CN108471635B - Method and apparatus for connecting wireless access points - Google Patents
Method and apparatus for connecting wireless access points Download PDFInfo
- Publication number
- CN108471635B CN108471635B CN201810539541.XA CN201810539541A CN108471635B CN 108471635 B CN108471635 B CN 108471635B CN 201810539541 A CN201810539541 A CN 201810539541A CN 108471635 B CN108471635 B CN 108471635B
- Authority
- CN
- China
- Prior art keywords
- wireless access
- access point
- preset
- mobile phone
- phone number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the application discloses a method and equipment for connecting a wireless access point. One embodiment of the method comprises: detecting whether the wireless access point connection type application is in a login state currently or not in response to receiving a connection request for connecting a target wireless access point displayed by the wireless access point connection type application; executing preset login operation in response to the fact that the wireless access point connection type application is detected not to be in a login state currently; in response to the login operation being successfully performed, performing the following connection operations: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point. The embodiment realizes the login of the wireless access point connection class application before connecting the target wireless access point.
Description
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a method and equipment for connecting wireless access points.
Background
With the continuous development of WIreless communication technology, a WIreless-Fidelity (WI-FI) network has become an important way for users to access the network on a daily basis, and brings great convenience to the users. For example, in some public areas, free open wireless access points are configured, and a user can connect the free open wireless access points without inputting a password; private wireless access points are often configured in a home and are usually provided with passwords, when a user connects the private wireless access points, the user needs to input the passwords, and the private wireless access points can be connected after the authentication is successful.
In order to facilitate the user to quickly connect to the wireless access point, the wireless access point connection application is started. A related art wireless access point connection-class application typically directly performs a corresponding connection operation in response to receiving a connection request for connecting to a wireless access point.
Disclosure of Invention
The embodiment of the application provides a method and equipment for connecting a wireless access point.
In a first aspect, an embodiment of the present application provides a method for connecting a wireless access point, where the method includes: detecting whether the wireless access point connection type application is in a login state currently or not in response to receiving a connection request for connecting a target wireless access point displayed by the wireless access point connection type application; executing preset login operation in response to the fact that the wireless access point connection type application is detected not to be in a login state currently; in response to the login operation being successfully performed, performing the following connection operations: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point.
In some embodiments, performing a preset login operation includes: sending a mobile phone number acquisition request to a preset third-party application so that the preset third-party application returns the mobile phone number of a user to which the wireless access point connection type application belongs; and in response to the received mobile phone number returned by the preset third-party application, logging in the wireless access point connection application by using the mobile phone number.
In some embodiments, the performing the preset login operation further includes: responding to the situation that a mobile phone number returned by a preset third-party application is not received, and displaying second prompt information for indicating the input of the mobile phone number; in response to receiving the mobile phone number input aiming at the second prompt message, triggering a verification code sending operation to send a verification code to the mobile phone number, and displaying third prompt message used for indicating the verification code received by the mobile phone number; and responding to the received verification code input aiming at the third prompt message, determining whether the verification code meets a second preset condition, and if so, logging in the wireless access point connection application by using the mobile phone number.
In some embodiments, the performing the preset login operation further includes: displaying second prompt information for indicating the input of the mobile phone number; in response to receiving the mobile phone number input aiming at the second prompt message, triggering a verification code sending operation to send a verification code to the mobile phone number, and displaying third prompt message used for indicating the verification code received by the mobile phone number; and responding to the received verification code input aiming at the third prompt message, determining whether the verification code meets a second preset condition, and if so, logging in the wireless access point connection application by using the mobile phone number.
In some embodiments, before performing the preset login operation, the method further includes: displaying first prompt information for prompting to log in the wireless access point connection application; and executing the preset login operation comprises the following steps: and executing preset login operation corresponding to the confirmation operation in response to the detection of the confirmation operation on the first prompt message.
In some embodiments, the first prompt message includes a message for prompting whether to log in with the authentication capability of the preset third-party application; and the confirmation operation comprises a first confirmation operation of confirming that the login is performed by utilizing the authentication capability of the preset third-party application and a second confirmation operation of confirming that the login is not performed by utilizing the authentication capability of the preset third-party application.
In some embodiments, the above method further comprises: responding to the login operation execution failure, obtaining configuration information from a local or a server, analyzing the configuration information, and determining whether the configuration information comprises indication information, wherein the indication information is used for indicating that the connection operation is allowed to be executed in response to the login failure of the wireless access point connection type application; and executing the connection operation in response to determining that the configuration information comprises the indication information.
In some embodiments, the above method further comprises: and in response to not obtaining the configuration information from the server, obtaining the configuration information from the local.
In some embodiments, the above method further comprises: and in response to determining that the configuration information does not include the indication information, presenting fourth prompt information for indicating login failure.
In some embodiments, the above method further comprises: and in response to determining that the target wireless access point does not meet the first preset condition, displaying fifth prompt information for instructing to reselect the wireless access point for connection.
In some embodiments, before presenting the fifth prompting message for instructing reselection of the wireless access point for connection, the method further comprises: and jumping to a wireless access point display interface of the wireless access point connection type application.
In some embodiments, connecting to the target wireless access point comprises: acquiring a password of a target wireless access point; and connecting the target wireless access point by using the acquired password.
In some embodiments, obtaining the password for the target wireless access point comprises: sending a password acquisition request to a server, wherein the password acquisition request comprises an identifier of a target wireless access point; and receiving the password of the target wireless access point issued by the server in response to the password acquisition request.
In a second aspect, an embodiment of the present application provides an apparatus for connecting a wireless access point, where the apparatus includes: a detecting unit configured to detect whether a wireless access point connection-class application is currently in a login state in response to receiving a connection request for connecting a target wireless access point shown by the wireless access point connection-class application; a first execution unit configured to execute a preset login operation in response to detecting that the wireless access point connection type application is not currently in a login state; a second execution unit configured to, in response to the login operation being successfully executed, execute the following connection operation: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point.
In a third aspect, an embodiment of the present application provides an electronic device, including: one or more processors; a storage device having one or more programs stored thereon; when executed by the one or more processors, cause the one or more processors to implement a method as described in any implementation of the first aspect.
In a fourth aspect, the present application provides a computer-readable medium, on which a computer program is stored, which when executed by a processor implements the method described in any implementation manner of the first aspect.
According to the method and the device for connecting the wireless access point, whether the wireless access point connection type application is in the login state currently is detected by responding to the received connection request for connecting the target wireless access point shown by the wireless access point connection type application, so that when the fact that the wireless access point connection type application is not in the login state currently is detected, the preset login operation is executed to log in the wireless access point connection type application. And finally, in response to the successful execution of the login operation, executing a connection operation aiming at the target wireless access point so as to realize the connection of the target wireless access point. Therefore, the execution of the preset login operation after the fact that the wireless access point connection application is not in the login state at present is effectively utilized, and the login of the wireless access point connection application before the target wireless access point is connected is achieved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for connecting to a wireless access point according to the present application;
FIG. 3 is a schematic diagram of one application scenario of a method for connecting a wireless access point according to the present application;
FIG. 4 is a flow diagram of yet another embodiment of a method for connecting to a wireless access point according to the present application;
FIG. 5 is a schematic block diagram of a computer system suitable for use in implementing an electronic device according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the method for connecting wireless access points of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a wireless access point connection application, a web browser application, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices including, but not limited to, smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 105 may be a server providing various services, such as a background server providing support for the terminal devices 101, 102, 103 to connect to the wireless access point. The backend server may for example store the passwords of a large number of wireless access points, so that the terminal devices 101, 102, 103 may obtain the passwords of the target wireless access points indicated by the received connection request from the backend server.
It should be noted that the method for connecting to a wireless access point provided in the embodiments of the present application is generally performed by the terminal devices 101, 102, and 103.
It should be noted that the server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of a method for connecting a wireless access point in accordance with the present application is shown. The process 200 of the method for connecting to a wireless access point comprises the following steps:
In this embodiment, an executing body (for example, the terminal device shown in fig. 1) of the method for connecting a wireless access point may detect whether a wireless access point connection class application is currently in a login state in response to receiving a connection request for connecting a target wireless access point shown by the wireless access point connection class application.
The wireless access point connection application may be an application installed locally in the execution subject and facilitating a user to quickly connect to the wireless access point. The wireless access point connection application may present the wireless access points in the preset area to the user in a list form on a wireless access point presentation interface, for example. Here, the reference region may be divided into a plurality of sub-regions in advance, and the preset region may be a sub-region where the position of the execution subject is located. Wherein each sub-region may contain a plurality of wireless access points.
It should be noted that, after detecting the click operation of the user on the target wireless access point displayed by the wireless access point connection application, the execution main body may display a wireless access point connection option to the user, so that the user may trigger a connection request for connecting the target wireless access point by clicking the wireless access point connection option. After receiving the connection request, the execution main body may check whether the wireless access point connection type application is currently in a login state in a preset file for recording the login situation of the wireless access point connection type application in real time. The wireless access point connection application may correspond to a logged-in state and an unregistered state, for example. The login status may be used to indicate that the wireless access point connection class application is currently logged in. The unregistered state may be used to indicate that the wireless access point connection class application is not currently registered.
In this embodiment, the executing agent may execute a preset login operation in response to detecting that the wireless access point connection class application is not currently in a login state.
As an example, the execution subject may locally obtain the historical login information of the wireless access point connection type application. The historical login information may include a login account number (e.g., a mobile phone number of the user). And then the execution subject can directly log in the wireless access point connection application by using the login account.
It should be noted that, by requiring the user to log in to the wireless access point connection-type application before connecting to the target wireless access point, the validity of the user using the target wireless access point can be ensured as much as possible. The method can also help to monitor the network behavior of the user, improve the responsibility and integrity of the user, standardize the network order, purify the network environment and the like.
In some optional implementations of this embodiment, the execution subject may perform the following login operations:
step one, the execution main body can display second prompt information used for indicating the input of the mobile phone number on a screen. The second prompt message may include, but is not limited to, text message, picture message, animation message, and the like. In addition, the second prompt message may further include a first text box for inputting the mobile phone number, so that the user can input the mobile phone number conveniently.
Step two, the execution main body may trigger the verification code sending operation to send the verification code to the mobile phone number in response to receiving the mobile phone number (for example, the mobile phone number input in the first text box) input for the second prompt message, and display a third prompt message for indicating to input the verification code received by the mobile phone number on the screen. The execution end of the verification code sending operation may be, for example, a server of an operator. The execution main body may send a request for sending the verification code to the server, where the request may include the mobile phone number and the verification code. The server may send the verification code to the phone number in response to receiving the request. The third prompt message may include, but is not limited to, text message, picture message, animation message, etc., and its content may be used to prompt the user to input the verification code received by the mobile phone number. In addition, the third prompt message may further include a second text box for inputting the verification code, so that the user can input the verification code.
Step three, the execution main body may determine whether the verification code satisfies a second preset condition in response to receiving the verification code input for the third prompt message (e.g., the verification code input in the second text box). The second preset condition may include, for example, a first sub-condition, and the first sub-condition may be, for example: and the verification code is consistent with the verification code which is sent to the mobile phone number input by the user last time. Of course, the second preset condition, while including the first sub-condition, may also include a second sub-condition, and the second sub-condition may be, for example: the sending time of the verification code is within a preset time period. The preset time period may be a time period in which the sending time of the verification code sent to the mobile phone number input by the user last time is the starting time and the duration is a preset duration (for example, 60 seconds).
And step four, the execution main body can use the mobile phone number input aiming at the second prompt message to log in the wireless access point connection application in response to the fact that the received verification code meets a second preset condition.
In some optional implementation manners of this embodiment, before performing the preset login operation, the execution main body may display, on a screen, first prompt information for prompting to log in the wireless access point connection-class application. In addition, the executing body may execute a preset login operation corresponding to the confirmation operation, for example, the login operation shown in the first step to the fourth step, in response to detecting the confirmation operation on the first prompt information.
The first prompt message may include, but is not limited to, text message, picture message, animation message, and the like, and the content of the first prompt message may be used to prompt the user to log in the wireless access point connection application. The confirmation operation may be used to indicate confirmation of the content prompted by the first prompting message, and may include, but is not limited to, a click operation, a slide operation, a gesture operation, and the like. As an example, the first prompt may include a confirmation option, and the user may perform a confirmation operation of the first prompt by clicking on the confirmation option.
In some optional implementations of this embodiment, the first prompt message may include a message for prompting whether to log in with an authentication capability of a preset third-party application. The information may be information presented to the user in an option manner, and the user may determine whether to select the information according to actual needs. In addition, the confirmation operation on the first prompt message may include a first confirmation operation of confirming that login is performed with the authentication capability of the preset third-party application, and a second confirmation operation of confirming that login is not performed with the authentication capability of the preset third-party application.
As an example, the first prompt message may include a first option for prompting whether to log in with the authentication capability of the preset third-party application, and may further include a confirmation option. The first confirmation operation on the first prompt message can be represented by clicking operation on a confirmation option in the case that the first option is selected. The second confirmation operation on the first prompt message can be represented by clicking operation on the confirmation option without selecting the first option.
In some optional implementations of this embodiment, the executing body may execute the login operation shown in the first step to the fourth step in response to detecting the second confirmation operation on the first prompt information.
And step 203, responding to the successful execution of the login operation, and executing the connection operation.
In this embodiment, the execution subject may execute the following connection operation in response to the login operation being successfully executed: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point. Here, the execution body may acquire a password of the target wireless access point, and connect the target wireless access point using the acquired password. At this time, the user can use the target wireless access point to surf the internet. It should be noted that, during the process of connecting to the target wireless access point, the execution subject may display the connection process on the screen thereof, so that the user can clearly know the connection progress of the target wireless access point.
It should be noted that the first preset condition may include, for example: the target wireless access point is included in the list of target wireless access points. The target wireless access point list may be a list of wireless access points in a sub-area where the execution subject is located. The executing agent may, for example, obtain a target wireless access point list from a server (e.g., a server shown in fig. 1), and then search for a target wireless access point in the target wireless access point list, where if the target wireless access point is found, the executing agent may determine that the target wireless access point meets a first preset condition; otherwise, the executing agent may determine that the target wireless access point does not satisfy the first preset condition.
Optionally, the first preset condition may further include that the security level of the target wireless access point is greater than the security level threshold while the target wireless access point is included in the target wireless access point list. After determining that the target wireless access point is included in the target wireless access point list, the executing body may perform a preset security authentication operation on the target wireless access point to obtain a security level of the target wireless access point. The executing body may compare the obtained security level with a security level threshold, and if the obtained security level is greater than the security level threshold, the executing body may determine that the target wireless access point satisfies a first preset condition; otherwise, the executing agent may determine that the target wireless access point does not satisfy the first preset condition.
In some optional implementations of this embodiment, the executing entity may obtain the password of the target wireless access point from a local or the server. Taking the example of obtaining the password of the target wireless access point from the server, the execution main body may send a password obtaining request to the server, where the password obtaining request may include an identifier of the target wireless access point; and the execution main body can receive the password of the target wireless access point issued by the server end in response to the password acquisition request. In some optional implementation manners of this embodiment, the execution main body may further obtain the configuration information from a local or the server in response to a login operation execution failure. The execution body may analyze the acquired configuration information to determine whether the configuration information includes indication information. The indication information may be used to indicate that the connection operation is allowed to be performed in response to a login failure of the wireless access point connection type application. The execution body may then execute the connection operation in response to the configuration information including the indication information. It should be noted that the failure of executing the login operation may be represented by that the verification code received by the execution subject does not satisfy the second preset condition.
As an example, the configuration information may include a parameter indicating whether the connection operation is allowed to be performed in response to a wireless access point connection-type application login failure, for example. The parameter values of the parameter may include, for example, a first value (e.g., 1, etc.) indicating that the above-described connection operation is allowed to be performed in response to a wireless access point connection-class application login failure, and a second value (e.g., 0, etc.) indicating that the above-described connection operation is not allowed to be performed in response to a wireless access point connection-class application login failure. The executing entity may check whether a current parameter value of the parameter is a first value in the configuration information, and if the current parameter value is the first value, the executing entity may determine that the configuration information includes the indication information.
In some optional implementation manners of this embodiment, if the configuration information does not include the indication information, the execution main body may display a fourth prompt information for indicating a login failure on a screen thereof. The fourth prompting message may include, but is not limited to, text message, picture message, animation message, etc., and the content thereof may be used to prompt the user of login failure, so that the user may try again at a later time. Optionally, before the fourth prompt is presented, the execution subject may jump to a wireless access point presentation interface of the wireless access point connection application.
In some optional implementation manners of this embodiment, if the target wireless access point does not satisfy the first preset condition, the execution main body may display, on a screen of the execution main body, a fifth prompt message for instructing to reselect the wireless access point for connection. The fifth prompting message may include, but is not limited to, text message, picture message, animation message, and the like, and the content of the fifth prompting message may be used to prompt the user to reselect the wireless access point for connection. Optionally, before the fifth prompt is presented, the executing entity may jump to a wireless access point presentation interface of the wireless access point connection application.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the method for connecting a wireless access point according to the present embodiment. In the application scenario of fig. 3, a wireless access point connection application may be installed on the smart phone of the user, and the wireless access point connection application may display the wireless access point in the sub-area where the location of the smart phone is located on the wireless access point display interface. In addition, the first preset condition includes that the wireless access point is included in a target wireless access point list, and the target wireless access point list is a list formed by the wireless access points in the sub-area where the position of the smart phone is located. In the application scenario, when a user wants to connect to a wireless access point by using a wireless access point connection application, the user can select a wireless access point a displayed by the wireless access point connection application to connect, so as to send a connection request to the smart phone. As indicated by reference numeral 301, the smartphone may detect whether the wireless access point connection-class application is currently logged in response to receiving the connection request. Thereafter, as indicated by reference numeral 302, the smart phone may perform a preset login operation in response to detecting that the wireless access point connection type application is not currently in a login state. Then, as indicated by reference numeral 303, the smartphone may determine whether wireless access point a is included in the list of target wireless access points in response to successful login operation. Finally, if the wireless access point a is included in the target wireless access point list, it may indicate that the wireless access point a satisfies the first preset condition, and the smart phone may connect to the wireless access point a as indicated by reference numeral 304. If the wireless access point a is not included in the target wireless access point list, for example, the wireless access point a is not included in the target wireless access point list due to a weak signal or a change in the location of the smart phone, it may be indicated that the wireless access point a does not satisfy the first preset condition, and the smart phone may jump to the wireless access point display interface and display a prompt message for prompting the user to reselect the wireless access point for connection.
The method provided by the embodiment of the application effectively utilizes the execution of the preset login operation after the wireless access point connection application is detected not to be in the login state at present, and realizes the login of the wireless access point connection application before the target wireless access point is connected.
With further reference to fig. 4, a flow 400 of yet another embodiment of a method for connecting a wireless access point is shown. The process 400 of the method for connecting to a wireless access point includes the steps of:
In this embodiment, an executing body (for example, the terminal device shown in fig. 1) of the method for connecting a wireless access point may detect whether a wireless access point connection class application is currently in a login state in response to receiving a connection request for connecting a target wireless access point shown by the wireless access point connection class application.
In this embodiment, the execution subject may present, in response to detecting that the wireless access point connection type application is not currently in the login state, first prompt information for prompting to log in the wireless access point connection type application on a screen thereof.
The first prompt message may include a message for prompting whether to log in with the authentication capability of the preset third-party application. The information can be presented to the user in an option mode, and the user can determine whether to select the information according to actual needs. The pre-set third party application may be an application having authentication capabilities (e.g., cell phone authentication capabilities). The preset third-party application may store a large amount of user information in advance, where each piece of user information may include, for example, a user identifier (e.g., an identification number of a user or an equipment identifier of an electronic device used by the user), and an authenticated mobile phone number corresponding to the user identifier. In addition, the confirmation operation on the first prompt message may include a first confirmation operation of confirming that login is performed with the authentication capability of the preset third-party application, and a second confirmation operation of confirming that login is not performed with the authentication capability of the preset third-party application.
In this embodiment, the execution main body may send, in response to detecting the first confirmation operation on the first prompt information, a mobile phone number acquisition request to the preset third-party application, so that the preset third-party application returns a mobile phone number of a user to which the wireless access point connection type application belongs.
As an example, the mobile phone number obtaining request may include a user identifier of the user, where the user identifier may be, for example, a device identifier of the electronic device where the execution subject is located. The preset third-party application can search the pre-stored user information for the user information comprising the user identification. If the mobile phone number is found, the preset third-party application can return the mobile phone number in the found user information to the execution main body; otherwise, the preset third-party application can return the mobile phone number acquisition failure prompt information to the execution main body.
And step 404, in response to receiving the mobile phone number returned by the preset third-party application, logging in the wireless access point connection application by using the mobile phone number.
In this embodiment, the execution main body may log in the wireless access point connection application by using a mobile phone number returned by the preset third-party application in response to receiving the mobile phone number. The execution body may then execute step 409.
And 405, in response to that the mobile phone number returned by the preset third-party application is not received, displaying second prompt information for indicating to input the mobile phone number.
In this embodiment, the execution main body may display, in response to not receiving the mobile phone number returned by the preset third-party application, second prompt information for instructing to input the mobile phone number on a screen of the execution main body, so as to prompt the user to input the mobile phone number. It should be noted that, if the execution main body receives the mobile phone number acquisition failure prompt message returned by the preset third-party application, it may indicate that the execution main body does not receive the mobile phone number returned by the preset third-party application.
In this embodiment, the execution main body may trigger the verification code sending operation to send the verification code to the mobile phone number in response to receiving the mobile phone number input for the second prompt message, and display, on a screen of the execution main body, third prompt message for indicating that the verification code received by the mobile phone number is input. The execution end of the verification code sending operation may be, for example, a server of an operator. The execution main body may send a request for sending the verification code to the server, where the request may include the mobile phone number and the verification code. The server may send the verification code to the phone number in response to receiving the request.
In this embodiment, the execution subject may determine whether the verification code satisfies the second preset condition in response to receiving the verification code input for the third prompt information. The second preset condition may include, for example, a first sub-condition, and the first sub-condition may be, for example: and the verification code is consistent with the verification code which is sent to the mobile phone number input by the user last time. Of course, the second preset condition, while including the first sub-condition, may also include a second sub-condition, and the second sub-condition may be, for example: the sending time of the verification code is within a preset time period. The preset time period may be a time period in which the sending time of the verification code that was last sent to the mobile phone number input by the user is the starting time and the duration is a preset duration (e.g., 60 seconds).
And step 408, in response to determining that the received verification code meets the second preset condition, logging in the wireless access point connection application by using the received mobile phone number input aiming at the second prompt message.
In this embodiment, the execution main body may log in the wireless access point connection application by using the received mobile phone number input for the second prompt information in response to determining that the received verification code satisfies the second preset condition. The execution body may then execute step 409.
In step 409, a connection operation is performed.
In this embodiment, after the execution of step 404 or step 408, the execution subject may perform the following connection operations: and determining whether the target wireless access point indicated by the received connection request meets a first preset condition, and if so, connecting the target wireless access point. At this time, the user can use the target wireless access point to surf the internet. It should be noted that, during the process of connecting to the target wireless access point, the execution subject may display the connection process on the screen thereof, so that the user can clearly know the connection progress of the target wireless access point.
The first preset condition may include, for example: the target wireless access point is included in the list of target wireless access points. The target wireless access point list may be a list of wireless access points within a sub-area in which the location of the execution subject is located. The executing agent may, for example, obtain a target wireless access point list from a server (e.g., a server shown in fig. 1), and then search for a target wireless access point in the target wireless access point list, and if the target wireless access point is found, the executing agent may determine that the target wireless access point satisfies a first preset condition.
As can be seen from fig. 4, compared with the embodiment shown in fig. 2, the flow 400 of the method for connecting to a wireless access point in the present embodiment highlights the step of performing a login operation corresponding to the first confirmation operation in response to detecting the first confirmation operation for the first prompt information (step 403 and 408). Therefore, the scheme described in this embodiment can realize real-name login of the wireless access point connection application (for example, login of the wireless access point connection application using the mobile phone number of the user) while reducing interaction with the user as much as possible. In addition, according to the scheme described in this embodiment, when the mobile phone number returned by the preset third-party application is not acquired, the mobile phone number of the user is acquired in a mode of interacting with the user, so that diversity of the mobile phone number acquisition modes can be realized, and successful login of the wireless access point connection application can be ensured as much as possible.
Referring now to FIG. 5, a block diagram of a computer system 500 suitable for use in implementing an electronic device (e.g., the terminal device shown in FIG. 1) of an embodiment of the present application is shown. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The above-described functions defined in the system of the present application are executed when the computer program is executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a detection unit, a first execution unit, and a second execution unit. The names of the units do not form a limitation to the unit itself in some cases, for example, the detection unit may also be described as a unit for detecting whether the wireless access point connection class application is currently in a login state.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to: detecting whether the wireless access point connection type application is in a login state currently or not in response to receiving a connection request for connecting a target wireless access point displayed by the wireless access point connection type application; executing preset login operation in response to the fact that the wireless access point connection type application is detected not to be in a login state currently; in response to the login operation being successfully performed, performing the following connection operations: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (15)
1. A method for connecting to a wireless access point, comprising:
in response to receiving a connection request for connecting a target wireless access point displayed by a wireless access point connection application, detecting whether the wireless access point connection application is currently in a login state;
in response to detecting that the wireless access point connection type application is not currently in a login state, executing a preset login operation, including: in response to detecting a confirmation operation of first prompt information, executing a preset login operation corresponding to the confirmation operation, wherein the first prompt information comprises information for prompting whether login is performed by utilizing authentication capability of a preset third-party application;
in response to the login operation being successfully performed, performing the following connection operations: and determining whether the target wireless access point meets a first preset condition, and if so, connecting the target wireless access point.
2. The method of claim 1, wherein the performing a preset login operation comprises:
sending a mobile phone number acquisition request to a preset third-party application so that the preset third-party application returns the mobile phone number of the user to which the wireless access point connection type application belongs;
and in response to the fact that a mobile phone number returned by the preset third-party application is received, logging in the wireless access point connection application by using the mobile phone number.
3. The method of claim 2, wherein the performing a preset login operation further comprises:
responding to the situation that a mobile phone number returned by a preset third-party application is not received, and displaying second prompt information for indicating the input of the mobile phone number; in response to receiving the mobile phone number input aiming at the second prompt message, triggering a verification code sending operation to send a verification code to the mobile phone number, and displaying third prompt message used for indicating the verification code received by the mobile phone number; and responding to the received verification code input aiming at the third prompt message, determining whether the verification code meets a second preset condition, and if so, logging in the wireless access point connection application by using the mobile phone number.
4. The method of claim 1, wherein the performing a preset login operation further comprises:
displaying second prompt information for indicating the input of the mobile phone number;
in response to receiving the mobile phone number input aiming at the second prompt message, triggering a verification code sending operation to send a verification code to the mobile phone number, and displaying third prompt message used for indicating the verification code received by the mobile phone number;
and responding to the received verification code input aiming at the third prompt message, determining whether the verification code meets a second preset condition, and if so, logging in the wireless access point connection application by using the mobile phone number.
5. The method according to one of claims 2-4, wherein prior to said performing a preset login operation, the method further comprises:
and displaying first prompt information for prompting to log in the wireless access point connection application.
6. The method of claim 1, wherein the validation operations include a first validation operation that validates logging in with the authentication capabilities of the preset third-party application, and a second validation operation that validates logging in without the authentication capabilities of the preset third-party application.
7. The method of claim 1, wherein the method further comprises:
responding to the login operation execution failure, obtaining configuration information from a local or a server, analyzing the configuration information, and determining whether the configuration information comprises indication information, wherein the indication information is used for indicating that the connection operation is allowed to be executed in response to the login failure of the wireless access point connection type application;
in response to determining that the configuration information includes the indication information, performing the connection operation.
8. The method of claim 7, wherein the method further comprises:
and responding to the situation that the configuration information is not acquired from the service end, and acquiring the configuration information from the local.
9. The method of claim 7, wherein the method further comprises:
in response to determining that the configuration information does not include the indication information, presenting fourth prompt information for indicating a login failure.
10. The method of claim 1, wherein the method further comprises:
and in response to determining that the target wireless access point does not meet the first preset condition, displaying fifth prompt information for instructing to reselect a wireless access point for connection.
11. The method of claim 10, wherein prior to said presenting fifth prompting information for instructing reselection of a wireless access point for connection, the method further comprises:
and jumping to a wireless access point display interface of the wireless access point connection type application.
12. The method of claim 1, wherein the connecting the target wireless access point comprises:
acquiring a password of the target wireless access point;
and connecting the target wireless access point by using the acquired password.
13. The method of claim 12, wherein the obtaining the password for the target wireless access point comprises:
sending a password acquisition request to a server, wherein the password acquisition request comprises an identifier of the target wireless access point;
and receiving the password of the target wireless access point issued by the server in response to the password acquisition request.
14. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-13.
15. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810539541.XA CN108471635B (en) | 2018-05-30 | 2018-05-30 | Method and apparatus for connecting wireless access points |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810539541.XA CN108471635B (en) | 2018-05-30 | 2018-05-30 | Method and apparatus for connecting wireless access points |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108471635A CN108471635A (en) | 2018-08-31 |
CN108471635B true CN108471635B (en) | 2020-10-02 |
Family
ID=63261632
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810539541.XA Active CN108471635B (en) | 2018-05-30 | 2018-05-30 | Method and apparatus for connecting wireless access points |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108471635B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112040529B (en) * | 2020-09-11 | 2023-08-04 | 连尚(北京)网络科技有限公司 | WiFi connection method and device |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104507158B (en) * | 2014-12-30 | 2018-10-23 | 北京奇虎科技有限公司 | A kind of method, apparatus and mobile terminal for establishing WLAN connection |
CN107295607A (en) * | 2017-07-05 | 2017-10-24 | 上海连尚网络科技有限公司 | Method and apparatus for connecting WAP |
-
2018
- 2018-05-30 CN CN201810539541.XA patent/CN108471635B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN108471635A (en) | 2018-08-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018223717A1 (en) | Webpage front-end testing method, device, system, apparatus and readable storage medium | |
CN104639721B (en) | The method and device of application information is provided in mobile terminal device | |
CN108681662B (en) | Method and device for installing program | |
CN110708346A (en) | Information processing system and method | |
US11363066B2 (en) | Method and device for information processing, test terminal, test platform and storage medium | |
CN107172685B (en) | Method and equipment for displaying information of wireless access point on mobile terminal | |
CN109981647B (en) | Method and apparatus for detecting brute force cracking | |
CN109684188B (en) | Test method and device | |
CN107690175B (en) | Method and equipment for managing wireless access point | |
CN108135026B (en) | Wi-Fi connection method, computer device and storage medium | |
CN104579830A (en) | Service monitoring method and device | |
WO2017071121A1 (en) | Method and device for establishing wireless connection | |
CN109491908B (en) | Page detection method and device, electronic equipment and storage medium | |
CN111125503B (en) | Method and apparatus for generating information | |
CN109218024B (en) | Method and device for controlling authority | |
CN108471635B (en) | Method and apparatus for connecting wireless access points | |
CN109145591B (en) | Plug-in loading method of application program | |
CN109491748B (en) | Wearable device control method and control terminal based on small program | |
CN116662193A (en) | Page testing method and device | |
JP6021723B2 (en) | Management server, communication terminal, user registration system, and user registration method | |
CN111885006B (en) | Page access and authorized access method and device | |
CN112822089B (en) | Method and device for adding friends | |
CN111597485B (en) | Information presentation method and device | |
CN106209742B (en) | Security verification method and system | |
CN110262813B (en) | Method and apparatus for installing applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210407 Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, Pudong New Area pilot Free Trade Zone, Shanghai Patentee after: Shanghai Shangxiang Network Technology Co.,Ltd. Address before: 312599 Affiliated Building B-2, 3rd Floor, Jiayi Plaza, 127 Renmin East Road, Nanming Street, Xinchang County, Shaoxing City, Zhejiang Province Patentee before: LIANSHANG (XINCHANG) NETWORK TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |