CN108990064B - Wireless hotspot connection method, electronic device and medium - Google Patents

Wireless hotspot connection method, electronic device and medium Download PDF

Info

Publication number
CN108990064B
CN108990064B CN201810840170.9A CN201810840170A CN108990064B CN 108990064 B CN108990064 B CN 108990064B CN 201810840170 A CN201810840170 A CN 201810840170A CN 108990064 B CN108990064 B CN 108990064B
Authority
CN
China
Prior art keywords
application
wireless hotspot
connection
connection method
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810840170.9A
Other languages
Chinese (zh)
Other versions
CN108990064A (en
Inventor
吴培希
赵学礼
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co.,Ltd.
Original Assignee
Shanghai Shangxiang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shangxiang Network Technology Co ltd filed Critical Shanghai Shangxiang Network Technology Co ltd
Priority to CN201810840170.9A priority Critical patent/CN108990064B/en
Publication of CN108990064A publication Critical patent/CN108990064A/en
Application granted granted Critical
Publication of CN108990064B publication Critical patent/CN108990064B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/20Manipulation of established connections

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a wireless hotspot connection method, electronic equipment and a medium, wherein the wireless hotspot connection method comprises the following steps: monitoring a connection state of a wireless hotspot in a terminal, and acquiring a packet name of a first application and a packet name of a second application when the connection state is monitored to be changed, wherein the first application comprises an application used for creating the connection state in the terminal, and the second application comprises an application used for running a foreground interface in the terminal; and determining whether the package name of the first application and the package name of the second application accord with a preset first connection strategy, and if so, displaying a guide interface. According to the method and the device, the hotspot connection state is monitored, the guiding interface is displayed after different applications are judged, the safety of the terminal connection hotspot can be guaranteed, the situation that the user is interfered by popping up the window to the user when the hotspot is detected can be avoided, the pop-up window guiding is more accurate, and the user experience is better.

Description

Wireless hotspot connection method, electronic device and medium
Technical Field
The present application relates to the field of wireless technologies, and in particular, to a wireless hotspot connection method, an electronic device, and a medium.
Background
Currently, applications (such as third party applications and WLAN (WIreless LAN) setup programs of a system) for connecting a WIreless hotspot (e.g., a Wi-Fi (WIreless Fidelity) hotspot) in a terminal generally run in the background, and when it is monitored that the terminal has a connectable Wi-Fi hotspot, the third party applications pop a window to the user to guide the user to enter the application and use the application to perform Wi-Fi hotspot connection. Because the third-party application performs popup guide connection when monitoring that an available hotspot exists, popup guide is not accurate and user operation is easily disturbed, and the third-party application is operated without judging the third-party application to connect the hotspot, the third-party application is easily connected to an unsafe hotspot, so that loss is caused to the user, and user experience is very poor.
Disclosure of Invention
In view of this, embodiments of the present application provide a method, a device, and a medium for connecting a wireless hotspot, so as to solve the problem in the prior art that when a connectable wireless hotspot is monitored, a user pops a window without determining an application of the connection hotspot, and the popup is not only inaccurate and easily interferes with user operations, but also easily connects to an unsafe hotspot to cause a loss to the user, thereby causing very poor user experience.
The embodiment of the application adopts the following technical scheme:
the embodiment of the application provides a wireless hotspot connection method, which comprises the following steps:
monitoring the connection state of a wireless hotspot in a terminal;
if the connection state is monitored to be changed, acquiring a packet name of a first application and a packet name of a second application, wherein the first application comprises an application used for creating the connection state in the terminal, and the second application comprises an application used for running a foreground interface in the terminal;
and determining whether the package name of the first application and the package name of the second application accord with a preset first connection strategy, and if so, displaying a guide interface.
Embodiments of the present application further provide a computer-readable storage medium, on which computer-readable instructions are stored, where the computer-readable instructions are executable by a processor to implement the foregoing wireless hotspot connection method.
The embodiment of the present application further provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and is characterized in that the processor implements the foregoing wireless hotspot connection method when executing the computer program.
The embodiment of the application adopts at least one technical scheme which can achieve the following beneficial effects: by monitoring the connection state of the wireless hotspot in the terminal and when the application connection hotspot is monitored, namely when the connection state of the wireless hotspot in the terminal is monitored to be changed, whether the application of the connection hotspot and the application of the operation foreground meet the connection strategy or not is obtained and determined, and then a user is pertinently guided to enter the application and use the application to surf the internet (such as wireless hotspot connection) through the guide interface, the safety of the user terminal connection hotspot can be ensured, and the situation that the user is interfered by popping up the window when the available wireless hotspot is detected can be avoided, so that the user can be more accurately popped up the window, the high-efficiency and better-experience wireless hotspot connection can be realized, and the terminal application can be better protected from being intercepted by third-party application.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a flowchart of a wireless hotspot connection method provided in embodiment 1 of the present application.
Fig. 2 is a schematic diagram of an application environment for implementing the wireless hotspot connection method provided in embodiment 2 of the present application.
Fig. 3 is a flowchart of a wireless hotspot connection method provided in embodiment 2 of the present application.
Fig. 4 is a flowchart of a wireless hotspot connection method provided in embodiment 3 of the present application.
Fig. 5 is a schematic diagram of an application environment for implementing the wireless hotspot connection method provided in embodiment 4 of the present application.
Fig. 6 is a flowchart of a wireless hotspot connection method provided in embodiment 4 of the present application.
Fig. 7 is a flowchart illustrating a guidance interface when a frequency control policy is adopted in the wireless hotspot connection method provided in embodiment 5 of the present application.
Fig. 8 is a flowchart illustrating a guidance interface when a timeout policy is adopted in the wireless hotspot connection method provided in embodiment 5 of the present application.
Fig. 9 is a schematic structural diagram of a wireless hotspot connection system according to embodiment 6 of the present application.
Detailed Description
In order to achieve the purpose of the present application, embodiments of the present application provide a wireless hotspot connection method, device, and medium. The wireless hotspot connection method comprises the steps of monitoring the connection state of a wireless hotspot in a terminal all the time at the background, wherein the wireless hotspot is in connection and is successfully connected, and when the connection state is monitored to be changed, timely acquiring the packet name of an application creating the wireless hotspot connection state and the packet name of a foreground application, and judging whether the two applications meet a preset connection strategy or not, so that a popup window can be targeted to a user, the popup window guides the user to enter the application for internet surfing experience, the user can be effectively prevented from being interfered by the popup window, the safety of the connection hotspot is ensured, and the user experience is further ensured.
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Example 1
In the wireless hotspot connection method provided in the embodiment of the application, from the perspective of equipment, the execution main body is a terminal, where the terminal may be a computer, a mobile phone, a tablet computer, an intelligent watch, an intelligent bracelet, or other equipment having a wireless hotspot connection function, and the application is not particularly limited thereto.
In addition, according to the wireless hotspot connection method provided in the embodiment of the application, from the viewpoint of a program, the execution main body may be a program installed in the terminal, for example, an application related to a wireless hotspot (e.g., a Wi-Fi hotspot), an instant messaging application, and the like. The application program may be in the form of an application client (such as an app (application program)) or a web page, and the like, and this application is not particularly limited in this respect. The following description will be given taking as an example that the program is a third application program preset in the terminal.
As shown in fig. 1, the wireless hotspot connection method provided in the embodiment of the present application includes the following steps:
and S102, monitoring the connection state of the wireless hotspot in the terminal.
In a specific implementation, the third application may run in the background, and then monitor the connection status of the wireless hotspot by monitoring information about connection to the wireless hotspot in the terminal in the background, for example, in an android system, the system provides five connection statuses of Wi-Fi, which are: the method includes the steps of enabling (connected), disabling (closed), disabling (connected), disabling (closed), and unknown (unknown), especially the states of the enabling, because different terminal device manufacturers may issue different broadcast messages, at this time, the states of the enabling may include a plurality of states, such as connection being opened, authentication being in, IP being acquired, connection being successful, and the like, and at this time, the application may monitor information related to the connection of the wireless hotspot in the terminal all the time in the background, so that the connection state of the wireless hotspot in the terminal and the change situation thereof can be known in real time.
In this embodiment, the connection state of the wireless hotspot monitored by the third application program may include at least one of an enabling state and an enabled state, and other states may or may not be monitored, so that the monitoring range may be narrowed, overhead, such as resource occupancy rate and power consumption, brought to the terminal by monitoring may be reduced, and a user may not perceive an influence caused by monitoring when using the terminal, so as to ensure user experience.
And step S104, if the change of the connection state of the wireless hotspot is monitored, executing step S106.
Thus, by judging the connection state monitored in step S102, the third application program can timely know whether an application is connecting to the wireless hotspot in the terminal and whether the application has successfully connected to the wireless hotspot, so that corresponding processing can be performed in a targeted manner, for example, when the monitored connection state does not change, the monitoring can be ended, and the third application program can continue to be in a background monitoring state, i.e., return to step S102, so as to timely know the connection state and the change condition of the wireless hotspot in the terminal next time.
Step S106, acquiring a package name of a first application and a package name of a second application, wherein the first application comprises an application used for creating the connection state in the terminal, and the second application comprises an application used for running a foreground interface in the terminal.
The first application can be an application used for connecting a wireless hotspot, an instant messaging application and the like, and the application is provided with an application for connecting the wireless hotspot, such as a system WLAN configuration program of a terminal and a networking application program of a third party installed on the terminal; in this embodiment, the second application may be an application related to wireless hotspot connection, or may also be an application unrelated to wireless hotspot connection, that is, the second application may be the same as the first application, or may be different from the first application; the second application may be an active application in addition to being a foreground application. Therefore, the package name of the first application and the package name of the second application are obtained, so that corresponding processing can be conveniently carried out on different networking applications.
Step S108, determining whether the packet name of the first application and the packet name of the second application accord with a preset first connection strategy, and if so, executing step S110. After the connection strategy is determined not to be met, the monitoring is finished, and the third application program is enabled to be in the background monitoring state continuously.
And step S110, displaying a guide interface.
In the embodiment, the user is more accurately and effectively popped up the window by determining whether the first application and the second application conform to the first connection policy, so that the user is guided to enter and surf the internet by using the third application program.
The first connection policy is used to determine whether to display the guidance interface, that is, whether to pop up a window, so as to guide the user of the terminal to enter a third application program through the pop up window, and enable the user to use the third application program to surf the internet, where the surfing may include, for example, the user may perform the wireless hotspot connection, manage configuration data of the wireless hotspot, switch other wireless hotspots with better network quality, and the like according to the pop up window guidance.
In a specific implementation, the first connection policy may be preset according to a specific application scenario, for example, in order to reduce interference of the popup window to the user and influence user experience, at this time, the first connection policy may specify the first application and/or the second application that can be popup, or may specify the first application and/or the second application that cannot be popup, for example, the first connection policy may specify that the first application satisfies a preset first condition and/or the second application satisfies a preset second condition before popup is performed, where the first condition and the second condition may be the same or different.
Further, in determining whether the first application and the second application conform to the first connection policy, a white list or a black list may be used, where the white list may be used to store packet names of applications that do not need popup, and the black list may be used to store packet names of applications that need popup, and then whether popup is needed is determined by determining whether the packet names of the first application and the second application belong to the white list or the black list. Here, the white list or the black list may be customized by the user or defined by the service provider, such that the package name of the application requiring pop-up window may be placed in the black list, and the package name of the application not requiring pop-up window may be placed in the white list, where the white list or the black list may be preset according to a specific application scenario, for example, the black list may include the application that the user (or the service provider) considers to require pop-up window, such as the application that the user (or the service provider) considers to be at risk, the application that has confirmed to have a security risk (such as a known phishing application, an application that cannot pass security authentication, etc.), the application that has a high security risk (such as an application that is not securely authenticated), and the like, for example, the black list may also include the application that the user cannot tolerate pop-up window interference, such as a video playing application, a game application, such as the white list may include the application that the user (or the service provider) considers to be secure, for example, the white list may also include applications that the user can tolerate pop-window interference, which is not described here.
In a specific implementation, a manner of presetting a blacklist in a connection policy may be preferred, and specifically, the first connection policy includes a blacklist, where the blacklist is used to store a package name of an application that needs to show the guidance interface. Thus, the step of determining whether the package name of the first application and the package name of the second application conform to the preset first connection policy may include: firstly, whether the package name of the first application is the same as that of the second application is determined, so that whether the system application automatically connects the hotspot in a background or whether a third-party application installed in the system connects the hotspot in a foreground is determined. Then, after determining that the package name of the first application is the same as the package name of the second application, further determining whether the package name of the second application belongs to the blacklist. Therefore, whether the application of the connection hotspot and the foreground application accord with the connection strategy or not is determined firstly, and then popup is performed, so that the user can be effectively prevented from being interfered by popup, and the user experience is ensured.
It should be noted that, as those skilled in the art will understand, the guiding interface may be changed according to the connection situation of the wireless hotspot after guiding the user to enter the third application program and when guiding the user to surf the internet in the third application program, and the description is not provided herein.
In this embodiment, through the above steps S102 to S110, first, the third application program monitors the connection state of the wireless hotspot in the terminal all the time in the background, and when it is monitored that the connection state changes, obtains the packet name of the application creating the connection state, that is, the packet name of the first application, and obtains the packet name of the foreground application running the foreground interface, that is, the packet name of the second application, and then determines the popup window by determining whether the packet name of the first application and the packet name of the second application conform to the connection policy. In this embodiment, through a preset connection policy, when it is found that the first application and the second application do not conform to the connection policy in the hotspot connection, the user is guided to enter the hotspot by popping the window to the user in time and the third application program is used for surfing the internet, which not only can effectively prevent the terminal from being connected to an unsafe or unauthorized wireless hotspot, ensure the security of the terminal in connection with and using the hotspot, but also can prevent the user from being disturbed by the popping the window to the user when the user detects an available wireless hotspot, thereby popping the window to the user more accurately, realizing efficient and better-experienced surfing the internet, and better protecting the application in the terminal from being intercepted by the second application (such as the third-party application).
It should be noted that, in this embodiment, the obtaining of the package name of the first application and the obtaining of the package name of the second application may be performed simultaneously or sequentially, and this is not specifically limited herein; the first application may be the same as the second application, and the second application is an application running a foreground interface and is also an application for connecting a wireless hotspot, that is, the second application is connecting the wireless hotspot in a running mode of the foreground interface. Although the second application may be the user actively connecting to the wireless hotspot, the second application may also be the second application automatically connecting to the wireless hotspot, so that it is required to determine whether the first application and the second application conform to the connection policy, and a more accurate and efficient popup to the user is realized.
Further, in a specific implementation, when the pop-up window is displayed, the guide interface at least partially covers the foreground interface, for example, the size of the guide interface may be smaller than or equal to the size of the foreground interface according to a display requirement of the guide information. In addition, in the whole guiding process, at least one or more display modes of a top pop-up window, a desktop pop-up window and a bottom pop-up window can be preferably performed on a foreground interface of the terminal, wherein the pop-up window can be a text box or a graphical interface. Furthermore, the guide interface can be a transparent interface, so that the guide interface does not cover the content of the foreground interface, the user can still see the content of the foreground interface, and the influence of popup on the user experience can be reduced.
Furthermore, when the popup window is performed, the permission of the popup window application can be improved, that is, the permission of the guide interface is higher than or equal to the permission of the foreground interface, so that the guide interface can better cover the foreground interface.
Example 2
The wireless hotspot connection method provided by the embodiment of the application is to set the first connection policy to a server (such as a cloud server) on the basis of the embodiment 1, as shown in fig. 2, an application environment diagram for implementing the wireless hotspot connection method provided by the embodiment of the present application is shown, wherein, a stable communication connection can be established between the hotspot 2 and the server 3 through a network (which can be a wired communication network or a wireless communication network), thus, when the terminal 1 is in the coverage area of the hotspot 2, the first application running in the background will create a connection state of the corresponding wireless hotspot, at this time, the third application program preset in the terminal 1 and in background listening executes the wireless hotspot connection method provided by the embodiment of the application, in the figure, the terminal 1 may also establish a connection with the server 3 through a mobile data network, so as to further ensure reliable communication between the terminal 1 and the server 3.
As shown in fig. 3, in the wireless hotspot connection method provided in the embodiment of the present application, step S108 may include the following steps:
and S1081, transmitting the packet name of the first application and the packet name of the second application to the server, so that the server can record the application connected with the hot spot and foreground application in the terminal in real time, and the server can adjust the connection strategy in time according to the record, thereby performing popup more specifically.
Further, before step S1081, that is, before the packet name of the first application and the packet name of the second application are transmitted to the server, it may be determined whether a wireless hotspot in the terminal is available, that is, it may be determined whether the wireless hotspot can be normally used for transmitting data between the terminal and the server, so as to ensure that the third application program can transmit the packet name of the first application and the packet name of the second application to the server in time, and save mobile data traffic for the user. In addition, when the wireless hotspot of the terminal is determined to be unavailable, whether a mobile data network of the terminal is available or not can be further determined, namely whether the mobile data network can be normally used for transmitting data between the terminal and the server side or not is determined, and then the packet name of the first application and the packet name of the second application can be transmitted to the server side through the mobile data network in time when the hotspot is unavailable. The mobile data network herein may comprise a mobile communication cellular network such as 2G, 3G, 4G, etc. provided by a communication operator.
Further, before step S1081, that is, before the packet name of the first application and the packet name of the second application are transmitted to the server, it may be determined whether the packet name of the second application is the same as the packet name of the first application, so that after determining that the packet name of the second application is the same as the packet name of the first application, step S1081 is performed.
Step S1083, receiving a confirmation result returned by the server, where the confirmation result is a result of the server confirming whether the packet name of the first application and the packet name of the second application conform to the first connection policy.
Step S1085, determining whether the packet name of the first application and the packet name of the second application conform to the first connection policy according to the received confirmation result, and if the confirmation result is that the first connection policy is satisfied, performing step S110. If the confirmation result does not accord with the first connection strategy, the monitoring can be finished, and the third application program is enabled to be in the background monitoring state continuously.
In this embodiment, the first connection policy is set in the server, and the server is further used to determine whether the first application and the second application conform to the connection policy, and then whether to pop up the window is determined according to a result returned by the server. At the moment, the set connection strategy can be updated in time through the server, so that the received confirmation result returned by the server is accurate and effective, and the popup window can be more accurately and effectively performed on the user of the terminal, thereby not only further ensuring the safety of the terminal connection hotspot, but also further reducing the interference of the popup window on the user and better protecting the terminal application from being intercepted by the second application.
Example 3
The wireless hotspot connection method provided in the embodiment of the present application is substantially the same as that in embodiment 2, except that after step S1083, it is further determined whether the reception in step 1083 fails, that is, whether the reception of the confirmation result is successful is determined, so as to ensure that communication between the server and the terminal can be reliably performed, thereby ensuring that the wireless hotspot connection method can be smoothly performed.
As shown in fig. 4, the wireless hotspot connection method provided in the embodiment of the present application may further include: a step S1084 is added between the step S1083 and the step S1085, and accordingly, the wireless hotspot connecting method further includes a step S1086.
And step S1084, judging whether the confirmation result is successfully received, if so, executing step S1085, and otherwise, executing step S1086.
It should be noted that, as those skilled in the art should understand, when determining whether the confirmation result is successfully received, a determination policy may be set according to a specific application scenario, for example, whether communication is overtime, whether communication has a fault, and the like may be determined, and a description of this is not repeated here.
Step S1086, judging whether the packet name of the first application and the packet name of the second application conform to a second connection strategy, wherein the second connection strategy is set in the terminal.
By setting the second connection policy in the terminal and by adding step S1084 and step S1086, it is possible to determine whether or not the popup is required by using the second connection policy in the terminal even when the server returns a failure.
It should be noted that the second connection policy herein may be preset according to a specific application scenario, and may also be preset according to the first connection policy in the server, and a description thereof is not further provided herein.
Further, when the communication connection between the terminal and the server is available, the second connection strategy is updated to the first connection strategy of the server, so that the timeliness and effectiveness of the second connection strategy are ensured. Specifically, the first connection policy sent by the server is received; and updating the second connection strategy according to the received first connection strategy. The connection strategy in the terminal is updated to the latest connection strategy of the server side in time, and then the popup window can be more accurately and effectively performed on the user of the terminal, so that the safety of the terminal connection hotspot can be further ensured, the interference of the popup window on the user can be further reduced, and the terminal application can be better protected from being intercepted by the second application.
It should be noted that the update mode of the connection policy between the terminal and the server may be that the terminal actively requests the server for update information, or that the terminal passively receives update information pushed by the server, which is not specifically limited herein.
Example 4
The wireless hotspot connection method provided in the embodiment of the application is based on embodiment 1, and the first connection strategy is set in the terminal, so that the implementation cost of an application scene can be further reduced. As shown in fig. 5, an application environment schematic diagram is provided for implementing the wireless hotspot connection method provided in this embodiment, so that when the terminal 1 is in a coverage area of the hotspot 2, the first application running in the background will create a connection state of a corresponding wireless hotspot, and at this time, a third application program preset in the terminal 1 and monitored in the background executes the wireless hotspot connection method provided in this embodiment.
Further, after the first connection policy is set in the terminal, as shown in fig. 6, the step S108 of the wireless hotspot connection method provided in this embodiment of the application, that is, determining whether the packet name of the first application and the packet name of the second application conform to a preset first connection policy, may include:
step S1087, judging whether the package name of the second application is the same as the package name of the first application, if so, executing step S1088. When the judgment result is different, the monitoring can be ended, and the third application program is enabled to be in the background monitoring state continuously.
Step S1088, judging whether the package name of the second application conforms to the first connection strategy. Similarly, when the judgment result is no, the monitoring can be ended, and the third application program is enabled to be in the background monitoring state continuously.
Example 5
The wireless hotspot connection method provided in the embodiment of the application is based on any one of embodiments 1 to 4, and can timely acquire the influence of the popup window on the user by acquiring the condition of the popup window processed by the user, so that different control strategies can be adopted during popup window, more accurate popup window can be realized, and the influence of the popup window on the user is smaller.
Specifically, when the guidance interface is displayed, the guidance interface may be displayed according to a frequency control policy, where the frequency control policy is used to determine whether the number of times of closing the guidance interface by a user of the terminal in a preset first time period does not exceed a first time threshold, and if so, continue to display the guidance interface. At this time, as shown in fig. 7, step S110 may include:
step S1101, when the guidance interface is displayed, acquiring a number of times that the guidance interface is closed by a user of the terminal within a preset first time period, where the first time period may be preset according to an actual application scenario, and is not specifically limited herein;
step S1102, determining whether the closing frequency does not exceed a first frequency threshold, if so, performing step S1103, otherwise, performing step S1104;
step S1103, displaying a guidance interface, where the guidance interface is used to guide a user to connect to the wireless hotspot, where the first time threshold may be preset according to an actual application scenario, and is not specifically limited herein.
And step S1104, ending displaying the guide interface.
Through the frequency control strategy, whether the popup interferes with the user or not can be timely known, for example, the user closes the popup for many times, at this time, it can be known that the reason why the popup interferes with the user is that the user closes the popup, or the user does not need to be guided to enter a third application program through the popup to surf the internet, at this time, the display of the guide interface is finished through the step S1104, and the user can be effectively prevented from being excessively interfered by the popup.
Specifically, when the guidance interface is displayed, the guidance interface may be displayed according to a timeout strategy, where the timeout strategy is used to determine whether the guidance interface receives a trigger signal of a user of the terminal within a preset second time period, and if so, the guidance interface continues to be displayed. At this time, as shown in fig. 8, step S110 may include:
step S1105, when displaying the guidance interface, obtaining a trigger signal of the user of the terminal, which is received by the guidance interface within a preset second time period, where the second time period may be preset according to an actual application scenario, and is not specifically limited herein; the trigger signal may include a signal for a user to operate the guide interface according to information displayed by the guide interface.
Step S1106, determining whether the guide interface receives the trigger signal within a preset second time period, if so, performing step S1107, and if not, performing step S1108.
And step S1107, continuing to display the guide interface.
And step S1108, ending displaying the guide interface.
Through the timeout strategy, whether the popup can effectively guide the user to enter the third application program for surfing the internet or not can be timely known, for example, the user does not operate the popup for a long time, at this time, the user can know that the user does not surf the internet according to the popup, at this time, the step S1108 can be finished to display the guide interface so as to avoid unnecessary overhead, such as resource occupation and power waste, brought to the system by the popup, and when the user performs related operation according to the guide interface within a preset second time period, namely, the guide interface receives a trigger signal of the user within the second time period, the guide interface is timely and continuously displayed, so that the user can surf the internet in time according to the guide of the third application program, and user experience is guaranteed.
Example 7
Based on the same inventive concept, as shown in fig. 9, an embodiment of the present application provides a wireless hotspot connection system, which includes a monitoring module 10, an obtaining module 20, a determining module 30, and a displaying module 40. The monitoring module 10 is configured to monitor a connection state of a wireless hotspot in the terminal, and call the obtaining module 20 when it is monitored that the connection state changes; the obtaining module 20 is configured to obtain a package name of a first application and a package name of a second application, where the first application includes an application in the terminal for creating the connection state, and the second application includes an application in the terminal for running a foreground interface; the determining module 30 is configured to determine whether the package name of the first application and the package name of the second application conform to a preset first connection policy, and if so, invoke the displaying module 40; the display module 40 is used for displaying the guide interface.
Based on the same inventive concept, embodiments of the present application provide a computer-readable storage medium, on which computer-readable instructions are stored, where the computer-readable instructions can be executed by a processor to perform the steps of the wireless hotspot connection method in any one of embodiments 1 to 6.
More specific examples, among others, that the readable storage medium may employ may include, but are not limited to: a portable disk, a hard disk, random access memory, read only memory, erasable programmable read only memory, optical storage device, magnetic storage device, or any suitable combination of the foregoing.
In a possible implementation manner, the embodiments of the present application may also be implemented in a form of a program product, where the program product includes program code, and when the program product runs on a terminal device, the program code is configured to enable the terminal device to execute steps of implementing the wireless hotspot connection method according to any one of embodiments 1 to 6.
Where program code for carrying out the invention is written in any combination of one or more programming languages, the program code may be executed entirely on the user device, partly on the user device, as a stand-alone software package, partly on the user device and partly on a remote device or entirely on the remote device.
Based on the same inventive concept, an embodiment of the present application provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, where the processor implements the steps of the wireless hotspot connection method described in any one of embodiments 1 to 6 when executing the computer program.
In the embodiments of the present disclosure, it should be understood by those skilled in the art that the terms "first", "second" and "third" do not have actual limiting meanings, but are used for convenience of distinction and to prevent confusion of concepts.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (18)

1. A wireless hotspot connection method is characterized by comprising the following steps:
monitoring the connection state of a wireless hotspot in a terminal;
if the connection state is monitored to be changed, acquiring a packet name of a first application and a packet name of a second application, wherein the first application comprises an application used for creating the connection state in the terminal, and the second application comprises an application used for running a foreground interface in the terminal;
determining whether the package name of the first application and the package name of the second application conform to a preset first connection strategy, wherein the first connection strategy comprises a blacklist, and the blacklist is used for storing the package name of the application needing to display a guide interface; and if so, displaying a guide interface so as to guide the user to enter and use a third application program to surf the internet.
2. The wireless hotspot connection method of claim 1, wherein the first connection policy is set at a server;
the determining whether the package name of the first application and the package name of the second application conform to a preset first connection policy includes:
transmitting the package name of the first application and the package name of the second application to the server;
and receiving a confirmation result returned by the server, wherein the confirmation result is a result of confirming whether the packet name of the first application and the packet name of the second application accord with the first connection strategy or not by the server.
3. The wireless hotspot connection method of claim 2, wherein before transmitting the packet name of the first application and the packet name of the second application to the server, the wireless hotspot connection method further comprises: and determining whether the package name of the second application is the same as the package name of the first application, and if so, executing the step of transmitting the package name of the first application and the package name of the second application to the server.
4. The wireless hotspot connection method of claim 2, wherein when receiving the confirmation result returned by the server fails, the wireless hotspot connection method further comprises: and judging whether the packet name of the first application and the packet name of the second application accord with a second connection strategy, wherein the second connection strategy is arranged in the terminal.
5. The wireless hotspot connection method of claim 4, further comprising:
receiving the first connection strategy sent by the server;
and updating the second connection strategy according to the received first connection strategy.
6. The wireless hotspot connection method of claim 2, wherein before transmitting the packet name of the first application and the packet name of the second application to the server, the wireless hotspot connection method further comprises: determining that the wireless hotspot is available.
7. The wireless hotspot connection method of claim 6, wherein upon determining that the wireless hotspot is unavailable, the wireless hotspot connection method further comprises: determining that a mobile data network of the terminal is available.
8. The wireless hotspot connection method of claim 1, wherein the first connection policy is disposed in the terminal.
9. The wireless hotspot connection method of claim 8, wherein the determining whether the packet name of the first application and the packet name of the second application conform to a preset first connection policy comprises:
and judging whether the package name of the second application is the same as that of the first application, and if so, judging whether the package name of the second application conforms to the first connection strategy.
10. The wireless hotspot connection method of claim 1, wherein the first connection policy comprises a blacklist, the blacklist being used to store packet names of applications that need to show the guidance interface;
the determining whether the package name of the first application and the package name of the second application conform to a preset first connection policy includes: and determining whether the packet name of the first application is the same as the packet name of the second application, and if so, determining whether the packet name of the second application belongs to the blacklist.
11. The wireless hotspot connection method of claim 1, wherein the privilege of the boot interface is higher than or equal to the privilege of the foreground interface when the boot interface is presented.
12. The wireless hotspot connection method of claim 1, wherein the guide interface at least partially overlays the foreground interface when the guide interface is presented.
13. The wireless hotspot connection method of claim 12, wherein the guidance interface is displayed in a manner comprising at least one of a top pop-up window, a desktop pop-up window, and a bottom pop-up window.
14. The wireless hotspot connection method of claim 13, wherein the guide interface is a transparent interface when the guide interface is presented.
15. The wireless hotspot connection method of claim 1, wherein the presenting a guidance interface comprises: and displaying the guide interface according to a frequency control strategy, wherein the frequency control strategy is used for judging whether the closing times of the guide interface closed by a user of the terminal in a preset first time period do not exceed a first time threshold, and if so, continuing to display the guide interface.
16. The wireless hotspot connection method of claim 1, wherein the presenting a guidance interface comprises: and displaying the guide interface according to an overtime strategy, wherein the overtime strategy is used for judging whether the guide interface receives a trigger signal of a user of the terminal within a preset second time period, and if so, continuing to display the guide interface.
17. A computer readable storage medium having computer readable instructions stored thereon which are executable by a processor to implement the wireless hotspot connection method of any one of claims 1 to 16.
18. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the wireless hotspot connection method of any one of claims 1 to 16 when executing the computer program.
CN201810840170.9A 2018-07-27 2018-07-27 Wireless hotspot connection method, electronic device and medium Active CN108990064B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810840170.9A CN108990064B (en) 2018-07-27 2018-07-27 Wireless hotspot connection method, electronic device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810840170.9A CN108990064B (en) 2018-07-27 2018-07-27 Wireless hotspot connection method, electronic device and medium

Publications (2)

Publication Number Publication Date
CN108990064A CN108990064A (en) 2018-12-11
CN108990064B true CN108990064B (en) 2022-03-01

Family

ID=64551357

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810840170.9A Active CN108990064B (en) 2018-07-27 2018-07-27 Wireless hotspot connection method, electronic device and medium

Country Status (1)

Country Link
CN (1) CN108990064B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126562A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of pop-up hold-up interception method and terminal
CN107548064A (en) * 2016-06-29 2018-01-05 上海连尚网络科技有限公司 For the method and apparatus for the security information for providing WAP
CN107979843A (en) * 2017-12-08 2018-05-01 上海连尚网络科技有限公司 A kind of Wi-Fi hotspot connection processing method, equipment and medium in terminal
CN108076464A (en) * 2017-12-13 2018-05-25 上海连尚网络科技有限公司 A kind of Wi-Fi hotspot connection bootstrap technique, equipment and medium in terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2008033913A2 (en) * 2006-09-12 2008-03-20 Wayport, Inc. Providing location-based services without access point control

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106126562A (en) * 2016-06-15 2016-11-16 广东欧珀移动通信有限公司 A kind of pop-up hold-up interception method and terminal
CN107548064A (en) * 2016-06-29 2018-01-05 上海连尚网络科技有限公司 For the method and apparatus for the security information for providing WAP
CN107979843A (en) * 2017-12-08 2018-05-01 上海连尚网络科技有限公司 A kind of Wi-Fi hotspot connection processing method, equipment and medium in terminal
CN108076464A (en) * 2017-12-13 2018-05-25 上海连尚网络科技有限公司 A kind of Wi-Fi hotspot connection bootstrap technique, equipment and medium in terminal

Also Published As

Publication number Publication date
CN108990064A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
US10021732B2 (en) Network access method, device, and system
CN104333863B (en) Connection management method and device, electronic equipment
EP3166349A1 (en) Internet access traffic sharing method, device and terminal
CN108055687B (en) Wireless network connection method and device and terminal equipment
EP3582549B1 (en) Network connection method and apparatus
CN108076464B (en) WiFi hotspot connection guiding method, device and medium for terminal
US20180332517A1 (en) Network Handover Method and Apparatus
EP2941060A1 (en) Network access method, device, and system
US10368319B2 (en) Method and apparatus for adjusting transmit power in GSM
CN113660653B (en) Transmission method and device and electronic equipment
CN108307485B (en) Wireless network scanning method and device, terminal equipment and storage medium
CN108990064B (en) Wireless hotspot connection method, electronic device and medium
US11259303B2 (en) Method for managing a high frequency connection a terminal and a base station
CN110087225B (en) Message processing method and related device
US20230156799A1 (en) Transmission control method, apparatus, and communication device
CN112789877B (en) Cell interference detection method, device, mobile terminal and storage medium
CN108337715B (en) Wireless network connection method, device, terminal equipment and storage medium
CN114696975B (en) Rate matching method and device
CN115243345A (en) Cell selection method, device, terminal equipment and readable storage medium
CN105451348B (en) Network control method and device
CN110535588B (en) Method, device, equipment, system and storage medium for controlling execution of configuration signaling
CN109743456B (en) Data transmission method and related device
CN113747559B (en) Method and device for reporting power headroom, terminal and readable storage medium
CA3081114A1 (en) Integrity protection control method, network device and computer storage medium
WO2024104078A1 (en) Measurement relaxation method, and terminal and network-side device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210419

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 200120 Shanghai city Pudong New Area mud Town Road No. 979 Building 2 Hon

Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant