Network access method, apparatus, and system

ABSTRACT

The present disclosure discloses a network access method performed at a computer server in connection with a social networking platform, comprising: receiving a network access request from a first social networking account at a first terminal to a second social networking account at a second terminal, the network access request for accessing a wireless network bound to the second social networking account, the first and second social networking account both being associated with the social networking platform; forwarding the network access request to the second social networking account, the network access request including the first social networking account and an identifier of the wireless network; receiving a feedback instruction sent by the second social networking account; and sending authorization information of the wireless network to the first social networking account when the feedback instruction is an access authorization instruction, the authorization information including verification information used for accessing the wireless network.

RELATED APPLICATIONS

This application is a continuation-in-part application ofPCT/CN2016/095566, entitled “NETWORK ACCESS METHOD, APPARATUS, ANDSYSTEM” filed on Aug. 16, 2016, which claims priority to Chinese PatentApplication No. 201510642604.0, filed with the State IntellectualProperty Office of the People's Republic of China on Sep. 30, 2015, andentitled “NETWORK ACCESS METHOD, APPARATUS, AND SYSTEM”, both of whichare incorporated herein by reference in their entirety.

FIELD OF THE TECHNOLOGY

Embodiments of the present disclosure relate to the technical field ofcommunications, and in particular, to a network access method,apparatus, and system.

BACKGROUND OF THE DISCLOSURE

With wide use of mobile terminals, wireless networks have become asignificant form for accessing the internet for the mobile terminals.The wireless network may be a wireless fidelity (WiFi) network.

In the existing technology, when accessing a wireless network, a mobileterminal needs to first acquire a Service Set Identifier (SSID) and aconnection password of the wireless network and then send an accessrequest to a wireless access point by using the SSID and the connectionpassword. The wireless access point verifies the SSID and the connectionpassword in the access request. After successfully verifying the SSIDand the connection password, the wireless access point allows the mobileterminal to access the wireless network. The connection password isverification information when accessing the wireless network.

During the implementation of the present disclosure, the inventor hasfound existence of at least the following problem:

As a mobile terminal can successfully access a wireless network onlyafter acquiring a connection password of the network and most wirelessnetworks are encrypted wireless networks that are set privately, most ofwireless networks that can be searched by the mobile terminal cannot beaccessed given that connection passwords of the encrypted wirelessnetworks are unknown.

SUMMARY

To resolve the problem of the existing technology, embodiments of thepresent disclosure provide a network access method, apparatus, andsystem. The technical solutions are as follows:

A first aspect of the embodiments of the present disclosure provides anetwork access method performed at a computer server in connection witha social networking platform, the method comprising: receiving a networkaccess request that is sent by a first social networking account at afirst terminal to a second social networking account at a secondterminal, the network access request being used for requesting to accessa wireless network bound to the second social networking account,wherein the first social networking account and the second socialnetworking account are associated with the social networking platform;forwarding the network access request to the second social networkingaccount, the network access request including the first socialnetworking account and an identifier of the wireless network; receivinga feedback instruction sent by the second social networking account; andsending authorization information of the wireless network to the firstsocial networking account in accordance with a determination that thefeedback instruction is an access authorization instruction, theauthorization information including verification information used foraccessing the wireless network.

A second aspect of the embodiments of the present disclosure provides acomputer server in connection with a social networking platform, thecomputer server having one or more processors, memory and one or moreprograms stored in the memory that, when executed by the one or moreprocessors, cause the computer server to perform the aforementionednetwork access method.

A third aspect of the embodiments of the present disclosure provides anon-transitory computer readable storage medium storing one or moreprograms that, when executed by one or more processors of a computerserver in connection with a social networking platform, cause thecomputer server to perform the aforementioned network access method.

Technical effects brought about by the technical solutions of theembodiments of the present disclosure are:

The server receives a network access request that is sent by the firstsocial networking account to the second social networking account, afirst social networking account logging in the first terminal, a secondsocial networking account logging in the second terminal, and thenetwork access request being used for requesting to access a wirelessnetwork bound to the second social networking account, forwards thenetwork access request to the second terminal, receives a feedbackinstruction sent by the second terminal, and sends authorizationinformation of the wireless network to the first terminal when thefeedback instruction is an access authorization instruction, so that thefirst terminal accesses the wireless network according to theauthorization information. The problem that most wireless networks areencrypted wireless networks that are set privately and most of wirelessnetworks that can be searched by a mobile terminal cannot be accessed isresolved, thereby achieving the effect that a wireless network is boundto a second social networking account of an owner, and a requestersends, by means of a first social networking account, a network accessrequest to the second social networking account of the owner that is oris not an acquaintance of the requester by using a social attribute ofthe social networking accounts, and accesses the wireless network whenthe owner authorizes the requester, so that the mobile terminal canaccess an encrypted wireless network that is set privately.

BRIEF DESCRIPTION OF THE DRAWINGS

To describe the technical solutions of the embodiments of the presentdisclosure more clearly, the following briefly introduces theaccompanying drawings required for describing the embodiments.Apparently, the accompanying drawings in the following description showonly some embodiments of the present disclosure, and a person ofordinary skill in the art may still derive other drawings from theseaccompanying drawings without creative efforts.

FIG. 1 is a schematic structural diagram of an implementationenvironment according to some embodiments of the present disclosure;

FIG. 2 is a method flowchart of a network access method according tosome embodiments of the present disclosure;

FIG. 3A is a method flowchart of a network access method according toanother embodiment of the present disclosure;

FIG. 3B is a schematic interface diagram of binding a social networkingaccount and an identifier of a wireless network according to someembodiments of the present disclosure;

FIG. 3C is a schematic interface diagram of receiving a network accessrequest by a social networking account according to some embodiments ofthe present disclosure;

FIG. 4A is a flowchart of a method for sending information betweensocial networking accounts according to some embodiments of the presentdisclosure;

FIG. 4B is a flowchart of a method for data statistics and resourceacquisition according to some embodiments of the present disclosure;

FIG. 5 is a method flowchart of a network access method according toanother embodiment of the present disclosure;

FIG. 6 is a structural block diagram of a network access apparatusaccording to some embodiments of the present disclosure;

FIG. 7 is a structural block diagram of a network access apparatusaccording to another embodiment of the present disclosure;

FIG. 8 is a structural block diagram of a network access apparatusaccording to some embodiments of the present disclosure;

FIG. 9 is a structural block diagram of a network access apparatusaccording to another embodiment of the present disclosure;

FIG. 10 is a structural block diagram of a network access apparatusaccording to some embodiments of the present disclosure;

FIG. 11 is a structural block diagram of a network access apparatusaccording to another embodiment of the present disclosure;

FIG. 12 is a structural block diagram of a network access systemaccording to some embodiments of the present disclosure;

FIG. 13 is a structural block diagram of a terminal according to someembodiments of the present disclosure; and

FIG. 14 is a structural block diagram of a server according to anotherembodiment of the present disclosure.

DESCRIPTION OF EMBODIMENTS

To make the objectives, technical solutions, and advantages of thepresent disclosure more comprehensible, the following further describesembodiments of the present disclosure in detail with reference to theaccompanying drawings.

Referring to FIG. 1, FIG. 1 is a schematic structural diagram of anetwork access system according to some embodiments of the presentdisclosure. The network access system includes: a first terminal 120, asecond terminal 140, and a server 160.

An installed application is run in the first terminal 120: for a firstterminal (not shown), a first social networking account logs in thefirst terminal.

The first terminal 120 may be a mobile phone, a tablet computer, anebook reader, a moving picture experts group audio layer III (MP3)player, a moving picture experts group audio layer IV (MP4) player, alaptop portable computer, a desktop computer, or the like. Acommunication application is installed in the first terminal 120. Thecommunication application may be an instant messaging program, a socialnetworking program, a video communication program, or an audiocommunication program. The communication application is an applicationhaving a text, audio and/or video communication capability in socialinteractions. For example, the communication application is an instantmessaging program “Tencent QQ”, a social networking program “Tencentweibo”, an audio/video communication program “WeChat”, or the like.

An installed application is run in the second terminal 140: for a secondterminal (not shown), a second social networking account logs in thesecond terminal.

The second terminal 140 may be a mobile phone, a tablet computer, anebook reader, a moving picture experts group audio layer III (MP3)player, a moving picture experts group audio layer IV (MP4) player, alaptop portable computer, a desktop computer, or the like. Acommunication application is installed in the second terminal 140. Thecommunication application may be an instant messaging program, a socialnetworking program, a video communication program, or an audiocommunication program. The communication application is an applicationhaving a text, audio and/or video communication capability in socialinteractions. For example, the communication application is an instantmessaging program “Tencent QQ”, a social networking program “Tencentweibo”, an audio/video communication program “WeChat”, or the like.

The first terminal 120 establishes a connection with the server 160 bymeans of a wireless network or a wired network. In some embodiments,information issued by the first terminal 120 is processed by the server160 and is then sent to the second terminal 140.

In some embodiments, the second terminal 140 establishes a connectionwith the server 160 by means of a wireless network or a wired network.Information issued by the second terminal 140 is processed by the server160 and is then sent to the first terminal 120.

In some embodiments, the server 160 is a backend server supporting thecommunication application such as a social networking platform. Theserver 160 may be one server or a server cluster or cloud computingcenter consisting of a plurality of servers.

In some embodiments, the server 160 includes a network applicationserver 162 and a social networking server 164.

The first terminal 120 establishes a connection with the networkapplication server 162 by means of a wireless network or a wirednetwork. The network application server 162 is configured to store anidentifier of the wireless network and authorization information of thewireless network. The authorization information is information used foraccessing the wireless network, for example, key information andconnection password. Meanwhile, the second terminal 140 establishes aconnection with the network application server 162 by means of awireless network or a wired network.

The first terminal 120 (or more specifically a first social networkingaccount at the first terminal 120) establishes a connection with thesocial networking server 164 by means of a wireless network or a wirednetwork. Meanwhile, the second terminal 140 (or more specifically asecond social networking account at the second terminal 140) establishesa connection with the social networking server 164 by means of awireless network or a wired network. The social networking server 164 isconfigured to process social networking information (e.g., text, audio,video messages) sent between the first terminal 120 and the secondterminal 140 in the form of a chat room.

In some embodiments, there are three possible relationships between thefirst and second social networking accounts. First, there might be adirect contact relationship between the first and second socialnetworking accounts. In this case, both the first and second socialnetworking accounts are on each other's contact list and there is anexisting one-to-one chat room between the two accounts. This usuallyhappens between the two user accounts when their respective owners knoweach other quite well. Second, although there is no direct contactrelationship between the first and second social networking accounts,both user accounts are participants of one or more group chats. In thiscase, the first and second social networking accounts are not on eachother's contact list but they might have some mutual friends on thesocial networking platform. In other words, there is an indirectrelationship between the two user accounts. Third, there is norelationship between the two user accounts, direct or indirect. As willbe described below, the relationship between the two user accounts atthe social networking platform may determine whether and how thewireless network is shared among users of the social networkingplatform.

Also, a connection is established between the network application server162 and the social networking server 164 by means of a wireless networkor a wired network.

In some embodiments, the wireless network or wired network uses standardcommunication technology and/or protocol. The network usually is theinternet, but may alternatively be any network, which includes, but isnot limited to, any combination of a local area network (LAN), ametropolitan area network (MAN), a wide area networks (WAN), a mobile,wired or wireless network, a private network, or a virtual privatenetwork. In some embodiments, the technology and/or format of HypertextMarkup Language (HTML), extensible Markup Language (XML), or the like isused to represent data exchanged through a network. In addition, all orsome links may further be encrypted by using a conventional encryptiontechnology such as Secure Sockets Layer (SSL), Transport Layer Security(TLS), Virtual Private Network (VPN), and Internet Protocol Security(IPsec). In some other embodiments, the foregoing data communicationtechnology may alternatively be replaced by or supplemented to by usinga customized and/or private data communication technology. It should benoted that the first terminal and the second terminal are clients of thesame type, or the first terminal and the second terminal are clients ofdifferent types.

Referring to FIG. 2, FIG. 2 is a method flowchart of a network accessmethod according to some embodiments of the present disclosure. In thisembodiment, the network access method being applied to the networkaccess system shown in FIG. 1 is used as an example for describing. Themethod includes:

Operation 201: A first social networking account at a first terminal (orfirst client) acquires, when there is a wireless network to be accessed,a second social networking account bound to the wireless network.

Operation 202: The first terminal sends a network access request to thesecond terminal by means of a server. The second social networkingaccount logs in the second terminal. The network access request is usedfor requesting to access the wireless network. In some embodiments, thenetwork access request includes the first social networking account andan identifier of the wireless network to be accessed. For example, theuser of the first terminal is visiting the house of the user of thesecond terminal for a party. Instead of asking the user of the secondterminal for a password to access the wireless network at the house, theuser can submit such network access request from his social networkingaccount by entering the identifier of the wireless network and thesocial networking account of the user at the social networking platform.In some embodiments, the network access request includes a currentlocation of the first terminal to uniquely identify the wireless network(e.g., using the GPS module in the first terminal).

Correspondingly, the server receives the network access request that issent by the first social networking account to the second socialnetworking account.

A first social networking account logs in the first terminal. The secondsocial networking account logs in the second terminal. The networkaccess request is used for requesting to access the wireless networkbound to the second social networking account.

Operation 203: The server forwards the network access request to thesecond terminal. The server forwards the received network access requestincluding the first social networking account and an identifier of thewireless network to the second terminal. Correspondingly, the secondterminal receives the network access request sent by the server.

In some embodiments, before forwarding the network access request to thesecond social networking account, the computer server determines arelationship between the first social networking account and the secondsocial networking account at the social networking platform. As notedabove, there are at least three possible relationships between the twosocial networking accounts.

When the first social networking account is a direct contact of thesecond social networking account at the social networking platform, thecomputer server may deem that the first social networking account isreliable and then sends the authorization information of the wirelessnetwork to the first social networking account without waiting for thefeedback instruction from the second social networking account. When thefirst social networking account and the second social networking accountare not on each other's direct contact list but are members of a groupchat at the social networking platform, the computer server may includean identity of the group chat and optionally the messages submitted bythe first social networking account in the group chat in the networkaccess request to be sent to the second social networking account. Whenreviewing the messages in the group chat associated with the firstsocial networking account, the user of the second terminal can determineif the first social networking account should be granted access to thewireless network or not. When the first social networking account andthe second social networking account are not members of any group chatat the social networking platform, the computer server may send aconnection invitation to the second social networking account, theconnection invitation including the first social networking account andthe identifier of the wireless network. After sending the connectioninvitation to the second social networking account, the computer servermay subsequently receive a response from the second social networkingaccount, the response indicating that the second social networkingaccount grants the network access request or not. If yes, the computerserver first establishes a direct contact relationship between the firstsocial networking account and the second social networking account atthe social networking platform before granting the authorizationinformation of the wireless network to the first social networkingaccount. Note that a user of the social networking platform canconfigure its account as to what type of network access request needswhat level of scrutiny before being granted access to a wireless networkowned by the user.

Operation 204: The second terminal generates a feedback instructionaccording to the network access request.

Operation 205: The second terminal sends the feedback instruction to theserver, the feedback instruction being used for instructing the serverto or not to send authorization information of the wireless network tothe first terminal, and the authorization information being informationused for accessing the wireless network.

In some embodiments, the feedback instruction includes two types: anaccess authorization instruction and an access prohibition instruction.When allowing the first terminal to access the wireless network, thesecond terminal sends an access authorization instruction to the server.When prohibiting the first terminal from accessing the wireless network,the second terminal sends an access prohibition instruction to theserver.

Correspondingly, the server receives the feedback instruction sent bythe second terminal.

Operation 206: The server sends the authorization information of thewireless network to the first terminal when the feedback instruction isan access authorization instruction, the authorization information beinginformation used for accessing the wireless network.

In some embodiments, the server sends the authorization information ofthe wireless network to the first terminal when the feedback instructionis an access authorization instruction, the authorization informationbeing information used for accessing the wireless network.

In some embodiments, the authorization information carries a connectionpassword of the wireless network or an access key of the wirelessnetwork.

In some embodiments, before receiving the network access request, theserver first receives a binding instruction sent by the second socialnetwork account at the second terminal, the binding instruction carryingthe second social networking account, the identifier of the wirelessnetwork, and the authorization information of the wireless network.Based on the binding instruction, the server binds the second socialnetworking account, the identifier of the wireless network, and theauthorization information of the wireless network according to thebinding instruction. In some embodiments, the binding instructionfurther includes a location of the wireless network. Using the locationof the wireless network and the location of the requesting firstterminal, the server can deny a network access request in accordancewith a determination that the location of the first terminal is outsidea predefined range of the location of the wireless network.

In some embodiments, before sending the authorization information to theserver, the second terminal encrypts the authorization information, soas to ensure security of the authorization information. Correspondingly,the first terminal receives the authorization information sent by theserver. The authorization information is sent by the server when thefeedback instruction of the second terminal is an access authorizationinstruction.

Operation 207: The first terminal accesses the wireless networkaccording to the authorization information.

In some embodiments, the information carried in the authorizationinformation is invisible to a user of the first terminal. The firstterminal accesses the wireless network according to the authorizationinformation.

In view of the above, by the network access method provided in theembodiments, the server receives a network access request that is sentby the first social networking account to the second social networkingaccount, a first social networking account logging in the firstterminal, a second social networking account logging in the secondterminal, and the network access request being used for requesting toaccess a wireless network bound to the second social networking account,forwards the network access request to the second terminal, receives afeedback instruction sent by the second terminal, and sendsauthorization information of the wireless network to the first terminalwhen the feedback instruction is an access authorization instruction, sothat the first terminal accesses the wireless network according to theauthorization information. The problem that most wireless networks areencrypted wireless networks that are set privately and most of wirelessnetworks that can be searched by a mobile terminal cannot be accessed isresolved, thereby achieving the effect that a wireless network is boundto a second social networking account of an owner, and a requestersends, by means of a first social networking account, a network accessrequest to the second social networking account of the owner that is oris not an acquaintance of the requester by using a social attribute ofthe social networking accounts, and accesses the wireless network whenthe owner authorizes the requester, so that the mobile terminal canaccess an encrypted wireless network that is set privately.

Referring to FIG. 3A, FIG. 3A is a method flowchart of a network accessmethod according to another embodiment of the present disclosure. Inthis embodiment, the network access method being applied to the networkaccess system shown in FIG. 1 is used as an example for describing. Themethod includes:

Operation 301: A second terminal sends a binding instruction to aserver, the binding instruction carrying a second social networkingaccount, an identifier of a wireless network, and authorizationinformation of the wireless network.

When the second terminal needs to bind the wireless network and thesecond social networking account for use, the second terminal firstsends the binding instruction to the server. The binding instructioncarries the second social networking account to be bound and theidentifier of the wireless network. Meanwhile, the second terminal alsoadds the authorization information of the wireless network to thebinding instruction for sending to the server.

Correspondingly, the server receives the binding instruction sent by thesecond social network account at the second terminal. The bindinginstruction carries the second social networking account, the identifierof the wireless network, and the authorization information of thewireless network.

Operation 302: The server binds the second social networking account,the identifier of the wireless network, and the authorizationinformation of the wireless network according to the bindinginstruction.

After receiving the binding instruction, the server acquires the secondsocial networking account and the identifier of the wireless networkfrom the binding instruction, stores the authorization information ofthe wireless network, and binds the second social networking account andthe wireless network.

Alternatively, after receiving the binding instruction, the server bindsthe second social networking account, the identifier of the wirelessnetwork, and the authorization information of the wireless network.

Operation 303: The second terminal sends a setting instruction to theserver, the setting instruction carrying an open range of the secondsocial networking account.

The open range includes: open to a selected social networking account,and/or, open to a social networking account having a predeterminedattribute, and/or, open to a social networking account having a socialrelation, and/or, open to all social networking accounts.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a selected socialnetworking account. The selected social networking account is authorizedto acquire the second social networking account corresponding to thewireless network when searching for a wireless network to be accessed.

For example, if the second social networking account determines socialnetworking accounts in a contact group “friends and family” as selectedsocial networking account, a social networking account in the contactgroup “friends and family” is authorized to acquire the second socialnetworking account corresponding to the wireless network when findingthe wireless network corresponding to the second social networkingaccount. The selected social networking account and the second socialnetworking account may be friends or may also be strangers.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a socialnetworking account having a predetermined attribute. A social networkingaccount having the predetermined attribute is authorized to acquire thesecond social networking account corresponding to the wireless networkwhen searching for a wireless network to be accessed. The predeterminedattribute includes at least one attribute of gender, age, education,place, hobbies, and personal experience.

For example, if the second social networking account sets thepredetermined attribute to be “gender: female, and age: 15 to 25”, asocial networking account having the attribute “gender: female, and age:15 to 25” is authorized to acquire the second social networking accountcorresponding to the wireless network when finding the wireless networkcorresponding to the second social networking account.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a socialnetworking account having a social relation. A social networking accounthaving the social relation is authorized to acquire the second socialnetworking account corresponding to the wireless network when searchingfor a wireless network to be accessed. The social relation includes, butis not limited to, at least one of a friend relation, a follow relation,a relation of being in a same group. The social relation may be aone-way social relation, for example, a social networking account Bfollows a social networking account A, or may also be a two-way socialrelation, for example, a social networking account A sends a message toa social networking account B and the social networking account B sendsa message to the social networking account A.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to all socialnetworking accounts. A social networking account of any client isauthorized to acquire the second social networking account correspondingto the wireless network when searching for a wireless network to beaccessed.

Correspondingly, the server receives the setting instruction sent by thesecond terminal. The setting instruction carries the open range of thesecond social networking account.

Operation 304: The server stores the open range of the second socialnetworking account according to the setting instruction.

After receiving the setting instruction sent by the second terminal, theserver acquires the open range of the second social networking accountcarried in the setting instruction, and stores the open range of thesecond social networking account in the server, so as to check whether afirst social networking account is within the open range of the secondsocial networking account when the first social networking accountrequests to acquire the second social networking account.

Operation 305: A first terminal acquires, when there is a wirelessnetwork to be accessed, the second social networking account bound tothe wireless network.

The first terminal searches for a wireless network in the surroundings,and screens according to the search result to select a wireless networkto be accessed. According to information presented by the wirelessnetwork to be accessed, the first terminal acquires, by means of theserver, the second social networking account bound to the wirelessnetwork.

For example, the first terminal finds three wireless networks to beaccessed: WIFI1, WIFI2, and WIFI3 within a predetermined range. Lockinginformation is presented at a corresponding position of each of thethree wireless networks to be accessed. However, a correspondingposition of the wireless network WIFI2 further presents information of“Request to access by means of QQ”, and a corresponding position of thewireless network WIFI3 further presents information of “Request toaccess by means of WeChat”. The second social networking accountscorresponding to the wireless networks can be acquired by tapping“Request to access” at corresponding positions of the wireless networksWIFI2 and WIFI3, as shown in FIG. 3B.

QQ and WeChat are two different communication applications.

Operation 306: The server provides the second social networking accountbound to the wireless network to the first terminal when the firstsocial networking account is within the open range.

In some embodiments, the open range is an open range set by the secondsocial networking account bound to the wireless network.

The open range includes: open to a selected social networking account,or, open to a social networking account having a predeterminedattribute, or, open to a social networking account having a socialrelation, or, open to all social networking accounts.

Operation 307: The first terminal sends a network access request to thesecond terminal by means of the server.

The second social networking account logs in the second terminal. Thenetwork access request is used for requesting to access the wirelessnetwork.

After acquiring the second social networking account, the first terminalsends, by means of the server, a network access request to the secondterminal by using the first social networking account that logs in thefirst terminal.

The network access request carries a portrait of the first socialnetworking account, and/or, request information sent by the first socialnetworking account.

For example, after acquiring the second social networking account at thecorresponding position of the wireless network WIFI2, the first terminalsends, by means of the server, information of “Hello, dear. I'm yourneighbor next door. I'm wondering whether I can use your wirelessnetwork to watch television for a moment. Thank you very much!” to thesecond social networking account, as shown in FIG. 3B.

It should be noted that the text in the foregoing information isself-defined and edited by a user of the first terminal, or the text inthe foregoing information is automatically generated by the server.

Correspondingly, the server receives the network access request that issent by the first social networking account to the second socialnetworking account.

Operation 308: The server forwards the network access request to thesecond terminal.

The server forwards the received network access request to the secondterminal.

Correspondingly, the second terminal receives the network access requestsent by the server.

Operation 309: The second terminal generates a feedback instructionaccording to the network access request.

Tractably, the network access request carries the portrait of the firstsocial networking account, and/or, the request information sent by thefirst terminal.

The second terminal receives the network access request forwarded by theserver, acquires information in the network access request, andgenerates a corresponding feedback instruction according to theinformation in the network access request.

For example, if the second terminal is the second social networkingaccount bound to the wireless network WIFI2, the information of thenetwork access request received by the second social networking accountthat logs in the second terminal is: “Hello, dear. I'm your neighbornext door. I'm wondering whether I can use your wireless network towatch television for a moment. Thank you very much!” and the portraitcorresponding to the first social networking account, as shown in FIG.3C.

In some embodiments, the feedback instruction includes two types: anaccess authorization instruction and an access prohibition instruction.When allowing the first terminal to access the wireless network, thesecond terminal sends an access authorization instruction to the server.When prohibiting the first terminal from accessing the wireless network,the second terminal sends an access prohibition instruction to theserver.

In some embodiments, the second social networking account generates acorresponding feedback instruction according to the portraitcorresponding to the first social networking account.

After the second social networking account receives the network accessrequest sent by the first social networking account, if a usercorresponding to the second social networking account particularly likesthe portrait of the first social networking account and allows the usercorresponding to the first social networking account to use the wirelessnetwork of the user corresponding to the second social networkingaccount, the second social networking account generates an accessauthorization instruction.

In some embodiments, the second social networking account generates acorresponding feedback instruction according to information sent by thefirst social networking account.

After the second social networking account receives the network accessrequest sent by the first social networking account, if the usercorresponding to the second social networking account finds that therequest information sent by the first social networking account is quitesincere, is moved by the request information sent by the first socialnetworking account, and allows the user corresponding to the firstsocial networking account to use the wireless network of the usercorresponding to the second social networking account, the second socialnetworking account generates an access authorization instruction.

In some embodiments, the second social networking account generates acorresponding feedback instruction according to both the portraitcorresponding to the first social networking account and the informationsent by the first social networking account.

After the second social networking account receives the network accessrequest sent by the first social networking account, if the usercorresponding to the second social networking account is at a bad moodand readily reject the network access request of the first socialnetworking account when seeing the request information sent by the firstsocial networking account, the second social networking accountgenerates an access prohibition instruction.

In some embodiments, the access authorization instruction may furthercarry an authorization time and the number of authorizations. In someembodiments, the access prohibition instruction may further carry aprohibition reason.

Operation 310: The second terminal sends the feedback instruction to theserver, the feedback instruction being used for instructing the serverto or not to send authorization information of the wireless network tothe first terminal, and the authorization information being informationused for accessing the wireless network.

The second terminal sends the feedback instruction to the server.

In some embodiments, before sending the authorization information to theserver, the second terminal encrypts the authorization information, soas to avoid theft of the authorization information in the transmissionprocess.

In some embodiments, the authorization information carries a connectionpassword of the wireless network or access information of connection tothe wireless network.

In some embodiments, the authorization information further carries anauthorization time and the number of authorizations.

Correspondingly, the server receives the feedback instruction sent bythe second terminal.

Operation 311: The server sends the authorization information of thewireless network to the first terminal when the feedback instruction isan access authorization instruction, so that the first terminal accessesthe wireless network according to the authorization information.

After receiving the feedback instruction sent by the second terminal,the server acquires information in the feedback instruction. If thefeedback instruction is an access authorization instruction, the serveracquires the stored authorization information and sends theauthorization information of the wireless network to the first terminalcorresponding to the first social networking account.

Correspondingly, the first terminal receives the authorizationinformation sent by the server. The authorization information is sent bythe server when the feedback instruction of the second terminal is anaccess authorization instruction.

Operation 312: The first terminal accesses the wireless networkaccording to the authorization information.

The first terminal accesses the wireless network according to theauthorization information sent by the server. In some embodiments, theinformation carried in the authorization information is invisible to auser of the first terminal, and from the perspective of the user, thefirst terminal is automatically connected to the wireless network.

The first terminal acquires, according to the authorization time and thenumber of authorizations carried in the authorization information, atime of this access to the wireless network, or the number of times forwhich the first terminal can access the wireless network. The firstterminal accesses the wireless network according to the duration definedby the authorization time, or the first terminal accesses the wirelessnetwork according to the times defined by the number of authorizations.

Operation 313: The server does not send the authorization information tothe first terminal corresponding to the first social networking accountwhen the feedback instruction is an access rejection instruction.

After receiving the feedback instruction sent by the second terminal,the server acquires information in the feedback instruction. If thefeedback instruction is an access rejection instruction, the server doesnot send the authorization information to the first terminalcorresponding to the first social networking account.

In some embodiments, the server sends prompt information to the firstsocial networking account. The prompt information is used for promptingthat the first social networking account is not authorized by the secondsocial networking account.

In view of the above, by the network access method provided in theembodiments, the server receives a network access request that is sentby the first social networking account to the second social networkingaccount, a first social networking account logging in the firstterminal, a second social networking account logging in the secondterminal, and the network access request being used for requesting toaccess a wireless network bound to the second social networking account,forwards the network access request to the second terminal, receives afeedback instruction sent by the second terminal, and sendsauthorization information of the wireless network to the first terminalwhen the feedback instruction is an access authorization instruction, sothat the first terminal accesses the wireless network according to theauthorization information. The problem that most wireless networks areencrypted wireless networks that are set privately and most of wirelessnetworks that can be searched by a mobile terminal cannot be accessed isresolved, thereby achieving the effect that a wireless network is boundto a second social networking account of an owner, and a requestersends, by means of a first social networking account, a network accessrequest to the second social networking account of the owner that is oris not an acquaintance of the requester by using a social attribute ofthe social networking accounts, and accesses the wireless network whenthe owner authorizes the requester, so that the mobile terminal canaccess an encrypted wireless network that is set privately.

In the network access method provided in the embodiment of FIG. 3A, thefirst terminal sends, by means of the server, a network access requestto the second terminal only once, and there is no other interactionsbetween the first terminal and the second terminal. As an embodimentprovided based on FIG. 3A, after the first terminal acquires the secondsocial networking account, another interaction behavior may be carriedout between the first terminal and the second social networking account.Refer to the following operations, as shown in FIG. 4A:

Operation 313: The first terminal sends first social networkinginformation to the second terminal by means the server.

After acquiring the second social networking account, the first terminalsends, by means of the server, the first social networking informationto the second social networking account that logs in the secondterminal.

The first social networking information is a second network accessrequest that is sent by the first terminal to the second socialnetworking account by means of the server, or chat information that issent by the first terminal to the second social networking account bymeans of the server, or a friend adding request that is sent by thefirst terminal to the second social networking account by means of theserver.

Correspondingly, the server receives the first social networkinginformation that is sent by the first social networking account to thesecond social networking account.

Operation 314: The server forwards the first social networkinginformation to the second terminal.

The server forwards to the second terminal the first social networkinginformation sent by the first terminal.

Correspondingly, the second terminal receives the first socialnetworking information that is sent by the first terminal by means ofthe server.

Operation 315: The second terminal sends second social networkinginformation to the first terminal by means of the server.

After receiving the network access request sent by the first terminal bymeans of the server, the second terminal acquires the first socialnetworking account carried in the network access request. The secondterminal corresponding to the second social networking account sends, bymeans of the server, the second social networking information to thefirst terminal corresponding to the first social networking account.

The second social networking information is chat information that issent by the second terminal to the first social networking account bymeans of the server, or a friend adding request that is sent by thesecond terminal to the first social networking account by means of theserver.

Correspondingly, the server receives the second social networkinginformation that is sent by the second social networking account to thefirst social networking account.

Operation 316: The server forwards the second social networkinginformation to the first terminal.

The server forwards to the first terminal the second social networkinginformation sent by the second terminal.

Correspondingly, the first terminal receives the second socialnetworking information that is sent by the second terminal by means ofthe server.

The sequential order of operation 313 to operation 316 in thisembodiment and operation 309 to operation 312 in the embodiment of FIG.3A is not specifically defined.

In some embodiments, the types of the social networking information mayfurther include: other types of information such as sending a redpacket, sending a virtual gift, and requesting to follow.

In view of the above, by the network access method provided in thisembodiment, an interaction behavior can be created between two socialnetworking accounts which are primarily strangers based on a wirelessnetwork as an intermediate medium, the probability at which the firstsocial networking account and the second social networking account meeteach other as friends is increased, and a new way of adding friends isprovided.

Based on the network access method provided by the embodiment in FIG.3A, the first terminal sends, by means of the server, the network accessrequest to the second social networking account and then accesses thewireless network, and a particular amount of use fees needs to becharged when the first terminal uses the wireless network. Refer to thefollowing operations, as shown in FIG. 4B:

Operation 317: The server periodically makes statistics about firstdata, the first data including at least one of a duration for which thefirst terminal is connected to the wireless network and data of trafficused by the first terminal after accessing the wireless network.

In some embodiments, the server makes statistics about the duration forwhich the first terminal is connected to the wireless network atpredetermined time intervals.

In some embodiments, the server makes statistics about the data oftraffic used by the first terminal after accessing the wireless networkat predetermined time intervals.

In some embodiments, the server makes statistics about the duration forwhich the first terminal is connected to the wireless network and thedata of traffic used by the first terminal after accessing the wirelessnetwork at predetermined time intervals.

Operation 318: The server transfers a first resource from a firstresource account corresponding to the first social networking account toan intermediate resource account corresponding to the server or a secondresource account corresponding to the second terminal according to thefirst data.

In some embodiments, the server transfers the first resource from thefirst resource account corresponding to the first social networkingaccount to the intermediate resource account corresponding to the serveraccording to the duration for which the first terminal is connected tothe wireless network.

In some embodiments, the server transfers the first resource from thefirst resource account corresponding to the first social networkingaccount to the intermediate resource account corresponding to the serveraccording to the data of traffic used by the first terminal afteraccessing the wireless network.

In some embodiments, the server transfers a first resource that has arelatively low cost for resources from the first resource accountcorresponding to the first social networking account to the intermediateresource account corresponding to the server according to the durationfor which the first terminal is connected to the wireless network andthe data of traffic used by the first terminal after accessing thewireless network. The cost for resources is obtained by calculating theduration of connection to the wireless network, or is obtained bycalculation the data of traffic used after accessing the wirelessnetwork.

In some embodiments, the server transfers the first resource from thefirst resource account corresponding to the first social networkingaccount to the second resource account corresponding to the secondterminal according to the duration for which the first terminal isconnected to the wireless network. In this case, forwarding by means ofthe intermediate resource account of the server is not required.

Operation 319: The server periodically makes statistics about seconddata, the second data including at least one of the number of times forwhich the second social networking account sends an access authorizationinstruction, the duration for which the first terminal is connected tothe wireless network, and the data of traffic used by the first terminalafter accessing the wireless network.

In some embodiments, the server makes statistics about the number oftimes for which the second social networking account sends an accessauthorization instruction at predetermined time intervals.

In some embodiments, the server makes statistics about the duration forwhich the first terminal is connected to the wireless network atpredetermined time intervals. In some embodiments, for each wirelessnetwork of the second social networking account, the server makesstatistics about the total duration for which all first terminals isconnected to the wireless network at predetermined time intervals.

In some embodiments, the server makes statistics about the data oftraffic used by the first terminal after accessing the wireless networkat predetermined time intervals. For each wireless network of the secondsocial networking account, the server makes statistics about the totaldata of traffic used by all the first terminals after accessing thewireless network at predetermined time intervals.

Operation 320: The server transfers a target resource from theintermediate resource account corresponding to the server to the secondresource account corresponding to the second social networking accountaccording to the second data.

In some embodiments, the server transfers the target resource from theintermediate resource account corresponding to the server to the secondresource account corresponding to the second social networking accountaccording to the number of times for which the second social networkingaccount sends an access authorization instruction.

In some embodiments, the server transfers the target resource from theintermediate resource account corresponding to the server to the secondresource account corresponding to the second social networking accountaccording to the duration for which the first terminal is connected tothe wireless network.

In some embodiments, the server transfers the target resource from theintermediate resource account corresponding to the server to the secondresource account corresponding to the second social networking accountaccording to the data of traffic used by the first terminal afteraccessing the wireless network.

The network access method provided by the embodiment in FIG. 2 and theembodiment in FIG. 3A is performed in one server. The network accessmethod may alternatively be performed in a plurality of servers. Referto the following embodiments.

Referring to FIG. 5, FIG. 5 is a method flowchart of a network accessmethod according to another embodiment of the present disclosure. Inthis embodiment, the network access method being applied to theimplementation environment shown in FIG. 1 is used as an example fordescribing. The method includes:

Operation 501: A second terminal sends a binding instruction to anetwork application server, the binding instruction carrying a secondsocial networking account, an identifier of a wireless network, andauthorization information of the wireless network.

When the second terminal needs to bind the wireless network and thesecond social networking account for use, the second terminal firstsends the binding instruction to the network application server. Thebinding instruction carries the second social networking account to bebound and the identifier of the wireless network. Meanwhile, the secondterminal also adds the authorization information of the wireless networkto the binding instruction for sending to the network applicationserver.

Correspondingly, the network application server receives the bindinginstruction sent by the second social network account at the secondterminal. The binding instruction carries the second social networkingaccount, the identifier of the wireless network, and the authorizationinformation of the wireless network.

Operation 502: The network application server binds the second socialnetworking account, the identifier of the wireless network, and theauthorization information of the wireless network according to thebinding instruction.

After receiving the binding instruction, the network application serveracquires the second social networking account and the identifier of thewireless network from the binding instruction, stores the authorizationinformation of the wireless network, and binds the second socialnetworking account and the wireless network.

Alternatively, after receiving the binding instruction, the networkapplication server binds the second social networking account, theidentifier of the wireless network, and the authorization information ofthe wireless network.

Operation 503: The second terminal sends a setting instruction to thenetwork application server, the setting instruction carrying an openrange of the second social networking account.

The open range includes: open to a selected social networking account,and/or, open to a social networking account having a predeterminedattribute, and/or, open to a social networking account having a socialrelation, and/or, open to all social networking accounts.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a selected socialnetworking account. The selected social networking account is authorizedto acquire the second social networking account corresponding to thewireless network when searching for a wireless network to be accessed.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a socialnetworking account having a predetermined attribute. A social networkingaccount having the predetermined attribute is authorized to acquire thesecond social networking account corresponding to the wireless networkwhen searching for a wireless network to be accessed. The predeterminedattribute includes at least one attribute of gender, age, education,place, hobbies, and personal experience.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to a socialnetworking account having a social relation. A social networking accounthaving the social relation is authorized to acquire the second socialnetworking account corresponding to the wireless network when searchingfor a wireless network to be accessed. The social relation includes, butis not limited to, at least one of a friend relation, a follow relation,a relation of being in a same group. The social relation may be aone-way social relation, for example, a social networking account Bfollows a social networking account A, or may also be a two-way socialrelation, for example, a social networking account A sends a message toa social networking account B and the social networking account B sendsa message to the social networking account A.

In some embodiments, the open range of the second social networkingaccount carried in the setting instruction is open to all socialnetworking accounts. A social networking account of any client isauthorized to acquire the second social networking account correspondingto the wireless network when searching for a wireless network to beaccessed.

Correspondingly, the server receives the setting instruction sent by thesecond terminal. The setting instruction carries the open range of thesecond social networking account.

Operation 504: The network application server stores the open range ofthe second social networking account according to the settinginstruction.

After receiving the setting instruction sent by the second terminal, thenetwork application server acquires the open range of the second socialnetworking account carried in the setting instruction, and stores theopen range of the second social networking account in the networkapplication server, so as to check whether a first social networkingaccount is within the open range of the second social networking accountwhen the first social networking account requests to acquire the secondsocial networking account.

Operation 505: A first terminal acquires, when there is a wirelessnetwork to be accessed, the second social networking account bound tothe wireless network.

The first terminal searches for a wireless network in the surroundings,and screens according to the search result to select a wireless networkto be accessed. According to information presented by the wirelessnetwork to be accessed, the first terminal acquires, by means of thenetwork application server, the second social networking account boundto the wireless network.

For example, the first terminal finds three wireless networks to beaccessed: WIFI1, WIFI2, and WIFI3 within a predetermined range. Lockinginformation is presented at a corresponding position of each of thethree wireless networks to be accessed. However, a correspondingposition of the wireless network WIFI2 further presents information of“Request to access by means of QQ”, and a corresponding position of thewireless network WIFI3 further presents information of “Request toaccess by means of WeChat”. The second social networking accountscorresponding to the wireless networks can be acquired by tapping“Request to access” at corresponding positions of the wireless networksWIFI2 and WIFI3.

Operation 506: The network application server provides the second socialnetworking account bound to the wireless network to the first terminalwhen a first social networking account is within the open range.

In some embodiments, the open range is an open range set by the secondsocial networking account bound to the wireless network.

The open range includes: open to a selected social networking account,or, open to a social networking account having a predeterminedattribute, or, open to a social networking account having a socialrelation, or, open to all social networking accounts.

Operation 507: The first terminal sends a network access request to thenetwork application server.

Operation 508: The network application server forwards to a socialserver the network access request that is sent by the first socialnetworking account to the second social networking account.

After receiving the network access request that is sent by the firstsocial networking account to the second social networking account, thenetwork application server forwards the network access request to thesocial server, and the social server sends the network access request tothe second terminal.

Correspondingly, the social server receives the network access requestforwarded by the network application server.

Operation 509: The social server forwards the network access request tothe second terminal.

The social server forwards the received network access request to thesecond terminal.

Correspondingly, the second terminal receives the network access requestsent by the social server.

Operation 510: The second terminal generates a feedback instructionaccording to the network access request.

The network access request carries a portrait of the first socialnetworking account, and/or, the request information sent by the firstterminal.

The second terminal receives the network access request forwarded by thesocial server, acquires information in the network access request, andgenerates a corresponding feedback instruction according to theinformation in the network access request.

Operation 511: The second terminal sends the feedback instruction to thenetwork application server, so that the network application server sendsthe authorization information of the wireless network to the firstterminal when the feedback instruction is an access authorizationinstruction, and that the first terminal accesses the wireless networkaccording to the authorization information.

Operation 512: The network application server sends the authorizationinformation of the wireless network to the first terminal when thefeedback instruction is an access authorization instruction, so that thefirst terminal accesses the wireless network according to theauthorization information.

After receiving the feedback instruction sent by the second terminal,the network application server acquires information in the feedbackinstruction. If the feedback instruction is an access authorizationinstruction, the network application server acquires the storedauthorization information and sends the authorization information of thewireless network to the first terminal corresponding to the first socialnetworking account.

Correspondingly, the first terminal receives the authorizationinformation sent by the network application server. The authorizationinformation is sent by the network application server when the feedbackinstruction of the second terminal is an access authorizationinstruction.

Operation 513: The first terminal accesses the wireless networkaccording to the authorization information.

The first terminal accesses the wireless network according to theauthorization information sent by the network application server.

Operation 514: The network application server does not send theauthorization information to the first terminal corresponding to thefirst social networking account when the feedback instruction is anaccess rejection instruction.

After receiving the feedback instruction sent by the second terminal,the server acquires information in the feedback instruction. If thefeedback instruction is an access rejection instruction, the server doesnot send the authorization information to the first terminalcorresponding to the first social networking account.

In some embodiments, the server sends prompt information to the firstsocial networking account. The prompt information is used for promptingthat the first social networking account is not authorized by the secondsocial networking account.

The following are apparatus embodiments of the present disclosure,content that is not detailed in the apparatus embodiments may refer tothe method embodiments that are one-to-one corresponding to theapparatus embodiments.

Referring to FIG. 6, FIG. 6 is a structural block diagram of a networkaccess apparatus according to some embodiments of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a server by means of software,hardware, or a combination of software and hardware. The apparatusincludes:

a request receiving module 610, configured to receive a network accessrequest that is sent by a first social networking account at a firstterminal to a second social networking account at a second terminal, afirst social networking account logging in the first terminal, a secondsocial networking account logging in the second terminal, and thenetwork access request being used for requesting to access a wirelessnetwork bound to the second social networking account;

a request forwarding module 620, configured to forward the networkaccess request to the second terminal;

a feedback receiving module 630, configured to receive a feedbackinstruction sent by the second terminal; and

an authorization sending module 640, configured to send authorizationinformation of the wireless network to the first terminal when thefeedback instruction is an access authorization instruction, theauthorization information including verification information used foraccessing the wireless network.

Referring to FIG. 7, FIG. 7 is a structural block diagram of a networkaccess apparatus according to another embodiment of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a server by means of software,hardware, or a combination of software and hardware. The apparatusincludes:

a binding receiving module 710, configured to receive a bindinginstruction sent by a second terminal, the binding instruction carryinga second social networking account, an identifier of a wireless network,and authorization information of the wireless network;

a binding execution module 720, configured to bind the second socialnetworking account, the identifier of the wireless network, and theauthorization information of the wireless network according to thebinding instruction;

a setting receiving module 730, configured to receive a settinginstruction sent by the second terminal, the setting instructioncarrying an open range of the second social networking account;

a range storage module 740, configured to store the open range of thesecond social networking account according to the setting instruction;

a request receiving module 750, configured to receive a network accessrequest that is sent by a first terminal to the second terminal, a firstsocial networking account logging in the first terminal, the secondsocial networking account logging in the second terminal, and thenetwork access request being used for requesting to access the wirelessnetwork bound to the second social networking account;

a account provisioning module 760, configured to provide the secondsocial networking account bound to the wireless network to the firstterminal when the first social networking account is within the openrange, where

the open range includes: open to a selected social networking account,or, open to a social networking account having a predeterminedattribute, or, open to a social networking account having a socialrelation, or, open to all social networking accounts; and thepredetermined attribute includes at least one attribute of gender, age,education, place, hobbies, and personal experience;

a request forwarding module 770, configured to forward the networkaccess request to the second terminal;

a feedback receiving module 780, configured to receive a feedbackinstruction sent by the second terminal;

an authorization sending module 790, configured to send theauthorization information of the wireless network to the first terminalwhen the feedback instruction is an access authorization instruction,the authorization information including verification information usedfor accessing the wireless network; and

an information forwarding module 800, configured to receive first socialnetworking information that is sent by the first social networkingaccount to the second social networking account, and forward the firstsocial networking information to the second terminal.

In some embodiments, the information forwarding module 800 is furtherconfigured to receive second social networking information that is sentby the second social networking account to the first social networkingaccount, and forward the second social networking information to thefirst terminal.

In some embodiments, the data statistics module 810 is configured toperiodically make statistics about first data, the first data includingat least one of a duration for which the first terminal is connected tothe wireless network and data of traffic used by the first terminalafter accessing the wireless network. The resource transfer module 820is configured to transfer a first resource from a first resource accountcorresponding to the first social networking account to a secondresource account corresponding to the second social networking accountaccording to the first data.

In some embodiments, the data statistics module 810 is configured toperiodically make statistics about first data, the first data includingat least one of a duration for which the first terminal is connected tothe wireless network and data of traffic used by the first terminalafter accessing the wireless network. The resource transfer module 820is further configured to periodically makes statistics about seconddata, the second data including at least one of the number of times forwhich the second social networking account sends an access authorizationinstruction, the duration for which the first terminal is connected tothe wireless network, and the data of traffic used by the first terminalafter accessing the wireless network.

In some embodiments, the data statistics module 810 is configured totransfer a first resource from a first resource account corresponding tothe first social networking account to an intermediate resource accountcorresponding to the server according to the first data. In someembodiments, the resource transfer module 820 is further configured totransfer a target resource from the intermediate resource accountcorresponding to the server to the second resource account correspondingto the second social networking account according to the second data.

Referring to FIG. 8, FIG. 8 is a structural block diagram of a networkaccess apparatus according to some embodiments of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a first terminal or a firstterminal by means of software, hardware, or a combination of softwareand hardware. The apparatus includes:

an account acquisition module 830, configured to acquire, when there isa wireless network to be accessed, a second social networking accountbound to the wireless network;

a request sending module 840, configured to send a network accessrequest to a second terminal by means of a server, the second socialnetworking account logging in the second terminal, and the networkaccess request being used for requesting to access the wireless network;

an authorization receiving module 850, configured to receiveauthorization information sent by the server, the authorizationinformation being used for accessing; and

a network access module 860, configured to access the wireless networkaccording to the authorization information.

Referring to FIG. 9, FIG. 9 is a structural block diagram of a networkaccess apparatus according to another embodiment of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a first terminal, or the wholeor a part of a first terminal, by means of software, hardware, or acombination of software and hardware. The apparatus includes:

an account acquisition module 830, configured to acquire, when there isa wireless network to be accessed, a second social networking accountbound to the wireless network;

a request sending module 840, configured to send a network accessrequest to a second terminal by means of a server, the second socialnetworking account logging in the second terminal, and the networkaccess request being used for requesting to access the wireless network;

an authorization receiving module 850, configured to receiveauthorization information sent by the server, the authorizationinformation including verification information used for accessing thewireless network; and

a network access module 860, configured to access the wireless networkaccording to the authorization information.

In some embodiments, further included are a first sending module 870,configured to send, by means of the server, first social networkinginformation to the second terminal; and a first receiving module 880,configured to receive second social networking information sent by thesecond terminal by means of the server.

Referring to FIG. 10, FIG. 10 is a structural block diagram of a networkaccess apparatus according to some embodiments of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a second terminal, or the wholeor a part of a first terminal, by means of software, hardware, or acombination of software and hardware. The apparatus includes:

a request receiving module 1010, configured to receive a network accessrequest sent by a server, the network access request being sent by afirst terminal to a second terminal, a first social networking accountlogging in the first terminal, a second social networking accountlogging in the second terminal, and the network access request beingused for requesting to access a wireless network bound to the secondsocial networking account;

a feedback generation module 1020, configured to generate a feedbackinstruction according to the network access request; and

a feedback sending module 1030, configured to send the feedbackinstruction to the server, the feedback instruction being used forinstructing the server to or not to send authorization information ofthe wireless network to the first terminal, and the authorizationinformation being information used for accessing the wireless network.

Referring to FIG. 11, FIG. 11 is a structural block diagram of a networkaccess apparatus according to another embodiment of the presentdisclosure. The network access apparatus provided in this embodiment maybe implemented as the whole or a part of a second terminal, or the wholeor a part of a first terminal, by means of software, hardware, or acombination of software and hardware. The apparatus includes:

a binding sending module 1110, configured to send a binding instructionto a server, the binding instruction carrying a second social networkingaccount, an identifier of a wireless network, and authorizationinformation of the wireless network;

a setting sending module 1120, configured to send a setting instructionto the server, the setting instruction carrying an open range of thesecond social networking account, wherein

the open range includes: open to a selected social networking account,or, open to a social networking account having a predeterminedattribute, or, open to a social networking account having a socialrelation, or, open to all social networking accounts; and thepredetermined attribute includes at least one attribute of gender, age,education, place, hobbies, and personal experience;

a request receiving module 1130, configured to receive a network accessrequest sent by the server, the network access request being sent by afirst terminal to a second terminal, a first social networking accountlogging in the first terminal, the second social networking accountlogging in the second terminal, and the network access request beingused for requesting to access a wireless network bound to the secondsocial networking account;

a feedback generation module 1140, configured to generate a feedbackinstruction according to the network access request; and

a feedback sending module 1150, configured to send the feedbackinstruction to the server, the feedback instruction being used forinstructing the server to or not to send the authorization informationof the wireless network to the first terminal, and the authorizationinformation being information used for accessing the wireless network.

In some embodiments, further included are a second receiving module1160, configured to receive first social networking information sent bythe first terminal by means of the server; and a second sending module1170, configured to send second social networking information to thefirst terminal by means of the server.

It should be noted that the above functional modules are only describedfor exemplary purposes when the network access apparatus accesses anetwork. In actual applications, the functions may be allocated todifferent functional modules according to specific needs, which meansthat the internal structure of the server and the terminal is divided todifferent functional modules to complete all or some of the abovedescribed functions. In addition, the network access apparatus providedby the foregoing embodiments are based on the same concept as thenetwork access method in the foregoing embodiments. For the specificimplementation process, refer to the method embodiments, and the detailsare not described herein again.

Referring to FIG. 12, FIG. 12 is a structural block diagram of a networkaccess system according to some embodiments of the present disclosure.The system includes: a server 1220, a first terminal 1240, and a secondterminal 1260.

The server 1220 includes the network access apparatus according to anyone of the embodiment shown in FIG. 6 or the embodiment shown in FIG. 7.

The first terminal 1240 includes the network access apparatus accordingto any one of the embodiment shown in FIG. 8 or the embodiment shown inFIG. 9.

The second terminal 1260 includes the network access apparatus accordingto any one of the embodiment shown in FIG. 10 or the embodiment shown inFIG. 11.

Referring to FIG. 13, FIG. 13 is a block diagram of a terminal 1300according to some embodiments of the present disclosure. The terminalmay include components such as a radio frequency (RF) circuit 1301, amemory 1302 including one or more non-transitory computer readablestorage media, an input unit 1303, a display unit 1304, a sensor 1305,an audio circuit 1306, a wireless fidelity (WiFi) module 1307, aprocessor 1308 including one or more processing cores, and a powersupply 1309. A person skilled in the art may understand that thestructure of the terminal shown in FIG. 13 does not constitute alimitation to the terminal, and the terminal may include more componentsor fewer components than those shown in the figure, or some componentsmay be combined, or a different component deployment may be used. The RFcircuit and/or the WiFi may alternatively be collectively referred to ascommunication components.

The RF circuit 1301 may be configured to receive and send signals duringan information receiving and sending process or a call process.Particularly, the RF circuit 1301 receives downlink information from abase station, then delivers the downlink information to the processor1308 for processing, and sends related uplink data to the base station.Generally, the RF circuit 1301 includes, but is not limited to, anantenna, at least one amplifier, a tuner, one or more oscillators, asubscriber identity module (SIM) card, a transceiver, a coupler, a lownoise amplifier (LNA), and a duplexer. In addition, the RF circuit 1301may also communicate with a network and another device by wirelesscommunication. The wireless communication may use any communicationsstandard or protocol, which includes, but is not limited to, GlobalSystem for Mobile communications (GSM), General Packet Radio Service(GPRS), Code Division Multiple Access (CDMA), Wideband Code DivisionMultiple Access (WCDMA), Long Term Evolution (LTE), email, ShortMessaging Service (SMS), and the like.

The memory 1302 may be configured to store a software program andmodule. The processor 1308 runs the software program and module storedin the memory 1302, to implement various functional applications anddata processing. The memory 1302 may mainly include a program storagearea and a data storage area. The program storage area may store anoperating system, an application program required by at least onefunction (such as a sound playback function and an image displayfunction), and the like. The data storage area may store data (such asaudio data and an address book) created according to use of theterminal, and the like. In addition, the memory 1302 may include a highspeed random access memory, and may also include a nonvolatile memorysuch as at least one magnetic disk storage device, a flash memory, oranother volatile solid-state storage device. Correspondingly, the memory1302 may further include a memory controller, so as to provide access ofthe processor 1308 and the input unit 1303 to the memory 1302.

The input unit 1303 may be configured to receive input digit orcharacter information, and generate a keyboard, mouse, joystick,optical, or track ball signal input related to the user setting andfunction control. Specifically, the input unit 1303 may include atouch-sensitive surface and another input device. The touch-sensitivesurface, which may also be referred to as a touchscreen or a touchpanel, may collect a touch operation of a user on or near thetouch-sensitive surface (such as an operation of a user on or near thetouch-sensitive surface by using any suitable object or accessory, suchas a finger or a stylus), and drive a corresponding connection apparatusaccording to a preset program. In some embodiments, the touch-sensitivesurface may include two parts: a touch detection apparatus and a touchcontroller. The touch detection apparatus detects a touch position ofthe user, detects a signal generated by the touch operation, andtransfers the signal to the touch controller. The touch controllerreceives the touch information from the touch detection apparatus,converts the touch information into touch point coordinates, and sendsthe touch point coordinates to the processor 1308. Moreover, the touchcontroller can receive and execute a command sent from the processor1308. In addition, the touch-sensitive surface may be may be aresistive, capacitive, infrared, or surface sound wave typetouch-sensitive surface. In addition to the touch-sensitive surface, theinput unit 1303 may further include the another input device.Specifically, the another input device may include, but is not limitedto, one or more of a physical keyboard, a functional key (such as avolume control key or a switch key), a track ball, a mouse, and ajoystick.

The display unit 1304 may be configured to display information input bythe user or information provided for the user, and various graphicaluser interfaces of the terminal. The graphical user interfaces may beformed by a graph, a text, an icon, a video, or any combination thereof.The display unit 1304 may include a display panel. In some embodiments,the display panel may be configured by using a liquid crystal display(LCD), an organic light-emitting diode (OLED), or the like. Further, thetouch-sensitive surface may cover the display panel. After detecting atouch operation on or near the touch-sensitive surface, thetouch-sensitive surface transfers the touch operation to the processor1308, so as to determine the type of the touch event. Then, theprocessor 1308 provides a corresponding visual output on the displaypanel according to the type of the touch event. Although, in FIG. 13,the touch-sensitive surface and the display panel are used as twoseparate parts to implement input and output functions, in someembodiments, the touch-sensitive surface and the display panel may beintegrated to implement the input and output functions.

The terminal may further include at least one sensor 1305, such as anoptical sensor, a motion sensor, and other sensors. Specifically, theoptical sensor may include an ambient light sensor and a proximitysensor. The ambient light sensor can adjust luminance of the displaypanel according to brightness of the ambient light. The proximity sensormay switch off the display panel and/or backlight when the terminal ismoved to the ear. As one type of motion sensor, a gravity accelerationsensor can detect magnitude of accelerations in various directions(generally on three axes), may detect magnitude and a direction of thegravity when static, and may be applied to an application thatrecognizes the attitude of the mobile phone (for example, switchingbetween landscape orientation and portrait orientation, a related game,and magnetometer attitude calibration), a function related to vibrationrecognition (such as a pedometer and a knock), and the like. Othersensors, such as a gyroscope, a barometer, a hygrometer, a thermometer,and an infrared sensor, which may be configured in the terminal, are notfurther described herein.

The audio circuit 1306, a speaker, and a microphone may provide audiointerfaces between the user and the terminal. The audio circuit 1306 mayconvert received audio data into an electric signal and transmit theelectric signal to the speaker. The speaker converts the electric signalinto a sound signal for output. On the other hand, the microphoneconverts a collected sound signal into an electric signal. The audiocircuit 1306 receives the electric signal and converts the electricsignal into audio data, and outputs the audio data to the processor 1308for processing. Then, the processor 1308 sends the audio data to, forexample, another terminal by using the RF circuit 1301, or outputs theaudio data to the memory 1302 for further processing. The audio circuit1306 may further include an earplug jack, so as to provide communicationbetween a peripheral earphone and the terminal.

WiFi is a short distance wireless transmission technology. The terminalmay help, by using the WiFi module 1307, the user to receive and sendemails, browse a web page, access streaming media, and so on, whichprovides wireless broadband internet access for the user. Although FIG.5 shows the WiFi module 1307, it may be understood that the WiFi module1307 is not a necessary component of the terminal, and when required,the WiFi module 1307 may be omitted as long as the scope of the essenceof the present disclosure is not changed.

The processor 1308 is the control center of the terminal, and isconnected to various parts of the mobile phone by using variousinterfaces and lines. By running or executing the software programand/or module stored in the memory 1302, and invoking data stored in thememory 1302, the processor 1308 performs various functions and dataprocessing of the terminal, thereby performing overall monitoring on themobile phone. In some embodiments, the processor 1308 may include one ormore processing cores. Preferably, the processor 1308 may integrate anapplication processor and a modem. The application processor mainlyprocesses an operating system, a user interface, an application program,and the like. The modem mainly processes wireless communication. It maybe understood that the foregoing modem may either not be integrated intothe processor 1308.

The terminal further includes the power supply 1309 (such as a battery)for supplying power to the components. Preferably, the power supply maybe logically connected to the processor 1308 by using a power managementsystem, thereby implementing functions such as charging, discharging andpower consumption management by using the power management system. Thepower supply 1309 may further include one or more of a direct current oralternating current power supply, a re-charging system, a power failuredetection circuit, a power supply converter or inverter, a power supplystate indicator, and any other components.

Although not shown in the figure, the terminal may further include acamera, a Bluetooth module, and the like, which are not furtherdescribed herein. Specifically, in this embodiment, the processor 1308in the terminal may run the one or more program instructions stored inthe memory 1302, so as to implement the operations performed by thefirst terminal or the second terminal in the network access methodaccording to the foregoing method embodiments.

A person skilled in the art of ordinary skill in the art shouldunderstand that all or a part of the operations of the network accessmethod in the foregoing embodiments may be implemented by a programinstructing relevant hardware. The program may be stored in anon-transitory computer readable storage medium, such as a read onlymemory (ROM), a random access memory (RAM), a magnetic disk, or anoptical disc.

Referring to FIG. 14, FIG. 14 is a structural block diagram of a serveraccording to some embodiments of the present disclosure. The server 1400includes a central processing unit (CPU) 1401, a system memory 1404including a random access memory (RAM) 1402 and a read only memory (ROM)1403, and a system bus 1405 connecting the system memory 1404 and thecentral processing unit 1401. The server 1400 further includes a basicinput/output system (I/O system) 1406 that helps the devices in thecomputer transmit information and a large capacity storage device 1407configured to store an operating system 1413, an application 1414, andanother program module 1418.

The basic input/output system 1406 includes a display 1408 configured todisplay information and an input device 1409, such as a mouse and akeyboard, configured to input information for a user. The display 1408and the input device 1409 are both connected to the central processingunit 1401 through an input/output controller 1410 connected to thesystem bus 1405. The basic input/output system 1406 may further includethe input/output controller 1410 configured to receive and processinputs from a plurality of other devices such as a keyboard, a mouse, oran electronic stylus. Similarly, the input/output controller 1410further provides outputs to a display screen, a printer, or an outputdevice of another type.

The large capacity storage device 1407 is connected to the centralprocessing unit 1401 through a large capacity storage controller (notshown) connected to the system bus 1405. The large capacity storagedevice 1407 and related computer readable media provide a non-volatilememory for the server 1400. That is, the large capacity storage device1407 may include non-transitory computer readable media (not shown) suchas a hard disk or a CD-ROM driver.

Without losing generality, the computer readable media may includecomputer storage media and a communication medium. The computer storagemedia include volatile/nonvolatile, removable/non-removable mediaimplemented by any method or technology and configured to storeinformation such as computer readable instructions, data structure,program module, or other data. The computer storage media include anRAM, a ROM, an EPROM, an EEPROM, a flash memory or another solid storagetechnology, a CD-ROM, a DVD or another optical memory, a cassette, amagnetic tape, or a magnetic disk memory or another magnetic storagedevice. Certainly, it can be learned by a person of ordinary skill inthe art that the computer storage media are not limited to the foregoingseveral types. The system memory 1404 and the large capacity storagedevice 1407 may be collectively referred to as memories.

According to the embodiments of the present disclosure, the server 1400may also be connected to a remote computer on the network for runningthrough a network such as the internet. That is, the server 1400 may beconnected to a network 1412 through a communication component 1411connected to the system bus 1405. Or, the server 1400 may also beconnected to a network of another type, or a remote computer system (notshown) by using the communication component 1411.

The memory further includes one or more programs. The one or moreprograms are stored in the memory and include instructions to beexecuted by the server in the network access method provided in theembodiments of the present disclosure.

A person skilled in the art of ordinary skill in the art shouldunderstand that all or a part of the operations of the network accessmethod in the foregoing embodiments may be implemented by a programinstructing relevant hardware. The program may be stored in anon-transitory computer readable storage medium, such as a read onlymemory (ROM), a random access memory (RAM), a magnetic disk, or anoptical disc.

The sequence numbers of the foregoing embodiments of the presentdisclosure are merely for the convenience of description, and do notimply the preference among the embodiments.

A person of ordinary skill in the art may understand that all or some ofthe operations of the foregoing embodiments may be implemented by usinghardware, or may be implemented by a program instructing relevanthardware. The program may be stored in a non-transitory computerreadable storage medium. The storage medium may be a read only memory, amagnetic disk, an optical disc, or the like.

The foregoing descriptions are merely embodiments of the presentdisclosure, but are not intended to limit the present disclosure. Anymodification, equivalent replacement, or improvement made within thespirit and principle of the present disclosure shall fall within theprotection scope of the present disclosure.

What is claimed is:
 1. A network access method performed at a computerserver in connection with a social networking platform, wherein thesocial networking platform is associated with a first social networkingaccount and a second social networking account, the computer serverhaving one or more processors and memory storing one or more programsfor execution by the one or more processors, the method comprising:receiving a binding instruction sent by the second social networkingaccount at a second terminal, the binding instruction carryinginformation of the second social networking account, an identifier of awireless network, and authorization information of the wireless network;binding the second social networking account, the identifier of thewireless network, and the authorization information of the wirelessnetwork according to the binding instruction; after the binding,receiving a network access request sent by the first social networkingaccount at a first terminal to the second social networking account atthe second terminal, the network access request including a message sentby the first terminal to access the wireless network bound to the secondsocial networking account; forwarding the network access requestincluding the message to the second social networking account, thenetwork access request including the first social networking account andan identifier of the wireless network; receiving a feedback instructionsent by the second social networking account; and sending authorizationinformation of the wireless network to the first social networkingaccount in accordance with a determination that the feedback instructionis an access authorization instruction, the authorization informationincluding verification information used for accessing the wirelessnetwork.
 2. The method according to claim 1, wherein the bindinginstruction further includes a location of the wireless network and thenetwork access request includes a location of the first terminal and themethod further comprises: denying the network access request inaccordance with a determination that the location of the first terminalis outside a predefined range of the location of the wireless network.3. The method according to claim 1, further comprising: before receivingthe network access request: providing the second social networkingaccount bound to the wireless network to the first terminal when thefirst social networking account is within an open range of the secondsocial networking account, wherein the open range comprises: open to aselected social networking account, or, open to a social networkingaccount having a predetermined attribute, or, open to a socialnetworking account having a social relation, or, open to all socialnetworking accounts; and the predetermined attribute comprises at leastone attribute of gender, age, education, place, hobbies, and personalexperience.
 4. The method according to claim 1, further comprising:after sending the authorization information of the wireless network tothe first social networking account: receiving first social networkinginformation that is sent by the first social networking account to thesecond social networking account, and forwarding the first socialnetworking information to the second terminal; and receiving secondsocial networking information that is sent by the second socialnetworking account to the first social networking account, andforwarding the second social networking information to the firstterminal.
 5. The method according to claim 1, further comprising:periodically collecting statistics about first data, the first datacomprising at least one of a duration for which the first terminal isconnected to the wireless network and data of traffic used by the firstterminal after accessing the wireless network; and transferring a firstresource from a first resource account corresponding to the first socialnetworking account to a second resource account corresponding to thesecond social networking account according to the first data.
 6. Themethod according to claim 1, further comprising: before forwarding thenetwork access request to the second social networking account:determining a relationship between the first social networking accountand the second social networking account at the social networkingplatform; in accordance with a determination that the first socialnetworking account is a direct contact of the second social networkingaccount at the social networking platform, sending the authorizationinformation of the wireless network to the first social networkingaccount without waiting for the feedback instruction from the secondsocial networking account; in accordance with a determination that thefirst social networking account and the second social networking accountare members of a group chat at the social networking platform, includingan identity of the group chat in the network access request to be sentto the second social networking account; and in accordance with adetermination that the first social networking account and the secondsocial networking account are not members of any group chat at thesocial networking platform, sending a connection invitation to thesecond social networking account, the connection invitation includingthe first social networking account and the identifier of the wirelessnetwork.
 7. The method according to claim 6, further comprising: aftersending the connection invitation to the second social networkingaccount: receiving a response from the second social networking account,the response indicating that the second social networking account grantsthe network access request; and in accordance with a determination thatthe second social networking account grants the network access request,establishing a direct contact relationship between the first socialnetworking account and the second social networking account at thesocial networking platform.
 8. A computer server in connection with asocial networking platform, wherein the social networking platform isassociated with a first social networking account and a second socialnetworking account, the computer server having one or more processors,memory, and one or more programs stored in the memory that, whenexecuted by the one or more processors, cause the computer server toperform a plurality of operations including: receiving a bindinginstruction sent by the second social networking account at a secondterminal, the binding instruction carrying information of the secondsocial networking account, an identifier of a wireless network, andauthorization information of the wireless network; binding the secondsocial networking account, the identifier of the wireless network, andthe authorization information of the wireless network according to thebinding instruction; after the binding, receiving a network accessrequest sent by the first social networking account at a first terminalto the second social networking account at the second terminal, thenetwork access request including a message sent by the first terminal toaccess the wireless network bound to the second social networkingaccount; forwarding the network access request including the message tothe second social networking account, the network access requestincluding the first social networking account and an identifier of thewireless network; receiving a feedback instruction sent by the secondsocial networking account; and sending authorization information of thewireless network to the first social networking account in accordancewith a determination that the feedback instruction is an accessauthorization instruction, the authorization information includingverification information used for accessing the wireless network.
 9. Thecomputer server according to claim 8, wherein the binding instructionfurther includes a location of the wireless network and the networkaccess request includes a location of the first terminal and the methodfurther comprises: denying the network access request in accordance witha determination that the location of the first terminal is outside apredefined range of the location of the wireless network.
 10. Thecomputer server according to claim 8, wherein the plurality ofoperations include: before receiving the network access request:providing the second social networking account bound to the wirelessnetwork to the first terminal when the first social networking accountis within an open range of the second social networking account, whereinthe open range comprises: open to a selected social networking account,or, open to a social networking account having a predeterminedattribute, or, open to a social networking account having a socialrelation, or, open to all social networking accounts; and thepredetermined attribute comprises at least one attribute of gender, age,education, place, hobbies, and personal experience.
 11. The computerserver according to claim 8, wherein the plurality of operationsinclude: after sending the authorization information of the wirelessnetwork to the first social networking account: receiving first socialnetworking information that is sent by the first social networkingaccount to the second social networking account, and forwarding thefirst social networking information to the second terminal; andreceiving second social networking information that is sent by thesecond social networking account to the first social networking account,and forwarding the second social networking information to the firstterminal.
 12. The computer server according to claim 8, wherein theplurality of operations include: periodically collecting statisticsabout first data, the first data comprising at least one of a durationfor which the first terminal is connected to the wireless network anddata of traffic used by the first terminal after accessing the wirelessnetwork; and transferring a first resource from a first resource accountcorresponding to the first social networking account to a secondresource account corresponding to the second social networking accountaccording to the first data.
 13. The computer server according to claim8, wherein the plurality of operations include: before forwarding thenetwork access request to the second social networking account:determining a relationship between the first social networking accountand the second social networking account at the social networkingplatform; in accordance with a determination that the first socialnetworking account is a direct contact of the second social networkingaccount at the social networking platform, sending the authorizationinformation of the wireless network to the first social networkingaccount without waiting for the feedback instruction from the secondsocial networking account; in accordance with a determination that thefirst social networking account and the second social networking accountare members of a group chat at the social networking platform, includingan identity of the group chat in the network access request to be sentto the second social networking account; and in accordance with adetermination that the first social networking account and the secondsocial networking account are not members of any group chat at thesocial networking platform, sending a connection invitation to thesecond social networking account, the connection invitation includingthe first social networking account and the identifier of the wirelessnetwork.
 14. The computer server according to claim 13, wherein theplurality of operations include: after sending the connection invitationto the second social networking account: receiving a response from thesecond social networking account, the response indicating that thesecond social networking account grants the network access request; andin accordance with a determination that the second social networkingaccount grants the network access request, establishing a direct contactrelationship between the first social networking account and the secondsocial networking account at the social networking platform.
 15. Anon-transitory computer readable storage medium storing one or moreprograms that, when executed by one or more processors of a computerserver in connection with a social networking platform, wherein thesocial networking platform is associated with a first social networkingaccount and a second social networking account, cause the computerserver to perform a plurality of operations including: receiving abinding instruction sent by the second social networking account at asecond terminal, the binding instruction carrying information of thesecond social networking account, an identifier of a wireless network,and authorization information of the wireless network; binding thesecond social networking account, the identifier of the wirelessnetwork, and the authorization information of the wireless networkaccording to the binding instruction; after the binding, receiving anetwork access request sent by the first social networking account at afirst terminal to the second social networking account at the secondterminal, the network access request including a message sent by thefirst terminal to access the wireless network bound to the second socialnetworking account; forwarding the network access request including themessage to the second social networking account, the network accessrequest including the first social networking account and an identifierof the wireless network; receiving a feedback instruction sent by thesecond social networking account; and sending authorization informationof the wireless network to the first social networking account inaccordance with a determination that the feedback instruction is anaccess authorization instruction, the authorization informationincluding verification information used for accessing the wirelessnetwork.
 16. The non-transitory computer readable storage mediumaccording to claim 15, wherein the binding instruction further includesa location of the wireless network and the network access requestincludes a location of the first terminal and the method furthercomprises: denying the network access request in accordance with adetermination that the location of the first terminal is outside apredefined range of the location of the wireless network.
 17. Thenon-transitory computer readable storage medium according to claim 15,wherein the plurality of operations include: before receiving thenetwork access request: providing the second social networking accountbound to the wireless network to the first terminal when the firstsocial networking account is within an open range of the second socialnetworking account, wherein the open range comprises: open to a selectedsocial networking account, or, open to a social networking accounthaving a predetermined attribute, or, open to a social networkingaccount having a social relation, or, open to all social networkingaccounts; and the predetermined attribute comprises at least oneattribute of gender, age, education, place, hobbies, and personalexperience.