WO2015157949A1 - 无线局域网络wlan的接入方法、终端及服务器 - Google Patents

无线局域网络wlan的接入方法、终端及服务器 Download PDF

Info

Publication number
WO2015157949A1
WO2015157949A1 PCT/CN2014/075529 CN2014075529W WO2015157949A1 WO 2015157949 A1 WO2015157949 A1 WO 2015157949A1 CN 2014075529 W CN2014075529 W CN 2014075529W WO 2015157949 A1 WO2015157949 A1 WO 2015157949A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wireless access
access point
information
permission
Prior art date
Application number
PCT/CN2014/075529
Other languages
English (en)
French (fr)
Inventor
戎国强
冯敬涛
李自军
张文虎
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to BR112016024045-6A priority Critical patent/BR112016024045B1/pt
Priority to CN201480001361.6A priority patent/CN104350802B/zh
Priority to JP2016562893A priority patent/JP6448662B2/ja
Priority to CA2945848A priority patent/CA2945848C/en
Priority to PCT/CN2014/075529 priority patent/WO2015157949A1/zh
Priority to EP14889330.8A priority patent/EP2999270B1/en
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to EP17185454.0A priority patent/EP3306985B1/en
Priority to KR1020167031594A priority patent/KR101834914B1/ko
Priority to AU2014391026A priority patent/AU2014391026B2/en
Publication of WO2015157949A1 publication Critical patent/WO2015157949A1/zh
Priority to US14/980,412 priority patent/US10425393B2/en
Priority to US16/549,343 priority patent/US11777916B2/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/71Hardware identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/084Access security using delegated authorisation, e.g. open authorisation [OAuth] protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/35Protecting application or service provisioning, e.g. securing SIM application provisioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • H04W12/37Managing security policies for mobile devices or for controlling mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/72Subscriber identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent
    • H04W12/73Access point logical identity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/11Allocation or use of connection identifiers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • Wireless local area network WLAN access method terminal and server
  • the present invention relates to the field of communications, and in particular, to an access method, a terminal, and a server for a wireless local area network (WLAN).
  • WLAN wireless local area network
  • WLAN Wireless Local Area Networks
  • the user can manually connect to the wireless access point to be accessed on the terminal, and manually input a password to connect to the access point, so that the user can access the Internet through the WLAN.
  • the user when a terminal is changed from one location to another, since the surrounding wireless access point is likely to change significantly, the user usually needs to reset the wireless access point related information to connect. That is, the user reselects the appropriate wireless access point and re-enters the password to connect to the WLAN. Obviously, this way of resetting imposes an operational burden on the user.
  • Method 1 implemented by WPS (Wi-Fi Protected Setup).
  • WPS Wi-Fi Protected Setup
  • This method can help users automatically set the network name (ie: SSID (Service Set Identifier)) and security key.
  • SSID Service Set Identifier
  • the terminal replaces the new location, since the wireless product having this function often designs a function key on the body, the user presses the function key or enters the PIN code, and then performs the wireless password setting after two or three operations.
  • a large number of wireless access point information is collected in advance in the application of the terminal, and the information includes a wireless access point name and a connection password corresponding to when the connection password is set.
  • the wireless access point around the terminal is displayed to the user.
  • the user then manually selects a specific wireless access point to connect as needed.
  • the above two methods simplify the manual operation steps of the user to some extent. However, these two methods still require user participation, and at least the user needs to manually select a specific wireless access point.
  • the first aspect of the present invention provides a method for accessing a WLAN of a wireless local area network, including: sending a query request of an available wireless access point to a server to query for available Wireless access point information; receiving wireless access point information returned by the server; determining a specific wireless access point from the received wireless access point information; acquiring the specific wireless access point from the server
  • the authentication information is used by the terminal to connect to a specific wireless access point corresponding to the authentication information.
  • the query request of the wireless access point carries at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the determining, by using the received wireless access point information, the specific wireless access Specifically, the specific wireless access point is determined from the wireless access point information according to a predetermined rule, where the predetermined rule is one or more of the following: signal strength, rate, available traffic.
  • the method Before determining the specific wireless access point in the wireless access point information, the method further includes: sending a request for requesting the connection right to the server, where the request for applying the connection authority is used to request the server to determine the terminal Whether it has connection rights; Receiving a permission assignment result sent by the server, where the connection authority is configured; determining, by the received wireless access point information, a specific wireless access point, specifically, according to the received permission assignment result, Determining a particular wireless access point from the wireless access point information.
  • the parameter that is to be carried by the request for requesting the connection permission includes: a terminal identifier; or, a user identifier; or, a terminal The permission value corresponding to the identifier, the application permission type, and the application permission type; or, the user ID, the application permission type, and the permission value corresponding to the application permission type.
  • the method further includes: The server sends the permission usage information, where the permission usage information includes: the terminal identifier and the consumed permission information, or the user identifier and the consumed permission information; receiving the permission unused information sent by the server; the permission is not used
  • the information is obtained by the server according to the rights allocated by the terminal and the rights usage information; obtaining the unused information sent by the server, and the rights corresponding to the terminal have been consumed when the rights are not used. And disconnecting the terminal from the wireless access point.
  • the acquiring, by the server, the specific wireless access point The authentication information, where the authentication information is used by the terminal to connect to the specific wireless access point corresponding to the authentication information includes: sending a request for the authentication information of the specific wireless connection point to the server; receiving the sending by the server The authentication information corresponding to the specific wireless access point; the method further includes: sending the received authentication information to the specific wireless access point to apply for authentication; and receiving an authentication result sent by the specific wireless access point And if the authentication result is that the authentication is successful, the terminal connects to the network by using the specific wireless access point.
  • a method for accessing a WLAN of a wireless local area network Acquiring: receiving a query request of an available wireless access point sent by the terminal; obtaining the available wireless access point information according to the query request, and transmitting the obtained available wireless access point information to the terminal; Receiving, by the terminal, an authentication information request for a specific wireless access point, transmitting, to the terminal, authentication information corresponding to the specific wireless access point, where the authentication information causes the terminal to connect to the specific wireless connection Entry point.
  • the query request of the wireless access point carries at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the method further includes: receiving a request for requesting connection permission sent by the terminal; determining, according to the received request, whether a connection right can be allocated to the terminal; when determining that the connection authority can be allocated for the terminal, The terminal sends the permission assignment result.
  • the parameter that the request for requesting the connection permission carries includes: a terminal identifier; or a user identifier; or, the terminal The permission value corresponding to the identifier, the application permission type, and the application permission type; or, the user ID, the application permission type, and the permission value corresponding to the application permission type.
  • the terminal is connected to the specific wireless connection
  • the method further includes: receiving the permission usage information sent by the terminal, where the permission usage information includes: the terminal identifier and the consumed authority information, or the user identifier and the consumed authority information; Determining the rights to be allocated by the terminal and the usage information of the rights, and processing the obtained unused information of the terminal; Sending the permission unused information to the terminal, where the permission unused information is used by the terminal to determine whether to continue to connect with the wireless access point.
  • the authenticating the corresponding wireless access point Before the information is sent to the terminal the method further includes: obtaining wireless connection authentication information from the at least one WLAN service provider.
  • the obtaining, by the at least one WLAN service provider, the wireless connection authentication information includes: providing the at least one WLAN service provider Sending a request for connection authentication information; receiving authentication information provided by the WLAN service provider; and saving the received authentication information.
  • the request for the connection request for the WLAN service provider to apply for the connection authentication information carries the connection authentication of the application The number of the information, and at least one of the following parameters: a geographical identifier, which is used to identify the area to which the wireless connection point belongs; a rate identifier, which is used to identify the rate type to which the connection authentication information of the application belongs; The traffic to which the connection authentication information of the application belongs is identified; the duration identifier is used to identify the duration corresponding to the connection authentication information of the application.
  • a third aspect of the present invention provides a terminal, including:
  • a sending unit configured to send a query request of an available wireless access point to the server to query available wireless access point information
  • a receiving unit configured to receive wireless access point information returned by the server
  • a processing unit configured to Determining a specific wireless access point in the wireless access point information received by the receiving unit
  • the connecting unit configured to acquire, from the server, authentication information of the specific wireless access point, where the authentication information is used by the terminal Connect to specific wireless access corresponding to authentication information Point
  • the processing unit is specifically configured to: determine, according to a predetermined rule, a specific wireless access point from the wireless access point information, where The predetermined rule is one or more of the following: signal strength, rate, available traffic.
  • the sending unit is further configured to: in the received wireless access Before determining the specific wireless access point in the point information, sending a request for requesting the connection right to the server, where the request for requesting the connection permission is used to request the server to determine whether the terminal has the connection right;
  • the receiving unit is further configured to receive a permission allocation result sent by the server, where the processing unit determines, according to the wireless access point information received by the receiving unit, that the specific wireless access point is: And determining, by the receiving unit, a specific wireless access point from the wireless access point information.
  • the sending unit is further configured to: after the terminal is connected to the wireless access point, The server sends the permission usage information, where the permission usage information includes: a terminal identifier and a value of the consumed authority, or a user identifier and the consumed authority information; the receiving unit is further configured to: receive, by the server, The privilege is not used; the privilege unused information is obtained by the server according to the privilege and the privilege usage information that are allocated by the server; the processing unit is further configured to: obtain the privilege unused information sent by the server And disconnecting, by the terminal, the connection between the terminal and the wireless access point, when the permission unused information is that the right corresponding to the terminal has been consumed.
  • the connecting unit specifically includes: an authentication information querying module, configured to send, to the server, a request for the authentication information corresponding to the specific wireless connection point; and an authentication information receiving module, configured to receive the sending by the server
  • the authentication information sending module is configured to send the received authentication information to the specific wireless access point to apply for authentication
  • the authentication result receiving module is configured to receive the specific wireless The authentication result of the authentication information by the access point, if the authentication result is that the authentication is successful, the terminal connects to the network through the specific wireless access point.
  • a fourth aspect of the present invention provides a server, including: a receiving unit, configured to receive a query request of an available wireless access point sent by a terminal, and a sending unit, configured to obtain the available wireless connection according to the query request Incoming information, and transmitting the acquired wireless access point information to the terminal; and when the receiving unit receives the authentication information request of the terminal for a specific wireless access point, the sending unit is further configured to: And transmitting, to the terminal, authentication information corresponding to the specific wireless access point, where the authentication information causes the terminal to connect to the specific wireless access point.
  • the receiving unit is further configured to: receive a request for requesting connection permission sent by the terminal;
  • the server further includes: a processing unit, configured to: And determining, according to the request received by the receiving unit, whether the terminal can be allocated a connection right;
  • the sending unit is further configured to: when determining that the terminal can be allocated the connection right, send the permission allocation result to the terminal.
  • the receiving unit is further configured to: receive the permission usage information sent by the terminal, where the permission usage information includes: a terminal identifier and a value of the consumed authority, or information of the user identifier and the consumed authority; And the method is further configured to: obtain, according to the rights that the terminal is assigned, and the rights usage information, to obtain the unused information of the terminal; the sending unit is further configured to: send the permission unused information to the terminal, The rights unused information is used by the terminal to determine whether the terminal continues to connect with the wireless access point.
  • the server further includes: acquiring The unit is configured to obtain wireless connection authentication information from at least one WLAN service provider.
  • the acquiring unit is specifically configured to: send, to the at least one WLAN service provider, a request for applying for connection authentication information; Receiving authentication information provided by the WLAN service provider; and saving the received authentication information.
  • a fifth aspect of the present invention provides a terminal, including:
  • a transmitter configured to send a query request of an available wireless access point to the server to query available wireless access point information
  • a receiver configured to receive wireless access point information returned by the server
  • a memory configured to store the a wireless access received by the receiver, information
  • a processor configured to determine a specific wireless access point from the wireless access point information stored in the memory; and the processor is further configured to: acquire the location from the server The authentication information of the specific wireless access point is used for the terminal to connect to a specific wireless access point corresponding to the authentication information.
  • the processor is specifically configured to: determine, according to a predetermined rule, a specific wireless access point from the wireless access point information, where The predetermined rule is one or more of the following: strongest signal strength, lowest rate, and maximum available traffic.
  • the transmitter is further configured to: Before determining the specific wireless access point, the point information sends a request for requesting connection permission to the server, where the request for requesting the connection permission is used to request the server to determine whether the terminal has a connection right;
  • the receiver is further configured to: receive a permission allocation result sent by the server; the processor determines, according to the wireless access point information stored in the memory, that the specific wireless access point is: the processor Determining a specific wireless access point from the wireless access point information stored in the memory according to the received rights assignment result.
  • the transmitter is further configured to: send, to the server, permission usage information, where the permission usage information The terminal identifier and the value of the consumed authority, or the user identifier and the consumed authority information;
  • the receiver is further configured to: receive the permission unused information sent by the server; and the permission unused information is the The server is processed according to the rights that the terminal is allocated and the rights usage information;
  • the processor is further configured to: obtain the permission unused information sent by the server, where the permission unused information is corresponding to the terminal After the rights have been exhausted, the connection between the terminal and the wireless access point is disconnected.
  • the transmitter is further configured to: send, to the server, a request for the authentication information corresponding to the specific wireless connection point; the receiver is further configured to: receive the authentication information of the specific wireless access point sent by the server.
  • the transmitter is further configured to: send the received authentication information to the specific wireless access point to apply for authentication; and the receiver is further configured to receive the specific wireless access point to the authentication information.
  • the authentication result if the authentication result is that the authentication is successful, the terminal connects to the network through the specific wireless access point.
  • a server is provided, including:
  • a receiver configured to receive a query request of an available wireless access point sent by the terminal, a processor, configured to obtain the available wireless access point information according to the query request, and a transmitter, configured to send to the terminal The acquired wireless access point information; and the transmitter is further configured to: when the receiver receives the authentication information request of the terminal for a specific wireless access point, corresponding to the specific wireless access point The authentication information is sent to the terminal, and the authentication information causes the terminal to connect to the specific wireless access point.
  • the receiver is further configured to: after the sender sends the acquired wireless access point information to the terminal, Determining, by the terminal, a request for requesting a connection permission; the processor is further configured to: determine, according to the request received by the receiver, whether the connection authority can be allocated to the terminal; the transmitter is further configured to: When it is determined that the terminal can be assigned a connection right, the terminal transmits a permission assignment result to the terminal.
  • the receiver is further configured to receive the permission usage information sent by the terminal, where the permission is used.
  • the information includes, the terminal identifier and the value of the consumed authority, or the user identifier and the consumed authority information;
  • the processor is further configured to: obtain, according to the rights that the terminal is assigned, and the rights usage information, the obtained usage rights of the terminal; the sender is further configured to: send the permission to the terminal
  • the unused information is used by the terminal to determine whether the terminal continues to connect with the wireless access point.
  • the processor is further used to : Obtain wireless connection authentication information from at least one WLAN service provider.
  • the processor is specifically configured to:
  • the processor sends an instruction to the receiver to instruct the receiver to receive the authentication information provided by the WLAN service provider; the server further includes: a memory, configured to save the received authentication information.
  • the WLAN access method, terminal and server provided by the present invention, the method includes: First, the terminal sends a query request of an available wireless access point to the server to query available wireless access point information; the server receives and according to the The query request sends the obtained available wireless access point information to the terminal. Next, the terminal receives the wireless access point information returned by the server, and determines a specific wireless access point from the received wireless access point information.
  • the terminal sends an authentication information request of the specific wireless access point to the server, and when the server receives the request, sends the authentication information corresponding to the specific wireless access point to the terminal, and the authentication information enables the terminal to connect to the specific wireless access point.
  • the specific wireless access point mode is determined by the wireless access point information returned from the server, so that when the wireless access point changes significantly, the user needs to manually operate from multiple wireless accesses. Selecting a wireless access point from the point, so this method is more intelligent, further simplifying user operations.
  • FIG. 1 is a schematic flowchart of a method for accessing a WLAN according to Embodiment 1 of the present invention
  • FIG. 2 is a schematic diagram of an interface of a method for accessing a WLAN according to Embodiment 1 of the present invention
  • FIG. 3 is a schematic flowchart of a method for accessing a WLAN according to Embodiment 2 of the present invention
  • FIG. 4 is a schematic structural diagram of a terminal according to Embodiment 3 of the present invention
  • FIG. 5 is another schematic structural diagram of a terminal according to Embodiment 3 of the present invention
  • FIG. 6 is a schematic structural diagram of a server according to Embodiment 4 of the present invention
  • FIG. 7 is another schematic structural diagram of a server according to Embodiment 4 of the present invention
  • FIG. 8 is another schematic structural diagram of a server according to Embodiment 4 of the present invention
  • FIG. 10 is a schematic structural diagram of a server according to Embodiment 6 of the present invention
  • FIG. 11 is a schematic structural diagram of another server according to Embodiment 6 of the present invention
  • Embodiment 1 of the present invention provides a method for accessing a WLAN of a wireless local area network, which is applied to a terminal, where the terminal can be a mobile phone, a notebook, a tablet, a personal digital assistant, and any mobile having a function of accessing a wireless local area network. device. As shown in Figure 1, the method includes the following steps:
  • the terminal sends a query request of the available wireless access point to the server to query the available wireless access point information. Since the wireless local area network itself has a certain regionality, when the terminal is in a different geographical position, the wireless access point in its surrounding environment also changes. Therefore, in this step, when the user initiates WLAN access on the terminal, the terminal sends a query request of the available wireless access point to the server to query the available wireless access point information.
  • the wireless access point information includes an identifier of at least one wireless access point.
  • the wireless access point identifier is usually represented by an SSID (Service Set Identifier), which is used to distinguish the wireless access point.
  • SSID Service Set Identifier
  • the step 101 may be specifically: the terminal sends a query request of the available wireless access point to the server.
  • Query the wireless access point managed by the server For example, after the user initiates the WLAN access, when the terminal detects that the geographical location of the user changes, the terminal sends a query request to the server to query the wireless access point managed by the server. For example, as long as the terminal detects that the geographical location of the terminal changes, the query request for the wireless access point managed by the server is sent to the server, and the trigger condition for the terminal to send the query request is not specifically limited.
  • the query request of the wireless access point may carry at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the server finds a matching wireless access point according to the parameter condition.
  • the area identifier is used to identify the range of the area to which the wireless connection point belongs in the query request sent by the terminal to the server.
  • the wireless connection point is required to be within 30 meters of the terminal position.
  • the terminal location may be expressed in the form of latitude and longitude, location name, building name, and the like.
  • the rate identifier is used to identify the rate type that the wireless connection point belongs to in the query request sent by the terminal to the server.
  • the traffic identifier is used to identify the type of traffic that the wireless connection point belongs to in the query request sent by the terminal to the server.
  • Duration indicator It is used to identify the time in the query request sent by the terminal to the server that the wireless connection point is required to be at least used.
  • the parameters carried in the query request sent by the terminal to the server include, but are not limited to, the above parameters. Of course, no parameters may be carried in the query request of the wireless access point. For example, when the query request sent by the terminal to the server does not carry any parameters, the server provides the terminal with all the wireless access points under its management.
  • the terminal receives the wireless access point information returned by the server.
  • the server when the server receives the query request from the terminal for the wireless access point, the server returns the corresponding wireless access point information according to the request.
  • the wireless access point information includes a plurality of wireless access points
  • the wireless access points may form a list of wireless access points, which are returned to the terminal by the server in a list form. That is, the wireless access point information returned by the terminal receiving server is a wireless access point list.
  • the terminal 101 when the terminal 101 sends a query request of the available wireless access point to the server to query the wireless access point managed by the server, the corresponding step 102 is specifically: querying and sending the self-management by the server After the wireless access point information, the terminal receives the wireless access point information returned by the server. It is understood that after step 102, the step of storing the received wireless access point information may also be included.
  • step 103 may be specifically: determining, according to a predetermined rule, a specific wireless access point from the received wireless access point information, where the predetermined rule is one of the following Or multiple: signal strength, rate, available traffic, etc.
  • the predetermined rule is one of the following Or multiple: signal strength, rate, available traffic, etc.
  • the rule can be set to “rate”, and the terminal determines one wireless access point with the lowest rate from the received wireless access point information.
  • the rule may be set to signal strength and available traffic, and the terminal determines, from the received wireless access point information, a wireless access point with the strongest signal strength and the most available traffic.
  • the foregoing predetermined rule may be the same as the parameter type carried in the query request that the terminal sends the wireless access point to the server.
  • the default rule defaults to the available traffic.
  • the two may be different, which may be specifically set by the user according to the specific situation, and the present invention is not limited herein.
  • WLAN service providers that is, operators providing WLAN services
  • WLANs usually provide WLANs to users for a fee, and from the perspective of WLAN service providers, reasonable allocation of network resources is beneficial to reduce costs.
  • Different network resources are allocated for different users.
  • different means of assigning network rights are used. Among them, the allocation authority can adopt such a strategy: The more the network is used, the greater the assigned authority.
  • the method further includes the following steps: First, the terminal sends an application connection to the server.
  • step 103 is specifically: The terminal determines a specific wireless access point from the wireless access point information according to the received rights assignment result. Specifically, after the terminal sends a request for the connection permission to the server, if the server determines that the terminal has the connection right, the server allocates the authority for the terminal, and after the server sends the permission assignment result to the terminal, the terminal receives the permission assignment result sent by the server; The terminal determines a specific wireless access point from the wireless access point information according to the result of the authority assignment.
  • the server allocates 100 megabits of traffic to the wireless access point A, allocates 50 megabits of traffic to the wireless access point B, and the server returns the above information to the terminal; It is preferable to connect the wireless access point A with a large traffic.
  • the request for the connection permission may carry the following four types of parameters to apply for the connection permission to the server: Form 1, the request for the connection permission carries the terminal identifier.
  • the request for the connection permission carries the user identifier.
  • the request for the connection permission carries the terminal identifier, the application permission type, and the permission value corresponding to the application permission type.
  • the types of permissions include traffic, connection duration, cost, and more.
  • the request for the connection permission carries the user ID, the application permission type, and the permission value corresponding to the application permission type.
  • the types of permissions include traffic, connection duration, cost, and more.
  • the method is based on the terminal, that is, the terminal requests the connection right from the server to report the identifier of the terminal to the server. In this way, the server can assign rights according to the terminal identifier.
  • the terminal identifier since only the terminal identifier is carried, it is allocated by the server according to its own policy.
  • the allocation policy can be as described above, "the more the network is used, the greater the assigned authority". For example: In the case that the permission type is traffic, if the terminal uses the traffic of the carrier's cellular network, the more WLAN traffic the operator gives to the terminal.
  • the method is applicable to a scenario in which a user uses multiple terminals for the same user. The user needs to register on the server to establish a binding relationship between the user ID and the terminal ID. When the terminal applies for connection permission, it needs to carry the user ID. In addition, since only the user ID is carried, it is allocated by the server according to its own policy.
  • the allocation policy can be as described above, "the more the network is used, the greater the assigned authority".
  • the method is based on the terminal, that is, the terminal reports the identity of the terminal to the server when the terminal requests the connection right from the server. In this way, the server can assign rights according to the terminal identifier.
  • the server in addition to carrying the terminal identifier, the server also carries the permission value corresponding to the application permission type and the application permission type. In this case, the server determines whether the permission type applied by the terminal and the corresponding permission value are within the allocation range. If yes, the server allocates the corresponding authority of the terminal; if not, the server provides the terminal with the rights that can be allocated according to its own allocation policy.
  • this method is based on the user and is suitable for the same user. Scenes of multiple terminals.
  • the user needs to register on the server to establish a binding relationship between the user ID and the terminal ID. In this way, the terminal only needs to carry the user ID when applying for the connection permission.
  • the server also carries the permission value corresponding to the application permission type and the application permission type. In this case, the server determines whether the type of the permission applied by the terminal and the corresponding permission value are within the allocation range. . If yes, the server allocates the corresponding authority of the terminal; if not, the server provides the terminal with the rights that can be allocated according to its own allocation policy.
  • the following example shows how the terminal sends the request permission request carrying the parameter and how the server assigns the WLAN access service permission to the terminal according to the permission request of the terminal.
  • the terminal counts the length of time that the terminal uses the cellular network for data communication during a specific time period. For example, the duration of the cellular network used for five days before the date of the statistics is 1 hour.
  • the terminal sends a permission request to the server according to the statistical duration result, and carries the cellular network usage of the specific time period in the request, for example, the start date is 1 day, the end date is 5 days, and the duration is 1 hour.
  • the server determines whether it is within the allocation range.
  • the terminal If it is judged that it is within the allocation range, the terminal is assigned the same duration of WLAN access right, and then the allocation result is returned to the terminal. If it is judged that it is not within the allocation range, the server sends a message of "non-conformity" to the terminal, and sends a confirmation message according to the allocation authority to the terminal according to its own allocation policy. After the terminal sends an acknowledgment, the server assigns the privilege to the terminal.
  • a display interface of the rights connection is also provided in the embodiment of the present invention. In the main control interface shown in Figure 2, when the switch is placed in the "Connected" state, the icon of the signal strength can be used to identify the terminal to connect to the wireless access point in a color or form.
  • the icon of the signal strength turns green and the number of stripes dynamically shows the strength of the signal.
  • the signal strength icon can be disconnected with another color or modality.
  • the icon for signal strength is grayed out and is at rest.
  • the configuration button When the user clicks the configuration button, another new interface can be displayed in front of the user, that is, the interface for setting the permission type as shown in FIG. In this interface, there are three types of permissions, and the user can select one or more of them according to their needs.
  • the terminal collects the data corresponding to the permission type, and sends the data to the server to apply for the corresponding permission.
  • step 104 acquires, from the server, authentication information of a specific wireless access point, where the authentication information is used by the terminal to connect to a specific wireless access point corresponding to the authentication information.
  • step 104 may specifically include the following steps:
  • the terminal sends a request for the authentication information corresponding to the specific wireless connection point to the server.
  • the wireless access point identifier and the terminal identifier, or the wireless access point identifier and the user identifier may be carried in the process of the terminal requesting the server for the authentication information corresponding to the specific wireless connection point.
  • the terminal receives the authentication information corresponding to the specific wireless access point sent by the server, where the authentication information may be a password or a combination of “user name-password”.
  • the method further includes the following steps:
  • the terminal sends the received authentication information to a specific wireless access point to apply for authentication.
  • a specific wireless access point For example, the terminal sends the above username "Userl” and password "Vvvv” to the wireless access point API to apply for authentication.
  • the terminal receives the authentication result sent by the wireless access point. If the authentication result is that the authentication succeeds, the terminal connects to the network by using the wireless access point. Specifically, when the terminal receives the successful authentication result sent by the wireless access point API, if the authentication result is the authentication pass, the terminal connects to the network through the wireless access point API.
  • the step further includes the step of the terminal applying for the connection right to the server before the step 103, specifically, the terminal sends a request for requesting the connection right to the server, where the request for requesting the connection authority is used to request the server to determine whether the terminal has the connection right, In the case of connection rights, the terminal receives the rights assignment result sent by the server.
  • the terminal determines a specific wireless access point from the wireless access point information according to the received permission allocation result, that is, the server allocates the right for the terminal according to the request, and when the assigned right is successful, the terminal can connect to the wireless access point.
  • the terminal needs to report the usage of the rights to the server. Therefore, after the terminal is connected to the wireless access point, the method further includes the following steps: First, the terminal sends the permission usage information to the server.
  • the permission usage information includes information about the terminal identifier and the consumed authority, or the user identifier and the consumed authority.
  • the privilege usage information corresponds to the foregoing “parameters carried in the request for requesting the connection privilege”, that is, when the terminal is used as the unit, the privilege usage information includes the terminal identifier and the consumed privilege information; When the permission usage information includes the household identification and has been consumed Permission information.
  • the rights usage information may also include a wireless access point identifier, authentication information (such as a username), and the like.
  • the terminal receives the permission unused information sent by the server; the permission unused information is obtained by the server according to the rights and rights usage information allocated by the terminal.
  • the privilege unused information is obtained by the server according to the privilege and privilege usage information that the terminal is assigned, that is, the terminal privilege unused information includes the terminal identifier and the unconsumed privilege information, or the user identifier and the unconsumed privilege information.
  • the information in which the authority is not consumed can be represented by a numerical value equal to the value obtained by subtracting the value of the authority already used from the assigned authority value. For example, if the value assigned to the terminal is 1 hour, and the value of the used permission is 0.8 hours, the value corresponding to the unused information is 0.2 hours.
  • the permission unused information sent by the server is obtained, and when the permission unused information is that the authority corresponding to the terminal has been consumed, the connection between the terminal and the wireless access point is disconnected.
  • the access method of the WLAN of the WLAN provided by the first embodiment of the present invention is applied to the terminal. First, the terminal sends a query request of the available wireless access point to the server to query the available wireless access point information. Next, the terminal receives the wireless access point information returned by the server, and determines a specific one from the received wireless access point information. Wireless access point. Then, the terminal acquires authentication information of the specific wireless access point from the server, and the authentication information is used for the terminal to connect to the specific wireless access point corresponding to the authentication information.
  • the specific wireless access point mode is determined by the terminal from the wireless access point information returned by the receiving server, so that when the wireless access point changes significantly, the user needs to manually operate from multiple wireless devices.
  • the problem of selecting a wireless access point in the access point is therefore more intelligent and can further simplify user operations.
  • Embodiment 2 The second embodiment of the present invention provides a method for accessing a WLAN of a wireless local area network, which is applied to a server. As shown in FIG. 3, the method includes the following steps:
  • the server receives a query request of an available wireless access point sent by the terminal. Since the wireless local area network itself has a certain regionality, when the terminal is in a different geographical position, the wireless access point in its surrounding environment also changes. Therefore, in this step, when the user initiates WLAN access on the terminal, the server receives the query request of the available wireless access point sent by the terminal. Wherein, the query request is used to query available wireless connections Entry information. Considering that the wireless access point near the environment where the terminal is located is not necessarily managed by the server associated with the terminal, specifically, the server receives the query request sent by the terminal, and the query request is used for querying the server-managed Wireless access point.
  • the query request of the wireless access point may carry at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the meanings of the three parameters are the same as described in the first embodiment, and are not described herein. Understandably, no parameters may be carried in the query request of the wireless access point.
  • the server can provide the terminal with all the wireless access points under its management.
  • the server obtains available wireless access point information according to the query request, and sends the obtained available wireless access point information to the terminal. Specifically, the server queries the available wireless access point information from its own storage according to the query request, and sends the queried available wireless access point information to the terminal.
  • the wireless access point information includes an identifier of at least one wireless access point, and the identifier is used to distinguish different wireless access points. Considering that WLAN service providers usually provide WLANs to users for a fee. On the basis of meeting the needs of users, rational allocation of network resources is conducive to reducing costs. Different network resources are allocated for different users. Generally, different means of assigning network rights are used.
  • the method further includes: determining Whether the terminal has connection rights. Specifically, determining whether the terminal has the connection authority is specifically divided into the following steps: First, the server receives a request for requesting connection permission sent by the terminal; and then, the server determines, according to the received request, whether the terminal can be the terminal.
  • the server may save the permission assignment result sent to the terminal.
  • the parameter carried in the request for requesting the connection permission includes: a terminal identifier; or a user identifier; or, a terminal identifier, an application permission type, and a permission value corresponding to the application permission type. ; or, the user ID, the application permission type, and the permission value corresponding to the application permission type.
  • the server When the server receives the authentication information request of the terminal for the specific wireless access point, the server sends the authentication information corresponding to the specific wireless access point to the terminal, where the authentication information causes the terminal to connect to the specific wireless access point. . Specifically, when the server receives the authentication information request of the terminal for the specific wireless access point, the server requests the corresponding authentication information according to the authentication information of the terminal, and sends the authentication information to the terminal.
  • the authentication information may be a password or a combination of "user name-password". Then, the terminal sends the received authentication information to the wireless access point to apply for authentication, and if the authentication passes, the terminal can connect to the network through the wireless access point.
  • the terminal may consume the right after the terminal is connected to the specific wireless access point. Therefore, optionally, in a specific embodiment of the present invention, after the terminal is connected to the specific wireless access point, the following steps are further included:
  • the server receives the permission usage information sent by the terminal.
  • the permission usage information includes information of the terminal identifier and the consumed authority, or information of the user identifier and the consumed authority.
  • the rights usage information may also include parameters such as a wireless access point identifier and authentication information (such as a username).
  • the server processes the unused information of the terminal according to the rights and rights usage information allocated by the terminal.
  • the permission unused information is obtained by the server according to the rights and rights usage information allocated by the terminal, that is, the terminal unused information includes the terminal identifier and the unsupplied right. Limited information, or, user identification and information on unconsumed permissions.
  • the information in which the authority is not consumed can be represented by a numerical value equal to the value obtained by subtracting the value of the authority already used from the assigned authority value. For example, if the value assigned to the terminal is 1 hour, and the value of the used permission is 0.8 hours, the value corresponding to the unused information is 0.2 hours.
  • Embodiment 2 of the present invention provides a method for accessing a WLAN of a wireless local area network, which is applied to a server.
  • the server receives the query request of the available wireless access point sent by the terminal; next, the server obtains the available wireless access point information according to the query request, and sends the obtained available wireless access point information to the terminal; Then, when receiving the authentication information request of the terminal for the specific wireless access point, the server sends the authentication information corresponding to the specific wireless access point to the terminal, where the authentication information causes the terminal to connect to the terminal Describe a specific wireless access point.
  • the specific wireless access point mode is determined by the terminal from the wireless access point information returned by the receiving server, so that when the wireless access point changes significantly, the user needs to manually operate from multiple wireless devices. The problem of selecting a wireless access point in the access point is therefore more intelligent, further simplifying user operations.
  • the method further comprises the step of: obtaining wireless connection authentication information from the at least one WLAN service provider.
  • the method for obtaining the wireless connection authentication information is batch acquisition.
  • the acquisition manner may also be one by one, and the present invention is not specifically limited.
  • the foregoing steps may be specifically divided into the following steps: First, sending a request for requesting connection authentication information to at least one WLAN service provider; after the WLAN service provider generates and sends connection authentication information according to the request, receiving The authentication information provided by the WLAN service provider; and the received authentication information is saved.
  • the authentication information may be a password or a combination of "user name-password". Take for example, the "username-password" format, the authentication information may be in the form shown in Table 1, so that the available username and password can be retrieved according to the wireless access point identifier. Table 1
  • the request for applying for the batch connection authentication information to the WLAN service provider carries the number of the connection authentication information that is requested, and at least one of the following parameters:
  • the area identifier is used to identify the area to which the wireless connection point belongs; the rate identifier is used to identify the rate type to which the authentication information of the application belongs; the traffic identifier is used to identify the traffic to which the authentication information of the application belongs; , the length of time corresponding to the authentication information used to identify the application; and the number of authentication information requested.
  • Embodiment 3 corresponds to the first embodiment.
  • the third embodiment of the present invention provides a terminal 30. As shown in FIG.
  • the method includes: a sending unit 301, configured to send a query request of an available wireless access point to a server to query for available
  • the receiving unit 302 is configured to receive the wireless access point information returned by the server, and the processing unit 303 is configured to determine a specific wireless access point from the wireless access point information received by the receiving unit 302;
  • the unit 304 is configured to acquire, from the server, authentication information of a specific wireless access point, where the authentication information is used by the terminal to connect to a specific wireless access point corresponding to the authentication information.
  • the query request of the wireless access point carries at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the third embodiment of the present invention provides a terminal 30, where the sending unit 301 sends an inquiry request of an available wireless access point to the server to query available wireless access point information; the receiving unit 302 receives the wireless access point information returned by the server; Unit 303 receives from receiving unit 302 Determining a specific wireless access point in the wireless access point information; the connection unit 304 is configured to acquire authentication information of the specific wireless access point from the server, where the authentication information is used for the terminal to connect to the specific wireless access corresponding to the authentication information point.
  • the terminal determining the specific wireless access point from the wireless access point information returned by the server avoids the user having to manually operate from multiple wireless access points when the wireless access point changes significantly.
  • the processing unit 303 is specifically configured to: determine, according to a predetermined rule, a specific wireless access point from the wireless access point information, where the predetermined rule is one or the following Multiple: Signal strength, rate, available traffic.
  • the sending unit 301 is further configured to: before determining a specific wireless access point from the received wireless access point information, send a request for requesting connection permission to the server, where The request for the connection permission is used to request the server to determine whether the terminal has the connection authority; in the case of having the connection authority, the receiving unit 302 is further configured to receive the permission assignment result sent by the server; the wireless received by the processing unit 303 from the receiving unit 302 Determining a specific wireless access point in the access point information is: determining a specific wireless access point from the wireless access point information according to the rights allocation result received by the receiving unit 302.
  • the sending unit 301 is further configured to: after the terminal is connected to the wireless access point, send permission usage information to the server, where the permission usage information includes, the terminal The identifier and the value of the consumed authority, or the user identifier and the consumed authority information; the receiving unit 302 is further configured to: receive the permission unused information sent by the server; the permission unused information is the authority and the authority that the server is assigned according to the terminal.
  • the processing unit 303 is further configured to: obtain the permission unused information sent by the server, and when the permission unused information is that the authority corresponding to the terminal has been consumed, disconnect the terminal from the wireless connection. The connection to the point.
  • the connecting unit 304 specifically includes:
  • the authentication information requesting module 3041 is configured to send a request for the authentication information corresponding to the specific wireless connection point to the server.
  • the authentication information receiving module 3042 is configured to receive the authentication information of the specific wireless access point sent by the server, and apply for the authentication sending module 3043. Sending the received authentication information to the wireless access point to apply for authentication;
  • the authentication result receiving module 3044 is configured to receive the authentication result of the specific wireless access point for the authentication information, and if the authentication result is successful, the terminal passes the specific wireless The access point is connected to the network.
  • Embodiment 4 corresponds to the second embodiment.
  • the fourth embodiment of the present invention provides a server 40.
  • the method includes: a receiving unit 401, configured to receive a query request of an available wireless access point sent by the terminal;
  • the unit 402 is configured to obtain available wireless access point information according to the query request, and send the acquired wireless access point information to the terminal;
  • the sending unit 402 is further configured to: send the authentication information corresponding to the specific wireless access point to the terminal, where the authentication information causes the terminal to connect to the specific Wireless access point.
  • the query request of the wireless access point carries at least one of the following parameters: a geographical identifier, a rate identifier, a traffic identifier, and a duration identifier.
  • the fourth embodiment of the present invention provides a server 40, where the receiving unit 401 receives an inquiry request of an available wireless access point sent by the terminal, and the sending unit 402 obtains available wireless access point information according to the query request, and sends the information to the terminal. The obtained wireless access point information.
  • the sending unit 402 is further configured to: send the authentication information corresponding to the specific wireless access point to the terminal, where the authentication information causes the terminal to connect to This particular wireless access point.
  • the server capable of transmitting the wireless access point information to the terminal and transmitting the authentication information corresponding to the wireless access point to the terminal after the terminal selects the specific wireless wireless access point avoids the wireless connection.
  • the ingress point changes significantly, the user needs to manually select a wireless access point from multiple wireless access points. The problem is therefore greatly simplified by user operations.
  • the receiving unit 401 is further configured to: receive a request for requesting connection permission sent by the terminal; as shown in FIG. 7, the server 40 further includes a processing unit 403, configured to receive, according to the receiving unit The request received by the 401 determines whether the connection authority can be allocated to the terminal.
  • the sending unit 402 is further configured to: when it is determined that the terminal can be allocated the connection right, send the permission allocation result to the terminal.
  • the parameter carried in the request for the connection permission includes: a terminal identifier; or a user identifier; or, a terminal identifier, an application permission type, and a permission value corresponding to the application permission type; or, the user identifier, the application permission type, and the application permission type correspond to Permission value.
  • the receiving unit 401 is further configured to: receive the permission usage information sent by the terminal, where the permission usage information includes a terminal identifier and a value of the consumed authority, or the user identifier and the The processing unit 403 is further configured to: obtain the permission unused information of the terminal according to the rights and the rights usage information that are allocated by the terminal; and the sending unit 402 is further configured to send the permission unused information to the terminal, where the permission The unused information is used by the terminal to determine whether the terminal continues to connect with the wireless access point.
  • the server 40 further includes: an obtaining unit 404, configured to obtain wireless connection authentication information from the at least one WLAN service provider.
  • the obtaining unit 403 is specifically configured to: send a request for applying for connection authentication information to at least one WLAN service provider; and generate and send a connection according to the request by the WLAN service provider After the authentication information, the authentication information provided by the WLAN service provider is received; and the received authentication information is saved.
  • the request for the batch connection authentication information carries the number of the authentication information to be applied and at least one of the following parameters: a geographical identifier, which is used to identify the area to which the wireless connection point belongs, and a rate identifier, which is used to identify the authentication information of the application.
  • the rate type is used to identify the traffic to which the authentication information belongs.
  • the duration identifier is used to identify the duration of the authentication information.
  • Embodiment 5 corresponds to the first embodiment.
  • the fifth embodiment of the present invention further provides a terminal 50. As shown in FIG. 9, the method includes: a sender 501, configured to send a query request of an available wireless access point to a server to query.
  • Receiver 502 configured to receive wireless access point information returned by the server; a memory 503, configured to store wireless access point information received by the receiver 502; and a processor 504, configured to use the memory 503 Determining a specific wireless access point in the stored wireless access point information; and the processor 504 is further configured to: acquire, from the server, authentication information of the specific wireless access point, where the authentication information is used by the terminal to connect to the authentication information.
  • Specific wireless access point The memory 503 includes persistent storage and non-persistent storage, and the persistent storage may be a hard disk, an SD card, or the like for storing an operating system, a browser engine, a management module client, a user identification module, and other applications. Non-persistent storage can be memory.
  • the processor 504 is configured to execute instructions and perform operations related to the mobile terminal system (eg, using instructions acquired from, for example, a memory) that can control the receipt and manipulation of input and output data between components of the mobile terminal system;
  • the processor 504 can be implemented on a single chip, multiple chips, or multiple electronic components, and can employ a variety of architectures, including dedicated or embedded processors, special purpose processors, controllers, ASICs, and the like.
  • the terminal 50 also includes an input/output device for human-computer interaction.
  • the user can issue a control command to the mobile terminal through the input device, for example, the input device can be a keyboard, a touch screen, or the like.
  • the output device the user can accept the processing result and feedback information of the mobile terminal, for example, the output device can be a display.
  • the fifth embodiment of the present invention provides a terminal 50, where the sender 501 sends an inquiry request of an available wireless access point to the server to query available wireless access point information; the receiver 502 receives the wireless access point information returned by the server; The 504 determines a specific wireless access point from the wireless access point information stored in the memory 503, and acquires a specific wireless access point from the server.
  • the authentication information is used by the terminal to connect to a specific wireless access point corresponding to the authentication information.
  • the terminal determining the specific wireless access point from the wireless access point information returned by the server avoids the user having to manually operate from multiple wireless access points when the wireless access point changes significantly.
  • the problem of selecting a wireless access point is so that the terminal is more intelligent and greatly simplifies the user's operation.
  • the processor 504 is specifically configured to: determine, according to a predetermined rule, a specific wireless access point from the wireless access point information, where the predetermined rule is one or the following Multiple: Signal strength, rate, available traffic.
  • the transmitter 501 is further configured to send, to the server, a request for requesting connection permission, before the processor 504 determines the specific wireless access point according to the wireless access point information.
  • the request for the connection permission is used to request the server to determine whether the terminal has the connection authority; in the case of having the connection authority, the receiver 502 is further configured to: receive the permission assignment result sent by the server; and the processor 504 stores the wireless from the memory 503. Determining the specific wireless access point in the access point information is specifically: The processor 504 determines a specific wireless access point from the wireless access information stored in the memory 503 according to the received permission allocation result.
  • the sender 501 is further configured to send permission usage information to the server, where the rights usage information includes a terminal identifier and a value of the consumed authority, or the user identifier and the
  • the receiver 502 is further configured to: receive the permission unused information sent by the server; the permission unused information is obtained by the server according to the authority and the permission usage information allocated by the terminal; the processor 504 is further configured to acquire The privilege sent by the server does not use the information.
  • the privilege unused information is that the privilege corresponding to the terminal has been consumed, the connection between the terminal and the wireless access point is disconnected.
  • the sender 501 is further configured to: send a request for the authentication information corresponding to the specific wireless connection point to the server; the receiver 502 is further configured to: After the authentication information is sent and the authentication information is sent, the authentication information of the specific wireless access point sent by the server is received; The transmitter 501 is further configured to: send the authentication information received by the receiver 502 to the wireless access point to apply for authentication; and the receiver 502 is further configured to: receive, by the specific wireless access point, the authentication result of the authentication information, if the authentication result For successful authentication, the terminal connects to the network through a specific wireless access point.
  • Embodiment 6 Embodiment 6
  • the sixth embodiment of the present invention provides a server 60, as shown in FIG. 10, including: a receiver 601, configured to receive a query request of an available wireless access point sent by the terminal; and a processor 602. And the transmitter 603 is configured to send the acquired wireless access point information to the terminal; and the transmitter 603 is further configured to: when the receiver 601 is configured to obtain the available wireless access point information according to the query request. Receiving, by the terminal, the authentication information corresponding to the specific wireless access point, the authentication information corresponding to the specific wireless access point is sent to the terminal, where the authentication information causes the terminal to connect to the specific wireless access point .
  • the processor 603 is configured to execute instructions and perform operations related to the mobile terminal system (eg, using instructions acquired from a memory), which can control reception and manipulation of input and output data between components of the mobile terminal system;
  • the 603 can be implemented on a single chip, multiple chips, or multiple electronic components and can be implemented in a variety of architectures, including dedicated or embedded processors, dedicated processors, controllers, ASICs, and more.
  • the sixth embodiment of the present invention provides a server 60, where the receiver 601 receives an inquiry request of an available wireless access point sent by the terminal; the processor 602 obtains available wireless access point information according to the query request, and the sender 603 sends The terminal transmits the acquired wireless access point information.
  • the sender 603 sends the authentication information corresponding to the specific wireless access point to the terminal, where the authentication information causes the terminal to connect to the terminal.
  • the particular wireless access point the server capable of transmitting the wireless access point information to the terminal and transmitting the authentication information corresponding to the wireless access point to the terminal after the terminal selects the specific wireless wireless access point avoids the wireless connection.
  • the receiver 601 is further configured to receive a request for requesting connection permission sent by the terminal;
  • the processor 602 is further configured to determine, according to the request received by the receiver 601, whether the terminal can be allocated a connection right;
  • the transmitter 603 is further configured to: when the processor 602 determines that the terminal can be assigned a connection right, send the rights assignment result to the terminal.
  • the receiver 601 is further configured to: receive the permission usage information sent by the terminal, where the permission usage information includes a terminal identifier and a value of the consumed authority, or the user identifier and the The processor 603 is further configured to: obtain the permission unused information of the terminal according to the rights and the rights usage information that are allocated by the terminal; the sender 602 is further configured to: send the permission unused information to the terminal, where The privilege unused information is used by the terminal to determine whether the terminal continues to connect with the wireless access point.
  • the processor 603 is further configured to: obtain wireless connection authentication information from at least one WLAN service provider.
  • the processor 603 is specifically configured to: the processor 603 send an instruction to the sender 602, instructing the sender 602 to send a request for requesting connection authentication information to the at least one WLAN service provider;
  • the device 603 sends an instruction to the receiver 601, instructing the receiver 601 to receive the authentication information provided by the WLAN service provider after the WLAN service provider generates and sends the connection authentication information according to the request;
  • the server 60 further includes: a memory 604, configured to store the authentication information received by the receiver 601.
  • the memory 604 includes persistent storage and non-persistent storage, and the persistent storage may be a hard disk, an SD card, or the like for storing an operating system, a browser engine, a management module client, a user identification module, and other applications.
  • Non-persistent storage can be memory.
  • the seventh embodiment of the present invention further provides a WLAN access system 70. As shown in FIG. 12, the system includes: the terminal according to the third embodiment of the present invention and the fourth embodiment of the present invention.
  • the server includes the terminal according to the fifth embodiment of the present invention and the server according to the sixth embodiment of the present invention.
  • a person skilled in the art may understand that all or part of the steps of implementing the above embodiments may be performed by a program to instruct related hardware, and the program may be stored in a computer readable storage medium, and the storage medium may be Is a read-only memory, a disk or a disc, and so on.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明公开了一种无线局域网络WLAN的接入方法、终端及服务器,涉及通信领域。为实现智能化,简化用户操作而发明。该方法包括:终端向服务器发送可用无线接入点的查询请求;服务器根据该查询请求,向终端发送所获得的可用无线接入点信息。接下来,终端接收服务器返回的无线接入点信息,从接收的无线接入点信息中确定特定的无线接入点。然后,终端向服务器发送特定无线接入点的认证信息请求,当服务器接收到该请求时,将特定无线接入点对应的认证信息发送给终端,该认证信息使终端连接到特定无线接入点。本发明可用于网络技术中。

Description

无线局域网络 WLAN的接入方法、 终端及服务器
技术领域 本发明涉及通信领域, 尤其涉及一种无线局域网络 WLAN的接入方 法、 终端及服务器。
背景技术
随着无线接入点的广泛部署, 通过 WLAN(Wireless Local Area Networks,无线局域网络)上网成为一种重要的上网方式。 具体的, 用户通 过在终端上手动选择所要接入的无线接入点, 以及手动输入密码连接到 该接入点上, 从而用户可通过 WLAN上网。 目前, 当终端由一个地点更换到另一地点时, 由于周边的无线接入 点很可能发生显著变化, 此时用户通常要重新设置无线接入点相关信息 才能连接。 也即, 用户重新选择合适的无线接入点, 并重新输入密码才 能连接到 WLAN。 显然, 这种重新设置的方式给用户带来操作上的负担。 现有技术中, 为解决上述问题, 可以通过以下两种方式实现: 方式一, 通过 WPS ( Wi-Fi Protected Setup ) 方式实现。 该方式能帮 助用户自动设置网络名(即: SSID ( Service Set Identifier, 服务集标识) ) 和安全秘钥。 具体的, 当终端更换新地点时, 由于具备这一功能的无线 产品往往在机身上设计一个功能键, 因此用户按下该功能键或输入 PIN 码, 再经过两三操作完成无线密码设置及客户端与路由器之间的无线连 接。
方式二, 在终端的应用中预先收集大量的无线接入点信息, 该信息 包括无线接入点名称和当其设置连接密码时对应的连接密码。 具体的, 在终端更换新地点的情况下, 在终端上运行该应用时, 则向用户展示此 时终端周边的无线接入点。 然后用户根据需要手动选择具体的无线接入 点以进行连接。 从上可看出, 上述两种方式在一定程度上简化了用户的手动操作步 骤。 但是这两种方式始终还是需要用户参与, 至少需要用户手动选择具 体的无线接入点。 发明内容 本发明的实施例提供一种 WLAN的接入方法、 终端及服务器, 用户 无需输入密码, 也无需选择具体的无线接入点, 从而简化用户操作。 为达到上述目的, 本发明的实施例采用如下技术方案: 本发明的第一方面, 提供一种无线局域网络 WLAN的接入方法, 包 括: 向服务器发送可用无线接入点的查询请求以查询可用的无线接入点 信息; 接收所述服务器返回的无线接入点信息; 从所述接收的无线接入点信息中确定特定的无线接入点; 从所述服务器获取所述特定无线接入点的认证信息, 所述认证信息 用于所述终端连接到与所述认证信息对应的特定无线接入点。 在第一方面的第一种可能的实现方式中, 无线接入点的查询请求携 带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时长标识。 结合第一方面或第一方面的第一种可能的实现方式, 在第一方面的 第二种可能的实现方式中, 所述从所述接收的无线接入点信息中确定特 定的无线接入点具体为, 按照预定规则从所述无线接入点信息中确定特 定的无线接入点, 其中, 所述预定规则为以下一种或多种: 信号强度, 费率, 可用流量。 结合第一方面或第一方面的第一种可能的实现方式或第一方面的第 二种可能的实现方式, 在第一方面的第三种可能的实现方式中, 在所述 从所述接收的无线接入点信息中确定特定的无线接入点前, 所述方法还 包括: 向所述服务器发送申请连接权限的请求, 所述申请连接权限的请求 用于请求所述服务器确定所述终端是否具有连接权限; 在具有连接权限的情况下, 接收所述服务器发送的权限分配结果; 所述从所述接收的无线接入点信息中确定特定的无线接入点具体 为, 根据所述接收的权限分配结果, 从所述无线接入点信息中确定特定 的无线接入点。 结合第一方面的第三种可能的实现方式, 在第一方面的第四种可能 的实现方式中, 所述申请连接权限的请求携带的参数包括: 终端标识; 或, 用户标识; 或, 终端标识、 申请权限类型和申请权限类型对应的权 限值; 或, 用户标识、 申请权限类型和申请权限类型对应的权限值。 结合第一方面的第四种可能的实现方式, 在第一方面的第五种可能 的实现方式中, 在所述终端连接到所述无线接入点后, 所述方法还包括: 向所述服务器发送权限使用信息, 其中所述权限使用信息包括, 终 端标识和已消耗权限的信息, 或, 用户标识和已消耗权限的信息; 接收所述服务器发送的权限未使用信息; 所述权限未使用信息为所 述服务器根据所述终端被分配的权限和所述权限使用信息处理得到; 获取所述服务器发送的权限未使用信息, 当所述权限未使用信息为 所述终端对应的权限已经消耗完毕, 则断开所述终端与所述无线接入点 的连接。 结合第一方面或第一方面的上述各个可能的实现方式中的任意一个 实现方式, 在第一方面的第六种可能的实现方式中, 所述从所述服务器 获取所述特定无线接入点的认证信息, 所述认证信息用于所述终端连接 到与认证信息对应的特定无线接入点包括: 向所述服务器发送所述特定无线连接点的认证信息的请求; 接收所述服务器发送的所述特定无线接入点对应的认证信息; 所述方法还包括: 将所述接收的认证信息发送到所述特定无线接入点以申请认证; 接收所述特定无线接入点发送的认证结果, 若所述认证结果为认证 成功, 则所述终端通过所述特定无线接入点连接网络。 本发明的第二方面, 提供一种无线局域网络 WLAN的接入方法, 包 括: 接收终端发送的可用无线接入点的查询请求; 根据所述查询请求, 获得所述可用的无线接入点信息, 并向所述终 端发送所述获得的可用无线接入点信息; 当接收到所述终端对特定无线接入点的认证信息请求时, 将所述特 定无线接入点对应的认证信息发送给所述终端, 所述认证信息使所述终 端连接到所述特定无线接入点。 在第二方面的第一种可能的实现方式中, 所述无线接入点的查询请 求携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时长标 识。
结合第二方面或第二方面的第一种可能的实现方式, 在第二方面的 第二种可能的实现方式中, 在所述向所述终端发送所述获得的无线接入 点信息后, 所述方法还包括: 接收所述终端发送的申请连接权限的请求; 根据所述接收的请求, 确定是否能为所述终端分配连接权限; 当确定能为所述终端分配连接权限时, 向所述终端发送权限分配结 果。
结合第二方面的第二种可能的实现方式, 在第二方面的第三种可能 的实现方式中, 所述申请连接权限的请求携带的参数包括: 终端标识; 或, 用户标识; 或, 终端标识、 申请权限类型和申请权限类型对应的权 限值; 或, 用户标识、 申请权限类型和申请权限类型对应的权限值。
结合第二方面的第二种可能的实现方式或第二方面的第三种可能的 实现方式, 在第二方面的第四种可能的实现方式中, 在所述终端连接到 所述特定无线接入点后, 所述方法还包括: 接收所述终端发送的权限使用信息, 其中所述权限使用信息包括, 终端标识和已消耗权限的信息, 或, 用户标识和已消耗权限的信息; 根据所述终端被分配的权限和所述权限使用信息, 处理得到所述终 端的权限未使用信息; 向所述终端发送所述权限未使用信息, 所述权限未使用信息用于所 述终端确定是否与所述无线接入点继续连接。
结合第二方面或第二方面的上述各个可能的实现方式中的任意一个 实现方式, 在第二方面的第五种可能的实现方式中, 在所述将所述特定 无线接入点对应的认证信息发送给所述终端之前, 所述方法还包括: 从至少一个 WLAN服务提供者获取无线连接认证信息。
结合第二方面的第五种可能的实现方式, 在第二方面的第六种可能 的实现方式中, 所述从至少一个 WLAN服务提供者获取无线连接认证信 息包括: 向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 接收所述 WLAN服务提供者提供的认证信息; 保存所述接收的认证信息。
结合第二方面的第六种可能的实现方式, 在第二方面的第七种可能 的实现方式中, 所述向所述 WLAN服务提供者申请连接认证信息的请求 中携带所述申请的连接认证信息的数量, 以及以下参数中的至少一个: 地域标识, 用于标识无线连接点所属的区域; 费率标识, 用于标识所述申请的连接认证信息所属的费率类型; 流量标识, 用于标识所述申请的连接认证信息所属的流量; 时长标识, 用于标识申请的连接认证信息对应的时长。 本发明的第三方面, 提供一种终端, 包括:
发送单元, 用于向服务器发送可用无线接入点的查询请求以查询可 用的无线接入点信息; 接收单元, 用于接收所述服务器返回的无线接入点信息; 处理单元, 用于从所述接收单元接收的无线接入点信息中确定特定 的无线接入点; 连接单元,用于从所述服务器获取所述特定无线接入点的认证信息, 其中所述认证信息用于所述终端连接到与认证信息对应的特定无线接入 点
结合第三方面, 在第三方面的第一种可能的实现方式中, 所述处理 单元具体用于: 按照预定规 'J从所述无线接入点信息中确定特定的无线接入点, 其 中, 所述预定规则为以下一种或多种: 信号强度, 费率, 可用流量。
结合第三方面或第三方面的第一种可能的实现方式, 在第三方面的 第二种可能的实现方式中, 所述发送单元还用于, 在所述从所述接收的无线接入点信息中确定 特定的无线接入点前, 向所述服务器发送申请连接权限的请求, 所述申 请连接权限的请求用于请求所述服务器确定所述终端是否具有连接权 限; 在具有连接权限的情况下, 所述接收单元还用于接收所述服务器发 送的权限分配结果; 所述处理单元从所述接收单元接收的无线接入点信息中确定特定的 无线接入点具体为: 根据所述接收单元接收的权限分配结果, 从所述无线接入点信息中 确定特定的无线接入点。 结合第三方面的第二种可能的实现方式, 在第三方面的第三种可能 的实现方式中, 所述发送单元还用于, 在所述终端连接到所述无线接入点后, 向所 述服务器发送权限使用信息, 其中所述权限使用信息包括, 终端标识和 已消耗权限的数值, 或, 用户标识和已消耗权限的信息; 所述接收单元还用于, 接收所述服务器发送的权限未使用信息; 所 述权限未使用信息为所述服务器根据所述终端被分配的权限和所述权限 使用信息处理得到; 所述处理单元还用于, 获取所述服务器发送的权限未使用信息, 当 所述权限未使用信息为所述终端对应的权限已经消耗完毕, 则断开所述 终端与所述无线接入点的连接。 结合第三方面或第三方面的第一种可能的实现方式或第三方面的第 二种可能的实现方式或第三方面的第三种可能的实现方式, 在第三方面 的第四种可能的实现方式中, 所述连接单元具体包括: 认证信息查询模块, 用于向所述服务器发送所述特定无线连接点对 应的认证信息的请求; 认证信息接收模块, 用于接收所述服务器发送的所述特定无线接入 点的认证信息; 申请认证发送模块, 用于将所述接收的认证信息发送到所述特定无 线接入点以申请认证; 认证结果接收模块, 用于接收所述特定无线接入点对所述认证信息 的认证结果, 若所述认证结果为认证成功, 则所述终端通过所述特定无 线接入点连接网络。 本发明的第四方面, 提供一种服务器, 包括: 接收单元, 用于接收终端发送的可用无线接入点的查询请求; 发送单元, 用于根据所述查询请求, 获得所述可用的无线接入点信 息, 并向所述终端发送所述获取的无线接入点信息; 以及 当所述接收单元接收到所述终端对特定无线接入点的认证信息请求 时, 所述发送单元还用于, 将所述特定无线接入点对应的认证信息发送 给所述终端, 所述认证信息使所述终端连接到所述特定无线接入点。 结合第四方面, 在第四方面的第一种可能的实现方式中, 所述接收单元还用于, 接收所述终端发送的申请连接权限的请求; 所述服务器还包括: 处理单元, 用于根据所述接收单元接收的请求, 确定是否能为所述 终端分配连接权限; 所述发送单元还用于, 当确定能为所述终端分配连接权限时, 向所 述终端发送权限分配结果。 结合第四方面的第一种可能的实现方式, 在第四方面的第二种可能 的实现方式中, 所述接收单元还用于, 接收所述终端发送的权限使用信息, 其中所 述权限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和 已消耗权限的信息; 所述处理单元还用于, 根据所述终端被分配的权限和所述权限使用 信息, 处理得到所述终端的权限未使用信息; 所述发送单元还用于, 向所述终端发送所述权限未使用信息, 所述 权限未使用信息被所述终端用于判断所述终端是否与所述无线接入点继 续连接。 结合第四方面或第四方面的第一种可能的实现方式或第四方面的第 二种可能的实现方式, 在第四方面的第三种可能的实现方式中, 所述服 务器还包括: 获取单元, 用于从至少一个 WLAN服务提供者获取无线连接认证信 息。 结合第四方面的第三种可能的实现方式, 在第四方面的第四种可能 的实现方式中, 所述获取单元具体用于: 向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 接收所述 WLAN服务提供者提供的认证信息; 保存所述接收的认证信息。 本发明的第五方面, 提供一种终端, 包括:
发送器, 用于向服务器发送可用无线接入点的查询请求以查询可用 的无线接入点信息; 接收器, 用于接收所述服务器返回的无线接入点信息; 存储器, 用于存储所述接收器接收的无线接入, 信息; 处理器, 用于从所述存储器存储的无线接入点信息中确定特定的无 线接入点; 以及 所述处理器还用于, 从所述服务器获取所述特定无线接入点的认证 信息, 所述认证信息用于所述终端连接到与所述认证信息对应的特定无 线接入点。 结合第五方面, 在第五方面的第一种可能的实现方式中, 所述处理 器具体用于: 按照预定规 'J从所述无线接入点信息中确定特定的无线接入点, 其 中, 所述预定规则为以下一种或多种: 最强信号强度, 最低费率, 最多 可用流量。 结合第五方面或第五方面的第一种可能的实现方式, 在第五方面的 第二种可能的实现方式中, 所述发送器还用于, 在所述处理器根据所述无线接入点信息确定特 定的无线接入点前, 向所述服务器发送申请连接权限的请求, 所述申请 连接权限的请求用于请求所述服务器确定所述终端是否具有连接权限; 在具有连接权限的情况下, 所述接收器还用于, 接收所述服务器发 送的权限分配结果; 所述处理器从所述存储器存储的无线接入点信息中确定特定的无线 接入点具体为: 所述处理器根据所述接收的权限分配结果, 从所述存储 器存储的所述无线接入点信息中确定特定的无线接入点。 结合第五方面的第二种可能的实现方式, 在第五方面的第三种可能 的实现方式中, 所述发送器还用于, 向所述服务器发送权限使用信息, 其中所述权 限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和已消 耗权限的信息; 所述接收器还用于, 接收所述服务器发送的权限未使用信息; 所述 权限未使用信息为所述服务器根据所述终端被分配的权限和所述权限使 用信息处理得到; 所述处理器还用于, 获取所述服务器发送的权限未使用信息, 当所 述权限未使用信息为所述终端对应的权限已经消耗完毕, 则断开所述终 端与所述无线接入点的连接。 结合第五方面或第五方面的第一种可能的实现方式或第五方面的第 二种可能的实现方式或第五方面的第三种可能的实现方式, 在第五方面 的第四种可能的实现方式中, 所述发送器还用于, 向所述服务器发送所述特定无线连接点对应的 认证信息的请求; 所述接收器还用于, 接收所述服务器发送的所述特定无线接入点的 认证信息; 所述发送器还用于, 将所述接收的认证信息发送到所述特定无线接 入点以申请认证; 所述接收器还用于, 接收所述特定无线接入点对所述认证信息的认 证结果, 若所述认证结果为认证成功, 则所述终端通过所述特定无线接 入点连接网络。 本发明的第六方面, 提供一种服务器, 包括:
接收器, 用于接收终端发送的可用无线接入点的查询请求; 处理器, 用于根据所述查询请求, 获得所述可用的无线接入点信息; 发送器, 用于向所述终端发送所述获取的无线接入点信息; 以及 所述发送器还用于, 当所述接收器接收到所述终端对特定无线接入 点的认证信息请求时, 将所述特定无线接入点对应的认证信息发送给所 述终端, 所述认证信息使所述终端连接到所述特定无线接入点。 结合第六方面, 在第六方面的第一种可能的实现方式中, 所述接收器还用于, 在所述发送器向所述终端发送所述获取的无线 接入点信息后, 接收所述终端发送的申请连接权限的请求; 所述处理器还用于, 根据所述接收器接收的请求, 确定是否能为所 述终端分配连接权限; 所述发送器还用于, 在所述处理器确定能为所述终端分配连接权限 时, 向所述终端发送权限分配结果。 结合第六方面的第一种可能的实现方式, 在第六方面的第二种可能 的实现方式中, 所述接收器还用于, 接收所述终端发送的权限使用信息, 其中所述 权限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和已 消耗权限的信息; 所述处理器还用于, 根据所述终端被分配的权限和所述权限使用信 息, 处理得到所述终端的权限未使用信息; 所述发送器还用于, 向所述终端发送所述权限未使用信息, 所述权 限未使用信息被所述终端用于判断所述终端是否与所述无线接入点继续 连接。 结合第六方面或第六方面的第一种可能的实现方式或第六方面的第 二种可能的实现方式, 在第六方面的第三种可能的实现方式中, 所述处 理器还用于: 从至少一个 WLAN服务提供者获取无线连接认证信息。 结合第六方面的第三种可能的实现方式, 在第六方面的第四种可能 的实现方式中, 所述处理器具体用于:
所述处理器向所述发送器发送指令, 指示所述发送器向至少一个 WLAN服务提供者发送申请连接认证信息的请求;
所述处理器向所述接收器发送指令, 指示所述接收器接收所述 WLAN服务提供者提供的认证信息; 所述服务器还包括: 存储器, 用于保存所述接收的认证信息。 本发明提供的无线局域网络 WLAN的接入方法、 终端及服务器, 该 方法包括: 首先, 终端向服务器发送可用无线接入点的查询请求以查询 可用的无线接入点信息; 服务器接收并根据所该查询请求, 向终端发送 所获得的可用无线接入点信息。 接下来, 终端接收服务器返回的无线接 入点信息, 从接收的无线接入点信息中确定特定的无线接入点。 然后, 终端向服务器发送特定无线接入点的认证信息请求, 当服务器接收到该 请求时, 将特定无线接入点对应的认证信息发送给终端, 该认证信息使 终端连接到特定无线接入点。 从上可看出, 这种通过从服务器返回的无 线接入点信息中确定特定的无线接入点方式, 避免了当无线接入点发生 显著变化时, 用户需手动操作从多个无线接入点中选择某个无线接入点 的问题, 因此该方式更具智能化, 进一步地简化了用户操作。 为了更清楚地说明本发明实施例或现有技术中的技术方案, 下面将 对实施例或现有技术描述中所需要使用的附图作简单地介绍, 显而易见 地, 下面描述中的附图仅仅是本发明的一些实施例, 对于本领域普通技 术人员来讲, 在不付出创造性劳动的前提下, 还可以根据这些附图获得 其他的附图。 图 1 为本发明实施例一提供的 WLAN 的接入方法的一种流程示意 图;
图 2为本发明实施例一提供的 WLAN的接入方法的一种界面示例性 示意图; 图 3 为本发明实施例二提供的 WLAN 的接入方法的一种流程示意 图;
图 4为本发明实施例三提供的终端的一种结构示意图; 图 5为本发明实施例三提供的终端的另一种结构示意图; 图 6为本发明实施例四提供的服务器的一种结构示意图; 图 7为本发明实施例四提供的服务器的另一种结构示意图; 图 8为本发明实施例四提供的服务器的另一种结构示意图; 图 9为本发明实施例五提供的终端的一种结构示意图; 图 10为本发明实施例六提供的服务器的一种结构示意图; 图 11为本发明实施例六提供的服务器的另一种结构示意图; 图 12为本发明实施例七提供的 WLAN的接入系统的一种系统架构 示意图。 具体实施方式 下面将结合本发明实施例中的附图, 对本发明实施例的技术方案进 行清楚、 完整地描述, 显然, 所描述的实施例仅仅是本发明的一部分实 施例, 而不是全部的实施例。 基于本发明中的实施例, 本领域普通技术 人员在没有做出创造性劳动的前提下所获得的所有其它实施例, 都属于 本发明保护的范围。 实施例一 本发明实施例一提供一种无线局域网络 WLAN的接入方法, 应用于 终端, 其中终端可以为手机、 笔记本、 平板电脑、 个人数字助理以及任 一具有接入无线局域网络功能的移动设备。 如图 1 所示, 该方法包括以 下步骤:
101 ,终端向服务器发送可用无线接入点的查询请求以查询可用的无 线接入点信息。 由于无线局域网络本身具有一定的地域性, 因此当终端处于不同的 地理位置时, 它周围环境中的无线接入点也会发生变化。 因此, 在本步 骤中, 当用户在终端上启动 WLAN接入时, 终端向服务器发送可用无线 接入点的查询请求以查询可用的无线接入点信息。 其中无线接入点信息 包括至少一个无线接入点的标识。该无线接入点标识通常用 SSID( Service Set Identifier, 服务集标识) 表示, 用于区分无线接入点。 具体的, 考虑到终端所处环境附近的无线接入点不一定都是该终端 相关联的服务器所管理的, 因此, 步骤 101 可具体为: 终端向服务器发 送可用无线接入点的查询请求以查询由服务器管理的无线接入点。 例如, 在用户启动 WLAN接入后 , 当终端检测到自身所在的地理位 置出现变化时, 则终端向服务器发送查询请求以查询由服务器管理的无 线接入点。 再例如, 只要终端检测到自身所在的地理位置出现变化时, 就向服务器发送该服务器所管理的无线接入点的查询请求, 关于终端发 送查询请求的触发条件, 本发明不做具体限定。
可选的, 在本步骤中, 在无线接入点的查询请求中可以携带有以下 至少一种参数: 地域标识, 费率标识, 流量标识, 时长标识。 当终端向 服务器发送的查询请求中携带有上述参数时, 服务器根据该参数条件, 找到匹配的无线接入点。 其中, 地域标识, 用于标识终端向服务器发送 的查询请求中要求无线连接点所属的区域范围, 例如要求无线连接点位 于以终端位置的 30米范围内。 其中, 该终端位置可以以经纬度、 地点名 称、 建筑名称等形式表示。 费率标识, 用于标识终端向服务器发送的查 询请求中要求无线连接点所属的费率类型。 流量标识, 用于标识终端向 服务器发送的查询请求中要求无线连接点所属的流量种类。 时长标识, 用于标识终端向服务器发送的查询请求中要求无线连接点至少能够使用 的时间。 可以理解的, 终端向服务器发送的查询请求中携带的参数包括但不 限于上述参数。 当然, 在无线接入点的查询请求中也可不携带任何参数。 例如, 当 终端向服务器发送的查询请求不携带任何参数时, 则服务器为终端提供 其管理下的所有无线接入点。
102 , 终端接收服务器返回的无线接入点信息。 本步骤中, 当服务器接收到终端对无线接入点的查询请求时, 服务 器会根据该请求返回相应的无线接入点信息。 可理解的, 当无线接入点 信息包括多个无线接入点时, 这些无线接入点可形成无线接入点列表, 以列表形式被服务器返回给终端。 也即, 终端接收服务器返回的的无线 接入点信息为无线接入点列表。 可选的, 当步骤 101 具体为终端向服务器发送可用无线接入点的查 询请求以查询由服务器管理的无线接入点时, 对应的, 步骤 102具体为: 在服务器查询到并发送自身管理的无线接入点信息后, 终端接收该服务 器返回的无线接入点信息。 可理解的, 在步骤 102后, 还可包括终端保存所接收到的无线接入 点信息的步骤。
103 , 终端从接收的无线接入点信息中确定特定的无线接入点。 其中, 所述特定的无线接入点表示某一无线接入点, 优选地, 该接 入点可以是最为合适的无线接入点。 当然, 在某些具体情况下, 该接入 点也可以是第二合适的无线接入点, 本发明对此不作具体限定。 可选的, 在本发明的一个具体实施例中, 步骤 103可具体为, 按照 预定规则从接收的无线接入点信息中确定特定的无线接入点, 其中, 所 述预定规则为以下一种或多种: 信号强度, 费率, 可用流量等。 关于预 定规则, 用户可根据自身需要自行选择设定。 例如, 当用户知悉终端所 在区域的 WLAN都是收费时, 可设定规则为 "费率" , 则终端从接收的 无线接入点信息中确定其中费率最低的一个无线接入点。 再例如, 用户 为了获得良好且长期有效的上网环境, 可设定规则为信号强度和可用流 量, 则终端从接收的无线接入点信息中确定其中信号强度最强且可用流 量最多的一个无线接入点。 需说明的是, 上述预定规则可以与前文所述的终端向服务器发送无 线接入点的查询请求中携带的参数类型相同。 例如, 在系统默认且无人 工改动的情况下, 当终端向服务器发送无线接入点的查询请求中携带的 参数类型为流量标识时, 则预定的规则默认为可用流量。 另外, 二者也 可以不同, 这可以由用户根据具体情况具体设定, 本发明在此不做限定。 此外, 通常情况下 WLAN服务提供者 (即提供 WLAN服务的运营 商) 是有偿向用户提供 WLAN的, 而且从 WLAN服务提供者的角度讲, 合理分配网络资源有利于降低成本。 针对不同用户分配不同的网络资源 一般采用分配不同使用网络权限的手段。 其中, 分配权限可采用这样的 策略: 使用网络越多, 则分配的权限越大。 例如, 终端 A使用网络的时 长和流量都比终端 B使用的多, 则向终端 A分配的权限比向终端 B分配 的大, 也即, 终端 A获得的时长和流量都比终端 B的多。 显然, 这种策 略既能满足不同用户的需求, 又能合理分配网络资源, 有效减低 WLAN 服务提供者的成本。 考虑到上述在终端连接网络前服务器为其分配权限的情况,可选的, 在本发明的一个具体实施例中, 在步骤 103前, 该方法还包括以下步骤: 首先, 终端向服务器发送申请连接权限的请求, 该申请连接权限的 请求用于请求服务器确定终端是否具有连接权限; 然后, 在具有连接权 限的情况下, 终端接收服务器发送的权限分配结果; 此种情形下, 步骤 103具体为: 终端根据接收的权限分配结果, 从 无线接入点信息中确定特定的无线接入点。 具体的, 在终端向服务器发送申请连接权限的请求后, 若服务器确 定终端具有连接权限, 服务器为终端分配权限, 在服务器向终端发送权 限分配结果后, 终端接收服务器发送的权限分配结果; 然后, 终端根据 权限分配结果, 从无线接入点信息中确定特定的无线接入点。 举例而言, 服务器为无线接入点 A分配了 100兆比特的流量, 为无线接入点 B分配 了 50兆比特的流量, 服务器将上述信息返回给终端; 则终端根据上述信 息, 可以优选流量大的无线接入点 A来连接。 其中, 申请连接权限的请求中可携带以下四种形式的参数向服务器 申请连接权限: 形式一, 申请连接权限的请求携带有终端标识。
形式二, 申请连接权限的请求携带有用户标识。 形式三, 申请连接权限的请求携带有终端标识、 申请权限类型和申 请权限类型对应的权限值。 其中权限类型包括流量、 连接时长、 费用等。 形式四, 申请连接权限的请求携带有用户标识、 申请权限类型和申 请权限类型对应的权限值。 其中权限类型包括流量、 连接时长、 费用等。 对于上述形式一, 该方式是以终端为单位, 即终端向服务器请求连 接权限向服务器报告终端的标识。 这样, 服务器就可以按照终端标识进 行权限的分配。 另外, 由于仅携带终端标识, 因此由服务器根据自己的 策略来分配。 其中分配策略可如前文所述的 "使用网络越多, 则分配的 权限越大" 的策略。 例如: 在权限类型是流量的情况下, 如果该终端使 用了运营商蜂窝网络的流量越多, 那么运营商给该终端赠送的 WLAN流 量就越多。 对于上述形式二, 该方式是以用户为单位, 适用于同一用户使用多 个终端的场景。 用户需要在服务器上注册, 建立用户标识和终端标识的 绑定关系。 当终端申请连接权限时需要携带用户标识。 另外, 由于仅携 带用户标识, 因此由服务器根据自己的策略来分配。 其中分配策略可如 前文所述的 "使用网络越多, 则分配的权限越大" 的策略。 对于上述形式三, 该方式是以终端为单位, 即终端向服务器请求连 接权限时向服务器报告终端的标识。 这样, 服务器就可以按照终端标识 进行权限的分配。 另外, 由于除携带终端标识外, 还携带有申请权限类 型和申请权限类型对应的权限值, 此种情况下, 服务器确定终端申请的 权限类型及其对应的权限值是否在分配范围之内。 如果在, 则服务器分 配终端相应的权限; 如果不在, 则服务器根据自身的分配策略向该终端 提供所能分配的权限。 对于上述形式四, 这种方式是以用户为单位, 适用于同一用户使用 多个终端的场景。 用户需要在服务器上注册, 建立用户标识和终端标识 的绑定关系。 这样, 当终端申请连接权限时只需要携带用户标识。 另夕卜, 由于除携带终端标识外, 还携带有申请权限类型和申请权限类型对应的 权限值, 此种情况下, 服务器确定终端申请的权限类型及其对应的权限 值是否在分配范围之内。 如果在, 则服务器分配终端相应的权限; 如果 不在, 则服务器根据自身的分配策略向该终端提供所能分配的权限。
以下举例说明终端如何发送携带有参数的申请权限请求以及服务器 如何根据终端的权限请求给终端分配 WLAN访问服务的权限。 以在连接 权限请求中携带的参数为终端标识和连接时长为例。 首先, 终端统计该 终端特定时间段内使用蜂窝网络进行数据通信的时长。 例如, 距统计当 天之前的五天内使用蜂窝网络的时长为 1 小时。 然后, 终端根据统计的 时长结果向服务器发送权限请求, 在请求中携带特定时间段的蜂窝网络 使用情况, 例如, 开始日期为 1 日、 结束日期为 5 日、 时长为 1 小时。 服务器根据收到的上述信息, 判断是否在分配范围之内。 若判断在分配 范围之内, 则给该终端分配同样时长的 WLAN访问权限, 然后把该分配 结果返回给终端。 若判断不在分配范围之内, 则服务器向终端发送 "不 符合" 的提示信息, 并根据自身的分配策略向终端发送是否按此分配权 限的确认信息。 在终端发送确认后, 服务器向终端分配该权限。 如图 2所示,在本发明实施例中还提供了一种权限连接的显示界面。 在如图 2 所示的主控界面中, 当开关置于 "连接" 状态时, 信号强度的 图标可以用一种颜色或形态标识该终端连接到无线接入点。 例如信号强 度的图标变成绿色且条纹的数量动态显示信号的强度。 当开关置于 "关 闭" 状态时, 信号强度的图标可用另一种颜色或形态标识连接已断开, 例如信号强度的图标变成灰色且处于静止状态。 而且, 在该界面上还有 一个用于设置权限类型的配置按钮。 当用户点击该配置按钮后能够在用 户面前展示另一新的界面, 即如图 2 所示的设置权限类型的界面。 在该 界面中, 可以有三种权限类型, 用户可根据需要选择其中的一种或多种。 在用户选择权限类型后, 终端统计该权限类型对应的数据, 将该数据发 送给服务器以申请相应的权限。
104 , 终端从服务器获取特定无线接入点的认证信息, 该认证信息用 于终端连接到与认证信息对应的特定无线接入点。 可选的, 在本发明的一个具体实施例中, 步骤 104可具体包括以下 步骤:
1041 , 终端向服务器发送特定无线连接点对应的认证信息的请求。 其中, 在终端向服务器请求特定无线连接点对应的认证信息的过程 中可携带无线接入点标识和终端标识, 或, 无线接入点标识和用户标识。
1042 , 终端接收服务器发送的特定无线接入点对应的认证信息 其中, 认证信息可以是密码, 也可以是 "用户名-密码" 的组合。 在此种情形下, 该方法还包括以下步骤:
1043 , 终端将接收的认证信息发送到特定无线接入点以申请认证。 举例而言, 终端将上述用户名 "Userl " 和密码 "Vvvv" 发送到无线 接入点 API以申请认证。
1044, 终端接收无线接入点发送的认证结果, 若认证结果为认证成 功, 则终端通过所述无线接入点连接网络。 具体而言, 当终端接收无线接入点 API发送的成功的认证结果, 如 果该认证结果为认证通过, 该终端通过无线接入点 API连接网络。 另外, 由于在步骤 103前还包括终端向服务器申请连接权限的步骤, 具体为, 终端向服务器发送申请连接权限的请求, 所述申请连接权限的 请求用于请求服务器确定终端是否具有连接权限, 在具有连接权限的情 况下, 终端接收服务器发送的权限分配结果。 从而终端根据所接收的权 限分配结果, 从无线接入点信息中确定特定的无线接入点, 即服务器根 据请求为终端分配权限, 当分配权限成功时, 终端可以连接无线接入点。 这种情形下, 终端需要向服务器报告权限的使用情况。 因此, 在终端连 接到无线接入点后, 该方法还包括以下步骤: 首先, 终端向服务器发送权限使用信息。 其中, 权限使用信息包括, 终端标识和已消耗权限的信息, 或, 用户标识和已消耗权限的信息。 其中, 权限使用信息与前述的 "申请连接权限的请求中携带的参数" 相对应, 也即, 当以终端为单位时, 权限使用信息包括终端标识和已消 耗权限的信息; 当以用户为单位时, 权限使用信息包括户标识和已消耗 权限的信息。 此外权限使用信息还可包括无线接入点标识、认证信息(如 用户名) 等。 接下来, 终端接收服务器发送的权限未使用信息; 该权限未使用信 息为服务器根据终端被分配的权限和权限使用信息处理得到。 其中, 权限未使用信息为服务器根据终端被分配的权限和权限使用 信息处理得到, 也即, 终端的权限未使用信息包括终端标识和未消耗权 限的信息, 或, 用户标识和未消耗权限的信息。 其中未消耗权限的信息 可用数值表示, 该数值等于从已分配的权限数值中减去已经使用的权限 数值后的数值。 例如, 终端被分配的权限对应的数值为 1 小时, 已经使 用的权限对应的数值为 0.8小时, 则权限未使用信息对应的数值为 0.2小 时。
然后, 获取服务器发送的权限未使用信息, 当权限未使用信息为终 端对应的权限已经消耗完毕, 则断开终端与无线接入点的连接。 本发明实施例一提供的无线局域网络 WLAN的接入方法, 应用于终 端。 首先, 终端向服务器发送可用无线接入点的查询请求以查询可用的 无线接入点信息; 接下来, 终端接收服务器返回的无线接入点信息, 从 接收的无线接入点信息中确定特定的无线接入点。 然后, 终端从服务器 获取特定无线接入点的认证信息, 该认证信息用于终端连接到与认证信 息对应的特定无线接入点。 从上可看出, 这种通过终端从接收服务器返 回的无线接入点信息中确定特定的无线接入点方式, 避免了当无线接入 点发生显著变化时, 用户需手动操作从多个无线接入点中选择某个无线 接入点的问题, 因此该方式更具智能化, 能够进一步简化用户操作。 实施例二 本发明实施例二提供一种无线局域网络 WLAN的接入方法, 应用于 服务器。 如图 3所示, 该方法包括以下步骤:
201 , 服务器接收终端发送的可用无线接入点的查询请求。 由于无线局域网络本身具有一定的地域性, 因此当终端处于不同的 地理位置时, 它周围环境中的无线接入点也会发生变化。 因此, 在本步 骤中, 当用户在终端上启动 WLAN接入时, 服务器会接收到终端发送的 可用无线接入点的查询请求。 其中, 该查询请求用以查询可用的无线接 入点信息。 考虑到终端所处环境附近的无线接入点不一定都是该终端相关联的 服务器所管理的, 因此, 具体的, 服务器会接收终端发送的查询请求, 该查询请求用于查询由服务器管理的无线接入点。 可选的,在无线接入点的查询请求中可以携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时长标识。 这三种参数的表示意义如 实施例一所描述的相同, 在此不作赘述。 可理解的, 在无线接入点的查询请求中也可不携带任何参数。 例如, 当终端向服务器发送的查询请求不携带任何参数时, 则服务器可向终端 提供其管理下的所有无线接入点。
202 , 服务器根据查询请求, 获得可用的无线接入点信息, 并向终端 发送所获得的可用无线接入点信息。 具体的, 服务器根据查询请求, 从自身的存储中查询到可用的无线 接入点信息, 将查询到的可用无线接入点信息发送给终端。 其中, 无线 接入点信息包括至少一个无线接入点的标识, 该标识用于区分不同的无 线接入点。 考虑到通常情况下 WLAN服务提供者是有偿向用户提供 WLAN的。 在满足用户需求的基础上, 合理分配网络资源有利于降低成本。 针对不 同用户分配不同的网络资源一般采用分配不同使用网络权限的手段。 其 中, 分配权限可采用这样的策略: 使用蜂窝网络越多, 则分配的 WLAN 访问权限越大。 这种策略既能满足不同用户的需求, 又能合理分配网络 资源, 有效减低 WLAN服务提供者的成本。 基于在终端连接网络前服务器为其分配权限的情况, 因此可选的, 在本发明的一个具体实施例中, 在步骤 202 服务器向终端发送所获得的 无线接入点信息后, 还包括: 确定终端是否具有连接权限。 具体的, 上述确定所述终端是否具有连接权限具体分为以下几个步 骤: 首先, 服务器接收终端发送的申请连接权限的请求; 接下来, 服务器根据所接收的请求, 确定是否能为所述终端分配连 接权限; 然后, 当服务器确定能为所述终端分配连接权限时, 向所述终端发 送权限分配结果。 其中, 可选的, 服务器可保存所述向终端发送的权限 分配结果。 可选的, 在本发明的一个具体实施例中, 所述申请连接权限的请求 携带的参数包括: 终端标识; 或, 用户标识; 或, 终端标识、 申请权限 类型和申请权限类型对应的权限值; 或, 用户标识、 申请权限类型和申 请权限类型对应的权限值。 这四种形式的参数意义与实施例一中的相同, 在此不做赘述。
203 , 当服务器接收到终端对特定无线接入点的认证信息请求时, 服 务器将特定无线接入点对应的认证信息发送给终端, 该认证信息使所述 终端连接到所述特定无线接入点。 具体的, 当服务器接收到终端对特定无线接入点的认证信息请求时, 服务器根据终端的认证信息请求选择对应的认证信息并将该认证信息发 送给终端。 其中, 认证信息可以是密码, 也可以是 "用户名-密码" 的组 合。 然后, 终端将接收的认证信息发送到所述无线接入点以申请认证, 如果认证通过则终端可以通过无线接入点连接网络。 此外, 考虑到由于在无线接入点前存在服务器为终端分配权限的情 况, 对应的, 在终端连接到特定无线接入点后也会存在终端消耗权限的 情况。 因此, 可选的, 在本发明的一个具体实施例中, 在终端连接到特 定无线接入点后, 还包括以下步骤:
2041 , 服务器接收终端发送的权限使用信息。 其中, 权限使用信息包括终端标识和已消耗权限的信息, 或, 用户 标识和已消耗权限的信息。 此外, 权限使用信息还可包括有无线接入点 标识、 认证信息 (如用户名) 等参数。
2042 , 服务器根据终端被分配的权限和权限使用信息, 处理得到该 终端的权限未使用信息。 其中, 权限未使用信息为服务器根据终端被分配的权限和权限使用 信息处理得到, 也即, 终端的权限未使用信息包括终端标识和未消耗权 限的信息, 或, 用户标识和未消耗权限的信息。 其中未消耗权限的信息 可用数值表示, 该数值等于从已分配的权限数值中减去已经使用的权限 数值后的数值。 例如, 终端被分配的权限对应的数值为 1 小时, 已经使 用的权限对应的数值为 0.8小时, 则权限未使用信息对应的数值为 0.2小 时。
2043 , 服务器向终端发送权限未使用信息, 该权限未使用信息用于 终端确定是否与无线接入点继续连接。 例如, 当终端对应的权限已经消耗完毕, 则终端断开自身与无线接 入点的连接。 本发明实施例二提供了一种无线局域网络 WLAN的接入方法, 应用 于服务器。 首先, 服务器接收终端发送的可用无线接入点的查询请求; 接下来, 服务器根据该查询请求, 获得所述可用的无线接入点信息, 并 向终端发送所获得的可用无线接入点信息; 然后, 服务器当接收到所述 终端对特定无线接入点的认证信息请求时, 将所述特定无线接入点对应 的认证信息发送给所述终端, 所述认证信息使所述终端连接到所述特定 无线接入点。 从上可看出, 这种通过终端从接收服务器返回的无线接入 点信息中确定特定的无线接入点方式, 避免了当无线接入点发生显著变 化时, 用户需手动操作从多个无线接入点中选择某个无线接入点的问题, 因此该方法更具智能化, 进一步简化用户操作。 此外,在终端向服务器申请连接特定无线接入点对应的认证信息前, 服务器需要事先具有无线接入点的认证信息。 因此可选的, 该方法还包 括以下步骤: 从至少一个 WLAN服务提供者获取无线连接认证信息。 其中, 优选的, 无线连接认证信息的获取方式为批量获取。 此外, 获取方式也可以是一个一个获取, 对此本发明不做具体限定。 可选的, 上述步骤可具体分为以下几个步骤: 首先, 向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 在 WLAN服务提供者 根据所述请求生成并发送连接认证信息后, 接收 WLAN服务提供者提供 的认证信息; 并保存接收的认证信息。 其中, 认证信息可以是密码, 也可以是 "用户名-密码" 的组合。 以 "用户名-密码" 形式为例, 认证信息可以是如表 1所示的形式, 这样就 可以根据无线接入点标识检索到可用的用户名和密码。 表 1
Figure imgf000025_0001
可选的, 所述向 WLAN服务提供者申请批量的连接认证信息的请求 中携带申请的连接认证信息的数量, 以及以下参数中的至少一个:
地域标识, 用于标识无线连接点所属的区域; 费率标识, 用于标识 所述申请的认证信息所属的费率类型; 流量标识, 用于标识所述申请的 认证信息所属的流量; 时长标识, 用于标识申请的认证信息对应的时长; 以及申请的认证信息的数量。 实施例三 与实施例一相对应, 本发明实施例三提供了一种终端 30, 如图 4所 示, 包括: 发送单元 301 , 用于向服务器发送可用无线接入点的查询请求以查 询可用的无线接入点信息; 接收单元 302 , 用于接收服务器返回的无线接入点信息; 处理单元 303 , 用于从接收单元 302接收的无线接入点信息中确定 特定的无线接入点; 连接单元 304 , 用于从服务器获取特定无线接入点的认证信息, 其 中该认证信息用于终端连接到与认证信息对应的特定无线接入点。 其中, 无线接入点的查询请求携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时长标识。 本发明实施例三提供了一种终端 30, 发送单元 301向服务器发送可 用无线接入点的查询请求以查询可用的无线接入点信息; 接收单元 302 接收服务器返回的无线接入点信息; 处理单元 303从接收单元 302接收 的无线接入点信息中确定特定的无线接入点; 连接单元 304 用于从服务 器获取特定无线接入点的认证信息, 其中该认证信息用于终端连接到与 认证信息对应的特定无线接入点。 从上可看出, 这种从服务器返回的无 线接入点信息中确定特定无线接入点的终端, 避免了当无线接入点发生 显著变化时, 用户需手动操作从多个无线接入点中选择某个无线接入点 的问题, 因此该终端更具智能化, 大大简化用户的操作。 可选的, 在本发明的一个具体实施例中, 处理单元 303具体用于: 按照预定规则从无线接入点信息中确定特定的无线接入点, 其中, 所述 预定规则为以下一种或多种: 信号强度, 费率, 可用流量。 可选的, 在本发明的一个具体实施例中, 发送单元 301还用于, 在 从接收的无线接入点信息中确定特定的无线接入点前, 向服务器发送申 请连接权限的请求, 该申请连接权限的请求用于请求服务器确定终端是 否具有连接权限; 在具有连接权限的情况下, 接收单元 302还用于接收服务器发送的 权限分配结果; 处理单元 303从所述接收单元 302接收的无线接入点信息中确定特 定的无线接入点具体为: 根据接收单元 302接收的权限分配结果, 从无 线接入点信息中确定特定的无线接入点。 进一步的, 在本发明的一个具体实施例中, 发送单元 301还用于, 在所述终端连接到所述无线接入点后, 向服务器发送权限使用信息, 其 中所述权限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标 识和已消耗权限的信息; 接收单元 302还用于, 接收服务器发送的权限未使用信息; 该权限 未使用信息为服务器根据终端被分配的权限和权限使用信息处理得到; 处理单元 303还用于, 获取服务器发送的权限未使用信息, 当所述 权限未使用信息为所述终端对应的权限已经消耗完毕, 则断开所述终端 与所述无线接入点的连接。 可选的, 在本发明的一个具体实施例中, 如图 5所示, 连接单元 304 具体包括: 认证信息申请模块 3041 , 用于向服务器发送特定无线连接点对应的 认证信息的请求; 认证信息接收模块 3042 , 用于接收服务器发送的特定无线接入点的 认证信息; 申请认证发送模块 3043 , 用于将接收的认证信息发送到无线接入点 以申请认证; 认证结果接收模块 3044 , 用于接收特定无线接入点对认证信息的认 证结果, 若认证结果为认证成功, 则终端通过该特定无线接入点连接网 络。
实施例四 与实施例二相对应, 本发明实施例四提供了一种服务器 40 , 如图 6 所示, 包括: 接收单元 401 , 用于接收终端发送的可用无线接入点的查询请求; 发送单元 402 , 用于根据所述查询请求, 获得可用的无线接入点信 息, 并向终端发送所获取的无线接入点信息; 以及
当接收单元 401接收到终端对特定无线接入点的认证信息请求时, 发送单元 402 还用于, 将特定无线接入点对应的认证信息发送给终端, 所述认证信息使终端连接到该特定无线接入点。 其中, 无线接入点的查询请求携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时长标识。 本发明实施例四提供了一种服务器 40 , 接收单元 401接收终端发送 的可用无线接入点的查询请求; 发送单元 402 根据所述查询请求, 获得 可用的无线接入点信息, 并向终端发送所获取的无线接入点信息。 然后, 当接收单元 401 接收到终端对特定无线接入点的认证信息请求时, 发送 单元 402 还用于, 将特定无线接入点对应的认证信息发送给终端, 所述 认证信息使终端连接到该特定无线接入点。 从上可看出, 这种能向终端 发送无线接入点信息, 并在终端选择特定无线无线接入点后能向终端发 送该无线接入点对应的认证信息的服务器, 避免了当无线接入点发生显 著变化时, 用户需手动操作从多个无线接入点中选择某个无线接入点的 问题, 因此能够大大简化用户操作。 可选的, 在本发明的一个具体实施例中, 接收单元 401还用于, 接 收终端发送的申请连接权限的请求; 如图 7所示, 服务器 40还包括处理 单元 403 , 用于根据接收单元 401接收的请求, 确定是否能为所述终端分 配连接权限; 此种情形下, 发送单元 402还用于, 当确定能为所述终端分配连接 权限时, 向所述终端发送权限分配结果。 其中, 申请连接权限的请求携带的参数包括: 终端标识; 或, 用户 标识; 或, 终端标识、 申请权限类型和申请权限类型对应的权限值; 或, 用户标识、 申请权限类型和申请权限类型对应的权限值。 进一步的, 在本发明的一个具体实施例中, 接收单元 401还用于, 接收终端发送的权限使用信息, 其中所述权限使用信息包括终端标识和 已消耗权限的数值, 或, 用户标识和已消耗权限的信息; 处理单元 403 还用于, 根据终端被分配的权限和权限使用信息, 处理得到终端的权限 未使用信息; 发送单元 402 还用于, 向终端发送权限未使用信息, 所述 权限未使用信息被所述终端用于判断终端是否与无线接入点继续连接。 可选的, 在本发明的一个具体实施例中, 如图 8所示, 服务器 40还 包括: 获取单元 404 , 用于从至少一个 WLAN服务提供者获取无线连接认 证信息。 进一步的, 在本发明的一个具体实施例中, 获取单元 403具体用于: 向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 在所 述 WLAN服务提供者根据所述请求生成并发送连接认证信息后, 接收所 述 WLAN服务提供者提供的认证信息; 并保存所述接收的认证信息。
其中, 申请批量的连接认证信息的请求中携带申请的认证信息的数 量以及以下至少一种参数: 地域标识, 用于标识无线连接点所属的区域; 费率标识, 用于标识 申请的认证信息所属的费率类型; 流量标识, 用于标识申请的认证信息 所属的流量; 时长标识, 用于标识申请的认证信息对应的时长。 实施例五 与实施例一相对应, 本发明实施例五还提供了一种终端 50 , 如图 9 所示, 包括: 发送器 501 , 用于向服务器发送可用无线接入点的查询请求以查询 可用的无线接入点信息; 接收器 502 , 用于接收服务器返回的无线接入点信息; 存储器 503 , 用于存储接收器 502接收的无线接入点信息; 处理器 504 , 用于从存储器 503 存储的无线接入点信息中确定特定 的无线接入点; 以及 处理器 504还用于, 从服务器获取特定无线接入点的认证信息, 所 述认证信息用于终端连接到与认证信息对应的特定无线接入点。 其中, 存储器 503 包括持久性存储和非持久性存储, 持久性存储可 以是硬盘、 SD卡等, 用于存储操作系统、 浏览器引擎、 管理模块客户端、 用户识别模块和其他应用程序。 非持久性存储可以是内存, 程序在运行 时, 需要从持久性存储加载到内存中, 内存中还保存程序运行过程中产 生的临时数据。 其中, 处理器 504用于执行指令并完成与移动终端系统相关的操作 (例如, 利用例如从存储器获取的指令) , 其可以控制移动终端系统的 各组件之间输入和输出数据的接收和操纵; 处理器 504 可以在单芯片、 多芯片或多个电子元件上实现, 并可采用多种体系结构, 包括专用或嵌 入式处理器、 专用处理器、 控制器、 ASIC 等。 此外, 终端 50 还包括输入 /输出设备, 用于人机交互。 其中, 通过 输入设备用户可以向移动终端发出控制指令, 例如输入设备可以是键盘、 触摸屏等。 通过输出设备用户可以接受移动终端的处理结果和反馈信息, 例如输出设备可以是显示器。 本发明实施例五提供了一种终端 50 , 发送器 501向服务器发送可用 无线接入点的查询请求以查询可用的无线接入点信息; 接收器 502接收 服务器返回的无线接入点信息; 处理器 504从存储器 503存储的无线接 入点信息中确定特定的无线接入点, 以及从服务器获取特定无线接入点 的认证信息, 所述认证信息用于终端连接到与认证信息对应的特定无线 接入点。 从上可看出, 这种从服务器返回的无线接入点信息中确定特定 无线接入点的终端, 避免了当无线接入点发生显著变化时, 用户需手动 操作从多个无线接入点中选择某个无线接入点的问题, 因此该终端更具 智能化, 大大简化用户的操作。 可选的, 在本发明的一个具体实施例中, 处理器 504具体用于: 按照预定规则从无线接入点信息中确定特定的无线接入点, 其中, 所述预定规则为以下一种或多种: 信号强度, 费率, 可用流量。 可选的, 在本发明的一个具体实施例中, 发送器 501还用于, 在处 理器 504根据所述无线接入点信息确定特定的无线接入点前, 向服务器 发送申请连接权限的请求, 该申请连接权限的请求用于请求服务器确定 终端是否具有连接权限; 在具有连接权限的情况下, 接收器 502还用于, 接收服务器发送的 权限分配结果; 处理器 504从存储器 503存储的无线接入点信息中确定特定的无线 接入点具体为: 处理器 504根据接收的权限分配结果, 从存储器 503存 储的无线接入, 信息中确定特定的无线接入点。 可选的, 在本发明的一个具体实施例中, 发送器 501还用于, 向服 务器发送权限使用信息, 其中所述权限使用信息包括终端标识和已消耗 权限的数值, 或, 用户标识和已消耗权限的信息; 接收器 502还用于, 接收服务器发送的权限未使用信息; 所述权限 未使用信息为服务器根据终端被分配的权限和权限使用信息处理得到; 处理器 504还用于, 获取服务器发送的权限未使用信息, 当权限未 使用信息为所述终端对应的权限已经消耗完毕, 则断开所述终端与所述 无线接入点的连接。 可选的, 在本发明的一个具体实施例中, 发送器 501还用于, 向服 务器发送所述特定无线连接点对应的认证信息的请求; 接收器 502还用于, 在服务器根据申请选择对应的认证信息并发送 所述认证信息后, 接收服务器发送的所述特定无线接入点的认证信息; 发送器 501还用于, 将接收器 502接收的认证信息发送到所述无线 接入点以申请认证; 接收器 502还用于, 接收特定无线接入点对认证信息的认证结果, 若认证结果为认证成功, 则终端通过特定无线接入点连接网络。 实施例六
与实施例二相对应, 本发明实施例六提供了一种服务器 60 , 如图 10 所示, 包括: 接收器 601 , 用于接收终端发送的可用无线接入点的查询请求; 处理器 602 , 用于根据查询请求, 获得所述可用的无线接入点信息; 发送器 603 , 用于向所述终端发送所述获取的无线接入点信息; 以 及 发送器 603还用于, 当接收器 601接收到终端对特定无线接入点的 认证信息请求时, 将所述特定无线接入点对应的认证信息发送给所述终 端, 所述认证信息使所述终端连接到所述特定无线接入点。 其中, 处理器 603用于执行指令并完成与移动终端系统相关的操作 (例如利用从存储器获取的指令) , 其可以控制移动终端系统的各组件 之间输入和输出数据的接收和操纵; 处理器 603 可以在单芯片、 多芯片 或多个电子元件上实现, 并可采用多种体系结构, 包括专用或嵌入式处 理器、 专用处理器、 控制器、 ASIC 等。 本发明实施例六提供了一种服务器 60 , 接收器 601接收终端发送的 可用无线接入点的查询请求; 处理器 602 根据所述查询请求, 获得可用 的无线接入点信息, 发送器 603 向终端发送所获取的无线接入点信息。 然后, 当接收器 601 接收到所述终端对特定无线接入点的认证信息请求 时, 发送器 603 将特定无线接入点对应的认证信息发送给终端, 所述认 证信息使所述终端连接到所述特定无线接入点。 从上可看出, 这种能向 终端发送无线接入点信息, 并在终端选择特定无线无线接入点后能向终 端发送该无线接入点对应的认证信息的服务器, 避免了当无线接入点发 生显著变化时, 用户需手动操作从多个无线接入点中选择某个无线接入 点的问题, 因此能够大大简化用户操作。 可选的, 在本发明的一个具体实施例中, 在发送器 603 向终端发送 所获取的无线接入点信息后, 接收器 601 还用于接收所述终端发送的申 请连接权限的请求;
处理器 602还用于, 根据接收器 601接收的请求, 确定是否能为所 述终端分配连接权限;
发送器 603还用于, 在处理器 602确定能为所述终端分配连接权限 时, 向所述终端发送权限分配结果。
进一步的, 在本发明的一个具体实施例中, 接收器 601还用于, 接 收终端发送的权限使用信息, 其中所述权限使用信息包括终端标识和已 消耗权限的数值, 或, 用户标识和已消耗权限的信息; 处理器 603还用于, 根据终端被分配的权限和权限使用信息, 处理 得到所述终端的权限未使用信息; 发送器 602还用于, 向终端发送权限未使用信息, 所述权限未使用 信息被所述终端用于判断所述终端是否与所述无线接入点继续连接。 可选的, 在本发明的一个具体实施例中, 处理器 603还用于: 从至 少一个 WLAN服务提供者获取无线连接认证信息。
进一步的, 在本发明的一个具体实施例中, 处理器 603具体用于: 处理器 603 向发送器 602 发送指令, 指示发送器 602 向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 处理器 603向接收器 601发送指令, 指示接收器 601在 WLAN服务 提供者根据所述请求生成并发送连接认证信息后, 接收 WLAN服务提供 者提供的认证信息;
此种情况下, 如图 1 1 所示, 服务器 60还包括: 存储器 604 , 用于 保存接收器 601接收的认证信息。 其中, 存储器 604 包括持久性存储和非持久性存储, 持久性存储可 以是硬盘、 SD卡等, 用于存储操作系统、 浏览器引擎、 管理模块客户端、 用户识别模块和其他应用程序。 非持久性存储可以是内存, 程序在运行 时, 需要从持久性存储加载到内存中, 内存中还保存程序运行过程中产 生的临时数据。 实施例七 此外, 本发明实施例七还提供了一种 WLAN 的接入系统 70, 如图 12所示, 该系统包括: 本发明实施例三所述的终端和本发明实施例四所 述的服务器; 或者, 所述系统包括本发明实施例五所述的终端和本发明 实施例六所述的服务器。 本领域普通技术人员可以理解实现上述实施例方法中的全部或部分 步骤是可以通过程序来指令相关的硬件完成, 所述的程序可以存储于一 种计算机可读存储介质中, 所述存储介质可以是只读存储器、 磁盘或光 盘等。
以上所述, 仅为本发明的具体实施方式, 但本发明的保护范围并不 局限于此, 任何熟悉本技术领域的技术人员在本发明揭露的技术范围内, 可轻易想到变化或替换, 都应涵盖在本发明的保护范围之内。 因此, 本 发明的保护范围应以权利要求的保护范围为准。

Claims

权 利 要 求 书
1、 一种无线局域网络 WLAN的接入方法, 其特征在于, 包括: 向服务器发送可用无线接入点的查询请求以查询可用的无线接入点 信息;
接收所述服务器返回的无线接入点信息;
从所述接收的无线接入点信息中确定特定的无线接入点;
从所述服务器获取所述特定无线接入点的认证信息, 所述认证信息 用于所述终端连接到与所述认证信息对应的特定无线接入点。
2、 根据权利要求 1所述的方法, 其特征在于, 所述无线接入点的查 询请求携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时 长标识。
3、 根据权利要求 1或 2所述的方法, 其特征在于, 所述从所述接收 的无线接入点信息中确定特定的无线接入点具体为, 按照预定规则从所 述无线接入点信息中确定特定的无线接入点, 其中, 所述预定规则为以 下一种或多种: 信号强度, 费率, 可用流量。
4、 根据权利要求 1-3任一项所述的方法, 其特征在于, 在所述从所 述接收的无线接入点信息中确定特定的无线接入点前, 所述方法还包括: 向所述服务器发送申请连接权限的请求, 所述申请连接权限的请求 用于请求所述服务器确定所述终端是否具有连接权限;
在具有连接权限的情况下, 接收所述服务器发送的权限分配结果; 所述从所述接收的无线接入点信息中确定特定的无线接入点具体 为, 根据所述接收的权限分配结果, 从所述无线接入点信息中确定特定 的无线接入点。
5、 根据权利要求 4所述的方法, 其特征在于, 所述申请连接权限的 请求携带的参数包括: 终端标识; 或, 用户标识; 或, 终端标识、 申请 权限类型和申请权限类型对应的权限值; 或, 用户标识、 申请权限类型 和申请权限类型对应的权限值。
6、 根据权利要求 5所述的方法, 其特征在于, 在所述终端连接到所 述无线接入点后, 所述方法还包括:
向所述服务器发送权限使用信息, 其中所述权限使用信息包括, 终 端标识和已消耗权限的信息, 或, 用户标识和已消耗权限的信息; 接收所述服务器发送的权限未使用信息; 所述权限未使用信息为所 述服务器根据所述终端被分配的权限和所述权限使用信息处理得到; 获取所述服务器发送的权限未使用信息, 当所述权限未使用信息为 所述终端对应的权限已经消耗完毕, 则断开所述终端与所述无线接入点 的连接。
7、 根据权利要求 1-6任一项所述的方法, 其特征在于, 所述从所述 服务器获取所述特定无线接入点的认证信息, 所述认证信息用于所述终 端连接到与认证信息对应的特定无线接入点包括:
向所述服务器发送所述特定无线连接点的认证信息的请求; 接收所述服务器发送的所述特定无线接入点对应的认证信息; 所述方法还包括:
将所述接收的认证信息发送到所述特定无线接入点以申请认证; 接收所述特定无线接入点发送的认证结果, 若所述认证结果为认证 成功, 则所述终端通过所述特定无线接入点连接网络。
8、 一种无线局域网络 WLAN的接入方法, 其特征在于, 包括: 接收终端发送的可用无线接入点的查询请求;
根据所述查询请求, 获得所述可用的无线接入点信息, 并向所述终 端发送所述获得的可用无线接入点信息;
当接收 'J所述终端对特定无线接入, 的认证信息请求时, 将所述特 定无线接入点对应的认证信息发送给所述终端, 所述认证信息使所述终 端连接到所述特定无线接入点。
9、 根据权利要求 8所述的方法, 其特征在于, 所述无线接入点的查 询请求携带有以下至少一种参数: 地域标识, 费率标识, 流量标识, 时 长标识。
10、 根据权利要求 8或 9所述的方法, 其特征在于, 在所述向所述 终端发送所述获得的无线接入点信息后, 所述方法还包括:
接收所述终端发送的申请连接权限的请求;
根据所述接收的请求, 确定是否能为所述终端分配连接权限; 当确定能为所述终端分配连接权限时, 向所述终端发送权限分配结 果。
1 1、 根据权利要求 10所述的方法, 其特征在于, 所述申请连接权限 的请求携带的参数包括: 终端标识; 或, 用户标识; 或, 终端标识、 申 请权限类型和申请权限类型对应的权限值; 或, 用户标识、 申请权限类 型和申请权限类型对应的权限值。
12、 根据权利要求 10或 11所述的方法, 其特征在于, 在所述终端 连接到所述特定无线接入点后, 所述方法还包括:
接收所述终端发送的权限使用信息, 其中所述权限使用信息包括, 终端标识和已消耗权限的信息, 或, 用户标识和已消耗权限的信息; 根据所述终端被分配的权限和所述权限使用信息, 处理得到所述终 端的权限未使用信息;
向所述终端发送所述权限未使用信息, 所述权限未使用信息用于所 述终端确定是否与所述无线接入点继续连接。
13、 根据权利要求 8-12任一项所述的方法, 其特征在于, 在所述将 所述特定无线接入点对应的认证信息发送给所述终端之前, 所述方法还 包括:
从至少一个 WLAN服务提供者获取无线连接认证信息。
14、 根据权利要求 13 所述的方法, 其特征在于, 所述从至少一个 WLAN服务提供者获取无线连接认证信息包括:
向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 接收所述 WLAN服务提供者提供的认证信息;
保存所述接收的认证信息。
15、 根据权利要求 14所述的方法, 其特征在于, 所述向所述 WLAN 服务提供者申请连接认证信息的请求中携带所述申请的连接认证信息的 数量, 以及以下参数中的至少一个:
地域标识, 用于标识无线连接点所属的区域;
费率标识, 用于标识所述申请的连接认证信息所属的费率类型; 流量标识, 用于标识所述申请的连接认证信息所属的流量; 时长标识, 用于标识申请的连接认证信息对应的时长。
16、 一种终端, 其特征在于, 包括:
发送单元, 用于向服务器发送可用无线接入点的查询请求以查询可 用的无线接入点信息;
接收单元, 用于接收所述服务器返回的无线接入点信息; 处理单元, 用于从所述接收单元接收的无线接入点信息中确定特定 的无线接入点;
连接单元, 用于从所述服务器获取所述特定无线接入点的认证信息, 其中所述认证信息用于所述终端连接到与认证信息对应的特定无线接入 点。
17、 根据权利要求 16所述的终端, 其特征在于, 所述处理单元具体 用于:
按照预定规 'J从所述无线接入点信息中确定特定的无线接入点, 其 中, 所述预定规则为以下一种或多种: 信号强度, 费率, 可用流量。
18、 根据权利要求 16或 17所述的终端, 其特征在于,
所述发送单元还用于, 在所述从所述接收的无线接入点信息中确定 特定的无线接入点前, 向所述服务器发送申请连接权限的请求, 所述申 请连接权限的请求用于请求所述服务器确定所述终端是否具有连接权 限;
在具有连接权限的情况下, 所述接收单元还用于接收所述服务器发 送的权限分配结果;
所述处理单元从所述接收单元接收的无线接入点信息中确定特定的 无线接入点具体为:
根据所述接收单元接收的权限分配结果, 从所述无线接入点信息中 确定特定的无线接入点。
19、 根据权利要求 18所述的终端, 其特征在于,
所述发送单元还用于, 在所述终端连接到所述无线接入点后, 向所 述服务器发送权限使用信息, 其中所述权限使用信息包括, 终端标识和 已消耗权限的数值, 或, 用户标识和已消耗权限的信息;
所述接收单元还用于, 接收所述服务器发送的权限未使用信息; 所 述权限未使用信息为所述服务器根据所述终端被分配的权限和所述权限 使用信息处理得到;
所述处理单元还用于, 获取所述服务器发送的权限未使用信息, 当 所述权限未使用信息为所述终端对应的权限已经消耗完毕, 则断开所述 终端与所述无线接入点的连接。
20、 根据权利要求 16-19 任一项所述的终端, 其特征在于, 所述连 接单元具体包括: 认证信息查询模块, 用于向所述服务器发送所述特定无线连接点对 应的认证信息的请求;
认证信息接收模块, 用于接收所述服务器发送的所述特定无线接入 点的认证信息;
申请认证发送模块, 用于将所述接收的认证信息发送到所述特定无 线接入点以申请认证;
认证结果接收模块, 用于接收所述特定无线接入点对所述认证信息 的认证结果, 若所述认证结果为认证成功, 则所述终端通过所述特定无 线接入点连接网络。
21、 一种服务器, 其特征在于, 包括:
接收单元, 用于接收终端发送的可用无线接入点的查询请求; 发送单元, 用于根据所述查询请求, 获得所述可用的无线接入点信 息, 并向所述终端发送所述获取的无线接入点信息; 以及
当所述接收单元接收到所述终端对特定无线接入点的认证信息请求 时, 所述发送单元还用于, 将所述特定无线接入点对应的认证信息发送 给所述终端, 所述认证信息使所述终端连接到所述特定无线接入点。
22、 根据权利要求 21所述的服务器, 其特征在于,
所述接收单元还用于, 接收所述终端发送的申请连接权限的请求; 所述服务器还包括:
处理单元, 用于根据所述接收单元接收的请求, 确定是否能为所述 终端分配连接权限;
所述发送单元还用于, 当确定能为所述终端分配连接权限时, 向所 述终端发送权限分配结果。
23、 根据权利要求 22所述的服务器, 其特征在于,
所述接收单元还用于, 接收所述终端发送的权限使用信息, 其中所 述权限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和 已消耗权限的信息;
所述处理单元还用于, 根据所述终端被分配的权限和所述权限使用 信息, 处理得到所述终端的权限未使用信息;
所述发送单元还用于, 向所述终端发送所述权限未使用信息, 所述 权限未使用信息被所述终端用于判断所述终端是否与所述无线接入点继 续连接。
24、 根据权利要求 21-23 任一项所述的服务器, 其特征在于, 所述 服务器还包括:
获取单元, 用于从至少一个 WLAN服务提供者获取无线连接认证信 息。
25、 根据权利要求 24所述的服务器, 其特征在于, 所述获取单元具 体用于:
向至少一个 WLAN服务提供者发送申请连接认证信息的请求; 接收所述 WLAN服务提供者提供的认证信息;
保存所述接收的认证信息。
26、 一种终端, 其特征在于, 包括:
发送器, 用于向服务器发送可用无线接入点的查询请求以查询可用 的无线接入点信息;
接收器, 用于接收所述服务器返回的无线接入点信息;
存储器, 用于存储所述接收器接收的无线接入, 信息;
处理器, 用于从所述存储器存储的无线接入点信息中确定特定的无 线接入点; 以及
所述处理器还用于, 从所述服务器获取所述特定无线接入点的认证 信息, 所述认证信息用于所述终端连接到与所述认证信息对应的特定无 线接入点。
27、 根据权利要求 26所述的终端, 其特征在于, 所述处理器具体用 于:
按照预定规 'J从所述无线接入点信息中确定特定的无线接入点, 其 中, 所述预定规则为以下一种或多种: 信号强度, 费率, 可用流量。
28、 根据权利要求 26或 27所述的终端, 其特征在于,
所述发送器还用于, 在所述处理器根据所述无线接入点信息确定特 定的无线接入点前, 向所述服务器发送申请连接权限的请求, 所述申请 连接权限的请求用于请求所述服务器确定所述终端是否具有连接权限; 在具有连接权限的情况下, 所述接收器还用于, 接收所述服务器发 送的权限分配结果;
所述处理器从所述存储器存储的无线接入点信息中确定特定的无线 接入点具体为:
所述处理器根据所述接收的权限分配结果, 从所述存储器存储的所 述无线接入点信息中确定特定的无线接入点。
29、 根据权利要求 28所述的终端, 其特征在于,
所述发送器还用于, 向所述服务器发送权限使用信息, 其中所述权 限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和已消 耗权限的信息;
所述接收器还用于, 接收所述服务器发送的权限未使用信息; 所述 权限未使用信息为所述服务器根据所述终端被分配的权限和所述权限使 用信息处理得到;
所述处理器还用于, 获取所述服务器发送的权限未使用信息, 当所 述权限未使用信息为所述终端对应的权限已经消耗完毕, 则断开所述终 端与所述无线接入点的连接。
30、 根据权利要求 26-29任一项所述的终端, 其特征在于,
所述发送器还用于, 向所述服务器发送所述特定无线连接点对应的 认证信息的请求;
所述接收器还用于, 接收所述服务器发送的所述特定无线接入点的 认证信息;
所述发送器还用于, 将所述接收的认证信息发送到所述特定无线接 入点以申请认证;
所述接收器还用于, 接收所述特定无线接入点对所述认证信息的认 证结果, 若所述认证结果为认证成功, 则所述终端通过所述特定无线接 入点连接网络。
3 1、 一种服务器, 其特征在于, 包括:
接收器, 用于接收终端发送的可用无线接入点的查询请求; 处理器, 用于根据所述查询请求, 获得所述可用的无线接入点信息; 发送器, 用于向所述终端发送所述获取的无线接入点信息; 以及 所述发送器还用于, 当所述接收器接收到所述终端对特定无线接入 点的认证信息请求时, 将所述特定无线接入点对应的认证信息发送给所 述终端, 所述认证信息使所述终端连接到所述特定无线接入点。
32、 根据权利要求 3 1所述的服务器, 其特征在于, 所述接收器还用于, 在所述发送器向所述终端发送所述获取的无线 接入点信息后, 接收所述终端发送的申请连接权限的请求;
所述处理器还用于, 根据所述接收器接收的请求, 确定是否能为所 述终端分配连接权限;
所述发送器还用于, 在所述处理器确定能为所述终端分配连接权限 时, 向所述终端发送权限分配结果。
33、 根据权利要求 32所述的服务器, 其特征在于,
所述接收器还用于, 接收所述终端发送的权限使用信息, 其中所述 权限使用信息包括, 终端标识和已消耗权限的数值, 或, 用户标识和已 消耗权限的信息;
所述处理器还用于, 根据所述终端被分配的权限和所述权限使用信 息, 处理得到所述终端的权限未使用信息;
所述发送器还用于, 向所述终端发送所述权限未使用信息, 所述权 限未使用信息被所述终端用于判断所述终端是否与所述无线接入点继续 连接。
34、 根据权利要求 31-33 任一项所述的服务器, 其特征在于, 所述 处理器还用于: 从至少一个 WLAN服务提供者获取无线连接认证信息。
35、 根据权利要求 34所述的服务器, 其特征在于, 所述处理器具体 用于:
所述处理器向所述发送器发送指令, 指示所述发送器向至少一个 WLAN服务提供者发送申请连接认证信息的请求;
所述处理器向所述接收器发送指令, 指示所述接收器接收所述 WLAN服务提供者提供的认证信息;
所述服务器还包括:
存储器, 用于保存所述接收的认证信息。
PCT/CN2014/075529 2014-04-16 2014-04-16 无线局域网络wlan的接入方法、终端及服务器 WO2015157949A1 (zh)

Priority Applications (11)

Application Number Priority Date Filing Date Title
CN201480001361.6A CN104350802B (zh) 2014-04-16 2014-04-16 无线局域网络wlan的接入方法、终端及服务器
JP2016562893A JP6448662B2 (ja) 2014-04-16 2014-04-16 無線ローカルエリアネットワークwlanのアクセス方法、端末、およびサーバ
CA2945848A CA2945848C (en) 2014-04-16 2014-04-16 Wireless local area network wlan access method, terminal, and server
PCT/CN2014/075529 WO2015157949A1 (zh) 2014-04-16 2014-04-16 无线局域网络wlan的接入方法、终端及服务器
EP14889330.8A EP2999270B1 (en) 2014-04-16 2014-04-16 Wireless local area network (wlan) access method, terminal and server
BR112016024045-6A BR112016024045B1 (pt) 2014-04-16 2014-04-16 Método de acesso a uma rede de área local sem fio wlan executado por um terminal e terminal
EP17185454.0A EP3306985B1 (en) 2014-04-16 2014-04-16 Wireless local area network wlan access method, terminal, and server
KR1020167031594A KR101834914B1 (ko) 2014-04-16 2014-04-16 무선랜(wlan) 액세스 방법, 단말기, 및 서버
AU2014391026A AU2014391026B2 (en) 2014-04-16 2014-04-16 Wireless local area network (WLAN) access method, terminal and server
US14/980,412 US10425393B2 (en) 2014-04-16 2015-12-28 Wireless local area network WLAN access method, terminal, and server
US16/549,343 US11777916B2 (en) 2014-04-16 2019-08-23 Wireless local area network WLAN access method, terminal, and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2014/075529 WO2015157949A1 (zh) 2014-04-16 2014-04-16 无线局域网络wlan的接入方法、终端及服务器

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US14/980,412 Continuation US10425393B2 (en) 2014-04-16 2015-12-28 Wireless local area network WLAN access method, terminal, and server

Publications (1)

Publication Number Publication Date
WO2015157949A1 true WO2015157949A1 (zh) 2015-10-22

Family

ID=52504158

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2014/075529 WO2015157949A1 (zh) 2014-04-16 2014-04-16 无线局域网络wlan的接入方法、终端及服务器

Country Status (9)

Country Link
US (2) US10425393B2 (zh)
EP (2) EP3306985B1 (zh)
JP (1) JP6448662B2 (zh)
KR (1) KR101834914B1 (zh)
CN (1) CN104350802B (zh)
AU (1) AU2014391026B2 (zh)
BR (1) BR112016024045B1 (zh)
CA (1) CA2945848C (zh)
WO (1) WO2015157949A1 (zh)

Families Citing this family (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105101338A (zh) * 2015-07-23 2015-11-25 中国联合网络通信集团有限公司 一种接入网络的方法及装置
CN105163368A (zh) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 一种无线网络接入方法和装置
CN105050048B (zh) * 2015-07-31 2019-05-03 腾讯科技(深圳)有限公司 一种网络接入点位置信息提示方法、终端以及服务器
CN105873237A (zh) * 2015-08-05 2016-08-17 上海连尚网络科技有限公司 一种用于建立无线连接的方法与设备
CN108124297B (zh) * 2015-08-05 2021-09-28 上海尚往网络科技有限公司 用于提供无线接入点的接入点信息的方法与设备
CN106921632B (zh) * 2015-12-25 2020-02-07 北京奇虎科技有限公司 无线热点接入控制方法及装置
CN105873049B (zh) * 2016-01-18 2017-12-22 上海连尚网络科技有限公司 一种用于共享无线接入点的方法、设备、系统和存储介质
CN105682015B (zh) 2016-04-05 2017-10-31 上海连尚网络科技有限公司 一种用于建立无线连接的方法与设备
US20170325134A1 (en) * 2016-05-04 2017-11-09 Huawei Technologies Co., Ltd. Method and apparatus for connecting a mobile device to a pay-for-usage communication network
CN105979567B (zh) * 2016-05-13 2017-07-28 上海连尚网络科技有限公司 确定无线接入点的接入信息的方法及设备、系统
CN105933905B (zh) * 2016-07-11 2017-12-22 上海掌门科技有限公司 一种实现无线接入点连接认证的方法与设备
CN107071864B (zh) * 2016-12-28 2019-11-08 上海掌门科技有限公司 一种用于连接无线接入点的方法、设备及系统
CN106879006A (zh) * 2017-01-19 2017-06-20 杰发科技(合肥)有限公司 无线接入设备及其无线连接管理方法
CN106851758B (zh) * 2017-03-17 2021-03-23 Oppo广东移动通信有限公司 通信网络切换方法及终端设备
EP3622690B1 (en) * 2017-05-11 2021-09-22 Airties Kablosuz Iletisim San. ve Dis Tic. A.S. Cloud based wifi network setup for multiple access points
CN107979841B (zh) * 2017-08-02 2020-11-03 上海连尚网络科技有限公司 无线接入点认证信息的查询方法与设备
CN107889191B (zh) * 2017-09-13 2021-01-19 上海连尚网络科技有限公司 无线局域网络的连接方法、装置、设备及计算机可读存储介质
KR102520521B1 (ko) * 2018-12-14 2023-04-12 선전 헤이탭 테크놀로지 코포레이션, 엘티디. Wifi 네트워크 처리 방법, 장치, 전자 장치 및 저장 매체
CN110401767B (zh) * 2019-05-30 2021-08-31 华为技术有限公司 信息处理方法和设备
US11109258B2 (en) * 2019-05-31 2021-08-31 Apple Inc. Crowd sourced privacy preserving access point mapping
BR102020017767A2 (pt) * 2019-08-29 2021-03-09 Reliance Jio Infocomm Ltd método e sistema para automaticamente descarregar um dispositivo de usuário para pelo menos um ponto de acesso (ap) sem fio
CN110602767B (zh) * 2019-10-30 2023-06-16 上海掌门科技有限公司 热点连接方法及设备
US12107864B2 (en) 2021-12-02 2024-10-01 Bank Of America Corporation System and method for automatically assigning network and application permissions to a network device based on user attributes
CN114501589B (zh) * 2022-01-27 2024-08-30 阿里巴巴(中国)有限公司 无线接入方法、无线接入点、终端设备和存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877901A (zh) * 2009-04-28 2010-11-03 华为技术有限公司 网络接入方法、终端设备、服务器及通信系统
CN102946586A (zh) * 2012-11-08 2013-02-27 中兴通讯股份有限公司 基于位置信息的接入网络信息通知、接入方法及装置
WO2014047887A1 (zh) * 2012-09-28 2014-04-03 华为技术有限公司 无线局域网接入方法、基站控制器和用户设备

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3518599B2 (ja) * 2002-01-09 2004-04-12 日本電気株式会社 無線lanシステム、アクセス制御方法およびプログラム
US20030233580A1 (en) * 2002-05-29 2003-12-18 Keeler James D. Authorization and authentication of user access to a distributed network communication system with roaming features
JP4531549B2 (ja) * 2004-01-29 2010-08-25 株式会社エヌ・ティ・ティ・ドコモ 通信システム、通信端末および通信プログラム
US7546459B2 (en) * 2004-03-10 2009-06-09 Telefonaktiebolaget L M Ericsson (Publ) GSM-like and UMTS-like authentication in a CDMA2000 network environment
JP4908819B2 (ja) * 2004-12-01 2012-04-04 キヤノン株式会社 無線制御装置、システム、制御方法、及びプログラム
KR100703149B1 (ko) 2005-03-23 2007-04-05 에스케이 텔레콤주식회사 이종 무선랜 사업자 서비스 영역에서의 무선랜 서비스 제공방법 및 시스템
US8151322B2 (en) * 2006-05-16 2012-04-03 A10 Networks, Inc. Systems and methods for user access authentication based on network access point
JP2010118840A (ja) * 2008-11-12 2010-05-27 Nec Corp 通信システム、サービス管理サーバ、サービス提供方法およびプログラム
US8620270B2 (en) 2009-10-06 2013-12-31 Mosaid Technologies Incorporated System and method providing interoperability between cellular and other wireless systems
US8340636B2 (en) * 2009-11-30 2012-12-25 Airvana Llc Determining if an access terminal is authorized to use an access point
EP2372971A1 (en) * 2010-03-30 2011-10-05 British Telecommunications Public Limited Company Method and system for authenticating a point of access
CN108174435A (zh) * 2011-11-25 2018-06-15 班德韦斯克公司 用于为移动无线装置提供智能网络接入选择的系统
CN102647771B (zh) * 2012-04-10 2016-05-25 华为技术有限公司 无线局域网络的发现与选择方法、设备及系统与终端
CN102711110A (zh) 2012-05-24 2012-10-03 中兴通讯股份有限公司 一种管理Wi-Fi网络的方法和无线路由器

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101877901A (zh) * 2009-04-28 2010-11-03 华为技术有限公司 网络接入方法、终端设备、服务器及通信系统
WO2014047887A1 (zh) * 2012-09-28 2014-04-03 华为技术有限公司 无线局域网接入方法、基站控制器和用户设备
CN102946586A (zh) * 2012-11-08 2013-02-27 中兴通讯股份有限公司 基于位置信息的接入网络信息通知、接入方法及装置

Also Published As

Publication number Publication date
KR101834914B1 (ko) 2018-03-06
KR20160143815A (ko) 2016-12-14
US11777916B2 (en) 2023-10-03
JP6448662B2 (ja) 2019-01-09
EP2999270B1 (en) 2017-10-11
EP3306985A1 (en) 2018-04-11
EP3306985B1 (en) 2020-12-23
CN104350802B (zh) 2019-07-26
EP2999270A4 (en) 2016-09-07
BR112016024045B1 (pt) 2023-09-26
BR112016024045A2 (pt) 2018-05-15
AU2014391026A1 (en) 2016-11-10
AU2014391026B2 (en) 2018-01-25
US20160134613A1 (en) 2016-05-12
CA2945848C (en) 2019-03-05
US20200053068A1 (en) 2020-02-13
EP2999270A1 (en) 2016-03-23
CN104350802A (zh) 2015-02-11
US10425393B2 (en) 2019-09-24
CA2945848A1 (en) 2015-10-22
JP2017511664A (ja) 2017-04-20

Similar Documents

Publication Publication Date Title
WO2015157949A1 (zh) 无线局域网络wlan的接入方法、终端及服务器
AU2021277736B2 (en) Pdu type setting method, ue policy setting method, and related entity
EP3840444B1 (en) Method for accessing network by internet of things device, and system
EP3742785B1 (en) Session management method and device
KR101914408B1 (ko) 인터넷 액세스 인증 방법 및 클라이언트, 그리고 컴퓨터 저장 매체
US20160286380A1 (en) Management method for embedded universal integrated circuit card, related device, and system
CN110351828B (zh) 一种定位方法及装置
WO2019075848A1 (zh) 协同终端切片功能和网络切片功能
EP2757738A2 (en) Communication management system, relay device, communication control system, communication system, communication method, and carrier means storing comunication control program
CN109618392B (zh) 网络共享的方法、装置、设备及计算机可读存储介质
US8958792B2 (en) Method and system for selecting mobility management entity of terminal group
WO2018001089A1 (zh) 业务处理方法及装置、存储介质
WO2015184823A1 (zh) 移动终端的接入控制方法、装置及计算机存储介质
US8429257B2 (en) Optimizing use of internet protocol addresses
CN101720085B (zh) 智能卡应用方法、装置
CN105959292A (zh) 设备使用权限的识别方法、管理服务器及系统
WO2015135278A1 (zh) 一种鉴权认证方法和系统、ProSe功能实体以及UE
KR101681941B1 (ko) 이기종 네트워크 기반 데이터 동시 전송 서비스 방법
CN107211479B (zh) 选择接入网的方法和装置
CN105323848B (zh) 数据通道控制方法、装置及服务器
GB2594930A (en) Authentication of devices to third party services

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14889330

Country of ref document: EP

Kind code of ref document: A1

REEP Request for entry into the european phase

Ref document number: 2014889330

Country of ref document: EP

WWE Wipo information: entry into national phase

Ref document number: 2014889330

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2945848

Country of ref document: CA

Ref document number: 2016562893

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2014391026

Country of ref document: AU

Date of ref document: 20140416

Kind code of ref document: A

ENP Entry into the national phase

Ref document number: 20167031594

Country of ref document: KR

Kind code of ref document: A

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112016024045

Country of ref document: BR

ENP Entry into the national phase

Ref document number: 112016024045

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20161014