CN107087293B - Access method, terminal and server - Google Patents
Access method, terminal and server Download PDFInfo
- Publication number
- CN107087293B CN107087293B CN201710138954.2A CN201710138954A CN107087293B CN 107087293 B CN107087293 B CN 107087293B CN 201710138954 A CN201710138954 A CN 201710138954A CN 107087293 B CN107087293 B CN 107087293B
- Authority
- CN
- China
- Prior art keywords
- terminal
- server
- application
- identity information
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000006855 networking Effects 0.000 claims abstract description 62
- 238000012795 verification Methods 0.000 claims description 78
- 230000004044 response Effects 0.000 claims description 28
- 230000008569 process Effects 0.000 claims description 9
- 238000010586 diagram Methods 0.000 description 16
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 4
- 230000003993 interaction Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000009191 jumping Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000011022 operating instruction Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W76/00—Connection management
- H04W76/20—Manipulation of established connections
- H04W76/25—Maintenance of established connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses an access method, a terminal and a server, wherein the method comprises the following steps: receiving a first network connection request of a first terminal, wherein the first network connection request is used for requesting to access a current wireless network; judging whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request; when the first terminal is judged not to be matched with the preset networked terminal information base, acquiring first identity information of the first terminal, and verifying whether the first identity information is valid; and when the first identity information is valid, indicating the first terminal to start a first application corresponding to the current wireless network so as to access the current wireless network on the first application.
Description
Technical Field
The invention relates to the field of mobile internet, in particular to an access method, a terminal and a server.
Background
As mobile terminals such as smart phones and tablet computers are increasingly popularized in daily life, more and more users perform traffic consuming operations such as shopping, chatting, and watching videos on the mobile terminals using mobile data traffic or Wireless Fidelity (WiFi), and users can terminate the mobile terminals and watch the videos, so that the mobile internet becomes the latest traffic interface, and more users transmit information to other users by providing usable WiFi to other users.
In the prior art, many applications on a mobile terminal have introduced a WiFi connection scheme of "connecting WiFi quickly", a user forms an identifier that a two-dimensional code and the like can access WiFi of the user by setting on the application, other users can access WiFi of the user by scanning the two-dimensional code, and after accessing WiFi of the user, the user can send information to other users by using the application.
However, with the prior art, other users can receive the information sent by the user only when using the application accessing the WiFi of the user, and the way for the user to send the information is reduced.
Disclosure of Invention
In order to solve the foregoing technical problems, embodiments of the present invention are intended to provide an access method, a terminal, and a server, which can implement diversity of information sending modes for users.
The embodiment of the invention provides an access method, which is applied to a server and comprises the following steps:
receiving a first network connection request of a first terminal, wherein the first network connection request is used for requesting to access to a current wireless network;
judging whether the first terminal is matched with a preset networked terminal information base or not according to the first networking request;
when the first terminal is judged to be not matched with the preset networked terminal information base, acquiring first identity information of the first terminal, and verifying whether the first identity information is valid;
and when the first identity information is valid, indicating the first terminal to start a first application corresponding to the current wireless network so as to access the current wireless network on the first application.
In the above method, after the determining, according to the first connection request, whether the first terminal is matched with a preset networked terminal information base, the method further includes:
and when the first terminal is judged to be matched with the preset networking terminal information base, indicating the first terminal to start the first application so as to access the current wireless network on the first application.
In the above method, the obtaining first identity information of the first terminal and verifying whether the first identity information is valid includes:
sending an authentication request to the first terminal, wherein the authentication request is used for requesting the first terminal to send the first identity information;
receiving a first response message sent by the first terminal in response to the identity authentication request, wherein the first response message carries the first identity information;
and matching the first identity information with preset identity verification information to verify whether the first identity information is valid.
In the above method, the instructing the first terminal to open a first application corresponding to the current wireless network to access the current wireless network on the first application includes:
sending a first starting instruction to the first terminal, wherein the first starting instruction is used for indicating the first terminal to start the first application;
receiving a second networking request sent by the first terminal in response to the first starting instruction, wherein the second networking request is used for requesting to access the current wireless network on the first application;
and in the wireless access setting of the first application, accessing the first terminal to the current wireless network according to the second networking request.
In the above method, after the obtaining the first identity information of the first terminal and verifying whether the first identity information is valid, the method further includes:
when the first identity information is invalid, the verification process of the first identity information is carried out again, and a first verification quantity is recorded;
and when the first verification quantity is greater than the preset verification quantity, sending a verification failure notification message to the first terminal.
The embodiment of the invention provides an access method, which is applied to a first terminal and comprises the following steps:
sending a first network connection request to a server, wherein the first network connection request is used for requesting to access to a current wireless network;
receiving a first starting instruction sent by the server in response to the first connection request, wherein the first starting instruction is used for starting a first application corresponding to the current wireless network;
starting the first application according to the first starting instruction;
receiving a first operation of a user on the first application, and sending a second networking request to the server according to the first operation, wherein the second networking request is used for requesting the server to complete the access of the current wireless network on the first application.
In the above method, after the sending the first connection request to the server, and before the receiving a first application starting instruction sent by the server and responding to the first connection request, the method further includes:
receiving an authentication request sent by the server, wherein the authentication request is used for requesting to send first identity information to the server;
and receiving a second operation of the user according to the identity authentication request, and sending the first identity information to the server according to the second operation.
An embodiment of the present invention provides a server, where the server includes:
a first receiving unit, configured to receive a first connection request of a first terminal, where the first connection request is used to request access to a current wireless network;
the matching unit is used for judging whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request;
the verification unit is used for acquiring first identity information of the first terminal and verifying whether the first identity information is valid or not when the first terminal is judged not to be matched with the preset networking terminal information base;
and an indicating unit, configured to indicate the first terminal to start a first application corresponding to the current wireless network when the first identity information is valid, so as to access the current wireless network on the first application.
In the server, the instructing unit is further configured to instruct the first terminal to start the first application when it is determined that the first terminal matches the preset networked terminal information base, so as to access the current wireless network on the first application.
In the above server, the server includes: a first transmitting unit;
the first sending unit is configured to send an authentication request to the first terminal, where the authentication request is used to request the first terminal to send the first identity information;
the first receiving unit is further configured to receive a first response message sent by the first terminal in response to the identity authentication request, where the first response message carries the first identity information;
the matching unit is further configured to match the first identity information with preset identity verification information, and verify whether the first identity information is valid.
In the above server, the server further includes: an access unit;
the first sending unit is further configured to send a first start instruction to the first terminal, where the first start instruction is used to instruct the first terminal to start the first application;
the first receiving unit is further configured to receive a second networking request sent by the first terminal in response to the first start instruction, where the second networking request is used to request to access the current wireless network on the first application;
and the access unit is used for accessing the first terminal to the current wireless network according to the second networking request in the wireless access setting of the first application.
In the server, the verification unit is further configured to, when the first identity information is invalid, perform a verification process of the first identity information again, and record a first verification number;
the first sending unit is further configured to send a verification failure notification message to the first terminal when the first verification number is greater than a preset verification number.
An embodiment of the present invention provides a first terminal, where the first terminal includes:
the second sending unit is used for sending a first connection request to the server, wherein the first connection request is used for requesting to access the current wireless network;
a second receiving unit, configured to receive a first start instruction sent by the server in response to the first connection request, where the first start instruction is used to start a first application corresponding to the current wireless network;
the starting unit is used for starting the first application according to the first starting instruction;
and the second sending unit is further configured to receive a first operation of a user on the first application, and send a second networking request to the server according to the first operation, where the second networking request is used to request the server to complete access to the current wireless network on the first application.
In the first terminal, the second receiving unit is further configured to receive an authentication request sent by the server, where the authentication request is used to request to send first identity information to the server;
the second sending unit is further configured to receive a second operation of the user according to the authentication request, and send the first identity information to the server according to the second operation.
The embodiment of the invention provides an access method, a terminal and a server, wherein the method comprises the following steps: receiving a first network connection request of a first terminal, wherein the first network connection request is used for requesting to access a current wireless network; judging whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request; when the first terminal is judged not to be matched with the preset networked terminal information base, acquiring first identity information of the first terminal, and verifying whether the first identity information is valid; and when the first identity information is valid, indicating the first terminal to start a first application corresponding to the current wireless network so as to access the current wireless network on the first application. By adopting the scheme, after receiving a first connection request sent by a first terminal, the server firstly judges whether the preset connected terminal information base has the first terminal, when the first terminal does not exist, the server acquires and verifies the first identity information corresponding to the first terminal, and when the first identity information is verified to be valid, the server indicates the first terminal to access the current wireless network on the first application, so that the server can acquire the first identity information of all the first terminals accessing the current wireless network on the first application, and the diversity of information sent by users is realized.
Drawings
Fig. 1 is a schematic structural diagram of an exemplary interaction between a server and a terminal according to an embodiment of the present invention;
fig. 2 is a first flowchart of an access method according to an embodiment of the present invention;
fig. 3 is a second flowchart of an access method according to an embodiment of the present invention;
fig. 4 is an interaction diagram of an access method according to an embodiment of the present invention;
fig. 5 is a flowchart of an exemplary access method according to an embodiment of the present invention;
fig. 6 is a first schematic structural diagram of a server 1 according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a server 1 according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a server 1 according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a server 1 according to an embodiment of the present invention;
fig. 10 is a first schematic structural diagram of a first terminal 2 according to an embodiment of the present invention;
fig. 11 is a second schematic structural diagram of a first terminal 2 according to an embodiment of the present invention.
Detailed Description
The technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
In the embodiment of the invention, a server side is accessed with a control gateway, the server interacts with a mobile terminal through the control gateway, and finally the operation of accessing the mobile terminal to WiFi is realized, as shown in figure 1, a cloud platform at the server side is accessed with the control gateway, the control gateway can be deployed at a user, wherein the cloud platform provides an access method of the control gateway and checks the legality of the control gateway, after the control gateway is smoothly accessed to the cloud platform, the cloud platform and the control gateway can carry out communication and synchronous configuration through an http protocol, the control gateway communicates with the mobile terminal through a switch and a router, specifically, when the mobile terminal sends an http get request to the server, the control gateway obtains the request and judges whether the mobile terminal needs authentication, when the mobile terminal needs authentication, the control platform redirects the request to the cloud platform, and pushing the authentication page by the cloud platform and carrying out authentication and verification.
Example one
An embodiment of the present invention provides an access method, which is applied to a server, and as shown in fig. 2, the method may include:
s101, receiving a first network connection request of a first terminal, wherein the first network connection request is used for requesting to access to a current wireless network.
The access method provided by the embodiment of the invention is suitable for a scene that the terminal accesses the WiFi in the terminal application.
In the embodiment of the invention, when the user of the first terminal needs to access the current wireless network, the user of the first terminal sends the first network connection request to the server by clicking or touching the appointed page of the first terminal so as to request to access the current wireless network.
Further, before the first terminal sends the first connection request to the server, the second terminal corresponding to the current wireless network registers the current wireless network at the first application, and an interface for accessing the current wireless network is generated in the first application.
S102, judging whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request.
After the server receives a first connection request sent by the first terminal, the server needs to determine whether the first terminal is a terminal that first accesses the current wireless network through the first application according to the first connection request.
In the embodiment of the invention, a server is provided with a preset connected terminal information base, when the server receives a first connection request sent by a first terminal, the server acquires the terminal information of the first terminal from the first connection request, matches the terminal information of the first terminal with the preset connected terminal information base, and when the matching is successful, the first terminal is characterized as a terminal which is not accessed into the current wireless network through a first application for the first time; and when the matching fails, the first terminal is characterized as a terminal which is accessed to the current wireless network through the first application for the first time.
In the embodiment of the invention, all terminal information accessed to the current wireless network through the first application is stored in the preset connected terminal information base.
S103, when the first terminal is judged not to be matched with the preset networking terminal information base, the first identity information of the first terminal is obtained, and whether the first identity information is valid or not is verified.
When the server judges that the first terminal is not matched with the preset networking terminal information base, the server represents that the first terminal accesses the terminal of the current wireless network through the first application for the first time, and at the moment, the server indicates the first terminal to send the first identity information and verifies the validity of the first identity information.
In the embodiment of the invention, when a server judges that a first terminal is not matched with a preset networked terminal information base, the server sends an identity authentication request to the first terminal to request the first terminal to send first identity information corresponding to the first terminal, the first terminal sends the first identity information to the server according to the identity authentication request, after the server receives the first identity information of the first terminal, the first identity information is matched with the preset identity authentication information to verify whether the first identity information is valid, and when the first identity information is matched with the preset identity authentication information, the first identity information is represented to be valid; and when the first identity information is not matched with the preset identity authentication information, the first identity information is represented to be invalid.
In the embodiment of the present invention, the first identity information includes identity information of the first terminal and authentication information corresponding to the identity information, and specifically, the server matches the authentication information corresponding to the identity information of the first terminal with preset identity authentication information to determine whether the first identity information is valid.
In the embodiment of the invention, the server sends the preset identity authentication information to the first terminal and receives the authentication information sent by the first terminal, and the server matches the authentication information sent by the first terminal with the preset identity authentication information to judge whether the first identity information is valid.
Further, when the server judges that the first identity information is valid, the server stores the first identity information into a preset networked terminal information base.
Further, when the server judges that the first terminal is matched with the preset networking terminal information base, the server instructs the first terminal to start the first application so as to access the current wireless network on the first application.
And S104, when the first identity information is valid, indicating the first terminal to open a first application corresponding to the current wireless network so as to access the current wireless network on the first application.
And when the server judges that the first identity information is valid, the server instructs the first terminal to open a first application corresponding to the current wireless network so that the first terminal accesses the current wireless network in the wireless access setting of the first application.
In the embodiment of the invention, when the server judges that the first identity information of the first terminal is valid, the server sends a first starting instruction to the first terminal to instruct the first terminal to start the first application, the first terminal starts the first application according to the received first starting instruction, then the first terminal receives the first operation of a user on the first application, the first terminal sends a second networking request to the server according to the first operation to request the server to complete the access of the current wireless network on the first application, and the server accesses the first terminal into the current wireless network in the wireless access setting of the first application according to the received second networking request.
In the embodiment of the invention, after the first terminal starts the first application according to the first starting instruction sent by the server, the first terminal jumps to the first application interface, and a user clicks or touches the first application interface to request to access the current wireless network.
Further, when the server judges that the first identity information is invalid, the server performs a verification process of the first identity information again and records a first verification quantity, and when the server judges that the first verification quantity is larger than a preset verification quantity, the server sends a verification failure notification message to the first terminal.
It can be understood that, after receiving a first connection request sent by a first terminal, a server first determines whether a first terminal exists in a preset connected terminal information base, and when the first terminal does not exist, acquires and verifies first identity information corresponding to the first terminal, and when the first identity information is verified to be valid, instructs the first terminal to access a current wireless network on a first application, so that the server can acquire all first identity information of the first terminal accessing the current wireless network on the first application, thereby realizing diversity of information sent by a user.
Example two
An embodiment of the present invention provides an access method, which is applied to a first terminal, and as shown in fig. 3, the method may include:
s201, sending a first network connection request to a server, wherein the first network connection request is used for requesting to access a current wireless network.
The access method provided by the embodiment of the invention is suitable for a scene that the terminal accesses the WiFi in the terminal application.
In the embodiment of the invention, when the first terminal needs to access the current wireless network, a user of the first terminal sends a first network connection request to the server by clicking or touching the appointed page of the first terminal so as to request to access the current wireless network.
In the embodiment of the invention, the first connection request is generated by clicking or touching an instruction page of the first terminal by a user of the first terminal.
Further, before the first terminal sends the first connection request to the server, the second terminal corresponding to the current wireless network registers the current wireless network at the first application, and an interface for accessing the current wireless network is generated in the first application.
S202, receiving a first starting instruction sent by the server in response to the first connection request, wherein the first starting instruction is used for starting a first application corresponding to the current wireless network.
In the embodiment of the invention, after the first terminal sends the first connection request to the server, the first terminal is about to receive the first starting instruction sent by the server in response to the first connection request.
In the embodiment of the invention, the first terminal receives a first starting instruction which is sent by a server and used for starting a first application corresponding to the current wireless network.
In the embodiment of the invention, the first terminal opens the current wireless network through the first application, so the server sends the first starting instruction to the first terminal to indicate the first terminal to open the first application.
And S203, starting the first application according to the first starting instruction.
After the first terminal receives the first starting instruction, the first terminal starts the first application according to the first starting instruction.
In the embodiment of the invention, after the first terminal receives the first starting instruction sent by the server, the first terminal jumps to the page of the first application accessing the current wireless network according to the first starting instruction.
S204, receiving a first operation of a user on the first application, and sending a second networking request to the server according to the first operation, wherein the second networking request is used for requesting the server to complete the access of the current wireless network on the first application.
After the first terminal launches the first application, the first terminal may be ready to complete the current wireless network access on the first application.
In the embodiment of the invention, when the first terminal jumps to the first application to access the current wireless network page, the user touches or clicks and other operations according to the prompt on the first application page, and the first terminal sends the request for the server to complete the access of the current wireless network on the first application according to the first operation.
It can be understood that, after the first terminal sends the first connection request to the server, the first terminal starts the first application according to the received first start instruction sent by the server, and sends a request to the server on the first application to complete the access of the current wireless network on the first application, so as to complete the operation of accessing the current wireless network on the first application, and the validity of accessing the current wireless network by the first terminal can be improved.
EXAMPLE III
An embodiment of the present invention provides an access method, as shown in fig. 4, the method may include:
s301, the first terminal sends a first network connection request to the server, and the first network connection request is used for requesting to access the current wireless network.
Here, the description of S301 in the embodiment of the present invention is identical to that of S201 in the first embodiment, and is not repeated here.
S302, the server judges whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request.
Here, the description of S302 in the embodiment of the present invention is identical to the description of S102 in the first embodiment, and is not repeated here.
And S303, when the server judges that the first terminal is not matched with the preset networking terminal information base, the server sends an identity authentication request to the first terminal, wherein the identity authentication request is used for requesting the first terminal to send the first identity information.
When the server judges that the first terminal is not matched with the preset networked terminal information base, the server needs to send an identity authentication request to the first terminal so as to request the first terminal to send the first identity information.
In the embodiment of the invention, when the server judges that the first terminal is not matched with the preset networking terminal information base, the server represents that the first terminal is a terminal which is accessed to the current wireless network through the first application for the first time, and at the moment, the server sends an identity verification request to the first terminal to request the first terminal to send the first identity information corresponding to the first terminal.
In the embodiment of the invention, the first identity information comprises identity information of the first terminal and verification information corresponding to the identity information of the first terminal.
S304, the first terminal receives the second operation of the user according to the identity authentication request and sends the first identity information to the server according to the second operation.
After the first terminal receives the identity authentication request sent by the server, the first terminal receives second operation of the user on the first terminal, generates first identity information according to the second operation, and sends the first identity information to the server.
In the embodiment of the invention, after the first terminal receives the identity verification request sent by the server, the first terminal displays the identity authentication page prompting the user to input the first identity information, the user inputs the first identity information on the identity authentication page of the first terminal, and the first terminal sends the first identity information to the server after receiving the first identity information.
S305, the server matches the first identity information with preset identity verification information to verify whether the first identity information is valid.
After the server receives the first identity information sent by the first terminal, the server matches the first identity information with preset identity verification information so as to verify that the first identity information is valid.
In the embodiment of the invention, the first identity information comprises the identity information and the verification information of the first terminal, the server matches the verification information with the preset identity verification information, and when the verification information is successfully matched with the preset identity verification information, the first identity information is represented to be effective; and when the verification information fails to be matched with the preset identity verification information, the first identity information is represented to be invalid.
In the embodiment of the invention, the server sends the preset identity authentication information to the first terminal and receives the authentication information sent by the first terminal, and the server matches the authentication information sent by the first terminal with the preset identity authentication information to judge whether the first identity information is valid.
Further, when the server judges that the first identity information is valid, the server stores the first identity information into a preset networked terminal information base.
S306, when the first identity information is valid or when the server judges that the first terminal is matched with the preset networking terminal information base, the server sends a first starting instruction to the first terminal, wherein the first starting instruction is used for indicating the first terminal to start the first application.
And when the server judges that the first identity information is valid or the first terminal is matched with the preset networking terminal information base, the server indicates the first terminal to start a first application corresponding to the current wireless network so that the first terminal is accessed to the current wireless network in the wireless access setting of the first application.
In the embodiment of the invention, the server sends the first starting instruction to the first terminal so as to instruct the first terminal to start the first application, and the current wireless network is accessed through the first application subsequently.
And S307, the first terminal starts the first application according to the first starting instruction.
Here, the description of S307 in the embodiment of the present invention is identical to the description of S203 in the first embodiment, and is not repeated here.
S308, the first terminal receives a first operation of the user on the first application, the first terminal sends a second networking request to the server according to the first operation, and the second networking request is used for requesting the server to complete the access of the current wireless network on the first application.
Here, the description of S308 in the embodiment of the present invention is identical to the description of S204 in the first embodiment, and is not repeated here.
S309, the server accesses the first terminal to the current wireless network according to the second networking request in the wireless access setting of the first application.
When the server receives a second networking request sent by the server, the server accesses the first terminal to the current wireless network in the wireless access setting of the first application.
In the embodiment of the invention, the first application has wireless access setting on the server side, and when the first terminal sends the second networking request to the server on the first application, the server accesses the first terminal into the current wireless network in the wireless access setting of the first application.
And S310, when the first identity information is invalid, the server carries out the verification process of the first identity information again and records the first verification quantity.
And when the server judges that the first identity information is invalid, the server re-verifies the first identity information of the first terminal and records the first verification quantity.
In the embodiment of the invention, when the server judges that the first identity information is invalid, the server sends the re-verification instruction to the first terminal, and the first terminal sends the first identity information to the server according to the re-verification instruction so that the server can re-verify the first identity information of the first terminal.
In the embodiment of the invention, the server records the first verification quantity of the server for verifying the first identity information.
S311, when the first verification number is larger than the preset verification number, sending a verification failure notification message to the first terminal.
The server compares the first verification quantity with a preset verification quantity, when the first verification quantity is larger than the preset verification quantity, the times of verifying the first identity information by the representation server exceed the preset times, and at the moment, the server sends a verification failure notification message to the first terminal.
In the embodiment of the invention, the server has the preset verification number, and when the first verification number recorded by the server is greater than the preset verification number, the server sends a verification failure notification message to the first terminal.
S306-S309 and S310-S311 are two parallel steps after step S305, which are specifically selected according to actual situations, and the embodiment of the present invention is not limited specifically.
Exemplarily, a process of connecting the wireless terminal to the WiFi through the application program is specifically as shown in fig. 5:
1. the wireless terminal user initiates a network access request on a network access request page of the wireless terminal.
2. A control gateway of an access cloud platform acquires an internet access request of a wireless terminal, wherein the internet access request carries parameters such as a physical address and a network address of the wireless terminal.
3. And the control network redirects parameters such as the physical address, the network address and the like of the wireless terminal to the cloud platform.
4. And the cloud platform inquires the received parameters such as the physical address, the network address and the like of the wireless terminal from the user information base.
5. And when the cloud platform does not inquire parameters such as a physical address, a network address and the like of the wireless terminal in the user information base, the cloud platform sends an identity authentication information request to the wireless terminal.
6. And the user inputs the mobile phone number on the identity verification page of the wireless terminal, acquires the verification code and clicks to submit the verification code.
7. And the cloud platform verifies the verification code.
8. When the verification fails, the wireless terminal prompts that the verification code is wrong and requests to acquire the verification code again.
9. And when the verification is successful, the cloud platform stores the identity information of the user to the user information base.
10. The cloud platform initiates a starting request to the wireless terminal, requests the wireless terminal to start an application program, and connects WiFi through the application program.
11. And clicking the WiFi connection identifier on the application program by the user, and sending a networking request by the wireless terminal according to the internal flow of the application program.
12. And after the control gateway acquires the networking request, the WiFi connection operation of the wireless terminal is completed.
13. And when the cloud platform inquires parameters such as a physical address, a network address and the like of the wireless terminal in the user information base, jumping to the step 10.
It can be understood that, after receiving a first connection request sent by a first terminal, a server first determines whether a first terminal exists in a preset connected terminal information base, and when the first terminal does not exist, acquires and verifies first identity information corresponding to the first terminal, and when the first identity information is verified to be valid, instructs the first terminal to access a current wireless network on a first application, so that the server can acquire all first identity information of the first terminal accessing the current wireless network on the first application, thereby realizing diversity of information sent by a user.
Example four
An embodiment of the present invention provides a server 1, as shown in fig. 6, where the server 1 includes:
a first receiving unit 10, configured to receive a first connection request of a first terminal, where the first connection request is used to request to access a current wireless network.
And the matching unit 11 is configured to determine whether the first terminal is matched with a preset networked terminal information base according to the first networking request.
A verification unit 12, configured to, when it is determined that the first terminal does not match the preset networked terminal information base, obtain first identity information of the first terminal, and verify whether the first identity information is valid.
An indicating unit 13, configured to instruct the first terminal to start a first application corresponding to the current wireless network when the first identity information is valid, so as to access the current wireless network on the first application.
Optionally, the indicating unit 13 is further configured to, when it is determined that the first terminal matches the preset networked terminal information base, indicate the first terminal to start the first application, so as to access the current wireless network on the first application.
Optionally, based on fig. 6, as shown in fig. 7, the server 1 includes: a first transmission unit 14.
The first sending unit 14 is configured to send an authentication request to the first terminal, where the authentication request is used to request the first terminal to send the first identity information.
The first receiving unit 10 is further configured to receive a first response message sent by the first terminal in response to the identity authentication request, where the first response message carries the first identity information.
The matching unit 11 is further configured to match the first identity information with preset identity verification information, and verify whether the first identity information is valid.
Optionally, based on fig. 7, as shown in fig. 8, the server 1 further includes: an access unit 15.
The first sending unit 14 is further configured to send a first start instruction to the first terminal, where the first start instruction is used to instruct the first terminal to start the first application.
The first receiving unit 10 is further configured to receive a second networking request sent by the first terminal in response to the first start instruction, where the second networking request is used to request to access the current wireless network on the first application.
The access unit 15 is configured to access the first terminal to the current wireless network according to the second networking request in the wireless access setting of the first application.
Optionally, the verification unit 12 is further configured to, when the first identity information is invalid, perform a verification process of the first identity information again, and record a first verification quantity.
The first sending unit 14 is further configured to send an authentication failure notification message to the first terminal when the first authentication number is greater than a preset authentication number.
In practical applications, as shown in fig. 9, the matching unit 11, the verification unit 12, the indication unit 13 and the access unit 15 may all be implemented by a processor 16 located on the server 1, can be realized by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP) or a Field Programmable Gate Array (FPGA) and the like, the first transmitting unit 14 may be implemented by a transmitter 17 located on the server 1, the first receiving unit 10 may be implemented by a receiver 18, the server may also comprise a memory 19 implementation, the memory 19, the transmitter 17, the receiver 18 may be connected to the processor 16, wherein the memory 19 is used for storing executable program code comprising computer operating instructions, the memory 19 may comprise a high speed RAM memory, and may further comprise a non-volatile memory, such as at least one disk memory.
EXAMPLE five
An embodiment of the present invention provides a first terminal 2, and as shown in fig. 10, the first terminal 2 includes:
a second sending unit 20, configured to send a first connection request to the server, where the first connection request is used to request to access the current wireless network.
A second receiving unit 21, configured to receive a first start instruction sent by the server in response to the first connection request, where the first start instruction is used to start a first application corresponding to the current wireless network.
The starting unit 22 is configured to start the first application according to the first starting instruction.
The second sending unit 20 is further configured to receive a first operation of the user on the first application, and send a second networking request to the server according to the first operation, where the second networking request is used to request the server to complete access to the current wireless network on the first application.
Optionally, the second receiving unit 21 is further configured to receive an authentication request sent by the server, where the authentication request is used to request to send the first identity information to the server.
The second sending unit 20 is further configured to receive a second operation of the user according to the authentication request, and send the first identity information to the server according to the second operation.
As shown in fig. 11, in practical applications, the starting unit 22 may be implemented by a processor 23 located on the first terminal 2, and may be implemented by a Central Processing Unit (CPU), a Microprocessor (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like, the second sending unit 20 may be implemented by a transmitter 24 located on the first terminal 2, the second receiving unit 21 may be implemented by a receiver 25, the first terminal 2 may further include a memory 26, and the memory 26, the transmitter 24, and the receiver 25 may be connected to the processor 23, wherein the memory 26 is used for storing executable program codes, the program codes include computer operation instructions, and the memory 26 may include a high-speed RAM memory and may further include a nonvolatile memory, such as at least one disk memory.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.
Claims (12)
1. An access method applied to a server, the method comprising:
receiving a first network connection request of a first terminal, wherein the first network connection request is used for requesting to access to a current wireless network;
judging whether the first terminal is matched with a preset networked terminal information base or not according to the first networking request;
when the first terminal is judged to be not matched with the preset networked terminal information base, acquiring first identity information of the first terminal, and verifying whether the first identity information is valid;
when the first identity information is valid, indicating the first terminal to start a first application corresponding to the current wireless network so as to access the current wireless network on the first application;
when the first terminal is judged to be matched with the preset networking terminal information base, indicating the first terminal to start the first application so as to access the current wireless network on the first application;
wherein the current wireless network is registered by the second terminal at the first application.
2. The method of claim 1, wherein the obtaining first identity information of the first terminal and verifying whether the first identity information is valid comprises:
sending an authentication request to the first terminal, wherein the authentication request is used for requesting the first terminal to send the first identity information;
receiving a first response message sent by the first terminal in response to the identity authentication request, wherein the first response message carries the first identity information;
and matching the first identity information with preset identity verification information to verify whether the first identity information is valid.
3. The method of claim 1, wherein the instructing the first terminal to open a first application corresponding to the current wireless network to access the current wireless network on the first application comprises:
sending a first starting instruction to the first terminal, wherein the first starting instruction is used for indicating the first terminal to start the first application;
receiving a second networking request sent by the first terminal in response to the first starting instruction, wherein the second networking request is used for requesting to access the current wireless network on the first application;
and in the wireless access setting of the first application, accessing the first terminal to the current wireless network according to the second networking request.
4. The method of claim 1, wherein after obtaining the first identity information of the first terminal and verifying whether the first identity information is valid, the method further comprises:
when the first identity information is invalid, the verification process of the first identity information is carried out again, and a first verification quantity is recorded;
and when the first verification quantity is greater than the preset verification quantity, sending a verification failure notification message to the first terminal.
5. An access method applied to a first terminal, the method comprising:
sending a first network connection request to a server, wherein the first network connection request is used for requesting to access to a current wireless network;
receiving a first starting instruction sent by the server in response to the first connection request, wherein the first starting instruction is used for starting a first application corresponding to the current wireless network;
starting the first application according to the first starting instruction;
receiving a first operation of a user on the first application, and sending a second networking request to the server according to the first operation, wherein the second networking request is used for requesting the server to complete the access of the current wireless network on the first application; wherein the current wireless network is registered by the second terminal at the first application.
6. The method of claim 5, wherein after sending the first connection request to the server, before receiving a first application launching instruction sent by the server in response to the first connection request, the method further comprises:
receiving an authentication request sent by the server, wherein the authentication request is used for requesting to send first identity information to the server;
and receiving a second operation of the user according to the identity authentication request, and sending the first identity information to the server according to the second operation.
7. A server, characterized in that the server comprises:
a first receiving unit, configured to receive a first connection request of a first terminal, where the first connection request is used to request access to a current wireless network;
the matching unit is used for judging whether the first terminal is matched with a preset networking terminal information base or not according to the first networking request;
the verification unit is used for acquiring first identity information of the first terminal and verifying whether the first identity information is valid or not when the first terminal is judged not to be matched with the preset networking terminal information base;
an indicating unit, configured to indicate the first terminal to start a first application corresponding to the current wireless network when the first identity information is valid, so as to access the current wireless network on the first application;
the indicating unit is further configured to indicate the first terminal to start the first application when it is determined that the first terminal matches the preset networked terminal information base, so as to access the current wireless network on the first application;
wherein the current wireless network is registered by the second terminal at the first application.
8. The server according to claim 7, wherein the server comprises: a first transmitting unit;
the first sending unit is configured to send an authentication request to the first terminal, where the authentication request is used to request the first terminal to send the first identity information;
the first receiving unit is further configured to receive a first response message sent by the first terminal in response to the identity authentication request, where the first response message carries the first identity information;
the matching unit is further configured to match the first identity information with preset identity verification information, and verify whether the first identity information is valid.
9. The server of claim 8, further comprising: an access unit;
the first sending unit is further configured to send a first start instruction to the first terminal, where the first start instruction is used to instruct the first terminal to start the first application;
the first receiving unit is further configured to receive a second networking request sent by the first terminal in response to the first start instruction, where the second networking request is used to request to access the current wireless network on the first application;
and the access unit is used for accessing the first terminal to the current wireless network according to the second networking request in the wireless access setting of the first application.
10. The server according to claim 8,
the verification unit is further configured to perform a verification process of the first identity information again when the first identity information is invalid, and record a first verification quantity;
the first sending unit is further configured to send a verification failure notification message to the first terminal when the first verification number is greater than a preset verification number.
11. A first terminal, characterized in that the first terminal comprises:
the second sending unit is used for sending a first connection request to the server, wherein the first connection request is used for requesting to access the current wireless network;
a second receiving unit, configured to receive a first start instruction sent by the server in response to the first connection request, where the first start instruction is used to start a first application corresponding to the current wireless network;
the starting unit is used for starting the first application according to the first starting instruction;
a second sending unit, further configured to receive a first operation of a user on the first application, and send a second networking request to the server according to the first operation, where the second networking request is used to request the server to complete access to the current wireless network on the first application;
wherein the current wireless network is registered by the second terminal at the first application.
12. The first terminal of claim 11,
the second receiving unit is further configured to receive an authentication request sent by the server, where the authentication request is used to request to send first identity information to the server;
the second sending unit is further configured to receive a second operation of the user according to the authentication request, and send the first identity information to the server according to the second operation.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710138954.2A CN107087293B (en) | 2017-03-09 | 2017-03-09 | Access method, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710138954.2A CN107087293B (en) | 2017-03-09 | 2017-03-09 | Access method, terminal and server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107087293A CN107087293A (en) | 2017-08-22 |
CN107087293B true CN107087293B (en) | 2020-06-30 |
Family
ID=59614507
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710138954.2A Active CN107087293B (en) | 2017-03-09 | 2017-03-09 | Access method, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107087293B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109510648B (en) * | 2019-01-25 | 2020-02-21 | 随锐科技集团股份有限公司 | Near field information transfer method |
CN109922160B (en) * | 2019-03-28 | 2021-07-06 | 全球能源互联网研究院有限公司 | A terminal security access method, device and system based on power Internet of things |
CN110533365A (en) * | 2019-08-05 | 2019-12-03 | 三只松鼠股份有限公司 | A kind of production managing and control system and method based on industrial Internet of Things |
CN112019504B (en) * | 2020-07-22 | 2022-08-26 | 大箴(杭州)科技有限公司 | Method and device for acquiring wifi dynamic verification code |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036340A (en) * | 2009-09-25 | 2011-04-27 | Lg电子株式会社 | Mobile terminal and method of managing and performing data communication using the same |
CN103533028A (en) * | 2013-09-26 | 2014-01-22 | 深圳市金立通信设备有限公司 | Method and terminal for monitoring state information |
CN103812653A (en) * | 2012-11-15 | 2014-05-21 | 中国电信股份有限公司 | Method and system for automatically acquiring account information accessed into wireless network |
CN104991919A (en) * | 2015-06-25 | 2015-10-21 | 青岛海信电器股份有限公司 | Information pushing method and apparatus for intelligent mobile terminal |
CN105873055A (en) * | 2016-04-18 | 2016-08-17 | 北京网康科技有限公司 | Wireless network access authentication method and device |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105450643B (en) * | 2015-11-17 | 2019-07-02 | 深信服科技股份有限公司 | The authentication method of network insertion, apparatus and system |
-
2017
- 2017-03-09 CN CN201710138954.2A patent/CN107087293B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102036340A (en) * | 2009-09-25 | 2011-04-27 | Lg电子株式会社 | Mobile terminal and method of managing and performing data communication using the same |
CN103812653A (en) * | 2012-11-15 | 2014-05-21 | 中国电信股份有限公司 | Method and system for automatically acquiring account information accessed into wireless network |
CN103533028A (en) * | 2013-09-26 | 2014-01-22 | 深圳市金立通信设备有限公司 | Method and terminal for monitoring state information |
CN104991919A (en) * | 2015-06-25 | 2015-10-21 | 青岛海信电器股份有限公司 | Information pushing method and apparatus for intelligent mobile terminal |
CN105873055A (en) * | 2016-04-18 | 2016-08-17 | 北京网康科技有限公司 | Wireless network access authentication method and device |
Also Published As
Publication number | Publication date |
---|---|
CN107087293A (en) | 2017-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI743405B (en) | Voice broadcast method, intelligent broadcast device, one or more non-temporary computer storage media encoded with computer program instructions, and intelligent broadcast equipment | |
JP6413015B2 (en) | Method, apparatus and system for accessing a wireless network | |
EP3726868B1 (en) | Profile download method and system, and related device | |
EP2405622B1 (en) | Device communication | |
WO2017107542A1 (en) | Video program obtaining method, device and system | |
JP6717528B2 (en) | Method, apparatus and system for providing remote terminal assistance to electronic devices using a relay server | |
CN107087293B (en) | Access method, terminal and server | |
CN105450643A (en) | Network access authentication method, apparatus and system | |
CN109474595B (en) | Electronic equipment binding method, electronic equipment, mobile terminal and server | |
CN105898181A (en) | Video conversation system and method and related equipment | |
CN110505188B (en) | Terminal authentication method, related equipment and authentication system | |
CN106656923A (en) | Device association method, key update method and apparatuses | |
CN105657781B (en) | WiFi network access method and device | |
WO2015077993A1 (en) | Installation package authorization method and device | |
CN104144163A (en) | Identity verification method, device and system | |
CN104683461A (en) | A method, device and device for configuring equipment into a network | |
CN104601589A (en) | Method of accessing broadcast television system, terminal and network side server | |
CN109996229B (en) | Data transmission method and device based on DHT network, electronic equipment and storage medium | |
CN105516054B (en) | A kind of method and device of subscriber authentication | |
CN107113281A (en) | Content shared method, terminal, server and system | |
CN109660988B (en) | Communication authentication processing method and device and electronic equipment | |
CN102594908B (en) | Method, equipment and system for transmitting network contents | |
CN112637221B (en) | Equipment control method and device | |
CN113242462B (en) | Screen projection method and device for realizing convergence terminal | |
CN107318100B (en) | Method, device and system for binding mobile phone number |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |