CN109997378B - Network sharing method and terminal - Google Patents
Network sharing method and terminal Download PDFInfo
- Publication number
- CN109997378B CN109997378B CN201780073316.5A CN201780073316A CN109997378B CN 109997378 B CN109997378 B CN 109997378B CN 201780073316 A CN201780073316 A CN 201780073316A CN 109997378 B CN109997378 B CN 109997378B
- Authority
- CN
- China
- Prior art keywords
- terminal
- wireless network
- network
- bluetooth
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application provides a network sharing method and a terminal. The first terminal acquires the information of the wireless network and sends the information of the wireless network to the second terminal. The first terminal receives a request for sharing the wireless network sent by the second terminal, the first terminal starts a Bluetooth personal area network function, and the Bluetooth personal area network function is used for the second terminal to be connected with the first terminal through Bluetooth to access the wireless network. The first terminal sends the information of the wireless network to the second terminal and shares the wireless network with the second terminal through the Bluetooth personal area network function according to the request sent by the second terminal for sharing the wireless network, so that the wireless network can be accessed through the Bluetooth personal area network of the first terminal even if the second terminal is not in the coverage range of the wireless network. Which is equivalent to enlarging the coverage of the wireless network.
Description
The present application claims priority of chinese patent application entitled "a method and apparatus for improving WiFi signal coverage" filed by the chinese patent office at 30/12/2016, application number 201611263410.0, the entire contents of which are incorporated herein by reference.
Technical Field
The present application relates to the field of communications, and in particular, to a network sharing method and a terminal.
Background
Wireless fidelity (Wi-Fi) is a technology for accessing a terminal to a network through an Access Point (AP), and can provide wireless network access for the terminal.
However, because the coverage of a Wi-Fi network is limited, terminals that are not within the coverage of the Wi-Fi network cannot access the Wi-Fi network. Therefore, how to improve the coverage of the Wi-Fi network becomes a problem to be solved urgently at present.
Disclosure of Invention
The application provides a method and a terminal for network sharing, and aims to solve the problem of how to improve the coverage of Wi-Fi.
In order to achieve the above object, the present application provides the following technical solutions:
a first aspect of the present application provides a network sharing method, including: the first terminal acquires the information of the wireless network and sends the information of the wireless network to the second terminal. The first terminal receives a request for sharing the wireless network sent by the second terminal, the first terminal starts a Bluetooth personal area network function, and the Bluetooth personal area network function is used for the second terminal to be connected with the first terminal through Bluetooth to access the wireless network. The first terminal sends the information of the wireless network to the second terminal and shares the wireless network with the second terminal through the Bluetooth personal area network function according to the request sent by the second terminal for sharing the wireless network, so that the wireless network can be accessed through the Bluetooth personal area network of the first terminal even if the second terminal is not in the coverage range of the wireless network. Which is equivalent to enlarging the coverage of the wireless network.
A second aspect of the present application provides a terminal, which is a first terminal, including: and the processor is used for acquiring the information of the wireless network. And the communication component is used for sending the information of the wireless network to a second terminal and receiving a request for sharing the wireless network sent by the second terminal. The processor is further configured to start a bluetooth personal area network, where the bluetooth personal area network is used for the second terminal to access the wireless network through bluetooth connection with the terminal. The terminal can use the Bluetooth personal area network to share the network for the second terminal, and even if the second terminal is not in the coverage range of the wireless network, the wireless network can be accessed through the Bluetooth personal area network of the first terminal. Which is equivalent to enlarging the coverage of the wireless network.
In one implementation, the sending, by the first terminal, the information of the wireless network to the second terminal includes: the first terminal broadcasts a first message by using Bluetooth, wherein the first message comprises the information of the wireless network, and the information of the wireless network comprises the name of the wireless network and the physical address of the wireless network. Because bluetooth is a common short-distance transmission mode, and because the information of the wireless network is broadcasted through bluetooth and the wireless network is shared by using a bluetooth personal area network, the wireless network has consistency in technical implementation, and therefore, the method has the advantage of easy implementation.
In one implementation, the first message further includes: a signal strength of the wireless network detected by the first terminal. The advantage of sending the signal strength is that the second terminal can display the signal strength in a list of wireless networks, providing reference information for the user to select a wireless network.
In one implementation, the receiving, by the first terminal, the request for sharing the wireless network sent by the second terminal includes: and the first terminal receives a first request message sent by the second terminal, wherein the first request message carries a request code, and the request code has the function of indicating the first terminal to verify whether the second terminal has the authority of passing through the Bluetooth sharing network. And if the verification request code is illegal, the first terminal sends a first response message to the second terminal, wherein the first response message is used for indicating that the request of the second terminal is rejected. The specific implementation mode of the first terminal for starting the Bluetooth personal area network is as follows: and if the request code is verified to be legal, the first terminal starts a Bluetooth personal area network. The purpose of authentication is to improve the security of network sharing.
In one implementation, before the first terminal turns on a bluetooth personal area network, the method further includes: and the first terminal receives a second request message sent by the second terminal, wherein the second request message carries an authentication request code, and the authentication request code is used for requesting Bluetooth authentication. And if the Bluetooth authentication is successful, the first terminal sends a second response message to the second terminal, wherein the second response message carries a Bluetooth authentication success code, otherwise, the first terminal sends a connection refusal message to the second terminal. The purpose of authentication is to improve the security of network sharing.
In one implementation, before the first terminal turns on a bluetooth personal area network, the method further includes: the first terminal receives the password of the wireless network sent by the second terminal, the first terminal verifies whether the password of the wireless network is correct or not by comparing the received password with the password stored locally, and if the password of the wireless network is incorrect, the first terminal sends a message of refusing to access the network to the second terminal. The specific mode of starting the Bluetooth personal area network by the first terminal is as follows: and if the password of the wireless network is correct, the first terminal starts a Bluetooth personal area network. The purpose of password authentication is to improve the security of network sharing.
A third aspect of the present application provides a network sharing method, including: the second terminal receives the information of the wireless network sent by the first terminal and sends a request for sharing the wireless network to the first terminal. And the second terminal accesses the wireless network through the Bluetooth personal local area network started by the first terminal. Because the wireless network can be accessed through the Bluetooth personal area network started by the first terminal, the wireless network can be accessed even if the first terminal is not in the coverage range of the wireless network, which is equivalent to the expansion of the coverage range of the wireless network.
A fourth aspect of the present application provides a terminal, which is a second terminal, including: the processor is used for receiving the information of the wireless network sent by the first terminal, sending a request for sharing the wireless network to the first terminal, and accessing the wireless network through the Bluetooth personal area network started by the first terminal. Because the wireless network can be accessed through the Bluetooth personal area network which is started by the first terminal, the wireless network can be accessed even if the first terminal is not in the coverage area of the wireless network.
In one implementation, the receiving, by the second terminal, the information of the wireless network sent by the first terminal includes: the second terminal receives a first message through Bluetooth, wherein the first message comprises the information of the wireless network, and the information of the wireless network comprises the name of the wireless network and the physical address of the wireless network.
In one implementation, the first message further includes: and the first mode of the first terminal accessing the wireless network is Wi-Fi.
In one implementation, the sending, by the second terminal, the request to the first terminal to share the wireless network includes: the second terminal sends a first request message for sharing the wireless network in a Bluetooth mode to the first terminal, and the first request message indicates that the wireless network is shared in the Bluetooth mode.
In one implementation manner, after the second terminal accesses the wireless network through a bluetooth personal area network established between the second terminal and the first terminal, the method further includes: and the second terminal sends a second message to a third terminal, wherein the second message comprises the information of the wireless network and a second mode of accessing the wireless network by the second terminal, and the second mode is Bluetooth. And the second terminal sends the information of the wireless network to the third terminal so that the third terminal can request the second terminal to share the wireless network.
In one implementation, after the second terminal sends the second message to the third terminal, the method further includes: and the second terminal receives a second request message sent by the third terminal, wherein the second request message indicates that the wireless network is shared by the Wi-Fi hotspot function. And the second terminal starts the Wi-Fi hotspot function of the third terminal, so that the third terminal accesses the wireless network by taking the second terminal as an access point, and the coverage range of the wireless network can be further expanded.
In one implementation manner, after the second terminal receives the information of the wireless network sent by the first terminal, the method further includes: the second terminal displays information of the wireless network in a list of wireless networks. The information of the wireless network is displayed in order to provide reference information for a user to select the wireless network.
In one implementation, the sending, by the second terminal, the request to the first terminal to share the wireless network includes: the second terminal sends a first request message to the first terminal, wherein the first request message carries a request code, and the request code has the function of indicating the first terminal to verify whether the second terminal has the authority of sharing the network through the Bluetooth. The purpose of authentication is to improve the security of network sharing.
In one implementation manner, before the second terminal accesses the wireless network through a bluetooth personal area network turned on by the first terminal, the method further includes: and the second terminal sends a second request message to the first terminal, wherein the second request message carries an authentication request code so as to request the first terminal to carry out Bluetooth authentication. The purpose of authentication is to improve the security of network sharing.
In one implementation manner, before the second terminal accesses the wireless network through a bluetooth personal area network turned on by the first terminal, the method further includes: and the second terminal displays a prompt box for inputting the password of the wireless network, and after receiving the password of the wireless network, the second terminal sends the password to the first terminal through Bluetooth. The purpose of password authentication is to improve the security of network sharing.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of an application scenario of a network sharing method disclosed in an embodiment of the present invention;
FIG. 2 is a diagram of a network sharing method according to an embodiment of the present invention;
fig. 3 is a schematic diagram illustrating a second terminal displaying a network shared by a first terminal during a network sharing method disclosed in an embodiment of the present invention;
FIG. 4 is a flowchart of another network sharing method according to an embodiment of the present invention;
FIG. 5 is a flowchart of another network sharing method according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
As shown in fig. 1, the router serves as an AP and provides a Wi-Fi network whose coverage has a radius X. The first terminal is within the coverage of the Wi-Fi network and therefore can access the Wi-Fi network. However, neither the second terminal nor the third terminal is within the coverage of the Wi-Fi network, and thus the Wi-Fi network cannot be accessed through the router. The terminals and routers shown in fig. 1 both follow the 802.11 protocol.
The technical scheme disclosed by the embodiment of the application aims to enable a second terminal which is not in the coverage range of the Wi-Fi network to access the Wi-Fi network through the Bluetooth personal area network of the first terminal by the aid of the first terminal transmitting Wi-Fi signals, further enable a third terminal which is not in the coverage range of the Wi-Fi network to negotiate a network access mode with the second terminal through a Bluetooth function, and enable the second terminal to access the Wi-Fi network as a Wi-Fi hotspot by the aid of the third terminal under the condition that the Bluetooth personal area network of the second terminal is occupied.
Fig. 2 is a specific process of sharing a network from the terminal 1 to the terminal 2 shown in fig. 1, including the following steps:
s201: the first terminal acquires information of the Wi-Fi network.
Specifically, the information of the Wi-Fi network includes but is not limited to: a name of the Wi-Fi network, a physical address of the Wi-Fi network, and a signal strength of the Wi-Fi network.
Specifically, the "Wi-Fi network" in S201 refers to a Wi-Fi network searched by the first terminal or connected to the first terminal.
S202: and the first terminal sends the information of the Wi-Fi network to the second terminal.
Optionally, the specific implementation process of S202 may include S2021-S2025:
s2021: and the first terminal encapsulates the information of the Wi-Fi network into Scan Result data.
The data structure of the Scan Result data is:
the SSID represents the name of the Wi-Fi network, the BSSID represents the physical address of the Wi-Fi network, the level represents the signal strength of the Wi-Fi network detected by the first terminal, and the level is an optional parameter. String represents a String type and int represents integer.
S2022: the first terminal broadcasts a first message by using Bluetooth, wherein the first message comprises information of the Wi-Fi network.
In addition to the information of the Wi-Fi network, optionally, the first message may further include, but is not limited to: the first terminal accesses the Wi-Fi network, and the access mode of the first terminal is specifically Wi-Fi or Bluetooth.
Specifically, as shown in table 1, the data structure of the message is:
TABLE 1
And the UUID is an identifier which marks that the information carries the information of the Wi-Fi network. The Special _ ID1 and the Access Method are a key-value pair, the Special _ ID1 represents the mode of the first terminal accessing the Wi-Fi network, the Access Method represents the value of the Special _ ID1, namely the specific mode of the first terminal accessing the Wi-Fi network, and the Special _ ID1 is specifically Wi-Fi or Bluetooth. The Special _ ID2 and the Scan Result are key-value pairs, the Special _ ID2 represents information of the Wi-Fi network, the Scan Result is a value of the Special _ ID2 and comprises specific contents of the information of the Wi-Fi network broadcasted by the terminal, and the specific data structure of the Scan Result is as described above.
For example, in this embodiment, the message broadcasted by the first terminal through the bluetooth is: UUID, Special _ ID1, Wi-Fi, Special _ ID2, { String SSID; StringBSSID; int level; }.
The first terminal can use a Bluetooth Low Energy (BLE) broadcast message carrying information of the Wi-Fi network, and specifically can call a BLE interface start Advertising broadcast message. BLE broadcasts messages periodically while connection requests from other devices can be accepted (bluetooth low energy connections are instantaneous and short, only for exchanging instantaneous data). And the transmission distance of the low-power consumption Bluetooth is longer and can reach 100 m. Bluetooth low energy may be used for message broadcasting, device discovery, and instant messaging. Besides the Bluetooth mode, the first terminal can also use other near field communication means to send the information of the Wi-Fi network to the second terminal.
It should be noted that, the first terminal uses the bluetooth broadcast message, and needs to start bluetooth first, in this embodiment, the first terminal may start bluetooth before S201 or S202, or may start bluetooth after S201 or S2021, which is not limited.
S2023: the second terminal scans the Bluetooth signal, and if the Bluetooth signal sent by the first terminal is scanned, the second terminal establishes Bluetooth connection with the first terminal.
Alternatively, if the first terminal sends information of the Wi-Fi network to the second terminal using other Near Field Communication means, such as Near Field Communication (NFC), the second terminal receives the information in a corresponding manner.
Optionally, the scanning of the bluetooth signal by the second terminal is triggered by an instruction to search for the Wi-Fi network, for example, an instruction to search for the Wi-Fi network is generated by a user operating on the second terminal, and the second terminal starts scanning the bluetooth signal according to the instruction. Alternatively, the second terminal automatically scans for bluetooth signals periodically.
S2024: the second terminal receives a first message broadcasted by the first terminal through Bluetooth.
S2025: and the second terminal obtains the information of the Wi-Fi network by analyzing the first message.
For example, the first message received by the second terminal is: UUID, Special _ ID1, Wi-Fi, Special _ ID2, { String SSID; string BSSID; int level; resolving a UUID, confirming that information of the Wi-Fi network is received, obtaining a mode that the first terminal accesses the Wi-Fi network according to the Special _ ID1 and the Wi-Fi, and setting the SSID according to the Special _ ID 2; string BSSID; int level; and acquiring the name, the physical address and the signal strength of the Wi-Fi network.
And the second terminal receives the information of the Wi-Fi network sent by the first terminal.
S203: the second terminal displays information of the Wi-Fi network.
Specifically, the second terminal displays the information of the Wi-Fi network in the local Wi-Fi network list, and optionally, the specific implementation manner includes S2031 to S2032:
s2031: the second terminal calculates the relative signal strength in combination with the signal strength of the bluetooth and the signal strength of the Wi-Fi network.
Methods of calculating relative signal strength include, but are not limited to: and multiplying the intensity of the Bluetooth signal by the signal intensity of the Wi-Fi network to obtain the relative signal intensity. The relative signal strength is the parameter level in the Scan Result data.
S2032: and the second terminal displays the analyzed information of the Wi-Fi network in a local Wi-Fi network list, and optionally displays the relative signal strength.
Fig. 3 is a list of Wi-Fi networks displayed on the first terminal and the second terminal, wherein the first terminal displays a Wi-Fi network with name "123" created by the home router, and the above steps are performed: the first terminal broadcasts the information of the Wi-Fi network through Bluetooth, the second terminal displays the information of the Wi-Fi network in a Wi-Fi list after receiving the information of the Wi-Fi network, and the Wi-Fi network with the name of 123 is also displayed on the second terminal.
After the second terminal searches for the Wi-Fi network, the user may select to connect to the Wi-Fi network on the second terminal, and taking fig. 4 as an example, the user may select a Wi-Fi network "123" from the list of Wi-Fi networks to connect to, thereby triggering a process in which the second terminal connects to the Wi-Fi network through a bluetooth technology.
It should be noted that S203 is an optional step, that is, the second terminal may also directly and automatically initiate a process of connecting to the received Wi-Fi network through bluetooth technology without displaying the received Wi-Fi network information.
A process of the second terminal connecting to the Wi-Fi network through bluetooth will be explained below.
S204: the second terminal sends a request to the first terminal to share the Wi-Fi network.
Optionally, if the first message received in S2022 includes Special _ ID1 and Access Method key-value pair, and the Access Method is Wi-Fi, it indicates that the first terminal accesses the Wi-Fi network through Wi-Fi, so that the second terminal requests the first terminal to Access the Wi-Fi network through bluetooth.
Optionally, the second terminal may directly request the first terminal to access the Wi-Fi network in a bluetooth manner without performing the determination.
Or, optionally, the second terminal requests sharing of the Wi-Fi network only from the first terminal, without specifying sharing in a bluetooth or Wi-Fi manner.
Optionally, the specific implementation manner of S204 is: the second terminal sends a first request message to the first terminal, wherein the first request message carries a request code, and the request code has the function of judging whether the second terminal has the authority of passing through the Bluetooth sharing network. The request code is preset and can be customized by a user, for example, the request code can be a combination of symbols and/or numerical values.
S205: the first terminal starts a Bluetooth personal area network (Bluetooth personal area network) and establishes Bluetooth connection with the second terminal.
Bluetooth personal area networks are a technology for sharing a network by means of bluetooth. After the bluetooth personal area network is started, in essence, the link layer of the second terminal is switched to the bluetooth module of the second terminal, data received by the bluetooth module can be forwarded to the Wi-Fi network through the link layer, and data received from the Wi-Fi network can also be forwarded out through the bluetooth module.
The specific implementation manner of S205 may be: the first terminal starts a Bluetooth personal area network by starting a Bluetooth network sharing switch of the first terminal. The second terminal starts the bluetooth pairing with the first terminal (as mentioned above, if the second terminal and the first terminal have sent a message using bluetooth, it indicates that the bluetooth pairing has been performed, the step of bluetooth pairing is skipped here, and if the first terminal and the second terminal do not establish a bluetooth connection, the pairing needs to be performed), and starts an "access network" switch of the bluetooth network with the first terminal, that is, the bluetooth connection is established with the second terminal.
Optionally, the first terminal starts the bluetooth personal area network function and establishes a bluetooth connection with the second terminal under the condition that the verification request code is legal (if the bluetooth connection between the first terminal and the second terminal is established before, the step of establishing the bluetooth connection is not executed any more), and if the verification request code is illegal, the first terminal sends a first response message to the second terminal, where the first response message is used to indicate that the request of the second terminal is rejected.
S206: the second terminal accesses the Wi-Fi network through the Bluetooth connection with the first terminal.
It should be noted that, if the first terminal does not access the Wi-Fi network before S206, the first terminal needs to access the Wi-Fi network before the second terminal establishes the bluetooth connection at S206.
As can be seen from fig. 2, although the second terminal is not within the coverage of the Wi-Fi network, the Wi-Fi network is accessed through the bluetooth personal area network of the first terminal. Which is equivalent to enlarging the coverage of the Wi-Fi network.
The mode of sharing the network through the Bluetooth can be realized only by utilizing the Bluetooth function of the terminal, and compared with the existing mode of improving the sending power of the hot spot, the mode of sharing the network through the Bluetooth can save the power and has lower radiation. Compared with the existing mode of using the Wi-Fi chip as the relay by improving the Wi-Fi chip, the method has better implementability and lower cost because the hardware is not upgraded.
Fig. 4 is a further network sharing method disclosed in the embodiment of the present application, which is different from fig. 2 in that: the first terminal carries out Bluetooth authentication and/or Wi-Fi password verification on the second terminal before starting a Bluetooth personal area network (Bluetooth personal area network) function.
The specific implementation of bluetooth authentication is as in S405-S2042:
s405: the second terminal sends a second request message to the first terminal by using a Bluetooth mode based on a general Attribute Profile (Generic Attribute Profile gatt), wherein the second request message carries an authentication request code to request the first terminal to perform Bluetooth authentication.
The authentication request code is used for requesting Bluetooth authentication. The authentication code is preset and can be customized by a user. For example, the authentication code may be a combination of symbols and/or values.
The Generic Attribute Profile (Generic Attribute Profile gatt) is a low power bluetooth protocol.
S406: and if the Bluetooth authentication is successful, the first terminal sends a second response message to the second terminal, wherein the second response message carries a Bluetooth authentication success code, and otherwise, the first terminal sends a connection refusal message to the second terminal.
The success code is used for indicating that the Bluetooth authentication is successful, is preset and can be customized by a user, and can be a combination of symbols and/or numerical values.
The purpose of bluetooth authentication is that the first terminal confirms that the second terminal has the authority to use bluetooth to connect with the first terminal, so as to improve the security of communication. S405-S406 are only one implementation of bluetooth function authentication between terminals, and the second terminal and the first terminal may also use other manners to perform bluetooth function authentication.
The Wi-Fi password verification process is as follows S407-S408:
s407: and the second terminal displays a prompt box for inputting the password of the Wi-Fi network, and sends the password to the first terminal through the Bluetooth after receiving the password of the Wi-Fi network.
Specifically, the second terminal may transmit the password to the first terminal using a bluetooth scheme based on a Generic Attribute Profile (Generic Attribute Profile gatt).
The password for the Wi-Fi network may be entered by the user in a prompt box.
S408: the first terminal verifies whether the password of the Wi-Fi network is correct by comparing the received password with the password stored locally, if so, the first terminal starts a Bluetooth personal area network (Bluetooth personal area network) function and establishes Bluetooth connection with the second terminal (if the Bluetooth connection between the first terminal and the second terminal is established before, the step of establishing the Bluetooth connection is not executed any more), and if not, a message of refusing to access the network is sent to the second terminal.
The message denying access to the network may be a message prompting a password error of the Wi-Fi network.
If the Wi-Fi network does not require a password, S407 and S408 can be skipped.
Or, the second terminal may send account information to the first terminal, and if the account information of the second terminal is the same as the account information of the first terminal (for example, the first terminal and the second terminal log in the same social account), S407 and S408 may also be skipped.
Alternatively, the second terminal may send the SIM card information to the first terminal, and if the SIM card of the second terminal is associated with the SIM card of the first terminal (e.g., in a relationship of a primary card and a secondary card), S407 and S408 may also be skipped. The other steps in fig. 4 are the same as those in fig. 3, and are not described again here.
After the second terminal shown in fig. 1 accesses the Wi-Fi network, a third terminal may access the Wi-Fi network through sharing of the second terminal, and fig. 5 is another network sharing method disclosed in this embodiment of the present application, and compared with the method shown in fig. 2 or fig. 4, the main differences are: because the second terminal accesses the Wi-Fi network by using the Bluetooth personal area network, the Bluetooth personal area network function of the second terminal is occupied, and the Wi-Fi network can not be shared with the third terminal by using the Bluetooth personal area network, so that the second terminal serves as a hot spot and shares the Wi-Fi network with the third terminal.
Fig. 5 includes the following steps:
s501: and the second terminal acquires the information of the Wi-Fi network.
S502: and the second terminal sends the information of the Wi-Fi network to the third terminal.
Unlike fig. 2 and 4, if the Special _ ID1 and the Access Method key-value pair are included in the message sent by the second terminal to the third terminal, the Method is bluetooth.
S503: and the third terminal displays the information of the Wi-Fi network.
S504: the third terminal sends a request to the second terminal to share the Wi-Fi network.
Optionally, if the Special _ ID1 and the Access Method key-value pair are received in S502 and the Access Method is bluetooth, it indicates that the second terminal accesses the Wi-Fi network by using bluetooth, so that the third terminal requests the second terminal to Access the Wi-Fi network by using a Wi-Fi hotspot mode.
Optionally, the third terminal may also directly request the second terminal to access the Wi-Fi network in a Wi-Fi hotspot manner without performing the determination. Alternatively, the third terminal requests sharing of the Wi-Fi network only from the second terminal, without specifying in what manner (bluetooth or Wi-Fi manner) to share.
S505: and the second terminal starts the Wi-Fi hotspot function.
Optionally, if the third terminal does not specify in what manner the second terminal shares the Wi-Fi network, the second terminal may first determine whether the bluetooth personal area network function of the second terminal is occupied, and if so, the second terminal starts the Wi-Fi hotspot function.
S506: and the third terminal connects the second terminal as a Wi-Fi hotspot to access the Wi-Fi network.
As can be seen from fig. 3, after the second terminal accesses the Wi-Fi network that is not within the coverage area through the bluetooth personal area network, the second terminal may also access the Wi-Fi network as a hotspot of the third terminal through the Wi-Fi hotspot function of the second terminal.
As shown in fig. 1, the radius of the coverage area of the Wi-Fi network is X, and the broadcast range of the bluetooth is Y, then the radius of the coverage area of the Wi-Fi network can be extended to X + Y by the broadcast of the first terminal. Theoretically, the wireless extension of the coverage range of the Wi-Fi network can be realized through the Bluetooth function of each terminal, and actually, the extension range can be controlled by considering the attenuation of signals, so that the balance between user experience and the extension range is achieved.
As can be seen from fig. 2 and 5, the same way of searching for a Wi-Fi network using bluetooth broadcasting is used for any one terminal. And the mode of accessing the Wi-Fi network needs to consider whether the terminal uses the Bluetooth personal area network to access the Wi-Fi network, if so, the terminal needs to share the network through a Wi-Fi hotspot because the Bluetooth shared network is occupied, and if not, the terminal can use the Bluetooth personal area network to share the network.
Fig. 6 is a terminal disclosed in an embodiment of the present application, including: a transceiver and a processor, wherein the transceiver comprises a Bluetooth component and a Wi-Fi component. The Bluetooth component is used for realizing the steps of sending and receiving through Bluetooth and the function of a Bluetooth personal area network in the figures 2, 4 and 5, and the Wi-Fi component is used for realizing the function of accessing the Wi-Fi network through the router Wi-Fi hotspot and providing the Wi-Fi hotspot for other terminals. The processor is configured to implement the steps of fig. 2, 4 and 5 in addition to the functionality of the communication component and to control the bluetooth component and the Wi-Fi component to implement the above-described functionality of the bluetooth component and the Wi-Fi component, respectively. That is, the terminal shown in fig. 6 may be the first terminal or the second terminal, or may be a terminal in which the functions of the first terminal and the second terminal are integrated.
Optionally, the terminal shown in fig. 6 may further include a memory for storing the application program and data generated by the processor in the process of executing the application program.
The terminal shown in fig. 6 may further include a Radio Frequency (RF) circuit that may be an integrated circuit of a wireless communication transmission function circuit and a reception function circuit. Typically, the RF circuitry includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The processor may be formed of an Integrated Circuit (IC), for example, a single packaged IC, or a plurality of packaged ICs connected to the same or different functions. For example, the Processor may include only a Central Processing Unit (CPU), or may be a combination of a GPU, a Digital Signal Processor (DSP), and a control chip (e.g., a baseband chip) in the communication Unit. In the embodiment of the present invention, the CPU may be a single operation core, or may include multiple operation cores.
The memory may be used to store software programs and modules, and the processor performs the steps of fig. 2, 4 and 5 except the functions of the communication component by operating the software programs and modules stored in the storage unit. The memory mainly includes a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like. The data storage area may store data generated during the execution of the program, and the like. In an embodiment of the invention, the Memory unit may include a volatile Memory, such as a Nonvolatile dynamic Random Access Memory (NVRAM), a Phase Change Random Access Memory (PRAM), a Magnetoresistive Random Access Memory (MRAM), and a non-volatile Memory, such as at least one magnetic disk Memory device, an Electrically ErasaBLE ProgrammaBLE Read-Only Memory (EEPROM), a flash Memory device, such as a NOR flash Memory (NOR flash Memory) or a NAND flash Memory (NAND flash Memory).
Optionally, the terminal may also include other input devices, sensors, display screens, and I/O subsystems. The I/O subsystem includes controllers for other input devices, sensor controllers, and display controllers.
It should be noted that the above embodiment only exemplifies a Wi-Fi network, and other wireless access networks, such as a bluetooth network, besides the Wi-Fi network, may also be shared by using the above method.
Claims (14)
1. A network sharing method, comprising:
the second terminal receives the information of the wireless network sent by the first terminal;
the second terminal sends a request for sharing the wireless network to the first terminal;
the second terminal accesses the wireless network through the Bluetooth personal area network started by the first terminal;
the second terminal sends a second message to a third terminal, wherein the second message comprises the information of the wireless network and a second mode of accessing the wireless network by the second terminal, and the second mode is Bluetooth;
the second terminal is also used as an access point for the third terminal to access the wireless network.
2. The method of claim 1, wherein the second terminal receiving the information of the wireless network sent by the first terminal comprises:
the second terminal receives a first message through Bluetooth, wherein the first message comprises the information of the wireless network, and the information of the wireless network comprises the name of the wireless network and the physical address of the wireless network.
3. The method of claim 2, wherein the first message further comprises:
and the first mode of the first terminal accessing the wireless network is Wi-Fi.
4. The method of claim 2, wherein the second terminal sending the request to the first terminal to share the wireless network comprises:
and the second terminal sends a first request message to the first terminal, wherein the first request message indicates that the wireless network is shared in a Bluetooth mode.
5. The method according to any of claims 1-4, wherein the information of the wireless network further comprises:
a signal strength of the wireless network detected by the first terminal.
6. The method according to any of claims 1-4, further comprising, after the second terminal sends the second message to the third terminal:
the second terminal receives a second request message sent by the third terminal, wherein the second request message indicates that the wireless network is shared by the Wi-Fi hotspot function;
and the second terminal starts the Wi-Fi hotspot function of the second terminal, so that the third terminal accesses the wireless network by taking the second terminal as an access point.
7. The method according to any of claims 1-4, wherein after the second terminal receives the information of the wireless network sent by the first terminal, the method further comprises:
the second terminal displays information of the wireless network in a list of wireless networks.
8. A terminal, wherein the terminal is a second terminal, comprising:
the processor is used for receiving information of a wireless network sent by a first terminal, sending a request for sharing the wireless network to the first terminal, and accessing the wireless network through a Bluetooth personal area network started by the first terminal; the second terminal is also used as an access point for accessing the wireless network by a third terminal;
the processor is further configured to:
and controlling the Bluetooth assembly to send a second message to the third terminal after accessing the wireless network through a Bluetooth personal area network started by the first terminal, wherein the second message comprises information of the wireless network and a second mode of accessing the wireless network by the second terminal, and the second mode is Bluetooth.
9. The terminal of claim 8, further comprising:
a Bluetooth component;
the processor is configured to receive information of a wireless network sent by a first terminal, and the information includes:
the processor is configured to control the bluetooth component to receive a first message, where the first message includes information of the wireless network, and the information of the wireless network includes a name of the wireless network and a physical address of the wireless network.
10. The terminal of claim 9, wherein the first message further comprises:
and the first mode of the first terminal accessing the wireless network is Wi-Fi.
11. The terminal of claim 9, wherein the processor configured to send the request to the first terminal to share the wireless network comprises:
the processor is configured to control the bluetooth component to send a first request message to the first terminal, where the first request message indicates that the wireless network is shared in a bluetooth manner.
12. The terminal according to any of claims 8-11, wherein the information of the wireless network further comprises:
a signal strength of the wireless network detected by the first terminal.
13. The terminal of any of claims 8-11, wherein the processor is further configured to:
controlling the Bluetooth component to receive a second request message sent by a third terminal after the second message is sent to the third terminal, wherein the second request message indicates that the wireless network is shared by Wi-Fi hotspot functions;
the terminal further comprises: a Wi-Fi component;
the processor is further configured to control the Wi-Fi component to start a Wi-Fi hotspot function of the third terminal, so that the third terminal accesses the wireless network by using the second terminal as an access point.
14. A terminal according to any of claims 8-11, characterized in that the terminal further comprises:
a display component to display information of the wireless network in a list of wireless networks.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611263410 | 2016-12-30 | ||
CN2016112634100 | 2016-12-30 | ||
PCT/CN2017/082392 WO2018120553A1 (en) | 2016-12-30 | 2017-04-28 | Network sharing method terminal |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109997378A CN109997378A (en) | 2019-07-09 |
CN109997378B true CN109997378B (en) | 2021-05-04 |
Family
ID=62706797
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201780073316.5A Active CN109997378B (en) | 2016-12-30 | 2017-04-28 | Network sharing method and terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN109997378B (en) |
WO (1) | WO2018120553A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107231627B (en) * | 2017-08-10 | 2020-11-10 | 乐鑫信息科技(上海)股份有限公司 | Bluetooth network and network distribution method |
CN109327865B (en) * | 2018-11-21 | 2022-02-18 | Oppo(重庆)智能科技有限公司 | Network sharing method and network sharing device |
CN112020049B (en) * | 2019-05-30 | 2023-06-09 | 深圳富泰宏精密工业有限公司 | Network connection method and electronic device |
CN112004217B (en) * | 2020-08-06 | 2023-02-28 | Oppo(重庆)智能科技有限公司 | Network access method, terminal and storage medium |
CN112738785B (en) * | 2020-12-29 | 2023-03-31 | 青岛海尔科技有限公司 | Device connection method and apparatus, storage medium, and electronic apparatus |
CN115884444A (en) * | 2022-10-27 | 2023-03-31 | 张春帅 | Method for establishing instant wireless communication interaction network by multiple intelligent devices |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904782A (en) * | 2011-07-27 | 2013-01-30 | 中兴通讯股份有限公司 | Personal network establishing method and interior gateway |
CN105407452A (en) * | 2015-10-27 | 2016-03-16 | 广东欧珀移动通信有限公司 | Method and system for controlling data flow in Bluetooth sharing network |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104427579A (en) * | 2013-08-23 | 2015-03-18 | 中兴通讯股份有限公司 | Method for establishing wireless local area network through mobile terminal and mobile terminal |
CN105025430A (en) * | 2014-04-23 | 2015-11-04 | 中国科学院深圳先进技术研究院 | Network sharing method and system |
US10117085B2 (en) * | 2014-05-19 | 2018-10-30 | Aerohive Networks, Inc. | Deployment of proximity beacon devices |
CN104243335A (en) * | 2014-09-30 | 2014-12-24 | 可牛网络技术(北京)有限公司 | Network sharing method and device |
US9980304B2 (en) * | 2015-04-03 | 2018-05-22 | Google Llc | Adaptive on-demand tethering |
CN104968021B (en) * | 2015-06-25 | 2020-01-10 | 福州瑞芯微电子股份有限公司 | Bandwidth control method and device in Bluetooth shared network |
US9674788B2 (en) * | 2015-06-26 | 2017-06-06 | Intel IP Corporation | Devices and methods for transmit concurrency by conditioned signal combining |
CN105376696A (en) * | 2015-10-09 | 2016-03-02 | 惠州Tcl移动通信有限公司 | Data transmission method and intelligent terminal |
-
2017
- 2017-04-28 CN CN201780073316.5A patent/CN109997378B/en active Active
- 2017-04-28 WO PCT/CN2017/082392 patent/WO2018120553A1/en active Application Filing
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102904782A (en) * | 2011-07-27 | 2013-01-30 | 中兴通讯股份有限公司 | Personal network establishing method and interior gateway |
CN105407452A (en) * | 2015-10-27 | 2016-03-16 | 广东欧珀移动通信有限公司 | Method and system for controlling data flow in Bluetooth sharing network |
Also Published As
Publication number | Publication date |
---|---|
WO2018120553A1 (en) | 2018-07-05 |
CN109997378A (en) | 2019-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109997378B (en) | Network sharing method and terminal | |
CN111263334B (en) | Configuring an electronic subscriber identity module for a mobile wireless device | |
CN110267327B (en) | Service transmission method and device | |
CN109328467B (en) | Method, server and system for downloading updated profiles | |
CN110366112B (en) | Positioning method and related equipment | |
JP2017500799A (en) | Method and terminal for data service transmission | |
US11770695B2 (en) | Mechanism to activate and manage a standalone device for cellular service | |
KR102102741B1 (en) | Method, device and system for authenticating to a mobile network, and server to authenticate devices to a mobile network | |
CN104871598A (en) | Wireless access point | |
WO2015124967A1 (en) | Traffic steering between wlan and cellular networks | |
CN113411781B (en) | Request method, device, terminal and storage medium for network slicing service | |
WO2016173339A1 (en) | Network access method and mobile communication terminal | |
CN110366204B (en) | Communication method and communication device | |
CN108605277A (en) | Establish the method and device of WLAN connection | |
JP2016505229A (en) | Communication control method, user equipment, network server, and system | |
WO2017166951A1 (en) | Network reselection control method and device of mobile terminal, and computer storage medium | |
JP2018512029A (en) | Method and associated apparatus for initiating inter-frequency measurements | |
CN112367625A (en) | Virtual card network-residing method and system, server, mobile terminal and storage medium | |
US20230076852A1 (en) | Electronic device supporting plurality of sims and operating method therefor | |
EP3422750B1 (en) | Method and apparatus for providing service provider identifier, access device, and terminal device | |
US9154949B1 (en) | Authenticated delivery of premium communication services to untrusted devices over an untrusted network | |
US20160196134A1 (en) | Secure storage synchronization | |
CN114205378A (en) | Network distribution method and device of Internet of things equipment, storage medium and electronic device | |
CN111448816A (en) | Network access method and equipment | |
EP3267708A1 (en) | Method, server and system for sending data from a source device to a destination device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |