CN111010693A - Method for providing wireless fidelity WiFi network access service and electronic equipment - Google Patents

Method for providing wireless fidelity WiFi network access service and electronic equipment Download PDF

Info

Publication number
CN111010693A
CN111010693A CN201911167666.5A CN201911167666A CN111010693A CN 111010693 A CN111010693 A CN 111010693A CN 201911167666 A CN201911167666 A CN 201911167666A CN 111010693 A CN111010693 A CN 111010693A
Authority
CN
China
Prior art keywords
wifi network
electronic equipment
configuration information
electronic device
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911167666.5A
Other languages
Chinese (zh)
Other versions
CN111010693B (en
Inventor
刘烨
胡卫卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201911167666.5A priority Critical patent/CN111010693B/en
Publication of CN111010693A publication Critical patent/CN111010693A/en
Priority to PCT/CN2020/129593 priority patent/WO2021104114A1/en
Application granted granted Critical
Publication of CN111010693B publication Critical patent/CN111010693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a method and electronic equipment for providing wireless fidelity (WiFi) network access service, wherein the method comprises the steps that when the first electronic equipment detects that a first WiFi network configured by the first electronic equipment is not encrypted, a hidden WiFi network is created; then the first electronic equipment sends the first configuration information of the hidden WiFi network to the second electronic equipment in a Near Field Communication (NFC) mode, and receives an access request sent by the second electronic equipment based on the first configuration information; and responding to the first access request, and establishing communication connection between the first electronic equipment and the second electronic equipment by the first electronic equipment.

Description

Method for providing wireless fidelity WiFi network access service and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method and an electronic device for providing WiFi network access service.
Background
With the development of smart home technology, a home often has a plurality of electronic devices (e.g., a mobile phone, a smart television, a smart speaker, etc.) that can communicate with each other. The electronic devices can access a Wireless Fidelity (WiFi) network through a router, and then access the internet. In order for a user to join an electronic device to a Wi-Fi network created by a router, the following steps are typically required: the steps of starting a WiFi switch, searching the surrounding available Wi-Fi network, selecting the SSID of the router and inputting the password are relatively complicated.
At present, electronic equipment supporting Near Field Communication (NFC) functions in the market can be connected to a WiFi network by touching a router supporting NFC without inputting an SSID password (this operation is simply referred to as "one touch"), so that the tedious operation of connecting Wi-Fi by inputting a password by a user is reduced.
The Wi-Fi network can adopt an Open mode (Open), namely encryption is not performed at all, anyone can connect to a router to use the network, the router newly purchased by a user is in the Open mode after being powered on, the user must manually set an encryption mode to ensure the safety of communication, and the current mainstream encryption modes comprise WEP, WPA/WPA2 and WPA-PSK/WPA 2-PSK.
In the prior art, a device (for short, an android device) carrying an android operating system performs a bump-and-connect operation when a WiFi network created by a router is in an Open mode, native code processing logic of the android device has a problem, and an encryption mode of the WiFi network is mistakenly identified as an authentication mode of a WPA2 type, so that the android device cannot be connected with the WiFi network created by the router in the Open mode. In order to solve the problem, android manufacturers can choose to adopt a patch upgrading mode to solve the problem, but the patch upgrading mode cannot cover all models of the android manufacturers, because the patch upgrading rate of the android manufacturers is generally low at present, basically, the upgrading rate of new models is high, and the old products are poor in performance. For consumers, the effect of the patch is too implicit and cannot be obviously perceived, so the attention degree is not enough, and even many consumers have no knowledge about the effect of the patch. For manufacturers, patch development needs to be performed on all models for patch upgrading, and higher challenges are provided for the manufacturers. Therefore, a solution is needed to provide a solution for android devices to perform a one-touch WiFi connection when WiFi is in OPEN mode, in addition to patch upgrade.
Disclosure of Invention
The application provides a method for providing wireless fidelity WiFi network access service, and the success rate of first-touch connection of an android device to a router is improved.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a method for providing WiFi network access service, the method comprising: the first electronic equipment detects whether a first WiFi network configured by the first electronic equipment is encrypted; when a first WiFi network configured by the first electronic equipment is not encrypted, a hidden WiFi network is created; the first electronic equipment sends the first configuration information of the hidden WiFi network to the second electronic equipment in a Near Field Communication (NFC) mode; the first electronic equipment acquires a first access request aiming at the hidden WiFi network sent by the second electronic equipment; and responding to the first access request, and establishing communication connection between the first electronic equipment and the second electronic equipment.
In the above method, a first electronic device (e.g., a router) may detect whether an unencrypted first WiFi network is configured, create a hidden WiFi network if the unencrypted first WiFi network is detected to be configured, and send configuration information of the hidden WiFi network to a second electronic device (e.g., a mobile phone or a smart speaker). The second electronic device may then touch the first electronic device, read configuration information (e.g., SSID and password) of the hidden WiFi network through NFC, and access the hidden WiFi network for communication. Assuming that the first electronic device activates the first WiFi network in the OPEN mode after being powered on (for example, the first electronic device activates an unencrypted first WiFi network according to factory settings after being powered on for the first time, or the first electronic device is configured with an unencrypted first WiFi network by a user), it is a hidden WiFi network that the user holds the second electronic device to touch the first electronic device and is actually connected to, the hidden WiFi network is encrypted and invisible to other devices (that is, the SSIDs of the hidden WiFi networks cannot be scanned by other devices). Therefore, the problem of connection failure mentioned in the background technology part can not be caused, the first electronic device carrying the android operating system can solve the problem without upgrading a patch, and the user experience is remarkably improved.
In a possible implementation manner, the configuration information of the hidden WiFi network includes at least one of a name or a password of the hidden WiFi network. Therefore, the user touches the encrypted WiFi network through the second electronic device for connection, so that the problem of connection failure mentioned in the background technology part can not be triggered, and the user experience is improved.
In a possible implementation manner, the second electronic device carries an android operating system, but the second electronic device may also carry other operating systems, for example, an ios operating system.
In a possible implementation manner, when a first WiFi network configured by a first electronic device is encrypted, the first electronic device sends second configuration information of the first WiFi network to a second electronic device in a near field communication NFC manner, and then the first electronic device obtains a second access request, which is sent by the second electronic device based on the second configuration information and is directed to the first WiFi network; and responding to the second access request, and establishing a communication connection between the first electronic equipment and the second electronic equipment for communication by the first electronic equipment.
In a possible implementation manner, the second electronic device may send third configuration information of the WiFi network to the first electronic device through NFC, and the first electronic device creates a WiFi network according to the third configuration information of the WiFi network. By the method, the user can set the configuration information of the WiFi network in the second electronic device, then the configuration information of the WiFi network is sent to the first electronic device through NFC by touching the first electronic device, and the first electronic device creates the WiFi network by utilizing the configuration information of the WiFi network. The second electronic device may then connect directly to the WiFi network created by the first electronic device.
In a possible implementation manner, the second electronic device sends the second configuration information of the first WiFi network to the third electronic device in a near field communication NFC manner, and then the third electronic device may create the WiFi network according to the second configuration information of the first WiFi network. By the method, the second electronic device can transmit the configuration information of the first WiFi network of the first electronic device to the third electronic device by touching the first electronic device first and then touching the third electronic device.
In a possible implementation manner, the first configuration information of the hidden WiFi network is sent to the second electronic device in an unencrypted manner.
In a second aspect, the present application provides an electronic device comprising: one or more processors, one or more memories, and one or more computer programs; wherein, the processor is coupled with both the touch screen and the memory, the one or more computer programs are stored in the memory, and when the electronic device runs, the processor executes the one or more computer programs stored in the memory, so that the electronic device executes the information synchronization method between multiple devices.
In a third aspect, the present application provides a computer storage medium comprising computer instructions that, when run on an electronic device, cause the electronic device to perform a method for information synchronization between multiple devices as described in any one of the first aspect.
In a fourth aspect, the present application provides a computer program product, which, when run on an electronic device, causes the electronic device to perform a method for synchronizing information between multiple devices according to any one of the first aspect.
It is to be understood that the electronic device according to the second aspect, the computer storage medium according to the third aspect, and the computer program product according to the fourth aspect may all implement the method for providing WiFi network access service, and therefore, the beneficial effects achieved by the method may refer to the beneficial effects in the information synchronization provided above, and are not described herein again.
Drawings
Fig. 1 is a first schematic diagram of a WiFi network according to an embodiment of the present application;
fig. 2 is a first schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 3 is a flowchart illustrating a method for providing WiFi access service according to an embodiment of the present disclosure;
fig. 4 is a schematic interface diagram of an electronic device connected to a WiFi network according to an embodiment of the present disclosure;
fig. 5 is a schematic interface diagram for setting up a WiFi network according to an embodiment of the present disclosure;
fig. 6 is a schematic view of a scenario for synchronizing WiFi networks among different routers according to an embodiment of the present disclosure;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present embodiment will be described in detail below with reference to the accompanying drawings.
Fig. 1 illustrates an example of a WiFi network 100 to which one or more of the apparatus, methods, systems, and/or computer program products further described herein may be applicable. The WiFi network 100 depicted includes one or more electronic devices, such as the light bulb 102, the sound box 104, the mobile terminal 106, or other types of electronic devices in fig. 1. Hereinafter, the electronic devices 102, 104, and 106 and other smart home devices (such as, televisions, washing machines, fans, air conditioners, security systems, etc.) are collectively referred to as "electronic devices". The light bulb 102 may control changes in the light, such as changes in the color and brightness of the light. The speaker box 104 may have an integrated voice assistant module that provides interactive voice dialog or query functionality via a "wake up word" (e.g., "hello, art") and may also control other electronic devices (e.g., control turning the light bulb 102 on or off). The mobile terminal 106 is shown in fig. 1 as a mobile phone, but may also include a laptop computer, a desktop computer, a tablet computer, a wearable electronic device, an in-vehicle device, a virtual reality device, and the like, which is not limited in this embodiment.
WiFi network 100 also includes wireless router 108. The router 108 is a Wi-Fi enabled device that can send Internet information to a personal device (e.g., a computer, a cell phone, or a tablet). These electronic devices form a Local Area Network (LAN) in a home. The electronic devices can communicate with each other via the wireless router 108 (e.g., the light bulb 102 communicates with the sound box 104 via the wireless router 108). The electronic device can also communicate with a remote server through the wireless router 108 via a communication network (e.g., a suitable communication network such as Long Term Evolution (LTE), fifth generation mobile communications (5G), etc.). Of course, the electronic devices can also communicate directly with each other (e.g., via short-range communication technologies such as Wi-Fi, NFC, bluetooth, etc.).
Hereinafter, the router access method will be described by taking the mobile terminal 106 shown in fig. 1 as an example, and fig. 2 shows a schematic structural diagram of the mobile terminal 106.
The mobile terminal 106 may include a processor 110, an external memory interface 120, an internal memory 121, a Universal Serial Bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a camera 193, a display screen 194, and the like.
It is to be understood that the illustrated structure of the embodiment of the present application does not constitute a specific limitation to the mobile terminal 106. In other embodiments of the present application, the mobile terminal 106 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
Processor 110 may include one or more processing units, such as: the processor 110 may include an Application Processor (AP), a modem processor, a Graphics Processor (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a neural-Network Processing Unit (NPU), etc. The different processing units may be separate devices or may be integrated into one or more processors.
A memory may also be provided in processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 110, thereby increasing the efficiency of the system.
In some embodiments, processor 110 may include one or more interfaces. The interface may include an integrated circuit (I2C) interface, an integrated circuit built-in audio (I2S) interface, a Pulse Code Modulation (PCM) interface, a universal asynchronous receiver/transmitter (UART) interface, a Mobile Industry Processor Interface (MIPI), a general-purpose input/output (GPIO) interface, a Subscriber Identity Module (SIM) interface, and/or a Universal Serial Bus (USB) interface, etc.
The charging management module 140 is configured to receive charging input from a charger. The charger may be a wireless charger or a wired charger. In some wired charging embodiments, the charging management module 140 may receive charging input from a wired charger via the USB interface 130. In some wireless charging embodiments, the charging management module 140 may receive a wireless charging input through a wireless charging coil of the mobile terminal 106. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be used to monitor parameters such as battery capacity, battery cycle count, battery state of health (leakage, impedance), etc. In some other embodiments, the power management module 141 may also be disposed in the processor 110. In other embodiments, the power management module 141 and the charging management module 140 may be disposed in the same device.
The wireless communication function of the mobile terminal 106 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, the baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the mobile terminal 106 may be used to cover a single or multiple communication bands. Different antennas can also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed as a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution including 2G/3G/4G/5G wireless communication applied on the mobile terminal 106. The mobile communication module 150 may include at least one filter, a switch, a power amplifier, a Low Noise Amplifier (LNA), and the like. The mobile communication module 150 may receive the electromagnetic wave from the antenna 1, filter, amplify, etc. the received electromagnetic wave, and transmit the electromagnetic wave to the modem processor for demodulation. The mobile communication module 150 may also amplify the signal modulated by the modem processor, and convert the signal into electromagnetic wave through the antenna 1 to radiate the electromagnetic wave. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide a solution for wireless communication applied to the mobile terminal 106, including Wireless Local Area Networks (WLANs) (e.g., wireless fidelity (Wi-Fi) networks), bluetooth (bluetooth, BT), Global Navigation Satellite System (GNSS), Frequency Modulation (FM), Near Field Communication (NFC), Infrared (IR), and the like. The wireless communication module 160 may be one or more devices integrating at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, performs frequency modulation and filtering processing on electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, perform frequency modulation and amplification on the signal, and convert the signal into electromagnetic waves through the antenna 2 to radiate the electromagnetic waves.
In some embodiments, antenna 1 of the mobile terminal 106 is coupled to the mobile communication module 150 and antenna 2 is coupled to the wireless communication module 160 so that the mobile terminal 106 can communicate with networks and other devices via wireless communication techniques. The wireless communication technology may include global system for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), time-division code division multiple access (time-division code division multiple access, TD-SCDMA), Long Term Evolution (LTE), LTE, BT, GNSS, WLAN, NFC, FM, and/or IR technologies, etc. The GNSS may include a Global Positioning System (GPS), a global navigation satellite system (GLONASS), a beidou satellite navigation system (BDS), a quasi-zenith satellite system (QZSS), and/or a Satellite Based Augmentation System (SBAS).
The mobile terminal 106 implements the display function through the GPU, the display screen 194, and the application processor, etc. The GPU is a microprocessor for image processing, and is connected to the display screen 194 and an application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. The processor 110 may include one or more GPUs that execute program instructions to generate or alter display information.
The display screen 194 is used to display images, video, and the like. The display screen 194 includes a display panel. The display panel may be a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), or the like. In some embodiments, the mobile terminal 106 may include 1 or N display screens 194, with N being a positive integer greater than 1.
The mobile terminal 106 may implement a photographing function through the ISP, the camera 193, the video codec, the GPU, the display screen 194, the application processor, and the like.
The ISP is used to process the data fed back by the camera 193. For example, when a photo is taken, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electrical signal, and the camera photosensitive element transmits the electrical signal to the ISP for processing and converting into an image visible to naked eyes. The ISP can also carry out algorithm optimization on the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image to the photosensitive element. The photosensitive element may be a Charge Coupled Device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor. The light sensing element converts the optical signal into an electrical signal, which is then passed to the ISP where it is converted into a digital image signal. And the ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into image signal in standard RGB, YUV and other formats. In some embodiments, the mobile terminal 106 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process digital image signals and other digital signals. For example, when the mobile terminal 106 selects a frequency bin, the digital signal processor is used to perform fourier transform or the like on the frequency bin energy.
Video codecs are used to compress or decompress digital video. The mobile terminal 106 may support one or more video codecs. In this way, the mobile terminal 106 may play or record video in a variety of encoding formats, such as: moving Picture Experts Group (MPEG) 1, MPEG2, MPEG3, MPEG4, and the like.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to extend the memory capability of the mobile terminal 106. The external memory card communicates with the processor 110 through the external memory interface 120 to implement a data storage function. For example, files such as music, video, etc. are saved in an external memory card.
The internal memory 121 may be used to store computer-executable program code, which includes instructions. The processor 110 executes various functional applications of the mobile terminal 106 and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a program storage area and a data storage area. The storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like. The stored data area may store data created during use of the mobile terminal 106 (e.g., audio data, phone book, etc.), and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (UFS), and the like.
The mobile terminal 106 may implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or some functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also called a "horn", is used to convert the audio electrical signal into an acoustic signal. The mobile terminal 106 may listen to music through the speaker 170A or to a hands-free conversation.
The receiver 170B, also called "earpiece", is used to convert the electrical audio signal into an acoustic signal. When the mobile terminal 106 answers a call or voice information, it is possible to answer a voice by placing the receiver 170B close to the human ear.
The microphone 170C, also referred to as a "microphone," is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can input a voice signal to the microphone 170C by speaking the user's mouth near the microphone 170C. The mobile terminal 106 may be provided with at least one microphone 170C. In other embodiments, the mobile terminal 106 may be provided with two microphones 170C to achieve noise reduction functions in addition to collecting sound signals. In other embodiments, the mobile terminal 106 may further include three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, perform directional recording, and so on.
The headphone interface 170D is used to connect a wired headphone. The headset interface 170D may be the USB interface 130, or may be a 3.5mm open mobile electronic device platform (OMTP) standard interface, a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The sensor module 180 may include a pressure sensor, a gyroscope sensor, an air pressure sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, and the like.
Of course, the mobile terminal 106 may further include one or more devices such as a key, a motor, an indicator, and a SIM card interface, which is not limited in this embodiment.
A router access method provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings. To implement the Wi-Fi network created by the electronic device access router 108, fig. 3 shows a signaling interaction diagram of the mobile terminal 106 accessing the WiFi network created by the router 108.
Referring to fig. 3, in step 302, the router 108 detects whether the first WiFi network is encrypted, and the encryption mode of the WiFi network includes any one of the following: OPEN mode (i.e., "No encryption"), WEP, WPA/WPA2, WPA-PSK/WPA 2-PSK. If the first WiFi network is encrypted, go to step 316; step 304 is performed if the first WiFi network is not encrypted. The first WiFi network may be a WiFi network configured by the router 108 itself, for example, a WiFi network created after the router 108 is powered on for the first time after leaving a factory.
Generally, when a router newly purchased by a user is powered on for the first time, WiFi is in an open mode, so that the user can conveniently access and configure the name (SSID) and password of the WiFi network. The router is also in open mode after factory reset (i.e. router reset), and the user needs to reset the name (SSID) and password of the WiFi network. Thus, in one implementation, step 302 may be replaced with: the router 108 detects that it is in a factory state to determine whether the first WiFi network is encrypted. For example, the factory status stored by the router 108 is boolean value factory _ status, and when the factory _ status is true, it represents that the router 108 is in the factory status (i.e., it represents that WiFi is not encrypted), and when the factory _ status is false, it represents that the router 108 is in the non-factory status. After the router 108 is powered on, it is determined that the first WiFi network is not encrypted by detecting that the factory status flag factor _ status is true.
At step 304, router 108 creates a hidden WiFi network. In one implementation, router 108 generates configuration information for the hidden WiFi network that includes a network name and a password. For example, the router 108 may randomly generate configuration information for hiding the WiFi network according to a certain rule.
At step 306, the mobile terminal 106 approaches the router NFC tag area. In one implementation, the NFC read-write area of the router 108 is labeled to prompt the user to approach the router to implement "one touch" (i.e., the NFC mode touches the router to implement the purpose of WiFi connection), and the user can hold the mobile terminal 106 close to the labeled area by hand according to the label position.
In step 308, the mobile terminal 106 requests to obtain WiFi network configuration information. In one implementation, the mobile terminal 106 sends a request message to the router requesting to read WiFi network configuration information.
At step 310, the NFC module of router 108 reads the hidden WiFi network configuration information. The router 108 has two WiFi SSIDs, one being the SSID of the first WiFi network and the other being the SSID of the hidden WiFi network created at step 304. In step 310, the NFC module of router 108 obtains the configuration information of the hidden WiFi network created in step 304, instead of the SSID of the first WiFi network. Therefore, the problem of failure in connecting the router mentioned in the background art is not generated, and the SSID of the hidden WiFi network cannot be scanned by the user side for the user, so that the user cannot perceive the behavior of creating the hidden WiFi network by the router.
In one implementation, step 302 may be performed again between steps 308 and 310 to detect whether the first WiFi network is encrypted, step 310 may be performed after determining that the first WiFi network is not encrypted, and steps 316 and 318 may be performed after determining that the first WiFi network is encrypted. In this way, the router 108 may detect whether the first WiFi network configured once is encrypted after the router starts to operate after powering on, determine whether the first WiFi network is encrypted again after acquiring the request message of the mobile terminal 106 for reading the WiFi network configuration information, and execute step 310 after determining that the first WiFi network is not encrypted. This may ensure that the mobile terminal 106 may connect to the encrypted WiFi network.
At step 312, the router 108 returns configuration information of the hidden WiFi network to the mobile terminal 106. For example, the router 108 returns configuration information of the hidden WiFi network to the mobile terminal 106 via NFC Data Exchange Format (NDEF) message data. In one implementation, the router 108 sends the configuration information of the WiFi hidden network to the mobile terminal 106 in clear text (i.e., without encrypting the configuration information of the WiFi hidden network) through NFC.
At step 314, the mobile terminal 106 connects to the hidden WiFi network, enabling successful access to the router.
In some embodiments, step 314 may be preceded by the steps of: the mobile terminal 106 displays a first user interface (e.g., the user interface 400 shown in fig. 4) in response to the configuration information of the hidden WiFi network obtained in step 312. The first user interface contains a prompt box 402, in which prompt box 402 contains a prompt "is connected to the network (network SSID, SSID" huaweii-07 AW-NFC "in the example")? ", connect button 404, cancel button 406. The user clicks on the connect button 404 to connect to the network "HUAWEI-07 AW-NFC" and the user clicks on the cancel button 406 to cancel the operation.
In step 316, the router 108 sends the configuration information of the first WiFi network to the mobile terminal 106 through NFC. In some implementations, the following steps are also included before step 316: the mobile terminal 106 sends a request message to obtain configuration information of the first WiFi network via NFC (provided that the mobile terminal 106 needs to be close to the router 108).
At step 318, the router 108 establishes a WiFi connection with the mobile terminal 106.
With the method shown in fig. 3 described above, the case of the first WiFi network where the user configures the router 108 with the OPEN mode, or the case of the router 108 creating the first WiFi network for the newly purchased first power-on usage, is addressed. The router 108 can automatically create a hidden WiFi network, and send configuration information of the hidden WiFi network to the mobile terminal 106 through NFC after the mobile terminal 106 touches the router 108, so that the mobile terminal 106 can be connected to the hidden WiFi network, and the security of WiFi connection is improved, and the problem of connection failure mentioned in the background technology part can be avoided, so that the success rate of connecting the router is improved.
In some embodiments, the mobile terminal 106 may also set the WiFi name and password of the router 108 through NFC. As shown in fig. 5, the mobile terminal 106 displays a WiFi interface 502, inputs a network name (SSID)506 in the interface 502, inputs a password 508, and clicks on a next step 510 to enter a prompt interface 504, where the interface 504 includes a prompt "please get close to the router to complete WiFi configuration". The user brings the mobile terminal 106 close to the NFC read-write area of the router according to the prompt, and the mobile terminal 106 sends a WiFi name and a password to the router 108 through NFC. The router 108 then creates a WiFi network based on the received WiFi name and password, and the mobile terminal 106 can then automatically connect to the WiFi network without touching the router.
In some embodiments, the mobile terminal 106 may also synchronize WiFi configuration information of two routers by NFC cloning WiFi configuration information of the routers, that is, copying WiFi configuration information of one router to another router. For example, as shown in fig. 6, a plurality of routers (e.g., the router 602 and the router 108) are located in a home of a user, and the user may first acquire WiFi configuration information of the router 108 through NFC by using the mobile terminal 106, and then send WiFi configuration information of the router 108 to the router 602 by approaching the mobile terminal to the router 602, thereby implementing synchronization of configuration information of the routers.
As shown in fig. 7, an embodiment of the present application discloses an electronic device, which may specifically be a router device (e.g., the router 108) in the foregoing embodiment. As shown in fig. 7, the electronic device may include a communication module 701; one or more processors 702; one or more memories 703; one or more application programs (not shown); and one or more computer programs 704, which may be connected via one or more communication buses 705.
The memory 703 may be used for storing data, software programs, and software modules, and may be a volatile memory (volatile memory), such as a random-access memory (RAM); or a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory (flash memory), a Hard Disk Drive (HDD) or a solid-state drive (SSD), or a combination of the above types of memories. Specifically, the memory 703 may store a program code, which is used for causing the processor 702 to execute the router access method provided by the embodiment of the present application by executing the program code.
For example, the memory 703 may store therein program code for causing the processor 702 to perform the method steps performed on the router 108 side of fig. 3 by executing the program code.
The communication module 701 may include a wireless communication module and/or a wired communication module, such as one or more of a Wi-Fi module, an NFC module, a bluetooth module, an infrared module, an ethernet communication module, and the like, may be configured to transmit and receive information, and may further send the received information to the processor 702 for processing; alternatively, signals generated by processor 702 are transmitted.
The processor 702 is coupled to the communication module 701, the memory 703. The processor 702 may be any processing device including, but not limited to, an MIPS (microprocessor with interleaved pipeline stages) processor, a microprocessor, a digital signal processor, an Application Specific Integrated Circuit (ASIC), a microcontroller, a state machine, or any type of programmable logic array. The processor 702 is a control center of the communication apparatus, connects various parts of the entire communication apparatus using various interfaces and lines, and performs various functions of the communication apparatus and processes data by operating or executing software programs and/or modules stored in the memory 703 and calling data stored in the memory 703.
In addition, it should be noted that the structure shown in fig. 7 is not limited to the structure of the electronic device related to the embodiment of the present application, and the electronic device may further include other modules, such as a sensor and a power module, and details are not repeated here.
In the embodiment of the present application, the user equipment may be divided into the functional modules according to the method example, for example, each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. It should be noted that, in the embodiment of the present application, the division of the module is schematic, and is only one logic function division, and there may be another division manner in actual implementation.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
Each functional unit in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially implemented or make a contribution to the prior art, or all or part of the technical solutions may be implemented in the form of a software product stored in a storage medium and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a processor to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard drive, read only memory, random access memory, magnetic or optical disk, and the like.
The above description is only a specific implementation of the embodiments of the present application, but the scope of the embodiments of the present application is not limited thereto, and any changes or substitutions within the technical scope disclosed in the embodiments of the present application should be covered by the scope of the embodiments of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of providing WiFi network access services, comprising:
the first electronic equipment detects whether a first WiFi network configured by the first electronic equipment is encrypted;
when a first WiFi network configured by the first electronic equipment is not encrypted, a hidden WiFi network is created;
the first electronic equipment sends the first configuration information of the hidden WiFi network to second electronic equipment in a Near Field Communication (NFC) mode;
the first electronic equipment acquires a first access request aiming at the hidden WiFi network, which is sent by the second electronic equipment based on the first configuration information;
and responding to the first access request, and establishing communication connection between the first electronic equipment and the second electronic equipment by the first electronic equipment.
2. The method of claim 1, wherein the configuration information of the hidden WiFi network comprises at least one of a name or a password of the hidden WiFi network.
3. The method according to claim 1 or 2, wherein the second electronic device is loaded with an android operating system.
4. The method of any of claims 1 to 3, further comprising:
when a first WiFi network configured by the first electronic equipment is encrypted, the first electronic equipment sends second configuration information of the first WiFi network to second electronic equipment in a Near Field Communication (NFC) mode;
the first electronic equipment acquires a second access request which is sent by the second electronic equipment based on the second configuration information and aims at the first WiFi network;
and responding to the second access request, and establishing communication connection between the first electronic equipment and the second electronic equipment by the first electronic equipment.
5. The method of any of claims 1 to 4, further comprising:
the second electronic equipment sends third configuration information of the WiFi network to the first electronic equipment in a Near Field Communication (NFC) mode;
and the first electronic equipment creates a WiFi network according to the third configuration information of the WiFi network.
6. The method of claim 4, further comprising:
the second electronic equipment sends second configuration information of the first WiFi network to third electronic equipment in a Near Field Communication (NFC) mode;
and the third electronic equipment creates a WiFi network according to the second configuration information of the first WiFi network.
7. The method according to any one of claims 1 to 6, wherein the first configuration information of the hidden WiFi network is sent to the second electronic device in an unencrypted manner.
8. An electronic device, comprising:
one or more processors;
a memory;
a communication module;
wherein the memory has stored therein one or more computer programs, the one or more computer programs comprising instructions, which when executed by the electronic device, cause the electronic device to perform a method of providing WiFi network access services as recited in any of claims 1-7.
9. A computer-readable storage medium having instructions stored therein, which when run on an electronic device, cause the electronic device to perform a method of providing WiFi network access services as recited in any of claims 1-7.
10. A computer program product comprising instructions for causing an electronic device to perform a method of providing WiFi network access services as claimed in any one of claims 1-7 when the computer program product is run on the electronic device.
CN201911167666.5A 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment Active CN111010693B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911167666.5A CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment
PCT/CN2020/129593 WO2021104114A1 (en) 2019-11-25 2020-11-18 Method for providing wireless fidelity (wifi) network access service, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911167666.5A CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment

Publications (2)

Publication Number Publication Date
CN111010693A true CN111010693A (en) 2020-04-14
CN111010693B CN111010693B (en) 2023-10-03

Family

ID=70113689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911167666.5A Active CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment

Country Status (2)

Country Link
CN (1) CN111010693B (en)
WO (1) WO2021104114A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104114A1 (en) * 2019-11-25 2021-06-03 华为技术有限公司 Method for providing wireless fidelity (wifi) network access service, and electronic device
CN113225715A (en) * 2021-04-20 2021-08-06 广州朗国电子科技有限公司 Wireless module setting method, electronic equipment and storage medium
CN113747543A (en) * 2021-08-03 2021-12-03 荣耀终端有限公司 Network distribution method and device
CN114285737A (en) * 2020-09-18 2022-04-05 华为技术有限公司 Method and device for configuring device
CN114615660A (en) * 2020-12-04 2022-06-10 华为技术有限公司 Access method, system and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011137312A2 (en) * 2010-04-30 2011-11-03 T-Mobile Usa, Inc. Connecting devices to an existing secure wireless network
WO2015117351A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Wifi connection method, device and system, and computer storage medium
WO2016041363A1 (en) * 2014-09-15 2016-03-24 Zhejiang Shenghui Lighting Co., Ltd. Method and system for automatically adapting to wi-fi network with hidden ssid
US20170289159A1 (en) * 2016-03-31 2017-10-05 Intel IP Corporation Security support for free wi-fi and sponsored connectivity for paid wi-fi
CN107567017A (en) * 2016-06-30 2018-01-09 华为技术有限公司 Wireless connection system, device and method
US20180027025A1 (en) * 2014-07-24 2018-01-25 Zte Corporation Hotspot configuration method, access method and device in wireless local area network
WO2018121086A1 (en) * 2016-12-27 2018-07-05 广东欧珀移动通信有限公司 Method for connecting to hidden ap, and terminal device
US20180302792A1 (en) * 2016-02-18 2018-10-18 Tencent Technology (Shenzhen) Company Limited Network connection method and apparatus, and computer storage medium
CN110320811A (en) * 2019-06-17 2019-10-11 华为技术有限公司 A kind of cut-in method and a kind of electronic equipment of smart home device
CN110461024A (en) * 2019-07-23 2019-11-15 深圳合强电子有限公司 Method, router and the smart machine that smart machine is connect automatically with router

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883315A (en) * 2012-08-28 2013-01-16 中兴通讯股份有限公司 Wireless fidelity (WiFi) authentication method and system, and terminal
CN105025472B (en) * 2014-04-25 2018-09-18 Tcl集团股份有限公司 A kind of WIFI access points enciphering hiding and the method and its system of discovery
CN104410969A (en) * 2014-11-07 2015-03-11 广东欧珀移动通信有限公司 Wireless fidelity (WIFI) hotspot hiding method and terminal equipment
CN105554062A (en) * 2015-11-30 2016-05-04 东莞酷派软件技术有限公司 Method, associated device and system of file transmission
US10362608B2 (en) * 2016-04-13 2019-07-23 Fortinet, Inc. Managing wireless client connections via near field communication
CN111010693B (en) * 2019-11-25 2023-10-03 华为技术有限公司 Method for providing wireless fidelity network access service and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011137312A2 (en) * 2010-04-30 2011-11-03 T-Mobile Usa, Inc. Connecting devices to an existing secure wireless network
US20180027025A1 (en) * 2014-07-24 2018-01-25 Zte Corporation Hotspot configuration method, access method and device in wireless local area network
WO2015117351A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Wifi connection method, device and system, and computer storage medium
WO2016041363A1 (en) * 2014-09-15 2016-03-24 Zhejiang Shenghui Lighting Co., Ltd. Method and system for automatically adapting to wi-fi network with hidden ssid
US20180302792A1 (en) * 2016-02-18 2018-10-18 Tencent Technology (Shenzhen) Company Limited Network connection method and apparatus, and computer storage medium
US20170289159A1 (en) * 2016-03-31 2017-10-05 Intel IP Corporation Security support for free wi-fi and sponsored connectivity for paid wi-fi
CN107567017A (en) * 2016-06-30 2018-01-09 华为技术有限公司 Wireless connection system, device and method
WO2018121086A1 (en) * 2016-12-27 2018-07-05 广东欧珀移动通信有限公司 Method for connecting to hidden ap, and terminal device
CN110320811A (en) * 2019-06-17 2019-10-11 华为技术有限公司 A kind of cut-in method and a kind of electronic equipment of smart home device
CN110461024A (en) * 2019-07-23 2019-11-15 深圳合强电子有限公司 Method, router and the smart machine that smart machine is connect automatically with router

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021104114A1 (en) * 2019-11-25 2021-06-03 华为技术有限公司 Method for providing wireless fidelity (wifi) network access service, and electronic device
CN114285737A (en) * 2020-09-18 2022-04-05 华为技术有限公司 Method and device for configuring device
CN114285737B (en) * 2020-09-18 2023-09-22 华为技术有限公司 Method and device for configuring device
CN114615660A (en) * 2020-12-04 2022-06-10 华为技术有限公司 Access method, system and electronic equipment
CN113225715A (en) * 2021-04-20 2021-08-06 广州朗国电子科技有限公司 Wireless module setting method, electronic equipment and storage medium
CN113747543A (en) * 2021-08-03 2021-12-03 荣耀终端有限公司 Network distribution method and device
CN113747543B (en) * 2021-08-03 2022-11-25 荣耀终端有限公司 Network distribution method, equipment, device and storage medium

Also Published As

Publication number Publication date
WO2021104114A1 (en) 2021-06-03
CN111010693B (en) 2023-10-03

Similar Documents

Publication Publication Date Title
CN110320811B (en) Access method of intelligent household equipment and electronic equipment
CN115209194B (en) Terminal equipment, method and system for realizing one touch screen through remote controller
CN113630297B (en) Method and terminal for controlling first equipment
CN111010693B (en) Method for providing wireless fidelity network access service and electronic equipment
WO2021052178A1 (en) Wi-fi connection method and device
WO2021037250A1 (en) Network access method and apparatus for wireless local area network (wlan)
CN111373713B (en) Message transmission method and device
WO2021043045A1 (en) Method and device for configuring network configuration information
CN112469013B (en) Bluetooth connection method and related device
CN112469011A (en) Bluetooth pairing method and related device
EP4283931A1 (en) Nfc method and system, and electronic device
WO2021104448A1 (en) Method for synchronizing key information, system and device
CN113038627B (en) File sharing method, mobile device and computer storage medium
CN111526321B (en) Voice communication method, voice communication device, storage medium and electronic equipment
CN116261124A (en) Data transmission method and device, electronic equipment and intelligent terminal
US20230337147A1 (en) Device Configuration Method and Device
WO2022095581A1 (en) Data transmission method and terminal device
WO2023051204A1 (en) Cross-device connection method, electronic device and storage medium
WO2023071730A1 (en) Voiceprint registration method and electronic devices
CN115412387A (en) Audio playing method and system and electronic equipment
CN116974587A (en) Application deployment method, electronic device, storage medium and chip system
CN115734169A (en) Communication system and communication method
CN114980238A (en) Wi-Fi access method and related equipment
CN114338891A (en) Communication method and device
CN115802326A (en) Bluetooth connection method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant