CN111010693B - Method for providing wireless fidelity network access service and electronic equipment - Google Patents

Method for providing wireless fidelity network access service and electronic equipment Download PDF

Info

Publication number
CN111010693B
CN111010693B CN201911167666.5A CN201911167666A CN111010693B CN 111010693 B CN111010693 B CN 111010693B CN 201911167666 A CN201911167666 A CN 201911167666A CN 111010693 B CN111010693 B CN 111010693B
Authority
CN
China
Prior art keywords
electronic device
wifi network
configuration information
router
hidden
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911167666.5A
Other languages
Chinese (zh)
Other versions
CN111010693A (en
Inventor
刘烨
胡卫卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201911167666.5A priority Critical patent/CN111010693B/en
Publication of CN111010693A publication Critical patent/CN111010693A/en
Priority to PCT/CN2020/129593 priority patent/WO2021104114A1/en
Application granted granted Critical
Publication of CN111010693B publication Critical patent/CN111010693B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The application provides a method for providing wireless fidelity network access service and an electronic device, wherein the method comprises the steps that when a first electronic device detects that a configured first WiFi network is not encrypted, a hidden WiFi network is created; then the first electronic equipment sends first configuration information of the hidden WiFi network to the second electronic equipment in a Near Field Communication (NFC) mode, and receives an access request sent by the second electronic equipment based on the first configuration information; in response to the first access request, the first electronic device establishes a communication connection with the second electronic device.

Description

Method for providing wireless fidelity network access service and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to a method for providing wireless fidelity network access service and an electronic device.
Background
With the development of smart home technology, a family often has a plurality of electronic devices (e.g., mobile phones, smart televisions, smart speakers, etc.) capable of communicating with each other. These electronic devices may access a wireless fidelity (Wireless Fidelity, wiFi) network through a router, thereby accessing the internet. In order for a user to join an electronic device to a Wi-Fi network created by a router, the following steps are typically required: the steps of starting the WiFi switch, searching surrounding available Wi-Fi networks, selecting the SSID of the router and inputting the password are complicated.
Electronic devices supporting near field communication (Near Field Communication, NFC) functions currently on the market can connect to a WiFi network by touching an NFC-enabled router without entering an SSID password (this operation is simply referred to as "one touch connection"), thus reducing the cumbersome operation of a user to enter a password to connect Wi-Fi.
The Wi-Fi network can adopt an Open mode (Open), namely, encryption is not performed at all, any person can connect to the router to use the network, a newly purchased router of a user is in the Open mode after being powered on, the user must manually set an encryption mode to ensure the safety of communication, and the currently mainstream encryption modes comprise WEP, WPA/WPA2 and WPA-PSK/WPA2-PSK.
In the prior art, when a WiFi network created by a router is in an Open mode, a device (simply referred to as an android device) carrying an android operating system performs a bump operation, and the code processing logic of the native android device has a problem, so that an encryption mode of the WiFi network is erroneously identified as a WPA2 type authentication mode, and the android device cannot be connected with the WiFi network in the Open mode created by the router. In order to solve the problem, the android manufacturer can choose to adopt a patch upgrading mode, but the patch upgrading mode cannot cover all models of the android manufacturer, because the patch upgrading rate of the android manufacturer is generally low, the upgrading rate of a new model is basically high, and the performance of an old product is poor. The patch effect is too implicit for the consumer to perceive obviously, so the importance is not enough, and even many consumers are not aware of the patch effect. Patch upgrades for vendors require patch development for all models, which presents a high challenge to vendor personnel. Therefore, there is a need to provide a solution that solves the problem of android devices in addition to patch upgrades that can also perform a touch-connect WiFi when the WiFi is OPEN mode.
Disclosure of Invention
The application provides a wireless fidelity WiFi network access service method, which improves the success rate of the android device in-touch connection with a router.
In order to achieve the above purpose, the application adopts the following technical scheme:
in a first aspect, the present application provides a method for providing a WiFi network access service, the method comprising: the method comprises the steps that first electronic equipment detects whether a configured first WiFi network is encrypted or not; when a first WiFi network configured by the first electronic equipment is not encrypted, a hidden WiFi network is created; the first electronic device sends the first configuration information of the hidden WiFi network to the second electronic device in a Near Field Communication (NFC) mode; the first electronic equipment acquires a first access request aiming at the hidden WiFi network and sent by the second electronic equipment; and responding to the first access request, and establishing communication connection between the first electronic equipment and the second electronic equipment.
In the above method, the first electronic device (e.g., a router) may detect whether the unencrypted first WiFi network is configured, create a hidden WiFi network if the unencrypted first WiFi network is detected to be configured, and send configuration information of the hidden WiFi network to the second electronic device (e.g., a mobile phone or a smart speaker). The second electronic device may then touch the first electronic device, read configuration information (e.g., SSID and password) of the hidden WiFi network via NFC, and access the hidden WiFi network for communication. Assuming that the first electronic device has an OPEN mode first WiFi network enabled after power-up (e.g., the first electronic device has an unencrypted first WiFi network enabled according to factory settings after first power-up, or the first electronic device has an unencrypted first WiFi network configured by the user), it is a hidden WiFi network that is encrypted and invisible to other devices (i.e., other devices cannot scan the SSID of the hidden WiFi network) that the user holds the second electronic device in touch with the first electronic device. Therefore, the problem of connection failure mentioned in the background art part can not be generated, the problem can be solved without upgrading patches by the first electronic equipment carrying the android operating system, and the user experience is remarkably improved.
In one possible implementation, the configuration information of the hidden WiFi network includes at least one of a name or a password of the hidden WiFi network. Therefore, the user touches the encrypted WiFi network through the second electronic equipment, so that the problem of connection failure mentioned in the background art part is not triggered, and the user experience is improved.
In one possible implementation, the second electronic device is loaded with an android operating system, and of course, the second electronic device may also be loaded with other operating systems, such as ios operating systems.
In one possible implementation manner, when a first WiFi network configured by a first electronic device is encrypted, the first electronic device sends second configuration information of the first WiFi network to a second electronic device through a near field communication NFC manner, and then the first electronic device obtains a second access request for the first WiFi network sent by the second electronic device based on the second configuration information; and responding to the second access request, and establishing communication connection between the first electronic equipment and the second electronic equipment for communication.
In one possible implementation manner, the second electronic device may send third configuration information of the WiFi network to the first electronic device through NFC, and the first electronic device creates a WiFi network according to the third configuration information of the WiFi network. According to the method, a user can set configuration information of the WiFi network in the second electronic device, then the configuration information of the WiFi network is sent to the first electronic device through NFC by touching the first electronic device, and the first electronic device creates a WiFi network by using the configuration information of the WiFi network. The second electronic device may then connect directly to the WiFi network created by the first electronic device.
In one possible implementation manner, the second electronic device sends the second configuration information of the first WiFi network to the third electronic device through the NFC manner, and then the third electronic device may create the WiFi network according to the second configuration information of the first WiFi network. According to the method, the second electronic device can transmit the configuration information of the first WiFi network of the first electronic device to the third electronic device in a mode that the second electronic device touches the first electronic device firstly and then touches the third electronic device.
In one possible implementation, the first configuration information of the hidden WiFi network is sent to the second electronic device in an unencrypted manner.
In a second aspect, the present application provides an electronic device comprising: one or more processors, one or more memories, and one or more computer programs; wherein the processor is coupled to both the touch screen and the memory, the one or more computer programs are stored in the memory, and when the electronic device is running, the processor executes the one or more computer programs stored in the memory to cause the electronic device to perform a method of synchronizing information between multiple devices as described in any of the preceding claims.
In a third aspect, the present application provides a computer storage medium comprising computer instructions which, when run on an electronic device, cause the electronic device to perform a method of information synchronization between a plurality of devices according to any of the first aspects.
In a fourth aspect, the application provides a computer program product for, when run on an electronic device, causing the electronic device to perform a method of information synchronization between multiple devices as claimed in any of the first aspects.
It will be appreciated that the electronic device according to the second aspect, the computer storage medium according to the third aspect, and the computer program product according to the fourth aspect may implement the method for providing WiFi network access service, so that the advantages achieved by the method may refer to the advantages in the information synchronization provided above, and are not described herein.
Drawings
Fig. 1 is a schematic diagram of a WiFi network according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an electronic device according to an embodiment of the present application;
fig. 3 is a flowchart of a method for providing a WiFi access service according to an embodiment of the present application;
fig. 4 is an interface schematic diagram of an electronic device connected to a WiFi network according to an embodiment of the present application;
fig. 5 is an interface schematic diagram of setting a WiFi network according to an embodiment of the present application;
fig. 6 is a schematic diagram of a scenario of a WiFi network synchronized between different routers according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The implementation of the present embodiment will be described in detail below with reference to the accompanying drawings.
Fig. 1 illustrates an example of a WiFi network 100 to which one or more of the apparatus, methods, systems, and/or computer program products described further herein may be applicable. The depicted WiFi network 100 includes one or more electronic devices, such as the light bulb 102, the sound box 104, the mobile terminal 106, or other types of electronic devices in fig. 1. Hereinafter, the electronic devices 102, 104, and 106, as well as other smart home devices (such as televisions, washing machines, fans, air conditioners, security systems, etc.), are collectively referred to as "electronic devices". Wherein the bulb 102 can control the light changes, such as the light color and brightness changes. The speaker 104 may have an integrated voice assistant module that may provide interactive voice conversations or query functions via a "wake-up word" (e.g., "hello, small art") and may also control other electronic devices (e.g., control the turning on or off of the light bulb 102). The mobile terminal 106 is illustrated in fig. 1 as a cell phone, and may of course also include a laptop computer, a desktop computer, a tablet computer, a wearable electronic device, a vehicle-mounted device, a virtual reality device, etc., as the embodiment of the application is not limited in this regard.
The WiFi network 100 also includes a wireless router 108. The router 108 is a Wi-Fi enabled device that can communicate Internet information to a personal device (e.g., a computer, cell phone, or tablet). These electronic devices may form a Local Area Network (LAN) in the home. The electronic devices can communicate with each other via the wireless router 108 (e.g., the light bulb 102 communicates with the enclosure 104 via the wireless router 108). The electronic device is also capable of communicating with a remote server via a communication network (e.g., a suitable communication network such as Long Term Evolution (LTE), fifth generation mobile communication (5G), etc.) via the wireless router 108. Of course, communication between electronic devices may also be direct (e.g., via Wi-Fi, NFC, bluetooth, etc. short-range communication techniques).
The router access method will be described below taking the mobile terminal 106 shown in fig. 1 as an example, and fig. 2 shows a schematic diagram of the structure of the mobile terminal 106.
The mobile terminal 106 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (universal serial bus, USB) interface 130, a charge management module 140, a power management module 141, a battery 142, an antenna 1, an antenna 2, a mobile communication module 150, a wireless communication module 160, an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an earphone interface 170D, a sensor module 180, a camera 193, a display 194, and the like.
It should be understood that the illustrated construction of an embodiment of the present application does not constitute a particular limitation of the mobile terminal 106. In other embodiments of the application, the mobile terminal 106 may include more or less components than illustrated, or certain components may be combined, or certain components may be split, or different arrangements of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The processor 110 may include one or more processing units, such as: the processor 110 may include an application processor (application processor, AP), a modem processor, a graphics processor (graphics processing unit, GPU), an image signal processor (image signal processor, ISP), a controller, a memory, a video codec, a digital signal processor (digital signal processor, DSP), a baseband processor, and/or a neural network processor (neural-network processing unit, NPU), etc. Wherein the different processing units may be separate devices or may be integrated in one or more processors.
A memory may also be provided in the processor 110 for storing instructions and data. In some embodiments, the memory in the processor 110 is a cache memory. The memory may hold instructions or data that the processor 110 has just used or recycled. If the processor 110 needs to reuse the instruction or data, it can be called directly from the memory. Repeated accesses are avoided and the latency of the processor 110 is reduced, thereby improving the efficiency of the system.
In some embodiments, the processor 110 may include one or more interfaces. The interfaces may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, a universal asynchronous receiver transmitter (universal asynchronous receiver/transmitter, UART) interface, a mobile industry processor interface (mobile industry processor interface, MIPI), a general-purpose input/output (GPIO) interface, a subscriber identity module (subscriber identity module, SIM) interface, and/or a universal serial bus (universal serial bus, USB) interface, among others.
The charge management module 140 is configured to receive a charge input from a charger. The charger can be a wireless charger or a wired charger. In some wired charging embodiments, the charge management module 140 may receive a charging input of a wired charger through the USB interface 130. In some wireless charging embodiments, the charge management module 140 may receive wireless charging input through a wireless charging coil of the mobile terminal 106. The charging management module 140 may also supply power to the electronic device through the power management module 141 while charging the battery 142.
The power management module 141 is used for connecting the battery 142, and the charge management module 140 and the processor 110. The power management module 141 receives input from the battery 142 and/or the charge management module 140 and provides power to the processor 110, the internal memory 121, the external memory, the display 194, the camera 193, the wireless communication module 160, and the like. The power management module 141 may also be configured to monitor battery capacity, battery cycle number, battery health (leakage, impedance) and other parameters. In other embodiments, the power management module 141 may also be provided in the processor 110. In other embodiments, the power management module 141 and the charge management module 140 may be disposed in the same device.
The wireless communication function of the mobile terminal 106 may be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, a modem processor, a baseband processor, and the like.
The antennas 1 and 2 are used for transmitting and receiving electromagnetic wave signals. Each antenna in the mobile terminal 106 may be configured to cover a single or multiple communication bands. Different antennas may also be multiplexed to improve the utilization of the antennas. For example: the antenna 1 may be multiplexed into a diversity antenna of a wireless local area network. In other embodiments, the antenna may be used in conjunction with a tuning switch.
The mobile communication module 150 may provide a solution for wireless communication including 2G/3G/4G/5G or the like applied on the mobile terminal 106. The mobile communication module 150 may include at least one filter, switch, power amplifier, low noise amplifier (low noise amplifier, LNA), etc. The mobile communication module 150 may receive electromagnetic waves from the antenna 1, perform processes such as filtering, amplifying, and the like on the received electromagnetic waves, and transmit the processed electromagnetic waves to the modem processor for demodulation. The mobile communication module 150 can amplify the signal modulated by the modem processor, and convert the signal into electromagnetic waves through the antenna 1 to radiate. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be disposed in the processor 110. In some embodiments, at least some of the functional modules of the mobile communication module 150 may be provided in the same device as at least some of the modules of the processor 110.
The wireless communication module 160 may provide solutions for wireless communication including wireless local area network (wireless local area networks, WLAN) (e.g., wireless fidelity (wireless fidelity, wi-Fi) network), bluetooth (BT), global navigation satellite system (global navigation satellite system, GNSS), frequency modulation (frequency modulation, FM), near field wireless communication technology (near field communication, NFC), infrared technology (IR), etc., as applied on the mobile terminal 106. The wireless communication module 160 may be one or more devices that integrate at least one communication processing module. The wireless communication module 160 receives electromagnetic waves via the antenna 2, modulates the electromagnetic wave signals, filters the electromagnetic wave signals, and transmits the processed signals to the processor 110. The wireless communication module 160 may also receive a signal to be transmitted from the processor 110, frequency modulate it, amplify it, and convert it to electromagnetic waves for radiation via the antenna 2.
In some embodiments, antenna 1 and mobile communication module 150 of mobile terminal 106 are coupled, and antenna 2 and wireless communication module 160 are coupled, such that mobile terminal 106 may communicate with a network and other devices via wireless communication technology. The wireless communication techniques may include the Global System for Mobile communications (global system for mobile communications, GSM), general packet radio service (general packet radio service, GPRS), code division multiple access (code division multiple access, CDMA), wideband code division multiple access (wideband code division multiple access, WCDMA), time division code division multiple access (time-division code division multiple access, TD-SCDMA), long term evolution (long term evolution, LTE), BT, GNSS, WLAN, NFC, FM, and/or IR techniques, among others. The GNSS may include a global satellite positioning system (global positioning system, GPS), a global navigation satellite system (global navigation satellite system, GLONASS), a beidou satellite navigation system (beidou navigation satellite system, BDS), a quasi zenith satellite system (quasi-zenith satellite system, QZSS) and/or a satellite based augmentation system (satellite based augmentation systems, SBAS).
The mobile terminal 106 implements display functions via a GPU, a display screen 194, an application processor, and the like. The GPU is a microprocessor for image processing, and is connected to the display 194 and the application processor. The GPU is used to perform mathematical and geometric calculations for graphics rendering. Processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
The display screen 194 is used to display images, videos, and the like. The display 194 includes a display panel. The display panel may employ a liquid crystal display (liquid crystal display, LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (AMOLED) or an active-matrix organic light-emitting diode (matrix organic light emitting diode), a flexible light-emitting diode (flex), a mini, a Micro led, a Micro-OLED, a quantum dot light-emitting diode (quantum dot light emitting diodes, QLED), or the like. In some embodiments, the mobile terminal 106 may include 1 or N display screens 194, N being a positive integer greater than 1.
The mobile terminal 106 may implement photographing functions through an ISP, a camera 193, a video codec, a GPU, a display 194, an application processor, and the like.
The ISP is used to process data fed back by the camera 193. For example, when photographing, the shutter is opened, light is transmitted to the camera photosensitive element through the lens, the optical signal is converted into an electric signal, and the camera photosensitive element transmits the electric signal to the ISP for processing and is converted into an image visible to naked eyes. ISP can also optimize the noise, brightness and skin color of the image. The ISP can also optimize parameters such as exposure, color temperature and the like of a shooting scene. In some embodiments, the ISP may be provided in the camera 193.
The camera 193 is used to capture still images or video. The object generates an optical image through the lens and projects the optical image onto the photosensitive element. The photosensitive element may be a charge coupled device (charge coupled device, CCD) or a Complementary Metal Oxide Semiconductor (CMOS) phototransistor. The photosensitive element converts the optical signal into an electrical signal, which is then transferred to the ISP to be converted into a digital image signal. The ISP outputs the digital image signal to the DSP for processing. The DSP converts the digital image signal into an image signal in a standard RGB, YUV, or the like format. In some embodiments, the mobile terminal 106 may include 1 or N cameras 193, N being a positive integer greater than 1.
The digital signal processor is used for processing digital signals, and can process other digital signals besides digital image signals. For example, when the mobile terminal 106 selects a frequency bin, the digital signal processor is used to fourier transform the frequency bin energy, or the like.
Video codecs are used to compress or decompress digital video. The mobile terminal 106 may support one or more video codecs. In this way, the mobile terminal 106 may play or record video in a variety of encoding formats, such as: dynamic picture experts group (moving picture experts group, MPEG) 1, MPEG2, MPEG3, MPEG4, etc.
The external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, to enable expansion of the memory capabilities of the mobile terminal 106. The external memory card communicates with the processor 110 through an external memory interface 120 to implement data storage functions. For example, files such as music, video, etc. are stored in an external memory card.
The internal memory 121 may be used to store computer executable program code including instructions. The processor 110 executes various functional applications of the mobile terminal 106 and data processing by executing instructions stored in the internal memory 121. The internal memory 121 may include a storage program area and a storage data area. The storage program area may store an application program (such as a sound playing function, an image playing function, etc.) required for at least one function of the operating system, etc. The storage data area may store data created during use of the mobile terminal 106 (e.g., audio data, phonebook, etc.), and the like. In addition, the internal memory 121 may include a high-speed random access memory, and may further include a nonvolatile memory such as at least one magnetic disk storage device, a flash memory device, a universal flash memory (universal flash storage, UFS), and the like.
The mobile terminal 106 may implement audio functionality through an audio module 170, a speaker 170A, a receiver 170B, a microphone 170C, an ear-headphone interface 170D, an application processor, and the like. Such as music playing, recording, etc.
The audio module 170 is used to convert digital audio information into an analog audio signal output and also to convert an analog audio input into a digital audio signal. The audio module 170 may also be used to encode and decode audio signals. In some embodiments, the audio module 170 may be disposed in the processor 110, or a portion of the functional modules of the audio module 170 may be disposed in the processor 110.
The speaker 170A, also referred to as a "horn," is used to convert audio electrical signals into sound signals. The mobile terminal 106 may listen to music, or to hands-free calls, through the speaker 170A.
A receiver 170B, also referred to as a "earpiece", is used to convert the audio electrical signal into a sound signal. When the mobile terminal 106 picks up a call or voice message, the voice may be picked up by placing the receiver 170B close to the human ear.
Microphone 170C, also referred to as a "microphone" or "microphone", is used to convert sound signals into electrical signals. When making a call or transmitting voice information, the user can sound near the microphone 170C through the mouth, inputting a sound signal to the microphone 170C. The mobile terminal 106 may be provided with at least one microphone 170C. In other embodiments, the mobile terminal 106 may be provided with two microphones 170C, which may also implement noise reduction in addition to collecting sound signals. In other embodiments, the mobile terminal 106 may also be provided with three, four or more microphones 170C to enable collection of sound signals, noise reduction, identification of sound sources, directional recording functions, etc.
The earphone interface 170D is used to connect a wired earphone. The headset interface 170D may be a USB interface 130 or a 3.5mm open mobile electronic device platform (open mobile terminal platform, OMTP) standard interface, a american cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
The sensor module 180 may include a pressure sensor, a gyroscope sensor, a barometric sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, and the like.
Of course, the mobile terminal 106 may further include one or more keys, a motor, an indicator, a SIM card interface, and the like, which are not limited in this embodiment of the present application.
The following will describe in detail a router access method provided by an embodiment of the present application with reference to the accompanying drawings. To implement a Wi-Fi network created by the electronic device access router 108, fig. 3 shows a signaling diagram of a WiFi network created by the mobile terminal 106 access router 108.
Referring to fig. 3, in step 302, the router 108 detects whether the first WiFi network is encrypted, and the encryption manner of the WiFi network includes any of the following: OPEN mode (i.e. "not encrypted"), WEP, WPA/WPA2, WPA-PSK/WPA2-PSK. Step 316 is performed if the first WiFi network is encrypted; step 304 is performed if the first WiFi network is not encrypted. The first WiFi network may be a WiFi network configured by the router 108 itself, for example, a WiFi network created after the first power-on and startup after the router 108 leaves the factory.
Generally, when a router newly purchased by a user is powered on for the first time, wiFi is in an open mode, so that the user can conveniently access and configure the name (SSID) and the password of the WiFi network. The router will also be in open mode after restoring factory settings (i.e., resetting the router) and the user needs to reset the name (SSID) and password of the WiFi network. Thus, in one implementation, step 302 may be replaced with: the router 108 detects whether it is in a factory state to determine whether the first WiFi network is encrypted. For example, the factory state stored by the router 108 is a boolean value factory_status, and when factory_status is true, it represents that the router 108 is in a factory state (i.e., it represents WiFi is not encrypted), and when factory_status is false, it represents that the router 108 is in a non-factory state. The router 108, after power up, determines that the first WiFi network is not encrypted by detecting that the factory_status flag is true.
In step 304, router 108 creates a hidden WiFi network. In one implementation, router 108 generates configuration information for the hidden WiFi network, including a network name and a password. For example, router 108 may randomly generate configuration information for the hidden WiFi network according to certain rules.
In step 306, the mobile terminal 106 approaches the router NFC tag area. In one implementation, the NFC read-write area of the router 108 is labeled to prompt the user to get close to the router to achieve a "one touch" (i.e., touching the router in NFC to achieve the purpose of connecting WiFi), the user can hold the mobile terminal 106 close to the area to which the label is attached, depending on the label location.
In step 308, the mobile terminal 106 requests to obtain WiFi network configuration information. In one implementation, the mobile terminal 106 sends a request message to the router requesting to read the WiFi network configuration information.
In step 310, the NFC module of router 108 reads the hidden WiFi network configuration information. Router 108 has two WiFi SSIDs, one being the SSID of the first WiFi network and the other being the SSID of the hidden WiFi network created at step 304. In step 310, the NFC module of the router 108 obtains the configuration information of the hidden WiFi network created in step 304, instead of the SSID of the first WiFi network. Therefore, the problem of failure of the connection router in the background technology is avoided, and the SSID of the hidden WiFi network cannot be scanned by the user side, so that the user does not feel the action of creating the hidden WiFi network by the router.
In one implementation, step 302 may also be performed again between steps 308 and 310 to detect whether the first WiFi network is encrypted, step 310 is performed after determining that the first WiFi network is not encrypted, and steps 316 and 318 are performed after determining that the first WiFi network is encrypted. In this way, the router 108 may detect whether the first WiFi network configured once after the power-on starts working is encrypted, and after obtaining the request message of the mobile terminal 106 for reading the WiFi network configuration information, determine whether the first WiFi network is encrypted again, and execute step 310 after determining that the first WiFi network is not encrypted. This ensures that the mobile terminal 106 can connect to the encrypted WiFi network.
In step 312, the router 108 returns configuration information for the hidden WiFi network to the mobile terminal 106. For example, the router 108 returns configuration information of the hidden WiFi network to the mobile terminal 106 via NFC Data Exchange Format (NDEF) message data. In one implementation, the router 108 sends the configuration information of the hidden WiFi network to the mobile terminal 106 in the clear (i.e., without encrypting the configuration information of the hidden WiFi network) via NFC.
In step 314, the mobile terminal 106 connects to the hidden WiFi network, enabling a successful access router.
In some embodiments, step 314 may be preceded by the steps of: the mobile terminal 106 displays a first user interface (e.g., the user interface 400 shown in fig. 4) in response to the configuration information of the hidden WiFi network acquired in step 312. The first user interface contains a prompt box 402, where prompt box 402 contains the prompt "whether to connect to a network (network SSID, SSID in the example being" HUAWEI-07AW-NFC ")? ", connect button 404, cancel button 406. A user clicking on the connect button 404 may connect to the network "HUAWEI-07AW-NFC" and a user clicking on the cancel button 406 may cancel the operation.
In step 316, the router 108 sends the configuration information of the first WiFi network to the mobile terminal 106 via NFC. In some implementations, the following steps are also included before step 316: the mobile terminal 106 sends a request message to obtain the configuration information of the first WiFi network through NFC (provided that the mobile terminal 106 needs to be close to the router 108).
In step 318, router 108 establishes a WiFi connection with mobile terminal 106.
By the method shown in fig. 3 above, the situation is addressed where the user configures the first WiFi network in OPEN mode for router 108, or where router 108 creates the first WiFi network for the first power-up use of the new purchase. The router 108 can automatically create a hidden WiFi network, and send configuration information of the hidden WiFi network to the mobile terminal 106 through NFC after the mobile terminal 106 touches the router 108, so that the mobile terminal 106 can be connected to the hidden WiFi network, and further, the security of WiFi connection is improved, and the problem of connection failure mentioned in the background art part can be avoided, so that the success rate of connecting the router is improved.
In some embodiments, the mobile terminal 106 may also set the WiFi name and password of the router 108 through NFC. As shown in fig. 5, the mobile terminal 106 displays a WiFi interface 502, inputs a network name (SSID) 506 and a password 508 on the interface 502, and then clicks a next step 510 to enter a prompt interface 504, where the interface 504 includes a prompt "please get close to the router to complete WiFi configuration". The user brings the mobile terminal 106 close to the router NFC read/write area according to the prompt, and the mobile terminal 106 sends the WiFi name and password to the router 108 through NFC. The router 108 then creates a WiFi network from the received WiFi name and password, and the mobile terminal 106 can then automatically connect to the WiFi network without touching the router again.
In some embodiments, the mobile terminal 106 may also clone the WiFi configuration information of the router through NFC, i.e., copy the WiFi configuration information of one router to another router, to achieve synchronization of the WiFi configuration information of both routers. For example, as shown in fig. 6, a user may have multiple routers (e.g., router 602 and router 108) in his home, and the user may use the mobile terminal 106 to obtain the WiFi configuration information of the router 108 through NFC, and then send the WiFi configuration information of the router 108 to the router 602 by approaching the mobile terminal to the router 602, so as to achieve synchronization of the configuration information of the router.
As shown in fig. 7, an embodiment of the present application discloses an electronic device, which may specifically be a router device (e.g., router 108) in the foregoing embodiment. As shown in fig. 7, the electronic device may include a communication module 701; one or more processors 702; one or more memories 703; one or more applications (not shown); and one or more computer programs 704, the devices described above may be connected by one or more communication buses 705.
The memory 703 may be used to store data, software programs, and software modules, and may be volatile memory (RAM), such as random-access memory; or a non-volatile memory (non-volatile memory), such as a read-only memory (ROM), a flash memory (flash memory), a hard disk (HDD) or a Solid State Drive (SSD), or a combination of the above types of memory. Specifically, the memory 703 may store program codes for causing the processor 702 to execute the router access method according to the embodiment of the present application by executing the program codes.
For example, the memory 703 may store program code for causing the processor 702 to perform the method steps performed by the router 108 side of fig. 3 by executing the program code.
The communication module 701 may include a wireless communication module and/or a wired communication module, such as one or more of a Wi-Fi module, an NFC module, and may further include a bluetooth module, an infrared module, an ethernet communication module, etc., and may be used to send and receive information, and may further process the received information to the processor 702; alternatively, the signal generated by the processor 702 is transmitted.
The processor 702 is coupled to the communication module 701, the memory 703. The processor 702 may be any processing device including, but not limited to, a MIPS (microprocessor without interlocked piped stages) processor, a microprocessor, a digital signal processor, an application specific integrated circuit, a microcontroller, a state machine, or any type of programmable logic array. The processor 702 is a control center of the communication device, connects various parts of the entire communication device using various interfaces and lines, performs various functions of the communication device and processes data by running or executing software programs and/or modules stored in the memory 703, and invoking data stored in the memory 703.
In addition, it should be noted that the structure shown in fig. 7 is not limited to the structure of the electronic device according to the embodiment of the present application, and the electronic device may further include other modules, such as a sensor, a power module, etc., which are not described herein in detail.
The embodiment of the application can divide the functional modules of the user equipment according to the method example, for example, each functional module can be divided corresponding to each function, or two or more functions can be integrated in one processing module. The integrated modules may be implemented in hardware or in software functional modules. It should be noted that, in the embodiment of the present application, the division of the modules is schematic, which is merely a logic function division, and other division manners may be implemented in actual implementation.
From the foregoing description of the embodiments, it will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of functional modules is illustrated, and in practical application, the above-described functional allocation may be implemented by different functional modules according to needs, i.e. the internal structure of the apparatus is divided into different functional modules to implement all or part of the functions described above. The specific working processes of the above-described systems, devices and units may refer to the corresponding processes in the foregoing method embodiments, which are not described herein.
The functional units in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the embodiments of the present application may be essentially or a part contributing to the prior art or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: flash memory, removable hard disk, read-only memory, random access memory, magnetic or optical disk, and the like.
The foregoing is merely a specific implementation of the embodiment of the present application, but the protection scope of the embodiment of the present application is not limited to this, and any changes or substitutions within the technical scope disclosed in the embodiment of the present application should be covered in the protection scope of the embodiment of the present application. Therefore, the protection scope of the embodiments of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A method of providing wireless fidelity WiFi network access services, comprising:
the method comprises the steps that first electronic equipment detects whether a configured first WiFi network is encrypted or not;
when a first WiFi network configured by the first electronic equipment is not encrypted, a hidden WiFi network is created;
the first electronic device sends first configuration information of the hidden WiFi network to the second electronic device in a Near Field Communication (NFC) mode;
the first electronic device obtains a first access request for the hidden WiFi network, which is sent by the second electronic device based on the first configuration information;
and responding to the first access request, and establishing communication connection between the first electronic device and the second electronic device.
2. The method of claim 1, wherein the configuration information of the hidden WiFi network includes at least one of a name or a password of the hidden WiFi network.
3. The method of claim 2, wherein the second electronic device is populated with an android operating system.
4. A method according to claim 3, characterized in that the method further comprises:
when a first WiFi network configured by the first electronic equipment is encrypted, the first electronic equipment sends second configuration information of the first WiFi network to second electronic equipment in a Near Field Communication (NFC) mode;
the first electronic device obtains a second access request for the first WiFi network, which is sent by the second electronic device based on the second configuration information;
and responding to the second access request, and establishing communication connection between the first electronic device and the second electronic device.
5. The method according to claim 4, wherein the method further comprises:
the second electronic device sends third configuration information of the WiFi network to the first electronic device in a Near Field Communication (NFC) mode;
and the first electronic equipment creates a WiFi network according to the third configuration information of the WiFi network.
6. The method according to claim 4, wherein the method further comprises:
the second electronic device sends second configuration information of the first WiFi network to the third electronic device in a Near Field Communication (NFC) mode;
and the third electronic equipment creates a WiFi network according to the second configuration information of the first WiFi network.
7. The method of any of claims 1-6, wherein the first configuration information of the hidden WiFi network is sent to the second electronic device in an unencrypted manner.
8. An electronic device, comprising:
one or more processors;
a memory;
a communication module;
wherein the memory has stored therein one or more computer programs, the one or more computer programs comprising instructions, which when executed by the electronic device, cause the electronic device to perform a method of providing wireless fidelity WiFi network access services according to any of claims 1-7.
9. A computer readable storage medium having instructions stored therein, which when run on an electronic device, cause the electronic device to perform a method of providing wireless fidelity WiFi network access services according to any of claims 1-7.
10. An electronic device, characterized in that it comprises means for performing the method according to any of claims 1 to 7.
CN201911167666.5A 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment Active CN111010693B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911167666.5A CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment
PCT/CN2020/129593 WO2021104114A1 (en) 2019-11-25 2020-11-18 Method for providing wireless fidelity (wifi) network access service, and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911167666.5A CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment

Publications (2)

Publication Number Publication Date
CN111010693A CN111010693A (en) 2020-04-14
CN111010693B true CN111010693B (en) 2023-10-03

Family

ID=70113689

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911167666.5A Active CN111010693B (en) 2019-11-25 2019-11-25 Method for providing wireless fidelity network access service and electronic equipment

Country Status (2)

Country Link
CN (1) CN111010693B (en)
WO (1) WO2021104114A1 (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010693B (en) * 2019-11-25 2023-10-03 华为技术有限公司 Method for providing wireless fidelity network access service and electronic equipment
CN114285737B (en) * 2020-09-18 2023-09-22 华为技术有限公司 Method and device for configuring device
CN114615660A (en) * 2020-12-04 2022-06-10 华为技术有限公司 Access method, system and electronic equipment
CN113225715A (en) * 2021-04-20 2021-08-06 广州朗国电子科技有限公司 Wireless module setting method, electronic equipment and storage medium
CN113747543B (en) * 2021-08-03 2022-11-25 荣耀终端有限公司 Network distribution method, equipment, device and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011137312A2 (en) * 2010-04-30 2011-11-03 T-Mobile Usa, Inc. Connecting devices to an existing secure wireless network
WO2015117351A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Wifi connection method, device and system, and computer storage medium
WO2016041363A1 (en) * 2014-09-15 2016-03-24 Zhejiang Shenghui Lighting Co., Ltd. Method and system for automatically adapting to wi-fi network with hidden ssid
CN107567017A (en) * 2016-06-30 2018-01-09 华为技术有限公司 Wireless connection system, device and method
WO2018121086A1 (en) * 2016-12-27 2018-07-05 广东欧珀移动通信有限公司 Method for connecting to hidden ap, and terminal device
CN110320811A (en) * 2019-06-17 2019-10-11 华为技术有限公司 A kind of cut-in method and a kind of electronic equipment of smart home device
CN110461024A (en) * 2019-07-23 2019-11-15 深圳合强电子有限公司 Method, router and the smart machine that smart machine is connect automatically with router

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883315A (en) * 2012-08-28 2013-01-16 中兴通讯股份有限公司 Wireless fidelity (WiFi) authentication method and system, and terminal
CN105025472B (en) * 2014-04-25 2018-09-18 Tcl集团股份有限公司 A kind of WIFI access points enciphering hiding and the method and its system of discovery
CN105828326B (en) * 2014-07-24 2021-01-01 中兴通讯股份有限公司 Access method of wireless local area network and wireless access node
CN104410969A (en) * 2014-11-07 2015-03-11 广东欧珀移动通信有限公司 Wireless fidelity (WIFI) hotspot hiding method and terminal equipment
CN105554062A (en) * 2015-11-30 2016-05-04 东莞酷派软件技术有限公司 Method, associated device and system of file transmission
CN107094294B (en) * 2016-02-18 2020-06-02 腾讯科技(深圳)有限公司 Network connection method and device
US20170289159A1 (en) * 2016-03-31 2017-10-05 Intel IP Corporation Security support for free wi-fi and sponsored connectivity for paid wi-fi
US10362608B2 (en) * 2016-04-13 2019-07-23 Fortinet, Inc. Managing wireless client connections via near field communication
CN111010693B (en) * 2019-11-25 2023-10-03 华为技术有限公司 Method for providing wireless fidelity network access service and electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011137312A2 (en) * 2010-04-30 2011-11-03 T-Mobile Usa, Inc. Connecting devices to an existing secure wireless network
WO2015117351A1 (en) * 2014-08-19 2015-08-13 中兴通讯股份有限公司 Wifi connection method, device and system, and computer storage medium
WO2016041363A1 (en) * 2014-09-15 2016-03-24 Zhejiang Shenghui Lighting Co., Ltd. Method and system for automatically adapting to wi-fi network with hidden ssid
CN107567017A (en) * 2016-06-30 2018-01-09 华为技术有限公司 Wireless connection system, device and method
WO2018121086A1 (en) * 2016-12-27 2018-07-05 广东欧珀移动通信有限公司 Method for connecting to hidden ap, and terminal device
CN110320811A (en) * 2019-06-17 2019-10-11 华为技术有限公司 A kind of cut-in method and a kind of electronic equipment of smart home device
CN110461024A (en) * 2019-07-23 2019-11-15 深圳合强电子有限公司 Method, router and the smart machine that smart machine is connect automatically with router

Also Published As

Publication number Publication date
CN111010693A (en) 2020-04-14
WO2021104114A1 (en) 2021-06-03

Similar Documents

Publication Publication Date Title
CN110320811B (en) Access method of intelligent household equipment and electronic equipment
CN115209194B (en) Terminal equipment, method and system for realizing one touch screen through remote controller
CN111010693B (en) Method for providing wireless fidelity network access service and electronic equipment
WO2021147686A1 (en) Method for guiding intelligent device to access network, and medium, control terminal, and system
CN113630297B (en) Method and terminal for controlling first equipment
WO2021052178A1 (en) Wi-fi connection method and device
WO2021043045A1 (en) Method and device for configuring network configuration information
WO2021037250A1 (en) Network access method and apparatus for wireless local area network (wlan)
CN112771900B (en) Data transmission method and electronic equipment
CN111373713B (en) Message transmission method and device
WO2020151385A1 (en) Method and device for controlling networking of smart home device
WO2021017894A1 (en) Method for using remote sim module, and electronic apparatus
CN112469011A (en) Bluetooth pairing method and related device
CN113038627B (en) File sharing method, mobile device and computer storage medium
WO2022089515A1 (en) Dual wifi connection method and electronic device
CN116261124A (en) Data transmission method and device, electronic equipment and intelligent terminal
CN114285737B (en) Method and device for configuring device
CN114980238B (en) Wi-Fi access method and related equipment
WO2023051204A1 (en) Cross-device connection method, electronic device and storage medium
CN116974587A (en) Application deployment method, electronic device, storage medium and chip system
CN114980238A (en) Wi-Fi access method and related equipment
CN115802326A (en) Bluetooth connection method and electronic equipment
CN117295040A (en) Message sending method, electronic equipment and communication system
CN115734169A (en) Communication system and communication method
CN114793338A (en) Wi-Fi connection method, wireless access equipment and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant