CN108601060A - Configuration method, mobile terminal and the storage medium of wireless network connection - Google Patents
Configuration method, mobile terminal and the storage medium of wireless network connection Download PDFInfo
- Publication number
- CN108601060A CN108601060A CN201810852926.1A CN201810852926A CN108601060A CN 108601060 A CN108601060 A CN 108601060A CN 201810852926 A CN201810852926 A CN 201810852926A CN 108601060 A CN108601060 A CN 108601060A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- network access
- network connection
- access link
- contact person
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/02—Access restriction performed under specific conditions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of configuration method of wireless network connection, this method includes:When the wireless network for receiving user's triggering accesses configuration-direct, the contacts list of default social software is obtained and shown;The selection instruction for receiving contacts list triggering of the user based on display, according to the selected contact person for allowing to access wireless network of the selection instruction;Wireless network access link is generated according to preset rules, the wireless network access link carries the information for allowing terminal to automatically access wireless network;The wireless network access link of generation is sent to the selected contact person by the social software.The invention also discloses a kind of mobile terminals and a kind of computer readable storage medium.The present invention can realize that the connection permission to wireless network carries out flexible configuration, promote the privacy based on wireless network connection.
Description
Technical field
The present invention relates to the configuration method of technical field of mobile terminals more particularly to wireless network connection, mobile terminal and
Computer readable storage medium.
Background technology
With flourishing for broadband industry and popularizing for intelligent terminal, the WIFI that more and more users pass through terminal
(WIreless-Fidelity, Wireless Fidelity) accesses home gateway, to enjoy network service.
In daily life, the WIFI passwords in user family are generally to be less comfortable with too many people to know than more covert information
Road, but the puzzlement for being asked password is faced sometimes, or the case where password is to relative, friend, finishing team is provided in a short time, when
When such case occurs, user in order to prevent reveal by password, or does not want that the terminal of existing password is allowed to connect family again
WIFI, can only be by the traditional approach of Modify password, and this mode is cumbersome, and user experience is not high.
Invention content
It is a primary object of the present invention to propose that a kind of configuration method of wireless network connection, mobile terminal and computer can
Read storage medium, it is intended to realize and flexible configuration is carried out to the connection permission of wireless network, be promoted based on the hidden of wireless network connection
Private.
To achieve the above object, the present invention provides a kind of configuration method of wireless network connection, and the method includes as follows
Step:
When the wireless network for receiving user's triggering accesses configuration-direct, the contact of default social software is obtained and shown
List;
The selection instruction for receiving contacts list triggering of the user based on display permits according to the selection instruction is selected
Perhaps the contact person of wireless network is accessed;
Wireless network access link is generated according to preset rules, the wireless network access link, which carries, allows terminal automatic
Access the information of wireless network;
The wireless network access link of generation is sent to the selected contact person by the social software.
Optionally, described when the wireless network for receiving user's triggering accesses configuration-direct, it obtains and shows default society
Before the step of handing over the contacts list of software, further include:
The acquisition request based on wireless network access-in management permission is sent to wireless network access point, the acquisition request is taken
Check information with preset kind;
Receive the check results based on the check information that the access point of the wireless network returns;
When the check results are that verification passes through, wireless network access-in management permission is obtained.
Optionally, the configuration method of the wireless network connection further includes:
The wireless network access link of generation is sent to the wireless network access point to preserve.
Optionally, the wireless network access link by generation is sent to the wireless network access point and protects
After the step of depositing, further include:
The invalidation request based on wireless network access link is sent to the wireless network access point, so that the nothing
The wireless network access link of preservation is determined as invalid link by line network access point.
Optionally, the check information is one or more groups in password, fingerprint, facial image and device identification
It closes.
Optionally, the selection instruction for receiving contacts list triggering of the user based on display, according to the choosing
Selecting the step of contact person for allowing access wireless network is selected in instruction includes:
When receiving selection instruction of the user based on group's triggering in the contacts list, select in the group
All Contacts as allow access wireless network contact person;
When receiving selection instruction of the user based on the single contact person triggering in the contacts list, the list is selected
A contact person is as the contact person for allowing to access wireless network.
Optionally, described the step of generating wireless network access link according to preset rules, includes:
Obtain the duration for allowing to access wireless network of user setting;
The duration for accessing wireless network is allowed to generate corresponding wireless network access link according to described.
Optionally, described the step of generating wireless network access link according to preset rules, includes:
Obtain the term of validity of the wireless network access link of user setting;
Corresponding wireless network access link is generated according to the term of validity of wireless network access link.
In addition, to achieve the above object, the present invention also provides a kind of mobile terminal, the mobile terminal includes:Memory,
Processor and the configurator for being stored in the wireless network connection that can be run on the memory and on the processor, it is described
The configurator of wireless network connection realizes the configuration method of wireless network connection as described above when being executed by the processor
The step of.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
The configurator of wireless network connection is stored on storage medium, the configurator of the wireless network connection is executed by processor
The step of configuration method of Shi Shixian wireless network connections as described above.
The present invention is obtained and is shown default when the wireless network that mobile terminal receives user's triggering accesses configuration-direct
The contacts list of social software;The selection instruction for receiving contacts list triggering of the user based on display, according to described
The selected contact person for allowing to access wireless network of selection instruction;Wireless network access link, the nothing are generated according to preset rules
Line network insertion link carries the information for allowing terminal to automatically access wireless network;It will be described in generation by the social software
Wireless network access link is sent to the selected contact person.Mobile terminal of the present invention passes through into selected social networks
Contact person sends wireless network access link, realizes the flexible configuration of wireless network connection permission, and the process is not necessarily to him
People provides wireless network access pin, to improve the privacy based on wireless network connection.
Description of the drawings
A kind of hardware architecture diagram of Fig. 1 mobile terminals of each embodiment to realize the present invention;
Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention;
Fig. 3 is the flow diagram of the configuration method first embodiment of wireless network connection of the present invention;
Fig. 4 is the selection interface schematic diagram of contacts list in the embodiment of the present invention;
Fig. 5 is the transmission schematic diagram of a scenario of wireless network access link in the embodiment of the present invention;
Fig. 6 is the flow diagram of the configuration method second embodiment of wireless network connection of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only
The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, terminal described in the present invention may include such as mobile phone, tablet
Computer, laptop, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
The shiftings such as media player (Portable Media Player, PMP), navigation device, wearable device, Intelligent bracelet, pedometer
The fixed terminals such as dynamic terminal, and number TV, desktop computer.
It will be illustrated by taking mobile terminal as an example in subsequent descriptions, it will be appreciated by those skilled in the art that in addition to special
Except element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, a kind of hardware architecture diagram of its mobile terminal of each embodiment to realize the present invention, the shifting
Moving terminal 100 may include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103, A/V (audio/video) input unit 104, sensor 105, display unit 106, user input unit 107, interface unit
108, the components such as memory 109, processor 110 and power supply 111.It will be understood by those skilled in the art that shown in Fig. 1
Mobile terminal structure does not constitute the restriction to mobile terminal, and mobile terminal may include components more more or fewer than diagram,
Either combine certain components or different components arrangement.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, signal sends and receivees, specifically, by base station
Downlink information receive after, to processor 110 handle;In addition, the data of uplink are sent to base station.In general, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrating
Frequency unit 101 can also be communicated with network and other equipment by radio communication.Above-mentioned wireless communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, wideband code division multiple access), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, frequency division duplex long term evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex long term evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browsing webpage and access streaming video etc., it has provided wireless broadband internet to the user and has accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, and it is not belonging to must be configured into for mobile terminal, it completely can be according to need
It to be omitted in the range for the essence for not changing invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, it is that radio frequency unit 101 or WiFi module 102 are received or
The audio data stored in memory 109 is converted into audio signal and exports to be sound.Moreover, audio output unit 103
The relevant audio output of specific function executed with mobile terminal 100 can also be provided (for example, call signal receives sound, disappears
Breath receives sound etc.).Audio output unit 103 may include loud speaker, buzzer etc..
A/V input units 104 are for receiving audio or video signal.A/V input units 104 may include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the image data of the static images or video obtained by image capture apparatus (such as camera) in image capture mode carries out
Reason.Treated, and picture frame may be displayed on display unit 106.Through graphics processor 1041, treated that picture frame can be deposited
Storage is sent in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (audio data), and can be audio data by such acoustic processing.Audio that treated (voice) data can
To be converted to the format output that can be sent to mobile communication base station via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises elimination (or inhibition) algorithms and send and receive sound to eliminate (or inhibition)
The noise generated during frequency signal or interference.
Mobile terminal 100 further includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity sensor can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As a kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axis) size of acceleration, size and the direction of gravity are can detect that when static, can be used to identify the application of mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared sensor, details are not described herein.
Display unit 106 is for showing information input by user or being supplied to the information of user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode may be used
Forms such as (Organic Light-Emitting Diode, OLED) configure display panel 1061.
User input unit 107 can be used for receiving the number or character information of input, and generate the use with mobile terminal
Family is arranged and the related key signals input of function control.Specifically, user input unit 107 may include touch panel 1071 with
And other input equipments 1072.Touch panel 1071, also referred to as touch screen collect user on it or neighbouring touch operation
(for example user uses any suitable objects or attachment such as finger, stylus on touch panel 1071 or in touch panel 1071
Neighbouring operation), and corresponding attachment device is driven according to preset formula.Touch panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
It is converted into contact coordinate, then gives processor 110, and order that processor 110 is sent can be received and executed.In addition, can
To realize touch panel 1071 using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves.In addition to touch panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
It includes but is not limited in physical keyboard, function key (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc.
It is one or more, do not limit herein specifically.
Further, touch panel 1071 can cover display panel 1061, when touch panel 1071 detect on it or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, touch panel 1071 and display panel
1061 be to realize the function that outputs and inputs of mobile terminal as two independent components, but in certain embodiments, can
The function that outputs and inputs of mobile terminal is realized so that touch panel 1071 and display panel 1061 is integrated, is not done herein specifically
It limits.
Interface unit 108 be used as at least one external device (ED) connect with mobile terminal 100 can by interface.For example,
External device (ED) may include wired or wireless headphone port, external power supply (or battery charger) port, wired or nothing
Line data port, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For the transmission data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storing software program and various data.Memory 109 can include mainly storing program area
And storage data field, wherein storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Audio data, phone directory etc.) etc..In addition, memory 109 may include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the entire mobile terminal of connection
A part by running or execute the software program and/or module that are stored in memory 109, and calls and is stored in storage
Data in device 109 execute the various functions and processing data of mobile terminal, to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Manage device, wherein the main processing operation system of application processor, user interface and application program etc., modem processor is main
Processing wireless communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) powered to all parts, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, to realize management charging by power-supply management system, put
The functions such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also be including bluetooth module etc., and details are not described herein.
Based on above-mentioned mobile terminal hardware configuration, each embodiment of mobile terminal of the present invention is proposed.
Fig. 1 is please referred to, in an embodiment of mobile terminal of the present invention, which includes:Memory 109, processing
Device 110 and the configuration journey for being stored in the wireless network connection that can be run on the memory 109 and on the processor 110
Sequence, the configurator of the wireless network connection realize following steps when being executed by the processor 110:
When the wireless network for receiving user's triggering accesses configuration-direct, the contact of default social software is obtained and shown
List;
The selection instruction for receiving contacts list triggering of the user based on display permits according to the selection instruction is selected
Perhaps the contact person of wireless network is accessed;
Wireless network access link is generated according to preset rules, the wireless network access link, which carries, allows terminal automatic
Access the information of wireless network;
The wireless network access link of generation is sent to the selected contact person by the social software.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
The acquisition request based on wireless network access-in management permission is sent to wireless network access point, the acquisition request is taken
Check information with preset kind;
Receive the check results based on the check information that the access point of the wireless network returns;
When the check results are that verification passes through, wireless network access-in management permission is obtained.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
The wireless network access link of generation is sent to the wireless network access point to preserve.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
The invalidation request based on wireless network access link is sent to the wireless network access point, so that the nothing
The wireless network access link of preservation is determined as invalid link by line network access point.
Further, the check information is one or more groups in password, fingerprint, facial image and device identification
It closes.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
When receiving selection instruction of the user based on group's triggering in the contacts list, select in the group
All Contacts as allow access wireless network contact person;
When receiving selection instruction of the user based on the single contact person triggering in the contacts list, the list is selected
A contact person is as the contact person for allowing to access wireless network.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
Obtain the duration for allowing to access wireless network of user setting;
The duration for accessing wireless network is allowed to generate corresponding wireless network access link according to described.
Further, following step is also realized when the configurator of the wireless network connection is executed by the processor 110
Suddenly:
Obtain the term of validity of the wireless network access link of user setting;
Corresponding wireless network access link is generated according to the term of validity of wireless network access link.
Each specific embodiment of the specific embodiment of mobile terminal of the present invention and the configuration method of following wireless network connections
Essentially identical, therefore not to repeat here.
Embodiment to facilitate the understanding of the present invention, below to the communications network system that is based on of mobile terminal of the present invention into
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
System is the LTE system of universal mobile communications technology, which includes communicating UE (User Equipment, the use of connection successively
Family equipment) (the lands Evolved UMTS Terrestrial Radio Access Network, evolved UMTS 201, E-UTRAN
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned terminal 100, and details are not described herein again.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connect with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide the access of UE201 to EPC203.
EPC203 may include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling, provides carrying and connection management between EPC203.HSS2032 is all to manage for providing some registers
Such as the function of home location register (not shown) etc, and some are preserved in relation to use such as service features, data rates
The dedicated information in family.All customer data can be sent by SGW2034, and PGW2035 can provide the IP of UE 201
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provides available strategy and charging control decision with charge execution function unit (not shown) for strategy.
IP operation 204 may include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc..
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And the following new network system etc., it does not limit herein.
Based on above-mentioned mobile terminal hardware configuration and communications network system, the configuration of wireless network connection of the present invention is proposed
The each embodiment of method.
The present invention provides a kind of configuration method of wireless network connection.
It is the flow diagram of the configuration method first embodiment of wireless network connection of the present invention with reference to Fig. 3, Fig. 3, it is described
Method includes:
Step S10 is obtained and is shown default social soft when the wireless network for receiving user's triggering accesses configuration-direct
The contacts list of part;
It is illustrated so that wireless network is family WIFI as an example, the application scenarios of the present embodiment can be:Work as friends and family
When into access customer man, often ask for WIFI passwords to user, and the WIFI passwords in user family be than more covert information,
Generally it is less comfortable with too many people to know, for this purpose, user can trigger wireless network access configuration-direct, the shifting on mobile terminals
Dynamic terminal is the mobile terminal for having wireless network access-in management permission.
When the wireless network that mobile terminal receives user's triggering accesses configuration-direct, it is soft that preset social activity can be waken up
Part, and the contacts list in social software is obtained, wherein social software can be chat software, in getting social software
Contacts list after, mobile terminal can show the contacts list in a preset configuration interface.
Step S20 receives the selection instruction of contacts list triggering of the user based on display, is referred to according to the selection
Enable the selected contact person for allowing to access wireless network;
In the step, contacts list triggering selection instruction of the user based on display, mobile terminal receives user's triggering
Selection instruction, and using the contact person that user selectes as the contact person for allowing to access wireless network.
Specifically, step S20 may further include:When receiving user based on the group in the contacts list
When the selection instruction of triggering, the All Contacts in the group are selected as the contact person for allowing to access wireless network;When connecing
When receiving selection instruction of the user based on the single contact person triggering in the contacts list, single contact person's conduct is selected
Allow the contact person for accessing wireless network.
It is the selection interface schematic diagram of contacts list in the embodiment of the present invention with reference to Fig. 4, Fig. 4.In social software, use
Family can generally be grouped contact person, if user contact is divided into three good friend, relative, stranger groups in Fig. 4, work as user
When selecting contact person, it can be based on the triggering selection instruction of one or more of contacts list group, mobile terminal can at this time
Using the All Contacts in selected corresponding group as the contact person for allowing to access wireless network, thus user can be with a key to certain
All Contacts in a group authorize;Certainly, user can also be based on single contact person's triggering selection in contacts list
Instruction, mobile terminal is to select single contact person as the contact person for allowing to access wireless network, as user hooks in Fig. 4 at this time
Select group " good friend ", and choose the contact person A in stranger, then it represents that user authorize " good friend " group in All Contacts and
Contact person A accesses wireless network.
Step S30 generates wireless network access link according to preset rules, and the wireless network access link, which carries, to be allowed
Terminal automatically accesses the information of wireless network;
After choosing the contact person for allowing to access wireless network, mobile terminal generates wireless network according to preset rules
Access link, wireless network access link carry the information for allowing terminal to automatically access wireless network.
As an implementation, described the step of generating wireless network access link according to preset rules, may include:
Obtain the duration for allowing to access wireless network of user setting;Allow the duration generation for accessing wireless network corresponding according to described
Wireless network access link.
Specifically, can be that the different durations for allowing to access wireless network is arranged in each contact person, which can be
Single accesses the duration of wireless network, can also be the duration of accumulation access wireless network, for example, when contacting artificial user good friend
When, the duration for accessing wireless network can will be allowed to be arranged longer, when contacting artificial stranger, can will allow to access
The duration of wireless network is arranged shorter, it is of course also possible to which being arranged for selected contact person unified allows to access wireless network
The duration of network, when specific implementation, can be flexibly arranged.Then, it is generated according to the duration for allowing to access wireless network of setting corresponding
Wireless network access link, for example the duration information write-in wireless network for accessing wireless network can will be allowed to access in link,
In this way, containing the duration information for allowing to access wireless network in wireless network access link.
As another embodiment, described the step of generating wireless network access link according to preset rules, can also wrap
It includes:Obtain the term of validity of the wireless network access link of user setting;According to the effective of wireless network access link
Phase generates corresponding wireless network access link.
Specifically, can the term of validity that wireless network accesses link, such as some good friend be set based on different contact persons
Come in home to act as a guest one day, then can set the term of validity of the corresponding wireless network access link of the good friend to 24 hours, 24 is small
When after the wireless network access link cease to be in force automatically.Then, it is generated according to the term of validity of the wireless network of setting access link
Corresponding wireless network access link, for example term of validity information can be written in wireless network access link, in this way, wireless network
The term of validity information for allowing to access wireless network is contained in network access link.
Further, link is shared with other people by contact person in order to prevent, can also be accessed in link in wireless network
The information that writing prohibition is shared can so ensure that the contact person that only user selectes could use the link, further increase
Privacy based on wireless network connection.
Step S40, by the social software by the access link of the wireless network of generation be sent to it is selected described in
Contact person.
Later, the wireless network access link of generation is sent to selected contact by mobile terminal by above-mentioned social software
People.Specifically, with reference to the transmission schematic diagram of a scenario that Fig. 5, Fig. 5 are wireless network access link in the embodiment of the present invention, movement is eventually
End can by the wireless network of generation access link be sent to in the dialog box of selected contact person, in getting home as contact person
When, the link only need to be clicked on its hand-held terminal device, terminal device will automatically access wireless network, so eliminate
It is manually entered the trouble of password, password need not also be informed other people by user, to improve the privacy based on wireless network connection
Property.
After terminal device connects upper wireless network, wireless network access point can be triggered, nothing is used to the terminal device
The timing of gauze network returns to the not available information of network if timing duration is more than preset duration to the terminal device.
In the present embodiment, mobile terminal sends wireless network by the contact person into selected social networks and accesses chain
It connects, realizes the flexible configuration of wireless network connection permission, and the process is not necessarily to provide wireless network access pin to other people, from
And improve the privacy based on wireless network connection.
Further, it is that the flow of the configuration method second embodiment of wireless network connection of the present invention is shown with reference to Fig. 6, Fig. 6
It is intended to.Based on above-mentioned embodiment shown in Fig. 3, before step S10, can also include:
Step S50 sends the acquisition request based on wireless network access-in management permission to wireless network access point, described to obtain
Request is taken to carry the check information of preset kind;
Step S60 receives the check results based on the check information that the access point of the wireless network returns;
Step S70 obtains wireless network access-in management permission when the check results are that verification passes through.
In the present embodiment, mobile terminal needs to get network insertion administration authority first.Specifically, mobile terminal can
To send the acquisition request based on wireless network access-in management permission to wireless network access point, acquisition request, which carries, presets class
The check information of type, the check information can be one or more groups in password, fingerprint, facial image and device identification
It closes;After wireless network access point receives mobile terminal request, the check information carried in request is obtained, and the verification is believed
Breath and the check information itself pre-saved are compared, if the check information carried in request and the verification itself pre-saved
Information matches, then to mobile terminal back-checking by check results;The access point that mobile terminal receives wireless network returns
Check results, when check results be verification pass through when, that is, obtain infinite network access-in management permission.
The present embodiment mobile terminal is follow-up nothing by obtaining infinite network access-in management permission to wireless network access point
Line network insertion configuration provides premise.
Further, the method can also include:The wireless network access link of generation is sent to the nothing
Line network access point is preserved.
The wireless network of generation can be accessed link and be sent to nothing by mobile terminal after generating wireless network access link
Line network access point is preserved, in this way, being initiated when follow-up wireless network access point receives other-end equipment by linking
Wireless network access request when, you can to judge chain that other-end equipment uses according to the access link of the wireless network of preservation
Whether connect is valid link.
Further, described that the wireless network access link of generation is sent to the wireless network access point progress
After the step of preservation, can also include:It is sent to the wireless network access point based on wireless network access link
Invalidation request, so that the wireless network access link of preservation is determined as invalid link by the wireless network access point.
Due in some cases, it is understood that there may be link is accidentally sent out, or before link fails, user does not want to allow contact person
The case where link that can connect wireless network is reused, for this purpose, mobile terminal can send base to wireless network access point
It is protected immediately after wireless network access point receives the invalidation request again in the invalidation request of wireless network access link
The wireless network access link deposited is determined as invalid link, and the corresponding terminal device of contact person for so holding the invalid link will
Wireless network can not be reused.
The present embodiment facilitates user to be accessed whenever and wherever possible to the wireless network generated by providing invalid link function
Link carries out invalid operation, improves the convenience of user's operation, further improves the flexibility of wireless network access configuration.
The present invention also provides a kind of computer readable storage mediums.
The configurator of wireless network connection is stored on computer readable storage medium of the present invention, the wireless network connects
The configurator connect realizes following steps when being executed by processor:
When the wireless network for receiving user's triggering accesses configuration-direct, the contact of default social software is obtained and shown
List;
The selection instruction for receiving contacts list triggering of the user based on display permits according to the selection instruction is selected
Perhaps the contact person of wireless network is accessed;
Wireless network access link is generated according to preset rules, the wireless network access link, which carries, allows terminal automatic
Access the information of wireless network;
The wireless network access link of generation is sent to the selected contact person by the social software.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
The acquisition request based on wireless network access-in management permission is sent to wireless network access point, the acquisition request is taken
Check information with preset kind;
Receive the check results based on the check information that the access point of the wireless network returns;
When the check results are that verification passes through, wireless network access-in management permission is obtained.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
The wireless network access link of generation is sent to the wireless network access point to preserve.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
The invalidation request based on wireless network access link is sent to the wireless network access point, so that the nothing
The wireless network access link of preservation is determined as invalid link by line network access point.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
The check information is one or more combinations in password, fingerprint, facial image and device identification.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
When receiving selection instruction of the user based on group's triggering in the contacts list, select in the group
All Contacts as allow access wireless network contact person;
When receiving selection instruction of the user based on the single contact person triggering in the contacts list, the list is selected
A contact person is as the contact person for allowing to access wireless network.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
Obtain the duration for allowing to access wireless network of user setting;
The duration for accessing wireless network is allowed to generate corresponding wireless network access link according to described.
Further, following steps are also realized when the configurator of the wireless network connection is executed by processor:
Obtain the term of validity of the wireless network access link of user setting;
Corresponding wireless network access link is generated according to the term of validity of wireless network access link.
Wherein, the configurator of the wireless network connection run on the processor is performed realized method can
With reference to the configuration method embodiment of wireless network connection of the present invention, details are not described herein again.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements include not only those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this
There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service
Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of configuration method of wireless network connection, which is characterized in that the configuration method of the wireless network connection includes such as
Lower step:
When the wireless network for receiving user's triggering accesses configuration-direct, contact person's row of default social software are obtained and shown
Table;
The selection instruction for receiving contacts list triggering of the user based on display allows to connect according to the selection instruction is selected
Enter the contact person of wireless network;
Wireless network access link is generated according to preset rules, the wireless network access link, which carries, allows terminal to automatically access
The information of wireless network;
The wireless network access link of generation is sent to the selected contact person by the social software.
2. the configuration method of wireless network connection as described in claim 1, which is characterized in that described to receive user's triggering
Wireless network access configuration-direct when, before the step of obtaining and showing the contacts list of default social software, further include:
The acquisition request based on wireless network access-in management permission is sent to wireless network access point, the acquisition request carries pre-
If the check information of type;
Receive the check results based on the check information that the access point of the wireless network returns;
When the check results are that verification passes through, wireless network access-in management permission is obtained.
3. the configuration method of wireless network connection as claimed in claim 2, which is characterized in that the wireless network connection is matched
The method of setting further includes:
The wireless network access link of generation is sent to the wireless network access point to preserve.
4. the configuration method of wireless network connection as claimed in claim 3, which is characterized in that described by the described wireless of generation
Network insertion link is sent to after the step of wireless network access point is preserved, and further includes:
The invalidation request based on wireless network access link is sent to the wireless network access point, so that the wireless network
The wireless network access link of preservation is determined as invalid link by network access point.
5. the configuration method of the wireless network connection as described in any one of claim 2 to 4, which is characterized in that the verification
Information is one or more combinations in password, fingerprint, facial image and device identification.
6. the configuration method of wireless network connection as described in claim 1, which is characterized in that the reception user is based on display
Contacts list triggering selection instruction, according to the selected contact person's for allowing to access wireless network of the selection instruction
Step includes:
When receiving selection instruction of the user based on group's triggering in the contacts list, the institute in the group is selected
People be related as the contact person for allowing to access wireless network;
When receiving selection instruction of the user based on the single contact person triggering in the contacts list, select described single
It is people as the contact person for allowing to access wireless network.
7. the configuration method of wireless network connection as described in claim 1, which is characterized in that described to be generated according to preset rules
Wireless network access link the step of include:
Obtain the duration for allowing to access wireless network of user setting;
The duration for accessing wireless network is allowed to generate corresponding wireless network access link according to described.
8. the configuration method of wireless network connection as described in claim 1, which is characterized in that described to be generated according to preset rules
Wireless network access link the step of include:
Obtain the term of validity of the wireless network access link of user setting;
Corresponding wireless network access link is generated according to the term of validity of wireless network access link.
9. a kind of mobile terminal, which is characterized in that the mobile terminal includes:Memory, processor and it is stored in the storage
On device and the configurator of wireless network connection that can run on the processor, the configurator of the wireless network connection
The step of the configuration method such as wireless network connection described in any item of the claim 1 to 8 is realized when being executed by the processor
Suddenly.
10. a kind of computer readable storage medium, which is characterized in that be stored with wireless network on the computer readable storage medium
The configurator of network connection is realized when the configurator of the wireless network connection is executed by processor as in claim 1 to 8
The step of configuration method of any one of them wireless network connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852926.1A CN108601060A (en) | 2018-07-27 | 2018-07-27 | Configuration method, mobile terminal and the storage medium of wireless network connection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810852926.1A CN108601060A (en) | 2018-07-27 | 2018-07-27 | Configuration method, mobile terminal and the storage medium of wireless network connection |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108601060A true CN108601060A (en) | 2018-09-28 |
Family
ID=63618491
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810852926.1A Pending CN108601060A (en) | 2018-07-27 | 2018-07-27 | Configuration method, mobile terminal and the storage medium of wireless network connection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108601060A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102802059A (en) * | 2011-05-27 | 2012-11-28 | 华为软件技术有限公司 | Set-top box configuring method, device and system |
CN103119911A (en) * | 2010-05-07 | 2013-05-22 | 电话有限公司 | System and method for synchronizing the profile of a user in social networks and the user's personal contact card (PCC) |
CN103476092A (en) * | 2013-09-13 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Mobile terminal based WIFI hotspot access method and system |
CN105357242A (en) * | 2014-08-22 | 2016-02-24 | 中国电信股份有限公司 | Method and system for accessing wireless local area network, short message push platform and portal system |
CN106454819A (en) * | 2015-08-11 | 2017-02-22 | 中兴通讯股份有限公司 | WIFI access point accessing method and apparatus |
CN106792682A (en) * | 2016-12-05 | 2017-05-31 | 奇酷互联网络科技(深圳)有限公司 | The cut-in method of WIFI network, device and terminal device |
-
2018
- 2018-07-27 CN CN201810852926.1A patent/CN108601060A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103119911A (en) * | 2010-05-07 | 2013-05-22 | 电话有限公司 | System and method for synchronizing the profile of a user in social networks and the user's personal contact card (PCC) |
CN102802059A (en) * | 2011-05-27 | 2012-11-28 | 华为软件技术有限公司 | Set-top box configuring method, device and system |
CN103476092A (en) * | 2013-09-13 | 2013-12-25 | 惠州Tcl移动通信有限公司 | Mobile terminal based WIFI hotspot access method and system |
CN105357242A (en) * | 2014-08-22 | 2016-02-24 | 中国电信股份有限公司 | Method and system for accessing wireless local area network, short message push platform and portal system |
CN106454819A (en) * | 2015-08-11 | 2017-02-22 | 中兴通讯股份有限公司 | WIFI access point accessing method and apparatus |
CN106792682A (en) * | 2016-12-05 | 2017-05-31 | 奇酷互联网络科技(深圳)有限公司 | The cut-in method of WIFI network, device and terminal device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN107682547A (en) | A kind of voice messaging regulation and control method, equipment and computer-readable recording medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN108182028A (en) | A kind of control method, terminal and computer readable storage medium | |
CN107734128A (en) | One kind swindle number identification method and equipment | |
CN108762631A (en) | A kind of method for controlling mobile terminal, mobile terminal and computer readable storage medium | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN108172161A (en) | Display methods, mobile terminal and computer readable storage medium based on flexible screen | |
CN107896287A (en) | Phone number risk monitoring method and mobile terminal | |
CN108771861A (en) | A kind of game control method, mobile terminal and computer readable storage medium | |
CN108601004A (en) | NFC uses bootstrap technique, mobile terminal and computer readable storage medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN108156325A (en) | A kind of double-sided screen Incoming-call control method, equipment and computer readable storage medium | |
CN107682541A (en) | Audio control method, mobile terminal and the storage medium of screen prjection | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN110052024A (en) | Method of adjustment, adjustment device, mobile terminal and the storage medium of game vibration | |
CN109065065A (en) | Call method, mobile terminal and computer readable storage medium | |
CN108650281A (en) | A kind of data managing method, device and computer readable storage medium | |
CN107194217A (en) | User data access control method, equipment and computer-readable recording medium | |
CN107516051A (en) | A kind of data encryption storage method, device and computer-readable recording medium | |
CN108063863A (en) | A kind of information browsing method, terminal, server and computer readable storage medium | |
CN107317932A (en) | Use method for limiting, mobile terminal and the computer-readable recording medium of terminal | |
CN109451438A (en) | A kind of finding method of intelligent terminal, intelligent terminal and storage medium | |
CN108768831A (en) | Sharing method, mobile terminal and the computer readable storage medium of chat record | |
CN108183833A (en) | A kind of response processing method, device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180928 |