CN104618987A - Method and device for accessing network - Google Patents

Method and device for accessing network Download PDF

Info

Publication number
CN104618987A
CN104618987A CN201410850875.0A CN201410850875A CN104618987A CN 104618987 A CN104618987 A CN 104618987A CN 201410850875 A CN201410850875 A CN 201410850875A CN 104618987 A CN104618987 A CN 104618987A
Authority
CN
China
Prior art keywords
access
terminal
network
request message
contact information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410850875.0A
Other languages
Chinese (zh)
Other versions
CN104618987B (en
Inventor
张旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410850875.0A priority Critical patent/CN104618987B/en
Publication of CN104618987A publication Critical patent/CN104618987A/en
Application granted granted Critical
Publication of CN104618987B publication Critical patent/CN104618987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/40Connection management for selective distribution or broadcast

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for accessing a network, belonging to the field of a communication technology. The method comprises the steps: periodically sending broadcasting information with an access identification code; receiving first access request information returned by first terminals according to the access identification code, wherein the first access request information at least includes contact information corresponding to the first terminals; if the contact information belongs to a preset white list, confirming that the first terminals have access conditions; and establishing wireless connection among the first terminals. According to the network accessing method, the terminals receive the broadcasting information with the access identification code sent by the network access equipment, and the access requests with contact information are sent to the network access equipment according to the access identification codes; after the contact information matched by the network access equipment belongs to the white list, the procedure of accessing the terminals to the wireless network is carried out. The operation procedure is reduced when the terminals are accessed to the wireless network; and the accessing efficiency to the wireless network is improved.

Description

Network access method and device
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method and an apparatus for accessing a network.
Background
With the development of communication technology, more and more users access a wireless network through a terminal with a wireless access function to access the network, and generally, the access to the wireless network needs to input a correct password before accessing the network.
In order to prevent password input errors, the operation of accessing the network can be carried out in a network sharing mode. The method comprises the following steps: the terminal which has accessed the network generates a two-dimensional code according to the SSID (Service set identifier) and the password of the currently accessed wireless network, and the terminal which is to be accessed to the network scans the two-dimensional code to obtain the corresponding SSID and the password and automatically accesses the wireless network according to the SSID and the password.
Disclosure of Invention
In order to solve the problems of the related art, the embodiments of the present disclosure provide a method and an apparatus for accessing a network. The technical scheme is as follows:
according to a first aspect of the embodiments of the present disclosure, there is provided a method for accessing a network, including:
periodically sending a broadcast message carrying an access identification code;
receiving a first access request message returned by a first terminal according to the access identification code, wherein the first access request message at least comprises contact person information corresponding to the first terminal;
if the contact information belongs to a preset white list, determining that the first terminal has access conditions;
and establishing a wireless connection with the first terminal.
In a first possible implementation manner of the first aspect, the periodically sending the broadcast message carrying the access identification code includes:
adding the access identification code into a newly added field of a broadcast message to be sent, and periodically sending the broadcast message;
or,
and adding the access identification code into a Service Set Identifier (SSID) in a broadcast message to be sent, and periodically sending the broadcast message.
In a second possible implementation manner of the first aspect, the determining that the first terminal has the access condition includes:
sending a verification request message to a second terminal, wherein the verification request message carries the contact information; the second terminal has the management authority of the home terminal;
receiving a verification result returned by the second terminal;
and if the verification result is that the verification is passed, determining that the first terminal has the access condition.
With reference to the third possible implementation manner of the first aspect, the access request message further includes a MAC address corresponding to the first terminal,
correspondingly, after the establishing of the wireless connection with the first terminal, the method further includes:
and storing the corresponding relation between the contact information and the MAC address.
With reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the method further includes:
after the first terminal breaks the wireless connection with the network access equipment, receiving a second access request message sent by the first terminal, wherein the second access request message carries contact person information corresponding to the first terminal and an MAC address corresponding to the first terminal;
inquiring whether a corresponding relation between the contact information and the MAC address exists or not;
and if the corresponding relation between the contact information and the MAC address exists, determining that the first terminal has access conditions, and establishing wireless connection with the first terminal.
In a fifth possible implementation manner of the first aspect, after receiving an access request message sent by the first terminal according to the access identifier, the method further includes:
and if the contact information does not belong to a preset white list, establishing wireless connection with the first terminal, and setting network access restriction corresponding to the first terminal.
According to a second aspect of the embodiments of the present disclosure, there is provided a method for accessing a network, including:
receiving a broadcast message sent by network access equipment, and analyzing the broadcast message;
if the access identification code is analyzed in the broadcast message, sending a first access request message to the network access equipment, wherein the first access request message at least comprises contact person information corresponding to a local terminal;
and receiving a first response message of an access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
In a first possible implementation manner of the second aspect, the parsing the broadcast message includes:
resolving an access identification code in a newly added field of the broadcast message; or,
and analyzing an access identification code in the SSID of the broadcast message.
In a second possible implementation manner of the second aspect, the first access request message further includes a MAC address corresponding to the local terminal.
In a third possible implementation manner of the second aspect, the method further includes:
after the wireless connection with the network access equipment is disconnected, sending a second access request message to the network access equipment, wherein the second access request message carries contact information corresponding to the terminal and an MAC address corresponding to the first terminal;
and receiving a second response message of the access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
According to a third aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a network, including:
the first sending module is used for periodically sending the broadcast message carrying the access identification code;
a first receiving module, configured to receive a first access request message returned by a first terminal according to the access identification code, where the first access request message at least includes contact information corresponding to the first terminal;
the first determining module is used for determining that the first terminal has an access condition when the contact information belongs to a preset white list;
and the first connection establishing module is used for establishing wireless connection with the first terminal.
In a first possible implementation manner of the third aspect, the first sending module includes:
a first sending unit, configured to add an access identification code to a newly added field of a broadcast message to be sent, and periodically send the broadcast message;
and the second sending unit is used for adding the access identification code into the service set identifier SSID in the broadcast message to be sent and periodically sending the broadcast message.
In a second possible implementation manner of the third aspect, the first determining module includes:
a third sending unit, configured to send a verification request message to a second terminal, where the verification request message carries the contact information; the second terminal has the management authority of the home terminal;
the first receiving unit is used for receiving the verification result returned by the second terminal;
and the determining unit is used for determining that the first terminal has the access condition when the verification result is that the verification passes.
With reference to the second possible implementation manner of the third aspect, in a third possible implementation manner, the access request message further includes a MAC address corresponding to the first terminal,
correspondingly, the device further comprises:
and the storage module is used for storing the corresponding relation between the contact information and the MAC address.
With reference to the second possible implementation manner of the third aspect, in a third possible implementation manner, the apparatus further includes:
a second receiving module, configured to receive a second access request message sent by the first terminal after the wireless connection with the first terminal is disconnected, where the second access request message carries contact information corresponding to the first terminal and an MAC address corresponding to the first terminal;
the query module is used for querying whether the corresponding relation between the contact information and the MAC address exists or not;
a second determining module, configured to determine that the first terminal has an access condition when a correspondence between the contact information and the MAC address exists;
and the second connection establishing module is used for establishing wireless connection with the first terminal.
In a fifth possible implementation manner of the third aspect, the apparatus further includes:
the third connection establishing module is used for establishing wireless connection with the first terminal when the contact information does not belong to a preset white list;
and the setting module is used for setting the network access limit corresponding to the first terminal.
According to a fourth aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a network, including:
the third receiving module is used for receiving the broadcast message sent by the network access equipment;
the analysis module is used for analyzing the broadcast message;
a second sending module, configured to send a first access request message to the network access device when the access identifier is analyzed in the broadcast message, where the first access request message at least includes contact information corresponding to a local terminal;
a fourth receiving module, configured to receive a first response message of accessing the network, where the first response message is sent by the network access device, so as to determine that establishment of the wireless connection with the network access device is successful.
In a first possible implementation manner of the fourth aspect, the parsing module includes:
the first analysis unit is used for analyzing the access identification code in the newly added field of the broadcast message;
and the second analysis unit is used for analyzing the access identification code in the SSID of the broadcast message.
In a second possible implementation manner of the fourth aspect, the first access request message further includes a MAC address corresponding to the local terminal.
In a third possible implementation manner of the fourth aspect, the apparatus further includes:
a third sending module, configured to send a second access request message to the network access device after the first terminal disconnects the wireless connection with the network access device, where the second access request message carries contact information corresponding to the local terminal and an MAC address corresponding to the local terminal;
a fifth receiving module, configured to receive a second response message of the access network sent by the network access device, so as to determine that establishment of the wireless connection with the network access device is successful.
According to a fifth aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a network, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
periodically sending a broadcast message carrying an access identification code;
receiving a first access request message returned by a first terminal according to the access identification code, wherein the first access request message at least comprises contact person information corresponding to the first terminal;
if the contact information belongs to a preset white list, determining that the first terminal has access conditions;
and establishing a wireless connection with the first terminal.
According to a sixth aspect of the embodiments of the present disclosure, there is provided an apparatus for accessing a network, including:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a broadcast message sent by network access equipment, and analyzing the broadcast message;
if the access identification code is analyzed in the broadcast message, sending a first access request message to the network access equipment, wherein the first access request message at least comprises contact person information corresponding to a local terminal;
and receiving a first response message of an access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the method comprises the steps that a broadcast message carrying an access identification code is periodically sent through network access equipment, an access request carrying contact person information returned by a terminal is received, and if the contact person information is in a preset white list, the terminal is determined to have access conditions to carry out a process of accessing a wireless network. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a flow chart illustrating a method of accessing a network in accordance with an exemplary embodiment;
FIG. 2 is a flow chart illustrating a method of accessing a network in accordance with an exemplary embodiment;
FIG. 3 is a flow chart illustrating a method of accessing a network in accordance with an exemplary embodiment;
fig. 4 is a flowchart illustrating a method of a terminal re-accessing a network in a method of accessing a network according to an exemplary embodiment;
FIG. 5 is a block diagram illustrating an apparatus for accessing a network in accordance with an exemplary embodiment;
FIG. 6 is a block diagram illustrating an apparatus for accessing a network in accordance with an exemplary embodiment;
fig. 7 is a block diagram illustrating an apparatus for accessing a network (general structure of a network access device) according to an example embodiment;
fig. 8 is a block diagram illustrating an apparatus (a general structure of a mobile terminal) according to an example embodiment.
Detailed Description
To make the objects, technical solutions and advantages of the present disclosure more apparent, embodiments of the present disclosure will be described in detail with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a method of accessing a network, as shown in fig. 1, for use in a network access device, according to an example embodiment, including the following steps.
In step 101, periodically sending a broadcast message carrying an access identification code;
in step 102, receiving a first access request message returned by the first terminal according to the access identification code, wherein the first access request message at least comprises contact information corresponding to the first terminal;
in step 103, if the contact information belongs to a preset white list, determining that the first terminal has an access condition;
in step 104, a wireless connection is established with the first terminal.
Optionally, in a first possible implementation manner, the periodically sending the broadcast message carrying the access identification code includes:
adding the access identification code into a newly added field of the broadcast message to be sent, and periodically sending the broadcast message;
or,
and adding the access identification code into a Service Set Identifier (SSID) in the broadcast message to be sent, and periodically sending the broadcast message.
Optionally, in a second possible implementation manner of the first aspect, the determining that the first terminal has the access condition includes:
sending a verification request message to the second terminal, wherein the verification request message carries the contact information; the second terminal has the management authority of the home terminal;
receiving a verification result returned by the second terminal;
and if the verification result is that the verification is passed, determining that the first terminal has the access condition.
Optionally, with reference to the third possible implementation manner of the first aspect, the access request message further includes a MAC address corresponding to the first terminal,
correspondingly, after the wireless connection with the first terminal is established, the method further comprises:
and storing the corresponding relation between the contact information and the MAC address.
Optionally, with reference to the third possible implementation manner of the first aspect, in a fourth possible implementation manner, the method further includes:
after the first terminal breaks the wireless connection with the network access equipment, receiving a second access request message sent by the first terminal, wherein the second access request message carries contact information corresponding to the first terminal and an MAC address corresponding to the first terminal;
inquiring whether a corresponding relation between the contact information and the MAC address exists or not;
and if the corresponding relation between the contact information and the MAC address exists, determining that the first terminal has the access condition, and establishing wireless connection with the first terminal.
Optionally, in a fifth possible implementation manner of the first aspect, after receiving an access request message sent by the first terminal according to the access identifier, the method further includes:
and if the contact information does not belong to the preset white list, establishing wireless connection with the first terminal, and setting network access restriction corresponding to the first terminal.
The method and the device for accessing the wireless network periodically send the broadcast message carrying the access identification code through the network access equipment, receive the access request carrying the contact information returned by the terminal, and determine that the terminal has the access condition to access the wireless network if the contact information is in a preset white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Fig. 2 is a flowchart illustrating a method of accessing a network, which is used in a terminal, as shown in fig. 2, according to an exemplary embodiment, and includes the following steps.
In step 201, a first terminal receives a broadcast message sent by a network access device, and analyzes the broadcast message;
in step 202, if the access identification code is analyzed in the broadcast message, a first access request message is sent to the network access device, where the first access request message at least includes contact information corresponding to the local terminal;
in step 203, a first response message of the access network sent by the network access device is received to determine that the establishment of the wireless connection with the network access device is successful.
Optionally, in a first possible implementation manner of the second aspect, parsing the broadcast message includes:
resolving an access identification code in a newly added field of the broadcast message; or,
and resolving the access identification code in the SSID of the broadcast message.
Optionally, in a second possible implementation manner of the second aspect, the first access request message further includes a MAC address corresponding to the local terminal.
Optionally, in a third possible implementation manner of the second aspect, the method further includes:
after the wireless connection with the network access equipment is disconnected, sending a second access request message to the network access equipment, wherein the second access request message carries the contact information corresponding to the terminal and the MAC address corresponding to the first terminal;
and receiving a second response message of the access network sent by the network access equipment to determine that the wireless connection establishment with the network access equipment is successful.
The method and the device for accessing the wireless network receive the broadcast message carrying the access identification code sent by the network access equipment through the terminal, send the access request carrying the contact information to the network access equipment according to the access identification code, and perform the process of accessing the wireless network after the network access equipment matches that the contact information belongs to the white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Fig. 3 is a flow chart illustrating a method of accessing a network according to an example embodiment, as shown in fig. 3, including the following steps.
In step 301, the network access device periodically sends a broadcast message carrying an access identification code.
The access identification code is used for the terminal to identify that the network access equipment has the functions of authentication-free and fast access to the wireless network. The access identification code can be a unique parameter corresponding to each network access device; the same parameters may be provided for each network access device.
The setting mode of the access identification code may include the following modes: first, a field may be added to the original broadcast message, and the access identifier is stored in the added field; second, the access id may be added to the original SSID field to form a new SSID with the original SSID. Wherein, the broadcast message at least comprises: SSID, MAC address (Media access control) of the network access device, and access identification code.
For the first mode, when the terminal analyzes the broadcast message after receiving the broadcast message, the terminal can check whether a newly added field exists in the broadcast message, if so, the terminal obtains an access identification code in the newly added field and verifies the access identification code so as to determine whether the network access equipment sending the broadcast message has the functions of authentication-free and fast accessing the wireless network;
for the second mode, when the terminal analyzes the broadcast message after receiving the broadcast message, the terminal can check whether an access identification code added additionally exists in the SSID field in the broadcast message, and if the access identification code added additionally exists in the SSID field in the broadcast message, the terminal can acquire the access identification code in the added field and verify the access identification code to determine whether the network access device sending the broadcast message has the functions of authentication-free and fast accessing the wireless network. For example: the original SSID is: the SSID after adding the access identification code is as follows: ABCD _ XYZ.
The method of verifying the access identification code is not limited herein.
Optionally, the MAC address of the network access device may also be used as the access identification code. Correspondingly, the MAC addresses of the network access devices having the functions of authentication-free and fast access to the wireless network need to be preset in the terminal, so that the MAC addresses are matched when the broadcast message is received, and whether to execute the operation of accessing the network in the embodiment of the present disclosure is determined.
Among them, in the embodiments of the present disclosure, the wireless network may include but is not limited to: a wireless fidelity WI-FI network.
Accordingly, step 301 may be implemented by:
adding the access identification code into a newly added field of the broadcast message to be sent, and periodically sending the broadcast message; or, adding the access identification code into the service set identifier SSID in the broadcast message to be sent, and periodically sending the broadcast message.
In step 302, the first terminal receives a broadcast message sent by the network access device and parses the broadcast message.
According to the two methods in step 301, the method for analyzing the access identification code in step 303 also includes two methods:
resolving an access identification code in a newly added field of the broadcast message; or, the access identification code is analyzed in the SSID of the broadcast message.
In step 303, if the access identifier is parsed from the broadcast message, the first terminal sends a first access request message to the network access device, where the first access request message at least includes contact information corresponding to the local terminal.
The first access request message may further include a MAC address corresponding to the local terminal.
The contact information may include, but is not limited to: a mobile phone number, a mail address, an instant messaging account, a social network account, and the like.
In step 304, the network access device returns a first access request message according to the access identification code, where the first access request message at least includes contact information corresponding to the first terminal.
In step 305, if the contact information belongs to a preset white list, it is determined that the first terminal has an access condition.
The administrator of the network access device uploads the self-stored contact information list to the network access device in advance, and can establish a white list according to the contact information list. The white list is a contact information list which allows the network access equipment to be accessed and can normally access the network.
Wherein the contact information list may include: name and corresponding contact information.
Optionally, after the contact information is matched in the white list to meet the condition, a second-step verification mode may be further set to improve the security of accessing the wireless network. Thus, step 305 may be implemented by:
in step 3051, if the contact information belongs to a preset white list, sending a verification request message to the second terminal, wherein the verification request message carries the contact information; the second terminal has the management authority of the home terminal.
The second terminal is used by a manager of the network access device, and the manager can set the second terminal for the second verification in the network access device in advance.
The contact information carried in the verification request message may be the contact information carried in the first access request. Optionally, the contact information carried in the verification request message may also be a name corresponding to the matched contact information and sent to the second terminal after the white list matching is performed for the network access device.
And after the second terminal receives the verification request message, generating prompt information and displaying the prompt information in a screen of the second terminal. The prompt information includes prompt content and two options, and the prompt content may be: "XX contact requests to connect to the network"; the options are respectively: an approval option and a rejection option. And the manager selects in the screen of the second terminal according to the two options of the prompt message, and generates a verification result after selecting one option and returns the verification result to the network access equipment. After the agreement option is selected, the verification result carries an identification passing the verification; and after the rejection option is selected, the verification result carries the identification which fails in verification.
In step 3052, the network access device receives the verification result returned by the second terminal.
In step 3053, if the verification result is that the first terminal passes the verification, it is determined that the first terminal has the access condition.
After the step 305 is completed, the step 307 is executed.
In step 306, if the contact information does not belong to the preset white list, a wireless connection with the first terminal is established, and a network access limit corresponding to the first terminal is set.
A blacklist may also be established in the network access device. The blacklist is a contact information list which is accessed to the network access equipment and is provided with network access limitation.
Although the terminal where the contact information belonging to the blacklist is located can access the wireless network of the network access device, network access is limited. The access restriction may limit the network bandwidth, limit the accessed website, etc. according to the actual situation.
Wherein, the contact information can belong to a blacklist; further, the contact information reported by the first terminal may also be included outside the blacklist and does not belong to the white list, and the processing method for such contact information may be the same as that of the blacklist.
In step 307, the network access device establishes a wireless connection with the first terminal.
And after the wireless connection establishing process is completed, returning a first response message to the first terminal to prompt the first terminal that the wireless network access is successful.
In step 308, the correspondence between the contact information and the MAC address is saved.
After the second verification step in step 305 is performed to perform further verification, the correspondence between the contact information and the MAC address is stored in the network access device, so that the second verification step may not be performed when the first terminal accesses the network access device again, which saves time for accessing the wireless network.
In step 309, the first terminal receives a first response message of the access network sent by the network access device to determine that the establishment of the wireless connection with the network access device is successful.
Fig. 4 is a flow chart illustrating a method of accessing a network, as shown in fig. 4, according to an example embodiment, including the following steps.
In step 401, after the first terminal disconnects the wireless connection with the network access device, a second access request message is sent to the network access device, where the second access request message carries contact information corresponding to the home terminal and a MAC address corresponding to the home terminal.
In step 402, after the network access device disconnects the wireless connection with the first terminal, a second access request message sent by the first terminal is received, where the second access request message carries the contact information corresponding to the first terminal and the MAC address corresponding to the first terminal.
In step 403, it is queried whether there is a correspondence between the contact information and the MAC address.
In the embodiment of the disclosure, when the first terminal performs the operation of accessing the network again, the network device verifies the first terminal through the corresponding relationship between the contact information and the MAC address, and does not need to perform secondary verification through the second terminal, thereby further reducing the operation in the verification process.
In step 404, if there is a correspondence between the contact information and the MAC address, it is determined that the first terminal has the access condition, and a wireless connection with the first terminal is established.
In step 405, a second response message of the access network sent by the network access device is received to determine that the establishment of the wireless connection with the network access device is successful.
The method and the device for accessing the wireless network periodically send the broadcast message carrying the access identification code through the network access equipment, receive the access request carrying the contact information returned by the terminal, and determine that the terminal has the access condition to access the wireless network if the contact information is in a preset white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
In addition, the terminal receives a broadcast message which is sent by the network access equipment and carries an access identification code, sends an access request carrying contact person information to the network access equipment according to the access identification code, and performs a process of accessing the wireless network after the network access equipment matches that the contact person information belongs to the white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Fig. 5 is an apparatus block diagram illustrating an access network in accordance with an example embodiment. Referring to fig. 5, the apparatus includes:
a first sending module 501, configured to send a broadcast message carrying an access identification code periodically;
a first receiving module 502, configured to receive a first access request message returned by the first terminal according to the access identifier, where the first access request message at least includes contact information corresponding to the first terminal;
a first determining module 503, configured to determine that the first terminal has an access condition when the contact information belongs to a preset white list;
a first establishing connection module 504, configured to establish a wireless connection with the first terminal.
The first sending module 501 includes:
a first sending unit 5011, configured to add the access identifier to a newly added field of the broadcast message to be sent, and periodically send the broadcast message;
the second sending unit 5012 is configured to add the access identifier to a service set identifier SSID in a broadcast message to be sent, and send the broadcast message periodically.
The first determining module 503 includes:
a third sending unit 5031, configured to send an authentication request message to the second terminal, where the authentication request message carries the contact information; the second terminal has the management authority of the home terminal;
a first receiving unit 5032, configured to receive a verification result returned by the second terminal;
a determining unit 5033, configured to determine that the first terminal has the access condition when the verification result is that the verification passes.
Wherein, the access request message also includes the MAC address corresponding to the first terminal,
correspondingly, the device further comprises:
a saving module 505, configured to save a corresponding relationship between the contact information and the MAC address.
Wherein, the device still includes:
a second receiving module 506, configured to receive a second access request message sent by the first terminal after the wireless connection with the first terminal is disconnected, where the second access request message carries contact information corresponding to the first terminal and an MAC address corresponding to the first terminal;
the query module 507 is configured to query whether there is a correspondence between the contact information and the MAC address;
a second determining module 508, configured to determine that the first terminal has the access condition when there is a correspondence between the contact information and the MAC address;
a second establishing module 509, configured to establish a wireless connection with the first terminal.
Wherein, the device still includes:
a third establishing connection module 510, configured to establish a wireless connection with the first terminal when the contact information does not belong to a preset white list;
the setting module 511 is configured to set a network access restriction corresponding to the first terminal.
The method and the device for accessing the wireless network periodically send the broadcast message carrying the access identification code through the network access equipment, receive the access request carrying the contact information returned by the terminal, and determine that the terminal has the access condition to access the wireless network if the contact information is in a preset white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Fig. 6 is an apparatus block diagram illustrating an access network in accordance with an example embodiment. Referring to fig. 6, the apparatus includes:
a third receiving module 601, configured to receive a broadcast message sent by a network access device;
the parsing module 602 is configured to parse the broadcast message;
a second sending module 603, configured to send a first access request message to the network access device when the access identifier is analyzed from the broadcast message, where the first access request message at least includes contact information corresponding to the local terminal;
a fourth receiving module 604, configured to receive a first response message of the access network sent by the network access device, so as to determine that the establishment of the wireless connection with the network access device is successful.
The parsing module 602 includes:
a first parsing unit 6021, configured to parse the access identification code from the newly added field of the broadcast message;
a second parsing unit 6022, configured to parse the access identification code from the SSID of the broadcast message.
The first access request message also includes a MAC address corresponding to the local terminal.
Wherein, the device still includes:
a third sending module 605, configured to send a second access request message to the network access device after the wireless connection with the network access device is disconnected, where the second access request message carries contact information corresponding to the local terminal and an MAC address corresponding to the local terminal;
a fifth receiving module 606, configured to receive a second response message of the access network sent by the network access device, so as to determine that the establishment of the wireless connection with the network access device is successful.
The method and the device for accessing the wireless network receive the broadcast message carrying the access identification code sent by the network access equipment through the terminal, send the access request carrying the contact information to the network access equipment according to the access identification code, and perform the process of accessing the wireless network after the network access equipment matches that the contact information belongs to the white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Corresponding to the method for accessing a network provided by the above exemplary embodiment, another exemplary embodiment of the present disclosure provides an apparatus 1900 for accessing a network, see fig. 7. For example, the apparatus 1900 may be provided as a network access device. Referring to fig. 7, the device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by the processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the method of accessing a network as described above.
The device 1900 may also include a power component 1926 configured to perform power management of the device 1900, a wired or wireless network interface 1950 configured to connect the device 1900 to a network, and an input/output (I/O) interface 1958. The device 1900 may operate based on an operating system stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
The method and the device for accessing the wireless network periodically send the broadcast message carrying the access identification code through the network access equipment, receive the access request carrying the contact information returned by the terminal, and determine that the terminal has the access condition to access the wireless network if the contact information is in a preset white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Corresponding to the method for accessing a network provided by the above exemplary embodiment, another exemplary embodiment of the present disclosure provides an apparatus 800 for accessing a network, see fig. 8. For example, the apparatus 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 8, the apparatus 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall operation of the device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operation at the device 800. Examples of such data include instructions for any application or method operating on device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Power component 806 provides power to the various components of device 800. The power components 806 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the device 800.
The multimedia component 808 includes a screen that provides an output interface between the device 800 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front-facing camera and/or the rear-facing camera may receive external multimedia data when the device 800 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the apparatus 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the device 800. For example, the sensor assembly 814 may detect the open/closed state of the device 800, the relative positioning of the components, such as a display and keypad of the apparatus 800, the sensor assembly 814 may also detect a change in position of the apparatus 800 or a component of the apparatus 800, the presence or absence of user contact with the apparatus 800, orientation or acceleration/deceleration of the apparatus 800, and a change in temperature of the apparatus 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate communications between the apparatus 800 and other devices in a wired or wireless manner. The device 800 may access a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, communications component 816 further includes a Near Field Communications (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the apparatus 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
The method and the device for accessing the wireless network receive the broadcast message carrying the access identification code sent by the network access equipment through the terminal, send the access request carrying the contact information to the network access equipment according to the access identification code, and perform the process of accessing the wireless network after the network access equipment matches that the contact information belongs to the white list. The operation process of the terminal when accessing the wireless network is reduced, and the efficiency of accessing the wireless network is improved.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (22)

1. A method for accessing a network, the method comprising:
periodically sending a broadcast message carrying an access identification code;
receiving a first access request message returned by a first terminal according to the access identification code, wherein the first access request message at least comprises contact person information corresponding to the first terminal;
if the contact information belongs to a preset white list, determining that the first terminal has access conditions;
and establishing a wireless connection with the first terminal.
2. The method of claim 1, wherein the periodically sending the broadcast message carrying the access identity code comprises:
adding the access identification code into a newly added field of a broadcast message to be sent, and periodically sending the broadcast message;
or,
and adding the access identification code into a Service Set Identifier (SSID) in a broadcast message to be sent, and periodically sending the broadcast message.
3. The method of claim 1, wherein the determining that the first terminal is provided with the access condition comprises:
sending a verification request message to a second terminal, wherein the verification request message carries the contact information; the second terminal has the management authority of the home terminal;
receiving a verification result returned by the second terminal;
and if the verification result is that the verification is passed, determining that the first terminal has the access condition.
4. The method of claim 3, wherein the access request message further includes a Media Access Control (MAC) address corresponding to the first terminal,
correspondingly, after the establishing of the wireless connection with the first terminal, the method further includes:
and storing the corresponding relation between the contact information and the MAC address.
5. The method of claim 4, further comprising:
after the wireless connection with the first terminal is disconnected, receiving a second access request message sent by the first terminal, wherein the second access request message carries contact information corresponding to the first terminal and an MAC address corresponding to the first terminal;
inquiring whether a corresponding relation between the contact information and the MAC address exists or not;
and if the corresponding relation between the contact information and the MAC address exists, determining that the first terminal has access conditions, and establishing wireless connection with the first terminal.
6. The method of claim 1, wherein after receiving the access request message sent by the first terminal according to the access identifier, the method further comprises:
and if the contact information does not belong to a preset white list, establishing wireless connection with the first terminal, and setting network access restriction corresponding to the first terminal.
7. A method for accessing a network, the method comprising:
receiving a broadcast message sent by network access equipment, and analyzing the broadcast message;
if the access identification code is analyzed in the broadcast message, sending a first access request message to the network access equipment, wherein the first access request message at least comprises contact person information corresponding to a local terminal;
and receiving a first response message of an access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
8. The method of claim 7, wherein parsing the broadcast message comprises:
resolving an access identification code in a newly added field of the broadcast message; or,
and analyzing an access identification code in the SSID of the broadcast message.
9. The method of claim 7, wherein the first access request message further includes a MAC address corresponding to the local terminal.
10. The method of claim 7, further comprising:
after the wireless connection with the network access equipment is disconnected, sending a second access request message to the network access equipment, wherein the second access request message carries contact information corresponding to the local terminal and an MAC address corresponding to the local terminal;
and receiving a second response message of the access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
11. An apparatus for accessing a network, the apparatus comprising:
the first sending module is used for periodically sending the broadcast message carrying the access identification code;
a first receiving module, configured to receive a first access request message returned by a first terminal according to the access identification code, where the first access request message at least includes contact information corresponding to the first terminal;
the first determining module is used for determining that the first terminal has an access condition when the contact information belongs to a preset white list;
and the first connection establishing module is used for establishing wireless connection with the first terminal.
12. The apparatus of claim 11, wherein the first sending module comprises:
a first sending unit, configured to add an access identification code to a newly added field of a broadcast message to be sent, and periodically send the broadcast message;
and the second sending unit is used for adding the access identification code into the service set identifier SSID in the broadcast message to be sent and periodically sending the broadcast message.
13. The apparatus of claim 11, wherein the first determining module comprises:
a third sending unit, configured to send a verification request message to a second terminal, where the verification request message carries the contact information; the second terminal has the management authority of the home terminal;
the first receiving unit is used for receiving the verification result returned by the second terminal;
and the determining unit is used for determining that the first terminal has the access condition when the verification result is that the verification passes.
14. The apparatus of claim 13, wherein the access request message further includes a Media Access Control (MAC) address corresponding to the first terminal,
correspondingly, the device further comprises:
and the storage module is used for storing the corresponding relation between the contact information and the MAC address.
15. The apparatus of claim 14, further comprising:
a second receiving module, configured to receive a second access request message sent by the first terminal after the wireless connection with the first terminal is disconnected, where the second access request message carries contact information corresponding to the first terminal and an MAC address corresponding to the first terminal;
the query module is used for querying whether the corresponding relation between the contact information and the MAC address exists or not;
a second determining module, configured to determine that the first terminal has an access condition when a correspondence between the contact information and the MAC address exists;
and the second connection establishing module is used for establishing wireless connection with the first terminal.
16. The apparatus of claim 11, further comprising:
the third connection establishing module is used for establishing wireless connection with the first terminal when the contact information does not belong to a preset white list;
and the setting module is used for setting the network access limit corresponding to the first terminal.
17. An apparatus for accessing a network, the apparatus comprising:
the third receiving module is used for receiving the broadcast message sent by the network access equipment;
the analysis module is used for analyzing the broadcast message;
a second sending module, configured to send a first access request message to the network access device when the access identifier is analyzed in the broadcast message, where the first access request message at least includes contact information corresponding to a local terminal;
a fourth receiving module, configured to receive a first response message of accessing the network, where the first response message is sent by the network access device, so as to determine that establishment of the wireless connection with the network access device is successful.
18. The apparatus of claim 17, wherein the parsing module comprises:
the first analysis unit is used for analyzing the access identification code in the newly added field of the broadcast message;
and the second analysis unit is used for analyzing the access identification code in the SSID of the broadcast message.
19. The apparatus of claim 17, wherein the first access request message further includes a MAC address corresponding to the local terminal.
20. The apparatus of claim 17, further comprising:
a third sending module, configured to send a second access request message to the network access device after the wireless connection with the network access device is disconnected, where the second access request message carries contact information corresponding to a home terminal and an MAC address corresponding to the home terminal;
a fifth receiving module, configured to receive a second response message of the access network sent by the network access device, so as to determine that establishment of the wireless connection with the network access device is successful.
21. An apparatus for accessing a network, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
periodically sending a broadcast message carrying an access identification code;
receiving a first access request message returned by a first terminal according to the access identification code, wherein the first access request message at least comprises contact person information corresponding to the first terminal;
if the contact information belongs to a preset white list, determining that the first terminal has access conditions;
and establishing a wireless connection with the first terminal.
22. An apparatus for accessing a network, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving a broadcast message sent by network access equipment, and analyzing the broadcast message;
if the access identification code is analyzed in the broadcast message, sending a first access request message to the network access equipment, wherein the first access request message at least comprises contact person information corresponding to a local terminal;
and receiving a first response message of an access network sent by the network access equipment to determine that the wireless connection with the network access equipment is successfully established.
CN201410850875.0A 2014-12-30 2014-12-30 Access the method and device of network Active CN104618987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410850875.0A CN104618987B (en) 2014-12-30 2014-12-30 Access the method and device of network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410850875.0A CN104618987B (en) 2014-12-30 2014-12-30 Access the method and device of network

Publications (2)

Publication Number Publication Date
CN104618987A true CN104618987A (en) 2015-05-13
CN104618987B CN104618987B (en) 2019-06-04

Family

ID=53153205

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410850875.0A Active CN104618987B (en) 2014-12-30 2014-12-30 Access the method and device of network

Country Status (1)

Country Link
CN (1) CN104618987B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005217A (en) * 2015-05-29 2015-10-28 广东欧珀移动通信有限公司 Control method, wireless sound box, terminal and system
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network
WO2018010256A1 (en) * 2016-07-15 2018-01-18 中兴通讯股份有限公司 Method and device for wi-fi sharing
CN110209513A (en) * 2019-06-06 2019-09-06 北京金山安全软件有限公司 Broadcast registration method, device, equipment and medium of application program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102165812A (en) * 2008-08-28 2011-08-24 高通股份有限公司 Method and system for restricted access configuration of access point base stations
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
CN104159275A (en) * 2014-07-17 2014-11-19 小米科技有限责任公司 Network connection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102165812A (en) * 2008-08-28 2011-08-24 高通股份有限公司 Method and system for restricted access configuration of access point base stations
CN103813330A (en) * 2012-11-15 2014-05-21 中兴通讯股份有限公司 Communication terminal and system and authority management method
CN104159275A (en) * 2014-07-17 2014-11-19 小米科技有限责任公司 Network connection method and device

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105005217A (en) * 2015-05-29 2015-10-28 广东欧珀移动通信有限公司 Control method, wireless sound box, terminal and system
CN105049416A (en) * 2015-06-15 2015-11-11 小米科技有限责任公司 Method and apparatus for accessing to wifi network
WO2018010256A1 (en) * 2016-07-15 2018-01-18 中兴通讯股份有限公司 Method and device for wi-fi sharing
CN107635229A (en) * 2016-07-15 2018-01-26 中兴通讯股份有限公司 A kind of method and apparatus shared WIFI
CN110209513A (en) * 2019-06-06 2019-09-06 北京金山安全软件有限公司 Broadcast registration method, device, equipment and medium of application program
CN110209513B (en) * 2019-06-06 2021-06-22 北京金山安全软件有限公司 Broadcast registration method, device, equipment and medium of application program

Also Published As

Publication number Publication date
CN104618987B (en) 2019-06-04

Similar Documents

Publication Publication Date Title
US9990480B2 (en) Method, apparatus and storage medium for setting smart device management account
US20170163626A1 (en) Method and device for network access of a smart terminal device
US10608988B2 (en) Method and apparatus for bluetooth-based identity recognition
CN105656948A (en) Account login method and device
CN106209800B (en) Equipment Authority sharing method and apparatus
CN106358189B (en) Method and device for accessing wireless local area network
CN106375096B (en) short message verification method and device
US20170105237A1 (en) Methods and apparatuses for network connection
US10313870B2 (en) Identity verification method and apparatus, and storage medium
CN104954371A (en) Equipment information display method and device
CN107094094B (en) Application networking method and device and terminal
CN111328076A (en) Equipment network distribution method, device and medium
WO2019028746A1 (en) Unmanned aerial vehicle access method and device
CN106454998B (en) Wireless local area network access method, device and terminal
CN109814942B (en) Parameter processing method and device
CN110049062B (en) Verification code verification method, device, system, server, electronic equipment and storage medium
CN106376057A (en) Wireless network access method and device
CN104684106A (en) Network connection method and device
CN107959757B (en) User information processing method and device, APP server and terminal equipment
CN104618987B (en) Access the method and device of network
CN105049219A (en) Network traffic ordering method and system, mobile terminal and server
CN105530129B (en) Router resetting method and device
CN107070707B (en) Method and device for determining initialization mode of router
CN105991626A (en) Network access method and network access device
CN106792570B (en) Positioning method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant