网。In this embodiment, when the wireless network device is powered on for the first time, it will provide a wireless local area network according to the pre-stored first WiFi name and first WiFi password. After the first mobile terminal obtains the first WiFi name and the first WiFi password through step S110, it can access the wireless local area network provided by the wireless network device.

可以理解的是,在所述第一移动终端接入所述无线网络设备提供的无线局域网后,即与所述无线网络设备处于同一局域网,从而可以通过局域网通信的方式与所述无线网络设备进行信息交互。It can be understood that after the first mobile terminal accesses the wireless local area network provided by the wireless network device, it is in the same local area network as the wireless network device, so that it can exchange information with the wireless network device through local area network communication.

步骤S130,所述第一移动终端响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址或第二管理账号密码。Step S130, the first mobile terminal obtains network configuration information set by the user in response to the user operation, and the network configuration information includes the updated second WiFi name, second WiFi password, second management address or second management account password.

在本实施例的一种实现方式中,所述第一移动终端在接入所述无线网络设备提供的无线WiFi后,可以通过所述第一管理账号密码向所述第一管理地址发起管理连接,获取所述无线网络设备的当前配置信息。In an implementation manner of this embodiment, after accessing the wireless WiFi provided by the wireless network device, the first mobile terminal may initiate a management connection to the first management address through the first management account password to obtain current configuration information of the wireless network device.

接着,所述第一移动终端可以提供一操作界面,并可以在所述操作界面上显示所述无线网络设备的当前配置信息。用户可以在该操作界面上根据自己的需要设置新的第二WiFi名称、第二WiFi密码、第二管理地址、第二管理账号密码等。Next, the first mobile terminal may provide an operation interface, and may display current configuration information of the wireless network device on the operation interface. The user can set a new second WiFi name, a second WiFi password, a second management address, a second management account password, etc. according to his needs on the operation interface.

所述第一移动终端可以响应用户在所述操作界面上的配置操作,获取用户设置的第二WiFi名称、第二WiFi密码、第二管理地址及第二管理账号密码作为网络配置信息。The first mobile terminal may respond to the user's configuration operation on the operation interface, and obtain the second WiFi name, the second WiFi password, the second management address and the second management account password set by the user as network configuration information.

可选地,在需要由所述无线网络设备发起拨号上网(如,PPPoE拨号上网)的场景中,用户还可以在所述操作界面上设置无线网络设备的拨号PPPoE账号密码。所述网络配置信息中可以包括PPPoE账号密码。Optionally, in a scenario where the wireless network device needs to initiate dial-up Internet access (for example, PPPoE dial-up Internet access), the user can also set the dial-up PPPoE account password of the wireless network device on the operation interface. The network configuration information may include a PPPoE account password.

步骤S140,所述第一移动终端向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求。Step S140, the first mobile terminal sends a configuration request carrying the first management account password and the network configuration information to the first management address.

在一种可能的实现方式中,所述第一移动终端可以根据所述第一管理地址、第一管理账号密码及所述网络配置信息拼接出一个访问所述第一管理地址的http Post请求。In a possible implementation manner, the first mobile terminal may splice an http Post request to access the first management address according to the first management address, the first management account password, and the network configuration information.

例如,以所述网络配置信息包括所述PPPoE账号密码、所述第二WiFi名称、所述第二WiFi密码为例,所述配置请求的形式可以如下:For example, taking the network configuration information including the PPPoE account password, the second WiFi name, and the second WiFi password as an example, the form of the configuration request can be as follows:

http://192.168.10.1/itms/username=xxxx&userpwd=xxxx&PPPOEuser=xxx&PPPOEpassword=xxx&SSID=test-2&WiFiPassword=12345678http://192.168.10.1/itms/username=xxxx&userpwd=xxxx&PPPOEuser=xxx&PPPOEpassword=xxx&SSID=test-2&WiFiPassword=12345678

其中,username字段和userpwd为所述第一管理账号密码,PPPOEuser字段和PPPOEpassword字段为所述PPPoE账号密码,SSID字段为所述第二WiFi名称,WiFiPassword字段为所述第二WiFi密码。Wherein, the username field and userpwd are the password of the first management account, the PPPOEuser field and the PPPOEpassword field are the password of the PPPoE account, the SSID field is the name of the second WiFi, and the WiFiPassword field is the password of the second WiFi.

步骤S150,所述无线网络设备根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后应用所述网络配置信息。Step S150, the wireless network device verifies the configuration request according to the pre-stored password of the first management account, and applies the network configuration information after the verification is passed.

在本实施例中,所述无线网络设备在接收到所述配置请求后,可以验证根据自身预存的第一管理账号密码与所述配置请求中携带的第一管理账号密码是否相符。若相符,则应用所述网络配置信息,即,使用用户新设置的网络配置替换所述无线网络设备预存的初始网络配置。In this embodiment, after receiving the configuration request, the wireless network device may verify whether the first management account password prestored by itself matches the first management account password carried in the configuration request. If they match, the network configuration information is applied, that is, the network configuration newly set by the user is used to replace the initial network configuration pre-stored in the wireless network device.

其中,如果所述网络配置信息中包括PPPoE账号密码,所述无线网络设备在在验证通过后使用所述PPPoE账号密码进行拨号上网,并向所述第一移动终端发送拨号状态。Wherein, if the network configuration information includes a PPPoE account password, the wireless network device uses the PPPoE account password to dial-up to access the Internet after passing the verification, and sends a dial-up status to the first mobile terminal.

基于上述设计,本实施例提供的无线网络设备配置方法,通过移动终端扫描设置在无线网络设备上的标识码,使移动终端自动地完成无线网络设备的WiFi接入、网络配置等动作,不需要用户进行大量复杂的手动操作,从而可以提高无线网络设备配置的效率,减少了配置出错的可能性。Based on the above design, the wireless network device configuration method provided in this embodiment enables the mobile terminal to automatically complete actions such as WiFi access and network configuration of the wireless network device by scanning the identification code set on the wireless network device by the mobile terminal, without requiring the user to perform a large number of complicated manual operations, thereby improving the efficiency of wireless network device configuration and reducing the possibility of configuration errors.

通常,无线网络设备还具有限制某个移动终端是否可以访问网络、限制上网时间、限时网速等功能。这些配置操作也需要用户通过终端设备与无线无线网络设备建立管理连接,然后对无线网络设备进行配置。Usually, the wireless network device also has the functions of restricting whether a certain mobile terminal can access the network, restricting the time of surfing the Internet, and limiting the speed of the network. These configuration operations also require the user to establish a management connection with the wireless network device through the terminal device, and then configure the wireless network device.

在一些场景中,对无线网络设备具有管理权限的用户可能暂时无法与无线网络设备建立管理连接,但是其他用户可能需要申请接入无线网络设备的权限。In some scenarios, a user with management rights to the wireless network device may temporarily be unable to establish a management connection with the wireless network device, but other users may need to apply for permission to access the wireless network device.

例如,请参照图3,所述无线网络设备配置系统还可以包括第二移动终端300。其中,所述第一移动终端200为对所述无线网络设备100具有管理权限的用户的移动终端,所述第一移动终端200可能当前无法与所述无线网络设备100建立管理通信(例如,所述无线网络设备100为内网无线网络设备,而所述第一移动终端200此时位于外网),而所述第二移动终端300可以为需要接入所述无线网络设备100的终端。For example, referring to FIG. 3 , the wireless network device configuration system may further include a second mobile terminal 300 . Wherein, the first mobile terminal 200 is a mobile terminal of a user having management authority to the wireless network device 100, the first mobile terminal 200 may not be able to establish management communication with the wireless network device 100 currently (for example, the wireless network device 100 is a wireless network device on an internal network, and the first mobile terminal 200 is located on an external network at this time), and the second mobile terminal 300 may be a terminal that needs to access the wireless network device 100.

在本实施例一种可能的实现方式中,可以通过步骤S210到步骤S250在不需要用户进行过多配置的情况下,实现所述第二移动终端获得接入所述无线网络设备上网的权限。请参照图4,下面对步骤S210到步骤S260进行详细解释。In a possible implementation manner of this embodiment, steps S210 to S250 may be used to realize that the second mobile terminal obtains the right to access the wireless network device to surf the Internet without requiring the user to perform too many configurations. Referring to FIG. 4 , step S210 to step S260 will be explained in detail below.

步骤S210,所述第一移动终端获取第二移动终端的通信标识、网络使用时间及限速策略。Step S210, the first mobile terminal acquires the communication identifier, network usage time and speed limit policy of the second mobile terminal.

在本实施例中,所述第二移动终端的通信标识可以包括所述第二移动终端的MAC地址,所述网络使用时间可以包括使用时长,所述限速策略可以包括最高下载速度及最高上传速度。In this embodiment, the communication identifier of the second mobile terminal may include the MAC address of the second mobile terminal, the network usage time may include usage duration, and the speed limit policy may include a maximum download speed and a maximum upload speed.

在一种可能的实现方式中,所述第二移动终端可以通过扫描设置于所述无线网络设备上的第一标识码,获得所述无线网络设备的身份标识及服务器的地址。In a possible implementation manner, the second mobile terminal may obtain the identity of the wireless network device and the address of the server by scanning the first identification code set on the wireless network device.

然后所述第二移动终端根据所述服务器的地址将所述无线网络设备发送联网申请信息,所述联网申请信息包括所述第二移动终端的通信标识及所述无线网络设备的身份标识。Then the second mobile terminal sends the wireless network device networking application information according to the address of the server, and the networking application information includes the communication identifier of the second mobile terminal and the identity identifier of the wireless network device.

所述服务器可以根据所述无线网络设备的身份标识查找对该无线网络设备具有管理权限的第一移动终端,并将所述联网申请信息发送至所述第一移动终端。The server may search for a first mobile terminal having management authority for the wireless network device according to the identity of the wireless network device, and send the networking application information to the first mobile terminal.

如此,所述第一移动终端可以获得所述第二移动终端的通信标识。In this way, the first mobile terminal can obtain the communication identifier of the second mobile terminal.

进一步地,所述第一移动终端在接收到所述联网申请信息后,可以显示一操作界面,用户可以在所述操作界面上进行配置选取所述网络使用时间及所述限速策略。Further, after the first mobile terminal receives the networking application information, it can display an operation interface, and the user can configure and select the network usage time and the speed limit policy on the operation interface.

步骤S220,所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息。Step S220, the first mobile terminal encrypts the communication identifier of the second mobile terminal, the network usage time, and the speed limit policy according to the second management account password to obtain encrypted information.

在本实施例中,为了避免恶意的终端设备对所述无线网络设备进行配置,所述第一终端可以使用所述第二管理账号密码来对对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密。In this embodiment, in order to prevent a malicious terminal device from configuring the wireless network device, the first terminal may use the second management account password to encrypt the communication identifier of the second mobile terminal, the network usage time, and the speed limit policy.

步骤S230,所述第一移动终端根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码。Step S230, the first mobile terminal generates a second identification code according to the encrypted information and the second management address of the wireless network device.

在本实施例中,所述第二标识码可以由所述第一移动终端发送至所述第二移动终端,或者采用所述其他方式发送给使用所述第二移动终端的用户。In this embodiment, the second identification code may be sent by the first mobile terminal to the second mobile terminal, or sent to the user using the second mobile terminal in the other manner.

步骤S240,所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息。Step S240, the second mobile terminal obtains the second management address and the encrypted information by scanning the second identification code, and sends networking configuration information carrying the encrypted information to the second management address.

在本实施例中,所述第二移动终端可以在与所述无线网络设备建立网络连接后,根据所述第二管理地址将所述加密信息发送给所述无线网络设备。In this embodiment, after establishing a network connection with the wireless network device, the second mobile terminal may send the encrypted information to the wireless network device according to the second management address.

在一种可能的实现方式中,在步骤S230中,所述第一移动终端可以根据所述加密信息、所述无线网络设备的第二WiFi名称、第二WiFi密码及第二管理地址生成所述第二标识码。In a possible implementation manner, in step S230, the first mobile terminal may generate the second identification code according to the encrypted information, the second WiFi name, the second WiFi password, and the second management address of the wireless network device.

然后在步骤S240中,所述第二移动终端可以通过扫描所述第二标识码,获得所述第二WiFi名称、所述第二WiFi密码、所述第二管理地址及所述加密信息。然后所述第二移动终端可以根据所述第二WiFi名称及所述第二WiFi密码接入所述无线网络设备提供的无线局域网,并通过所述无线局域网向所述第二管理地址发送携带有所述加密信息的联网配置信息。Then in step S240, the second mobile terminal can obtain the second WiFi name, the second WiFi password, the second management address and the encrypted information by scanning the second identification code. Then the second mobile terminal can access the wireless local area network provided by the wireless network device according to the second WiFi name and the second WiFi password, and send the networking configuration information carrying the encrypted information to the second management address through the wireless local area network.

如此,使用所述第二移动终端的用户可以不需要提前获知所述无线网络设备的第二WiFi名称和第二WiFi密码,不需要进行手动选择操作即可使所述第二移动终端自动地接入所述无线网络设备提供的WiFi,并发送所述联网配置信息。In this way, the user using the second mobile terminal does not need to know the second WiFi name and the second WiFi password of the wireless network device in advance, and does not need to perform a manual selection operation to enable the second mobile terminal to automatically access the WiFi provided by the wireless network device and send the networking configuration information.

可以理解的时,此时,虽然所述第二移动终端可以接入所述无线网络设备提供的无线局域网,但并不是即可以通过所述无线网络设备上网,还需要经过所述无线网络设备后续处理步骤以后,才可通过所述无线网络设备上网。It can be understood that at this time, although the second mobile terminal can access the wireless local area network provided by the wireless network device, it does not immediately access the Internet through the wireless network device, and needs to go through the subsequent processing steps of the wireless network device before it can access the Internet through the wireless network device.

步骤S250,所述无线网络设备根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略。Step S250, the wireless network device decrypts the encrypted information in the received networking configuration information according to the second management account password, and obtains the communication identifier of the second mobile terminal, the network usage time and the speed limit policy.

在本实施例中,所述无线网络设备可以根据预存的第二管理账号密码对所述加密信息进行解密,若解密成功,则表示该联网配置信息确实来自于对该无线网络设备具有管理权限的第一移动终端,所述无线网络设备获取·解密后得到的所述第二移动终端的通信标识、所述网络使用时间及所述限速策略。In this embodiment, the wireless network device may decrypt the encrypted information according to the pre-stored second management account password. If the decryption is successful, it means that the networking configuration information does come from the first mobile terminal having management authority for the wireless network device, and the wireless network device acquires and decrypts the communication identifier of the second mobile terminal, the network usage time, and the speed limit policy.

步骤S260,所述无线网络设备根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度。In step S260, the wireless network device adds the second mobile terminal to a whitelist for allowing Internet access according to the communication identifier of the second mobile terminal, and limits the online time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

例如,所述无线网络设备可以将所述第二移动终端的MAC地址加入到允许上网白名单,然后设置与该MAC地址相关的网络使用时间设置和限速设置。在如此设置之后,所述无线网络设备即可放行所述第二移动终端的上网流量。For example, the wireless network device may add the MAC address of the second mobile terminal to a white list allowing Internet access, and then set the network usage time setting and speed limit setting related to the MAC address. After such setting, the wireless network device can allow the Internet traffic of the second mobile terminal.

基于上述设计,本实施例提供的无线网络设备配置方法,可以在对所述无线网络设备具有管理权限的第一移动终端无法与所述无线网络设备直接通信的时候,通过需要接入所述无线网络设备的第二移动终端的扫描动作,使第二移动终端发起与所述第一移动终端之间的信息交互,从而实现自动地对所述无线网络设备进行配置使所述第二移动终端获得通过所述无线网络设备上网的权限。整个过程的信息传递和数据配置不需要用户进行复杂的手动操作,大大提高了无线网络设备配置的效率,减少配置出错的可能性。Based on the above design, the wireless network device configuration method provided in this embodiment can enable the second mobile terminal to initiate information interaction with the first mobile terminal through the scanning action of the second mobile terminal that needs to access the wireless network device when the first mobile terminal having management authority for the wireless network device cannot directly communicate with the wireless network device, so as to automatically configure the wireless network device so that the second mobile terminal obtains the right to access the Internet through the wireless network device. The entire process of information transmission and data configuration does not require users to perform complicated manual operations, which greatly improves the efficiency of wireless network device configuration and reduces the possibility of configuration errors.

进一步地,为了避免所述第二移动终端重复使用同一联网配置信息获得延长的上网时间,在一些可能的实现方式中,所述第一移动终端可以在所述加密信息中设置某种唯一标识。Further, in order to prevent the second mobile terminal from repeatedly using the same networking configuration information to obtain extended online time, in some possible implementation manners, the first mobile terminal may set some kind of unique identifier in the encrypted information.

例如,在步骤S230中,所述第一移动终端可以获取当前时间作为授权时间,然后根据所述第二管理账号密码对所述授权时间、所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得所述加密信息。For example, in step S230, the first mobile terminal may obtain the current time as the authorization time, and then encrypt the authorization time, the communication identifier of the second mobile terminal, the network usage time, and the speed limit policy according to the second management account password to obtain the encrypted information.

在步骤S260中,所述无线网络设备可以根据所述第二管理账号密码对本次接收到的所述联网配置信息中的加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间、所述限速策略及所述授权时间。In step S260, the wireless network device may decrypt the encrypted information in the networking configuration information received this time according to the second management account password, and obtain the communication identifier of the second mobile terminal, the network usage time, the speed limit policy and the authorization time.

然后,所述无线网络设备检测是否曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息。Then, the wireless network device detects whether it has ever received historical networking configuration information with the same authorization time as the networking configuration information received this time.

若曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息,则表示本次接收到的所述联网配置信息是所述第二移动终端曾经发送过的,即所述第二移动终端可能在重复使用同一个联网配置信息以获取延长的上网时间,因此所述无线网络设备不对本次的所述联网配置信息进行处理。If the historical networking configuration information with the same authorization time as the networking configuration information received this time has been received, it means that the networking configuration information received this time was sent by the second mobile terminal, that is, the second mobile terminal may reuse the same networking configuration information to obtain an extended Internet access time, so the wireless network device does not process the networking configuration information this time.

若不曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息,则表示本次接收到的联网配置信息是新的,所述无线网络设备可以将本次接收到的联网配置信息记录为历史联网配置信息,然后再执行将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度的步骤。If the historical networking configuration information with the same authorization time as the network configuration information received this time has not been received, it means that the network connection configuration information received this time is new, and the wireless network device can record the network connection configuration information received this time as historical network configuration information, and then perform the steps of adding the second mobile terminal to the white list of allowing Internet access, and limiting the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

在一种可能的实现方式中,所述无线网络设备还与网络安全服务器通信连接,所述方法还包括:In a possible implementation manner, the wireless network device is also communicatively connected to a network security server, and the method further includes:

所述无线网络设备在接收到更新当前的所述网络配置信息的未知信息访问请求时,在所述未知信息访问请求与信任白名单中的白名单成员不匹配时进行拦截,并在拦截的同时将所述未知信息访问请求中的访问配置信息发送给所述网络安全服务器;When the wireless network device receives an unknown information access request for updating the current network configuration information, it intercepts when the unknown information access request does not match a whitelist member in the trusted white list, and sends the access configuration information in the unknown information access request to the network security server while intercepting;

所述网络安全服务器获取所述访问配置信息中的每个访问配置属性所对应的历史网络事件集合,并所述历史网络事件集合中查找到与所述无线网络设备的路由运行环境相关的目标网络攻击事件后,基于所述目标网络攻击事件的预设更新策略更新所述无线网络设备在所述网络安全服务器上的路由安全防护策略,基于更新后的所述路由安全防护策略,在所述无线网络设备的虚拟安全防护环境中模拟网络安全攻击事件信息;The network security server acquires a set of historical network events corresponding to each access configuration attribute in the access configuration information, and after finding a target network attack event related to the routing operation environment of the wireless network device in the set of historical network events, update the routing security protection policy of the wireless network device on the network security server based on the preset update policy of the target network attack event, and simulate network security attack event information in the virtual security protection environment of the wireless network device based on the updated routing security protection policy;

获取所述无线网络设备的虚拟安全防护环境中针对所述网络安全攻击事件信息响应的多个响应拦截行为的响应拦截行为对象,并获取与所述多个响应拦截行为相关的多个历史拦截扩展跟踪行为,任一历史拦截扩展跟踪行为包括扩展跟踪对象和扩展跟踪路径集合;Obtaining response interception behavior objects of multiple response interception behaviors in response to the network security attack event information in the virtual security protection environment of the wireless network device, and acquiring multiple historical interception extension tracking behaviors related to the multiple response interception behaviors, any historical interception extension tracking behavior includes an extension tracking object and an extension tracking path set;

根据每个历史拦截扩展跟踪行为的扩展跟踪对象和多个响应拦截行为的响应拦截行为对象,确定每个历史拦截扩展跟踪行为所属的响应拦截行为;According to the extended tracking object of each historical interception extended tracking action and the response interception action objects of multiple response interception actions, determine the response interception behavior to which each historical interception extended tracking action belongs;

根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合以及每个历史拦截扩展跟踪行为所属的响应拦截行为,对所述多个历史拦截扩展跟踪行为进行分簇处理,得到多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为;According to the set of extended tracing paths of each historical interception extended tracing behavior and the response interception behavior to which each historical interception extended tracing behavior belongs, the multiple historical interception extended tracing behaviors are clustered to obtain the response interception behaviors to which the multiple historical interception extended tracing behavior clusters respectively belong;

根据多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为,确定所述多个历史拦截扩展跟踪行为中每个扩展跟踪行为所属的响应拦截行为,并为每个扩展跟踪行为和每个扩展跟踪行为所属的响应拦截行为建立关联关系后,基于建立的关联关系信息对所述路由安全防护策略进行扩展更新,以将扩展更新后的所述路由安全防护策略发送给所述无线网络设备进行自动响应配置。According to the response interception behaviors to which the plurality of historical interception extended tracking behavior clusters respectively belong, determine the response interception behavior to which each extended tracking behavior in the plurality of historical interception extended tracking behaviors belongs, and after establishing an association relationship between each extended tracking behavior and the response interception behavior to which each extended tracking behavior belongs, perform an extended update on the routing security protection policy based on the established association relationship information, so as to send the expanded and updated routing security protection policy to the wireless network device for automatic response configuration.

基于上述设计,本实施例提供的无线网络设备配置方法可以在云端执行无线网络设备的网络安全策略的更新,并在更新的过程中结合模拟行为和历史行为进行扩展更新,以提高后续无线网络设备的网络安全性,传统方案通常仅在于简单的拦截。Based on the above design, the wireless network device configuration method provided in this embodiment can update the network security policy of the wireless network device in the cloud, and perform extended updates in combination with simulated behavior and historical behavior during the update process, so as to improve the network security of subsequent wireless network devices. Traditional solutions usually only focus on simple interception.

可选地,在执行所述获取与所述多个响应拦截行为相关的多个历史拦截扩展跟踪行为时,可以获取原始拦截扩展跟踪行为集合,原始拦截扩展跟踪行为集合中的任一原始拦截扩展跟踪行为包括扩展跟踪对象和扩展跟踪路径集合;然后从所述原始拦截扩展跟踪行为集合中确定与多个响应拦截行为对象中至少一个响应拦截行为对象匹配的原始拦截扩展跟踪行为,将匹配的多个原始拦截扩展跟踪行为均作为与所述多个响应拦截行为相关的多个历史拦截扩展跟踪行为。Optionally, when performing the acquisition of a plurality of historical interception extended tracking actions related to the plurality of response interception actions, an original interception extended tracking action set may be obtained, and any original interception extended tracking action set includes an extended tracking object and an extended tracking path set; then, from the original interception extended tracking action set, an original interception extended tracking action that matches at least one response interception action object among the plurality of response interception action objects is determined, and the matched multiple original interception extended tracking actions are used as multiple historical interception extended tracking actions related to the plurality of response interception actions.

可选地,所述响应拦截行为对象包括响应拦截行为类别和响应拦截行为覆盖区域。在执行从所述原始拦截扩展跟踪行为集合中确定与多个响应拦截行为对象中至少一个响应拦截行为对象匹配的原始拦截扩展跟踪行为时,若原始拦截扩展跟踪行为中的扩展跟踪对象与目标响应拦截行为类别匹配,则确定所述原始拦截扩展跟踪行为是与所述目标响应拦截行为类别对应的响应拦截行为对象匹配的原始拦截扩展跟踪行为,所述目标响应拦截行为类别属于多个响应拦截行为类别。Optionally, the response interception behavior object includes a response interception behavior category and a response interception behavior coverage area. When performing the original interception extended tracking behavior determined to match at least one response interception behavior object among the plurality of response interception behavior objects from the original interception extended tracking behavior set, if the extended tracking object in the original interception extended tracking behavior matches the target response interception behavior category, then it is determined that the original interception extended tracking behavior is the original interception extended tracking behavior matching the response interception behavior object corresponding to the target response interception behavior category, and the target response interception behavior category belongs to multiple response interception behavior categories.

可选地,在执行针对任一历史拦截扩展跟踪行为,根据所述任一历史拦截扩展跟踪行为的扩展跟踪对象和多个响应拦截行为的响应拦截行为对象,确定所述任一历史拦截扩展跟踪行为所属的响应拦截行为时,从多个响应拦截行为对象中确定与所述任一历史拦截扩展跟踪行为中的扩展跟踪对象匹配的目标响应拦截行为对象;然后将所述目标响应拦截行为对象对应的响应拦截行为作为所述任一历史拦截扩展跟踪行为所属的响应拦截行为。Optionally, when executing any historical interception extended tracking behavior, according to the extended tracking object of any historical interception extended tracking behavior and the response interception behavior objects of multiple response interception behaviors, when determining the response interception behavior to which any historical interception extended tracking behavior belongs, determine from the multiple response interception behavior objects a target response interception behavior object that matches the extended tracking object in any of the historical interception extended tracking behaviors; and then use the response interception behavior corresponding to the target response interception behavior object as the response interception behavior to which any historical interception extended tracking behavior belongs.

可选地,在执行所述根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合以及每个历史拦截扩展跟踪行为所属的响应拦截行为,对所述多个历史拦截扩展跟踪行为进行分簇处理,得到多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为时,可以获取第一预设分簇数量,根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合和所述第一预设分簇数量,将多个历史拦截扩展跟踪行为划分为多个原始拦截扩展跟踪行为库。然后根据每个原始拦截扩展跟踪行为库中的历史拦截扩展跟踪行为所属的响应拦截行为,确定多个历史拦截扩展跟踪行为簇以及每个历史拦截扩展跟踪行为簇所属的响应拦截行为。Optionally, when executing the extended tracing path set of each historical intercepting extended tracing behavior and the response intercepting behavior to which each historical intercepting extended tracing behavior belongs, performing clustering processing on the multiple historical intercepting extended tracing behaviors to obtain the response intercepting behaviors to which the multiple historical intercepting extended tracing behavior clusters respectively belong, a first preset clustering number may be obtained, and according to the extended tracing path set of each historical intercepting extended tracking behavior and the first preset clustering number, divide the multiple historical intercepting extended tracking behaviors into multiple original intercepting extended tracking behavior libraries. Then, according to the response interception behavior to which the history interception extension tracking behavior belongs in each original interception extension tracking behavior library, multiple historical interception extension tracking behavior clusters and the response interception behavior to which each history interception extension tracking behavior cluster belongs are determined.

其中,在执行根据每个原始拦截扩展跟踪行为库中的历史拦截扩展跟踪行为所属的响应拦截行为,确定多个历史拦截扩展跟踪行为簇以及每个历史拦截扩展跟踪行为簇所属的响应拦截行为时,可以统计原始拦截扩展跟踪行为库中包含的历史拦截扩展跟踪行为的第一行为数量,然后将所述原始拦截扩展跟踪行为库划分为多个单位原始拦截扩展跟踪行为库,任一单位原始请求簇中的历史拦截扩展跟踪行为属于相同响应拦截行为。然后从多个单位原始拦截扩展跟踪行为库中获取包含历史拦截扩展跟踪行为最多的目标单位原始拦截扩展跟踪行为库,统计目标单位原始拦截扩展跟踪行为库包含的历史拦截扩展跟踪行为的第二行为数量。Wherein, when executing the response interception behavior to which the historical interception extension tracking behavior in each original interception extension tracking behavior library belongs, a plurality of historical interception extension tracking behavior clusters and the response interception behavior to which each historical interception extension tracking behavior cluster belongs are determined, the number of the first behaviors of the historical interception extension tracking behavior contained in the original interception extension tracking behavior library can be counted, and then the original interception extension tracking behavior library is divided into multiple unit original interception extension tracking behavior libraries, and the historical interception extension tracking behaviors in any unit original request cluster belong to the same response interception behavior. Then obtain the target unit original interception extended tracking behavior library containing the most historical interception extended tracking behavior library from multiple unit original interception extended tracking behavior libraries, and count the number of second behaviors of historical interception extended tracking behavior contained in the target unit's original interception extended tracking behavior library.

若所述第一行为数量和所述第二行为数量之间的比值不小于预设响应拦截行为比值,则将所述原始拦截扩展跟踪行为库确定为历史拦截扩展跟踪行为簇,并将所述目标单位原始拦截扩展跟踪行为库对应的响应拦截行为作为所述历史拦截扩展跟踪行为簇所属的响应拦截行为。If the ratio between the first behavior quantity and the second behavior quantity is not less than the preset response interception behavior ratio, the original interception extended tracking behavior library is determined as a historical interception extended tracking behavior cluster, and the response interception behavior corresponding to the original interception extended tracking behavior library of the target unit is used as the response interception behavior to which the historical interception extended tracking behavior cluster belongs.

若所述第一行为数量和所述第二行为数量之间的比值小于所述预设响应拦截行为比值,则调整所述第一预设分簇数量,得到第二预设分簇数量。If the ratio between the first behavior number and the second behavior number is smaller than the preset response interception behavior ratio, then adjust the first preset clustering number to obtain a second preset clustering number.

然后,根据所述第二预设分簇数量,将所述原始拦截扩展跟踪行为库中的历史拦截扩展跟踪行为重新进行分簇处理,得到历史拦截扩展跟踪行为簇以及所述历史拦截扩展跟踪行为簇所属的响应拦截行为。Then, according to the second preset number of clusters, re-cluster the historical interception extended tracking behaviors in the original interception extended tracking behavior library to obtain the historical interception extended tracking behavior clusters and the response interception behaviors to which the historical interception extended tracking behavior clusters belong.

在一种可能的实现方式中,所述多个历史拦截扩展跟踪行为包括第一历史拦截扩展跟踪行为和第二历史拦截扩展跟踪行为。在执行根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合和所述第一预设分簇数量,将多个历史拦截扩展跟踪行为划分为多个原始拦截扩展跟踪行为库时,统计所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为的扩展跟踪行为联动数量;从所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为中获取最大扩展跟踪行为数量;若所述扩展跟踪行为联动数量和所述最大扩展跟踪行为数量之间的比值大于所述第一预设分簇数量,则将所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为组合为原始拦截扩展跟踪行为库;或者In a possible implementation manner, the multiple history intercepting extended tracing actions include a first historical intercepting extended tracing action and a second historical intercepting extended tracing action. When executing the extended tracing path set and the first preset clustering quantity of each historical intercepting extended tracing behavior, when dividing a plurality of historical intercepting extended tracing behaviors into a plurality of original intercepting extended tracing behavior libraries, counting the number of extended tracing behavior linkages between the first historical intercepting extended tracing behavior and the second historical intercepting extended tracing behavior; obtaining the maximum number of extended tracing behaviors from the first historical intercepting extended tracing behavior and the second historical intercepting extended tracing behavior; Combining the tracing behavior and the second historical interception extension tracing behavior into an original interception extension tracing behavior library; or

在另一种可能的实现方式中,所述多个历史拦截扩展跟踪行为包括第一历史拦截扩展跟踪行为和第二历史拦截扩展跟踪行为。在执行所述根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合和所述第一预设分簇数量,将多个历史拦截扩展跟踪行为划分为多个原始拦截扩展跟踪行为库时,统计所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为的扩展跟踪行为联动数量;统计所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为的扩展跟踪行为总量;若所述扩展跟踪行为联动数量和所述扩展跟踪行为总量之间的比值大于所述第一预设分簇数量,则将所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为组合为原始拦截扩展跟踪行为库;或者In another possible implementation manner, the multiple history intercepting extended tracing actions include a first historical intercepting extended tracing action and a second historical intercepting extended tracing action. When executing the extended tracing path set and the first preset clustering quantity according to each historical intercepting extended tracing behavior, when dividing a plurality of historical intercepting extended tracing behaviors into a plurality of original intercepting extended tracing behavior libraries, counting the number of extended tracing behaviors of the first historical intercepting extended tracing behavior and the second historical intercepting extended tracing behavior; counting the total amount of extended tracing behaviors of the first historical intercepting extended tracing behavior and the second historical intercepting extended tracing behavior; Combining with the second historical interception extension tracking behavior to form an original interception extension tracking behavior library; or

在另一种可能的实现方式中,所述多个历史拦截扩展跟踪行为包括第一历史拦截扩展跟踪行为和第二历史拦截扩展跟踪行为,所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为均还包括扩展跟踪行为的行为参与度。在执行根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合和所述第一预设分簇数量,将多个历史拦截扩展跟踪行为划分为多个原始拦截扩展跟踪行为库时,获取所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为的共用扩展跟踪行为;根据所述共用扩展跟踪行为在所述第一历史拦截扩展跟踪行为中的行为参与度和共用扩展跟踪行为在所述第二历史拦截扩展跟踪行为中的行为参与度的差值,确定行为参与度权重;若所述行为参与度权重小于所述第一预设分簇数量,则将所述第一历史拦截扩展跟踪行为和所述第二历史拦截扩展跟踪行为组合为原始拦截扩展跟踪行为库。In another possible implementation manner, the plurality of history intercepting extended tracking behaviors include a first historical intercepting extended tracking action and a second historical intercepting extended tracking action, and both the first historical intercepting extended tracking action and the second historical intercepting extended tracking action further include the behavior participation degree of the extended tracking action. When executing the extended tracking path set and the first preset clustering quantity of each historical intercepting extended tracking behavior, when dividing multiple historical intercepting extended tracking behaviors into a plurality of original intercepting extended tracking behavior libraries, obtaining the shared extended tracking behavior of the first historical intercepted extended tracking behavior and the second historical intercepted extended tracking behavior; determining the behavior participation weight according to the difference between the behavior participation degree of the shared extended tracking behavior in the first historical intercepted extended tracking behavior and the behavior participation degree of the shared extended tracking behavior in the second historical intercepted extended tracking behavior; if the behavior participation weight is less than the first preset number of clusters , then combine the first historical interception extension tracing behavior and the second history interception extension tracing behavior into an original interception extension tracing behavior library.

可选地,在执行针对所述多个历史拦截扩展跟踪行为中任一扩展跟踪行为,根据多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为,确定所述多个历史拦截扩展跟踪行为中每个扩展跟踪行为所属的响应拦截行为时,可以根据多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为,统计所述任一扩展跟踪行为在每个响应拦截行为的扩展跟踪次数以及所述任一扩展跟踪行为在所有响应拦截行为的总扩展跟踪次数;若多个扩展跟踪次数中的最大扩展跟踪次数和所述总扩展跟踪次数的比值大于预设比值,则将所述最大扩展跟踪次数对应的响应拦截行为作为所述任一扩展跟踪行为所属的响应拦截行为。Optionally, when executing any extended tracking behavior among the plurality of historical interception extended tracking behaviors, and determining the response interception behavior to which each extended tracking behavior in the plurality of historical interception extended tracking behavior clusters respectively belongs according to the response interception behaviors to which each of the multiple historical interception extended tracking behavior clusters belongs, the number of extended tracking times of any of the extended tracking behaviors in each response interception behavior and the total number of extended tracking times of the any extended tracking behavior in all response interception behaviors can be counted according to the response interception behaviors to which each of the multiple historical interception extended tracking behavior clusters belongs; If the value is greater than the preset ratio, the response interception behavior corresponding to the maximum number of extended tracking times is used as the response interception behavior to which any of the extended tracking behaviors belongs.

可选地,在执行所述基于建立的关联关系信息对所述路由安全防护策略进行扩展更新,以将扩展更新后的所述路由安全防护策略发送给所述无线网络设备进行自动响应配置时,可以按照建立的关联关系信息中的每个扩展跟踪行为和每个扩展跟踪行为所属的响应拦截行为,查找与每个扩展跟踪行为对应的策略规则集合,并按照每个扩展跟踪行为所属的响应拦截行为从所述策略规则集合中获取对应的待更新规则后,基于所述待更新规则对所述路由安全防护策略进行规则更新,以将规则更新后的所述路由安全防护策略发送给所述无线网络设备进行自动响应配置。Optionally, when performing the extended update of the routing security protection policy based on the established association relationship information, so as to send the expanded and updated routing security protection policy to the wireless network device for automatic response configuration, search for a policy rule set corresponding to each extended tracking behavior according to each extended tracking behavior in the established association relationship information and the response interception behavior to which each extended tracking behavior belongs, and after obtaining corresponding rules to be updated from the policy rule set according to the response interception behavior to which each extended tracking behavior belongs, then update the routing security protection policy based on the rules to be updated. The routing security protection policy with updated rules is sent to the wireless network device for automatic response configuration.

本实施例还提供一种无线网络设备配置系统,所述系统包括第一移动终端及无线网络设备。This embodiment also provides a wireless network device configuration system, the system includes a first mobile terminal and a wireless network device.

所述第一移动终端用于通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码;根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网;响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址或第二管理账号密码;向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求。The first mobile terminal is configured to scan a first identification code on the wireless network device to obtain a first WiFi name, a first WiFi password, a first management address, and a first management account password prestored by the wireless network device; access a wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password; respond to a user operation, obtain network configuration information set by the user, and the network configuration information includes an updated second WiFi name, second WiFi password, second management address or second management account password; Send a configuration request carrying the first management account password and the network configuration information to the first management address .

所述无线网络设备用于根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后应用所述网络配置信息。The wireless network device is configured to verify the configuration request according to the pre-stored password of the first management account, and apply the network configuration information after the verification is passed.

在一些可能的实现方式中,所述系统还包括第二移动终端。In some possible implementation manners, the system further includes a second mobile terminal.

所述第一移动终端还用于获取第二移动终端的通信标识、网络使用时间及限速策略;根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息;根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码;The first mobile terminal is also used to acquire the communication identification, network use time and speed limit policy of the second mobile terminal; encrypt the communication identification of the second mobile terminal, the network use time and the speed limit policy according to the second management account password to obtain encrypted information; generate a second identification code according to the encrypted information and the second management address of the wireless network device;

所述第二移动终端用于通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息;The second mobile terminal is configured to obtain the second management address and the encrypted information by scanning the second identification code, and send networking configuration information carrying the encrypted information to the second management address;

所述无线网络设备还用于根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略;根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度。The wireless network device is further configured to decrypt the encrypted information in the received networking configuration information according to the second management account password, and obtain the communication identification of the second mobile terminal, the network usage time, and the speed limit policy; add the second mobile terminal to a whitelist for allowing Internet access according to the communication identification of the second mobile terminal, and limit the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

在一些可能的实现方式中,所述第一移动终端还用于获取当前时间作为授权时间。In some possible implementation manners, the first mobile terminal is further configured to obtain the current time as the authorization time.

所述第一移动终端具体用于获取当前时间作为授权时间;使用所述第二管理账号密码对所述授权时间、所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得所述加密信息;The first mobile terminal is specifically used to obtain the current time as the authorization time; use the second management account password to encrypt the authorization time, the communication identification of the second mobile terminal, the network usage time and the speed limit policy to obtain the encrypted information;

所述无线网络设备具体用于根据所述第二管理账号密码对本次接收到的所述联网配置信息中的加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间、所述限速策略及所述授权时间;检测是否曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息;若是,则不对本次的所述联网配置信息进行处理;若否,则将本次接收到的联网配置信息记录为历史联网配置信息,然后再执行将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度的步骤。The wireless network device is specifically configured to decrypt the encrypted information in the networking configuration information received this time according to the second management account password, and obtain the communication identifier of the second mobile terminal, the network usage time, the speed limit policy, and the authorization time; detect whether historical networking configuration information with the same authorization time as the networking configuration information received this time has been received; if so, do not process the networking configuration information this time; A step of adding a whitelist allowing Internet access, and restricting the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy.

综上所述,本申请提供的无线网络设备配置方法及系统,通过移动终端扫描设置在无线网络设备上的标识码,使移动终端自动地完成无线网络设备的WiFi接入、网络配置等动作,不需要用户进行大量复杂的手动操作,从而可以提高无线网络设备配置的效率,减少了配置出错的可能性。To sum up, the wireless network device configuration method and system provided by the present application enable the mobile terminal to automatically complete actions such as WiFi access and network configuration of the wireless network device by scanning the identification code set on the wireless network device through the mobile terminal, without requiring the user to perform a large number of complicated manual operations, thereby improving the efficiency of wireless network device configuration and reducing the possibility of configuration errors.

在本申请所提供的实施例中,应该理解到,所揭露的装置和方法,也可以通过其它的方式实现。以上所描述的装置实施例仅仅是示意性的,例如,附图中的流程图和框图显示了根据本申请的多个实施例的装置、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段或代码的一部分,所述模块、程序段或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现方式中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个连续的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这依所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以用执行规定的功能或动作的专用的基于硬件的系统来实现,或者可以用专用硬件与计算机指令的组合来实现。In the embodiments provided in this application, it should be understood that the disclosed devices and methods may also be implemented in other ways. The device embodiments described above are only illustrative. For example, the flowcharts and block diagrams in the accompanying drawings show the architecture, functions and operations of possible implementations of devices, methods and computer program products according to multiple embodiments of the present application. In this regard, each block in the flowchart or block diagram may represent a module, program segment, or a portion of code that includes one or more executable instructions for implementing specified logical functions. It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks in succession may, in fact, be executed substantially concurrently, or they may sometimes be executed in the reverse order, depending upon the functionality involved. It should also be noted that each block in the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by special purpose hardware-based systems that perform the specified functions or actions, or by combinations of special purpose hardware and computer instructions.

另外,在本申请各个实施例中的各功能模块可以集成在一起形成一个独立的部分,也可以是各个模块单独存在,也可以两个或两个以上模块集成形成一个独立的部分。In addition, each functional module in each embodiment of the present application may be integrated to form an independent part, each module may exist independently, or two or more modules may be integrated to form an independent part.

所述功能如果以软件功能模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。If the functions are implemented in the form of software function modules and sold or used as independent products, they can be stored in a computer-readable storage medium. Based on such an understanding, the technical solution of the present application is essentially or part of the contribution to the prior art or a part of the technical solution can be embodied in the form of a software product, the computer software product is stored in a storage medium, and includes several instructions to make a computer device (which can be a personal computer, server, or network device, etc.) execute all or part of the steps of the method described in each embodiment of the application. The aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk, and other media that can store program codes.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any such actual relationship or order between these entities or operations. Furthermore, the term "comprises", "comprises" or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or apparatus comprising a set of elements includes not only those elements but also other elements not expressly listed or which are inherent to such process, method, article or apparatus. Without further limitations, an element defined by the phrase "comprising a ..." does not exclude the presence of additional identical elements in the process, method, article or apparatus comprising said element.

以上所述,仅为本申请的各种实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应所述以权利要求的保护范围为准。The above are just various implementations of the present application, but the scope of protection of the present application is not limited thereto. Anyone skilled in the art within the technical scope disclosed in this application can easily think of changes or substitutions, which should be covered within the scope of protection of the present application. Therefore, the protection scope of the present application should be based on the protection scope of the claims.

Claims (7)

1.一种无线网络设备配置方法,其特征在于,所述方法包括:1. A wireless network device configuration method, characterized in that the method comprises: 第一移动终端通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码;The first mobile terminal obtains the first WiFi name, the first WiFi password, the first management address and the first management account password pre-stored in the wireless network device by scanning the first identification code on the wireless network device; 所述第一移动终端根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网;The first mobile terminal accesses the wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password; 所述第一移动终端响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址或第二管理账号密码;The first mobile terminal responds to user operations and obtains network configuration information set by the user, the network configuration information including the updated second WiFi name, second WiFi password, second management address or second management account password; 所述第一移动终端向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求;The first mobile terminal sends a configuration request carrying the first management account password and the network configuration information to the first management address; 所述无线网络设备根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后应用所述网络配置信息;The wireless network device verifies the configuration request according to the pre-stored password of the first management account, and applies the network configuration information after the verification is passed; 所述方法还包括:The method also includes: 所述第一移动终端获取第二移动终端的通信标识、网络使用时间及限速策略;The first mobile terminal acquires the communication identification, network usage time and speed limit policy of the second mobile terminal; 所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息;The first mobile terminal encrypts the communication identification of the second mobile terminal, the network usage time and the speed limit policy according to the second management account password to obtain encrypted information; 所述第一移动终端根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码;The first mobile terminal generates a second identification code according to the encrypted information and the second management address of the wireless network device; 所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息;The second mobile terminal obtains the second management address and the encrypted information by scanning the second identification code, and sends networking configuration information carrying the encrypted information to the second management address; 所述无线网络设备根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略;The wireless network device decrypts the encrypted information in the received networking configuration information according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time, and the speed limit policy; 所述无线网络设备根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度;The wireless network device adds the second mobile terminal to a whitelist allowing the Internet access according to the communication identification of the second mobile terminal, and limits the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit strategy; 所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息的步骤,包括:The first mobile terminal encrypts the communication identification of the second mobile terminal, the network usage time and the speed limit policy according to the second management account password to obtain encrypted information, including: 所述第一移动终端获取当前时间作为授权时间;The first mobile terminal obtains the current time as the authorization time; 所述第一移动终端使用所述第二管理账号密码对所述授权时间、所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得所述加密信息;The first mobile terminal uses the second management account password to encrypt the authorization time, the communication identification of the second mobile terminal, the network usage time and the speed limit policy to obtain the encrypted information; 所述无线网络设备根据所述第二管理账号密码对接收到的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略的步骤,包括:The wireless network device decrypts the received encrypted information according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time and the speed limit policy, including: 所述无线网络设备根据所述第二管理账号密码对本次接收到的所述联网配置信息中的加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间、所述限速策略及所述授权时间;The wireless network device decrypts the encrypted information in the networking configuration information received this time according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time, the speed limit policy and the authorization time; 所述无线网络设备检测是否曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息;The wireless network device detects whether it has ever received historical networking configuration information with the same authorization time as the networking configuration information received this time; 若是,则不对本次的所述联网配置信息进行处理;If so, the networking configuration information described this time will not be processed; 若否,则将本次接收到的联网配置信息记录为历史联网配置信息,然后再执行将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度的步骤。If not, then record the networking configuration information received this time as historical networking configuration information, and then perform the step of adding the second mobile terminal to the whitelist of allowing Internet access, and limiting the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit policy. 2.根据权利要求1所述的方法,其特征在于,所述第一移动终端通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码的步骤,包括:2. The method according to claim 1, wherein the first mobile terminal scans the first identification code on the wireless network device to obtain the first WiFi name, the first WiFi password, the first management address and the first management account password prestored by the wireless network device, including: 第一移动终端通过扫描无线网络设备上的第一标识码,获得无线网络设备的身份标识;The first mobile terminal obtains the identity of the wireless network device by scanning the first identification code on the wireless network device; 所述第一移动终端向服务器发送登录信息获取请求,所述登录信息获取请求携带有所述无线网络设备的身份标识;The first mobile terminal sends a login information acquisition request to the server, and the login information acquisition request carries the identity of the wireless network device; 所述服务器根据接收到的登录信息获取请求中的所述无线网络设备的身份标识查找与所述无线网络设备对应的所述第一WiFi名称、所述第一WiFi密码、所述第一管理地址及所述第一管理账号密码发送给所述第一移动终端。The server searches for the first WiFi name, the first WiFi password, the first management address and the first management account password corresponding to the wireless network device according to the identity of the wireless network device in the received login information acquisition request and sends them to the first mobile terminal. 3.根据权利要求2所述的方法,其特征在于,所述方法还包括:3. The method according to claim 2, wherein the method further comprises: 所述服务器预先记录有购买所述无线网络设备的用户的身份标识与所述无线网络设备的身份标识的对应关系;The server pre-records the corresponding relationship between the identity of the user who purchased the wireless network device and the identity of the wireless network device; 所述第一移动终端向服务器发送登录信息获取请求的步骤,包括:The step of the first mobile terminal sending a login information acquisition request to the server includes: 所述第一移动终端向服务器发送携带有在所述第一移动终端上登录的用户的身份标识及所述无线网络设备的身份标识的登录信息获取请求;The first mobile terminal sends a login information acquisition request carrying the identity of the user logged in on the first mobile terminal and the identity of the wireless network device to the server; 所述服务器根据接收到的登录信息获取请求中的所述无线网络设备的身份标识查找所述无线网络设备初始的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端的步骤,包括:The server searches for the initial first WiFi name, first WiFi password, first management address and first management account password of the wireless network device according to the identity of the wireless network device in the received login information acquisition request and sends them to the first mobile terminal, including: 所述服务器根据预存的所述对应关系验证所述登录信息获取请求中的用户的身份标识与所述无线网络设备的身份标识是否相符;The server verifies whether the identity of the user in the login information acquisition request matches the identity of the wireless network device according to the pre-stored correspondence; 若相符,则查找与所述无线网络设备的身份标识对应的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码发送给所述第一移动终端。If they match, search for the first WiFi name, first WiFi password, first management address and first management account password corresponding to the identity of the wireless network device and send them to the first mobile terminal. 4.根据权利要求1所述的方法,其特征在于,在所述第一移动终端获取第二移动终端的通信标识、网络使用时间及限速策略的步骤之前,所述方法还包括:4. The method according to claim 1, wherein, before the first mobile terminal obtains the communication identification of the second mobile terminal, the network usage time and the speed limit strategy, the method further comprises: 所述第二移动终端通过扫描设置于所述无线网络设备上的第一标识码,获得所述无线网络设备的身份标识及服务器的地址;The second mobile terminal obtains the identity of the wireless network device and the address of the server by scanning the first identification code set on the wireless network device; 所述第二移动终端根据所述服务器的地址将所述无线网络设备发送联网申请信息,所述联网申请信息包括所述第二移动终端的通信标识及所述无线网络设备的身份标识;The second mobile terminal sends the wireless network device networking application information according to the address of the server, and the networking application information includes the communication identifier of the second mobile terminal and the identity identifier of the wireless network device; 所述服务器根据所述无线网络设备的身份标识查找对该无线网络设备具有管理权限的第一移动终端,并将所述联网申请信息发送至所述第一移动终端。The server searches for a first mobile terminal having management authority for the wireless network device according to the identity of the wireless network device, and sends the networking application information to the first mobile terminal. 5.根据权利要求1所述的方法,其特征在于,所述第一移动终端根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码的步骤,包括:5. The method according to claim 1, wherein the step of generating a second identification code by the first mobile terminal according to the encrypted information and the second management address of the wireless network device comprises: 所述第一移动终端根据所述加密信息、所述无线网络设备的第二WiFi名称、第二WiFi密码及第二管理地址生成所述第二标识码;The first mobile terminal generates the second identification code according to the encrypted information, the second WiFi name of the wireless network device, the second WiFi password, and the second management address; 所述第二移动终端通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息的步骤,包括:The second mobile terminal obtains the second management address and the encrypted information by scanning the second identification code, and sends the networking configuration information carrying the encrypted information to the second management address, including: 所述第二移动终端通过扫描所述第二标识码,获得所述第二WiFi名称、所述第二WiFi密码、所述第二管理地址及所述加密信息;The second mobile terminal obtains the second WiFi name, the second WiFi password, the second management address and the encrypted information by scanning the second identification code; 所述第二移动终端根据所述第二WiFi名称及所述第二WiFi密码接入所述无线网络设备提供的无线局域网,并通过所述无线局域网向所述第二管理地址发送携带有所述加密信息的联网配置信息。The second mobile terminal accesses the wireless local area network provided by the wireless network device according to the second WiFi name and the second WiFi password, and sends networking configuration information carrying the encrypted information to the second management address through the wireless local area network. 6.根据权利要求1-5中任意一项所述的方法,其特征在于,所述无线网络设备还与网络安全服务器通信连接,所述方法还包括:6. The method according to any one of claims 1-5, wherein the wireless network device is also communicatively connected to a network security server, and the method further comprises: 所述无线网络设备在接收到更新当前的所述网络配置信息的未知信息访问请求时,在所述未知信息访问请求与信任白名单中的白名单成员不匹配时进行拦截,并在拦截的同时将所述未知信息访问请求中的访问配置信息发送给所述网络安全服务器;When the wireless network device receives an unknown information access request for updating the current network configuration information, it intercepts when the unknown information access request does not match a whitelist member in the trusted white list, and sends the access configuration information in the unknown information access request to the network security server while intercepting; 所述网络安全服务器获取所述访问配置信息中的每个访问配置属性所对应的历史网络事件集合,并所述历史网络事件集合中查找到与所述无线网络设备的路由运行环境相关的目标网络攻击事件后,基于所述目标网络攻击事件的预设更新策略更新所述无线网络设备在所述网络安全服务器上的路由安全防护策略,基于更新后的所述路由安全防护策略,在所述无线网络设备的虚拟安全防护环境中模拟网络安全攻击事件信息;The network security server acquires a set of historical network events corresponding to each access configuration attribute in the access configuration information, and after finding a target network attack event related to the routing operation environment of the wireless network device in the set of historical network events, update the routing security protection policy of the wireless network device on the network security server based on the preset update policy of the target network attack event, and simulate network security attack event information in the virtual security protection environment of the wireless network device based on the updated routing security protection policy; 获取所述无线网络设备的虚拟安全防护环境中针对所述网络安全攻击事件信息响应的多个响应拦截行为的响应拦截行为对象,并获取与所述多个响应拦截行为相关的多个历史拦截扩展跟踪行为,任一历史拦截扩展跟踪行为包括扩展跟踪对象和扩展跟踪路径集合;Obtaining response interception behavior objects of multiple response interception behaviors in response to the network security attack event information in the virtual security protection environment of the wireless network device, and acquiring multiple historical interception extension tracking behaviors related to the multiple response interception behaviors, any historical interception extension tracking behavior includes an extension tracking object and an extension tracking path set; 根据每个历史拦截扩展跟踪行为的扩展跟踪对象和多个响应拦截行为的响应拦截行为对象,确定每个历史拦截扩展跟踪行为所属的响应拦截行为;According to the extended tracking object of each historical interception extended tracking action and the response interception action objects of multiple response interception actions, determine the response interception behavior to which each historical interception extended tracking action belongs; 根据每个历史拦截扩展跟踪行为的扩展跟踪路径集合以及每个历史拦截扩展跟踪行为所属的响应拦截行为,对所述多个历史拦截扩展跟踪行为进行分簇处理,得到多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为;According to the set of extended tracing paths of each historical interception extended tracing behavior and the response interception behavior to which each historical interception extended tracing behavior belongs, the multiple historical interception extended tracing behaviors are clustered to obtain the response interception behaviors to which the multiple historical interception extended tracing behavior clusters respectively belong; 根据多个历史拦截扩展跟踪行为簇分别所属的响应拦截行为,确定所述多个历史拦截扩展跟踪行为中每个扩展跟踪行为所属的响应拦截行为,并为每个扩展跟踪行为和每个扩展跟踪行为所属的响应拦截行为建立关联关系后,基于建立的关联关系信息对所述路由安全防护策略进行扩展更新,以将扩展更新后的所述路由安全防护策略发送给所述无线网络设备进行自动响应配置。According to the response interception behaviors to which the plurality of historical interception extended tracking behavior clusters respectively belong, determine the response interception behavior to which each extended tracking behavior in the plurality of historical interception extended tracking behaviors belongs, and after establishing an association relationship between each extended tracking behavior and the response interception behavior to which each extended tracking behavior belongs, perform an extended update on the routing security protection policy based on the established association relationship information, so as to send the expanded and updated routing security protection policy to the wireless network device for automatic response configuration. 7.一种无线网络设备配置系统,其特征在于,所述系统包括第一移动终端及无线网络设备;7. A wireless network device configuration system, characterized in that the system includes a first mobile terminal and a wireless network device; 所述第一移动终端用于通过扫描无线网络设备上的第一标识码,获得所述无线网络设备预存的第一WiFi名称、第一WiFi密码、第一管理地址及第一管理账号密码;根据所述第一WiFi名称及所述第一WiFi密码接入所述无线网络设备提供的无线局域网;响应用户操作,获取用户设置的网络配置信息,所述网络配置信息包括更新后的第二WiFi名称、第二WiFi密码、第二管理地址或第二管理账号密码;向所述第一管理地址发送携带有所述第一管理账号密码及所述网络配置信息的配置请求;The first mobile terminal is configured to scan a first identification code on the wireless network device to obtain a first WiFi name, a first WiFi password, a first management address, and a first management account password prestored by the wireless network device; access a wireless local area network provided by the wireless network device according to the first WiFi name and the first WiFi password; respond to a user operation, obtain network configuration information set by the user, and the network configuration information includes an updated second WiFi name, second WiFi password, second management address or second management account password; Send a configuration request carrying the first management account password and the network configuration information to the first management address ; 所述无线网络设备用于根据预存的所述第一管理账号密码对所述配置请求进行验证,并在验证通过后应用所述网络配置信息;The wireless network device is configured to verify the configuration request according to the pre-stored password of the first management account, and apply the network configuration information after the verification is passed; 所述系统还包括第二移动终端;The system also includes a second mobile terminal; 所述第一移动终端还用于获取第二移动终端的通信标识、网络使用时间及限速策略;根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息;根据所述加密信息及所述无线网络设备的第二管理地址生成第二标识码;The first mobile terminal is also used to acquire the communication identification, network use time and speed limit policy of the second mobile terminal; encrypt the communication identification of the second mobile terminal, the network use time and the speed limit policy according to the second management account password to obtain encrypted information; generate a second identification code according to the encrypted information and the second management address of the wireless network device; 所述第二移动终端用于通过扫描所述第二标识码,获得所述第二管理地址及所述加密信息,并向所述第二管理地址发送携带有所述加密信息的联网配置信息;The second mobile terminal is configured to obtain the second management address and the encrypted information by scanning the second identification code, and send networking configuration information carrying the encrypted information to the second management address; 所述无线网络设备还用于根据所述第二管理账号密码对接收到的所述联网配置信息中的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略;根据所述第二移动终端的通信标识将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度;The wireless network device is further configured to decrypt the encrypted information in the received networking configuration information according to the second management account password, and obtain the communication identifier of the second mobile terminal, the network usage time and the speed limit policy; add the second mobile terminal to a whitelist for allowing Internet access according to the communication identifier of the second mobile terminal, and limit the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit strategy; 所述第一移动终端根据所述第二管理账号密码对所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得加密信息,包括:The first mobile terminal encrypts the communication identification of the second mobile terminal, the network usage time, and the speed limit policy according to the second management account password to obtain encrypted information, including: 所述第一移动终端获取当前时间作为授权时间;The first mobile terminal obtains the current time as the authorization time; 所述第一移动终端使用所述第二管理账号密码对所述授权时间、所述第二移动终端的通信标识、所述网络使用时间及所述限速策略进行加密获得所述加密信息;The first mobile terminal uses the second management account password to encrypt the authorization time, the communication identification of the second mobile terminal, the network usage time and the speed limit policy to obtain the encrypted information; 所述无线网络设备根据所述第二管理账号密码对接收到的所述加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间及所述限速策略,包括:The wireless network device decrypts the received encrypted information according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time and the speed limit policy, including: 所述无线网络设备根据所述第二管理账号密码对本次接收到的所述联网配置信息中的加密信息进行解密,获得所述第二移动终端的通信标识、所述网络使用时间、所述限速策略及所述授权时间;The wireless network device decrypts the encrypted information in the networking configuration information received this time according to the second management account password, and obtains the communication identification of the second mobile terminal, the network usage time, the speed limit policy and the authorization time; 所述无线网络设备检测是否曾接收到过与本次接收到的所述联网配置信息的授权时间相同的历史联网配置信息;The wireless network device detects whether it has ever received historical networking configuration information with the same authorization time as the networking configuration information received this time; 若是,则不对本次的所述联网配置信息进行处理;If so, the networking configuration information described this time will not be processed; 若否,则将本次接收到的联网配置信息记录为历史联网配置信息,然后再执行将所述第二移动终端加入允许上网白名单,并根据所述网络使用时间及所述限速策略限制所述第二移动终端的上网时间及速度的操作。If not, then record the networking configuration information received this time as historical networking configuration information, and then perform the operation of adding the second mobile terminal to the whitelist of allowing Internet access, and restricting the Internet access time and speed of the second mobile terminal according to the network usage time and the speed limit strategy.
CN202110520516.9A 2021-05-13 2021-05-13 Wireless network device configuration method and system Active CN113645054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110520516.9A CN113645054B (en) 2021-05-13 2021-05-13 Wireless network device configuration method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110520516.9A CN113645054B (en) 2021-05-13 2021-05-13 Wireless network device configuration method and system

Publications (2)

Publication Number Publication Date
CN113645054A CN113645054A (en) 2021-11-12
CN113645054B true CN113645054B (en) 2023-07-25

Family

ID=78415853

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110520516.9A Active CN113645054B (en) 2021-05-13 2021-05-13 Wireless network device configuration method and system

Country Status (1)

Country Link
CN (1) CN113645054B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114489740B (en) * 2022-04-14 2022-06-24 北京金朗维科技有限公司 Online updating method and device for wireless code scanning equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955041A (en) * 2014-03-24 2015-09-30 济宁职业技术学院 WiFi real-name authentication method

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100907507B1 (en) * 2007-03-05 2009-07-14 삼성전자주식회사 User Authentication Method and System for the WLAN Network Interworking of Wireless LAN Terminal
CN106332056B (en) * 2015-06-30 2020-01-14 芋头科技(杭州)有限公司 Structure and method for pre-configuring user information of intelligent equipment
CN105227346B (en) * 2015-08-24 2018-09-28 上海斐讯数据通信技术有限公司 It is a kind of based on the method for configuring routers scanned the two-dimensional code
CN105975559A (en) * 2016-05-03 2016-09-28 浪潮电子信息产业股份有限公司 Method and system for login to background page of router
CN106507351B (en) * 2016-10-28 2019-12-31 维沃移动通信有限公司 Method and mobile terminal for obtaining connection password of wireless network
CN109548018B (en) * 2019-01-11 2021-11-23 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system
CN110121170B (en) * 2019-04-17 2022-08-19 广东电网有限责任公司信息中心 Mobile network identity authentication method based on encryption technology

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104955041A (en) * 2014-03-24 2015-09-30 济宁职业技术学院 WiFi real-name authentication method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
无线局域网安全技术分析;郭守发;刘晓;;福建电脑(第11期);全文 *

Also Published As

Publication number Publication date
CN113645054A (en) 2021-11-12

Similar Documents

Publication Publication Date Title
US12184753B2 (en) Systems and methods for securing access rights to resources using cryptography and the blockchain
US20230084344A1 (en) Private cloud control
US11089044B2 (en) Method and system for assessing data security
US11552953B1 (en) Identity-based authentication and access control mechanism
US10469496B2 (en) Fabric assisted identity and authentication
US9843575B2 (en) Wireless network authentication method and wireless network authentication apparatus
CN102823195B (en) System and method for remotely maintaining a client system in an electronic network using software testing performed by a virtual machine
US11765164B2 (en) Server-based setup for connecting a device to a local area network
CN104144163B (en) Auth method, apparatus and system
US20230385396A1 (en) Methods and systems for verifying applications
US20150281239A1 (en) Provision of access privileges to a user
JP2016524248A (en) Method and system for protecting identity information from theft or copying
CN111262865B (en) Method, device and system for making access control strategy
CN106664291A (en) Systems and methods for providing secure access to local network devices
WO2018120913A1 (en) Certificate acquisition method, authentication method and network device
Chen et al. A full lifecycle authentication scheme for large-scale smart IoT applications
WO2016188335A1 (en) Access control method, apparatus and system for user data
WO2020025056A1 (en) Method, device, system, and mobile terminal for security authorization
CN115412269A (en) Service processing method, device, server and storage medium
CN107637012A (en) System, apparatus and method for securely coordinating rendezvous points of distributed devices using entropy multiplexing
WO2017084456A1 (en) Wifi hotspot processing method, device and system
CN113645054B (en) Wireless network device configuration method and system
JP7140845B2 (en) Devices and methods for securing network connections
CN115276998A (en) IoT authentication method, device and IoT device
US10542569B2 (en) Community-based communication network services

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PP01 Preservation of patent right
PP01 Preservation of patent right

Effective date of registration: 20250513

Granted publication date: 20230725