US20220303276A1 - Network connection method, hotspot terminal and management terminal - Google Patents
Network connection method, hotspot terminal and management terminal Download PDFInfo
- Publication number
- US20220303276A1 US20220303276A1 US17/711,789 US202217711789A US2022303276A1 US 20220303276 A1 US20220303276 A1 US 20220303276A1 US 202217711789 A US202217711789 A US 202217711789A US 2022303276 A1 US2022303276 A1 US 2022303276A1
- Authority
- US
- United States
- Prior art keywords
- terminal
- hotspot
- mobile terminal
- identity information
- user identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 55
- 238000012790 confirmation Methods 0.000 claims abstract description 78
- 230000006854 communication Effects 0.000 description 32
- 238000004891 communication Methods 0.000 description 32
- 238000010586 diagram Methods 0.000 description 22
- 230000006870 function Effects 0.000 description 7
- 244000089409 Erythrina poeppigiana Species 0.000 description 6
- 235000009776 Rathbunia alamosensis Nutrition 0.000 description 6
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 230000007175 bidirectional communication Effects 0.000 description 2
- 239000002131 composite material Substances 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/10—Connection setup
- H04W76/12—Setup of transport tunnels
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/40—Security arrangements using identity modules
- H04W12/43—Security arrangements using identity modules using shared identity modules, e.g. SIM sharing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/02—Terminal devices
- H04W88/06—Terminal devices adapted for operation in multiple networks or having at least two operational modes, e.g. multi-mode terminals
Definitions
- Embodiments of the present invention relate to the communications field, and in particular, to a network connection method, a hotspot terminal, and a management terminal.
- a mobile terminal With popularization of mobile terminals, a mobile terminal currently accesses a wireless local area network (WLAN) established by a hotspot terminal that is used as an application access point (AP), so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music.
- WLAN wireless local area network
- AP application access point
- an encrypted WLAN may be established on the hotspot terminal, and a correct password needs to be entered for the mobile terminal to access the WLAN established by the hotspot terminal.
- Embodiments of the present invention provide a network connection method, a hotspot terminal, and a management terminal to implement a secure and convenient network connection.
- a network connection method including: receiving, by a hotspot terminal, an Internet access request sent by a mobile terminal, where the Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier SSID of the hotspot terminal, an unencrypted wireless local area network WLAN established by the hotspot terminal;
- the receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information specifically includes: sending, by the hotspot terminal, the user identity information to a management terminal; and receiving, by the hotspot terminal, the permission confirmation instruction sent by the management terminal, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- the receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information specifically includes: displaying, by the hotspot terminal, the user identity information; and receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the hotspot terminal determines the Internet access permission of the mobile terminal according to the received permission confirmation instruction
- the hotspot terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
- a network connection method including: receiving, by a management terminal, user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal; displaying the user identity information by the management terminal; receiving, by the management terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the management terminal; and sending, by the management terminal, the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal.
- the management terminal after the management terminal sends the permission confirmation instruction to the hotspot terminal, the management terminal sets an Internet access condition of the mobile terminal and sends the set Internet access condition to the hotspot terminal.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- a hotspot terminal including: a communications module and a processor; where the processor is configured to establish an unencrypted wireless local area network WLAN; the communications module is configured to receive an Internet access request sent by a mobile terminal, where the Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier SSID of the hotspot terminal, the unencrypted wireless local area network WLAN established by the processor; the processor is further configured to instruct, according to the Internet access request received by the communications module, the communications module to send an input request to the mobile terminal, where the input request is used to request the mobile terminal to send user identity information, and the user identity information is used to identify a user who uses the mobile terminal; the communications module is further configured to receive the user identity information sent by the mobile terminal; and the processor is further configured to receive a permission confirmation instruction that is entered by an administrator according to the user identity information, and determine Internet access permission of the mobile terminal according to the permission confirmation instruction.
- the processor is further configured to establish an unencrypted wireless
- the communications module is further configured to send the user identity information to a management terminal, receive the permission confirmation instruction sent by the management terminal, and send the permission confirmation instruction to the processor, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- the hotspot terminal further includes a display module and an input module; where:
- the display module is configured to display the user identity information after the communications module receives the user identity information sent by the mobile terminal;
- the processor when receiving the permission confirmation instruction that is entered by the administrator according to the user identity information, the processor is specifically configured to receive, by using the input module, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- the processor is further configured to set, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- a management terminal includes a communications module, a display module, an input module, and a processor; where the communications module is configured to receive user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal;
- the display module is configured to display the user identity information
- the processor is configured to receive, by using the input module, a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the display module;
- the processor is further configured to instruct, according to the permission confirmation instruction, the communications module to send the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal.
- the processor is further configured to set an Internet access condition of the mobile terminal; and the communications module is further configured to send the Internet access condition set by the processor to the hotspot terminal.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- the hotspot terminal can determine the Internet access permission of the mobile terminal according to the received permission confirmation instruction, and provide a more convenient and efficient network connection method under the premise of ensuring that a process in which the mobile terminal accesses a wireless local area network established by the hotspot terminal is secure.
- FIG. 1 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to another embodiment of the present invention
- FIG. 3 is a schematic flowchart of a network connection method according to an embodiment of the present invention.
- FIG. 4 is a schematic diagram of an user interface showing that a mobile terminal finds a service set identifier SSID of a hotspot terminal;
- FIG. 5A is a schematic diagram of an user interface showing that a hotspot terminal sends an input request to a mobile terminal;
- FIG. 5B is a schematic diagram of an user interface showing that a user enters user identity information according to an input request user interface
- FIG. 6 is a schematic flowchart of a network connection method according to another embodiment of the present invention.
- FIG. 7 is a schematic flowchart of a network connection method according to another embodiment of the present invention.
- FIG. 8 is a schematic structural diagram of a hotspot terminal 80 according to an embodiment of the present invention.
- FIG. 9 is a schematic structural diagram of a processor 802 according to an embodiment of the present invention.
- FIG. 10 is a schematic structural diagram of a management terminal 100 according to an embodiment of the present invention.
- FIG. 1 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to an embodiment of the present invention.
- a device A is a hotspot terminal, and the device A is used as an application access point (AP) of a wide area network (WAN) to log in to a remote network.
- a device B is a mobile terminal on a local area network (LAN) side, and the mobile terminal accesses a wireless local area network (WLAN) established by the device A that is used as an AP, so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music.
- a person who operates the device A is referred to as an administrator, and a person who operates the device B is referred to as a user.
- FIG. 2 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to another embodiment of the present invention.
- a device A is a hotspot terminal and is used as an application access point of a WAN to log in to a remote network.
- a device B is a mobile terminal on a LAN side, and the mobile terminal accesses a WLAN established by the device A that is used as an AP, so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music.
- a device C is a mobile terminal on the LAN side and is referred to as a management terminal.
- a person who operates the device C is referred to as an administrator, and a person who operates the device B is referred to as a user.
- a mobile terminal involved may be, for example, a mobile phone, a personal computer (PC), a tablet computer, a digital camera, and a game console.
- a hotspot terminal may be, for example, a wireless router, a portable router, a wireless modem, a mobile phone, a PC, a tablet computer, and a digital camera.
- a management terminal may be, for example, a mobile phone, a PC, a tablet computer, a digital camera, and a game console.
- a hotspot terminal establishes a wireless local area network for which a password is set.
- a correct password needs to be entered for the mobile terminal to access an encrypted WLAN established by the hotspot terminal, so as to implement a data service.
- the mobile terminal accesses the encrypted WLAN established by the hotspot terminal, the following problems are likely to occur: it is difficult to enter the password, or it is difficult to acquire the password because the password is too complex; or any mobile terminal can access the encrypted WLAN when the password is disclosed.
- a process in which the mobile terminal accesses the encrypted WLAN established by the hotspot terminal is tedious and complex.
- FIG. 3 is a schematic flowchart of a network connection method according to an embodiment of the present invention. The method includes the following steps:
- a hotspot terminal receives an Internet access request sent by a mobile terminal.
- the Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier (SSID) of the hotspot terminal, an unencrypted WLAN established by the hotspot terminal.
- SSID service set identifier
- the hotspot terminal acquires a MAC address of the mobile terminal, where the MAC address of the mobile terminal is used to uniquely identify the mobile terminal.
- the SSID of the hotspot terminal may be broadcasted by the hotspot terminal in a wireless fidelity (Wi-Fi) manner, or may be broadcasted by the hotspot terminal in another manner, such as near field communication (NFC).
- Wi-Fi wireless fidelity
- NFC near field communication
- the Internet access request may be specifically a request for logging in to a website, such as sina (a news website), yahoo, sohu (a video website), or youku (a video website); or a request for logging in to another application program that requires Internet access, such as MSN or QQ (a chat tool).
- a website such as sina (a news website), yahoo, sohu (a video website), or youku (a video website)
- MSN a request for logging in to another application program that requires Internet access
- QQ a chat tool
- the mobile terminal When the mobile terminal finds the SSID of the hotspot terminal, the mobile terminal requests to access, according to the found SSID of the hotspot terminal, the WLAN established by the hotspot terminal.
- the hotspot terminal establishes the unencrypted WLAN, that is, the mobile terminal may access, according to the SSID, the unencrypted WLAN established by the hotspot terminal in a case in which no password needs to be entered.
- FIG. 4 is a schematic diagram of an user interface showing that a mobile terminal finds an SSID of a hotspot terminal; as shown in FIG. 4 , the mobile terminal finds an SSID that does not require password entering: E5730-Open, and the mobile terminal may access, according to the E5730-Open, an unencrypted WLAN established by the hotspot terminal.
- the mobile terminal After the mobile terminal accesses the unencrypted WLAN established by the hotspot terminal, the mobile terminal sends, according to a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music, an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal. For example, the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), or youku (a video website) by using the hotspot terminal.
- a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music
- an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal.
- the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), or youku (a video website) by using the hotspot terminal.
- the hotspot terminal sends an input request to the mobile terminal according to the received Internet access request, where the input request is used to request the mobile terminal to send user identity information.
- the hotspot terminal When the hotspot terminal receives the Internet access request sent by the mobile terminal, the hotspot terminal sends the input request to the mobile terminal according to the received Internet access request. Specifically, the mobile terminal requests to log in to a remote network by using the hotspot terminal, and the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network, and sends the input request to the mobile terminal to request the mobile terminal to send the user identity information.
- the user identity information is used to identify a user who uses the mobile terminal, and the user identity information may include at least one piece of information of a user name, a user nickname, a user phone number, and user convention information. The foregoing at least one piece of information of a user name, a user nickname, a user phone number, and user convention information is used to enable an administrator to distinguish an identity of the user.
- the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network and sends the input request to the mobile terminal, which may be implemented by the hotspot terminal in a redirection manner. That is, the hotspot terminal redirects the Internet access request sent by the mobile terminal to the input request in the redirection manner.
- the mobile terminal requests to log in to sina, and the hotspot terminal sends an input request to the mobile terminal in the redirection manner;
- FIG. 5A is an example of a specific display user interface of the input request.
- FIG. 5A is a schematic diagram of an user interface showing that a hotspot terminal sends an input request to a mobile terminal. As shown in FIG. 5A , the hotspot terminal sends, according to the received Internet access request, the input request to the mobile terminal to request the mobile terminal to send the user identity information.
- the user identity information that requires to be entered is displayed on the schematic diagram of the user interface in FIG. 5A , and for example, may include any one or more of the following information: permission application information, a nickname, and a user phone number.
- the hotspot terminal receives the user identity information sent by the mobile terminal.
- the user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the user convention information may be any information about a convention between the user and the administrator, such as a piece of specific text and a string of specific numbers.
- FIG. 5B is a schematic diagram of an user interface of user identity information that is sent by a mobile terminal and received by a hotspot terminal.
- the schematic diagram of the user interface in FIG. 5B is used as an example for description.
- the user identity information sent by the mobile terminal to the hotspot terminal is the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- a display user interface of the mobile terminal may further include other content, such as “Please notify me of an approval result by an SMS message”, and the user may choose whether to receive the approval result by an SMS message; if the user chooses to receive the approval result by an SMS message, the user may fill in a phone number for receiving the SMS message.
- the display user interface of the mobile terminal may further include description about a current WLAN, such as “E5730-Open”, and “This is a wireless router of Zhang San”.
- the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information.
- the schematic diagram of the user interface in FIG. 5B is used as an example for description.
- the hotspot terminal receives the user identity information sent by the mobile terminal, and the user identity information displayed on the user interface includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- the user identity information sent by the mobile terminal may include only the permission application information, or may include only the nickname, or may be other identity information that is used to enable the administrator to identify the user, for example, at least one of a user name, a user phone number, or user convention information.
- the hotspot terminal receives the permission confirmation instruction that is entered by the administrator according to the user identity information.
- the hotspot terminal sends the user identity information to a management terminal, and the hotspot terminal receives the permission confirmation instruction sent by the management terminal, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- the hotspot terminal sends the user identity information to the management terminal, and the user identity information includes “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- the user identity information displayed on an user interface of the management terminal includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- the administrator enters the permission confirmation instruction by operating a touchscreen of the management terminal, or pressing a physical button of the management terminal, or in another manner.
- receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information specifically includes: displaying, by the hotspot terminal, the user identity information, and receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- the user identity information is displayed on an user interface of the hotspot terminal, and the user identity information includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- the administrator enters the permission confirmation instruction by operating a touchscreen of the hotspot terminal, or pressing a physical button of the hotspot terminal, or in another manner.
- the hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- the hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- a problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved.
- a convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
- FIG. 6 is a schematic flowchart of a network connection method according to another embodiment of the present invention. The method includes the following steps:
- a mobile terminal accesses, according to an SSID of a hotspot terminal, an unencrypted WLAN established by the hotspot terminal.
- the hotspot terminal establishes the unencrypted WLAN, that is, the mobile terminal may access, according to the SSID, the unencrypted WLAN established by the hotspot terminal in a case in which no password needs to be entered.
- the mobile terminal finds an SSID that does not require password entering: E5730-Open, and the mobile terminal may access, according to the E5730-Open, an unencrypted WLAN established by the hotspot terminal.
- the SSID of the hotspot terminal may be broadcasted by the hotspot terminal in a Wi-Fi manner, or may be broadcasted by the hotspot terminal in another manner, such as NFC.
- the hotspot terminal When the mobile terminal accesses, according to the SSID of the hotspot terminal, the unencrypted WLAN established by the hotspot terminal, the hotspot terminal acquires a MAC address of the mobile terminal, where the MAC address of the mobile terminal is used to uniquely identify the mobile terminal.
- the mobile terminal sends an Internet access request to the hotspot terminal.
- the Internet access request may be specifically a request for logging in to a website, such as sina (a news website), yahoo, sohu (a video website), or youku (a video website); or a request for logging in to another application program that requires Internet access, such as MSN or QQ (a chat tool).
- a website such as sina (a news website), yahoo, sohu (a video website), or youku (a video website)
- MSN a request for logging in to another application program that requires Internet access
- QQ a chat tool
- the mobile terminal After the mobile terminal accesses the unencrypted WLAN established by the hotspot terminal, the mobile terminal sends, according to a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music, an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal. For example, the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), youku (a video website), or the like by using the hotspot terminal.
- a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music
- an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal.
- the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), youku (a video website), or the like by using the hotspot terminal.
- the hotspot terminal sends an input request to the mobile terminal according to the received Internet access request.
- the input request is used to request the mobile terminal to send user identity information.
- the hotspot terminal When the hotspot terminal receives the Internet access request sent by the mobile terminal, the hotspot terminal sends the input request to the mobile terminal according to the received Internet access request. Specifically, the mobile terminal requests to log in to a remote network by using the hotspot terminal, and the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network, and sends the input request to the mobile terminal to request the mobile terminal to send the user identity information.
- the user identity information is used to identify a user who uses the mobile terminal, and the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network and sends the input request to the mobile terminal, which may be implemented by the hotspot terminal in a redirection manner. That is, the hotspot terminal redirects the Internet access request sent by the mobile terminal to the input request in the redirection manner.
- the mobile terminal requests to log in to sina, and the hotspot terminal sends an input request to the mobile terminal in the redirection manner;
- FIG. 5 A is an example of a specific display user interface of the input request.
- the mobile terminal sends user identity information to the hotspot terminal according to the received input request.
- the user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the hotspot terminal displays the received user identity information.
- a schematic diagram of an user interface in FIG. 5B is used as an example for description, and permission application information that is entered by the user according to a requirement displayed on the user interface is “I am Li Si, and I want to log in to a remote network by using your AP; please approve.”
- the user identity information sent by the mobile terminal to the hotspot terminal is the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and a nickname “Tom”.
- the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information.
- the administrator enters the permission confirmation instruction according to the user identity information displayed by the hotspot terminal.
- the user identity information is displayed on an user interface of the hotspot terminal, and the user identity information includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- the administrator enters the permission confirmation instruction by operating a touchscreen of the hotspot terminal, or pressing a physical button of the hotspot terminal, or in another manner.
- the hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- the hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- the hotspot terminal may further perform step S 608 .
- the hotspot terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the hotspot terminal by the mobile terminal.
- the Internet access limitation may be specifically time of accessing the unencrypted WLAN established by the hotspot terminal, or an Internet access range, or a bandwidth limitation.
- the Internet access limitation may be set by the administrator, or the Internet access limitation may be set according to a result of searching for, by the hotspot terminal according to the MAC address of the mobile terminal, an Internet access condition of the mobile terminal in a pre-stored whitelist.
- the hotspot terminal may set time of accessing, by different mobile terminals, the unencrypted WLAN established by the hotspot terminal, or set Internet access ranges of different mobile terminals, or set bandwidth limitations of different mobile terminals, as shown in Table 1.
- the hotspot terminal may establish a whitelist; when the mobile terminal in the whitelist sends an Internet access request again, the hotspot terminal may search the whitelist and determine Internet access permission and an Internet access limitation of the mobile terminal according to the whitelist.
- the hotspot terminal may further perform step S 609 .
- the hotspot terminal sends reminder information to the mobile terminal.
- the reminder information is used to remind whether the Internet access request of the mobile terminal is approved.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- a problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved.
- a convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
- the hotspot terminal determines that a mobile terminal has Internet access permission
- the hotspot terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals can efficiently and quickly log in to the remote network.
- FIG. 7 is a schematic flowchart of a network connection method according to another embodiment of the present invention. The method includes the following steps:
- a mobile terminal accesses, according to an SSID of a hotspot terminal, an unencrypted WLAN established by the hotspot terminal.
- the mobile terminal sends an Internet access request to the hotspot terminal.
- the hotspot terminal sends an input request to the mobile terminal according to the received Internet access request.
- the mobile terminal sends user identity information to the hotspot terminal according to the received input request.
- Steps S 701 -S 704 are respectively the same as steps S 601 -S 604 in the embodiment shown in FIG. 6 , and for specific implementation manners, refer to description in steps S 601 -S 604 .
- the hotspot terminal sends the user identity information to a management terminal.
- the user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the management terminal displays the received user identity information.
- FIG. 5B a schematic diagram of an user interface in FIG. 5B is used as an example for description, and when an user interface of the management terminal displays the user interface shown in FIG. 5B , the user identity information displayed on the user interface includes permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and a nickname “Tom”.
- the management terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the management terminal.
- the administrator enters the permission confirmation instruction according to the user identity information displayed by the management terminal.
- the administrator enters the permission confirmation instruction by operating a touchscreen of the management terminal, or pressing a physical button of the management terminal, or in another manner.
- the management terminal sends the permission confirmation instruction that is entered by the administrator to the hotspot terminal.
- the hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- the hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- the management terminal may further perform step S 710 .
- the management terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the hotspot terminal by the mobile terminal.
- the Internet access limitation may be specifically time of accessing the unencrypted WLAN established by the hotspot terminal, or Internet access ranges that are set for different mobile terminals, or bandwidth limitations that are set for different mobile terminals.
- the Internet access limitation may be set by the administrator, or the Internet access limitation may be set according to a result of searching for, by the hotspot terminal according to a MAC address of the mobile terminal, an Internet access condition of the mobile terminal in a pre-stored whitelist.
- the management terminal may set time of accessing, by different mobile terminals, the unencrypted WLAN established by the hotspot terminal, or set Internet access ranges of different mobile terminals, or set bandwidth limitations of different mobile terminals.
- the management terminal detects distances between mobile terminals and the hotspot terminal, and sets different Internet access permission of the mobile terminals according to the detected distances between the mobile terminals and the hotspot terminal, as shown in Table 2.
- the management terminal may establish a whitelist, and send the whitelist to the hotspot terminal.
- the management terminal sends the set Internet access limitation to the hotspot terminal.
- the management terminal may send, to the hotspot terminal, time of connecting to a network by different mobile terminals by using the hotspot terminal, or Internet access ranges of different mobile terminals, or bandwidth limitations of different mobile terminals, which are set according to MAC addresses of the mobile terminals.
- the management terminal may also send a whitelist of mobile terminals that have the Internet access permission to the hotspot terminal.
- the hotspot terminal may further perform step S 712 .
- the hotspot terminal sends reminder information to the mobile terminal.
- the reminder information is used to remind whether the Internet access request of the mobile terminal is approved.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- a problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved.
- a convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
- the management terminal After a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal.
- the hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
- FIG. 8 is a schematic structural diagram of a hotspot terminal 80 according to an embodiment of the present invention, where the hotspot terminal 80 includes parts such as a communications module 801 , a processor 802 , a memory 803 , a bus 804 , a display module 805 , and an input module 806 .
- the communications module 801 may be a Wi-Fi chip or an integrated chip with a Wi-Fi function, and may be a Wi-Fi chip that supports at least one of protocols 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, or a composite chip that integrates a Wi-Fi function.
- the memory 803 may include a RAM and a ROM, or any fixed storage medium, or a removable storage medium, and is configured to store a program that can execute an embodiment of the present invention or application data in an embodiment of the present invention.
- the memory 803 receives input from other components, or stored information, such as an Internet access request sent by a mobile terminal or user identity information sent by a mobile terminal, is invoked by other components.
- the processor 802 includes an arithmetic logic unit (ALU) 8022 , a register 8021 , and a controller 8023 , where the ALU8022 is responsible for various calculations that the processor 802 can perform.
- the register 8021 is configured to temporarily store code and data in a program execution process.
- the controller 8023 is configured to control instruction execution and information transmission.
- the processor 802 is configured to execute a program, stored in the memory 803 , of an embodiment of the present invention, and implement bidirectional communication with another unit by using the bus 804 .
- the display module 805 may be configured to display information that is entered by a user or information that is provided for a user.
- the input module 806 may be configured to receive an input instruction of a user or provide an interface for external input.
- the memory 803 and the processor 802 may be further integrated into a physical module for applying an embodiment of the present invention, and a program that implements the embodiment of the present invention is stored and run on the physical module.
- bus 804 includes a data bus, and may further include a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are marked as the bus 804 in the diagram.
- units of the hotspot terminal 80 separately execute the following content.
- the processor 802 is configured to establish an unencrypted WLAN.
- the communications module 801 is configured to receive an Internet access request sent by a mobile terminal, where the Internet access request is sent to the hotspot terminal 80 after the mobile terminal accesses, according to a service set identifier SSID of the hotspot terminal 80 , the unencrypted wireless local area network WLAN established by the processor 802 .
- the processor 802 is further configured to instruct, according to the received Internet access request, the communications module 801 to send an input request to the mobile terminal, where the input request is used to request the mobile terminal to send user identity information, and the user identity information is used to identify a user who uses the mobile terminal.
- the communications module 801 is further configured to receive the user identity information sent by the mobile terminal.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the processor 802 is further configured to receive a permission confirmation instruction that is entered by an administrator according to the user identity information, and determine Internet access permission of the mobile terminal according to the permission confirmation instruction received by the communications module 801 .
- the memory 803 is configured to store the Internet access request received by the communications module, an instruction sent by the processor to the communications module, and the received user identity information.
- the communications module 801 is further configured to send the user identity information to a management terminal, receive the permission confirmation instruction sent by the management terminal, and send the permission confirmation instruction to the processor, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- the display module 805 is configured to display the user identity information after the communications module 801 receives the user identity information sent by the mobile terminal.
- the processor 802 When receiving the permission confirmation instruction that is entered by the administrator according to the user identity information, the processor 802 is specifically configured to receive, by using the input module 806 , the permission confirmation instruction that is entered by the administrator according to the user identity information.
- the processor 802 is further configured to set, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
- the processor 802 is further configured to send reminder information to the mobile terminal after the Internet access permission of the mobile terminal is determined, where the reminder information is used to remind whether the Internet access request of the mobile terminal is approved.
- the hotspot terminal in this embodiment of the present invention is configured to execute a method in the foregoing method embodiments; for details, refer to a corresponding process in the foregoing method embodiments, and details are not described herein again.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- a problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved.
- a convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
- the management terminal After a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal.
- the hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
- FIG. 10 is a schematic structural diagram of a management terminal 100 according to an embodiment of the present invention, where the management terminal 100 includes parts such as a communications module 1001 , a processor 1002 , a memory 1003 , a bus 1004 , a display module 1005 , and an input module 1006 .
- the communications module 1001 may be a Wi-Fi chip or an integrated chip with a Wi-Fi function, and may be a Wi-Fi chip that supports at least one of protocols 802.11 a, 802.11 b, 802.11g, 802.11n, and 802.11ac, or a composite chip that integrates a Wi-Fi function.
- the memory 1003 may include a RAM and a ROM, or any fixed storage medium, or a removable storage medium, and is configured to store a program that can execute an embodiment of the present invention or application data in an embodiment of the present invention.
- the memory 1003 receives input from other components, or stored information, such as an Internet access request sent by a mobile terminal or user identity information sent by a mobile terminal, is invoked by other components.
- the processor 1002 is configured to execute a program, stored in the memory 1003 , of an embodiment of the present invention, and implement bidirectional communications with another unit by using the bus 1004 .
- the display module 1005 may be configured to display information that is entered by a user or information that is provided for a user.
- An input unit 1006 may be configured to receive an input instruction of a user or provide an interface for external input.
- the memory 1003 and the processor 1002 may be further integrated into a physical module for applying an embodiment of the present invention, and a program that implements the embodiment of the present invention is stored and run on the physical module.
- bus 1004 All components of the management terminal 100 are coupled together by using the bus 1004 , where the bus 1004 includes a data bus, and may further include a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are marked as the bus 1004 in the diagram.
- units of the management terminal 100 separately execute the following content.
- the communications module 1001 is configured to receive user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal.
- the display module 1005 is configured to display the user identity information.
- the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- the processor 1002 is configured to receive, by using the input module 1006 , a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the display module 1005 .
- the processor 1002 is further configured to instruct, according to the permission confirmation instruction, the communications module 1001 to send the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal.
- the processor 1002 is further configured to set an Internet access condition of the mobile terminal after the communications module 1001 sends the permission confirmation instruction to the hotspot terminal.
- the communications module 1001 is further configured to send the Internet access condition set by the processor 1002 to the hotspot terminal.
- the management terminal in this embodiment of the present invention is configured to execute a method in the foregoing method embodiments; for details, refer to a corresponding process in the foregoing method embodiments, and details are not described herein again.
- a hotspot terminal when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- a problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved.
- a convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
- the management terminal After a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal.
- the hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
- the disclosed device, apparatus and method may be implemented in other manners.
- the described device embodiment is merely exemplary.
- the unit division is merely logical function division and may be other division in actual implementation.
- a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed.
- the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces.
- the indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
- the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. A part or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present invention.
- functional units in the embodiments of the present invention may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
- the program may be stored in a computer readable storage medium. When the program runs, the steps of the method embodiments are performed.
- the foregoing storage medium includes: any medium that can store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
Embodiments of the present invention disclose a network connection method, a hotspot terminal, and a management terminal. A hotspot terminal receives an Internet access request sent by a mobile terminal. The hotspot terminal sends an input request to the mobile terminal according to the received Internet access request. The hotspot terminal receives user identity information sent by the mobile terminal. The hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information. The hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. According to the network connection method provided in the embodiments of the present invention, a problem that a process in which a mobile terminal logs in to a remote network by using a hotspot terminal is tedious and complex is resolved.
Description
- This application is a continuation of U.S. patent application Ser. No. 16/781,851, filed on Feb. 4, 2020, which is a continuation of U.S. patent application Ser. No. 14/996,000, filed on Jan. 14, 2016, now U.S. Pat. No. 10,616,232, which is a continuation of International Patent Application No. PCT/CN2014/079036, filed on May 31, 2014. All of the aforementioned applications are hereby incorporated by reference in their entireties.
- Embodiments of the present invention relate to the communications field, and in particular, to a network connection method, a hotspot terminal, and a management terminal.
- With popularization of mobile terminals, a mobile terminal currently accesses a wireless local area network (WLAN) established by a hotspot terminal that is used as an application access point (AP), so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music. However, to ensure security of the mobile terminal that accesses the WLAN, an encrypted WLAN may be established on the hotspot terminal, and a correct password needs to be entered for the mobile terminal to access the WLAN established by the hotspot terminal.
- In some application scenarios, when the mobile terminal accesses the encrypted WLAN established by the hotspot terminal, there is a problem such as difficulty in entering a password, or a password being too complex, or difficulty in acquiring a password, which causes a tedious process of accessing the encrypted WLAN by the mobile terminal.
- Embodiments of the present invention provide a network connection method, a hotspot terminal, and a management terminal to implement a secure and convenient network connection.
- According to a first aspect of the present invention, a network connection method is provided, including: receiving, by a hotspot terminal, an Internet access request sent by a mobile terminal, where the Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier SSID of the hotspot terminal, an unencrypted wireless local area network WLAN established by the hotspot terminal;
- sending, by the hotspot terminal, an input request to the mobile terminal according to the received Internet access request, where the input request is used to request the mobile terminal to send user identity information, and the user identity information is used to identify a user who uses the mobile terminal; receiving, by the hotspot terminal, the user identity information sent by the mobile terminal; receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information; and determining, by the hotspot terminal, Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- In a first possible implementation manner, the receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information specifically includes: sending, by the hotspot terminal, the user identity information to a management terminal; and receiving, by the hotspot terminal, the permission confirmation instruction sent by the management terminal, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- With reference to the first aspect, in a second possible implementation manner, the receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information specifically includes: displaying, by the hotspot terminal, the user identity information; and receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- With reference to the first aspect and any one of the foregoing possible implementation manners, in a third possible implementation manner, the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- With reference to the first aspect and any one of the foregoing possible implementation manners, in a fourth possible implementation manner, after the hotspot terminal determines the Internet access permission of the mobile terminal according to the received permission confirmation instruction, the hotspot terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
- According to a second aspect, a network connection method is provided, including: receiving, by a management terminal, user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal; displaying the user identity information by the management terminal; receiving, by the management terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the management terminal; and sending, by the management terminal, the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal.
- In a first possible implementation manner, after the management terminal sends the permission confirmation instruction to the hotspot terminal, the management terminal sets an Internet access condition of the mobile terminal and sends the set Internet access condition to the hotspot terminal.
- With reference to the second aspect and the first possible implementation manner, in a second possible implementation manner, the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- According to a third aspect, a hotspot terminal is provided, including: a communications module and a processor; where the processor is configured to establish an unencrypted wireless local area network WLAN; the communications module is configured to receive an Internet access request sent by a mobile terminal, where the Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier SSID of the hotspot terminal, the unencrypted wireless local area network WLAN established by the processor; the processor is further configured to instruct, according to the Internet access request received by the communications module, the communications module to send an input request to the mobile terminal, where the input request is used to request the mobile terminal to send user identity information, and the user identity information is used to identify a user who uses the mobile terminal; the communications module is further configured to receive the user identity information sent by the mobile terminal; and the processor is further configured to receive a permission confirmation instruction that is entered by an administrator according to the user identity information, and determine Internet access permission of the mobile terminal according to the permission confirmation instruction.
- In a first possible implementation manner, the communications module is further configured to send the user identity information to a management terminal, receive the permission confirmation instruction sent by the management terminal, and send the permission confirmation instruction to the processor, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- In a second possible implementation manner, the hotspot terminal further includes a display module and an input module; where:
- the display module is configured to display the user identity information after the communications module receives the user identity information sent by the mobile terminal;
- and when receiving the permission confirmation instruction that is entered by the administrator according to the user identity information, the processor is specifically configured to receive, by using the input module, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- With reference to the third aspect and any one of the foregoing possible implementation manners, after the Internet access permission of the mobile terminal is determined according to the permission confirmation instruction, the processor is further configured to set, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
- With reference to the third aspect and any one of the foregoing possible implementation manners, the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- According to a fourth aspect, a management terminal is provided, and the management terminal includes a communications module, a display module, an input module, and a processor; where the communications module is configured to receive user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal;
- the display module is configured to display the user identity information;
- the processor is configured to receive, by using the input module, a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the display module; and
- the processor is further configured to instruct, according to the permission confirmation instruction, the communications module to send the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal.
- In a first possible implementation manner, after the communications module sends the permission confirmation instruction to the hotspot terminal, the processor is further configured to set an Internet access condition of the mobile terminal; and the communications module is further configured to send the Internet access condition set by the processor to the hotspot terminal.
- With reference to the fourth aspect and the first possible implementation manner, the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- It can be learned from the foregoing technical solutions that, in the technical solutions of the embodiments of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. The hotspot terminal can determine the Internet access permission of the mobile terminal according to the received permission confirmation instruction, and provide a more convenient and efficient network connection method under the premise of ensuring that a process in which the mobile terminal accesses a wireless local area network established by the hotspot terminal is secure.
- To describe the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments. Apparently, the accompanying drawings in the following description show merely some embodiments of the present invention, and a person skilled in the art may still derive other drawings from these accompanying drawings without creative efforts.
-
FIG. 1 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to an embodiment of the present invention; -
FIG. 2 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to another embodiment of the present invention; -
FIG. 3 is a schematic flowchart of a network connection method according to an embodiment of the present invention; -
FIG. 4 is a schematic diagram of an user interface showing that a mobile terminal finds a service set identifier SSID of a hotspot terminal; -
FIG. 5A is a schematic diagram of an user interface showing that a hotspot terminal sends an input request to a mobile terminal; -
FIG. 5B is a schematic diagram of an user interface showing that a user enters user identity information according to an input request user interface; -
FIG. 6 is a schematic flowchart of a network connection method according to another embodiment of the present invention; -
FIG. 7 is a schematic flowchart of a network connection method according to another embodiment of the present invention; -
FIG. 8 is a schematic structural diagram of ahotspot terminal 80 according to an embodiment of the present invention; -
FIG. 9 is a schematic structural diagram of aprocessor 802 according to an embodiment of the present invention; and -
FIG. 10 is a schematic structural diagram of amanagement terminal 100 according to an embodiment of the present invention. - The following clearly describes the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Apparently, the described embodiments are merely some but not all of the embodiments of the present invention. All other embodiments obtained by a person skilled in the art based on the embodiments of the present invention without creative efforts shall fall within the protection scope of the present invention.
-
FIG. 1 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to an embodiment of the present invention. As shown inFIG. 1 , a device A is a hotspot terminal, and the device A is used as an application access point (AP) of a wide area network (WAN) to log in to a remote network. A device B is a mobile terminal on a local area network (LAN) side, and the mobile terminal accesses a wireless local area network (WLAN) established by the device A that is used as an AP, so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music. In the application scenario of this embodiment of the present invention, a person who operates the device A is referred to as an administrator, and a person who operates the device B is referred to as a user. -
FIG. 2 is a schematic diagram of an application scenario in which a mobile terminal accesses a wireless local area network established by a hotspot terminal according to another embodiment of the present invention. As shown inFIG. 2 , a device A is a hotspot terminal and is used as an application access point of a WAN to log in to a remote network. A device B is a mobile terminal on a LAN side, and the mobile terminal accesses a WLAN established by the device A that is used as an AP, so as to implement data services, such as watching a video, browsing a web page, instant messaging, or listening to music. A device C is a mobile terminal on the LAN side and is referred to as a management terminal. In the application scenario of this embodiment of the present invention, a person who operates the device C is referred to as an administrator, and a person who operates the device B is referred to as a user. - In the present invention, a mobile terminal involved may be, for example, a mobile phone, a personal computer (PC), a tablet computer, a digital camera, and a game console. A hotspot terminal may be, for example, a wireless router, a portable router, a wireless modem, a mobile phone, a PC, a tablet computer, and a digital camera. A management terminal may be, for example, a mobile phone, a PC, a tablet computer, a digital camera, and a game console.
- In the prior art, to ensure security of a mobile terminal that accesses a wireless local area network, a hotspot terminal establishes a wireless local area network for which a password is set. A correct password needs to be entered for the mobile terminal to access an encrypted WLAN established by the hotspot terminal, so as to implement a data service. In some application scenarios, when the mobile terminal accesses the encrypted WLAN established by the hotspot terminal, the following problems are likely to occur: it is difficult to enter the password, or it is difficult to acquire the password because the password is too complex; or any mobile terminal can access the encrypted WLAN when the password is disclosed. As a result, a process in which the mobile terminal accesses the encrypted WLAN established by the hotspot terminal is tedious and complex.
-
FIG. 3 is a schematic flowchart of a network connection method according to an embodiment of the present invention. The method includes the following steps: - S301. A hotspot terminal receives an Internet access request sent by a mobile terminal.
- The Internet access request is sent to the hotspot terminal after the mobile terminal accesses, according to a service set identifier (SSID) of the hotspot terminal, an unencrypted WLAN established by the hotspot terminal. When the mobile terminal accesses, according to the SSID of the hotspot terminal, the unencrypted WLAN established by the hotspot terminal, the hotspot terminal acquires a MAC address of the mobile terminal, where the MAC address of the mobile terminal is used to uniquely identify the mobile terminal.
- The SSID of the hotspot terminal may be broadcasted by the hotspot terminal in a wireless fidelity (Wi-Fi) manner, or may be broadcasted by the hotspot terminal in another manner, such as near field communication (NFC).
- The Internet access request may be specifically a request for logging in to a website, such as sina (a news website), yahoo, sohu (a video website), or youku (a video website); or a request for logging in to another application program that requires Internet access, such as MSN or QQ (a chat tool).
- When the mobile terminal finds the SSID of the hotspot terminal, the mobile terminal requests to access, according to the found SSID of the hotspot terminal, the WLAN established by the hotspot terminal. The hotspot terminal establishes the unencrypted WLAN, that is, the mobile terminal may access, according to the SSID, the unencrypted WLAN established by the hotspot terminal in a case in which no password needs to be entered.
-
FIG. 4 is a schematic diagram of an user interface showing that a mobile terminal finds an SSID of a hotspot terminal; as shown inFIG. 4 , the mobile terminal finds an SSID that does not require password entering: E5730-Open, and the mobile terminal may access, according to the E5730-Open, an unencrypted WLAN established by the hotspot terminal. - After the mobile terminal accesses the unencrypted WLAN established by the hotspot terminal, the mobile terminal sends, according to a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music, an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal. For example, the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), or youku (a video website) by using the hotspot terminal.
- S302. The hotspot terminal sends an input request to the mobile terminal according to the received Internet access request, where the input request is used to request the mobile terminal to send user identity information.
- When the hotspot terminal receives the Internet access request sent by the mobile terminal, the hotspot terminal sends the input request to the mobile terminal according to the received Internet access request. Specifically, the mobile terminal requests to log in to a remote network by using the hotspot terminal, and the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network, and sends the input request to the mobile terminal to request the mobile terminal to send the user identity information. The user identity information is used to identify a user who uses the mobile terminal, and the user identity information may include at least one piece of information of a user name, a user nickname, a user phone number, and user convention information. The foregoing at least one piece of information of a user name, a user nickname, a user phone number, and user convention information is used to enable an administrator to distinguish an identity of the user.
- In another embodiment of the present invention, the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network and sends the input request to the mobile terminal, which may be implemented by the hotspot terminal in a redirection manner. That is, the hotspot terminal redirects the Internet access request sent by the mobile terminal to the input request in the redirection manner. For example, the mobile terminal requests to log in to sina, and the hotspot terminal sends an input request to the mobile terminal in the redirection manner;
FIG. 5A is an example of a specific display user interface of the input request. -
FIG. 5A is a schematic diagram of an user interface showing that a hotspot terminal sends an input request to a mobile terminal. As shown inFIG. 5A , the hotspot terminal sends, according to the received Internet access request, the input request to the mobile terminal to request the mobile terminal to send the user identity information. - The user identity information that requires to be entered is displayed on the schematic diagram of the user interface in
FIG. 5A , and for example, may include any one or more of the following information: permission application information, a nickname, and a user phone number. - S303. The hotspot terminal receives the user identity information sent by the mobile terminal.
- The user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information. The user convention information may be any information about a convention between the user and the administrator, such as a piece of specific text and a string of specific numbers.
-
FIG. 5B is a schematic diagram of an user interface of user identity information that is sent by a mobile terminal and received by a hotspot terminal. The schematic diagram of the user interface inFIG. 5B is used as an example for description. - A user enters user identity information according to the user identity information that is displayed on the user interface and requires to be entered; for example, the entered user identity information includes that permission application information is “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and that a nickname is “Tom”. The user identity information sent by the mobile terminal to the hotspot terminal is the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- It should be noted that a display user interface of the mobile terminal may further include other content, such as “Please notify me of an approval result by an SMS message”, and the user may choose whether to receive the approval result by an SMS message; if the user chooses to receive the approval result by an SMS message, the user may fill in a phone number for receiving the SMS message. In addition, the display user interface of the mobile terminal may further include description about a current WLAN, such as “E5730-Open”, and “This is a wireless router of Zhang San”.
- S304. The hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information.
- Similarly, the schematic diagram of the user interface in
FIG. 5B is used as an example for description. After the user enters the user identity information and the user clicks for confirmation (for example, clicks “Apply for Internet access”), the hotspot terminal receives the user identity information sent by the mobile terminal, and the user identity information displayed on the user interface includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”. - Optionally, the user identity information sent by the mobile terminal may include only the permission application information, or may include only the nickname, or may be other identity information that is used to enable the administrator to identify the user, for example, at least one of a user name, a user phone number, or user convention information.
- There may be two manners in which the hotspot terminal receives the permission confirmation instruction that is entered by the administrator according to the user identity information.
- One manner is as follows: The hotspot terminal sends the user identity information to a management terminal, and the hotspot terminal receives the permission confirmation instruction sent by the management terminal, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal.
- For example, the hotspot terminal sends the user identity information to the management terminal, and the user identity information includes “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- The user identity information displayed on an user interface of the management terminal includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”. According to the user identity information displayed by the management terminal, including the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”, the administrator enters the permission confirmation instruction by operating a touchscreen of the management terminal, or pressing a physical button of the management terminal, or in another manner.
- In the other manner, receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information specifically includes: displaying, by the hotspot terminal, the user identity information, and receiving, by the hotspot terminal, the permission confirmation instruction that is entered by the administrator according to the user identity information.
- For example, the user identity information is displayed on an user interface of the hotspot terminal, and the user identity information includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- According to the user identity information displayed by the hotspot terminal, including the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”, the administrator enters the permission confirmation instruction by operating a touchscreen of the hotspot terminal, or pressing a physical button of the hotspot terminal, or in another manner.
- S305. The hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- The hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- In this embodiment of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. A problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved. A convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal.
-
FIG. 6 is a schematic flowchart of a network connection method according to another embodiment of the present invention. The method includes the following steps: - S601. A mobile terminal accesses, according to an SSID of a hotspot terminal, an unencrypted WLAN established by the hotspot terminal.
- The hotspot terminal establishes the unencrypted WLAN, that is, the mobile terminal may access, according to the SSID, the unencrypted WLAN established by the hotspot terminal in a case in which no password needs to be entered. For example, the mobile terminal finds an SSID that does not require password entering: E5730-Open, and the mobile terminal may access, according to the E5730-Open, an unencrypted WLAN established by the hotspot terminal.
- The SSID of the hotspot terminal may be broadcasted by the hotspot terminal in a Wi-Fi manner, or may be broadcasted by the hotspot terminal in another manner, such as NFC.
- When the mobile terminal accesses, according to the SSID of the hotspot terminal, the unencrypted WLAN established by the hotspot terminal, the hotspot terminal acquires a MAC address of the mobile terminal, where the MAC address of the mobile terminal is used to uniquely identify the mobile terminal.
- S602. The mobile terminal sends an Internet access request to the hotspot terminal.
- The Internet access request may be specifically a request for logging in to a website, such as sina (a news website), yahoo, sohu (a video website), or youku (a video website); or a request for logging in to another application program that requires Internet access, such as MSN or QQ (a chat tool).
- After the mobile terminal accesses the unencrypted WLAN established by the hotspot terminal, the mobile terminal sends, according to a user requirement such as watching a video, browsing a web page, instant messaging, or listening to music, an Internet access request to the hotspot terminal to request to log in to a remote network by using the hotspot terminal. For example, the mobile terminal requests to log in to sina (a news website), yahoo, sohu (a video website), youku (a video website), or the like by using the hotspot terminal.
- S603. The hotspot terminal sends an input request to the mobile terminal according to the received Internet access request.
- The input request is used to request the mobile terminal to send user identity information.
- When the hotspot terminal receives the Internet access request sent by the mobile terminal, the hotspot terminal sends the input request to the mobile terminal according to the received Internet access request. Specifically, the mobile terminal requests to log in to a remote network by using the hotspot terminal, and the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network, and sends the input request to the mobile terminal to request the mobile terminal to send the user identity information. The user identity information is used to identify a user who uses the mobile terminal, and the user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- In another embodiment of the present invention, the hotspot terminal prevents, according to the received Internet access request, the mobile terminal from logging in to the remote network and sends the input request to the mobile terminal, which may be implemented by the hotspot terminal in a redirection manner. That is, the hotspot terminal redirects the Internet access request sent by the mobile terminal to the input request in the redirection manner. For example, the mobile terminal requests to log in to sina, and the hotspot terminal sends an input request to the mobile terminal in the redirection manner; FIG. 5A is an example of a specific display user interface of the input request.
- S604. The mobile terminal sends user identity information to the hotspot terminal according to the received input request.
- The user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- S605. The hotspot terminal displays the received user identity information.
- A schematic diagram of an user interface in
FIG. 5B is used as an example for description, and permission application information that is entered by the user according to a requirement displayed on the user interface is “I am Li Si, and I want to log in to a remote network by using your AP; please approve.” The user identity information sent by the mobile terminal to the hotspot terminal is the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and a nickname “Tom”. - S606. The hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information.
- The administrator enters the permission confirmation instruction according to the user identity information displayed by the hotspot terminal.
- For example, the user identity information is displayed on an user interface of the hotspot terminal, and the user identity information includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”.
- According to the user identity information displayed by the hotspot terminal, where the user identity information includes the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”, the administrator enters the permission confirmation instruction by operating a touchscreen of the hotspot terminal, or pressing a physical button of the hotspot terminal, or in another manner.
- S607. The hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- The hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- In another embodiment of the present invention, after the hotspot terminal performs step S607 and determines that the mobile terminal has the Internet access permission, the hotspot terminal may further perform step S608.
- S608. The hotspot terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the hotspot terminal by the mobile terminal.
- The Internet access limitation may be specifically time of accessing the unencrypted WLAN established by the hotspot terminal, or an Internet access range, or a bandwidth limitation.
- Optionally, the Internet access limitation may be set by the administrator, or the Internet access limitation may be set according to a result of searching for, by the hotspot terminal according to the MAC address of the mobile terminal, an Internet access condition of the mobile terminal in a pre-stored whitelist.
- According to MAC addresses of mobile terminals, the hotspot terminal may set time of accessing, by different mobile terminals, the unencrypted WLAN established by the hotspot terminal, or set Internet access ranges of different mobile terminals, or set bandwidth limitations of different mobile terminals, as shown in Table 1.
-
TABLE 1 Example: Access Bandwidth MAC address time Internet access range limitation 44-45-53-54-00-00 10 min Limited to a news web page 2 Mbit/s 44-45-53-54-00-01 30 min Limited to a news web page 10 Mbit/s - For a mobile terminal that has Internet access permission, which is determined by the hotspot terminal, the hotspot terminal may establish a whitelist; when the mobile terminal in the whitelist sends an Internet access request again, the hotspot terminal may search the whitelist and determine Internet access permission and an Internet access limitation of the mobile terminal according to the whitelist.
- In another embodiment of the present invention, after the hotspot terminal performs step S607 and determines the Internet access permission of the mobile terminal, the hotspot terminal may further perform step S609.
- S609. The hotspot terminal sends reminder information to the mobile terminal.
- The reminder information is used to remind whether the Internet access request of the mobile terminal is approved.
- In this embodiment of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. A problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved. A convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal. Furthermore, after the hotspot terminal determines that a mobile terminal has Internet access permission, the hotspot terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals can efficiently and quickly log in to the remote network.
-
FIG. 7 is a schematic flowchart of a network connection method according to another embodiment of the present invention. The method includes the following steps: - S701. A mobile terminal accesses, according to an SSID of a hotspot terminal, an unencrypted WLAN established by the hotspot terminal.
- S702. The mobile terminal sends an Internet access request to the hotspot terminal.
- S703. The hotspot terminal sends an input request to the mobile terminal according to the received Internet access request.
- S704. The mobile terminal sends user identity information to the hotspot terminal according to the received input request.
- Steps S701-S704 are respectively the same as steps S601-S604 in the embodiment shown in
FIG. 6 , and for specific implementation manners, refer to description in steps S601-S604. - S705. The hotspot terminal sends the user identity information to a management terminal.
- The user identity information may be, for example, at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- S706. The management terminal displays the received user identity information.
- Similarly, a schematic diagram of an user interface in
FIG. 5B is used as an example for description, and when an user interface of the management terminal displays the user interface shown inFIG. 5B , the user identity information displayed on the user interface includes permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and a nickname “Tom”. - S707. The management terminal receives a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by the management terminal.
- The administrator enters the permission confirmation instruction according to the user identity information displayed by the management terminal.
- For example, according to the user identity information displayed by the management terminal, including the permission application information “I am Li Si, and I want to log in to a remote network by using your AP; please approve” and the nickname “Tom”, the administrator enters the permission confirmation instruction by operating a touchscreen of the management terminal, or pressing a physical button of the management terminal, or in another manner.
- S708. The management terminal sends the permission confirmation instruction that is entered by the administrator to the hotspot terminal.
- S709. The hotspot terminal determines Internet access permission of the mobile terminal according to the received permission confirmation instruction.
- The hotspot terminal determines, according to the received permission confirmation instruction that is entered by the administrator according to the user identity information, whether the mobile terminal can log in to a remote network by using the hotspot terminal.
- In another embodiment of the present invention, after the management terminal performs step S709 and determines the mobile terminal has the Internet access permission, the management terminal may further perform step S710.
- S710. The management terminal sets, according to a preset Internet access condition, an Internet access limitation of accessing the hotspot terminal by the mobile terminal.
- The Internet access limitation may be specifically time of accessing the unencrypted WLAN established by the hotspot terminal, or Internet access ranges that are set for different mobile terminals, or bandwidth limitations that are set for different mobile terminals.
- Optionally, the Internet access limitation may be set by the administrator, or the Internet access limitation may be set according to a result of searching for, by the hotspot terminal according to a MAC address of the mobile terminal, an Internet access condition of the mobile terminal in a pre-stored whitelist.
- According to MAC addresses of mobile terminals, the management terminal may set time of accessing, by different mobile terminals, the unencrypted WLAN established by the hotspot terminal, or set Internet access ranges of different mobile terminals, or set bandwidth limitations of different mobile terminals. Alternatively, the management terminal detects distances between mobile terminals and the hotspot terminal, and sets different Internet access permission of the mobile terminals according to the detected distances between the mobile terminals and the hotspot terminal, as shown in Table 2.
-
TABLE 2 Example: Access Internet access Bandwidth MAC address time range limitation Distance 44-45-53-54- 10 min Limited to a 2 Mbit/s 2 m, 10 Mbit/s 00-00 news web page allowed 44-45-53-54- 30 min Limited to a 10 Mbit/s 10 m, 2 Mbit/s 00-01 news web page allowed - For a mobile terminal that the Internet access permission, which is determined by the management terminal, the management terminal may establish a whitelist, and send the whitelist to the hotspot terminal.
- S711. The management terminal sends the set Internet access limitation to the hotspot terminal.
- The management terminal may send, to the hotspot terminal, time of connecting to a network by different mobile terminals by using the hotspot terminal, or Internet access ranges of different mobile terminals, or bandwidth limitations of different mobile terminals, which are set according to MAC addresses of the mobile terminals. The management terminal may also send a whitelist of mobile terminals that have the Internet access permission to the hotspot terminal.
- In another embodiment of the present invention, after the hotspot terminal performs step S709 and determines that the mobile terminal has the Internet access permission, the hotspot terminal may further perform step S712.
- S712. The hotspot terminal sends reminder information to the mobile terminal.
- The reminder information is used to remind whether the Internet access request of the mobile terminal is approved.
- In this embodiment of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. A problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved. A convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal. Furthermore, after a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal. The hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
-
FIG. 8 is a schematic structural diagram of ahotspot terminal 80 according to an embodiment of the present invention, where thehotspot terminal 80 includes parts such as acommunications module 801, aprocessor 802, amemory 803, a bus 804, adisplay module 805, and aninput module 806. - The
communications module 801 may be a Wi-Fi chip or an integrated chip with a Wi-Fi function, and may be a Wi-Fi chip that supports at least one of protocols 802.11a, 802.11b, 802.11g, 802.11n, and 802.11ac, or a composite chip that integrates a Wi-Fi function. - The
memory 803 may include a RAM and a ROM, or any fixed storage medium, or a removable storage medium, and is configured to store a program that can execute an embodiment of the present invention or application data in an embodiment of the present invention. By using the bus 804, thememory 803 receives input from other components, or stored information, such as an Internet access request sent by a mobile terminal or user identity information sent by a mobile terminal, is invoked by other components. - As shown in
FIG. 9 , theprocessor 802 includes an arithmetic logic unit (ALU) 8022, aregister 8021, and acontroller 8023, where the ALU8022 is responsible for various calculations that theprocessor 802 can perform. Theregister 8021 is configured to temporarily store code and data in a program execution process. Thecontroller 8023 is configured to control instruction execution and information transmission. - The
processor 802 is configured to execute a program, stored in thememory 803, of an embodiment of the present invention, and implement bidirectional communication with another unit by using the bus 804. - The
display module 805 may be configured to display information that is entered by a user or information that is provided for a user. Theinput module 806 may be configured to receive an input instruction of a user or provide an interface for external input. - The
memory 803 and theprocessor 802 may be further integrated into a physical module for applying an embodiment of the present invention, and a program that implements the embodiment of the present invention is stored and run on the physical module. - All components of the
hotspot terminal 80 are coupled together by using the bus 804, where the bus 804 includes a data bus, and may further include a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are marked as the bus 804 in the diagram. - In this embodiment of the present invention, units of the
hotspot terminal 80 separately execute the following content. - The
processor 802 is configured to establish an unencrypted WLAN. - The
communications module 801 is configured to receive an Internet access request sent by a mobile terminal, where the Internet access request is sent to thehotspot terminal 80 after the mobile terminal accesses, according to a service set identifier SSID of thehotspot terminal 80, the unencrypted wireless local area network WLAN established by theprocessor 802. - The
processor 802 is further configured to instruct, according to the received Internet access request, thecommunications module 801 to send an input request to the mobile terminal, where the input request is used to request the mobile terminal to send user identity information, and the user identity information is used to identify a user who uses the mobile terminal. - The
communications module 801 is further configured to receive the user identity information sent by the mobile terminal. The user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information. - The
processor 802 is further configured to receive a permission confirmation instruction that is entered by an administrator according to the user identity information, and determine Internet access permission of the mobile terminal according to the permission confirmation instruction received by thecommunications module 801. - The
memory 803 is configured to store the Internet access request received by the communications module, an instruction sent by the processor to the communications module, and the received user identity information. - In another embodiment of the present invention, the
communications module 801 is further configured to send the user identity information to a management terminal, receive the permission confirmation instruction sent by the management terminal, and send the permission confirmation instruction to the processor, where the permission confirmation instruction is entered by the administrator according to the user identity information displayed by the management terminal. - In another embodiment of the present invention, the
display module 805 is configured to display the user identity information after thecommunications module 801 receives the user identity information sent by the mobile terminal. - When receiving the permission confirmation instruction that is entered by the administrator according to the user identity information, the
processor 802 is specifically configured to receive, by using theinput module 806, the permission confirmation instruction that is entered by the administrator according to the user identity information. - In another embodiment of the present invention, after the Internet access permission of the mobile terminal is determined according to the permission confirmation instruction, the
processor 802 is further configured to set, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal. - In another embodiment of the present invention, the
processor 802 is further configured to send reminder information to the mobile terminal after the Internet access permission of the mobile terminal is determined, where the reminder information is used to remind whether the Internet access request of the mobile terminal is approved. - For the purpose of convenient and brief description, the hotspot terminal in this embodiment of the present invention is configured to execute a method in the foregoing method embodiments; for details, refer to a corresponding process in the foregoing method embodiments, and details are not described herein again.
- In this embodiment of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. A problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved. A convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal. Furthermore, after a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal. The hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
-
FIG. 10 is a schematic structural diagram of amanagement terminal 100 according to an embodiment of the present invention, where themanagement terminal 100 includes parts such as acommunications module 1001, aprocessor 1002, amemory 1003, a bus 1004, adisplay module 1005, and aninput module 1006. - The
communications module 1001 may be a Wi-Fi chip or an integrated chip with a Wi-Fi function, and may be a Wi-Fi chip that supports at least one of protocols 802.11 a, 802.11 b, 802.11g, 802.11n, and 802.11ac, or a composite chip that integrates a Wi-Fi function. - The
memory 1003 may include a RAM and a ROM, or any fixed storage medium, or a removable storage medium, and is configured to store a program that can execute an embodiment of the present invention or application data in an embodiment of the present invention. By using the bus 1004, thememory 1003 receives input from other components, or stored information, such as an Internet access request sent by a mobile terminal or user identity information sent by a mobile terminal, is invoked by other components. - The
processor 1002 is configured to execute a program, stored in thememory 1003, of an embodiment of the present invention, and implement bidirectional communications with another unit by using the bus 1004. - The
display module 1005 may be configured to display information that is entered by a user or information that is provided for a user. Aninput unit 1006 may be configured to receive an input instruction of a user or provide an interface for external input. - The
memory 1003 and theprocessor 1002 may be further integrated into a physical module for applying an embodiment of the present invention, and a program that implements the embodiment of the present invention is stored and run on the physical module. - All components of the
management terminal 100 are coupled together by using the bus 1004, where the bus 1004 includes a data bus, and may further include a power bus, a control bus, a status signal bus, and the like. However, for clarity of description, various buses are marked as the bus 1004 in the diagram. - In this embodiment of the present invention, units of the
management terminal 100 separately execute the following content. - The
communications module 1001 is configured to receive user identity information sent by a hotspot terminal, where the user identity information is used to identify a user who uses a mobile terminal, and the mobile terminal is a terminal that accesses an unencrypted wireless local area network WLAN established by the hotspot terminal and sends an Internet access request to the hotspot terminal. - The
display module 1005 is configured to display the user identity information. - The user identity information includes at least one piece of information of a user name, a user nickname, a user phone number, and user convention information.
- The
processor 1002 is configured to receive, by using theinput module 1006, a permission confirmation instruction that is entered by an administrator according to the user identity information displayed by thedisplay module 1005. - The
processor 1002 is further configured to instruct, according to the permission confirmation instruction, thecommunications module 1001 to send the permission confirmation instruction to the hotspot terminal, so that the hotspot terminal determines Internet access permission of the mobile terminal. - The
processor 1002 is further configured to set an Internet access condition of the mobile terminal after thecommunications module 1001 sends the permission confirmation instruction to the hotspot terminal. - The
communications module 1001 is further configured to send the Internet access condition set by theprocessor 1002 to the hotspot terminal. - For the purpose of convenient and brief description, the management terminal in this embodiment of the present invention is configured to execute a method in the foregoing method embodiments; for details, refer to a corresponding process in the foregoing method embodiments, and details are not described herein again.
- In this embodiment of the present invention, when a hotspot terminal receives an Internet access request of a mobile terminal, the hotspot terminal sends an input request to the mobile terminal, and the hotspot terminal receives a permission confirmation instruction that is entered by an administrator according to user identity information, and determines Internet access permission of the mobile terminal according to the received permission confirmation instruction. A problem that entering a password when the mobile terminal logs in to a remote network by using the hotspot terminal is complex and tedious is resolved. A convenient and efficient method for performing network connection by the mobile terminal by using the hotspot terminal is provided under the premise of ensuring that the mobile terminal can securely log in to the remote network by using the hotspot terminal. Furthermore, after a management terminal determines that a mobile terminal has the Internet access permission, the management terminal details Internet access limitations of different mobile terminals according to different MAC addresses of the mobile terminals, and sends the set Internet access limitations to the hotspot terminal. The hotspot terminal sends reminder information to the mobile terminals to remind whether Internet access requests of the mobile terminals are approved; different Internet access limitations are set according to different mobile terminals under the premise of ensuring that the mobile terminals log in to a remote network by using the hotspot terminal, so that the mobile terminals efficiently and quickly log in to the remote network.
- A person of ordinary skill in the art may be aware that, in combination with the examples described in the embodiments disclosed in this specification, units, algorithms and method steps may be implemented by a combination of computer software and electronic hardware. Whether the functions are performed by hardware or software depends on particular applications and design constraint conditions of the technical solutions. A person skilled in the art may use different methods to implement the described functions for each particular application, but it should not be considered that the implementation goes beyond the scope of the present invention.
- It may be clearly understood by a person skilled in the art that, for the purpose of convenient and brief description, for a detailed working process of the foregoing apparatus and device, reference may be made to a corresponding process in the foregoing method embodiments, and details are not described herein again.
- In the several embodiments provided in the present application, the disclosed device, apparatus and method may be implemented in other manners. For example, the described device embodiment is merely exemplary. For example, the unit division is merely logical function division and may be other division in actual implementation. For example, a plurality of units or components may be combined or integrated into another system, or some features may be ignored or not performed. In addition, the displayed or discussed mutual couplings or direct couplings or communication connections may be implemented through some interfaces. The indirect couplings or communication connections between the apparatuses or units may be implemented in electronic, mechanical, or other forms.
- The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on a plurality of network units. A part or all of the units may be selected according to actual needs to achieve the objectives of the solutions of the embodiments of the present invention.
- In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each of the units may exist alone physically, or two or more units are integrated into one unit.
- A person of ordinary skill in the art may understand that all or some of the steps of the method embodiments may be implemented by a program instructing relevant hardware. The program may be stored in a computer readable storage medium. When the program runs, the steps of the method embodiments are performed. The foregoing storage medium includes: any medium that can store program code, such as a ROM, a RAM, a magnetic disk, or an optical disc.
- The foregoing descriptions are merely specific implementation manners of the present invention, but are not intended to limit the protection scope of the present invention. Any variation or replacement readily figured out by a person skilled in the art within the technical scope disclosed in the present invention shall fall within the protection scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (20)
1. A network connection method comprising:
receiving, by a hotspot terminal, user identity information sent by a mobile terminal for accessing a wireless local area network (WLAN) of the hotspot terminal, wherein the user identity information is used to identify a user who uses the mobile terminal;
displaying, by the hotspot terminal, an interface on a touchscreen of the hotspot terminal, wherein the interface comprises the user identity information;
receiving, by the hotspot terminal, a permission confirmation instruction that is entered by an administrator according to the user identity information by operating the touchscreen of the hotspot terminal; and
determining, by the hotspot terminal, Internet access permission of the mobile terminal for accessing the WLAN of the hotspot terminal, according to the received permission confirmation instruction without requiring a password from the mobile terminal.
2. The method according to claim 1 , wherein the user identity information comprises a user name of a user of the mobile terminal.
3. The method according to claim 1 , wherein the user identity information comprises a user nickname of a user of the mobile terminal.
4. The method according to claim 1 , wherein the user identity information comprises a phone number of the mobile terminal.
5. The method according to claim 1 , wherein the user identity information comprises a piece of specific text.
6. The method according to claim 5 , wherein the user identity information further comprises a user nickname of a user of the mobile terminal.
7. The method according to claim 1 , wherein the user identity information comprises permission application information.
8. The method according to claim 1 , after determining the Internet access permission of the mobile terminal, the method further comprises setting, by the hotspot terminal and according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
9. The method according to claim 1 , wherein the method further comprises sending, by the hotspot terminal, reminder information to the mobile terminal, wherein the reminder information is used to inform whether the Internet access request of the mobile terminal is approved.
10. The method according to claim 1 , wherein the hotspot terminal is one of a wireless router, a portable router, a wireless modem, a mobile phone, a personal computer (PC), a tablet computer, or a digital camera.
11. A hotspot terminal comprising:
a non-transitory computer readable medium which contains computer-executable instructions; and
a processor configured to execute the computer-executable instructions to enable the hotspot terminal to perform operations comprising:
receiving user identity information sent by a mobile terminal for accessing a wireless local area network (WLAN) of the hotspot terminal, wherein the user identity information is used to identify a user who uses the mobile terminal;
displaying an interface on a touchscreen of the hotspot terminal, wherein the interface comprises the user identity information;
receiving a permission confirmation instruction that is entered by an administrator according to the user identity information by operating the touchscreen of the hotspot terminal; and
determining Internet access permission of the mobile terminal for accessing the WLAN of the hotspot terminal, according to the received permission confirmation instruction without requiring a password from the mobile terminal.
12. The hotspot terminal according to claim 11 , wherein the user identity information comprises a user name of a user of the mobile terminal.
13. The hotspot terminal according to claim 11 , wherein the user identity information comprises a user nickname of a user of the mobile terminal.
14. The hotspot terminal according to claim 11 , wherein the user identity information comprises a phone number of the mobile terminal.
15. The hotspot terminal according to claim 11 , wherein the user identity information comprises a piece of specific text.
16. The hotspot terminal according to claim 15 , wherein the user identity information further comprises a user nickname of a user of the mobile terminal.
17. The hotspot terminal according to claim 11 , wherein the user identity information comprises permission application information.
18. The hotspot terminal according to claim 11 , wherein after determining the Internet access permission of the mobile terminal, the processor is further configured to execute the computer-executable instructions to enable the hotspot terminal to perform an operation comprising setting, according to a preset Internet access condition, an Internet access limitation of accessing the WLAN by the mobile terminal.
19. The hotspot terminal according to claim 11 , wherein the processor is further configured to execute the computer-executable instructions to enable the hotspot terminal to perform an operation comprising sending reminder information to the mobile terminal, wherein the reminder information is used to inform whether the Internet access request of the mobile terminal is approved.
20. A network system comprising:
a mobile terminal configured to send user identity information to a hotspot terminal, wherein the user identity information is used to identify a user who uses the mobile terminal;
a hotspot terminal configured to:
receive the user identity information sent by the mobile terminal for accessing a wireless local area network (WLAN) of the hotspot terminal;
display an interface on a touchscreen of the hotspot terminal, wherein the interface comprises the user identity information;
receiving a permission confirmation instruction that is entered by an administrator according to the user identity information by operating the touchscreen of the hotspot terminal; and
determining Internet access permission of the mobile terminal for accessing the WLAN of the hotspot terminal, according to the received permission confirmation instruction without requiring a password from the mobile terminal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/711,789 US20220303276A1 (en) | 2014-05-31 | 2022-04-01 | Network connection method, hotspot terminal and management terminal |
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2014/079036 WO2015180192A1 (en) | 2014-05-31 | 2014-05-31 | Network connection method, hotspot terminal, and management terminal |
US14/996,000 US10616232B2 (en) | 2014-05-31 | 2016-01-14 | Network connection method, hotspot terminal and management terminal |
US16/781,851 US11310239B2 (en) | 2014-05-31 | 2020-02-04 | Network connection method, hotspot terminal and management terminal |
US17/711,789 US20220303276A1 (en) | 2014-05-31 | 2022-04-01 | Network connection method, hotspot terminal and management terminal |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/781,851 Continuation US11310239B2 (en) | 2014-05-31 | 2020-02-04 | Network connection method, hotspot terminal and management terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220303276A1 true US20220303276A1 (en) | 2022-09-22 |
Family
ID=52557558
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/996,000 Active 2034-06-17 US10616232B2 (en) | 2014-05-31 | 2016-01-14 | Network connection method, hotspot terminal and management terminal |
US16/781,851 Active 2034-07-22 US11310239B2 (en) | 2014-05-31 | 2020-02-04 | Network connection method, hotspot terminal and management terminal |
US17/711,789 Pending US20220303276A1 (en) | 2014-05-31 | 2022-04-01 | Network connection method, hotspot terminal and management terminal |
Family Applications Before (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/996,000 Active 2034-06-17 US10616232B2 (en) | 2014-05-31 | 2016-01-14 | Network connection method, hotspot terminal and management terminal |
US16/781,851 Active 2034-07-22 US11310239B2 (en) | 2014-05-31 | 2020-02-04 | Network connection method, hotspot terminal and management terminal |
Country Status (6)
Country | Link |
---|---|
US (3) | US10616232B2 (en) |
EP (2) | EP3869766B1 (en) |
JP (1) | JP6842919B2 (en) |
CN (2) | CN104380776B (en) |
ES (2) | ES2934600T3 (en) |
WO (1) | WO2015180192A1 (en) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106797561A (en) * | 2014-11-29 | 2017-05-31 | 华为技术有限公司 | A kind of identity identifying method and wearable device |
US10813155B2 (en) * | 2015-02-06 | 2020-10-20 | Sony Corporation | Wireless communication apparatus and wireless communication method for connection to a wireless network |
CN106162627B (en) * | 2015-04-22 | 2020-09-29 | 北京囡宝科技有限公司 | Method for triggering data communication service application by adjacent router in wireless environment |
CN104980503B (en) * | 2015-06-11 | 2018-11-16 | 福建联迪商用设备有限公司 | The information-pushing method and equipment of a kind of POS terminal as Wi-Fi hotspot |
CN105072666B (en) * | 2015-07-02 | 2019-02-22 | 深圳平安讯科技术有限公司 | WIFI hot spot connects control method, server and WIFI hot spot |
CN106714171A (en) * | 2015-11-17 | 2017-05-24 | 中兴通讯股份有限公司 | Network squatting preventing method and device, terminal and router |
CN105491406B (en) * | 2015-11-18 | 2019-01-22 | 北京智享科技有限公司 | A kind of video sharing device, method, system and portable device |
CN105682095A (en) * | 2015-12-24 | 2016-06-15 | 北京奇虎科技有限公司 | LAN-based wireless hotspot control method and device |
CN105610842B (en) * | 2015-12-30 | 2019-04-02 | Oppo广东移动通信有限公司 | A kind of WIFI hot spot cut-in method and mobile device |
WO2017128276A1 (en) * | 2016-01-29 | 2017-08-03 | 丰唐物联技术(深圳)有限公司 | Network establishment method, control equipment and node |
CN107635229A (en) * | 2016-07-15 | 2018-01-26 | 中兴通讯股份有限公司 | A kind of method and apparatus shared WIFI |
WO2018059045A1 (en) * | 2016-09-27 | 2018-04-05 | 华为技术有限公司 | Wifi connection method and device |
CN106211160B (en) * | 2016-09-27 | 2020-06-02 | 北京小米移动软件有限公司 | Network access method and device |
CN106658499A (en) * | 2016-12-07 | 2017-05-10 | 安徽尚果信息科技有限公司 | Wireless authentication service management mode |
US12016064B2 (en) * | 2016-12-09 | 2024-06-18 | Huawei Technologies Co., Ltd. | Method for establishing hotspot connection and terminal device |
WO2018153028A1 (en) * | 2017-02-27 | 2018-08-30 | 华为技术有限公司 | Method and apparatus for establishing wireless local area network connection and terminal |
US10966258B2 (en) * | 2017-03-08 | 2021-03-30 | Comcast Cable Communications, Llc | Methods and systems for managing network hotspots |
CN107197462B (en) | 2017-06-28 | 2020-04-07 | 阿里巴巴集团控股有限公司 | Wireless network type detection method and device and electronic equipment |
US11277744B2 (en) * | 2017-08-23 | 2022-03-15 | Huawei Technologies Co., Ltd. | Wi-Fi hotspot connection method and terminal |
CN108124275A (en) * | 2017-12-19 | 2018-06-05 | 上海创功通讯技术有限公司 | Network management, device and server |
CN110300432B (en) | 2018-03-22 | 2022-04-26 | 阿里巴巴集团控股有限公司 | Method for distributing network to equipment and network distribution system |
CN109195173A (en) * | 2018-08-28 | 2019-01-11 | 努比亚技术有限公司 | A kind of hotspot connection method, terminal and computer readable storage medium |
CN109819456B (en) * | 2018-12-21 | 2024-03-08 | 东君新能源有限公司 | Solar WiFi terminal, access management method thereof and readable storage medium |
CN109618344B (en) * | 2019-01-25 | 2020-06-23 | 广东省恒博信息有限公司 | Safe connection method and device of wireless monitoring equipment |
WO2020206584A1 (en) * | 2019-04-08 | 2020-10-15 | Arris Enterprises Llc | Administrating pending network access requests via a telephony device |
CN110662209B (en) * | 2019-10-11 | 2023-06-06 | 北京奇艺世纪科技有限公司 | Screen-throwing equipment connection method and device in isolation network |
CN112822679B (en) * | 2019-10-31 | 2023-09-01 | 深圳市万普拉斯科技有限公司 | WLAN hotspot connection method and device and readable storage medium |
CN110896537B (en) * | 2019-12-19 | 2023-07-28 | 武汉虹信科技发展有限责任公司 | Communication management and control method and device |
CN112804684A (en) * | 2020-06-01 | 2021-05-14 | 苏州才豪电子科技有限公司 | Network access system based on wireless communication network |
CN112333073B (en) * | 2020-09-04 | 2023-07-25 | 深圳Tcl新技术有限公司 | Network acceleration method, system, device and readable storage medium of gateway device |
CN112637338B (en) * | 2020-12-22 | 2023-05-26 | 广州技象科技有限公司 | Method, device, equipment and storage medium for managing node service of Internet of things |
CN113194012B (en) * | 2021-04-27 | 2022-05-31 | 上海德衡数据科技有限公司 | Multi-agent management method, device, equipment and storage medium based on Internet of things |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020069284A1 (en) * | 2000-05-17 | 2002-06-06 | Slemmer Michael Weston | System and method of controlling network connectivity |
US20030224799A1 (en) * | 2002-03-26 | 2003-12-04 | Squibbs Robert Francis | Facilitating data transfers with mobile entities via wireless communication hotspots |
US20130102260A1 (en) * | 2011-10-25 | 2013-04-25 | Samsung Electronics Co. Ltd. | Apparatus and method for discovering device in portable terminal |
US20130103833A1 (en) * | 2010-06-30 | 2013-04-25 | British Telecommunications Public Limited Company | Method and apparatus for a mobile node to connect different access routers while maintaining a consistent network address |
US20130108114A1 (en) * | 2011-10-31 | 2013-05-02 | Verint Systems Ltd. | System and method for interception of ip traffic based on image processing |
US20140071058A1 (en) * | 2012-09-10 | 2014-03-13 | International Business Machines Corporation | Positioning Clickable Hotspots On A Touchscreen Display |
US20150055505A1 (en) * | 2013-08-20 | 2015-02-26 | D-Link Corporation | Selection method for rapidly obtaining hotspot information |
Family Cites Families (60)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002077271A (en) * | 2000-08-25 | 2002-03-15 | Sharp Corp | Network apparatus |
US7617317B2 (en) * | 2001-12-03 | 2009-11-10 | Sprint Spectrum L.P. | Method and system for allowing multiple service providers to serve users via a common access network |
WO2005004385A1 (en) | 2003-06-30 | 2005-01-13 | Fujitsu Limited | Radio communication authentication program and radio communication program |
JP4355611B2 (en) | 2003-06-30 | 2009-11-04 | パナソニック株式会社 | COMMUNICATION SYSTEM, COMMUNICATION METHOD, BASE STATION DEVICE, CONTROLLER, DEVICE, AND CONTROL PROGRAM |
CN1830190A (en) | 2003-07-29 | 2006-09-06 | 汤姆森特许公司 | Controlling access to a network using redirection |
US20050059150A1 (en) * | 2003-09-17 | 2005-03-17 | Becton, Dickinson And Company | Environments that maintain function of primary liver cells |
US20050198319A1 (en) * | 2004-01-15 | 2005-09-08 | Yahoo! Inc. | Techniques for parental control of internet access including a guest mode |
US7860978B2 (en) * | 2004-01-22 | 2010-12-28 | Toshiba America Research, Inc. | Establishing a secure tunnel to access router |
JP4531549B2 (en) * | 2004-01-29 | 2010-08-25 | 株式会社エヌ・ティ・ティ・ドコモ | Communication system, communication terminal, and communication program |
KR20060063348A (en) * | 2004-12-07 | 2006-06-12 | 한국전자통신연구원 | Method for controlling internet access using authentication assertion |
CN1842000A (en) | 2005-03-29 | 2006-10-04 | 华为技术有限公司 | Method for realizing access authentication of WLAN |
JP4545647B2 (en) | 2005-06-17 | 2010-09-15 | 富士通株式会社 | Attack detection / protection system |
US8116287B2 (en) * | 2005-07-29 | 2012-02-14 | Microsoft Corporation | Transmitting a communication from a wireless access point indicating hidden networks |
JP4789569B2 (en) | 2005-10-05 | 2011-10-12 | キヤノン株式会社 | Wireless communication device |
JP5052802B2 (en) | 2006-03-23 | 2012-10-17 | 大阪瓦斯株式会社 | Operation terminal for equipment |
JP2008017302A (en) | 2006-07-07 | 2008-01-24 | Ntt Docomo Inc | Short-range radio communication terminal and transmission power control method |
US7664527B2 (en) * | 2006-08-04 | 2010-02-16 | At&T Mobility Ii Llc | Network identity and timezone (NITZ) functionality for non-3GPP devices |
JP4953736B2 (en) | 2006-09-06 | 2012-06-13 | パナソニック株式会社 | Wireless communication system |
JP2008263445A (en) * | 2007-04-12 | 2008-10-30 | Docomo Technology Inc | Connection setting system, authentication apparatus, wireless terminal and connection setting method |
JP4915301B2 (en) | 2007-07-06 | 2012-04-11 | 株式会社ナカヨ通信機 | Wireless LAN system, wireless LAN terminal, and access point |
JP5112806B2 (en) | 2007-10-15 | 2013-01-09 | ソフィア総合研究所株式会社 | Wireless LAN communication method and communication system |
CN101897157A (en) * | 2007-11-20 | 2010-11-24 | 松下电器产业株式会社 | Address allocation method, address allocation system, mobile node, and proxy node |
JP5201674B2 (en) | 2008-10-29 | 2013-06-05 | シャープ株式会社 | Transmission priority setting device, transmission priority setting method, and transmission priority setting program |
US20110030037A1 (en) * | 2009-07-07 | 2011-02-03 | Vadim Olshansky | Zone migration in network access |
JP4738520B2 (en) | 2009-09-18 | 2011-08-03 | 株式会社東芝 | Electronic device and communication control method |
CN101770333B (en) | 2009-12-24 | 2012-05-23 | 华为终端有限公司 | Method for realizing routing configuration and routing equipment |
US20110163606A1 (en) | 2010-01-05 | 2011-07-07 | Vivek Kumar | Method and Apparatus for Monitoring and Controlling a Power System |
US8527549B2 (en) | 2010-02-22 | 2013-09-03 | Sookasa Inc. | Cloud based operating and virtual file system |
JP5418349B2 (en) | 2010-03-24 | 2014-02-19 | 日本電気株式会社 | Wireless communication system, wireless communication method, program, and recording medium |
CN101895962A (en) | 2010-08-05 | 2010-11-24 | 华为终端有限公司 | Wi-Fi (wireless fidelity) access method, access point and Wi-Fi access system |
US8989159B2 (en) * | 2010-10-01 | 2015-03-24 | Smith Micro Software, Inc. | System and method managing hotspot network access of a plurality of devices |
KR20120071221A (en) * | 2010-12-22 | 2012-07-02 | 한국전자통신연구원 | Apparatus and method for wireless network connection |
JP5678261B2 (en) * | 2011-03-03 | 2015-02-25 | サイレックス・テクノロジー株式会社 | Wireless LAN device setting system |
CN102204307B (en) | 2011-06-15 | 2014-04-16 | 华为技术有限公司 | WLAN authentication method based on MAC address and device thereof |
WO2012174427A2 (en) | 2011-06-16 | 2012-12-20 | OneID Inc. | Method and system for determining authentication levels in transactions |
US8705408B2 (en) * | 2011-09-09 | 2014-04-22 | Cisco Technology Inc. | Identifying a wireless network device across factory resets |
US10165007B2 (en) | 2011-09-15 | 2018-12-25 | Microsoft Technology Licensing, Llc | Securing data usage in computing devices |
EP2575379A1 (en) * | 2011-09-29 | 2013-04-03 | Alcatel Lucent | Apparatuses and computer program products for discovering and accessing local services via WiFi hotspots |
US8600344B2 (en) * | 2012-02-15 | 2013-12-03 | Bright House Networks, Llc | Integrating a mobile hotspot into a larger network environment |
US8302152B1 (en) | 2012-02-17 | 2012-10-30 | Google Inc. | Location-based security system for portable electronic device |
CN102611597A (en) | 2012-04-10 | 2012-07-25 | 中山爱科数字家庭产业孵化基地有限公司 | Method for accessing internet through broadband in free of inputting account and password in different family environments |
US9247489B2 (en) * | 2012-04-13 | 2016-01-26 | Futurewei Technologies, Inc. | System and method for ANDSF enhancement with ANQP server capability |
US8862882B2 (en) * | 2012-06-29 | 2014-10-14 | Intel Corporation | Systems and methods for authenticating devices by adding secure features to Wi-Fi tags |
CN102791016B (en) | 2012-07-04 | 2014-12-10 | 大唐移动通信设备有限公司 | Access processing method and device |
US9979710B2 (en) * | 2012-07-26 | 2018-05-22 | Stmicroelectronics, Inc. | Single SSID and dual-SSID enhancements |
CN103181208B (en) | 2012-08-01 | 2016-01-13 | 华为终端有限公司 | A kind of method and system of control terminal access of radio network |
TWI488537B (en) * | 2012-08-10 | 2015-06-11 | Vivotek Inc | A setting method and the device of the connecting to the access point |
WO2014034116A1 (en) * | 2012-08-30 | 2014-03-06 | パナソニック株式会社 | Information management method, information management device, program, and program provision method |
US20140068098A1 (en) | 2012-09-04 | 2014-03-06 | Qualcomm Incorporated | Reducing network latency resulting from non-access stratum (nas) authentication for high performance content applications |
US20140082610A1 (en) * | 2012-09-14 | 2014-03-20 | DewMobile Inc. | Mesh network and mesh network node application |
CN102869014A (en) * | 2012-09-18 | 2013-01-09 | 东莞宇龙通信科技有限公司 | Terminal and data communication method |
CN102883320B (en) * | 2012-09-18 | 2017-03-15 | 东莞宇龙通信科技有限公司 | WiFi method for authenticating and its system |
GB2507960A (en) * | 2012-11-14 | 2014-05-21 | Ibm | Wireless access point login dependent upon supply of stored (key/personal) information and/or viewing a message (advertisement) |
US9167512B2 (en) * | 2012-12-13 | 2015-10-20 | Blackberry Limited | Methods and apparatus for use in controlling connections to wireless networks |
US9935956B1 (en) * | 2012-12-17 | 2018-04-03 | Western Digital Technology, Inc. | Devices and methods configured to control network access time |
TWI492656B (en) * | 2012-12-25 | 2015-07-11 | 廣達電腦股份有限公司 | Wireless access points |
CN103298072A (en) * | 2013-07-02 | 2013-09-11 | 张洁昕 | Method and system for automatically connecting to WiFi (wireless fidelity) access points and mobile communication terminal |
WO2015035620A1 (en) | 2013-09-13 | 2015-03-19 | 华为终端有限公司 | Processing method of wireless network equipment, wireless network equipment and processor thereof |
CN103476092B (en) * | 2013-09-13 | 2017-06-06 | 惠州Tcl移动通信有限公司 | A kind of WIFI hot spot cut-in method and system based on mobile terminal |
CN103491648B (en) * | 2013-09-18 | 2018-04-10 | 宇龙计算机通信科技(深圳)有限公司 | Communication means and system based on WIFI |
-
2014
- 2014-05-31 JP JP2016535313A patent/JP6842919B2/en active Active
- 2014-05-31 WO PCT/CN2014/079036 patent/WO2015180192A1/en active Application Filing
- 2014-05-31 EP EP21152449.1A patent/EP3869766B1/en active Active
- 2014-05-31 ES ES21152449T patent/ES2934600T3/en active Active
- 2014-05-31 ES ES14892998T patent/ES2881103T3/en active Active
- 2014-05-31 EP EP14892998.7A patent/EP3007477B1/en active Active
- 2014-05-31 CN CN201480001395.5A patent/CN104380776B/en active Active
- 2014-05-31 CN CN201910197491.6A patent/CN109996234B/en active Active
-
2016
- 2016-01-14 US US14/996,000 patent/US10616232B2/en active Active
-
2020
- 2020-02-04 US US16/781,851 patent/US11310239B2/en active Active
-
2022
- 2022-04-01 US US17/711,789 patent/US20220303276A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020069284A1 (en) * | 2000-05-17 | 2002-06-06 | Slemmer Michael Weston | System and method of controlling network connectivity |
US20030224799A1 (en) * | 2002-03-26 | 2003-12-04 | Squibbs Robert Francis | Facilitating data transfers with mobile entities via wireless communication hotspots |
US20130103833A1 (en) * | 2010-06-30 | 2013-04-25 | British Telecommunications Public Limited Company | Method and apparatus for a mobile node to connect different access routers while maintaining a consistent network address |
US20130102260A1 (en) * | 2011-10-25 | 2013-04-25 | Samsung Electronics Co. Ltd. | Apparatus and method for discovering device in portable terminal |
US20130108114A1 (en) * | 2011-10-31 | 2013-05-02 | Verint Systems Ltd. | System and method for interception of ip traffic based on image processing |
US20140071058A1 (en) * | 2012-09-10 | 2014-03-13 | International Business Machines Corporation | Positioning Clickable Hotspots On A Touchscreen Display |
US20150055505A1 (en) * | 2013-08-20 | 2015-02-26 | D-Link Corporation | Selection method for rapidly obtaining hotspot information |
Also Published As
Publication number | Publication date |
---|---|
ES2934600T3 (en) | 2023-02-23 |
WO2015180192A1 (en) | 2015-12-03 |
ES2881103T3 (en) | 2021-11-26 |
JP6842919B2 (en) | 2021-03-17 |
US20200177599A1 (en) | 2020-06-04 |
US11310239B2 (en) | 2022-04-19 |
EP3007477B1 (en) | 2021-04-28 |
EP3869766B1 (en) | 2022-09-28 |
CN109996234A (en) | 2019-07-09 |
US20160127381A1 (en) | 2016-05-05 |
CN109996234B (en) | 2022-03-25 |
US10616232B2 (en) | 2020-04-07 |
JP2016528844A (en) | 2016-09-15 |
EP3007477A4 (en) | 2016-09-14 |
CN104380776B (en) | 2019-03-26 |
CN104380776A (en) | 2015-02-25 |
EP3007477A1 (en) | 2016-04-13 |
EP3869766A1 (en) | 2021-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20220303276A1 (en) | Network connection method, hotspot terminal and management terminal | |
US11729594B2 (en) | Network access method, device, and system | |
US10601811B2 (en) | Method for connecting to WLAN hotspot device, WLAN hotspot device, and user equipment | |
US9143512B2 (en) | Communication devices, computer readable storage devices, and methods for secure multi-path communication | |
EP2838309B1 (en) | Method, device and system for establishing data connection | |
AU2017428472B2 (en) | Wi-Fi hotspot connection method and terminal | |
US11323492B2 (en) | Managing data communications based on phone calls between mobile computing devices | |
US9967099B2 (en) | Method and apparatus for providing information | |
CN107567017B (en) | Wireless connection system, device and method | |
WO2014044057A1 (en) | Methods, terminals, and systems for facilitating data sharing | |
US20140086179A1 (en) | Methods, terminals, and systems for facilitating data sharing | |
EP3182787A1 (en) | Communication method and device | |
US20180359355A1 (en) | System message notification method and user equipment | |
EP3979071B1 (en) | Method, user equipment, and application server for downloading application | |
WO2022127808A1 (en) | Trusted relay communication method and apparatus, terminal, and network side device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: HUAWEI TECHNOLOGIES CO., LTD., CHINA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ZHONG, ZHEN;REEL/FRAME:059476/0969 Effective date: 20160112 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: FINAL REJECTION MAILED |