CN107979843B - WiFi hotspot connection processing method, device and medium for terminal - Google Patents

WiFi hotspot connection processing method, device and medium for terminal Download PDF

Info

Publication number
CN107979843B
CN107979843B CN201711299325.4A CN201711299325A CN107979843B CN 107979843 B CN107979843 B CN 107979843B CN 201711299325 A CN201711299325 A CN 201711299325A CN 107979843 B CN107979843 B CN 107979843B
Authority
CN
China
Prior art keywords
terminal
web authentication
hotspot
application
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711299325.4A
Other languages
Chinese (zh)
Other versions
CN107979843A (en
Inventor
吴培希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co.,Ltd.
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201711299325.4A priority Critical patent/CN107979843B/en
Publication of CN107979843A publication Critical patent/CN107979843A/en
Priority to PCT/CN2018/117993 priority patent/WO2019109843A1/en
Application granted granted Critical
Publication of CN107979843B publication Critical patent/CN107979843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition

Abstract

The application monitoring terminal on the terminal monitors the connection behavior of the terminal aiming at the Web authentication hotspot, and after the connection behavior aiming at the Web authentication hotspot is monitored, if the detection result of the network related program of the current terminal does not accord with the preset condition, the connection behavior aiming at the Web authentication hotspot is controlled, and if the detection result of the network related program of the current terminal accords with the preset condition, the user is guided to carry out Web authentication.

Description

WiFi hotspot connection processing method, device and medium for terminal
Technical Field
The present application relates to the field of computer technologies, and in particular, to a WiFi hotspot connection processing method, device, and medium at a terminal.
Background
The popularization of the smart phone brings convenience to the life of people, various services can be performed by using various applications on the smart phone, accordingly, internet traffic needs to be consumed, and users often surf the internet through WiFi hotspots as much as possible in order to save traffic cost.
In the prior art, some WiFi hotspots are Web authentication hotspots, and when a Web authentication hotspot is connected, a corresponding Web authentication Web page is automatically opened, and after authentication is performed through the Web authentication Web page, internet access can be performed through the Web authentication hotspot.
Based on the prior art, a scheme capable of meeting the use requirement of the Web authentication hotspot of the user more accurately is needed.
Disclosure of Invention
The embodiment of the application provides a WiFi hotspot connection processing method, device and medium for a terminal, which are used for solving the following technical problems in the prior art: there is a need for a solution that more accurately meets the user's Web authentication hotspot usage requirements.
The embodiment of the application adopts the following technical scheme:
a WiFi hotspot connection method in a terminal comprises the following steps:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
Optionally, before managing and controlling a connection behavior for the Web authentication hotspot or guiding a user, the method further includes:
and determining that the successful connection index of the Web authentication hotspot is not lower than a threshold value, wherein the successful connection index represents the possible degree of successful connection of the Web authentication hotspot.
Optionally, the successful connection indicator is based on at least one of: the WiFi hotspot signal strength, the WiFi hotspot historical connection record of the terminal and the limited list of the WiFi hotspots.
Optionally, the detecting result of the network related program of the terminal at present does not meet the predetermined condition, including:
AN application of a foreground of the terminal is not a third-party networking application, and a W L AN setup page of AN operating system is not a foreground of the terminal.
Optionally, the managing and controlling the connection behavior for the Web authentication hotspot includes:
and disconnecting the Web authentication hotspot connected through the connection behavior, or preventing the connection behavior.
Optionally, before managing and controlling the connection behavior for the Web authentication hotspot, the method further includes:
determining that an application of the foreground of the terminal is currently a pre-specified do-not-disturb application or determining that an application of the foreground of the terminal is currently not a pre-specified disturbing application.
Optionally, before the Web authentication hotspot connected through the connection behavior is disconnected or the connection behavior is prevented, the method further includes:
a query interface is presented to query the user to: whether to disconnect the Web authentication hotspot connected by the connection behavior or to block the connection behavior.
Optionally, the detecting result of the network related program of the terminal at present meets a predetermined condition, including:
the application of the foreground of the terminal is currently a third-party networking application, or the foreground of the terminal is currently a W L AN setup page of the operating system.
Optionally, the method further comprises:
if the detection result of the network related program of the current terminal can not be determined to meet the preset condition, judging whether the foreground of the current terminal has no application or whether the application of the foreground of the current terminal is not a pre-specified do-not-disturb application or whether the application of the foreground of the current terminal is a pre-specified disturb-able application;
and if so, displaying a guide interface to guide the user to perform corresponding Web authentication.
Optionally, the detecting result of the network related program of the terminal at present does not meet the predetermined condition, including:
the connection behavior aiming at the Web authentication hotspot is automatically carried out by the operating system according to the WiFi hotspot configuration data which is locally pre-stored;
the managing and controlling the connection behavior aiming at the Web authentication hotspot comprises the following steps:
and if the application of the foreground of the current terminal is determined to be a pre-specified do not disturb application or the application of the foreground of the current terminal is determined not to be a pre-specified disturb application, disconnecting the Web authentication hotspot connected through the Web authentication hotspot connecting behavior or preventing the Web authentication hotspot connecting behavior.
Optionally, the interface is displayed by at least one of: floating window, dialog box, bottom pop-up window.
A terminal, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
A WiFi hotspot connection processing non-volatile computer storage medium storing computer-executable instructions configured to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects: whether the connection behavior is the active behavior of the user can be estimated by judging whether the detection result of the network related program of the current terminal meets the preset condition, if not, the connection behavior can be managed and controlled, so that the connection behavior is prevented from disturbing the user, if yes, the user can be guided to carry out corresponding Web authentication, and therefore the actual use requirement of the user on Web authentication hotspots can be met, and the user experience is improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a WiFi hotspot connection processing method provided in some embodiments of the present application;
fig. 2 is a detailed flowchart of a WiFi hotspot connection processing method provided in some embodiments of the present application;
fig. 3 is a schematic structural diagram of a terminal provided in some embodiments of the present application;
fig. 4 is a schematic structural diagram of a WiFi hotspot connection processing device according to some embodiments of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a flowchart illustrating a WiFi hotspot connection processing method according to some embodiments of the present application. In this flow, from the perspective of the device, the execution main body is a terminal, such as a mobile phone, a tablet computer, a smart watch, a smart band, and the like, which is not specifically limited in this application.
In addition, from a program perspective, an execution subject of some steps in the embodiment of the present application may be a program installed in a terminal, for example, an application for collecting and sharing a WiFi hotspot, an instant messaging application, and the like. The program may be in the form of an application client, a web page, or the like, which is not specifically limited in this application.
The process in fig. 1 may include the following steps:
s102: and monitoring the connection behavior of the terminal aiming at the Web authentication hotspot.
In some embodiments of the present application, a connection behavior (for convenience of description, may be simply referred to as a connection behavior) of the terminal for the Web authentication hotspot may be automatically performed or may be performed based on a real-time operation of a user. For the former case, for example, the operating system of the terminal automatically connects the Web authentication hotspot by using the configuration data of the previously connected Web authentication hotspot; for the latter case, for example, assuming that a third-party networking application is installed on the terminal, the user may start the third-party networking application and click the Web authentication hotspot recommended by the third-party networking application to connect. In addition, in practical application, the third-party networking application can also automatically connect to the Web authentication hotspot without manual operation of a user.
S104: and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
In some embodiments of the present application, it may be inferred whether the connection behavior is an active behavior of the user by detecting a network-related program of the terminal.
The network related program is, for example, a foreground of the terminal, a network function page of the operating system, or a data traffic monitoring program. The detection of the network-related procedure may be triggered after the connection behavior is monitored, or may be started before the connection behavior is monitored.
In some embodiments of the present application, the predetermined condition may be set according to a characteristic exhibited by an active behavior or an inactive behavior of the user.
For example, generally, when a user wants to actively connect to a Web authentication hotspot, a third-party networking application is often manually opened, or a W L AN setting page of AN operating system is manually opened, the opened third-party networking application or W L AN setting page is in the foreground, and the user then performs corresponding operation in the foreground to attempt to connect to the Web authentication hotspot.
Of course, the above paragraph is merely an example of the predetermined condition, and is not only a limitation of the predetermined condition. In addition to the above-described conditions, other conditions that can be used to presume that the connection behavior is the user's active behavior can be used as the predetermined conditions. For example, assuming that a data traffic monitoring program monitors a continuous large traffic in a short period of time recently, it is likely that a user is watching a video or downloading through a mobile cellular network, and is now actively switching to an available Web authentication hotspot to continue watching the video or downloading; then the condition that the data flow program monitors continuous large flow in a short period of time can be taken as a preset condition; and so on.
In some embodiments of the application, if the detection result does not meet the predetermined condition, it may be considered that the connection behavior is not an active behavior of the user, and may further disturb the user, and therefore, management and control may be performed to reduce or even eliminate disturbance to the user.
If the detection result meets the predetermined condition, the connection behavior can be considered as the active behavior of the user, and therefore, the connection behavior can be released. In addition, in this case, in order to further improve the user experience, additional assistance may be provided, for example, to guide the user to perform corresponding Web authentication, perform security detection of a Web authentication hotspot for the user, and the like.
Through the method of fig. 1, whether the connection behavior is the active behavior of the user can be estimated by judging whether the detection result of the network related program of the current terminal meets the predetermined condition, if not, the connection behavior can be managed and controlled, so that the connection behavior is prevented from disturbing the user, and if so, the user can be guided to perform corresponding Web authentication, so that the actual use requirement of the user on a Web authentication hotspot can be met, the user experience is improved, and the technical problem can be solved.
Based on the method of fig. 1, some embodiments of the present application also provide some specific embodiments of the method, and further embodiments, which are explained below.
In practical application, if the Web authentication hotspot is not successfully connected, the user is generally not disturbed, and the processing such as management and control or guidance can not be performed, so as to save resources. Based on this, after the connection behavior is monitored, whether the connection can be successfully performed can be predicted, if so, the management and control or the guidance and the like are performed, and otherwise, the connection behavior can be released.
In some embodiments of the present application, whether a Web authentication hotspot can be successfully connected may be predicted based on a successful connection index, where the successful connection index indicates a degree of likelihood of successfully connecting the Web authentication hotspot. The successful connection indicator may be based on one or more data. Several are listed as examples.
For example, WiFi hotspot signal strength, WiFi hotspot historical connection records for the terminal, a restricted list of WiFi hotspots, etc. Generally, when the signal intensity of the current Web authentication hotspot is higher than a certain threshold value, connection is more likely to be successful; if the terminal is successfully connected with the current Web authentication hotspot in the past, the terminal is more likely to be successfully connected; if the physical address or the IP address of the terminal is in the limited list of the current Web authentication, the connection may fail.
According to the three paragraphs above, in some embodiments of the present application, for step S104, before managing and controlling the connection behavior for the Web authentication hotspot or guiding the user, the following may be further performed: and judging whether the successful connection index of the Web authentication hotspot is not lower than a threshold value, if so, continuing to execute the subsequent flow, and otherwise, ending the flow.
In some embodiments of the present application, for step S104, there may be multiple specific ways to manage the connection behavior for the Web authentication hotspot. For example, a Web authentication hotspot connected by a connection behavior may be disconnected, or the connection behavior may be blocked, or a Web authentication page may be intercepted, etc. Generally, if the Web authentication hotspot is not successfully connected, the connection behavior can be directly prevented, and if the Web authentication hotspot is successfully connected, the connection can be disconnected or the Web authentication page can be intercepted, so that the Web authentication page is prevented from disturbing the user as much as possible.
Further, the control can be performed more carefully to prevent the control from adversely affecting the user experience. Specifically, more preconditions can be determined before management and control, and management and control are performed if the preconditions are all satisfied.
For example, the user may specify a do-not-disturb application and/or a disturb-able application in advance, and further, for step S104, before managing and controlling the connection behavior for the Web authentication hotspot, the following steps may be performed:
judging whether the application of the foreground of the current terminal is a pre-specified do-not-disturb application or determining whether the application of the foreground of the current terminal is not a pre-specified disturb-able application; if so, managing, otherwise, not managing, but further inquiring the user or ending the process.
For a do-not-disturb application, it can be considered that a user is relatively resistant to other applications or operating system disturbances (e.g., popup, automatic switching to foreground, etc.) while using the application; for a disturbing application, the user may be considered relatively tolerant to other applications or operating system disturbances while using the application. Do-not-disturb applications are typically applications that require high real-time performance, such as gaming applications, instant messaging applications, and the like.
In addition, do-not-disturb applications and/or disturb-able applications can also be specified automatically by the operating system or application based on certain policies, and not necessarily user dependent.
For another example, for step S104, before managing and controlling the connection behavior for the Web authentication hotspot, the following steps may be further performed: a query interface is presented to query the user to: and (4) whether management and control are carried out. And if the user is affirmed, performing management and control again.
According to the specific mode of management and control, more specific information can be provided for the user to make decisions. For example, if the management and control manner is to disconnect a Web authentication hotspot connected by a connection behavior, or to block the connection behavior, before the management and control, the following steps may be performed: a query interface is presented to query the user to: whether to disconnect a Web authentication hotspot connected by the connection behavior, or to block the connection behavior.
In some embodiments of the present application, the detection of the network-related program of the terminal is performed based on specific permissions, for example, auxiliary permissions for performing foreground operations in the background, application use viewing permissions, and the like. If the authority is insufficient, the execution of the detection may be affected, and it may be impossible to determine whether the detection result of the network related program of the current terminal meets the predetermined condition.
For the situation of the previous paragraph, it may be determined whether the foreground of the current terminal has no application, or whether the application of the foreground of the current terminal is not a pre-specified do-not-disturb application, or whether the application of the foreground of the current terminal is a pre-specified disturb-able application; and if so, displaying a guide interface to guide the user to perform corresponding Web authentication.
In some embodiments of the present application, the display modes of the query interface and the guidance interface may be various. For example, the display is performed by a floating window, a dialog box, a bottom pop-up window, etc., which is not specifically limited in the present application.
In addition, the inquiry interface and the guide interface can have certain transparency, so that the user can conveniently view the content covered by the interface.
In some embodiments of the present application, for step S104, the detecting result of the network related program of the current terminal does not meet the predetermined condition, which may include: and the connection behavior aiming at the Web authentication hotspot is automatically carried out by the operating system according to the WiFi hotspot configuration data which is locally pre-stored. Managing and controlling connection behaviors for the Web authentication hotspot, such as: and if the application of the foreground of the current terminal is determined to be the pre-specified do not disturb application or the application of the foreground of the current terminal is determined not to be the pre-specified disturb application, disconnecting the Web authentication hotspot connected through the Web authentication hotspot connecting behavior or preventing the Web authentication hotspot connecting behavior.
Based on the above description, some embodiments of the present application further provide a detailed flowchart of the WiFi hotspot connection processing method, as shown in fig. 2. It should be noted that the detailed flow of fig. 2 is exemplary and not limiting to the present application, and there may be more than one detailed flow of the WiFi hotspot connection processing method according to the above detailed description of the solution.
The process in fig. 2 mainly comprises the following steps:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
judging whether the successful connection index of the Web authentication hotspot is not lower than a threshold value, if so, judging whether the connection behavior is the active behavior of the user (namely, executing a judgment action whether the preset condition is met), and if not, ending the flow;
if the user actively acts, the popup guides the user to carry out corresponding Web authentication, or the popup can further inquire the user;
if the behavior is not the active behavior of the user, judging whether the connection behavior and the result thereof can disturb the user strongly (namely, executing the judgment action of the do-not-disturb application or the disturbing application);
if the user is disturbed strongly, the connection with the Web authentication hotspot is disconnected, and the process is ended;
if the user is not disturbed, the process is ended.
Along the same lines, some embodiments of the present application also provide corresponding devices and non-volatile computer storage media and apparatuses.
Fig. 3 is a schematic structural diagram of a terminal according to some embodiments of the present application, where the terminal includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
A WiFi hotspot connection processing non-volatile computer storage medium of some embodiments provided herein stores computer-executable instructions configured to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
and after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, managing and controlling the connection behavior aiming at the Web authentication hotspot, and if the detection result of the network related program of the terminal accords with the preset condition, guiding a user to carry out Web authentication.
Fig. 4 is a schematic structural diagram of a WiFi hotspot connection guiding device of some embodiments provided herein, where a dashed box represents an optional module, the device including:
the monitoring module 401 is used for monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
after monitoring the connection behavior for the Web authentication hotspot, the processing module 402 manages and controls the connection behavior for the Web authentication hotspot if the detection result of the current network-related program of the terminal does not meet a predetermined condition, and guides the user to perform Web authentication if the detection result of the current network-related program of the terminal meets the predetermined condition.
Optionally, before the processing module 402 manages and controls a connection behavior for the Web authentication hotspot or guides a user, the processing module further performs:
and determining that the successful connection index of the Web authentication hotspot is not lower than a threshold value, wherein the successful connection index represents the possible degree of successful connection of the Web authentication hotspot.
Optionally, the successful connection indicator is based on at least one of: the WiFi hotspot signal strength, the WiFi hotspot historical connection record of the terminal and the limited list of the WiFi hotspots.
Optionally, the detecting result of the network related program of the terminal at present does not meet the predetermined condition, including:
AN application of a foreground of the terminal is not a third-party networking application, and a W L AN setup page of AN operating system is not a foreground of the terminal.
Optionally, the processing module 402 manages and controls a connection behavior for the Web authentication hotspot, including:
and disconnecting the Web authentication hotspot connected through the connection behavior, or preventing the connection behavior.
Optionally, before the processing module 402 manages and controls the connection behavior for the Web authentication hotspot, the processing module further performs:
determining that an application of the foreground of the terminal is currently a pre-specified do-not-disturb application or determining that an application of the foreground of the terminal is currently not a pre-specified disturbing application.
Optionally, before the processing module 402 disconnects the Web authentication hotspot connected by the connection behavior, or before the connection behavior is blocked, the processing module further performs:
a query interface is presented to query the user to: whether to disconnect the Web authentication hotspot connected by the connection behavior or to block the connection behavior.
Optionally, the detecting result of the network related program of the terminal at present meets a predetermined condition, including:
the application of the foreground of the terminal is currently a third-party networking application, or the foreground of the terminal is currently a W L AN setup page of the operating system.
Optionally, the processing module 402 further performs:
if the detection result of the network related program of the current terminal can not be determined to meet the preset condition, judging whether the foreground of the current terminal has no application or whether the application of the foreground of the current terminal is not a pre-specified do-not-disturb application or whether the application of the foreground of the current terminal is a pre-specified disturb-able application;
and if so, displaying a guide interface to guide the user to perform corresponding Web authentication.
Optionally, the detecting result of the network related program of the terminal at present does not meet the predetermined condition, including:
the connection behavior aiming at the Web authentication hotspot is automatically carried out by the operating system according to the WiFi hotspot configuration data which is locally pre-stored;
the processing module 402 manages and controls connection behaviors for the Web authentication hotspot, including:
if the processing module 402 determines that the application of the foreground of the terminal is a pre-specified do-not-disturb application or determines that the application of the foreground of the terminal is not a pre-specified disturb-able application, the Web authentication hotspot connected through the Web authentication hotspot connecting behavior is disconnected, or the Web authentication hotspot connecting behavior is prevented.
Optionally, the interface is displayed by at least one of: floating window, dialog box, bottom pop-up window.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (12)

1. A WiFi hotspot connection processing method in a terminal is characterized by comprising the following steps:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, the connection behavior is not the active behavior of the user, the connection behavior aiming at the Web authentication hotspot is managed and controlled, and if the detection result of the network related program of the terminal accords with the preset condition, the user is guided to carry out Web authentication; the network-related program includes: a foreground of the terminal, or a network function page of an operating system, or a data traffic monitoring program;
the managing and controlling the connection behavior aiming at the Web authentication hotspot comprises the following steps:
and disconnecting the Web authentication hotspot connected through the connection behavior, or stopping the connection behavior or intercepting a Web authentication page.
2. The method of claim 1, wherein the connection behavior for the Web authentication hotspot is governed or before a user is guided, the method further comprising:
and determining that the successful connection index of the Web authentication hotspot is not lower than a threshold value, wherein the successful connection index represents the possible degree of successful connection of the Web authentication hotspot.
3. The method of claim 2, wherein the successful connection indicator is based on at least one of: the WiFi hotspot signal strength, the WiFi hotspot historical connection record of the terminal and the limited list of the WiFi hotspots.
4. The method of claim 1, wherein the current detection result of the network-related procedure of the terminal does not meet a predetermined condition, comprising:
AN application of a foreground of the terminal is not a third-party networking application, and a W L AN setup page of AN operating system is not a foreground of the terminal.
5. The method of claim 4, wherein prior to governing connection behavior for the Web authentication hotspot, the method further comprises:
determining that an application of the foreground of the terminal is currently a pre-specified do-not-disturb application or determining that an application of the foreground of the terminal is currently not a pre-specified disturbing application.
6. The method of claim 1, wherein before the disconnecting the Web authentication hotspot connected by the connecting act or preventing the connecting act, the method further comprises:
a query interface is presented to query the user to: whether to disconnect the Web authentication hotspot connected by the connection behavior or to block the connection behavior.
7. The method of claim 1, wherein the detecting result of the network-related procedure of the terminal currently meets a predetermined condition includes:
the application of the foreground of the terminal is currently a third-party networking application, or the foreground of the terminal is currently a W L AN setup page of the operating system.
8. The method of claim 1, wherein the method further comprises:
if the detection result of the network related program of the current terminal can not be determined to meet the preset condition, judging whether the foreground of the current terminal has no application or whether the application of the foreground of the current terminal is not a pre-specified do-not-disturb application or whether the application of the foreground of the current terminal is a pre-specified disturb-able application;
and if so, displaying a guide interface to guide the user to perform corresponding Web authentication.
9. The method of claim 1, wherein the current detection result of the network-related procedure of the terminal does not meet a predetermined condition, comprising:
the connection behavior aiming at the Web authentication hotspot is automatically carried out by the operating system according to the WiFi hotspot configuration data which is locally pre-stored;
the managing and controlling the connection behavior aiming at the Web authentication hotspot comprises the following steps:
and if the application of the foreground of the current terminal is determined to be a pre-specified do not disturb application or the application of the foreground of the current terminal is determined not to be a pre-specified disturb application, disconnecting the Web authentication hotspot connected through the Web authentication hotspot connecting behavior or preventing the Web authentication hotspot connecting behavior.
10. The method of claim 6 or 8, wherein the interface is displayed by at least one of: floating window, dialog box, bottom pop-up window.
11. A terminal, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, the connection behavior is not the active behavior of the user, the connection behavior aiming at the Web authentication hotspot is managed and controlled, and if the detection result of the network related program of the terminal accords with the preset condition, the user is guided to carry out Web authentication; the network-related program includes: a foreground of the terminal, or a network function page of an operating system, or a data traffic monitoring program;
the managing and controlling the connection behavior aiming at the Web authentication hotspot comprises the following steps:
and disconnecting the Web authentication hotspot connected through the connection behavior, or stopping the connection behavior or intercepting a Web authentication page.
12. A non-transitory computer storage medium storing computer-executable instructions, the computer-executable instructions configured to:
monitoring the connection behavior of the terminal aiming at the Web authentication hotspot;
after monitoring the connection behavior aiming at the Web authentication hotspot, if the detection result of the network related program of the terminal does not accord with the preset condition, the connection behavior is not the active behavior of the user, the connection behavior aiming at the Web authentication hotspot is managed and controlled, and if the detection result of the network related program of the terminal accords with the preset condition, the user is guided to carry out Web authentication; the network-related program includes: a foreground of the terminal, or a network function page of an operating system, or a data traffic monitoring program;
the managing and controlling the connection behavior aiming at the Web authentication hotspot comprises the following steps:
and disconnecting the Web authentication hotspot connected through the connection behavior, or stopping the connection behavior or intercepting a Web authentication page.
CN201711299325.4A 2017-12-08 2017-12-08 WiFi hotspot connection processing method, device and medium for terminal Active CN107979843B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201711299325.4A CN107979843B (en) 2017-12-08 2017-12-08 WiFi hotspot connection processing method, device and medium for terminal
PCT/CN2018/117993 WO2019109843A1 (en) 2017-12-08 2018-11-28 Terminal-side wifi hotspot connection processing method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711299325.4A CN107979843B (en) 2017-12-08 2017-12-08 WiFi hotspot connection processing method, device and medium for terminal

Publications (2)

Publication Number Publication Date
CN107979843A CN107979843A (en) 2018-05-01
CN107979843B true CN107979843B (en) 2020-07-17

Family

ID=62009742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711299325.4A Active CN107979843B (en) 2017-12-08 2017-12-08 WiFi hotspot connection processing method, device and medium for terminal

Country Status (2)

Country Link
CN (1) CN107979843B (en)
WO (1) WO2019109843A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979843B (en) * 2017-12-08 2020-07-17 上海连尚网络科技有限公司 WiFi hotspot connection processing method, device and medium for terminal
CN108990064B (en) * 2018-07-27 2022-03-01 上海尚往网络科技有限公司 Wireless hotspot connection method, electronic device and medium
CN108600280B (en) * 2018-08-06 2020-11-03 连尚(新昌)网络科技有限公司 Network connection method, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779068A (en) * 2012-07-10 2012-11-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and application program networking control method
WO2015196973A1 (en) * 2014-06-25 2015-12-30 Tencent Technology (Shenzhen) Company Limited Security verification method and apparatus
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN106603436A (en) * 2016-12-01 2017-04-26 美的智慧家居科技有限公司 Method and system for intelligent device connecting to network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107454592B (en) * 2017-07-14 2020-11-27 台州市吉吉知识产权运营有限公司 Method and system for preventing automatic Portal pop-up during application program authentication
CN107979843B (en) * 2017-12-08 2020-07-17 上海连尚网络科技有限公司 WiFi hotspot connection processing method, device and medium for terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102779068A (en) * 2012-07-10 2012-11-14 宇龙计算机通信科技(深圳)有限公司 Mobile terminal and application program networking control method
WO2015196973A1 (en) * 2014-06-25 2015-12-30 Tencent Technology (Shenzhen) Company Limited Security verification method and apparatus
CN105657781A (en) * 2014-11-14 2016-06-08 深圳市腾讯计算机系统有限公司 Method and device for accessing WiFi network
CN106603436A (en) * 2016-12-01 2017-04-26 美的智慧家居科技有限公司 Method and system for intelligent device connecting to network

Also Published As

Publication number Publication date
CN107979843A (en) 2018-05-01
WO2019109843A1 (en) 2019-06-13

Similar Documents

Publication Publication Date Title
US20200356682A1 (en) Method, a system, a device and a readable medium for setting access permission for an application
US9721112B2 (en) Passive compliance violation notifications
CN107979843B (en) WiFi hotspot connection processing method, device and medium for terminal
US20200034557A1 (en) System Function Invoking Method and Apparatus, and Terminal
US9330265B2 (en) Method for component access control and electronic device
EP2985695B1 (en) Method and device for setting application program state
CN106899649B (en) Task request processing method and device and user equipment
CN108076464B (en) WiFi hotspot connection guiding method, device and medium for terminal
US10642662B2 (en) Method for application action synchronization, terminal device, and storage medium
EP3128789A1 (en) Method, device and mobile terminal for reducing power consumption
EP4152151A1 (en) Multi-cloud resource scheduler
CN107948123B (en) File transmission method and device
CN109495397B (en) Flow control method and device
CN110868347A (en) Message prompting method, device and system
CN112114804A (en) Application program generation method, device and system
CN105303101B (en) A kind of method and terminal for controlling application operating
CN110941464B (en) Light exposure method, device, system and storage medium
CN110928630A (en) Activation control method, device and equipment for application program window and storage medium
CN111209574A (en) Access control and access behavior recognition method, system, device and storage medium
CN107317923B (en) Method, device and terminal for controlling GPS running state
CN115688102A (en) Window processing method and device, processor and electronic equipment
CN106886721B (en) Method and device for realizing auxiliary function in application
CN110737320B (en) Power consumption detection method and device, electronic equipment and storage medium
CN112988353A (en) Operation control method and device for application program
CN107797645B (en) Resource control method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210513

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Patentee after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 200120 2, building 979, Yun Han Road, mud town, Pudong New Area, Shanghai

Patentee before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.