WO2018107952A1 - 无线连接方法及装置 - Google Patents

无线连接方法及装置 Download PDF

Info

Publication number
WO2018107952A1
WO2018107952A1 PCT/CN2017/112897 CN2017112897W WO2018107952A1 WO 2018107952 A1 WO2018107952 A1 WO 2018107952A1 CN 2017112897 W CN2017112897 W CN 2017112897W WO 2018107952 A1 WO2018107952 A1 WO 2018107952A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wireless network
predetermined area
wireless
module
Prior art date
Application number
PCT/CN2017/112897
Other languages
English (en)
French (fr)
Inventor
陈林
孟苑
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2018107952A1 publication Critical patent/WO2018107952A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/02Access restriction performed under specific conditions
    • H04W48/04Access restriction performed under specific conditions based on user or terminal location or mobility data, e.g. moving direction, speed

Definitions

  • the present disclosure relates to the field of communications, such as a wireless connection method and apparatus.
  • merchants generally post wireless network access information (for example, WiFi SSID and Key) on the eye-catching walls and windows of the store, and the customer manually searches for a Service Set Identifier (SSID) and enters a Key or a mobile phone to scan the QR code.
  • SSID Service Set Identifier
  • Get WiFi access information to log in to the shared wireless network.
  • the wireless network access information (for example, WiFi SSID/Key) is directly posted on the storefront, and the Key is directly exposed to everyone as a network password, which lacks security. It is also easy to trigger a network, increase the number of invalid users, affecting effective user access and network speed experience.
  • Pre-coding the wireless network access information into a two-dimensional code can encrypt the wireless network access information, but requires a special application to scan and parse to obtain the access information, and then manually input the wireless network settings of the access terminal. This method not only increases the process of the administrator to create the QR code, but also increases the operation of the customer scanning and input.
  • Wireless network access information needs to be printed and posted in advance, which is inconvenient to update and time-consuming and labor-intensive.
  • the wireless network may have multiple sets of SSIDs or multiple wireless routers to provide different network service experiences, such as VIP area and common customer area corresponding to different network speeds.
  • the existing solution needs to post corresponding wireless network access information or two-dimensional code one by one, which is large in workload, easy to leak, and inconvenient to update management.
  • the embodiments of the present disclosure provide a wireless connection method and apparatus, so as to at least solve the problem that the access information of the wireless network is directly pasted out in the related art, and the access information of the wireless network is directly leaked to the user.
  • a wireless connection method including: detecting that a terminal enters a predetermined area, pushing an available wireless network to the terminal; and receiving the terminal for requesting access to the wireless network Entering a request; acquiring access information of the wireless network, and connecting the terminal to the wireless network.
  • the method further includes: detecting, after the terminal leaves the predetermined area, a disconnection of the terminal to the wireless network; or detecting The connection of the terminal to the wireless network is disconnected until the usage time of the access information exceeds a preset duration.
  • detecting that the terminal enters the predetermined area, and pushing the available wireless network to the terminal includes: determining a broadcast range of the predetermined area, where the broadcast range is less than or equal to the wireless function in the predetermined area The coverage of the router; when the terminal is detected to enter the broadcast range, the available wireless network is pushed to the terminal through the broadcast information.
  • determining the broadcast range of the predetermined area includes: determining a mandatory IBeacon module corresponding to the predetermined area; determining, by the IBeacon module, a broadcast range of the predetermined area.
  • the method before determining the broadcast range of the predetermined area, the method further includes: setting access information of the wireless router that assumes the wireless function in the predetermined area.
  • the method includes: periodically updating access information of the wireless network.
  • a wireless connection apparatus including: a detection module configured to: when detecting that a terminal enters a predetermined area, push an available wireless network to the terminal; and receive a module configured to receive the The terminal is configured to request an access request to enter the wireless network; and the connection module is configured to acquire access information of the wireless network, and connect the terminal to the wireless network.
  • the foregoing apparatus further includes: a first disconnecting module configured to: after detecting that the terminal leaves the predetermined area for a predetermined time, disconnect the terminal to the wireless network; or, disconnect the second And the module is configured to disconnect the terminal to the wireless network after detecting that the usage time of the access information exceeds a preset duration.
  • a first disconnecting module configured to: after detecting that the terminal leaves the predetermined area for a predetermined time, disconnect the terminal to the wireless network; or, disconnect the second And the module is configured to disconnect the terminal to the wireless network after detecting that the usage time of the access information exceeds a preset duration.
  • the detecting module is further configured to determine a broadcast range of the predetermined area, where the broadcast range is less than or equal to a coverage of a wireless router that assumes wireless functions in the predetermined area; and detecting the When the terminal enters the broadcast range, the available wireless network is pushed to the terminal through the broadcast information.
  • the detecting module is further configured to determine a mandatory IBeacon module corresponding to the predetermined area; and determine, by the IBeacon module, a broadcast range of the predetermined area
  • the apparatus further includes: a setting module configured to set access information of the wireless router that assumes the wireless function in the predetermined area.
  • the foregoing apparatus further includes: an update module, configured to periodically update access information of the wireless network.
  • a storage medium is also provided.
  • the storage medium is configured to store program code for performing the steps of: when detecting that the terminal enters the predetermined area, pushing the available wireless network to the terminal; receiving the access request of the terminal for requesting access to the wireless network; Acquiring access information of the wireless network, and connecting the terminal to the wireless network.
  • the storage medium is further configured to store program code for performing the following steps: after connecting the terminal to the wireless network, further comprising: detecting that the terminal leaves the predetermined area after a predetermined time Opening a connection of the terminal to the wireless network; or, after detecting that the usage time of the access information exceeds a preset duration, disconnecting the terminal from the wireless network.
  • the storage medium is further configured to store program code for performing the following steps: when detecting that the terminal enters the predetermined area, pushing the available wireless network to the terminal comprises: determining a broadcast range of the predetermined area, where The broadcast range is less than or equal to the coverage of the wireless router that assumes the wireless function in the predetermined area; when the terminal is detected to enter the broadcast range, the available wireless network is pushed to the terminal through the broadcast information.
  • the storage medium is further configured to store program code for performing the following steps: determining the broadcast range of the predetermined area comprises: determining a must-have IBeacon module corresponding to the predetermined area; determining, by the IBeacon module The broadcast range of the predetermined area.
  • the storage medium is further configured to store program code for performing the following steps: before determining the broadcast range of the predetermined area, further comprising: setting access information of the wireless router that assumes the wireless function in the predetermined area.
  • the storage medium is further configured to store program code for performing the following steps: after connecting the terminal to the wireless network, comprising: periodically updating access information of the wireless network.
  • the available wireless network is pushed to the terminal; the receiving terminal is used to request an access request to enter the wireless network; the access information of the wireless network is acquired, and the terminal is connected. Go to the wireless network.
  • the access information of the wireless network is obtained from the predetermined server according to the terminal access request, and the terminal accesses the wireless network according to the access information, so that the access information of the shared network does not need to be disclosed, and the wireless network is avoided. Direct access to information, network sharing is more targeted and safer. Therefore, the access information of the wireless network directly pasted out in the related art can be solved, and the access information of the wireless network is directly leaked to everyone.
  • FIG. 1 is a block diagram showing the hardware structure of a mobile terminal in a wireless connection method according to an embodiment of the present disclosure
  • FIG. 2 is a flowchart of a wireless connection method in accordance with an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of partitioning in accordance with an embodiment of the present disclosure.
  • FIG. 4 is an alternate flow diagram of a wireless connection method in accordance with an embodiment of the present disclosure.
  • FIG. 5 is a flowchart of a wireless network setup module in accordance with an embodiment of the present disclosure
  • FIG. 6 is a flowchart of association between a wireless router and an IBeacon group in accordance with an embodiment of the present disclosure
  • FIG. 7 is a flowchart of association of multiple wireless routers with an IBeacon group in accordance with an embodiment of the present disclosure
  • FIG. 8 is a flowchart of a function flow of an interaction between an access end APP and an IBeacon server according to an embodiment of the present disclosure
  • FIG. 9 is a structural block diagram of a wireless connection device according to an embodiment of the present disclosure.
  • FIG. 10 is a block diagram 1 of an alternative structure of a wireless connection device in accordance with an embodiment of the present disclosure
  • FIG. 11 is a block diagram 2 of an alternative structure of a wireless connection device according to an embodiment of the present disclosure.
  • FIG. 12 is a block diagram 3 of an alternative structure of a wireless connection device in accordance with an embodiment of the present disclosure.
  • FIG. 1 is a hardware structural block diagram of a mobile terminal in a wireless connection method according to an embodiment of the present disclosure.
  • mobile terminal 10 may include one or more (only one shown) processor 102, memory 104 configured to store data, and transmission device 106 configured to perform communication functions.
  • Processor 102 may include, but is not limited to, a processing device such as a microprocessor MCU or a programmable logic device FPGA. It will be understood by those skilled in the art that the structure shown in FIG. 1 is merely illustrative, and does not limit the structure of the above mobile terminal.
  • the mobile terminal 10 may also include more or fewer components than shown in FIG. 1, or There is a configuration different from that shown in FIG.
  • the memory 104 can be configured to store application software
  • Memory 104 may include high speed random access memory, and may also include non-volatile memory such as one or more magnetic storage devices, flash memory, or other non-volatile solid state memory. In some examples, memory 104 may further include remote memory remotely located relative to processor 102, which may be connected to mobile terminal 10 over a network. Examples of such networks include, but are not limited to, the Internet, intranets, local area networks, mobile communication networks, and combinations thereof.
  • Transmission device 106 is configured to receive or transmit data via a network.
  • the above-described network specific example may include a wireless network provided by a communication provider of the mobile terminal 10.
  • the transmission device 106 includes a Network Interface Controller (NIC) that can be connected to other network devices through a base station to communicate with the Internet.
  • the transmission device 106 can be a Radio Frequency (RF) module configured to communicate with the Internet wirelessly.
  • NIC Network Interface Controller
  • RF Radio Frequency
  • FIG. 2 is a flowchart of a wireless connection method according to an embodiment of the present disclosure, as shown in FIG. 2 . The process includes the steps described below.
  • Step S202 when detecting that the terminal enters the predetermined area, pushing the available wireless network to the terminal;
  • Step S204 The receiving terminal is configured to request an access request to enter the wireless network.
  • Step S206 acquiring access information of the wireless network from the predetermined service, and connecting the terminal to the wireless network.
  • the access information of the wireless network is obtained from the predetermined server, and the terminal is accessed to the wireless network according to the access information, so that the access information of the shared network does not need to be disclosed, thereby avoiding Direct exposure of wireless network access information, network sharing is more targeted and safer. Therefore, the access information of the wireless network directly pasted out in the related art can be solved, and the access information of the wireless network is directly leaked to everyone.
  • the IBeacon technology can be introduced, and the terminal enters the coverage area of the IBeacon module.
  • the IBeacon module triggers the access terminal to notify the terminal that there is an available wireless network through the broadcast.
  • the connection server obtains the access information, and the user or the APP sets the WiFi access information of the access terminal to connect to the shared wireless network.
  • IBeacon technology was proposed by Apple Inc., which is the key technology of Apple's IoT strategy. Under the continuous promotion of Apple, it began to be used in some shopping malls, parking lots and other occasions.
  • the main application scenarios are limited scenes such as WeChat shake, shop navigation, and garage search.
  • An access terminal based on the IBeacon scenario needs to install a corresponding APP and is a smart terminal supporting Bluetooth technology.
  • the method in the foregoing embodiment may involve: an IBeacon server, an IBeacon module, and an access terminal APP, and the foregoing devices are components of the IoT technology of the Internet of Things released by the Apple company, and therefore, no additional hardware cost is added.
  • the method further includes: detecting that the terminal disconnects the connection of the terminal to the wireless network after leaving the predetermined area for a predetermined time; or detecting that the access information is used for more than the preset time. When the time is long, disconnect the terminal from the wireless network.
  • pushing the available wireless network to the terminal includes: determining a broadcast range of the predetermined area, where the broadcast range is less than or equal to a wireless function in the predetermined area. The coverage of the wireless router; when the terminal is detected to enter the broadcast range, the available wireless network is pushed to the terminal through the broadcast information.
  • determining the broadcast range of the predetermined area includes: determining a mandatory IBeacon module corresponding to the predetermined area; determining, by the IBeacon module, a broadcast range of the predetermined area.
  • the method may include: determining a range of wireless network coverage; and dividing the range into a plurality of predetermined areas according to the wireless network sharing requirement. And determining a correspondence between the IBeacon module and the wireless router in the wireless network, where the broadcast range of each IBeacon module is less than or equal to the corresponding IBeacon module.
  • the wireless network is divided into three different areas by five IBeacon modules, as shown in Figure 3, through the server intelligent management module.
  • the block associates each IBeacon module with the wireless range assumed by the particular wireless router/SSID. Ensure that the broadcast range of each IBeacon module is less than or equal to the wireless router/SSID coverage of the wireless function in the area.
  • the wireless network partition based on the IBeacon is more accurate, especially the multi-region multi-SSID scene has a significant effect.
  • one of the two predetermined areas may be randomly selected to provide an available network to the user terminal.
  • the method before determining the broadcast range of the predetermined area, the method further includes: setting access information of the wireless router that assumes the wireless function in the predetermined area.
  • the service set identification SSID broadcast function of the wireless router can be turned off.
  • the SSID and Key of each wireless router WiFi/SSID are set by the intelligent management module.
  • the wireless router SSID broadcast function can be optionally turned off.
  • the method further includes: periodically updating the access information of the wireless network.
  • the time and manner of updating the shared wireless network access information period is set by the intelligent management module to implement periodic update of the access information.
  • the present embodiment provides a fast and secure method for sharing a wireless network based on the above-described IBeacon technology, which relates to a wireless router, a Bluetooth IBEacon module, an IBeacon server, and an intelligent management associated with an IBeacon service. Module, access terminal APP.
  • the server and the intelligent management module are responsible for wireless router WiFi access information management, including: wireless router WiFi access information management, access information cycle update, wireless router/SSID and IBeacon module partition association, and access terminal APP information update.
  • the universally unique identifier (Universally unique identifier, UUID) of all the IBeacon modules in the specified area.
  • UUID Universally unique identifier
  • the access terminal APP receives the broadcast message of the specified UUID, and then the access terminal APP pushes the free shared wireless network information to the client; the customer clicks on the access In the wireless network, the access terminal APP obtains WiFi access information and links to the shared wireless network.
  • the WiFi access information is automatically invalidated.
  • the method does not need to disclose the access information of the shared network, avoiding direct exposure of the network access information, and the network sharing is more targeted and safer; the intelligent management module periodically and automatically updates the wireless network access information to further clean up the access users periodically. Improve sharing efficiency. Lift The security of the high-sharing wireless network enables the accessor to obtain better and more convenient free bandwidth services, ensuring that the wireless network administrator obtains the maximum benefit.
  • the WiFi access is received and set by the access terminal APP, and the entire process of wireless network access information transmission is automatically completed by the management module and the access APP, and the SSID/Key is not displayed to the client, and the SSID broadcast can be closed, and any user can be closed.
  • the wireless network cannot be found, and the access to the APP automatically searches for the IBeacon information to minimize the network.
  • the intelligent management module can automatically update the access information periodically, and the update is easy to maintain and has no cost. This method can control multiple routers or multiple SSIDs at the same time, and the effect is more significant for a large area-wide overlapping layout wireless shared network.
  • the intelligent management module and the wireless router mentioned in the foregoing method may be connected through a network cable, or may be wirelessly connected through an administrator SSID and a Key.
  • the IBeacon is associated with the router or the SSID overlay, and the terminal APP administrator mode can also be used.
  • the administrator carries the terminal, moves in the wireless network coverage area that needs to be associated, and automatically formulates the router according to the IBeacon information received by the administrator terminal. Or SSID association. If multiple routers or SSID coverage areas overlap, you can adjust the specified IBeacon power on the administrator terminal APP, and manually optimize the area of the IBeacon module to match the specified coverage area of the wireless network.
  • the intelligent management module mentioned in this method can also be implemented in the form of an APP on the intelligent terminal of the administrator, and the administrator realizes the management through the wireless connection of the intelligent terminal and the wireless router, and implements periodic update.
  • the access terminal APP mentioned in the above method obtains the wireless network access SSID/Key, and may also be transmitted in a two-dimensional code, a clear code or an encrypted manner.
  • FIG. 4 is a schematic flow chart of an optional method of a wireless connection method according to an embodiment of the present disclosure. As shown in FIG. 4, the steps described below are included.
  • Step S401 setting an SSID and a Key of each wireless router WiFi through the intelligent management module
  • Step S402 planning a distribution area of the IBeacon module according to the wireless network sharing area requirement; and associating each IBeacon module with a specific wireless router by using an intelligent management module;
  • Step S403 The client terminal enters the IBeacon coverage area, and the IBeacon module triggers the access terminal APP to prompt the client to have an available wireless network by broadcasting;
  • Step S404 the user clicks on the access wireless network, and the access terminal APP connects to the server to obtain the access information. And setting the WiFi access parameter of the access terminal;
  • Step S405 The access terminal completes the connection with the wireless router and swims the Internet.
  • FIG. 5 is a flowchart of a wireless network setting module according to an embodiment of the present disclosure, as shown in FIG. 5, including the steps described below.
  • Step S501 Select a wireless router or SSID in the server intelligent management module
  • Step S502 setting an SSID/Key of the wireless router or a certain SSID/Key of the multiple SSID;
  • Step S503 It is optional to turn off the SSID broadcast. By turning off the SSID broadcast, no one can find the wireless network, and only rely on the access terminal APP to obtain the maximum possible prevention of the network;
  • Step S504 Select to set a function of periodically updating the wireless network access information, and set an update period and an update rule.
  • Step S505 When the update cycle time expires, the intelligent management module automatically resets the SSID/Key of the wireless router or the SSID; the update cycle time has not expired, and the SSID/Key remains unchanged;
  • Step S506 Set the SSID/Key to the specified wireless router WiFi module to complete the wireless network access setting.
  • FIG. 6 is a flowchart of association between a wireless router and an IBeacon group according to an embodiment of the present disclosure, as shown in FIG. 6, including the steps described below.
  • Step S601 setting a wireless router to associate with the IBeacon group in the intelligent management module
  • Step S602 Select a wireless router or SSID to be set
  • Step S603 Select an IBeacon 1 module that matches the wireless router or the SSID;
  • step S604 the IBeacon module matching the wireless router or the SSID is sequentially selected according to S603, and the IBeacon module is completed, and the association of the IBeacon module in all the coverage areas is completed.
  • FIG. 8 is a flowchart of the interaction process between the access terminal APP and the IBeacon server according to an embodiment of the present disclosure, as shown in FIG. The steps described below.
  • Step S801 The customer carries the smart terminal to enter the storefront
  • Step S802 The client intelligent terminal enters the coverage of the IBeacon and receives a broadcast frame of an IBeacon module.
  • Step S803 The access end APP obtains the UBeID module UUID number of the received broadcast frame;
  • Step S804 The access terminal APP reports the WiFi address of the terminal and the UUID number of the IBeacon module to the IBeacon server.
  • Step S805 the IBeacon server feeds back the UUID to the intelligent management module.
  • Step S806 The intelligent management module queries whether the associated wireless router or SSID associated with the UUID is valid. If valid, the access terminal user can obtain the wireless shared network access qualification; if it is invalid, the access terminal user is an illegal customer and cannot obtain the wireless shared network information;
  • Step S807 The intelligent management module queries to obtain the SSID/Key information of the wireless router or the SSID.
  • the management module combines the SSID/Key information, the network disconnection timer period, and the access terminal WiFi Mac address to form an encrypted data packet.
  • the key in the packet has been changed to the encrypted random code;
  • Step S808 The access end APP obtains the access encrypted data packet, obtains the SSID/Key, and the network disconnection timing period. If the SSID/Key changes, you need to re-alert the customer to share the network changes;
  • Step S809 The access terminal APP reminds or sets the WiFi parameter of the client intelligent terminal
  • Step S810 the client terminal implements networking
  • Step S811 The access end APP starts a network disconnection timer.
  • Step S812 determining whether the network disconnect timer expires, and the network connection is not expired;
  • Step S813 The network disconnection timer expires, and the access terminal APP determines whether the IBeacon broadcast is received.
  • Step S814 The access terminal APP reports the WiFi Mac address and the received IBeacon UUID to the server again, and acquires a new access encrypted data packet from the server.
  • the server determines that the access terminal WiFi Mac address and UUID have not changed, the Key remains unchanged, and the network timer period is re-assigned, and the S810 network is maintained; if the UUID changes, the user position changes, and the jump S803-S806 judges again. Is the new UUID illegal?
  • the SSID/Key remains unchanged; if the new UUID and the original UUID belong to different SSIDs or The router covers the area, and the server assigns a new SSID/Key according to the new UUID;
  • Step S815 When the network disconnection timer expires, the access terminal APP has not received the IBeacon broadcast, indicating that the access terminal has left the IBeacon distribution area, and the access end APP stops sending the IBeacon information to the server. After the network disconnection timer expires, the server fails to receive the new IBeacon update request from the access terminal, and the randomly generated Key expires;
  • Step S816 After the Key is invalid, the WiFi access information is invalid, and the access terminal is disconnected from the network.
  • a wireless connection device is also provided, which is configured to implement the above-mentioned embodiments and optional embodiments, and has not been described again.
  • the term “module” may implement a combination of software and/or hardware of a predetermined function.
  • the devices described in the following embodiments are typically implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
  • FIG. 9 is a structural block diagram of a wireless connection device according to an embodiment of the present disclosure. As shown in FIG. 9, the device includes:
  • the detecting module 92 is configured to: when detecting that the terminal enters the predetermined area, push the available wireless network to the terminal;
  • the receiving module 94 is connected to the foregoing detecting module 92, and configured to receive an access request for the terminal to request to enter the wireless network;
  • connection module 96 is connected to the receiving module 94, configured to acquire access information of the wireless network, and connect the terminal to the wireless network.
  • FIG. 10 is a block diagram of an optional structure of a wireless connection device according to an embodiment of the present disclosure, as shown in FIG.
  • the device includes, in addition to all the modules shown in FIG. 9, the following:
  • the first disconnecting module 102 is configured to disconnect the terminal from the wireless network after detecting that the terminal leaves the predetermined area for a predetermined time;
  • the second disconnecting module 104 is connected to the first disconnecting module 102, and is configured to disconnect the terminal from the wireless network after detecting that the usage time of the access information exceeds a preset duration.
  • the detecting module 92 is further configured to determine a broadcast range of the predetermined area, where the broadcast range is less than or equal to a coverage of a wireless router that assumes a wireless function in the predetermined area; and detecting the location When the terminal enters the broadcast range, the available wireless network is pushed to the terminal through the broadcast information.
  • the detecting module is further configured to determine a mandatory IBeacon module corresponding to the predetermined area; and determine, by the IBeacon module, a broadcast range of the predetermined area.
  • FIG. 11 is a block diagram of an optional structure of a wireless connection device according to an embodiment of the present disclosure. As shown in FIG. 11, the device includes, in addition to all the modules shown in FIG. 10, the following:
  • the setting module 112 is configured to set access information of the wireless router that assumes the wireless function in the predetermined area.
  • FIG. 12 is a block diagram 3 of an optional structure of a wireless connection device according to an embodiment of the present disclosure. As shown in FIG. 12, the method further includes:
  • the update module 122 is configured to periodically update access information of the wireless network.
  • each of the above modules may be implemented by software or hardware.
  • the foregoing may be implemented by, but not limited to, the foregoing modules are all located in the same processor; or, the above modules are in any combination.
  • the forms are located in different processors.
  • Embodiments of the present disclosure also provide a storage medium.
  • the storage medium may be configured to store program code configured to perform the following steps: when detecting that the terminal enters the predetermined area, push the available wireless network to the terminal; the receiving terminal is configured to request to enter the wireless The access request of the network; obtaining the access information of the wireless network from the predetermined service, and connecting the terminal to the wireless network.
  • the storage medium is further configured to store program code configured to perform the following steps: After the terminal is connected to the wireless network, the method further includes: after detecting that the terminal leaves the predetermined area for a predetermined time, disconnecting the terminal from the wireless network; and detecting that the use time of the access information exceeds a preset duration, disconnecting the terminal from the wireless network. connection.
  • the storage medium is further configured to store program code configured to perform the steps of: detecting that the terminal enters the predetermined area, and pushing the available wireless network to the terminal comprises: determining a broadcast range of the predetermined area, wherein The broadcast range is less than or equal to the coverage of the wireless router that assumes the wireless function in the predetermined area; detecting that the terminal enters the broadcast range, and pushing the available wireless network to the terminal through the broadcast information.
  • the storage medium is further configured to store program code configured to perform the following steps: determining the broadcast range of the predetermined area comprises: determining a must-have IBeacon module corresponding to the predetermined area; determining, by the IBeacon module The broadcast range of the predetermined area.
  • the storage medium is further configured to store program code configured to perform the following steps: before determining the broadcast range of the predetermined area, further comprising: setting access information of the wireless router that the predetermined area bears the wireless function.
  • the storage medium is further configured to store program code configured to perform the following steps: after connecting the terminal to the wireless network, comprising: periodically updating access information of the wireless network.
  • the foregoing storage medium may include, but not limited to, a USB flash drive, a Read-Only Memory (ROM), a Random Access Memory (RAM), a mobile hard disk, and a magnetic memory.
  • ROM Read-Only Memory
  • RAM Random Access Memory
  • a mobile hard disk e.g., a hard disk
  • magnetic memory e.g., a hard disk
  • the processor performs, according to the stored program code in the storage medium, when detecting that the terminal enters the predetermined area, pushing the available wireless network to the terminal; and the receiving terminal is configured to request access to the wireless network. Request; obtain access information of the wireless network from the predetermined service, and connect the terminal to the wireless network.
  • the processor performs, according to the stored program code in the storage medium, after the terminal is connected to the wireless network, the method further includes: after detecting that the terminal leaves the predetermined area for a predetermined time, disconnecting the terminal to the wireless The connection of the network; or, after detecting that the access information has been used for more than a preset period of time, disconnect the terminal from the wireless network.
  • the processor executes according to the stored program code in the storage medium:
  • pushing the available wireless network to the terminal includes: determining a broadcast range of the predetermined area, wherein the broadcast range is less than or equal to the coverage of the wireless router that assumes the wireless function in the predetermined area a range; when detecting that the terminal enters the broadcast range, pushing an available wireless network to the terminal by using broadcast information.
  • the processor is configured to: according to the stored program code in the storage medium, determining the broadcast range of the predetermined area, including: determining a must-have IBeacon module corresponding to the predetermined area; and passing the IBeacon module Determining a broadcast range of the predetermined area.
  • the processor performs, according to the stored program code in the storage medium, before determining the broadcast range of the predetermined area, further comprising: setting the access information of the wireless router that is responsible for the wireless function in the predetermined area. And turn off the wireless router's service set identity SSID broadcast feature.
  • the processor performs, according to the stored program code in the storage medium, after the terminal is connected to the wireless network, including: periodically updating the access information of the wireless network.
  • modules or steps of the present disclosure described above can be implemented by a general-purpose computing device, which can be centralized on a single computing device or distributed across multiple computing devices. On the network, optionally, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from The steps shown or described are performed sequentially, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated into a single integrated circuit module.
  • the access information of the wireless network is acquired from the predetermined server, and the terminal is connected to the wireless network according to the access information, so that The access information of the shared network does not need to be disclosed, and the direct exposure of the wireless network access information is avoided, and the network sharing is more targeted and safer. Therefore, the access information of the wireless network directly pasted out in the related art can be solved, and the access information of the wireless network is directly leaked to everyone.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本文公布一种无线连接方法及装置,该方法包括:检测到终端进入预定区域时,向终端推送可用的无线网络;接收终端用于请求进入无线网络的接入请求;获取无线网络的接入信息,将终端连接到无线网络。本文解决了相关技术中直接粘贴出无线网络的接入信息,导致无线网络的接入信息被直接暴漏给所有人的问题。

Description

无线连接方法及装置 技术领域
本公开涉及通信领域,例如一种无线连接方法及装置。
背景技术
随着互联网和智能手机的快速发展,人们的生活越来越离不开网络,年轻一代更是变成了低头族,时时刻刻机不离手。商场、餐馆、娱乐场所、宾馆、会议中心看准商机纷纷推出免费无线保真(Wireless-Fidelity,简称为WiFi)来吸引客户。如何快速安全地将自己手中无线资源分享给有效客户,最大限度地提高客户体验,又方便管理是众多商家所关注的。
目前商家普遍将无线网络接入信息(例如,WiFi SSID和Key)张贴在店面醒目的墙壁、窗户,客户手动搜索服务集标识(Service Set Identifier,简称为SSID)并输入Key或者手机扫描二维码获得WiFi接入信息登陆共享无线网络。
上述对于共享无线网络分享方法,有如下缺点:
1)将无线网络接入信息(例如,WiFi SSID/Key)直接张贴在店面显著位置,Key作为网络密码直接暴露给所有人,缺乏安全性。也容易引发蹭网,徒增无效用户,影响有效用户接入和网速体验。
2)将无线网络接入信息预制成二维码可以实现对无线网络接入信息的加密,但需要专门应用去扫描解析以获得接入信息,再手动输入接入终端的无线网络设置中。该法既增加了管理员制作二维码的过程,也增加了客户扫描和输入的操作。
3)一般共享无线网络的接入信息容易被万能钥匙等应用破译,继而引发蹭网和黑客入侵。
4)无线网络接入信息需要提前打印和张贴,更新不便,且费时费力费钱。
5)对于场地较大或者有多个不同业务分区的店面,无线网络可能有多组SSID或者多个无线路由器,以提供不同的网络服务体验,如VIP区、普通客户区分别对应不同的网速。现有方案需要逐个区域张贴对应的无线网络接入信息或者二维码,工作量大、易泄露、更不方便更新管理。
发明内容
以下是对本文详细描述的主题的概述。本概述并非是为限制权利要求的保护范围。
本公开实施例提供了一种无线连接方法及装置,以至少解决相关技术中直接粘贴出无线网络的接入信息,导致无线网络的接入信息被直接暴漏给所用人的问题。
根据本公开的一个实施例,提供了一种无线连接方法,包括:检测到终端进入预定区域时,向所述终端推送可用的无线网络;接收所述终端用于请求进入所述无线网络的接入请求;获取所述无线网络的接入信息,将所述终端连接到所述无线网络。
可选地,在将所述终端连接到所述无线网络之后,还包括:检测到所述终端离开所述预定区域预定时间后,断开所述终端到所述无线网络的连接;或者,检测到所述接入信息的使用时间超过预设时长,断开所述终端到所述无线网络的连接。
可选地,检测到终端进入预定区域,向所述终端推送可用的无线网络包括:确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,确定所述预定区域的广播范围包括:确定所述预定区域对应的必肯IBeacon模块;通过所述IBeacon模块确定所述所述预定区域的广播范围。
可选地,在确定所述预定区域的广播范围之前,还包括:设置所述预定区域中承担无线功能的无线路由器的接入信息。
可选地,在将所述终端连接到所述无线网络之后,包括:周期性更新所述无线网络的接入信息。
根据本公开的另一个实施例,提供了一种无线连接装置,包括:检测模块,配置成检测到终端进入预定区域时,向所述终端推送可用的无线网络;接收模块,配置成接收所述终端用于请求进入所述无线网络的接入请求;连接模块,配置成获取所述无线网络的接入信息,将所述终端连接到所述无线网络。
可选地,上述装置还包括:第一断开模块,配置成检测到所述终端离开所述预定区域预定时间后,断开所述终端到所述无线网络的连接;或者,第二断开模块,配置成检测到所述接入信息的使用时间超过预设时长后,断开所述终端到所述无线网络的连接。
可选地,所述检测模块,还配置成确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;以及检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,所述检测模块,还配置成确定所述预定区域对应的必肯IBeacon模块;以及通过所述IBeacon模块确定所述所述预定区域的广播范围
可选地,上述装置还包括:设置模块,配置成设置所述预定区域中承担无线功能的无线路由器的接入信息。
可选地,上述装置还包括:更新模块,配置成周期性更新所述无线网络的接入信息。
根据本公开的又一个实施例,还提供了一种存储介质。该存储介质设置为存储用于执行以下步骤的程序代码:检测到终端进入预定区域时,向所述终端推送可用的无线网络;接收所述终端用于请求进入所述无线网络的接入请求;获取所述无线网络的接入信息,将所述终端连接到所述无线网络。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:在将所述终端连接到所述无线网络之后,还包括:检测到所述终端离开所述预定区域预定时间后,断开所述终端到所述无线网络的连接;或者,检测到所述接入信息的使用时间超过预设时长后,断开所述终端到所述无线网络的连接。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:检测到终端进入预定区域时,向所述终端推送可用的无线网络包括:确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:确定所述预定区域的广播范围包括:确定所述预定区域对应的必肯IBeacon模块;通过所述IBeacon模块确定所述所述预定区域的广播范围。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:在确定所述预定区域的广播范围之前,还包括:设置所述预定区域中承担无线功能的无线路由器的接入信息。
可选地,存储介质还设置为存储用于执行以下步骤的程序代码:在将所述终端连接到所述无线网络之后,包括:周期性更新所述无线网络的接入信息。
在本公开的上述方法和装置中,检测到终端进入预定区域时,向终端推送可用的无线网络;接收终端用于请求进入无线网络的接入请求;获取无线网络的接入信息,将终端连接到无线网络。由于根据终端接入请求,从预定服务器中获取到无线网络的接入信息,根据该接入信息将终端接入到无线网络,使得共享网络的接入信息不需要被公开,避免了无线网络接入信息的直接暴露,网络共享针对性更强、更安全。因此,可以解决相关技术中直接粘贴出无线网络的接入信息,导致无线网络的接入信息被直接暴漏给所有人的问题。
在阅读并理解了附图和详细描述后,可以明白其他方面。
附图概述
此处所说明的附图用来提供对本公开的进一步理解,构成本申请的一部分,本公开的示意性实施例及其说明用于解释本公开,并不构成对本公开的不当限定。
图1是本公开实施例的一种无线连接方法中的移动终端的硬件结构框图;
图2是根据本公开实施例的无线连接方法的流程图;
图3是根据本公开实施例的分区示意图;
图4是根据本公开实施例的无线连接方法的可选流程示意图;
图5是根据本公开实施例的无线网络设置模块流程图;
图6是根据本公开实施例的无线路由器与IBeacon组关联流程图;
图7是根据本公开实施例的多个无线路由器与IBeacon组关联流程图;
图8是根据本公开实施例的接入端APP与IBeacon服务器交互流程功能流程图;
图9是根据本公开实施例的无线连接装置的结构框图;
图10是根据本公开实施例的无线连接装置的可选结构框图一;
图11是根据本公开实施例的无线连接装置的可选结构框图二;
图12是根据本公开实施例的无线连接装置的可选结构框图三。
具体实施方式
下文中将参考附图并结合实施例来详细说明本公开。需要说明的是,本申请中的实施例及实施例中的特征可以以合适的方式相互组合。
需要说明的是,本公开的说明书和权利要求书及上述附图中的术语“第一”、“第二”等是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。
实施例1
本申请实施例1所提供的方法可以在移动终端应用、计算机终端应用或者类似的运算装置应用中执行。以运行在移动终端应用上为例,图1是本公开实施例的一种无线连接方法中的移动终端的硬件结构框图。如图1所示,移动终端10可以包括一个或多个(图中仅示出一个)处理器102、配置成存储数据的存储器104、以及配置成执行通信功能的传输装置106。处理器102可以包括但不限于微处理器MCU或可编程逻辑器件FPGA等的处理装置。本领域普通技术人员可以理解,图1所示的结构仅为示意,其并不对上述移动终端的结构造成限定。例如,移动终端10还可包括比图1中所示更多或者更少的组件,或者具 有与图1所示不同的配置。
存储器104可配置成存储应用软件
的软件程序以及模块,如本公开实施例中的无线连接方法对应的程序指令/模块,处理器102通过运行存储在存储器104内的软件程序以及模块,从而执行各种功能应用以及数据处理,即实现上述的方法。存储器104可包括高速随机存储器,还可包括非易失性存储器,如一个或者多个磁性存储装置、闪存、或者其他非易失性固态存储器。在一些实例中,存储器104可进一步包括相对于处理器102远程设置的远程存储器,这些远程存储器可以通过网络连接至移动终端10。上述网络的实例包括但不限于互联网、企业内部网、局域网、移动通信网及其组合。
传输装置106配置成经由一个网络接收或者发送数据。上述的网络具体实例可包括移动终端10的通信供应商提供的无线网络。在一个实例中,传输装置106包括一个网络适配器(Network Interface Controller,NIC),其可通过基站与其他网络设备相连从而可与互联网进行通讯。在一个实例中,传输装置106可以为射频(Radio Frequency,RF)模块,其配置成通过无线方式与互联网进行通讯。
在本实施例中提供了一种运行于上述移动终端应用(例如,接入端应用APP)的无线接入方法,图2是根据本公开实施例的无线连接方法的流程图,如图2所示,该流程包括下述描述的步骤。
步骤S202,检测到终端进入预定区域时,向终端推送可用的无线网络;
步骤S204,接收终端用于请求进入无线网络的接入请求;
步骤S206,从预定服务中获取无线网络的接入信息,将终端连接到无线网络。
通过上述步骤,根据终端接入请求,从预定服务器中获取到无线网络的接入信息,根据该接入信息将终端接入到无线网络,使得共享网络的接入信息不需要被公开,避免了无线网络接入信息的直接暴露,网络共享针对性更强、更安全。因此,可以解决相关技术中直接粘贴出无线网络的接入信息,导致无线网络的接入信息被直接暴漏给所有人的问题。
例如,可以将IBeacon技术引入,终端进入IBeacon模块覆盖区域,IBeacon模块通过广播来触发接入端APP提示终端有可用无线网络,用户通过终端点击接入无线网络,接入端APP接收到终端发送的接入无线网络的请求后,连接服务器获得接入信息,用户或APP设置接入终端WiFi接入信息,连接共享无线网络。IBeacon技术由苹果公司提出,是苹果公司物联网战略的关键技术,并在苹果公司的持续推动下,开始在一些商场、停车场等场合商用。目前,主要应用场景是微信摇一摇、店铺导航、车库找车等有限场景。基于IBeacon场景的接入终端需要安装相应APP,且为支持蓝牙技术的智能终端。此时,上述实施例方法可以涉及:IBeacon服务器、IBeacon模块、接入端APP,而上述装置均为苹果公司发布的物联网IBeacon技术的组成模块,因此,不会额外增加硬件成本。
可选地,在将终端连接到无线网络之后,该方法还包括:检测到终端离开预定区域预定时间后,断开终端到无线网络的连接;或者,检测到接入信息的使用时间超过预设时长时,断开终端到无线网络的连接。通过上述步骤,可以达到定期清理接入用户,提高共享效率。提高共享无线网络的安全性,使接入者获得更优质更方便的免费带宽服务,保证无线网络管理员获得最大的利益。
可选地,检测到终端进入预定区域时,向所述终端推送可用的无线网络包括:确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,确定所述预定区域的广播范围包括:确定所述预定区域对应的必肯IBeacon模块;通过所述IBeacon模块确定所述所述预定区域的广播范围。
例如,在向终端推送可用的无线网络之前,可以包括:确定无线网络覆盖的范围;根据无线网络分享需求,将范围划分为若干个预定区域。可以确定若干个预定区域中每个预定区域对应的必肯IBeacon模块;建立IBeacon模块与无线网络中承担无线功能的无线路由器的对应关系,其中,每个IBeacon模块广播范围小于或等于IBeacon模块对应的区域中承担无线功能的无线路由器的覆盖范围;通过IBeacon模块检测到终端进入IBeacon模块对应的预定区域,根据IBeacon模块的广播信息向终端推送可用的无线网络。例如,通过5个IBeacon模块将无线网络划分为3个不同的区域,如图3所示,通过服务器智能管理模 块将各IBeacon模块与具体的无线路由器/SSID承担的无线范围相关联。确保各IBeacon模块广播范围小于或等于该区域中承担无线功能的无线路由器/SSID覆盖范围。通过上述步骤,由于IBeacon模块覆盖范围比无线网络小很多,且有多种规格覆盖范围可控,使得基于IBeacon的无线网络分区更精准,特别是多区域多SSID场景效果显著。可选地,当其中两个预定区域覆盖的区域有重合时,可以随机选择两个预定区域中的一个向用户终端提供可用的网络。
可选地,在确定所述预定区域的广播范围之前,该方法还包括:设置所述预定区域中承担无线功能的无线路由器的接入信息。可选地,可以关闭无线路由器的服务集标识SSID广播功能。例如,通过智能管理模块设置各无线路由器WiFi/SSID的SSID及Key。无线路由器SSID广播功能可选择关闭。通过上述步骤,由于关闭SSID广播,任何用户均无法搜到该无线网络,依靠接入APP自动搜索IBeacon信息,可最大限度防止蹭网。
可选地,在将终端连接到无线网络之后,该方法还包括:周期性更新无线网络的接入信息。例如,通过智能管理模块设置共享无线网络接入信息周期更新的时间和方式,实现接入信息周期性更新。
为了方便理解上述实施例,本实施例基于上述描述的IBeacon技术,提供了一种快速安全的分享无线网络的方法,该方法涉及无线路由器、蓝牙IBeacon模块、IBeacon服务器、与IBeacon服务关联的智能管理模块、接入终端APP。服务器及智能管理模块负责无线路由器WiFi接入信息管理,包括:各无线路由器WiFi接入信息管理、接入信息周期更新、无线路由器/SSID与IBeacon模块分区关联、接入端APP信息更新。首先在智能管理模块上设置共享无线网络接入信息,如SSID和Key;再根据无线网络覆盖的区域范围及分区,将指定区域内所有IBeacon模块的通用唯一标识符(Universally unique identifier,简称为UUID)与管理模块相关联;当接入用户进入IBeacon分布区域时,接入终端APP会收到指定UUID的广播消息,然后接入终端APP将有免费共享无线网络信息推送给客户;客户点击接入无线网络,接入终端APP获取WiFi接入信息,链接到共享无线网络。当客户离开IBeacon覆盖范围一定时间或者指定有效期到期,WiFi接入信息自动作废。此方法不需要公开共享网络的接入信息,避免网络接入信息直接暴露,网络共享针对性更强、更安全;通过智能管理模块定期自动化更新无线网络接入信息,进一步达到定期清理接入用户,提高共享效率。提 高共享无线网络的安全性,使接入者获得更优质更方便的免费带宽服务,保证无线网络管理员获得最大的利益。
上述实施例通过接入端APP接收和设置WiFi接入,无线网络接入信息传递全过程均由管理模块和接入APP自动完成,不显示SSID/Key给客户,亦可关闭SSID广播,任何用户均无法搜到该无线网络,依靠接入APP自动搜索IBeacon信息,可最大限度防止蹭网。智能管理模块可自动化周期性更新接入信息,更新维护方便、无成本。该方法可同时控制多台路由器或多SSID,对于大区域范围重叠布局无线共享网络效果更显著。
可选地,上述方法提到的智能管理模块和无线路由器之间可以通过网线连接,也可以通过管理员SSID和Key实现无线连接。以及上述提到的IBeacon与路由器或SSID覆盖关联,亦可使用终端APP管理员模式,管理员携带终端,在需要关联的无线网络覆盖区域走动,根据管理员终端接收到的IBeacon信息自动与制定路由器或SSID关联。如果多路由器或SSID覆盖区域重合,可在管理员终端APP上调整指定IBeacon功率,人工优化实现IBeacon模块的区域与无线网络指定覆盖区吻合。此方法提到的智能管理模块也可以在管理员的智能终端上以APP形式实现,管理员通过智能终端与无线路由器无线连接实现管理,并实现周期性更新。上述方法中提到的接入端APP获得无线网络接入SSID/Key亦可以是以二维码、明码或加密方式传输。
下面详细论述上述实例中的基于IBeacon技术无线网络快速安全分享的方法。
图4是根据本公开实施例的无线连接方法可选流程示意图,如图4所示,包括如下描述的步骤。
步骤S401:通过智能管理模块设置各无线路由器WiFi的SSID及Key;
步骤S402:根据无线网络分享区域需求,规划IBeacon模块的分布区域;通过智能管理模块将各IBeacon模块与具体的无线路由器相关联;
步骤S403:客户终端进入IBeacon覆盖区域,IBeacon模块通过广播来触发接入端APP提示客户有可用无线网络;
步骤S404:用户点击接入无线网络,接入端APP连接服务器获得接入信息, 并设置接入终端WiFi接入参数;
步骤S405:接入终端与无线路由器完成连接,畅游互联网。
具体的实现步骤按功能模块说明如下:
(1)无线网络设置功能,图5是根据本公开实施例的无线网络设置模块流程图,如图5所示,包括如下描述的步骤。
步骤S501:在服务器智能管理模块中选择某个无线路由器或SSID;
步骤S502:设置该无线路由器的SSID/Key或多SSID的某个SSID/Key;
步骤S503:可选择关闭SSID广播。通过关闭SSID广播,任何人均无法搜到该无线网络,仅依靠接入端APP获取,可最大限度防止蹭网;
步骤S504:选择设置周期性更新无线网络接入信息功能,设置更新周期和更新规则;
步骤S505:更新周期时间到时,智能管理模块自动重置该无线路由器或SSID的SSID/Key;更新周期时间未到,SSID/Key保持不变;
步骤S506:设置SSID/Key到指定无线路由器WiFi模块,完成无线网络接入设置。
如果有多个无线路由器或多SSID,按上面流程依次设置。
(2)关联无线路由器与IBeacon模块组,图6是根据本公开实施例的无线路由器与IBeacon组关联流程图,如图6所示,包括如下描述的步骤。
步骤S601:在智能管理模块设置无线路由器与IBeacon组关联;
步骤S602:选择需要设置的无线路由器或SSID;
步骤S603:选择与该无线路由器或SSID匹配的IBeacon 1模块;
步骤S604:按S603依次选择该无线路由器或SSID匹配的IBeacon模块,直至IBeacon n模块,完成所有覆盖区域内IBeacon模块的关联。
如果有多个无线路由器或多SSID,按上面流程依次设置关联,如图7所述。
(3)接入端APP与IBeacon服务器交互流程功能,图8是根据本公开实施例的接入端APP与IBeacon服务器交互流程功能流程图,如图8所示,包括如 下描述的步骤。
步骤S801:客户携带智能终端进入店面;
步骤S802:客户智能终端进入IBeacon覆盖范围,收到某个IBeacon模块的广播帧;
步骤S803:接入端APP获得收到广播帧的IBeacon模块UUID号;
步骤S804:接入端APP将终端WiFi Mac地址、IBeacon模块UUID号上报给IBeacon服务器;
步骤S805:IBeacon服务器将UUID反馈给智能管理模块;
步骤S806:智能管理模块查询该UUID关联的所属无线路由器或SSID是否有效。如果有效,接入终端用户可获得无线共享网络接入资格;如果无效,则接入终端用户为非法客户,无法获取无线共享网络信息;
步骤S807:智能管理模块查询获得该无线路由器或SSID的SSID/Key信息。管理模块将SSID/Key信息、断网定时器周期、接入终端WiFi Mac地址相组合,组成加密数据包。该数据包中Key已变更为加密后的随机码;
步骤S808:接入端APP获得接入加密数据包,获得SSID/Key以及断网定时周期。如果SSID/Key发生变化,需重新提醒客户共享网络发生变化;
步骤S809:接入端APP提醒或设置客户智能终端WiFi参数;
步骤S810:客户终端实现联网;
步骤S811:接入端APP启动断网定时器;
步骤S812:判断断网定时器是否到期,未到期联网保持;
步骤S813:断网定时器到期接入端APP判断是否收到IBeacon广播;
步骤S814:接入端APP再次将WiFi Mac地址、接收到的IBeacon UUID上报服务器,从服务器获取新的接入加密数据包。当服务器判断接入终端WiFi Mac地址和UUID均未变化时,Key保持不变,重新赋值断网定时器周期,S810联网保持;如果UUID变化,说明用户位置发生变化,跳转S803~S806再次判断新的UUID是否非法。如果新的UUID与原UUID属于同一SSID或者路由器覆盖区域,SSID/Key保持不变;如果新的UUID与原UUID属于不同SSID或者 路由器覆盖区域,服务器根据新UUID赋值新的SSID/Key;
步骤S815:断网定时器到期时,接入端APP已收不到IBeacon广播,说明接入终端已离开IBeacon分布区,接入端APP停止向服务器发送IBeacon信息。断网定时器到期服务器收不到接入终端的新的IBeacon更新请求一定时间后,随机生成的Key失效;
步骤S816:Key失效后,WiFi接入信息失效,接入端断开联网。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到根据上述实施例的方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是典型的实施方式。基于这样的理解,本公开的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,或者网络设备等)执行本公开各个实施例所述的方法。
实施例2
在本实施例中还提供了一种无线连接装置,该装置配置成实现上述实施例及可选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置典型地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图9是根据本公开实施例的无线连接装置的结构框图,如图9所示,该装置包括:
检测模块92,配置成检测到终端进入预定区域时,向终端推送可用的无线网络;
接收模块94,连接至上述检测模块92,配置成接收终端用于请求进入无线网络的接入请求;
连接模块96,连接至上述接收模块94,配置成获取无线网络的接入信息,将终端连接到无线网络。
图10是根据本公开实施例的无线连接装置的可选结构框图一,如图10所 示,该装置除包括图9所示的所有模块外,还包括:
第一断开模块102,配置成检测到终端离开预定区域预定时间后,断开终端到无线网络的连接;或者,
第二断开模块104,连接至上述第一断开模块102,配置成检测到接入信息的使用时间超过预设时长后,断开终端到无线网络的连接。
可选地,所述检测模块92,还配置成确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;以及检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,所述检测模块,还配置成确定所述预定区域对应的必肯IBeacon模块;以及通过所述IBeacon模块确定所述所述预定区域的广播范围。
图11是根据本公开实施例的无线连接装置的可选结构框图二,如图11所示,该装置除包括图10所示的所有模块外,还包括:
设置模块112,配置成设置预定区域中承担无线功能的无线路由器的接入信息。
图12是根据本公开实施例的无线连接装置的可选结构框图三,如图12所示,还包括:
更新模块122,配置成周期性更新无线网络的接入信息。
需要说明的是上述各个模块是可以通过软件或硬件来实现的,对于后者,可以通过以下方式实现,但不限于此:上述模块均位于同一处理器中;或者,上述各个模块以任意组合的形式分别位于不同的处理器中。
实施例3
本公开的实施例还提供了一种存储介质。可选地,在本实施例中,上述存储介质可以被设置为存储配置成执行以下步骤的程序代码:检测到终端进入预定区域时,向终端推送可用的无线网络;接收终端配置成请求进入无线网络的接入请求;从预定服务中获取无线网络的接入信息,将终端连接到无线网络。
可选地,存储介质还被设置为存储配置成执行以下步骤的程序代码:在将 终端连接到无线网络之后,还包括:检测到终端离开预定区域预定时间后,断开终端到无线网络的连接;检测到接入信息的使用时间超过预设时长后,断开终端到无线网络的连接。
可选地,存储介质还被设置为存储配置成执行以下步骤的程序代码:检测到终端进入预定区域,向所述终端推送可用的无线网络包括:确定所述预定区域的广播范围,其中,所述广播范围小于等于所述预定区域承担无线功能的无线路由器的覆盖范围;检测到所述终端进入所述广播范围,通过广播信息向所述终端推送可用的无线网络。
可选地,存储介质还被设置为存储配置成执行以下步骤的程序代码:确定所述预定区域的广播范围包括:确定所述预定区域对应的必肯IBeacon模块;通过所述IBeacon模块确定所述所述预定区域的广播范围。
可选地,存储介质还被设置为存储配置成执行以下步骤的程序代码:在确定所述预定区域的广播范围之前,还包括:设置预定区域承担无线功能的无线路由器的接入信息。
可选地,存储介质还被设置为存储配置成执行以下步骤的程序代码:在将终端连接到无线网络之后,包括:周期性更新无线网络的接入信息。
可选地,在本实施例中,上述存储介质可以包括但不限于:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:检测到终端进入预定区域时,向终端推送可用的无线网络;接收终端用于请求进入无线网络的接入请求;从预定服务中获取无线网络的接入信息,将终端连接到无线网络。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在将终端连接到无线网络之后,还包括:检测到终端离开预定区域预定时间后,断开终端到无线网络的连接;或者,检测到接入信息的使用时间超过预设时长后,断开终端到无线网络的连接。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行: 检测到终端进入预定区域时,向所述终端推送可用的无线网络包括:确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:确定所述预定区域的广播范围包括:确定所述预定区域对应的必肯IBeacon模块;通过所述IBeacon模块确定所述所述预定区域的广播范围。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在确定所述预定区域的广播范围之前,还包括:设置预定区域承担无线功能的无线路由器的接入信息,并关闭无线路由器的服务集标识SSID广播功能。
可选地,在本实施例中,处理器根据存储介质中已存储的程序代码执行:在将终端连接到无线网络之后,包括:周期性更新无线网络的接入信息。
可选地,本实施例中的具体示例可以参考上述实施例及可选实施方式中所描述的示例,本实施例在此不再赘述。
显然,本领域的技术人员应该明白,上述描述的本公开的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。
以上所述仅为本公开的可选实施例而已,并不用于限制本公开,对于本领域的技术人员来说,本公开可以有各种更改和变化。
工业实用性
在本公开提供的无线连接方法及装置中,根据终端接入请求,从预定服务器中获取到无线网络的接入信息,根据该接入信息将终端接入到无线网络,使 得共享网络的接入信息不需要被公开,避免了无线网络接入信息的直接暴露,网络共享针对性更强、更安全。因此,可以解决相关技术中直接粘贴出无线网络的接入信息,导致无线网络的接入信息被直接暴漏给所有人的问题。

Claims (13)

  1. 一种无线连接方法,包括:
    检测到终端进入预定区域时,向所述终端推送可用的无线网络;
    接收所述终端用于请求进入所述无线网络的接入请求;
    获取所述无线网络的接入信息,将所述终端连接到所述无线网络。
  2. 根据权利要求1所述的方法,其中,在将所述终端连接到所述无线网络之后,还包括:
    检测到所述终端离开所述预定区域预定时间后,断开所述终端到所述无线网络的连接;或者,
    检测到所述接入信息的使用时间超过预设时长后,断开所述终端到所述无线网络的连接。
  3. 根据权利要求2所述的方法,其中,检测到终端进入预定区域,向所述终端推送可用的无线网络包括:
    确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;
    检测到所述终端进入所述广播范围,通过广播信息向所述终端推送可用的无线网络。
  4. 根据权利要求3所述的方法,其中,确定所述预定区域的广播范围包括:
    确定所述预定区域对应的必肯IBeacon模块;
    通过所述IBeacon模块确定所述预定区域的广播范围。
  5. 根据权利要求3所述的方法,其中,在确定所述预定区域的广播范围之前,还包括:
    设置所述预定区域中承担无线功能的无线路由器的接入信息。
  6. 根据权利要求1至5中任一项所述的方法,其中,在将所述终端连接到所述无线网络之后,包括:
    周期性更新所述无线网络的接入信息。
  7. 一种无线连接装置,包括:
    检测模块,配置成检测到终端进入预定区域时,向所述终端推送可用的无线网络;
    接收模块,配置成接收所述终端用于请求进入所述无线网络的接入请求;
    连接模块,配置成获取所述无线网络的接入信息,将所述终端连接到所述无线网络。
  8. 根据权利要求7所述的装置,还包括:
    第一断开模块,配置成检测到所述终端离开所述预定区域预定时间后,断开所述终端到所述无线网络的连接;或者,
    第二断开模块,配置成检测到所述接入信息的使用时间超过预设时长后,断开所述终端到所述无线网络的连接。
  9. 根据权利要求8所述的装置,其中,所述检测模块还配置成确定所述预定区域的广播范围,其中,所述广播范围小于或等于所述预定区域中承担无线功能的无线路由器的覆盖范围;以及检测到所述终端进入所述广播范围时,通过广播信息向所述终端推送可用的无线网络。
  10. 根据权利要求9所述的装置,其中,所述检测模块还配置成确定所述预定区域对应的必肯IBeacon模块;以及通过所述IBeacon模块确定所述预定区域的广播范围。
  11. 根据权利要求9所述的装置,还包括:
    设置模块,配置成设置所述预定区域中承担无线功能的无线路由器的接入信息。
  12. 根据权利要求7至12中任一项所述的装置,还包括:
    更新模块,配置成周期性更新所述无线网络的接入信息。
  13. 一种计算机可读存储介质,存储有计算机可执行指令,所述计算机可执行指令配置成执行权利要求1-6中任一项所述的方法。
PCT/CN2017/112897 2016-12-16 2017-11-24 无线连接方法及装置 WO2018107952A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611170794.1 2016-12-16
CN201611170794.1A CN108207018A (zh) 2016-12-16 2016-12-16 无线连接方法及装置

Publications (1)

Publication Number Publication Date
WO2018107952A1 true WO2018107952A1 (zh) 2018-06-21

Family

ID=62557855

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/112897 WO2018107952A1 (zh) 2016-12-16 2017-11-24 无线连接方法及装置

Country Status (2)

Country Link
CN (1) CN108207018A (zh)
WO (1) WO2018107952A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818137A (zh) * 2020-06-24 2020-10-23 南京智鹤电子科技有限公司 绑定的方法及装置
CN112188593A (zh) * 2020-09-30 2021-01-05 海尔优家智能科技(北京)有限公司 无线配置方法及装置、存储介质、电子装置

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108601062B (zh) * 2018-06-29 2020-12-18 南京投知科技有限公司 WiFi连接共享方法、终端及计算机存储介质
CN115334128A (zh) * 2019-03-14 2022-11-11 西安艾润物联网技术服务有限责任公司 一种基于车载终端的车辆控制方法及终端
CN110769483B (zh) * 2019-12-30 2020-04-21 深圳市通恒伟创科技有限公司 基于物联网的共享上网方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104486755A (zh) * 2014-12-03 2015-04-01 北京京东尚科信息技术有限公司 基于ibeacon实现智能设备的WIFI 配置的系统和方法
CN104581615A (zh) * 2014-12-25 2015-04-29 小米科技有限责任公司 服务提供方法及装置
CN105530684A (zh) * 2014-09-28 2016-04-27 腾讯科技(深圳)有限公司 网络接入方法、装置和系统
CN105792317A (zh) * 2014-12-22 2016-07-20 中国电信股份有限公司 WiFi接入方法、装置及终端

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102572836B (zh) * 2010-12-20 2016-10-05 联想(北京)有限公司 接入无线网络的方法、便携移动终端以及无线网络系统
CN103731810B (zh) * 2013-12-31 2017-08-15 小米科技有限责任公司 接入点共享方法及装置
TW201546739A (zh) * 2014-06-10 2015-12-16 zhi-rong Peng 以電信整合iBeacon室內定位技術與資訊物流雲端平台的消費服務系統及其方法
US9544838B2 (en) * 2014-08-01 2017-01-10 Apple Inc. Detecting and connecting to Wi-Fi™ networks
CN104981000B (zh) * 2015-07-20 2018-06-08 陕西师范大学 一种隐身WiFi热点自动接入装置及方法
CN105357740B (zh) * 2015-09-23 2020-09-25 Tcl移动通信科技(宁波)有限公司 一种无线网络的接入方法及无线访问节点

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105530684A (zh) * 2014-09-28 2016-04-27 腾讯科技(深圳)有限公司 网络接入方法、装置和系统
CN104486755A (zh) * 2014-12-03 2015-04-01 北京京东尚科信息技术有限公司 基于ibeacon实现智能设备的WIFI 配置的系统和方法
CN105792317A (zh) * 2014-12-22 2016-07-20 中国电信股份有限公司 WiFi接入方法、装置及终端
CN104581615A (zh) * 2014-12-25 2015-04-29 小米科技有限责任公司 服务提供方法及装置

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818137A (zh) * 2020-06-24 2020-10-23 南京智鹤电子科技有限公司 绑定的方法及装置
CN112188593A (zh) * 2020-09-30 2021-01-05 海尔优家智能科技(北京)有限公司 无线配置方法及装置、存储介质、电子装置
CN112188593B (zh) * 2020-09-30 2023-06-16 海尔优家智能科技(北京)有限公司 无线配置方法及装置、存储介质、电子装置

Also Published As

Publication number Publication date
CN108207018A (zh) 2018-06-26

Similar Documents

Publication Publication Date Title
WO2018107952A1 (zh) 无线连接方法及装置
US10999064B2 (en) Network-based device registration for content distribution platforms
US10694449B2 (en) Method and apparatus for automatically detecting and connecting to Wi-Fi networks
US11070633B2 (en) Pre-association discovery of services
JP6066538B1 (ja) ピアベースの認証
US9001693B2 (en) Enhanced discovery procedures in peer-to-peer wireless local area networks (WLANs)
KR102150659B1 (ko) 위치 정보에 기반한 디바이스 검색 방법 및 장치
RU2632161C2 (ru) Способ и устройство для предоставления информации
US9648577B1 (en) ADSS enabled global roaming system
CA3005873A1 (en) Centralized access point provisioning system and methods of operation thereof
JP6756009B2 (ja) データ伝送
CN105432103A (zh) 接入网络辅助引导自举
US8954035B2 (en) Wi-Fi authentication by proxy
TW201349902A (zh) 無線網路中擴展服務集之轉移
JP6563416B2 (ja) 近接ベースのピアツーピアモバイルコンピューティング用のアプリケーションのユーザエクスペリエンスを向上させるシステムおよび方法
WO2017125025A1 (zh) 寻呼的方法、装置、系统及存储介质
TWI590693B (zh) 連網裝置的網路設定方法及系統
US20140105094A1 (en) Method and system for secure advertisements and wireless discovery of virtual controller based access point clusters
WO2016041440A1 (en) Method and system for broadcasting content to smart devices using a specialized gateway box
WO2019062632A1 (zh) 物理设备的配置方法及装置
WO2023202461A1 (zh) 控制跨域设备的方法、控制终端、服务器及系统
KR20150108596A (ko) 펨토셀 시스템 및 펨토셀 시스템에서의 펨토셀 관리 방법
Wolisz et al. Flexible Information Broadcasting using Beacon Stuffing in IEEE 802.11 Networks
JP2017531233A (ja) 複数のデータソースによって複数の周波数において生成されたデータ入力を同期させるための方法および装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17881887

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17881887

Country of ref document: EP

Kind code of ref document: A1