CN110958611A - WiFi connection control method and device, storage medium and terminal - Google Patents

WiFi connection control method and device, storage medium and terminal Download PDF

Info

Publication number
CN110958611A
CN110958611A CN201910989016.2A CN201910989016A CN110958611A CN 110958611 A CN110958611 A CN 110958611A CN 201910989016 A CN201910989016 A CN 201910989016A CN 110958611 A CN110958611 A CN 110958611A
Authority
CN
China
Prior art keywords
station
site
wifi connection
wifi
internet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910989016.2A
Other languages
Chinese (zh)
Inventor
孙建东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Original Assignee
Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yulong Computer Telecommunication Scientific Shenzhen Co Ltd filed Critical Yulong Computer Telecommunication Scientific Shenzhen Co Ltd
Priority to CN201910989016.2A priority Critical patent/CN110958611A/en
Publication of CN110958611A publication Critical patent/CN110958611A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices

Abstract

The invention discloses a WiFi connection control method, a WiFi connection control device, a computer storage medium and a terminal, wherein the method comprises the following steps: receiving a wireless fidelity (WiFi) connection request of a station; after the WiFi connection request is verified to pass, periodically measuring the transmitting power of the station; and when the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, forbidding to provide the Internet surfing service for the site. According to the method and the device, only the transmitting power of the station needs to be periodically measured, and when the frequency that the transmitting power of the station is smaller than the power threshold is larger than the preset frequency, the station can be judged to be an illegal station, internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.

Description

WiFi connection control method and device, storage medium and terminal
Technical Field
The present invention relates to the field of networks, and in particular, to a WiFi connection control method, apparatus, storage medium, and terminal.
Background
The router mainly refers to a device for converting a wired broadband signal into a wireless fidelity (WiFi) signal, and after the intelligent terminal establishes connection with a wireless router through the WiFi, the intelligent terminal can access the wired broadband to access the internet. We easily connect to the internet world through routers anytime and anywhere. However, some uncertainties (network access) also occur, and the network access is achieved by accessing the WiFi network of the other party by means of password cracking and the like so as to achieve the purpose of using the broadband freely. Illegal users surf the internet, which results in the decrease of the internet speed of legal users.
Disclosure of Invention
The application mainly aims to provide a WiFi connection control method, and aims to solve the technical problem that in the prior art, the Internet speed of a WiFi legal user is reduced due to the fact that a terminal illegally accesses WiFi. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides a method for controlling WIFI connection, where the method includes:
receiving a WiFi connection request of a site;
after the WiFi connection request is verified to pass, periodically measuring the transmitting power of the station;
and when the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, forbidding to provide the Internet surfing service for the site.
In a second aspect, an embodiment of the present application provides a control apparatus for WiFi connection, where the apparatus includes:
the receiving module is used for receiving a WiFi connection request of a site;
the measurement module is used for periodically measuring the transmitting power of the station after the WiFi connection request is verified to pass;
and the illegal access control module is used for forbidding to provide internet service for the site when the frequency that the transmitting power of the site is smaller than the power threshold value is greater than the preset frequency.
In a third aspect, an embodiment of the present application provides a terminal, which may include: a memory and a processor; wherein the memory stores a computer program adapted to be loaded by the memory and to perform the above-mentioned method steps.
In a fourth aspect, embodiments of the present application provide a computer storage medium having a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
when the scheme of the embodiment of the application is executed, the access point AP receives a WiFi connection request of a station, after the WiFi connection request is verified to pass, the transmitting power of the station is periodically measured, the verification process only verifies whether a WiFi password is correct, and when the number of times that the transmitting power of the station is measured to be smaller than a power threshold value is larger than the preset number of times, internet access service is forbidden to be provided for the station. The transmission power of the station is periodically measured, and when the transmission power of the station is smaller than the power threshold for more than the preset number, the station can be judged to be an illegal station, the internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a view of an application scenario of a BSS according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a WiFi connection control method according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a WiFi connection control method according to an embodiment of the present disclosure;
fig. 4 is an explanatory diagram for displaying an AP list according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a control device for WiFi connection according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Detailed Description
In order to make the objects, features and advantages of the embodiments of the present application more obvious and understandable, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the application, as detailed in the appended claims.
The embodiment of the application can be applied to a Wireless Local Area Network (WLAN), and the standard adopted by the WLAN at present is the Institute of Electrical and Electronics Engineers (IEEE) 802.11 series. The WLAN may include a plurality of Basic Service Sets (BSSs), and each BSS may include one (Access Point, AP) and a plurality of Stations (STAs) associated with the AP.
The AP is also called a wireless access point or a hotspot, and is an access point for a mobile user to enter a wired network, and is mainly deployed in a home, a building, and a garden, and typically has a coverage radius of several tens of meters to hundreds of meters, and may also be deployed outdoors. The AP acts as a bridge connecting the network and the wireless network, and mainly functions to connect the wireless network clients together and then to access the wireless network to the ethernet. Specifically, the AP may be a terminal device or a network device with a WiFi chip. Optionally, the AP may be a device supporting 802.11ax standard, and further optionally, the AP may be a device supporting multiple WLAN standards such as 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11 a.
The STA may be a wireless communication chip, a wireless sensor, or a wireless communication terminal. For example: the mobile phone supporting the WiFi communication function, the tablet computer supporting the WiFi communication function, the set top box supporting the WiFi communication function, the smart television supporting the WiFi communication function, the smart wearable device supporting the WiFi communication function, the vehicle-mounted communication device supporting the WiFi communication function and the computer supporting the WiFi communication function. Optionally, the STA may support an 802.11ax system, and further optionally, the station supports multiple WLAN systems such as 802.11ac, 802.11n, 802.11g, 802.11b, and 802.11 a.
As shown in fig. 1, which is an application scenario diagram of a BSS provided in an embodiment of the present invention, the BSS includes an AP, an STA1, an STA2, and an STA3, and the STA1, the STA2, and the STA3 are associated with the AP, a station in the embodiment of the present invention may be any STA in the fig. 1, an access point may be the AP in the fig. 1, and it should be noted that the number of STAs in the embodiment of the present invention is merely an example.
In the following method embodiments, for convenience of description, only the execution subject of each step is described as the access point AP.
The first embodiment is as follows:
please refer to fig. 2, which is a flowchart illustrating a WiFi connection control method according to an embodiment of the present disclosure. As shown in fig. 2, the method of the embodiment of the present application may include the steps of:
step S101, a WiFi connection request of a station is received.
Generally, an AP transmits WiFi signals to surrounding stations, and the stations may discover the AP through channel scanning to obtain attribute information of the AP, for example: the attribute information includes one or more of a Service Set Identifier (SSID), a Basic Service Set Identifier (BSSID), a signal strength of the WiFi signal, and an encryption scheme of the WiFi signal. The station displays the scanned AP list, the user selects one AP in the AP list, if the WiFi signal of the AP is encrypted, the user inputs a corresponding WiFi password, the station sends a WiFi connection request to the AP, the AP receives the WiFi connection request of the station, and the WiFi connection request carries the WiFi password. In the wireless local area network, the access points are two types of wireless routers and mobile phone hot spots, and the stations are wireless clients.
There are two scanning modes for stations to find surrounding APs: one is active scanning and the other is passive scanning. The active scanning process comprises the following steps: the station periodically sends a probe request frame (probe request), the AP returns a probe response frame (probe response) to the station according to the probe request frame, and the station acquires the attribute information of the AP according to the probe response frame. The passive scanning process comprises the following steps: the AP periodically transmits a beacon frame (beacon), and the station receives the beacon frame and acquires the attribute information of the AP according to the beacon frame.
And step S102, after the WiFi connection request is verified to pass, periodically measuring the transmitting power of the station.
Generally, after receiving a WiFi connection request from a station, an AP verifies the WiFi connection request, and the verification process includes verifying whether a WiFi password is correct. The WiFi password is that when an illegal station is connected with WiFi through cracking software, the cracking software finds the password corresponding to the WiFi through the WiFi name in a server. After verifying that the WiFi connection request passes, the AP periodically measures the transmit power of the station.
The AP periodically measures the transmission Power of the station, and may represent the transmission Power of the station by measuring the values of three parameters, RSRP (Reference Signal Receiving Power), RSRQ (Reference Signal Receiving Quality), RSSI (Received Signal Strength Indicator).
Wherein, in the 3GPP protocol, RSRP represents a linear average of the power contribution values (in W) of the resource elements carrying the cell-specific reference signals over the considered measurement band. Colloquially, the power value of RSRP may be considered to represent the power value of each subcarrier. RSSI represents the received signal strength, an optional part of the radio transmission layer, is used to determine the link quality, and whether to increase the broadcast transmission strength. RSRQ represents the LTE reference signal received quality, and this metric mainly ranks different LTE candidate cells according to the signal quality, and RSRQ — N RSRP/RSSI, because the bandwidths on which the RSRP and RSSI measurement values are based may be different, the RSRQ and RSSI measurement values are adjusted by a coefficient, that is, N represents the number of resource blocks RB in the LTE carrier RSSI measurement bandwidth. RSRQ achieves an efficient way to report the effect of combining signal strength and interference.
Step S103, if the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, the site is forbidden to be provided with internet access service.
Generally, based on the transmission power of the station measured in step S102, when the transmission power of the station measured by the AP each time is smaller than the power threshold, the number of times is increased by 1, and when the number of times that the transmission power of the station is smaller than the power threshold is greater than the preset number of times, it may be determined that the station is an illegal station, and it is prohibited to provide the internet access service for the station, and the AP stops measuring the transmission power of the station.
The method comprises the following steps that a website is forbidden to be provided with internet surfing services, wherein the two conditions are included, one is that WiFi connection of the website is directly disconnected, and internet surfing services are not provided for the website any more; another is to allow a station to establish a WiFi connection, but limit the maximum network speed of the station, for example: the maximum line speed of the station is limited to 10 kb/s.
When the scheme of the embodiment of the application is executed, the access point AP receives a WiFi connection request of a station, after the WiFi connection request is verified to pass, the transmitting power of the station is periodically measured, the verification process only verifies whether a WiFi password is correct, and when the number of times that the transmitting power of the station is measured to be smaller than a power threshold value is larger than the preset number of times, internet access service is forbidden to be provided for the station. The transmission power of the station is periodically measured, and when the transmission power of the station is smaller than the power threshold for more than the preset number, the station can be judged to be an illegal station, the internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.
Example two:
please refer to fig. 3, which is a flowchart illustrating a WiFi connection control method according to an embodiment of the present disclosure. As shown in fig. 3, the method of the embodiment of the present application may include the steps of:
step S201, a WiFi connection request of a station is received.
Generally, a station needs to search surrounding WiFi signals in an active scanning or passive scanning manner to access a WiFi network, and then establishes a connection with an AP through two processes of authentication and association, and finally accesses the WiFi network. The station displays the scanned AP list, the user selects one AP to connect, if the WiFi signal of the AP is encrypted, the user inputs a corresponding WiFi password, the station sends a WiFi connection request to the AP, the AP receives the WiFi connection request of the station, and the WiFi connection request carries the WiFi password.
It should be noted that the active scanning is a process in which a station periodically searches for a surrounding wireless network, and the process includes: the station periodically sends a probe request frame (probe request), the AP returns a probe response frame (probe response) to the station according to the probe request frame, and the station acquires the attribute information of the AP according to the probe response frame. The passive scanning is that a station searches surrounding wireless networks through beacon frames (beacon) periodically sent by a frame listening AP, and the process includes: the AP periodically sends beacon, and the station receives the beacon frame and acquires the attribute information of the AP according to the beacon frame. The attribute information of the AP includes: SSID, BSSID, signal strength of WiFi signal, and encryption mode of WiFi signal.
For example, the station displays the list of scanned APs, as shown in fig. 4, the station searches for a plurality of APs, the user selects an AP with a WiFi name 1005 to connect to, inputs a WiFi password 1235432, and the station sends a WiFi connection request to the AP.
And step S202, after the WiFi connection request is verified to pass, a preset internet access white list is obtained.
Generally, after the WiFi connection request is verified by the AP, the AP may obtain a preset white list of internet access. In the verification process of the WiFi connection request, the AP verification includes verifying whether the WiFi password is correct.
Generally, when a user uses a wireless router or a mobile phone hotspot for the first time, the user sets a WiFi password and a password of the mobile phone hotspot to prevent other users from surfing the Internet. In addition, the user may add an internet white list to the AP, where the internet white list is used to record the device identifier of the station, and the device identifier of the station with high WiFi frequency is set on the AP by the user, for example: the mobile phone equipment identification of the user, the equipment identification of the user computer, the equipment identification of the user ipad, the mobile phone equipment identification of the user family and the like.
It should be noted that, in the wireless routing device, the most commonly used device identifier is a MAC address, which is called a local area network address, an ethernet address or a physical address, and is an address used for confirming the location of the device. Each terminal device can be uniquely identified by the MAC address, and the corresponding terminal device can be known as long as the MAC address of each terminal device is obtained.
For example, as shown in the AP list shown in fig. 4, the addresses of the whitelist added by the primary user with the WiFi name 1005 at the access point are: mobile phone 1(06:00:30:0A:7C:5D), mobile phone 2(07:00:20:1A:7C:5D), mobile phone 3(10:00:30:0A:7C:5E), and computer 1(02:10:30:0A:6B: 5D). After the user inputs the WiFi password 1235432 of 1005 and the AP verifies, the user obtains the device identifier of the above-mentioned whitelist.
Step S203, determining whether the device identifier of the site is located in the whitelist.
Generally, the device identifier, i.e., the MAC address, of the station is obtained, and based on the device identifiers in the white list of access networks obtained in step S202, the MAC address of the station and the MAC addresses in the white list of access networks are compared one by one, so as to determine whether the MAC address of the station is in the white list of access networks.
For example, at this time, the device identifier of the station with the AP name 1005 is 11:00:30:0A:7C:5E, and the AP compares the MAC address with the MAC addresses in the whitelist one by one, and determines whether the MAC address of the station is in the whitelist.
And step S204, if the equipment identifier of the site is located in the online white list, providing an online service for the site based on the WiFi connection of the site.
Generally, the MAC address of the station is located in the whitelist of access networks based on the comparison in step S203, so that the access network service can be provided for the station based on the WiFi connection of the station.
For example, the device identifier of a certain station connected to the AP is 10:00:30:0A:7C:5E, the MAC address is compared with the address in the white internet access list, and the address is found to be the address of the mobile phone 3 in the white internet access list, so that the mobile phone 3 is provided with internet access service based on WiFi connection of the mobile phone 3.
Step S205, if the device identifier of the station is not located in the whitelist, periodically measuring the transmission power of the station.
Generally, the MAC address of the station is not located in the white list based on the comparison in step S203, and the AP periodically measures the transmission power of the station.
For example, after the device identifier of a certain station connected to the AP is 11:00:30:0A:7C:5E and is compared with the MAC address in the white list on the internet, it is found that the MAC address of the station is not in the white list on the internet, and the AP needs to measure the transmission power of the station every 0.1 second.
Step S206, determining whether the number of times that the transmission power of the station is smaller than the power threshold is greater than a predetermined number of times.
Generally, when the transmission power of the station is periodically measured in step S205, it is determined whether the number of times that the transmission power of the station is smaller than the power threshold is greater than a predetermined number of times. For example, the AP measures the transmission power of the station every 0.1 second, the set power threshold is 500mW, the transmission power of the station is compared with the power threshold, the number of times that the transmission power of the station is smaller than the power threshold is counted, the preset number of times is 10, and the counted number of times is compared with the preset number of times every 5 seconds.
Step S207, if the times that the transmitting power of the station is smaller than the power threshold is not larger than the preset times, establishing WiFi connection with the station, and providing internet surfing services for the station based on the WiFi connection.
Generally, the number of times that the transmission power of the station is less than the power threshold value is less than or equal to the predetermined number of times based on the measurement in step S206, it is determined that the station is not an illegal station, a WiFi connection with the station is established, and the internet access service is provided for the station based on the WiFi connection.
For example, within 5 seconds, periodically measuring the transmission power of the station to be 400mW once, and the transmission power of the station to be 500mW or more in the rest of time, where the number of times that the transmission power of the station is smaller than the power threshold is 1 and is less than the preset number of times 10, then the AP determines that the station is not an illegal station, establishes a WiFi connection with the station, and provides internet access service for the station based on the WiFi connection.
And step S208, clearing the times that the transmitting power of the station is smaller than the power threshold value.
Generally, based on the number of times that the transmission power of the station is smaller than the power threshold counted in step S207, the AP clears the counted number of times that the transmission power of the station is smaller than the power threshold when providing the station with the internet service. For example, if the number of times measured in step S207 is 1, the AP clears the number of times.
Step S209, add the device identifier of the website to the whitelist.
Generally, after the above steps provide the internet access service for the station, and clear the number of times that the transmission power of the station is smaller than the power threshold, it is convenient for the station to connect the AP again, the workload of the AP is reduced, and the AP adds the device identifier of the station to the white list of the internet.
For example, based on the station connected to the AP in S208, the device identifier of the station is 01:00:30:0A:7C:5E, and after the number of times that the transmission power of the station is smaller than the power threshold is cleared, the device identifier of the station is added to the white list for internet access and stored as the device identifier of the mobile phone 4.
Step S210, if the number of times that the transmission power of the station is smaller than the power threshold is greater than the predetermined number of times, prohibiting providing the station with the internet service, and adding the device identifier of the station to an internet blacklist.
Generally, based on the number of times that the transmission power of the base station is smaller than the power threshold value, which is measured in step 205 and step 206, is greater than the predetermined number of times, it is determined that the station is an illegal station, and the provision of the internet access service for the station is prohibited.
For example, if the device identifier is a station 11:00:30:0A:7C:5E, the transmission power of the station is measured to be about 270mW in the period, as long as the measured transmission power of the station is less than the power threshold value of 500mW, the AP adds 1 to the number of times that the transmission power of the station is counted to be less than the power threshold value, and the number of times that the transmission power of the station is counted to be less than the power threshold value in 5 seconds in one period is 30, and the AP determines that the station is an illegal station and prohibits providing internet service for the station. The step of forbidding to provide the internet surfing service for the site comprises the following steps: and adding the equipment identifier of the site into an online blacklist, wherein the online blacklist stores the equipment identifier of the illegal site, and the equipment identifier in the online blacklist can also be added by a master user of the AP. And when the illegal station is connected with the AP again, the AP finds that the illegal station is positioned in the internet access blacklist by comparing the equipment identifier of the station, and service is forbidden for the illegal station.
Optionally, the internet access service is prohibited from being provided for the site, and the WiFi connection failure message may also be sent to an illegal site. For example, when the AP determines that the currently connected station is an illegal station, a warning message indicating that the WiFi connection fails is sent to the station.
When the scheme of the embodiment of the application is executed, the access point AP receives a WiFi connection request of a station, after the WiFi connection request is verified to pass, the transmitting power of the station is periodically measured, the verification process only verifies whether a WiFi password is correct, and when the number of times that the transmitting power of the station is measured to be smaller than a power threshold value is larger than the preset number of times, internet access service is forbidden to be provided for the station. The transmission power of the station is periodically measured, and when the transmission power of the station is smaller than the power threshold for more than the preset number, the station can be judged to be an illegal station, the internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Example three:
fig. 5 is a schematic structural diagram of a control device for WiFi connection according to an embodiment of the present disclosure. The control means may be implemented as all or part of the terminal by software, hardware or a combination of both. The device includes:
a receiving module 510, configured to receive a WiFi connection request of a station;
a measuring module 520, connected to the receiving module 510, for periodically measuring the transmission power of the station after verifying that the WiFi connection request passes;
an illegal access control module 530, connected to the receiving module 510 and the measuring module 520, configured to prohibit providing an internet service for the station when the number of times that the transmission power of the station is smaller than the power threshold is greater than a preset number of times.
Optionally, the illegal access control module 530 includes:
and the power measurement control unit is used for stopping measuring the transmitting power of the site after the internet surfing service is forbidden to be provided for the site.
The blacklist setting unit is connected with the power measurement control unit and used for adding the equipment identifier of the website to an online blacklist; the network access blacklist comprises equipment identifications of sites which forbid providing network access service; or sending a message of WiFi connection failure to the station.
Optionally, the WiFi connection control apparatus 500 shown in fig. 5 further includes:
the legal access control module 540 is connected to the receiving module 510, the measuring module 520, and the illegal access control module 530, and is configured to establish a WiFi connection with the station when the transmission power of the station is not less than the power threshold, and provide an internet access service for the station based on the WiFi connection.
Optionally, the legal access control module 540 further includes:
and the clearing unit is used for clearing the times that the transmitting power of the site is smaller than the power threshold when the WiFi connection is established with the site.
Optionally, the measurement module 520 further includes:
the non-white list equipment confirming unit is used for acquiring a preset internet access white list and determining that the equipment identification of the site is not positioned in the internet access white list;
optionally, the measurement module 520 further includes:
and the white list equipment confirming unit is connected with the non-white list equipment confirming unit and used for confirming that if the equipment identifier of the site is positioned in the internet white list, the internet service is provided for the site based on the WiFi connection.
It should be noted that, when the WiFi connection control apparatus provided in the foregoing embodiment executes the WiFi connection control method, only the division of the functional modules is taken as an example, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the functions described above. In addition, the WiFi connection control apparatus and the WiFi connection control method provided in the above embodiments belong to the same concept, and details of implementation processes thereof are referred to in the method embodiments, which are not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
When the scheme of the embodiment of the application is executed, the access point AP receives a WiFi connection request of a station, after the WiFi connection request is verified to pass, the transmitting power of the station is periodically measured, the verification process only verifies whether a WiFi password is correct, and when the number of times that the transmitting power of the station is measured to be smaller than a power threshold value is larger than the preset number of times, internet access service is forbidden to be provided for the station. The transmission power of the station is periodically measured, and when the transmission power of the station is smaller than the power threshold for more than the preset number, the station can be judged to be an illegal station, the internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.
Example four:
please refer to fig. 6, which provides a schematic structural diagram of a terminal according to an embodiment of the present application. As shown in fig. 6, the terminal 1000 can include: at least one processor 1001, at least one network interface 1003, memory 1004, at least one communication bus 1002.
Wherein a communication bus 1002 is used to enable connective communication between these components.
The network interface 1003 may optionally include a standard wired interface or a wireless interface (e.g., WI-FI interface).
Processor 1001 may include one or more processing cores, among other things. Processor 1001 interfaces various parts throughout terminal 1000 using various interfaces and lines to perform various functions of terminal 1000 and to process data by executing or executing instructions, programs, code sets, or instruction sets stored in memory 1004 and invoking data stored in memory 1004. Alternatively, the processor 1001 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1001 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 1001, but may be implemented by a single chip.
The Memory 1004 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1004 includes a non-transitory computer-readable medium. The memory 1004 may be used to store instructions, programs, code sets, or instruction sets. The memory 1004 may include a program storage area and a data storage area, wherein the program storage area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. The memory 1004 may optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 6, the memory 1004, which is a type of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a key event response application program.
In the terminal 1000 shown in fig. 6, the processor 1001 may be configured to invoke an application program of a control method of WiFi connection stored in the memory 1004, and specifically perform the following operations:
receiving a WiFi connection request of a site;
after the WiFi connection request is verified to pass, periodically measuring the transmitting power of the station;
and when the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, forbidding to provide the Internet surfing service for the site.
In one embodiment, the processor 1001 further performs the following operations:
in one embodiment, after prohibiting providing the internet service for the website, the processor 1001 further performs the following operations:
and stopping measuring the transmitting power of the station.
In one embodiment, after prohibiting providing the internet service for the website, the processor 1001 further performs the following operations:
adding the equipment identification of the website to an online blacklist; the network access blacklist comprises equipment identifications of sites which forbid providing network access service; or
And sending a WiFi connection failure message to the station.
In one embodiment, the processor 1001 further performs the following operations after periodically measuring the transmission power of the station:
and when the transmitting power of the site is not less than the power threshold, establishing WIFI connection with the site, and providing internet access service for the site based on the WiFi connection.
In one embodiment, the processor 1001 further performs the following operations when establishing a WiFi connection with the station:
and clearing the times that the transmitting power of the station is smaller than the power threshold value.
In one embodiment, the processor 1001 further performs the following operations before periodically measuring the transmit power of the station:
and acquiring a preset internet white list, and determining that the equipment identifier of the website is not located in the internet white list.
In an embodiment, after obtaining the preset whitelist, the processor 1001 further performs the following operations:
and if the equipment identification of the site is located in the internet surfing white list, providing internet surfing service for the site based on the WIFI connection.
When the scheme of the embodiment of the application is executed, the access point AP receives a WiFi connection request of a station, after the WiFi connection request is verified to pass, the transmitting power of the station is periodically measured, the verification process only verifies whether a WiFi password is correct, and when the number of times that the transmitting power of the station is measured to be smaller than a power threshold value is larger than the preset number of times, internet access service is forbidden to be provided for the station. The transmission power of the station is periodically measured, and when the transmission power of the station is smaller than the power threshold for more than the preset number, the station can be judged to be an illegal station, the internet access service is forbidden to be provided for the station, the phenomenon that an access point is rubbed by the illegal station is avoided, and the legal station can keep normal internet access speed.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the above method steps, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 2 and fig. 3, which are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. A control method for WiFi connection, the method comprising:
receiving a wireless fidelity (WiFi) connection request of a station;
after the WiFi connection request is verified to pass, periodically measuring the transmitting power of the station;
and when the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, forbidding to provide the Internet surfing service for the site.
2. The method according to claim 1, wherein the prohibiting providing the internet service for the station when the number of times that the transmission power of the station is smaller than the power threshold is greater than a preset number of times comprises:
and when the times that the transmitting power of the site is smaller than the power threshold is larger than the preset times, forbidding to provide the internet service for the site, and stopping measuring the transmitting power of the site.
3. The method according to claim 1 or 2, wherein the prohibiting the web service from being provided to the site comprises:
adding the equipment identification of the website to an online blacklist; the network access blacklist comprises equipment identifications of sites which forbid providing network access service; or
And sending a WiFi connection failure message to the station.
4. The method of claim 1, further comprising:
and when the transmitting power of the site is not less than the power threshold, establishing WIFI connection with the site, and providing internet access service for the site based on the WiFi connection.
5. The method of claim 4, further comprising:
and when the WiFi connection is established with the site, clearing the times that the transmitting power of the site is smaller than the power threshold value.
6. The method according to any one of claims 1 to 5, wherein before the periodically measuring the transmission power of the station, the method further comprises:
and acquiring a preset internet white list, and determining that the equipment identifier of the website is not located in the internet white list.
7. The method of claim 6, further comprising:
and if the equipment identification of the site is located in the internet surfing white list, providing internet surfing service for the site based on the WIFI connection.
8. A control apparatus for WiFi connection, the apparatus comprising:
the receiving module is used for receiving a WiFi connection request of a site;
the measurement module is used for periodically measuring the transmitting power of the station after the WiFi connection request is verified to pass;
and the illegal access control module is used for forbidding to provide internet service for the site when the frequency that the transmitting power of the site is smaller than the power threshold value is greater than the preset frequency.
9. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to carry out the method steps according to any one of claims 1 to 7.
10. A terminal, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps of any of claims 1 to 7.
CN201910989016.2A 2019-10-17 2019-10-17 WiFi connection control method and device, storage medium and terminal Pending CN110958611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910989016.2A CN110958611A (en) 2019-10-17 2019-10-17 WiFi connection control method and device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910989016.2A CN110958611A (en) 2019-10-17 2019-10-17 WiFi connection control method and device, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN110958611A true CN110958611A (en) 2020-04-03

Family

ID=69975572

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910989016.2A Pending CN110958611A (en) 2019-10-17 2019-10-17 WiFi connection control method and device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN110958611A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333053A (en) * 2020-06-02 2021-02-05 深圳Tcl新技术有限公司 Anti-network-rubbing method and device, routing equipment and storage medium
CN112351473A (en) * 2020-11-05 2021-02-09 杭州网银互联科技股份有限公司 Method and system for selecting WiFi access point channel
CN113365272A (en) * 2021-05-10 2021-09-07 荣耀终端有限公司 Method and system for preventing network from being rubbed

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050152312A1 (en) * 2004-01-08 2005-07-14 Interdigital Technology Corporation Method and apparatus for autonomously determining the coverage area of an access point in a wireless communication system
CN102917438A (en) * 2011-08-04 2013-02-06 巴比禄股份有限公司 Access point device and communication configuration providing method
CN103167534A (en) * 2011-12-15 2013-06-19 展讯通信(上海)有限公司 Measurement processing method and device, user device of communication events
CN104837175A (en) * 2015-04-01 2015-08-12 普联技术有限公司 Wireless router access control method and device
CN105245539A (en) * 2015-10-27 2016-01-13 上海斐讯数据通信技术有限公司 Router visitor verification method and system and router
CN105704784A (en) * 2014-11-28 2016-06-22 华为技术有限公司 Processing method and device for wireless access
CN105722182A (en) * 2016-02-25 2016-06-29 上海斐讯数据通信技术有限公司 Automatic internet stealing prevention method and routing equipment
CN105848154A (en) * 2016-06-07 2016-08-10 醴陵恒茂电子科技有限公司 Method for carrying out wireless identity authentication based on RSSI ranging
CN106102088A (en) * 2016-06-01 2016-11-09 上海斐讯数据通信技术有限公司 The connection control method of a kind of wireless router and wireless router
CN108966225A (en) * 2018-06-11 2018-12-07 四川斐讯信息技术有限公司 A kind of method and system of the anti-loiter network of router

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050152312A1 (en) * 2004-01-08 2005-07-14 Interdigital Technology Corporation Method and apparatus for autonomously determining the coverage area of an access point in a wireless communication system
CN102917438A (en) * 2011-08-04 2013-02-06 巴比禄股份有限公司 Access point device and communication configuration providing method
CN103167534A (en) * 2011-12-15 2013-06-19 展讯通信(上海)有限公司 Measurement processing method and device, user device of communication events
CN105704784A (en) * 2014-11-28 2016-06-22 华为技术有限公司 Processing method and device for wireless access
CN104837175A (en) * 2015-04-01 2015-08-12 普联技术有限公司 Wireless router access control method and device
CN105245539A (en) * 2015-10-27 2016-01-13 上海斐讯数据通信技术有限公司 Router visitor verification method and system and router
CN105722182A (en) * 2016-02-25 2016-06-29 上海斐讯数据通信技术有限公司 Automatic internet stealing prevention method and routing equipment
CN106102088A (en) * 2016-06-01 2016-11-09 上海斐讯数据通信技术有限公司 The connection control method of a kind of wireless router and wireless router
CN105848154A (en) * 2016-06-07 2016-08-10 醴陵恒茂电子科技有限公司 Method for carrying out wireless identity authentication based on RSSI ranging
CN108966225A (en) * 2018-06-11 2018-12-07 四川斐讯信息技术有限公司 A kind of method and system of the anti-loiter network of router

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333053A (en) * 2020-06-02 2021-02-05 深圳Tcl新技术有限公司 Anti-network-rubbing method and device, routing equipment and storage medium
CN112351473A (en) * 2020-11-05 2021-02-09 杭州网银互联科技股份有限公司 Method and system for selecting WiFi access point channel
CN113365272A (en) * 2021-05-10 2021-09-07 荣耀终端有限公司 Method and system for preventing network from being rubbed

Similar Documents

Publication Publication Date Title
EP1704731B1 (en) Method and apparatus for indicating service set identifiers to probe for
US8615603B2 (en) Wireless LAN system, wireless LAN device, and storage medium having stored therein wireless LAN program
US9480005B2 (en) System and method for common attributes in HESSID and the associated queries
CN110958611A (en) WiFi connection control method and device, storage medium and terminal
US9730148B2 (en) Procedure for selecting network discovery method
US11716756B2 (en) Data communication method and apparatus for performing spatial reuse
US11871223B2 (en) Authentication method and apparatus and device
KR20130055501A (en) Apparatus and method for selecting of access point
US11019483B2 (en) Access point supporting at least two virtual networks and method performed thereby for communicating with wireless device
US10965650B2 (en) Indicating channel usage in wireless network
CN111278036B (en) Method and device for acquiring MAC address
CN106453370B (en) Method and device for registering IPC (inter-programmable logic controller) to NVR (network video recorder)
EP3422750B1 (en) Method and apparatus for providing service provider identifier, access device, and terminal device
CN113132983B (en) Network disconnection reconnection method for intelligent terminal
WO2015092114A1 (en) Establishing new access network
US11375437B2 (en) Management frames and usage in a wireless network environment
US11057770B2 (en) Method and apparatus for dynamically changing connection in wireless LAN
US20160113046A1 (en) System and Method for Reducing Communications Overhead
US20230014215A1 (en) Wireless communication device and wireless communication method used in wireless communication device
WO2023045823A1 (en) Association method in wlan, and ap, and sta
CN109618394B (en) Wireless network access method, device, terminal equipment and storage medium
JP6552349B2 (en) Wireless communication system and base station
CN117135738A (en) WIFI communication method, device and network equipment
CN117062191A (en) Method, device, equipment and medium for connecting wireless access points of Internet of things equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination