CN106937289B - Network access method and electronic equipment - Google Patents

Network access method and electronic equipment Download PDF

Info

Publication number
CN106937289B
CN106937289B CN201710188090.5A CN201710188090A CN106937289B CN 106937289 B CN106937289 B CN 106937289B CN 201710188090 A CN201710188090 A CN 201710188090A CN 106937289 B CN106937289 B CN 106937289B
Authority
CN
China
Prior art keywords
electronic equipment
electronic device
network access
key information
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710188090.5A
Other languages
Chinese (zh)
Other versions
CN106937289A (en
Inventor
谌琛
张晓平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201710188090.5A priority Critical patent/CN106937289B/en
Publication of CN106937289A publication Critical patent/CN106937289A/en
Application granted granted Critical
Publication of CN106937289B publication Critical patent/CN106937289B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a network access method, which is applied to first electronic equipment and comprises the following steps: detecting a first access signal sent by second electronic equipment, wherein the first access signal is used for requesting to establish communication connection with a first communication module in the first electronic equipment; acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment; judging whether preset network access conditions are met or not based on the network access key information; and when the preset network access condition is determined to be met, establishing communication connection between the first communication module and the second electronic equipment.

Description

Network access method and electronic equipment
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a network access method and an electronic device.
Background
The current household router can be set to be in a visitor mode and a non-visitor mode, and under the visitor mode, as long as terminal equipment in a signal coverage range of the wireless local area network can be freely accessed, however, the wireless local area network router facilitates free access of non-visitors and non-homeowners while visitors and homeowners are facilitated, network use experience is reduced, and meanwhile insecurity of the wireless local area network is increased.
Disclosure of Invention
The embodiment of the invention provides a network access method and electronic equipment, which can improve the security of a wireless local area network on the premise of ensuring the network experience of a user.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides a network access method, which is applied to first electronic equipment and comprises the following steps:
detecting a first access signal sent by second electronic equipment, wherein the first access signal is used for requesting to establish communication connection with a first communication module in the first electronic equipment;
acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment;
judging whether preset network access conditions are met or not based on the network access key information;
and when the preset network access condition is determined to be met, establishing communication connection between the first communication module and the second electronic equipment.
In the foregoing solution, the acquiring the network access key information includes:
acquiring first key information representing the distance between the second electronic equipment and the first electronic equipment;
correspondingly, the determining whether the preset network access condition is met based on the network access key information includes:
judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range or not based on the network access key information;
when the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, judging that a preset network access condition is met; otherwise, judging that the preset network access condition is not met.
In the foregoing solution, the acquiring the network access key information includes:
the first positional relationship is obtained based on the first access signal.
In the foregoing solution, the acquiring the network access key information includes:
and detecting a signal sent by the second electronic equipment by adopting a second communication module, and determining the first position relation based on a detection result.
In the foregoing solution, before the detecting the first access signal sent by the second electronic device, the method further includes:
setting a display mode of a service set identifier of the wireless local area network as a hidden mode;
and sending the service set identification to the second electronic equipment through the second communication module.
In the foregoing solution, before the obtaining of the network access key information, the method further includes:
judging whether the first access signal comprises preset network authentication information or not;
and if the first access signal comprises preset network authentication information, establishing communication connection between the first communication module and the second electronic equipment.
An embodiment of the present invention further provides an electronic device, where the electronic device is a first electronic device, and the electronic device includes: a first communication component and a processor; wherein the content of the first and second substances,
the first communication component is used for detecting a first access signal sent by second electronic equipment, and the first access signal is used for requesting to establish communication connection with a first communication component in the first electronic equipment;
the processor is used for acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment;
judging whether preset network access conditions are met or not based on the network access key information;
and establishing communication connection between the first communication module and the second electronic device when the preset network access condition is determined to be met.
In the above scheme, the processor is further configured to obtain first key information representing a distance between the second electronic device and the first electronic device;
judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range or not based on the network access key information;
when the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, judging that a preset network access condition is met; otherwise, judging that the preset network access condition is not met.
In the foregoing solution, the processor is further configured to obtain the first position relationship based on the first access signal.
In the above solution, the electronic device further includes a second communication component;
the second communication assembly is used for detecting a signal sent by the second electronic device and determining the first position relation based on a detection result.
In the above scheme, the processor is further configured to set a display mode of a service set identifier of the wireless local area network to be a hidden mode;
and sending the service set identification to the second electronic equipment through the second communication module.
In the above scheme, the processor is further configured to determine whether the first access signal includes preset network authentication information;
and if the first access signal comprises preset network authentication information, establishing communication connection between the first communication module and the second electronic equipment.
According to the network access method and the electronic device provided by the embodiment of the invention, the first electronic device detects a first access signal sent by the second electronic device, and the first access signal is used for requesting to establish communication connection with the first electronic device; acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment; judging whether preset network access conditions are met or not based on the network access key information; and when the preset network access condition is determined to be met, establishing communication connection between the first communication module and the second electronic equipment. Therefore, the first electronic equipment allows the electronic equipment with the position relation meeting the preset condition to be accessed, and the electronic equipment with the position relation not meeting the preset condition can be denied access, so that the network security is greatly improved.
Drawings
Fig. 1 is a first flowchart illustrating a network access method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a network access method according to an embodiment of the present invention;
fig. 3 is a first schematic view of an implementation scenario of a network access method according to an embodiment of the present invention;
fig. 4 is a third schematic flow chart of a network access method according to an embodiment of the present invention;
fig. 5 is a schematic view of a scenario for implementing the network access method according to the embodiment of the present invention;
fig. 6 is a fourth schematic flowchart of a network access method according to an embodiment of the present invention;
fig. 7 is a schematic view of a third implementation scenario of the network access method in the embodiment of the present invention;
fig. 8 is a fifth flowchart illustrating a network access method according to an embodiment of the present invention;
fig. 9 is a fourth schematic view of an implementation scenario of the network access method in the embodiment of the present invention;
fig. 10 is a flowchart illustrating a network access method according to a sixth embodiment of the present invention;
fig. 11 is a seventh flowchart illustrating a network access method according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples.
It should be noted that the terms "first \ second \ third" related to the embodiments of the present invention are merely used for distinguishing similar objects, and do not represent a specific ordering for the objects, and it should be understood that "first \ second \ third" may exchange a specific order or sequence order if allowed. It should be understood that the terms first, second, and third, as used herein, are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or otherwise described herein.
Example one
Fig. 1 is a schematic flow chart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, and in an embodiment, the first electronic device is a network access device, such as a router, as shown in fig. 1, the network access method in the embodiment of the present invention includes:
step 101: the method comprises the steps of detecting a first access signal sent by second electronic equipment, wherein the first access signal is used for requesting to establish communication connection with a first communication module in the first electronic equipment.
The second electronic device is not limited to a mobile phone, a notebook computer, a desktop computer, and other terminal devices;
the first access signal may be a Wireless local area network (WiFi) signal, and correspondingly, the first communication module is a WiFi module, and the first access signal is used for the second electronic device to request to establish a WiFi communication connection with the first electronic device.
Step 102: and acquiring network access key information.
In practical implementation, the network access key information includes first key information, where the first key information is information corresponding to a first location relationship, and the first location relationship is a location relationship between the second electronic device and the first electronic device. In an embodiment, the first location relationship may be distance information between the second electronic device and the first electronic device, or the first location relationship may be signal strength information for characterizing the distance relationship between the second electronic device and the first electronic device.
In an embodiment, when the first location relationship is distance information between the second electronic device and the first electronic device, the obtaining network access key information may be determined for the first electronic device based on a signal strength of the first access signal, or based on a signal strength and a direction of the first access signal.
Step 103: and judging whether preset network access conditions are met or not based on the network access key information.
In practical implementation, different network access key information may correspond to different network access conditions, for example, when the network access key information includes distance information between the second electronic device and the first electronic device, and when the distance between the second electronic device and the first electronic device is within a preset distance range, it is determined that a preset wireless local area network access condition is satisfied; otherwise, the preset wireless local area network access condition is judged not to be met. When the network access key information comprises the signal intensity of the first access signal, and when the signal intensity of the first access signal exceeds a preset signal intensity threshold value, determining that a preset wireless local area network access condition is met; otherwise, the preset wireless local area network access condition is judged not to be met.
Step 104: and when the preset network access condition is determined to be met, establishing communication connection between the first communication module and the second electronic equipment.
By applying the embodiment of the invention, when the user sets the visitor mode (password-free access) for the router equipment, the router equipment judges that the user equipment which meets the preset condition can be accessed based on the acquired network key information, and the user equipment which does not meet the preset condition can not be accessed even if the password is not needed, so that the user experience is ensured, and the network security of the user is greatly improved.
Example two
Fig. 2 is a schematic flowchart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, and fig. 3 is a schematic view of an implementation scenario of the network access method in the embodiment of the present invention; in this embodiment, the first electronic device is a router, and with reference to fig. 2 and fig. 3, the network access method in the embodiment of the present invention includes:
step 201: a first access signal sent by a second electronic device is detected.
Here, the first access signal is used for requesting to establish a wireless local area network communication connection with the first electronic device.
Here, when this embodiment is actually implemented, the method before this step further includes: the first electronic equipment sets the access mode of the wireless local area network to be a password-free access mode, namely a visitor mode.
The wireless local area network connection may be a WiFi network, and correspondingly, the first access signal is used to request a WiFi communication module in the first electronic device to establish a WiFi network communication connection.
Step 202: and acquiring distance information between the second electronic equipment and the first electronic equipment based on the first access signal.
Specifically, in practical implementation, the steps specifically include:
the first electronic equipment acquires the signal strength of the first access signal, and determines the distance between the second electronic equipment and the first electronic equipment based on the signal strength of the first access signal; here, a mapping relationship table of the signal strength and the distance information may be stored in advance, and the mapping relationship table is searched based on the determined signal strength of the first access signal, so as to determine the distance between the second electronic device and the first electronic device;
or, the first electronic device obtains the signal strength of the first access signal;
performing signal source positioning on the first access signal based on the signal strength of the first access signal to determine the position information of the second electronic device;
positioning the first electronic device to determine position information of the first electronic device;
determining a distance between the second electronic device and the first electronic device based on the location information of the second electronic device and the location information of the first electronic device.
Step 203: judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, and if so, executing step 204; otherwise, step 207 is performed.
Here, the distance range may be preset according to actual needs, such as 10 meters. Therefore, through the preset conditions, the electronic equipment meeting the preset distance range judges the user meeting the preset requirements, the access of the user can be allowed, and the user beyond the distance range can be considered as an illegal user to refuse the access, so that the safety of the WiFi network is improved while the user experience is not influenced.
Step 204: and establishing a wireless local area network communication connection with the second electronic equipment.
Here, when the first electronic device determines that the second electronic device is within the preset distance range, the second electronic device is considered to meet the preset condition, and then the WiFi communication module in the first electronic device establishes a WiFi network communication connection with the second electronic device.
Step 205: detecting a second access signal sent by the second electronic device, determining whether the distance between the second electronic device and the first electronic device is within a preset distance range, and if so, executing step 206; otherwise, step 207 is performed.
Here, in practical applications, after the second electronic device accesses the wireless local area network through the first electronic device, if the connection of the wireless local area network is disconnected, the second electronic device may initiate an access request to the first electronic device again, that is, send a second access signal to the first electronic device to request to access the wireless local area network again, however, since the wireless local area network is password-free access currently, in order to ensure network security, the first electronic device may determine again whether the second electronic device is within a preset distance range of the first electronic device, and determine to allow or deny access of the second electronic device according to a determination result.
Step 206: and establishing the wireless local area network communication connection with the second electronic equipment again.
Step 207: rejecting the network access request of the second electronic device.
By applying the embodiment of the invention, the user sets the visitor mode (password access free) for the router equipment, and the router equipment judges that the user equipment within a certain distance range of the router equipment can be accessed, but the user equipment outside the certain distance range of the router equipment cannot be accessed, so that the user experience is ensured, and the network security of the user is greatly improved.
EXAMPLE III
Fig. 4 is a schematic flowchart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, and fig. 5 is a schematic view of an implementation scenario of the network access method in the embodiment of the present invention; in this embodiment, the first electronic device is a router, and with reference to fig. 4 and 5, the network access method in the embodiment of the present invention includes:
step 300: the first electronic equipment sets the access mode of the wireless local area network to be a visitor mode.
Here, in practical applications, the user uses the wireless lan to facilitate visitor visiting, and the access mode of the first electronic device is set to be a password-free access mode, i.e. a visitor mode.
Step 301: a first access signal sent by a second electronic device is detected.
Here, the first access signal is used to request a wireless local area network communication connection to be established with a first communication module in the first electronic device.
In this embodiment, the wlan connection is a WiFi network, and correspondingly, the first access signal is used to request a WiFi communication module in the first electronic device to establish a WiFi network communication connection.
Step 302: and detecting a signal sent by the second electronic equipment by adopting a second communication module, and determining the distance relationship between the second electronic equipment and the first electronic equipment based on the detection result.
Here, in an actual implementation, the second communication module may be a near Field communication module, such as an NFC (near Field communication) module, and since a transmission distance of an NFC signal is only a few meters (currently, about 5 meters), when the NFC communication module of the first electronic device can receive the NFC signal of the NFC communication module in the second electronic device, it is determined that the second electronic device is located within a certain distance range of itself, that is, a distance relationship between the second electronic device and itself can be determined. On the contrary, when the NFC communication module of the first electronic device cannot receive the NFC signal of the NFC communication module in the second electronic device, it is determined that the second electronic device is located outside a certain distance range of itself. It should be noted that the communication module is not limited to the NFC communication module, and may also be a near field communication module such as a bluetooth module.
Step 303: judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, and if so, executing step 304; otherwise, step 307 is executed.
Here, when the first electronic device detects a signal sent by the second electronic device by using the second communication module, determining that the distance between the second electronic device and the first electronic device is within a preset distance range; on the contrary, when the first electronic device cannot detect the signal sent by the second electronic device by adopting the second communication module, it is determined that the distance between the second electronic device and the first electronic device is not within the preset distance range.
Step 304: and establishing a wireless local area network communication connection with the second electronic equipment.
Here, when the first electronic device determines that the second electronic device is within the preset distance range, the second electronic device is considered to meet the preset condition, and then the WiFi communication module in the first electronic device establishes a WiFi network communication connection with the second electronic device.
Step 305: detecting a second access signal sent by the second electronic device, judging whether the distance between the second electronic device and the first electronic device is within a preset distance range, and if so, executing step 306; otherwise, step 307 is executed.
Here, in practical applications, after the second electronic device accesses the wireless local area network through the first electronic device, if the connection of the wireless local area network is disconnected, the second electronic device may initiate an access request to the first electronic device again, that is, send a second access signal to the first electronic device to request to access the wireless local area network again, however, since the wireless local area network is password-free access currently, in order to ensure network security, the first electronic device may determine again whether the second electronic device is within a preset distance range of the first electronic device (still may be implemented by performing signal detection through its own second communication module), and determine to allow or deny access of the second electronic device according to a determination result.
Step 306: and establishing the wireless local area network communication connection with the second electronic equipment again.
Step 307: rejecting the network access request of the second electronic device.
By applying the embodiment of the invention, the user sets the visitor mode (password access free) for the router device, and the router device judges that the user device within a certain distance range can be accessed and the user device outside the certain distance range cannot be accessed through the NFC module of the router device, so that the user experience is ensured and the network security of the user is greatly improved.
Example four
Fig. 6 is a schematic flowchart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, and fig. 7 is a schematic view of an implementation scenario of the network access method in the embodiment of the present invention; in this embodiment, the first electronic device is a router, and as shown in fig. 6 and fig. 7, the network access method in the embodiment of the present invention includes:
step 401: the first electronic equipment sets an access mode of a wireless local area network to be a visitor mode, and sets a display mode of a service set identifier of the wireless local area network to be a hidden mode.
Here, in actual implementation, in order to improve security of the user wireless lan, a Service Set Identifier (SSID) may be Set to hide the wireless lan.
Step 402: and sending the service set identification to the second electronic equipment through a second communication module of the first electronic equipment.
In an actual implementation process, the second communication module may be an NFC communication module, and send the SSID of the wireless local area network to the second electronic device through the established NFC communication connection, so that the second electronic device establishes a communication connection with the first electronic device based on the received SSID and accesses the wireless local area network. Here, the SSID is sent through NFC communication connection, so that it is ensured that an electronic device farther from the first electronic device cannot know the SSID, and the security of the user wireless local area network is further improved.
Step 403: and detecting a first access signal transmitted by the second electronic equipment based on the service set identification.
Here, the first access signal is used for requesting to establish a wireless local area network communication connection with the first electronic device.
Step 404: acquiring distance information between the second electronic device and the first electronic device, judging whether the distance between the second electronic device and the first electronic device is within a preset distance range, and executing the step 405 if the distance is within the preset distance range; otherwise, step 406 is performed.
In practical implementation, the distance information between the second electronic device and the first electronic device may be obtained in various ways, such as: directly determining distance information between the second electronic equipment and the first electronic equipment based on the signal strength of the first access signal; or, detecting a signal sent by the second electronic device by using an NFC communication module to determine distance information between the second electronic device and the first electronic device.
Step 405: and establishing a wireless local area network communication connection with the second electronic equipment.
Step 406: rejecting the network access request of the second electronic device.
By applying the embodiment of the invention, under the condition that the first electronic device is set to access without a password, the SSID for hiding the network of the first electronic device is set, then only the SSID is sent to the user equipment within a certain distance range, and then the second electronic device is allowed to access when the second electronic device is within the preset distance range of the second electronic device by judging the distance relationship between the second electronic device and the second electronic device, so that the security of the network is greatly improved.
EXAMPLE five
Fig. 8 is a schematic flowchart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, and fig. 9 is a schematic view of an implementation scenario of the network access method in the embodiment of the present invention; in this embodiment, the first electronic device is a router, and with reference to fig. 8 and fig. 9, the network access method in the embodiment of the present invention includes:
step 500: the first electronic equipment sets the access mode of the wireless local area network to be a visitor mode.
Here, the guest mode is a password-free access mode.
Step 501: a first access signal sent by a second electronic device is detected.
Here, the first access signal is used to request a wireless local area network communication connection to be established with a first communication module in the first electronic device.
In this embodiment, the wlan connection is a WiFi network, and correspondingly, the first access signal is used to request a WiFi communication module in the first electronic device to establish a WiFi network communication connection.
Step 502: acquiring the signal intensity of the first access signal, and judging whether the signal intensity of the first access signal reaches a preset signal intensity threshold value, if so, executing step 503; if not, step 504 is performed.
Here, the signal strength threshold may be set according to actual requirements, and since the signal strength of the signal received closer to the first electronic device is greater, the signal strength may be directly used as a condition whether to satisfy the condition of accessing the wireless local area network.
Step 503: and establishing a wireless local area network communication connection with the second electronic equipment.
Here, it should be noted that, after the second electronic device accesses the wireless local area network through the first electronic device, the network connection may be disconnected during the use process, and when the second electronic device disconnects the network connection with the first electronic device and initiates an access request again, in order to ensure the network security, the first electronic device needs to determine again whether the signal strength of the access signal of the second electronic device meets the preset condition, and determine whether to allow the access according to the determination result.
Step 504: rejecting the network access request of the second electronic device.
By applying the embodiment of the invention, under the condition that the first electronic equipment is set to be free from password access, whether the first electronic equipment is allowed to be accessed is determined by judging the signal strength of the first access signal of the second electronic equipment, and when the signal strength of the first access signal of the second electronic equipment reaches the preset signal strength threshold value, the second electronic equipment is determined to be within a certain distance range of the second electronic equipment, so that the second electronic equipment is allowed to be accessed, therefore, the condition that visitors of non-users cannot access the wireless local area network of the users is ensured, and the safety of the wireless local area network is improved while the network experience of the visitors is not influenced.
EXAMPLE six
Fig. 10 is a schematic flow chart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, where the first electronic device is a network access device, such as a router device, as shown in fig. 10, and the network access method in the embodiment of the present invention includes:
step 600: the first electronic equipment sets the access mode of the wireless local area network to be a visitor mode.
Here, the guest mode is a password-free access mode.
Step 601: a first access signal sent by a second electronic device is detected.
Here, the first access signal is used to request a wireless local area network communication connection to be established with a first communication module in the first electronic device.
In this embodiment, the wlan connection is a WiFi network, and correspondingly, the first access signal is used to request a WiFi communication module in the first electronic device to establish a WiFi network communication connection.
Step 602: acquiring the signal intensity of the first electronic device based on the first access signal, and judging whether the signal intensity of the first electronic device reaches a preset signal intensity threshold, if so, executing step 603; if not, step 604 is performed.
Here, since the strength of the mobile phone transmission signal is adjustable in practical application, in order to access the WiFi network, the mobile phone may actively enhance its own transmission signal to deceive the network access device, thereby endangering the network security of the user, and in order to avoid this, in this embodiment, the first access signal includes the signal strength of the first electronic device (router) detected by the second electronic device (mobile phone, etc.), so that the first electronic device (network access device) is determined based on its own signal strength.
The signal strength threshold may be set according to actual needs, and since the signal strength of the signal received closer to the first electronic device is higher, the signal strength may be directly used as a condition whether to meet the condition of accessing the wireless local area network.
Step 603: and establishing a wireless local area network communication connection with the second electronic equipment.
Here, it should be noted that, after the second electronic device accesses the wireless local area network through the first electronic device, the network connection may be disconnected during the use process, and when the second electronic device disconnects the network connection with the first electronic device and initiates an access request again, in order to ensure the network security, the first electronic device needs to determine again whether the signal strength of the first electronic device included in the access signal of the second electronic device satisfies the preset condition, and determine whether to allow the access according to the determination result.
Step 604: rejecting the network access request of the second electronic device.
By applying the embodiment of the invention, under the condition that the first electronic device is set to be free from password access, whether the first electronic device is allowed to be accessed is determined by judging the signal strength of the first electronic device carried in the first access signal of the second electronic device, and when the signal strength of the first electronic device reaches the preset signal strength threshold value, the second electronic device is determined to be within a certain distance range of the first electronic device, and the second electronic device is allowed to be accessed.
EXAMPLE seven
Fig. 11 is a schematic flow chart of a network access method in an embodiment of the present invention, where the method is applied to a first electronic device, where the first electronic device is a network access device, such as a router device, as shown in fig. 11, and the network access method in the embodiment of the present invention includes:
step 700: the first electronic equipment sets the access mode of the wireless local area network to be a frequent visitor mode.
Here, the frequent client mode, i.e. the password mode, is accessible to the access device by performing a password authentication, and sets the network authentication information of the wireless lan, i.e. the access password.
Step 701: a first access signal sent by a second electronic device is detected.
Here, the first access signal is used for requesting to establish a wireless local area network communication connection with the first electronic device.
Step 702: judging whether the first access signal comprises preset network authentication information or not, and if not, executing step 703; if so, step 704 is performed.
In practical applications, the network authentication information may be an access password of the wireless lan.
Step 703: acquiring network access key information, judging whether preset network access conditions are met, and if so, executing step 704; if not, step 705 is performed.
The network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment; if the first location relationship is distance information between the second electronic device and the first electronic device.
Step 704: and establishing a communication connection between the first communication module and the second electronic equipment.
Step 705: rejecting the network access request of the second electronic device.
Here, it should be noted that, after the second electronic device accesses the wireless local area network through the first electronic device, the network connection may be disconnected during the use process, and when the second electronic device disconnects the network connection with the first electronic device and initiates an access request again, in order to ensure the network security, the first electronic device needs to determine again whether the position relationship between the second electronic device and the first electronic device meets a preset network access condition, and determine whether to allow the access according to the determination result.
Example eight
Fig. 12 is a schematic structural diagram of a composition of a first electronic device in an embodiment of the present invention, and as shown in fig. 12, the composition of the first electronic device in the embodiment of the present invention includes: a first communication component 11 and a processor 12;
the first communication component 11 is configured to detect a first access signal sent by a second electronic device, where the first access signal is used to request to establish a communication connection with the first communication component 11 in the first electronic device;
the processor 12 is configured to acquire network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment;
judging whether preset network access conditions are met or not based on the network access key information;
and establishing communication connection between the first communication module and the second electronic device when the preset network access condition is determined to be met.
Here, in practical applications, the first communication component 11 may be a WiFi communication component; correspondingly, the first access signal is used for requesting to establish a WiFi communication connection with the first electronic device so as to access a WiFi network.
In an embodiment, the first location relationship may be distance information between the second electronic device and the first electronic device, or the first location relationship may be signal strength information for characterizing the distance relationship between the second electronic device and the first electronic device.
In an embodiment, the processor 12 is further configured to obtain first key information representing a distance between the second electronic device and the first electronic device;
judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range or not based on the network access key information;
when the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, judging that a preset wireless local area network access condition is met; otherwise, the preset wireless local area network access condition is judged not to be met.
In an embodiment, the processor 12 is further configured to obtain the first position relationship based on the first access signal.
In an embodiment, the electronic device further comprises a second communication component 13;
the second communication component is used for detecting a signal sent by the second electronic equipment and determining the first position relation based on a detection result;
here, in practical applications, the second communication component may be an NFC communication component.
In an embodiment, the processor 12 is further configured to set a display mode of a service set identifier of a wireless local area network to be a hidden mode;
and sending the service set identification to the second electronic equipment through the second communication module.
In an embodiment, the processor 12 is further configured to determine whether the first access signal includes preset network authentication information;
and if the first access signal comprises preset network authentication information, establishing communication connection between the first communication module and the second electronic equipment.
Here, it should be noted that: the above description related to the first electronic device is similar to the above description of the method, and the description of the beneficial effects of the method is omitted for brevity. For technical details not disclosed in the first electronic device embodiment of the present invention, refer to the description of the method embodiment of the present invention.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a mobile storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional module and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (12)

1. A network access method applied to a first electronic device, the method comprising:
detecting a first access signal sent by second electronic equipment, wherein the first access signal is used for requesting to establish communication connection with a first communication module in the first electronic equipment;
acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment;
judging whether preset network access conditions are met or not based on the network access key information;
when the preset network access condition is determined to be met, establishing communication connection between the first communication module and the second electronic equipment;
detecting a second access signal sent by the second electronic equipment, and judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range;
and if the second electronic equipment and the first electronic equipment are within the preset distance range, establishing the wireless local area network communication connection with the second electronic equipment again.
2. The method of claim 1, wherein the obtaining network access key information comprises:
acquiring first key information representing the distance between the second electronic equipment and the first electronic equipment;
correspondingly, the determining whether the preset network access condition is met based on the network access key information includes:
judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range or not based on the network access key information;
when the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, judging that a preset network access condition is met; otherwise, judging that the preset network access condition is not met.
3. The method of claim 1, wherein the obtaining network access key information comprises:
the first positional relationship is obtained based on the first access signal.
4. The method of claim 1, wherein the obtaining network access key information comprises:
and detecting a signal sent by the second electronic equipment by adopting a second communication module, and determining the first position relation based on a detection result.
5. The method of claim 4, wherein before the detecting the first access signal transmitted by the second electronic device, the method further comprises:
setting a display mode of a service set identifier of the wireless local area network as a hidden mode;
and sending the service set identification to the second electronic equipment through the second communication module.
6. The method of claim 1, wherein prior to said obtaining network access critical information, the method further comprises:
judging whether the first access signal comprises preset network authentication information or not;
and if the first access signal comprises preset network authentication information, establishing communication connection between the first communication module and the second electronic equipment.
7. An electronic device, wherein the electronic device is a first electronic device, the electronic device comprising: a first communication component and a processor; wherein the content of the first and second substances,
the first communication component is used for detecting a first access signal sent by second electronic equipment, and the first access signal is used for requesting to establish communication connection with a first communication component in the first electronic equipment;
the processor is used for acquiring network access key information; the network access key information comprises first key information, the first key information is information corresponding to a first position relationship, and the first position relationship is a position relationship between the second electronic equipment and the first electronic equipment;
judging whether preset network access conditions are met or not based on the network access key information;
when the preset network access condition is determined to be met, establishing communication connection between the first communication assembly and the second electronic equipment;
the processor is further configured to detect a second access signal sent by the second electronic device, and determine whether a distance between the second electronic device and the first electronic device is within a preset distance range; and if the second electronic equipment and the first electronic equipment are within the preset distance range, establishing the wireless local area network communication connection with the second electronic equipment again.
8. The electronic device of claim 7,
the processor is further configured to acquire first key information representing a distance between the second electronic device and the first electronic device;
judging whether the distance between the second electronic equipment and the first electronic equipment is within a preset distance range or not based on the network access key information;
when the distance between the second electronic equipment and the first electronic equipment is within a preset distance range, judging that a preset network access condition is met; otherwise, judging that the preset network access condition is not met.
9. The electronic device of claim 7,
the processor is further configured to obtain the first positional relationship based on the first access signal.
10. The electronic device of claim 7, further comprising a second communication component;
the second communication assembly is used for detecting a signal sent by the second electronic device and determining the first position relation based on a detection result.
11. The electronic device of claim 9 or 10,
the processor is further configured to set a display mode of a service set identifier of the wireless local area network to a hidden mode;
and sending the service set identification to the second electronic equipment through a second communication component.
12. The electronic device of claim 7,
the processor is further configured to determine whether the first access signal includes preset network authentication information;
and if the first access signal comprises preset network authentication information, establishing communication connection between the first communication assembly and the second electronic equipment.
CN201710188090.5A 2017-03-27 2017-03-27 Network access method and electronic equipment Active CN106937289B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710188090.5A CN106937289B (en) 2017-03-27 2017-03-27 Network access method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710188090.5A CN106937289B (en) 2017-03-27 2017-03-27 Network access method and electronic equipment

Publications (2)

Publication Number Publication Date
CN106937289A CN106937289A (en) 2017-07-07
CN106937289B true CN106937289B (en) 2021-05-18

Family

ID=59424860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710188090.5A Active CN106937289B (en) 2017-03-27 2017-03-27 Network access method and electronic equipment

Country Status (1)

Country Link
CN (1) CN106937289B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107318119B (en) * 2017-08-28 2021-02-09 广东美的制冷设备有限公司 Household appliance networking method, household appliance and computer readable storage medium
CN111436024A (en) * 2019-01-15 2020-07-21 珠海格力电器股份有限公司 Wireless connection method, wireless communication device and intelligent terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103181235A (en) * 2012-08-16 2013-06-26 华为终端有限公司 Method and device for wireless-network building connection
CN104159271A (en) * 2013-05-15 2014-11-19 华为技术有限公司 Boundary control method and system, and access controller
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN104540186A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103181235A (en) * 2012-08-16 2013-06-26 华为终端有限公司 Method and device for wireless-network building connection
EP2804424A1 (en) * 2012-08-16 2014-11-19 Huawei Device Co., Ltd. Connection setup method and device for wireless network
CN104159271A (en) * 2013-05-15 2014-11-19 华为技术有限公司 Boundary control method and system, and access controller
CN104363585A (en) * 2014-10-27 2015-02-18 深圳市金立通信设备有限公司 Wireless local area network access method
CN104540186A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device

Also Published As

Publication number Publication date
CN106937289A (en) 2017-07-07

Similar Documents

Publication Publication Date Title
KR101910477B1 (en) Control access point
KR101694773B1 (en) Method and apparatus for connecting wireless network in a digital device
WO2017000830A1 (en) Cross-terminal login-free method and device
KR101341256B1 (en) Apparatus and method for strengthening security connection of network
KR101720043B1 (en) System and method for authentication in wireless lan
US20120036557A1 (en) Wi-fi access method, access point and wi-fi access system
US20150085848A1 (en) Method and Apparatus for Controlling Wireless Network Access Parameter Sharing
CN105916151A (en) Intelligent equipment wireless network access method and system thereof
CN104144415A (en) Method for connecting WiFi access point and mobile communication terminal
CN104767713B (en) Account binding method, server and system
US8954035B2 (en) Wi-Fi authentication by proxy
US11706823B2 (en) Communication management and wireless roaming support
US10750369B2 (en) Method, apparatus, and platform for sharing wireless local area network
US20150281960A1 (en) Network authentication
CN107027121A (en) A kind of WiFi network safety access method and device
CN106937289B (en) Network access method and electronic equipment
US10104543B2 (en) Protection against illegitimate link termination in a wireless network
US9686239B2 (en) Secure data transmission
CN105592463B (en) Access authentication method and device
CN106230788A (en) The reorientation method of a kind of portal certification, radio reception device, portal server
CN109688096B (en) IP address identification method, device, equipment and computer readable storage medium
KR20130002044A (en) A method for detecting illegal access point and a wlan device therefor
KR20150041407A (en) Trust Access Point connection Apparatus and Method
CN107786973B (en) Wireless network user privacy protection method and computer readable storage medium
CN108810858A (en) A method of the quick obtaining wireless router access authority based on NFC

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant