WO2015027712A1 - Procédé d'accès à un réseau d'un terminal mobile, terminal mobile et dispositif de terminal - Google Patents

Procédé d'accès à un réseau d'un terminal mobile, terminal mobile et dispositif de terminal Download PDF

Info

Publication number
WO2015027712A1
WO2015027712A1 PCT/CN2014/076040 CN2014076040W WO2015027712A1 WO 2015027712 A1 WO2015027712 A1 WO 2015027712A1 CN 2014076040 W CN2014076040 W CN 2014076040W WO 2015027712 A1 WO2015027712 A1 WO 2015027712A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
authorization
wifi network
mobile terminal
authorized
Prior art date
Application number
PCT/CN2014/076040
Other languages
English (en)
Chinese (zh)
Inventor
王斌
刘道宽
翁海斌
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Publication of WO2015027712A1 publication Critical patent/WO2015027712A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • H04W12/64Location-dependent; Proximity-dependent using geofenced areas
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/108Network architectures or network communication protocols for network security for controlling access to devices or network resources when the policy decisions are valid for a limited amount of time
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/61Time-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Definitions

  • the invention relates to a method for a mobile terminal to connect to a network, a mobile terminal and a terminal device.
  • the application is based on a Chinese patent application with the application number 201310385160.8 and the application date being 2013/8/29, and claims the priority of the Chinese patent application, the entire Chinese patent application The contents are incorporated herein by reference.
  • the present disclosure relates to the field of communications technologies, and in particular, to a method for connecting a mobile terminal to a network, a mobile terminal, and a terminal device.
  • WIFI Wireless Fidelity
  • the mobile device When the mobile terminal user accesses the WIFI network in different places providing the WIFI network, the mobile device needs to be configured differently to access, for example, when accessing the WIFI network of a new place, the mobile terminal needs to be reconfigured with the WIFI.
  • VPN Virtual Private Network
  • access password Authenticated password
  • certificate information of access network e.g., password
  • AP Access Point, access node
  • these configuration information is usually told by the mobile terminal user by means of verbal or text, and then manually input and configured by the mobile terminal user, and only after the input and configuration are completely correct, the corresponding WIFI network can be accessed.
  • the embodiments of the present disclosure provide a method for a mobile terminal to connect to a network, a mobile terminal, and a terminal device, to solve the problem that the access efficiency of the mobile terminal to access the WIFI network is low, and the security of the WIFI network cannot be guaranteed.
  • a method for a mobile terminal to connect to a network includes: receiving a request message sent by a mobile terminal for accessing a WIFI network, where the request message includes the encrypted
  • the first authorization information is further included, where the first authorization information includes authorization distance information and/or authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network.
  • the authorization time information is used to indicate an authorized use period of the WIFI network;
  • the mobile terminal After determining that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network.
  • a method for a mobile terminal to connect to a network includes: sending a request message for connecting to the WIFI network to a device that provides a WIFI network, where the request message includes the encrypted
  • the first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network.
  • the authorization time information is used to indicate an authorized use period of the WIFI network;
  • a terminal device where the terminal device has a connection network right, and the terminal device includes:
  • a first receiving module configured to receive a request message that is sent by the mobile terminal and used to access the WIFI network, where the request message includes the first authorization information, in addition to the encrypted access information of the WIFI network,
  • the first authorization information authorization distance information and/or authorization time information
  • the authorization distance information is used to indicate an authorized coverage area of the WIFI network
  • the authorization time information is used to indicate authorized use of the WIFI network.
  • a judging module configured to determine whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information
  • An authorization module configured to: if the judgment result of the determining module is satisfied, decrypt the access information of the WIFI network; and after determining that the access information of the WIFI network is correct according to the decryption result, authorizing the mobile terminal Access to the WIFI network.
  • a mobile terminal including:
  • a sending module configured to send, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where The authorization information includes the authorization distance information and/or the authorization time information, wherein the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network.
  • An access module configured to: after the device that provides the WIFI network determines validity according to the request message, access the WIFI network.
  • a terminal device including a memory, and one or more programs, wherein one or more programs are stored in a memory and configured to be one or more
  • the processor executing the one or more programs includes instructions for: receiving a request message sent by the mobile terminal for accessing the WIFI network, wherein the request message includes the encrypted WIFI network And the first authorization information, where the first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network, The authorization time information is used to indicate an authorized use period of the WIFI network; Determining whether the mobile terminal satisfies corresponding authorization distance information and/or authorization time information in the first authorization information;
  • the device that provides the WIFI network And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization.
  • the distance information and/or the authorization time information where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network;
  • the device that provides the WIFI network determines the validity according to the request message, the device accesses the WIFI network.
  • the technical solutions provided by the embodiments of the present disclosure may include the following beneficial effects:
  • the request message for accessing the WIFI network carries the first authorization information, where the first authorization information includes the authorization distance information or the authorization time information or both, and the WIFI network indicated by the two types of information is used.
  • the use of one or all of the authorization coverage and the authorized usage time period controls the use of the WIFI network by the mobile terminal.
  • the mobile terminal accesses the WIFI network, it automatically determines whether the mobile terminal satisfies the corresponding authorized distance information and/or authorization time information in the first authorization information, that is, automatically determines whether the mobile terminal is authorized to cover the WIFI network indicated by the authorized distance information.
  • the mobile terminal can access the WIFI network without manual input and configuration, and the WIFI network access information will not be leaked due to display or notification.
  • the input and configuration are not manually performed, the access efficiency of the WIFI network is improved, and the use burden of the mobile terminal user is reduced; on the other hand, the access information of the WIFI network is not The user is explicitly notified, and the user can access the WIFI network without knowing the WIFI network access information, thereby avoiding the leakage of the WIFI network access information and ensuring the security of the WIFI network.
  • FIG. 1 is a flow chart of a method for a mobile terminal to connect to a network according to an exemplary embodiment.
  • FIG. 2 is a flow chart showing a method for a mobile terminal to connect to a network according to an exemplary embodiment.
  • FIG. 3 is an example according to an example.
  • FIG. 4 is a flow chart showing the steps of a method for a mobile terminal to connect to a network according to an exemplary embodiment.
  • FIG. 5 is a flowchart according to an exemplary embodiment. Flow chart of steps for authorizing interaction of the mobile terminal;
  • FIG. 6 is a structural block diagram of a terminal device according to an exemplary embodiment;
  • FIG. 7 is a structural block diagram of a terminal device according to an exemplary embodiment
  • FIG. 8 is a structural block diagram of a mobile terminal according to an exemplary embodiment
  • FIG. 9 is a structural block diagram of a mobile terminal according to an exemplary embodiment.
  • FIG. 10 is a schematic structural diagram of a mobile terminal authorization system according to an exemplary embodiment
  • FIG. 11 is a schematic structural diagram of a terminal device according to an exemplary embodiment
  • FIG. 12 is a schematic structural diagram of a router according to an exemplary embodiment. detailed description
  • FIG. 1 a flow chart of steps of a method for a mobile terminal to connect to a network according to a first embodiment of the present disclosure is shown.
  • the method for connecting the network to the mobile terminal of the present disclosure is described from the service side, such as the wireless router side that is connected to the server.
  • the method for the mobile terminal to connect to the network in this embodiment includes the following steps:
  • step S102 a request message for accessing the WIFI network sent by the mobile terminal is received.
  • the request message includes, in addition to the access information of the encrypted WIFI network, the first authorization information, where the first authorization information includes any one or all of the authorization distance information and the authorization time information; the authorization distance information is used to indicate The authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.
  • the access information of the WIFI network includes information for accessing the WIFI network, such as VPN (Virtual Private
  • the authorization distance information is used to indicate the accessibility coverage of the WIFI network.
  • the authorization time information is used to indicate the authorized use time period of the WIFI network. In an actual application, the authorized use time period may be a time period such as 8AM to 10AM, or may be an expiration date, such as 24 hours from the time when the authorization information is sent, etc. .
  • step S104 it is determined whether the mobile terminal satisfies the corresponding authorized distance information and/or the authorization time information in the first authorization information; if yes, step S106 is performed; if not, step S110 is performed.
  • the wireless router or the hotspot device providing the WIFI network may only judge whether the mobile terminal is within the authorization coverage of the WIFI network indicated by the authorization distance information;
  • the wireless router provides The hotspot device of the win network may only judge whether the time when the mobile terminal sends the request message is within the authorized use period of the WIFI network indicated by the authorization time information;
  • the line router or the hotspot device providing the WIFI network needs to determine whether the mobile terminal is within the authorized coverage of the WIFI network indicated by the authorized distance information, and determine the mobile Whether the time at which the terminal sends the authorization information is within the authorized use period of the WIFI network indicated by the authorization time information.
  • the authorization coverage and the authorized usage time period are flexibly set by those skilled in the art according to actual needs, and the disclosure does not limit this.
  • step S106 if it is determined that the mobile terminal satisfies the corresponding authorized distance information and/or the authorized time information in the first authorization information, decrypting the access information of the WIFI network in the request message sent by the mobile terminal, and determining the decryption Whether the access information of the subsequent WIFI network is correct, if yes, step S108 is performed; if not, step S1 lOo is performed.
  • step S108 after determining that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network, and the process ends.
  • step S110 the mobile terminal is not allowed to access the WIFI network, and the process ends.
  • the request message for accessing the WIFI network carries the first authorization information, where the first authorization information includes the authorization distance information or the authorization time information or both, and the authorization of the WIFI network indicated by the foregoing two types of information
  • the mobile terminal accesses the WIFI network, it automatically determines whether the mobile terminal satisfies the corresponding authorized distance information and/or authorization time information in the first authorization information, that is, automatically determines whether the mobile terminal is authorized to cover the WIFI network indicated by the authorized distance information.
  • the mobile terminal In the range, or determining whether the time for the mobile terminal to send the authorization information is within the time period indicated by the authorization time information, or both, when the determination result is yes, then determining the WIFI network connection in the request message. Whether the incoming information is correct or not, if the access information is also correct, the mobile terminal is allowed to access the WIFI network without manual input and configuration, and the WIFI network access information is not leaked due to display or notification. And if it is automatically determined whether the mobile terminal satisfies the determination result of the corresponding authorization distance information and/or the authorization time information in the first authorization information, or if the judgment result is yes, but the WIFI network access information is incorrect, The mobile terminal is not allowed to access the WIFI network.
  • FIG. 2 a flow chart of steps of a method for a mobile terminal to connect to a network according to a second embodiment of the present disclosure is shown.
  • a method for connecting a mobile terminal of the present disclosure to a terminal device having a connection network authority such as a wireless router or a network hotspot, is taken as an example.
  • the terminal device having the connection authority of the network has been connected to the network side server, and receives the request message sent by the mobile terminal and processes it.
  • the method for connecting a mobile terminal to a network in this embodiment includes the following steps:
  • step S202 the terminal device having the connection authority of the network generates the second authorization information, and sends the second authorization information to the mobile terminal through the FC (Near Field Communication) technology.
  • FC Near Field Communication
  • the generated second authorization information includes one or all of the authorization distance information and the authorization time information, in addition to the access information of the encrypted WIFI network and the related information of the terminal device.
  • the related information of the terminal device may be related description or description information of the terminal device, and does not have a substantial impact on the mobile terminal connection network of the embodiment.
  • the second authorization information becomes an authorization information including distance and/or time, only in Valid for a certain distance and / or time.
  • the setting of the second authorization information includes the authorization distance information and the authorization time information.
  • the second authorization information may also have a right of being shared by a plurality of mobile terminals.
  • the second authorization information may also include the device information of the mobile terminal.
  • the second authorization information includes the device information of the mobile terminal, the second authorization information is only used for the WIFI network authorization of the mobile terminal.
  • the authorization information cannot be shared with other mobile terminals, that is, when other mobile terminals request access to the WIFI network using the authorization information containing the device information, they will be rejected.
  • the second authorization information may be shared by the plurality of mobile terminals, that is, the access to the WIFI network may be shared by the plurality of mobile terminals.
  • the second authorization information includes the sharing permission.
  • the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
  • the new authorization distance information and/or the authorization time information may be automatically generated, and the new authorization distance information and/or the authorization time information may be The original authorization distance information and/or the authorization time information may be the same, or may be different.
  • the authorization time of one mobile terminal is a permanent authorization
  • the new authorization time generated by the mobile terminal is 3 hours
  • the mobile terminal will have 3
  • the hour's authorization time is shared with other mobile terminals. That is, when the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals: the mobile terminal acquires the authorization distance information and/or the authorization time information in the second authorization information; The distance information and/or the authorization time information, the corresponding temporary authorization distance information and/or the temporary authorization time information are configured, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorized distance information, and the temporary authorization time information is The indicated WIFI network usage time period is within the time period indicated by the authorization distance information; the temporary authorization distance information and/or the temporary authorization time information, and the encrypted WIFI network access information in the second authorization information are used to generate the temporary authorization. Information; Send temporary authorization information to other mobile terminals requesting sharing authorization.
  • the second authorization information is sent to the mobile terminal by using the FC technology, for example, by using an FC chip or a dedicated FC device.
  • FC technology is a relatively common and adopted data transmission and interaction technology, with fast transmission speed, simple implementation and low implementation cost.
  • the terminal device having the connection authority of the network may be a wireless router, a network hotspot, or a mobile terminal.
  • step S204 the mobile terminal receives the second authorization information, obtains the authorized distance information and/or the authorized time information, and generates the first authorization information.
  • step S206 when the mobile terminal needs to access the WIFI network, the request message is generated and sent to the terminal device having the connection network authority, and the terminal device having the connection network authority receives the request message sent by the mobile terminal by using the FC technology.
  • the request message sent by the mobile terminal to the terminal device having the connection network includes the access information of the encrypted WIFI network in addition to the first authorization information generated in step S204, and may also have a current location similar to the mobile terminal. , current time and other information.
  • the terminal device with the right to connect to the network is a device capable of providing a WIFI network, such as a wireless router, a network hotspot, etc., and no longer includes the mobile terminal.
  • step S208 the terminal device having the connection network authority determines whether the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information; if yes, step S210 is performed; if not, step S214 is performed. .
  • the determining, by the terminal device having the connection authority of the network, whether the mobile terminal meets the corresponding authorization distance information and/or the authorization time information in the first authorization information comprises: determining whether the current location of the mobile terminal is in the WIFI network indicated by the corresponding authorized distance information Within the authorized coverage; and/or, determining whether the current time of the mobile terminal is within the authorized use period of the WIFI network indicated by the corresponding authorized time information.
  • the terminal device having the network connection authority needs to determine the location and time of the mobile terminal, and only the current location of the mobile terminal is in the WIFI.
  • the current time in the authorized coverage of the network and the time when the authorization information is sent is within the authorized use period, and subsequent processing is performed; otherwise, the mobile terminal is denied access to the WIFI network.
  • the terminal device with the connection network authority may first obtain the location information of the mobile terminal, such as GPS information or WIFI signal strength information, when determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information. And determining, according to the location information of the mobile terminal or the WIFI signal strength information, whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.
  • the method for determining whether the mobile terminal is within the authorized coverage of the WIFI network indicated by the authorized distance information is also applicable according to the current location of the mobile terminal, for example, obtaining the location information of the mobile terminal by using the base station, and determining according to the location information. Wait.
  • the terminal device having the connection network authority further needs to determine, in this step, the stored device information used when generating the second authorization information, and the request message sent by the received mobile terminal. Whether the device information matches. Only when the terminal device having the connection network authority determines that the stored device information used when generating the second authorization information matches the device information in the request message sent by the received mobile terminal, The terminal device that accesses the network authority performs the subsequent step S210 to authorize the mobile terminal to access the WIFI network; otherwise, the terminal device having the connection network authority will refuse the mobile terminal to access the WIFI network.
  • the terminal device having the connection network permission allows the mobile terminal to access the WIFI network in the second authorization information, and the authorization distance information and/or the authorization time information. Sharing to other mobile terminals, that is, other mobile terminals that do not directly receive authorization information from a terminal device having a connection network right, but obtain authorization information from another mobile terminal, and can also use the authorization information to access WIFI.
  • the internet
  • step S210 if the terminal device having the connection network authority determines that the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information, accessing the WIFI network in the authorization information sent by the mobile terminal The information is decrypted, and step S212 is performed.
  • step S212 when the terminal device having the connection network authority determines that the access information of the WIFI network is correct according to the decryption result, the mobile terminal is authorized to access the WIFI network, and the current process is terminated.
  • the method further includes: the device information carried by the received request message and the stored standard.
  • the device information is matched; if it is matched, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access the WIFI.
  • the APP application that controls the setting of the wireless router can be installed on the mobile terminal, if the mobile terminal is the authorization information directly obtained from the wireless router, and the device information carried in the request message sent by the mobile terminal to the wireless router is If the standard device information stored in the wireless router matches, the mobile terminal can not only access the WIFI network but also set the WIFI network; and if the mobile terminal that sends the request message to the wireless router is authorized from other mobile terminals Information, even if the mobile terminal carries its own device information in the request message, the device information cannot match the standard device information stored in the wireless router, and at this time, the mobile terminal can only access the WIFI network, and Unable to set up the WIFI network.
  • the terminal device having the network access authority determines that the distance is interrupted. If the request message sent by the mobile terminal is received again within the set time period, the mobile terminal is directly authorized to access the WIFI network. If the WIFI network is interrupted, the mobile terminal cannot access the WIFI network, and the mobile terminal may still be within the authorized coverage and/or authorized use period of the WIFI network. After the WIFI network resumes connection, the mobile terminal again sends the server to the server.
  • the terminal device that has the right to connect to the network will no longer verify the legality of the location and/or time of the mobile terminal, and will no longer verify the access information and correctness, and directly allow the mobile terminal to access again.
  • WIFI network The setting time period is flexibly set by a person skilled in the art according to actual needs, and the disclosure does not limit this.
  • step S214 the terminal device having the connection authority of the network does not allow the mobile terminal to access the WIFI network, and ends. This process.
  • the authorization information is exchanged through the FC technology, and can be changed at any time without manual intervention, and does not require manual memory, and is convenient and secure.
  • the authorization information includes authorization distance information and authorization time information, which can effectively control the use of the authorization information. Space and time effectively ensure the safe use of WIFI networks.
  • FIG. 3 a flow chart of steps of a method for a mobile terminal to connect to a network according to Embodiment 3 of the present disclosure is shown.
  • the method for connecting the mobile terminal of the present disclosure to the mobile terminal side that requests access to the WIFI network is described, and the following steps are included:
  • step S302 the mobile terminal sends a request message for connecting to the WIFI network to the device providing the WIFI network.
  • the request message is used to request access to the WIFI network, and the request message includes the first authorization information, and the first authorization information includes one of authorization distance information and authorization time information, in addition to the access information of the encrypted WIFI network. Or all.
  • the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.
  • the device providing the WIFI network can be used for the mobile terminal to connect to the WIFI network.
  • the device can be a wireless router or a network hotspot; the device providing the WIFI network can also generate authorization information, and when generating the authorization information, the device providing the WIFI network It may be a terminal device having a connection network authority such as the above-mentioned wireless router or network hotspot, or may be a mobile terminal. When it is a mobile terminal, the mobile terminal may generate temporary authorization information to share with other mobile terminals.
  • step S304 after the device that provides the WIFI network determines the validity according to the request message, the mobile terminal accesses the WIFI network.
  • the WIFI network can be accessed without manual input and setting on the mobile terminal, which reduces the operation burden of the user and improves the access efficiency of the WIFI network.
  • the access information is transparent to the user and avoids information leakage. , improve the security of the WIFI network.
  • FIG. 4 a flow chart of steps of a method for a mobile terminal to connect to a network according to Embodiment 4 of the present disclosure is shown.
  • This embodiment still describes the method for connecting the mobile terminal of the present disclosure to the mobile terminal side that requests access to the WIFI network, and includes the following steps:
  • step S402 the mobile terminal receives the second authorization information sent by the terminal device having the connection network authority by using the FC technology.
  • the second authorization information is used by the terminal device having the connection network authority to authorize the mobile terminal to access the WIFI network, and the second authorization information includes the access information of the encrypted WIFI network and the related information of the terminal device having the network access authority. And including one or all of the authorization distance information and the authorization time information, the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use period of the WIFI network.
  • the second authorization information may further include device information of the mobile terminal.
  • the second authorization information includes the device information of the mobile terminal, the second authorization information is only available to the mobile terminal corresponding to the device information to access the WIFI network. Other mobile terminals cannot use the authorization information to access the WIFI network.
  • the second authorization information is set to include the access information and the authorized distance information of the encrypted WIFI network, and does not include the authorization time information and the device information.
  • the authorization distance information, the authorization time information, and the device information may be set according to actual needs, and when the information is included Processing may be implemented with reference to corresponding portions of various embodiments of the present disclosure.
  • the authorization information may be shared by multiple mobile terminals, and the authorization information is commonly used to access the WIFI network.
  • the mobile terminal can also interact with the terminal device having the right to connect to the network through other devices or channels, and receive the authorization information sent by the terminal device having the connection authority of the network, and is not limited to the FC technology.
  • a terminal device having a connection network authority may be a wireless router, a network hotspot, or a mobile terminal that can share authorization information.
  • step S404 the mobile terminal acquires the access information of the encrypted WIFI network, the authorization distance information and/or the authorization time information from the second authorization information, and generates the first authorization information by using the authorization distance information and/or the authorization time information.
  • step S406 when accessing the WIFI network, the mobile terminal sends a request message for connecting to the WIFI network to the device providing the WIFI network through the FC technology.
  • the request message carries the first authorization information and the access information of the encrypted WIFI network.
  • the device providing the WIFI network can be a wireless router or a network hotspot.
  • step S408 after the device to be provided with the WIFI network determines the validity according to the request message, the mobile terminal accesses the WIFI network.
  • the device that provides the WIFI network further matches the device information carried in the received request message with the stored standard device information after determining the legality; If it matches, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access the WIFI network.
  • step S410 the mobile terminal receives an authorization information sharing request sent by another mobile terminal.
  • the second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device information of the mobile terminal receiving the second authorization information matches the stored standard device information, The second authorization information includes the sharing authority. At this time, the mobile terminal can share the access information of the encrypted WIFI network in the second authorization information to other mobile terminals by using the sharing authority.
  • the second authorization information may be shared by the plurality of mobile terminals.
  • the authorization information is shared to the mobile terminal B, but is not limited thereto. In practical applications, the mobile terminal A may also be used.
  • the authorization information is sent to the mobile terminal B to realize the sharing of the authorization information.
  • the number of mobile terminals sharing the authorization information is not limited. In this embodiment, only the mobile terminal B is taken as an example, and other Other mobile terminals sharing the authorization information at the mobile terminal A, or sharing processing of other mobile terminals sharing the authorization information from the mobile terminal B, may be implemented by referring to this embodiment.
  • step S412 the mobile terminal shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals according to the authorization information sharing request through the sharing authority.
  • a feasible way is to directly send the access information of the encrypted WIFI network and the authorized distance information and/or the authorized time information in the original second authorization information to other mobile terminals, that is, in the second authorization information.
  • Information such as access information, authorized distance information (if any), and authorized time information (if any) are not changed.
  • Other mobile terminals enjoy the same WIFI network authorization coverage and authorized use as the mobile terminal. period.
  • Another possible manner is: obtaining authorization distance information and/or authorization time information in the second authorization information; configuring corresponding temporary authorization distance information and/or temporary authorization time information according to the authorization distance information and/or the authorization time information, The WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the WIFI network usage time period indicated by the temporary authorization time information is within the time period indicated by the authorization distance information; using the temporary authorization distance information and/or Or temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information, generating temporary authorization information; sending the temporary authorization information to other mobile terminals requesting the sharing authorization, such as sending the authorization information sharing request terminal.
  • the mobile terminal performs secondary setting on the basis of its own authorized coverage and/or authorized use time period, so that the authorization of other mobile terminals sharing the authorization information is further restricted.
  • the secondary settings for different mobile terminals may be different.
  • the authorization information includes both the authorization coverage range and the authorized usage time period, you can also perform secondary settings for only one of them.
  • no matter how the secondary setting is performed no matter how many times the authorization information is shared, or how many mobile terminals are shared, the access information is the same as the access information in the original authorization information, and no change occurs.
  • the mobile terminal transmits the temporary authorization information to other mobile terminals requesting the sharing authorization by the FC technology when transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization.
  • steps S410-S412 is not limited to the manner after step S408, in fact, after the mobile terminal obtains the authorization information, that is, at any time after step S402.
  • the WIFI network can be accessed without manual input and setting on the mobile terminal, thereby reducing the operation burden of the user and improving the access efficiency of the WIFI network; the access information is transparent to the user, avoiding information leakage and improving The security of the WIFI network; the authorization information can be conveniently shared among multiple mobile terminal users, which is convenient to use, improves the ease of operation of the WIFI network access, and further improves the access efficiency of the WIFI network.
  • FIG. 5 a flow chart of steps for authorizing an interaction of a mobile terminal according to Embodiment 5 of the present disclosure is shown.
  • This embodiment describes the interaction process when the mobile terminal of the present disclosure is authorized from the perspective of the interaction between the device providing the WIFI network and the mobile terminal.
  • the mobile terminal authorization method of this embodiment includes the following steps:
  • step S502 the mobile terminal A establishes a short-range wireless connection with the device B that provides the WIFI network.
  • a short-range wireless connection is established through the FC technology, and the device providing the WIFI network may be a wireless router or a network hotspot.
  • step S504 the device B providing the WIFI network generates authorization information (including the time validity period and the effective distance) according to the WIFI network access information saved by the established wireless connection, and transmits the information to the mobile terminal A.
  • the device B that provides the WIFI network adds a "time validity period", that is, an authorization time information, and an "effective distance", that is, an authorization distance information, to the attribute of the WIFI network access information, if the validity period is 24 hours, and the authorization is performed after the valid time is exceeded.
  • the information is automatically invalidated; the effective distance is 2 meters.
  • the authorization information is automatically invalidated.
  • step S506 after receiving the authorization information of the device B providing the WIFI network, the mobile terminal A saves and extracts the verification information (such as password, verification answer, verification string, etc.).
  • the verification information such as password, verification answer, verification string, etc.
  • the verification information is not displayed on the screen (this ensures that the mobile terminal A can have authorization information and does not know the password).
  • step S508 after receiving the authorization information, if the authorization information carries the time validity period, the mobile terminal A starts timing, and automatically clears the authorization information after the validity period is reached; if the authorization information carries the effective distance, the distance sensor is started. The distance between the local end and the device B that provides the WIFI network or the distance from the verification device is detected. When the distance exceeds the effective distance, the authorization information is automatically cleared.
  • the distance is still considered to be within the effective distance.
  • a predetermined time e.g. 10 minutes
  • the mobile terminal A when the mobile terminal A uses the authorization information, when the verification device is a WIFI hotspot, the mobile terminal A initiates the connection of the WIFI function, scans the WIFI hotspot and sends a connection request, and the connection request carries The authentication information extracted by the authorization information, the WIFI hotspot determines the legality of the user A according to the verification information; when the verification device is the access control, etc., it detects that the device to be verified moves within a predetermined distance, and obtains the verification information to verify its legality.
  • the authorization information can be shared by the mobile terminal A to other mobile terminals.
  • user A goes to a restaurant to eat, and after the mobile terminal used by user A obtains the authorization for network access, the authorization can also be shared to the mobile terminal of other user B, when the mobile terminal of user B leaves the restaurant. If the predetermined time is exceeded, User B's mobile terminal re-enters the coverage of the restaurant network, and its network authorization is still valid.
  • the mobile terminal of user A can share the authorization information to the mobile terminal of user B through the FC technology, and the mobile terminal of user B directly obtains the authorization without displaying the password.
  • a password verification device is installed on the door lock of the house.
  • the mobile phone is close to the scanning area of the password verification device, the validity of the password is verified and it is determined whether the door is opened.
  • user A's mobile phone shares the authorization information to user B's mobile phone through FC technology, and user B's mobile phone directly obtains authorization. Do not display the password.
  • the authorization information has a certain distance and time limit. For example, the authorization information may be valid within one day, and when the validity period is exceeded, the authorization information is invalid.
  • the authorization information is exchanged by the FC, and can be changed at any time without manual intervention, and does not require manual memory, which is convenient and safe.
  • the authorization information includes the effective distance and the effective time, and can effectively control the use space and time of the authorization information. .
  • FIG. 6 a block diagram of a terminal device according to Embodiment 6 of the present disclosure is shown.
  • the terminal device of the embodiment has a connection network authority, and the terminal device includes: a first receiving module 602, configured to receive a request message that is sent by the mobile terminal and used to access the WIFI network, where the request message includes the encrypted WIFI network.
  • the first authorization information is further included, wherein the first authorization information authorizes the distance information and/or the authorization time information, the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the WIFI network.
  • the authorization module 604 is configured to determine whether the mobile terminal satisfies the corresponding authorization distance information and/or the authorization time information in the first authorization information, and the authorization module 606 is configured to: if the judgment result of the determination module 604 is satisfied, Then, the access information of the WIFI network is decrypted; when the access information of the WIFI network is determined according to the decryption result, the mobile terminal is authorized to access the WIFI network.
  • the terminal device in this embodiment is used to implement the corresponding mobile terminal authorization method on the terminal device side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.
  • FIG. 7 a block diagram of a terminal device according to a seventh embodiment of the present disclosure is shown.
  • the embodiment of the present invention further optimizes the structure of the terminal device in the sixth embodiment.
  • the optimized terminal device further includes: a generating and sending module 608, configured to receive, by the first receiving module 602, the terminal for transmitting the WIFI network Before the request message, the second authorization information is generated, and the second authorization information is sent to the mobile terminal by using the FC technology, where the second authorization information includes the authorization distance information and/or the authorization time information, and the encryption The access information of the WIFI network and the information of the terminal device.
  • the first receiving module 602 is configured to receive, by using the FC technology, a request message sent by the mobile terminal to access the WIFI network.
  • the determining module 604 determines whether the current location of the mobile terminal is in the WIFI network indicated by the corresponding authorized distance information when determining whether the mobile terminal meets the authorized distance information and/or the authorized time information in the authorization information. Within the authorized coverage; and/or, determining whether the current time of the mobile terminal is within the authorized use period of the WIFI network indicated by the corresponding authorized time information.
  • the determining module 604 obtains the location information or the WIFI signal strength information of the mobile terminal when determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information; The location information or the WIFI signal strength information determines whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.
  • the optimized terminal device further includes: an interrupt authorization module 610, configured to connect the mobile terminal to the WIFI network.
  • an interrupt authorization module 610 configured to connect the mobile terminal to the WIFI network.
  • the authorization module 606 is further configured to: after determining that the access information of the WIFI network is correct, the device information carried by the received request message and the stored The standard device information is matched; if it matches, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have the right to use the WIFI network, and the mobile terminal is authorized to access. WIFI network.
  • the second authorization information when the second authorization information is generated, if the device information of the mobile terminal that receives the second authorization information matches the stored standard device information, the second authorization information includes the sharing authority; The sharing authority shares the access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
  • the mobile terminal acquires the authorized distance information and/or the authorization time information in the second authorization information when sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals; And configuring the corresponding temporary authorization distance information and/or the temporary authorization time information according to the authorization distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the temporary authorization is performed.
  • the time period of the WIFI network indicated by the time information is within the time period indicated by the authorization distance information; the temporary authorization distance information and/or the temporary authorization time information, and the access information of the encrypted WIFI network in the second authorization information are generated.
  • Temporary authorization information Send temporary authorization information to other mobile terminals requesting sharing authorization.
  • the terminal device in this embodiment is used to implement the corresponding mobile terminal authorization method on the terminal device side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.
  • FIG. 8 a block diagram of a structure of a mobile terminal according to an eighth embodiment of the present disclosure is shown.
  • the mobile terminal of this embodiment includes: a sending module 702, configured to send a request message for connecting to the WIFI network to the device that provides the WIFI network, where the request message includes the first authorization information, in addition to the access information of the encrypted WIFI network.
  • the first authorization information includes the authorization distance information and/or the authorization time information, where the authorization distance information is used to indicate the authorized coverage of the WIFI network, and the authorization time information is used to indicate the authorized use time period of the WIFI network; After the device that provides the WIFI network determines the legitimacy according to the request, it accesses the WIFI network.
  • the mobile terminal in this embodiment is used to implement the mobile terminal authorization method on the mobile terminal side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.
  • FIG. 9 a block diagram of a structure of a mobile terminal according to Embodiment 9 of the present disclosure is shown.
  • the embodiment of the present invention further optimizes the structure of the mobile terminal in the eighth embodiment.
  • the optimized mobile terminal further includes: a receiving module 706, configured to send, before the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network.
  • the second authorization information includes the access information of the encrypted WIFI network and the information of the terminal device, and the authorization distance information and/or the authorization time information.
  • the second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device information of the mobile terminal receiving the second authorization information and the stored standard device information The matching, the second authorization information includes the sharing authority; the optimized mobile terminal further includes: an authorization sharing module 708, configured to share the access information of the encrypted WIFI network in the second authorization information to the other by using the sharing authority Mobile terminal.
  • an authorization sharing module 708 configured to share the access information of the encrypted WIFI network in the second authorization information to the other by using the sharing authority Mobile terminal.
  • the authorization sharing module 708 includes: an information obtaining module 7082, configured to obtain authorization distance information and/or authorization time information in the second authorization information by using the sharing authority; and a configuration module 7084, configured to use the authorized distance Information and/or authorization time information, configured with corresponding temporary authorization distance information and/or temporary authorization time information, wherein the WIFI network coverage indicated by the temporary authorization distance information is within the coverage indicated by the authorization distance information, and the temporary authorization time information indication The WIFI network usage time period is within a time period indicated by the authorization distance information; the generating module 1086 is configured to use the temporary authorization distance information and/or the temporary authorization time information, and the encrypted WIFI network access in the second authorization information.
  • the shared sending module 7088 is configured to send the temporary authorization information to other mobile terminals requesting the sharing authorization by using the FC technology.
  • the sending module 702 when the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network, the sending module 702 sends a request message for connecting to the WIFI network to the device providing the WIFI network through the FC technology.
  • the mobile terminal in this embodiment is used to implement the mobile terminal authorization method on the mobile terminal side in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.
  • Example ten
  • the mobile terminal authorization system of this embodiment includes a terminal device 802 having a connection network authority and a mobile terminal
  • the terminal device 802 includes: an authorization information signing module 8022 (which can implement the function of generating the sending module 608 in the terminal device of the seventh embodiment), is responsible for interacting with the mobile terminal through a channel such as FC, and issuing an authorization information to the mobile terminal.
  • the authorization information is an authorization message containing distance and/or time, and the encrypted Token is valid only for a certain distance and/or time.
  • the authorization information verification module 8024 (which can implement the functions of the first receiving module 602, the determining module 604, the authorization module 606, and the interrupt authorization module 610 in the sixth and seventh embodiments), and receives the mobile terminal when the terminal device such as a wireless router or a network hotspot After the transferred authorization information, the authorization information needs to be verified.
  • the validity can be based entirely on distance, or it can be based entirely on time, or it can be based on a combination of the two.
  • the module also includes a distance sensing function. If the terminal device senses that the user is gradually moving away, It is sensed by location information such as GPS information, or it can be perceived by other information such as changes in the strength of the WIFI connection signal, and the authorization of the user is cancelled. Of course, if the user suddenly loses contact with them, the network may be interrupted, the terminal device cannot judge whether the user has left, avoiding authorization to the user again, and the validity of the authorization may be controlled by time, for example, within 30 minutes, the user is again with the server. Once the connection is established, the previous authorization continues to be valid.
  • the mobile terminal 804 includes: an authorization information transmission module 8042 (implementing the functions of the transmission module 702 and the access module 704 in the eighth and ninth embodiments), and uploading the obtained authorization information to the terminal device.
  • the authorization information can be device-dependent or device-independent. If it is not related to the device, a mobile terminal is authorized, and can also share the authorization information with other mobile terminals through devices such as FC.
  • the mobile terminal authorization system of the present embodiment is used to implement the corresponding mobile terminal authorization method in the foregoing multiple method embodiments, and has the beneficial effects of the corresponding method embodiments, and details are not described herein again.
  • the terminal device can be used to implement a method for connecting a mobile terminal to a network provided in the foregoing embodiment.
  • the terminal can be a router, a mobile phone, a tablet pad, a wearable mobile device (such as a smart watch), and the like.
  • a router a mobile phone, a tablet pad, a wearable mobile device (such as a smart watch), and the like.
  • the terminal device 700 can include a communication unit 110, a memory 120 including one or more computer readable storage media, an input unit 130, a display unit 140, a sensor 150, an audio circuit 160, a WiFi (wireless fidelity) module 170.
  • a processor 180 having one or more processing cores, and a power supply 190 and the like. It will be understood by those skilled in the art that the terminal device structure shown in FIG. 11 does not constitute a limitation of the terminal device, and may include more or less components than those illustrated, or may be combined with some components, or different component arrangements.
  • the communication unit 110 can be used for transmitting and receiving information or receiving and transmitting signals during a call.
  • the communication unit 110 can be a network communication device such as an RF (Radio Frequency) circuit, a router, a modem, or the like. Specifically, when the communication unit 110 is an RF circuit, the downlink information of the base station is received, and then processed by one or more processors 180; in addition, data related to the uplink is transmitted to the base station.
  • RF circuits as communication units include, but are not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, and a LNA (Low Noise Amplifier, low) Noise amplifier), duplexer, etc.
  • SIM Subscriber Identity Module
  • the communication unit 110 can also communicate with the network and other devices through wireless communication.
  • Wireless communication can use any communication standard or protocol, including but not limited to GSM (Global System of Mobile communication), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access, code) Divisional Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), E-mail, SMS (Short Messaging Service), and the like.
  • the memory 120 can be used to store software programs and modules, and the processor 180 executes various functional applications and data processing by running software programs and modules stored in the memory 120.
  • the memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the terminal device 700 (such as audio data, phone book, etc.) and the like.
  • the memory 120 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, or Other volatile solid-state storage devices. Accordingly, memory 120 may also include a memory controller to provide access to memory 120 by processor 180 and input unit 130.
  • Input unit 130 can be used to receive input numeric or character information, as well as to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 130 can include touch sensitive surface 131 and other input devices 132.
  • Touch-sensitive surface 131 also referred to as a touch display or trackpad, can collect touch operations on or near the user (eg, the user uses a finger, stylus, etc., on any touch-sensitive surface 131 or on the touch-sensitive surface 131 The operation near the touch-sensitive surface 131) and driving the corresponding connecting device according to a preset program.
  • the touch-sensitive surface 131 may include two portions of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information
  • the processor 180 is provided and can receive commands from the processor 180 and execute them.
  • the touch-sensitive surface 131 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 130 can also include other input devices 132.
  • other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • Display unit 140 can be used to display information entered by the user or information provided to the user as well as various graphical user interfaces of terminal device 700, which can be constructed from graphics, text, icons, video, and any combination thereof.
  • the display unit 140 may include a display panel 141.
  • the display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like.
  • the touch-sensitive surface 131 may cover the display panel 141, and when the touch-sensitive surface 131 detects a touch operation thereon or nearby, it is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 according to the touch event The type provides a corresponding visual output on display panel 141.
  • touch-sensitive surface 131 and display panel 141 are implemented as two separate components to implement input and input functions, in some embodiments, touch-sensitive surface 131 can be integrated with display panel 141 for input. And output function.
  • Terminal device 700 can also include at least one type of sensor 150, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 141 according to the brightness of the ambient light, and the proximity sensor may close the display panel 141 when the terminal device 700 moves to the ear. And / or backlight.
  • the gravity acceleration sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the terminal device 700 can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, here No longer.
  • the audio circuit 160, the speaker 161, and the microphone 162 can provide an audio interface between the user and the terminal device 700.
  • the audio circuit 160 can transmit the converted electrical data of the received audio data to the speaker 161 for conversion to the sound signal output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electrical signal by the audio circuit 160. After receiving, it is converted into audio data, and then processed by the audio data output processor 180, and then passed through the RF circuit 110. It is sent to, for example, another terminal device, or the audio data is output to the memory 120 for further processing.
  • the audio circuit 160 may also include an earbud jack to provide communication of the peripheral earphones with the terminal device 700.
  • the terminal device may be configured with a wireless communication unit 170, which may be a WiFi module.
  • WiFi is a short-range wireless transmission technology, and the terminal device 700 can help users to send and receive emails, browse web pages, and access streaming media through the wireless communication unit 170, which provides users with wireless broadband Internet access.
  • FIG. 11 shows the wireless communication unit 170, it can be understood that it does not belong to the essential configuration of the terminal device 700, and may be omitted as needed within the scope of not changing the essence of the disclosure.
  • the processor 180 is the control center of the terminal device 700, which connects various portions of the entire handset using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 120, and recalling data stored in the memory 120.
  • the various functions and processing data of the terminal device 700 are executed to perform overall monitoring of the mobile phone.
  • the processor 180 may include one or more processing cores; in one embodiment, the processor 180 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, and For applications, etc., the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 180.
  • the terminal device 700 also includes a power source 190 (such as a battery) that supplies power to the various components.
  • the power source can be logically coupled to the processor 180 through a power management system to manage charging, discharging, and power consumption through the power management system. Management and other functions.
  • Power supply 190 may also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the terminal device 700 may further include a camera, a Bluetooth module, and the like, and details are not described herein.
  • the display unit of the terminal device is a touch screen display
  • the terminal device further includes a memory, and one or more programs, wherein one or more programs are stored in the memory, and configured to be one or one
  • the above processor executing the one or more programs includes instructions for performing the following operations:
  • the mobile terminal And receiving, by the mobile terminal, a request message for accessing the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization The information includes an authorization distance information and/or an authorization time information, where the authorization distance information is used to indicate an authorized coverage of the WIFI network, and the authorization time information is used to indicate an authorized use period of the WIFI network;
  • the device that provides the WIFI network And sending, by the device that provides the WIFI network, a request message that is connected to the WIFI network, where the request message includes, in addition to the encrypted access information of the WIFI network, first authorization information, where the first authorization information includes authorization.
  • Distance information and/or authorization time information wherein the authorization distance information is used to indicate an authorization of the WIFI network a coverage range, where the authorization time information is used to indicate an authorized use period of the win network;
  • the memory further includes instructions to:
  • the method further includes: generating, by the terminal device having the connection network permission, second authorization information, and transmitting, by using the near field communication FC technology, the mobile terminal a second authorization information, where the second authorization information includes, in addition to the authorization distance information and/or the authorization time information, access information of the encrypted WIFI network and the
  • the step of receiving the request message for accessing the WIFI network sent by the mobile terminal includes: receiving, by the FC technology, the request message sent by the mobile terminal.
  • the memory further includes instructions to:
  • Determining whether the mobile terminal meets the corresponding authorized distance information and/or the authorized time information in the authorization information comprises: determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information Inside; and/or,
  • the memory further includes instructions to:
  • Determining whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information comprises: acquiring location information of the mobile terminal or WIFI signal strength information; according to location information of the mobile terminal or WIFI The signal strength information determines whether the current location of the mobile terminal is within the authorized coverage of the WIFI network indicated by the corresponding authorized distance information.
  • the memory further includes instructions to:
  • the connection is resumed, and it is determined whether the request message sent by the mobile terminal is received again within the set time period after the interruption; if it is determined that the mobile terminal is received again within the set time period
  • the request message sent directly authorizes the mobile terminal to access the WIFI network.
  • the memory further includes instructions to:
  • the method further includes: receiving the device information and the stored standard carried by the request message The device information is matched; if it is matched, it is determined that the mobile terminal has the right to set and use the WIFI network, and the mobile terminal is authorized to access the WIFI network; if not, the mobile terminal is determined to have a WIFI network. Authorizing the mobile terminal to access the WIFI network.
  • the memory further includes instructions to:
  • the memory further includes instructions to:
  • the step of the mobile terminal sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals includes: the mobile terminal acquiring the authorized distance information and/or the authorization time in the second authorization information.
  • the mobile terminal configures corresponding temporary authorization distance information and/or temporary authorization time information according to the authorization distance information and/or the authorization time information, where the WIFI network coverage indicated by the temporary authorization distance information is in the Within the coverage indicated by the authorization distance information, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information; the mobile terminal uses the temporary authorization distance information and/or temporary authorization time
  • the information, and the access information of the encrypted WIFI network in the second authorization information generates temporary authorization information; the mobile terminal sends the temporary authorization information to other mobile terminals requesting the sharing authorization.
  • the memory further includes instructions to:
  • the method further includes: receiving second authorization information sent by the terminal device having the connection network permission, where the second authorization information is used for Authorizing the mobile terminal to access the WIFI network, the second authorization information, in addition to the encrypted access information of the WIFI network and the information of the terminal device, the authorization distance information and/or the authorization time information.
  • the memory further includes instructions to:
  • the second authorization information is generated by the terminal device having the connection network authority; when the terminal device having the connection network authority generates the second authorization information, if the device of the mobile terminal receiving the second authorization information The information matches the stored standard device information, and the second authorization information includes sharing rights;
  • the method further includes: sharing, by the sharing authority, access information of the encrypted WIFI network in the second authorization information to other mobile terminals.
  • the memory further includes instructions to:
  • the step of sharing the access information of the encrypted WIFI network in the second authorization information to other mobile terminals includes:
  • the WIFI network coverage indicated by the temporary authorization distance information is indicated by the authorized distance information Within the coverage, the WIFI network usage time period indicated by the temporary authorization time information is within a time period indicated by the authorization distance information;
  • the temporary authorization information is sent to other mobile terminals requesting the sharing authorization.
  • the memory further includes instructions to:
  • the step of transmitting the temporary authorization information to other mobile terminals requesting the sharing authorization includes: The temporary authorization information is transmitted to other mobile terminals requesting the sharing authorization by the near field communication FC technology.
  • the memory further includes instructions to:
  • the step of sending a request message for connecting to the WIFI network to the device providing the WIFI network includes: sending, by the near field communication FC technology, a request message for connecting to the WIFI network to the device providing the WIFI network.
  • the router 1200 may generate a large difference due to different configurations or performances, and may include one or more central processing units (CPUs) 1201. (eg, one or more processors) and memory 1202, one or more storage media 1205 that store application 1203 or data 1204 (eg, one or one storage device in Shanghai).
  • the memory 1202 and the storage medium 1205 may be short-term storage or persistent storage.
  • the program stored on the storage medium 1205 may include one or more modules (not shown), and each module may include a series of instructions for operation in the router. Still further, the processor 1201 can be configured to communicate with the storage medium 1205 to perform a series of instruction operations in the storage medium 1205 on the router 1200.
  • Router 1200 can also include one or more power supplies 1206, one or more wired or wireless network interfaces 1207, one or more input and output interfaces 1208, one or more keyboards or touch screens 1209, one or more indicator lights 1210 and/or Or, one or more operating systems 1211, such as MIUI, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • the indicator light 1210 is used to indicate the status of each part of the router, for example, display network status, power status, data transmission status, wifi status, and the like.
  • FC modules 1212 for transmitting information by FC.
  • Embodiments of the present disclosure provide a distance and/or time based authorization scheme. When the distance and/or time is exceeded, the authorization is invalidated, reused, and reauthorization is required.
  • the authorization information is exchanged through the FC, and can be changed at any time without manual intervention, and does not require manual memory, and is convenient and safe.
  • the authorization information includes effective distance and/or effective time information, which can be effectively controlled.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

L'invention concerne un procédé d'accès à un réseau d'un terminal mobile, un terminal mobile et un dispositif de terminal. Le procédé comporte les étapes consistant à: recevoir un message de demande envoyé par un terminal mobile et utilisé pour accéder à un réseau Wi-Fi, le message de demande comportant des informations d'accès d'un réseau Wi-Fi crypté et comportant en outre des premières informations d'habilitation; déterminer si le terminal mobile satisfait des informations de distance d'habilitation et/ou des informations de durée d'habilitation correspondantes figurant dans les premières informations d'habilitation; dans l'affirmative, décrypter les informations d'accès au réseau Wi-Fi; et après qu'il a été déterminé, en fonction d'un résultat de décryptage, que les informations d'accès au réseau Wi-Fi sont correctes, habiliter le terminal mobile à accéder au réseau Wi-Fi. La solution selon les modes de réalisation de la présente invention améliore le rendement d'accès à un réseau Wi-Fi, évite les fuites d'informations d'accès au réseau Wi-Fi et assure la sécurité du réseau Wi-Fi.
PCT/CN2014/076040 2013-08-29 2014-04-23 Procédé d'accès à un réseau d'un terminal mobile, terminal mobile et dispositif de terminal WO2015027712A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201310385160.8A CN103476030B (zh) 2013-08-29 2013-08-29 移动终端连接网络的方法、移动终端与终端设备
CN201310385160.8 2013-08-29

Publications (1)

Publication Number Publication Date
WO2015027712A1 true WO2015027712A1 (fr) 2015-03-05

Family

ID=49800698

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/076040 WO2015027712A1 (fr) 2013-08-29 2014-04-23 Procédé d'accès à un réseau d'un terminal mobile, terminal mobile et dispositif de terminal

Country Status (2)

Country Link
CN (1) CN103476030B (fr)
WO (1) WO2015027712A1 (fr)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108616888A (zh) * 2018-05-04 2018-10-02 努比亚技术有限公司 无线热点授权连接方法、移动终端及计算机可读存储介质
CN108780488A (zh) * 2018-03-22 2018-11-09 深圳达闼科技控股有限公司 物质检测信息的上传及上传权限的确定方法、系统及装置
CN112333631A (zh) * 2020-03-11 2021-02-05 徐苗 基于区块链的wifi接入位置信号共识系统

Families Citing this family (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103476030B (zh) * 2013-08-29 2016-12-28 小米科技有限责任公司 移动终端连接网络的方法、移动终端与终端设备
CN103874164B (zh) * 2014-02-28 2017-06-06 上海升途智能系统有限公司 通过nfc连接wifi的方法、系统和移动终端设备
CN103889029A (zh) * 2014-03-24 2014-06-25 深圳市云猫信息技术有限公司 一种网络热点共享方法及客户端、共享端、管理服务器
CN103929742B (zh) * 2014-04-22 2018-06-05 杭州爱纬斯电子有限公司 移动终端借道WiFi安全共享网络摄像头的方法及智控装置
CN104105163B (zh) * 2014-07-08 2018-04-13 深圳市比巴科技有限公司 声波发送方法、接收方法、发送装置、接收装置及系统
CN104363631B (zh) * 2014-10-24 2019-03-08 小米科技有限责任公司 无线路由器的连接方法、装置和系统
CN105740662B (zh) * 2014-12-09 2019-02-05 联想(北京)有限公司 一种信息处理方法及电子设备
CN104580175A (zh) * 2014-12-26 2015-04-29 深圳市兰丁科技有限公司 一种设备授权方法和装置
CN104539617A (zh) * 2014-12-26 2015-04-22 深圳市金立通信设备有限公司 一种网络连接控制方法
CN104581724A (zh) * 2014-12-26 2015-04-29 深圳市金立通信设备有限公司 一种终端
CN106416337B (zh) * 2015-03-31 2020-01-31 华为技术有限公司 获取鉴权信息的方法、装置及终端
CN106332076A (zh) * 2015-06-23 2017-01-11 西安中兴新软件有限责任公司 一种无线接入方法、装置和系统
CN104955036B (zh) * 2015-07-07 2019-04-05 北京长亭科技有限公司 公共Wi-Fi环境下安全联网方法和装置
CN105162775A (zh) * 2015-08-05 2015-12-16 深圳市方迪科技股份有限公司 虚拟机登陆方法及装置
CN105228216B (zh) * 2015-08-29 2019-06-11 宇龙计算机通信科技(深圳)有限公司 一种网络接入方法及终端
CN105307169B (zh) * 2015-09-18 2018-12-28 腾讯科技(深圳)有限公司 访客网络的接入方法、装置和系统
US10057022B2 (en) * 2015-09-28 2018-08-21 Yazaki Corporation Method for controlling access to an in-vehicle wireless network
CN105391770A (zh) * 2015-10-13 2016-03-09 北京乐动卓越科技有限公司 车载无线网络的使用方法及系统
CN105516972B (zh) * 2015-12-17 2019-07-19 小米科技有限责任公司 网络连接方法及装置
CN105657733B (zh) * 2016-01-29 2020-11-06 努比亚技术有限公司 网络稳定控制装置和方法
CN107426730A (zh) * 2016-05-24 2017-12-01 中兴通讯股份有限公司 一种无线设备的安全接入方法及装置
CN106469279A (zh) * 2016-08-30 2017-03-01 北京北信源软件股份有限公司 一种压缩加、解密的方法和系统
WO2018040805A1 (fr) * 2016-08-31 2018-03-08 华为技术有限公司 Procédé d'établissement d'une association dans un réseau local sans fil, terminal et point d'accès
CN107786972B (zh) 2016-08-31 2020-07-24 华为技术有限公司 无线局域网中建立关联的方法、终端和接入点
CN106412907B (zh) * 2016-09-14 2020-02-14 Oppo广东移动通信有限公司 一种网络接入方法、相关设备及系统
DE102016220544A1 (de) * 2016-10-20 2018-04-26 Krones Ag Maschine zur Verarbeitung von Lebensmitteln und Verpackungsprodukten
CN106507279A (zh) * 2016-10-31 2017-03-15 努比亚技术有限公司 无线热点连接装置和方法
CN108024308B (zh) * 2016-11-03 2022-02-25 上海掌门科技有限公司 无线接入点分享、连接的方法及设备
WO2018205064A1 (fr) * 2017-05-08 2018-11-15 深圳市卓希科技有限公司 Procédé et système de contrôle d'accès
CN107396362B (zh) * 2017-08-21 2021-07-23 上海掌门科技有限公司 一种用于对用户设备进行无线连接预授权的方法与设备
WO2019051647A1 (fr) * 2017-09-12 2019-03-21 深圳传音通讯有限公司 Procédé de partage de mot de passe wifi, premier terminal, second terminal et système
CN108769989B (zh) * 2018-05-14 2021-06-18 青岛海信宽带多媒体技术有限公司 一种无线网连接方法、无线接入装置和设备
CN110740288B (zh) * 2018-07-20 2022-02-01 钉钉控股(开曼)有限公司 投屏网络的管理方法、接入方法及装置
CN108848015A (zh) * 2018-08-13 2018-11-20 珠海格力电器股份有限公司 连接网络的方法、装置、智能设备及用户终端
CN109474419A (zh) * 2018-10-22 2019-03-15 航天信息股份有限公司 一种活体人像照片加密、解密方法及加解密系统
CN111246441B (zh) * 2020-02-26 2021-08-24 深圳市岍丞技术有限公司 蓝牙耳机与终端的连接方法、系统及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895876A (zh) * 2009-05-20 2010-11-24 阿尔卡特朗讯 一种在连接无线网络设备过程中验证用户身份的方法和装置
CN103200567A (zh) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 WiFi接入的方法和系统
CN103476030A (zh) * 2013-08-29 2013-12-25 小米科技有限责任公司 移动终端连接网络的方法、移动终端与终端设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101895876A (zh) * 2009-05-20 2010-11-24 阿尔卡特朗讯 一种在连接无线网络设备过程中验证用户身份的方法和装置
CN103200567A (zh) * 2012-01-05 2013-07-10 中兴通讯股份有限公司 WiFi接入的方法和系统
CN103476030A (zh) * 2013-08-29 2013-12-25 小米科技有限责任公司 移动终端连接网络的方法、移动终端与终端设备

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108780488A (zh) * 2018-03-22 2018-11-09 深圳达闼科技控股有限公司 物质检测信息的上传及上传权限的确定方法、系统及装置
CN108780488B (zh) * 2018-03-22 2023-05-05 北京云端光科技术有限公司 物质检测信息的上传及上传权限的确定方法、系统及装置
CN108616888A (zh) * 2018-05-04 2018-10-02 努比亚技术有限公司 无线热点授权连接方法、移动终端及计算机可读存储介质
CN112333631A (zh) * 2020-03-11 2021-02-05 徐苗 基于区块链的wifi接入位置信号共识系统
CN112333631B (zh) * 2020-03-11 2022-07-19 金网络(北京)电子商务有限公司 基于区块链的wifi接入位置信号共识系统

Also Published As

Publication number Publication date
CN103476030A (zh) 2013-12-25
CN103476030B (zh) 2016-12-28

Similar Documents

Publication Publication Date Title
WO2015027712A1 (fr) Procédé d'accès à un réseau d'un terminal mobile, terminal mobile et dispositif de terminal
EP4007321A1 (fr) Procédé de partage d'informations, appareil terminal, support d'informations et produit-programme d'ordinateur
US10880746B2 (en) Network connection method, apparatus, storage medium and terminal
WO2018176781A1 (fr) Procédé d'envoi d'informations, procédé de réception d'informations, appareil et système
WO2017118412A1 (fr) Procédé, appareil et système de mise à jour de clé
CN109600223B (zh) 验证方法、激活方法、装置、设备及存储介质
RU2608948C2 (ru) Способ, устройство и система для управления доступом к маршрутизатору
WO2017185711A1 (fr) Procédé, appareil et système permettant de commander un dispositif intelligent, et support d'informations
WO2017041599A1 (fr) Procédé de traitement de service et dispositif électronique
WO2015101273A1 (fr) Procédé de vérification de sécurité et dispositif et système associés
US9635018B2 (en) User identity verification method and system, password protection apparatus and storage medium
JP7204792B2 (ja) Wi-fiホットスポット接続方法および端末
WO2017084288A1 (fr) Procédé et dispositif de vérification d'identité
CN107483213B (zh) 一种安全认证的方法、相关装置及系统
TWI568222B (zh) 路由器管理方法和裝置
US10454905B2 (en) Method and apparatus for encrypting and decrypting picture, and device
WO2014000652A1 (fr) Terminal, dispositif et procédé d'installation d'un module complémentaire de navigateur
CN108901020B (zh) 网络接入的方法、移动终端及服务器
CN110393021B (zh) 一种基于无线通信的连接方法及终端
WO2019057119A1 (fr) Procédé de connexion de point d'accès wifi basé sur un terminal mobile, terminal mobile et support de stockage
CN109600340B (zh) 操作授权方法、装置、终端以及服务器
WO2017166976A1 (fr) Procédé, dispositif et système pour distribuer et vérifier un service d'application
CN108737341B (zh) 业务处理方法、终端及服务器
CN107995669B (zh) 一种无线接入点ap信息的显示方法及移动终端
CN107995150B (zh) 身份验证方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14841171

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14841171

Country of ref document: EP

Kind code of ref document: A1