Abstract:
This application provides a call method, a call apparatus, a VOIP server, and a call system. The call method includes: receiving, by a VOIP server, a first call request that is forwarded by a first VOIP gateway and that includes a local identifier; acquiring, by the VOIP server according to a prestored association relationship, a destination identifier that corresponds to the local identifier; searching, by the VOIP server, for a visited location GMSC to which the destination identifier belongs; and sending, by the VOIP server, a second call request including the destination identifier to the visited location GMSC, so that the visited location GMSC calls the destination identifier.
Abstract:
A wireless local area network (WLAN) access method, a terminal, and a server implement intelligentization and simplify a user operation. The method includes sending, by the terminal, a request for querying an available wireless access point to a server; sending, by the server according to the query request, obtained information about the available wireless access point; then, receiving, by the terminal, wireless access point information returned by the server, and determining a specific wireless access point from the received wireless access point information; then, sending, by the terminal, an authentication information request of the specific wireless access point to the server; and when receiving the request, sending, by the server, authentication information corresponding to the specific wireless access point to the terminal, where the authentication information is used to connect the terminal to the specific wireless access point.
Abstract:
A wireless local area network (WLAN) access method, a terminal, and a server implement intelligentization and simplify a user operation. The method includes sending, by the terminal, a request for querying an available wireless access point to a server; sending, by the server according to the query request, obtained information about the available wireless access point; then, receiving, by the terminal, wireless access point information returned by the server, and determining a specific wireless access point from the received wireless access point information; then, sending, by the terminal, an authentication information request of the specific wireless access point to the server; and when receiving the request, sending, by the server, authentication information corresponding to the specific wireless access point to the terminal, where the authentication information is used to connect the terminal to the specific wireless access point.
Abstract:
A wireless local area network (WLAN) access method includes sending, by a terminal, a request for querying an available wireless access point to a server. The method further includes sending, by the server according to the query request, obtained information about the available wireless access point. The method further includes receiving, by the terminal, wireless access point information returned by the server, and determining a specific wireless access point from the received wireless access point information. The method further includes sending, by the terminal, an authentication information request of the specific wireless access point to the server. The method further includes when receiving the request, sending, by the server, authentication information corresponding to the specific wireless access point to the terminal, where the authentication information is used to connect the terminal to the specific wireless access point.
Abstract:
Embodiments of the present invention provide a blacklist management method and a device, relate to the field of communications, and are used for rapidly and conveniently adding a number to a blacklist, thereby improving operation efficiency of a terminal. The method includes: detecting, by a first terminal, an acceleration of the first terminal; when it is determined that the acceleration is greater than or equal to a first preset value, acquiring identification information of a second terminal; and adding the identification information to a blacklist. Embodiments of the method are used for blacklist management.