CN113194470B - Method and device for establishing wireless connection and mobile terminal - Google Patents

Method and device for establishing wireless connection and mobile terminal Download PDF

Info

Publication number
CN113194470B
CN113194470B CN202110469984.8A CN202110469984A CN113194470B CN 113194470 B CN113194470 B CN 113194470B CN 202110469984 A CN202110469984 A CN 202110469984A CN 113194470 B CN113194470 B CN 113194470B
Authority
CN
China
Prior art keywords
wireless network
image
verification information
mobile terminal
access verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110469984.8A
Other languages
Chinese (zh)
Other versions
CN113194470A (en
Inventor
王征添
陈景远
何辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110469984.8A priority Critical patent/CN113194470B/en
Publication of CN113194470A publication Critical patent/CN113194470A/en
Application granted granted Critical
Publication of CN113194470B publication Critical patent/CN113194470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/60Type of objects
    • G06V20/62Text, e.g. of license plates, overlay texts or captions on TV images
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V30/00Character recognition; Recognising digital ink; Document-oriented image-based pattern recognition
    • G06V30/10Character recognition
    • G06V30/14Image acquisition
    • G06V30/148Segmentation of character regions
    • G06V30/153Segmentation of character regions using recognition of characters or words
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a method and a device for establishing wireless connection and a mobile terminal. The method comprises the following steps: acquiring an image to be processed through an image acquisition device; acquiring access verification information from the image to be processed based on a pattern-text identification mode; and establishing wireless connection with the target wireless network based on the access verification information. Therefore, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can be triggered to establish the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved.

Description

Method and device for establishing wireless connection and mobile terminal
Technical Field
The present application relates to the field of mobile terminal technologies, and in particular, to a method and an apparatus for establishing a wireless connection, and a mobile terminal.
Background
With the development of network technology, wireless networks are emerging in many places that can be used by users. In the process of accessing the wireless network, access authentication information may need to be input into the mobile terminal, and if the input access authentication information passes the authentication of the wireless network, the mobile terminal may establish a wireless connection with the wireless network. However, in the process of inputting the access authentication information, the user is required to perform excessive manual operations, which causes inconvenience to the user.
Disclosure of Invention
In view of the above problems, the present application provides a method, an apparatus, and a mobile terminal for establishing a wireless connection to improve the above problems.
In a first aspect, the present application provides a method for establishing a wireless connection, which is applied to a mobile terminal, and the method includes: acquiring an image to be processed through an image acquisition device; acquiring access verification information from the image to be processed based on a pattern-text identification mode; and establishing wireless connection with the target wireless network based on the access verification information.
In a second aspect, the present application provides a method for establishing a wireless connection, which is executed in a mobile terminal, and includes: the image acquisition unit is used for acquiring an image to be processed through the image acquisition device; the information extraction unit is used for acquiring access verification information from the image to be processed based on a pattern-text identification mode; and the wireless connection unit is used for establishing wireless connection with the target wireless network based on the access verification information.
In a third aspect, the present application provides a mobile terminal comprising one or more processors and a memory; one or more programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the methods described above.
In a fourth aspect, the present application provides a computer readable storage medium storing program code executable by a processor, the computer readable storage medium comprising stored program code, wherein the method described above is performed when the program code runs.
According to the method, the device and the mobile terminal for establishing the wireless connection, the image to be processed is obtained through the image acquisition device, the access verification information is obtained from the image to be processed in a picture-text recognition mode, and then the wireless connection is established with the target wireless network based on the access verification information. Therefore, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can be triggered to establish the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic diagram illustrating a scenario of a method for establishing a wireless connection according to the present application;
fig. 2 shows a flow chart of a method for establishing a wireless connection as proposed in the present application;
FIG. 3 shows a schematic diagram of one of the triggered displays of the present application;
FIG. 4 illustrates a schematic diagram of one embodiment of the present application for posting display wireless access information;
FIG. 5 is a schematic diagram of an input interface for entering keywords in the present application;
fig. 6 shows a flow chart of another method for establishing a wireless connection proposed by the present application;
fig. 7 is a schematic diagram illustrating a display of access authentication information according to the present application;
FIG. 8 is a schematic diagram of an information display interface according to one embodiment of the present disclosure;
fig. 9 is a schematic diagram illustrating a modification of access authentication information according to an embodiment of the present disclosure;
fig. 10 is a flow chart illustrating yet another method for establishing a wireless connection proposed by the present application;
fig. 11 is a flow chart illustrating yet another method of establishing a wireless connection as set forth herein;
fig. 12 is a schematic diagram illustrating another access authentication information input interface proposed in the present application;
fig. 13 is a flow chart illustrating yet another method for establishing a wireless connection proposed by the present application;
FIG. 14 is a schematic diagram of a live preview image of the subject application;
FIG. 15 shows a schematic diagram of the present application prompting a user that a wireless connection is being established;
fig. 16 is a block diagram illustrating a detection apparatus of a wireless access point according to the present application;
fig. 17 is a block diagram showing another structure of a detection apparatus of a wireless access point proposed in the present application;
fig. 18 is a block diagram illustrating an electronic device for performing a method of wireless connection according to an embodiment of the present application;
fig. 19 is a storage unit for storing or carrying program codes for implementing a method of wireless connection according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The network is already an indispensable thing for the user of the mobile terminal, and the mobile terminal can acquire more information through the network to display the information to the user. And with the popularization of network technology, wireless networks have been deployed in many places for users to use. For example, in a mall, a mall may provide a wireless network for a user to use, and in some restaurants, a wireless network may also be provided for a user to use.
In some places, in order to limit the mobile terminal connected to the network, the mobile terminal needs to submit access authentication information to the wireless network for authentication in the process of establishing wireless connection with the wireless network, and the mobile terminal can establish wireless connection with the wireless network after successful authentication of the wireless network. For example, in the process of establishing a wireless connection between the mobile terminal and the Wi-Fi network, the mobile terminal needs to provide a Wi-Fi password to the Wi-Fi network for verification, and if the provided Wi-Fi password is successfully verified, the mobile terminal side may establish a wireless connection with the Wi-Fi network.
However, the inventors have studied the procedure of establishing a radio connection and have found that a user is required to perform many manual operations in the procedure of establishing a radio connection. For example, in some scenarios, the wireless access information may be printed on some paper or may be posted on a wall, and in this case, the user of the mobile terminal needs to read the wireless access information first, then manually input the read wireless access information into the mobile terminal, and then manually trigger the mobile terminal to perform an operation of establishing a wireless connection.
Therefore, the inventor proposes a method, an apparatus and a mobile terminal for establishing a wireless connection in the present application, in which an image to be processed is acquired by an image acquisition apparatus, access authentication information is acquired from the image to be processed based on a pattern-text recognition, and then a wireless connection is established with a target wireless network based on the access authentication information. Therefore, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can be triggered to establish the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved.
The application environment to which the present application relates will be described first.
The application scenario shown in fig. 1 includes a mobile terminal 100 and a wireless access point 200. Here, the establishment of the wireless connection between the mobile terminal 100 and the wireless network may be understood as the establishment of the wireless connection between the wireless access point 200 corresponding to the wireless network. The wireless network in the embodiments of the present application is understood to be a wireless local area network, which may be a Wi-Fi network, a bluetooth network, or a Zigbee network. For example, in the case where the wireless network is a Wi-Fi network, the wireless access point corresponding to the Wi-Fi network may be a wireless router.
In the present application, the mobile terminal 100 may be a mobile phone, a tablet computer, or the like. The wireless access point 200 may broadcast a wireless signal, and when the mobile terminal 100 is located within the coverage of the wireless signal, a wireless connection may be established with the wireless access point 200.
Embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Referring to fig. 2, a method for establishing a wireless connection provided in the present application is applied to a mobile terminal, and the method includes:
s110: and acquiring an image to be processed through an image acquisition device.
The mobile terminal according to the embodiment of the present application may include an image capturing device (e.g., a camera), and the image capturing device may be configured to capture an image. The acquired image to be processed can be understood as an image which may include access authentication information. In the embodiment of the present application, there may be a plurality of ways to trigger the image capturing device to capture the image to be processed.
As a manner, a trigger control may be configured in a negative screen of the mobile terminal, and if a touch operation acting on the trigger control is detected, the trigger control may be triggered to start acquiring an image to be processed through the image acquisition device. The negative screen can be understood as an interface displayed if the screen continues to slide towards the opposite direction of the end direction under the condition that the mobile terminal already displays the most end desktop.
Illustratively, as shown in fig. 3, in the case shown in the left image of fig. 3, the mobile terminal is displaying a desktop 2, and if the screen is slid toward the direction shown by the dotted arrow in the left image in the case of detecting the displayed desktop 2, the mobile terminal is triggered to display a desktop 1 shown in the middle image of fig. 3. The table top 1 can be understood as the most end table top. If a sliding operation is detected that continues in the direction indicated by the dashed arrow shown in the middle image in the case of displaying the desktop 1, the display of the negative one screen 10 is triggered. In the negative one-screen 10 shown in fig. 3, a trigger control 11 named as intelligent Wifi is displayed, and if a touch operation acting on the trigger control 11 is detected, the mobile terminal starts the image acquisition device to acquire an image to be processed.
It should be noted that the display style in the negative one-screen 10 and the trigger control 11 shown in fig. 3 are exemplary, wherein the display style in the negative one-screen 10 may have other display styles, and the trigger control 11 may be disposed at other positions in the negative one-screen 10.
As another mode, acquiring the image to be processed by the image acquisition device may include: and if the mobile terminal is detected to be in the designated posture, acquiring the image to be processed through the image acquisition device. It should be noted that, a specified gesture and a corresponding function may be bound in advance in the mobile terminal, so that when it is detected that the mobile terminal is in a certain specified gesture, the function corresponding to the specified gesture that the mobile terminal is currently in may be directly executed. Alternatively, the designated gesture may be a number of times that the mobile terminal is continuously shaken reaches a threshold number of times. In this case, if the number of times that the mobile terminal detects that the mobile terminal is shaken reaches the threshold number of times, it is determined that the mobile terminal is in the designated posture, and then the acquisition of the image to be processed by the image acquisition device may be triggered to start.
The threshold number of times may be set to a larger number of times in order to avoid false triggering. For example, the number of times can be set to 4 or 5, etc. to avoid that the image acquisition device is mistakenly triggered to acquire the image due to subconscious shaking operation of the mobile terminal in the process of holding the mobile terminal by the user.
As another mode, the image acquisition device may be triggered to acquire the image to be processed through a shortcut tool interface of the mobile terminal itself. Optionally, the shortcut interface may be triggered to be displayed by performing a sliding operation from the top of the screen toward the bottom of the screen, and the management control may be displayed in the shortcut interface. If the touch operation acting on the management control is detected, the image acquisition device can be triggered to acquire the image to be processed.
Still, as another mode, the image acquisition device may be triggered to acquire the image to be processed in a voice control mode. In this way, after the voice assistant of the mobile terminal is started, if the specified voice content is acquired, the image acquisition device may be triggered to acquire the image to be processed. Alternatively, the specified voice content may be "take a picture connection", or may be "help me connect to wireless network", or the like. Alternatively, the designated voice content may be set by the user according to the user's own habits.
S120: and acquiring access verification information from the image to be processed based on a pattern-text identification mode.
After the image to be processed is obtained, image-text recognition in the image to be processed can be started, so that access authentication information can be extracted. As one way, the mobile terminal may extract the access verification information from the image to be processed based on an OCR (Optical Character Recognition) manner.
It should be noted that, besides the access authentication information, other contents may be included in the image to be processed. For example, in a restaurant, the place where the access authentication information of the wireless network is posted may also include the name of the restaurant or some publicity, and the information may be acquired by the image acquisition device. As one way, in order to enable the mobile terminal to accurately extract the access authentication information, the mobile terminal may perform character filtering on content from the image to be processed, so that content that is not the access authentication information may be filtered out. Furthermore, the mobile terminal can improve the probability of obtaining effective access authentication information by starting to obtain the content as the access authentication information after the designated character.
S130: and establishing wireless connection with the target wireless network based on the access verification information.
After obtaining the access authentication information, the mobile terminal may start to establish a wireless connection. In the embodiment of the present application, the target wireless network may be understood as a wireless network that will attempt to establish a wireless connection. In the embodiments of the present application, there are various ways to determine the target wireless network.
As one way, establishing a wireless connection with a target wireless network based on the access authentication information includes: selecting a target wireless network from the searched wireless networks, wherein the target wireless network is a wireless network of which the corresponding wireless signal intensity meets specified conditions; requesting connection establishment with the target wireless network one by one based on the access authentication information.
It should be noted that the signal strength of the wireless signal corresponding to the wireless network is attenuated with the increase of the propagation distance, and the location where the user can see Zhang Tieyou access information is usually a location closer to the wireless network corresponding to the visible access authentication information. Wherein closer to the wireless network may be understood as closer to a wireless access point of the wireless network. Correspondingly, the closer the user is to the wireless network, the stronger the signal strength corresponding to the wireless network searched by the mobile terminal will be, and therefore, the mobile terminal can use the wireless network whose corresponding wireless signal strength meets the specified conditions as the target wireless network to try to establish connection. Alternatively, the specified condition may be the wireless networks of the first few bits whose corresponding signal strengths are ordered from high to low.
Illustratively, the wireless networks searched by the mobile terminal include a wireless network w1, a wireless network w2, a wireless network w3, a wireless network w4, and a wireless network w5. Wherein, the specified condition is that the corresponding wireless networks with the first 4 bits are sequenced from high signal strength to low signal strength, if the signal strength of the wireless network w1 is-25 dbm, the signal strength of the wireless network w2 is-30 dbm, the signal strength of the wireless network w3 is-50 dbm, the signal strength of the wireless network w4 is-20 dbm, and the signal strength of the wireless network w5 is-75 dbm. Then, after comparison, the wireless signal strength obtained sequentially from high to low is: wireless network w4, wireless network w1, wireless network w2, wireless network w3, and wireless network w5. Then in the case of the first 4-bit wireless network with the specified condition that the corresponding signal strength is ordered from high to low, the target wireless network can be obtained by: wireless network w4, wireless network w1, wireless network w2, and wireless network w3. Then, the mobile terminal tries to establish a connection with the wireless network w4 based on the obtained access authentication information, and if the mobile terminal cannot establish a connection with the wireless network w4, the mobile terminal tries to establish a connection with the wireless network w1 again, and so on. If all the wireless networks in the mobile terminal and the target wireless network cannot establish wireless connection, the mobile terminal can display prompt information to prompt a user that the connection fails.
Alternatively, in some cases, the place where the wireless network is provided may also post the name of the wireless network in addition to the access authentication information. For example, as shown in fig. 4, in the style shown in fig. 4, an account number of the wireless network and a password are posted at the same time, wherein the account number of the wireless network can be understood as the name of the wireless network. In this way, if the mobile terminal directly acquires the name of the wireless network from the image to be processed, the wireless network corresponding to the acquired name can be directly used as the target wireless network to establish the wireless network, and the efficiency of establishing the wireless network can be further improved. Illustratively, the searched wireless networks include a wireless network w1, a wireless network w2, a wireless network w3, a wireless network w4, and a wireless network w5, and in the process of obtaining the access verification information from the image to be processed, a name (account) of the wireless network is also obtained, and the wireless network corresponding to the name is the wireless network w5, so that the mobile terminal will use the wireless network w5 as a target wireless network to attempt to establish a wireless connection.
As still another way, the mobile terminal may prompt the user to input a keyword regarding a target wireless network and then select a wireless network matching the keyword as the target wireless network from the searched wireless networks. It should be noted that, in some environments, there are many wireless networks that can be searched by the mobile terminal, and then there are also many wireless networks that can satisfy the specified conditions, and if the mobile terminal tries one by one, it may take a long time, and in order to improve this situation, the mobile terminal may display an input interface after obtaining the access verification information, so that the user may input the foregoing keywords, and then the mobile terminal searches for a wireless network that matches the keywords from the searched wireless networks as a target wireless network, so that a wireless connection may be established more quickly and efficiently under the condition that there are many wireless networks that can be searched. For example, as shown in fig. 5, after acquiring the access verification information from the image to be processed, the mobile terminal may display an input interface shown in fig. 5, and an input area 13 is displayed in the input interface 12, and after a user may input a keyword in the input area 13 and click a control named connection start, the mobile terminal is triggered to match the keyword acquired from the input area 13 to obtain a target wireless network, and then establish a wireless connection with the target wireless network. The mobile terminal may use a wireless network with a corresponding network name including the keyword as a target wireless network. For example, if the keyword input by the user is "zhi", the mobile terminal may use the wireless network whose corresponding network name includes "zhi" as the target wireless network.
Optionally, in order to improve flexibility of the mobile terminal in the process of establishing the wireless connection, the mobile terminal may determine, according to a current actual situation, which manner is specifically adopted to determine the target wireless network. As one way, the mobile terminal may determine which way to specifically determine the target wireless network according to the number of searched wireless networks. Optionally, if the number of the wireless networks searched by the mobile terminal is smaller than the number threshold, the mobile terminal may directly select a target wireless network from the searched wireless networks, where the target wireless network is a wireless network whose corresponding wireless signal strength meets a specified condition; and requesting connection with the target wireless network one by one based on the access verification information, if the number of the wireless networks searched by the mobile terminal is not less than a number threshold, displaying an input interface to prompt a user to input keywords, and then determining the target wireless network based on the keywords.
It should be noted that, if the number of the searched wireless networks is smaller than the number threshold, it is not large to represent that the time consumed by the mobile terminal to directly try the searched wireless networks one by one is not large, correspondingly, if the number of the searched wireless networks is not smaller than the number threshold, it is large to represent that the number of the currently searched wireless networks is large, and if the connection is tried one by one, it may be necessary to consume a large amount of time before the success of the attempt.
The mobile terminal may be provided with a network switch, and the network switch may control the mobile terminal to start or stop communication based on the wireless network. In this way, the mobile terminal can automatically turn on the network switch after obtaining the access authentication information from the image to be processed, so that the mobile terminal can establish wireless connection with the target wireless network based on the access authentication information. Optionally, if the mobile terminal cannot establish the wireless connection based on the obtained access authentication information, the mobile terminal may automatically turn off the network switch again, so as to avoid resource waste.
In the method for establishing wireless connection provided by this embodiment, an image to be processed is acquired by an image acquisition device, access authentication information is acquired from the image to be processed based on an image-text recognition mode, and then wireless connection is established with a target wireless network based on the access authentication information. Therefore, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can be triggered to establish the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved.
Referring to fig. 6, a method for establishing a wireless connection provided in the present application is applied to a mobile terminal, and the method includes:
s210: and acquiring an image to be processed through an image acquisition device.
S220: and acquiring access verification information from the image to be processed based on a pattern-text identification mode.
S230: and displaying the access authentication information.
The access authentication information acquired by the mobile terminal from the image to be processed is obtained by performing image-text recognition on the image to be processed, so that in the recognition process, the extracted access authentication information may not be the access authentication information expected to be extracted by the user due to an error in an area where text extraction is performed or an error in operation of a recognition algorithm of the mobile terminal, and thus, in order to avoid resource waste caused by the fact that the mobile terminal uses the wrong access authentication information to try to connect to a wireless network, the mobile terminal can display the acquired access authentication information, so that the user can confirm the access authentication information in advance. For example, as shown in fig. 7, if the image to be processed is acquired with respect to the image shown in fig. 4, the access verification information displayed in the information display interface 13 may be 12345678 shown in fig. 7.
S240: and responding to a connection instruction, and establishing wireless connection with the target wireless network based on the access verification information.
Then the user may trigger the mobile terminal to generate a different instruction based on his own judgment in case the access authentication information is displayed. Optionally, if the user confirms that the displayed access authentication information is actually the access authentication information required by the user, the mobile terminal may be triggered to generate a connection instruction, so that the mobile terminal responds to the connection instruction and establishes a wireless connection with the target wireless network based on the access authentication information. Optionally, if the user confirms that the displayed access verification information is not actually the required access verification information, the mobile terminal may be triggered to generate a reacquisition instruction, so that the mobile terminal may reacquire the image to be processed through the image acquisition device, and reacquire new access verification information from the reacquired image to be processed, and further repeat the step after the access verification information is displayed.
In the embodiment of the present application, the mobile terminal may be provided with various ways to trigger generation of the connection instruction or reacquisition instruction.
As one mode, a first control and a second control are displayed in an interface for displaying access verification information. The first control is used for generating a connection instruction after being touched, and the second control is used for generating a reacquisition instruction after being touched. For example, as shown in fig. 8, the control named confirmation may be a first control, and the control named reacquisition may be a second control, and if the mobile terminal detects that the control named confirmation acts on, the mobile terminal may trigger generation of the connection instruction, and may cancel displaying the information display interface 13 at the same time. Correspondingly, if the mobile terminal detects a control acting on reacquisition, a reacquisition instruction can be triggered to be generated, and the display of the information display interface 13 can be cancelled at the same time.
Alternatively, the connection instruction or the re-acquisition instruction may be generated by a voice assistant when the access authentication information is displayed. And if the mobile terminal acquires the first voice content, triggering to generate a connection instruction. Optionally, if the mobile terminal acquires the second voice content, the mobile terminal may trigger generation of a reacquisition instruction. The content specifically included in the first voice content or the second voice content may be configured by the user according to the habit of the user. For example, the first voice content may be "confirm connection", or may be "password correct", the second voice content may be "password error", or may be "recapture", etc.
In addition, in order to reduce the number of times of the mobile terminal to perform the image acquisition again, the mobile terminal may further provide an interface for modifying the displayed access authentication information. In this way, if the user finds that the displayed access authentication information is not actually required access authentication information, the displayed access authentication information can be modified through the interface. For example, as shown in fig. 9, when the access authentication information is displayed, the access authentication information may be displayed in an editable area 16 of the information display interface 15, wherein the content in the editable area 16 may be modified according to the operation of the user, wherein the modification includes inputting new content or replacing original content. Where the original extracted access authentication information I12345678 is shown in the left image in fig. 9, and the modification shown in fig. 9 includes modifying the letter I in the left image to the number 1 in the right image, the resulting modified access authentication information is 112345678.
Correspondingly, before establishing a wireless connection with a target wireless network based on the access authentication information, the method further includes: if modification operation is detected, modifying the access verification information to obtain modified access verification information; in this manner, in response to the connection instruction, establishing a wireless connection with the target wireless network based on the access authentication information includes: and responding to a connection instruction, and establishing wireless connection with the target wireless network based on the modified access verification information.
According to the method for establishing the wireless connection, the image to be processed carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the image to be processed, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can trigger the establishment of the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved. In addition, in this embodiment, after obtaining the access authentication information from the image to be processed, the access authentication information may be displayed first, so that the user may preliminarily determine whether the obtained access authentication information is the required access authentication information, so as to avoid waste of time and resources caused by the mobile terminal attempting to establish a wireless connection using the wrong access authentication information. Moreover, in one mode, the mobile terminal can modify the displayed access authentication information according to the operation of the user, so that the situation that the mobile terminal acquires the image to be processed again can be avoided.
Referring to fig. 10, a method for establishing a wireless connection provided in the present application is applied to a mobile terminal, and the method includes:
s310: and acquiring an image to be processed through an image acquisition device.
S320: and acquiring a target area in the image to be processed, wherein the target area is an area containing a text.
It should be noted that, in the area for posting or displaying the access authentication information, the access authentication information itself is only a smaller area, so that the access authentication information actually occupies a smaller area in the acquired image to be processed. In order to facilitate extraction of the access authentication information, an area that may actually include text in the image to be processed may be first located as a target area, and then text content may be further extracted with respect to the target area.
S330: and performing text recognition on the target area to obtain access verification information.
As one mode, the text recognition of the target area to obtain the access verification information includes: and if the target area comprises the specified text, acquiring the text positioned at the specified relative position of the specified text as access verification information. It should be noted that the access authentication information that is shown is usually shown in some specific locations, so that the user can quickly identify which of the shown contents is the access authentication information.
For example, referring to fig. 4, the access authentication information "12345678" is shown after the content of "password", so that the user can recognize that the shown "12345678" is the content of the password. Correspondingly, the "password" may be understood as a specific text, so that, if the mobile terminal recognizes the specific text of the "password", the access authentication information to be acquired may be acquired as the content after the specific text, and the specific relative position may be the position shown after the specific text. Further, in some other cases, the access authentication information may be displayed below the designated text, and the mobile terminal may use the text displayed in the lower line of the designated text as the access authentication information in the case where the designated text is detected and a position after the designated text has no text.
S340: and establishing wireless connection with the target wireless network based on the access verification information.
According to the method for establishing the wireless connection, the image to be processed carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the image to be processed, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can trigger the establishment of the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved. In addition, in the embodiment, in the process of acquiring the access authentication information from the image to be processed, an area suspected to include text content may be first located as a target area, and then text recognition may be performed on the content in the target area, so as to improve the overall recognition efficiency.
Referring to fig. 11, a method for establishing a wireless connection provided in the present application is applied to a mobile terminal, and the method includes:
s410: and acquiring an image to be processed through an image acquisition device.
S420: and acquiring access verification information from the image to be processed based on a pattern-text identification mode.
S430: and detecting whether the currently displayed interface is an access verification information input interface.
It should be noted that the mobile terminal may be triggered in different scenes to acquire the to-be-processed image through the image acquisition device, and thus, in different scenes, the access verification information acquired from the to-be-processed image may have different uses, and therefore, the mobile terminal may determine the current scene through detecting the currently displayed interface, so as to determine what processing method is to be performed on the access verification information subsequently.
In one scenario, the user has already determined the wireless network to be connected, and has already opened the access authentication information input interface of the wireless network to be connected, but has not completed the input of the access authentication information in the access authentication information input interface. In another class of scenarios, the user does not know which wireless network specifically needs to be connected, but only the need to connect to a certain wireless network. For example, when a user uses video software, a video to be played needs to occupy a large network transmission flow, and then the user may desire to switch to perform video transmission through the wireless network related in this embodiment, and further needs to trigger the mobile terminal to establish a wireless connection with the wireless network. The mobile terminal may detect the currently displayed interface in order to be able to distinguish between the two types of scenes.
S440: and if the currently displayed interface is the access verification information input interface, inputting the access verification information in an information input area of the access verification information input interface.
If the currently displayed interface is detected to be the access verification information input interface, it indicates that the current user already has a clear connection target, and only does not know the access verification information of the wireless network to be connected, and then the mobile terminal can be triggered to acquire the image to be processed through the image acquisition device under the condition that the access verification information input interface corresponding to the wireless network to be connected is already displayed, so as to acquire the access verification information, and then the access verification information is input into the information input area of the access verification information input interface.
For example, as shown in fig. 12, in the left image of fig. 12, the mobile terminal displays an access verification information input interface 17 corresponding to a wireless network named "Mianfeiwifi", if the mobile terminal is triggered to acquire the image to be processed through the image acquisition device and obtain the access verification information under the condition that the left image of fig. 12 is displayed, the access verification information may be input into an information input area 18 as shown in the right image of fig. 12, and then, if it is further detected that the user touches a control named connection, the mobile terminal may attempt to establish a wireless connection with the wireless network named "Mianfeiwifi" based on the access verification information in the information input area 18.
In the embodiment, when the mobile terminal has already displayed the access verification information input interface, the mobile terminal may trigger the image acquisition device to acquire the image to be processed in the specified posture indicated in the foregoing embodiment, and may also trigger the image acquisition device to acquire the image to be processed in the voice assistant manner shown in the foregoing embodiment, so that the currently displayed access verification information input interface does not need to be exited before the access verification information is acquired.
S450: and if the currently displayed interface is not the access verification information input interface, executing the wireless connection establishment with the target wireless network based on the access verification information.
If the currently displayed interface is not the access authentication information input interface, it indicates that the user does not clearly determine which wireless network the user needs to establish a wireless connection with, and the mobile terminal may attempt to establish a wireless connection based on the target wireless network determined by the method provided in this embodiment.
According to the method for establishing the wireless connection, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can trigger the establishment of the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved. In addition, in this embodiment, after the access verification information is obtained from the image to be processed, different operations can be performed on the access verification information according to the currently specifically displayed interface, so that the adaptability and the universality of the method are improved.
Referring to fig. 13, a method for establishing a wireless connection provided in the present application is applied to a mobile terminal, and the method includes:
s510: and acquiring a real-time preview image acquired by the image acquisition device as an image to be processed.
It should be noted that, in the process of acquiring the image to be processed by the image acquisition device, the image acquired by taking a picture may be used as the image to be processed, or a real-time preview image acquired by the image acquisition device may be used as the image to be processed as in this embodiment. Illustratively, as shown in fig. 14, the left image of fig. 14 shows the access authentication information (i.e., the password in fig. 14) displayed, and if the left image of fig. 14 is captured by the image capturing device, the live preview image 19 shown in the right image of fig. 14 can be obtained. The real-time preview image is directly used as the image to be processed, so that the user does not need to manually trigger the photographing operation, the steps of the user for operation can be further reduced, and the efficiency of establishing the wireless connection is improved.
S520: and acquiring access verification information from the image to be processed based on a pattern-text identification mode.
S530: and establishing wireless connection with the target wireless network based on the access verification information.
In order to facilitate a user to know the current processing state of the mobile terminal in time, the mobile terminal may display the prompt information according to the current state. For example, if the mobile terminal is currently acquiring the access authentication information from the image to be processed, the content of the prompt message that the mobile terminal may display is "acquiring the access authentication information", and further, if the acquisition of the access authentication information is completed and the wireless connection with the target wireless network is started based on the access authentication information, the mobile terminal may display "wireless connection is being established. Illustratively, as shown in fig. 15, the mobile terminal hovers a prompt message "wireless connection is being established" on the screen so that the user can know that the mobile terminal has begun to attempt to establish a wireless connection with the target wireless network. The manner of establishing the wireless connection between the mobile terminal and the target wireless network in this embodiment may be the same as that in the foregoing embodiment.
As a manner, the mobile terminal may need to consume a period of time in the process of establishing the wireless connection with the target wireless network based on the access verification information, and then, in order to reduce resource consumption, the mobile terminal may still maintain the operation state of the image capturing device in the process of establishing the wireless connection with the target wireless network based on the access verification information, but may not extract the access verification information from the real-time preview image. Furthermore, after the mobile terminal fails to establish a wireless connection with the target wireless network based on the access authentication information that has been acquired, the mobile terminal may resume extracting the access authentication information from the live preview image in order to try again to establish a wireless connection.
As one way, the mobile terminal may or may not successfully establish the wireless connection in the process of attempting to establish the wireless connection. The mobile terminal may correspondingly give different feedback for different connection results.
Optionally, if the mobile terminal successfully establishes the wireless connection with the target wireless network in the process of establishing the wireless connection with the target wireless network based on the access verification information, the mobile terminal may quit the operation of the image acquisition program corresponding to the image acquisition device, so that the mobile terminal does not display the image acquisition interface any more. If the mobile terminal does not successfully establish the wireless connection with the target wireless network in the process of establishing the wireless connection with the target wireless network based on the access verification information, the user can be prompted to change the acquisition target. Wherein, replacing the acquisition target may be understood as prompting the user to switch the image acquisition area of the image acquisition device. It can be understood that, if the image capturing areas of the image capturing devices are different, the contents of the obtained to-be-processed image are correspondingly different, so that the mobile terminal can obtain new access authentication information again to attempt to establish a wireless connection.
It should be noted that, in this embodiment, the mobile terminal is direct
According to the method for establishing the wireless connection, the image to be processed carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the image to be processed, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can trigger the establishment of the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved. In addition, in this embodiment, the access verification information can be extracted by using the real-time preview image as the image to be processed, which is further beneficial to improving the efficiency of finally establishing the wireless connection.
Referring to fig. 16, an apparatus 600 for establishing a wireless connection provided by the present application, operating in a mobile terminal, includes:
the image acquiring unit 610 is configured to acquire an image to be processed through an image acquisition device.
As one mode, the image obtaining unit 610 is specifically configured to obtain a real-time preview image collected by the image collecting device as an image to be processed.
As one mode, the image obtaining unit 610 is specifically configured to obtain, by the image capturing device, an image to be processed if it is detected that the mobile terminal is in a specified posture.
And an information extraction unit 620, configured to obtain access authentication information from the image to be processed based on a graphics-text identification manner.
As a mode, the information extracting unit 620 is specifically configured to acquire a target area in the image to be processed, where the target area is an area including a text; and performing text recognition on the target area to obtain access verification information. Optionally, the information extracting unit 620 is specifically configured to, if the target area includes a specified text, obtain a text located at a specified relative position of the specified text as the access verification information.
A wireless connection unit 630, configured to establish a wireless connection with the target wireless network based on the access authentication information.
As one mode, the wireless connection unit 630 is specifically configured to select a target wireless network from the searched wireless networks, where the target wireless network is a wireless network whose corresponding wireless signal strength satisfies a specified condition; requesting connection establishment with the target wireless network one by one based on the access authentication information.
As one mode, the wireless connection unit 630 is specifically configured to display the access authentication information; and responding to a connection instruction, and establishing wireless connection with the target wireless network based on the access verification information.
Optionally, the wireless connection unit 630 is specifically configured to modify the access authentication information if the modification operation is detected, so as to obtain modified access authentication information. Furthermore, the wireless connection unit 630 is specifically configured to, in response to the connection instruction, establish a wireless connection with the target wireless network based on the modified access authentication information.
As shown in fig. 17, the apparatus 600 further includes:
an information input unit 640 for detecting whether the currently displayed interface is an access verification information input interface; and if the currently displayed interface is the access verification information input interface, inputting the access verification information in an information input area of the access verification information input interface. In this manner, the wireless connection unit 630 is specifically configured to execute the establishing of the wireless connection with the target wireless network based on the access verification information if the currently displayed interface is not the access verification information input interface.
According to the device for establishing wireless connection provided by the embodiment, the image to be processed is obtained through the image acquisition device, the access verification information is obtained from the image to be processed in a picture-text recognition mode, and then the wireless connection is established with the target wireless network based on the access verification information. Therefore, the to-be-processed image carrying the access verification information can be acquired through the image acquisition device in the mode, so that the mobile terminal can directly extract the access verification information from the to-be-processed image, then the wireless connection is directly established with the target wireless network based on the acquired access verification information, and further the mobile terminal can be triggered to establish the wireless connection in the image acquisition mode, so that a user does not need to identify and input the access verification information, and the user experience is improved.
It should be noted that, in the present application, the device embodiment and the foregoing method embodiment correspond to each other, the specific implementation principle of each unit in the device embodiment is similar to that in the foregoing method embodiment, and specific contents in the device embodiment may refer to the method embodiment, which is not described again in the device embodiment.
An electronic device provided by the present application will be described with reference to fig. 18.
Referring to fig. 18, based on the text processing method and apparatus, another electronic device 200 capable of executing the text processing method is further provided in the embodiment of the present application. The electronic device 200 includes one or more processors 102 (only one shown), memory 104, and network module 106 coupled to each other. The memory 104 stores programs that can execute the content of the foregoing embodiments, and the processor 102 can execute the programs stored in the memory 104.
Processor 102 may include one or more cores for processing data, among other things. The processor 102 interfaces with various components throughout the electronic device 200 using various interfaces and circuitry to perform various functions of the electronic device 200 and process data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 104 and invoking data stored in the memory 104. Alternatively, the processor 102 may be implemented in hardware using at least one of Digital Signal Processing (DSP), field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 102 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 102, but may be implemented by a communication chip.
The Memory 104 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 104 may be used to store instructions, programs, code sets, or instruction sets. The memory 104 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The storage data area may also store data created by the terminal 100 in use, such as a phonebook, audio-video data, chatting log data, and the like.
The network module 106 is configured to receive and transmit electromagnetic waves, and implement interconversion between the electromagnetic waves and electrical signals, so as to communicate with a communication network or other devices, for example, an audio playing device. The network module 106 may include various existing circuit elements for performing these functions, such as an antenna, a radio frequency transceiver, a digital signal processor, an encryption/decryption chip, a Subscriber Identity Module (SIM) card, memory, and so forth. The network module 106 may communicate with various networks, such as the internet, an intranet, a wireless network, or with other devices via a wireless network. The wireless network may comprise a cellular telephone network, a wireless local area network, or a metropolitan area network. For example, the network module 106 may perform information interaction with a base station.
Referring to fig. 19, a block diagram of a computer-readable storage medium provided in an embodiment of the present application is shown. The computer readable medium 1100 has stored therein program code that can be called by a processor to perform the method described in the method embodiments above.
The computer-readable storage medium 1100 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 1100 includes a non-volatile computer-readable storage medium. The computer readable storage medium 1100 has storage space for program code 1110 for performing any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 1110 may be compressed, for example, in a suitable form.
To sum up, according to the text processing method, the text processing device, and the electronic device provided by the present application, the movement condition of the selector is detected, and then after the selector stops moving, the to-be-processed partitioned area corresponding to the position where the selector stops moving is obtained, and then the text in the to-be-processed partitioned area is used as the to-be-processed text, and the to-be-processed text is converted to obtain the converted text, and then the converted text is output. Therefore, by the mode, the converted text can be flexibly obtained by detecting the movement condition of the selector and obtaining the to-be-processed divided area corresponding to the position of the stopped selector, and convenience in text conversion is improved. In addition, in the embodiment, only the texts in the to-be-processed divided regions corresponding to the selector can be converted, and all the texts in the interface are not required to be converted, so that the efficiency of outputting the conversion result is improved.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Moreover, various embodiments or examples and features of various embodiments or examples described in this specification can be combined and combined by one skilled in the art without being mutually inconsistent.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and the scope of the preferred embodiments of the present application includes other implementations in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present application.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions.
It should be understood that portions of the present application may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some technical feature diagrams may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. A method for establishing a wireless connection, wherein the method is applied to a mobile terminal, and the method comprises:
displaying a real-time preview image acquired by an image acquisition device, and acquiring the real-time preview image acquired by the image acquisition device as an image to be processed;
acquiring a target area in the image to be processed, wherein the target area is an area containing a text;
if the specified text is acquired in the target area, acquiring the text positioned at the specified relative position of the specified text as access verification information, wherein the specified relative position comprises a line behind the specified text or below the specified text;
and under the condition of displaying the real-time preview image, establishing wireless connection with a target wireless network based on the access verification information.
2. The method of claim 1, wherein the establishing a wireless connection with a target wireless network based on the access authentication information further comprises:
detecting whether the currently displayed interface is an access verification information input interface;
if the currently displayed interface is the access verification information input interface, inputting the access verification information in an information input area of the access verification information input interface;
and if the currently displayed interface is not the access verification information input interface, executing the wireless connection establishment with the target wireless network based on the access verification information.
3. The method of claim 1, wherein the establishing a wireless connection with a target wireless network based on the access authentication information comprises:
displaying the access verification information;
and responding to a connection instruction, and establishing wireless connection with the target wireless network based on the access verification information.
4. The method of claim 3, wherein the establishing a wireless connection with the target wireless network based on the access authentication information in response to the connection instruction further comprises:
if modification operation is detected, modifying the access verification information to obtain modified access verification information;
the responding to the connection instruction, and establishing wireless connection with the target wireless network based on the access verification information, including:
and responding to a connection instruction, and establishing wireless connection with the target wireless network based on the modified access verification information.
5. The method of claim 1, wherein the establishing a wireless connection with a target wireless network based on the access authentication information comprises:
selecting a target wireless network from the searched wireless networks, wherein the target wireless network is a wireless network of which the corresponding wireless signal intensity meets specified conditions;
requesting connection establishment with the target wireless network one by one based on the access authentication information.
6. The method according to claim 1, wherein the acquiring the image to be processed by the image acquisition device comprises:
and if the mobile terminal is detected to be in the designated posture, acquiring the image to be processed through the image acquisition device.
7. An apparatus for establishing a wireless connection, operable with a mobile terminal, the apparatus comprising:
the image acquisition unit is used for displaying the real-time preview image acquired by the image acquisition device and acquiring the real-time preview image acquired by the image acquisition device as an image to be processed;
the information extraction unit is used for acquiring a target area in the image to be processed, wherein the target area is an area containing a text; if the specified text is acquired in the target area, acquiring the text positioned at the specified relative position of the specified text as access verification information, wherein the specified relative position comprises a line behind the specified text or below the specified text;
and the wireless connection unit is used for establishing wireless connection with a target wireless network based on the access verification information under the condition of displaying the real-time preview image.
8. A mobile terminal comprising one or more processors and memory;
one or more programs stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to perform the method of any of claims 1-6.
9. A computer-readable storage medium storing program code executable by a processor, the computer-readable storage medium comprising stored program code, wherein the method of any of claims 1-6 is performed when the program code is executed.
CN202110469984.8A 2021-04-28 2021-04-28 Method and device for establishing wireless connection and mobile terminal Active CN113194470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110469984.8A CN113194470B (en) 2021-04-28 2021-04-28 Method and device for establishing wireless connection and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110469984.8A CN113194470B (en) 2021-04-28 2021-04-28 Method and device for establishing wireless connection and mobile terminal

Publications (2)

Publication Number Publication Date
CN113194470A CN113194470A (en) 2021-07-30
CN113194470B true CN113194470B (en) 2023-03-31

Family

ID=76980168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110469984.8A Active CN113194470B (en) 2021-04-28 2021-04-28 Method and device for establishing wireless connection and mobile terminal

Country Status (1)

Country Link
CN (1) CN113194470B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017003756A1 (en) * 2015-06-30 2017-01-05 Yahoo! Inc. Methods and systems for detecting and recognizing text from images
WO2020048441A1 (en) * 2018-09-03 2020-03-12 广东虚拟现实科技有限公司 Communication connection method, terminal device and wireless communication system

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899975A (en) * 2017-03-21 2017-06-27 广东小天才科技有限公司 Wireless network access method and mobile terminal
CN106973425A (en) * 2017-04-06 2017-07-21 上海掌门科技有限公司 A kind of method and apparatus for connecting WAP
CN107635233A (en) * 2017-10-25 2018-01-26 速感科技(北京)有限公司 Intelligent sweeping, intelligent sweeping system and its network collocating method
CN109165292A (en) * 2018-07-23 2019-01-08 Oppo广东移动通信有限公司 Data processing method, device and mobile terminal
CN109413760B (en) * 2018-10-23 2021-11-23 上海掌门科技有限公司 Wireless connection method and device
CN111461097A (en) * 2020-03-18 2020-07-28 北京大米未来科技有限公司 Method, apparatus, electronic device and medium for recognizing image information

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017003756A1 (en) * 2015-06-30 2017-01-05 Yahoo! Inc. Methods and systems for detecting and recognizing text from images
WO2020048441A1 (en) * 2018-09-03 2020-03-12 广东虚拟现实科技有限公司 Communication connection method, terminal device and wireless communication system

Also Published As

Publication number Publication date
CN113194470A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN106921560B (en) Voice communication method, device and system
WO2019233212A1 (en) Text identification method and device, mobile terminal, and storage medium
US9083848B2 (en) Speaker displaying method and videophone terminal therefor
CN105338391B (en) Intelligent television control method and mobile terminal
CN104066009B (en) program identification method, device, terminal, server and system
CN104394263A (en) Accessing point list displaying method and device
CN107038074B (en) Memory optimization device and method based on association strategy
CN110515533B (en) Electronic equipment shortcut operation method and device, electronic equipment and storage medium
CN108932102B (en) Data processing method and device and mobile terminal
CN111901896A (en) Information sharing method, information sharing device, electronic equipment and storage medium
CN109725543B (en) Equipment control code configuration method and device, cloud server and network system
CN111669737A (en) Bluetooth device connection method and device and electronic device
CN111367457A (en) Content sharing method and device and electronic equipment
CN111273769B (en) Equipment control method and device, electronic equipment and storage medium
CN114629932A (en) Electronic equipment and cooperation method between electronic equipment
CN105389113A (en) Gesture-based application control method and apparatus and terminal
WO2016202277A1 (en) Message sending method and mobile terminal
CN104391877A (en) Method, device, terminal and server for searching subjects
CN110933772A (en) Connection method of wireless device, mobile terminal and computer readable storage medium
CN114691277A (en) Application program processing method, intelligent terminal and storage medium
WO2019223484A1 (en) Information display method and apparatus, and mobile terminal and storage medium
EP3823270A1 (en) Video processing method and device, and terminal and storage medium
CN104679506B (en) A kind of terminal
CN113938733A (en) Shortcut key control method and device for remote control equipment, storage medium and device
CN107070707B (en) Method and device for determining initialization mode of router

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant