CN107920383B - Wireless hotspot connection method, mobile terminal and computer-readable storage medium - Google Patents

Wireless hotspot connection method, mobile terminal and computer-readable storage medium Download PDF

Info

Publication number
CN107920383B
CN107920383B CN201711114808.2A CN201711114808A CN107920383B CN 107920383 B CN107920383 B CN 107920383B CN 201711114808 A CN201711114808 A CN 201711114808A CN 107920383 B CN107920383 B CN 107920383B
Authority
CN
China
Prior art keywords
wireless hotspot
party application
attribute mark
preset
attribute
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711114808.2A
Other languages
Chinese (zh)
Other versions
CN107920383A (en
Inventor
候祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201711114808.2A priority Critical patent/CN107920383B/en
Publication of CN107920383A publication Critical patent/CN107920383A/en
Application granted granted Critical
Publication of CN107920383B publication Critical patent/CN107920383B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions

Abstract

The embodiment of the invention discloses a wireless hotspot connection method, which belongs to the technical field of communication and is applied to a mobile terminal, and comprises the following steps: and when an event triggering access to the wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot, if the attribute mark indicates that the wireless hotspot is connected by a third-party application, prohibiting automatic access to the wireless hotspot, and if the attribute mark indicates that the wireless hotspot is not connected by the third-party application, automatically accessing the wireless hotspot. The embodiment of the invention also discloses a mobile terminal and a computer readable storage medium, which can improve the security of accessing the wireless hotspot.

Description

Wireless hotspot connection method, mobile terminal and computer-readable storage medium
Technical Field
The invention belongs to the technical field of communication, and particularly relates to a wireless hotspot connection method, a mobile terminal and a computer readable storage medium.
Background
The development of communication technology and internet technology has enabled mobile terminals to be widely used, and users' demand for wifi (WIRELESS-fidelity) network access has increased. The mode of accessing the wifi network is diversified, wherein the convenience is that peripheral free wifi information is automatically obtained through third party application and connection is established with the selected wifi, and the third party application refers to the application which can be used by the mobile terminal of systems such as android and iPhone.
After a user uses (such as a wifi universal key) to connect a wifi hotspot, the terminal device can automatically store the hotspot information, and can automatically connect when the wifi hotspot is scanned next time, and the potential safety hazard exists because the password-free hotspot provided in the third-party application cannot be ensured to be safe.
Disclosure of Invention
The invention provides a wireless hotspot connection method, a mobile terminal and a computer readable storage medium, which can solve the potential safety hazard caused by automatic reconnection when a once-connected wireless hotspot is accessed through a third-party application.
The first aspect of the embodiments of the present invention provides a wireless hotspot connection method, which is applied to a mobile terminal, and the method includes:
when an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot;
if the attribute mark indicates that the wireless hotspot is connected by a third-party application, automatically accessing the wireless hotspot is forbidden;
and if the attribute mark indicates that the wireless hotspot is not connected through a third-party application, automatically accessing the wireless hotspot.
A second aspect of an embodiment of the present invention provides a mobile terminal, including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring an attribute mark of a wireless hotspot when an event triggering access to the wireless hotspot is monitored;
a connection module, configured to prohibit automatic access to the wireless hotspot if the attribute flag indicates that the wireless hotspot was connected via a third-party application;
the connection module is further configured to automatically access the wireless hotspot if the attribute flag indicates that the wireless hotspot is not connected through a third-party application.
A third aspect of the embodiments of the present invention provides a mobile terminal, including: the wireless hotspot connecting method comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein when the processor executes the computer program, the wireless hotspot connecting method provided by the first aspect of the embodiment of the invention is realized.
A fourth aspect of the embodiments of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the wireless hotspot connection method provided in the first aspect of the embodiments of the present invention.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
Fig. 1 is a schematic flow chart illustrating an implementation of a wireless hotspot connection method according to a first embodiment of the present invention;
fig. 2 is a schematic application environment diagram of a wireless hotspot connection method according to an embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an implementation of a wireless hotspot connection method according to a second embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an implementation of a wireless hotspot connection method according to a third embodiment of the present invention;
fig. 5 is a schematic structural diagram of a mobile terminal according to a fourth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a mobile terminal according to a fifth embodiment of the present invention;
fig. 7 is a hardware configuration diagram of the mobile terminal in the embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a schematic view of an implementation flow of a wireless hotspot connection method according to a first embodiment of the present invention, where the method is applicable to a mobile terminal, and the mobile terminal includes: the mobile communication network can be used for communication devices used in moving, such as smart phones, tablet computers, smart watches and the like. As shown in fig. 2, fig. 2 is a schematic application environment diagram of a wireless hotspot connection method according to an embodiment of the present invention. As shown in fig. 2, the mobile terminal is a mobile phone, for example, the mobile phone 100 establishes a connection with the wireless hotspot 200 through a built-in application control, so as to access a wireless network provided by the wireless hotspot 200. The wireless hotspot connection method in the embodiment shown in fig. 1 mainly includes the following steps:
101. when an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot;
a wireless hotspot generally refers to a location where a wireless local area network is provided in a public place to access Internet services. The wireless hotspot may also be a mobile terminal, which may serve as an access device to a wifi network.
The attribute tag of the wireless hotspot is a tag indicating whether the wireless hotspot was connected through a third-party application. For example: if the attribute is marked as true, the wireless hotspot is indicated to be connected through a third-party application; the attribute flag is other, such as false or null or other flag, indicating that the wireless hotspot has not been connected through a third party application.
The corresponding relation between the attribute mark and the wireless hotspot connected through the third-party application can be preset.
The third-party application is an application excluding a system component having a wireless connection function in the mobile terminal, and is an application that is not tied to the operating system, or an application developed by a developer of a non-operating system installed by the user, for example, various apps (applications) having a wireless connection function that do not belong to the system and need to be installed later or built in advance.
102. If the attribute mark indicates that the wireless hotspot is connected by a third-party application, the wireless hotspot is prohibited from being automatically accessed;
if the attribute mark indicates that the wireless hotspot is connected through the third-party application once, and whether the password-free wireless hotspot provided in the third-party application is safe cannot be guaranteed, the wireless hotspot is considered to have potential safety hazards, the wireless hotspot is prohibited from being automatically accessed, namely, reconnection is not automatically performed, but the wireless hotspot can be accessed through a system component, namely, the wireless hotspot selected and connected by the user and the input password are acquired and then connected, or the wireless hotspot is repeatedly accessed through the third-party application again, namely, the wireless hotspot selected by the user and the input or decrypted password are acquired and then connected.
103. And if the attribute mark indicates that the wireless hotspot is not connected through the third-party application, automatically accessing the wireless hotspot.
If the attribute mark indicates that the wireless hotspot is not connected through the third-party application, the wireless hotspot is considered to be safe, and the wireless hotspot can be automatically accessed.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Referring to fig. 3, fig. 3 is a schematic flow chart illustrating an implementation of a wireless hotspot connection method according to a second embodiment of the present invention, where the method can be applied to a mobile terminal. As shown in fig. 3, the method includes:
201. when the wireless hotspot is accessed through the third-party application, the attribute mark of the accessed wireless hotspot is marked as a preset attribute mark, and the preset attribute mark indicates that the wireless hotspot is connected through the third-party application;
before accessing a wireless hotspot, firstly, judging whether an Application used when the wireless hotspot is accessed is a third-party Application, wherein the specific judgment mode can be that network Interface information for triggering Application call connected with the wireless hotspot and User Identification information of an accessed wireless network are obtained, the network Interface is an Application Programming Interface (API), the User Identification information is a (UID, User Identification), and according to the obtained network Interface information and the User Identification information, through matching with a system component, judging whether the Application triggering the access event is a system component.
When the wireless hotspot is accessed through the third-party application, the attribute mark of the accessed wireless hotspot is marked as a preset attribute mark, and the preset attribute mark indicates that the wireless hotspot is connected through the third-party application.
Specifically, when the wireless hotspot is connected through the third-party application, whether the security level of the third-party application is smaller than a preset level or not is judged, and if the security level of the third-party application is smaller than the preset level, the attribute mark of the wireless hotspot is marked as a preset attribute mark.
Further, when the wireless hotspot is connected through the third-party application, whether the security level of the third-party application is smaller than a preset level is judged, specifically, when the wireless hotspot is connected through the third-party application, the score of the third-party application is obtained through the application management platform, the security level of the third-party application is determined according to the obtained score, and whether the security level is smaller than the preset level is judged.
Among other things, application management platforms, such as application marketplaces, application malls, and the like, may provide a platform for application download, installation, and the like management. The user's score for the application is typically saved in the platform. The corresponding relation between the scores and the safety levels can be preset in the mobile terminal, and the safety levels of different applications can be determined by inquiring the corresponding relation. It will be appreciated that a higher score corresponds to a higher security level.
Optionally, the security level may also be user-defined. Specifically, in response to a setting instruction triggered by a user, the security level of the application to which the setting instruction points may be set to a level specified by the user.
202. When an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot;
the attribute tag of the wireless hotspot is a tag indicating whether the wireless hotspot was connected through a third-party application. For example: if the attribute is marked as true, the wireless hotspot is indicated to be connected through a third-party application; the attribute flag is other, such as false or null or other flag, indicating that the wireless hotspot has not been connected through a third party application.
The corresponding relation between the attribute mark and the wireless hotspot connected through the third-party application can be preset.
203. If the attribute mark indicates that the wireless hotspot is connected by a third-party application, the wireless hotspot is prohibited from being automatically accessed;
if the attribute mark indicates that the wireless hotspot is connected by the third-party application, the wireless hotspot is considered to have potential safety hazard, the wireless hotspot is prohibited from being automatically accessed, namely, the reconnection is not automatically performed, but the wireless hotspot can be accessed through a system component, namely, the wireless hotspot selected by the user to be connected and the input password are acquired and then the connection is performed, or the wireless hotspot is repeatedly accessed through the third-party application, namely, the wireless hotspot selected by the user and the input or decrypted password are acquired and then the connection is performed.
204. And if the attribute mark indicates that the wireless hotspot is not connected through the third-party application, automatically accessing the wireless hotspot.
If the attribute mark indicates that the wireless hotspot is not connected through the third-party application, the wireless hotspot is considered to be safe, and the wireless hotspot can be automatically accessed.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Referring to fig. 4, fig. 4 is a schematic view illustrating an implementation flow of a wireless hotspot connection method according to a third embodiment of the present invention, where the method can be applied to a mobile terminal. As shown in fig. 4, the method includes:
301. when the wireless hotspot is connected through the third-party application, whether an access password used when the wireless hotspot is accessed is a password input by a user is judged;
specifically, when a wireless hotspot is connected through a third-party application, whether an input event of the access password is continuously monitored before an access event of the wireless hotspot is monitored is judged, and if the input event of the access password is continuously monitored, the access password used when the wireless hotspot is accessed is confirmed to be the password input by the user.
It should be noted that, if the wireless hotspot is accessed according to the operation of the user, a general user performs a password input operation first and then performs an operation of clicking the connection confirmation button, and when a click event of the connection confirmation button is monitored, an access request is sent to the wireless hotspot to which the click event points, so as to complete the access operation. That is, the application program obtains the password input by the user, the user clicks the confirmation connection button, and the application program sends the access request to the wireless hotspot as successive events which occur successively
If not, executing step 302; if the password is entered by the user, step 303 is performed.
302. Marking the attribute mark of the wireless hotspot as a preset attribute mark;
if the attribute mark is not the password input by the user, the attribute mark of the wireless hotspot is marked as a preset attribute mark.
By judging whether the input event of the access password is continuously monitored before the access event of the wireless hotspot is monitored, whether the monitored access event of the wireless hotspot is dominated by the user can be judged. If the user is dominant, the normally accessed wireless hotspot is safe, so that the wireless hotspot does not need to be marked, and the wireless hotspot still can be automatically connected when being scanned next time, so that the flexibility of wireless network connection management can be improved.
303. The attribute mark of the wireless hotspot is not marked as a preset attribute mark;
including tagging as other attribute tags or not attribute tagging of the wireless hotspot.
304. When an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot;
305. if the attribute mark indicates that the wireless hotspot is connected by a third-party application, the wireless hotspot is prohibited from being automatically accessed;
if the attribute mark indicates that the wireless hotspot is connected by the third-party application, the wireless hotspot is considered to have potential safety hazard, the wireless hotspot is prohibited from being automatically accessed, namely, the reconnection is not automatically performed, but the wireless hotspot can be accessed through a system component, namely, the wireless hotspot selected by the user to be connected and the input password are acquired and then the connection is performed, or the wireless hotspot is repeatedly accessed through the third-party application, namely, the wireless hotspot selected by the user and the input or decrypted password are acquired and then the connection is performed.
306. And if the attribute mark indicates that the wireless hotspot is not connected through the third-party application, automatically accessing the wireless hotspot.
If the attribute mark indicates that the wireless hotspot is not connected through the third-party application, the wireless hotspot is considered to be safe, and the wireless hotspot can be automatically accessed.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a mobile terminal according to a fourth embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown. The mobile terminal illustrated in fig. 5 may be an execution subject of the wireless hotspot connection method provided in the foregoing embodiment illustrated in fig. 1. The mobile terminal illustrated in fig. 5 mainly includes: an acquisition module 401 and a connection module 402.
An obtaining module 401, configured to obtain an attribute flag of a wireless hotspot when an event triggering access to the wireless hotspot is monitored;
a connection module 402, configured to prohibit automatic access to the wireless hotspot if the attribute flag indicates that the wireless hotspot was connected via the third-party application;
the connection module 402 is further configured to automatically access the wireless hotspot if the attribute flag indicates that the wireless hotspot is not connected through the third-party application.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1, which is not described herein again.
It should be noted that, in the embodiment of the mobile terminal illustrated in fig. 5, the division of the functional modules is only an example, and in practical applications, the above functions may be allocated by different functional modules according to needs, for example, configuration requirements of corresponding hardware or convenience of implementation of software, that is, the internal structure of the mobile terminal is divided into different functional modules to complete all or part of the functions described above. In addition, in practical applications, the corresponding functional modules in this embodiment may be implemented by corresponding hardware, or may be implemented by corresponding hardware executing corresponding software. The above description principles can be applied to various embodiments provided in the present specification, and are not described in detail below.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Referring to fig. 6, a schematic structural diagram of a mobile terminal according to a fifth embodiment of the present invention shows only portions related to the embodiment of the present invention for convenience of description. The mobile terminal illustrated in fig. 6 may be an executive body of the wireless hotspot connection method provided in the foregoing embodiments illustrated in fig. 3 to 4. The mobile terminal in this embodiment is different from the mobile terminal in the embodiment shown in fig. 5 mainly in that:
further, the mobile terminal further includes:
the marking module 501 is configured to mark the attribute mark of the wireless hotspot as a preset attribute mark when the wireless hotspot is accessed through a third-party application, where the preset attribute mark indicates that the wireless hotspot is connected through the third-party application.
Further, the marking module 501 includes: a decision submodule 5011 and a flag submodule 5012.
The judgment sub-module 5011 is configured to judge whether the security level of the third-party application is less than a preset level when the third-party application is connected to the wireless hotspot;
the marking submodule 5012 is configured to mark the attribute mark of the wireless hotspot as a preset attribute mark if the attribute mark is smaller than the preset level;
the judgment sub-module 5011 is further configured to, when the wireless hotspot is connected through the third-party application, obtain a score of the third-party application through the application management platform, determine a security level of the third-party application according to the obtained score, and judge whether the security level is less than a preset level.
The judgment sub-module 5011 is further configured to judge whether an access password used when the wireless hotspot is accessed is a password input by the user when the wireless hotspot is connected through the third-party application;
the marking sub-module 5012 is further configured to mark the attribute flag of the wireless hotspot as a preset attribute flag if the password is not the password input by the user.
The determining sub-module 5011 is further configured to determine, when the wireless hotspot is connected through the third-party application, whether an input event of the access password is continuously monitored before the access event of the wireless hotspot is monitored, and if the input event of the access password is continuously monitored, determine that the access password used when the wireless hotspot is accessed is the password input by the user.
For details that are not described in the present embodiment, please refer to the description of the embodiment shown in fig. 1 to fig. 4, which will not be described herein again.
In the embodiment of the invention, when the wireless hotspot is connected, if the wireless hotspot is connected by the third-party application once, the wireless hotspot is forbidden to be automatically accessed, if the wireless hotspot is not connected by the third-party application once, the wireless hotspot is automatically accessed, whether the wireless hotspot is automatically accessed is confirmed by confirming whether the wireless hotspot is connected by the third-party application once, so that the potential safety hazard caused by automatically reconnecting the wireless hotspot connected by the third-party application once can be avoided, and the security of accessing the wireless hotspot is improved.
Referring to fig. 7, fig. 7 is a hardware structure diagram of a mobile terminal according to an embodiment of the present invention.
The mobile terminal described in this embodiment includes:
a memory 61, a processor 62 and a computer program stored on the memory 61 and executable on the processor 62, wherein the processor 62 executes the computer program to implement the wireless hotspot connecting method described in the embodiments of fig. 1 to 5.
The method comprises the following steps: when an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot; if the attribute mark indicates that the wireless hotspot is connected by a third-party application, automatically accessing the wireless hotspot is forbidden; and if the attribute mark indicates that the wireless hotspot is not connected through a third-party application, automatically accessing the wireless hotspot.
Further, the mobile terminal further includes:
at least one input device 63 and at least one output device 64.
The memory 61, the processor 62, the input device 63, and the output device 64 are connected by a bus 65.
The input device 63 may be a camera, a touch panel, a physical button, a mouse, or the like. The output device 64 may specifically be a display screen.
The Memory 61 may be a high-speed Random Access Memory (RAM) Memory or a non-volatile Memory (non-volatile Memory), such as a magnetic disk Memory. The memory 61 is used for storing a set of executable program codes, and the processor 62 is coupled to the memory 61.
Further, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium may be provided in the mobile terminal in the foregoing embodiments, and the computer-readable storage medium may be the memory in the foregoing embodiment shown in fig. 7. The computer readable storage medium has stored thereon a computer program, which when executed by a processor implements the wireless hotspot connecting method described in the embodiments of fig. 1 to 4. Further, the computer-readable storage medium may be various media that can store program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a RAM, a magnetic disk, or an optical disk.
In the embodiments provided in the present application, it should be understood that the disclosed mobile terminal and method may be implemented in other ways. For example, the above-described embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and an actual implementation may have another division, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication link may be through some interfaces, and the indirect coupling or communication link of the modules may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention. Further, those skilled in the art will appreciate that the embodiments described in the specification are presently preferred and that no acts or modules are necessarily required of the invention.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the above description, for those skilled in the art, there are variations on the specific implementation and application scope according to the concepts of the embodiments of the present invention, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (11)

1. A wireless hotspot connection method is applied to a mobile terminal, and is characterized by comprising the following steps:
when an event triggering access to a wireless hotspot is monitored, acquiring an attribute mark of the wireless hotspot;
if the attribute mark indicates that the wireless hotspot is connected by a third-party application, automatically accessing the wireless hotspot is forbidden;
and if the attribute mark indicates that the wireless hotspot is not connected through a third-party application, automatically accessing the wireless hotspot.
2. The method of claim 1, wherein the method further comprises:
when a wireless hotspot is accessed through a third-party application, the attribute mark of the wireless hotspot is marked as a preset attribute mark, and the preset attribute mark indicates that the wireless hotspot is connected through the third-party application.
3. The method of claim 2, wherein marking the attribute indicia of the wireless hotspot as a preset attribute indicia upon connection of the wireless hotspot by a third-party application comprises:
when a wireless hotspot is connected through a third-party application, judging whether the security level of the third-party application is smaller than a preset level;
and if the attribute mark is smaller than the preset grade, marking the attribute mark of the wireless hotspot as a preset attribute mark.
4. The method of claim 3, wherein determining whether the security level of the third-party application is less than a preset level when the wireless hotspot is connected through the third-party application comprises:
when a wireless hotspot is connected through a third-party application, the score of the third-party application is obtained through an application management platform;
and determining the security level of the third-party application according to the obtained score, and judging whether the security level is less than a preset level.
5. The method of claim 1, wherein marking the attribute indicia of the wireless hotspot as a preset attribute indicia upon connection of the wireless hotspot by a third-party application comprises:
when a wireless hotspot is connected through a third-party application, judging whether an access password used when the wireless hotspot is accessed is a password input by a user;
and if the attribute mark is not the password input by the user, marking the attribute mark of the wireless hotspot as a preset attribute mark.
6. The method of claim 5, wherein when the wireless hotspot is connected through the third-party application, determining whether the access password used when accessing the wireless hotspot is a password input by a user comprises:
when a wireless hotspot is connected through a third-party application, judging whether an input event of an access password is continuously monitored before an access event of the wireless hotspot is monitored;
and if the input event of the access password is continuously monitored, confirming that the access password used when the wireless hotspot is accessed is the password input by the user.
7. A mobile terminal, comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring an attribute mark of a wireless hotspot when an event triggering access to the wireless hotspot is monitored;
a connection module, configured to prohibit automatic access to the wireless hotspot if the attribute flag indicates that the wireless hotspot was connected via a third-party application;
the connection module is further configured to automatically access the wireless hotspot if the attribute flag indicates that the wireless hotspot is not connected through a third-party application.
8. The mobile terminal of claim 7, wherein the mobile terminal further comprises:
the marking module is used for marking the attribute mark of the wireless hotspot as a preset attribute mark when the wireless hotspot is accessed through a third-party application, wherein the preset attribute mark represents that the wireless hotspot is connected through the third-party application.
9. The mobile terminal of claim 8, wherein the tagging module comprises:
the judging submodule is used for judging whether the security level of the third-party application is smaller than a preset level or not when the wireless hotspot is connected through the third-party application;
the marking sub-module is used for marking the attribute mark of the wireless hotspot as a preset attribute mark if the attribute mark is smaller than the preset grade;
the judgment sub-module is further configured to, when the wireless hotspot is connected through a third-party application, obtain a score of the third-party application through an application management platform, determine a security level of the third-party application according to the obtained score, and judge whether the security level is less than a preset level.
The judgment sub-module is also used for judging whether an access password used for accessing the wireless hotspot is a password input by a user when the wireless hotspot is connected through a third-party application;
the marking sub-module is further configured to mark the attribute mark of the wireless hotspot as a preset attribute mark if the password is not the password input by the user;
the judging submodule is further configured to judge whether an input event of the access password is continuously monitored before an access event of the wireless hotspot is monitored when the wireless hotspot is connected through a third-party application, and if the input event of the access password is continuously monitored, confirm that the access password used when the wireless hotspot is accessed is the password input by the user.
10. A mobile terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the wireless hotspot connecting method according to any one of claims 1 to 6 when executing the computer program.
11. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements a wireless hotspot connecting method according to any one of claims 1 to 6.
CN201711114808.2A 2017-11-13 2017-11-13 Wireless hotspot connection method, mobile terminal and computer-readable storage medium Active CN107920383B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711114808.2A CN107920383B (en) 2017-11-13 2017-11-13 Wireless hotspot connection method, mobile terminal and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711114808.2A CN107920383B (en) 2017-11-13 2017-11-13 Wireless hotspot connection method, mobile terminal and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN107920383A CN107920383A (en) 2018-04-17
CN107920383B true CN107920383B (en) 2021-09-10

Family

ID=61895499

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711114808.2A Active CN107920383B (en) 2017-11-13 2017-11-13 Wireless hotspot connection method, mobile terminal and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN107920383B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108600280B (en) * 2018-08-06 2020-11-03 连尚(新昌)网络科技有限公司 Network connection method, equipment and storage medium
CN112020057B (en) * 2019-05-30 2023-04-07 中国电信股份有限公司 Method and system for identifying message
CN112040529B (en) * 2020-09-11 2023-08-04 连尚(北京)网络科技有限公司 WiFi connection method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243468A (en) * 2014-09-11 2014-12-24 高建宏 Method and system for logging onto commercial website of business place through Wi-Fi
EP2940925A1 (en) * 2014-04-28 2015-11-04 Nxp B.V. Implementing use-dependent security settings in a single white-box implementation
CN107197462A (en) * 2017-06-28 2017-09-22 阿里巴巴集团控股有限公司 Detection method, device and the electronic equipment of wireless network type

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2134063B1 (en) * 2008-05-12 2013-10-02 BlackBerry Limited Methods and apparatus for use in facilitating access to a communication service via WLAN hotspot
CN105873062A (en) * 2016-06-27 2016-08-17 联想(北京)有限公司 Method and device to be networked with wireless communication network, and terminal equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2940925A1 (en) * 2014-04-28 2015-11-04 Nxp B.V. Implementing use-dependent security settings in a single white-box implementation
CN104243468A (en) * 2014-09-11 2014-12-24 高建宏 Method and system for logging onto commercial website of business place through Wi-Fi
CN107197462A (en) * 2017-06-28 2017-09-22 阿里巴巴集团控股有限公司 Detection method, device and the electronic equipment of wireless network type

Also Published As

Publication number Publication date
CN107920383A (en) 2018-04-17

Similar Documents

Publication Publication Date Title
US20200366516A1 (en) Electronic device and method for registering smart home device in smart home system
US10635456B2 (en) Method for entering operating system desktop and mobile intelligent terminal
CN107844342B (en) Control method and device for keeping application program alive, storage medium and mobile terminal
CN107920383B (en) Wireless hotspot connection method, mobile terminal and computer-readable storage medium
US20160007204A1 (en) Method and apparatus of notifying of smishing
CN108762956B (en) Method for acquiring Native local data, server, mobile terminal and storage medium
EP3533247B1 (en) Wireless network type detection method and electronic device
CN105490917B (en) Method and device for realizing sharing in application
CN104992096A (en) Data protection method and mobile terminal
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
EP3021250B1 (en) Electronic device and method for suggesting response manual in occurrence of denial
CN105376719A (en) Information pushing method and device
CN108984255B (en) Remote assistance method and related equipment
CN111026408A (en) Method and device for managing application and computer storage medium
CN106714181B (en) Method and device for connecting WiFi hotspot
US10491730B2 (en) Method and apparatus for providing contact information
CN114265653A (en) Interface display method, device, equipment, storage medium and program product
CN108037989B (en) SDK component identification method and device
CN112486733B (en) System restoration method, device, terminal and storage medium
US20110263295A1 (en) System and method for providing a smart card-based widget service, and smart card for the same
CN110908881A (en) Method and device for sending buried point data, electronic equipment and computer readable storage medium
CN110659082A (en) Application program interface display method and device, terminal and storage medium
CN107968880B (en) Information management method, mobile terminal, and computer-readable storage medium
CN106775230B (en) Application freezing method and device and terminal
CN106201930B (en) A kind of device port determining device, terminal and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co.,Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: GUANGDONG OPPO MOBILE TELECOMMUNICATIONS Corp.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant