WO2016101729A1 - Wireless network access method, device and system - Google Patents

Wireless network access method, device and system Download PDF

Info

Publication number
WO2016101729A1
WO2016101729A1 PCT/CN2015/094708 CN2015094708W WO2016101729A1 WO 2016101729 A1 WO2016101729 A1 WO 2016101729A1 CN 2015094708 W CN2015094708 W CN 2015094708W WO 2016101729 A1 WO2016101729 A1 WO 2016101729A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
guest terminal
router
guest
wireless
Prior art date
Application number
PCT/CN2015/094708
Other languages
French (fr)
Chinese (zh)
Inventor
赵俊博
王中华
向明
Original Assignee
北京奇虎科技有限公司
奇智软件(北京)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201410826919.6A priority Critical patent/CN104540128B/en
Priority to CN201410826919.6 priority
Application filed by 北京奇虎科技有限公司, 奇智软件(北京)有限公司 filed Critical 北京奇虎科技有限公司
Publication of WO2016101729A1 publication Critical patent/WO2016101729A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Abstract

The present invention relates to the technical field of communications. Disclosed are a wireless network access method, device and system, mainly aiming at addressing the problem of a complex operation process when a visitor accesses a wireless AP, the main technical solution of the present invention comprising: detecting a signal strength of a visitor terminal; according to the signal strength, calculating an actual distance between the visitor terminal and a router; comparing the actual distance with a preset distance threshold; if the actual distance is not greater than the distance threshold, then transmitting an authentication request to a manager terminal, thus enabling the manager terminal to determine whether to enable the visitor terminal to access a wireless access point (AP) created by the router; and receiving a request response returned by the manager terminal, and according to instruction information carried in the request response, allowing access by the visitor terminal or canceling access by the visitor terminal. The present invention is mainly used in the process of a visitor terminal accessing a wireless AP in a home local area network.

Description

Method, device and system for wireless network access Technical field

The present invention relates to the field of communications technologies, and in particular, to a method, device, and system for wireless network access.

Background technique

Wireless Fidelity (WiFi) is one of the most widely used wireless network transmission technologies. WiFi is a wireless network composed of wireless access points (APs) and wireless network cards. Wireless APs are commonly called "hot spots". Any A user terminal such as a smartphone, tablet or laptop with a wireless network card can share network resources through the AP.

In the home network, the host usually sets a password for the wireless AP. When the user terminal of the visitor detects the signal of the wireless AP, the visitor needs to manually select the AP name to be joined, and manually input the wireless password for authentication. In practical applications, manually selecting the AP name and entering the wireless password is cumbersome to operate, and the process of password input is very error-prone.

Summary of the invention

In view of this, the embodiments of the present invention provide a method, a device, and a system for accessing a wireless network, and the main purpose thereof is to solve the problem that the operation process is cumbersome when a visitor accesses the wireless AP.

According to an aspect of the present invention, a method for wireless network access is provided, including:

Detecting the signal strength of the visitor terminal;

Calculating the actual distance between the guest terminal and the router according to the signal strength;

Comparing the actual distance with a preset distance threshold;

If the actual distance is not greater than the distance threshold, send an authentication request to the management terminal, so that the management terminal determines whether to access the guest terminal to the wireless access node AP created by the router;

Receiving a request response returned by the management terminal, and accessing or canceling accessing the guest terminal according to the indication information carried in the request response.

According to another aspect of the present invention, an apparatus for wireless network access is provided, including:

a detecting unit, configured to detect a signal strength of the visitor terminal;

a calculating unit, configured to calculate an actual distance between the guest terminal and the router according to the signal strength detected by the detecting unit;

a comparison unit, configured to compare the actual distance calculated by the calculation unit with a preset distance threshold;

a sending unit, configured to send an authentication request to the management terminal when the actual distance of the comparison unit is not greater than the distance threshold, so that the management terminal determines whether to access the guest terminal to the wireless access node AP created by the router;

a receiving unit, configured to receive a request response returned by the management terminal sent by the sending unit;

The operating unit is configured to access or cancel access to the guest terminal according to the indication information carried in the request response received by the receiving unit.

According to another aspect of the present invention, a system for wireless network access is provided, the system Including a guest terminal, a router, and a management terminal, wherein

The router is configured to detect the signal strength of the guest terminal, calculate the actual distance between the guest terminal and the router according to the signal strength, and compare the actual distance with the preset distance threshold. If the actual distance is not greater than the distance threshold, the router is sent to the management terminal. Send an authentication request;

The management terminal is configured to receive an authentication request sent by the router, determine whether the guest terminal is connected to the wireless access node AP created by the router, and send a request response to the router;

The router is further configured to receive a request response returned by the management terminal, and access or cancel access to the guest terminal according to the indication information carried in the request response.

According to another aspect of the present invention, a computer program is presented, comprising computer readable code that, when executed on a computing device, causes the computing device to perform the wireless network access described above Methods.

According to another aspect of the present invention, a computer readable medium is proposed, wherein the computer program described above is stored.

According to the above technical solution, the method, device and system for wireless network access provided by the present invention, the router detects the signal strength of the guest terminal, calculates the actual distance between the guest terminal and the router according to the signal strength, and calculates the calculated actual distance. Comparing with the preset distance threshold, when the actual distance is not greater than the distance threshold, the router sends an authentication request to the management terminal, and the management terminal determines whether the guest terminal is connected to the wireless AP created by the router, and sends the signal to the router. The request response, the router receives the request response sent by the management terminal, and accesses or cancels access to the guest terminal according to the indication information carried in the request response. Compared with the prior art, the actual distance between the guest terminal and the router calculated by the router is not greater than the distance threshold, and then the router determines to access the guest terminal according to the indication information sent by the management terminal, without manually inputting the wireless password for checking. Therefore, the method provided by the present invention can greatly simplify the operation process of the visitor terminal accessing the wireless AP.

The above description is only an overview of the technical solutions of the present invention, and the above-described and other objects, features and advantages of the present invention can be more clearly understood. Specific embodiments of the invention are set forth below.

DRAWINGS

Various other advantages and benefits will become apparent to those skilled in the art from a The drawings are only for the purpose of illustrating the preferred embodiments and are not to be construed as limiting. Throughout the drawings, the same reference numerals are used to refer to the same parts. In the drawing:

FIG. 1 is a flowchart of a method for accessing a wireless network according to an embodiment of the present invention;

2 is a schematic diagram of an authentication request interface sent to a management terminal according to an embodiment of the present invention;

FIG. 3 is a schematic diagram of a white list for recording a guest terminal according to an embodiment of the present invention;

4 is a block diagram showing the structure of an apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 5 is a structural block diagram of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 6 is a structural block diagram of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 7 is a structural block diagram of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 8 is a block diagram showing the structure of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 9 is a block diagram showing the structure of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 10 is a block diagram showing the structure of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 11 is a block diagram showing the structure of another apparatus for accessing a wireless network according to an embodiment of the present invention;

FIG. 12 is a block diagram showing the structure of a system for accessing a wireless network according to an embodiment of the present invention;

Figure 13 is a schematic block diagram showing a computing device for performing the method according to the present invention;

Fig. 14 schematically shows a storage unit for holding or carrying program code implementing the method according to the invention.

Specific embodiment

Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While the embodiments of the present invention have been shown in the drawings, the embodiments Rather, these embodiments are provided so that this disclosure will be more fully understood and the scope of the disclosure will be fully disclosed.

The embodiment of the invention provides a method for wireless network access. As shown in FIG. 1 , the method includes:

101. Detect the signal strength of the visitor terminal.

When the guest terminal needs to access the wireless network, it first needs to turn on the signal switch of the wireless network on its own device, so that the router can detect the guest terminal according to the signal sent by the guest terminal, and the router detects the visitor based on the signal sent by the guest terminal. The signal strength of the terminal. The guest terminal in step 101 is a guest terminal that supports wireless Internet access. The guest terminal used in the embodiment of the present invention may be: a smart phone, a personal computer (PC), a tablet computer, etc., and the specific implementation of the present invention. There are no restrictions on the example.

102. Calculate the actual distance between the guest terminal and the router according to the signal strength.

After detecting the signal strength of the guest terminal in step 101, the router calculates the actual distance between the guest terminal and the router based on the signal strength. When calculating the actual distance between the visitor terminal and the router, the embodiment of the present invention does not exclude external interference and errors caused by different guest terminal models.

103. Compare the actual distance with a preset distance threshold.

After the actual distance calculated in step 102, the preset distance threshold is compared. The smaller the set distance threshold is, the closer the visitor terminal needs to be to the actual distance of the router to access the wireless. In the network. The preset distance threshold is manually set, and may be implemented by using, but not limited to, setting the distance threshold. For example, setting the distance threshold to 40 cm, or setting the distance threshold to 10 cm, the specific The embodiment of the invention does not limit this.

104. If the actual distance is not greater than the distance threshold, send an authentication request to the management terminal, so that the management terminal determines whether to access the guest terminal to the wireless access node AP created by the router.

While ensuring that the operation steps of the guest terminal to access the wireless AP can be simplified, the security of the wireless AP is also ensured. In order to prevent other guest terminals from accessing the wireless AP, the router should perform the comparison according to the comparison result in step 103. If the actual distance is not greater than the distance threshold, the authentication terminal sends an authentication request to the management terminal; the management terminal receives and responds to the authentication request sent by the router, and the router determines whether to access the guest terminal according to the information carried in the authentication request information. Wireless AP. The management terminal is a terminal used by the router owner, and includes a smart phone, a PC, a tablet, and the like. The specific embodiment of the present invention is not limited.

105. Receive a request response returned by the management terminal, and access or cancel access to the guest terminal according to the indication information carried in the request response.

In the process of accessing the wireless AP, the guest terminal does not access the guest terminal to the wireless AP when the actual distance between the guest terminal and the router calculated by the router is not greater than the distance threshold, but responds according to the request sent by the management terminal. Information carried in. The router receives and views the information in the request response, and accesses or cancels the access to the guest terminal according to the indication information carried in the request response. When the management terminal instructs the router to connect the guest terminal to the wireless AP, it determines to connect the guest terminal to the wireless terminal. In the AP, when the management terminal indicates that the router cannot access the guest terminal to the wireless AP, the guest terminal is cancelled to be connected to the wireless AP.

In the prior art, for a home scene, when there are many guest terminals in the home, the owner needs to manually input the password of the wireless AP on each guest's mobile phone, tablet computer, etc., and the more guests, the more the host The amount of repetitive work is greater, and the process of password entry is very error prone. In order to simplify the process of accessing a wireless AP by a guest terminal, the wireless network access method provided by the embodiment of the present invention detects the signal strength of the guest terminal, calculates the actual distance between the guest terminal and the router according to the signal strength, and calculates the calculated distance. The actual distance is compared with the preset distance threshold. When the actual distance is not greater than the distance threshold, the router sends an authentication request to the management terminal, and the management terminal determines whether the guest terminal is connected to the wireless AP created by the router, and Sending a request response to the router, the router receives the request response sent by the management terminal, and accesses or cancels access to the guest terminal according to the indication information carried in the request response. Compared with the prior art, the actual distance between the guest terminal and the router calculated by the router in the embodiment of the present invention is not greater than the distance threshold, and then the router determines to access the guest terminal according to the indication information sent by the management terminal, without manually inputting the wireless password. The authentication is performed. Therefore, the method provided by the embodiment of the present invention can greatly simplify the operation process of the guest terminal accessing the wireless AP.

Further, when the router sends an authentication request to the management terminal, the router needs to notify the management terminal which visitor terminal accesses the wireless AP. Therefore, when the router sends the authentication request to the management terminal, the router needs to wirelessly bridge the virtual created by the guest terminal. The AP obtains the MAC address of the guest terminal and the name of the virtual AP from the virtual AP, and the router can obtain the obtained MAC address and the name of the virtual AP. The bearer is sent to the management terminal in the authentication request, and the MAC address can be carried in the authentication request and sent to the management terminal. The name of the virtual AP can be carried in the authentication request and sent to the management terminal. The management terminal can The guest terminal is identified based on the MAC address and/or the name of the virtual AP. As shown in FIG. 2, FIG. 2 is a schematic diagram of an interface of an authentication request sent by a router to a management terminal. The management terminal clicks on the guest terminal 1 and sends an indication to the router by clicking and transmitting. The name of the virtual AP is set by the guest terminal. When the name of the virtual AP is set, the guest terminal may adopt the following method. For example, the name of the virtual AP may be a Service Set Identifier (SSID). It can also be set according to the user's preference, such as Gs496, etc., and the specific embodiment of the present invention is not limited.

Further, the request response sent by the management terminal to the router carries the MAC address of the guest terminal and/or the name of the virtual AP, and the name of the MAC address and/or the virtual AP is bound with an authentication flag, and the authentication is performed. The flag bit is used to identify whether access to the guest terminal is allowed. The authentication flag bit can be set to 1 and 0, 1 for allowing access to the guest terminal, and 0 for not allowing access to the guest terminal. Alternatively, as another alternative manner, the authentication flag bit may also be represented by T(True) and F(False), where the meaning of the T representation corresponds to the above 1, indicating that access to the guest terminal is allowed, and the meaning of the F representation is Corresponding to the above 0, it means that access to the guest terminal is not allowed.

Further, each time the router calculates that the actual distance between the guest terminal and the router is not greater than the preset distance, the router sends an authentication request to the management terminal. Similarly, in the case that the guest terminal 1 has previously accessed the wireless AP once, When the guest terminal 1 accesses the wireless AP for the second time, the router also sends the information of the authentication request to the management terminal, which may cause certain troubles to the management terminal. To this end, after the router receives the request response returned by the management terminal, if the management terminal allows access to the guest terminal, the MAC address of the guest terminal is added to the whitelist; if the management terminal prohibits access to the guest terminal, Adding the MAC address of the guest terminal to the blacklist; the next time the guest terminal added to the whitelist by the router accesses the wireless AP, the automatic access to the wireless AP can be realized as long as the actual distance of the terminal is not greater than the distance threshold; The guest terminal that the router accesses the blacklist cannot access the wireless AP, and the guest terminal can only continuously send the request information of the access to the wireless AP. The embodiment of the present invention may implement the occasion of adding the MAC address of the guest terminal to the whitelist or the blacklist by using, but not limited to, the following, for example, immediately after the router receives the request response returned by the management terminal. The MAC address is added to the whitelist or the blacklist, or the router selects its own idle time to add the MAC address of the guest terminal to the whitelist or the blacklist. The specific embodiment of the present invention does not limit this.

It should be noted that the MAC address of the guest terminal recorded in the white list or the blacklist is not the name of the guest terminal, because the MAC address of the guest terminal can uniquely identify a guest terminal, and the name of the guest terminal can be arbitrarily changed. Further, it cannot be ensured that the guest terminal is identified by recording the name of the guest terminal. In an implementation manner of the embodiment of the present invention, the whitelist or the blacklist may also record the name of the corresponding guest terminal on the premise of recording the guest terminal, but the router needs to record according to the whitelist when identifying the guest terminal. Corresponding to the MAC address of the guest terminal for identification. As shown in FIG. 3, FIG. 3 shows a schematic diagram of recording the MAC address of the guest terminal and the name of the guest terminal in the white list.

Further, the management terminal may update the whitelist and/or the blacklist in the router. First, the router receives the update command sent by the management terminal, and updates the whitelist and/or the blacklist according to the update command, and the following will update the router. The contents of the whitelist and/or blacklist are detailed:

1. Add a MAC address to the whitelist or blacklist. If the management terminal adds a MAC address to the whitelist or the blacklist in advance, if the MAC address is added to the whitelist, the guest terminal identified by the MAC address needs to access the wireless AP and automatically access the wireless. In the AP, if the MAC address is added to the blacklist, the guest terminal identified by the MAC address cannot access the wireless AP.

2. Delete the MAC address recorded in the whitelist or blacklist. Deleting the whitelist mentioned here

Or the MAC address recorded in the blacklist, when the visitor terminal identified by the MAC address accesses the wireless AP next time, the router needs to calculate, according to the signal strength of the guest terminal, the actual distance between the guest terminal and the router is not greater than the distance threshold, and according to The indication of the management terminal determines whether the guest terminal is connected to the wireless AP.

3. Transfer the MAC address in the whitelist to the blacklist. After the MAC address is transferred to the blacklist, the guest terminal identified by the MAC address cannot access the wireless AP.

4. Transfer the MAC address in the blacklist to the whitelist. After the MAC address is transferred to the whitelist, the guest terminal identified by the MAC address can be automatically accessed into the wireless AP.

Further, as a refinement and extension of the above embodiment, when the above step 101 detects the signal strength of the guest terminal, the router adopts different methods for detecting the signal strength of the guest terminal for different signal types. When detecting the signal strength of the guest terminal, the embodiment of the present invention adopts, but is not limited to, the following methods:

method one:

When the guest terminal transmits a data signal, the received signal strength when detecting the received digital signal indicates the RSSI value.

The router uses a unified method to detect the signal strength of the guest terminal. The signal strength is different according to the transmission power of different guest terminals, and different guest terminal models correspond to different transmission powers. Therefore, the RSSI is detected at the router to receive the digital signal. After the value, the transmit power of the corresponding guest terminal model is searched, and the RSSI value is calibrated according to the size of the transmit power. Exemplarily, assume that the transmission power of the guest terminal 1 of the model M01 is 40 mW, and the transmission power of the guest terminal 2 of the model M030 is 5 mW. When the guest terminal 1 and the guest terminal 2 are in the same position from the router, the router It will be detected that the signal strength of the guest terminal 1 is greater than the signal strength of the guest terminal 2; similarly, when the router detects that the signal strengths of the guest terminal 3 and the guest terminal 4 are the same, and the transmission power of the guest terminal 3 and the guest terminal 4 are the same The actual distance between the guest terminal 3 and the guest terminal 4 and the router is the same, but the transmission power of the guest terminal 3 is not different from the transmission power of the guest terminal 4, and the transmission power of the guest terminal 3 is higher than that of the guest terminal 4. When the transmission power is large, the actual distance between the guest terminal 3 and the router is larger than the actual distance between the guest terminal 4 and the router. When the transmission power of the guest terminal 3 is smaller than the transmission power of the guest terminal 4, the guest terminal 3 and The actual distance between the routers is smaller than the actual distance between the guest terminal 4 and the router. The router has an error in calculating the actual distance between the guest terminal and the router based on the signal strength. Therefore, for the problem as described above, the embodiment of the present invention calibrates the RSSI value according to the size of different transmission powers of different guest terminal models.

During the actual operation, the router determines the model of the guest terminal according to the data signal sent by the guest terminal, and searches for the corresponding transmit power of the guest terminal according to the guest terminal model and the transmit power comparison table, as shown in Table 1. Table 1 shows a comparison of the guest terminal model and the transmission power.

Table 1

Visitor terminal model Transmit power M01 40mW M030 5mW Zw8050 60mW SX673 3mW H4 21mW Mh370 25mW

After the router calibrates the RSSI value according to the transmit power of the guest terminal, the current RSSI value of the guest terminal is obtained, and the signal strength of the guest terminal is determined according to the current RSSI value of the guest terminal, and a preset first mapping relationship is locally saved in the router. The table obtains the actual distance between the guest terminal and the router, wherein the table records a one-to-one correspondence between the RSSI value and the actual distance. The router may calculate the actual distance corresponding to different signal strengths in advance, and write the calculated actual distance into the first mapping relationship table. Thereafter, after obtaining the signal strength of the guest terminal, the router directly looks up the table to obtain the corresponding actual distance. In this embodiment, the method for calculating the actual distance according to the signal strength of the RSSI may be implemented by referring to the prior art, and details are not described herein again.

When the router searches for the transmit power corresponding to the visitor terminal according to the guest terminal model and the transmit power comparison table, the embodiment of the present invention can be implemented by using, but not limited to, the following manner: the router in the guest terminal model and the transmit power comparison table The transmit power corresponding to the visitor terminal is searched one by one; or the transmit power corresponding to the visitor terminal is searched in the guest terminal model and the transmit power comparison table by means of a binary method, which is not limited in the embodiment of the present invention.

Method 2:

The wireless bridge is connected to the virtual AP created by the guest terminal, and detects the decibel dBm value of the virtual AP.

The router automatically scans the surrounding wireless APs and checks the wireless APs that can be bridged. The router obtains the dBm value carried in the wireless AP during the wireless AP scanning process. The signal strength of the guest terminal can be detected according to the dBm value. The strength calculates the actual distance between the guest terminal and the router. In a specific implementation, the guest terminal first creates a virtual AP, and the router bridges the virtual AP created by the guest terminal, and detects the dBm value. The dBm value and the RSSI value can both be used to indicate the signal strength of the guest terminal, wherein the dBm value and the RSSI value can be converted into each other.

The router obtains the current dBm value of the guest terminal, and determines the signal strength of the guest terminal according to the current dBm value of the guest terminal, and saves a preset second mapping relationship table locally on the router to obtain the actual distance between the guest terminal and the router, where , the table records the dBm value and the actual distance A one-to-one correspondence between them.

Optionally, in order to further ensure the security of the wireless AP, the router stops broadcasting the name of the wireless AP to the guest terminal before detecting the signal strength of the guest terminal, so that the guest terminal does not display the name of the wireless AP. In an implementation manner of the embodiment of the present invention, when the router stops broadcasting the name of the wireless AP to the guest terminal, the router may continue to detect the signal strength of the guest terminal, and the router calculates the actual between the guest terminal and the router according to the signal strength. When the distance is not greater than the distance threshold, the router broadcasts the name of the wireless AP and accesses the guest terminal to the wireless AP. In another implementation manner of the embodiment of the present invention, the router stops broadcasting the name of the wireless AP to the guest terminal. When the visitor terminal knows the name of the wireless AP, the guest terminal user can manually input the name of the wireless AP, and send a request message for accessing the wireless AP to the router, and the router sends the request information to the wireless AP to the visitor. The terminal sends a waiting message, when the router calculates, according to the signal strength, that the actual distance between the guest terminal and the router is not greater than the distance threshold, the router sends an authentication request to the management terminal, and receives the request returned by the management terminal. Responding to and according to the indication information carried in the request response or The access to the guest terminal is cancelled.

The embodiment of the present invention may be implemented by using, but not limited to, the following information when sending the prompt information to the guest terminal. For example, the router may send the prompt information waiting for ranging to the guest terminal in the form of a dialog box; or Alternatively, the router may not respond to the request information of the access wireless AP sent by the guest terminal, but wait for the router to calculate, according to the signal strength of the guest terminal, that the actual distance between the guest terminal and the router is not greater than the distance threshold, to the management terminal. Sending an authentication request, the router receives the request response returned by the management terminal, and accesses or cancels accessing the guest terminal according to the indication information carried in the request response. The specific embodiments of the present invention are not limited.

In the actual application scenario, the router stops broadcasting the name of the wireless AP to the guest terminal and applies it to the interactive game of the family. Hide the wireless AP in a corner of the home, Xiaoming, Xiaohua, Xiaohong three people to play, to see which guest terminal will access the wireless AP in the shortest time, Xiaoming, Xiaohua, Xiaohong three guest terminal The wireless AP needs to be connected within a preset distance from the router. In addition, the router can also be set within a preset distance between the guest terminal and the router, and establish a wireless network between the guest terminal and the wireless AP by shaking the guest terminal. In order to increase the user's experience in simplifying access to wireless AP operating procedures. The router sets the number and manner of shaking the guest terminal so that the guest terminal can quickly access the wireless AP. The router can set the guest terminal to shake once, or set the guest terminal to shake twice, and the router shakes according to the guest terminal. The number of times determines whether the guest terminal is connected to the wireless AP.

Optionally, since the router can virtualize multiple wireless APs, and each wireless AP has its unique name, the router can also broadcast the names of all the wireless APs to the guest terminal, so that the user selects the required location on the guest terminal. The accessed wireless AP, wherein multiple wireless APs virtualized by the same router are subnets created by the router, and the guest terminal can be connected to the wireless network.

Further, as described above, the router may virtualize a plurality of wireless APs, and divide the plurality of virtual APs that are virtualized into a primary wireless AP and a secondary wireless AP, wherein the guest terminal passes the primary wireless AP. You can log in to the control interface of the router to modify the configuration information of the router and the name of the wireless AP. However, the guest terminal cannot log in to the control interface of the router from the wireless AP. The primary wireless AP and the secondary wireless AP are both created by the router. The subnet, when a guest terminal requests access to the wireless network, can access the guest terminal to the secondary wireless AP.

Further, as an implementation of the foregoing method, the embodiment of the present invention further provides a device for accessing a wireless network. As shown in FIG. 4, the device includes:

a detecting unit 401, configured to detect a signal strength of the guest terminal;

The calculating unit 402 is configured to calculate an actual distance between the visitor terminal and the router according to the signal strength detected by the detecting unit 401;

The comparison unit 403 is configured to compare the actual distance calculated by the calculation unit 402 with a preset distance threshold;

The sending unit 404 is configured to send an authentication request to the management terminal when the actual distance of the comparison unit 403 is not greater than the distance threshold, so that the management terminal determines whether to access the guest terminal to the wireless access node AP created by the router. ;

The receiving unit 405 is configured to receive a request response returned by the management terminal sent by the sending unit 404.

The operating unit 406 is configured to access or cancel access to the guest terminal according to the indication information carried in the request response received by the receiving unit 405.

Further, as shown in FIG. 5, the guest terminal is created with a virtual AP, and the sending unit 404 sends an authentication request to the management terminal, including:

The bridging module 4041 is configured to wirelessly bridge into the virtual AP created by the guest terminal;

An obtaining module 4042, configured to acquire, by the virtual AP that is bridged by the bridging module 4041, a media access control MAC address of the guest terminal and/or a name of the virtual AP;

The sending module 4043 is configured to carry the MAC address acquired by the obtaining module 4042 and/or the name of the virtual AP in the authentication request, and send the management terminal to the management terminal, so that the management terminal identifies the guest terminal according to the MAC address and/or the name of the virtual AP. .

Further, the request response received by the receiving unit 405 carries the MAC address of the guest terminal and/or the name of the virtual AP, and the name of the MAC address and/or the virtual AP is bound with an authentication flag, and the authentication flag is used for Identifies whether access to the guest terminal is allowed.

Further, as shown in FIG. 6, the apparatus further includes:

The adding unit 407 is configured to: after the receiving unit 405 receives the request response returned by the management terminal, when the management terminal allows access to the guest terminal, add the MAC address of the guest terminal to the whitelist;

The adding unit 407 is further configured to: after the receiving unit 405 receives the request response returned by the management terminal, when the management terminal prohibits accessing the guest terminal, adding the MAC address of the guest terminal to the blacklist.

Further, as shown in FIG. 7, the apparatus further includes:

The receiving unit 405 is further configured to receive an update instruction sent by the management terminal;

The updating unit 408 is configured to update the white list and/or the blacklist according to the update instruction received by the receiving unit 405.

Further, the detecting unit 401 is further configured to: when the guest terminal sends the data signal, detect the connection The received signal strength when receiving the digital signal indicates the RSSI value;

The calculating unit 402 is further configured to search for a distance value corresponding to the RSSI value in the preset first mapping relationship table to obtain an actual distance.

Further, as shown in FIG. 8, the apparatus further includes:

The searching unit 409 is configured to search for the transmit power of the corresponding visitor terminal model after the detecting unit 401 detects the RSSI value when receiving the digital signal;

The calibration unit 410 is configured to calibrate the RSSI value according to the size of the transmit power searched by the searching unit 409.

Further, the detecting unit 401 is further configured to: wirelessly bridge into the virtual AP created by the guest terminal, and detect a decibel dBm value of the virtual AP;

The calculating unit 402 is further configured to search for a distance value corresponding to the dBm value in the preset second mapping relationship table to obtain an actual distance.

Further, as shown in FIG. 9, the apparatus further includes:

The stopping unit 4011 is configured to stop broadcasting the name of the wireless AP to the guest terminal before the detecting unit 401 detects the signal strength of the guest terminal, so that the guest terminal does not display the name of the wireless AP.

Further, as shown in FIG. 10, the apparatus further includes:

The broadcasting unit 4012 is configured to broadcast the names of all the wireless APs to the guest terminal when the actual distance of the comparison unit 403 is not greater than the distance threshold, so that the user selects the wireless AP that needs to be accessed on the guest terminal.

Further, as shown in FIG. 11, the operating unit 406 accesses the guest terminal, including:

The establishing module 4061 is configured to establish a virtual wireless AP, and the guest terminal cannot log in to the control interface of the router through the virtual wireless AP;

The access module 4062 is configured to access the guest terminal to the virtual wireless AP established by the establishing module 4061.

Further, as an implementation of the foregoing method and an application of the foregoing apparatus, as shown in FIG. 12, an embodiment of the present invention further provides a wireless network access system, where the system includes a guest terminal 501, a router 502, and a management terminal 503. among them,

The router 502 is configured to detect the signal strength of the guest terminal 501, calculate the actual distance between the guest terminal 501 and the router 502 according to the signal strength, and compare the actual distance with a preset distance threshold. If the actual distance is not greater than the distance threshold, Sending an authentication request to the management terminal 503;

The management terminal 503 is configured to receive an authentication request sent by the router 502, determine whether the guest terminal 501 is connected to the wireless access node AP created by the router 502, and send a request response to the router 502.

The router 502 is further configured to receive the request response returned by the management terminal 503, and access or cancel the access to the guest terminal 501 according to the indication information carried in the request response.

The device and system for accessing a wireless network according to an embodiment of the present invention, the router detects the signal strength of the guest terminal, calculates the actual distance between the guest terminal and the router according to the signal strength, and calculates the calculated actual distance and the preset distance threshold. Performing an alignment, when the actual distance is not greater than the distance threshold, the router sends an authentication request to the management terminal, and the management terminal determines whether to access the guest terminal. To the wireless AP created by the router, and sending a request response to the router, the router receives the request response sent by the management terminal, and accesses or cancels the access to the guest terminal according to the indication information carried in the request response. Compared with the prior art, the actual distance between the guest terminal and the router calculated by the router in the embodiment of the present invention is not greater than the distance threshold, and then the router determines to access the guest terminal according to the indication information sent by the management terminal, without manually inputting the wireless password. The device and system provided by the embodiments of the present invention can greatly simplify the operation process of the guest terminal accessing the wireless AP.

In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.

It will be appreciated that related features in the above methods and apparatus can be referenced to each other. In addition, "first", "second", and the like in the above embodiments are used to distinguish the embodiments, and do not represent the advantages and disadvantages of the embodiments.

A person skilled in the art can clearly understand that for the convenience and brevity of the description, the specific working process of the system, the device and the unit described above can refer to the corresponding process in the foregoing method embodiment, and details are not described herein again.

The algorithms and displays provided herein are not inherently related to any particular computer, virtual system, or other device. Various general purpose systems can also be used with the teaching based on the teachings herein. The structure required to construct such a system is apparent from the above description. Moreover, the invention is not directed to any particular programming language. It is to be understood that the invention may be embodied in a variety of programming language, and the description of the specific language has been described above in order to disclose the preferred embodiments of the invention.

In the description provided herein, numerous specific details are set forth. However, it is understood that the embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures, and techniques are not shown in detail so as not to obscure the understanding of the description.

Similarly, the various features of the invention are sometimes grouped together into a single embodiment, in the above description of the exemplary embodiments of the invention, Figure, or a description of it. However, the method disclosed is not to be interpreted as reflecting the intention that the claimed invention requires more features than those recited in the claims. Rather, as the following claims reflect, inventive aspects reside in less than all features of the single embodiments disclosed herein. Therefore, the claims following the specific embodiments are hereby explicitly incorporated into the embodiments, and each of the claims as a separate embodiment of the invention.

Those skilled in the art will appreciate that the modules in the devices of the embodiments can be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and further they may be divided into a plurality of sub-modules or sub-units or sub-components. In addition to such features and/or at least some of the processes or units being mutually exclusive, any combination of the features disclosed in the specification, including the accompanying claims, the abstract and the drawings, and any methods so disclosed, or All processes or units of the device are combined. Each feature disclosed in this specification (including the accompanying claims, the abstract and the drawings) may be replaced by alternative features that provide the same, equivalent or similar purpose.

In addition, those skilled in the art will appreciate that, although some embodiments described herein include certain features that are included in other embodiments and not in other features, combinations of features of different embodiments are intended to be within the scope of the present invention. Different embodiments are formed and formed. For example, in the following claims, any one of the claimed embodiments can be used in any combination.

The various component embodiments of the present invention may be implemented in hardware, or in a software module running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or digital signal processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components of the wireless network access device in accordance with embodiments of the present invention. The invention can also be implemented as a device or device program (e.g., a computer program and a computer program product) for performing some or all of the methods described herein. Such a program implementing the invention may be stored on a computer readable medium or may be in the form of one or more signals. Such signals may be downloaded from an Internet website, provided on a carrier signal, or provided in any other form.

For example, Figure 13 schematically illustrates a block diagram of a computing device for performing the method in accordance with the present invention. The computing device conventionally includes a processor 1310 and a computer program product or computer readable medium in the form of a memory 1320. The memory 1320 may be an electronic memory such as a flash memory, an EEPROM (Electrically Erasable Programmable Read Only Memory), an EPROM, a hard disk, or a ROM. Memory 1320 has a storage space 1330 for program code 1331 for performing any of the method steps described above. For example, the storage space 1330 for program code may include respective program codes 1331 for implementing various steps in the above methods, respectively. The program code can be read from or written to one or more computer program products. These computer program products include program code carriers such as hard disks, compact disks (CDs), memory cards or floppy disks. Such a computer program product is typically a portable or fixed storage unit as described with reference to FIG. The storage unit may have a storage segment, a storage space, and the like that are similarly arranged to the storage 1320 in the computing device of FIG. The program code can be compressed, for example, in an appropriate form. Typically, the storage unit comprises computer readable code 1331' for performing the steps of the method according to the invention, ie code that can be read by a processor such as, for example, 1310, which when executed by the computing device causes the calculation The device performs the various steps in the methods described above.

It is to be noted that the above-described embodiments are illustrative of the invention and are not intended to be limiting, and that the invention may be devised without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as a limitation. The word "comprising" does not exclude the presence of the elements or steps that are not recited in the claims. The word "a" or "an" The invention can be implemented by means of hardware comprising several distinct elements and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means can be embodied by the same hardware item. The use of the words first, second, and third does not indicate any order. These words can be interpreted as names.

In addition, it should also be noted that the language used in this specification is primarily for readability and teaching. It is chosen for the purpose, and is not chosen to explain or define the subject matter of the invention. Therefore, many modifications and changes will be apparent to those skilled in the art without departing from the scope of the invention. The disclosure of the present invention is intended to be illustrative, and not restrictive, and the scope of the invention is defined by the appended claims.

The present invention is applicable to computer systems/servers that can operate with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations suitable for use with computer systems/servers include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, handheld or laptop devices, based on Microprocessor systems, set-top boxes, programmable consumer electronics, networked personal computers, small computer systems, mainframe computer systems, and distributed cloud computing technology environments including any of the above, and the like.

The computer system/server can be described in the general context of computer system executable instructions (such as program modules) being executed by a computer system. Generally, program modules may include routines, programs, target programs, components, logic, data structures, and the like that perform particular tasks or implement particular abstract data types. The computer system/server can be implemented in a distributed cloud computing environment where tasks are performed by remote processing devices that are linked through a communication network. In a distributed cloud computing environment, program modules may be located on a local or remote computing system storage medium including storage devices.

"an embodiment," or "an embodiment," or "an embodiment," In addition, it is noted that the phrase "in one embodiment" is not necessarily referring to the same embodiment.

Claims (25)

  1. A method for wireless network access, comprising:
    Detecting the signal strength of the visitor terminal;
    Calculating an actual distance between the guest terminal and the router according to the signal strength;
    Comparing the actual distance with a preset distance threshold;
    And if the actual distance is not greater than the distance threshold, sending an authentication request to the management terminal, so that the management terminal determines whether to access the guest terminal to the wireless access node AP created by the router;
    Receiving a request response returned by the management terminal, and accessing or canceling accessing the guest terminal according to the indication information carried in the request response.
  2. The method according to claim 1, wherein the guest terminal is created with a virtual AP, and the sending the authentication request to the management terminal comprises:
    Wirelessly connecting to the virtual AP created by the guest terminal;
    Obtaining, by the virtual AP, a media access control MAC address of the guest terminal and/or a name of the virtual AP;
    Carrying the MAC address and/or the name of the virtual AP in the authentication request, and sending the information to the management terminal, so that the management terminal compares the MAC address and/or the name of the virtual AP. The guest terminal is identified.
  3. The method according to claim 2, wherein the request response carries the MAC address of the guest terminal and/or the name of the virtual AP, and the MAC address and/or the virtual The name of the AP is bound with an authentication flag, and the authentication flag is used to identify whether access to the guest terminal is allowed.
  4. The method according to claim 1, wherein after the receiving the request response returned by the management terminal, the method further comprises:
    Adding a MAC address of the guest terminal to the whitelist if the management terminal allows access to the guest terminal;
    If the management terminal prohibits access to the guest terminal, the MAC address of the guest terminal is added to the blacklist.
  5. The method of claim 4, wherein the method further comprises:
    Receiving an update instruction sent by the management terminal;
    Updating the whitelist and/or the blacklist according to the update instruction.
  6. The method according to claim 1, wherein the detecting the signal strength of the guest terminal comprises:
    When the visitor terminal sends a data signal, detecting a received signal strength indicating an RSSI value when receiving the digital signal;
    The calculating, according to the signal strength, the actual distance between the guest terminal and the router, including:
    Finding a distance value corresponding to the RSSI value in a preset first mapping relationship table, obtaining the Actual distance.
  7. The method according to claim 6, wherein after the detecting the RSSI value when the digital signal is received, the method further comprises:
    Finding a transmit power corresponding to the model of the guest terminal;
    The RSSI value is calibrated according to the magnitude of the transmit power.
  8. The method according to claim 1, wherein the detecting the signal strength of the guest terminal comprises:
    Wirelessly connecting to the virtual AP created by the guest terminal;
    Detecting a decibel dBm value of the virtual AP;
    The calculating, according to the signal strength, the actual distance between the guest terminal and the router, including:
    Finding a distance value corresponding to the dBm value in a preset second mapping relationship table, and obtaining the actual distance.
  9. The method according to claim 1, wherein before the detecting the signal strength of the guest terminal, the method further comprises:
    Stop broadcasting the name of the wireless AP to the guest terminal such that the guest terminal does not display the name of the wireless AP.
  10. The method according to claim 9, wherein if the actual distance is not greater than the distance threshold, the method further comprises:
    The names of all wireless APs are broadcast to the guest terminal such that the user selects a wireless AP that needs to be accessed on the guest terminal.
  11. The method according to any one of claims 1 to 10, wherein the accessing the guest terminal comprises:
    Establishing a virtual wireless AP, where the guest terminal cannot log in to the control interface of the router through the virtual wireless AP;
    The guest terminal is accessed into the virtual wireless AP.
  12. A device for accessing a wireless network, comprising:
    a detecting unit, configured to detect a signal strength of the visitor terminal;
    a calculating unit, configured to calculate an actual distance between the guest terminal and the router according to the signal strength detected by the detecting unit;
    a comparison unit, configured to compare the actual distance calculated by the calculation unit with a preset distance threshold;
    a sending unit, configured to send an authentication request to the management terminal when the actual distance of the comparing unit is not greater than the distance threshold, so that the management terminal determines whether to access the guest terminal to the router Created in the AP of the wireless access node;
    a receiving unit, configured to receive a request response returned by the management terminal sent by the sending unit;
    And an operation unit, configured to access or cancel access to the guest terminal according to the indication information carried in the request response received by the receiving unit.
  13. The device according to claim 12, wherein said guest terminal is created The virtual AP sends the authentication request to the management terminal, including:
    a bridging module, configured to wirelessly bridge into the virtual AP created by the guest terminal;
    An acquiring module, configured to acquire, by the virtual AP that is bridged by the bridging module, a media access control MAC address of the guest terminal and/or a name of the virtual AP;
    a sending module, configured to carry, in the authentication request, the MAC address acquired by the acquiring module and/or the name of the virtual AP, to the management terminal, so that the management terminal is based on the MAC address and/or Or the name of the virtual AP identifies the guest terminal.
  14. The device according to claim 13, wherein the request response received by the receiving unit carries the MAC address of the guest terminal and/or the name of the virtual AP, and the MAC address and/or Or the name of the virtual AP is bound with an authentication flag, where the authentication flag is used to identify whether access to the guest terminal is allowed.
  15. The device of claim 12, wherein the device further comprises:
    Adding a unit, after the receiving unit receives the request response returned by the management terminal, when the management terminal allows access to the guest terminal, adding the MAC address of the guest terminal to the whitelist;
    The adding unit is further configured to: after the receiving unit receives the request response returned by the management terminal, add the MAC address of the guest terminal to the blacklist when the management terminal prohibits accessing the guest terminal in.
  16. The device according to claim 15, wherein the device further comprises:
    The receiving unit is further configured to receive an update instruction sent by the management terminal;
    And an updating unit, configured to update the whitelist and/or the blacklist according to an update instruction received by the receiving unit.
  17. The apparatus according to claim 12, wherein the detecting unit is further configured to: when the guest terminal transmits a data signal, detect a received signal strength indicating RSSI value when the digital signal is received;
    The calculating unit is further configured to: search for a distance value corresponding to the RSSI value in a preset first mapping relationship table, and obtain the actual distance.
  18. The device of claim 17, wherein the device further comprises:
    a searching unit, configured to search for a transmit power corresponding to the model of the guest terminal after the detecting unit detects an RSSI value when the digital signal is received;
    And a calibration unit, configured to calibrate the RSSI value according to a size of a transmit power searched by the lookup unit.
  19. The device according to claim 12, wherein the detecting unit is further configured to: wirelessly bridge into the virtual AP created by the guest terminal, and detect a decibel dBm value of the virtual AP;
    The calculating unit is further configured to search for a distance value corresponding to the dBm value in a preset second mapping relationship table to obtain the actual distance.
  20. The device of claim 12, wherein the device further comprises:
    a stopping unit, configured to stop before the detecting unit detects the signal strength of the guest terminal The guest terminal broadcasts the name of the wireless AP such that the guest terminal does not display the name of the wireless AP.
  21. The device of claim 20, wherein the device further comprises:
    a broadcasting unit, configured to: when the actual distance of the comparing unit is not greater than the distance threshold, broadcast a name of all wireless APs to the guest terminal, so that the user selects the wireless that needs to be accessed on the guest terminal. AP.
  22. The device according to any one of claims 12 to 21, wherein the operating unit accessing the guest terminal comprises:
    Establishing a module, configured to establish a virtual wireless AP, where the guest terminal cannot log in to the control interface of the router by using the virtual wireless AP;
    An access module, configured to access the guest terminal to a virtual wireless AP established by the establishing module.
  23. A system for wireless network access, characterized in that the system includes a guest terminal, a router, and a management terminal, wherein
    The router is configured to detect a signal strength of the guest terminal, calculate an actual distance between the guest terminal and the router according to the signal strength, and compare the actual distance with a preset distance threshold, if the actual If the distance is not greater than the distance threshold, the authentication request is sent to the management terminal;
    The management terminal is configured to receive the authentication request sent by the router, determine whether to access the guest terminal to a wireless access node AP created by the router, and send a request response to the router;
    The router is further configured to receive the request response returned by the management terminal, and access or cancel access to the guest terminal according to the indication information carried in the request response.
  24. A computer program comprising computer readable code, when said computer readable code is run on a computing device, causing said computing device to perform wireless network access according to any of claims 1-11 method.
  25. A computer readable medium storing the computer program of claim 24.
PCT/CN2015/094708 2014-12-26 2015-11-16 Wireless network access method, device and system WO2016101729A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201410826919.6A CN104540128B (en) 2014-12-26 2014-12-26 The method, apparatus and system of wireless network access
CN201410826919.6 2014-12-26

Publications (1)

Publication Number Publication Date
WO2016101729A1 true WO2016101729A1 (en) 2016-06-30

Family

ID=52855563

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2015/094708 WO2016101729A1 (en) 2014-12-26 2015-11-16 Wireless network access method, device and system

Country Status (2)

Country Link
CN (1) CN104540128B (en)
WO (1) WO2016101729A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869616A (en) * 2015-05-25 2015-08-26 成都西蒙电子技术有限公司 Cloud share wireless router equipment and connection method

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104540128B (en) * 2014-12-26 2018-10-09 北京奇虎科技有限公司 The method, apparatus and system of wireless network access
CN105101349A (en) * 2015-05-12 2015-11-25 中兴通讯股份有限公司 Access control method, device and terminal for wireless local area network
CN105992208A (en) * 2015-05-15 2016-10-05 乐视致新电子科技(天津)有限公司 Wireless connection authentication method and wireless connection authentication device
CN104902477A (en) * 2015-06-26 2015-09-09 努比亚技术有限公司 Authentication terminal, wireless router, wireless router connection method and wireless router connection system
CN105120526A (en) * 2015-07-28 2015-12-02 深圳市宏电技术股份有限公司 wifi connecting method and system characterized by no near-field authentication
US10122685B2 (en) * 2015-08-26 2018-11-06 Tatung Company Method for automatically establishing wireless connection, gateway device and client device for internet of things using the same
JP6017004B1 (en) * 2015-10-20 2016-10-26 株式会社リクルートホールディングス Suspicious person detection system and suspicious person detection method
CN105245539A (en) * 2015-10-27 2016-01-13 上海斐讯数据通信技术有限公司 Router visitor verification method and system and router
CN105188024B (en) * 2015-10-29 2019-06-14 小米科技有限责任公司 Access the method, apparatus and system of network
CN105517099B (en) * 2015-11-27 2019-10-25 上海斐讯数据通信技术有限公司 A kind of method and system controlling wireless network access client
CN105357123B (en) * 2015-11-30 2018-04-06 上海斐讯数据通信技术有限公司 Right management method, system and the router of router
CN105636174A (en) * 2016-03-03 2016-06-01 青岛海信电器股份有限公司 Wi-Fi access method and system, server and terminal
CN105812270A (en) * 2016-03-09 2016-07-27 联想(北京)有限公司 Information processing method and wireless routing device
CN105848148A (en) * 2016-04-28 2016-08-10 乐视控股(北京)有限公司 WIFI connection method, terminal and router
CN105873106A (en) * 2016-04-29 2016-08-17 北京小米移动软件有限公司 Processing method and device for wireless network connection and equipment
CN105848151A (en) * 2016-05-27 2016-08-10 北京奇虎科技有限公司 WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device
CN106060820A (en) * 2016-08-24 2016-10-26 深圳普创天信科技发展有限公司 Wireless network access method
CN107295606A (en) * 2017-06-30 2017-10-24 北京小米移动软件有限公司 Method for connecting network, device and user equipment
CN107509196A (en) * 2017-08-23 2017-12-22 合肥龙图腾信息技术有限公司 A kind of quick connection WiFi system and method
CN107592639A (en) * 2017-10-26 2018-01-16 上海斐讯数据通信技术有限公司 A kind of terminal device adds the method and system of router white list

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013184433A1 (en) * 2012-06-08 2013-12-12 Time Warner Cable Inc. Wireless session configuration persistence
CN104144415A (en) * 2014-07-10 2014-11-12 深圳市螺光科技有限公司 Method for connecting WiFi access point and mobile communication terminal
US20140334465A1 (en) * 2013-05-08 2014-11-13 Lg Electronics Inc. Method and apparatus for paging based on location information of a user equipment in a convergence network of a plurality of communication systems
WO2014197764A1 (en) * 2013-06-06 2014-12-11 Interdigital Patent Holdings, Inc. Wifi channel selection and subchannel selective transmissions
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8099107B2 (en) * 2006-04-21 2012-01-17 Cisco Technology, Inc. Method and apparatus for WLAN location services
US20100113035A1 (en) * 2008-11-05 2010-05-06 Suat Eskicioglu Location-based handovers from a macrocell to a femtocell using event-triggered measurement reporting
CN101557625B (en) * 2009-03-09 2011-04-06 南京大学 Fast switching method based on movement detection in wireless network
CN102685882A (en) * 2011-03-11 2012-09-19 北京威讯紫晶科技有限公司 Area locating method in wireless networks
US9042829B2 (en) * 2013-01-04 2015-05-26 Nokia Corporation Method, apparatus, and computer program product for wireless short-range communication
CN103188023A (en) * 2013-03-19 2013-07-03 天脉聚源(北京)传媒科技有限公司 Distance measuring method and system, and application method
CN103874168A (en) * 2013-12-27 2014-06-18 北京奇虎科技有限公司 Method and routing device for realizing network authentication through Bluetooth matching
CN103997782B (en) * 2014-04-24 2018-06-05 湘潭大学 A kind of method of the wireless aps Detection location based on signal strength and packet capturing rate

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013184433A1 (en) * 2012-06-08 2013-12-12 Time Warner Cable Inc. Wireless session configuration persistence
US20140334465A1 (en) * 2013-05-08 2014-11-13 Lg Electronics Inc. Method and apparatus for paging based on location information of a user equipment in a convergence network of a plurality of communication systems
WO2014197764A1 (en) * 2013-06-06 2014-12-11 Interdigital Patent Holdings, Inc. Wifi channel selection and subchannel selective transmissions
CN104144415A (en) * 2014-07-10 2014-11-12 深圳市螺光科技有限公司 Method for connecting WiFi access point and mobile communication terminal
CN104540128A (en) * 2014-12-26 2015-04-22 北京奇虎科技有限公司 Method, device and system for wireless network access

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104869616A (en) * 2015-05-25 2015-08-26 成都西蒙电子技术有限公司 Cloud share wireless router equipment and connection method

Also Published As

Publication number Publication date
CN104540128A (en) 2015-04-22
CN104540128B (en) 2018-10-09

Similar Documents

Publication Publication Date Title
US20170118213A1 (en) Indoor location server provision and discovery
US20190230613A1 (en) Method and apparatus for registering wireless device in wireless communication system
EP2852201B1 (en) Method, device, system and storage medium for controlling access to a router
EP3165009B1 (en) Apparatus and method for controlling wireless data traffic
US10341942B2 (en) Method of transmitting proximity service data and electronic device for the same
EP3072334B1 (en) Method, system and apparatus for automatically connecting to wlan
CN104247513B (en) Method, device for High-effective Service discovery
US9736767B2 (en) Identification-assisted wireless network connections
US8886230B2 (en) Systems and methods for service set identifier-based location detection
US9577692B2 (en) Subscriber identification module management method and electronic device supporting the same
US10250297B2 (en) System and method of providing a service using a near field communication tag
US9686364B2 (en) Location aware resource locator
US9942839B2 (en) Reducing wireless reconnection time of a computing device
CN104967997B (en) A kind of Wi-Fi cut-in method, Wi-Fi equipment, terminal device and system
US9674708B2 (en) Monitoring unauthorized access point
RU2605610C2 (en) Method and device for connection with the network
CN104540128B (en) The method, apparatus and system of wireless network access
US9398624B2 (en) Wireless communication
WO2017020654A1 (en) Wireless network access method and device
US20190335404A1 (en) Exchanging ranging and location information among peer-to-peer devices
US20160234212A1 (en) Network Access Control Method and Apparatus
CN104333863B (en) Connection management method and device, electronic equipment
EP2854378B1 (en) Method, device and network equipment for acquiring feature information
CA2835210C (en) Managing network interaction for devices
CN105100231B (en) Acquisition methods, equipment and the system of smart machine location information

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15871799

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase in:

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15871799

Country of ref document: EP

Kind code of ref document: A1