CN111148080A - Wireless network connection method and user equipment - Google Patents

Wireless network connection method and user equipment Download PDF

Info

Publication number
CN111148080A
CN111148080A CN201910659971.XA CN201910659971A CN111148080A CN 111148080 A CN111148080 A CN 111148080A CN 201910659971 A CN201910659971 A CN 201910659971A CN 111148080 A CN111148080 A CN 111148080A
Authority
CN
China
Prior art keywords
user equipment
electronic
hotspot
electronic device
wireless network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910659971.XA
Other languages
Chinese (zh)
Inventor
王强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
TCL China Star Optoelectronics Technology Co Ltd
Original Assignee
Shenzhen China Star Optoelectronics Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen China Star Optoelectronics Technology Co Ltd filed Critical Shenzhen China Star Optoelectronics Technology Co Ltd
Priority to CN201910659971.XA priority Critical patent/CN111148080A/en
Publication of CN111148080A publication Critical patent/CN111148080A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/0008General problems related to the reading of electronic memory record carriers, independent of its reading method, e.g. power transfer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/04Arrangements for maintaining operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Artificial Intelligence (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a wireless network connection method and user equipment, wherein the method comprises the following steps: judging whether an electronic tag of first electronic equipment is in a readable state; if yes, reading preset wireless connection information from an electronic tag of the first electronic device, wherein the wireless connection information at least comprises a name of a first hotspot of the first electronic device and access verification information; and establishing wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information. By implementing the embodiment of the invention, the efficiency of wireless network connection can be improved.

Description

Wireless network connection method and user equipment
Technical Field
The invention relates to the technical field of wireless communication, in particular to a wireless network connection method and user equipment.
Background
Currently, some small-screen user devices (such as smart watches) are increasingly full-featured and have more applications, but some applications in the small-screen user devices have higher network requirements. Because the screen of the small-screen user equipment is small, the user can have inconvenience when performing operations such as selection of a wireless network, input of a password and the like, and the efficiency of the step of connecting the wireless network is low.
Disclosure of Invention
The embodiment of the invention discloses a wireless network connection method and user equipment, which can improve the efficiency of wireless network connection.
The first aspect of the embodiments of the present invention discloses a method for connecting a wireless network, including:
judging whether an electronic tag of first electronic equipment is in a readable state;
if yes, reading preset wireless connection information from an electronic tag of the first electronic device, wherein the wireless connection information at least comprises a name of a first hotspot of the first electronic device and access verification information;
and establishing wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
A second aspect of an embodiment of the present invention discloses a user equipment, where the user equipment includes:
the judging unit is used for judging whether the electronic tag of the first electronic equipment is in a readable state;
a reading unit, configured to read preset wireless connection information from the electronic tag of the first electronic device when the determining unit determines that the electronic tag of the first electronic device is in a readable state, where the wireless connection information at least includes a name of a first hotspot of the first electronic device and access verification information;
and the first establishing unit is used for establishing wireless network connection between the user equipment and the first hotspot according to the name and the access verification information of the first hotspot read by the reading unit.
A third aspect of the embodiments of the present invention discloses a user equipment, including:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to execute part or all of the steps of any one of the wireless network connection methods disclosed in the first aspect of the embodiments of the present invention.
A fourth aspect of the present invention discloses a computer-readable storage medium storing a computer program, where the computer program enables a computer to execute part or all of the steps of any one of the methods for connecting a wireless network disclosed in the first aspect of the present invention.
A fifth aspect of the embodiments of the present invention discloses a computer program product, which, when running on a computer, causes the computer to execute some or all of the steps of any one of the methods for connecting a wireless network disclosed in the first aspect of the embodiments of the present invention.
A sixth aspect of the present embodiment discloses an application publishing platform, where the application publishing platform is configured to publish a computer program product, where when the computer program product runs on a computer, the computer is enabled to execute some or all of the steps of any one of the methods for connecting a wireless network disclosed in the first aspect of the present embodiment.
Compared with the prior art, the embodiment of the invention has the following beneficial effects:
in the embodiment of the invention, the user equipment can judge whether the electronic tag of the first electronic equipment is in a readable state; if so, the user equipment can read preset wireless connection information from an electronic tag of the electronic equipment, wherein the wireless connection information at least comprises the name of a first hotspot of the electronic equipment and access verification information; and the user equipment can establish wireless network connection between the user equipment and the first hotspot of the electronic equipment according to the name of the first hotspot and the access verification information. Therefore, by implementing the embodiment of the invention, even if the screen of the user equipment is small, the user equipment can also carry out wireless network connection rapidly, so that the steps of connecting the user equipment with a wireless network can be reduced, and the efficiency of wireless network connection of the user equipment is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a wireless network connection method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another wireless network connection method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating a wireless network connection method according to another embodiment of the present invention;
fig. 4 is a schematic structural diagram of a user equipment disclosed in an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another user equipment disclosed in the embodiment of the present invention;
fig. 6 is a schematic structural diagram of another user equipment disclosed in the embodiment of the present invention;
fig. 7 is a schematic structural diagram of another user equipment disclosed in the embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "comprises" and "comprising," and any variations thereof, of embodiments of the present invention are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The embodiment of the invention discloses a wireless network connection method and user equipment, which can improve the efficiency of wireless network connection. The following detailed description is made with reference to the accompanying drawings.
Example one
Referring to fig. 1, fig. 1 is a flowchart illustrating a wireless network connection method according to an embodiment of the present invention. As shown in fig. 1, the connection method of the wireless network may include the steps of:
101. the user equipment judges whether the electronic tag of the first electronic equipment is in a readable state, if so, the steps 102 to 103 are executed, and if not, the process is ended.
For example, the user device may be a small-screen user device such as a smart headset, a smart bracelet, a smart watch, a smart collar, an electronic pen, a smart ring, or the like; or the user equipment can also be non-small-screen user equipment or robots such as a family education machine, a tablet computer, a mobile phone and a smart television; the embodiments of the present invention are not limited.
In one embodiment, the user device may determine whether the electronic tag of the first electronic device is in a readable state only if the electronic code within the electronic tag of the user device is added to the permission list of the electronic tag of the first electronic device, wherein the electronic code within the electronic tag of the user device is the unique electronic code.
For example, if the electronic tag of the user equipment is in the sensing area of the electronic tag of the first electronic equipment, and if the electronic tag of the first electronic equipment does not add the electronic code in the electronic tag of the user equipment to the permission list, the user equipment does not perform judgment operation on the electronic tag of the first electronic equipment; if the electronic tag of the first electronic device adds the electronic code in the electronic tag of the user device to the permission list, a reader-writer on the electronic tag of the user device transmits a radio frequency signal to the reader-writer of the electronic tag of the first electronic device, the radio frequency signal comprises the electronic code in the electronic tag of the user device and a request connection inquiry, the reader-writer of the electronic tag of the first electronic device compares the electronic code in the electronic tag of the user device in the permission list after receiving the electronic code transmitted by the reader-writer on the electronic tag of the user device, and then verification is performed, and if verification is successful, the user device can judge that the electronic tag of the first electronic device can be read. When the electronic tag of the user equipment enters a sensing area of the electronic tag of the first unfamiliar electronic equipment, wherein the electronic tag of the first unfamiliar electronic equipment refers to the electronic tag of the first unfamiliar electronic equipment without adding the electronic code in the electronic tag of the user equipment, and the user equipment does not actively judge and inquire the electronic tag of the first unfamiliar electronic equipment, so that information of the electronic tag of the user equipment can be prevented from being stolen by the electronic tag of the first unfamiliar electronic equipment, and the safety of the user equipment for reading the electronic tag of the first electronic equipment is improved.
In one embodiment, when an electronic code in the electronic tag of the user equipment is added to the permission list of the electronic tag of the first electronic device, the reader of the electronic tag of the first electronic device transmits a radio frequency signal to the user equipment.
For example, when the user equipment is in the sensing area of the electronic tag of the first electronic device, and the electronic tag of the first electronic device completes the operation of adding the electronic code in the electronic tag of the user equipment to the permission list, the reader of the electronic tag of the first electronic device transmits a radio frequency signal to the electronic tag of the user equipment, where the radio frequency signal includes the security identification key.
In one embodiment, if the receiver on the electronic tag of the user equipment receives the secure identification key of the electronic tag of the first electronic device, the receiver may receive information that the electronic number in the electronic tag of the user equipment is in the permission list of the electronic tag of the first electronic device when entering the sensing area of the electronic tag of the first electronic device.
For example, the user equipment determines that the electronic tag of the first electronic device is secure, the user equipment adds the electronic number of the user equipment to an authorization list of the electronic tag of the first electronic device, the electronic tag of the first electronic device sends a secure identification key to the electronic tag of the user equipment, when the electronic tag of the user equipment enters an induction range of the electronic tag of the first electronic device, a receiver of the electronic tag of the user equipment can receive the electronic number, which is transmitted by the electronic tag of the first electronic device and stored in the electronic tag of the user equipment in the authorization list of the electronic tag of the first electronic device, and then the electronic tag of the user equipment can perform an inquiry operation on the electronic tag of the first electronic device; if the electronic tag of the user equipment does not have the security identification key issued by the electronic tag of the first electronic equipment, the electronic tag of the user equipment does not actively inquire the electronic tag of the first electronic equipment, and the user equipment acquires the security identification key through permission operation of both sides, so that the security of reading the electronic tag of the user equipment can be improved, the electronic tag of the unsafe first electronic equipment is prevented from illegally acquiring information in the electronic tag of the user equipment, and the security of connecting the user equipment to a wireless network is improved.
102. The user equipment reads preset wireless connection information from the electronic tag of the first electronic equipment, wherein the wireless connection information at least comprises the name of a first hotspot of the first electronic equipment and access verification information.
In one embodiment, the user equipment may employ radio frequency technology to read the wireless connection information preset by the electronic tag of the first electronic device.
For example, the user equipment adopts a radio frequency technology, the user equipment may transmit a radio frequency signal to an electronic tag of the first electronic equipment, and the user equipment may acquire the preset wireless connection information in the electronic tag of the first electronic equipment through the transmitted radio frequency signal, where the electronic tag of the user equipment and the electronic tag of the first electronic equipment may be used in a severe environment, such as a humid, high-temperature, or magnetic field-disturbed environment. The user equipment adopts the radio frequency technology, so that the user equipment can read the preset wireless connection information of the electronic tag of the first electronic equipment in a normal environment and can also read the preset wireless network information of the electronic tag of the first electronic equipment in a severe environment, and the application range of the user equipment is further expanded.
103. And the user equipment establishes wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
In one embodiment, when the user equipment performs the wireless network connection with the first hotspot, the method includes the following steps:
the user equipment actively searches the adaptive wireless network according to the name and the access verification information of the first hotspot, then the first hotspot uses an encryption algorithm to authenticate whether the name and the access verification information of the first hotspot sent by the user equipment are correct or not, if so, wireless network connection is established between the user equipment and the first hotspot, wherein the encryption algorithm is an algorithm mainly used for protecting the first hotspot.
In one embodiment, after the user equipment establishes the wireless network with the first hotspot, if the name and the password of the first hotspot are not changed, when the user equipment enters the coverage area of the first hotspot again, verification is not performed any more, so that the efficiency of wireless network connection of the user equipment is improved.
In an embodiment, the user equipment may generate an electronic tag of its own network hotspot information, the electronic tag of the user equipment may be an inductive electronic tag, the electronic tag of the electronic equipment that needs to be wirelessly connected establishes a wireless connection by being close to the electronic tag of the user equipment, and the electronic tag of the user equipment may switch the operating state of the user equipment and the energy saving state of the user equipment according to whether the electronic tag of the electronic equipment exists in the induction area.
For example, when the electronic tag of the user equipment senses that the electronic tag of the electronic equipment is in the sensing area, and the receiving head of the infrared unit of the electronic tag of the user equipment receives the infrared ray reflected by the electronic tag of the electronic equipment, the user equipment informs the controller of the electronic tag of the user equipment to instruct the sound unit of the electronic tag of the user equipment to emit sound prompt and instruct the light unit of the electronic tag of the user equipment to start flashing, meanwhile, the working switch of the electronic tag of the user equipment is indicated to be turned on, the electronic tag of the user equipment is adjusted from the energy-saving state to the working state, and the electronic tag of the user equipment increases the network hotspot signal strength of the user equipment to the maximum coverage of the network hotspot signal, the electronic tag of the electronic device can be always connected to the network hotspot signal of the user device within the maximum coverage range of the network hotspot signal of the user device.
In one embodiment, if the electronic device leaves the maximum coverage area of the network hotspot signal of the user equipment, the electronic tag of the user equipment starts a timing module, and within a specified time, if the electronic device does not return to the network hotspot area of the user equipment, a controller of the electronic tag of the user equipment controls a sound unit of the electronic tag to emit a sound prompt and instructs a light unit of the electronic tag to turn off light flashing, and simultaneously instructs a working switch of the electronic tag to turn off, the electronic tag of the user equipment is adjusted from a working state to an energy-saving state, and the network hotspot of the user equipment is turned off, the electronic tag of the user equipment can switch the working state and the energy-saving state according to whether the electronic device is in the coverage area of the wireless network, and the user equipment cannot detect the electronic tag of the electronic device within the specified time, the electronic tag of the user equipment performs energy-saving operation on the user equipment, so that the effective working time of the user equipment is prolonged.
Therefore, by implementing the wireless network connection method described in fig. 1, even when the screen of the user equipment is small, the user equipment can perform wireless network connection quickly, so that the steps of connecting the user equipment to the wireless network can be reduced, and the efficiency of wireless network connection of the user equipment can be improved.
In addition, by implementing the connection method of the wireless network described in fig. 1, the electronic tag of the strange electronic device may not be actively judged and queried, so that the information of the electronic tag of the user equipment may be prevented from being stolen by the electronic tag of the unsafe strange first electronic device, thereby improving the security of the user equipment reading the electronic tag of the first electronic device.
In addition, by implementing the method for connecting the wireless network described in fig. 1, the security read by the electronic tag of the user equipment is increased by obtaining the secure identification key through the two-party permission operation, so that the electronic tag of the unsecure first electronic equipment is prevented from illegally obtaining information in the electronic tag of the user equipment, and the security of the user equipment connecting to the wireless network is improved.
In addition, by implementing the wireless network connection method described in fig. 1, the radio frequency technology is adopted, so that the electronic tag of the user equipment can also recognize the preset wireless network information of the electronic tag of the first electronic equipment under the severe environment condition, thereby improving the application range of the electronic tag of the user equipment.
In addition, by implementing the wireless network connection method described in fig. 1, after establishing a network connection with the first hotspot, when entering the coverage area of the first hotspot again, the verification operation is not performed any more, thereby improving the efficiency of wireless network connection of the user equipment.
In addition, by implementing the wireless network connection method described in fig. 1, the operating state and the energy saving state may be switched according to whether the electronic device is in the range covered by the wireless network, and if the user equipment cannot detect the electronic tag of the electronic device within a specified time, the energy saving operation is performed, thereby increasing the effective operating time of the user equipment.
Example two
Referring to fig. 2, fig. 2 is a flowchart illustrating another wireless network connection method according to an embodiment of the present invention. As shown in fig. 2, the connection method of the wireless network may include the steps of:
201. the user equipment acquires the working frequency band of the user equipment.
202. The user equipment detects the working frequency band of the first electronic equipment.
In an embodiment, the mode of the user equipment in detecting the operating frequency band of the first electronic device may be:
the user equipment can set the transmission power value for detecting the working frequency band of the first electronic equipment before detection, the set transmission power value can only detect a specific working frequency band range, and the abnormal frequency band is avoided in the detection process, so that the efficiency of the user equipment for detecting the working frequency band of the first electronic equipment can be improved.
203. The user equipment compares whether the working frequency band of the user equipment is the same as the working frequency band of the first electronic equipment, if so, the step 204-step 206 are executed; if not, the flow is ended.
In an embodiment, if the operating frequency band of the user equipment includes the operating frequency band of the first electronic device, the user equipment may reserve the operating frequency band of the first electronic device, and the user equipment may adjust the operating frequency band of the user equipment to be the same as the operating frequency band of the first electronic device. This prevents the user equipment from missing the operating band of the first electronic device that can be interrogated.
204. The user equipment sends inquiry information to the first electronic equipment by using the working frequency band of the first electronic equipment, wherein the inquiry information is used for inquiring whether an electronic tag of the first electronic equipment can be read or not.
205. And the user equipment acquires response information returned by the first electronic equipment through the working frequency band of the first electronic equipment.
206. The user equipment judges whether the response information indicates that the electronic tag of the first electronic equipment can be read, if so, the steps 207 to 212 are executed; if not, the flow is ended.
By implementing the steps 201 to 206, the user equipment may determine whether the electronic tag of the first electronic device is in a readable state.
207. The user equipment reads preset wireless connection information from the electronic tag of the first electronic equipment, wherein the wireless connection information at least comprises the name of a first hotspot of the first electronic equipment and access verification information.
208. And the user equipment establishes wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
209. The user device establishes a wireless network connection between the user device and a second hotspot of a plurality of second electronic devices.
In one embodiment, the user equipment can generate the network hotspot information of the user equipment into an electronic tag, and the plurality of second electronic devices can scan the electronic tags of the user equipment to perform wireless network connection, so that the workload of actively adding the plurality of second electronic devices to the user equipment can be reduced, and the efficiency of wireless network connection is improved.
In one embodiment, the user equipment may generate an electronic tag with its own network hotspot information, the multiple second electronic devices may scan the electronic tag of the user equipment to perform wireless network connection, and if the multiple second electronic devices are within a specific range of the electronic tag of the user equipment, the wireless connection information in the electronic tag may be directly read without performing an inquiry operation.
For example, the ue sets that the electronic tag of the ue can be scanned by the second electronic devices within 10 cm, and the second electronic devices can directly read the wireless connection information in the electronic tag of the ue without performing an inquiry operation on the electronic tag of the ue, so as to improve the efficiency of wireless network connection of the second electronic devices on the premise of ensuring the security of the electronic tag of the ue.
210. The user equipment respectively sends the name of the first hotspot and the access verification information to each second electronic device through wireless network connection between the user equipment and the second hotspot of each second electronic device, so that each second electronic device establishes wireless network connection with the first hotspot according to the name of the first hotspot and the access verification information, and a loss-preventing network of the first electronic device is formed.
211. The user equipment acquires alarm messages respectively sent by a plurality of second electronic devices in the loss prevention network, wherein the alarm messages are sent to the user equipment when the second electronic devices respectively detect that the wireless network connection with the first hot spot of the first electronic device is disconnected.
212. The user equipment judges whether the user equipment acquires the alarm messages respectively sent by the plurality of second electronic equipment in the loss prevention network, if so, the step 213 is executed; if not, the flow is ended.
213. The user equipment determines whether the user equipment detects that the wireless network connection between the user equipment and the first hotspot is disconnected, if so, step 214 is executed; if not, the flow is ended.
214. And the user equipment controls the user equipment to send out alarm prompt information that the first electronic equipment is lost.
Therefore, by implementing the wireless network connection method described in fig. 2, even when the screen of the user equipment is small, the user equipment can perform wireless network connection quickly, so that the steps of connecting the user equipment to the wireless network can be reduced, and the efficiency of wireless network connection of the user equipment can be improved.
In addition, by implementing the wireless network connection method described in fig. 2, the transmission power value detected by the user equipment may be set in advance, so that the user equipment only detects a certain specific operating frequency range, thereby improving the efficiency of detecting the operating frequency range of the first electronic device.
In addition, by implementing the wireless network connection method described in fig. 2, the operating frequency band of the user equipment may be adjusted to be the same as the operating frequency band of the first electronic device, so that the user equipment may be prevented from missing the operating frequency band of the first electronic device that can perform an inquiry.
In addition, by implementing the wireless network connection method described in fig. 2, the network hotspot information of the user equipment itself can be generated into an electronic tag, so that the workload of actively adding a plurality of second electronic devices is reduced, and the wireless network connection efficiency of the user equipment is improved.
In addition, by implementing the method for connecting a wireless network described in fig. 2, a security range for scanning by the plurality of second electronic devices may be set, and the plurality of second electronic devices scanning within the scanned security range may quickly read the wireless connection information of the electronic tag of the user equipment, so that the efficiency of wireless network connection of the plurality of second electronic devices is improved on the premise of ensuring the security of the electronic tag of the user equipment.
EXAMPLE III
Referring to fig. 3, fig. 3 is a flowchart illustrating another wireless network connection method according to an embodiment of the present invention. As shown in fig. 3, the connection method of the wireless network may include the steps of:
301. the user equipment acquires the working frequency band of the user equipment.
302. The user equipment detects the working frequency band of the first electronic equipment.
303. The user equipment compares whether the working frequency band of the user equipment is the same as the working frequency band of the first electronic equipment, if so, the step 304-step 306 are executed; if not, the flow is ended.
304. The user equipment sends inquiry information to the first electronic equipment by using the working frequency band of the first electronic equipment, wherein the inquiry information is used for inquiring whether an electronic tag of the first electronic equipment can be read or not.
305. And the user equipment acquires response information returned by the first electronic equipment through the working frequency band of the first electronic equipment.
306. The ue determines whether the response message indicates that the electronic tag of the first electronic device can be read, if so, then step 307 to step 310 are executed, and if not, the process is ended.
307. The user equipment reads preset wireless connection information from the electronic tag of the first electronic equipment, wherein the wireless connection information at least comprises the name of a first hotspot of the first electronic equipment and access verification information.
In one embodiment, the user equipment can read the preset wireless connection information in the electronic tag of the first electronic device by touching the first electronic device without performing a tedious step of inputting the connection information, thereby improving the efficiency of reading the preset wireless connection information of the electronic tag of the first electronic device by the user equipment.
308. And the user equipment establishes wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
309. And the user equipment stores the name and the access verification information of the first hotspot in a hardware encryption chip of the user equipment.
In an embodiment, after the user equipment stores the name of the first hotspot and the access verification information in a hardware encryption chip of the user equipment, the user equipment may also perform encryption interference processing on the names of other electronic devices accessing the first hotspot and the access verification information, and the user equipment may protect the names of the other electronic devices connected to the first hotspot in the first hotspot connected to the user equipment and the access verification information, thereby improving the security of the first hotspot connected to the user equipment.
310. The user equipment monitors whether unauthorized external equipment accesses the data of the hardware encryption chip, if so, the steps 310 to 315 are executed; if not, the flow is ended.
In an embodiment, the user device may further monitor whether an unauthorized external device connected to the first hotspot accesses names and access authentication messages of other electronic devices, and if so, execute step 311, where the user device may protect not only its own security but also the security of other electronic devices.
311. The user equipment controls the user equipment to send out the alarm prompt information of illegal access.
312. The user device establishes a wireless network connection between the user device and a second hotspot of a plurality of second electronic devices.
313. The user equipment respectively sends the name of the first hotspot and the access verification information to each second electronic device through wireless network connection between the user equipment and the second hotspot of each second electronic device, so that each second electronic device establishes wireless network connection with the first hotspot according to the name of the first hotspot and the access verification information, and a loss-preventing network of the first electronic device is formed.
314. The user equipment acquires alarm messages respectively sent by the plurality of second electronic devices in the loss prevention network, wherein the alarm messages are sent to the user equipment when the plurality of second electronic devices respectively detect that the wireless network connection with the first hot spot of the first electronic device is disconnected.
315. The user equipment judges whether the user equipment acquires alarm messages respectively sent by the plurality of second electronic equipment in the loss prevention network, if so, step 316 is executed; if not, the flow is ended.
316. The user equipment judges whether the user equipment detects that the wireless network connection between the user equipment and the first hotspot is disconnected, if so, the step 317 is executed; if not, the flow is ended.
317. And the user equipment controls the user equipment to send out alarm prompt information that the first electronic equipment is lost.
Therefore, by implementing the wireless network connection method described in fig. 3, even when the screen of the user equipment is small, the user equipment can perform wireless network connection quickly, so that the steps of connecting the user equipment to the wireless network can be reduced, and the efficiency of wireless network connection of the user equipment can be improved.
In addition, by implementing the wireless network connection method described in fig. 3, the user equipment can perform the operation of connecting the wireless network of the electronic tag of the first electronic device only by touching the electronic tag of the first electronic device, without performing a cumbersome step of inputting connection information, thereby improving the efficiency of reading the preset wireless connection information of the electronic tag of the first electronic device by the user equipment.
In addition, by implementing the connection method of the wireless network described in fig. 3, names and access verification information of other electronic devices connected to the first hotspot in the first hotspot connected to the user equipment can be protected, so that the security of the first hotspot connected to the user equipment is improved.
In addition, the implementation of the connection method of the wireless network described in fig. 3 can protect not only the security of the user equipment itself, but also the security of other electronic devices.
Example four
Referring to fig. 4, fig. 4 is a schematic structural diagram of a user equipment according to an embodiment of the present invention. As shown in fig. 4, the user equipment may include:
a determining unit 401, configured to determine whether an electronic tag of the first electronic device is in a readable state.
A reading unit 402, configured to read preset wireless connection information from the electronic tag of the first electronic device when the determining unit 401 determines that the electronic tag of the first electronic device is in a readable state, where the wireless connection information at least includes a name of a first hotspot of the first electronic device and access verification information.
A first establishing unit 403, configured to establish a wireless network connection between the user equipment and the first hotspot according to the name and the access verification information of the first hotspot read by the reading unit 402.
In one embodiment, the determining unit 401 may determine whether the electronic tag of the first electronic device is in a readable state only when the electronic code in the electronic tag of the user equipment is added to the permission list of the electronic tag of the first electronic device, wherein the electronic code in the electronic tag of the user equipment is the unique electronic code.
For example, if the electronic tag of the user equipment is in the sensing area of the electronic tag of the first electronic equipment, and if the electronic tag of the first electronic equipment does not add the electronic code in the electronic tag of the user equipment to the permission list, the determining unit 401 does not perform the determining operation on the electronic tag of the first electronic equipment; if the electronic tag of the first electronic device adds the electronic code in the electronic tag of the user device to the permission list, the reader-writer on the electronic tag of the user device transmits a radio frequency signal to the reader-writer of the electronic tag of the first electronic device, where the radio frequency signal includes the electronic code in the electronic tag of the user device and a request for connection inquiry, and after receiving the electronic code sent by the reader-writer on the electronic tag of the user device, the reader-writer of the electronic tag of the first electronic device compares the electronic code in the electronic tag of the user device in the permission list and verifies the electronic code, and if the verification is successful, the determining unit 401 may determine that the electronic tag of the first electronic device can be read. When the electronic tag of the user equipment enters a sensing area of an electronic tag of a strange first electronic device, wherein the electronic tag of the strange first electronic device refers to the electronic tag of the first electronic device to which the electronic code in the electronic tag of the user equipment is not added, the judgment unit 401 does not actively judge and inquire the electronic tag of the strange first electronic device, so that information of the electronic tag of the user equipment can be prevented from being stolen by the electronic tag of the strange first electronic device, and the safety of the user equipment for reading the electronic tag of the first electronic device is improved.
In one embodiment, when an electronic code in the electronic tag of the user equipment is added to the permission list of the electronic tag of the first electronic device, the reader of the electronic tag of the first electronic device transmits a radio frequency signal to the user equipment.
For example, when the user equipment is in the sensing area of the electronic tag of the first electronic device, and the electronic tag of the first electronic device completes the operation of adding the electronic code in the electronic tag of the user equipment to the permission list, the reader of the electronic tag of the first electronic device transmits a radio frequency signal to the electronic tag of the user equipment, where the radio frequency signal includes the security identification key.
In one embodiment, if the receiver on the electronic tag of the user equipment receives the secure identification key of the electronic tag of the first electronic device, the receiver may receive information that the electronic number in the electronic tag of the user equipment is in the permission list of the electronic tag of the first electronic device when entering the sensing area of the electronic tag of the first electronic device.
For example, the determining unit 401 determines that the electronic tag of the first electronic device is secure, the user equipment adds the electronic number of the user equipment to the permission list of the electronic tag of the first electronic device, the electronic tag of the first electronic device sends a secure identification key to the electronic tag of the user equipment, when the electronic tag of the user equipment enters the sensing range of the electronic tag of the first electronic device, the receiver of the electronic tag of the user equipment may receive information that the electronic number in the electronic tag of the user equipment is in the permission list of the electronic tag of the first electronic device, and then the electronic tag of the user equipment may perform an inquiry operation on the electronic tag of the first electronic device; if the electronic tag of the user equipment does not have the security identification key issued by the electronic tag of the first electronic equipment, the electronic tag of the user equipment does not actively inquire the electronic tag of the first electronic equipment, and the user equipment acquires the security identification key through permission operation of both sides, so that the security of reading the electronic tag of the user equipment can be improved, the electronic tag of the unsafe first electronic equipment is prevented from illegally acquiring information in the electronic tag of the user equipment, and the security of connecting the user equipment to a wireless network is improved.
In one embodiment, the reading unit 402 may use radio frequency technology to read the wireless connection information preset by the electronic tag of the first electronic device through radio frequency.
For example, the reading unit 402 employs a radio frequency technology, the reading unit 402 may transmit a radio frequency signal to an electronic tag of the first electronic device, and the reading unit 402 may obtain preset wireless connection information in the electronic tag of the first electronic device through the transmitted radio frequency signal, where the reading unit 402 and the electronic tag of the first electronic device may be used in a harsh environment, such as a humid, high-temperature environment, or an environment with magnetic field interference. The reading unit 402 adopts a radio frequency technology, so that the user equipment can read the preset wireless connection information of the electronic tag of the first electronic device not only in a normal environment, but also in a severe environment, thereby improving the application range of the user equipment.
In an embodiment, when the first establishing unit 403 performs the wireless network connection with the first hotspot, the following steps are required to be included:
the first establishing unit 403 actively searches for an adapted wireless network according to the name and the access verification information of the first hotspot, and then the first hotspot uses an encryption algorithm to authenticate whether the name and the access verification information of the first hotspot sent by the user equipment are correct, if so, the first establishing unit 403 establishes a wireless network connection with the first hotspot, wherein the encryption algorithm is an algorithm mainly used for protecting the first hotspot.
In an embodiment, after the first establishing unit 403 establishes the wireless network with the first hotspot, if the name and the password of the first hotspot are not changed, when the first establishing unit 403 enters the coverage of the first hotspot again, the authentication is not performed, so that the efficiency of wireless network connection of the user equipment is improved.
In an embodiment, the first establishing unit 403 may generate an electronic tag from the network hotspot information of itself, the electronic tag of the first establishing unit 403 may be an induction type electronic tag, the electronic tag of the electronic device that needs to perform wireless connection establishes wireless connection through the electronic tag close to the first establishing unit 403, and the electronic tag of the first establishing unit 403 may switch the working state of the first establishing unit 403 and the energy saving state of the first establishing unit 403 according to whether there is an electronic tag of the electronic device in the induction area.
For example, when the electronic tag of the first establishing unit 403 senses that the electronic tag of the electronic device is in the sensing area, and the receiving head of the infrared unit of the electronic tag of the first establishing unit 403 receives the infrared ray reflected by the electronic tag of the electronic device, the first establishing unit 403 notifies the controller of the electronic tag of the first establishing unit 403 to instruct the sound unit of the electronic tag of the first establishing unit 403 to emit a sound prompt and instruct the light unit of the electronic tag of the first establishing unit 403 to start flashing, and at the same time, instructs the operating switch of the electronic tag of the first establishing unit 403 to be turned on, the electronic tag of the first establishing unit 403 is adjusted from the energy saving state to the operating state, and the electronic tag of the first establishing unit 403 increases the intensity of the network hotspot signal of the first establishing unit 403 to the maximum coverable range of the network hotspot signal, the electronic tag of the electronic device may be always connected to the network hotspot signal of the first establishing unit 403 within the maximum coverage range of the network hotspot signal of the first establishing unit 403, so that the electronic device may use the network hotspot signal in a large range after connecting to the network hotspot signal of the first establishing unit 403 according to the electronic tag of the electronic device.
In an embodiment, if the electronic device leaves the maximum coverage area of the network hotspot signal of the first establishing unit 403, the electronic tag of the first establishing unit 403 starts a timing module, and if the electronic device does not return to the network hotspot range of the first establishing unit 403 within a specified time, the controller of the electronic tag of the first establishing unit 403 controls the sound unit of the electronic tag to emit a sound prompt and instructs the light unit of the electronic tag to turn off the light flashing, and instructs the operating switch of the electronic tag to turn off, the electronic tag of the first establishing unit 403 is adjusted from the operating state to the energy saving state, and the network hotspot of the first establishing unit 403 is turned off, the electronic tag of the first establishing unit 403 may switch between the operating state and the energy saving state according to whether the electronic device is in the coverage area of the wireless network, the electronic tag of the electronic device cannot be detected by the first establishing unit 403 within the specified time, the electronic tag of the first establishing unit 403 performs power saving operation on the first establishing unit 403, so that the effective working time of the first establishing unit 403 is increased.
It can be seen that, with the user equipment described in fig. 4, even when the screen of the user equipment is small, the wireless network connection can be performed quickly, so that the steps of connecting the user equipment to the wireless network can be reduced, and the efficiency of the wireless network connection of the user equipment can be improved.
In addition, the user equipment described in fig. 4 may not actively determine and query the electronic tag of the strange electronic equipment, so that the information of the electronic tag of the user equipment may be prevented from being stolen by the electronic tag of the unsafe strange first electronic equipment, thereby improving the security of the user equipment in reading the electronic tag of the first electronic equipment.
In addition, with the user equipment described in fig. 4, the security of reading the electronic tag of the user equipment is increased by obtaining the secure identification key through the two-party authorized operation, so that the electronic tag of the unsecure first electronic equipment is prevented from illegally obtaining information in the electronic tag of the user equipment, and the security of the user equipment connecting to the wireless network is improved.
In addition, the user equipment described in fig. 4 is implemented, and the radio frequency technology is adopted, so that the electronic tag of the user equipment can also recognize the preset wireless network information of the electronic tag of the first electronic equipment under the severe environment condition, thereby improving the application range of the electronic tag of the user equipment.
In addition, with the user equipment described in fig. 4, after the network connection is established with the first hotspot, when the user equipment enters the coverage area of the first hotspot again, the user equipment does not perform the verification operation any more, so that the efficiency of the wireless network connection of the user equipment is improved.
In addition, the user equipment described in fig. 4 may switch the operating state and the energy saving state according to whether the electronic equipment is in the coverage area of the wireless network, and if the user equipment cannot detect the electronic tag of the electronic equipment within a specified time, the user equipment performs an energy saving operation, thereby increasing the effective operating time of the user equipment.
EXAMPLE five
Referring to fig. 5, fig. 5 is a schematic structural diagram of another ue according to an embodiment of the present invention. The user equipment shown in fig. 5 is optimized by the user equipment shown in fig. 4. Compared with the user equipment shown in fig. 4, the user equipment shown in fig. 5 may further include:
a second establishing unit 404, configured to establish a wireless network connection between the user equipment and a second hotspot of the multiple second electronic devices after the first establishing unit 403 establishes a wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
An interaction unit 405, configured to send the name of the first hotspot and the access verification information to each second electronic device through the wireless network connection between the user equipment and the second hotspot of each second electronic device established by the second establishing unit 404, so that each second electronic device establishes a wireless network connection with the first hotspot according to the name of the first hotspot and the access verification information, respectively, thereby forming a loss prevention network of the first electronic device.
A detecting unit 406, configured to detect, after the interacting unit 405 obtains the alarm messages respectively sent by the multiple second electronic devices in the loss network, whether the wireless network connection between the user equipment and the first hotspot is disconnected.
A second control unit 407, configured to control the user equipment to send an alarm notification message that the first electronic device is lost when the interaction unit 405 acquires alarm messages respectively sent by the multiple second electronic devices in the loss prevention network, and when the detection unit 406 detects that the wireless network connection between the user equipment and the first hotspot is disconnected.
As an alternative implementation, the determining unit 401 shown in fig. 5 may include:
the first obtaining sub-unit 4011 is configured to obtain an operating frequency band of the user equipment.
The detecting sub-unit 4012 is configured to detect an operating frequency band of the first electronic device.
A comparing sub-unit 4013, configured to compare whether the operating frequency band of the user equipment acquired by the first acquiring sub-unit 4011 is the same as the operating frequency band of the first electronic equipment detected by the detecting sub-unit 4012.
An inquiring sub-unit 4014, configured to, when the operating frequency band of the user equipment acquired by the first acquiring sub-unit 4011 is the same as the operating frequency band of the first electronic equipment detected by the detecting sub-unit 4012, send inquiry information to the first electronic equipment by using the operating frequency band of the first electronic equipment, where the inquiry information is used to inquire whether an electronic tag of the first electronic equipment can be read.
The second obtaining sub-unit 4015 is configured to obtain response information returned by the first electronic device through the operating frequency band of the first electronic device.
A determining sub-unit 4016, configured to determine that the electronic tag of the first electronic device is in a readable state when the response information acquired by the second acquiring sub-unit 4015 indicates that the electronic tag of the first electronic device can be read.
In an embodiment, the manner of detecting the operating frequency band of the first electronic device by the detecting sub-unit 4012 may be:
the detecting sub-unit 4012 may set a transmission power value for detecting the working frequency band of the first electronic device before detection, where the set transmission power value can only detect a specific working frequency band range, and avoid an abnormal frequency band in the detection process, so that the efficiency of the detecting sub-unit 4012 for detecting the working frequency band of the first electronic device can be improved.
In an embodiment, if the operating frequency band of the user equipment includes the operating frequency band of the first electronic equipment, the comparing sub-unit 4013 may reserve the operating frequency band of the first electronic equipment, and the comparing sub-unit 4013 may adjust the operating frequency band of the user equipment to be the same as the operating frequency band of the first electronic equipment. This prevents the user equipment from missing the operating band of the first electronic device that can be interrogated.
In an embodiment, the second establishing unit 404 may generate the network hotspot information of itself into an electronic tag, and a plurality of second electronic devices may scan the electronic tag of the second establishing unit 404 to perform wireless network connection, so that the workload of the second establishing unit 404 actively adding a plurality of second electronic devices may be reduced, thereby improving the efficiency of wireless network connection.
In an embodiment, the second establishing unit 404 may generate an electronic tag with its own network hotspot information, and the plurality of second electronic devices may scan the electronic tag of the second establishing unit 404 to perform wireless network connection, and if the plurality of second electronic devices are within a specific range of the electronic tag of the second establishing unit 404, the plurality of second electronic devices may directly read the wireless connection information in the electronic tag, without performing an inquiry operation.
For example, the second establishing unit 404 sets that the electronic tag of the second establishing unit 404 can be scanned by a plurality of second electronic devices within 10 centimeters, and the plurality of second electronic devices may not perform an inquiry operation on the electronic tag of the second establishing unit 404, and directly read the wireless connection information in the electronic tag of the second establishing unit 404, so as to improve the efficiency of wireless network connection of the plurality of second electronic devices on the premise of ensuring the security of the electronic tag of the second establishing unit 404.
It can be seen that, with the user equipment described in fig. 5, even when the screen of the user equipment is small, the user equipment can perform wireless network connection quickly, so that the steps of connecting the user equipment to a wireless network can be reduced, and the efficiency of wireless network connection of the user equipment can be improved.
In addition, the ue described in fig. 5 may set the transmission power value detected by the ue in advance, so that the ue only detects a specific operating frequency range, thereby improving the efficiency of detecting the operating frequency range of the first electronic device.
In addition, implementing the user equipment described in fig. 5, the operating frequency band of the user equipment may be adjusted to be the same as the operating frequency band of the first electronic device, so that the operating frequency band of the first electronic device that can perform the inquiry may be prevented from being missed.
In addition, by implementing the user equipment described in fig. 5, the network hotspot information of the user equipment itself can be generated into an electronic tag, so that the workload of actively adding a plurality of second electronic devices is reduced, and the efficiency of wireless network connection of the user equipment is improved.
In addition, the user equipment described in fig. 5 may set a security range for scanning by the plurality of second electronic devices, and the plurality of second electronic devices scanning within the security range may quickly read the wireless connection information of the electronic tag of the user equipment, so as to improve the efficiency of wireless network connection of the plurality of second electronic devices on the premise of ensuring the security of the electronic tag of the user equipment.
EXAMPLE six
Referring to fig. 6, fig. 6 is a schematic structural diagram of another ue according to an embodiment of the present invention. The user equipment shown in fig. 6 is optimized by the user equipment shown in fig. 5. Compared with the user equipment shown in fig. 5, the user equipment shown in fig. 6 may further include:
a storing unit 408, configured to store the name of the first hotspot and the access verification information in a hardware encryption chip of the user equipment after the first establishing unit 403 establishes a wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
And a monitoring unit 409, configured to monitor whether an unauthorized external device accesses data of the hardware cryptographic chip.
The first control unit 410 is configured to control the user equipment to send an alarm prompt message indicating that there is an illegal access when the monitoring unit 409 monitors that there is data of an unauthorized external device accessing the hardware encryption chip.
In an embodiment, after the storage unit 408 stores the name and the access verification information of the first hotspot in the hardware encryption chip of the storage unit 408, the storage unit 408 may also perform encryption interference processing on the names and the access verification information of other electronic devices accessing the first hotspot, and the storage unit 408 may protect the names and the access verification information of other electronic devices connected to the first hotspot in the first hotspot connected to the user device, thereby improving the security of the first hotspot connected to the user device.
In one embodiment, the monitoring unit 409 may also monitor whether an unauthorized external device connected to the first hotspot accesses the name and access authentication message of other electronic devices, and the monitoring unit 409 may protect not only the security of itself but also the security of other electronic devices.
It can be seen that, with the user equipment described in fig. 6, even when the screen of the user equipment is small, the user equipment can perform wireless network connection quickly, so that the steps of connecting the user equipment to a wireless network can be reduced, and the efficiency of wireless network connection of the user equipment can be improved.
In addition, by implementing the user equipment described in fig. 6, names and access authentication information of other electronic devices connected to the first hotspot in the first hotspot connected to the user equipment may be protected, so that security of the first hotspot connected to the user equipment is improved.
In addition, the user equipment described in fig. 6 may be implemented to protect not only the security of the user equipment itself, but also the security of other electronic devices.
EXAMPLE seven
Referring to fig. 7, fig. 7 is a schematic structural diagram of another ue according to an embodiment of the present invention. As shown in fig. 7, the user equipment may include:
a memory 701 in which executable program code is stored;
a processor 702 coupled to the memory 701;
the processor 702 calls the executable program code stored in the memory 701 to execute some or all of the steps of the connection method of any one of the wireless networks in fig. 1 to 3.
An embodiment of the present invention discloses a computer-readable storage medium storing a computer program, wherein the computer program enables a computer to execute a part or all of the steps of a connection method of a wireless network in any one of fig. 1 to 3.
The embodiment of the invention also discloses a computer program product, wherein when the computer program product runs on a computer, the computer is caused to execute part or all of the steps of the connection method of the wireless network in any one of the above method embodiments.
It will be understood by those skilled in the art that all or part of the steps in the methods of the embodiments described above may be implemented by instructions associated with hardware, which may be stored in a computer-readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a Programmable Read-Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), a One-time Programmable Read-Only Memory (OTPROM), an Electrically Erasable rewritable Read-Only Memory (EEPROM), a compact disc-Read-Only Memory (CD-ROM), or other Memory, a magnetic disk, a magnetic tape, or a magnetic tape, Or any other medium which can be used to carry or store data and which can be read by a computer.
The foregoing describes in detail a method for connecting a wireless network and a user equipment disclosed in the embodiments of the present invention, and a specific example is applied in the present disclosure to explain the principle and the embodiments of the present invention, and the description of the foregoing embodiments is only used to help understanding the method and the core idea of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method for connecting to a wireless network, comprising:
judging whether an electronic tag of first electronic equipment is in a readable state;
if yes, reading preset wireless connection information from an electronic tag of the first electronic device, wherein the wireless connection information at least comprises a name of a first hotspot of the first electronic device and access verification information;
and establishing wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information.
2. The connection method according to claim 1, wherein the determining whether the electronic tag of the first electronic device is in a readable state comprises:
acquiring a working frequency band of user equipment;
detecting the working frequency band of the first electronic equipment;
comparing whether the working frequency band of the user equipment is the same as the working frequency band of the first electronic equipment;
if the electronic tags are the same, sending inquiry information to the first electronic device by using the working frequency band of the first electronic device, wherein the inquiry information is used for inquiring whether the electronic tags of the first electronic device can be read or not;
and acquiring response information returned by the first electronic device through the working frequency band of the first electronic device, and if the response information is used for indicating that the electronic tag of the first electronic device can be read, determining that the electronic tag of the first electronic device is in a readable state.
3. The method according to claim 2, wherein after establishing the wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access authentication information, the method further comprises:
storing the name and the access verification information of the first hotspot in a hardware encryption chip of the user equipment;
monitoring whether an unauthorized external device accesses the data of the hardware encryption chip;
and if so, controlling the user equipment to send out an alarm prompt message for illegal access.
4. The connection method according to claim 2 or 3, wherein after the establishing of the wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access authentication information, the method further comprises:
establishing wireless network connection between the user equipment and a second hotspot of a plurality of second electronic devices;
respectively sending the name and the access verification information of the first hotspot to each second electronic device through wireless network connection between the user equipment and the second hotspot of each second electronic device, so that each second electronic device establishes wireless network connection with the first hotspot according to the name and the access verification information of the first hotspot, and a loss prevention network of the first electronic device is formed;
acquiring alarm messages respectively sent by the plurality of second electronic devices in the loss prevention network, wherein the alarm messages are sent to the user equipment when the plurality of second electronic devices respectively detect that the wireless network connection with the first hot spot of the first electronic device is disconnected;
and controlling the user equipment to send out alarm prompt information that the first electronic equipment is lost.
5. The connection method according to claim 4, wherein after obtaining the alarm messages respectively sent by the plurality of second electronic devices in the loss control network and before controlling the user equipment to send out the alarm prompt message indicating that the first electronic device is lost, the method further comprises:
and detecting whether the wireless network connection between the user equipment and the first hotspot is also disconnected, and if so, controlling the user equipment to send out alarm prompt information that the first electronic equipment is lost.
6. A user device, comprising:
the judging unit is used for judging whether the electronic tag of the first electronic equipment is in a readable state;
a reading unit, configured to read preset wireless connection information from the electronic tag of the first electronic device when the determining unit determines that the electronic tag of the first electronic device is in a readable state, where the wireless connection information at least includes a name of a first hotspot of the first electronic device and access verification information;
and the first establishing unit is used for establishing wireless network connection between the user equipment and the first hotspot according to the name and the access verification information of the first hotspot read by the reading unit.
7. The UE of claim 6, wherein the determining unit comprises:
the first acquiring subunit is used for acquiring the working frequency band of the user equipment;
the detection subunit is used for detecting the working frequency band of the first electronic equipment;
a comparison subunit, configured to compare whether the working frequency band of the user equipment acquired by the first acquisition subunit is the same as the working frequency band of the first electronic equipment detected by the detection subunit;
an inquiry subunit, configured to send inquiry information to the first electronic device by using the operating frequency band of the first electronic device when the operating frequency band of the user equipment acquired by the first acquisition subunit is the same as the operating frequency band of the first electronic device detected by the detection subunit, where the inquiry information is used to inquire whether an electronic tag of the first electronic device can be read;
the second acquiring subunit is configured to acquire response information returned by the first electronic device through the working frequency band of the first electronic device;
a determining subunit, configured to determine that the electronic tag of the first electronic device is in a readable state when the response information acquired by the second acquiring subunit indicates that the electronic tag of the first electronic device can be read.
8. The UE of claim 7, further comprising:
a storage unit, configured to store the name of the first hotspot and the access verification information in a hardware encryption chip of the user equipment after the first establishing unit establishes a wireless network connection between the user equipment and the first hotspot according to the name of the first hotspot and the access verification information;
the monitoring unit is used for monitoring whether unauthorized external equipment accesses the data of the hardware encryption chip;
and the first control unit is used for controlling the user equipment to send out the alarm prompt information of illegal access when the monitoring unit monitors that the unauthorized external equipment accesses the data of the hardware encryption chip.
9. The user equipment according to claim 7 or 8, wherein the user equipment further comprises:
the second establishing unit is used for establishing wireless network connection between the user equipment and a second hotspot of the plurality of second electronic equipment after the first establishing unit establishes the wireless network connection between the user equipment and the first hotspot according to the name and the access verification information of the first hotspot;
an interaction unit, configured to send, through the wireless network connection between the user equipment and the second hotspot of each second electronic device established by the second establishing unit, a name and access verification information of the first hotspot to each second electronic device, so that each second electronic device establishes a wireless network connection with the first hotspot according to the name and access verification information of the first hotspot, respectively, thereby forming an anti-loss network of the first electronic device;
the interaction unit is further configured to acquire an alarm message sent by each of the plurality of second electronic devices in the loss prevention network, where the alarm message is sent to the user equipment when each of the plurality of second electronic devices detects that the wireless network connection with the first hotspot of the first electronic device is disconnected;
and the second control unit is used for controlling the user equipment to send out alarm prompt information that the first electronic equipment is lost when the interaction unit obtains the alarm messages respectively sent by the plurality of second electronic equipment in the loss prevention network.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program, wherein the computer program causes a computer to execute the connection method of a wireless network according to any one of claims 1 to 5.
CN201910659971.XA 2019-07-19 2019-07-19 Wireless network connection method and user equipment Pending CN111148080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910659971.XA CN111148080A (en) 2019-07-19 2019-07-19 Wireless network connection method and user equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910659971.XA CN111148080A (en) 2019-07-19 2019-07-19 Wireless network connection method and user equipment

Publications (1)

Publication Number Publication Date
CN111148080A true CN111148080A (en) 2020-05-12

Family

ID=70516779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910659971.XA Pending CN111148080A (en) 2019-07-19 2019-07-19 Wireless network connection method and user equipment

Country Status (1)

Country Link
CN (1) CN111148080A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818667A (en) * 2020-09-10 2020-10-23 深圳传音控股股份有限公司 Device connection method, device and readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385684A (en) * 2016-09-08 2017-02-08 三星电子(中国)研发中心 Method and device for sharing wireless network and accessing wireless network
CN106507279A (en) * 2016-10-31 2017-03-15 努比亚技术有限公司 Hotspot attachment means and method
CN107454557A (en) * 2017-07-28 2017-12-08 上海斐讯数据通信技术有限公司 A kind of router connection method and system
CN108573182A (en) * 2018-04-26 2018-09-25 深圳市盛路物联通讯技术有限公司 A kind of radio frequency signal communication method and system
WO2019128906A1 (en) * 2017-12-29 2019-07-04 阿里巴巴集团控股有限公司 Method, apparatus, and system for accessing network hotspot device by device to be distributed a network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385684A (en) * 2016-09-08 2017-02-08 三星电子(中国)研发中心 Method and device for sharing wireless network and accessing wireless network
CN106507279A (en) * 2016-10-31 2017-03-15 努比亚技术有限公司 Hotspot attachment means and method
CN107454557A (en) * 2017-07-28 2017-12-08 上海斐讯数据通信技术有限公司 A kind of router connection method and system
WO2019128906A1 (en) * 2017-12-29 2019-07-04 阿里巴巴集团控股有限公司 Method, apparatus, and system for accessing network hotspot device by device to be distributed a network
CN108573182A (en) * 2018-04-26 2018-09-25 深圳市盛路物联通讯技术有限公司 A kind of radio frequency signal communication method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818667A (en) * 2020-09-10 2020-10-23 深圳传音控股股份有限公司 Device connection method, device and readable storage medium
CN111818667B (en) * 2020-09-10 2020-12-29 深圳传音控股股份有限公司 Device connection method, device and readable storage medium

Similar Documents

Publication Publication Date Title
KR101833965B1 (en) Distributing biometric authentication between devices in an ad hoc network
KR101564000B1 (en) Terminal for Securing Cloud Environments and Method thereof
CN101315710B (en) Mobile based identification in security and asset management systems
US7496948B1 (en) Method for controlling access to a target application
US10638323B2 (en) Wireless communication device, wireless communication method, and computer readable storage medium
KR102424142B1 (en) Method and apparatus for certificating information related payment in a mobile communication system
CN107545631B (en) Entrance guard unlocking method and device and entrance guard unlocking implementation device
CN103227988A (en) Intelligent IoT (Internet of things) and control method thereof
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN109618344A (en) A kind of secure connection method and device of wireless monitoring equipment
JP2003288328A (en) Security device for portable information apparatus and method therefor
CN103874067A (en) Authentication and Data Security for Wireless Networks
CN111148080A (en) Wireless network connection method and user equipment
CN105338527B (en) Internet of Things module network connection configuration method and system
KR20150041407A (en) Trust Access Point connection Apparatus and Method
CN113841185A (en) System and method for a doorbell device to initiate a state change of an access control device and/or control panel in response to two-factor authentication
CN107454557B (en) Router connection method and system
EP3291505B1 (en) Multi-level security mechanism for accessing a panel
KR102390887B1 (en) Method and apparatus for registering wireless device in wireless communication system
US20130007843A1 (en) Method, Program Product, and System of Network Connection in a Wireless Local Area Network
CN105472616B (en) Wireless access point connection method and electronic equipment
JP4853870B2 (en) Repeater, wireless communication terminal, communication system, communication method and program
CN106559850B (en) Network access switching method and device
KR101487349B1 (en) Terminal Authentication Method in Wireless Access Point and Wireless LAN System using the same
WO2016165165A1 (en) Device access processing method, device access processing apparatus and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination