WO2018040524A1 - 分享热点的方法及设备 - Google Patents

分享热点的方法及设备 Download PDF

Info

Publication number
WO2018040524A1
WO2018040524A1 PCT/CN2017/075225 CN2017075225W WO2018040524A1 WO 2018040524 A1 WO2018040524 A1 WO 2018040524A1 CN 2017075225 W CN2017075225 W CN 2017075225W WO 2018040524 A1 WO2018040524 A1 WO 2018040524A1
Authority
WO
WIPO (PCT)
Prior art keywords
hotspot
connection
identity authentication
connection information
hotspots
Prior art date
Application number
PCT/CN2017/075225
Other languages
English (en)
French (fr)
Inventor
杨波
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018040524A1 publication Critical patent/WO2018040524A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present disclosure relates to the field of mobile communications, for example, to a method and apparatus for sharing hotspots.
  • a network sharing technology is that when a mobile network of a hotspot device is available, the hotspot device can establish a mobile hotspot, set a Service Set Identifier (SSID), an encryption method, and a password to notify the user of the hotspot information. The user searches for the hotspot and enters the correct password to successfully connect to the hotspot.
  • SSID Service Set Identifier
  • the hotspot sharing method requires the participation of the user, and the operation is too cumbersome for the user, and the name and password of the hot spot are to be notified to the user, and there are cases such as inconsistency and leakage.
  • the present disclosure provides a method and a device for sharing hotspots, which can avoid the cumbersome operation and low security in the hotspot sharing mode.
  • a first aspect of the present disclosure provides a method for sharing a hotspot, which is applied to a first device that shares a hotspot, including:
  • a second aspect of the present disclosure provides a method for sharing a hotspot, which is applied to a second device that uses a hotspot, including:
  • the first device requesting to share the hotspot authenticates the second device
  • a third aspect of the present disclosure provides a first device for sharing a hotspot, including:
  • a first authentication module configured to perform identity authentication on a second device that requests to use the hot spot, and send the hotspot connection information to the second device when the identity authentication is passed;
  • the first network module is configured to start a hotspot mode and perform hotspot sharing after the first authentication module sends the hotspot connection information.
  • a second device for using a hotspot including:
  • a second authentication module configured to perform the identity authentication on the second device by the first device that requests the shared hotspot, and obtain the hotspot connection information sent by the first device of the shared hotspot after the identity authentication is passed;
  • the second network module is configured to scan surrounding hotspots and perform hotspot connection based on the hotspot connection information.
  • the present disclosure also provides a non-transitory computer readable storage medium storing computer executable instructions arranged to perform the above method.
  • the present disclosure also provides a first device for sharing hotspots, the first device comprising:
  • At least one processor At least one processor
  • the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to execute execution by a first device applied to the shared hotspot Ways to share hotspots.
  • the present disclosure also provides a second device using a hotspot, the second device comprising:
  • At least one processor At least one processor
  • the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor to cause the at least one processor to perform execution on a second device applied to the hotspot using Ways to share hotspots.
  • the hotspot sharing operation and the use of the hotspot operation are both behind the device.
  • the completion of the station eliminates the need for user participation, simplifies the operation of the user when sharing the hotspot and the operation of the user when using the hotspot, and can quickly and safely share and use the hotspot, thereby avoiding the cumbersome operation and low security of the hotspot sharing mode in the related technology. .
  • FIG. 1 is a flowchart of a method for sharing a hotspot according to a first embodiment of the present disclosure
  • FIG. 2 is a flowchart of a method for sharing hotspots according to a second embodiment of the present disclosure
  • FIG. 3 is a flowchart of an implementation of setting a hotspot in a third embodiment of the present disclosure
  • FIG. 5 is a flowchart of an implementation of negotiating full configuration information in a third embodiment of the present disclosure
  • FIG. 6 is a flowchart of an implementation of turning on and connecting a hotspot in a third embodiment of the present disclosure
  • FIG. 7 is a flowchart of a method for quickly sharing hotspots according to a third embodiment of the present disclosure.
  • FIG. 8 is a structural block diagram of a first device for sharing hotspots according to a fourth embodiment of the present disclosure.
  • FIG. 9 is a structural block diagram of a second device using a hotspot according to a fifth embodiment of the present disclosure.
  • FIG. 10 is a schematic structural diagram of hardware of a first device for sharing hotspots according to an embodiment of the present disclosure
  • FIG. 11 is a schematic structural diagram of hardware of a second device using a hotspot according to an embodiment of the present disclosure.
  • the method of the related hotspot sharing method is too cumbersome.
  • the embodiment of the present disclosure provides a method and a device for sharing a hot spot, and the method and the device are simplified.
  • the user's operation, for the user can click the one-click share hotspot button to complete all the work in the background, and the user using the hotspot can quickly and securely connect to the shared hotspot.
  • a method for sharing a hotspot is provided, which is applied to a first device that shares a hotspot.
  • the preset one-click sharing control can be triggered.
  • the first device sharing the hotspot performs the steps shown in FIG.
  • step 110 hotspot connection information is configured.
  • the configured hotspot connection information may include: a Service Set Identifier (SSID) of the hotspot, an encryption method, and a randomly generated password for connecting the hotspot.
  • SSID Service Set Identifier
  • step 120 the second device that requests the hotspot is used for identity authentication, and when the authentication is passed, the hotspot connection information is sent to the second device.
  • performing identity authentication on the second device requesting the hotspot may include:
  • the set time window is opened, and if only a peer-to-peer (P2P) connection request sent by the second device named according to the set rule is received, a P2P connection is established with the second device. And, when the connection is successful, determining that the identity authentication of the second device is a pass, recording the MAC address of the second device, and if the connection is unsuccessful, determining that the identity authentication of the second device is not passed.
  • P2P peer-to-peer
  • This embodiment considers that the P2P technology that has been introduced by the Wireless Fidelity (Wi-Fi) Alliance supports multiple Wi-Fi devices to be connected to each other without an Access Point (AP). Therefore, in this embodiment, the device that can successfully establish a P2P connection can be used as a basis for whether the identity authentication is passed. And in order to prevent the shared hotspot from being used by other users, the concept of a time window is proposed.
  • the time window can be a time period in which only one user requests to establish a P2P connection, and can respond, if the connection is unsuccessful, the determination is made.
  • the identity authentication of the second device is not passed. Among them, the time window can be flexibly set according to requirements, such as 10s seconds.
  • a method for performing identity authentication on a second device that requests to use the hotspot is provided, and the manner may include:
  • the principle is the same as that of the previous embodiment.
  • the difference is that multiple naming modes are defined in the set rule.
  • the rule options of different naming modes are provided for the user to select, and
  • the first device is named according to the naming rules selected by the user. If the P2P connection request sent by the second device is received, the second device with the same naming manner as the first device is selected for connection, and the same as the first device is used. First The user of the second device is a legitimate user.
  • the sending, by the second device that is configured by the identity authentication, the configured connection information includes: establishing, by using, based on the recorded media access control (MAC) address of the second device
  • the P2P connection sends a data packet carrying the hotspot connection information to the second device.
  • MAC media access control
  • step 130 the hotspot mode is activated and hotspot sharing is performed.
  • the STA (Station) device can connect to the hotspot according to the connection information of the hotspot to share the hotspot.
  • the STA device itself does not accept wireless access, but the STA device can connect to the AP.
  • a method of sharing a hotspot is provided for use in a second device that uses a hotspot.
  • the preset one-click control of the shared hotspot in the second device may be triggered, and when the control is triggered, the steps shown in FIG. 2 are performed.
  • step 210 the first device requesting to share the hotspot performs identity authentication on the second device.
  • the requesting the first device to perform identity authentication on the second device may include:
  • step 220 after the identity authentication is passed, the hotspot connection information sent by the first device that shares the hotspot is obtained.
  • the data packet carrying the hotspot connection information sent by the first device to the second device may be received, and the data packet is parsed to obtain hotspot connection information.
  • step 230 surrounding hotspots are scanned, and a hotspot connection is made based on the hotspot connection information.
  • the scanning of the hotspots from the surrounding hotspots to the hotspot connection is completed in the device without user participation.
  • the surrounding hotspots are scanned, and the SSID and the encryption mode in the hotspot connection information are retrieved and scanned.
  • the target hotspot matching the SSID and the encryption method is determined in the hotspot, and according to the tune
  • the password information in the hotspot connection information is taken, and is connected to the target hotspot.
  • the method described in this embodiment designs a set of processes to simplify the operation of the user.
  • the user can click the one-click sharing hotspot key to complete all the work in the background, and the user who uses the hotspot can quickly and securely connect to the sharing.
  • the hotspot avoids the problem that the mobile smart terminal sharing hotspots in the related technology is too cumbersome and the hotspot name and password should be notified to the user, and there are problems such as inconsistency and compromise.
  • a method for sharing a hotspot may include: setting a hotspot, confirming the use of a hotspot identity, negotiating full configuration information, and turning on and connecting a hotspot.
  • the background can perform the above steps in sequence, which simplifies the cumbersome steps of the user in the process of connecting the hotspot, and does not have to worry about the hot password being leaked, the whole process is convenient to operate, the password is secure, and the connection is fast.
  • the AP device represents the first device that shares the hotspot
  • the STA device represents the second device that uses the hotspot.
  • setting the hotspot process may include the following steps.
  • step 310 after the hotspot participant clicks the one-click share hotspot button, the AP device sets the Wi-Fi chip working mode to the hotspot mode.
  • step 320 the AP device configures the name (SSID) of the shared hotspot.
  • the AP device configures the encryption mode of the shared hotspot as WPA2PSK, and randomly generates a password.
  • step 340 the AP device backs up the SSID, encryption mode, and password of the shared hotspot.
  • the Wi-Fi chip is set to work in the Hotspot mode by the AP device in the background, and then the name of the shared hotspot (the maximum length can be 32 characters) and the encryption mode, for example, WPA2 PSK is selected as the encryption mode, and You can configure a password of at least 8 digits mixed with numbers and uppercase and lowercase letters to back up the SSID, encryption method and password of the shared hotspot.
  • the AP device switches its Wi-Fi chip working mode to the P2P mode; the STA device that uses the hotspot shared by the AP device triggers the control of the shared hotspot after the user triggers a preset key in the STA device.
  • the Wi-Fi chip working mode of the STA device is also switched to the P2P mode;
  • the device name (Device Name) is set according to the set rule, for example, the set device name is in the format of “XXX_***”.
  • step 430 if the STA device finds an AP device with a naming rule of "XXX_***", it initiates a P2P connection request to the AP device.
  • step 440 the AP device sets a time window, and if the P2P connection request of the STA device having only one "XXX_***" is received in the time window, the connection request is responded; if the connection is unsuccessful, the determination is made. The identity of the user using the hotspot is not passed.
  • step 450 the P2P connection is successful, indicating that the identity authentication using the hotspot user has passed.
  • the method implementation uses the P2P technical specification to verify the identity of the hotspot user.
  • Both the AP device and the STA device can work in the P2P mode, and the device name can be named as a certain rule, such as: XXX_***, if the STA device A P2P device in the form of the rule is initiated to initiate a P2P connection request.
  • the P2P connection is successful only if the P2P request of the P2P device of the rule type is received by the AP device in a short interval. Indicates that the identity authentication of the user using the hotspot is passed, and the AP device records the MAC address of the STA device.
  • step 510 the AP device sends a frame of hotspot information (Hotspot Info) data packet to the STA device.
  • Hotspot Info a frame of hotspot information
  • step 520 the STA device parses the Hotspot Info packet.
  • step 530 the STA device responds to a frame of Hotspot Response data packets to the AP device.
  • step 540 the AP device sends a frame hotspot success (Hotspot Success) packet to the STA device.
  • Hotspot Success a frame hotspot success
  • the sent Hotspot Info data packet carries the previously stored hotspot configuration information (SSID, encryption mode, and password), and the MAC address of the previously confirmed STA device is also added to the packet header, that is, the designated The frame data packet will be directed to the identified STA device.
  • the STA device parses the information element (Information Element, IE) information in the Hotspot Info data packet, extracts the SSID and password of the AP device, and responds to one frame.
  • the Hotspot Response packet is sent to the AP device to indicate that the STA device has successfully extracted the SSID and password of the AP device.
  • the AP device sends a frame of Hotspot Success data packet to the STA device, indicating that the hotspot configuration information of the AP device informs the STA device that the action is successfully completed.
  • the hotspot is enabled and connected, that is, how the AP device turns on the hotspot and how the STA device connects to the hotspot.
  • the process is shown in Figure 6.
  • step 610 the Wi-Fi chip operating mode of the AP device is switched to the Hotspot mode.
  • step 620 the AP device turns on the sharing hotspot.
  • step 630 the Wi-Fi chip operating mode of the STA device is switched to the STA mode.
  • step 640 the STA device scans for surrounding hotspots.
  • step 650 the STA device selects a hotspot that is consistent with the target SSID and encryption mode, and inputs a password to connect.
  • the 610 of the embodiment opens the hotspot of the shared AP device, and the hotspot information is set in the previous step.
  • the STA device scans the surrounding hotspots, and after searching for the hotspots that are consistent with the SSID and the encryption mode in the Hotspot Info, the password is input. This is the same as the hotspot connection process in the related technology.
  • the four-way handshake protocol process is also executed, and the process ends the sharing of the hotspot connection successfully.
  • FIG. 7 is a schematic flowchart of a method for sharing hotspots according to the embodiment, which can be more clearly seen from the flow diagram. Understand the implementation process of the above four parts in time.
  • the first device includes: a configuration module 810, a first authentication module 820, and a first network module 830.
  • the configuration module 810 is configured to configure hotspot connection information.
  • the first authentication module 820 is configured to perform identity authentication on the second device that requests to use the hotspot, and send the hotspot connection information to the second device when the identity authentication is passed.
  • the first network module 830 is configured to start the hotspot mode and perform hotspot sharing after the first authentication module 820 sends the hotspot connection information.
  • the configuration module 810 can be configured to configure the SSID and the encryption mode of the hotspot. And randomly generate a password to connect to this hotspot.
  • the first authentication module 820 includes: a first naming unit 821 and a first identity authentication unit 822.
  • the first naming unit 821 is configured to set the device name of the first device according to a set rule.
  • the first identity authentication unit 822 is configured to open a set time window, and if only a P2P connection request sent by the second device named according to the set rule is received, the second device is established with the second device.
  • the P2P is connected, and when the connection is successful, it is determined that the identity authentication of the second device is passed, and the MAC address of the second device is recorded. If the connection is unsuccessful, it is determined that the identity authentication of the second device is not passed.
  • the first authentication module 820 further includes: an information sending unit 823.
  • the information transmitting unit 823 is configured to send, to the second device, a data packet carrying the hotspot connection information based on the recorded MAC address of the second device.
  • a second device that uses a hotspot includes: a second authentication module 910 and a second network module 920.
  • the second authentication module 910 is configured to request the first device that shares the hotspot to perform identity authentication on the second device, and obtain the hotspot connection information sent by the first device that shares the hotspot after the identity authentication is passed.
  • the second network module 920 is configured to scan surrounding hotspots and perform hotspot connection based on the hotspot connection information.
  • the second authentication module 910 may include: a second naming unit 911 and a second identity authentication unit 912.
  • the second naming unit 911 is arranged to set the device name of the second device according to a set rule.
  • the second identity authentication unit 912 is configured to: when the P2P device named according to the set rule is found, determine that the P2P device is the first device, initiate a P2P connection request to the first device, and connect in a P2P connection. Upon success, it is determined that the identity authentication of the second device has passed.
  • the second network module 920 may be configured to scan the surrounding hotspot, retrieve the SSID and the encryption mode in the hotspot connection information, and determine the scanned hotspot according to the SSID and the encryption mode.
  • the first device and the second device in this embodiment simplify the operation of the user, and the user can click the one-click sharing hotspot button to complete all the work in the background of the device, and the user using the hotspot can quickly and securely connect.
  • the steps of sharing the hotspots in the mobile smart terminal in the related technology are avoided, and the names and passwords of the hotspots are notified to the user, and there are problems such as inconsistency and leakage.
  • the present disclosure also provides a non-transitory computer readable storage medium storing computer executable instructions arranged to perform the method of any of the above embodiments.
  • the present disclosure also provides a hardware structure diagram of a first device.
  • the first device includes:
  • At least one processor 100 is exemplified by one processor 100 in FIG. 10; and a memory 101 may further include a communication interface 102 and a bus 103.
  • the processor 100, the communication interface 102, and the memory 101 can complete communication with each other through the bus 103.
  • Communication interface 102 can be configured for information transfer.
  • the processor 100 can call logic instructions in the memory 101 to perform the method performed by the first device in the above embodiments.
  • logic instructions in the memory 101 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
  • the memory 101 is a computer readable storage medium, and can be used to store a software program, a computer executable program, a program instruction or a module corresponding to a method executed by the first device in the embodiment of the present disclosure.
  • the processor 100 executes a function application and data processing by executing a software program, an instruction or a module stored in the memory 101, that is, a method performed by the first device in the above method embodiment.
  • the memory 101 may include a storage program area and an storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to usage of the first device, and the like. Further, the memory 101 may include a high speed random access memory, and may also include a nonvolatile memory.
  • the present disclosure also provides a hardware structure diagram of a second device.
  • the second device includes:
  • At least one processor 11, one processor 11 is taken as an example in FIG. 11; and a memory 12, which may further include a communication interface 13 and a bus 14.
  • the processor 11, the communication interface 13, and the memory 12 can complete communication with each other through the bus 14.
  • the communication interface 13 can be configured for information transmission.
  • the processor 11 can call the logic instructions in the memory 12 to perform the method performed by the second device in the above embodiment.
  • logic instructions in the memory 12 described above may be implemented in the form of a software functional unit and sold or used as a stand-alone product, and may be stored in a computer readable storage medium.
  • the memory 12 is a computer readable storage medium, and can be used to store a software program, a computer executable program, a program instruction or a module corresponding to a method executed by a second device in the embodiment of the present disclosure.
  • the processor 11 executes the function application and the data processing by executing the software program, the instruction or the module stored in the memory 12, that is, the method executed by the second device in the above method embodiment.
  • the memory 12 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function; the storage data area may store data created according to usage of the second device, and the like. Further, the memory 12 may include a high speed random access memory, and may also include a nonvolatile memory.
  • the foregoing method may be implemented by means of software and a general hardware platform, and may also be implemented by hardware.
  • the technical solution of the present disclosure can be embodied in the form of a software product stored in a storage medium (such as a read-only memory (ROM), a random access memory (RAM). , a disk, an optical disk, including one or more instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method described in the embodiments of the present disclosure.
  • the hotspot sharing operation and the hotspot operation are all completed in the background of the device, without user participation, simplifying the operation of the user when sharing the hotspot and the operation of the user when using the hotspot, which can be fast and safe Sharing and using hotspots.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本文公开了一种分享热点的方法及设备,应用于分享热点的第一设备的所述方法包括:配置热点连接信息,对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息,启动热点模式,并进行热点分享。使用热点的第二设备请求第一设备对第二设备进行身份认证,在身份认证通过后,获取所述第一设备发送的热点连接信息,扫描周围热点,并基于所述热点连接信息,进行热点连接。

Description

分享热点的方法及设备 技术领域
本公开涉及移动通信领域,例如涉及一种分享热点的方法及设备。
背景技术
随着第四代移动通信4G网络的不断完善,手机等移动终端用户对网络的需求也变得越来越多,所以,用户常常会遇到需要进行网络分享的场景。一种网络分享技术是当一个热点设备的移动网络可用时,所述热点设备可以建立一个移动热点,设置热点的名称(Service Set Identifier,SSID)、加密方式以及密码,告诉使用者这些热点信息,使用者搜索到该热点输入正确密码才可成功连接到该热点。
然而,该热点共享方式,需要用户的参与,对于用户来讲操作过于繁琐,且热点的名称和密码等要告知使用者,存在传达不一致以及泄密等情况。
发明内容
本公开提供一种分享热点的方法及设备,可以避免热点分享方式中操作繁琐且安全性低的现象。
本公开的第一个方面,提供一种分享热点的方法,应用于分享热点的第一设备,包括:
配置热点连接信息;
对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息;以及
启动热点模式,进行热点分享。
本公开的第二个方面,提供一种分享热点的方法,应用于使用热点的第二设备,包括:
请求分享热点的第一设备对所述第二设备进行身份认证;
在身份认证通过后,获取所述第一设备发送的热点连接信息;以及
扫描周围热点,并基于所述热点连接信息,进行热点连接。
本公开的第三个方面,提供一种分享热点的第一设备,包括:
配置模块,设置为配置热点连接信息;
第一认证模块,设置为对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息;以及
第一网络模块,设置为在所述第一认证模块发送热点连接信息后,启动热点模式,进行热点分享。
本公开的第四个方面,提供一种使用热点的第二设备,包括:
第二认证模块,设置为请求分享热点的第一设备对所述第二设备进行身份认证,并在身份认证通过后,获取所述分享热点的第一设备发送的热点连接信息;以及
第二网络模块,设置为扫描周围热点,并基于所述热点连接信息,进行热点连接。
本公开还提供了一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述方法。
本公开还提供了一种分享热点的第一设备,该第一设备包括:
至少一个处理器;以及
与所述至少一个处理器通信连接的存储器;其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行应用于所述分享热点的第一设备执行的分享热点的方法。
本公开还提供了一种使用热点的第二设备,该第二设备包括:
至少一个处理器;以及
与所述至少一个处理器通信连接的存储器;其中,
所述存储器存储有可被所述至少一个处理器执行的指令,所述指令被所述至少一个处理器执行,以使所述至少一个处理器执行应用于所述使用热点的第二设备执行的分享热点的方法。
在本公开提供的方法和设备下,热点分享操作和使用热点操作均在设备后 台完成,无需用户参与,简化了分享热点时用户的操作和使用热点时用户的操作,可以快捷、安全的进行热点分享和使用,避免了相关技术中热点分享方式操作繁琐且安全性低的现象。
附图说明
附图仅用于示出可选实施方式,而并不认为是对本公开的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1为本公开第一实施例提供的一种分享热点的方法的流程图;
图2为本公开第二实施例提供的一种分享热点的方法的流程图;
图3为本公开第三实施例中设置热点的实施流程图;
图4为本公开第三实施例中确认使用热点者身份的实施流程图;
图5为本公开第三实施例中协商完全配置信息的实施流程图;
图6为本公开第三实施例中开启并连接热点的实施流程图;
图7为本公开第三实施例所述快速分享热点的方法的流程图;
图8为本公开第四实施例提供的一种分享热点的第一设备的结构框图;
图9为本公开第五实施例提供的一种使用热点的第二设备的结构框图;
图10为本公开实施例提供的分享热点的第一设备的硬件结构示意图;以及
图11为本公开实施例提供的使用热点的第二设备的硬件结构示意图。
具体实施方式
下面将参照附图更详细地描述本公开的示例性实施例。在不冲突的情况下,以下实施例以及实施例中的技术特征可以相互任意组合。
相关的热点分享方式的步骤过于繁琐,热点的名称和密码要告知使用者时,存在传达不一致和泄密等问题,本公开实施例提供一种分享热点的方法及设备,所述方法及设备简化了用户的操作,对于用户来讲可以只点击一键分享热点键,便可在后台完成全部工作,使用热点的用户可快捷和安全地连接到分享的热点。
在本公开的第一实施例中,提供了一种分享热点的方法,应用于分享热点的第一设备。当用户有分享热点的需求时,可以触发预设的一键分享控件,在 该控件被触发时,分享热点的第一设备执行如图1所示的步骤。
在步骤110中,配置热点连接信息。
本实施例中,配置的热点连接信息可以包括:本热点的服务集标识(Service Set Identifier,SSID)、加密方式以及随机生成的连接本热点的密码。
在步骤120中,对请求使用本热点的第二设备进行身份认证,并在认证通过时,向所述第二设备发送所述热点连接信息。
在本公开的一个实施例中,对请求使用本热点的第二设备进行身份认证,可以包括:
按设定的规则,设置所述第一设备的设备名称;以及
开启设定的时间窗口,在该时间窗口内若仅接收到一个按所述设定的规则命名的第二设备发送的点对点(Peer to Peer,P2P)连接请求,则与第二设备建立P2P连接,并在连接成功时,判定该第二设备的身份认证为通过,记录该第二设备的MAC地址,若连接不成功,判定所述第二设备的身份认证为不通过。
本实施例考虑到无线保真(Wireless Fidelity,Wi-Fi)联盟已推出的P2P技术支持多个Wi-Fi设备在没有接入点(Access Point,AP)的情况下相互连接。所以,本实施例中可以将能够成功建立P2P连接的设备作为身份认证是否通过的依据。并且为了防止分享的热点被其他用户使用,提出了时间窗口的概念,时间窗口可以是一个时间段,在该时间窗口内若只有一个用户请求建立P2P连接,可以予以响应,若连接不成功,判定所述第二设备的身份认证为不通过。其中,时间窗口可以根据需求灵活设定,例如10s秒。
本实施例中,只对时间窗口内有且仅有的一个设备发起的P2P连接请求予以响应,是考虑到当时间窗口内有多个设备发起连接请求时,存在干扰用户,无法对目标设备进行识别。在本公开的一实施例中,提出一种对请求使用本热点的第二设备进行身份认证的方式,该方式可以包括:
与前一实施例实施原理相同,区别在于设定的规则中定义多种命名方式,在用户触发第二设备中预设的一键分享控件时,提供不同命名方式的规则选项供用户选择,并按照用户选定的命名规则对第一设备进行命名。在开启设定的时间窗口内,若接收到多个第二设备发送的P2P连接请求,则选择与第一设备命名方式相同的第二设备进行连接,并认为使用与第一设备命名方式相同的第 二设备的用户是合法用户。
可选地,本实施例中,向身份认证通过的第二设备发送配置的所述连接信息,包括:基于记录的所述第二设备的媒体访问控制(Media Access Control,MAC)地址,利用建立的P2P连接,向所述第二设备发送携带有所述热点连接信息的数据包。
在步骤130中,启动热点模式,并进行热点分享。
在启动热点模式后,STA(Station)设备可根据本热点的连接信息连接本热点,实现热点的分享。STA设备本身并不接受无线的接入,但是STA设备可以连接到AP。
在本公开的第二实施例中,提供一种分享热点的方法,应用于使用热点的第二设备。当用户有要使用分享的热点的需求时,可以触发第二设备中预设的一键使用分享热点的控件,在该控件被触发时,执行如图2所示的步骤。
在步骤210中,请求分享热点的第一设备对所述第二设备进行身份认证。
与第一实施例相匹配的,请求所述第一设备对所述第二设备进行身份认证可以包括:
按设定的规则,设置所述第二设备的设备名称;以及
当发现有按所述设定的规则命名的P2P设备时,判定该P2P设备为所述第一设备,向所述第一设备发起P2P连接请求,并在P2P连接成功时,判定所述第二设备的身份认证已通过。
在步骤220中,在身份认证通过后,获取所述分享热点的第一设备发送的热点连接信息。
与第一实施例相匹配的,在身份认证通过后,可以接收所述第一设备发送至所述第二设备的携带有热点连接信息的数据包,解析该数据包得到热点连接信息。
在步骤230中,扫描周围热点,并基于所述热点连接信息,进行热点连接。
本实施例中,从扫描周围热点到进行热点连接,均在设备内完成,无需用户参与,可选的,扫描周围热点,调取所述热点连接信息中的SSID和加密方式,并在扫描到的热点中确定出与所述SSID和加密方式匹配的目标热点,并根据调 取的所述热点连接信息中的密码信息,连接到所述目标热点。
综上可知,本实施例所述方法设计一套流程来简化用户的操作,用户可以只点击一键分享热点键,便可在后台完成全部工作,使用热点的用户可快捷以及安全地连接到分享的热点,避免了相关技术中移动智能终端分享热点的操作过于繁琐以及热点的名称和密码要告知使用者时,存在传达不一致和泄密等问题。
在本公开的第三实施例中提供一种分享热点的方法,所述方法可以包括:设置热点、确认使用热点者身份、协商完全配置信息以及开启并连接热点。在用户按下一键分享热点键后,后台可依次执行上述步骤,简化了用户在连接热点过程中的繁琐步骤,且不用担心热点密码被泄露,整个过程操作便捷、密码安全以及连接快速。如下表述中AP设备代表分享热点的第一设备,STA设备代表使用热点的第二设备。
设置热点,即如何去新建一个要分享的热点。
如图3所示,设置热点过程可以包括如下步骤。
在步骤310中,分享热点者点击一键分享热点键后,AP设备将Wi-Fi芯片工作模式设置为热点模式(Hotspot Mode)。
在步骤320中,AP设备配置分享热点的名称(SSID)。
在步骤330中,AP设备配置分享热点的加密方式为WPA2PSK,并随机生成密码。
在步骤340中,AP设备备份分享热点的SSID、加密方式和密码。
本实施例中,通过AP设备后台下发命令,设置Wi-Fi芯片工作在Hotspot模式,随后配置分享热点的名称(最大长度可为32字符)和加密方式,例如选择WPA2 PSK作为加密方式,并可配置数字和大小写字母混合的至少8位的密码,备份分享热点的SSID、加密方式及密码。
确认使用热点者身份,以防其他用户使用分享的热点,流程示意图如图4所示。
在步骤410中,AP设备将其Wi-Fi芯片工作模式切换到P2P模式;要使用该AP设备分享的热点的STA设备在用户触发了STA设备中预设的一键使用分享热点的控件后,也将STA设备的Wi-Fi芯片工作模式切换到P2P模式;
在步骤420中,AP设备和STA设备分别切换到P2P模式后,均按设定的规则,设置各自的设备名称(Device Name),例如设置的设备名称均为“XXX_***”格式。
在步骤430中,STA设备若发现有命名规则为“XXX_***”的AP设备,则向所述AP设备发起P2P连接请求。
在步骤440中,AP设备设定一个时间窗口,若该时间窗口内接收到仅且只有一个“XXX_***”的STA设备的P2P连接请求,则响应该连接请求;若连接不成功,判定使用热点的用户的身份认证为不通过。
在步骤450中,P2P连接成功,表明使用热点用户的身份认证通过了。
本方法实施借助P2P技术规范来验证使用热点用户的身份,AP设备和STA设备可以都工作在P2P模式,且设备名称都可以被命名为一定规则的形式,如:XXX_***,STA设备若发现有该规则形式的P2P设备便向其发起P2P连接请求,AP设备若短时间间隔内,只接收到仅且只有一个该规则形式的P2P设备的P2P请求,才会同意该请求,P2P连接成功表明使用热点的用户的身份认证通过了,同时AP设备会记录下STA设备的MAC地址。
协商完全配置信息,即AP设备如何将分享的热点信息安全地告知给STA设备,流程示意图如图5所示。
在步骤510中,AP设备给STA设备发送一帧热点信息(Hotspot Info)数据包。
在步骤520中,STA设备解析Hotspot Info数据包。
在步骤530中,STA设备响应一帧热点响应(Hotspot Response)数据包给AP设备。
在步骤540中,AP设备给STA设备发送一帧热点成功(Hotspot Success)数据包。
本实施例中的510步骤中,发送的Hotspot Info数据包携带了之前备份的热点配置信息(SSID、加密方式及密码),同时包头中也添加了之前已确认身份STA设备的MAC地址,即指定该帧数据包将定向发送给已确认身份的STA设备。STA设备成功接收到该帧数据包后,解析Hotspot Info数据包中的AP信息元素(Information Element,IE)信息,提取AP设备的SSID和密码,响应一帧 Hotspot Response数据包给AP设备,以表明STA设备已成功提取到AP设备的SSID和密码,AP设备给STA设备发送一帧Hotspot Success数据包,表示AP设备的热点配置信息告知STA设备动作成功完成。
开启并连接热点,即AP设备如何开启热点以及STA设备怎样去连接该热点,流程示意图见图6。
在步骤610中,将AP设备的Wi-Fi芯片工作模式切换到Hotspot模式。
在步骤620中,AP设备开启分享热点。
在步骤630中,将STA设备的Wi-Fi芯片工作模式切换到STA模式。
在步骤640中,STA设备扫描周围热点。
在步骤650中,STA设备选定与目标SSID和加密方式一致的热点,输入密码进行连接。
本实施例的610开启了分享AP设备的热点,热点信息已在之前步骤中设置,STA设备扫描周围的热点,检索到有与Hotspot Info中SSID及加密方式一致的热点后,便输入密码进行连接,这与相关技术中热点的连接流程一样,也执行四次握手协议流程,流程结束分享热点连接成功。
基于上述设置热点、确认使用热点者身份、协商完全配置信息、以及开启并连接热点的阐述,图7示出了本实施例所述分享热点的方法的流程示意图,从该流程示意图能够更清楚的了解上述四部分的实施过程及时机。
如图8所示,在本公开的第四实施例中提供一种分享热点的第一设备。所述第一设备包括:配置模块810、第一认证模块820以及第一网络模块830。
配置模块810设置为配置热点连接信息。
第一认证模块820设置为对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息。
第一网络模块830设置为在所述第一认证模块820发送热点连接信息后,启动热点模式,进行热点分享。
基于上述结构框架及实施原理,下面给出在上述结构下的几个实施方式,以使本公开技术方案的实施方便和准确。
本实施例中,配置模块810可以设置为配置本热点的SSID以及加密方式, 并随机生成连接本热点的密码。
可选地,在本公开的一个实施例中,第一认证模块820,包括:第一命名单元821和第一身份认证单元822。
第一命名单元821设置为按设定的规则,设置所述第一设备的设备名称。
第一身份认证单元822设置为开启设定的时间窗口,在该时间窗口内若仅接收到一个按所述设定的规则命名的第二设备发送的P2P连接请求,则与该第二设备建立P2P连接,并在连接成功时,判定该第二设备的身份认证为通过,记录该第二设备的MAC地址,若连接不成功,判定第二设备的身份认证为不通过。
可选的,第一认证模块820,还包括:信息发送单元823。
信息发送单元823设置为基于记录的所述第二设备的MAC地址,向所述第二设备发送携带有所述热点连接信息的数据包。
在本公开的第五实施例中提供一种使用热点的第二设备,如图9所示,所述设备包括:第二认证模块910和第二网络模块920。
第二认证模块910设置为请求分享热点的第一设备对所述第二设备进行身份认证,并在身份认证通过后,获取所述分享热点的第一设备发送的热点连接信息。
第二网络模块920设置为扫描周围热点,并基于所述热点连接信息,进行热点连接。
在本公开的一个实施例中,第二认证模块910,可以包括:第二命名单元911和第二身份认证单元912。
第二命名单元911设置为按设定的规则,设置所述第二设备的设备名称。
第二身份认证单元912设置为当发现有按所述设定的规则命名的P2P设备时,判定该P2P设备为所述第一设备,向所述第一设备发起P2P连接请求,并在P2P连接成功时,判定所述第二设备的身份认证已通过。
可选地,本实施例中,第二网络模块920可以设置为扫描周围热点,调取所述热点连接信息中的SSID和加密方式,并根据所述SSID和加密方式,确定扫描到的热点中的目标热点,并根据调取的所述热点连接信息中的密码信息, 连接到所述目标热点。
综上可知,本实施例的第一设备和第二设备,简化用户的操作,用户可以只点击一键分享热点键,便可在设备后台完成全部工作,使用热点的用户可快捷以及安全地连接到分享的热点,避免了相关技术中移动智能终端分享热点的步骤过于繁琐,以及热点的名称和密码要告知使用者时,存在传达不一致和泄密等问题。
本公开还提供了一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令设置为执行上述任一实施例中的方法。
本公开还提供了一种第一设备的硬件结构示意图。参见图10,该第一设备包括:
至少一个处理器(processor)100,图10中以一个处理器100为例;以及存储器(memory)101,还可以包括通信接口(Communications Interface)102和总线103。其中,处理器100、通信接口102、存储器101可以通过总线103完成相互间的通信。通信接口102可以设置为信息传输。处理器100可以调用存储器101中的逻辑指令,以执行上述实施例中第一设备执行的方法。
此外,上述的存储器101中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器101作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中第一设备执行的方法对应的程序指令或模块。处理器100通过运行存储在存储器101中的软件程序、指令或模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的第一设备执行的方法。
存储器101可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据第一设备的使用所创建的数据等。此外,存储器101可以包括高速随机存取存储器,还可以包括非易失性存储器。
本公开还提供了一种第二设备的硬件结构示意图。参见图11,该第二设备包括:
至少一个处理器(processor)11,图11中以一个处理器11为例;以及存储器(memory)12,还可以包括通信接口(Communications Interface)13和总线 14。其中,处理器11、通信接口13、存储器12可以通过总线14完成相互间的通信。通信接口13可以设置为信息传输。处理器11可以调用存储器12中的逻辑指令,以执行上述实施例中第二设备执行的方法。
此外,上述的存储器12中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。
存储器12作为一种计算机可读存储介质,可用于存储软件程序、计算机可执行程序,如本公开实施例中第二设备执行的方法对应的程序指令或模块。处理器11通过运行存储在存储器12中的软件程序、指令或模块,从而执行功能应用以及数据处理,即实现上述方法实施例中的第二设备执行的方法。
存储器12可包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序;存储数据区可存储根据第二设备的使用所创建的数据等。此外,存储器12可以包括高速随机存取存储器,还可以包括非易失性存储器。通过以上的实施方式的描述,上述实施例方法可借助软件和通用硬件平台的方式来实现,当然也可以通过硬件的方式实现。
本公开的技术方案本质上可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如只读存储器(Read-Only Memory,ROM)、随机存取存储器(Random Access Memory,RAM)、磁碟、光盘)中,包括一个或多个指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本公开实施例所述的方法。
工业实用性
本公开实施例提供的分享热点的方法及设备,热点分享操作和使用热点操作均在设备后台完成,无需用户参与,简化了分享热点时用户的操作和使用热点时用户的操作,可以快捷以及安全的进行热点分享和使用。

Claims (15)

  1. 一种分享热点的方法,应用于分享热点的第一设备,包括:
    配置热点连接信息;
    对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息;以及
    启动热点模式,进行热点分享。
  2. 如权利要求1所述的方法,其中,所述对请求使用本热点的第二设备进行身份认证,包括:
    按设定的规则,设置所述第一设备的设备名称;以及
    开启设定的时间窗口,在该时间窗口内若仅接收到一个按所述设定的规则命名的第二设备发送的点对点P2P连接请求,则与该第二设备建立P2P连接,并在连接成功时,判定该第二设备的身份认证为通过,记录该第二设备的媒体访问控制MAC地址,若连接不成功,判定所述第二设备的身份认证为不通过。
  3. 如权利要求2所述的方法,其中,所述向所述第二设备发送所述热点连接信息,包括:基于记录的所述第二设备的MAC地址,向所述第二设备发送携带有所述热点连接信息的数据包。
  4. 如权利要求1至3任意一项所述的方法,其中,所述配置热点连接信息,包括:配置本热点的服务集标识SSID和加密方式,并随机生成连接本热点的密码。
  5. 一种分享热点的方法,应用于使用热点的第二设备,包括:
    请求分享热点的第一设备对所述第二设备进行身份认证;
    在身份认证通过后,获取所述第一设备发送的热点连接信息;以及
    扫描周围热点,并基于所述热点连接信息,进行热点连接。
  6. 如权利要求5所述的方法,其中,所述请求分享热点的第一设备对所述 第二设备进行身份认证,包括:
    按设定的规则,设置所述第二设备的设备名称;以及
    当发现有按所述设定的规则命名的点对点P2P设备时,判定该P2P设备为所述第一设备,向所述第一设备发起P2P连接请求,并在P2P连接成功时,判定所述第二设备的身份认证已通过。
  7. 如权利要求5或6所述的方法,其中,所述扫描周围热点,并基于所述热点连接信息,进行热点连接,包括:
    扫描周围热点,调取所述热点连接信息中的服务集标识SSID和加密方式,并根据所述SSID和加密方式,确定扫描到的热点中的目标热点,并根据调取的所述热点连接信息中的密码信息,连接到所述目标热点。
  8. 一种分享热点的第一设备,包括:
    配置模块,设置为配置热点连接信息;
    第一认证模块,设置为对请求使用本热点的第二设备进行身份认证,并在身份认证通过时,向所述第二设备发送所述热点连接信息;以及
    第一网络模块,设置为在所述第一认证模块发送热点连接信息后,启动热点模式,进行热点分享。
  9. 如权利要求8所述的第一设备,其中,所述第一认证模块,包括:
    第一命名单元,设置为按设定的规则,设置所述第一设备的设备名称;以及
    第一身份认证单元,设置为开启设定的时间窗口,在该时间窗口内若仅接收到一个按所述设定的规则命名的第二设备发送的点对点P2P连接请求,则与该第二设备建立P2P连接,并在连接成功时,判定该第二设备的身份认证为通过,记录该第二设备的媒体访问控制MAC地址,若连接不成功,判定所述第二 设备的身份认证为不通过。
  10. 如权利要求9所述的第一设备,其中,所述第一认证模块,还包括:
    信息发送单元,设置为基于记录的所述第二设备的MAC地址,向所述第二设备发送携带有所述热点连接信息的数据包。
  11. 如权利要求8至10任意一项所述的第一设备,其中,所述配置模块,设置为配置本热点的服务集标识SSID和加密方式,并随机生成连接本热点的密码。
  12. 一种使用热点的第二设备,包括:
    第二认证模块,设置为请求分享热点的第一设备对所述第二设备进行身份认证,并在身份认证通过后,获取所述第一设备发送的热点连接信息;以及
    第二网络模块,设置为扫描周围热点,并基于所述热点连接信息,进行热点连接。
  13. 如权利要求12所述的第二设备,其中,所述第二认证模块,包括:
    第二命名单元,设置为按设定的规则,设置所述第二设备的设备名称;以及
    第二身份认证单元,设置为当发现有按所述设定的规则命名的点对点P2P设备时,判定该P2P设备为所述第一设备,向所述第一设备发起P2P连接请求,并在P2P连接成功时,判定所述第二设备的身份认证已通过。
  14. 如权利要求12或13所述的设备,其中,所述第二网络模块,设置为扫描周围热点,调取所述热点连接信息中的服务集标识SSID和加密方式,并根据所述SSID和加密方式,确定扫描到的热点中的目标热点,并根据调取的所述热点连接信息中的密码信息,连接到所述目标热点。
  15. 一种非暂态计算机可读存储介质,存储有计算机可执行指令,所述计 算机可执行指令设置为执行权利要求1-7中任一项的方法。
PCT/CN2017/075225 2016-09-05 2017-02-28 分享热点的方法及设备 WO2018040524A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610801551.7A CN107801185A (zh) 2016-09-05 2016-09-05 一种快速分享热点的方法及设备
CN201610801551.7 2016-09-05

Publications (1)

Publication Number Publication Date
WO2018040524A1 true WO2018040524A1 (zh) 2018-03-08

Family

ID=61299970

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/075225 WO2018040524A1 (zh) 2016-09-05 2017-02-28 分享热点的方法及设备

Country Status (2)

Country Link
CN (1) CN107801185A (zh)
WO (1) WO2018040524A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602767A (zh) * 2019-10-30 2019-12-20 上海掌门科技有限公司 热点连接方法及设备
CN111447624A (zh) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi设备及其配网方法、具有存储功能的装置
CN112261653A (zh) * 2020-09-09 2021-01-22 上海连尚网络科技有限公司 一种用于管理无线接入点的分享用户的方法与设备

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113038627B (zh) * 2019-12-05 2022-09-16 华为技术有限公司 一种文件分享方法、移动设备、计算机存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040152447A1 (en) * 2002-09-10 2004-08-05 Mcdonnell James Thomas Edward Method and apparatus for authenticating service to a wireless communications device
CN103826323A (zh) * 2014-02-26 2014-05-28 深圳市金立通信设备有限公司 一种无线网络连接的方法、终端及移动终端
CN104394600A (zh) * 2014-10-24 2015-03-04 小米科技有限责任公司 传输文件的方法及装置
CN105072704A (zh) * 2015-07-22 2015-11-18 上海斐讯数据通信技术有限公司 一种陌生智能终端之间获取信息的方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101192916A (zh) * 2006-11-23 2008-06-04 华为技术有限公司 无线接入方法及无线接入设备
CN101420413B (zh) * 2007-10-25 2012-11-07 华为技术有限公司 会话密钥协商方法、认证服务器及网络设备
CN101998403A (zh) * 2009-08-21 2011-03-30 中兴通讯股份有限公司 跨网络接入鉴权的实现方法和系统
US20120051345A1 (en) * 2010-09-01 2012-03-01 Texas Instruments Incorporated Efficient dual bss scheduling
CN103402275A (zh) * 2013-07-26 2013-11-20 北京小米科技有限责任公司 分享WiFi链接信息的方法、终端和系统
CN104902532A (zh) * 2014-03-06 2015-09-09 张永杰 一种自动接入无线局域网的方法和系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040152447A1 (en) * 2002-09-10 2004-08-05 Mcdonnell James Thomas Edward Method and apparatus for authenticating service to a wireless communications device
CN103826323A (zh) * 2014-02-26 2014-05-28 深圳市金立通信设备有限公司 一种无线网络连接的方法、终端及移动终端
CN104394600A (zh) * 2014-10-24 2015-03-04 小米科技有限责任公司 传输文件的方法及装置
CN105072704A (zh) * 2015-07-22 2015-11-18 上海斐讯数据通信技术有限公司 一种陌生智能终端之间获取信息的方法及系统

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110602767A (zh) * 2019-10-30 2019-12-20 上海掌门科技有限公司 热点连接方法及设备
CN110602767B (zh) * 2019-10-30 2023-06-16 上海掌门科技有限公司 热点连接方法及设备
CN111447624A (zh) * 2020-03-04 2020-07-24 浙江大华技术股份有限公司 WiFi设备及其配网方法、具有存储功能的装置
CN111447624B (zh) * 2020-03-04 2023-12-15 浙江大华技术股份有限公司 WiFi设备及其配网方法、具有存储功能的装置
CN112261653A (zh) * 2020-09-09 2021-01-22 上海连尚网络科技有限公司 一种用于管理无线接入点的分享用户的方法与设备
CN112261653B (zh) * 2020-09-09 2023-03-24 上海连尚网络科技有限公司 一种用于管理无线接入点的分享用户的方法与设备

Also Published As

Publication number Publication date
CN107801185A (zh) 2018-03-13

Similar Documents

Publication Publication Date Title
TWI634771B (zh) Wisdom device and method and device for establishing Bluetooth connection between devices
JP5669521B2 (ja) 無線通信端末および接続設定方法
KR101504447B1 (ko) 애드 혹 무선 네트워킹을 구현하기 위한 시스템들 및 방법들
EP3334084B1 (en) Security authentication method, configuration method and related device
EP2291017B1 (en) Method for network connection
US8572698B1 (en) Connecting a legacy wireless device to a WPS-enabled access point
WO2014086252A1 (zh) 关联设备的方法、装置及系统
KR20130079839A (ko) 와이파이 다이렉트 연결 방법
WO2014190950A1 (zh) 用于建立连接的方法及设备
WO2018040524A1 (zh) 分享热点的方法及设备
EP2993933B1 (en) Wireless terminal configuration method, apparatus and wireless terminal
US20210251019A1 (en) Systems and methods for provisioning wi-fi devices
WO2023280194A1 (zh) 网络连接管理方法、装置、可读介质、程序产品及电子设备
US20210367942A1 (en) Method and Apparatus for Secure Interaction Between Terminals
CN107979864B (zh) 接入点的接入方法、装置及系统
WO2015014307A1 (zh) 一种用于配置多设备的方法、设备和系统
WO2023279897A1 (zh) 安全绑定方法及系统、存储介质、电子装置
US20220022034A1 (en) Communication apparatus, communication method, program, and storage medium
WO2016145826A1 (zh) Wifi热点的接入方法及装置
WO2012026932A1 (en) Method and apparatus for over-the-air configuration of a wireless device
WO2017000680A1 (zh) 一种建立连接的方法及装置
CN113543131A (zh) 网络连接管理方法、装置、计算机可读介质及电子设备
CN109981420B (zh) 一种智能设备配网方法和智能设备
JP6468341B2 (ja) 無線接続装置、無線通信に関する設定情報を複製する方法、および、ネットワークシステム
JP2006345302A (ja) ゲートウェイ装置およびプログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17844834

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17844834

Country of ref document: EP

Kind code of ref document: A1