CN104285458A - Wireless network access method, system and terminal - Google Patents

Wireless network access method, system and terminal Download PDF

Info

Publication number
CN104285458A
CN104285458A CN201480001207.9A CN201480001207A CN104285458A CN 104285458 A CN104285458 A CN 104285458A CN 201480001207 A CN201480001207 A CN 201480001207A CN 104285458 A CN104285458 A CN 104285458A
Authority
CN
China
Prior art keywords
terminal
message
social networks
wireless network
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201480001207.9A
Other languages
Chinese (zh)
Inventor
王润芝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN104285458A publication Critical patent/CN104285458A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/02Processing of mobility data, e.g. registration information at HLR [Home Location Register] or VLR [Visitor Location Register]; Transfer of mobility data, e.g. between HLR, VLR or external networks
    • H04W8/08Mobility data transfer
    • H04W8/14Mobility data transfer between corresponding nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The present invention discloses a wireless network access method, a system and a terminal. A first terminal sends the social network registration information thereof to a second terminal, so that the second terminal can authenticate the first terminal by the social network registration information. If the authentication of the first terminal is permitted, the first terminal obtains an IP address of a wireless network distributed by the second terminal, and the first terminal accesses the wireless network according to the IP address. By the above content, the steps of a mobile terminal accessing in a wireless local area network can be reduced, thereby realizing the non-perception access.

Description

Wireless network access method, system and terminal
Technical field
The present invention relates to the communications field, particularly relate to a kind of wireless network access method, system and terminal.
Background technology
Along with the development of WLAN (wireless local area network) (Wireless Fidelity, WIFI) technology, because access security needs, the access of WIFI introduces authentication, and authentication procedures is as shown in Figure 1 particularly, comprising:
S100:WIFI equipment initiates certification.
S101:WIFI equipment carries out authentication.
S102: if authentification failure, then access request is refused.
S103: certification is passed through, access request is allowed to.
Visible, only have passed authentication, just allow to be access in.At present along with the development of mobile technology, the network of operator has gone out early stage mobile communications network, also add WLAN.In order to realize ease for use and the fail safe of Wi-Fi access, there is now multiple WIFI secret sharing.The mode that WIFI equipment can be accessed by first certification again, accessing WLAN, is common in family, enterprise router; WIFI equipment also can first access network, authenticated pass through after carry out certification again, after certification is passed through, be allowed to continue access, otherwise disallowable network, be common in the public places such as hotel, hotel, station.
Although in existing solution, done enough guarantees to network access security, as application encipher algorithm, no matter which kind of mode, all needs manually to input password when accessing WLAN first.And if during password change, then need to re-enter password authentification to access, and password is also easily forgotten.So manually input password carries out authentication when WLAN (wireless local area network) accesses, operate more complicated, Consumer's Experience is bad.
Summary of the invention
In view of this, embodiments provide wireless network access method, system and terminal, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
First aspect provides a kind of wireless network access method, comprising: first terminal sends the social networks log-on message of first terminal to the second terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal; If first terminal authentication is passed through, first terminal obtains the IP address of the wireless network of the second terminal distribution; First terminal is according to IP address access of radio network.
In conjunction with the implementation of first aspect, in the implementation that the first is possible, first terminal sends the social networks log-on message of first terminal to the second terminal, comprise: first terminal sends wireless network connection request to the second terminal, wireless network connection request carries the social networks log-on message of first terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal.
In conjunction with the implementation of first aspect, in the implementation that the second is possible, first terminal sends the social networks log-on message of first terminal to the second terminal, comprising: first terminal is set up wireless network with the second terminal and is connected; First terminal sends the social networks log-on message of first terminal to the second terminal by wireless network, carries out authentication to make the second terminal by social networks log-on message to first terminal.
In conjunction with the implementation that the second of first aspect is possible, in the implementation that the third is possible, method also comprises: if first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
In conjunction with the implementation of first aspect, in the 4th kind of possible implementation, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
Second aspect provides a kind of wireless network access method, comprising: the second terminal receives the social networks log-on message that first terminal sends; Second terminal carries out authentication according to social networks log-on message to first terminal; If authentication is passed through, then the IP address distributing wireless network, to first terminal, makes first terminal according to IP address access of radio network.
In conjunction with the implementation of second aspect, in the implementation that the first is possible, second terminal receives the social networks log-on message that first terminal sends, comprise: the second terminal receives the wireless network connection request that first terminal sends, and wireless network connection request carries the social networks log-on message of first terminal.
In conjunction with the implementation of second aspect, in the implementation that the second is possible, the second terminal receives the social networks log-on message that first terminal sends, and comprising: the second terminal and first terminal are set up wireless network and be connected; Second terminal receives the social networks log-on message of first terminal by wireless network.
In conjunction with the implementation that the second of second aspect is possible, in the implementation that the third is possible, method also comprises: if first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
The implementation possible in conjunction with the implementation of second aspect, the first possible implementation of second aspect, the second or the third possible implementation, in the 4th kind of possible implementation, second terminal carries out authentication according to social networks log-on message to first terminal, comprise: the social networks log-on message of the second terminal comparison social networks log-on message and the second terminal, if consistent, then confirm that authentication is passed through.
The implementation possible in conjunction with the implementation of second aspect, the first possible implementation of second aspect, the second or the third possible implementation, in the 5th kind of possible implementation, second terminal carries out authentication according to social networks log-on message to first terminal, comprising: the second terminal sends social networks log-on message and carries out authentication to server.
In conjunction with the implementation of second aspect, in the 6th kind of possible implementation, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
The third aspect provides a kind of first terminal, comprising: sending module, for sending the social networks log-on message of first terminal to the second terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal; Address acquisition module, is connected with sending module, if pass through for first terminal authentication, obtains the IP address of the wireless network of the second terminal distribution; Access module, is connected with address acquisition module, for according to IP address access of radio network.
In conjunction with the implementation of the third aspect, in the implementation that the first is possible, sending module is used for:
Send wireless network connection request to the second terminal, wireless network connection request carries the social networks log-on message of first terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal.
In conjunction with the implementation of the third aspect, in the implementation that the second is possible, sending module also for: set up wireless network with the second terminal and be connected; Send the social networks log-on message of first terminal to the second terminal by wireless network, by social networks log-on message, authentication is carried out to first terminal to make the second terminal.
In conjunction with the implementation that the second of the third aspect is possible, in the implementation that the third is possible, if first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
In conjunction with the implementation of the third aspect, in the 4th kind of possible implementation, social networks log-on message comprises user identification code that equipment vendors activate, at least one in login account.
Fourth aspect provides a kind of second terminal, comprising: receiver module, for receiving the social networks log-on message that first terminal sends; Authentication module, is connected with receiver module, for carrying out authentication according to social networks log-on message to first terminal; If authentication is passed through, then authentication module distributes the IP address of wireless network to first terminal, makes first terminal according to IP address access of radio network.
In conjunction with the implementation of fourth aspect, in the implementation that the first is possible, receiver module is used for: receive the wireless network connection request that first terminal sends, wireless network connection request carries the social networks log-on message of first terminal.
In conjunction with the implementation of fourth aspect, in the implementation that the second is possible, receiver module is used for: set up wireless network with first terminal and be connected; The social networks log-on message of first terminal is received by wireless network.
In conjunction with the implementation that the second of fourth aspect is possible, in the implementation that the third is possible, the second terminal also comprises link control module, this link control module, determines that first terminal authentication is passed through, then control first terminal success access of radio network; Determine that first terminal authentication is not passed through, then disconnect the second terminal and be connected with the wireless network of first terminal.
The implementation possible in conjunction with the implementation of fourth aspect, the first possible implementation of fourth aspect, the second or the third possible implementation, in the 4th kind of possible implementation, authentication module is also for the social networks log-on message of comparison social networks log-on message and the second terminal, if consistent, then confirm that authentication is passed through.
The implementation possible in conjunction with the implementation of fourth aspect, the first possible implementation of fourth aspect, the second or the third possible implementation, in the 5th kind of possible implementation, authentication module also for: send social networks log-on message and carry out authentication to server.
In conjunction with the implementation of fourth aspect, in the 6th kind of possible implementation, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
5th aspect provides a kind of wireless network access scheme, comprises first terminal and the second terminal, and first terminal sends the social networks log-on message of first terminal to the second terminal; Second terminal carries out authentication according to social networks log-on message to first terminal; If authentication is passed through, then the IP address of the second terminal distribution wireless network is to first terminal; First terminal is according to IP address access of radio network.
In conjunction with the implementation of the 5th aspect, in the implementation that the first is possible, first terminal sends wireless network connection request to the second terminal, and wireless network connection request carries the social networks log-on message of first terminal.
In conjunction with the implementation of the 5th aspect, in the implementation that the second is possible, first terminal is set up wireless network with the second terminal and is connected; First terminal sends the social networks log-on message of first terminal to the second terminal by wireless network.
In conjunction with the implementation that the second of the 5th aspect is possible, in the implementation that the third is possible, if first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
The implementation possible in conjunction with the implementation of the 5th aspect, the first possible implementation of the 5th aspect, the second or the third possible implementation, in the 4th kind of possible implementation, the social networks log-on message of the second terminal comparison social networks log-on message and the second terminal, if consistent, then confirm that authentication is passed through.
The implementation possible in conjunction with the implementation of the 5th aspect, the first possible implementation of the 5th aspect, the second or the third possible implementation, in the 5th kind of possible implementation, system also comprises server, and the second terminal sends social networks log-on message and carries out authentication to server.
In conjunction with the implementation of the 5th aspect, in the 6th kind of possible implementation, social networks log-on message comprises user identification code that equipment vendors activate, at least one in login account.
The present invention sends the social networks log-on message of first terminal to the second terminal by first terminal, carry out authentication to make the second terminal by social networks log-on message to first terminal; If first terminal authentication is passed through, first terminal obtains the IP address of the wireless network of the second terminal distribution; First terminal, according to IP address access of radio network, can reduce the step during access of mobile terminal device WLAN (wireless local area network), realizes unaware access.
Accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, be briefly described to the accompanying drawing used required in embodiment or description of the prior art below, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skill in the art, under the prerequisite not paying creative work, other accompanying drawing can also be obtained according to these accompanying drawings.
Fig. 1 carries out the method schematic diagram of authentication when being wireless network access in prior art;
Fig. 2 is the structural representation of the first embodiment of wireless network access scheme of the present invention;
Fig. 3 is the data interaction figure of the first embodiment of wireless network access scheme of the present invention;
Fig. 4 is the structural representation of the second embodiment of wireless network access scheme of the present invention;
Fig. 5 is the data interaction figure of the second embodiment of wireless network access scheme of the present invention;
Fig. 6 is the schematic flow sheet of the wireless network access method of first embodiment of the invention;
Fig. 7 is the schematic flow sheet of the wireless network access method of second embodiment of the invention;
Fig. 8 is the structural representation of the first terminal of first embodiment of the invention;
Fig. 9 is the structural representation of the second terminal of first embodiment of the invention;
Figure 10 is the structural representation of the first terminal of second embodiment of the invention;
Figure 11 is the structural representation of the second terminal of second embodiment of the invention.
Embodiment
For making the object of the embodiment of the present invention, technical scheme and advantage clearly, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, belong to the scope of protection of the invention.
Refer to Fig. 2, Fig. 2 is the structural representation of the first embodiment of wireless network access scheme of the present invention.As shown in Figure 2, wireless network access scheme 20 comprises first terminal 21 and the second terminal 22.First terminal 21 sends the social networks log-on message of first terminal 20 to the second terminal 22; Second terminal 22 carries out authentication according to social networks log-on message to first terminal 21; If authentication is passed through, then the second terminal 22 distributes the IP address of wireless network to first terminal 21; First terminal 21 is according to IP address access of radio network.
In embodiments of the present invention, the second terminal 22 possesses the ability of first terminal 21 being carried out to authentication, and first terminal 21 and the second terminal 22 can be existing intelligent terminals, as mobile phone, IPAD, computer etc.Second terminal 22 first access of radio network.Then first terminal 21 sends wireless network connection request to the second terminal 22, and wireless network connection request carries the social networks log-on message of first terminal.First terminal 21 is set up wireless network with the second terminal 22 and is connected.First terminal 21 sends the social networks log-on message of first terminal 21 to the second terminal 22 by wireless network.
Social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.As the Apple ID of apple, the Gmail of Android, Huawei's cloud account of Huawei, or the social networks account such as microblog account, wherein, social networks can be facebook, twitter, Renren Network etc.
In embodiments of the present invention, when authentication, two kinds of methods can be adopted to carry out authentication.First method is: the social networks log-on message of the social networks log-on message that the second terminal 22 comparison first terminal 21 sends and the second terminal 22, if unanimously, then confirms that authentication is passed through.If inconsistent, then confirm that authentication is not passed through.Particularly as shown in Figure 3:
In step 1, first terminal 21 sends wireless network connection request to the second terminal 22.
In step 2, first terminal 21 and the second terminal 22 connect.Now the second terminal 22 can carry out next step the authentication to first terminal 21.
In step 3, first terminal 21 sends social networks log-on message to the second terminal 22.
In step 4, the second terminal 22 is by social networks log-on message and from depositing information authentication comparison.Particularly, the social networks log-on message that first terminal 21 sends by the second terminal 22 compares with the local social networks log-on message preserved under identical account of the second terminal 22.If both are consistent, then authentication is passed through; If inconsistent, then authentication is not passed through.
In steps of 5, the second terminal 22 distributes wireless network IP address to first terminal 21.In detail, when authentication is passed through, the second terminal 22 distributes the IP address of wireless network to first terminal 21, and first terminal 21 is according to IP address success access of radio network.Authentication is obstructed out-of-date, and the second terminal 22 disconnects and being connected with the wireless network of first terminal 21.
As shown in Figure 4, wireless network access scheme 20 also comprises server 23.The second method for authenticating is: social networks log-on message is pass-through to server 23 and carries out authentication by the second terminal 22.Particularly as shown in Figure 5.
In step 1, first terminal 21 sends wireless network connection request to the second terminal 22.
In step 2, first terminal 21 and the second terminal 22 connect.Now the second terminal 22 can carry out next step the authentication to first terminal 21.
In step 3, first terminal 21 sends social networks log-on message to the second terminal 22.
In step 4, social networks log-on message is pass-through to server 23 by the second terminal 22.
In steps of 5, server 23 notifies that the second terminal 22 authentication is passed through.Particularly, server 23 carries out authentication according to social networks log-on message, and authenticating result is notified the second terminal 22.Preferably, server 23 can be cloud server.
In step 6, the second terminal 22 distributes wireless network IP address to first terminal 21.In detail, when authentication is passed through, the second terminal 22 distributes the IP address of wireless network to first terminal 21, and first terminal 21 is according to IP address success access of radio network.Authentication is obstructed out-of-date, and the second terminal 22 disconnects and being connected with the wireless network of first terminal 21.
In embodiments of the present invention, sent the social networks log-on message of first terminal 20 to the second terminal 22 by first terminal 21; Second terminal 22 carries out authentication according to social networks log-on message to first terminal 21; If authentication is passed through, then the second terminal 22 distributes the IP address of wireless network to first terminal 21; First terminal 21 is according to IP address access of radio network, first terminal 21 does not need to input password in the process of access, by this Novel mobile terminal equipment room wireless network access method, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
Refer to Fig. 6, Fig. 6 is the schematic flow sheet of the wireless network access method of first embodiment of the invention.As shown in Figure 6, the wireless network access method of the first embodiment comprises:
S20: first terminal sends the social networks log-on message of first terminal to the second terminal.
In the present embodiment, the second terminal possesses the ability of first terminal being carried out to authentication, and first terminal and the second terminal can be existing intelligent terminals, as mobile phone, IPAD, computer etc.And all can bind a social networks log-on message for authentication during existing intelligent terminal activation.Social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one, as the Apple ID of apple, the Gmail of Android, Huawei's cloud account etc. of Huawei, wherein, social networks can be facebook, twitter, Renren Network etc.
Particularly, first terminal sends wireless network connection request to the second terminal, and wireless network connection request carries the social networks log-on message of first terminal.First terminal is set up wireless network with the second terminal and is connected, and sends the social networks log-on message of first terminal to the second terminal by wireless network, carries out authentication to make the second terminal by social networks log-on message to first terminal.
S21: if first terminal authentication is passed through, first terminal obtains the IP address of the wireless network of the second terminal distribution.
S22: first terminal is according to IP address access of radio network.
If first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
In embodiments of the present invention, sent the social networks log-on message of first terminal by first terminal to the second terminal, by social networks log-on message, authentication is carried out to first terminal to make the second terminal; If first terminal authentication is passed through, first terminal obtains the IP address of the wireless network of the second terminal distribution; First terminal, according to IP address access of radio network, by the cut-in method of this Novel mobile terminal equipment room wireless network, can reduce the step during access of mobile terminal device WLAN (wireless local area network), realize unaware access.
Refer to Fig. 7, Fig. 7 is the schematic flow sheet of the wireless network access method of second embodiment of the invention.As shown in Figure 7, the wireless network access method of the second embodiment comprises:
S30: the second terminal receives the social networks log-on message that first terminal sends.
In the present embodiment, the second terminal possesses the ability of first terminal being carried out to authentication, and first terminal and the second terminal can be existing intelligent terminals, as mobile phone, IPAD, computer etc.Before S30, the second terminal first access of radio network.Then the second terminal 22 receives the wireless network connection request that first terminal 21 sends, and wireless network connection request carries the social networks log-on message of first terminal.First terminal 21 is set up wireless network with the second terminal 22 and is connected.Then the second terminal 22 receives the social networks log-on message of first terminal 21 transmission by wireless network.Wherein, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.As the Apple ID of apple, the Gmail of Android, Huawei's cloud account of Huawei, or the social networks account such as microblog account, wherein, social networks can be facebook, twitter, Renren Network etc.
S31: the second terminal carries out authentication according to social networks log-on message to first terminal.
In S31, the second terminal can have two kinds of method for authenticating according to social networks log-on message to first terminal.The first is: the social networks log-on message of the social networks log-on message that the second terminal comparison first terminal sends and the second terminal, if unanimously, then confirms that authentication is passed through.If inconsistent, then confirm that authentication is not passed through.The second is: the second terminal sends social networks log-on message and carries out authentication to server.
S32: if authentication is passed through, then the IP address distributing wireless network, to first terminal, makes first terminal according to IP address access of radio network.
In S32, if first terminal authentication is passed through, then first terminal success access of radio network; If first terminal authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal.
So, the second terminal receives the social networks log-on message that first terminal sends; Second terminal carries out authentication according to social networks log-on message to first terminal; If authentication is passed through, then distribute the IP address of wireless network to first terminal, make first terminal according to IP address access of radio network, in authentication process, only need to use social networks log-on message, do not need manually to input any password, thus by this Novel mobile terminal equipment room wireless network access method, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
Refer to Fig. 8, Fig. 8 is the structural representation of the first terminal of first embodiment of the invention.As shown in Figure 8, first terminal 21 comprises: sending module 210, address acquisition module 211 and access module 212.Sending module 210, for sending the social networks log-on message of first terminal 21 to the second terminal, carries out authentication by social networks log-on message to first terminal 21 to make the second terminal.Address acquisition module 211 is connected with sending module 210, if pass through for first terminal 21 authentication, obtains the IP address of the wireless network of the second terminal distribution.Access module 212 is connected with address acquisition module 211, for according to IP address access of radio network.
In embodiments of the present invention, sending module 210 sends wireless network connection request to the second terminal, and wireless network connection request carries the social networks log-on message of first terminal 21.Sending module 210 is set up wireless network with the second terminal and is connected, and sends the social networks log-on message of first terminal 21 to the second terminal, carry out authentication to make the second terminal by social networks log-on message to first terminal 21 by wireless network.Wherein, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one, as the Apple ID of apple, the Gmail of Android, Huawei's cloud account of Huawei, or the social networks accounts such as microblog account, wherein, social networks can be facebook, twitter, Renren Network etc.If first terminal 21 authentication is passed through, then the successful access of radio network of first terminal 21; If first terminal 21 authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal 21.So, in authentication process, only need to use social networks log-on message, do not need manually to input any password, thus by this Novel mobile terminal equipment room wireless network access method, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
Refer to Fig. 9, Fig. 9 is the structural representation of the second terminal of first embodiment of the invention.As shown in Figure 9, the second terminal 22 comprises: receiver module 220, authentication module 221 and link control module 222.The social networks log-on message that receiver module 220 sends for receiving first terminal.Authentication module 221 is connected with receiver module 220, for carrying out authentication according to social networks log-on message to first terminal.If authentication is passed through, then authentication module 221 distributes the IP address of wireless network to first terminal, makes first terminal according to IP address access of radio network.
In embodiments of the present invention, receiver module 220 receives the wireless network connection request that first terminal sends, and wireless network connection request carries the social networks log-on message of first terminal.Receiver module 220 and first terminal are set up wireless network and are connected, and receive the social networks log-on message of first terminal by wireless network.Wherein, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
Authentication module 221 can have two kinds of method for authenticating according to social networks log-on message to first terminal.The first is: the social networks log-on message of the social networks log-on message that authentication module 221 comparison first terminal sends and the second terminal 22, if unanimously, then confirms that authentication is passed through.If inconsistent, then confirm that authentication is not passed through.The second is: authentication module 221 sends social networks log-on message and carries out authentication to server.If link control module 222 determines that first terminal authentication is passed through, then control first terminal success access of radio network; If link control module 222 determines that first terminal authentication is not passed through, then disconnect the second terminal 22 and be connected with the wireless network of first terminal.So, in authentication process, only need to use social networks log-on message, do not need manually to input any password, thus by this Novel mobile terminal equipment room wireless network access method, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
Refer to Figure 10, Figure 10 is the structural representation of the first terminal of second embodiment of the invention.As shown in Figure 8, first terminal 31 comprises transceiver 311, processor 312, memory 313 and data/address bus 314, wherein transceiver 311, processor 312 and memory 313 are connected with data/address bus 314 respectively, to carry out data interaction by data/address bus 314.
In embodiments of the present invention, transceiver 311 sends the social networks log-on message of first terminal 31 to the second terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal 31.If first terminal 31 authentication is passed through, then processor 312 obtains the IP address of the wireless network of the second terminal distribution, and according to IP address access of radio network.
In embodiments of the present invention, transceiver 311 sends wireless network connection request to the second terminal, and wireless network connection request carries the social networks log-on message of first terminal 31.Transceiver 311 is set up wireless network with the second terminal and is connected, and sends the social networks log-on message of first terminal 31 to the second terminal, carry out authentication to make the second terminal by social networks log-on message to first terminal 31 by wireless network.Wherein, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one, as the Apple ID of apple, the Gmail of Android, Huawei's cloud account of Huawei, or the social networks accounts such as microblog account, wherein, social networks can be facebook, twitter, Renren Network etc.Memory 314 is for storing social networks log-on message.If first terminal 31 authentication is passed through, then the successful access of radio network of first terminal 31; If first terminal 31 authentication is not passed through, then the second terminal disconnects and being connected with the wireless network of first terminal 31.So, in authentication process, only need to use social networks log-on message, do not need manually to input any password, thus by this Novel mobile terminal equipment room wireless network access method, the step when access of mobile terminal device WLAN (wireless local area network) is shared can be reduced, realize unaware access.
Refer to Figure 11, Figure 11 is the structural representation of the second terminal of second embodiment of the invention.As shown in Figure 9, second terminal 32 comprises transceiver 321, processor 322, memory 323 and data/address bus 324, wherein receiver 321, processor 322 and memory 323 are connected with data/address bus 324 respectively, to carry out data interaction by data/address bus 324.
In embodiments of the present invention, transceiver 321 receives the social networks log-on message that first terminal sends.Memory 323 is for storing social networks log-on message.The processor 322 be connected with receiver 321 carries out authentication according to social networks log-on message to first terminal.If authentication is passed through, then processor 322 distributes the IP address of wireless network to first terminal, makes first terminal according to IP address access of radio network.
In embodiments of the present invention, transceiver 321 receives the wireless network connection request that first terminal sends, and wireless network connection request carries the social networks log-on message of first terminal.Transceiver 321 and first terminal are set up wireless network and are connected, and receive the social networks log-on message of first terminal by wireless network.Wherein, social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one, as the Apple ID of apple, the Gmail of Android, Huawei's cloud account of Huawei, or the social networks accounts such as microblog account, wherein, social networks can be facebook, twitter, Renren Network etc.
Processor 322 can have two kinds of method for authenticating according to social networks log-on message to first terminal.The first is: the social networks log-on message of the social networks log-on message that processor 322 comparison first terminal sends and the second terminal 32, if unanimously, then confirms that authentication is passed through.If inconsistent, then confirm that authentication is not passed through.The second is: processor 322 sends social networks log-on message and carries out authentication to server.Processor 322 determines that first terminal authentication is passed through, then control first terminal success access of radio network; Processor 322 determines that first terminal authentication is not passed through, then disconnect the second terminal 32 and be connected with the wireless network of first terminal.
In sum, first terminal sends the social networks log-on message of first terminal to the second terminal, carries out authentication to make the second terminal by social networks log-on message to first terminal; If first terminal authentication is passed through, first terminal obtains the IP address of the wireless network of the second terminal distribution; First terminal is according to IP address access of radio network, in authentication process, only need to use social networks log-on message, do not need manually to input any password, thus by this Novel mobile terminal equipment room wireless network access method, the step during access of mobile terminal device WLAN (wireless local area network) can be reduced, realize unaware access.
The foregoing is only embodiments of the invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (30)

1. a wireless network access method, is characterized in that, described method comprises:
First terminal sends the social networks log-on message of described first terminal to the second terminal, carries out authentication to make described second terminal by described social networks log-on message to described first terminal;
If described first terminal authentication is passed through, described first terminal obtains the IP address of the wireless network of described second terminal distribution;
Described first terminal accesses described wireless network according to described IP address.
2. method according to claim 1, is characterized in that, described first terminal sends the social networks log-on message of described first terminal to described second terminal, comprising:
Described first terminal sends wireless network connection request to described second terminal, described wireless network connection request carries the described social networks log-on message of described first terminal, carries out authentication to make described second terminal by described social networks log-on message to described first terminal.
3. method according to claim 1, is characterized in that, described first terminal sends the social networks log-on message of described first terminal to described second terminal, comprising: described first terminal is set up wireless network with described second terminal and is connected;
Described first terminal sends the social networks log-on message of described first terminal to described second terminal by described wireless network, carry out authentication to make described second terminal by described social networks log-on message to described first terminal.
4. method according to claim 3, is characterized in that, described method also comprises: if described first terminal authentication is passed through, then described first terminal successfully accesses described wireless network;
If described first terminal authentication is not passed through, then described second terminal disconnects and being connected with the wireless network of described first terminal.
5. method according to claim 1, is characterized in that, described social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
6. a wireless network access method, is characterized in that, described method comprises:
Second terminal receives the social networks log-on message that first terminal sends;
Described second terminal carries out authentication according to described social networks log-on message to described first terminal;
If described authentication is passed through, then the IP address distributing wireless network, to described first terminal, makes described first terminal access described wireless network according to described IP address.
7. method according to claim 6, is characterized in that, described second terminal receives the social networks log-on message that described first terminal sends, and comprising:
Described second terminal receives the wireless network connection request that described first terminal sends, and described wireless network connection request carries the described social networks log-on message of described first terminal.
8. method according to claim 6, is characterized in that, described second terminal receives the social networks log-on message that described first terminal sends, and comprising:
Described second terminal is set up wireless network with described first terminal and is connected;
Described second terminal receives the social networks log-on message of described first terminal by described wireless network.
9. method according to claim 8, is characterized in that, described method also comprises: if described first terminal authentication is passed through, then described first terminal success access of radio network;
If described first terminal authentication is not passed through, then described second terminal disconnects and being connected with the wireless network of described first terminal.
10. the method according to any one of claim 6-9, it is characterized in that, described second terminal carries out authentication according to described social networks log-on message to described first terminal, comprise: the social networks log-on message of social networks log-on message and described second terminal described in described second terminal comparison, if consistent, then confirm that authentication is passed through.
11. methods according to any one of claim 6-9, it is characterized in that, described second terminal carries out authentication according to described social networks log-on message to described first terminal, comprising: described second terminal sends described social networks log-on message and carries out authentication to server.
12. methods according to claim 6, is characterized in that, described social networks log-on message comprises: at least one of consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message.
13. 1 kinds of first terminals, is characterized in that, comprising:
Sending module, for sending the social networks log-on message of described first terminal to the second terminal, carries out authentication by described social networks log-on message to described first terminal to make described second terminal;
Address acquisition module, is connected with described sending module, if pass through for described first terminal authentication, obtains the IP address of the wireless network of described second terminal distribution;
Access module, is connected with described address acquisition module, for accessing described wireless network according to described IP address.
14. first terminals according to claim 13, is characterized in that, described sending module is used for:
Send wireless network connection request to described second terminal, described wireless network connection request carries the described social networks log-on message of described first terminal, carries out authentication to make described second terminal by described social networks log-on message to described first terminal.
15. first terminals according to claim 14, is characterized in that, described sending module also for:
Set up wireless network with described second terminal to be connected;
The social networks log-on message being sent described first terminal by described wireless network, to described second terminal, carries out authentication by described social networks log-on message to described first terminal to make described second terminal.
16. first terminals according to claim 15, is characterized in that, if described first terminal authentication is passed through, then and described first terminal success access of radio network;
If described first terminal authentication is not passed through, then described second terminal disconnects and being connected with the wireless network of described first terminal.
17. first terminals according to claim 13, is characterized in that, described social networks log-on message comprise consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message at least one.
18. a kind of second terminal, is characterized in that, comprising:
Receiver module, for receiving the social networks log-on message that first terminal sends;
Authentication module, is connected with described receiver module, for carrying out authentication according to described social networks log-on message to described first terminal; If described authentication is passed through, then described authentication module distributes the IP address of wireless network to described first terminal, makes described first terminal access described wireless network according to described IP address.
19. second terminals according to claim 18, it is characterized in that, described receiver module is used for: receive the wireless network connection request that described first terminal sends, described wireless network connection request carries the described social networks log-on message of described first terminal.
20. second terminals according to claim 18, it is characterized in that, described receiver module is used for:
Set up wireless network with described first terminal to be connected;
The social networks log-on message of described first terminal is received by described wireless network.
21. second terminals according to claim 20, is characterized in that, described second terminal also comprises link control module, described link control module,
Determine that described first terminal authentication is passed through, then control described first terminal success access of radio network;
Determine that described first terminal authentication is not passed through, then disconnect described second terminal and be connected with the wireless network of described first terminal.
22. the second terminals according to any one of claim 18-21, is characterized in that, described authentication module also for: the social networks log-on message of social networks log-on message described in comparison and described second terminal, if unanimously, then confirms that authentication is passed through.
23. the second terminals according to any one of claim 18-21, is characterized in that, described authentication module also for: send described social networks log-on message and carry out authentication to server.
24. second terminals according to claim 18, is characterized in that, described social networks log-on message comprises
At least one of consumption-orientation network registry information, friend-making type network registry information, mailbox log-on message.
25. 1 kinds of wireless network access schemes, is characterized in that, comprise first terminal and the second terminal,
Described first terminal sends the social networks log-on message of described first terminal to the second terminal;
Described second terminal carries out authentication according to described social networks log-on message to described first terminal;
If described authentication is passed through, then described first terminal is given in the IP address of described second terminal distribution wireless network;
Described first terminal accesses described wireless network according to described IP address.
26. systems according to claim 25, is characterized in that, described first terminal sends wireless network connection request to described second terminal, and described wireless network connection request carries the described social networks log-on message of described first terminal.
27. systems according to claim 25, is characterized in that, described first terminal is set up wireless network with described second terminal and is connected;
Described first terminal sends the social networks log-on message of described first terminal to described second terminal by described wireless network.
28. systems according to claim 27, is characterized in that, if described first terminal authentication is passed through, then and described first terminal success access of radio network;
If described first terminal authentication is not passed through, then described second terminal disconnects and being connected with the wireless network of described first terminal.
29. systems according to any one of claim 25-28, is characterized in that, the social networks log-on message of social networks log-on message and described second terminal described in described second terminal comparison, if unanimously, then confirm that authentication is passed through.
30. systems according to any one of claim 25-28, it is characterized in that, described system also comprises server, and described second terminal sends described social networks log-on message and carries out authentication to described server.
CN201480001207.9A 2014-06-24 2014-06-24 Wireless network access method, system and terminal Pending CN104285458A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/080592 WO2015196350A1 (en) 2014-06-24 2014-06-24 Wireless network access method, system and terminal

Publications (1)

Publication Number Publication Date
CN104285458A true CN104285458A (en) 2015-01-14

Family

ID=52258905

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480001207.9A Pending CN104285458A (en) 2014-06-24 2014-06-24 Wireless network access method, system and terminal

Country Status (2)

Country Link
CN (1) CN104285458A (en)
WO (1) WO2015196350A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015196350A1 (en) * 2014-06-24 2015-12-30 华为技术有限公司 Wireless network access method, system and terminal
CN105636030A (en) * 2016-01-29 2016-06-01 北京小米移动软件有限公司 Method and device for sharing access point
CN106559787A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 Method for network access, apparatus and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179554A (en) * 2011-12-22 2013-06-26 中国移动通信集团广东有限公司 Control method and device for wireless broadband network access and network equipment
CN103607712A (en) * 2013-11-29 2014-02-26 深圳Tcl新技术有限公司 Access method and device for wireless network
CN103747000A (en) * 2014-01-13 2014-04-23 深圳市深信服电子科技有限公司 Authentication method and authentication device for accessing wireless network
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104285458A (en) * 2014-06-24 2015-01-14 华为技术有限公司 Wireless network access method, system and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103179554A (en) * 2011-12-22 2013-06-26 中国移动通信集团广东有限公司 Control method and device for wireless broadband network access and network equipment
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
CN103607712A (en) * 2013-11-29 2014-02-26 深圳Tcl新技术有限公司 Access method and device for wireless network
CN103747000A (en) * 2014-01-13 2014-04-23 深圳市深信服电子科技有限公司 Authentication method and authentication device for accessing wireless network

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015196350A1 (en) * 2014-06-24 2015-12-30 华为技术有限公司 Wireless network access method, system and terminal
CN106559787A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 Method for network access, apparatus and system
US10531301B2 (en) 2015-09-30 2020-01-07 Tencent Technology (Shenzhen) Company Limited Network access method, apparatus, and system
CN106559787B (en) * 2015-09-30 2020-02-14 腾讯科技(深圳)有限公司 Network access method, device and system
US10993090B2 (en) 2015-09-30 2021-04-27 Tencent Technology (Shenzhen) Company Limited Network access method, apparatus, and system
CN105636030A (en) * 2016-01-29 2016-06-01 北京小米移动软件有限公司 Method and device for sharing access point
CN105636030B (en) * 2016-01-29 2019-02-22 北京小米移动软件有限公司 Share the method and device of access point

Also Published As

Publication number Publication date
WO2015196350A1 (en) 2015-12-30

Similar Documents

Publication Publication Date Title
CN106656547B (en) Method and device for updating network configuration of household electrical appliance
CN109644133A (en) For requesting the method, the terminal for the method and network of the certification between terminal and third-party server to be sliced instance management equipment in a wireless communication system
US9967738B2 (en) Methods and arrangements for enabling data transmission between a mobile device and a static destination address
CN107241339B (en) Identity authentication method, identity authentication device and storage medium
CN104144463A (en) Wi-fi network access method and system
CN103888265A (en) Login system and method based on mobile terminal
CN104767715A (en) Network access control method and equipment
EP4247115A2 (en) Method and device for activating 5g user
US20140019757A1 (en) Authentication method and system
CN104780536B (en) A kind of authentication method and terminal of internet of things equipment
KR101929868B1 (en) Connection establishment method, device, and system
US10097555B2 (en) Device-to-device network membership confirmation
KR102237840B1 (en) APPARATUS AND METHODS TO INSTALL AND MANAGE eSIM PROFILES
CN103702312A (en) Wireless information transmission method and equipment
CN105357224A (en) Intelligent household gateway register, remove method and system
CN104219401A (en) A phone number distributing method, device and system
CN104285458A (en) Wireless network access method, system and terminal
US20160302132A1 (en) Routing communications traffic
CN103095721A (en) A method and terminal and system for establishing secure connection
US20140189789A1 (en) Method and apparatus for ensuring collaboration between a narrowband device and a broadband device
CN116566764A (en) Configuration method and device for accessing virtual private network
CN111492358B (en) Device authentication
CN105409259B (en) Telephone service is provided by WIFI for non-cellular
CN105072666A (en) WIFI hot spot connection control method, server, and WIFI hot spot
US20240008117A1 (en) Dual-connection device enabling service advertisement and discovery of services between networks, user device and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150114

RJ01 Rejection of invention patent application after publication