CN107635234B - Wi-Fi control method, mobile terminal and computer-readable storage medium - Google Patents

Wi-Fi control method, mobile terminal and computer-readable storage medium Download PDF

Info

Publication number
CN107635234B
CN107635234B CN201710912788.7A CN201710912788A CN107635234B CN 107635234 B CN107635234 B CN 107635234B CN 201710912788 A CN201710912788 A CN 201710912788A CN 107635234 B CN107635234 B CN 107635234B
Authority
CN
China
Prior art keywords
application program
wireless hotspot
wireless
preset
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710912788.7A
Other languages
Chinese (zh)
Other versions
CN107635234A (en
Inventor
易晓柯
吴国钿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710912788.7A priority Critical patent/CN107635234B/en
Publication of CN107635234A publication Critical patent/CN107635234A/en
Application granted granted Critical
Publication of CN107635234B publication Critical patent/CN107635234B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a Wi-Fi control method, which is characterized in that for a mobile terminal which is simultaneously connected with two wireless hotspots, when an application program is started, whether the application program is a preset application program with safety requirements is determined, when the application program is determined to be the preset application program, a safe wireless hotspot in the two wireless hotspots which are connected currently is further determined, then the application program is configured to carry out data transmission through the determined safe wireless hotspot, so that safe network service is provided for the application program, and the purpose of improving the data transmission safety of the application program is achieved. The invention also discloses a mobile terminal and a computer readable storage medium. The invention can improve the data transmission safety of the application program.

Description

Wi-Fi control method, mobile terminal and computer-readable storage medium
Technical Field
The invention relates to the technical field of mobile terminals, in particular to a Wi-Fi control method, a mobile terminal and a computer readable storage medium.
Background
With the improvement of the living standard of modern people, mobile terminals such as smart phones and PAD (PAD) become necessities in life, and an important function of the mobile terminals is to realize data transmission through Wi-Fi (Wireless Fidelity) and internet communication. But it is accompanied by a lot of privacy and security problems, for example, when a user operates a mobile terminal to access an insecure wireless hotspot, a lawbreaker can steal user account information, resulting in user loss. In addition, data transmitted by the application program on the mobile terminal can be intercepted, such as chat content, transaction information, even an address book and the like, so that greater loss is caused.
Disclosure of Invention
The invention provides a Wi-Fi control method, a mobile terminal and a computer readable storage medium, aiming at improving the security of data transmission of an application program.
In order to achieve the above object, the present invention provides a Wi-Fi control method applied to a mobile terminal, where a Wi-Fi module of the mobile terminal is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes a connection with a first wireless hotspot based on the first MAC address, and the Wi-Fi module establishes a connection with a second wireless hotspot based on the second MAC address, the Wi-Fi control method including:
when an application program is started, determining whether the application program is a preset application program with a safety requirement;
when the application program is the preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined secure wireless hotspot.
Further, the present invention also provides a mobile terminal, comprising:
the Wi-Fi module is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes connection with a first wireless hotspot based on the first MAC address, and the Wi-Fi module establishes connection with a second wireless hotspot based on the second MAC address;
a memory storing a Wi-Fi control program;
a processor in communication with the memory and configured to execute the Wi-Fi control program to implement the steps of:
when an application program is started, determining whether the application program is a preset application program with a safety requirement;
when the application program is the preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined secure wireless hotspot.
Further, the present invention also provides a computer-readable storage medium, which is applied to a mobile terminal, a Wi-Fi module of the mobile terminal is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes a connection with a first wireless hotspot based on the first MAC address, the Wi-Fi module establishes a connection with a second wireless hotspot based on the second MAC address, the computer-readable storage medium stores a Wi-Fi control program, and when executed by a processor, the Wi-Fi control program implements the following steps:
when an application program is started, determining whether the application program is a preset application program with a safety requirement;
when the application program is the preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined secure wireless hotspot.
According to the Wi-Fi control method, the mobile terminal and the computer readable storage medium, when the application program is started, whether the application program is a preset application program with safety requirements is determined, when the application program is determined to be the preset application program, the safe wireless hotspot in the two wireless hotspots which are connected currently is further determined, and then the application program is configured to perform data transmission through the determined safe wireless hotspot, so that safe network service is provided for the application program, and the purpose of improving the data transmission safety of the application program is achieved.
Drawings
Fig. 1 is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention;
FIG. 2 is a communication network system architecture diagram of the mobile terminal shown in FIG. 1;
FIG. 3 is a flowchart illustrating a Wi-Fi control method according to a first embodiment of the present invention;
FIG. 4 is a schematic diagram of a layered structure of a Wi-Fi module in the first embodiment of the Wi-Fi control method of the invention;
fig. 5 is a schematic diagram of a Wi-Fi module connecting a first wireless hotspot and a second wireless hotspot in a first embodiment of the Wi-Fi control method of the present invention;
fig. 6 is an exemplary diagram of a wireless hotspot to which a mobile terminal switches connection in a third embodiment of a Wi-Fi control method of the present invention;
fig. 7 is an exemplary diagram of an optional setting interface of a secure white list in a fourth embodiment of the Wi-Fi control method according to the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The main solution of the embodiment of the invention is as follows: for a mobile terminal simultaneously connected with two wireless hotspots, when an application program is started, firstly, a network environment required by the application program for network service is determined, and after the network environment required by the application program is determined, a wireless hotspot of which the network environment is the network environment required by the application program in the two currently connected wireless hotspots is further determined, and then the application program is configured to perform data transmission for the wireless hotspot of the network environment required by the application program through the network environment, so that the required network service is provided for the application program, and the normal operation of the application program is ensured.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palm top computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device (such as a smart band), a pedometer, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like.
The following description will be given by way of example of a mobile terminal, and it will be understood by those skilled in the art that the construction according to the embodiment of the present invention can be applied to a fixed type terminal, in addition to elements particularly used for mobile purposes.
Referring to fig. 1, which is a schematic diagram of a hardware structure of an optional mobile terminal for implementing various embodiments of the present invention, the mobile terminal 100 may include: RF (Radio Frequency) unit 101, Wi-Fi module 102, audio output unit 103, a/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit 108, memory 109, processor 110, and power supply 111. Those skilled in the art will appreciate that the mobile terminal architecture shown in fig. 1 is not intended to be limiting of mobile terminals, which may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile terminal in detail with reference to fig. 1:
the radio frequency unit 101 may be configured to receive and transmit signals during information transmission and reception or during a call, and specifically, receive downlink information of a base station and then process the downlink information to the processor 110; in addition, the uplink data is transmitted to the base station. Typically, radio frequency unit 101 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 101 can also communicate with a network and other devices through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA2000(Code Division Multiple Access 2000), WCDMA (Wideband Code Division Multiple Access), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access), FDD-LTE (Frequency Division duplex Long Term Evolution), and TDD-LTE (Time Division duplex Long Term Evolution).
Wi-Fi belongs to a short-distance wireless transmission technology, and a mobile terminal can help a user to receive and send emails, browse webpages, access streaming media and the like through a Wi-Fi module 102, and provides wireless data transmission for the user.
The audio output unit 103 may convert audio data received by the radio frequency unit 101 or the Wi-Fi module 102 or stored in the memory 109 into an audio signal and output as sound when the mobile terminal 100 is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 103 may also provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 103 may include a speaker, a buzzer, and the like.
The a/V input unit 104 is used to receive audio or video signals. The a/V input Unit 104 may include a Graphics Processing Unit (GPU) 1041 and a microphone 1042, the Graphics processor 1041 Processing image data of still pictures or video obtained by an image capturing device (e.g., a camera) in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 106. The image frames processed by the graphics processor 1041 may be stored in the memory 109 (or other storage medium) or transmitted via the radio frequency unit 101 or the Wi-Fi module 102. The microphone 1042 may receive sounds (audio data) via the microphone 1042 in a phone call mode, a recording mode, a voice recognition mode, or the like, and may be capable of processing such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 101 in case of a phone call mode. The microphone 1042 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The mobile terminal 100 also includes at least one sensor 105, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 1061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 1061 and/or a backlight when the mobile terminal 100 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
The display unit 106 is used to display information input by a user or information provided to the user. The Display unit 106 may include a Display panel 1061, and the Display panel 1061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 107 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the mobile terminal. Specifically, the user input unit 107 may include a touch panel 1071 and other input devices 1072. The touch panel 1071, also referred to as a touch screen, may collect a touch operation performed by a user on or near the touch panel 1071 (e.g., an operation performed by the user on or near the touch panel 1071 using a finger, a stylus, or any other suitable object or accessory), and drive a corresponding connection device according to a predetermined program. The touch panel 1071 may include two parts of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 110, and can receive and execute commands sent by the processor 110. In addition, the touch panel 1071 may be implemented in various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. In addition to the touch panel 1071, the user input unit 107 may include other input devices 1072. In particular, other input devices 1072 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like, and are not limited to these specific examples.
Further, the touch panel 1071 may cover the display panel 1061, and when the touch panel 1071 detects a touch operation thereon or nearby, the touch panel 1071 transmits the touch operation to the processor 110 to determine the type of the touch event, and then the processor 110 provides a corresponding visual output on the display panel 1061 according to the type of the touch event. Although the touch panel 1071 and the display panel 1061 are shown in fig. 1 as two separate components to implement the input and output functions of the mobile terminal, in some embodiments, the touch panel 1071 and the display panel 1061 may be integrated to implement the input and output functions of the mobile terminal, and is not limited herein.
The interface unit 108 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 108 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal 100 and external devices.
The memory 109 may be used to store software programs as well as various data. The memory 109 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 109 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The processor 110 is a control center of the mobile terminal, connects various parts of the entire mobile terminal using various interfaces and lines, and performs various functions of the mobile terminal and processes data by operating or executing software programs and/or modules stored in the memory 109 and calling data stored in the memory 109, thereby performing overall monitoring of the mobile terminal. Processor 110 may include one or more processing units; preferably, the processor 110 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 110.
Near Field Communication (NFC) is a short-range, high-frequency radio technology that allows contactless point-to-point data transmission and exchange of data between electronic devices, which evolved from contactless Radio Frequency Identification (RFID). The NFC has the working frequency of 13.56Hz, the effective range of 20cm and the transmission speed of 106 Kbit/s, 212 Kbit/s or 424 Kbit/s. NFC has 3 modes of operation: card reader mode, point-to-point mode, card emulation mode. And when the NFC equipment is in a card reader mode, the NFC equipment generates a radio frequency field to read and write data from an external NFC label with the same standard. In the peer-to-peer mode, the NFC may communicate with other NFC devices for peer-to-peer data transmission. In the card simulation mode, the card reader is an active device and generates a radio frequency field; the NFC equipment is passive equipment, and a non-contact card meeting the NFC standard is simulated to interact with the card reader. The mobile terminal 100 implements an NFC function, such as implementing NFC payment, etc., through the NFC controller 111. Although fig. 1 shows the NFC controller 111, it is understood that it does not belong to the essential constitution of the mobile terminal, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The mobile terminal 100 may further include a power supply 112 (e.g., a battery) for supplying power to the various components, and preferably, the power supply 112 may be logically connected to the processor 110 via a power management system, so that functions of managing charging, discharging, and power consumption are performed via the power management system.
Although not shown in fig. 1, the mobile terminal 100 may further include a bluetooth module or the like, which is not described in detail herein.
In order to facilitate understanding of the embodiments of the present invention, a communication network system on which the mobile terminal of the present invention is based is described below.
Referring to fig. 2, fig. 2 is an architecture diagram of a communication Network system according to an embodiment of the present invention, where the communication Network system is an LTE system of a universal mobile telecommunications technology, and the LTE system includes a UE (User Equipment) 201, an E-UTRAN (Evolved UMTS Terrestrial Radio Access Network) 202, an EPC (Evolved Packet Core) 203, and an IP service 204 of an operator, which are in communication connection in sequence.
Specifically, the UE201 may be the mobile terminal 100 described above, and is not described herein again.
The E-UTRAN202 includes eNodeB2021 and other eNodeBs 2022, among others. Among them, the eNodeB2021 may be connected with other eNodeB2022 through backhaul (e.g., X2 interface), the eNodeB2021 is connected to the EPC203, and the eNodeB2021 may provide the UE201 access to the EPC 203.
The EPC203 may include an MME (Mobility Management Entity) 2031, an HSS (Home Subscriber Server) 2032, other MMEs 2033, an SGW (Serving gateway) 2034, a PGW (PDN gateway) 2035, and a PCRF (Policy and Charging Rules Function) 2036, and the like. The MME2031 is a control node that handles signaling between the UE201 and the EPC203, and provides bearer and connection management. HSS2032 is used to provide registers to manage functions such as home location register (not shown) and holds subscriber specific information about service characteristics, data rates, etc. All user data may be sent through SGW2034, PGW2035 may provide IP address assignment for UE201 and other functions, and PCRF2036 is a policy and charging control policy decision point for traffic data flow and IP bearer resources, which selects and provides available policy and charging control decisions for a policy and charging enforcement function (not shown).
The IP services 204 may include the internet, intranets, IMS (IP Multimedia Subsystem), or other IP services, among others.
Although the LTE system is described as an example, it should be understood by those skilled in the art that the present invention is not limited to the LTE system, but may also be applied to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA, and future new network systems.
Based on the above mobile terminal hardware structure and communication network system, various embodiments of the mobile terminal of the present invention are provided.
Referring to fig. 1, in an embodiment of the mobile terminal of the present invention, the mobile terminal includes:
the Wi-Fi module 102 is configured with a first MAC address and a second MAC address, the Wi-Fi module 102 establishes connection with a first wireless hotspot based on the first MAC address, and the Wi-Fi module 102 establishes connection with a second wireless hotspot based on the second MAC address;
a memory 109 in which a Wi-Fi control program is stored;
a processor 110 in communication with the memory 109 and configured to execute the aforementioned Wi-Fi control program to implement the steps of:
when an application program is started, determining whether the application program is a preset application program with a safety requirement;
when the application program is a preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined safe wireless hotspot.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
and judging whether the two wireless hotspots which are connected currently adopt a preset public key encryption algorithm or not, and determining the wireless hotspot which starts the preset public key encryption algorithm as a safe wireless hotspot.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
and when the application program is not a preset application program, configuring the application program to transmit data through the wireless hotspot with better network quality in the two currently connected wireless hotspots.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
when the two wireless hotspots which are connected currently are unsafe wireless hotspots, disconnecting the Wi-Fi module 102 from the wireless hotspot with poor network quality in the two wireless hotspots, and controlling the Wi-Fi module 102 to establish connection with the safe wireless hotspot in the same frequency band where the disconnected wireless hotspot is located;
and configuring the application program to perform data transmission through the newly established connected secure wireless hotspot.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
acquiring a package name of the application program, and identifying whether the application program is a payment application or not according to the acquired package name, wherein when the application program is the payment application, the application program is determined to be a preset application program.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
and identifying the system authority acquired by the application program, and judging whether the acquired system authority simultaneously comprises a telephone authority, an address list authority and a short message authority, wherein if the judgment result is yes, the application program is determined to be a preset application program.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
and judging whether the application program is a trusted application running in a trusted execution environment, wherein when the application program is the trusted application, the application program is determined to be a preset application program.
Further, when the processor 110 executes the Wi-Fi control program stored in the memory 109, the following operations are also implemented:
and judging whether the application program is an application program in a pre-generated safe white list, wherein when the application program is the application program in the safe white list, the application program is determined to be a preset application program.
Further, the present invention also provides a Wi-Fi control method, which is executed by the mobile terminal shown in fig. 1, and referring to fig. 3, in a first embodiment of the Wi-Fi control method of the present invention, the Wi-Fi control method includes:
step S10, when the application program is started, determining whether the application program is a preset application program with safety requirements;
step S20, when the application program is a preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and step S30, configuring the application program to perform data transmission through the determined secure wireless hotspot.
In order to facilitate understanding of the inventive solution, a brief description of the hardware basis on which the inventive solution is implemented follows.
Referring to fig. 4, corresponding to the logical hierarchy of the android system, the Wi-Fi module 102 of the mobile terminal includes a Wi-Fi chip 1021, a Wi-Fi dual-port driver module 1022, a Wi-Fi dual-port protocol module 1023, a Wi-Fi dual-port frame module 1024, and a display module 1025.
The Wi-Fi chip 1021 supports a double-MAC technology, can burn two different MAC addresses at the same time, and is responsible for realizing data communication of the bottommost layer.
On the basis that the existing Wi-Fi drive only supports the wlan0, the Wi-Fi dual-port drive module 1022 additionally supports the wlan1, binds two MAC addresses with the wlan0 and the wlan1 respectively, and builds a communication channel to ensure that a drive command can be smoothly sent to the Wi-Fi chip 1021.
The Wi-Fi dual-port protocol module 1023 comprises two protocol stacks, which are respectively used for supporting a port wlan0 and a port wlan1, and contain relatively independent configuration files for storing wireless hotspot information and protocol stack configuration information. The information in the two ports wlan0 and wlan1 can be synchronized through separate services in the protocol stacks, so that the operation of a user on any one path can be stored, and in the process of starting Wi-Fi, when the protocol stacks are started, the protocol stacks of the two ports can be respectively started, and meanwhile, the Wi-Fi dual-port driving module 1022 can be notified to enable the two ports, and after the two wlan ports at the bottom layer are enabled, the bottom layer driving part and the following parts really have the double Wi-Fi functions. The Wi-Fi dual port protocol module 1023 completes the binding of the protocol stack and the bottom port through the common interface provided by the Wi-Fi dual port driver module 1022, and further completes the establishment of the message channel.
The Wi-Fi dual-port frame module 1024 is different from the original single Wi-Fi frame in that the support for a wlan1 port is newly added, the original Wi-Fi frame and a message mechanism are kept unchanged, a set of new message transmission mechanism is independently established, two sockets are simultaneously started to bind different protocol stacks, and normal communication of an upper layer and a lower layer is kept. The Wi-Fi dual port frame module 1024 distinguishes whether the issued command belongs to wlan0 or wlan1 by port number.
And the display module 1025 is used for displaying the user interface, receiving the triggered user interface operation and responding by other corresponding modules.
Based on the above description regarding the mobile terminal Wi-Fi module 102, the following describes in detail the implementation of the solution of the present invention.
In this embodiment, the Wi-Fi module 102 further includes a first Wi-Fi antenna and a second Wi-Fi antenna, and the Wi-Fi module 102 can connect to the two wireless hotspots through the first Wi-Fi antenna and the second Wi-Fi antenna at the same time. By default, referring to fig. 5, after the Wi-Fi module 102 establishes a connection with a first wireless hotspot working in a first frequency band through a first Wi-Fi antenna based on a first MAC address, the Wi-Fi module 102 establishes a connection with a second wireless hotspot working in a second frequency band through a second Wi-Fi antenna based on a second MAC address. When the first wireless hotspot works in the 2.4G frequency band, the second wireless hotspot works in the 5G frequency band, or when the first wireless hotspot works in the 5G frequency band, the second wireless hotspot works in the 2.4G frequency band. For example, after establishing a connection with a wireless hotspot operating in a 2.4G frequency band, the Wi-Fi module 102 of the mobile terminal defaults to establish a connection with another wireless hotspot operating in a 5G frequency band. It should be noted that, in other embodiments, the Wi-Fi module 102 of the mobile terminal may simultaneously connect two wireless hotspots operating in the 2.4G frequency band, and may also simultaneously connect two wireless hotspots operating in the 5G frequency band.
In real life, various public places usually provide free wireless access services, however, it is likely that these wireless hotspots providing free wireless access services are set by lawless persons for stealing user privacy data, for example, lawless persons usually set a wireless hotspot without password verification to induce a user to connect a mobile terminal to the wireless hotspot, and then background capture the user's account information, chat information and other privacy data.
In order to avoid the above situation, when the mobile terminal starts the application program, the mobile terminal first identifies the started application program to determine whether the application program is a preset application program with a security requirement, that is, whether the started application program has a risk of revealing user privacy data.
In this embodiment, a hierarchical manner may be adopted to determine whether the application is a preset application with a security requirement. Specifically, the mobile terminal divides the currently installed application program of the mobile terminal into different security levels according to configuration data input by a user, for example, a first security level has a higher security requirement on the network environment, a second security level has a lower security requirement on the network environment compared with the first security level, and a third security level has no security requirement on the network environment.
When the mobile terminal identifies whether the started application program is an application program with a safety requirement, if the started application program is identified to be an application program with a first safety level, the started application program is directly determined to be a preset application program; if the started application program is identified to be the application program with the second security level, the started application program is temporarily determined to be a preset application program; and if the started application program is identified to be the application program with the third security level, directly determining that the started application program is not the preset application program.
Optionally, in other embodiments, an application list may be preset locally on the mobile terminal, and the user adds the application with the security requirement to the preset application list, so that the mobile terminal may determine whether the application is the preset application by determining whether the application is located in the preset application list.
After the determination operation on the started application program is completed, if the application program is determined to be a preset application program (including a directly determined preset application program and a temporarily determined preset application program), a safe wireless hotspot in the two currently connected wireless hotspots is further determined.
Optionally, determining whether the wireless hotspot is a secure wireless hotspot may be implemented in a plurality of ways, where determining a secure wireless hotspot of two currently connected wireless hotspots includes:
and judging whether the two wireless hotspots which are connected currently adopt a preset public key encryption algorithm or not, and determining the wireless hotspot which starts the preset public key encryption algorithm as a safe wireless hotspot.
Generally, Wi-Fi technology has several encryption methods as follows:
1. WEP, WEP 64-bit or 128-bit data encryption.
2. WPA-PSK adopts Wi-Fi protected access of a pre-shared key and adopts WPA-PSK standard encryption technology, and the encryption type is TKIP.
3. WPA2-PSK, Wi-Fi protected access with pre-shared keys (version 2), and WPA2-PSK standard encryption technology, with the encryption type being AES.
4. WPA-PSK + WPA2-PSK, allowing the mobile terminal to perform cryptographic encryption using WPA-PSK or WPA 2-PSK.
5. WAPI, namely a wireless local area network authentication and privacy infrastructure, is an encryption technology supported by China.
As is well known, WEP is a simple encryption method based on shared keys, and has low security, and when a wireless hotspot transmits data by using such an encryption method, the transmitted data is easily intercepted. Therefore, in this embodiment, whether the wireless hotspot is safe or not can be determined by identifying whether the wireless hotspot adopts an encryption mode based on a public key encryption algorithm, and specifically, the wireless hotspot adopting a preset public key encryption algorithm is identified as a safe wireless hotspot. The specific selection of the preset public key encryption algorithm is not specifically limited in this embodiment, and a person skilled in the art can select a public key encryption algorithm with a higher encryption level than WEP as the preset public key encryption algorithm according to actual needs.
In addition, a safe hotspot list can be maintained locally at the mobile terminal, a user can add a trusted safe wireless hotspot to the safe hotspot list, and the mobile terminal can determine whether the wireless hotspot is a safe wireless hotspot by judging whether the wireless hotspot is located in the safe hotspot list.
After the identification of the safe wireless hotspot is completed, if the started application program is directly determined to be a preset application program, the mobile terminal directly configures the application program to perform data transmission through the determined safe wireless hotspot. For example, when the started application program is determined to be the application program with the security requirement, if the first wireless hotspot is determined to be the security wireless hotspot, the mobile terminal configures the application program to perform data transmission through the first wireless hotspot; and if the second wireless hotspot is determined to be the safe wireless hotspot, the mobile terminal configures the application program to transmit data through the second wireless hotspot.
On the other hand, if the started application program is temporarily determined to be a preset application program, the mobile terminal further identifies the determined available bandwidth of the secure wireless hotspot, and if the identified available bandwidth of the secure wireless hotspot is greater than or equal to the required bandwidth of the application program, the mobile terminal configures the application program to perform data transmission through the secure wireless hotspot; if the available bandwidth of the secure wireless hotspot is identified to be smaller than the required bandwidth of the application program, the mobile terminal configures the application program to perform data transmission through another wireless hotspot (for example, when the first wireless hotspot is determined as the secure wireless hotspot, the another wireless hotspot is the second wireless hotspot, or when the second wireless hotspot is determined as the secure wireless hotspot, the another wireless hotspot is the first wireless hotspot).
It should be noted that if it is determined that the two currently connected wireless hotspots (i.e., the first wireless hotspot and the second wireless hotspot) are both secure wireless hotspots, the application program may be configured to perform data transmission through the first wireless hotspot or the wireless hotspot;
or, configuring the application program to perform data transmission through the wireless hotspot with better network quality in the two currently connected wireless hotspots, thereby providing better network service for the wireless hotspot.
According to the Wi-Fi control method provided by the embodiment of the invention, for a mobile terminal which is simultaneously connected with two wireless hotspots, when an application program is started, whether the application program is a preset application program with a safety requirement is firstly determined, when the application program is determined to be the preset application program, a safe wireless hotspot in the two currently connected wireless hotspots is further determined, and then the application program is configured to carry out data transmission through the determined safe wireless hotspot, so that a safe network service is provided for the application program, and the purpose of improving the data transmission safety of the application program is achieved.
Further, a second embodiment of the Wi-Fi control method of the present invention is proposed based on the first embodiment of the Wi-Fi control method of the present invention, and in this embodiment, after step S10, the method further includes:
and when the application program is not a preset application program, configuring the application program to transmit data through the wireless hotspot with better network quality in the two currently connected wireless hotspots.
It should be noted that, in this embodiment, on the basis of the foregoing first embodiment, a processing scheme is provided in which the application program is not a preset application program, which is only described below, and other embodiments can refer to the foregoing first embodiment, and are not described herein again.
In this embodiment, when it is recognized that the started application program is not a preset application program, that is, when the application program does not have a security requirement, a wireless hotspot with better network quality in two currently connected wireless hotspots is determined, and then the application program is configured to perform data transmission through the wireless hotspot with better network quality. Specifically, a person skilled in the art can select which parameter to represent the network quality of the wireless hotspot according to actual needs, and may represent the network quality of the wireless hotspot by using the signal strength of the wireless hotspot, may also represent the network quality by using the data transceiving success rate of the wireless hotspot, and may also represent the network quality by using the negotiation rate of the wireless hotspot.
In order to more accurately represent the network quality of the wireless hotspot, the network quality of the wireless hotspot is represented by combining the signal strength, the negotiation rate and the data transceiving success rate in the embodiment. In the following, the network quality of the first wireless hotspot is taken as an example for description, and the detection of the network quality of the second wireless hotspot can be referred to.
Specifically, the mobile terminal first detects a Wi-Fi signal of a first wireless hotspot through the Wi-Fi module 102, then obtains the signal strength and negotiation rate of the first wireless hotspot according to the Wi-Fi signal detection of the first wireless hotspot, and then obtains a data transceiving success rate based on the first wireless hotspot from a bottom layer.
After the signal intensity, the negotiation rate and the data receiving and sending success rate of the first wireless hotspot are obtained, the quality scores corresponding to the signal intensity, the negotiation rate and the data receiving and sending success rate are respectively determined according to the size intervals of the signal intensity, the negotiation rate and the data receiving and sending success rate, then the weighted sum of the quality scores is calculated according to the preset weight coefficients corresponding to the signal intensity, the negotiation rate and the data receiving and sending success rate, and the calculated weighted sum is used as the network quality of the first wireless hotspot.
For example, it is assumed that the preset weight coefficients corresponding to the signal strength, the negotiation rate, and the data transceiving success rate are 0.4, 0.2, and 0.4, respectively.
Dividing 3 intensity intervals corresponding to the signal intensity, and respectively corresponding to quality scores of 60, 40 and 20 from large to small; corresponding to the negotiated rate, 3 rate intervals are also divided, and the rate intervals respectively correspond to quality scores of 60, 40 and 20 from large to small; the data transmission and reception success rate is also divided into 3 rate intervals, and the rate intervals respectively correspond to the quality scores of 60, 40 and 20 from large to small.
If it is determined that the quality scores corresponding to the signal strength, the negotiation rate, and the data transceiving success rate are 60, 40, and 40, respectively, the network quality of the first wireless hotspot is 60 × 0.4+40 × 0.2+40 × 0.4 — 48.
Further, based on the first embodiment, a third embodiment of the Wi-Fi control method according to the present invention is proposed, where in this embodiment, after step S20, the method further includes:
when the two wireless hotspots which are connected currently are unsafe wireless hotspots, disconnecting the Wi-Fi module 102 from the wireless hotspot with poor network quality in the two wireless hotspots, and controlling the Wi-Fi module 102 to establish connection with the safe wireless hotspot in the same frequency band where the disconnected wireless hotspot is located;
and configuring the application program to perform data transmission through the newly established connected secure wireless hotspot.
It should be noted that, in this embodiment, processing operations of non-secure wireless hotspots in connected wireless hotspots are added on the basis of the foregoing first embodiment, which is only described below, and other embodiments can refer to the foregoing corresponding embodiments, and are not described herein again.
After the mobile terminal finishes judging the two wireless hotspots, if it is determined that the two currently connected wireless hotspots are both unsafe wireless hotspots, the mobile terminal further identifies the network quality of the first wireless hotspot and the second wireless hotspot (the specific identification method may refer to the second embodiment, which is not described herein again), and determines the wireless hotspot with poor network quality in the two wireless hotspots.
After the wireless hotspot with poor network quality is determined, the mobile terminal disconnects the Wi-Fi module 102 from the wireless hotspot with poor network quality, and controls the Wi-Fi module 102 to establish connection with the safe wireless hotspot in the same frequency band where the disconnected wireless hotspot is located. For example, referring to fig. 6, when determining that the network quality of the first wireless hotspot operating in the 2.4G frequency band is poor, the mobile terminal controls the Wi-Fi module 102 to disconnect from the first wireless hotspot, scans other wireless hotspots operating in the 2.4G frequency band, determines a secure wireless hotspot, such as a third wireless hotspot, in the other wireless hotspots, and then controls the Wi-Fi module 102 to establish a connection with the third wireless hotspot.
After the Wi-Fi module 102 establishes a connection with the secure wireless hotspot, the mobile terminal configures the application program to perform data transmission through the secure wireless hotspot for which the connection is newly established.
Further, based on any embodiment, a fourth embodiment of the Wi-Fi control method of the present invention is provided, where in this embodiment, determining whether the application is a preset application with a security requirement includes:
acquiring a package name of the application program, and identifying whether the application program is a payment application or not according to the acquired package name, wherein when the application program is the payment application, the application program is determined to be a preset application program;
or identifying the system authority acquired by the application program, and judging whether the acquired system authority simultaneously comprises a telephone authority, an address list authority and a short message authority, wherein when the judgment result is yes, the application program is determined to be a preset application program;
or judging whether the application program is a trusted application running in a trusted execution environment, wherein when the application program is the trusted application, the application program is determined to be a preset application program;
or judging whether the application program is an application program in a pre-generated safe white list, wherein when the application program is the application program in the safe white list, the application program is determined to be a preset application program.
It should be noted that, in this embodiment, on the basis of the foregoing embodiment, several operations for optionally identifying whether the application is a preset application with a security requirement are added, which will only be described below, and other operations may refer to the foregoing embodiment and are not described herein again.
In this embodiment, whether the application is a preset application with a security requirement may be identified in various ways.
Firstly, when the mobile terminal starts an application program, firstly, a package name of the application program is obtained, then the obtained package name is compared with each package name in a locally maintained payment application list, if the comparison is successful, the application program is indicated to be a payment application, and the payment application generally relates to transmission of sensitive transaction information, so that the application program can be determined to be a preset application program with a safety requirement.
Secondly, when the mobile terminal starts the application program, firstly, the system permission acquired by the application program is identified, then whether the system permission acquired by the application program simultaneously comprises the telephone permission, the address list permission and the short message permission is judged, if yes, the application program is usually related to the transmission of sensitive call information, the address list and the like, and therefore the application program can be determined to be a preset application program with safety requirements.
Thirdly, when the mobile terminal starts the application program, firstly, whether the application program is a trusted application running in a trusted execution environment is identified, if so, the application program has a higher system security level, and transmission of sensitive information is usually involved, so that the application program can be determined to be a preset application program with a security requirement.
And fourthly, when the mobile terminal starts the application program, firstly identifying whether the application program is the application program in a pre-generated safety white list, and if so, determining that the application program is a preset application program with safety requirements. For example, please refer to fig. 7, which is an exemplary diagram of a setting interface of the secure white list, if a user feels that security protection needs to be performed on data transmission of an application program, a slider corresponding to the application program may be dialed to the right, and the application program is added to the secure white list, such as application program 3; and if the user feels that the data transmission of the application program is not required to be subjected to safety protection, the sliding block corresponding to the application program is not stirred, and the default state is maintained.
In addition, the present invention further provides a computer-readable storage medium, which is applied to the mobile terminal shown in fig. 1, where the mobile terminal includes a Wi-Fi module 102, the Wi-Fi module 102 is configured with a first MAC address and a second MAC address, the Wi-Fi module 102 establishes a connection with a first wireless hotspot based on the first MAC address, and the Wi-Fi module 102 establishes a connection with a second wireless hotspot based on the second MAC address, and the computer-readable storage medium stores a Wi-Fi control program, and when executed by the processor 110, the Wi-Fi control program implements the following operations:
when an application program is started, determining whether the application program is a preset application program with a safety requirement;
when the application program is a preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined safe wireless hotspot.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
and judging whether the two wireless hotspots which are connected currently adopt a preset public key encryption algorithm or not, and determining the wireless hotspot which starts the preset public key encryption algorithm as a safe wireless hotspot.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
and when the application program is not a preset application program, configuring the application program to transmit data through the wireless hotspot with better network quality in the two currently connected wireless hotspots.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
when the two wireless hotspots which are connected currently are unsafe wireless hotspots, disconnecting the Wi-Fi module 102 from the wireless hotspot with poor network quality in the two wireless hotspots, and controlling the Wi-Fi module 102 to establish connection with the safe wireless hotspot in the same frequency band where the disconnected wireless hotspot is located;
and configuring the application program to perform data transmission through the newly established connected secure wireless hotspot.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
acquiring a package name of the application program, and identifying whether the application program is a payment application or not according to the acquired package name, wherein when the application program is the payment application, the application program is determined to be a preset application program.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
and identifying the system authority acquired by the application program, and judging whether the acquired system authority simultaneously comprises a telephone authority, an address list authority and a short message authority, wherein if the judgment result is yes, the application program is determined to be a preset application program.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
and judging whether the application program is a trusted application running in a trusted execution environment, wherein when the application program is the trusted application, the application program is determined to be a preset application program.
Further, the Wi-Fi control program, when executed by the processor 110, further implements the following operations:
and judging whether the application program is an application program in a pre-generated safe white list, wherein when the application program is the application program in the safe white list, the application program is determined to be a preset application program.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for causing a mobile terminal to execute the method according to the embodiments of the present invention.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A Wi-Fi control method is characterized in that a Wi-Fi module of a mobile terminal is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes connection with a first wireless hotspot based on the first MAC address, the Wi-Fi module establishes connection with a second wireless hotspot based on the second MAC address, the Wi-Fi module comprises a Wi-Fi chip, a Wi-Fi dual-port driving module and a Wi-Fi dual-port protocol module, the Wi-Fi dual-port driving module is used for binding the first MAC address and the second MAC address with a port wlan0 and a port wlan1 respectively, the Wi-Fi dual-port protocol module comprises two protocol stacks respectively used for supporting the port wlan0 and the port wlan1, and the Wi-Fi control method comprises the following steps:
when an application program is started, determining whether the application program is a preset application program with a safety requirement, wherein the safety level of the currently installed application program of the mobile terminal comprises a first safety level, a second safety level and a third safety level, if the application program is the application program with the first safety level, determining that the application program is the preset application program, and if the application program is the application program with the second safety level, temporarily determining that the application program is the preset application program;
when the application program is the preset application program, determining a safe wireless hotspot in two wireless hotspots which are connected currently;
and configuring the application program to perform data transmission through the determined safe wireless hotspot, wherein if the application program is temporarily determined to be a preset application program, the application program is configured to perform data transmission through the safe wireless hotspot when the available bandwidth of the safe wireless hotspot is greater than or equal to the required bandwidth of the application program, and the application program is configured to perform data transmission through the other wireless hotspot of the two wireless hotspots when the available bandwidth of the safe wireless hotspot is less than the required bandwidth of the application program.
2. The Wi-Fi control method of claim 1, wherein the determining a secure wireless hotspot of two currently connected wireless hotspots comprises:
and judging whether the two wireless hotspots which are connected currently adopt a preset public key encryption algorithm or not, and determining the wireless hotspot which starts the preset public key encryption algorithm as a safe wireless hotspot.
3. The Wi-Fi control method of claim 1, wherein the step of determining whether the application is a preset application that has security requirements is followed by:
and when the application program is not the preset application program, configuring the application program to transmit data through the wireless hotspot with better network quality in the two currently connected wireless hotspots.
4. The Wi-Fi control method of claim 1, wherein the step of determining a secure wireless hotspot of two currently connected wireless hotspots is followed by:
when the two wireless hotspots which are connected currently are unsafe wireless hotspots, disconnecting the Wi-Fi module from the wireless hotspot with poor network quality in the two wireless hotspots, and controlling the Wi-Fi module to establish connection with the safe wireless hotspot in the same frequency band where the disconnected wireless hotspot is located;
and configuring the application program to perform data transmission through the newly established connected secure wireless hotspot.
5. The Wi-Fi control method of any of claims 1-4, wherein the determining whether the application is a preset application for which a security requirement exists comprises:
acquiring a package name of the application program, and identifying whether the application program is a payment application or not according to the acquired package name, wherein when the application program is the payment application, the application program is determined to be the preset application program.
6. The Wi-Fi control method of any of claims 1-4, wherein the determining whether the application is a preset application for which a security requirement exists comprises:
and identifying the system authority acquired by the application program, and judging whether the system authority simultaneously comprises a telephone authority, an address list authority and a short message authority, wherein when the judgment result is yes, the application program is determined to be the preset application program.
7. The Wi-Fi control method of any of claims 1-4, wherein the determining whether the application is a preset application for which a security requirement exists comprises:
and judging whether the application program is a trusted application running in a trusted execution environment, wherein when the application program is the trusted application, the application program is determined to be the preset application program.
8. The Wi-Fi control method of any of claims 1-4, wherein the determining whether the application is a preset application for which a security requirement exists comprises:
and judging whether the application program is an application program in a pre-generated safe white list, wherein when the application program is the application program in the safe white list, the application program is determined to be the preset application program.
9. A mobile terminal, characterized in that the mobile terminal comprises:
the Wi-Fi module is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes connection with a first wireless hotspot based on the first MAC address, and the Wi-Fi module establishes connection with a second wireless hotspot based on the second MAC address;
a memory storing a Wi-Fi control program;
a processor in communication with the memory and configured to execute the Wi-Fi control program to implement the steps of the Wi-Fi control method of any of claims 1-8.
10. A computer-readable storage medium applied to a mobile terminal, wherein a Wi-Fi module of the mobile terminal is configured with a first MAC address and a second MAC address, the Wi-Fi module establishes a connection with a first wireless hotspot based on the first MAC address, the Wi-Fi module establishes a connection with a second wireless hotspot based on the second MAC address, and the computer-readable storage medium has a Wi-Fi control program stored thereon, which when executed by a processor implements the steps of the Wi-Fi control method according to any one of claims 1 to 8.
CN201710912788.7A 2017-09-29 2017-09-29 Wi-Fi control method, mobile terminal and computer-readable storage medium Active CN107635234B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710912788.7A CN107635234B (en) 2017-09-29 2017-09-29 Wi-Fi control method, mobile terminal and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710912788.7A CN107635234B (en) 2017-09-29 2017-09-29 Wi-Fi control method, mobile terminal and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN107635234A CN107635234A (en) 2018-01-26
CN107635234B true CN107635234B (en) 2021-07-23

Family

ID=61103579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710912788.7A Active CN107635234B (en) 2017-09-29 2017-09-29 Wi-Fi control method, mobile terminal and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN107635234B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109803325B (en) 2019-02-12 2020-12-22 Oppo广东移动通信有限公司 Data distribution method and device, mobile terminal and storage medium
CN110475333B (en) * 2019-08-19 2021-07-16 Oppo广东移动通信有限公司 Method for disconnecting WIFI network and related equipment
CN110493779B (en) * 2019-08-23 2022-01-25 Oppo广东移动通信有限公司 Wireless network connection method and related device
CN111148188B (en) * 2019-12-30 2022-11-04 Oppo广东移动通信有限公司 Network connection method, device, storage medium and electronic equipment
CN112788664A (en) * 2020-12-31 2021-05-11 努比亚技术有限公司 Dual-WiFi data transmission method, device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
CN105898809A (en) * 2016-05-25 2016-08-24 努比亚技术有限公司 WiFi connection management device and method, and mobile terminal
CN106250780A (en) * 2016-07-29 2016-12-21 捷开通讯(深圳)有限公司 Mobile terminal and network application program method for limiting
CN106888184A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 Mobile terminal payment class application security method of payment and device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8493992B2 (en) * 2010-02-04 2013-07-23 Texas Instruments Incorporated Interrelated WiFi and USB protocols and other application framework processes, circuits and systems
WO2013152409A1 (en) * 2012-04-13 2013-10-17 Oliveira Eduardo Soares De Web-connected safety helmet
CN106102098B (en) * 2016-05-27 2019-09-13 华为技术有限公司 A kind of method and device accessing WIFI network

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
CN106888184A (en) * 2015-12-15 2017-06-23 北京奇虎科技有限公司 Mobile terminal payment class application security method of payment and device
CN105898809A (en) * 2016-05-25 2016-08-24 努比亚技术有限公司 WiFi connection management device and method, and mobile terminal
CN106250780A (en) * 2016-07-29 2016-12-21 捷开通讯(深圳)有限公司 Mobile terminal and network application program method for limiting

Also Published As

Publication number Publication date
CN107635234A (en) 2018-01-26

Similar Documents

Publication Publication Date Title
CN109257740B (en) Profile downloading method, mobile terminal and readable storage medium
CN107635234B (en) Wi-Fi control method, mobile terminal and computer-readable storage medium
CN107770841B (en) Hotspot connection method, mobile terminal and computer-readable storage medium
CN112004173B (en) Bluetooth headset switching method, mobile terminal and computer readable storage medium
CN108307432B (en) WiFi control method, mobile terminal and computer-readable storage medium
CN109618316B (en) Network sharing method, mobile terminal and storage medium
CN107580359B (en) Wireless hotspot sharing method, mobile terminal and computer readable storage medium
CN107147656B (en) Method and system for establishing remote control and readable storage medium
CN109151169B (en) Camera authority management method, mobile terminal and computer readable storage medium
CN108307433B (en) Wireless hotspot sharing method, mobile terminal and computer readable storage medium
CN110677851B (en) Terminal network access method and network access equipment access method
CN108075899B (en) Identity authentication method, mobile terminal and computer readable storage medium
CN108833690B (en) Authority control method, terminal and computer readable storage medium
CN108601062B (en) WiFi connection sharing method, terminal and computer storage medium
CN107124718B (en) Data transmission method, mobile terminal and storage medium
CN108012270B (en) Information processing method, equipment and computer readable storage medium
CN107770840B (en) Hot signal display method, mobile terminal and computer readable storage medium
CN108541046B (en) Network selection method, terminal and storage medium
CN107395363B (en) Fingerprint sharing method and mobile terminal
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
JP2021533679A (en) Resource setting method and equipment
WO2021175244A1 (en) Authorization and policy parameter configuration method, terminal, and network functions
CN108199964B (en) Transmission method, terminal, server and computer readable storage medium
CN112770279A (en) Network sharing method, mobile terminal and computer readable storage medium
CN108183833B (en) Response processing method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant