CN115087073A - Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium - Google Patents

Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium Download PDF

Info

Publication number
CN115087073A
CN115087073A CN202110260700.4A CN202110260700A CN115087073A CN 115087073 A CN115087073 A CN 115087073A CN 202110260700 A CN202110260700 A CN 202110260700A CN 115087073 A CN115087073 A CN 115087073A
Authority
CN
China
Prior art keywords
access node
connection
wireless terminal
configuration information
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110260700.4A
Other languages
Chinese (zh)
Inventor
许超杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202110260700.4A priority Critical patent/CN115087073A/en
Priority to PCT/CN2022/070949 priority patent/WO2022188538A1/en
Publication of CN115087073A publication Critical patent/CN115087073A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/15Setup of multiple wireless link connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

The embodiment of the invention discloses a method for authenticating Wi-Fi connection, a wireless terminal, an access node and a storage medium, which are used for connecting the wireless terminal with other encryption networks, and even if the wireless terminal is not connected before, the password does not need to be input manually, so that intelligent and safe connection is realized. The method provided by the embodiment of the invention comprises the following steps: establishing a first Wi-Fi connection with the access node; receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and establishing the second Wi-Fi connection with the access node according to the configuration information.

Description

Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium
Technical Field
The present invention relates to the field of wireless fidelity, and in particular, to a method for supporting an access node in a wireless terminal to authenticate a Wi-Fi connection, a wireless terminal, an access node, and a storage medium.
Background
Currently, a mainstream access node (AP) supports dual-band wireless access network (Wi-Fi), that is, 2.4GHz and 5GHz bands, and more wireless terminals (also referred to as stations) such as mobile phones and the like also support the 2.4GHz and 5GHz bands. For the AP, different frequency bands correspond to different Service Set Identifiers (SSIDs), belong to different networks, and all have respective authentication access passwords. Therefore, a STA needs to manually input a password when establishing connection with two (or more) Wi-Fi bands of the AP.
For such a scenario, usually, an STA completes an authenticated connection with Wi-Fi in one of the frequency bands of an AP, and then is considered to be a trusted connection for Wi-Fi in the other frequency band. But when the AP is connected with another Wi-Fi, the process of inputting the password by clicking the connection is still needed, and the experience is not intelligent and convenient enough.
Disclosure of Invention
The embodiment of the invention provides a method for supporting an access node to authenticate Wi-Fi connection in a wireless terminal, the access node and a storage medium, which are used for connecting the wireless terminal with other encryption networks, even if the wireless terminal is not connected before, passwords do not need to be input manually, and intelligent and safe connection is realized.
A first aspect of the present application provides a method for supporting an access node in a wireless terminal to authenticate a Wi-Fi connection, where the access node supports at least two Wi-Fi connections, and may include:
establishing a first Wi-Fi connection with the access node;
receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and
and establishing the second Wi-Fi connection with the access node according to the configuration information.
A second aspect of the present application provides a method of authenticating a Wi-Fi connection in an access node supporting at least two Wi-Fi connections, which may include:
establishing a first Wi-Fi connection with the wireless terminal;
sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection; the configuration information is used for the wireless terminal to establish the second Wi-Fi connection with the access node.
A third aspect of the present application provides a wireless terminal, where an access node supports at least two Wi-Fi connections, and may include:
a processing module to establish a first Wi-Fi connection with the access node;
a transceiver module to receive configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and
the processing module is further configured to establish the second Wi-Fi connection with the access node according to the configuration information.
A fourth aspect of the present application provides an access node supporting at least two Wi-Fi connections, which may include:
the connection establishing module is used for establishing a first Wi-Fi connection with the wireless terminal;
a processing module for the access node to support at least two Wi-Fi connections,
the receiving and sending module is used for sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection; the configuration information is used for the wireless terminal to establish the second Wi-Fi connection with the access node.
A fifth aspect of the present application provides a wireless terminal, which may include:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of the first aspect of the application.
A sixth aspect of the present application provides an access node, which may include:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of the second aspect of the application.
A seventh aspect of the present application provides a computer-readable storage medium comprising instructions which, when executed on a processor, cause the processor to perform the method of the first aspect, or the second aspect of the present application.
In yet another aspect, an embodiment of the present invention discloses a computer program product, which, when run on a computer, causes the computer to execute the method of the first aspect or the second aspect of the present application.
In another aspect, an embodiment of the present invention discloses an application publishing platform, configured to publish a computer program product, where when the computer program product runs on a computer, the computer is caused to execute the method according to the first aspect or the second aspect of the present application.
According to the technical scheme, the embodiment of the invention has the following advantages:
in the embodiment of the application, the access node supports at least two Wi-Fi connections, and a wireless terminal establishes a first Wi-Fi connection with the access node; receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and establishing the second Wi-Fi connection with the access node according to the configuration information. Namely, when the wireless terminal is connected with other encrypted networks, even if the wireless terminal is not connected before, the password does not need to be input manually, and intelligent and safe connection is realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and obviously, the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained according to the drawings.
FIG. 1 is a main functional block diagram of the inside of a Wi-Fi module in the embodiment of the present application;
FIG. 2 is a diagram illustrating an embodiment of a method for supporting an access node to authenticate a Wi-Fi connection in a wireless terminal according to an embodiment of the present application;
FIG. 3 is a diagram illustrating password interaction permission settings of different types of networks of an AP according to an embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of a method for supporting an access node to authenticate a Wi-Fi connection in a wireless terminal according to an embodiment of the present application;
FIG. 5 is a diagram of an embodiment of a wireless terminal in an embodiment of the present application;
FIG. 6 is a diagram of an embodiment of a wireless terminal in an embodiment of the present application;
fig. 7 is a schematic diagram of another embodiment of a wireless terminal according to an embodiment of the present invention;
fig. 8 is a schematic diagram of another embodiment of a wireless terminal according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a method for supporting an access node to authenticate Wi-Fi connection in a wireless terminal, the access node and a storage medium, which are used for realizing intelligent and safe connection without inputting passwords manually even if the wireless terminal is not connected with other encryption networks.
In order to make those skilled in the art better understand the technical solutions of the present invention, the technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The embodiments based on the present invention should fall into the protection scope of the present invention.
In the prior art, there is also a problem that each Wi-Fi needs to remember a password. Confusion is avoided if all Wi-Fi of the AP are set to the same password, but this presents another problem where one network is open to other users, but another network is only to family private members, and is easily accessible to other users if the same password is used.
In the embodiment of the application, the wireless terminal supports Wi-Fi linking. And may also be referred to as User Equipment (UE), access terminal, subscriber unit, subscriber station, mobile station, remote terminal, mobile device, User terminal, wireless communication device, User agent, or User device, etc.
The Wireless terminal may be a Station (ST) in a WLAN, and may be a cellular phone, a cordless phone, a Session Initiation Protocol (SIP) phone, a Wireless Local Loop (WLL) station, a Personal Digital Assistant (PDA) device, a handheld device with Wireless communication function, a computing device or other processing device connected to a Wireless modem, a vehicle-mounted device, a wearable device, a Wireless terminal in a next generation communication system such as an NR Network, or a Wireless terminal in a future evolved Public Land Mobile Network (PLMN) Network, and the like.
In the embodiment of the application, the wireless terminal can be deployed on land, including indoor or outdoor, handheld, wearable or vehicle-mounted; can also be deployed on the water surface (such as a ship and the like); and may also be deployed in the air (e.g., airplanes, balloons, satellites, etc.).
In the embodiment of the present application, the wireless terminal may be a Mobile Phone (Mobile Phone), a tablet computer (Pad), a computer with a wireless transceiving function, a Virtual Reality (VR) wireless terminal, an Augmented Reality (AR) wireless terminal, a wireless terminal in industrial control (industrial control), a wireless terminal in self driving (self driving), a wireless terminal in remote medical (remote medical), a wireless terminal in smart grid (smart grid), a wireless terminal in transportation safety, a wireless terminal in smart city (smart city), or a wireless terminal in smart home (smart home).
By way of example and not limitation, in embodiments of the present application, the wireless terminal may also be a wearable device. Wearable equipment can also be called wearable intelligent equipment, is the general term of applying wearable technique to carry out intelligent design, develop the equipment that can dress to daily wearing, like glasses, gloves, wrist-watch, dress and shoes etc.. A wearable device is a portable device that is worn directly on the body or integrated into the clothing or accessories of the user. The wearable device is not only a hardware device, but also realizes powerful functions through software support, data interaction and cloud interaction. The generalized wearable smart device includes full functionality, large size, and can implement full or partial functionality without relying on a smart phone, such as: smart watches or smart glasses and the like, and only focus on a certain type of application functions, and need to be used in cooperation with other devices such as smart phones, such as various smart bracelets for physical sign monitoring, smart jewelry and the like.
The method and the device utilize an encryption connection link established by the wireless terminal and the AP to transmit the SSID and the password of other networks of the AP by using a specific message, or transmit the SSID and the password of the network belonging to the same network subset AP with the AP. And after acquiring the specific information, the wireless terminal stores the specific information into a local Wi-Fi configuration file, when other Wi-Fi networks connected with the AP or networks belonging to the same network subset AP with the AP are connected, the Wi-Fi configuration file is inquired, and if the corresponding SSID and the password are inquired, the process of inputting the password is not needed, and the wireless terminal is directly connected with other Wi-Fi networks.
As shown in fig. 1, which is a main functional block diagram inside a Wi-Fi module in the embodiment of the present application, when a Wi-Fi requests a connection, in an authentication process, a network SSID and a password to be connected are queried from a configuration file (config file) in a memory, and if the network SSID and the password are queried, a process of requesting a password to be input by popping up a window does not occur.
The technical solution of the present application is further described below by way of examples.
Example 1: the wireless terminal acquires the configuration information of the second Wi-Fi through the access node, and the configuration information is actively requested by the wireless terminal to the access node. The access node supports at least two Wi-Fi connections.
As shown in fig. 2, a schematic diagram of an embodiment of a method for supporting an access node in a wireless terminal to authenticate a Wi-Fi connection in the embodiment of the present application may include:
201. the wireless terminal establishes a first Wi-Fi connection with the access node.
202. In the case that the first Wi-Fi connection is an encrypted connection, and/or the wireless terminal supports multiple Wi-Fi connections, the wireless terminal sends a request to the access node, the request requesting configuration information for the second Wi-Fi.
Optionally, the wireless terminal may first determine whether a first Wi-Fi connection established with the access node is an encrypted connection, and then determine whether the wireless terminal supports multiple Wi-Fi connections when the first Wi-Fi connection is the encrypted connection, and send a request to the access node when the wireless terminal supports multiple Wi-Fi connections.
Optionally, the wireless terminal may first determine whether the wireless terminal supports multiple Wi-Fi connections, and then determine whether a first Wi-Fi connection established with the access node is an encrypted connection when the wireless terminal supports multiple Wi-Fi connections, and send a request to the access node when the first Wi-Fi connection is an encrypted connection.
Optionally, the wireless terminal may determine whether a first Wi-Fi connection established with the access node is an encrypted connection, and send a request to the access node when the first Wi-Fi connection is the encrypted connection.
Optionally, the wireless terminal may first determine whether the wireless terminal supports multiple Wi-Fi connections, and in a case that the wireless terminal supports multiple Wi-Fi connections, the wireless terminal sends a request to the access node.
Illustratively, the wireless terminal may send a request to the access node based on the first Wi-Fi connection being encrypted; the access node receives a request sent by the wireless terminal. The request may be a specific request frame for requesting configuration information of the second Wi-Fi. The number of the second Wi-Fi devices may be one or more, and is not limited. The wireless terminal can judge whether to support multi-Wi-Fi connection capability according to the self capability, and the multi-Wi-Fi connection capability can be in a Wi-Fi multi-band form or a multi-frequency concurrent form (namely, a plurality of Wi-Fi are connected at the same time).
It will be appreciated that the cryptographic security of the current first Wi-Fi connection needs to be confirmed at both the wireless terminal and the access node end because of the SSID related cryptographic interaction between the wireless terminal and the access node.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
203. And the access node sends configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection under the condition that the first Wi-Fi connection is connected through encryption and the wireless terminal supports multiple Wi-Fi connections according to the request.
Optionally, the access node acquires the configuration information of the second Wi-Fi and sends the configuration information of the second Wi-Fi to the wireless terminal according to the request, when the first Wi-Fi connection is connected through encryption and the wireless terminal supports multiple Wi-Fi connections.
Optionally, the second Wi-Fi is a public type Wi-Fi. Since the public type Wi-Fi is generally low in security and privacy, the SSID and password can be acquired by other Wi-Fi.
Optionally, the access node may first determine whether a first Wi-Fi connection established with the wireless terminal is an encrypted connection, and then determine whether the wireless terminal supports multiple Wi-Fi connections if the first Wi-Fi connection is the encrypted connection, and acquire configuration information of a second Wi-Fi connection if the first Wi-Fi connection supports multiple Wi-Fi connections.
Optionally, the access node may first determine whether the wireless terminal supports multiple Wi-Fi connections, determine whether a first Wi-Fi connection established with the wireless terminal is an encrypted connection if the wireless terminal supports multiple Wi-Fi connections, and acquire configuration information of a second Wi-Fi connection if the first Wi-Fi connection is an encrypted connection.
Optionally, the access node may determine whether the wireless terminal supports multiple Wi-Fi connections, and acquire configuration information of a second Wi-Fi network when the wireless terminal supports multiple Wi-Fi connections.
Optionally, the access node may determine whether the first Wi-Fi connection established with the wireless terminal is an encrypted connection, and acquire configuration information of the second Wi-Fi in the case of the encrypted connection.
Optionally, the access node further confirms the Wi-Fi that allows another Wi-Fi to acquire the SSID and the password when determining that there is a second Wi-Fi, and further acquires the SSID and the password of the second Wi-Fi.
It will be appreciated that the wireless terminal receives configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection.
Optionally, the receiving, from the access node through the first Wi-Fi connection, configuration information of a second Wi-Fi may include:
the wireless terminal judges whether the first Wi-Fi connection is encrypted connection, and receives configuration information of a second Wi-Fi from the access node through the first Wi-Fi connection under the condition that the first Wi-Fi connection is encrypted connection; and/or the presence of a gas in the gas,
the wireless terminal judges whether the wireless terminal supports multi-Wi-Fi connection, and receives configuration information of a second Wi-Fi from the access node through the first Wi-Fi connection under the condition that the wireless terminal supports multi-Wi-Fi connection.
Optionally, within a second predetermined time, if the wireless terminal does not receive the configuration information of the second Wi-Fi, the request is sent to the access node again.
Optionally, the access node sends a response to the wireless terminal according to the request; the wireless terminal receives a response sent by the access node according to the request; the wireless terminal resending the request to the access node without recognizing the response; the access node re-receives the request from the wireless terminal.
It will be appreciated that the cryptographic security of the current first Wi-Fi connection needs to be confirmed at both the wireless terminal and the access node end because of the SSID related cryptographic interaction between the wireless terminal and the access node.
Each Wi-Fi network on an AP may set whether it allows access to passwords in this manner. Fig. 3 is a schematic diagram illustrating password interaction permission settings of different types of networks of an AP in the embodiment of the present application. In the illustration of fig. 3, the arrow direction indicates the direction of SSID and password transmission. The SSID and the password of the public wireless fidelity (public Wi-Fi) can be acquired by other public Wi-Fi and private wireless fidelity (private Wi-Fi) in the mode, the SSID and the password of the private Wi-Fi cannot be acquired by other public Wi-Fi, and the acquisition permission among different private Wi-Fi can be flexibly set.
Optionally, the wireless terminal receives the service set identifier and the password of the second Wi-Fi sent by the access node.
An example of an exemplary format of an acknowledgement frame carrying a service set identifier and a password of a second Wi-Fi network is shown, where an Information Element (IE) 1 indicates that the type of the frame is an acknowledgement frame of Service Set Identifier (SSID) and password interaction, and then an SSID and a corresponding password of each Wi-Fi network. As shown in table 1 below:
Figure BDA0002969842490000081
TABLE 1
It should be noted that, if the access node determines that the first Wi-Fi connection currently established with the wireless terminal is not an encrypted connection, a response including a reject frame may be replied to the wireless terminal; or, if the access node judges that no other Wi-Fi exists on the access node, a response including a rejection frame may be replied to the wireless terminal; alternatively, if the access node determines that there is no Wi-Fi that allows another Wi-Fi to obtain the SSID and password, a response including a reject frame may be replied to the wireless terminal. If the wireless terminal receives a response including a reject frame, the flow ends.
It can be understood that, if the wireless terminal sends a request to the access node, and if the access node receives a response including an acknowledgement frame, the configuration information of the second Wi-Fi in the acknowledgement frame is written into the local configuration file; if a response including the rejection frame replied by the access node is received, ending the process; if no response or no response is received within a preset time duration, the wireless terminal may implement a frame retransmission policy, i.e., resend the request to the access node.
204. The wireless terminal stores the configuration information in a local configuration file.
It is to be appreciated that the wireless terminal stores the configuration information for the second Wi-Fi in a local configuration file. Optionally, the configuration information of the second Wi-Fi may include a service set identifier and a password of the second Wi-Fi.
It is understood that the local configuration file may be a local Wi-Fi configuration file. Step 204 is an optional step.
205. And the wireless terminal establishes the second Wi-Fi connection with the access node according to the configuration information.
Optionally, the establishing the second Wi-Fi connection with the access node according to the configuration information may include: and the wireless terminal establishes the second Wi-Fi connection with the access node according to the configuration information in the local configuration file.
Optionally, if the configuration information of the second Wi-Fi is queried in the local configuration file, the wireless terminal establishes the second Wi-Fi connection with the access node.
Optionally, the establishing, by the wireless terminal, the second Wi-Fi connection with the access node may include:
(1) maintaining a connection with the first Wi-Fi and establishing the second Wi-Fi connection with the access node; i.e., a wireless terminal may connect two or more Wi-Fi simultaneously. Or the like, or, alternatively,
(2) and disconnecting the connection with the first Wi-Fi and establishing the second Wi-Fi connection with the access node. I.e., the wireless terminal switches from connecting a first Wi-Fi to connecting a second Wi-Fi.
It should be noted that the wireless terminal directly establishes the second Wi-Fi connection with the access node, which means that the wireless terminal does not need to input a password, and does not need to respond to the operation of inputting the password by the user, and can directly establish the second Wi-Fi connection with the access node.
Optionally, the method further includes: the wireless terminal receives second Wi-Fi updated configuration information from the access node via the first Wi-Fi connection, the second Wi-Fi updated configuration information including an updated service set identifier, and/or an updated password.
In the embodiment of the application, a wireless terminal establishes a first Wi-Fi connection with an access node; and under the condition that the first Wi-Fi connection is connected through encryption and the wireless terminal supports second Wi-Fi connection, if a service set identifier and a password of the second Wi-Fi are inquired in a local configuration file, the wireless terminal directly establishes the second Wi-Fi connection with an access node, and the second Wi-Fi is the Wi-Fi which is not connected with the wireless terminal. Namely, after the first encryption network is normally established between the wireless terminal and the access node, other encryption networks are connected, even if the wireless terminal and the access node are not connected before, the password does not need to be input manually, and intelligent and safe connection is realized. Optionally, the SSID and password of other Wi-Fi networks between the two devices are interacted by using an encryption network already established between the wireless terminal and the AP. Therefore, after the wireless terminal and the AP normally establish the first encryption network, other encryption networks are connected, even if the wireless terminal and the AP are not connected before, the password does not need to be manually input, the wireless terminal looks like being connected with the network, and intelligent and safe connection is realized.
In the embodiment of the application, when a Wi-Fi of a wireless terminal and an Access Point (AP) establishes a connection successfully and then establishes a connection with other Wi-Fi of the AP, even if the connection is the first time and an authentication encryption process exists, a user does not need to manually input a password, and the wireless terminal can be directly connected with other Wi-Fi.
Example 2: and the wireless terminal acquires the configuration information of the second Wi-Fi through the access node, and the configuration information is actively sent to the wireless terminal by the access node. The access node supports at least two Wi-Fi connections.
As shown in fig. 4, a schematic diagram of another embodiment of a method for supporting an access node in a wireless terminal to authenticate a Wi-Fi connection in the embodiment of the present application may include:
401. the wireless terminal establishes a first Wi-Fi connection with the access node.
402. And sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection under the condition that the first Wi-Fi connection is connected through encryption and/or the wireless terminal supports multiple Wi-Fi connections.
Optionally, the configuration information of the second Wi-Fi is obtained and sent to the wireless terminal when the first Wi-Fi connection is connected through encryption and/or the wireless terminal supports multiple Wi-Fi connections.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
Optionally, the second Wi-Fi is a public type Wi-Fi. Since the public type Wi-Fi is generally low in security and privacy, the SSID and password can be acquired by other Wi-Fi.
Optionally, the access node may first determine whether a first Wi-Fi connection established with the wireless terminal is an encrypted connection, and then determine whether the wireless terminal supports multiple Wi-Fi connections when the first Wi-Fi connection is the encrypted connection, and acquire configuration information of a second Wi-Fi connection when the multiple Wi-Fi connections are supported.
Optionally, the access node determines whether the wireless terminal supports multiple Wi-Fi connections, determines whether a first Wi-Fi connection established with the wireless terminal is an encrypted connection if the wireless terminal supports multiple Wi-Fi connections, and acquires configuration information of a second Wi-Fi connection if the first Wi-Fi connection is an encrypted connection.
Optionally, the access node may determine whether the first Wi-Fi connection established with the wireless terminal is an encrypted connection, and acquire configuration information of the second Wi-Fi in the case of the encrypted connection.
Optionally, the access node may determine whether the wireless terminal supports multiple Wi-Fi connections, and acquire configuration information of a second Wi-Fi network when the wireless terminal supports multiple Wi-Fi connections.
Optionally, the access node further confirms the Wi-Fi that allows another Wi-Fi to acquire the SSID and the password when determining that there is a second Wi-Fi, and further acquires the SSID and the password of the second Wi-Fi.
It will be appreciated that the wireless terminal receives configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection. Optionally, after receiving the service set identifier and the password of the second Wi-Fi sent by the access node, the wireless terminal may reply an Acknowledgement (ACK) to the access node according to a common frame.
Optionally, the receiving, from the access node through the first Wi-Fi connection, configuration information of a second Wi-Fi may include:
the wireless terminal judges whether the first Wi-Fi connection is encrypted connection, and receives configuration information of a second Wi-Fi from the access node through the first Wi-Fi connection under the condition that the first Wi-Fi connection is encrypted connection; and/or the presence of a gas in the gas,
the wireless terminal judges whether the wireless terminal supports multi-Wi-Fi connection, and receives configuration information of a second Wi-Fi from the access node through the first Wi-Fi connection under the condition that the wireless terminal supports multi-Wi-Fi connection.
It will be appreciated that the cryptographic security of the current first Wi-Fi connection needs to be confirmed at both the wireless terminal and the access node end because of the SSID related cryptographic interaction between the wireless terminal and the access node.
Optionally, within a first predetermined time, if the wireless terminal does not receive the configuration information of the second Wi-Fi, the request is sent to the access node.
Optionally, the access node sends a response to the wireless terminal according to the request; the wireless terminal receives a response sent by the access node according to the request; the wireless terminal resending the request to the access node without recognizing the response; the access node re-receives the request from the wireless terminal.
That is, in the embodiment where the access node actively sends the configuration information of the second Wi-Fi to the wireless terminal, if the wireless terminal does not receive the configuration information of the second Wi-Fi sent by the access node within the first predetermined time period, the wireless terminal may initiate a request to the access node to actively request the configuration information of the second Wi-Fi. It can be understood that, if the wireless terminal sends a request to the access node, and if the access node receives a response including an acknowledgement frame, the configuration information of the second Wi-Fi in the acknowledgement frame is written into the local configuration file; if a response including the rejection frame replied by the access node is received, ending the process; if no response or no recognized response is received within the second predetermined time period, the wireless terminal may implement a frame retransmission policy, i.e., resend the request to the access node.
Optionally, when it is detected that the second Wi-Fi configuration information is updated, the access node acquires the updated configuration information of the second Wi-Fi; the access node sends second Wi-Fi updated configuration information to the wireless terminal through the first Wi-Fi connection; the second Wi-Fi updated configuration information includes the second Wi-Fi updated service set identifier, and/or an updated password. That is, the service set identifier of the second Wi-Fi may be updated, and the password may also be updated, and in case of update, the access node may also actively send the updated service set identifier and/or the updated password to the wireless terminal, and notify the wireless terminal to update its SSID and password in time.
An example of a specific frame format carrying a service set identifier and a password of a second Wi-Fi is illustrated, where an Information Element (IE) 2 indicates that the type of the frame is a specific frame of a Service Set Identifier (SSID) and password interaction, and then an SSID and a corresponding password of each Wi-Fi network. As shown in table 2 below:
Figure BDA0002969842490000131
TABLE 2
403. The wireless terminal stores the configuration information in a local configuration file.
404. And the wireless terminal establishes the second Wi-Fi connection with the access node according to the configuration information.
Optionally, steps 403 and 404 may refer to the description of steps 204 and 205 in the embodiment shown in fig. 3, and are not described herein again.
In the embodiment shown in fig. 2, the wireless terminal mainly initiates the request, the AP responds, and then the wireless terminal performs different operations according to different results. However, the wireless terminal requests, the AP replies, and then the wireless terminal performs different operations according to different reply types, which is a somewhat cumbersome process. The method is only carried out at the stage of establishing connection of one network, after SSID and password of other networks are obtained, if the obtained SSID or password of the network is changed, the wireless terminal cannot know the SSID or password in time, and at the moment, if the wireless terminal is connected with the network with the modified SSID or password of the AP, the password still needs to be input again. In the embodiment of the application, after the wireless terminal and the AP establish the first Wi-Fi connection, the AP actively sends out a frame carrying SSIDs and passwords of other Wi-Fi, and the wireless terminal replies ACK according to the common frame without further processing if the function of the scheme is not supported. In addition, when the SSID or password of the Wi-Fi connected with the AP and the wireless terminal is not modified, the specific frame can be triggered to be sent on the Wi-Fi connected with the AP and the wireless terminal, and the wireless terminal is informed to update the SSID and the password in time.
The application has the innovation point that SSIDs and passwords of other networks of the AP are obtained interactively by using the encrypted connection link established by the wireless terminal and the AP, so that the process that the same wireless terminal needs to input the passwords repeatedly when being connected with different networks of the same AP is omitted. For the wireless terminal, the wireless terminal can be in different frequency bands or in a multi-frequency concurrent mode; for an AP, it is its different network SSID. The corresponding interactive frame definition may include a request frame and a reply frame. The other key point is the setting of network SSID and password acquisition authority at the AP side.
The technical scheme of the application needs to support the function of the wireless terminal and the AP which support multiple frequencies (including concurrency), and the functions can be respectively demonstrated.
Establishing a first connection with a multi-frequency AP to be proved by using a wireless terminal supporting the function, then initiating connection with a second network by the wireless terminal, and observing whether the connection is successful without inputting a password; and establishing a first connection with a multi-frequency wireless terminal to be proved by using the AP supporting the function, and then initiating connection with a second network by the wireless terminal to observe whether the direct connection is successful without inputting a password.
For some products, a similar technical scheme can be used, but the frame type is modified, so that the product cannot correctly analyze the frame, a wireless terminal and an AP using the same manufacturer scheme can be connected, and whether password connection is not required to be input by other networks after the password connection is input by the first network is observed. And the technical scheme can also be used for preliminarily judging whether the product to be proved uses the data such as the product introduction description and the like.
As shown in fig. 5, which is a schematic diagram of an embodiment of a wireless terminal in an embodiment of the present application, an access node supports at least two Wi-Fi connections, and may include:
a processing module 501, configured to establish a first Wi-Fi connection with the access node;
a transceiver module 502 configured to receive configuration information of a second Wi-Fi from the access node over the first Wi-Fi connection; and
the processing module 501 is further configured to establish the second Wi-Fi connection with the access node according to the configuration information.
Optionally, the transceiver module 502 is specifically configured to receive, through the first Wi-Fi connection, configuration information of a second Wi-Fi from the access node when the first Wi-Fi connection is an encrypted connection.
Optionally, the transceiver module 502 is specifically configured to receive, through the first Wi-Fi connection, configuration information of a second Wi-Fi from the access node, when multiple Wi-Fi connections are supported.
Optionally, the processing module 501 is further configured to store the configuration information in a local configuration file.
Optionally, the processing module 501 is specifically configured to establish the second Wi-Fi connection with the access node according to the configuration information in the local configuration file.
Optionally, the transceiver module 502 is further configured to send a request to the access node, where the request is used to request the access node for the configuration information of the second Wi-Fi of the access node.
Optionally, the transceiver module 502 is further configured to send the request to the access node within a first predetermined time if the wireless terminal does not receive the configuration information of the second Wi-Fi.
Optionally, the transceiver module 502 is further configured to, within a second predetermined time, if the wireless terminal does not receive the configuration information of the second Wi-Fi, resend the request to the access node.
Optionally, the transceiver module 502 is further configured to receive a response sent by the access node according to the request; re-sending the request to the access node if the response is not identified.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the transceiver module 502 is further configured to receive, from the access node through the first Wi-Fi connection, the updated configuration information of the second Wi-Fi.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
Optionally, the second Wi-Fi is a public type Wi-Fi.
Optionally, the processing module 501 is specifically configured to maintain a connection with the first Wi-Fi, and establish the second Wi-Fi connection with the access node; or the like, or, alternatively,
the processing module 501 is specifically configured to disconnect the connection with the first Wi-Fi and establish the second Wi-Fi connection with the access node.
As shown in fig. 6, which is a schematic diagram of an embodiment of an access node in the embodiment of the present application, the access node supports at least two Wi-Fi connections, and may include:
a processing module 601 for the access node to support at least two Wi-Fi connections,
a transceiver module 602, configured to send configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection; the configuration information is used for the wireless terminal to establish the second Wi-Fi connection with the access node.
Optionally, the transceiver module 602 is specifically configured to send, to the wireless terminal, configuration information of a second Wi-Fi through the first Wi-Fi connection when the first Wi-Fi connection is an encrypted connection.
Optionally, the transceiver module 602 is specifically configured to send configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection when the wireless terminal supports multiple Wi-Fi connections.
Optionally, the transceiver module 602 is further configured to receive a request sent by the wireless terminal;
the processing module 601 is specifically configured to send configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection according to the request.
Optionally, the transceiver module 602 is further configured to send a response to the wireless terminal according to the request; re-receiving the request from the wireless terminal.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the transceiver module 602 is further configured to send the updated configuration information of the second Wi-Fi to the wireless terminal through the first Wi-Fi connection.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
Optionally, the second Wi-Fi is a public type Wi-Fi.
As shown in fig. 7, which is a schematic diagram of another embodiment of the wireless terminal in the embodiment of the present invention, the method may include:
fig. 7 is a block diagram illustrating a partial structure of a handset associated with a wireless terminal provided by an embodiment of the present invention. Referring to fig. 7, the handset includes: radio Frequency (RF) circuit 710, memory 720, input unit 730, display unit 740, sensor 750, audio circuit 760, wireless fidelity (Wi-Fi) module 770, processor 780, and power supply 790. Those skilled in the art will appreciate that the handset configuration shown in fig. 7 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 7:
the RF circuit 710 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information of a base station and then processes the received downlink information to the processor 780; in addition, the data for designing uplink is transmitted to the base station. In general, the RF circuit 710 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 710 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 720 may be used to store software programs and modules, and the processor 780 may execute various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 720. The memory 720 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 720 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 730 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 730 may include a touch panel 731 and other input devices 732. The touch panel 731, also referred to as a touch screen, can collect touch operations of a user (e.g. operations of the user on or near the touch panel 731 by using any suitable object or accessory such as a finger, a stylus, etc.) and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 731 may include two portions of a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts it to touch point coordinates, and sends the touch point coordinates to the processor 780, and can receive and execute commands from the processor 780. In addition, the touch panel 731 may be implemented by various types, such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 730 may include other input devices 732 in addition to the touch panel 731. In particular, other input devices 732 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 740 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The Display unit 740 may include a Display panel 741, and optionally, the Display panel 741 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 731 can cover the display panel 741, and when the touch panel 731 detects a touch operation on or near the touch panel 731, the touch operation is transmitted to the processor 780 to determine the type of the touch event, and then the processor 780 provides a corresponding visual output on the display panel 741 according to the type of the touch event. Although the touch panel 731 and the display panel 741 are two independent components in fig. 7 to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 731 and the display panel 741 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 750, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display panel 741 according to the brightness of ambient light, and a proximity sensor that turns off the display panel 741 and/or a backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 760, speaker 761, and microphone 762 may provide an audio interface between a user and a cell phone. The audio circuit 760 can transmit the electrical signal converted from the received audio data to the speaker 761, and the electrical signal is converted into a sound signal by the speaker 761 and output; on the other hand, the microphone 762 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 760, and then processes the audio data output processor 780, and then transmits the audio data to, for example, another cellular phone through the RF circuit 710, or outputs the audio data to the memory 720 for further processing.
Wi-Fi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through a Wi-Fi module 770, and provides wireless broadband internet access for the user. Although fig. 7 shows the Wi-Fi module 770, it is understood that it does not belong to the essential constitution of the handset and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 780 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 720 and calling data stored in the memory 720, thereby integrally monitoring the mobile phone. Alternatively, processor 780 may include one or more processing units; preferably, the processor 780 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 780.
The handset also includes a power supply 790 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 780 via a power management system, so that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which will not be described herein.
In this embodiment of the present invention, the access node supports at least two Wi-Fi connections, and includes:
a processor 780 configured to establish a first Wi-Fi connection with the access node;
RF circuitry 710 to receive configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and
the processor 780 is further configured to establish the second Wi-Fi connection with the access node according to the configuration information.
Optionally, the RF circuit 710 is specifically configured to receive, from the access node through the first Wi-Fi connection, configuration information of a second Wi-Fi when the first Wi-Fi connection is an encrypted connection.
Optionally, the RF circuit 710 is specifically configured to receive, through the first Wi-Fi connection, configuration information of a second Wi-Fi from the access node in a case that multiple Wi-Fi connections are supported.
Optionally, the processor 780 is further configured to store the configuration information in a local configuration file.
Optionally, the processor 780 is specifically configured to establish the second Wi-Fi connection with the access node according to the configuration information in the local configuration file.
Optionally, the RF circuit 710 is further configured to send a request to the access node, where the request is used to request the access node for configuration information of the second Wi-Fi of the access node.
Optionally, the RF circuit 710 is further configured to send the request to the access node if the wireless terminal does not receive the configuration information of the second Wi-Fi within the first predetermined time.
Optionally, the RF circuit 710 is further configured to resend the request to the access node if the wireless terminal does not receive the configuration information of the second Wi-Fi within a second predetermined time.
Optionally, the RF circuit 710 is further configured to receive a response sent by the access node according to the request; re-sending the request to the access node if the response is not identified.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the RF circuit 710 is further configured to receive the second Wi-Fi updated configuration information from the access node via the first Wi-Fi connection.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
Optionally, the second Wi-Fi is a public type Wi-Fi.
Optionally, the processor 780 is specifically configured to maintain the connection with the first Wi-Fi, and establish the second Wi-Fi connection with the access node; or the like, or, alternatively,
the processor 780 is specifically configured to disconnect the first Wi-Fi connection and establish the second Wi-Fi connection with the access node.
As shown in fig. 8, which is a schematic diagram of another embodiment of an access node in the embodiment of the present invention, the access node supports at least two Wi-Fi connections, and may include:
a memory 801 in which executable program code is stored;
a processor 802 and a transceiver 803 coupled to the memory 801;
a processor 802 for the access node to support at least two Wi-Fi connections,
a transceiver 803 for transmitting configuration information for a second Wi-Fi to the wireless terminal over the first Wi-Fi connection; the configuration information is used for the wireless terminal to establish the second Wi-Fi connection with the access node.
Optionally, the transceiver 803 is specifically configured to send, to the wireless terminal, configuration information of a second Wi-Fi through the first Wi-Fi connection when the first Wi-Fi connection is an encrypted connection.
Optionally, the transceiver 803 is specifically configured to send, to the wireless terminal, configuration information of a second Wi-Fi through the first Wi-Fi connection when the wireless terminal supports multiple Wi-Fi connections.
Optionally, the transceiver 803 is further configured to receive a request sent by the wireless terminal;
the processor 802 is specifically configured to send configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection according to the request.
Optionally, the transceiver 803 is further configured to send a response to the wireless terminal according to the request; re-receiving the request from the wireless terminal.
Optionally, the second Wi-Fi is another Wi-Fi of the access node, or the second Wi-Fi is a Wi-Fi of another access node of the same network subset as the access node.
Optionally, the configuration information includes a service set identifier and a password.
Optionally, the transceiver 803 is further configured to send the updated second Wi-Fi configuration information to the wireless terminal through the first Wi-Fi connection, where the updated second Wi-Fi configuration information includes an updated service set identifier and/or an updated password.
Optionally, the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected.
Optionally, the second Wi-Fi is a public type Wi-Fi.
In the above embodiments, all or part of the implementation may be realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product.
The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that a computer can store or a data storage device, such as a server, a data center, etc., that is integrated with one or more available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (30)

1. A method in a wireless terminal for supporting an access node for authenticating Wi-Fi connections, the access node supporting at least two Wi-Fi connections, comprising:
establishing a first Wi-Fi connection with the access node;
receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and
and establishing the second Wi-Fi connection with the access node according to the configuration information.
2. The method of claim 1, wherein receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection comprises:
receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection if the first Wi-Fi connection is an encrypted connection.
3. The method of claim 1 or 2, wherein the receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection comprises:
receiving configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection if multiple Wi-Fi connections are supported.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
storing the configuration information in a local configuration file.
5. The method of claim 4, wherein the establishing the second Wi-Fi connection with the access node according to the configuration information comprises:
and establishing the second Wi-Fi connection with the access node according to the configuration information in the local configuration file.
6. The method according to claim 1 or 2, characterized in that the method further comprises:
sending a request to the access node, the request to request configuration information of the second Wi-Fi of the access node from the access node.
7. The method according to claim 1 or 2, characterized in that the method further comprises:
and within first preset time, if the wireless terminal does not receive the configuration information of the second Wi-Fi, the request is sent to the access node.
8. The method of claim 6, further comprising:
and if the wireless terminal does not receive the configuration information of the second Wi-Fi within second preset time, the request is sent to the access node again.
9. The method of claim 6, further comprising:
receiving a response sent by the access node according to the request;
re-sending the request to the access node if the response is not identified.
10. The method of claim 1 or 2, wherein the second Wi-Fi is other Wi-Fi of the access node, or wherein the second Wi-Fi is Wi-Fi of other access nodes of the same network subset as the access node.
11. The method of claim 1 or 2, wherein the configuration information comprises a service set identifier and a password.
12. The method of claim 11, further comprising:
receiving, from the access node, the second Wi-Fi updated configuration information over the first Wi-Fi connection.
13. The method of claim 1 or 2, wherein the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected to.
14. The method of claim 1 or 2, wherein the second Wi-Fi is a public type Wi-Fi.
15. The method of claim 1 or 2, wherein the establishing the second Wi-Fi connection with the access node comprises:
maintaining a connection with the first Wi-Fi and establishing the second Wi-Fi connection with the access node; or the like, or, alternatively,
and disconnecting the connection with the first Wi-Fi and establishing the second Wi-Fi connection with the access node.
16. A method of authenticating a Wi-Fi connection in an access node supporting at least two Wi-Fi connections, comprising:
establishing a first Wi-Fi connection with the wireless terminal;
sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection; the configuration information is used for the wireless terminal to establish the second Wi-Fi connection with the access node.
17. The method of claim 16, wherein sending configuration information for a second Wi-Fi to the wireless terminal over the first Wi-Fi connection comprises:
and sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection when the first Wi-Fi connection is an encrypted connection.
18. The method of claim 16 or 17, wherein the sending configuration information for a second Wi-Fi to the wireless terminal over the first Wi-Fi connection comprises:
and sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection under the condition that the wireless terminal supports multiple Wi-Fi connections.
19. The method of claim 16 or 17, further comprising:
receiving a request sent by the wireless terminal;
the sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection comprises:
and sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection according to the request.
20. The method of claim 19, further comprising:
sending a response to the wireless terminal according to the request;
re-receiving the request from the wireless terminal.
21. The method of claim 16 or 17, wherein the second Wi-Fi is another Wi-Fi of the access node, or wherein the second Wi-Fi is a Wi-Fi of another access node of a same network subset as the access node.
22. The method of claim 16 or 17, wherein the configuration information comprises a service set identifier and a password.
23. The method of claim 22, further comprising:
and sending the updated configuration information of the second Wi-Fi to the wireless terminal through the first Wi-Fi connection.
24. The method of claim 16 or 17, wherein the second Wi-Fi is a Wi-Fi that the wireless terminal has not connected to.
25. The method of claim 16 or 17, wherein the second Wi-Fi is a public type Wi-Fi.
26. A wireless terminal, an access node supporting at least two Wi-Fi connections, comprising:
a processing module to establish a first Wi-Fi connection with the access node;
a transceiver module to receive configuration information for a second Wi-Fi from the access node over the first Wi-Fi connection; and
the processing module is further configured to establish the second Wi-Fi connection with the access node according to the configuration information.
27. An access node supporting at least two Wi-Fi connections, comprising:
a processing module for the access node to support at least two Wi-Fi connections,
the receiving and sending module is used for sending configuration information of a second Wi-Fi to the wireless terminal through the first Wi-Fi connection; the configuration information is used to establish the second Wi-Fi connection with the access node.
28. A wireless terminal, comprising:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of any of claims 1-15.
29. An access node, comprising:
a memory storing executable program code;
a processor and transceiver coupled with the memory;
the transceiver and the processor invoke the executable program code stored in the memory for performing the method of any of claims 16-25.
30. A computer-readable storage medium comprising instructions that, when executed on a processor, cause the processor to perform the method of any of claims 1-15, or any of claims 16-25.
CN202110260700.4A 2021-03-10 2021-03-10 Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium Pending CN115087073A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110260700.4A CN115087073A (en) 2021-03-10 2021-03-10 Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium
PCT/CN2022/070949 WO2022188538A1 (en) 2021-03-10 2022-01-10 Method for authenticating wi-fi connection, wireless terminal, access node, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110260700.4A CN115087073A (en) 2021-03-10 2021-03-10 Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium

Publications (1)

Publication Number Publication Date
CN115087073A true CN115087073A (en) 2022-09-20

Family

ID=83227387

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110260700.4A Pending CN115087073A (en) 2021-03-10 2021-03-10 Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium

Country Status (2)

Country Link
CN (1) CN115087073A (en)
WO (1) WO2022188538A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104010309A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method for establishing connection between access point and terminal and terminal
CN107852655A (en) * 2016-05-31 2018-03-27 华为技术有限公司 Switch the method and terminal device of access point
CN107920353A (en) * 2016-10-08 2018-04-17 中兴通讯股份有限公司 A kind of method and hot spot access device of Wireless Fidelity connection switching hot spot
US20190364566A1 (en) * 2018-05-23 2019-11-28 Google Llc Intelligent Band Selection for Wireless Access Point
CN110602707A (en) * 2019-09-05 2019-12-20 青岛海信移动通信技术股份有限公司 Method and terminal for connecting wireless network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112312372A (en) * 2020-10-26 2021-02-02 Oppo广东移动通信有限公司 Network access method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104010309A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method for establishing connection between access point and terminal and terminal
CN107852655A (en) * 2016-05-31 2018-03-27 华为技术有限公司 Switch the method and terminal device of access point
CN107920353A (en) * 2016-10-08 2018-04-17 中兴通讯股份有限公司 A kind of method and hot spot access device of Wireless Fidelity connection switching hot spot
US20190364566A1 (en) * 2018-05-23 2019-11-28 Google Llc Intelligent Band Selection for Wireless Access Point
CN110602707A (en) * 2019-09-05 2019-12-20 青岛海信移动通信技术股份有限公司 Method and terminal for connecting wireless network

Also Published As

Publication number Publication date
WO2022188538A1 (en) 2022-09-15

Similar Documents

Publication Publication Date Title
CN110167201B (en) Data transmission method, related device and system
CN109995701B (en) Equipment guiding method, terminal and server
CN110944406B (en) Link establishment method of sidelink and terminal
CN111106907A (en) Indication method and terminal for Transmission Configuration Indication (TCI) state
CN112788783B (en) Relay connection establishment method and device
CN106550361B (en) Data transmission method, equipment and computer readable storage medium
JP2020528716A (en) WI-FI hotspot connection method and terminal
CN110868240A (en) Frequency hopping method, terminal and network equipment during PUSCH (physical uplink shared channel) repeated transmission
CN108391277B (en) Signal connection method, device, mobile terminal and computer readable storage medium
CN104581993A (en) Wireless connection building method, data transmission method and terminal
CN111818593A (en) Network switching method and terminal
CN112469109A (en) Method for preferentially selecting ENDC cell, terminal device and storage medium
CN111800794B (en) Method and equipment for determining demodulation reference signal position
CN112691363A (en) Cross-terminal switching method and related device for cloud games
CN106998553B (en) Equipment identity identification method, computer equipment and storage medium
CN113038513A (en) Method, terminal device and storage medium for independent networking weak coverage
CN112654073B (en) Network attachment method and user equipment
WO2022252716A1 (en) Method for acquiring timer parameters, terminal device, and storage medium
CN107534958B (en) Signal transmission method, base station and user equipment
CN112954823B (en) Method for reestablishing data connection, terminal equipment and storage medium
CN115087073A (en) Method for authenticating Wi-Fi connection, wireless terminal, access node and storage medium
CN107925565B (en) Algorithm updating method, equipment to be updated and server
CN111601364B (en) Method for sending and receiving network identification information and communication equipment
CN113873684A (en) Connection establishing method and device based on local area network, terminal equipment and storage medium
CN110740024B (en) CSI reporting method, terminal and network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination