WO2018019287A1 - 无线局域网连接方法、移动终端及存储介质 - Google Patents

无线局域网连接方法、移动终端及存储介质 Download PDF

Info

Publication number
WO2018019287A1
WO2018019287A1 PCT/CN2017/094878 CN2017094878W WO2018019287A1 WO 2018019287 A1 WO2018019287 A1 WO 2018019287A1 CN 2017094878 W CN2017094878 W CN 2017094878W WO 2018019287 A1 WO2018019287 A1 WO 2018019287A1
Authority
WO
WIPO (PCT)
Prior art keywords
local area
wireless local
area network
mobile terminal
access key
Prior art date
Application number
PCT/CN2017/094878
Other languages
English (en)
French (fr)
Inventor
梁瀚昀
丁海峰
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018019287A1 publication Critical patent/WO2018019287A1/zh
Priority to US16/013,785 priority Critical patent/US10356707B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/107Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W36/00Hand-off or reselection arrangements
    • H04W36/0005Control or signalling for completing the hand-off
    • H04W36/0011Control or signalling for completing the hand-off for data sessions of end-to-end connection
    • H04W36/0022Control or signalling for completing the hand-off for data sessions of end-to-end connection for transferring data sessions between adjacent core network technologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present application relates to a wireless local area network communication technology, and in particular, to a wireless local area network connection method, a mobile terminal, and a storage medium.
  • Cellular data communication such as 4G communication
  • WiFi Wireless Fidelity
  • WLANs are widely deployed in various public places such as subways, shops, etc., to facilitate the user's data communication needs anytime and anywhere, but the wireless LAN deployed in public places is usually not open, that is, with a verification mechanism. The user needs to obtain the access key of the wireless local area network in advance to access, and needs to be reset when the user moves in the coverage area of other wireless local area networks.
  • the embodiment of the present application provides a wireless local area network connection method and a mobile terminal, which can support the mobile terminal to automatically access the wireless local area network and implement seamless handover of the access.
  • an embodiment of the present application provides a wireless local area network connection method, where the method includes:
  • the identifier of the wireless local area network can be connected to the wireless local area network;
  • the operation of detecting the connection identifier of the target accessible wireless local area network is detected, and access is performed based on the access key of the target accessible to the wireless local area network.
  • the embodiment of the present application provides a mobile terminal, where the mobile terminal includes:
  • a detecting unit configured to detect a wireless local area network covering the mobile terminal
  • a matching unit configured to match an identifier of the wireless local area network, a pre-stored geographic location of the mobile terminal, an identifier of a wireless local area network storing a corresponding access key, and a geographic location, and determine to cover the mobile terminal Accessible wireless local area network with corresponding access key in the wireless local area network;
  • a setting unit configured to set a corresponding access key for the accessible wireless local area network at an operating system layer
  • a presentation unit that presents a column of a wireless local area network covering the mobile terminal at a network connection interface a table, and presenting a connection identifier for the accessible wireless local area network;
  • the access unit detects an operation for the connection identifier of the target accessible wireless local area network, and accesses based on the access key of the target accessible to the wireless local area network.
  • an embodiment of the present application provides a mobile terminal, including:
  • a memory configured to store an executable program
  • a processor configured to: perform the following operations by executing an executable program stored in the memory:
  • the operation of detecting the connection identifier of the target accessible wireless local area network is detected, and access is performed based on the access key of the target accessible to the wireless local area network.
  • an embodiment of the present application provides a storage medium, where the storage medium includes a set of instructions that, when executed, cause at least one processor to perform operations including:
  • the operation of detecting the connection identifier of the target accessible wireless local area network is detected, and access is performed based on the access key of the target accessible to the wireless local area network.
  • the embodiment of the present application has the following beneficial effects: by matching the related information of the pre-stored wireless local area network with the geographic location of the mobile terminal, the accessible wireless local area network and the corresponding access key can be efficiently found; and the user is supported by the connection identifier. Connect to the WLAN, no need to implement additional operations, improve the efficiency of access to the WLAN; when switching over the WLAN covering the mobile terminal, only need to connect to the new WLAN through the connection identifier to access, to achieve access Seamless switching.
  • FIG. 1 is an optional schematic structural diagram of a mobile terminal provided by an embodiment of the present application.
  • FIG. 2 is a schematic diagram of an optional scenario of a wireless local area network connection provided by an embodiment of the present application
  • FIG. 3 is an optional schematic flowchart of a method for connecting a wireless local area network according to an embodiment of the present application
  • 4-1 to 4-3 are schematic diagrams of an optional operation of connecting a wireless local area network according to an embodiment of the present application
  • FIG. 5 is an optional schematic flowchart of setting an access key of a wireless local area network in a mobile terminal according to an embodiment of the present disclosure
  • FIG. 6 is a schematic structural diagram of an optional connection of a mobile terminal to a WiFi network according to an embodiment of the present disclosure
  • FIG. 7 is a schematic structural diagram of an optional function of a mobile terminal according to an embodiment of the present application.
  • FIG. 8 is a schematic structural diagram of hardware of a mobile terminal according to an embodiment of the present application.
  • Mobile terminals any type of mobile terminal equipment such as smart phones, tablet computers, and vehicle-mounted mobile terminals, or mobile terminal devices that are fixedly used; mobile terminals have short-range communication capabilities, and can also have cellular communication capabilities.
  • the identification of the WLAN including:
  • SSID Service Set Identifier
  • BSSID Basic Service Set Identifier
  • AP wired network access point
  • BSSID Basic Service Set
  • BSSID Basic Service Set
  • the BSSID can be regarded as a medium access control (MAC) address of the AP.
  • MAC medium access control
  • the embodiment of the present application can be provided as a wireless local area network connection method and a mobile terminal using a wireless local area network connection method, and the mobile terminal can be implemented in any manner, such as a smart phone, a tablet computer, a notebook computer, a vehicle mobile terminal, etc., of course, Implemented in a desktop computer or similar computing device,
  • the embodiment of the present application does not limit the software and hardware structure of the mobile terminal.
  • the mobile terminal 10 includes a hardware layer, a driver layer, and an operating system layer. And software layer.
  • the structure of the mobile terminal 10 shown in FIG. 1 is merely an example and does not constitute a limitation on the structure of the mobile terminal.
  • the mobile terminal 10 can set more components than FIG. 1 according to implementation requirements, or omit setting of partial components according to implementation needs.
  • the hardware layer of the mobile terminal 10 includes a processor 11, an input/output interface 13, a storage medium 14, and a network interface 12, and the components can communicate via a system bus connection.
  • the processor 11 can be implemented by using a central processing unit (CPU), a microprocessor (MCU, Microcontroller Unit), an application specific integrated circuit (ASIC), or a Field-Programmable Gate Array (FPGA).
  • the input/output interface 13 can be implemented using input/output devices such as a display screen, a touch screen, and a speaker.
  • the storage medium 14 may be implemented by using a non-volatile storage medium such as a flash memory, a hard disk, or an optical disk, or may be implemented by a volatile storage medium such as double-rate (DDR) dynamic storage.
  • DDR double-rate
  • the storage medium 14 may be The mobile terminals 10 are commonly disposed at the same place, and may be remotely disposed remotely with respect to the mobile terminal 10, or may be distributed locally and remotely with respect to the mobile terminal 10.
  • the network interface 12 provides the processor 11 with access capabilities of external data such as the off-site set storage medium 14.
  • the network interface 12 may be based on Near Field Communication (NFC) technology, Bluetooth technology, Zigbee (ZigBee) technology for short-range communication, and can also implement communication systems such as Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), and its evolution. Standard communication.
  • the driver layer includes middleware 15 for the operating system 16 to identify and communicate with the hardware layer components, such as a collection of driver applications for the various components of the hardware layer.
  • Operating system 16 is used to provide a user-oriented graphical interface, illustratively including various types of applications 17, which support user control of the device via a graphical interface.
  • the software environment of the device such as the operating system type and version, is not limited, and may be, for example, an Android operating system, an iOS operating system, a Linux operating system, or a UNIX operating system.
  • the wireless local area network connection method provided by the present application can be implemented by the mobile terminal 10 executing executable instructions in the storage medium 14 .
  • the method for performing the wireless local area network connection provided by the embodiment of the present application is used.
  • the executable instructions may be provided as a function or application of the operating system 16 content of the mobile terminal 10 (eg, WiFi housekeeper, one-click connection to WiFi, etc.), or as an installation package for a third-party application, or as an operating system.
  • the function plug-in of the application already installed in 16 such as a one-click connection WiFi plug-in in the WiFi housekeeping application).
  • FIG. 2 An optional application scenario diagram of the wireless local area network connection provided by the embodiment of the present application is shown in FIG. 2.
  • the mobile terminal 10, the wireless local area network 30, the wireless local area network 40, and the cloud 20 are exemplarily shown.
  • the mobile terminal 10 is in the coverage of the wireless local area network 30 and the wireless local area network 40.
  • FIG. 3 An optional flow diagram of the wireless local area network connection method provided by the embodiment of the present application, which is shown in FIG. 3, is described, and includes the following steps:
  • Step 101 Detect a wireless local area network covering the mobile terminal.
  • the mobile terminal detects a broadcast signal of a wireless local area network in an environment in which the mobile terminal is located, and parses the broadcast signal to obtain an identifier of the corresponding wireless local area network.
  • the wireless local area network connection method provided by the embodiment of the present application is illustrated by a specific application in the mobile terminal, such as a WiFi butler implementation.
  • the operating system layer of the mobile terminal invokes the network interface 12 of the hardware layer (such as a WiFi module) according to the built-in logic.
  • the broadcast signal covering the wireless local area network in the environment where the mobile terminal is located is scanned, and the broadcast signal is parsed to obtain the identifier of the corresponding wireless local area network to form a WiFi list (including the identifier of the wireless local area network), and the detection of the wireless local area network covering the current geographic location of the mobile terminal is completed.
  • the WiFi housekeeper can know the wireless local area network covering the mobile terminal by reading the WiFi list.
  • the operating system layer of the mobile terminal 10 calls the network interface of the hardware layer to monitor the broadcast signal at 2.4 Ghz and 5 Ghz, and the SSID of the wireless local area network 30 and the wireless local area network 40 can be parsed from the broadcast signal.
  • the wireless local area network covering the mobile terminal can be comprehensively analyzed by analyzing the broadcast signal. Detection.
  • a method of quickly determining a wireless local area network where a mobile terminal is currently located without parsing a broadcast signal is provided.
  • the movement of the user holding the mobile terminal has certain regularity (such as a fixed commute route, a fixed route to the casino, etc.), so the user often uses a fixed number of wireless local area networks, once in the mobile terminal.
  • the identity and geographic location of these fixed-purpose wireless local area networks are stored, and by reading the geographical location stored by the mobile terminal, it is possible to quickly determine which wireless local area networks are covered by the current geographical location.
  • the wireless LAN deployed in some locations does not transmit broadcast signals (ie, the SSID is not broadcasted externally), so that even if the user has accessed such "hidden” wireless LANs, When it is in the coverage of the wireless local area network again, such hidden wireless local area network will not be found by parsing the broadcast signal.
  • the mobile terminal pre-stores the geographic location of the mobile terminal, and updates when the update condition of the geographic location is satisfied, to ensure the timeliness of the stored geographical location; and the mobile terminal also stores the access secret.
  • the identity of the key's wireless local area network eg, the aforementioned hidden wireless local area network
  • geographic location e.g., the geographical location of the mobile terminal pre-stored in the mobile terminal (as stored in the cache) is matched with the geographical location of the wireless local area network in which the corresponding access key is stored in the mobile terminal, and if the matching is successful, it is determined that the mobile terminal is in the The coverage of the corresponding WLAN.
  • the mobile terminal 10 reads the pre-stored geographic location of the mobile terminal 10, and the geographical location of the mobile terminal 10 read here is regarded as the current geographic location of the mobile terminal 10, and the read Geographical location and wireless storage of the corresponding access key in the mobile terminal 10
  • the geographical location of the local area network is matched. Assuming that the mobile terminal 10 stores the identity of the wireless local area network 30, the wireless local area network 40, and the geographic location, the coverage of the mobile terminal 10 in the wireless local area network 30 and the wireless local area network 40 will be determined.
  • the above-mentioned geographic location through the mobile terminal matches the geographical location of the wireless local area network in which the corresponding access key is stored in the mobile terminal, and does not need to be received.
  • the wireless local area network currently covered by the mobile terminal can be quickly located, such as a wireless local area network that has been accessed in the current geographical location.
  • Step 102 Match the identifier of the wireless local area network, and the geographical location of the pre-stored mobile terminal, the identifier of the wireless local area network storing the corresponding access key, and the geographic location, and determine that the wireless local area network covering the mobile terminal has corresponding access.
  • the key can be connected to the wireless LAN.
  • the following information is pre-stored (eg, cached) in the mobile terminal with a portion of the wireless local area network (eg, a wireless local area network that covers the geographic location of the mobile terminal): 1) identification of the wireless local area network, such as SSID and BSSID, etc. 2) the access key of the wireless local area network; 3) the geographical location of the wireless local area network.
  • the wireless local area network based identification may not accurately distinguish wireless local area networks in different geographical locations.
  • two different geographical locations of wireless local area networks may have the same SSID such as “free WiFi”. Therefore, in the embodiment of the present application, the wireless local area network is distinguished based on the geographic location and the identifier of the wireless local area network, and even if multiple wireless local area networks are deployed in the same geographical location, the identification may be based on the identifier of the wireless local area network.
  • the mobile terminal determines, in such a manner, a wireless local area network (referred to as an accessible wireless local area network) that can be accessed in the current geographic location: an identifier of the wireless local area network that will cover the mobile terminal, and a geographical location of the pre-stored mobile terminal. Matching with the identifier and geographic location of the wireless local area network in which the mobile terminal stores the corresponding access key, and determining that the matching is successful The line LAN is accessible to the wireless LAN and the corresponding access key can be determined.
  • a wireless local area network referred to as an accessible wireless local area network
  • the local area network can access the wireless local area network, and can determine the corresponding access key; if the matching is not successful, the SSID and the BSSID of the wireless local area network can be corresponding to the SSID and the BSSID of the wireless local area network in which the mobile terminal stores the corresponding access key.
  • a matching is performed to determine that the successfully matched wireless local area network is accessible to the wireless local area network, and the corresponding access key can be determined.
  • the mobile terminal 10 matches the identifier of the wireless local area network 30 and the geographical location of the mobile terminal 10 stored in advance, and the identifier and geographic location of the wireless local area network in which the mobile terminal 10 stores the corresponding access key. Assuming that the mobile terminal 10 stores the identifiers, geographic locations, and access keys of the wireless local area network 30 and the wireless local area network 40, it can be determined that the wireless local area network 30 is accessible to the wireless local area network. Similarly, the wireless local area network 40 can be determined to be accessible to the wireless network. local area network.
  • the geographic location and the identifier of the wireless local area network with the corresponding access key are pre-stored by the mobile terminal, and the accessible wireless network in the current geographical location can be efficiently found when the mobile terminal is in the coverage of any wireless local area network. And the corresponding access key.
  • the mobile terminal locally stores an identifier of a small number of wireless local area networks having a corresponding access key and a geographical location, so that when the location change of the mobile terminal is random, the local storage based on the mobile terminal has a corresponding The identity of the wireless local area network of the access key and the geographical location may result in a failure to hit the wireless local area network covered by all the geographical locations where the mobile terminal is located.
  • the mobile terminal can upload the identifier, the geographical location, the access key, and the like of the wireless local area network that was once accessed to the cloud storage, and the mobile terminal determines the wireless that can be accessed in the current geographic location in this manner.
  • Local area network referred to as accessible wireless local area network: the identifier of the wireless local area network that will cover the mobile terminal, and the geographical location of the pre-stored mobile terminal. Matching with the identifier and geographic location of the wireless local area network in which the mobile terminal stores the corresponding access key, and determining that the successfully matched wireless local area network is accessible to the wireless local area network.
  • the identifier of the wireless local area network as the SSID as an example, based on the SSID of the wireless local area network and the geographical location of the mobile terminal, matching with the SSID and the geographical location of the wireless local area network in which the corresponding access key is stored in the cloud, and determining the successfully matched wireless local area network.
  • the corresponding access key may be determined; if the matching is not successful, the SSID and the BSSID of the wireless local area network may be matched with the SSID and the BSSID of the wireless local area network in which the corresponding access key is stored in the cloud.
  • the wireless local area network with successful matching is determined to be accessible to the wireless local area network, and the corresponding access key can be determined.
  • the mobile terminal 10 matches the identifier of the wireless local area network 30 and the pre-stored geographic location of the mobile terminal 10 with the identifier and geographic location of the wireless local area network in which the cloud 20 stores the corresponding access key.
  • the cloud 20 stores the identifiers, geographic locations, and access keys of the wireless local area network 30 and the wireless local area network 40.
  • the wireless local area network 30 can be determined to be accessible to the wireless local area network.
  • the wireless local area network 40 can be determined to be accessible to the wireless local area network.
  • the above method for determining the accessibility to the wireless local area network requires communication with the cloud, but the cloud stores the identification, geographic location, and access key of the wireless local area network uploaded by a large number of mobile terminals (such as mobile terminals installed with WiFi butler).
  • the identifier of the wireless local area network covering the mobile terminal and the geographical location are matched with the identifier of the wireless local area network stored in the cloud and the geographical location, the wireless local area network that hits the geographical location of the mobile terminal can be ensured.
  • the efficiency of the wireless local area network and the hit ratio of the wireless local area network in which the mobile terminal is currently located are taken into consideration, and the identifier of the wireless local area network covering the mobile terminal and the geographical position of the pre-stored mobile terminal are preferentially matched with the mobile terminal.
  • the identifier of the wireless local area network in which the corresponding access key is stored and the geographic location are matched to determine that the successfully matched wireless local area network is matched, and if it can match, the end is ended.
  • the identifier of the wireless local area network and the pre-stored The geographic location of the mobile terminal, and the wireless local area network with the corresponding access key stored in the cloud
  • the identification and the geographical location are matched, and the successfully connected wireless local area network is determined, and the access key, the identifier and the geographical location of the accessible wireless local area network are stored to the mobile terminal to update the local storage of the mobile terminal, so that when The mobile terminal can improve the hit rate by matching the identifier of the same wireless local area network and the geographical location of the pre-stored mobile terminal with the identifier and geographic location of the wireless local area network in which the corresponding access key is stored in the mobile terminal. Thereby improving the efficiency of finding a wireless LAN.
  • the mobile terminal 10 matches the identifier of the wireless local area network 30 and the geographical location of the mobile terminal 10 stored in advance, and the identifier and geographic location of the wireless local area network in which the mobile terminal 10 stores the corresponding access key. Assuming that the mobile terminal 10 does not store the wireless local area network 30, and the identity, geographic location, and access key of the wireless local area network 40, it cannot be hit (that is, cannot be matched) to access the wireless local area network; subsequently, the mobile terminal 10 continues to wirelessly The identifier of the local area network 30 and the pre-stored geographic location of the mobile terminal 10 are matched with the identifier and geographic location of the wireless local area network in which the cloud 20 stores the corresponding access key.
  • the cloud 20 stores the wireless local area network 30 and the wireless local area network 40.
  • the identifier, the geographical location, and the access key may determine that the wireless local area network 30 is accessible to the wireless local area network.
  • the wireless local area network 40 may be determined to be accessible to the wireless local area network.
  • the mobile terminal 10 stores the access key of the wireless local area network 30 and the wireless local area network 40 to the mobile terminal 10, and subsequently stores the corresponding access with the mobile terminal 10 by the identifier of the wireless local area network 30 and the geographical location of the mobile terminal 10 stored in advance.
  • the identity of the WLAN of the key and the geographical location correspond to each other, it can be directly hit.
  • the mobile terminal when the mobile terminal stores the identity, geographical location and access key of the wireless local area network covering the mobile terminal, it can directly hit the wireless local area network to ensure the efficiency of hitting the wireless local area network, and when the miss occurs, Cloud matching, because the data stored in the cloud of the wireless LAN is comprehensive, it can hit the wireless LAN.
  • the accessible wireless is matched to any of the foregoing methods.
  • LAN storage for various reasons can be used to access the wireless LAN can not be used, such as low security, frequent access key update, signal difference, etc., in order to ensure the stability of data communication after access to the wireless LAN, you can also
  • the WLAN can be accessed for screening, and the accessible WLAN that meets the preset condition is selected from the matched WLANs.
  • the preset conditions include:
  • the access key update frequency exceeds the frequency threshold. Frequent update of the access key will inevitably lead to disconnection of the network connection after access, which affects the continuity of the service used by the user.
  • the signal strength is lower than the signal strength threshold, indicating that the mobile terminal may be at the edge of the coverage area of the wireless local area network signal, or the signal transmission may be affected by the obstruction.
  • the WLAN is a private network.
  • the private network risks being maliciously captured.
  • the owner of the private network may not want to open the private network to any user.
  • the matched accessible wireless local area network is replaced by the selected accessible wireless local area network, thereby ensuring the stability of accessing the data communication accessible to the wireless local area network.
  • Step 103 Set a corresponding access key for the accessible wireless local area network at the operating system layer.
  • the WiFi controller applies the access key of the WLAN to the operating system layer, and the operating system layer performs the data communication through the wireless local area network, based on the access key via the hardware.
  • the network interface 12 of the layer initiates access.
  • Step 104 Present a wireless local area network covering the mobile terminal on the network connection interface, and present a connection identifier for the accessible wireless local area network.
  • the network connection interface of the mobile terminal presents information such as SSID, encryption, signal strength, etc. of various types of wireless local area networks covering the mobile terminal.
  • information such as SSID, encryption, signal strength, etc. of various types of wireless local area networks covering the mobile terminal.
  • a one-click connection identifier is also presented, prompting the user to access the corresponding wireless local area network once the one-click connection identifier is triggered, and since the access key for accessing the wireless local area network has been obtained and is in the operating system
  • the layers are set up so no additional setup is required for the user.
  • Step 105 The operation of detecting a connection identifier of the target accessible wireless local area network is detected, and access is performed based on the access key of the target accessible to the wireless local area network.
  • step 104 when the one-button connection identifier is triggered, the access is initiated by using an access key of the accessible wireless local area network set at the operating system layer, as shown in FIG.
  • the access key of the wireless local area network 30 is used to initiate the access to the wireless local area network 30, and after the successful access, the data communication is performed via the wireless local area network 30.
  • the mobile terminal stores (e.g., caches) the identity of a portion of the wireless local area network, the geographic location, and the access key.
  • the wireless local area network in which the corresponding access key is stored in the mobile terminal corresponds to the geographic location where the mobile terminal is currently located, thereby improving the hit rate of the mobile terminal locally matching the accessible wireless local area network.
  • the wireless LAN corresponding to the stored access key may no longer cover the mobile terminal, and the access key may also be invalid. Therefore, it is necessary to update the stored access key.
  • the mobile terminal when the mobile terminal detects that the update condition of the access key of the pre-stored wireless local area network is satisfied, the mobile terminal updates the access key of the corresponding wireless local area network stored in advance, for example, deletes the access key of a part of the wireless local area network. To avoid setting a failed access key at the operating system layer, or to synchronize the access key of some wireless local area networks with the cloud to maintain the validity of the access key.
  • Example 1 The update condition is: the update time of the access key of the wireless local area network is reached.
  • the update time can be the same setting for all wireless LANs. Once the update time is reached, the access key is determined to be invalid, and the access key of the wireless local area network to be stored by the mobile terminal is synchronized with the cloud to avoid the situation that the access key cannot be accessed after the access key is set at the operating system layer.
  • the addition of different dimensions is specifically set, including:
  • the location addition can be negatively related to the number of other wireless LANs deployed at the location where the WLAN is located. For example, if the number of WLANs deployed at the location is large, based on the randomness of user access, the update time can be Relatively elongated.
  • the identifier of the wireless local area network has different merchant identification bonuses because of carrying different merchants' identifiers.
  • the wireless local area network of a large commercial store is relatively stable and secure and the access key is The update cycle is longer, so the merchant logo addition for a large store can be greater than the merchant logo bonus for a small store.
  • the above addition and the reference update time are superimposed to obtain an update time of the access key of the corresponding wireless local area network, and the access key of the corresponding wireless local area network is updated when the update time arrives, thereby, the characteristics of each wireless local area network are targeted sexual update access key.
  • Example 2 The update condition is that the geographical distance of the wireless local area network and the geographical position of the pre-stored mobile terminal exceed the distance threshold.
  • the mobile terminal has exceeded the coverage of the wireless local area network, and it is not necessary to store the corresponding access key in the mobile terminal, so the access key of the corresponding wireless local area network can be deleted, when the mobile terminal is located within the coverage of the wireless local area network again. , can synchronize the access key from the cloud to the mobile terminal local storage.
  • the update conditions shown in the example 1) and the example 2) may also be used in combination, for example, the update condition is: the update time of the access key of the wireless local area network arrives, and the geographical location of the wireless local area network and the pre-stored mobile terminal The distance of the geographic location exceeds the distance threshold.
  • the update time arrives and the mobile terminal leaves the coverage of the wireless local area network
  • the access key of the wireless local area network is determined to be invalid, and it is not necessary to store the corresponding access key in the mobile terminal, so To delete the access key of the corresponding wireless local area network, when the mobile terminal is located within the coverage of the wireless local area network again, the access key can be synchronized from the cloud to the local storage of the mobile terminal.
  • the geographic location of the mobile terminal is pre-stored in the mobile terminal.
  • the advantage of pre-storing the geographical location is that when the wireless LAN is required to be matched, the mobile terminal does not need to be re-located, and only the pre-stored geographical location needs to be read. (Considered as the nearest geographic location of the mobile terminal), thus ensuring the efficiency of matching access to the wireless local area network.
  • the mobile terminal updates the pre-stored geographical location in an asynchronous manner to match the accessible wireless local area network.
  • the accuracy of the pre-stored geographical location is ensured, and on the other hand, Asynchronous execution, so there is no need to locate when matching the accessible wireless LAN, which improves the efficiency of matching access to the wireless LAN and avoids delay.
  • updating the pre-stored geographic location is done in such a way:
  • the mobile terminal When it is detected that the update condition of the geographical location of the pre-stored mobile terminal is satisfied, the mobile terminal is located, and the geographical position of the pre-stored mobile terminal is updated by using the geographical location obtained by the positioning.
  • the update conditions are exemplified below.
  • Example 1 The update interval time at which the geographic location of the mobile terminal is detected is reached.
  • Periodically updating the geographic location of the mobile terminal at the update interval ensures the timeliness of the geographic location.
  • the mobile terminal stores the nearest 2 (or more) geographic locations, by comparing the distance between the geographical locations and the distance threshold, if the distance threshold is exceeded (greater than the accuracy error of the positioning), the mobile terminal moves, thereby positioning
  • the mobile terminal is such that when the mobile terminal is stationary, it does not need to be frequently positioned to avoid affecting the endurance performance of the terminal.
  • the specific event may be: scanning a wireless local area network list covering the mobile terminal; wireless LAN disconnected, etc.
  • the wireless local area network access event accessed by the mobile terminal, the user accessing the wireless local area network or re-selecting the wireless local area network for access, so updating the pre-stored geographical location may
  • the subsequently accessible accessible wireless local area network covers the current geographic location of the mobile terminal.
  • the specific event may also be successful for the mobile terminal to access the wireless local area network verification; detecting that the mobile terminal is set to a trusted wireless local area network by the mobile terminal (an application in the mobile terminal sets the wireless local area network as the trust means obtaining the wireless local area network) The heartbeat of the connected control).
  • the mobile terminal is an iOS device
  • the wireless local area network uses a WiFi protocol networking (also referred to as a WiFi network).
  • a WiFi controller is used to perform a WiFi network connection.
  • the operating system layer calls back the WiFi list.
  • the WiFi housekeeper obtains the access key of the WiFi network in the WiFi list and sets it.
  • the WiFi list includes the WiFi network 1 and the WiFi network 2, and the WiFi housekeeper obtains the access key of the WiFi network 1.
  • the WiFi list is presented in the WiFi list interface 42, including the name of the WiFi network, where the access key of the WiFi network is based on the geographic location of the mobile terminal and the SSID of the WiFi network at the mobile terminal.
  • the cache or cloud matching is obtained.
  • the access key of the corresponding WiFi network is matched based on the SSID and the BSSID of the WiFi network.
  • the WiFi housekeeper presents a prompt 43 on the WiFi list interface 42 that can be connected by a WiFi butler. After the user triggers the prompt 43, the WiFi manager presents a one-click connection identifier 44 to the accessible WiFi network in the WiFi list interface 42 when the user triggers One-click connection set by WiFi network 1 After the identifier 44, the WiFi housekeeper will trigger the operating system layer to initiate access based on the access key of the WiFi network 1 set in advance.
  • the operating system layer of the mobile terminal scans the WiFi network covered by the current location of the mobile terminal according to the built-in logic, for example, scanning the WiFi list when the user triggers the mobile terminal to display the WiFi list interface.
  • the WiFi Manager obtains the WiFi list scanned by the operating system layer, and searches (matches) in the cache based on the SSID of the WiFi network in the WiFi list and the current geographic location of the mobile terminal (equivalent to the geographical location of the WiFi network). Access keys for WiFi network 1 and WiFi network 2.
  • the cache stores information such as the geographical location, SSID, BSSIDs, and update time of the WiFi network (where the update time may be equal to the effective time, or may be the time before the effective time arrives), the effective time, and the like.
  • the access key of the corresponding WiFi network may also be matched based on the SSID and the BSSID of the WiFi network.
  • the access key of the WiFi network is searched in the cache and the access key is not invalid, the access key of the WiFi network is set to the operating system layer and the access key of the WiFi network has been set in response to the operating system layer.
  • the operating system layer will call back to the WiFi Manager when scanning the WiFi list, so that the WiFi Manager can set the password of the WiFi network.
  • the WiFi network 2 is continuously pulled to the cloud based on the SSID and the geographical location of the WiFi network 2.
  • the access key is stored in the cache of the mobile terminal, and the information such as the access key, time, and geographic location of the WiFi network 2 is stored.
  • WiFi network 1 even if the corresponding access secret is searched in the mobile terminal cache If the update time or the effective time of the access key arrives, the access key of the WiFi network 1 is still pulled from the cloud, and the access key and the valid time of the WiFi network 1 cached by the mobile terminal are updated. .
  • the WiFi housekeeper can use the callback of the operating system layer to set the access key of the WiFi network 1; if the operating system layer has passed the callback The way the WiFi housekeeper sets the access key of the WiFi network, the WiFi key needs to wait for the operating system layer to scan the WiFi list next time and call back to the WiFi housekeeper to set the access key.
  • FIG. 6 An alternative architecture diagram of the mobile terminal connected to the WiFi network shown in FIG. 6 is described, and the processing of connecting the WiFi home to the WiFi network is described.
  • connection WiFi network is implemented by components that are jointly operated by the mobile terminal and the cloud.
  • the MQQHotspotHelper component (which can be implemented as a functional component of the WiFi Manager) is responsible for registering Hotspot events, responding to Hotspot events, and setting the access key for the WiFi network in the ScanList event.
  • WiFi Password Fetcher (can be implemented as a functional component of the WiFi Manager), is responsible for searching the cache for the access key of the WiFi network in the WiFi list, and setting the WiFi network connection in the scan list event when searching for the WiFi access key. Enter the key; if the access key of the WiFi network in the WiFi list is not searched in the cache, the access key of the WiFi network is pulled from the cloud, for example, the access density of the WiFi network in the WiFi list is pulled from the cloud. key. According to the geographic location of the WiFi network in the WiFi list, the SSID, etc., the access key of the WiFi network is cached after the access key is successfully obtained.
  • WiFi Password Caching Manager is responsible for managing the cache of WiFi access keys, and buffers and manages related information of the WiFi network, such as SSID, BSSIDs, access keys, geographic location, update time, and effective time.
  • the new access key of the corresponding WiFi network is pulled from the cloud through the WiFi Password Fetcher, and the new access key of the WiFi network is updated to the cache.
  • the new access key of the corresponding WiFi network is pulled from the cloud through the WiFi Password Fetcher, and the new access key of the WiFi network is updated to the cache.
  • the information of the corresponding WiFi network in the cache is deleted.
  • MQQHotspotHelperSettings can be implemented as a component of the WiFi Manager's backend, responsible for hosting the entire HotspotHelper configuration items, while dynamically configuring in the cloud.
  • the WiFi connection successfully checks parameters such as timeout value and check interval. If the connection is not successful after the mobile terminal initiates the connection exceeding the timeout value, the connection fails; after the connection is successful, it is detected whether the connection with the WiFi network is maintained based on the check interval time.
  • WiFi one-button setup parameters such as signal strength thresholds and the maximum number of WiFi networks that can be connected per button with each list setting.
  • the signal strength threshold is used to control the WiFi network displaying the one-button connection identifier.
  • Geographical parameters such as update interval, update accuracy, and update timing.
  • the update interval is used to control the update of the geographical location of the cached mobile terminal, relocate the mobile terminal when the update interval arrives and update the location of the mobile terminal in the cache, ensuring the timeliness of the geographical location cached by the mobile terminal.
  • the update precision is used to control the moving distance of the geographic location that triggers the update of the mobile terminal, for example, storing the latest two geographic locations of the mobile terminal in the cache, and determining the mobile end based on the two geographic locations.
  • the moving distance of the terminal exceeds the update accuracy, the mobile terminal is located and the geographical position of the cached mobile terminal is updated.
  • the update opportunity is used to indicate a specific event that triggers updating the geographic location of the mobile terminal, such as the following events: scanning the WiFi list; the WiFi network connection is successful; the WiFi network verification is successful; the heartbeat of the trusted WiFi network; the WiFi network is disconnected, and the like.
  • WiF access key cache parameters such as base time, weight addition, location addition and merchant identity addition, the distance threshold between the current geographic location and the geographical location of the cached WiFi, wherein the basic information of the merchant indication includes the store Name, category, phone and address, etc.
  • the WiFi access key cache parameter is used to indicate the timing of updating the cached WiFi network access key, such as updating the access key in the cache when the update time arrives, and the current geographic location of the mobile terminal (read from the cache) and When the distance of the geographical location of the WiFi network exceeds the distance threshold, the information of the corresponding WiFi network in the cache, such as the SSID, the access key, and the geographical location, is deleted.
  • WiFi trust mode One-click connection capability can set the trust of a WiFi network, and only one application can control the connection with a WiFi network. After the application obtains the control of the connection with a WiFi network by setting the trust, when the mobile terminal accesses the WiFi network, the application receives the callback of the operating system layer at regular intervals, and the application is activated, thereby controlling the WiFi. The connection status of the network.
  • the operating system layer will call back the application every 5 minutes.
  • the application has the ability to execute code in the background, such as checking the security of the WiFi network and obtaining the geographical location of the WiFi network (improving the connection success). Rate), other services that require background capabilities (such as statistical point reporting, traffic monitoring, power check).
  • Disconnect from setting up a trusted WiFi network without manual action For example, if you check that a WiFi network has security issues, you can alert the user and actively help the user disconnect with the WiFi network connection.
  • the identifier added by the current application for the WiFi network can be displayed.
  • the operating system layer displays the identifiers of multiple applications corresponding to the WiFi network in the WiFi list; After successfully connecting to the WiFi network, the operating system layer will only display the identity of the only trusted application. This is good for the brand to show.
  • the mobile terminal includes: a detecting unit 110, a matching unit 120, a setting unit 130, a presenting unit 140, an access unit 150, and a first updating unit. 160 and second update unit 170.
  • the detecting unit 110 is configured to detect a wireless local area network that covers the mobile terminal.
  • the detecting unit 110 detects a broadcast signal of the wireless local area network in the environment where the mobile terminal is located, and parses the broadcast signal to obtain the identifier of the corresponding wireless local area network.
  • the location of the mobile terminal is pre-stored in the detecting unit 110, and is updated when the update condition of the geographic location is met, to ensure the timeliness of the stored geographical location; and the mobile terminal also stores the access secret.
  • the identity of the key's wireless local area network eg, the aforementioned hidden wireless local area network
  • the detecting unit 110 matches the geographical location of the mobile terminal stored in advance (as stored in the cache) with the geographical location of the wireless local area network in which the corresponding access key is stored in the mobile terminal, and if the matching is successful, determines that the mobile terminal is in the No corresponding The coverage of the line LAN.
  • the matching unit 120 is configured to match the identifier of the wireless local area network, and the geographical location of the pre-stored mobile terminal, the identifier of the wireless local area network storing the corresponding access key, and the geographic location, and determine that the wireless local area network covering the mobile terminal has The access key can be connected to the wireless local area network;
  • the matching unit 120 is further configured to match the identifier of the wireless local area network and the geographical location of the pre-stored mobile terminal with the identifier and geographic location of the wireless local area network in which the mobile terminal stores the corresponding access key. , to determine that the matching is successful access to the wireless local area network;
  • the mobile terminal pre-stores the geographical location and the identifier of the wireless local area network with the corresponding access key, and when the mobile terminal is in the coverage of any wireless local area network, the accessible wireless network in the current geographical location can be efficiently found and correspondingly Access key.
  • the matching unit 120 is further configured to: when the matching fails, the identifier of the wireless local area network and the geographical location of the pre-stored mobile terminal, and the identifier and geographic location of the wireless local area network in which the corresponding access key is stored in the cloud. Matching, determining that the matching successfully accesses the wireless local area network, and storing the access key accessible to the wireless local area network to the mobile terminal.
  • the mobile terminal When the mobile terminal stores the identifier, the geographical location, and the access key of the wireless local area network covering the mobile terminal, it can directly hit the WLAN to ensure the efficiency of hitting the WLAN, and match from the cloud when the miss occurs. Because the data stored in the cloud of the wireless LAN is comprehensive, it can be hit to access the wireless LAN.
  • the matching unit 120 is further configured to match the identifier of the wireless local area network and the geographical location of the pre-stored mobile terminal with the identifier and geographic location of the wireless local area network in which the corresponding access key is stored in the cloud to determine a match. Successful access to the wireless LAN.
  • the above method of determining access to the wireless local area network requires communication with the cloud, but the cloud storage is a wireless local area network uploaded by a large number of mobile terminals (such as a mobile terminal installed with a WiFi housekeeper).
  • the identification, the geographical location, and the access key so that when the identifier of the wireless local area network covering the mobile terminal and the geographical location are matched with the identifier of the wireless local area network stored in the cloud and the geographical location, the geographic location coverage of the hit mobile terminal can be ensured.
  • Wireless LAN Wireless LAN.
  • the mobile terminal further includes: a first updating unit 160, configured to filter out an accessible wireless local area network that meets a preset condition from the accessible wireless local area network, and use the filtered accessible wireless local area network to update and match. Successful access to the wireless LAN;
  • the preset conditions include one of the following:
  • the safety factor is below the safety factor threshold
  • the access key update frequency exceeds the frequency threshold
  • the signal strength is lower than the signal strength threshold
  • the WLAN is a private network.
  • the setting unit 130 is configured to set a corresponding access key for the accessible wireless local area network at the operating system layer;
  • the presenting unit 140 is configured to present a wireless local area network covering the mobile terminal in the network connection interface, and present a connection identifier for the accessible wireless local area network;
  • the access unit 150 is configured to detect an operation for the connection identifier of the target accessible wireless local area network, and access based on the access key of the target accessible wireless local area network.
  • the mobile terminal further includes: a second update unit 170, configured to: when detecting that the update condition of the geographical location of the pre-stored mobile terminal is satisfied, locate the mobile terminal and update the pre-stored mobile location by using the located geographic location.
  • the geographical location of the terminal
  • an update interval time at which the geographic location of the mobile terminal is detected is reached
  • the wireless local area network in which the corresponding access key is stored in the mobile terminal corresponds to the current geographical location of the mobile terminal, thereby improving the hit rate of the mobile terminal locally matching the accessible wireless local area network.
  • the mobile terminal further includes: a third updating unit 180, configured to: when detecting that the update condition of the access key of the pre-stored wireless local area network is satisfied, updating the pre-stored access key of the corresponding wireless local area network;
  • the update condition includes at least one of the following:
  • the update time of the access key of the wireless local area network is reached
  • updating the access key of the corresponding wireless local area network stored in advance may maintain the validity of the access key stored by the mobile terminal.
  • One-click connection identification allows users to connect to the wireless LAN with one click, without implementing additional operations and improving the efficiency of accessing the wireless LAN.
  • the access key of the wireless local area network can be delivered through the cloud, and the access key and the geographic location update of the mobile terminal can be controlled through various parameters configured in the cloud, and the mobile terminal is dynamically updated according to the geographic location of the mobile terminal.
  • the mobile terminal uses a caching mechanism to store the access key of the wireless local area network, so as to avoid frequently pulling the access key from the cloud, thereby reducing network traffic, speeding up the access to the wireless local area network, and improving the success rate of the access.
  • the foregoing storage medium includes: a mobile storage mobile terminal, a random access memory (RAM), a read-only memory (ROM), a magnetic disk, or an optical disk.
  • RAM random access memory
  • ROM read-only memory
  • magnetic disk or an optical disk.
  • optical disk A medium that can store application code.
  • a hardware implementation of the mobile terminal of the present application includes a processor 802, a storage medium 804, and at least one external communication interface 801; the processor 802, the storage medium 804, and an external communication interface. 801 are all connected by a bus 803.
  • the processor 802 can be a processing component such as a microprocessor, a central processing unit, a digital signal processor, or a programmable logic array. Computer executable code is stored in the storage medium 804.
  • the storage medium 804 includes or stores at least one set of instructions that, when executed, cause the processor 802 to perform the aforementioned wireless local area network connection method of the present application. Among them, including but not limited to performing the following methods:
  • access is based on the set access key of the accessible wireless local area network.
  • the above-described integrated unit of the present application may be stored in a computer readable storage medium if it is implemented in the form of a software function module and sold or used as a stand-alone product.
  • the technical solution of the embodiments of the present application may be embodied in the form of a software product in essence or in the form of a software product, which is stored in a storage medium and includes a plurality of instructions for making
  • a computer mobile terminal (which may be a personal computer, server, or network mobile terminal, etc.) performs all or part of the methods described in various embodiments of the present application.
  • the foregoing storage medium includes: a mobile storage mobile terminal, a RAM, a ROM, a magnetic disk, or an optical disk, and the like, which can store application code.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请公开了一种无线局域网连接方法、移动终端及存储介质;方法包括:检测覆盖移动终端的无线局域网;将无线局域网的标识、以及预先存储的移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定覆盖移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;在操作系统层针对可接入无线局域网设置相应的接入密钥;在网络连接界面呈现覆盖移动终端的无线局域网,并呈现针对所述可接入无线局域网的连接标识;检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。

Description

无线局域网连接方法、移动终端及存储介质
相关申请的交叉引用
本申请基于申请号为201610616199.X、申请日为2016年07月29日的中国专利申请提出,并要求该中国专利申请的优先权,该中国专利申请的全部内容在此引入本申请作为参考。
技术领域
本申请涉及无线局域网通信技术,尤其涉及一种无线局域网连接方法、移动终端及存储介质。
背景技术
随着智能手机、平板电脑、车载移动终端以及穿戴式设备等各种移动终端的普及和发展,以及用户随时随地获取信息的需求,用户需要随时随地接入互联网进行数据通信。
蜂窝数据通信如4G通信较以往更快的数据传输速率,但是用户出于节省资费、以及使用更快传输速率的需求,更倾向于使用移动终端接入无线局域网(WLAN,Wireless Local Area Networks)的方式进行数据通信,典型地,无线局域网使用无线相容性认证(WiFi,Wireless Fidelity)协议组网。
目前,无线局域网被广泛部署在各种公众场合如地铁、商店等,为用户随时随地的数据通信需求提供便利,但是,公众场合部署的无线局域网通常不是开放性质,也即是带有验证机制,用户需要预先获取无线局域网的接入密钥才能接入,在用户移动后其他无线局域网的覆盖区域中时,又需要重新设置。
相关技术对于实现移动终端的自动接入无线局域网、以及接入的无缝 切换尚无有效解决方案。
发明内容
本申请实施例提供一种无线局域网连接方法及移动终端,能够支持移动终端自动接入无线局域网、以及实现接入的无缝切换。
本申请实施例的技术方案是这样实现的:
第一方面,本申请实施例提供一种无线局域网连接方法,所述方法包括:
检测覆盖移动终端的无线局域网;
将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
第二方面,本申请实施例提供一种移动终端,所述移动终端包括:
检测单元,用于检测覆盖移动终端的无线局域网;
匹配单元,用于将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
设置单元,用于在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
呈现单元,在网络连接界面呈现覆盖所述移动终端的无线局域网的列 表,并呈现针对所述可接入无线局域网的连接标识;
接入单元,检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
第三方面,本申请实施例提供一种移动终端,包括:
存储器,配置为存储可执行程序;
处理器,配置为通过执行所述存储器中存储的可执行程序时实现以下操作:
检测覆盖移动终端的无线局域网;
将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
第四方面,本申请实施例提供一种存储介质,该存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行包括以下的操作:
检测覆盖移动终端的无线局域网;
将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
本申请实施例具有以下有益效果:通过预存储的无线局域网的相关信息与移动终端的地理位置匹配,可以高效查找到可接入无线局域网以及相应的接入密钥;通过连接标识支持用户一键连接无线局域网,不需要实施额外的操作,提升接入无线局域网的效率;在覆盖移动终端的无线局域网发生切换时,只需要通过连接标识连接新的无线局域网即可接入,实现了接入的无缝切换。
附图说明
图1是本申请实施例提供的移动终端的一个可选的结构示意图;
图2是本申请实施例提供的无线局域网连接的一个可选的场景示意图;
图3是本申请实施例无线局域网连接方法的一个可选的流程示意图;
图4-1至图4-3是本申请实施例提供的连接无线局域网的可选的操作示意图;
图5是本申请实施例提供的在移动终端中设置无线局域网的接入密钥的一个可选的流程示意图;
图6是本申请实施例提供的移动终端连接WiFi网络的一个可选的架构示意图;
图7是本申请实施例提供的移动终端的一个可选的功能结构示意图;
图8是本申请实施例提供的移动终端的硬件结构示意图。
具体实施方式
以下结合附图及实施例,对本申请进行进一步详细说明。应当理解, 此处所提供的实施例仅仅用以解释本申请,并不用于限定本申请。另外,以下所提供的实施例是用于实施本申请的部分实施例,而非提供实施本申请的全部实施例,在不冲突的情况下,本申请实施例记载的技术方案可以任意组合的方式实施。
本申请实施例中涉及的名词和术语适用于如下的解释。
移动终端,智能手机、平板电脑以及车载移动终端等任意类型的移动终端设备,或固定使用的移动终端设备;移动终端具备近距离通信能力,还可以具备蜂窝通信能力。
无线局域网的标识,包括:
1)无线局域网的服务集标识(SSID,Service Set Identifier)。
2)无线局域网的基本服务集标识(BSSID,Basic Service Set Identifier),一个无线局域网至少由一个连接到有线网络接入点(AP)和若干无线工作站组成,这种配置称为一个基本服务集(BSS,Basic Service Set)。一群移动终端设定相同的BSS名称,即可自成一个组(group),而此BSS的名称即所谓BSSID,
通常,在移动终端如手机参与的WLAN中,BSSID可以视为AP的介质接入控制(MAC)地址。
本申请实施例可提供为无线局域网连接方法以及应用无线局域网连接方法的移动终端,移动终端可以任意方式实施,如智能手机、平板电脑、笔记本电脑、车载移动终端等方式实施,当然,也可以在台式机电脑或类似的计算设备中实施,
另外,本申请实施例对上述移动终端的软硬件结构也不做限定,在图1示出的移动终端10的一个可选的结构示意图中,移动终端10包括硬件层、驱动层、操作系统层和软件层。然而,本领域的技术人员应当理解,图1示出的移动终端10的结构仅为示例,并不构成对移动终端结构的限定。例如, 移动终端10可以根据实施需要设置较图1更多的组件,或者根据实施需要省略设置部分组件。
移动终端10的硬件层包括处理器11、输入/输出接口13,存储介质14以及网络接口12,组件可以经系统总线连接通信。处理器11可以采用中央处理器(CPU)、微处理器(MCU,Microcontroller Unit)、专用集成电路(ASIC,Application Specific Integrated Circuit)或逻辑可编程门阵列(FPGA,Field-Programmable Gate Array)实现。输入/输出接口13可以采用如显示屏、触摸屏、扬声器等输入/输出器件实现。存储介质14可以采用闪存、硬盘、光盘等非易失性存储介质实现,也可以采用双倍率(DDR,Double Data Rate)动态存储等易失性存储介质实现,示例性地,存储介质14可以与移动终端10共同在同一地点设置,也可以相对于移动终端10异地远程设置,或者相对移动终端10本地和异地分布设置。网络接口12向处理器11提供外部数据如异地设置的存储介质14的访问能力,示例性地,网络接口12可以基于近场通信(NFC,Near Field Communication)技术、蓝牙(Bluetooth)技术、紫蜂(ZigBee)技术进行的近距离通信,另外,还可以实现如基于码分多址(CDMA,Code Division Multiple Access)、宽带码分多址(WCDMA,Wideband Code Division Multiple Access)等通信制式及其演进制式的通信。
驱动层包括用于供操作系统16识别硬件层并与硬件层各组件通信的中间件15,例如可以为针对硬件层的各组件的驱动应用的集合。
操作系统16用于提供面向用户的图形界面,示例性地,包括各种类型的应用17,操作系统16支持用户经由图形界面对设备的控制。本申请实施例对上述设备的软件环境如操作系统类型、版本不做限定,例如可以是安卓操作系统、iOS操作系统、Linux操作系统或UNIX操作系统等。
基于图1示出的移动终端10的结构,本申请提供的无线局域网连接方法可以通过移动终端10执行存储介质14中的可执行指令实现,可执行指 令用于执行本申请实施例提供的无线局域网连接方法。示例性地,可执行指令可以提供为移动终端10操作系统16内容的功能或应用(如WiFi管家、一键连接WiFi等),或者提供为第三方应用的安装包,又或者,提供为操作系统16中已经安装的应用的功能插件等形式(如WiFi管家应用中的一键连接WiFi插件)。
基于上述移动终端的软硬件结构提出本申请以下实施例。
本申请实施例提供的无线局域网连接的一个可选的应用场景示意图如图2所示,在图2中,示例性示出了移动终端10、无线局域网30、无线局域网40和云端20。这里,假设移动终端10处于无线局域网30和无线局域网40的覆盖范围。
结合图3示出的本申请实施例提供的无线局域网连接方法的一个可选的流程示意图进行说明,包括以下步骤:
步骤101,检测覆盖移动终端的无线局域网。
在一个实施例中,移动终端检测移动终端所处环境中无线局域网的广播信号,解析广播信号得到相应无线局域网的标识。
以本申请实施例提供的无线局域网连接方法由移动终端中的特定应用如WiFi管家实施为例说明,移动终端的操作系统层调用硬件层的网络接口12(如WiFi模块),按照内建的逻辑扫描覆盖移动终端所处环境中无线局域网的广播信号,解析广播信号得到相应无线局域网的标识以形成WiFi列表(包括有无线局域网的标识),完成对覆盖移动终端当前地理位置的无线局域网的检测。WiFi管家通过读取WiFi列表可以获知覆盖移动终端的无线局域网。
以图3为例,移动终端10的操作系统层调用硬件层的网络接口在2.4Ghz以及5Ghz的信道监听广播信号,从广播信号中即可解析出无线局域网30和无线局域网40的SSID。
由于是通过解析广播信号的方式确定移动终端当前位置所覆盖的无线局域网,因此只要移动终端处于无线局域网信号的有效辐射范围,即可通过解析广播信号的方式可以对覆盖移动终端的无线局域网进行全面的检测。
在另一个实施例中,提供一种不解析广播信号即可快速确定移动终端当前所处位置的无线局域网的方式。
适用于这样的场景:用户持有移动终端的运动具有一定的规律性(如固定的上下班路线、固定去娱乐场游玩的路线等),因此用户往往会固定使用若干无线局域网,一旦移动终端中存储有这些固定使用的无线局域网的标识以及地理位置,通过读取移动终端存储的地理位置即可快速确定当前地理位置覆盖有哪些无线局域网。
另外,还适用于这样的场景,某些位置部署的无线局域网不会发射广播信号(即SSID是不会对外广播的),这样,即使用户曾经接入过这类“隐藏”的无线局域网,当再次处于该无线局域网的覆盖范围时,通过解析广播信号的方式不会查找到这类隐藏的无线局域网。
接续前述说明,移动终端中预先存储有移动终端的地理位置,并在满足地理位置的更新条件时进行更新,以确保存储的地理位置的时效性;并且,移动终端中还存储有具有接入密钥的无线局域网(如,前述的隐藏的无线局域网)的标识以及地理位置。从而,将移动终端中预先存储(如在缓存中存储)的移动终端的地理位置,与移动终端中存储有相应接入密钥的无线局域网的地理位置匹配,如果匹配成功,则确定移动终端处于相应无线局域网的覆盖范围。
仍以图3为例,移动终端10通过读取预先存储的移动终端10的地理位置,这里读取的移动终端10的地理位置视为移动终端10当前所处的地理位置,将所读取的地理位置与移动终端10中存储有相应接入密钥的无线 局域网的地理位置匹配,这里假设移动终端10中存储有无线局域网30、无线局域网40的标识以及地理位置,则将确定移动终端10处于无线局域网30、以及无线局域网40的覆盖范围。
可见,上述通过移动终端所处的地理位置(通过读取移动终端中存储的最新的地理位置)与移动终端中存储有相应接入密钥的无线局域网的地理位置匹配的方式,在不需要接收广播信号进行解析的前提下,即可快速定位移动终端当前地理覆盖的无线局域网,如曾经在当前地理位置接入的无线局域网。
步骤102,将无线局域网的标识、以及预先存储的移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定覆盖移动终端的无线局域网中具有相应接入密钥的可接入无线局域网。
在一个实施例中,移动终端中预先存储(例如,缓存)有部分无线局域网(如覆盖移动终端当前所处地理位置的无线局域网)的以下信息:1)无线局域网的标识,如SSID和BSSID等;2)无线局域网的接入密钥;3)无线局域网的地理位置。
实际应用中,仅仅基于无线局域网的标识可能无法准确区分不同地理位置的无线局域网,例如两个不同地理位置的无线局域网可能具有相同的SSID如“免费WiFi”。因此,本申请实施例中,基于无线局域网的地理位置以及标识来区分无线局域网,即使同一地理位置中部署有多个无线局域网,也可以基于无线局域网的标识进行区分。
接续前述说明,移动终端通过这样的方式确定在当前地理位置可以接入的无线局域网(简称可接入无线局域网):将覆盖移动终端的无线局域网的标识、以及预先存储的移动终端的地理位置,与移动终端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的无 线局域网为可接入无线局域网,并可确定相应的接入密钥。
以无线局域网的标识为SSID为例,基于无线局域网的SSID以及移动终端的地理位置,与移动终端中存储有相应接入密钥的无线局域网的SSID和地理位置对应进行匹配,确定匹配成功的无线局域网为可接入无线局域网,并可确定相应的接入密钥;若没有匹配成功,还可以将无线局域网的SSID和BSSID与移动终端存储有相应接入密钥的无线局域网的SSID和BSSID对应进行匹配,确定匹配成功的无线局域网为可接入无线局域网,并可确定相应的接入密钥。
以图3为例,移动终端10以无线局域网30的标识、预先存储的移动终端10的地理位置,与移动终端10存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,这里假设移动终端10存储有无线局域网30和无线局域网40的标识、地理位置以及接入密钥,则可确定无线局域网30为可接入无线局域网,同理,可确定无线局域网40为可接入无线局域网。
可见,通过移动终端预先存储具有相应接入密钥的无线局域网的地理位置以及标识,在移动终端处于任一无线局域网的覆盖范围时,都可以高效查找到在当前地理位置的可接入无线网络以及相应的接入密钥。
在另一个实施例中,移动终端本地存储有具有相应接入密钥的少量的无线局域网的标识以及地理位置,导致当移动终端的位置变化随机性较强时,基于移动终端本地存储有具有相应接入密钥的无线局域网的标识以及地理位置,会出现无法命中移动终端所处的所有地理位置所覆盖的无线局域网的情况。
针对这种情况,移动终端可将所曾经接入的无线局域网的标识、地理位置以及接入密钥等上传至云端存储,并且,移动终端通过这样的方式确定在当前地理位置可以接入的无线局域网(简称可接入无线局域网):将覆盖移动终端的无线局域网的标识、以及预先存储的移动终端的地理位置, 与移动终端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的无线局域网为可接入无线局域网。
以无线局域网的标识为SSID为例,基于无线局域网的SSID以及移动终端的地理位置,与云端中存储有相应接入密钥的无线局域网的SSID和地理位置对应进行匹配,确定匹配成功的无线局域网为可接入无线局域网,并可确定相应的接入密钥;若没有匹配成功,还可以将无线局域网的SSID和BSSID与云端存储有相应接入密钥的无线局域网的SSID和BSSID对应进行匹配,确定匹配成功的无线局域网为可接入无线局域网,并可确定相应的接入密钥。
以图3为例,移动终端10以无线局域网30的标识、预先存储的移动终端10的地理位置,与云端20存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,这里假设云端20存储有无线局域网30和无线局域网40的标识、地理位置以及接入密钥,则可确定无线局域网30为可接入无线局域网,同理,可确定无线局域网40为可接入无线局域网。
上述确定可接入无线局域网的方式虽然需要与云端的通信,但是云端存储的是大量移动终端(如安装WiFi管家的移动终端)上传的无线局域网的标识、地理位置以及接入密钥,从而,以覆盖移动终端的无线局域网的标识以及地理位置与云端存储的无线局域网的标识以及地理位置对应匹配时,能够确保命中移动终端所处地理位置覆盖的无线局域网。
在另一个实施例中,兼顾查找移动终端当前所处地理位置覆盖的无线局域网的效率以及命中率,将覆盖移动终端的无线局域网的标识、以及预先存储的移动终端的地理位置,优先与移动终端中存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的可接入无线局域网,如果能够匹配则结束,当匹配失败时,将无线局域网的标识和预先存储的移动终端的地理位置,与云端存储有相应接入密钥的无线局域网 的标识和地理位置进行匹配,确定匹配成功的可接入无线局域网,并将可接入无线局域网的接入密钥、标识以及地理位置存储至移动终端,以更新移动终端本地存储,这样,当移动终端后续再次基于同一无线局域网的标识、以及预先存储的移动终端的地理位置,与移动终端中存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配时,能够提升命中率,从而提升查找可接入无线局域网的效率。
以图3为例,移动终端10以无线局域网30的标识、预先存储的移动终端10的地理位置,与移动终端10存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,这里假设移动终端10未存储有无线局域网30、以及无线局域网40的标识、地理位置以及接入密钥,则无法命中(也就是无法匹配到)可接入无线局域网;后续,移动终端10继续以无线局域网30的标识、预先存储的移动终端10的地理位置,与云端20存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,这里假设云端20存储有无线局域网30和无线局域网40的标识、地理位置以及接入密钥,则可确定无线局域网30为可接入无线局域网,同理,可确定无线局域网40为可接入无线局域网。
移动终端10将无线局域网30、无线局域网40的接入密钥存储至移动终端10本地,后续以无线局域网30的标识、预先存储的移动终端10的地理位置,与移动终端10存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配时,可以直接命中。
可见,在移动终端中存储有覆盖移动终端的无线局域网的标识、地理位置以及接入密钥时,可以直接命中可接入无线局域网,确保命中可接入无线局域网的效率,当未命中时从云端匹配,由于云端的存储的无线局域网的数据全面,因此可以命中可接入无线局域网。
在一个实施例中,对于采用前述任意一种方式所匹配到的可接入无线 局域网,存储各种原因导致可接入无线局域网无法使用,如安全性低、接入密钥频繁更新、信号差等,为了保证接入可接入无线局域网之后数据通信的稳定性,还可以对可接入无线局域网进行筛选,从匹配得到的可接入无线局域网中筛选出符合预设条件的可接入无线局域网,示例性地,预设条件包括:
1)安全系数低于安全系数阈值。
2)接入密钥更新频率超出频率阈值,接入密钥频繁更新必然导致接入后网络连接断开,影响用户使用业务的连续性。
3)信号强度低于信号强度阈值,表明移动终端可能处于无线局域网信号覆盖区域的边缘,或者因遮挡物影响信号传输。
4)无线局域网为私有网络,私有网络一方面存在被恶意抓包的风险,另一方面私有网络的拥有者可能不希望将私有网络开放给任意用户使用。
利用筛选出的可接入无线局域网替换匹配到的可接入无线局域网,从而保证接入可接入无线局域网的数据通信的稳定性。
步骤103,在操作系统层针对可接入无线局域网设置相应的接入密钥。
以移动终端中运行WiFi管家为例,WiFi管家将可接入无线局域网的接入密钥应用到操作系统层,供操作系统层在需要通过无线局域网进行数据通信时,基于接入密钥经由硬件层的网络接口12发起接入。
步骤104,在网络连接界面呈现覆盖移动终端的无线局域网,并呈现针对所述可接入无线局域网的连接标识。
在一个实施例中,在移动终端的网络连接界面呈现覆盖移动终端的各种类型的无线局域网的SSID、是否加密、信号强度等信息。对于可接入无线局域网,还对应呈现一键连接标识,提示用户一旦触发一键连接标识即可接入相应的无线局域网,并且由于已经获取可接入无线局域网的接入密钥并在操作系统层进行了设置,因此不需要用户进行额外的设置操作。
步骤105,检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
在一个实施例中,接续步骤104的示例,当一键连接标识被触发时,利用在操作系统层所设置的可接入无线局域网的接入密钥发起接入,以图3为例,当针对无线局域网30的一键连接标识被触发时,利用无线局域网30的接入密钥向无线局域网30发起接入,接入成功后经由无线局域网30进行数据通信。
如前所述,移动终端中存储(例如,缓存)有部分无线局域网的标识、地理位置以及接入密钥。特别地,移动终端中存储有相应接入密钥的无线局域网与移动终端当前所处的地理位置对应,从而提升移动终端在本地匹配可接入无线局域网的命中率。但是,随着时间的累积,存储的接入密钥对应的无线局域网可能不再覆盖移动终端,并且,接入密钥也存在失效的情况,因此,有必要更新存储的接入密钥。
在一个实施例中,移动终端检测到预先存储的无线局域网的接入密钥的更新条件满足时,更新预先存储的相应无线局域网的接入密钥,例如,删除部分无线局域网的接入密钥以避免在操作系统层设置失效的接入密钥,或者,将部分无线局域网的接入密钥与云端同步,以保持接入密钥的有效性。
结合更新条件的不同示例进行说明。
示例1)更新条件为:无线局域网的接入密钥的更新时间到达。
例如,更新时间可以为针对全部无线局域网同一设置。一旦更新时间到达,即将接入密钥判断为失效,移动终端即将存储的无线局域网的接入密钥与云端同步,避免在操作系统层设置接入密钥后出现无法接入的情况。
再例如,基于无线局域网有针对性设置不同维度的加成,包括:
1.1)权重加成,与无线局域网的稳定性正相关(一般来说,无线局域 网越稳定,则重设接入的信息的可能性越小,更新时间相对可以拉长),与无线局域网的安全性负相关(一般来说,安全性越高,接入密钥更换越频繁,因此更新时间相对需要缩短),或者根据实际需要设置;
1.2)位置加成,可以与无线局域网所处的位置所部署的其他无线局域网的数量负相关,例如,若该位置部署的无线局域网的数量较多,基于用户接入的随机性,更新时间可以相对拉长。
1.3)商家标识加成,示例性地,无线局域网的标识如SSID中因携带不同的商家的标识而具有不同的商家标识加成,例如,大型商铺的无线局域网相对稳定和安全且接入密钥的更新周期更长,因此大型商铺的商家标识加成可以大于小型商铺的商家标识加成。
将上述加成与基准更新时间进行叠加得得到对应无线局域网的接入密钥的更新时间,在更新时间到达时更新相应无线局域网的接入密钥,从而,针对每个无线局域网的特点有针对性的更新接入密钥。
示例2)更新条件为:无线局域网的地理位置与预先存储的移动终端的地理位置的距离超出距离阈值。
表明移动终端已经超出了无线局域网的覆盖范围,没有必要在移动终端存储相应的接入密钥,因此可以删除相应无线局域网的接入密钥,当移动终端再次位于该无线局域网的覆盖范围内时,可以从云端同步接入密钥至移动终端本地存储。
另外,示例1)与示例2)示出的更新条件还可以结合使用,例如,更新条件为:无线局域网的接入密钥的更新时间到达,且,无线局域网的地理位置与预先存储的移动终端的地理位置的距离超出距离阈值。一旦更新时间到达,且移动终端离开无线局域网的覆盖范围,即将无线局域网的接入密钥判断为失效,没有必要在移动终端存储相应的接入密钥,因此可 以删除相应无线局域网的接入密钥,当移动终端再次位于该无线局域网的覆盖范围内时,可以从云端同步接入密钥至移动终端本地存储。
如前,移动终端中预先存储有移动终端的地理位置,预先存储地理位置的优点在于,在需要匹配可接入无线局域网时,不需要重新进行定位移动终端,只需要读取预先存储的地理位置(视为移动终端的最近的地理位置),从而能够保证匹配可接入无线局域网的效率。同时,有必要对移动终端中预先存储的地理位置进行更新,以保证预先存储的地理位置的精确性。
需要指出的是,本申请实施例中移动终端更新预先存储的地理位置是异步于匹配可接入无线局域网的方式进行,一方面,保证了预先存储的地理位置的准确性,另一方面,由于是异步执行,因此在匹配可接入无线局域网时不需要进行定位,提升了匹配可接入无线局域网的效率,避免延迟。
在一个实施例中,更新预先存储的地理位置采用这样的方式:
检测到预先存储的移动终端的地理位置的更新条件满足时,定位移动终端,并利用定位得到的地理位置更新预先存储的移动终端的地理位置。下面对更新条件进行示例性说明。
示例1)检测到移动终端的地理位置的更新间隔时间到达。
以更新间隔时间周期性更新移动终端的地理位置,能够保证地理位置的时效性。
2)检测到移动终端的地理位置的变化超出距离阈值。
例如,移动终端中存储有最近的2(或者更多)个地理位置,通过比较地理位置之间的距离与距离阈值,如果超出距离阈值(大于定位的精度误差)说明移动终端发生移动,从而定位移动终端,这样在移动终端静止时不需要频繁定位,避免影响终端的续航性能。
3)检测到针对移动终端正在使用的无线局域网的特定事件。
例如,特定事件可以为:扫描覆盖移动终端的无线局域网列表;无线 局域网断开等。
一旦检测到扫描覆盖移动终端的无线局域网列表的事件,移动终端接入的无线局域网断开的事件,用户接入无线局域网或重新选择无线局域网进行接入的需求,因此更新预先存储的地理位置可以使后续匹配到的可接入无线局域网覆盖移动终端当前的地理位置。
另外,特定事件还可以为移动终端接入无线局域网验证成功;检测到被移动终端一个应用设置为信任的无线局域网(移动终端中一个应用设置无线局域网为信任是指,取得该与该无线局域网的连接的控制)的心跳。
下面再结合一个示例对前述无线局域网连接进行说明,在下述示例中,假设移动终端为iOS设备,无线局域网使用WiFi协议组网(也称为WiFi网络)。
参见图4-1至图4-3示出的连接无线局域网的可选的操作示意图,以移动终端中运行WiFi管家进行WiFi网络连接为例,用户查看WiFi列表时,操作系统层将WiFi列表回调给WiFi管家,WiFi管家获取WiFi列表中WiFi网络的接入密钥并进行设置,这里,假设WiFi列表中包括WiFi网络1和WiFi网络2,并且WiFi管家获取到WiFi网络1的接入密钥。
在用户选择安全一键连接41时,在WiFi列表界面42呈现WiFi列表,包括WiFi网络的名称,这里的WiFi网络的接入密钥是基于移动终端的地理位置以及WiFi网络的SSID在移动终端的缓存或者云端匹配得到,在基于移动终端的地理位置以及WiFi网络的SSID未匹配得到WiFi网络的接入密钥时,基于WiFi网络的SSID和BSSID进行匹配相应WiFi网络的接入密钥。
WiFi管家在WiFi列表界面42呈现可通过WiFi管家一键连接的提示43,用户触发提示43后WiFi管家在WiFi列表界面42中针对可接入的WiFi网络呈现一键连接标识44,当用户触发针对WiFi网络1所设置的一键连接 标识44后,WiFi管家将触发操作系统层基于预先设置的WiFi网络1的接入密钥发起接入。
结合图5示出的在移动终端中设置无线局域网的接入密钥的一个可选的流程示意图,对图4-1至图4-3示出的获取WiFi网络的接入密钥并进行设置的处理进行说明。
移动终端的操作系统层按照内置的逻辑扫描移动终端当前位置覆盖的WiFi网络,例如,在用户触发移动终端显示WiFi列表界面时扫描WiFi列表。
WiFi管家(App)获得操作系统层扫描到的WiFi列表,基于WiFi列表中WiFi网络的SSID以及移动终端当前的地理位置(等同于WiFi网络的地理位置),在缓存(Cache)中搜索(匹配)WiFi网络1和WiFi网络2的接入密钥。缓存中存储有部分WiFi网络的地理位置、SSID、BSSIDs、更新时间(其中,更新时间可以与有效时间等同,也可以为有效时间到达之前的时间)、有效时间等信息。在基于移动终端的地理位置以及WiFi网络的SSID未匹配得到WiFi网络的接入密钥时,还可以基于WiFi网络的SSID和BSSID进行匹配相应WiFi网络的接入密钥。
如果在缓存中搜索到WiFi网络的接入密钥,且接入密钥未失效,则向操作系统层设置WiFi网络的接入密钥并回应操作系统层已经设置WiFi网络的接入密钥。操作系统层在扫描WiFi列表时会回调给WiFi管家,使得WiFi管家可以设置WiFi网络的密码。
这里,假设在缓存中搜索到WiFi网络1的接入密钥,但没有搜索到WiFi网络2的接入密钥,则基于WiFi网络2的SSID、地理位置,继续向云端拉取WiFi网络2的接入密钥,并在移动终端的缓存存储WiFi网络2的接入密钥、时间、地理位置等信息。
另外,对于WiFi网络1,即使在移动终端缓存中搜索到相应的接入密 钥,如果接入密钥的更新时间或有效时间到达,则仍然会从云端拉取WiFi网络1的接入密钥,并更新移动终端缓存的WiFi网络1的接入密钥、有效时间等信息。
如果操作系统层还未通过回调的方式使得WiFi管家设置过WiFi网络的接入密钥,则WiFi管家可以利用操作系统层的回调设置WiFi网络1的接入密钥;如果操作系统层已经通过回调的方式使得WiFi管家设置过WiFi网络的接入密钥,则WiFi关键需要等待操作系统层下次扫描WiFi列表并回调给WiFi管家时设置接入密钥。
结合图6示出的移动终端连接WiFi网络的一个可选的架构示意图,对WiFi管家连接WiFi网络的处理进行说明。
在图6中,连接WiFi网络由移动终端和云端共同运行的组件实现。
移动终端中运行以下组件:
MQQHotspotHelper组件(可以实施为WiFi管家的一个功能组件),负责注册热点(Hotspot)事件、响应Hotspot的事件,并在扫描列表(ScanList)事件中设置WiFi网络的接入密钥。
WiFi Password Fetcher(可以实施为WiFi管家的一个功能组件),负责从缓存中搜索WiFi列表中WiFi网络的接入密钥,当搜索到WiFi接入密钥时在扫描列表事件中设置WiFi网络的接入密钥;如果在缓存中没有搜索到WiFi列表中WiFi网络的接入密钥,则从云端拉取WiFi网络的接入密钥,例如,从云端拉取WiFi列表中WiFi网络的接入密钥。根据WiFi列表中WiFi网络的地理位置、SSID等进行拉取,拉取接入密钥成功后把WiFi网络的接入密钥进行缓存。
WiFi Password Caching Manager负责管理WiFi接入密钥的缓存,把WiFi网络的相关信息,如SSID、BSSIDs、接入密钥、地理位置、更新时间、有效时间缓存并进行管理。
例如,当缓存的接入密钥的更新时间到达时,通过WiFi Password Fetcher从云端拉取相应WiFi网络的新的接入密钥,并把WiFi网络的新的接入密钥更新至缓存。
再例如,当缓存的接入密钥的有效时间到达时,通过WiFi Password Fetcher从云端拉取相应WiFi网络的新的接入密钥,并把WiFi网络的新的接入密钥更新至缓存。
再例如,当缓存的接入密钥对应的地理位置与移动终端当前的地理位置的距离超出距离阈值,则删除缓存中相应WiFi网络的信息。
云端中运行以下组件:
MQQHotspotHelperSettings(可以实施为WiFi管家后台的一个组件),负责承载整个HotspotHelper的配置项,同时可云端动态配置。
示例性地,在云端可以配置以下类型的参数:
1)WiFi连接成功检查参数,例如超时值、检查间隔。在移动终端发起连接超出超时值之后仍未连接成功则连接失败;在连接成功后基于检查间隔时间检测与WiFi网络的连接是否保持。
2)WiFi一键连设置参数,例如信号强度阀值和每个列表设置可一键连接的WiFi网络的最大数量。信号强度阈值用于控制显示一键连接标识的WiFi网络,当WiFi网络的信号强度低于信号强度阈值,即使具有WiFi网络的接入密钥也不对应显示WiFi的一键连接标识
3)地理位置参数,如更新间隔、更新精度和更新时机等。
更新间隔用于控制缓存的移动终端的地理位置的更新,当更新间隔到达时重新定位移动终端并在缓存中更新移动终端的位置,确保移动终端缓存的地理位置的时效性。
更新精度用于控制触发更新移动终端的地理位置的移动距离,例如缓存中存储移动终端最近的2个地理位置,当基于2个地理位置确定移动终 端的移动距离超出更新精度时,即定位移动终端并更新缓存的移动终端的地理位置。
更新时机用于指示触发更新移动终端的地理位置的特定事件,如以下事件:扫描WiFi列表;WiFi网络连接成功;WiFi网络验证成功;已信任的WiFi网络的心跳;WiFi网络断开等。
4)WiF接入密钥缓存参数,如基础时间、权重加成、位置加成和商家标识加成、当前地理位置与缓存WiFi的地理位置之间的距离阈值,其中商家标示的基础信息包括门店名称、品类、电话和地址等。
WiFi接入密钥缓存参数用于指示更新缓存的WiFi网络接入密钥的时机,如更新时间到达时更新缓存中的接入密钥,移动终端当前的地理位置(从缓存中读取)与WiFi网络的地理位置的距离超出距离阈值时,删除缓存中相应WiFi网络的信息,如SSID、接入密钥以及地理位置等。
5)WiFi信任模式一键连接能力可以设置某个WiFi网络的信任,有且只有一个应用可以控制与某个WiFi网络的连接。应用通过设置信任取得与某个WiFi网络的连接的控制权之后,当移动终端接入该WiFi网络时,应用每隔一定时间会收到操作系统层的回调,应用被激活,从而可以控制与WiFi网络的连接状态。
当应用设置对某个WiFi网络的信任后,就具有了控制与该WiFi网络之前的连接的能力,例如:
与设置信任的WiFi网络的连接成功后,操作系统层每隔5分钟会回调这个应用,应用在后台具有执行代码的能力,例如检查WiFi网络的安全性、获取WiFi网络的地理位置(提高连接成功率)、进行其它需要后台能力的业务(例如统计点即时上报、流量监控、电量检查)。
在不需要人工操作的情况断开与设置信任的WiFi网络的连接。例如,检查到某个WiFi网络有安全问题,可以提醒用户,并主动帮用户断开与该 WiFi网络的连接。
与WiFi网络连接成功后,可以显示当前应用针对该WiFi网络所添加的标识。当多个具有一键连接的应用同时对一个WiFi网络打上一键连接的标识,在未与WiFi网络连接时,操作系统层会在WiFi列表中对应WiFi网络的显示多个应用的标识;但在与WiFi网络连接成功后,操作系统层只会显示唯一一个获得信任的应用的标识。这个利于品牌露出。
6)打标识的字符串控制
用于控制连接标识中的字符的内容。
7)检查云端配置更新的参数,用于支持对前述的各种参数更新。
对前述移动终端的逻辑结构进行示例性说明,参见图7示出的移动终端的一个可选的逻辑结构示意图,需要指出的是,图7中的逻辑功能单元可以进行进一步的拆分或者合并,因此移动终端的逻辑功能结构不限于图7示出的形式;在图7中,移动终端包括:检测单元110、匹配单元120、设置单元130、呈现单元140、接入单元150、第一更新单元160和第二更新单元170。
下面对各单元进行说明。
检测单元110,用于检测覆盖移动终端的无线局域网。
例如,检测单元110检测移动终端所处环境中无线局域网的广播信号,解析广播信号得到相应无线局域网的标识。
又例如,检测单元110中预先存储有移动终端的地理位置,并在满足地理位置的更新条件时进行更新,以确保存储的地理位置的时效性;并且,移动终端中还存储有具有接入密钥的无线局域网(如,前述的隐藏的无线局域网)的标识以及地理位置。从而,检测单元110将预先存储(如在缓存中存储)的移动终端的地理位置,与移动终端中存储有相应接入密钥的无线局域网的地理位置匹配,如果匹配成功,则确定移动终端处于相应无 线局域网的覆盖范围。
匹配单元120,用于将无线局域网的标识、以及预先存储的移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定覆盖移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
在一个实施例中,匹配单元120,还用于将无线局域网的标识、以及预先存储的移动终端的地理位置,与移动终端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的可接入无线局域网;
通过移动终端预先存储具有相应接入密钥的无线局域网的地理位置以及标识,在移动终端处于任一无线局域网的覆盖范围时,都可以高效查找到在当前地理位置的可接入无线网络以及相应的接入密钥。
在一个实施例中,匹配单元120,还用于匹配失败时,将无线局域网的标识和预先存储的移动终端的地理位置,与云端存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定匹配成功的可接入无线局域网,并将可接入无线局域网的接入密钥存储至移动终端。
在移动终端中存储有覆盖移动终端的无线局域网的标识、地理位置以及接入密钥时,可以直接命中可接入无线局域网,确保命中可接入无线局域网的效率,当未命中时从云端匹配,由于云端的存储的无线局域网的数据全面,因此可以命中可接入无线局域网。
在一个实施例中,匹配单元120,还用于将无线局域网的标识和预先存储的移动终端的地理位置,与云端存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定匹配成功的可接入无线局域网。
上述确定可接入无线局域网的方式虽然需要与云端的通信,但是云端存储的是大量移动终端(如安装WiFi管家的移动终端)上传的无线局域网 的标识、地理位置以及接入密钥,从而,以覆盖移动终端的无线局域网的标识以及地理位置与云端存储的无线局域网的标识以及地理位置对应匹配时,能够确保命中移动终端所处地理位置覆盖的无线局域网。
在一个实施例中,移动终端还包括:第一更新单元160,用于从可接入无线局域网中筛选出符合预设条件的可接入无线局域网,利用筛选出的可接入无线局域网更新匹配成功的可接入无线局域网;
其中,预设条件包括以下之一:
安全系数低于安全系数阈值;
接入密钥更新频率超出频率阈值;
信号强度低于信号强度阈值;
无线局域网为私有网络。
设置单元130,用于在操作系统层针对可接入无线局域网设置相应的接入密钥;
呈现单元140,用于在网络连接界面呈现覆盖移动终端的无线局域网,并呈现针对所述可接入无线局域网的连接标识;
接入单元150,用于检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
在一个实施例中,移动终端还包括:第二更新单元170,用于检测到预先存储的移动终端的地理位置的更新条件满足时,定位移动终端并利用定位得到的地理位置更新预先存储的移动终端的地理位置;
其中,检测到移动终端的地理位置的更新间隔时间到达;
检测到移动终端的地理位置的变化超出距离阈值;
移动终端中存储有相应接入密钥的无线局域网与移动终端当前所处的地理位置对应,从而提升移动终端在本地匹配可接入无线局域网的命中率。
在一个实施例中,移动终端还包括:第三更新单元180,用于检测到预先存储的无线局域网的接入密钥的更新条件满足时,更新预先存储的相应无线局域网的接入密钥;
其中,更新条件包括以下至少之一:
无线局域网的接入密钥的更新时间到达;
无线局域网的地理位置与预先存储的移动终端的地理位置的距离超出距离阈值;其中,更新时间可以采用这样的方式确定:将无线局域网的至少一个维度的加成,与基准更新时间进行叠加得到确定无线局域网的接入密钥的更新时间;其中,加成包括:权重加成、位置加成和商家标识加成。
移动终端检测到预先存储的无线局域网的接入密钥的更新条件满足时,更新预先存储的相应无线局域网的接入密钥,可以保持移动终端存储的接入密钥的有效性。
综上所述,本申请实施例具有以下有益效果:
1、通过一键连接标识支持用户一键连接无线局域网,不需要实施额外的操作,提升接入无线局域网的效率。
2、在覆盖移动终端的无线局域网发生切换时,只需要通过一键连接标识连接新的无线局域网即可接入,实现了接入的无缝切换。
3、无线局域网的接入密钥可通过云端下发,并且通过云端配置的各种参数可对移动终端的接入密钥、地理位置的更新进行控制,根据移动终端的地理位置动态更新移动终端中存储的接入密钥。
4、移动终端在本地采用缓存机制存储无线局域网的接入密钥,避免频繁从云端拉取接入密钥,从而减少网络流量,加快了接入无线局域网的效率,提高接入的成功率。
本领域的技术人员可以理解:实现上述方法实施例的全部或部分步骤可以通过应用指令相关的硬件来完成,前述的应用可以存储于一计算机可读取存储介质中,该应用在执行时,执行包括上述方法实施例的步骤;而前述的存储介质包括:移动存储移动终端、随机存取存储器(RAM,Random Access Memory)、只读存储器(ROM,Read-Only Memory)、磁碟或者光盘等各种可以存储应用代码的介质。
具体来说,本申请移动终端的一种硬件实施方式,如图8所示,包括处理器802、存储介质804以及至少一个外部通信接口801;所述处理器802、存储介质804以及外部通信接口801均通过总线803连接。所述处理器802可为微处理器、中央处理器、数字信号处理器或可编程逻辑阵列等具有处理功能的电子元器件。所述存储介质804中存储有计算机可执行代码。
所述存储介质804包括或存储有至少一组指令,当执行所述指令时,引起所述处理器802执行本申请前述无线局域网连接方法。其中,包括但不限于执行以下方法:
检测覆盖移动终端的无线局域网;
将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并针对所述可接入无线局域网呈现连接标识;
响应于针对所述连接标识的操作,基于设置的可接入无线局域网的接入密钥进行接入。
需要指出的是,本申请存储介质还能够执行前述各个方法流程中的处 理,只是这里不再进行赘述。
或者,本申请上述集成的单元如果以软件功能模块的形式实现并作为独立的产品销售或使用时,也可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对相关技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机移动终端(可以是个人计算机、服务器、或者网络移动终端等)执行本申请各个实施例所述方法的全部或部分。而前述的存储介质包括:移动存储移动终端、RAM、ROM、磁碟或者光盘等各种可以存储应用代码的介质。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到变化或替换,都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以所述权利要求的保护范围为准。

Claims (13)

  1. 一种无线局域网连接方法,所述方法包括:
    检测覆盖移动终端的无线局域网;
    将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
    在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
    在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
    检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
  2. 根据权利要求1所述的方法,其中,所述将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网,包括:
    将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置,与所述移动终端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的所述可接入无线局域网。
  3. 根据权利要求2所述的方法,其中,所述方法还包括:
    匹配失败时,将所述无线局域网的标识和预先存储的所述移动终端的地理位置,与云端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的所述可接入无线局域网,并将所述可接入无线局域网的接入密钥存储至所述移动终端。
  4. 根据权利要求1所述的方法,其中,所述将无线局域网的标识、以 及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网,包括:
    将所述无线局域网的标识和预先存储的所述移动终端的地理位置,与云端存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定匹配成功的所述可接入无线局域网。
  5. 根据权利要求1-4任一项所述的方法,其中,所述方法还包括:
    从所述可接入无线局域网中筛选出符合预设条件的可接入无线局域网,利用筛选出的可接入无线局域网更新匹配成功的所述可接入无线局域网;
    其中,所述预设条件包括以下至少之一:
    安全系数低于安全系数阈值;
    接入密钥更新频率超出频率阈值;
    信号强度低于信号强度阈值;
    所述无线局域网为私有网络。
  6. 根据权利要求1所述的方法,其中,所述方法还包括:
    检测到所述预先存储的移动终端的地理位置的更新条件满足时,定位所述移动终端并利用定位得到的地理位置更新预先存储的所述移动终端的地理位置;
    其中,所述更新条件包括以下至少之一:
    检测到所述移动终端的地理位置的更新间隔时间到达;
    检测到所述移动终端的地理位置的变化超出距离阈值;
    检测到针对所述移动终端正在使用的无线局域网的特定事件。
  7. 根据权利要求1所述的方法,其中,所述方法还包括:
    检测到预先存储的无线局域网的接入密钥的更新条件满足时,更新所 述预先存储的相应无线局域网的接入密钥;
    其中,所述更新条件包括以下至少之一:
    所述无线局域网的接入密钥的更新时间到达;
    所述无线局域网的地理位置与预先存储的所述移动终端的地理位置的距离超出距离阈值。
  8. 根据权利要求7所述的方法,其中,所述方法还包括:
    基于所述无线局域网的至少一个维度的加成,与基准更新时间进行叠加得到所述无线局域网的接入密钥的更新时间;
    其中,所述加成包括:权重加成、位置加成和商家标识加成。
  9. 一种移动终端,所述移动终端包括:
    检测单元,检测覆盖移动终端的无线局域网;
    匹配单元,将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
    设置单元,在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
    呈现单元,在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
    接入单元,检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
  10. 根据权利要求9所述的移动终端,其中,
    所述匹配单元,将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置,与所述移动终端存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定匹配成功的所述可接入无线局域网。
  11. 根据权利要求10所述的移动终端,其中,
    所述匹配单元,匹配失败时,将所述无线局域网的标识和预先存储的所述移动终端的地理位置,与云端存储有相应接入密钥的无线局域网的标识和地理位置进行匹配,确定匹配成功的所述可接入无线局域网,并将所述可接入无线局域网的接入密钥存储至所述移动终端。
  12. 一种移动终端,包括:
    存储器,配置为存储可执行程序;
    处理器,配置为通过执行所述存储器中存储的可执行程序时实现以下操作:
    检测覆盖移动终端的无线局域网;
    将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
    在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
    检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
  13. 一种存储介质,该存储介质包括一组指令,当执行所述指令时,引起至少一个处理器执行包括以下的操作:
    检测覆盖移动终端的无线局域网;
    将所述无线局域网的标识、以及预先存储的所述移动终端的地理位置、与存储有相应接入密钥的无线局域网的标识和地理位置对应进行匹配,确定覆盖所述移动终端的无线局域网中具有相应接入密钥的可接入无线局域网;
    在操作系统层针对所述可接入无线局域网设置相应的接入密钥;
    在网络连接界面呈现覆盖所述移动终端的无线局域网的列表,并呈现针对所述可接入无线局域网的连接标识;
    检测到针对目标可接入无线局域网的连接标识的操作,基于所述目标可接入无线局域网的接入密钥进行接入。
PCT/CN2017/094878 2016-07-29 2017-07-28 无线局域网连接方法、移动终端及存储介质 WO2018019287A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/013,785 US10356707B2 (en) 2016-07-29 2018-06-20 Wireless local area network connection method, mobile terminal, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610616199.XA CN107071772B (zh) 2016-07-29 2016-07-29 无线局域网连接方法及移动终端
CN201610616199.X 2016-07-29

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/013,785 Continuation-In-Part US10356707B2 (en) 2016-07-29 2018-06-20 Wireless local area network connection method, mobile terminal, and storage medium

Publications (1)

Publication Number Publication Date
WO2018019287A1 true WO2018019287A1 (zh) 2018-02-01

Family

ID=59616899

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/094878 WO2018019287A1 (zh) 2016-07-29 2017-07-28 无线局域网连接方法、移动终端及存储介质

Country Status (3)

Country Link
US (1) US10356707B2 (zh)
CN (1) CN107071772B (zh)
WO (1) WO2018019287A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109756948B (zh) * 2016-12-28 2021-11-23 上海掌门科技有限公司 通过用户设备中的应用连接无线接入点的方法与设备
CN107968880B (zh) * 2017-11-13 2021-02-09 Oppo广东移动通信有限公司 信息管理方法、移动终端及计算机可读存储介质
CN108566440B (zh) * 2018-06-26 2021-06-15 上海尚往网络科技有限公司 一种网络连接方法、设备及存储介质
CN110309639A (zh) * 2019-06-28 2019-10-08 温州科技职业学院 一种基于图书情报管理的保密系统
CN110474911B (zh) * 2019-08-14 2023-05-23 深圳前海微众银行股份有限公司 终端可信性识别方法、装置、设备与计算机可读存储介质
CN112367606A (zh) * 2019-12-12 2021-02-12 北京沃东天骏信息技术有限公司 Wi-Fi连接的方法、装置、电子设备和可读介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103024929A (zh) * 2012-12-20 2013-04-03 惠州Tcl移动通信有限公司 一种基于移动终端连接无线网络的方法及移动终端
US20140073289A1 (en) * 2012-09-11 2014-03-13 Wavemax Corp. 3g/4g mobile data offload via roaming in a network of shared protected/locked wi-fi access points
CN105472703A (zh) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 无线网连接方法及装置
CN106488529A (zh) * 2015-08-24 2017-03-08 中兴通讯股份有限公司 一种接入wifi网络的方法及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9288751B2 (en) * 2007-08-29 2016-03-15 Qualcomm Incorporated Use of position data to select wireless access point
US20090109941A1 (en) * 2007-10-31 2009-04-30 Connect Spot Ltd. Wireless access systems
CN104717721B (zh) * 2015-02-27 2019-03-05 上海连尚网络科技有限公司 WiFi接入系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140073289A1 (en) * 2012-09-11 2014-03-13 Wavemax Corp. 3g/4g mobile data offload via roaming in a network of shared protected/locked wi-fi access points
CN103024929A (zh) * 2012-12-20 2013-04-03 惠州Tcl移动通信有限公司 一种基于移动终端连接无线网络的方法及移动终端
CN105472703A (zh) * 2014-09-11 2016-04-06 中兴通讯股份有限公司 无线网连接方法及装置
CN106488529A (zh) * 2015-08-24 2017-03-08 中兴通讯股份有限公司 一种接入wifi网络的方法及装置

Also Published As

Publication number Publication date
US10356707B2 (en) 2019-07-16
CN107071772A (zh) 2017-08-18
US20180302852A1 (en) 2018-10-18
CN107071772B (zh) 2020-07-07

Similar Documents

Publication Publication Date Title
WO2018019287A1 (zh) 无线局域网连接方法、移动终端及存储介质
US10148672B2 (en) Detection of rogue access point
JP6161076B2 (ja) 無線ネットワーク接続のための拡張可能なフレームワーク
US10051585B2 (en) Methods, apparatuses and computer program products for providing temporal information
CN112106439A (zh) 用于无线接入点的智能带选择
CN105682015A (zh) 一种用于建立无线连接的方法与设备
US9571503B2 (en) Method for connecting to network and electronic device thereof
US20160242033A1 (en) Communication service using method and electronic device supporting the same
CN103475996A (zh) 网络连接方法、网络共享方法及装置
US9386400B2 (en) Automatic implementation of preferences based on detection of a mobile device
US20220312180A1 (en) Method for discovering bluetooth device and bluetooth device
US9774990B2 (en) Proximity-based verification of programming instructions
TWI737227B (zh) 事件處理方法、設備以及電腦可讀儲存媒體
US20150065126A1 (en) Method for connecting to network and electronic device thereof
US20160219520A1 (en) Mobile terminal apparatus, communications control method, and computer product
US11974351B2 (en) Device for wireless communication with other devices
US20190045417A1 (en) Connecting to a wireless network based on a device mobility state
KR102317051B1 (ko) 채널 리스트를 이용하여 무선 통신을 수행하는 방법 및 전자 장치
US20210258730A1 (en) Information pushing method and terminal device
CN107529171B (zh) 检测终端接入伪基站的方法及相关产品
WO2022262369A1 (zh) WiFi接入方法、终端设备及存储介质
KR20180064252A (ko) 무선 통신 시스템에서 통신 품질을 측정하는 방법 및 이를 위한 장치
KR101714528B1 (ko) 무선 통신 서비스를 제공하는 차량 및 그 제어방법
CN112868247B (zh) 小区连接处理方法、装置、移动终端及存储介质
CN115706919A (zh) 一种小区搜索方法、终端设备、网络服务器及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17833590

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17833590

Country of ref document: EP

Kind code of ref document: A1