CN103826226A - Method and device for controlling wireless internet access - Google Patents
Method and device for controlling wireless internet access Download PDFInfo
- Publication number
- CN103826226A CN103826226A CN201410059119.6A CN201410059119A CN103826226A CN 103826226 A CN103826226 A CN 103826226A CN 201410059119 A CN201410059119 A CN 201410059119A CN 103826226 A CN103826226 A CN 103826226A
- Authority
- CN
- China
- Prior art keywords
- wireless internet
- internet access
- user side
- time
- access request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for controlling wireless internet access. The method comprises the steps that when a wireless internet access request sent by a user side is received, a wireless internet access gateway analyzes whether the received wireless internet access request carries an authenticated identifier or not; when the received wireless internet access request carries the authenticated identifier, the wireless internet access gateway authorizes the user side to have the access to the internet. The invention further discloses a device for controlling the wireless internet access. The device for controlling the wireless internet access aims to effectively solve the problem that when the user side sends the wireless internet access request again, short message cost generated by internet access is achieved in a short message verification mode, user identification verification is completed fast and effectively, user identification verification efficiency is improved, and user identification verification cost is lowered.
Description
Technical field
The present invention relates to wireless Internet access field, relate in particular to control method and the device of wireless Internet access.
Background technology
Along with popularizing of the Internet, make people's work and life more and more be unable to do without network.Be accompanied by the development of mobile Internet and mobile terminal, people expect to finish the work by mobile Internet anywhere or anytime or to carry out amusement.For example, people have a meal in market shopping, dining room, bank's transacting business or moving in that hotel etc. all expects can be by mobile terminal Internet access.
At present, use domestic 3G(The3rd Generation Telecommunication, the 3rd third-generation mobile communication technology) the very high campus network of network online meeting generation, based on this reason, in order to attract client to come, the ground such as market, dining room, bank, hotel often all provide free wifi network to use to client.Client can surf the Net by businessman's Wifi network that provide is provided, sees a film, and friend's interaction, at any time or real-time various information of understanding etc.
But in order to meet businessman self marketing needs and to meet country's online laws and regulations, the Wifi network that businessman provides needs authenticated user identity information.At present, the mode of authenticated user identity information is mainly the mode that uses note authentication.Authenticate by note, businessman can obtain subscriber phone number, conveniently carries out the issue of some marketing strategies, also can audit to user's internet behavior, prevents that user from using network to carry out unlawful activities.
But there is following defect in the authentication mode of the subscriber identity information of note authentication:
1,, because businessman's flow of the people is large, use note authentication to produce high short-message fee;
2, part client often patronizes to some fixing businessman, and they need to re-start authentication at each presence, causes like this that subscriber authentication process is loaded down with trivial details, poor efficiency.
Foregoing only, for auxiliary understanding technical scheme of the present invention, does not represent and admits that foregoing is prior art.
Summary of the invention
Main purpose of the present invention, for control method and the device of wireless Internet access are provided, is intended to realize completing user authentication fast and effectively, improves the efficiency of subscriber authentication, reduces subscriber authentication cost.
For achieving the above object, the invention provides a kind of control method of wireless Internet access, the method comprising the steps of:
In the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that the analysis of wireless Internet access gateway receives carries Verified Logo;
In the time that the wireless Internet access request receiving carries Verified Logo, user side access network described in the mandate of described wireless Internet access gateway.
Preferably, after whether the wireless Internet access request receiving in the analysis of described wireless Internet access gateway carries the step of Verified Logo, the method also comprises:
In the time that the wireless Internet access request receiving does not carry Verified Logo, described wireless Internet access gateway prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number;
In the time receiving the described short-message verification code that user side sends, user side access network described in the mandate of described wireless Internet access gateway.
Preferably, described in the time that the wireless Internet access request receiving does not carry Verified Logo, described wireless Internet access gateway prompting user input handset number, and in the time receiving the phone number of user's input, after described phone number sends the step of short-message verification code, the method also comprises:
In the time not receiving the described short-message verification code that user side sends, described wireless Internet access gateway prompting user sends described short-message verification code in the first Preset Time, or prompting user obtains short-message verification code again.
Preferably, the method also comprises:
Whether the analysis of described wireless Internet access gateway receives the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, described wireless Internet access gateway is deleted the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
Preferably, after whether the analysis of described wireless Internet access gateway receives the step of wireless Internet access request that carries Verified Logo user side in the second Preset Time, the method also comprises:
Receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, the relevant information that described wireless Internet access gateway receives the request user side of getting online without being tethered to a cable described in being arranges specific identifier.
The present invention further provides a kind of control device of wireless Internet access, this device comprises:
Analysis module, in the time receiving the wireless Internet access request that user side sends, analyzes the wireless Internet access request receiving and whether carries Verified Logo;
Control module, in the time that the wireless Internet access request receiving carries Verified Logo, authorizes described user side access network.
Preferably, this device also comprises:
Prompting module, in the time that the wireless Internet access request receiving does not carry Verified Logo, prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number;
Described control module, in the time receiving the described short-message verification code that user side sends, authorizes described user side access network.
Preferably, described prompting module, in the time not receiving the described short-message verification code that user side sends, prompting user sends described short-message verification code in the first Preset Time, or prompting user obtains short-message verification code again.
Preferably, this device also comprises processing module,
Described analysis module, for analyzing whether receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Described processing module, for do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, deletes the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
Preferably, described processing module, also when receiving the wireless Internet access request that carries Verified Logo user side, for the described relevant information that receives the request user side of getting online without being tethered to a cable arranges specific identifier in the second Preset Time.
Relatively prior art, the present invention, in the time receiving the wireless Internet access request that user side sends, analyzes the wireless Internet access request receiving and whether carries Verified Logo; In the time that the wireless Internet access request receiving carries Verified Logo, the display interface of controlling user side jumps to described wireless Internet access asks corresponding accession page.While effectively avoiding user side again to send wireless Internet access request, also need to realize by the mode of short-message verification the problem of the short-message fee of access the Internet generation, realize completing user authentication fast and effectively, improve the efficiency of subscriber authentication, reduce subscriber authentication cost.
Accompanying drawing explanation
Fig. 1 is the schematic flow sheet of control method the first embodiment of getting online without being tethered to a cable of the present invention;
Fig. 2 is the schematic flow sheet of control method the second embodiment of getting online without being tethered to a cable of the present invention;
Fig. 3 is the high-level schematic functional block diagram of control device the first embodiment of getting online without being tethered to a cable of the present invention;
Fig. 4 is the high-level schematic functional block diagram of control device the second embodiment of getting online without being tethered to a cable of the present invention.
Realization, functional characteristics and the advantage of the object of the invention, in connection with embodiment, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The schematic flow sheet of control method the first embodiment of getting online without being tethered to a cable for the present invention as shown in Figure 1.
It is emphasized that: flow chart shown in Fig. 1 is only a preferred embodiment, those skilled in the art is when knowing, any embodiment building around inventive concept should not depart from the scope containing in following technical scheme:
In the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that the analysis of wireless Internet access gateway receives carries Verified Logo; In the time that the wireless Internet access request receiving carries Verified Logo, user side access network described in the mandate of described wireless Internet access gateway.
Below that the present embodiment is progressively realized the concrete steps of getting online without being tethered to a cable and controlling:
Step S11, in the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that the analysis of wireless Internet access gateway receives carries Verified Logo.
In the present embodiment, the mode of described wireless Internet access is preferably Wifi online, and the Wifi focus that user side is set up by connection is realized access the Internet; Wifi focus is connected with Internet Server through security gateway, and online connection and internet content that security gateway plays each user side are controlled and monitored.Each user side by after the authentication of security gateway, that is, after security gateway mandate access network, can be accessed the content of Internet Server.Described wireless Internet access gateway is preferably the security gateway being deployed in network.
Security gateway is in the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that analysis receives carries has been verified mark, describedly verify that mark can be the Mac address of user side, and/or the Cookie arranging in the browser of user side access the Internet.
Step S12, in the time that the wireless Internet access request receiving carries Verified Logo, user side access network described in the mandate of described wireless Internet access gateway.
In the present embodiment, described security gateway, in the time that the wireless Internet access request receiving carries Verified Logo, is authorized described user side access network.For example, the described Mac address that is designated user side of having verified, described security gateway prestores the Mac address of each connected user authenticated end, receiving the request of wireless Internet access, obtaining gets online without being tethered to a cable asks the Mac address of the user side comprising, and whether analysis has the Mac address that prestores consistent with the Mac address of the user side obtaining, when consistent in the Mac address that has prestore Mac address and the user side obtaining, determine that the wireless Internet access request receiving carries Verified Logo, authorize described user side access network, , described user side user can get online without being tethered to a cable and access the content on Internet Server.For example, the described Cookie arranging in the browser that is designated user side access the Internet that verified, described security gateway prestores the Cookie arranging in the browser of each user side access the Internet, receiving the request of wireless Internet access, obtaining gets online without being tethered to a cable asks the user side comprising to access the Cookie arranging in the browser of the Internet, and analyze whether to have prestore Cookie and the user side that obtains to access the Cookie arranging in the browser of the Internet consistent, in the time having the Cookie arranging in the browser of prestore Cookie and the user side access the Internet obtaining consistent, determine that the wireless Internet access request receiving carries Verified Logo, authorize described user side access network, , described user side user can get online without being tethered to a cable and access the content on Internet Server.
In the time that the wireless Internet access request receiving does not carry Verified Logo, described security gateway prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number; In the time receiving the described short-message verification code that user side sends, user side access network described in described security gateway mandate.For example, consistent with the Mac address of the user side obtaining in the Mac address that do not prestore, or, when the Cookie that arranges in the browser of Cookie and the user side access the Internet obtaining that do not prestore is consistent, described security gateway determines that the wireless Internet access request receiving does not carry Verified Logo, realizes the content on access Internet Server by the mode of short-message verification.In the time not receiving the described short-message verification code that user side sends,, after certain hour (for example, the content realizing on access Internet Server in the mode that needs short-message verification plays beginning timing, after 0 second, 1 second or 1 minute) while not receiving the described short-message verification code that user side sends, described security gateway prompting user sends described short-message verification code in the first Preset Time, or, prompting user obtains short-message verification code again, so that in time by sending said short message identifying code, by authenticating user identification, access the Internet.After successfully passing through the authenticating user identification of security gateway, the Cookie arranging in the browser of the Mac address of the user side that described security gateway comprises the request of getting online without being tethered to a cable or user side access the Internet prestores, again to send at this user side when request of getting online without being tethered to a cable, realize the content on access Internet Server without the mode by short-message verification again.Described the first Preset Time can be 30s or 1 minute constant duration.
At the present embodiment, in the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that the analysis of wireless Internet access gateway receives carries Verified Logo; In the time that the wireless Internet access request receiving carries Verified Logo, user side access network described in the mandate of described wireless Internet access gateway.While effectively avoiding user side again to send wireless Internet access request, also need to realize by the mode of short-message verification the problem of the short-message fee of access the Internet generation, realize completing user authentication fast and effectively, improve the efficiency of subscriber authentication, reduce subscriber authentication cost.
The schematic flow sheet of control method the second embodiment of getting online without being tethered to a cable for the present invention as shown in Figure 2.
Based on above-mentioned the first embodiment, the method also comprises:
Step S13, whether the analysis of wireless Internet access gateway receives the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Step S14, do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, described wireless Internet access gateway is deleted the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
In the present embodiment, described Verified Logo is take the Mac address of user side as example, and security gateway prestores all by the Mac address of subscriber authentication user side.Access the Internet at certain user side by subscriber authentication, finish to play beginning timing in internet access, analyze the wireless Internet access request that this user side sends that whether receives in the second Preset Time, do not receive the wireless Internet access request that this user side sends in the second Preset Time time, the relevant information of this user side having is deleted.Described the second Preset Time can be 30 days or 2 months constant durations; The relevant information of described this user side includes but not limited to the Cookie arranging in the Mac address of this user side and/or the browser of this user side access the Internet.In other embodiments of the invention, can also be also that described security gateway is accessed the Internet at certain user side by subscriber authentication and played beginning timing, analyze the wireless Internet access request that this user side sends that whether receives in the second Preset Time.
Receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, the relevant information that described security gateway receives the request user side of getting online without being tethered to a cable described in being arranges specific identifier, deleted to receive the relevant information of the request user side of getting online without being tethered to a cable described in preventing.For example, access the Internet at certain user side by subscriber authentication, finish to play beginning timing in internet access, whether described security gateway analysis receives the wireless Internet access request that this user side sends in the second Preset Time, receive the wireless Internet access request that this user side sends in the second Preset Time time, the relevant information of this user side is arranged to specific identifier, deleted to prevent the relevant information of this user side, the relevant information that is this user side arranges not deleted mark, acquiescence is by the relevant information persistence of this user side (this user side is conventional user side), or, until while receiving the instruction of relevant information of deleting this user side, just the relevant information of this user side is deleted.Described mark can be the mark that wireless Internet access requesting terminal is not sent again in order to distinguish other in " 0 " or " 1 " etc.
In the second Preset Time, whether receive in the analysis of the present embodiment wireless Internet access gateway the wireless Internet access request that carries Verified Logo user side; Do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, described wireless Internet access gateway is deleted the described relevant information that does not receive the request user side of getting online without being tethered to a cable.That is, do not receive the wireless Internet access request that same user side sends in the second Preset Time time, described wireless Internet access gateway is deleted the relevant information of this user side of preserving, to save the memory headroom of security gateway, and then improves the performance of security gateway.
The high-level schematic functional block diagram of control device the first embodiment of getting online without being tethered to a cable for the present invention as shown in Figure 3.This device comprises: analysis module 10, control module 20 and prompting module 30.
Described analysis module 10, in the time receiving the wireless Internet access request that user side sends, analyzes the wireless Internet access request receiving and whether carries Verified Logo.
In the present embodiment, the mode of described wireless Internet access is preferably Wifi online, and the Wifi focus that user side is set up by connection is realized access the Internet; Wifi focus is connected with Internet Server through security gateway, and online connection and internet content that security gateway plays each user side are controlled and monitored.Each user side, by after the authentication of security gateway, can be accessed the content of Internet Server.The control device of described wireless Internet access is preferably security gateway.
Described security gateway is in the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that analysis receives carries has been verified mark, describedly verify that mark can be the Mac address of user side, and/or the Cookie arranging in the browser of user side access the Internet.
Described control module 20, in the time that the wireless Internet access request receiving carries Verified Logo, authorizes described user side access network.
In the present embodiment, described security gateway, in the time that the wireless Internet access request receiving carries Verified Logo, is authorized described user side access network.For example, the described Mac address that is designated user side of having verified, described security gateway is receiving the request of wireless Internet access, obtaining gets online without being tethered to a cable asks the Mac address of the user side comprising, security gateway prestores the Mac address of each connected user authenticated end, and whether analysis has the Mac address that prestores consistent with the Mac address of the user side obtaining, when consistent in the Mac address that has prestore Mac address and the user side obtaining, determine that the wireless Internet access request receiving carries Verified Logo, authorize described user side access network, , described user side user can get online without being tethered to a cable and access the content on Internet Server.For example, the described Cookie arranging in the browser that is designated user side access the Internet that verified, described security gateway prestores the Cookie arranging in the browser of each user side access the Internet, described security gateway is receiving the request of wireless Internet access, obtaining gets online without being tethered to a cable asks the user side comprising to access the Cookie arranging in the browser of the Internet, and analyze whether to have prestore Cookie and the user side that obtains to access the Cookie arranging in the browser of the Internet consistent, in the time having the Cookie arranging in the browser of prestore Cookie and the user side access the Internet obtaining consistent, determine that the wireless Internet access request receiving carries Verified Logo, authorize described user side access network, , user side user can get online without being tethered to a cable and access the content on Internet Server.
In the time that the wireless Internet access request receiving does not carry Verified Logo, described security gateway prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number; In the time receiving the described short-message verification code that user side sends, user side access network described in described security gateway mandate.For example, consistent with the Mac address of the user side obtaining in the Mac address that do not prestore, or, when the Cookie that arranges in the browser of Cookie and the user side access the Internet obtaining that do not prestore is consistent, determine that the wireless Internet access request receiving does not carry Verified Logo, realize the content on access Internet Server by the mode of short-message verification.
Described prompting module 30, for in the time not receiving the described short-message verification code that user side sends,, after certain hour (for example, the content realizing on access Internet Server in the mode that needs short-message verification plays beginning timing, after 0 second, 1 second or 1 minute) while not receiving the described short-message verification code that user side sends, prompting user sends described short-message verification code in the first Preset Time, or, prompting user obtains short-message verification code again, so that in time by sending said short message identifying code, by authenticating user identification, access the Internet.After successfully passing through the authenticating user identification of security gateway, the Cookie arranging in the browser of the Mac address of the user side that described security gateway comprises the request of getting online without being tethered to a cable or user side access the Internet prestores, again to send at this user side when request of getting online without being tethered to a cable, realize the content on access Internet Server without the mode by short-message verification again.Described the first Preset Time can be 30s or 1 minute constant duration.
At the present embodiment, in the time receiving the wireless Internet access request that user side sends, analysis module 10 is analyzed the wireless Internet access request receiving and whether is carried Verified Logo; In the time that the wireless Internet access request receiving carries Verified Logo, control module 20 is authorized described user side access network.While effectively avoiding user side again to send wireless Internet access request, also need to realize by the mode of short-message verification the problem of the short-message fee of access the Internet generation, realize completing user authentication fast and effectively, improve the efficiency of subscriber authentication, reduce subscriber authentication cost.
The high-level schematic functional block diagram of control device the second embodiment of getting online without being tethered to a cable for the present invention as shown in Figure 4.This device also comprises: processing module 40,
Described analysis module 10, for analyzing whether receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Described processing module 40, for do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, deletes the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
In the present embodiment, described Verified Logo is take the Mac address of user side as example, and security gateway prestores all by the Mac address of subscriber authentication user side.Access the Internet at certain user side by subscriber authentication, finish to play beginning timing in internet access, analyze the wireless Internet access request that this user side sends that whether receives in the second Preset Time, do not receive the wireless Internet access request that this user side sends in the second Preset Time time, the relevant information of this user side having is deleted.Described the second Preset Time can be 30 days or 2 months constant durations; The relevant information of described this user side includes but not limited to the Cookie arranging in the Mac address of this user side and/or the browser of this user side access the Internet.In other embodiments of the invention, can also be also that security gateway is accessed the Internet at certain user side by subscriber authentication and played beginning timing, analyze the wireless Internet access request that this user side sends that whether receives in the second Preset Time.
Receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, the relevant information that described security gateway receives the request user side of getting online without being tethered to a cable described in being arranges specific identifier, deleted to receive the relevant information of the request user side of getting online without being tethered to a cable described in preventing.For example, access the Internet at certain user side by subscriber authentication, finish to play beginning timing in internet access, whether described security gateway analysis receives the wireless Internet access request that this user side sends in the second Preset Time, receive the wireless Internet access request that this user side sends in the second Preset Time time, for the relevant information of this user side arranges specific identifier, deleted to prevent the relevant information of this user side, the relevant information that is this user side arranges not deleted mark, acquiescence is by the relevant information persistence of this user side (this user side is conventional user side), or, until while receiving the instruction of relevant information of deleting this user side, just the relevant information of this user side is deleted.Described mark can be that " 0 " or " 1 " etc. are in order to distinguish the mark of other-end.
Analyze in the second Preset Time, whether to receive the wireless Internet access request that carries Verified Logo user side at the present embodiment analysis module 10; Do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, processing module 40 is deleted the described relevant information that does not receive the request user side of getting online without being tethered to a cable.That is, do not receive the wireless Internet access request that same user side sends in the second Preset Time time, security gateway is deleted the relevant information of this user side of preserving, to save the memory headroom of security gateway, and then improves the performance of security gateway.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add essential general hardware platform by software and realize, can certainly pass through hardware, but in a lot of situation, the former is better execution mode.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprise that some instructions (can be mobile phones in order to make a station terminal equipment, computer, server, or the network equipment etc.) carry out the method described in each embodiment of the present invention.
The foregoing is only the preferred embodiments of the present invention; not thereby limit the scope of the claims of the present invention; every equivalent structure or conversion of equivalent flow process that utilizes specification of the present invention and accompanying drawing content to do; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.
Claims (10)
1. a control method for wireless Internet access, is characterized in that, the method comprising the steps of:
In the time receiving the wireless Internet access request that user side sends, whether the wireless Internet access request that the analysis of wireless Internet access gateway receives carries Verified Logo;
In the time that the wireless Internet access request receiving carries Verified Logo, user side access network described in the mandate of described wireless Internet access gateway.
2. the control method of wireless Internet access according to claim 1, is characterized in that, after whether the wireless Internet access request receiving in the analysis of described wireless Internet access gateway carries the step of Verified Logo, the method also comprises:
In the time that the wireless Internet access request receiving does not carry Verified Logo, described wireless Internet access gateway prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number;
In the time receiving the described short-message verification code that user side sends, user side access network described in the mandate of described wireless Internet access gateway.
3. the control method of wireless Internet access according to claim 2, it is characterized in that, it is described in the time that the wireless Internet access request receiving does not carry Verified Logo, described wireless Internet access gateway prompting user input handset number, and in the time receiving the phone number of user's input, after described phone number sends the step of short-message verification code, the method also comprises:
In the time not receiving the described short-message verification code that user side sends, described wireless Internet access gateway prompting user sends described short-message verification code in the first Preset Time, or prompting user obtains short-message verification code again.
4. the control method of wireless Internet access according to claim 1, is characterized in that, the method also comprises:
Whether the analysis of described wireless Internet access gateway receives the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, described wireless Internet access gateway is deleted the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
5. the control method of wireless Internet access according to claim 4, is characterized in that, after whether the analysis of described wireless Internet access gateway receives the step of wireless Internet access request that carries Verified Logo user side in the second Preset Time, the method also comprises:
Receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, the relevant information that described wireless Internet access gateway receives the request user side of getting online without being tethered to a cable described in being arranges specific identifier.
6. a control device for wireless Internet access, is characterized in that, this device comprises:
Analysis module, in the time receiving the wireless Internet access request that user side sends, analyzes the wireless Internet access request receiving and whether carries Verified Logo;
Control module, in the time that the wireless Internet access request receiving carries Verified Logo, authorizes described user side access network.
7. the control device of wireless Internet access according to claim 6, is characterized in that, this device also comprises:
Prompting module, in the time that the wireless Internet access request receiving does not carry Verified Logo, prompting user input handset number, and in the time receiving the phone number of user's input, send short-message verification code to described phone number;
Described control module, in the time receiving the described short-message verification code that user side sends, authorizes described user side access network.
8. the control device of wireless Internet access according to claim 7, is characterized in that,
Described prompting module, in the time not receiving the described short-message verification code that user side sends, prompting user sends described short-message verification code in the first Preset Time, or prompting user obtains short-message verification code again.
9. the control device of wireless Internet access according to claim 6, is characterized in that, this device also comprises processing module,
Described analysis module, for analyzing whether receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time;
Described processing module, for do not receive the wireless Internet access request that carries Verified Logo user side in the second Preset Time time, deletes the described relevant information that does not receive the request user side of getting online without being tethered to a cable.
10. the control device of wireless Internet access according to claim 9, is characterized in that,
Described processing module, also when receiving the wireless Internet access request that carries Verified Logo user side, for the described relevant information that receives the request user side of getting online without being tethered to a cable arranges specific identifier in the second Preset Time.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410059119.6A CN103826226A (en) | 2014-02-20 | 2014-02-20 | Method and device for controlling wireless internet access |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410059119.6A CN103826226A (en) | 2014-02-20 | 2014-02-20 | Method and device for controlling wireless internet access |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103826226A true CN103826226A (en) | 2014-05-28 |
Family
ID=50761005
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410059119.6A Pending CN103826226A (en) | 2014-02-20 | 2014-02-20 | Method and device for controlling wireless internet access |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103826226A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113558A (en) * | 2014-08-05 | 2014-10-22 | 环境保护部华南环境科学研究所 | Network identity identifying method for matching identification through double-check |
CN104618385A (en) * | 2015-02-13 | 2015-05-13 | 厦门乐享新传媒有限公司 | Method and system for connecting Internet |
CN105049413A (en) * | 2015-06-02 | 2015-11-11 | 杭州敦崇科技股份有限公司 | Authentication method for free wireless Internet access |
CN105101476A (en) * | 2015-03-23 | 2015-11-25 | 洪永川 | Wireless local area network system applicable to rail trains |
CN105450616A (en) * | 2014-09-23 | 2016-03-30 | 中国电信股份有限公司 | Terminal authentication method, trusted determination gateway, authentication server and system |
CN105592461A (en) * | 2015-11-19 | 2016-05-18 | 湖北睛彩视讯科技有限公司 | WiFi user identification authentication method and system |
CN105848147A (en) * | 2015-07-28 | 2016-08-10 | 维沃移动通信有限公司 | Network connection method and device, and Wi-Fi routing equipment |
CN105933901A (en) * | 2016-05-25 | 2016-09-07 | 深圳市共进电子股份有限公司 | Method and system for authenticating wireless router |
CN106162944A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to steamer |
CN106161484A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to automobile |
CN106161486A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to aircraft |
CN106559783A (en) * | 2015-09-29 | 2017-04-05 | 华为技术有限公司 | A kind of authentication method to WIFI network, device and system |
CN106789905A (en) * | 2016-11-22 | 2017-05-31 | 上海斐讯数据通信技术有限公司 | A kind of network access equipment and method |
CN108259518A (en) * | 2018-04-24 | 2018-07-06 | 北京知道创宇信息技术有限公司 | A kind of network connection authentication method, device, electronic equipment and storage medium |
CN109326058A (en) * | 2018-08-29 | 2019-02-12 | 中国建设银行股份有限公司 | Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine |
CN109343373A (en) * | 2018-09-07 | 2019-02-15 | 广东美的厨房电器制造有限公司 | The control method and cooking appliance of cooking appliance |
CN109714417A (en) * | 2018-12-27 | 2019-05-03 | 迈普通信技术股份有限公司 | Network control system and method based on user behavior |
CN109818936A (en) * | 2018-12-29 | 2019-05-28 | 北京奇安信科技有限公司 | IP address-based server info processing method and processing device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1307017A1 (en) * | 2001-10-24 | 2003-05-02 | Siemens Aktiengesellschaft | Method and system for radio data networks access authentication |
CN102196434A (en) * | 2010-03-10 | 2011-09-21 | 中国移动通信集团公司 | Authentication method and system for wireless local area network terminal |
CN102984173A (en) * | 2012-12-13 | 2013-03-20 | 迈普通信技术股份有限公司 | Network access control method and system |
CN103067348A (en) * | 2011-10-20 | 2013-04-24 | 安美世纪(北京)科技有限公司 | Hotel public network wired/wireless unified authentication roaming method |
-
2014
- 2014-02-20 CN CN201410059119.6A patent/CN103826226A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1307017A1 (en) * | 2001-10-24 | 2003-05-02 | Siemens Aktiengesellschaft | Method and system for radio data networks access authentication |
CN102196434A (en) * | 2010-03-10 | 2011-09-21 | 中国移动通信集团公司 | Authentication method and system for wireless local area network terminal |
CN103067348A (en) * | 2011-10-20 | 2013-04-24 | 安美世纪(北京)科技有限公司 | Hotel public network wired/wireless unified authentication roaming method |
CN102984173A (en) * | 2012-12-13 | 2013-03-20 | 迈普通信技术股份有限公司 | Network access control method and system |
Cited By (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104113558B (en) * | 2014-08-05 | 2016-11-23 | 环境保护部华南环境科学研究所 | A kind of network identity recognition methods being carried out matching identification by twin check |
CN104113558A (en) * | 2014-08-05 | 2014-10-22 | 环境保护部华南环境科学研究所 | Network identity identifying method for matching identification through double-check |
CN105450616A (en) * | 2014-09-23 | 2016-03-30 | 中国电信股份有限公司 | Terminal authentication method, trusted determination gateway, authentication server and system |
CN105450616B (en) * | 2014-09-23 | 2019-07-12 | 中国电信股份有限公司 | A kind of authentication method of terminal, accredited judgement gateway, certificate server and system |
CN104618385A (en) * | 2015-02-13 | 2015-05-13 | 厦门乐享新传媒有限公司 | Method and system for connecting Internet |
CN105101476A (en) * | 2015-03-23 | 2015-11-25 | 洪永川 | Wireless local area network system applicable to rail trains |
CN106162944A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to steamer |
CN106161484A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to automobile |
CN106161486A (en) * | 2015-03-23 | 2016-11-23 | 洪永川 | A kind of wireless local area network (WLAN) system being applied to aircraft |
CN105049413A (en) * | 2015-06-02 | 2015-11-11 | 杭州敦崇科技股份有限公司 | Authentication method for free wireless Internet access |
CN105848147A (en) * | 2015-07-28 | 2016-08-10 | 维沃移动通信有限公司 | Network connection method and device, and Wi-Fi routing equipment |
CN106559783A (en) * | 2015-09-29 | 2017-04-05 | 华为技术有限公司 | A kind of authentication method to WIFI network, device and system |
CN106559783B (en) * | 2015-09-29 | 2020-04-14 | 华为技术有限公司 | Authentication method, device and system for WIFI network |
US10743180B2 (en) | 2015-09-29 | 2020-08-11 | Huawei Technologies Co., Ltd. | Method, apparatus, and system for authenticating WIFI network |
CN105592461A (en) * | 2015-11-19 | 2016-05-18 | 湖北睛彩视讯科技有限公司 | WiFi user identification authentication method and system |
CN105933901A (en) * | 2016-05-25 | 2016-09-07 | 深圳市共进电子股份有限公司 | Method and system for authenticating wireless router |
CN106789905A (en) * | 2016-11-22 | 2017-05-31 | 上海斐讯数据通信技术有限公司 | A kind of network access equipment and method |
CN108259518A (en) * | 2018-04-24 | 2018-07-06 | 北京知道创宇信息技术有限公司 | A kind of network connection authentication method, device, electronic equipment and storage medium |
CN109326058A (en) * | 2018-08-29 | 2019-02-12 | 中国建设银行股份有限公司 | Identification check method, apparatus, terminal and readable medium based on wisdom automatic teller machine |
CN109326058B (en) * | 2018-08-29 | 2021-07-20 | 中国建设银行股份有限公司 | Identity verification method and device based on intelligent teller machine, terminal and readable medium |
CN109343373A (en) * | 2018-09-07 | 2019-02-15 | 广东美的厨房电器制造有限公司 | The control method and cooking appliance of cooking appliance |
CN109714417A (en) * | 2018-12-27 | 2019-05-03 | 迈普通信技术股份有限公司 | Network control system and method based on user behavior |
CN109714417B (en) * | 2018-12-27 | 2021-08-10 | 迈普通信技术股份有限公司 | Network control system and method based on user behavior |
CN109818936A (en) * | 2018-12-29 | 2019-05-28 | 北京奇安信科技有限公司 | IP address-based server info processing method and processing device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103826226A (en) | Method and device for controlling wireless internet access | |
CN101267631B (en) | A method for self-adapted configuration of access points at a mobile terminal | |
CN105516962B (en) | Account-opening method and system based on eUICC | |
CN104717218B (en) | A kind of Wifi Verification Systems and method | |
CN103079201B (en) | Fast authentication method, access controller (AC) and system for wireless local area network | |
WO2016082483A1 (en) | Pseudo base station discrimination method and apparatus | |
CN104144058B (en) | A kind of Information Authentication method matched based on sound wave | |
JP2014527326A (en) | Wireless LAN connection device and operation method thereof | |
CN103401884A (en) | Authentication method and system for public wireless environment Internet access based on micro message | |
CN105656627A (en) | Identity verification method, device and system | |
CN103905399A (en) | Account registration management method and apparatus | |
CN106161385A (en) | The long-range control method of a kind of equipment and device | |
CN104008325A (en) | Mobile phone Wi-Fi network-connecting real name identity authentication platform and method based on two-dimension codes | |
CN105450643A (en) | Network access authentication method, apparatus and system | |
CN106534040A (en) | Method and device for identifying subscriber identity of terminal equipment | |
CN103747000A (en) | Authentication method and authentication device for accessing wireless network | |
CN111949958B (en) | Authorization authentication method and device in Oauth protocol | |
CN105681258B (en) | Session method and conversational device based on third-party server | |
CN106879048A (en) | Smart machine networking method, system and smart machine | |
CN104660405A (en) | Business equipment authentication method and equipment | |
CN106658498A (en) | Portal approved quick roaming method and WiFi device | |
CN106162640A (en) | A kind of portal authentication method and system | |
CN105357224B (en) | A kind of registration of intelligent domestic gateway, removing method and system | |
US20150180851A1 (en) | Method, device, and system for registering terminal application | |
CN103873251A (en) | Method and equipment for establishing connection by audio frequency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140528 |
|
RJ01 | Rejection of invention patent application after publication |