WO2014117493A1 - 接入点的接入方法及相关设备 - Google Patents

接入点的接入方法及相关设备 Download PDF

Info

Publication number
WO2014117493A1
WO2014117493A1 PCT/CN2013/080964 CN2013080964W WO2014117493A1 WO 2014117493 A1 WO2014117493 A1 WO 2014117493A1 CN 2013080964 W CN2013080964 W CN 2013080964W WO 2014117493 A1 WO2014117493 A1 WO 2014117493A1
Authority
WO
WIPO (PCT)
Prior art keywords
access point
code
user terminal
information
access
Prior art date
Application number
PCT/CN2013/080964
Other languages
English (en)
French (fr)
Inventor
许天亮
Original Assignee
华为终端有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为终端有限公司 filed Critical 华为终端有限公司
Priority to EP13794786.7A priority Critical patent/EP2779723B1/en
Priority to JP2014559087A priority patent/JP5978517B2/ja
Priority to US14/143,932 priority patent/US20140214660A1/en
Publication of WO2014117493A1 publication Critical patent/WO2014117493A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/77Graphical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present application relates to the field of communications technologies, and in particular, to an access method and related device of an access point. Background technique
  • WiFi Wireless Point Fidelity
  • APs access points
  • the AP performs an open broadcast on the Service Set Identifier (SSID) provided by the operator.
  • SSID Service Set Identifier
  • the user terminal finds the SSID, if the SSID is confirmed to be accessed, the AP is associated with the AP of the SSID, and the input is correct.
  • the password is selected, the access to the AP is ensured, and the user terminal accesses the AP, and the related network application service can be performed.
  • the user terminal needs to connect to a peripheral input password such as a keyboard to associate with the AP.
  • a peripheral input password such as a keyboard
  • the access password cannot be input, and thus the connection is not On the AP.
  • the access password is long or the SSID number is long, the access password or the SSID input may be incorrect, which increases the difficulty of the identification operation and reduces the efficiency of accessing the AP.
  • the administrator needs to provide the access password.
  • the user terminal can access the AP by entering the access password. If the user's identity authentication is vulnerable, and the password is usually in the form of letters or numbers, it is easy to cause the password to be leaked. The user's attack caused the system to crash.
  • the user terminal can also access the WiFi AP in the manner specified by the Wi-Fi Protected Setup (WPS) standard, that is, the WPS button of the AP that needs to click the W- for a long time.
  • WPS Wi-Fi Protected Setup
  • the WPS button of the W-AP When the WPS button of the W-AP is clicked, the user terminal can access the AP of the WiFi to perform related network application services.
  • the connection can be established. The operation is cumbersome and complicated, and the utility is not practical.
  • the connection is successful only supports the application of the service, and the service is not supported. The next connection after disconnection makes the connection operation more cumbersome.
  • an access method of an access point includes: a user terminal acquiring a two-dimensional code; the user terminal parsing the two-dimensional code to obtain information about the two-dimensional code, where The information of the two-dimensional code includes an access password for accessing the access point and an identifier of the access point; the user terminal according to the access password of the access point and the access The identity of the point is accessed to the access point.
  • the acquiring, by the user terminal, the two-dimensional code includes: acquiring, by the user terminal, the two-dimensional code by using a scanning manner.
  • the user terminal acquires a two-dimensional code by using a scan mode, where: the user terminal sends a scan request to the access point, And causing the access point to generate a two-dimensional code, and displaying, by the access point, the two-dimensional code to a display screen; the user terminal scanning the display screen to obtain the two-dimensional code.
  • the acquiring, by the user terminal, the two-dimensional code includes: acquiring, by the user terminal, a picture carrying the two-dimensional code; A picture of the code to obtain the two-dimensional code.
  • the user terminal acquiring a picture that carries the two-dimensional code includes: The user terminal sends a first request to the access point, so that the access point generates a picture carrying a two-dimensional code, where the first request is used to request to acquire a picture carrying a two-dimensional code; Receiving first information sent by the access point, where the first information includes a picture carrying the two-dimensional code.
  • the method further includes: the user terminal receiving the payment request information sent by the access point, so that the user performs payment according to the payment request information, where the payment request information includes a tariff standard
  • the first information further includes duration information or traffic information that is accessed by the access point.
  • the information of the two-dimensional code further includes accessing The duration information or traffic information of the access point.
  • an embodiment of the present application provides an access method for an access point, including: receiving a scan request sent by a user terminal; generating a two-dimensional code; and displaying the two-dimensional code on a display screen to enable the The user terminal scans the display screen to obtain the two-dimensional code, and the user terminal parses the two-dimensional code to obtain information of the two-dimensional code, where the information of the two-dimensional code includes access The access password of the access point and the identifier of the access point are accessed by the user terminal according to the access password of the access point and the identifier of the access point.
  • the generating the two-dimensional code includes: Generating a two-dimensional code according to the identifier of the access point, an access password for accessing the access point, and an encryption manner.
  • an embodiment of the present application provides an access method for an access point, including: sending a picture carrying a two-dimensional code to a user terminal, so that the user terminal acquires a picture carrying the two-dimensional code And parsing the picture carrying the two-dimensional code by the user terminal, acquiring the two-dimensional code, and parsing the two-dimensional code by the user terminal to obtain information about the two-dimensional code,
  • the information of the two-dimensional code includes an access password for accessing the access point and an identifier of the access point, where the user terminal accesses the access password and the access according to the access point.
  • the sending, by the user, the picture carrying the two-dimensional code to the user terminal includes: receiving a first request sent by the user terminal, where the first request is used to request to acquire a picture having a two-dimensional code; generating a picture carrying the two-dimensional code; transmitting the first information to the user terminal, so that the user terminal acquires the first information, where the first information includes A picture of the two-dimensional code.
  • the method further includes: sending the payment request information to the user terminal, so that the user performs payment according to the payment request information, where the payment request information includes a tariff standard and a tariff method, and the first information further includes Accessing the duration information or traffic information of the access point.
  • the generating a picture that carries the two-dimensional code includes: generating the two-dimensional code; The two-dimensional code is encapsulated in the form of a picture.
  • the generating the two-dimensional code includes: according to the identifier of the access point, the accessing the connection The entry password and the encryption method generate the two-dimensional code.
  • the embodiment of the present application provides a user terminal, including: an acquiring unit, configured to acquire a two-dimensional code, and a processing unit, configured to parse the two-dimensional code, and obtain information about the two-dimensional code, where the second The information of the dimension code includes an access password for accessing an access point and an identifier of the access point, and the processing unit is further configured to: according to the access password of the access point and the access The identity of the ingress point accesses the access point.
  • the acquiring unit is specifically configured to obtain a two-dimensional code by using a scanning manner.
  • the acquiring unit is specifically configured to send a scan request to an access point, so that the access point generates two And dimension code, and the two-dimensional code is displayed by the access point to the display screen, and is used for scanning the display screen to obtain the two-dimensional code.
  • the acquiring unit is specifically configured to obtain a picture that carries the two-dimensional code, and is further configured to parse the picture that carries the two-dimensional code, and obtain the Describe the QR code.
  • the acquiring unit is further configured to send a first request to the access point, so that the access point generates Carrying a picture with a two-dimensional code, the first request is used to request to acquire a picture carrying a two-dimensional code;
  • the acquiring unit is further configured to receive the first information sent by the access point, where the first information includes a picture that carries the two-dimensional code.
  • the acquiring unit is further configured to receive the payment request information sent by the access point, so that the user pays according to the Receiving, by the request information, the first information sent by the access point, where the payment request information includes a tariff standard and a tariff method, where the first information further includes duration information or traffic for accessing the access point. information.
  • the acquiring unit is further configured to scan the display screen by using a camera device.
  • the information of the two-dimensional code further includes duration information or traffic for accessing the access point. information.
  • an embodiment of the present application provides an access point, including: a receiving unit, configured to receive a scan request sent by a user terminal, and a processing unit, configured to generate a two-dimensional code according to the scan request received by the receiving unit a display unit, configured to display the two-dimensional code onto the display screen, so that the user terminal scans the display screen to obtain the two-dimensional code, and the two-dimensional code is parsed by the user terminal a code, the information of the two-dimensional code, the information of the two-dimensional code includes an access password for accessing the access point, and an identifier of the access point, where the user terminal is used according to the access point The access password of the access point and the identifier of the access point are accessed by the access point.
  • the processing unit is configured to generate a two-dimensional code according to the identifier of the access point, an access password for accessing the access point, and an encryption manner.
  • an embodiment of the present application provides an access point, including: a sending unit, configured to send a picture carrying the two-dimensional code to the user terminal, so that the user terminal acquires a picture carrying the two-dimensional code; and the user terminal parses the carrying the two-dimensional code a picture of the two-dimensional code, and the information of the two-dimensional code is obtained by the user terminal, and the information of the two-dimensional code includes access to the access point.
  • the sending unit is specifically configured to receive a first request sent by a user terminal, where the first request is used to request to acquire a picture carrying a two-dimensional code, and And generating, by the first request, a picture carrying the two-dimensional code, and sending the first information to the user terminal, so that the user terminal acquires the first information, where the first information includes carrying There is a picture of the two-dimensional code.
  • the sending unit is further configured to send payment request information to the user terminal, so that the user according to the payment request information
  • the payment request information includes a tariff standard and a tariff method
  • the first information further includes duration information or traffic information for accessing the access point.
  • the sending unit is further configured to generate the two-dimensional code, and is configured to encapsulate the two-dimensional code in a picture form .
  • the sending unit is further configured to: according to the identifier of the access point, the accessing the access point
  • the two-dimensional code is generated by an access password and an encryption method.
  • the embodiment of the present application obtains the two-dimensional code by the user terminal, and parses the two-dimensional code to obtain the information of the two-dimensional code, where the information of the two-dimensional code includes an access password and a location for accessing the access point.
  • FIG. 1 is a flowchart of an access method of an access point according to an embodiment of the present application
  • FIG. 2 is a flowchart of another method for accessing an access point according to an embodiment of the present disclosure
  • FIG. 3 is a flowchart of another method for accessing an access point according to an embodiment of the present application
  • FIG. 5 is a structural diagram of another user terminal according to an embodiment of the present application.
  • FIG. 6 is a structural diagram of an access point provided by an embodiment of the present application.
  • FIG. 7 is a structural diagram of another access point according to an embodiment of the present application.
  • FIG. 8 is a structural diagram of another access point according to an embodiment of the present application. detailed description
  • FIG. 1 is a flow chart of an access method of an access point according to an embodiment of the present application.
  • the access method of the access point provided in this embodiment is expressed by the user terminal as the execution subject, and the user terminal has the WiFi function, and may be a user terminal such as a mobile phone or a computer, or may have a WIFI function but no keyboard device is configured. terminal.
  • the access method of the access point provided in this embodiment includes the following steps:
  • the user terminal acquires a two-dimensional code.
  • the user terminal can acquire the two-dimensional code by scanning. Specifically, you can follow these steps:
  • the user terminal sends a scan request to the access point, so that the access point generates a two-dimensional code, and the access point displays the two-dimensional code to the display screen;
  • the user terminal scans the display screen to obtain a two-dimensional code.
  • the user terminal can scan the display screen through the camera device to obtain the two-dimensional code.
  • the two-dimensional code can be printed and output, and the user is provided with a paper piece displaying the two-dimensional code, so that the user scans the paper piece through the user terminal to obtain the second Dimension code.
  • the manner in which the user terminal obtains the two-dimensional code specifically includes the following steps:
  • the user terminal acquires a picture carrying a two-dimensional code
  • the user terminal parses the picture carrying the two-dimensional code to obtain the two-dimensional code.
  • the manner in which the user terminal acquires the picture carrying the two-dimensional code includes the following steps: a. The user terminal sends the first request to the access point, so that the access point generates a picture carrying the two-dimensional code, A request is used to request to acquire a picture carrying a two-dimensional code; b. The user terminal receives the first information sent by the access point, and the first information includes a picture carrying the two-dimensional code.
  • the method further includes: receiving, by the user terminal, the payment request information sent by the access point, so that the user The payment request information is paid, and the payment request information includes a tariff standard and a tariff method, and the first information also includes duration information or traffic information of the access point.
  • the user terminal parses the two-dimensional code to obtain information of the two-dimensional code, where the information of the two-dimensional code includes an access password of the access point and an identifier of the access point.
  • the information of the two-dimensional code further includes duration information or traffic information of the access point.
  • the access point When the accumulated duration of the user accessing the access point exceeds the duration of the information restriction or the network traffic used after the user accesses the access point exceeds the traffic restricted by the traffic information, the access point is automatically logged out or cut off by the access point.
  • a network with a user terminal When the accumulated duration of the user accessing the access point exceeds the duration of the information restriction or the network traffic used after the user accesses the access point exceeds the traffic restricted by the traffic information, the access point is automatically logged out or cut off by the access point.
  • the user terminal accesses the access point according to the access password of the access point and the identifier of the access point.
  • the user terminal obtains the two-dimensional code and parses the two-dimensional code to obtain the information of the two-dimensional code, and the user terminal according to the information of the two-dimensional code, that is, according to the access password and the access point of the access point.
  • the identity of the access point No need to use the keyboard to enter a password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal.
  • the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved.
  • the encryption method of the two-dimensional code prevents the phenomenon of artificially stealing a password. Further, the access point can generate a two-dimensional code, which is not easy to leak the password, and prevents the system from being attacked by an illegal user and causing the system to crash.
  • FIG. 2 is a flow chart of another access method of an access point according to an embodiment of the present application.
  • the access method of the access point provided in this embodiment is represented by the access point as an execution entity.
  • the access method of the access point provided in this embodiment includes:
  • S210 Receive a scan request sent by a user terminal.
  • S230 Display a two-dimensional code on the display screen, so that the user terminal scans the display screen to obtain a two-dimensional code, and the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code, and the information of the two-dimensional code includes The access password of the access point and the identifier of the access point are accessed by the user terminal according to the access password of the access point and the identifier of the access point.
  • the two-dimensional code can be printed and output, and the user is provided with a paper piece displaying the two-dimensional code, so that the user scans the paper piece through the user terminal to obtain the second Dimension code.
  • the generating, by the access point, the two-dimensional code includes the following steps: generating a two-dimensional code according to the identifier of the access point, the access password of the access point, and the encryption mode.
  • a two-dimensional code is generated by receiving a scan request sent by the user terminal, so that the two-dimensional code is displayed on the display screen, so that the user terminal scans the display screen to obtain a two-dimensional code, and the user terminal parses the two-dimensional code to obtain
  • the information of the two-dimensional code, the information of the two-dimensional code includes the access password of the access point and the identifier of the access point, and the user terminal accesses according to the access password of the access point and the identifier of the access point. Access Point.
  • the keyboard No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal.
  • the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved.
  • the encryption method of the two-dimensional code prevents the phenomenon of artificially stealing a password. And the two-dimensional code is generated by the access point, and it is not easy to leak the password, thereby preventing the system from being attacked by an illegal user and causing the system to crash.
  • FIG. 3 is a flow chart of another access method of an access point according to an embodiment of the present application.
  • the access method of the access point provided in this embodiment is described by using an access point as an execution subject.
  • the access method of the access point provided in this embodiment includes:
  • sending a picture carrying the two-dimensional code to the user terminal specifically includes the following steps:
  • S310 Receive a first request sent by the user terminal, where the first request is used to request to acquire a picture carrying the two-dimensional code.
  • S320. Generate a picture carrying a two-dimensional code.
  • the method further includes: sending the payment request information to the user terminal, so that the user according to the payment request The information is paid, and the payment request information includes a tariff standard and a tariff method.
  • the first information also includes duration information or traffic information of the access point.
  • generating the picture carrying the two-dimensional code specifically includes the following steps: generating a two-dimensional code; and encapsulating the two-dimensional code in a picture form.
  • generating the two-dimensional code specifically includes the following steps: generating a two-dimensional code according to an identifier of the access point, an access password of the access point, and an encryption manner.
  • the user terminal is configured to obtain a picture carrying the two-dimensional code by sending the picture carrying the two-dimensional code, and the picture of the two-dimensional code is obtained by the user terminal, and the two-dimensional code is obtained by the user.
  • the terminal parses the two-dimensional code to obtain the information of the two-dimensional code.
  • the information of the two-dimensional code includes the access password of the access point and the identifier of the access point, and the user terminal according to the access password of the access point and The identity of the access point is connected to the access point. No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal.
  • FIG. 4 is a structural diagram of a user terminal according to an embodiment of the present application.
  • the user terminal provided in this embodiment includes: an obtaining unit 41 and a processing unit 42.
  • the obtaining unit 41 is configured to acquire a two-dimensional code.
  • the processing unit 42 is configured to parse the two-dimensional code to obtain information of the two-dimensional code, where the information of the two-dimensional code includes an access password for accessing an access point and an identifier of the access point.
  • the processing unit 42 is further configured to access the access point according to an access password of the access point and an identifier of the access point.
  • the acquiring unit is specifically configured to obtain a two-dimensional code by scanning.
  • the acquiring unit is specifically configured to send a scan request to an access point, so that the access point generates a two-dimensional code, and the access point displays the two-dimensional code to the display screen; Scan the display to get the QR code.
  • the acquiring unit is specifically configured to obtain a picture carrying the two-dimensional code, and is also used to parse the picture carrying the two-dimensional code to obtain a two-dimensional code.
  • the acquiring unit is further configured to send the first request to the access point, so that the access point generates a picture carrying the two-dimensional code, where the first request is used to request to acquire the two-dimensional code.
  • the acquiring unit is further configured to receive the first information sent by the access point, where the first information includes a picture carrying the two-dimensional code.
  • the acquiring unit is further configured to receive the payment request information sent by the access point, so that the user receives the first information sent by the access point after the payment is performed according to the payment request information, where the payment request information includes The tariff standard and the tariff method, the first information also includes the duration information or the traffic information of the access point.
  • the acquisition unit is further configured to scan the display screen by the camera device.
  • the information of the two-dimensional code further includes duration information or traffic information of the access point.
  • the two-dimensional code is obtained by the acquiring unit 41, and the two-dimensional code is parsed by the processing unit 42 to obtain information of the two-dimensional code, where the information of the two-dimensional code includes an access password and an access point for accessing an access point. Logo.
  • the access point is further accessed by the processing unit 42 according to the access password of the access point and the identifier of the access point. No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal. Moreover, the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved.
  • FIG. 5 is a structural diagram of another user terminal according to an embodiment of the present application.
  • the user terminal provided in this embodiment includes: an input device 51, an output device 52, a memory 53, and a processor 54, wherein a set of program codes is stored in the memory 53, and the processor 54 is used to call the memory.
  • the stored program code is configured to: obtain a two-dimensional code; parse the two-dimensional code to obtain information of the two-dimensional code, and the information of the two-dimensional code includes an access password of the access point and an identifier of the access point; Accessing the access point according to the access password of the access point and the identifier of the access point.
  • the processor of the user terminal performs a related operation, acquires a two-dimensional code, and parses the two-dimensional code to obtain information of the two-dimensional code, where the information of the two-dimensional code includes an access password and access of the access point.
  • the identifier of the point the user terminal accesses the access point according to the access password of the access point and the identifier of the access point.
  • the processor performs the operation of acquiring the two-dimensional code, and the two-dimensional code may be obtained by scanning.
  • the processor obtains the two-dimensional code by scanning, which may be obtained by: sending a scan request to the access point, so that the access point generates a two-dimensional code, and is displayed by the access point.
  • the QR code is displayed on the display; the display is scanned to obtain the QR code.
  • the processor performing the operation of acquiring the two-dimensional code may perform the following operations: acquiring a picture carrying the two-dimensional code; and parsing the picture carrying the two-dimensional code to obtain the two-dimensional code.
  • the processor performing the operation of acquiring the picture carrying the two-dimensional code may perform the following operations: sending the first request to the access point, so that the access point generates the picture carrying the two-dimensional code.
  • the first request is used to request to obtain a picture carrying the two-dimensional code; the first information sent by the access point is received, and the first information includes a picture carrying the two-dimensional code.
  • the processor is further configured to perform the following Operation: receiving payment request information sent by the access point, so that the user pays according to the payment request information, where the payment request information includes a tariff standard and a tariff method, and the first information also includes the duration information or the flow information of the access point.
  • the processor performing the operation of scanning the display screen may specifically perform the following operations: scanning the display screen by the camera device.
  • the information of the two-dimensional code further includes duration information or traffic information of the access point.
  • FIG. 6 is a structural diagram of an access point according to an embodiment of the present application. As shown in FIG. 6, the access point provided in this embodiment includes: a receiving unit 61, a processing unit 62, and a display unit.
  • a receiving unit 61 configured to receive a scan request sent by the user terminal
  • a processing unit 62 configured to generate a two-dimensional code according to the scan request received by the receiving unit 61
  • a display unit 63 configured to display the two-dimensional code on the display screen
  • the user terminal scans the display screen to obtain the two-dimensional code
  • the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code, and whether the information of the two-dimensional code includes the access password and access of the access point.
  • the identifier of the point is accessed by the user terminal according to the access password of the access point and the identifier of the access point.
  • the processing unit is specifically configured to generate a two-dimensional code according to an identifier of the access point, an access password of the access point, and an encryption manner.
  • the receiving unit 61 receives the scan request sent by the user terminal, and causes the processing unit 62 to generate a two-dimensional code according to the scan request received by the receiving unit 61, so that the display unit 63 displays the two-dimensional code on the display screen, so that The user terminal scans the display screen to obtain the two-dimensional code, and the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code, and the information of the two-dimensional code includes the access password of the access point and the access point.
  • the identifier is accessed by the user terminal according to the access password of the access point and the identifier of the access point. No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal. Moreover, the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved. Further, the encryption method of the two-dimensional code prevents the phenomenon of artificially stealing a password. Further, the access point can generate a two-dimensional code, which is not easy to leak the password, and prevents the system from being attacked by an illegal user to make the system paralyzed. Referring to FIG. 7, FIG.
  • the access point provided in this embodiment includes: an input device 71, an output device 72, and a memory 73. And a processor 74, wherein the memory 73 stores a set of program codes, and the processor 74 is configured to call the program code stored in the memory, to perform the following operations: receiving a scan request sent by the user terminal; generating a two-dimensional code; The two-dimensional code is displayed on the display screen, so that the user terminal scans the display screen to obtain the two-dimensional code, and the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code, and the information of the two-dimensional code includes access access.
  • the access password of the point and the identifier of the access point are accessed by the user terminal according to the access password of the access point and the identifier of the access point.
  • the performing, by the processor, the operation of generating the two-dimensional code includes the following steps: generating a two-dimensional code according to an identifier of the access point, an access password of the access point, and an encryption manner.
  • the processor performs a related operation to receive a scan request sent by the user terminal, and then generates a two-dimensional code; and displays the two-dimensional code on the display screen, so that the user terminal scans the display screen to obtain the two-dimensional code.
  • the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code, and the information of the two-dimensional code includes the access password of the access point and the identifier of the access point, and the user terminal according to the access point
  • the access password and the identity of the access point are connected to the access point. No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal.
  • the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved.
  • the encryption method of the two-dimensional code prevents the phenomenon of artificially stealing a password.
  • the access point can generate a two-dimensional code, which is not easy to leak the password, and prevents the system from being attacked by an illegal user to make the system paralyzed.
  • Another access point provided in this embodiment includes: a sending unit, configured to send a picture carrying a two-dimensional code to the user terminal, so that the user terminal acquires a picture carrying the two-dimensional code, and is carried by the user terminal The picture of the two-dimensional code, the two-dimensional code is obtained, and the two-dimensional code is parsed by the user terminal to obtain the information of the two-dimensional code.
  • the information of the two-dimensional code includes the access password of the access point and the identifier of the access point
  • the user terminal accesses the access point according to the access password of the access point and the identifier of the access point.
  • the sending unit is configured to receive a first request sent by the user terminal, where the first request is used to request to acquire a picture carrying the two-dimensional code, and to generate a picture carrying the two-dimensional code according to the first request, Sending the first information to the user terminal, so that the user terminal acquires the first information, where the first information includes a picture carrying the two-dimensional code.
  • the sending unit is further configured to send the payment request information to the user terminal, so that the user performs payment according to the payment request information, where the payment request information includes a tariff standard and a tariff method, and the first information further includes access access.
  • the duration information or traffic information of the point is further configured to generate a two-dimensional code; and to encapsulate the two-dimensional code in a picture form.
  • the sending unit is further configured to generate a two-dimensional code according to the identifier of the access point, the access password of the access point, and an encryption manner. Referring to FIG. 8, FIG. 8 is a structural diagram of another access point according to an embodiment of the present application. As shown in FIG.
  • the access point provided in this embodiment includes: an input device 81, an output device 82, a memory 83, and a processor 84, wherein a set of program codes is stored in the memory 83, and the processor 84 is configured to call the memory.
  • the program code stored in the following is used to: send a picture carrying the two-dimensional code to the user terminal, so that the user terminal acquires the picture carrying the two-dimensional code; and the user terminal analyzes the picture carrying the two-dimensional code, Obtaining a two-dimensional code, and the user terminal parses the two-dimensional code to obtain information of the two-dimensional code.
  • the information of the two-dimensional code includes an access password of the access point and an identifier of the access point, and the user terminal accesses according to the The access password of the access point and the identity of the access point are accessed to the access point.
  • the performing, by the processor, the sending the picture carrying the two-dimensional code to the user terminal includes the following steps: receiving the first request sent by the user terminal, where the first request is used to request to acquire the second a picture of the dimension code; generating a picture carrying the two-dimensional code; Sending the first information to the user terminal, so that the user terminal acquires the first information, where the first information includes a picture carrying the two-dimensional code.
  • the processor is further configured to perform the following operations:
  • the payment request information is sent to the user terminal, so that the user pays according to the payment request information, and the payment request information includes a tariff standard and a tariff method, and the first information further includes duration information or traffic information of the access point.
  • the performing, by the processor, the step of generating a picture carrying the two-dimensional code includes the following steps: generating a two-dimensional code; and encapsulating the two-dimensional code in a picture form.
  • the performing, by the processor, the operation of generating the two-dimensional code includes the following steps: generating a two-dimensional code according to an identifier of the access point, an access password of the access point, and an encryption manner.
  • the processor performs a related operation to send a picture carrying the two-dimensional code to the user terminal, so that the user terminal acquires the picture carrying the two-dimensional code; and the user terminal analyzes the picture carrying the two-dimensional code. Obtaining a two-dimensional code, and the user terminal parses the two-dimensional code to obtain the information of the two-dimensional code.
  • the information of the two-dimensional code includes an access password of the access point and an identifier of the access point, and the user terminal is connected according to the The access password of the access point and the identity of the access point are accessed to the access point. No need to use the keyboard to enter the password or click the WPS button to automatically scan or obtain the QR code, which is convenient and simple to operate, and reduces the size of the user terminal. Moreover, the phenomenon that the input password is too long is avoided due to the long password, and the efficiency of accessing the access point is improved. Further, the encryption method of the two-dimensional code prevents the phenomenon of artificially stealing a password.
  • the access point can generate a two-dimensional code, which is not easy to leak the password, and prevents the system from being attacked by an illegal user to make the system paralyzed.
  • the disclosed apparatus and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of modules or units is only a logical function division. In actual implementation, there may be another division manner, for example, multiple units or modules may be combined or Can be integrated into another system, or some features can be ignored, or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device, module or unit, or an electrical, mechanical or other form of connection.
  • the components displayed as modules or units may or may not be physical modules or units, ie may be located in one place, or may be distributed over multiple network modules or units. Some or all of the modules or units may be selected according to actual needs to achieve the objectives of the embodiments of the present invention.
  • each functional module or unit in each embodiment of the present invention may be integrated into one processing module or unit, or each module or unit may exist physically separately, or two or more modules or units may be integrated in In a module or unit.
  • the above integrated modules or units can be implemented either in the form of hardware or in the form of software functional units.
  • An integrated module or unit if implemented as a software function module or unit and sold or used as a stand-alone product, can be stored in a computer readable storage medium.
  • the technical solution of the present invention contributes in essence or to the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the various embodiments of the present invention.
  • the foregoing storage medium includes: a USB flash drive, a removable hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk or an optical disk, and the like. The medium of the code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请实施例公开了一种接入点的接入方法及相关设备。本实施例通过用户终端获取二维码,解析所述二维码,以获取所述二维码的信息,所述二维码的信息包括接入所述接入点的接入密码和所述接入点的标识,所述用户终端根据所述二维码信息接入所述接入点。无需使用键盘输入密码或者同步点击 WPS按钮,就可自动扫描或者获取二维码,操作方便、简单,且减小了用户终端的体积。并且,避免了密码过长致使输入出错的现象发生,提高了接入到接入点的效率。进一步,通过二维码的加密方式,防止人为盗取密码的现象发生。进一步可以由接入点生成二维码,不易泄露密码,防止系统受到非法用户的攻击进系统瘫痪。

Description

接入点的接入方法及相关设备 技术领域
本申请涉及通信技术领域,具体涉及一种接入点的接入方法及相关设备。 背景技术
目前, 随着运营商对无线局域网 (Wireless Local Area Network, WLAN ) 业务的推动, 在越来越多的区域部署无线保真 (Wireless Fidelity ,WiFi)技术的 接入点( Access Point, AP),具体由 AP将其运营商提供的服务集标识( Service Set Identifier, SSID )进行开放式广播, 用户终端发现该 SSID后, 如果确认 接入该 SSID, 则与该 SSID的 AP进行关联, 输入正确的密码后才能确保接 入 AP, 用户终端接入到该 AP上, 即可进行相关的网络应用业务。
一般来讲, 用户终端需要连接键盘等外设输入接入密码, 才可与 AP进 行关联, 然而对于微小型的用户终端, 没有键盘等外设的情况下, 不能输入 接入密码, 因而连接不上 AP。 以及, 接入密码很长的情况下或者 SSID的号 码很长时,也会导致接入密码或者 SSID的输入有误,增加了识别操作的难度, 降低了接入 AP 的效率。 同时, 需要管理员提供接入密码, 用户终端输入该 接入密码才可接入 AP, 若用户的身份认证存在漏洞, 且密码的形式一般是字 母或者数字, 很容易导致密码泄露, 进而受到非法用户的攻击造成系统瘫痪。
目前, 用户终端也可按照 Wi-Fi安全防护设定( Wi-Fi Protected Setup , WPS )的标准规定的方式接入 WiFi的 AP, 即需要长时间点击 W - 的 AP的 WPS按钮。 在点击用户终端的 WPS按钮时间内, 若 W - 的 AP的 WPS按 钮也处于点击状态, 则用户终端可接入该 WiFi的 AP, 与其进行相关的网络 应用业务。 用户终端的 WPS按钮与 WiFi的 AP的 WPS按钮必须处于同步的 情况时, 才能建立连接, 操作繁瑣复杂, 实用性不大, 而且, 一次连接成功 仅支持本次服务的应用, 不支持本次服务断开之后的下一次连接, 使得连接 操作更加繁瑣。 发明内容 本申请实施例提供了一种接入点的接入方法及相关设备, 解决了现有的 接入点接入方法操作繁瑣复杂以及安全性能低的问题。 第一方面, 本申请实施例提供的一种接入点的接入方法, 包括: 用户终端获取二维码; 所述用户终端解析所述二维码, 获得所述二维码的信息, 所述二维码的 信息包括接入所述接入点的接入密码和所述接入点的标识; 所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标识 接入所述接入点。 结合第一方面, 在第一种可能的实现方式中, 所述用户终端获取二维码, 包括: 用户终端通过扫描方式获取二维码。 结合第一方面的第一种可能的实现方式, 在第二种可能的实现方式中, 所述用户终端通过扫描方式获取二维码, 包括: 用户终端发送扫描请求给所述接入点, 以使所述接入点生成二维码, 并 由所述接入点显示所述二维码至显示屏上; 所述用户终端对所述显示屏进行扫描, 以获取所述二维码。 结合第一方面, 在第三种可能的实现方式中, 所述用户终端获取二维码, 包括: 用户终端获取携带有二维码的图片; 所述用户终端解析所述携带有所述二维码的图片, 获得所述二维码。 结合第一方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述用户终端获取携带有二维码的图片, 包括: 用户终端发送第一请求至所述接入点, 以使所述接入点生成携带有二维 码的图片, 所述第一请求用于请求获取携带有二维码的图片; 所述用户终端接收所述接入点发送的第一信息, 所述第一信息中包括携 带有所述二维码的图片。 结合第一方面的第四种可能的实现方式, 在第五种可能的实现方式中, 所述用户终端发送第一请求至所述接入点之后, 以及所述用户终端接收所述 接入点发送的第一信息之前, 所述方法还包括: 所述用户终端接收所述接入点发送的付费请求信息, 以使用户根据所述 付费请求信息进行付费, 所述付费请求信息中包括资费标准和资费方式, 所 述第一信息中还包括接入所述接入点的时长信息或者流量信息。 结合第一方面的第二种可能的实现方式, 在第六种可能的实现方式中, 所述用户终端对所述显示屏进行扫描, 包括: 所述用户终端通过照相设备对所述显示屏进行扫描。 结合第一方面或者第一方面的第一中可能的实现方式或者第一方面的第 二种可能的实现方式, 在第七种可能的实现方式中, 所述二维码的信息还包 括接入所述接入点的时长信息或者流量信息。 第二方面, 本申请实施例提供了一种接入点的接入方法, 包括: 接收用户终端发送的扫描请求; 生成二维码; 显示所述二维码至显示屏上,以使所述用户终端对所述显示屏进行扫描, 以获取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的 信息, 所述二维码的信息包括接入所述接入点的接入密码和所述接入点的标 识, 由所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标 识接入所述接入点。 结合第二方面, 在第一种可能的实现方式中, 所述生成二维码, 包括: 根据所述接入点的标识、 接入所述接入点的接入密码以及加密方式生成 二维码。 第三方面, 本申请实施例提供了一种接入点的接入方法, 包括: 发送携带有二维码的图片给用户终端, 以使所述用户终端获取携带有所 述二维码的图片; 并由所述用户终端解析所述携带有所述二维码的图片, 获 取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码和所述接入点的标识, 由 所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标识接入 所述接入点。 结合第三方面, 在第一种可能的实现方式中, 所述发送携带有二维码的 图片给用户终端, 包括: 接收用户终端发送的第一请求, 所述第一请求用于请求获取携带有二维 码的图片; 生成携带有所述二维码的图片; 发送第一信息给所述用户终端, 以使所述用户终端获取所述第一信息, 所述第一信息中包括携带有所述二维码的图片。 结合第三方面的第一种可能的实现方式, 在第二种可能的实现方式中, 所述接收所述用户终端发送的第一请求之后, 以及所述发送第一信息给所述 用户终端之前, 所述方法还包括: 发送付费请求信息给所述用户终端, 以使用户根据所述付费请求信息进 行付费, 所述付费请求信息中包括资费标准和资费方式, 所述第一信息中还 包括接入所述接入点的时长信息或者流量信息。 结合第三方面的第一种可能的实现方式, 在第三种可能的实现方式中, 所述生成携带有所述二维码的图片, 包括: 生成所述二维码; 以图片形式封装所述二维码。 结合第三方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述生成所述二维码, 包括: 根据所述接入点的标识、 所述接入所述接入点的接入密码以及加密方式 生成所述二维码。
第四方面, 本申请实施例提供一种用户终端, 包括: 获取单元, 用于获取二维码; 处理单元, 用于解析所述二维码, 获得所述二维码的信息, 所述二维码 的信息包括接入一接入点的接入密码和所述接入点的标识; 所述处理单元, 还用于根据所述接入所述接入点的接入密码和所述接入 点的标识接入所述接入点。 结合第四方面, 在第一种可能的实现方式中, 所述获取单元, 具体用于通过扫描方式获取二维码。 结合第四方面的第一种那个可能的实现方式, 在第二种可能的实现方式 中, 所述获取单元, 具体用于发送扫描请求给一接入点, 以使所述接入点生 成二维码, 并由所述接入点显示所述二维码至显示屏上, 以及用于对所述显 示屏进行扫描, 以获取所述二维码。 结合第四方面, 在第三种可能的实现方式中, 所述获取单元, 具体用于 获取携带有二维码的图片, 还用于解析所述携带有所述二维码的图片, 获得 所述二维码。 结合第四方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述获取单元, 还用于发送第一请求至所述接入点, 以使所述接入点生成携 带有二维码的图片, 所述第一请求用于请求获取携带有二维码的图片; 所述获取单元, 还用于接收所述接入点发送的第一信息, 所述第一信息 中包括携带有所述二维码的图片。 结合第四方面的第四种可能的实现方式, 在第五种可能的实现方式中, 所述获取单元, 还用于接收所述接入点发送的付费请求信息, 以使用户根据 所述付费请求信息进行付费后接收所述接入点发送的第一信息, 所述付费请 求信息中包括资费标准和资费方式, 所述第一信息中还包括接入所述接入点 的时长信息或者流量信息。 结合第四方面的第二种可能的实现方式, 在第六种可能的实现方式中, 所述获取单元, 还用于通过照相设备对所述显示屏进行扫描。 结合第四方面或者第四方面的第一种可能的实现方式或者第四方面的第 二种可能的实现方式, 所述二维码的信息还包括接入所述接入点的时长信息 或者流量信息。 第五方面, 本申请实施例提供了一种接入点, 包括: 接收单元, 用于接收用户终端发送的扫描请求; 处理单元, 用于根据接收单元接收到的所述扫描请求生成二维码; 显示单元, 用于显示所述二维码至显示屏上, 以使所述用户终端对所述 显示屏进行扫描, 以获取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码 和所述接入点的标识, 由所述用户终端根据所述接入所述接入点的接入密码 和所述接入点的标识接入所述接入点。 结合第五方面, 在第一种可能的实现方式中, 所述处理单元, 具体用于 根据所述接入点的标识、 接入所述接入点的接入密码以及加密方式生成二维 码。 第六方面, 本申请实施例提供了一种接入点, 包括: 发送单元, 用于发送携带有二维码的图片给用户终端, 以使所述用户终 端获取携带有所述二维码的图片; 并由所述用户终端解析所述携带有所述二 维码的图片, 获取所述二维码, 并由所述用户终端解析所述二维码, 获取所 述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码和所述 接入点的标识, 由所述用户终端根据所述接入所述接入点的接入密码和所述 接入点的标识接入所述接入点。 结合第六方面, 在第一种可能的实现方式中, 所述发送单元, 具体用于 接收用户终端发送的第一请求 , 所述第一请求用于请求获取携带有二维码的 图片, 以及用于根据所述第一请求生成携带有所述二维码的图片, 发送第一 信息给所述用户终端, 以使所述用户终端获取所述第一信息, 所述第一信息 中包括携带有所述二维码的图片。 结合第六方面的第一种可能的实现方式, 在第二种可能的实现方式中, 所述发送单元, 还用于发送付费请求信息给所述用户终端, 以使用户根据所 述付费请求信息进行付费, 所述付费请求信息中包括资费标准和资费方式, 所述第一信息中还包括接入所述接入点的时长信息或者流量信息。 结合第六方面的第一种可能的实现方式, 在第三种可能的实现方式中, 所述发送单元, 还用于生成所述二维码; 以及用于以图片形式封装所述二维 码。 结合第六方面的第三种可能的实现方式, 在第四种可能的实现方式中, 所述发送单元, 还用于根据所述接入点的标识、 所述接入所述接入点的接入 密码以及加密方式生成所述二维码。 本申请实施例通过用户终端获取二维码, 解析所述二维码, 以获取所述 二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码和所述接 入点的标识, 所述用户终端根据接入所述接入点的接入密码和所述接入点的 标识接入所述接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可 自动扫描或者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并 且, 避免了密码过长致使输入出错的现象发生, 提高了接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 进一 步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击 而使系统瘫痪。 附图说明
为了更清楚地说明本申请实施例或现有技术中的技术方案, 下面将对实 施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见地, 下面 描述中的附图仅仅是本申请的一些实施例, 对于本领域普通技术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得其他的附图。
图 1是本申请实施例提供的一种接入点的接入方法的流程图;
图 2是本申请实施例提供的另一种接入点的接入方法的流程图; 图 3是本申请实施例提供的另一种接入点的接入方法的流程图; 图 4是本申请实施例提供的一种用户终端的结构图;
图 5是本申请实施例提供的另一种用户终端的结构图;
图 6是本申请实施例提供的一种接入点的结构图;
图 7是本申请实施例提供的另一种接入点的结构图;
图 8是本申请实施例提供的另一种接入点的结构图。 具体实施方式
下面将结合本申请实施例中的附图, 对本申请实施例中的技术方案进行 清楚、 完整地描述, 显然, 所描述的实施例仅仅是本申请一部分实施例, 而 不是全部的实施例。 基于本申请中的实施例, 本领域普通技术人员在没有做 出创造性劳动前提下所获得的所有其他实施例, 都属于本申请保护的范围。
下面通过具体实施例, 分别进行详细的说明。
请参见图 1 , 图 1是本申请实施例提供的一种接入点的接入方法的流程 图。本实施例提供的接入点的接入方法是以用户终端为执行主体进行表述的, 用户终端具有 WiFi 功能, 可以是手机或者电脑等用户终端, 也可以是具有 WIFI功能但是没有配置键盘设备的终端。 如图 1所示, 本实施例提供的接入 点的接入方法, 包括如下步骤:
S110、 用户终端获取二维码。 一个实施例中, 用户终端可以通过扫描方式获取二维码。 具体可以按照 如下步骤进行:
1、 用户终端发送扫描请求给接入点, 以使接入点生成二维码, 并由接入 点显示二维码至显示屏上;
2、 用户终端对显示屏进行扫描, 以获取二维码。 可选的, 用户终端可以 通过照相设备对该显示屏进行扫描, 以获取该二维码。 可选的, 接入点生成二维码后, 可以对二维码进行打印输出, 给用户提 供显示该二维码的纸件, 供用户通过用户终端对该纸件进行扫描, 以获得该 二维码。 一个实施例中, 用户终端获取二维码的方式具体包括如下步骤:
A、 用户终端获取携带有二维码的图片;
B、 用户终端解析携带有二维码的图片, 获得二维码。 一个实施例中, 用户终端获取携带有二维码的图片的方式具体包括如下 步骤: a、 用户终端发送第一请求至接入点, 以使接入点生成携带有二维码的图 片, 第一请求用于请求获取携带有二维码的图片; b、 用户终端接收接入点发送的第一信息, 第一信息中包括携带有二维码 的图片。 可选的, 用户终端发送第一请求至接入点之后, 以及用户终端接收接入 点发送的第一信息之前, 方法还包括: 用户终端接收接入点发送的付费请求信息, 以使用户根据付费请求信息 进行付费, 付费请求信息中包括资费标准和资费方式, 第一信息中还包括接 入接入点的时长信息或者流量信息。 S120、 用户终端解析二维码, 获得二维码的信息, 二维码的信息包括接 入接入点的接入密码和接入点的标识。 可选的, 二维码的信息还包括接入接入点的时长信息或者流量信息。 当 用户接入该接入点的累计时长超过时常信息限制的时长或者用户接入该接入 点后使用的网络流量超过流量信息限制的流量, 则自动退出该接入点或者通 过接入点切断与用户终端之间的网络。
S130、 用户终端根据所述接入所述接入点的接入密码和所述接入点的标 识接入接入点。
本申请中, 通过用户终端获取二维码, 解析二维码, 以获取二维码的信 息, 则用户终端根据二维码的信息, 即根据接入接入点的接入密码和接入点 的标识接入接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自 动扫描或者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了密码过长致使输入出错的现象发生, 提高了接入到接入点的效率。
进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 进一 步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击 而使系统瘫痪。
请参见图 2 , 图 2是本申请实施例提供的另一种接入点的接入方法的流程 图。 本实施例提供的接入点的接入方发是以接入点为执行主体进行表述的, 如图 2所示, 本实施例提供的接入点的接入方法, 包括:
S210、 接收用户终端发送的扫描请求。
S220、 生成二维码。
S230、 显示二维码至显示屏上, 以使用户终端对显示屏进行扫描, 以获 取二维码, 并由用户终端解析二维码, 获取二维码的信息, 二维码的信息包 括接入接入点的接入密码和接入点的标识, 则由用户终端根据所述接入所述 接入点的接入密码和所述接入点的标识接入接入点。 可选的, 接入点生成二维码后, 可以对二维码进行打印输出, 给用户提 供显示该二维码的纸件, 供用户通过用户终端对该纸件进行扫描, 以获得该 二维码。 可选的, 接入点生成二维码具体包括以下步骤: 根据接入点的标识、 接入接入点的接入密码以及加密方式生成二维码。 本实施例通过接收用户终端发送的扫描请求生成二维码, 以显示二维码 至显示屏上, 使用户终端对显示屏进行扫描, 获取二维码, 并由用户终端解 析二维码, 获取二维码的信息, 二维码的信息包括接入接入点的接入密码和 接入点的标识, 则由用户终端根据接入接入点的接入密码和接入点的标识接 入接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自动扫描或 者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了 密码过长致使输入出错的现象发生, 提高了接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 且通过接入点生成 二维码, 不易泄露密码, 防止系统受到非法用户的攻击而使系统瘫痪。
请参见图 3 , 图 3是本申请实施例提供的另一种接入点的接入方法的流 程图。本实施例提供的接入点的接入方法是以接入点为执行主体进行描述的。 本实施例提供的接入点的接入方法包括:
发送携带有二维码的图片给用户终端, 以使用户终端获取携带有二维码 的图片; 并由用户终端解析携带有二维码的图片, 获取二维码, 并由用户终 端解析二维码, 获取二维码的信息, 二维码的信息包括接入接入点的接入密 码和接入点的标识, 则由用户终端根据接入接入点的接入密码和接入点的标 识接入接入点。 一个实施例中, 如图 3所示, 发送携带有二维码的图片给用户终端具体 包括如下步骤:
S310、 接收用户终端发送的第一请求, 第一请求用于请求获取携带有二 维码的图片。 S320、 生成携带有二维码的图片。 其中, 作为可选的一种实施方式, 在接收用户终端发送的第一请求之后, 以及发送第一信息给用户终端之前, 方法还包括: 发送付费请求信息给用户终端, 以使用户根据付费请求信息进行付费, 付费请求信息中包括资费标准和资费方式, 第一信息中还包括接入接入点的 时长信息或者流量信息。
S330、 发送第一信息给用户终端, 以使用户终端获取第一信息, 第一信 息中包括携带有二维码的图片。 一个实施例中, 生成携带有二维码的图片具体包括如下步骤: 生成二维码; 以图片形式封装二维码。 一个实施例中, 生成二维码具体包括如下步骤: 根据接入点的标识、 接入接入点的接入密码以及加密方式生成二维码。 本实施例通过发送携带有二维码的图片给用户终端, 以使用户终端获取 携带有二维码的图片; 并由用户终端解析携带有二维码的图片, 获取二维码, 并由用户终端解析二维码, 获取二维码的信息, 二维码的信息包括接入接入 点的接入密码和接入点的标识, 则由用户终端根据接入接入点的接入密码和 接入点的标识接入接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自动扫描或者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了密码过长致使输入出错的现象发生, 提高了接入到接入点的效 率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 且通 过接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击而使系 统瘫痪。 请参见图 4, 图 4是本申请实施例提供的一种用户终端的结构图。 如图 4 所示, 本实施例提供的用户终端包括: 获取单元 41、 处理单元 42。 其中, 获取单元 41 , 用于获取二维码。 处理单元 42 , 用于解析二维码, 获得二维码的信息, 二维码的信息包括 接入一接入点的接入密码和接入点的标识。 处理单元 42 , 还用于根据接入接入点的接入密码和接入点的标识接入该 接入点。 作为一种可选的实施方式, 获取单元, 具体用于通过扫描方式获取二维 码。 作为一种可选的实施方式, 获取单元, 具体用于发送扫描请求给一接入 点, 以使接入点生成二维码, 并由接入点显示二维码至显示屏上;以及用于对 显示屏进行扫描, 以获取二维码。 作为一种可选的实施方式, 获取单元, 具体用于获取携带有二维码的图 片, 还用于解析携带有二维码的图片, 获得二维码。 作为一种可选的实施方式, 获取单元, 还用于发送第一请求至接入点, 以使接入点生成携带有二维码的图片, 第一请求用于请求获取携带有二维码 的图片; 获取单元, 还用于接收接入点发送的第一信息, 第一信息中包括携带有 二维码的图片。 作为一种可选的实施方式, 获取单元, 还用于接收接入点发送的付费请 求信息,以使用户根据付费请求信息进行付费后接收接入点发送的第一信息, 付费请求信息中包括资费标准和资费方式, 第一信息中还包括接入接入点的 时长信息或者流量信息。 作为一种可选的实施方式, 获取单元, 还用于通过照相设备对显示屏进 行扫描。 作为一种可选的实施方式, 二维码的信息还包括接入接入点的时长信息 或者流量信息。 本实施例中, 通过获取单元 41获取二维码, 由处理单元 42解析二维码, 获得二维码的信息, 二维码的信息包括接入一接入点的接入密码和接入点的 标识。进一步通过处理单元 42根据接入接入点的接入密码和接入点的标识接 入接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自动扫描或 者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了 密码过长致使输入出错的现象发生, 提高了接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 且通过接入点生成 二维码, 不易泄露密码, 防止系统受到非法用户的攻击而使系统瘫痪。 请参见图 5 , 图 5是本申请实施例提供的另一种用户终端的结构图。 如 图 5所示, 本实施例提供的用户终端包括: 输入装置 51、 输出装置 52、 存储 器 53和处理器 54, 其中, 存储器 53中存储一组程序代码, 且处理器 54用 于调用存储器中存储的程序代码, 用于执行以下操作: 获取二维码; 解析二维码, 获得二维码的信息, 二维码的信息包括接入接入点的接入 密码和接入点的标识; 根据接入接入点的接入密码和接入点的标识接入接入点。 本申请中, 通过用户终端的处理器执行相关操作, 获取二维码, 解析二 维码, 以获取二维码的信息, 二维码的信息包括接入接入点的接入密码和接 入点的标识, 则根据接入接入点的接入密码和接入点的标识使用户终端接入 接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自动扫描或者 获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了密 码过长致使输入出错的现象发生, 提高了接入到接入点的效率。 进一步, 通过执行二维码的加密, 可以防止人为盗取密码的现象发生。 进一步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的 攻击而使系统瘫痪。 作为一种可选的实施方式, 处理器执行获取二维码的操作具体可以通过 扫描方式获取二维码。 作为一种可选的实施方式, 处理器通过扫描方式获取二维码, 具体可以 通过如下操作获得: 发送扫描请求给接入点, 以使接入点生成二维码, 并由接入点显示二维 码至显示屏上; 对显示屏进行扫描, 以获取二维码。 作为一种可选的实施方式, 处理器执行获取二维码的操作具体可以执行 下述操作: 获取携带有二维码的图片; 解析携带有二维码的图片, 获得二维码。 作为一种可选的实施方式, 处理器执行获取携带有二维码的图片的操作 具体可以执行如下操作: 发送第一请求至接入点, 以使接入点生成携带有二维码的图片, 第一请 求用于请求获取携带有二维码的图片; 接收接入点发送的第一信息, 第一信息中包括携带有二维码的图片。 作为一种可选的实施方式, 处理器执行发送第一请求至接入点的操作之 后, 以及处理器执行接收接入点发送的第一信息的操作之前, 该处理器还用 于执行下述操作: 接收接入点发送的付费请求信息 ,以使用户根据付费请求信息进行付费 , 付费请求信息中包括资费标准和资费方式, 第一信息中还包括接入接入点的 时长信息或者流量信息。 作为一种可选的实施方式, 处理器执行对显示屏进行扫描的操作具体可 以按照如下操作进行: 通过照相设备对显示屏进行扫描。 作为一种可选的实施方式, 二维码的信息还包括接入接入点的时长信息 或者流量信息。 请参见图 6 , 图 6是本申请实施例提供的一种接入点的结构图。 如图 6 所示, 本实施例提供的接入点包括: 接收单元 61、 处理单元 62和显示单元
63。 接收单元 61 , 用于接收用户终端发送的扫描请求; 处理单元 62 , 用于根据接收单元 61接收到的扫描请求生成二维码; 显示单元 63 , 用于显示二维码至显示屏上, 以使用户终端对显示屏进行 扫描, 以获取二维码, 并由用户终端解析二维码, 获取二维码的信息, 二维 码的信息是否包括接入接入点的接入密码和接入点的标识, 则由用户终端根 据接入接入点的接入密码和接入点的标识接入接入点。 作为一种可选的实施方式, 处理单元, 具体用于根据接入点的标识、 接 入接入点的接入密码以及加密方式生成二维码。 本实施例中, 通过接收单元 61接收用户终端发送的扫描请求, 使处理单 元 62根据接收单元 61接收到的扫描请求生成二维码, 以便显示单元 63显示二 维码至显示屏上, 以使用户终端对显示屏进行扫描, 以获取二维码, 并由用 户终端解析二维码, 获取二维码的信息, 二维码的信息包括接入接入点的接 入密码和接入点的标识, 则由用户终端根据接入接入点的接入密码和接入点 的标识接入接入点。 无需使用键盘输入密码或者同步点击 WPS按钮, 就可自 动扫描或者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了密码过长致使输入出错的现象发生, 提高了接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 进一 步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击 而使系统瘫痪。 请参见图 7 , 图 7是本申请实施例提供的另一种接入点的结构图。 如图 7 所示, 本实施例提供的接入点包括: 输入装置 71、 输出装置 72、 存储器 73 和处理器 74 , 其中, 存储器 73中存储一组程序代码, 且处理器 74用于调用 存储器中存储的程序代码, 用于执行以下操作: 接收用户终端发送的扫描请求; 生成二维码; 显示二维码至显示屏上, 以使用户终端对显示屏进行扫描, 以获取二维 码, 并由用户终端解析二维码, 获取二维码的信息, 二维码的信息包括接入 接入点的接入密码和接入点的标识, 则由用户终端根据接入接入点的接入密 码和接入点的标识接入接入点。 作为一种可选的实施方式, 处理器执行生成二维码的操作具体包括如下 步骤: 根据接入点的标识、 接入接入点的接入密码以及加密方式生成二维码。 本实施例中, 通过处理器执行相关操作以接收用户终端发送的扫描请求 后生成二维码; 并显示二维码至显示屏上, 以使用户终端对显示屏进行扫描, 以获取二维码, 并由用户终端解析二维码, 获取二维码的信息, 二维码的信 息包括接入接入点的接入密码和接入点的标识, 则由用户终端根据接入接入 点的接入密码和接入点的标识接入接入点。 无需使用键盘输入密码或者同步 点击 WPS按钮, 就可自动扫描或者获取二维码, 操作方便、 简单, 且减小了 用户终端的体积。 并且, 避免了密码过长致使输入出错的现象发生, 提高了 接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 进一 步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击 而使系统瘫痪。 本实施例提供的另一种接入点包括: 发送单元, 用于发送携带有二维码 的图片给用户终端, 以使用户终端获取携带有二维码的图片, 并由用户终端 解析携带有二维码的图片, 获取二维码, 并由用户终端解析二维码, 获取二 维码的信息二维码的信息包括接入接入点的接入密码和接入点的标识, 则由 用户终端根据接入接入点的接入密码和接入点的标识接入接入点。 可选的, 发送单元, 具体用于接收用户终端发送的第一请求, 第一请求 用于请求获取携带有二维码的图片, 以及用于根据第一请求生成携带有二维 码的图片, 发送第一信息给用户终端, 以使用户终端获取第一信息, 第一信 息中包括携带有二维码的图片。 一个实施例中, 发送单元, 还用于发送付费请求信息给用户终端, 以使 用户根据付费请求信息进行付费,付费请求信息中包括资费标准和资费方式, 第一信息中还包括接入接入点的时长信息或者流量信息。 一个实施例中, 发送单元, 还用于生成二维码; 以及用于以图片形式封 装二维码。 一个实施例中, 发送单元, 还用于根据接入点的标识、 接入接入点的接 入密码以及加密方式生成二维码。 请参见图 8 , 图 8是本申请实施例提供的另一种接入点的结构图。 如图 8 所示, 本实施例提供的接入点包括: 输入装置 81、 输出装置 82、 存储器 83 和处理器 84 , 其中, 存储器 83中存储一组程序代码, 且处理器 84用于调用 存储器中存储的程序代码, 用于执行以下操作: 发送携带有二维码的图片给用户终端, 以使用户终端获取携带有二维码 的图片; 并由用户终端解析携带有二维码的图片, 获取二维码, 并由用户终 端解析二维码, 获取二维码的信息, 二维码的信息包括接入接入点的接入密 码和接入点的标识, 则由用户终端根据接入接入点的接入密码和接入点的标 识接入接入点。 作为一种可选的实施方式, 该处理器执行发送携带有二维码的图片给用 户终端的操作具体包括如下步骤: 接收用户终端发送的第一请求, 第一请求用于请求获取携带有二维码的 图片; 生成携带有二维码的图片; 发送第一信息给用户终端, 以使用户终端获取第一信息, 第一信息中包 括携带有二维码的图片。 作为一种可选的实施方式, 该处理器执行接收用户终端发送的第一请求 的操作之后, 以及执行发送第一信息给用户终端的操作之前, 该处理器还用 于执行下述操作: 发送付费请求信息给用户终端, 以使用户根据付费请求信息进行付费, 付费请求信息中包括资费标准和资费方式, 第一信息中还包括接入接入点的 时长信息或者流量信息。 作为一种可选的实施方式, 该处理器执行生成携带有二维码的图片的操 作具体包括如下步骤: 生成二维码; 以图片形式封装二维码。 作为一种可选的实施方式, 该处理器执行生成二维码的操作具体包括如 下步骤: 根据接入点的标识、 接入接入点的接入密码以及加密方式生成二维码。 本实施例中, 通过处理器执行相关操作, 以发送携带有二维码的图片给 用户终端, 以使用户终端获取携带有二维码的图片; 并由用户终端解析携带 有二维码的图片, 获取二维码, 并由用户终端解析二维码, 获取二维码的信 息, 二维码的信息包括接入接入点的接入密码和接入点的标识, 则由用户终 端根据接入接入点的接入密码和接入点的标识接入接入点。 无需使用键盘输 入密码或者同步点击 WPS按钮, 就可自动扫描或者获取二维码, 操作方便、 简单, 且减小了用户终端的体积。 并且, 避免了密码过长致使输入出错的现 象发生, 提高了接入到接入点的效率。 进一步, 通过二维码的加密方式, 防止人为盗取密码的现象发生。 进一 步可以由接入点生成二维码, 不易泄露密码, 防止系统受到非法用户的攻击 而使系统瘫痪。 在本申请所提供的几个实施例中, 应该理解到, 所揭露的设备和方法, 可以通过其它的方式实现。 例如, 以上所描述的设备实施例仅仅是示意性的, 例如, 模块或单元的划分, 仅仅为一种逻辑功能划分, 实际实现时可以有另 外的划分方式, 例如多个单元或模块可以结合或者可以集成到另一个系统, 或一些特征可以忽略, 或不执行。 另外, 所显示或讨论的相互之间的耦合或 直接耦合或通信连接可以是通过一些接口、 装置、 模块或单元的间接耦合或 通信连接, 也可以是电的, 机械的或其它的形式连接。 作为模块或单元显示的部件可以是或者也可以不是物理模块或单元, 即可以 位于一个地方, 或者也可以分布到多个网络模块或单元上。 可以根据实际的 需要选择其中的部分或者全部模块或单元来实现本发明实施例方案的目的。
另外, 在本发明各个实施例中的各功能模块或单元可以集成在一个处理 模块或单元中, 也可以是各个模块或单元单独物理存在, 也可以是两个或两 个以上模块或单元集成在一个模块或单元中。 上述集成的模块或单元既可以 釆用硬件的形式实现, 也可以釆用软件功能单元的形式实现。
集成的模块或单元如果以软件功能模块或单元的形式实现并作为独立的 产品销售或使用时, 可以存储在一个计算机可读取存储介质中。 基于这样的 理解, 本发明的技术方案本质上或者说对现有技术做出贡献的部分, 或者该 技术方案的全部或部分可以软件产品的形式体现出来, 该计算机软件产品存 储在一个存储介质中, 包括若干指令用以使得一台计算机设备(可以是个人 计算机, 服务器, 或者网络设备等)执行本发明各个实施例方法的全部或部 分步骤。 而前述的存储介质包括: U盘、 移动硬盘、 只读存储器 (ROM, Read-Only Memory ) 、 随机存取存 4诸器 ( RAM, Random Access Memory ) 、 磁碟或者光盘等各种可以存储程序代码的介质。
以上, 仅为本发明的具体实施方式, 但本发明的保护范围并不局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到各 种等效的修改或替换, 这些修改或替换都应涵盖在本发明的保护范围之内。 因此, 本发明的保护范围应以权利要求的保护范围为准。

Claims

权 利 要 求 书
1、 一种接入点的接入方法, 其特征在于, 包括: 用户终端获取二维码; 所述用户终端解析所述二维码, 获得所述二维码的信息, 所述二维码的 信息包括接入所述接入点的接入密码和所述接入点的标识; 所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标识 接入所述接入点。
2、 如权利要求 1所述的接入点的接入方法, 其特征在于, 所述用户终端 获取二维码, 包括: 用户终端通过扫描方式获取二维码。
3、 如权利要求 2所述的接入点的接入方法, 其特征在于, 所述用户终端 通过扫描方式获取二维码, 包括: 用户终端发送扫描请求给所述接入点, 以使所述接入点生成二维码, 并 由所述接入点显示所述二维码至显示屏上; 所述用户终端对所述显示屏进行扫描, 以获取所述二维码。
4、 如权利要求 1所述的接入点的接入方法, 其特征在于, 所述用户终端 获取二维码, 包括: 用户终端获取携带有二维码的图片; 所述用户终端解析所述携带有所述二维码的图片, 获得所述二维码。
5、 如权利要求 4所述的接入点的接入方法, 其特征在于, 所述用户终端 获取携带有二维码的图片, 包括: 用户终端发送第一请求至所述接入点, 以使所述接入点生成携带有二维 码的图片, 所述第一请求用于请求获取携带有二维码的图片; 所述用户终端接收所述接入点发送的第一信息, 所述第一信息中包括携 带有所述二维码的图片。
6、 如权利要求 5所述的接入点的接入方法, 其特征在于, 所述用户终端 发送第一请求至所述接入点之后, 以及所述用户终端接收所述接入点发送的 第一信息之前, 所述方法还包括: 所述用户终端接收所述接入点发送的付费请求信息, 以使用户根据所述 付费请求信息进行付费, 所述付费请求信息中包括资费标准和资费方式, 所 述第一信息中还包括接入所述接入点的时长信息或者流量信息。
7、 如权利要求 3所述的接入点的接入方法, 其特征在于, 所述用户终端 对所述显示屏进行扫描, 包括: 所述用户终端通过照相设备对所述显示屏进行扫描。
8、 如权利要求 1或 2或 3所述的接入点的接入方法, 其特征在于, 所述 二维码的信息还包括接入所述接入点的时长信息或者流量信息。
9、 一种接入点的接入方法, 其特征在于, 包括: 接收用户终端发送的扫描请求; 生成二维码; 显示所述二维码至显示屏上,以使所述用户终端对所述显示屏进行扫描, 以获取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的 信息, 所述二维码的信息包括接入所述接入点的接入密码和所述接入点的标 识, 由所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标 识接入所述接入点。
10、 如权利要求 9所述的接入点的接入方法, 其特征在于, 所述生成二 维码, 包括: 根据所述接入点的标识、 接入所述接入点的接入密码以及加密方式生成 二维码。
11、 一种接入点的接入方法, 其特征在于, 包括: 发送携带有二维码的图片给用户终端, 以使所述用户终端获取携带有所 述二维码的图片; 并由所述用户终端解析所述携带有所述二维码的图片, 获 取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码和所述接入点的标识, 由 所述用户终端根据所述接入所述接入点的接入密码和所述接入点的标识接入 所述接入点。
12、 如权利要求 11所述的接入点的接入方法, 其特征在于, 所述发送携 带有二维码的图片给用户终端, 包括: 接收用户终端发送的第一请求, 所述第一请求用于请求获取携带有二维 码的图片; 生成携带有所述二维码的图片; 发送第一信息给所述用户终端, 以使所述用户终端获取所述第一信息, 所述第一信息中包括携带有所述二维码的图片。
13、 如权利要求 12所述的接入点的接入方法, 其特征在于, 所述接收所 述用户终端发送的第一请求之后, 以及所述发送第一信息给所述用户终端之 前, 所述方法还包括: 发送付费请求信息给所述用户终端, 以使用户根据所述付费请求信息进 行付费, 所述付费请求信息中包括资费标准和资费方式, 所述第一信息中还 包括接入所述接入点的时长信息或者流量信息。
14、 如权利要求 12 所述的接入点的接入方法, 其特征在于, 所述生成 携带有所述二维码的图片, 包括: 生成所述二维码; 以图片形式封装所述二维码。
15、 如权利要求 14所述的接入点的接入方法, 其特征在于, 所述生成所 述二维码, 包括: 根据所述接入点的标识、 所述接入所述接入点的接入密码以及加密方式 生成所述二维码。
16、 一种用户终端, 其特征在于, 包括: 获取单元, 用于获取二维码; 处理单元, 用于解析所述二维码, 获得所述二维码的信息, 所述二维码 的信息包括接入一接入点的接入密码和所述接入点的标识; 所述处理单元, 还用于根据所述接入所述接入点的接入密码和所述接入 点的标识接入所述接入点。
17、 如权利要求 16所述的用户终端, 其特征在于, 所述获取单元, 具体用于通过扫描方式获取二维码。
18、 如权利要求 17所述的用户终端, 其特征在于, 所述获取单元, 具体 用于发送扫描请求给一接入点, 以使所述接入点生成二维码, 并由所述接入 点显示所述二维码至显示屏上, 以及用于对所述显示屏进行扫描, 以获取所 述二维码。
19、 如权利要求 16所述的用户终端, 其特征在于, 所述获取单元, 具体 用于获取携带有二维码的图片, 还用于解析所述携带有所述二维码的图片, 获得所述二维码。
20、 如权利要求 19所述的用户终端, 其特征在于, 所述获取单元, 还用 于发送第一请求至所述接入点, 以使所述接入点生成携带有二维码的图片, 所述第一请求用于请求获取携带有二维码的图片; 所述获取单元, 还用于接收所述接入点发送的第一信息, 所述第一信息 中包括携带有所述二维码的图片。
21、 如权利要求 20所述的用户终端, 其特征在于, 所述获取单元, 还用 于接收所述接入点发送的付费请求信息, 以使用户根据所述付费请求信息进 行付费后接收所述接入点发送的第一信息, 所述付费请求信息中包括资费标 准和资费方式, 所述第一信息中还包括接入所述接入点的时长信息或者流量 信息。
22、 如权利要求 18所述的用户终端, 其特征在于, 所述获取单元, 还用于通过照相设备对所述显示屏进行扫描。
23、 如权利要求 16或 17或 18所述的用户终端, 其特征在于, 所述二维码 的信息还包括接入所述接入点的时长信息或者流量信息。
24、 一种接入点, 其特征在于, 包括: 接收单元, 用于接收用户终端发送的扫描请求; 处理单元, 用于根据接收单元接收到的所述扫描请求生成二维码; 显示单元, 用于显示所述二维码至显示屏上, 以使所述用户终端对所述 显示屏进行扫描, 以获取所述二维码, 并由所述用户终端解析所述二维码, 获取所述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码 和所述接入点的标识, 由所述用户终端根据所述接入所述接入点的接入密码 和所述接入点的标识接入所述接入点。
25、 如权利要求 24所述的接入点, 其特征在于, 所述处理单元, 具体用 于根据所述接入点的标识、 接入所述接入点的接入密码以及加密方式生成二 维码。
26、 一种接入点, 其特征在于, 包括: 发送单元, 用于发送携带有二维码的图片给用户终端, 以使所述用户终 端获取携带有所述二维码的图片; 并由所述用户终端解析所述携带有所述二 维码的图片, 获取所述二维码, 并由所述用户终端解析所述二维码, 获取所 述二维码的信息, 所述二维码的信息包括接入所述接入点的接入密码和所述 接入点的标识, 由所述用户终端根据所述接入所述接入点的接入密码和所述 接入点的标识接入所述接入点。
27、 如权利要求 26所述的接入点, 其特征在于, 所述发送单元, 具体用 于接收用户终端发送的第一请求, 所述第一请求用于请求获取携带有二维码 的图片, 以及用于根据所述第一请求生成携带有所述二维码的图片, 发送第 一信息给所述用户终端, 以使所述用户终端获取所述第一信息, 所述第一信 息中包括携带有所述二维码的图片。
28、 如权利要求 27所述的接入点, 其特征在于, 所述发送单元, 还用于 发送付费请求信息给所述用户终端, 以使用户根据所述付费请求信息进行付 费, 所述付费请求信息中包括资费标准和资费方式, 所述第一信息中还包括 接入所述接入点的时长信息或者流量信息。
29、 如权利要求 27 所述的接入点, 其特征在于, 所述发送单元, 还用 于生成所述二维码; 以及用于以图片形式封装所述二维码。
30、 如权利要求 29所述的接入点, 其特征在于, 所述发送单元, 还用于 根据所述接入点的标识、 所述接入所述接入点的接入密码以及加密方式生成 所述二维码。
PCT/CN2013/080964 2013-01-29 2013-08-07 接入点的接入方法及相关设备 WO2014117493A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
EP13794786.7A EP2779723B1 (en) 2013-01-29 2013-08-07 Method and related device for accessing access point
JP2014559087A JP5978517B2 (ja) 2013-01-29 2013-08-07 アクセスポイントにアクセスするための方法および関連デバイス
US14/143,932 US20140214660A1 (en) 2013-01-29 2013-12-30 Method and related device for accessing access point

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310034152.9A CN103974257B (zh) 2013-01-29 2013-01-29 接入点的接入方法及相关设备
CN201310034152.9 2013-01-29

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/143,932 Continuation US20140214660A1 (en) 2013-01-29 2013-12-30 Method and related device for accessing access point

Publications (1)

Publication Number Publication Date
WO2014117493A1 true WO2014117493A1 (zh) 2014-08-07

Family

ID=51243197

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2013/080964 WO2014117493A1 (zh) 2013-01-29 2013-08-07 接入点的接入方法及相关设备

Country Status (4)

Country Link
EP (1) EP2779723B1 (zh)
JP (1) JP5978517B2 (zh)
CN (1) CN103974257B (zh)
WO (1) WO2014117493A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016535367A (ja) * 2014-08-15 2016-11-10 小米科技有限責任公司Xiaomi Inc. アクセス認証方法、装置、システム、プログラム及び記録媒体
CN110162722A (zh) * 2019-04-12 2019-08-23 深圳壹账通智能科技有限公司 基于二维码的产品推荐方法、服务器及存储介质
WO2024002300A1 (zh) * 2022-06-30 2024-01-04 先临三维科技股份有限公司 设备接入无线网络的方法、装置及存储介质

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103687063B (zh) * 2013-12-02 2016-03-23 小米科技有限责任公司 一种连接网络的方法、装置及终端设备
CN111556497B (zh) 2014-08-21 2022-06-10 华为技术有限公司 无线网络接入控制方法及设备、系统
TWI539858B (zh) * 2014-08-22 2016-06-21 物聯智慧科技(深圳)有限公司 電子裝置與外部網路之連線設定方法及電子裝置
CN105472694B (zh) * 2014-09-05 2020-04-07 腾讯科技(深圳)有限公司 通过扫描二维码接入WiFi的方法、装置、终端及存储介质
CN105392136A (zh) * 2014-09-09 2016-03-09 中兴通讯股份有限公司 一种基于二维码访问路由器的方法及装置
CN106211205B (zh) * 2015-04-30 2019-04-30 广东美的制冷设备有限公司 配置方法及系统、家用电器、移动终端和服务器
CN106100890A (zh) * 2016-06-28 2016-11-09 杭州威威网络科技有限公司 一种通过设备自动扫描二维码完成参数配置的方法
CN107635229A (zh) * 2016-07-15 2018-01-26 中兴通讯股份有限公司 一种wifi共享的方法和装置
CN106658360A (zh) * 2016-10-19 2017-05-10 广东欧珀移动通信有限公司 一种数据传输方法及设备
CN106714333A (zh) * 2016-11-14 2017-05-24 广东欧珀移动通信有限公司 一种数据迁移的方法及终端
CN107567025B (zh) * 2017-09-14 2019-02-26 宁波大红鹰学院 基于电子钱包消费模式的wlan准入管理系统和方法

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431752A (zh) * 2007-11-09 2009-05-13 北京华旗资讯数码科技有限公司 利用多算法实现无线局域网的保密通信方法
WO2011128725A1 (en) * 2010-04-13 2011-10-20 Nokia Corporation Method and apparatus for providing machine initial access procedure for machine to machine communication
CN102724668A (zh) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 一种基于二维码图形的wifi网络信息共享方法及系统
CN202665403U (zh) * 2012-01-10 2013-01-16 杭州动众广告策划有限公司 一种具有网络接入功能的餐巾纸

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4480478B2 (ja) * 2004-06-15 2010-06-16 株式会社バッファロー アクセスポイントおよび外部記憶装置を含むシステム、アクセスポイント、無線lan接続方法、無線lan接続プログラムを記録した媒体および無線lanシステム
JP2006261938A (ja) * 2005-03-16 2006-09-28 Sony Corp 通信システム、通信装置および方法、記録媒体、並びにプログラム
JP2009124409A (ja) * 2007-11-14 2009-06-04 Sony Corp 撮像装置、無線通信システム、無線通信設定方法及びプログラム
US20110150266A1 (en) * 2009-12-22 2011-06-23 Dirk Hohndel Automated security control using encoded security information
JP5729161B2 (ja) * 2010-09-27 2015-06-03 ヤマハ株式会社 通信端末、無線機、及び無線通信システム
KR101836876B1 (ko) * 2011-03-02 2018-03-09 삼성전자주식회사 휴대용 단말기에서 네트워크 연결을 수행하기 위한 장치 및 방법
EP2693689A1 (de) * 2012-07-31 2014-02-05 Siemens Aktiengesellschaft Netzwerkkonfiguration per computerlesbaren optischen Code

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431752A (zh) * 2007-11-09 2009-05-13 北京华旗资讯数码科技有限公司 利用多算法实现无线局域网的保密通信方法
WO2011128725A1 (en) * 2010-04-13 2011-10-20 Nokia Corporation Method and apparatus for providing machine initial access procedure for machine to machine communication
CN202665403U (zh) * 2012-01-10 2013-01-16 杭州动众广告策划有限公司 一种具有网络接入功能的餐巾纸
CN102724668A (zh) * 2012-06-15 2012-10-10 惠州Tcl移动通信有限公司 一种基于二维码图形的wifi网络信息共享方法及系统

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2016535367A (ja) * 2014-08-15 2016-11-10 小米科技有限責任公司Xiaomi Inc. アクセス認証方法、装置、システム、プログラム及び記録媒体
CN110162722A (zh) * 2019-04-12 2019-08-23 深圳壹账通智能科技有限公司 基于二维码的产品推荐方法、服务器及存储介质
WO2024002300A1 (zh) * 2022-06-30 2024-01-04 先临三维科技股份有限公司 设备接入无线网络的方法、装置及存储介质

Also Published As

Publication number Publication date
JP5978517B2 (ja) 2016-08-24
EP2779723A4 (en) 2014-12-31
EP2779723A1 (en) 2014-09-17
EP2779723B1 (en) 2018-02-28
CN103974257A (zh) 2014-08-06
CN103974257B (zh) 2018-08-14
JP2015510363A (ja) 2015-04-02

Similar Documents

Publication Publication Date Title
WO2014117493A1 (zh) 接入点的接入方法及相关设备
US9179314B2 (en) Secure and automatic connection to wireless network
TWI634771B (zh) Wisdom device and method and device for establishing Bluetooth connection between devices
JP5897137B2 (ja) ワイヤレスローカルエリアネットワーク認証方法およびモバイル端末
US8925042B2 (en) Connecting devices to an existing secure wireless network
US20160119316A1 (en) Wireless network authentication method and wireless network authentication apparatus
CN107529160B (zh) 一种VoWiFi网络接入方法和系统、终端及无线访问接入点设备
CN109922474B (zh) 触发网络鉴权的方法及相关设备
US11871223B2 (en) Authentication method and apparatus and device
WO2023280194A1 (zh) 网络连接管理方法、装置、可读介质、程序产品及电子设备
US11197157B2 (en) Method, apparatus, and system for performing authentication on terminal in wireless local area network
CN111132305B (zh) 5g用户终端接入5g网络的方法、用户终端设备及介质
WO2018233726A1 (zh) 网络切片的认证方法及相应装置、系统和介质
US10750363B2 (en) Methods and apparatuses for conditional WiFi roaming
WO2021239098A1 (zh) 业务获取方法、装置、通信设备及可读存储介质
US8229398B2 (en) GSM authentication in a CDMA network
CN101800984A (zh) 获取wapi证书的方法、服务器端及wapi认证系统
US20140214660A1 (en) Method and related device for accessing access point
CN111093196B (zh) 5g用户终端接入5g网络的方法、用户终端设备及介质
US20190200226A1 (en) Method of authenticating access to a wireless communication network and corresponding apparatus
CN111132167B (zh) 5g用户终端接入5g网络的方法、用户终端设备及介质
CN109379744B (zh) 伪基站识别方法、装置及通信终端
US20220408258A1 (en) Methods and apparatuses for facilitating connection to a wifi network
WO2017041298A1 (zh) 验证无线局域网接入点的方法、终端、服务平台、接入点和接入点后台
CN114430497A (zh) 投屏设备自动无线连接方法、装置、投屏器及存储介质

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 2013794786

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2014559087

Country of ref document: JP

Kind code of ref document: A

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 13794786

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE