Network access method, device, and system

ABSTRACT

A network access method includes: establishing a BLUETOOTH connection to a BLUETOOTH terminal; receiving, using the BLUETOOTH connection, a network access request from the BLUETOOTH terminal; and when the BLUETOOTH terminal is an authorized device, activating a BLUETOOTH network sharing function automatically and forwarding the network access request to a wide area network.

CROSS REFERENCE AND RELATED APPLICATIONS

This is a continuation of U.S. patent application Ser. No. 17/081,537 filed on Oct. 27, 2020, which is a continuation of U.S. patent application Ser. No. 16/444,581 filed on Jun. 18, 2019, now U.S. Pat. No. 10,848,946, which is a continuation of U.S. patent application Ser. No. 16/006,212 filed on Jun. 12, 2018, now U.S. Pat. No. 10,356,588, which is a continuation of U.S. patent application Ser. No. 15/634,353 filed on Jun. 27, 2017, now U.S. Pat. No. 10,021,732, which is a continuation of U.S. patent application Ser. No. 14/851,321 filed on Sep. 11, 2015, now U.S. Pat. No. 9,712,952, which is a continuation of International Patent Application No. PCT/CN2014/073335 filed on Mar. 13, 2014, which claims priority to Chinese Patent Application No. 201310079398.8 filed on Mar. 13, 2013. All of the disclosures of the aforementioned patent applications are hereby incorporated by reference in their entireties.

TECHNICAL FIELD

Embodiments of the present disclosure relate to the field of communications technologies, and in particular, to a network access method, device, and system.

BACKGROUND

An electronic device such as a personal digital assistance (PDA) and a mobile phone can access a network, so as to implement operations such as web browsing, email sending and receiving, and data downloading. The electronic device can access a network in multiple manners. For example, the mobile phone can access a third-generation (3G) or fourth-generation (4G) network using a subscriber identity module (SIM) card; and the PDA can access the Internet network using a Wi-Fi hotspot. However, in an area beyond the coverage of the Wi-Fi hotspot, the PDA cannot access the network using the Wi-Fi hotspot.

At present, some electronic devices provide a BLUETOOTH access point (AP) function, that is, a BLUETOOTH network sharing function. Using the BLUETOOTH network sharing function, these electronic devices can serve as an AP to provide another electronic device that needs to access the network with a network connection. Based on the foregoing BLUETOOTH network sharing function, in an area beyond the coverage of a Wi-Fi hotspot, the PDA can access the network using the electronic device having the BLUETOOTH network sharing function. For example, the PDA may access the network using a mobile phone having the BLUETOOTH network sharing function, and a network access process includes that the mobile phone establishes a BLUETOOTH connection to the PDA, and then a user turns on the BLUETOOTH network sharing function of the mobile phone manually, so as to provide the PDA with a network connection.

However, in the foregoing method in which the PDA accesses the network using a mobile phone having the BLUETOOTH network sharing function, for each operation, the user needs to turn on the BLUETOOTH network sharing function (BLUETOOTH AP function) of the electronic device through manual configuration, which is a troublesome process and leads to an excessively long time to access a network.

SUMMARY

The present disclosure provides a network access method, device, and system, which achieves a simple operation and low time consumption for a BLUETOOTH terminal to access a network.

A first aspect of the present application provides a network access method, including establishing a BLUETOOTH connection to a BLUETOOTH terminal; receiving, using the BLUETOOTH connection, a network access request sent by the BLUETOOTH terminal; and if the BLUETOOTH terminal is an authorized device, activating a BLUETOOTH network sharing function automatically and forwarding the network access request to a wide area network.

In a first possible implementation manner of the first aspect, before the establishing a BLUETOOTH connection to a BLUETOOTH terminal, the method further includes performing BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receiving an authorization request sent by the BLUETOOTH terminal; and accepting the authorization request, and identifying the BLUETOOTH terminal as an authorized device.

In a second possible implementation manner of the first aspect, after the establishing a BLUETOOTH connection to a BLUETOOTH terminal and before the determining whether the BLUETOOTH terminal is an authorized device, the method further includes prompting a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and after the authorization confirmation instruction is received, identifying the BLUETOOTH terminal as an authorized device.

With reference to the first aspect of the present application, the first possible implementation manner of the first aspect, or the second possible implementation manner of the first aspect, in a third possible implementation manner, the method further includes after the network access request is forwarded to the wide area network, if a new network access request is not received within a preset time, turning off the BLUETOOTH network sharing function.

A second aspect of the present application provides a computer storage medium, where, the computer storage medium stores a computer program, and when the computer program in the computer storage medium is read in a computer, the computer program can enable the computer to implement the steps according to any possible implementation of the first aspect of present application.

A third aspect of the present application provides a network access device, including a connection module configured to perform BLUETOOTH connection to a BLUETOOTH terminal; a receiving module configured to receive a network access request sent by the BLUETOOTH terminal connected to the BLUETOOTH connection module; an activating module configured to activate a BLUETOOTH network sharing module automatically when the BLUETOOTH terminal is an authorized device; and the BLUETOOTH network sharing module configured to forward the network access request received by the receiving module to a wide area network.

In a first possible implementation manner of the third aspect, the device further includes a pairing module and a first authorization module, where, the pairing module is configured to perform BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receive an authorization request sent by the BLUETOOTH terminal; and the first authorization module is configured to accept the authorization request received by the pairing module and identify the BLUETOOTH terminal as an authorized device.

In a second possible implementation manner of the third aspect, the device further includes a human-computer interaction module and a second authorization module, where, the human-computer interaction module is configured to prompt a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and the second authorization module is configured to identify the BLUETOOTH terminal as an authorized device according to the authorization confirmation instruction received by the human-computer interaction module.

With reference to the third aspect of the present application, the first possible implementation manner of the third aspect, or the second possible implementation manner of the third aspect, in a third possible implementation manner, the device further includes a turn-off module configured to after the BLUETOOTH network sharing module forwards the network access request to the wide area network, if a new network access request is not received within a preset time, turn off the BLUETOOTH network sharing function.

A fourth aspect of the present application provides a network access device, including a memory and a processor, where, the memory is configured to store a set of program code; and the processor is configured to call the program code stored in the memory and execute establishing a BLUETOOTH connection to a BLUETOOTH terminal; receiving, using the BLUETOOTH connection, a network access request sent by the BLUETOOTH terminal; and if the BLUETOOTH terminal is an authorized device, activating a BLUETOOTH network sharing function automatically and forwarding the network access request to a wide area network.

In a first possible implementation manner of the fourth aspect, before the establishing a BLUETOOTH connection to a BLUETOOTH terminal, the processor is further configured to execute performing BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receiving an authorization request sent by the BLUETOOTH terminal; and accepting the authorization request, and identifying the BLUETOOTH terminal as an authorized device.

In a second possible implementation manner of the fourth aspect, after the establishing a BLUETOOTH connection to a BLUETOOTH terminal and before the determining whether the BLUETOOTH terminal is an authorized device, the processor is further configured to execute prompting a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and after the authorization confirmation instruction is received, identifying the BLUETOOTH terminal as an authorized device.

With reference to the fourth aspect of the present application, the first possible implementation manner of the fourth aspect, or the second possible implementation manner of the fourth aspect, in a third possible implementation manner, the processor is further configured to execute after the network access request is forwarded to the wide area network, if a new network access request is not received within a preset time, turning off the BLUETOOTH network sharing function.

A fifth aspect of the present application provides a network access system, including a BLUETOOTH terminal and a network access device, where, the BLUETOOTH terminal is configured to after establishing a BLUETOOTH connection to the network access device, send a network access request to the network access device; and the network access device is configured to when the BLUETOOTH terminal is an authorized device or not, activate a BLUETOOTH network sharing function automatically and forward the network access request to a wide area network.

In a first possible implementation manner of the fifth aspect, before the establishing a BLUETOOTH connection to the BLUETOOTH terminal, the network access device is further configured to perform BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receive an authorization request sent by the BLUETOOTH terminal; and identify the BLUETOOTH terminal as an authorized device.

In a second possible implementation manner of the fifth aspect, after the establishing a BLUETOOTH connection to the BLUETOOTH terminal and before the determining whether the BLUETOOTH terminal is an authorized device, the network access device is further configured to prompt a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and after the authorization confirmation instruction is received, identify the BLUETOOTH terminal as an authorized device.

With reference to the fifth aspect of the present application, the first possible implementation manner of the fifth aspect, or the second possible implementation manner of the fifth aspect, in a third possible implementation manner, the network access device is further configured to after the network access request is forwarded to the wide area network, when a new network access request is not received within a preset time, turn off the BLUETOOTH network sharing function.

In the present disclosure, when a network access request sent by a BLUETOOTH terminal is received, and when it is determined that the BLUETOOTH terminal is an authorized device, a BLUETOOTH network sharing function is activated automatically and the network access request is forwarded to a wide area network, so as to enable the BLUETOOTH terminal to access a network. When a BLUETOOTH terminal that needs to access a network is an authorized device, a BLUETOOTH network sharing function can be activated automatically in the present disclosure, so as to achieve a simple operation and low time consumption for a BLUETOOTH terminal to access a network.

BRIEF DESCRIPTION OF DRAWINGS

To describe the technical solutions in the embodiments of the present disclosure more clearly, the following briefly introduces the accompanying drawings required for describing the embodiments. The accompanying drawings in the following description show merely some embodiments of the present disclosure, and a person of ordinary skill in the art may still derive other drawings from these accompanying drawings without creative efforts.

FIG. 1 is a flowchart of a network access method according to an embodiment of the present disclosure;

FIG. 2 is a flowchart of another network access method according to an embodiment of the present disclosure;

FIG. 3 is a flowchart of still another network access method according to an embodiment of the present disclosure;

FIG. 4 is a structural diagram of a network access device according to an embodiment of the present disclosure;

FIG. 5 is a structural diagram of another network access device according to an embodiment of the present disclosure;

FIG. 6 is a structural diagram of still another network access device according to an embodiment of the present disclosure;

FIG. 7 is a structural diagram of still yet another network access device according to an embodiment of the present disclosure;

FIG. 8 is a structural diagram of a network access device according to an embodiment of the present disclosure; and

FIG. 9 is a structural diagram of a network access system according to an embodiment of the present disclosure.

DESCRIPTION OF EMBODIMENTS

The following clearly describes the technical solutions in the embodiments of the present disclosure with reference to the accompanying drawings in the embodiments of the present disclosure. The described embodiments are merely some but not all of the embodiments of the present disclosure. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present disclosure without creative efforts shall fall within the protection scope of the present disclosure.

Referring to FIG. 1 , FIG. 1 is a flowchart of a network access method according to an embodiment of the present disclosure. This embodiment is executed by an electronic device having a BLUETOOTH AP function, for example, a mobile phone. A BLUETOOTH terminal described in this embodiment is an electronic device that has a BLUETOOTH function and needs to access a network, for example, a PDA. As shown in FIG. 1 , the network access method provided in this embodiment includes the following steps.

101. Establish a BLUETOOTH connection to a BLUETOOTH terminal.

102. Receive, using the BLUETOOTH connection, a network access request sent by the BLUETOOTH terminal.

After the connection is established to the BLUETOOTH terminal, if the BLUETOOTH terminal needs to access a network, the BLUETOOTH terminal sends the network access request, for example, a Hypertext Transfer Protocol (HTTP) request.

Optionally, in a possible implementation manner of this embodiment, before the BLUETOOTH connection to the BLUETOOTH terminal is established, the network access method provided in this embodiment may further include performing BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receiving an authorization request sent by the BLUETOOTH terminal; and accepting the authorization request, and identifying the BLUETOOTH terminal as an authorized device.

For security reasons, BLUETOOTH pairing needs to be performed before communication is performed between two BLUETOOTH devices, and then data can be exchanged. Pairing (also referred to as binding sometimes) refers to a process in which two BLUETOOTH devices exchange protection keys with each other. After pairing succeeds, all information sent between the BLUETOOTH devices using the BLUETOOTH connection is encrypted and can only reach a BLUETOOTH device that is permitted by the pairing to receive the information. Once pairing between the BLUETOOTH devices succeeds, the connection can be established.

Using signaling in a process of the BLUETOOTH pairing, the entity executing this embodiment can receive the authorization request. The authorization request may be a protocol agreed upon between the entity executing this embodiment and the BLUETOOTH terminal. After receiving the protocol, the entity executing this embodiment accepts the authorization request and identifies the BLUETOOTH terminal as an authorized device automatically.

Optionally, in another possible implementation manner of this embodiment, after the entity executing this embodiment establishes the BLUETOOTH connection to the BLUETOOTH terminal and before the entity executing this embodiment determines whether the BLUETOOTH terminal is an authorized device, the network access method provided in this embodiment may further include prompting a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and after the authorization confirmation instruction is received, identifying the BLUETOOTH terminal as an authorized device.

The entity executing this embodiment stores an authorization record. When an authorized BLUETOOTH terminal initiates a network request again, the entity executing this embodiment can directly search the authorization record to find whether the BLUETOOTH terminal that initiates the network request currently is an authorized device.

103. If the BLUETOOTH terminal is an authorized device, activate a BLUETOOTH network sharing function automatically and forward the network access request to a wide area network.

The entity executing this embodiment determines whether the BLUETOOTH terminal that initiates the network access request currently is an authorized device. If the BLUETOOTH terminal is an authorized device, the entity executing this embodiment activates the BLUETOOTH network sharing function automatically. Optionally, a method for determining whether the BLUETOOTH device that initiates the network access request is an authorized device may be searching an authorization record to find whether authorization for the BLUETOOTH device is included, where if the authorization for the BLUETOOTH device is included, the BLUETOOTH device is an authorized device.

The entity executing this embodiment can provide the BLUETOOTH terminal with a network access service by means of an access control list (ACL) of BLUETOOTH. When the BLUETOOTH terminal is an authorized device, the entity executing this embodiment activates the BLUETOOTH network sharing function automatically and forwards the network access request to a corresponding server in the wide area network by means of the ACL, so as to obtain requested content.

Optionally, in order to prevent the BLUETOOTH network sharing function from being activated in a case in which the BLUETOOTH network sharing function is not required, which leads to a waste of power and resources, and also in order to further improve user experience, in this embodiment, after the network access request is received and the network access request is forwarded to the wide area network, if a new network access request is not received within a preset time, the BLUETOOTH network sharing function is turned off. The preset time herein may be set to a proper time value according to a specific application, which is not limited herein.

This embodiment further protects a computer storage medium. The computer storage medium stores a computer program, and when the computer program in the computer storage medium is read in a computer, the computer program can enable the computer to implement the foregoing steps in this embodiment.

In this embodiment, when a network access request sent by a BLUETOOTH terminal is received, and when it is determined that the BLUETOOTH terminal is an authorized device, a BLUETOOTH network sharing function is activated automatically and the network access request is forwarded to a wide area network, so as to enable the BLUETOOTH terminal to access a network. When a BLUETOOTH terminal that needs to access a network is an authorized device, a BLUETOOTH network sharing function can be activated automatically in the present disclosure, so as to achieve a simple operation and low time consumption for a BLUETOOTH terminal to access a network.

Referring to FIG. 2 , FIG. 2 is a flowchart of another network access method according to an embodiment of the present disclosure, where a BLUETOOTH terminal is a PDA, and an electronic device that provides the PDA with a BLUETOOTH network sharing function is a mobile phone having a BLUETOOTH AP function. As shown in FIG. 2 , the method in this embodiment includes the following steps.

201. A mobile phone performs BLUETOOTH pairing with a PDA, and the mobile phone receives an authorization request sent by the PDA.

Optionally, using signaling in a process of the BLUETOOTH pairing, the PDA sends an authorization request, and the authorization request may be a protocol agreed upon between the mobile phone and the PDA.

202. The mobile phone accepts the authorization request and identifies the PDA as an authorized device.

203. The mobile phone establishes a BLUETOOTH connection to the PDA.

204. The mobile phone receives a network access request sent by the PDA.

The network access request may be an HTTP request.

205. When the PDA is an authorized device, the mobile phone activates the BLUETOOTH network sharing function.

206. The mobile phone provides the PDA with a network connection.

For a method for providing the PDA with a network connection by the mobile phone, refer to the embodiment of FIG. 1 , and details are not described herein again.

207. If the mobile phone does not receive a new network request within a preset time, the mobile phone turns off the BLUETOOTH network sharing function.

After the mobile phone forwards a previous network access request to a wide area network, if a new network access request is not received within a preset time, the mobile phone turns off the BLUETOOTH network sharing function.

In this embodiment, using signaling in a process of BLUETOOTH pairing, a PDA sends an agreed-upon authorization request protocol to a mobile phone, so that the mobile phone identifies the PDA as an authorized device, and when the PDA initiates a network request subsequently, the mobile phone identifies the PDA automatically and turns on a BLUETOOTH AP function for the PDA. In this embodiment, the PDA can access a network using BLUETOOTH without Wi-Fi, achieving a simple process and low time consumption for network access.

Referring to FIG. 3 , FIG. 3 is a flowchart of still another network access method according to an embodiment of the present disclosure, where a BLUETOOTH terminal is a PDA, and an electronic device that provides the PDA with a BLUETOOTH network sharing function is a mobile phone having a BLUETOOTH AP function. As shown in FIG. 3 , the method in this embodiment includes the following steps.

301. A mobile phone performs BLUETOOTH pairing with a PDA.

302. The mobile phone establishes a BLUETOOTH connection to the PDA.

303. The mobile phone prompts a user to input an authorization confirmation instruction using a human-computer interaction manner.

The human-computer interaction manner may be the mobile phone displays, on a screen, information that prompts the user whether to confirm authorization for the device, and the user may confirm authorization using a corresponding confirmation button and may abandon authorization using a corresponding cancel button.

304. The mobile phone receives the authorization confirmation instruction input by the user.

305. The mobile phone identifies the PDA as an authorized device.

When the user inputs the authorization confirmation instruction using the corresponding confirmation button, the mobile phone identifies the PDA as an authorized device after receiving the confirmation instruction.

306. The mobile phone receives a network access request sent by the PDA.

The network access request may be an HTTP request.

Step 303 to step 305 may also be executed after step 306. After the mobile phone performs the BLUETOOTH pairing with the PDA, the mobile phone does not immediately prompt the user to input an authorization confirmation instruction. However, after step 306, the mobile phone is triggered to execute step 303 after receiving the network access request sent by the PDA, and execute step 305 after receiving the authorization confirmation instruction input by the user.

307. When the PDA is an authorized device, the mobile phone activates the BLUETOOTH network sharing function.

308. The mobile phone provides the PDA with a network connection.

For a method for providing the PDA with a network connection by the mobile phone, refer to the embodiment of FIG. 1 , and details are not described herein again.

309. If the mobile phone does not receive a new network request within a preset time, the mobile phone turns off the BLUETOOTH network sharing function.

After the mobile phone forwards a previous network access request to a wide area network, if the mobile phone does not receive a new network access request within a preset time, the mobile phone turns off the BLUETOOTH network sharing function. For details, refer to the embodiment of FIG. 1 , and details are not described herein again.

In this embodiment, authorization for a PDA by a mobile phone needs to be confirmed by a user manually, and the user determines whether to authorize the PDA to use a BLUETOOTH AP function, which can prevent a case in which any PDA can access a network using the mobile phone of the user, which leads to a resource waste of the mobile phone of the user.

Referring to FIG. 4 , FIG. 4 is a structural diagram of a network access device according to an embodiment of the present disclosure. The network access device may be a mobile phone having a BLUETOOTH AP function, and the like. The network access device includes a connection module 401 configured to perform BLUETOOTH connection to a BLUETOOTH terminal; a receiving module 402 configured to receive a network access request sent by the BLUETOOTH terminal connected to the BLUETOOTH connection module 401; an activating module 403 configured to activate a BLUETOOTH network sharing module 405 automatically when the network access device is an authorized device; and the BLUETOOTH network sharing module 404 is configured to forward the network access request received by the receiving module 402 to a wide area network.

Optionally, in a possible implementation manner of the network access device provided in this embodiment, the network access device may also include a pairing module 405 and a first authorization module 406, where, as shown in FIG. 5 , the pairing module 405 is configured to perform BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receive an authorization request sent by the BLUETOOTH terminal; and the first authorization module 406 is configured to accept the authorization request received by the pairing module 405 and identify the BLUETOOTH terminal as an authorized device.

In this implementation manner, using signaling in a process of the BLUETOOTH pairing, the BLUETOOTH terminal sends an agreed-upon authorization request protocol to the mobile phone, so that the network access device identifies the BLUETOOTH terminal as an authorized device, and when the BLUETOOTH terminal initiates a network request again subsequently, the network access device identifies the BLUETOOTH terminal automatically and turns on the BLUETOOTH AP function for the BLUETOOTH terminal.

Optionally, in a possible implementation manner of the network access device provided in this embodiment, the network access device may also include a human-computer interaction module 407 and a second authorization module 408, where, as shown in FIG. 6 , the human-computer interaction module 407 is configured to prompt a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and the second authorization module 408 is configured to identify, according to the authorization confirmation instruction received by the human-computer interaction module 407, the BLUETOOTH terminal as an authorized device; where in specific implementation, the second authorization module 408 may identify the BLUETOOTH terminal corresponding to the authorization instruction as an authorized device after the human-computer interaction module 407 receives the authorization confirmation instruction.

In this implementation manner, authorization for the BLUETOOTH terminal by the network access device needs to be confirmed by the user manually, and the user determines whether to authorize the BLUETOOTH terminal to share the BLUETOOTH network function, which can prevent a case in which any BLUETOOTH terminal can access a network using the network access device, which leads to a resource waste of the network access device.

Optionally, this embodiment may further include a determining module 409, as shown in FIG. 7 . The determining module 409 is configured to determine whether the BLUETOOTH device that initiates the network access request currently is an authorized device. For a specific determining method, refer to the foregoing embodiments for a specific determining method, and details are not described herein again. A determining result of the determining module 409 serves as a basis for whether to activate the BLUETOOTH network sharing module 405 by the activating module 403. For details, refer to the foregoing description of the activating module 403, and details are not described herein again.

After the network access device provided in this embodiment succeeds in performing BLUETOOTH pairing with a BLUETOOTH terminal and establishes a BLUETOOTH connection, the network access device, after receiving a network request sent by the BLUETOOTH terminal, determines whether the BLUETOOTH terminal is an authorized device, and if the BLUETOOTH terminal is an authorized device, a BLUETOOTH network sharing function is activated automatically, so as to enable the BLUETOOTH terminal to access a network. The network access device provided in this embodiment achieves a simple process and low time consumption for a BLUETOOTH terminal to access a network.

Referring to FIG. 8 , FIG. 8 is a structural diagram of a network access device according to an embodiment of the present disclosure, and the network access device includes a memory 501 and a processor 502, where the memory 501 is configured to store a set of program code; and the processor 502 is configured to call the program code stored in the memory 501 and execute establishing a BLUETOOTH connection to a BLUETOOTH terminal; receiving, using the BLUETOOTH connection, a network access request sent by the BLUETOOTH terminal; and if the BLUETOOTH terminal is an authorized device, activating a BLUETOOTH network sharing function automatically and forwarding the network access request to a wide area network.

Optionally, before establishing the BLUETOOTH connection to the BLUETOOTH terminal, the processor 502 is further configured to execute performing BLUETOOTH pairing with the BLUETOOTH terminal, and during a process of the BLUETOOTH pairing, receiving an authorization request sent by the BLUETOOTH terminal; and identifying the BLUETOOTH terminal as an authorized device.

Optionally, after establishing the BLUETOOTH connection to the BLUETOOTH terminal and before determining whether the BLUETOOTH terminal is an authorized device, the processor 502 is further configured to execute prompting a user to input an authorization confirmation instruction of the BLUETOOTH terminal using a human-computer interaction manner; and after the authorization confirmation instruction is received, identifying the BLUETOOTH terminal as an authorized device.

Optionally, the processor 502 is further configured to execute after the network access request is forwarded to the wide area network, if a new network access request is not received within a preset time, turning off the BLUETOOTH network sharing function.

After the network access device provided in this embodiment succeeds in performing BLUETOOTH pairing with a BLUETOOTH terminal and establishes a BLUETOOTH connection, the network access device, after receiving a network request sent by the BLUETOOTH terminal, determines whether the BLUETOOTH terminal is an authorized device, and if the BLUETOOTH terminal is an authorized device, a BLUETOOTH network sharing function is activated automatically, so that the BLUETOOTH terminal accesses a network. The network access device provided in this embodiment achieves a simple process and low time consumption for a BLUETOOTH terminal to access a network.

Referring to FIG. 9 , FIG. 9 is a structural diagram of a network access system according to an embodiment of the present disclosure, and the network access system includes a BLUETOOTH terminal 601 and a network access device 602.

The BLUETOOTH terminal 601 is configured to after establishing a BLUETOOTH connection to the network access device 602, send a network access request to the network access device 602.

The network access device 602 is configured to when the BLUETOOTH terminal 601 is an authorized device, activate a BLUETOOTH network sharing function automatically and forward the network access request to a wide area network.

Optionally, in a possible implementation manner of the network access system provided in this embodiment, before establishing the BLUETOOTH connection to the BLUETOOTH terminal 601, the network access device 602 is further configured to perform BLUETOOTH pairing with the BLUETOOTH terminal 601, and during a process of the BLUETOOTH pairing, receive an authorization request sent by the BLUETOOTH terminal 601; and accept the authorization request, and identify the BLUETOOTH terminal 601 as an authorized device.

Optionally, in another possible implementation manner of the network access system provided in this embodiment, after establishing the BLUETOOTH connection to the BLUETOOTH terminal 601 and before determining whether the BLUETOOTH terminal 601 is an authorized device, the network access device 602 is further configured to prompt a user to input an authorization confirmation instruction of the BLUETOOTH terminal 601 using a human-computer interaction manner; and after the authorization confirmation instruction is received, identify the BLUETOOTH terminal 601 as an authorized device.

Optionally, the network access device 602 is further configured to after the network access request is forwarded to the wide area network, if a new network access request is not received within a preset time, turn off the BLUETOOTH network sharing function.

In this embodiment, after the network access device succeeds in performing BLUETOOTH pairing with a BLUETOOTH terminal and establishes a BLUETOOTH connection, the network access device, after receiving a network request sent by the BLUETOOTH terminal, determines whether the BLUETOOTH terminal is an authorized device, and if the BLUETOOTH terminal is an authorized device, a BLUETOOTH network sharing function is activated automatically, so as to enable the BLUETOOTH terminal to access a network. In this embodiment, a simple process operation and low time consumption are achieved for a BLUETOOTH terminal to access a network.

A person of ordinary skill in the art may understand that all or some of the processes of the methods in the embodiments may be implemented by a computer program instructing relevant hardware. The program may be stored in a computer readable storage medium. When the program runs, the processes of the methods in the embodiments are performed. The foregoing storage medium may include a magnetic disk, an optical disc, a read-only memory (ROM), or a random-access memory (RAM).

What is disclosed above is merely exemplary embodiments of the present disclosure, and certainly is not intended to limit the protection scope of the present disclosure. Therefore, equivalent variations made in accordance with the claims of the present disclosure shall fall within the scope of the present disclosure. 

What is claimed is:
 1. A network access method performed by a first terminal, the network access method comprising: performing pairing with a second terminal using a BLUETOOTH connection; receiving an authorization request from the second terminal during the pairing; accepting the authorization request; identifying the second terminal as an authorized device; receiving, using the BLUETOOTH connection and from the second terminal, a network access request; and forwarding, responsive to the second terminal being the authorized device, the network access request to a wide area network.
 2. The network access method of claim 1, wherein before the receiving the authorization request, the network access method further comprises prompting a user to input, to the first terminal, an authorization confirmation instruction to authorize the second terminal.
 3. The network access method of claim 1, further comprising turning on a BLUETOOTH network sharing function when receiving the network access request.
 4. The network access method of claim 3, wherein after forwarding the network access request, the network access method further comprises turning off, when a new network access request is not received from the second terminal within a preset time, the BLUETOOTH network sharing function.
 5. The network access method of claim 1, wherein the wide area network comprises a Wi-Fi network.
 6. The network access method of claim 1, wherein the network access request is a Hypertext Transfer Protocol (HTTP) request.
 7. The network access method of claim 1, wherein before forwarding the network access request, the network access method further comprises determining the second terminal is the authorized device.
 8. A first terminal, comprising: a memory configured to store instructions; and a processor coupled to the memory and configured to execute the instructions to cause the first terminal to: perform pairing with a second terminal using a BLUETOOTH connection; receive an authorization request from the second terminal during the pairing; accept the authorization request; identify the second terminal as an authorized device; receive, using the BLUETOOTH connection, a network access request from the second terminal; and forward, responsive to the second terminal being the authorized device, the network access request to a wide area network.
 9. The first terminal of claim 8, wherein the processor is further configured to execute the instructions to cause the first terminal to, before receiving the authorization request, prompt a user to input an authorization confirmation instruction to authorize the second terminal.
 10. The first terminal of claim 8, wherein the processor is further configured to execute the instructions to cause the first terminal to turn on a BLUETOOTH network sharing function when the first terminal receives the network access request.
 11. The first terminal of claim 10, wherein the processor is further configured to execute the instructions to cause the first terminal to, after forwarding the network access request, turn off, when a new network access request is not received from the second terminal within a preset time, the BLUETOOTH network sharing function.
 12. The first terminal of claim 8, wherein the wide area network comprises a Wi-Fi network.
 13. The first terminal of claim 8, wherein the network access request is a Hypertext Transfer Protocol (HTTP) request.
 14. The first terminal of claim 8, wherein the processor is further configured to execute the instructions to cause the first terminal to, before forwarding the network access request, determine the second terminal is the authorized device.
 15. A computer program product comprising instructions that are stored on a non-transitory computer-readable medium and that, when executed by a processor, cause a first terminal to: perform pairing with a second terminal using a BLUETOOTH connection; receive an authorization request from the second terminal during the pairing; accept the authorization request; identify the second terminal as an authorized device; receive, using the BLUETOOTH connection, a network access request from the second terminal; and forward, responsive to the second terminal being the authorized device, the network access request to a wide area network.
 16. The computer program product of claim 15, wherein when executed by the processor, the instructions further cause the first terminal to, before receiving the authorization request, prompt a user to input an authorization confirmation instruction to authorize the second terminal.
 17. The computer program product of claim 15, wherein when executed by the processor, the instructions further cause the first terminal to turn on a BLUETOOTH network sharing function when the first terminal receives the network access request.
 18. The computer program product of claim 17, wherein when executed by the processor, the instructions cause the first terminal to, after forwarding the network access request, turn off, when a new network access request is not received from the second terminal within a preset time, the BLUETOOTH network sharing function.
 19. The computer program product of claim 15, wherein the wide area network comprises a Wi-Fi network.
 20. The computer program product of claim 15, wherein the network access request is a Hypertext Transfer Protocol (HTTP) request. 