WO2015027712A1 - Network access method of mobile terminal, mobile terminal, and terminal device - Google Patents

Network access method of mobile terminal, mobile terminal, and terminal device Download PDF

Info

Publication number
WO2015027712A1
WO2015027712A1 PCT/CN2014/076040 CN2014076040W WO2015027712A1 WO 2015027712 A1 WO2015027712 A1 WO 2015027712A1 CN 2014076040 W CN2014076040 W CN 2014076040W WO 2015027712 A1 WO2015027712 A1 WO 2015027712A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
authorization
wifi network
mobile terminal
access
Prior art date
Application number
PCT/CN2014/076040
Other languages
French (fr)
Chinese (zh)
Inventor
王斌
刘道宽
翁海斌
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201310385160.8 priority Critical
Priority to CN201310385160.8A priority patent/CN103476030B/en
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Publication of WO2015027712A1 publication Critical patent/WO2015027712A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/00502Time aware
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/005Context aware security
    • H04W12/00503Location or proximity aware, e.g. using proximity to other devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

Provided are a network access method of a mobile terminal, a mobile terminal, and a terminal device. The method comprises: receiving a request message sent by a mobile terminal and used for accessing a WIFI network, the request message comprising access information of an encrypted WIFI network and further comprising first entitlement information; determining whether the mobile terminal satisfies corresponding entitlement distance information and/or entitlement time information in the first entitlement information; if yes, decrypting the access information of the WIFI network; and after it is determined, according to a decryption result, that the access information of the WIFI network is correct, entitling the mobile terminal to access the WIFI network. The solution according to the embodiments of the present disclosure improves the access efficiency of a WIFI network, avoids leakage of access information of the WIFI network, and ensures security of the WIFI network.

Description

 The invention relates to a method for a mobile terminal to connect to a network, a mobile terminal and a terminal device. The application is based on a Chinese patent application with the application number 201310385160.8 and the application date being 2013/8/29, and claims the priority of the Chinese patent application, the entire Chinese patent application The contents are incorporated herein by reference. Technical field

 The present disclosure relates to the field of communications technologies, and in particular, to a method for connecting a mobile terminal to a network, a mobile terminal, and a terminal device. Background technique

 With the development of communication technologies, it has become more and more common for people to log in to wireless networks using mobile terminals for various network accesses and interactions. To this end, more and more places have set up WIFI (Wireless Fidelity) networks to facilitate mobile terminal users to access the network.

 When the mobile terminal user accesses the WIFI network in different places providing the WIFI network, the mobile device needs to be configured differently to access, for example, when accessing the WIFI network of a new place, the mobile terminal needs to be reconfigured with the WIFI. VPN (Virtual Private Network), access password, certificate information of access network, AP (Access Point, access node), etc. At present, these configuration information is usually told by the mobile terminal user by means of verbal or text, and then manually input and configured by the mobile terminal user, and only after the input and configuration are completely correct, the corresponding WIFI network can be accessed.

 In the process of inputting and configuring the above-mentioned access to the WIFI network, on the one hand, the mobile terminal user needs to manually input these configurations each time, the operation is troublesome and the reliability is not high, such as the user sometimes hears the error, or the operation error, or the root Will not operate, so that the mobile terminal user can not access the WIFI network or access the WIFI network is inefficient, and increases the user's operational burden; on the other hand, these configuration information is easy to leak, thus providing a place for the WIFI network The security impact, especially in some cases, such as private home WIFI networks, these configurations are related to the privacy of the user, and once leaked, it will cause immeasurable adverse effects on the user. Summary of the invention

 The embodiments of the present disclosure provide a method for a mobile terminal to connect to a network, a mobile terminal, and a terminal device, to solve the problem that the access efficiency of the mobile terminal to access the WIFI network is low, and the security of the WIFI network cannot be guaranteed.

 According to a first aspect of the embodiments of the present disclosure, a method for a mobile terminal to connect to a network, includes: receiving a request message sent by a mobile terminal for accessing a WIFI network, where the request message includes the encrypted In addition to the access information of the WIFI network, the first authorization information is further included, where the first authorization information includes authorization distance information and/or authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network. The authorization time information is used to indicate an authorized use period of the WIFI network;

Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time in the first authorization information Information

 If yes, decrypt the access information of the WIFI network;

 After determining that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network.

 According to a second aspect of the embodiments of the present disclosure, a method for a mobile terminal to connect to a network, includes: sending a request message for connecting to the WIFI network to a device that provides a WIFI network, where the request message includes the encrypted In addition to the access information of the WIFI network, the first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network. The authorization time information is used to indicate an authorized use period of the WIFI network;

 After the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network. According to a third aspect of the embodiments of the present disclosure, a terminal device is provided, where the terminal device has a connection network right, and the terminal device includes:

 a first receiving module, configured to receive a request message that is sent by the mobile terminal and used to access the WIFI network, where the request message includes the first authorization information, in addition to the encrypted access information of the WIFI network, The first authorization information authorization distance information and/or authorization time information, the authorization distance information is used to indicate an authorized coverage area of the WIFI network, and the authorization time information is used to indicate authorized use of the WIFI network. a judging module, configured to determine whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;

 An authorization module, configured to: if the judgment result of the determining module is satisfied, decrypt the access information of the WIFI network; and after determining that the access information of the WIFI network is correct according to the decryption result, authorizing the mobile terminal Access to the WIFI network.

 According to a fourth aspect of the embodiments of the present disclosure, a mobile terminal is provided, including:

 a sending module, configured to send, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where The authorization information includes the authorization distance information and/or the authorization time information, wherein the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network. An access module, configured to: after the device that provides the WIFI network determines validity according to the request message, access the WIFI network.

According to a fifth aspect of embodiments of the present disclosure, there is provided a terminal device including a memory, and one or more programs, wherein one or more programs are stored in a memory and configured to be one or more The processor executing the one or more programs includes instructions for: receiving a request message sent by the mobile terminal for accessing the WIFI network, wherein the request message includes the encrypted WIFI network And the first authorization information, where the first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network, The authorization time information is used to indicate an authorized use period of the WIFI network; Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;

 If yes, decrypt the access information of the WIFI network;

 After determining that the access information of the WIFI network is correct according to the decryption result, authorizing the mobile terminal to access the WIFI network;

 Wohe / or

 And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization. The distance information and/or the authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network;

 After the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network. The technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:

 In the embodiment of the present disclosure, the request message for accessing the WIFI network carries the first authorization information, where the first authorization information includes the authorization distance information or the authorization time information or both, and the WIFI network indicated by the two types of information is used. The use of one or all of the authorization coverage and the authorized usage time period controls the use of the WIFI network by the mobile terminal. When the mobile terminal accesses the WIFI network, it automatically determines whether the mobile terminal satisfies the corresponding authorized distance information and/or authorization time information in the first authorization information, that is, automatically determines whether the mobile terminal is authorized to cover the WIFI network indicated by the authorized distance information. In the range, or determining whether the time for the mobile terminal to send the authorization information is within the time period indicated by the authorization time information, or both, when the judgment result is yes and the WIFI network access information in the authorization information is correct, The mobile terminal can access the WIFI network without manual input and configuration, and the WIFI network access information will not be leaked due to display or notification. It can be seen that, by adopting the solution of the embodiment of the present disclosure, on the one hand, the input and configuration are not manually performed, the access efficiency of the WIFI network is improved, and the use burden of the mobile terminal user is reduced; on the other hand, the access information of the WIFI network is not The user is explicitly notified, and the user can access the WIFI network without knowing the WIFI network access information, thereby avoiding the leakage of the WIFI network access information and ensuring the security of the WIFI network.

 The above general description and the following detailed description are intended to be illustrative and not restrictive. DRAWINGS

 The drawings herein are incorporated in and constitute a part of the specification, and illustrate embodiments of the invention,

1 is a flow chart of a method for a mobile terminal to connect to a network according to an exemplary embodiment. FIG. 2 is a flow chart showing a method for a mobile terminal to connect to a network according to an exemplary embodiment. FIG. 3 is an example according to an example. FIG. 4 is a flow chart showing the steps of a method for a mobile terminal to connect to a network according to an exemplary embodiment. FIG. 5 is a flowchart according to an exemplary embodiment. Flow chart of steps for authorizing interaction of the mobile terminal; FIG. 6 is a structural block diagram of a terminal device according to an exemplary embodiment;

 FIG. 7 is a structural block diagram of a terminal device according to an exemplary embodiment;

 FIG. 8 is a structural block diagram of a mobile terminal according to an exemplary embodiment;

 FIG. 9 is a structural block diagram of a mobile terminal according to an exemplary embodiment;

 FIG. 10 is a schematic structural diagram of a mobile terminal authorization system according to an exemplary embodiment; FIG. 11 is a schematic structural diagram of a terminal device according to an exemplary embodiment;

 FIG. 12 is a schematic structural diagram of a router according to an exemplary embodiment. detailed description

 The above-described objects, features and advantages of the present invention will become more apparent from the aspects of the appended claims.

 Embodiment 1

 Referring to FIG. 1, a flow chart of steps of a method for a mobile terminal to connect to a network according to a first embodiment of the present disclosure is shown. In this embodiment, the method for connecting the network to the mobile terminal of the present disclosure is described from the service side, such as the wireless router side that is connected to the server. The method for the mobile terminal to connect to the network in this embodiment includes the following steps:

 In step S102, a request message for accessing the WIFI network sent by the mobile terminal is received.

 The request message includes, in addition to the access information of the encrypted WIFI network, the first authorization information, where the first authorization information includes any one or all of the authorization distance information and the authorization time information; the authorization distance information is used to indicate The authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.

 The access information of the WIFI network includes information for accessing the WIFI network, such as VPN (Virtual Private

Network, virtual private network), access password, certificate information of access network, AP (Access Point, access node). The encryption method of the access information can be selected by any person skilled in the art according to the actual situation, such as using the MD5 algorithm and the RSA algorithm (RSA is 1977 by Ron Rivest, Adi Samor) (Adi Shamir) and Leonard Adleman proposed that RSA is composed of the initials of their three surnames.), DES (Data Encryption Standard) algorithm for encryption, etc. The embodiment of the present disclosure does not limit this. The authorization distance information is used to indicate the accessibility coverage of the WIFI network. The authorization time information is used to indicate the authorized use time period of the WIFI network. In an actual application, the authorized use time period may be a time period such as 8AM to 10AM, or may be an expiration date, such as 24 hours from the time when the authorization information is sent, etc. .

 In step S104, it is determined whether the mobile terminal satisfies the corresponding authorized distance information and/or the authorization time information in the first authorization information; if yes, step S106 is performed; if not, step S110 is performed.

 When the first authorization information includes the authorization distance information and does not include the authorization time information, the wireless router or the hotspot device providing the WIFI network may only judge whether the mobile terminal is within the authorization coverage of the WIFI network indicated by the authorization distance information;

When the first authorization information includes the authorization time information and does not include the authorization distance information, the wireless router provides The hotspot device of the win network may only judge whether the time when the mobile terminal sends the request message is within the authorized use period of the WIFI network indicated by the authorization time information;

 When the first authorization information includes both the authorized distance information and the authorized time information, the line router or the hotspot device providing the WIFI network needs to determine whether the mobile terminal is within the authorized coverage of the WIFI network indicated by the authorized distance information, and determine the mobile Whether the time at which the terminal sends the authorization information is within the authorized use period of the WIFI network indicated by the authorization time information.

 The authorization coverage and the authorized usage time period are flexibly set by those skilled in the art according to actual needs, and the disclosure does not limit this.

 In step S106, if it is determined that the mobile terminal satisfies the corresponding authorized distance information and/or the authorized time information in the first authorization information, decrypting the access information of the WIFI network in the request message sent by the mobile terminal, and determining the decryption Whether the access information of the subsequent WIFI network is correct, if yes, step S108 is performed; if not, step S1 lOo is performed.

 In step S108, after determining that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network, and the process ends.

 In step S110, the mobile terminal is not allowed to access the WIFI network, and the process ends.

 In this embodiment, the request message for accessing the WIFI network carries the first authorization information, where the first authorization information includes the authorization distance information or the authorization time information or both, and the authorization of the WIFI network indicated by the foregoing two types of information One or all of the coverage and authorized usage time periods control the use of the WIFI network by the mobile terminal. When the mobile terminal accesses the WIFI network, it automatically determines whether the mobile terminal satisfies the corresponding authorized distance information and/or authorization time information in the first authorization information, that is, automatically determines whether the mobile terminal is authorized to cover the WIFI network indicated by the authorized distance information. In the range, or determining whether the time for the mobile terminal to send the authorization information is within the time period indicated by the authorization time information, or both, when the determination result is yes, then determining the WIFI network connection in the request message. Whether the incoming information is correct or not, if the access information is also correct, the mobile terminal is allowed to access the WIFI network without manual input and configuration, and the WIFI network access information is not leaked due to display or notification. And if it is automatically determined whether the mobile terminal satisfies the determination result of the corresponding authorization distance information and/or the authorization time information in the first authorization information, or if the judgment result is yes, but the WIFI network access information is incorrect, The mobile terminal is not allowed to access the WIFI network. It can be seen that, by using the solution of the embodiment, on the one hand, no manual input and configuration are required, the access efficiency of the WIFI network is improved, and the use burden of the mobile terminal user is reduced; on the other hand, the access information of the WIFI network is no longer used. Explicitly notify the user that the user can access the WIFI network without knowing the WIFI network access information, avoiding the leakage of the WIFI network access information, and ensuring the security of the WIFI network.

 Embodiment 2

Referring to FIG. 2, a flow chart of steps of a method for a mobile terminal to connect to a network according to a second embodiment of the present disclosure is shown. In this embodiment, a method for connecting a mobile terminal of the present disclosure to a terminal device having a connection network authority, such as a wireless router or a network hotspot, is taken as an example. The terminal device having the connection authority of the network has been connected to the network side server, and receives the request message sent by the mobile terminal and processes it. The method for connecting a mobile terminal to a network in this embodiment includes the following steps:

 In step S202, the terminal device having the connection authority of the network generates the second authorization information, and sends the second authorization information to the mobile terminal through the FC (Near Field Communication) technology.

 The generated second authorization information includes one or all of the authorization distance information and the authorization time information, in addition to the access information of the encrypted WIFI network and the related information of the terminal device. The related information of the terminal device may be related description or description information of the terminal device, and does not have a substantial impact on the mobile terminal connection network of the embodiment. By including one or all of the encrypted access information or Token, and the authorized distance information and the authorized time information, the second authorization information becomes an authorization information including distance and/or time, only in Valid for a certain distance and / or time. In this embodiment, the setting of the second authorization information includes the authorization distance information and the authorization time information.

 Further, the second authorization information may also have a right of being shared by a plurality of mobile terminals.

 The second authorization information may also include the device information of the mobile terminal. When the second authorization information includes the device information of the mobile terminal, the second authorization information is only used for the WIFI network authorization of the mobile terminal. The authorization information cannot be shared with other mobile terminals, that is, when other mobile terminals request access to the WIFI network using the authorization information containing the device information, they will be rejected. Conversely, if the device information of the mobile terminal is not included in the second authorization information, the second authorization information may be shared by the plurality of mobile terminals, that is, the access to the WIFI network may be shared by the plurality of mobile terminals.

 Another possible way is: when the terminal device having the network access authority generates the second authorization information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes the sharing permission. Through the sharing permission, the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals. At this time, when the mobile terminal shares the access information of the WIFI network to other mobile terminals, the new authorization distance information and/or the authorization time information may be automatically generated, and the new authorization distance information and/or the authorization time information may be The original authorization distance information and/or the authorization time information may be the same, or may be different. For example, the authorization time of one mobile terminal is a permanent authorization, and the new authorization time generated by the mobile terminal is 3 hours, and the mobile terminal will have 3 The hour's authorization time is shared with other mobile terminals. That is, when the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals: the mobile terminal acquires the authorization distance information and/or the authorization time information in the second authorization information; The distance information and/or the authorization time information, the corresponding temporary authorization distance information and/or the temporary authorization time information are configured, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorized distance information, and the temporary authorization time information is The indicated WIFI network usage time period is within the time period indicated by the authorization distance information; the temporary authorization distance information and/or the temporary authorization time information, and the encrypted WIFI network access information in the second authorization information are used to generate the temporary authorization. Information; Send temporary authorization information to other mobile terminals requesting sharing authorization.

In this embodiment, the second authorization information is sent to the mobile terminal by using the FC technology, for example, by using an FC chip or a dedicated FC device. However, it is not limited thereto, and other transmission methods are also applicable, such as by other suitable devices or directly through a wireless network or a WIFI network or an existing connection method. FC technology is a relatively common and adopted data transmission and interaction technology, with fast transmission speed, simple implementation and low implementation cost. In this step, the terminal device having the connection authority of the network may be a wireless router, a network hotspot, or a mobile terminal.

 In step S204, the mobile terminal receives the second authorization information, obtains the authorized distance information and/or the authorized time information, and generates the first authorization information.

 In step S206, when the mobile terminal needs to access the WIFI network, the request message is generated and sent to the terminal device having the connection network authority, and the terminal device having the connection network authority receives the request message sent by the mobile terminal by using the FC technology.

 The request message sent by the mobile terminal to the terminal device having the connection network includes the access information of the encrypted WIFI network in addition to the first authorization information generated in step S204, and may also have a current location similar to the mobile terminal. , current time and other information.

 Starting from this step, the terminal device with the right to connect to the network is a device capable of providing a WIFI network, such as a wireless router, a network hotspot, etc., and no longer includes the mobile terminal.

 In step S208, the terminal device having the connection network authority determines whether the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information; if yes, step S210 is performed; if not, step S214 is performed. .

 The determining, by the terminal device having the connection authority of the network, whether the mobile terminal meets the corresponding authorization distance information and/or the authorization time information in the first authorization information comprises: determining whether the current location of the mobile terminal is in the WIFI network indicated by the corresponding authorized distance information Within the authorized coverage; and/or, determining whether the current time of the mobile terminal is within the authorized use period of the WIFI network indicated by the corresponding authorized time information.

 In this embodiment, since the first authorization information includes both the authorization distance information and the authorization time information, the terminal device having the network connection authority needs to determine the location and time of the mobile terminal, and only the current location of the mobile terminal is in the WIFI. The current time in the authorized coverage of the network and the time when the authorization information is sent is within the authorized use period, and subsequent processing is performed; otherwise, the mobile terminal is denied access to the WIFI network. Of course, in the case of only one of the authorization distance information and the authorization time information, it is only necessary to judge the corresponding part.

 The terminal device with the connection network authority may first obtain the location information of the mobile terminal, such as GPS information or WIFI signal strength information, when determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information. And determining, according to the location information of the mobile terminal or the WIFI signal strength information, whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information. However, the method for determining whether the mobile terminal is within the authorized coverage of the WIFI network indicated by the authorized distance information is also applicable according to the current location of the mobile terminal, for example, obtaining the location information of the mobile terminal by using the base station, and determining according to the location information. Wait.

When the request message further includes the device information of the mobile terminal, the terminal device having the connection network authority further needs to determine, in this step, the stored device information used when generating the second authorization information, and the request message sent by the received mobile terminal. Whether the device information matches. Only when the terminal device having the connection network authority determines that the stored device information used when generating the second authorization information matches the device information in the request message sent by the received mobile terminal, The terminal device that accesses the network authority performs the subsequent step S210 to authorize the mobile terminal to access the WIFI network; otherwise, the terminal device having the connection network authority will refuse the mobile terminal to access the WIFI network.

 When the second authorization information does not include the device information of the mobile terminal, the terminal device having the connection network permission allows the mobile terminal to access the WIFI network in the second authorization information, and the authorization distance information and/or the authorization time information. Sharing to other mobile terminals, that is, other mobile terminals that do not directly receive authorization information from a terminal device having a connection network right, but obtain authorization information from another mobile terminal, and can also use the authorization information to access WIFI. The internet.

 In step S210, if the terminal device having the connection network authority determines that the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information, accessing the WIFI network in the authorization information sent by the mobile terminal The information is decrypted, and step S212 is performed.

 In step S212, when the terminal device having the connection network authority determines that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network, and the current process is terminated.

 In an embodiment, when the first authorization information further includes the device information of the mobile terminal, after the step of determining that the access information of the WIFI network is correct, the method further includes: the device information carried by the received request message and the stored standard. The device information is matched; if it is matched, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access the WIFI. The internet. This is because the APP (application) that controls the setting of the wireless router can be installed on the mobile terminal, if the mobile terminal is the authorization information directly obtained from the wireless router, and the device information carried in the request message sent by the mobile terminal to the wireless router is If the standard device information stored in the wireless router matches, the mobile terminal can not only access the WIFI network but also set the WIFI network; and if the mobile terminal that sends the request message to the wireless router is authorized from other mobile terminals Information, even if the mobile terminal carries its own device information in the request message, the device information cannot match the standard device information stored in the wireless router, and at this time, the mobile terminal can only access the WIFI network, and Unable to set up the WIFI network.

 In addition, after the mobile terminal accesses the WIFI network, there may be a network failure that causes the network to be interrupted. At this time, when the connection between the mobile terminal and the WIFI network is interrupted and the connection is restored, the terminal device having the network access authority determines that the distance is interrupted. If the request message sent by the mobile terminal is received again within the set time period, the mobile terminal is directly authorized to access the WIFI network. If the WIFI network is interrupted, the mobile terminal cannot access the WIFI network, and the mobile terminal may still be within the authorized coverage and/or authorized use period of the WIFI network. After the WIFI network resumes connection, the mobile terminal again sends the server to the server. Sending the same request message, requesting to access the WIFI network again, as long as the request message is sent within a set time period after the interruption, because the access information and the authorization information carried in the request message are the same as before The terminal device that has the right to connect to the network will no longer verify the legality of the location and/or time of the mobile terminal, and will no longer verify the access information and correctness, and directly allow the mobile terminal to access again. WIFI network. The setting time period is flexibly set by a person skilled in the art according to actual needs, and the disclosure does not limit this.

In step S214, the terminal device having the connection authority of the network does not allow the mobile terminal to access the WIFI network, and ends. This process.

 In this embodiment, the authorization information is exchanged through the FC technology, and can be changed at any time without manual intervention, and does not require manual memory, and is convenient and secure. The authorization information includes authorization distance information and authorization time information, which can effectively control the use of the authorization information. Space and time effectively ensure the safe use of WIFI networks.

 Embodiment 3

 Referring to FIG. 3, a flow chart of steps of a method for a mobile terminal to connect to a network according to Embodiment 3 of the present disclosure is shown. In this embodiment, the method for connecting the mobile terminal of the present disclosure to the mobile terminal side that requests access to the WIFI network is described, and the following steps are included:

 In step S302, the mobile terminal sends a request message for connecting to the WIFI network to the device providing the WIFI network. The request message is used to request access to the WIFI network, and the request message includes the first authorization information, and the first authorization information includes one of authorization distance information and authorization time information, in addition to the access information of the encrypted WIFI network. Or all. The authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.

 The device providing the WIFI network can be used for the mobile terminal to connect to the WIFI network. In this case, the device can be a wireless router or a network hotspot; the device providing the WIFI network can also generate authorization information, and when generating the authorization information, the device providing the WIFI network It may be a terminal device having a connection network authority such as the above-mentioned wireless router or network hotspot, or may be a mobile terminal. When it is a mobile terminal, the mobile terminal may generate temporary authorization information to share with other mobile terminals.

 In step S304, after the device that provides the WIFI network determines the validity according to the request message, the mobile terminal accesses the WIFI network.

 With the embodiment, the WIFI network can be accessed without manual input and setting on the mobile terminal, which reduces the operation burden of the user and improves the access efficiency of the WIFI network. Moreover, the access information is transparent to the user and avoids information leakage. , improve the security of the WIFI network.

 Embodiment 4

 Referring to FIG. 4, a flow chart of steps of a method for a mobile terminal to connect to a network according to Embodiment 4 of the present disclosure is shown. This embodiment still describes the method for connecting the mobile terminal of the present disclosure to the mobile terminal side that requests access to the WIFI network, and includes the following steps:

 In step S402, the mobile terminal receives the second authorization information sent by the terminal device having the connection network authority by using the FC technology.

 The second authorization information is used by the terminal device having the connection network authority to authorize the mobile terminal to access the WIFI network, and the second authorization information includes the access information of the encrypted WIFI network and the related information of the terminal device having the network access authority. And including one or all of the authorization distance information and the authorization time information, the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.

In addition, the second authorization information may further include device information of the mobile terminal. When the second authorization information includes the device information of the mobile terminal, the second authorization information is only available to the mobile terminal corresponding to the device information to access the WIFI network. Other mobile terminals cannot use the authorization information to access the WIFI network.

 In this embodiment, the second authorization information is set to include the access information and the authorized distance information of the encrypted WIFI network, and does not include the authorization time information and the device information. However, it should be understood by those skilled in the art that, in practical applications, whether one or more of the authorization distance information, the authorization time information, and the device information are included in the authorization information may be set according to actual needs, and when the information is included Processing may be implemented with reference to corresponding portions of various embodiments of the present disclosure. When the device information is not included in the authorization information, the authorization information may be shared by multiple mobile terminals, and the authorization information is commonly used to access the WIFI network.

 In addition, the mobile terminal can also interact with the terminal device having the right to connect to the network through other devices or channels, and receive the authorization information sent by the terminal device having the connection authority of the network, and is not limited to the FC technology. A terminal device having a connection network authority may be a wireless router, a network hotspot, or a mobile terminal that can share authorization information.

 In step S404, the mobile terminal acquires the access information of the encrypted WIFI network, the authorization distance information and/or the authorization time information from the second authorization information, and generates the first authorization information by using the authorization distance information and/or the authorization time information. .

 In step S406, when accessing the WIFI network, the mobile terminal sends a request message for connecting to the WIFI network to the device providing the WIFI network through the FC technology. The request message carries the first authorization information and the access information of the encrypted WIFI network.

 The device providing the WIFI network can be a wireless router or a network hotspot.

 In step S408, after the device to be provided with the WIFI network determines the validity according to the request message, the mobile terminal accesses the WIFI network.

 In an embodiment, if the request message further includes the device information of the mobile terminal, the device that provides the WIFI network further matches the device information carried in the received request message with the stored standard device information after determining the legality; If it matches, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access the WIFI network.

 In step S410, the mobile terminal receives an authorization information sharing request sent by another mobile terminal.

 The second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device information of the mobile terminal receiving the second authorization information matches the stored standard device information, The second authorization information includes the sharing authority. At this time, the mobile terminal can share the access information of the encrypted WIFI network in the second authorization information to other mobile terminals by using the sharing authority.

 Or,

When the device information is not included in the second authorization information, the second authorization information may be shared by the plurality of mobile terminals. In this embodiment, after the mobile terminal A receives the authorization information sharing request sent by the mobile terminal B, the authorization information is shared to the mobile terminal B, but is not limited thereto. In practical applications, the mobile terminal A may also be used. After actively searching for the mobile terminal B, the authorization information is sent to the mobile terminal B to realize the sharing of the authorization information. In addition, the number of mobile terminals sharing the authorization information is not limited. In this embodiment, only the mobile terminal B is taken as an example, and other Other mobile terminals sharing the authorization information at the mobile terminal A, or sharing processing of other mobile terminals sharing the authorization information from the mobile terminal B, may be implemented by referring to this embodiment.

 In step S412, the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals according to the authorization information sharing request through the sharing authority.

 When the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals according to the authorization information sharing request through the sharing authority:

 A feasible way is to directly send the access information of the encrypted WIFI network and the authorized distance information and/or the authorized time information in the original second authorization information to other mobile terminals, that is, in the second authorization information. Information such as access information, authorized distance information (if any), and authorized time information (if any) are not changed. Other mobile terminals enjoy the same WIFI network authorization coverage and authorized use as the mobile terminal. period.

 Another possible manner is: obtaining authorization distance information and/or authorization time information in the second authorization information; configuring corresponding temporary authorization distance information and/or temporary authorization time information according to the authorization distance information and/or the authorization time information, The WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the WIFI network usage time period indicated by the temporary authorization time information is within the time period indicated by the authorization distance information; using the temporary authorization distance information and/or Or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information, generating temporary authorization information; sending the temporary authorization information to other mobile terminals requesting the sharing authorization, such as sending the authorization information sharing request terminal. That is, the mobile terminal performs secondary setting on the basis of its own authorized coverage and/or authorized use time period, so that the authorization of other mobile terminals sharing the authorization information is further restricted. Also, the secondary settings for different mobile terminals may be different. When the authorization information includes both the authorization coverage range and the authorized usage time period, you can also perform secondary settings for only one of them. However, no matter how the secondary setting is performed, no matter how many times the authorization information is shared, or how many mobile terminals are shared, the access information is the same as the access information in the original authorization information, and no change occurs.

 In one embodiment, the mobile terminal transmits the temporary authorization information to other mobile terminals requesting the sharing authorization by the FC technology when transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization.

 Furthermore, the execution of steps S410-S412 is not limited to the manner after step S408, in fact, after the mobile terminal obtains the authorization information, that is, at any time after step S402.

 With the embodiment, the WIFI network can be accessed without manual input and setting on the mobile terminal, thereby reducing the operation burden of the user and improving the access efficiency of the WIFI network; the access information is transparent to the user, avoiding information leakage and improving The security of the WIFI network; the authorization information can be conveniently shared among multiple mobile terminal users, which is convenient to use, improves the ease of operation of the WIFI network access, and further improves the access efficiency of the WIFI network.

 Embodiment 5

 Referring to FIG. 5, a flow chart of steps for authorizing an interaction of a mobile terminal according to Embodiment 5 of the present disclosure is shown.

This embodiment describes the interaction process when the mobile terminal of the present disclosure is authorized from the perspective of the interaction between the device providing the WIFI network and the mobile terminal. The mobile terminal authorization method of this embodiment includes the following steps:

 In step S502, the mobile terminal A establishes a short-range wireless connection with the device B that provides the WIFI network.

 For example, a short-range wireless connection is established through the FC technology, and the device providing the WIFI network may be a wireless router or a network hotspot.

 In step S504, the device B providing the WIFI network generates authorization information (including the time validity period and the effective distance) according to the WIFI network access information saved by the established wireless connection, and transmits the information to the mobile terminal A.

 The device B that provides the WIFI network adds a "time validity period", that is, an authorization time information, and an "effective distance", that is, an authorization distance information, to the attribute of the WIFI network access information, if the validity period is 24 hours, and the authorization is performed after the valid time is exceeded. The information is automatically invalidated; the effective distance is 2 meters. When the distance of the mobile terminal A from the server B or the verification device exceeds 2 meters, the authorization information is automatically invalidated.

 In step S506, after receiving the authorization information of the device B providing the WIFI network, the mobile terminal A saves and extracts the verification information (such as password, verification answer, verification string, etc.).

 However, the verification information is not displayed on the screen (this ensures that the mobile terminal A can have authorization information and does not know the password).

 In step S508, after receiving the authorization information, if the authorization information carries the time validity period, the mobile terminal A starts timing, and automatically clears the authorization information after the validity period is reached; if the authorization information carries the effective distance, the distance sensor is started. The distance between the local end and the device B that provides the WIFI network or the distance from the verification device is detected. When the distance exceeds the effective distance, the authorization information is automatically cleared.

 In one embodiment, to avoid erroneous operation, when the distance exceeds the effective distance for less than a predetermined time (e.g., 10 minutes), the distance is still considered to be within the effective distance.

 For the mobile terminal A, when the mobile terminal A uses the authorization information, when the verification device is a WIFI hotspot, the mobile terminal A initiates the connection of the WIFI function, scans the WIFI hotspot and sends a connection request, and the connection request carries The authentication information extracted by the authorization information, the WIFI hotspot determines the legality of the user A according to the verification information; when the verification device is the access control, etc., it detects that the device to be verified moves within a predetermined distance, and obtains the verification information to verify its legality.

 Similarly, when the device information of the mobile terminal A is not included in the authorization information, the authorization information can be shared by the mobile terminal A to other mobile terminals.

 For example, user A goes to a restaurant to eat, and after the mobile terminal used by user A obtains the authorization for network access, the authorization can also be shared to the mobile terminal of other user B, when the mobile terminal of user B leaves the restaurant. If the predetermined time is exceeded, User B's mobile terminal re-enters the coverage of the restaurant network, and its network authorization is still valid. The mobile terminal of user A can share the authorization information to the mobile terminal of user B through the FC technology, and the mobile terminal of user B directly obtains the authorization without displaying the password.

For another example, when the door lock is unlocked by the mobile phone, a password verification device is installed on the door lock of the house. When the mobile phone is close to the scanning area of the password verification device, the validity of the password is verified and it is determined whether the door is opened. In this scenario, user A's mobile phone shares the authorization information to user B's mobile phone through FC technology, and user B's mobile phone directly obtains authorization. Do not display the password. The authorization information has a certain distance and time limit. For example, the authorization information may be valid within one day, and when the validity period is exceeded, the authorization information is invalid.

 In this embodiment, the authorization information is exchanged by the FC, and can be changed at any time without manual intervention, and does not require manual memory, which is convenient and safe. The authorization information includes the effective distance and the effective time, and can effectively control the use space and time of the authorization information. .

 Embodiment 6

 Referring to FIG. 6, a block diagram of a terminal device according to Embodiment 6 of the present disclosure is shown.

 The terminal device of the embodiment has a connection network authority, and the terminal device includes: a first receiving module 602, configured to receive a request message that is sent by the mobile terminal and used to access the WIFI network, where the request message includes the encrypted WIFI network. In addition to the access information, the first authorization information is further included, wherein the first authorization information authorizes the distance information and/or the authorization time information, the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the WIFI network. The authorization module 604 is configured to determine whether the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information, and the authorization module 606 is configured to: if the judgment result of the determination module 604 is satisfied, Then, the access information of the WIFI network is decrypted; when the access information of the WIFI network is determined according to the decryption result, the mobile terminal is authorized to access the WIFI network.

 The terminal device in this embodiment is used to implement the corresponding mobile terminal authorization method on the terminal device side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.

 Example 7

 Referring to FIG. 7, a block diagram of a terminal device according to a seventh embodiment of the present disclosure is shown.

 The embodiment of the present invention further optimizes the structure of the terminal device in the sixth embodiment. The optimized terminal device further includes: a generating and sending module 608, configured to receive, by the first receiving module 602, the terminal for transmitting the WIFI network Before the request message, the second authorization information is generated, and the second authorization information is sent to the mobile terminal by using the FC technology, where the second authorization information includes the authorization distance information and/or the authorization time information, and the encryption The access information of the WIFI network and the information of the terminal device.

 In the optimized terminal device, the first receiving module 602 is configured to receive, by using the FC technology, a request message sent by the mobile terminal to access the WIFI network.

 In the optimized terminal device, the determining module 604 determines whether the current location of the mobile terminal is in the WIFI network indicated by the corresponding authorized distance information when determining whether the mobile terminal meets the authorized distance information and/or the authorized time information in the authorization information. Within the authorized coverage; and/or, determining whether the current time of the mobile terminal is within the authorized use period of the WIFI network indicated by the corresponding authorized time information.

 In the optimized terminal device, the determining module 604 obtains the location information or the WIFI signal strength information of the mobile terminal when determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information; The location information or the WIFI signal strength information determines whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.

The optimized terminal device further includes: an interrupt authorization module 610, configured to connect the mobile terminal to the WIFI network. When the connection is resumed after the disconnection, it is judged whether the request message sent by the mobile terminal is received again within the set time period after the interruption; if it is determined that the request message sent by the mobile terminal is received again within the set time period, the mobile terminal is directly authorized. Access to the WIFI network.

 In the optimized terminal device, when the request message further includes the device information of the mobile terminal, the authorization module 606 is further configured to: after determining that the access information of the WIFI network is correct, the device information carried by the received request message and the stored The standard device information is matched; if it matches, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access. WIFI network.

 In the optimized terminal device, when the second authorization information is generated, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes the sharing authority; The sharing authority shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals.

 In the optimized terminal device, the mobile terminal acquires the authorized distance information and/or the authorization time information in the second authorization information when sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals; And configuring the corresponding temporary authorization distance information and/or the temporary authorization time information according to the authorization distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the temporary authorization is performed. The time period of the WIFI network indicated by the time information is within the time period indicated by the authorization distance information; the temporary authorization distance information and/or the temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information are generated. Temporary authorization information; Send temporary authorization information to other mobile terminals requesting sharing authorization.

 The terminal device in this embodiment is used to implement the corresponding mobile terminal authorization method on the terminal device side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.

 Example eight

 Referring to FIG. 8, a block diagram of a structure of a mobile terminal according to an eighth embodiment of the present disclosure is shown.

 The mobile terminal of this embodiment includes: a sending module 702, configured to send a request message for connecting to the WIFI network to the device that provides the WIFI network, where the request message includes the first authorization information, in addition to the access information of the encrypted WIFI network. The first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use time period of the WIFI network; After the device that provides the WIFI network determines the legitimacy according to the request, it accesses the WIFI network.

 The mobile terminal in this embodiment is used to implement the mobile terminal authorization method on the mobile terminal side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.

 Example nine

 Referring to FIG. 9, a block diagram of a structure of a mobile terminal according to Embodiment 9 of the present disclosure is shown.

The embodiment of the present invention further optimizes the structure of the mobile terminal in the eighth embodiment. The optimized mobile terminal further includes: a receiving module 706, configured to send, before the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network. Receiving second authorization information sent by the terminal device having the right to connect to the network, where the second authorization letter The information is used to authorize the mobile terminal to access the WIFI network. The second authorization information includes the access information of the encrypted WIFI network and the information of the terminal device, and the authorization distance information and/or the authorization time information.

 Preferably, the second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device information of the mobile terminal receiving the second authorization information and the stored standard device information The matching, the second authorization information includes the sharing authority; the optimized mobile terminal further includes: an authorization sharing module 708, configured to share the access information of the encrypted WIFI network in the second authorization information to the other by using the sharing authority Mobile terminal.

 In the optimized mobile terminal, the authorization sharing module 708 includes: an information obtaining module 7082, configured to obtain authorization distance information and/or authorization time information in the second authorization information by using the sharing authority; and a configuration module 7084, configured to use the authorized distance Information and/or authorization time information, configured with corresponding temporary authorization distance information and/or temporary authorization time information, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the temporary authorization time information indication The WIFI network usage time period is within a time period indicated by the authorization distance information; the generating module 1086 is configured to use the temporary authorization distance information and/or the temporary authorization time information, and the encrypted WIFI network access in the second authorization information. Information, generating temporary authorization information; a sharing sending module 7088, configured to send temporary authorization information to other mobile terminals requesting sharing authorization.

 In the optimized mobile terminal, the shared sending module 7088 is configured to send the temporary authorization information to other mobile terminals requesting the sharing authorization by using the FC technology.

 In the optimized mobile terminal, when the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network, the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network through the FC technology.

 The mobile terminal in this embodiment is used to implement the mobile terminal authorization method on the mobile terminal side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again. Example ten

 Referring to FIG. 10, a schematic structural diagram of a mobile terminal authorization system according to Embodiment 10 of the present disclosure is shown. The mobile terminal authorization system of this embodiment includes a terminal device 802 having a connection network authority and a mobile terminal

804.

 among them,

The terminal device 802 includes: an authorization information signing module 8022 (which can implement the function of generating the sending module 608 in the terminal device of the seventh embodiment), is responsible for interacting with the mobile terminal through a channel such as FC, and issuing an authorization information to the mobile terminal. The authorization information is an authorization message containing distance and/or time, and the encrypted Token is valid only for a certain distance and/or time. The authorization information verification module 8024 (which can implement the functions of the first receiving module 602, the determining module 604, the authorization module 606, and the interrupt authorization module 610 in the sixth and seventh embodiments), and receives the mobile terminal when the terminal device such as a wireless router or a network hotspot After the transferred authorization information, the authorization information needs to be verified. Depending on the setting of the authorization rules, the validity can be based entirely on distance, or it can be based entirely on time, or it can be based on a combination of the two. The module also includes a distance sensing function. If the terminal device senses that the user is gradually moving away, It is sensed by location information such as GPS information, or it can be perceived by other information such as changes in the strength of the WIFI connection signal, and the authorization of the user is cancelled. Of course, if the user suddenly loses contact with them, the network may be interrupted, the terminal device cannot judge whether the user has left, avoiding authorization to the user again, and the validity of the authorization may be controlled by time, for example, within 30 minutes, the user is again with the server. Once the connection is established, the previous authorization continues to be valid.

 The mobile terminal 804 includes: an authorization information transmission module 8042 (implementing the functions of the transmission module 702 and the access module 704 in the eighth and ninth embodiments), and uploading the obtained authorization information to the terminal device. The authorization information can be device-dependent or device-independent. If it is not related to the device, a mobile terminal is authorized, and can also share the authorization information with other mobile terminals through devices such as FC.

 The mobile terminal authorization system of the present embodiment is used to implement the corresponding mobile terminal authorization method in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.

 A schematic diagram of a structure of a terminal device according to an embodiment of the present disclosure. Referring to FIG. 11, the terminal device can be used to implement a method for connecting a mobile terminal to a network provided in the foregoing embodiment. The terminal can be a router, a mobile phone, a tablet pad, a wearable mobile device (such as a smart watch), and the like. In one embodiment:

The terminal device 700 can include a communication unit 110, a memory 120 including one or more computer readable storage media, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a WiFi (wireless fidelity) module 170. A processor 180 having one or more processing cores, and a power supply 190 and the like. It will be understood by those skilled in the art that the terminal device structure shown in FIG. 11 does not constitute a limitation of the terminal device, and may include more or less components than those illustrated, or may be combined with some components, or different component arrangements. The communication unit 110 can be used for transmitting and receiving information or receiving and transmitting signals during a call. The communication unit 110 can be a network communication device such as an RF (Radio Frequency) circuit, a router, a modem, or the like. Specifically, when the communication unit 110 is an RF circuit, the downlink information of the base station is received, and then processed by one or more processors 180; in addition, data related to the uplink is transmitted to the base station. Generally, RF circuits as communication units include, but are not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, and a LNA (Low Noise Amplifier, low) Noise amplifier), duplexer, etc. In addition, the communication unit 110 can also communicate with the network and other devices through wireless communication. Wireless communication can use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access, code) Divisional Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), E-mail, SMS (Short Messaging Service), and the like. The memory 120 can be used to store software programs and modules, and the processor 180 executes various functional applications and data processing by running software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal device 700 (such as audio data, phone book, etc.) and the like. Furthermore, the memory 120 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, or Other volatile solid-state storage devices. Accordingly, memory 120 may also include a memory controller to provide access to memory 120 by processor 180 and input unit 130.

 Input unit 130 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls. Preferably, input unit 130 can include touch sensitive surface 131 and other input devices 132. Touch-sensitive surface 131, also referred to as a touch display or trackpad, can collect touch operations on or near the user (eg, the user uses a finger, stylus, etc., on any touch-sensitive surface 131 or on the touch-sensitive surface 131 The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program. Alternatively, the touch-sensitive surface 131 may include two portions of a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information The processor 180 is provided and can receive commands from the processor 180 and execute them. In addition, the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface 131, the input unit 130 can also include other input devices 132. Preferably, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.

 Display unit 140 can be used to display information entered by the user or information provided to the user as well as various graphical user interfaces of terminal device 700, which can be constructed from graphics, text, icons, video, and any combination thereof. The display unit 140 may include a display panel 141. Alternatively, the display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 according to the touch event The type provides a corresponding visual output on display panel 141. Although in FIG. 11, touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.

 Terminal device 700 can also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors. Preferably, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 when the terminal device 700 moves to the ear. And / or backlight. As a kind of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the terminal device 700 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here No longer.

The audio circuit 160, the speaker 161, and the microphone 162 can provide an audio interface between the user and the terminal device 700. The audio circuit 160 can transmit the converted electrical data of the received audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal by the audio circuit 160. After receiving, it is converted into audio data, and then processed by the audio data output processor 180, and then passed through the RF circuit 110. It is sent to, for example, another terminal device, or the audio data is output to the memory 120 for further processing. The audio circuit 160 may also include an earbud jack to provide communication of the peripheral earphones with the terminal device 700.

 In order to implement wireless communication, the terminal device may be configured with a wireless communication unit 170, which may be a WiFi module. WiFi is a short-range wireless transmission technology, and the terminal device 700 can help users to send and receive emails, browse web pages, and access streaming media through the wireless communication unit 170, which provides users with wireless broadband Internet access. Although FIG. 11 shows the wireless communication unit 170, it can be understood that it does not belong to the essential configuration of the terminal device 700, and may be omitted as needed within the scope of not changing the essence of the disclosure.

 The processor 180 is the control center of the terminal device 700, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120. The various functions and processing data of the terminal device 700 are executed to perform overall monitoring of the mobile phone. Optionally, the processor 180 may include one or more processing cores; in one embodiment, the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, and For applications, etc., the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 180.

 The terminal device 700 also includes a power source 190 (such as a battery) that supplies power to the various components. In one embodiment, the power source can be logically coupled to the processor 180 through a power management system to manage charging, discharging, and power consumption through the power management system. Management and other functions. Power supply 190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.

 Although not shown, the terminal device 700 may further include a camera, a Bluetooth module, and the like, and details are not described herein. Specifically, in this embodiment, the display unit of the terminal device is a touch screen display, the terminal device further includes a memory, and one or more programs, wherein one or more programs are stored in the memory, and configured to be one or one The above processor executing the one or more programs includes instructions for performing the following operations:

 And receiving, by the mobile terminal, a request message for accessing the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization The information includes an authorization distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network;

 Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;

 If yes, decrypt the access information of the WIFI network;

 Authorizing the mobile terminal to access the mobile terminal after determining that the access information of the WIFI network is correct according to the decryption result

WIFI network.

 Wohe / or

And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization. Distance information and/or authorization time information, wherein the authorization distance information is used to indicate an authorization of the WIFI network a coverage range, where the authorization time information is used to indicate an authorized use period of the win network;

 After the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network. In one embodiment, the memory further includes instructions to:

 Before receiving the request message for accessing the WIFI network sent by the mobile terminal, the method further includes: generating, by the terminal device having the connection network permission, second authorization information, and transmitting, by using the near field communication FC technology, the mobile terminal a second authorization information, where the second authorization information includes, in addition to the authorization distance information and/or the authorization time information, access information of the encrypted WIFI network and the The step of receiving the request message for accessing the WIFI network sent by the mobile terminal includes: receiving, by the FC technology, the request message sent by the mobile terminal.

 In one embodiment, the memory further includes instructions to:

 Determining whether the mobile terminal meets the corresponding authorized distance information and/or the authorized time information in the authorization information comprises: determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information Inside; and/or,

 Determining whether the current time of the mobile terminal is within the authorized use time period of the WIFI network indicated by the corresponding authorization time information.

 In one embodiment, the memory further includes instructions to:

 Determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information comprises: acquiring location information of the mobile terminal or WIFI signal strength information; according to location information of the mobile terminal or WIFI The signal strength information determines whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.

 In one embodiment, the memory further includes instructions to:

 When the connection between the mobile terminal and the WIFI network is interrupted, the connection is resumed, and it is determined whether the request message sent by the mobile terminal is received again within the set time period after the interruption; if it is determined that the mobile terminal is received again within the set time period The request message sent directly authorizes the mobile terminal to access the WIFI network.

 In one embodiment, the memory further includes instructions to:

 After the device information of the mobile terminal is further included in the request message, after the step of determining that the access information of the WIFI network is correct, the method further includes: receiving the device information and the stored standard carried by the request message The device information is matched; if it is matched, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have a WIFI network. Authorizing the mobile terminal to access the WIFI network.

 In one embodiment, the memory further includes instructions to:

When the terminal device having the network access authority generates the second authorization information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes the sharing authority; The sharing authority, the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals. In one embodiment, the memory further includes instructions to:

 The step of the mobile terminal sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals includes: the mobile terminal acquiring the authorized distance information and/or the authorization time in the second authorization information. The mobile terminal configures corresponding temporary authorization distance information and/or temporary authorization time information according to the authorization distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is in the Within the coverage indicated by the authorization distance information, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information; the mobile terminal uses the temporary authorization distance information and/or temporary authorization time The information, and the access information of the encrypted WIFI network in the second authorization information, generates temporary authorization information; the mobile terminal sends the temporary authorization information to other mobile terminals requesting the sharing authorization. In one embodiment, the memory further includes instructions to:

 Before the step of sending the request message for connecting the WIFI network to the device providing the WIFI network, the method further includes: receiving second authorization information sent by the terminal device having the connection network permission, where the second authorization information is used for Authorizing the mobile terminal to access the WIFI network, the second authorization information, in addition to the encrypted access information of the WIFI network and the information of the terminal device, the authorization distance information and/or the authorization time information.

 In one embodiment, the memory further includes instructions to:

 The second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device of the mobile terminal receiving the second authorization information The information matches the stored standard device information, and the second authorization information includes sharing rights;

 The method further includes: sharing, by the sharing authority, access information of the encrypted WIFI network in the second authorization information to other mobile terminals.

 In one embodiment, the memory further includes instructions to:

 The step of sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals includes:

 Obtaining authorization distance information and/or authorization time information in the second authorization information;

 And configuring the corresponding temporary authorization distance information and/or the temporary authorization time information according to the authorized distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is indicated by the authorized distance information Within the coverage, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information;

 Generating temporary authorization information by using the temporary authorization distance information and/or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information;

 The temporary authorization information is sent to other mobile terminals requesting the sharing authorization.

 In one embodiment, the memory further includes instructions to:

The step of transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization includes: The temporary authorization information is transmitted to other mobile terminals requesting the sharing authorization by the near field communication FC technology. In one embodiment, the memory further includes instructions to:

 The step of sending a request message for connecting to the WIFI network to the device providing the WIFI network includes: sending, by the near field communication FC technology, a request message for connecting to the WIFI network to the device providing the WIFI network. In an embodiment, when the terminal device is a router, as shown in FIG. 12, the router 1200 may generate a large difference due to different configurations or performances, and may include one or more central processing units (CPUs) 1201. (eg, one or more processors) and memory 1202, one or more storage media 1205 that store application 1203 or data 1204 (eg, one or one storage device in Shanghai). Among them, the memory 1202 and the storage medium 1205 may be short-term storage or persistent storage. The program stored on the storage medium 1205 may include one or more modules (not shown), and each module may include a series of instructions for operation in the router. Still further, the processor 1201 can be configured to communicate with the storage medium 1205 to perform a series of instruction operations in the storage medium 1205 on the router 1200.

 Router 1200 can also include one or more power supplies 1206, one or more wired or wireless network interfaces 1207, one or more input and output interfaces 1208, one or more keyboards or touch screens 1209, one or more indicator lights 1210 and/or Or, one or more operating systems 1211, such as MIUI, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like. The indicator light 1210 is used to indicate the status of each part of the router, for example, display network status, power status, data transmission status, wifi status, and the like. Also included is one or more FC modules 1212 for transmitting information by FC.

 Embodiments of the present disclosure provide a distance and/or time based authorization scheme. When the distance and/or time is exceeded, the authorization is invalidated, reused, and reauthorization is required. Through the authorization scheme of the embodiment of the present disclosure, the authorization information is exchanged through the FC, and can be changed at any time without manual intervention, and does not require manual memory, and is convenient and safe. The authorization information includes effective distance and/or effective time information, which can be effectively controlled. The space and time of use of the authorization information. The various embodiments in the present specification are described in a progressive manner, and each embodiment focuses on differences from other embodiments, and the same similar parts between the various embodiments can be referred to each other. For the device and system embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant parts can be referred to the description of the method embodiment.

 The foregoing is a detailed description of a mobile terminal authorization scheme provided by the present invention. The principles and implementation manners of the present invention are described herein by using specific examples. The description of the above embodiments is only for helping to understand the method and the method of the present invention. At the same time, those skilled in the art will have various changes in the specific embodiments and application scopes according to the idea of the present invention. In summary, the contents of the present specification should not be construed as being limit.

Claims

 Rights request
 A method for a mobile terminal to connect to a network, comprising:
 And receiving, by the mobile terminal, a request message for accessing the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization The information includes an authorization distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use time period of the WIFI network;
 Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;
 If yes, decrypt the access information of the WIFI network;
 Authorizing the mobile terminal to access the mobile terminal after determining that the access information of the WIFI network is correct according to the decryption result
WIFI network.
 2. The method of claim 1 wherein
 Before the step of receiving the request message for accessing the WIFI network sent by the mobile terminal, the method further includes: the terminal device having the connection network authority generating the second authorization information, and sending the second authorization information to the mobile terminal by using a near field communication FC technology The second authorization information, in addition to the authorization distance information and/or the authorization time information, the second authorization information further includes the encrypted access information of the WIFI network and Information of the terminal device;
 The receiving the request message for accessing the WIFI network sent by the mobile terminal includes: receiving, by using the FC technology, the request message sent by the mobile terminal.
 The method according to claim 1, wherein the step of determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the authorization information comprises:
 Determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information; and/or,
 Determining whether the current time of the mobile terminal is within an authorized use period of the WIFI network indicated by the corresponding authorization time information.
 The method according to claim 3, wherein the step of determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information comprises: acquiring Location information of the mobile terminal or WIFI signal strength information;
 And determining, according to the location information of the mobile terminal or the WIFI signal strength information, whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.
 The method according to claim 1, wherein the method further comprises:
 When the connection between the mobile terminal and the WIFI network is interrupted, the connection is resumed, and it is determined whether the request message sent by the mobile terminal is received again within a set time period after the distance is interrupted;
If it is determined that the request message sent by the mobile terminal is received again within the set time period, the mobile terminal is directly authorized to access the WIFI network. 6. The method of claim 2, wherein
 When the device information of the mobile terminal is further included in the request message, after the step of determining that the access information of the WIFI network is correct, the method further includes:
 Matching the received device information carried by the request message with the stored standard device information;
 If yes, determining that the mobile terminal has the right to set and use the WIFI network, and authorizing the mobile terminal to access the WIFI network;
 If not, it is determined that the mobile terminal has the right to use the WIFI network, and the mobile terminal is authorized to access the WIFI network.
 7. The method of claim 6 wherein:
 When the terminal device having the network access authority generates the second authorization information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes the sharing authority; The sharing authority, the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
 The method according to claim 7, wherein the step of the mobile terminal sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals comprises:
 The mobile terminal acquires the authorization distance information and/or the authorization time information in the second authorization information; the mobile terminal configures the corresponding temporary authorization distance information and/or according to the authorized distance information and/or the authorization time information. Temporary authorization time information, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the WIFI network usage time period indicated by the temporary authorization time information is in the authorized distance information Within the indicated time period;
 The mobile terminal generates temporary authorization information by using the temporary authorization distance information and/or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information;
 The mobile terminal transmits the temporary authorization information to other mobile terminals requesting sharing authorization.
 A method for a mobile terminal to connect to a network, comprising:
 And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization. a distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, where the authorization time information is used to indicate an authorized use period of the WIFI network;
 After the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network. The method according to claim 9, wherein before the step of sending the request message for connecting to the WIFI network to the device providing the WIFI network, the method further includes:
 And receiving the second authorization information that is sent by the terminal device that has the right to connect to the network, where the second authorization information is used to authorize the mobile terminal to access the WIFI network, and the second authorization information includes the encrypted connection of the WIFI network. In addition to the information and the information of the terminal device, the authorization distance information and/or the authorization time information is further included.
The method according to claim 10, wherein the second authorization information is connected by the connection The terminal device of the network authority generates; when the terminal device having the connection network authority generates the second authorization information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, The sharing authority is included in the second authorization information;
 The method further includes: sharing, by the sharing authority, access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
 The method according to claim 11, wherein the step of sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals comprises:
 Obtaining authorization distance information and/or authorization time information in the second authorization information;
 And configuring the corresponding temporary authorization distance information and/or the temporary authorization time information according to the authorized distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is indicated by the authorized distance information Within the coverage, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information;
 Generating temporary authorization information by using the temporary authorization distance information and/or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information;
 The temporary authorization information is sent to other mobile terminals requesting the sharing authorization.
 The method according to claim 11 or 12, wherein the step of transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization comprises:
 The temporary authorization information is transmitted to other mobile terminals requesting the sharing authorization by the near field communication FC technology.
14. The method of claim 9 wherein:
 The step of sending a request message for connecting to the WIFI network to the device that provides the WIFI network includes: sending, by using a near field communication FC technology, a request message for connecting to the WIFI network to the device that provides the WIFI network.
 A terminal device, wherein the terminal device has a connection network permission, and the terminal device includes: a first receiving module, configured to receive a request message that is sent by the mobile terminal and used to access the WIFI network, where The request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information grants distance information and/or authorized time information, and the authorized distance information is used. And indicating the authorized coverage of the WIFI network, where the authorization time information is used to indicate an authorized use period of the WIFI network;
 a determining module, configured to determine whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;
 An authorization module, configured to: if the judgment result of the determining module is satisfied, decrypt the access information of the WIFI network; and after determining that the access information of the WIFI network is correct according to the decryption result, authorizing the mobile terminal Access to the WIFI network.
 16. The terminal device according to claim 15, wherein
The terminal device further includes: a generating sending module, configured to receive, by the first receiving module, a sending by the mobile terminal Before the request message for accessing the WIFI network, generate second authorization information, and send the second authorization information to the mobile terminal by using a near field communication FC technology, where the second authorization information includes In addition to the authorization distance information and/or the authorization time information, the encrypted access information of the WIFI network and the information of the terminal device are further included;
 The first receiving module is configured to receive, by using an FC technology, the request message sent by the mobile terminal to access the WIFI network.
 The terminal device according to claim 15, wherein the determining module determines the mobile when determining whether the mobile terminal satisfies corresponding authorized distance information and/or authorized time information in the authorization information. Whether the current location of the terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information; and/or determining whether the current time of the mobile terminal is in the corresponding indication of the authorized time information The authorized period of use of the WIFI network.
 The terminal device according to claim 17, wherein the determining module determines whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information. Obtaining the location information of the mobile terminal or the WIFI signal strength information; determining, according to the location information of the mobile terminal or the WIFI signal strength information, whether the current location of the mobile terminal is in the corresponding indication of the authorized distance information Within the authorized coverage of the WIFI network.
 The terminal device according to claim 15, wherein the terminal device further comprises: an interrupt authorization module, configured to determine that the distance is interrupted when the connection between the mobile terminal and the WIFI network is interrupted and the connection is resumed Whether the request message sent by the mobile terminal is received again in the subsequent set time period; if it is determined that the request message sent by the mobile terminal is received again within the set time period, the direct authorization station is directly authorized The mobile terminal accesses the WIFI network.
 20. The terminal device according to claim 16, wherein
 When the request message further includes the device information of the mobile terminal, after the determining, by the authorization module, that the access information of the WIFI network is correct, the device information and the stored standard carried by the received request message are received. The device information is matched; if it is matched, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have a WIFI network. Authorizing the mobile terminal to access the WIFI network.
 21. The terminal device according to claim 20, wherein
 When the generating and transmitting module generates the second authorization information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes a sharing authority; Sharing the right, the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
The terminal device according to claim 21, wherein the mobile terminal acquires the access information when the access information of the encrypted WIFI network in the second authorization information is shared with other mobile terminals Authorization distance information and/or authorization time information in the second authorization information; according to the authorization distance information and/or authorization time information, Corresponding temporary authorization distance information and/or temporary authorization time information, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the temporary authorization time information indicates WIFI The network usage time period is within a time period indicated by the authorization distance information; using the temporary authorization distance information and/or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information, Generating the temporary authorization information; transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization.
23. A mobile terminal, comprising:
 a sending module, configured to send, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where The authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network. ;
 An access module, configured to: after the device that provides the WIFI network determines validity according to the request message, access the WIFI network.
 The mobile terminal according to claim 23, wherein the mobile terminal further comprises: a receiving module, configured to receive second authorization information sent by a terminal device having a connection network permission, wherein the second authorization The information is used to authorize the mobile terminal to access the WIFI network, and the second authorization information includes the encrypted access information of the WIFI network and the information of the terminal device, and the authorized distance information and/or the location. Authorization time information.
 The mobile terminal according to claim 24, wherein the second authorization information is generated by the terminal device having the connection network authority; and the second authorization is generated when the terminal device having the connection network authority generates In the information, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes a sharing authority;
 The mobile terminal further includes an authorization sharing module, configured to share the access information of the encrypted WIFI network in the second authorization information to other mobile terminals by using the sharing authority.
 The mobile terminal according to claim 25, wherein the authorization sharing module comprises: an information acquisition module, configured to acquire authorization distance information in the second authorization information and/or by using the sharing authority Authorization time information;
 a configuration module, configured to configure corresponding temporary authorization distance information and/or temporary authorization time information according to the authorization distance information and/or authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is Within the coverage indicated by the authorization distance information, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information;
 a generating module, configured to generate temporary authorization information by using the temporary authorization distance information and/or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information;
And a shared sending module, configured to send the temporary authorization information to another mobile terminal requesting the sharing authorization. The mobile terminal according to claim 25 or 26, characterized in that
 The shared sending module is configured to send the temporary authorization information to other mobile terminals requesting sharing authorization by using a near field communication FC technology.
 28. The mobile terminal of claim 23, wherein
 When the sending module sends a request message for connecting to the WIFI network to the device providing the WIFI network, the sending module sends a request message for connecting to the WIFI network to the device providing the WIFI network by using the near field communication FC technology.
 29. A terminal device, characterized in that the terminal device comprises a memory, and one or more programs, wherein one or more programs are stored in the memory and configured to be executed by one or more processors One or more programs contain instructions for doing the following:
 And receiving, by the mobile terminal, a request message for accessing the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization The information includes an authorization distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use time period of the WIFI network;
 Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;
 If yes, decrypt the access information of the WIFI network;
 After determining that the access information of the WIFI network is correct according to the decryption result, authorizing the mobile terminal to access the WIFI network;
 Wohe / or
 And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization. a distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, where the authorization time information is used to indicate an authorized use period of the WIFI network;
 After the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network.
PCT/CN2014/076040 2013-08-29 2014-04-23 Network access method of mobile terminal, mobile terminal, and terminal device WO2015027712A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201310385160.8 2013-08-29
CN201310385160.8A CN103476030B (en) 2013-08-29 2013-08-29 Mobile terminal connects the method for network, mobile terminal and terminal unit

Publications (1)

Publication Number Publication Date
WO2015027712A1 true WO2015027712A1 (en) 2015-03-05

Family

ID=49800698

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/076040 WO2015027712A1 (en) 2013-08-29 2014-04-23 Network access method of mobile terminal, mobile terminal, and terminal device

Country Status (2)

Country Link
CN (1) CN103476030B (en)
WO (1) WO2015027712A1 (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103476030B (en) * 2013-08-29 2016-12-28 小米科技有限责任公司 Mobile terminal connects the method for network, mobile terminal and terminal unit
CN103874164B (en) * 2014-02-28 2017-06-06 上海升途智能系统有限公司 Method, system and the mobile terminal device of WIFI are connected by NFC
CN103889029A (en) * 2014-03-24 2014-06-25 深圳市云猫信息技术有限公司 Network hotspot sharing method, client side, sharing side and management server
CN103929742B (en) * 2014-04-22 2018-06-05 杭州爱纬斯电子有限公司 Mobile terminal piggybacking WiFi shares safely the method and intelligent control device of IP Camera
CN104105163B (en) * 2014-07-08 2018-04-13 深圳市比巴科技有限公司 Sound wave sending method, method of reseptance, dispensing device, reception device and system
CN104363631B (en) * 2014-10-24 2019-03-08 小米科技有限责任公司 The connection method of wireless router, device and system
CN105740662B (en) * 2014-12-09 2019-02-05 联想(北京)有限公司 A kind of information processing method and electronic equipment
CN104580175A (en) * 2014-12-26 2015-04-29 深圳市兰丁科技有限公司 Equipment authorization method and device
CN104539617A (en) * 2014-12-26 2015-04-22 深圳市金立通信设备有限公司 Network connection control method
CN104581724A (en) * 2014-12-26 2015-04-29 深圳市金立通信设备有限公司 Terminal
WO2016154886A1 (en) * 2015-03-31 2016-10-06 华为技术有限公司 Method, apparatus and terminal for acquiring authentication information
CN106332076A (en) * 2015-06-23 2017-01-11 西安中兴新软件有限责任公司 wireless access method, device and system
CN104955036B (en) * 2015-07-07 2019-04-05 北京长亭科技有限公司 Safe networking method and apparatus under public Wi-Fi environment
CN105162775A (en) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 Logging method and device of virtual machine
CN105228216B (en) * 2015-08-29 2019-06-11 宇龙计算机通信科技(深圳)有限公司 A kind of method for network access and terminal
CN105307169B (en) * 2015-09-18 2018-12-28 腾讯科技(深圳)有限公司 The cut-in method of guest network, device and system
CN105391770A (en) * 2015-10-13 2016-03-09 北京乐动卓越科技有限公司 Use method and use system of on-vehicle wireless network
CN105516972B (en) * 2015-12-17 2019-07-19 小米科技有限责任公司 Method for connecting network and device
CN105657733A (en) * 2016-01-29 2016-06-08 努比亚技术有限公司 Network stabilization control device and method
CN107426730A (en) * 2016-05-24 2017-12-01 中兴通讯股份有限公司 The safety access method and device of a kind of wireless device
CN106469279A (en) * 2016-08-30 2017-03-01 北京北信源软件股份有限公司 A kind of method and system of compression Encrypt and Decrypt
WO2018040805A1 (en) * 2016-08-31 2018-03-08 华为技术有限公司 Method for establishing association in wireless local area network, terminal and access point
CN106412907B (en) * 2016-09-14 2020-02-14 Oppo广东移动通信有限公司 Network access method, related equipment and system
WO2018205064A1 (en) * 2017-05-08 2018-11-15 深圳市卓希科技有限公司 Access control method and system
CN107396362A (en) * 2017-08-21 2017-11-24 上海掌门科技有限公司 A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
WO2019051647A1 (en) * 2017-09-12 2019-03-21 深圳传音通讯有限公司 Method for sharing wifi password, first terminal, second terminal, and system
CN108848015A (en) * 2018-08-13 2018-11-20 珠海格力电器股份有限公司 Connect method, apparatus, smart machine and the user terminal of network

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895876A (en) * 2009-05-20 2010-11-24 阿尔卡特朗讯 Method and device for verifying user identity during connecting wireless network equipment
CN103200567A (en) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 Method and system of wireless fidelity (WiFi) access
CN103476030A (en) * 2013-08-29 2013-12-25 小米科技有限责任公司 Method for connecting mobile terminal to network, mobile terminal and terminal equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895876A (en) * 2009-05-20 2010-11-24 阿尔卡特朗讯 Method and device for verifying user identity during connecting wireless network equipment
CN103200567A (en) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 Method and system of wireless fidelity (WiFi) access
CN103476030A (en) * 2013-08-29 2013-12-25 小米科技有限责任公司 Method for connecting mobile terminal to network, mobile terminal and terminal equipment

Also Published As

Publication number Publication date
CN103476030B (en) 2016-12-28
CN103476030A (en) 2013-12-25

Similar Documents

Publication Publication Date Title
US9961088B2 (en) Systems and methods for geolocation-based authentication and authorization
RU2611968C1 (en) Method, apparatus and system for access authentication
KR101671731B1 (en) Mobile platform with sensor data security
US20150294101A1 (en) Running applications, and authenticating users
US9436819B2 (en) Securely pairing computing devices
US20190090131A1 (en) Method and apparatus for remote portable wireless device authentication
US10326861B2 (en) Method for controlling cooperation of multiple intelligent devices and apparatus thereof
EP2901649B1 (en) Securely joining a secure wireless communications network
JP6140293B2 (en) Wireless network device processing method, wireless network device, and wireless network device processor
US9703971B2 (en) Sensitive operation verification method, terminal device, server, and verification system
US9807610B2 (en) Method and apparatus for seamless out-of-band authentication
JP6064050B2 (en) Router access control method, router access control apparatus, and network system
US9860357B2 (en) Establishing an authenticated wireless connection between short-range wireless terminals more conveniently
US8621483B2 (en) Methods, apparatuses and computer program products for provisioning applications to in vehicle infotainment systems with secured access
US20170127018A1 (en) Video interaction method, terminal, server and system
RU2617547C2 (en) Method, device and end device for nfc data transmission
EP2887615A1 (en) Cloud-based scalable authentication for electronic devices
WO2015070784A1 (en) Network access control method and apparatus
US8959608B2 (en) Single sign-on for a native application and a web application on a mobile device
KR20120092366A (en) Method and apparatus for performing function in mobile terminal using short range communication
JP6467526B2 (en) Communication message transmission method and wearable device
US20190268770A1 (en) Method and apparatus for remote portable wireless device authentication
US20150168930A1 (en) Device control method, device control system
EP2437463B1 (en) Apparatus and method for providing service in service zone
KR101793443B1 (en) Method, apparatus, program and recording medium for setting smart device management account

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14841171

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14841171

Country of ref document: EP

Kind code of ref document: A1