WO2018120553A1 - 一种网络共享方法及终端 - Google Patents

一种网络共享方法及终端 Download PDF

Info

Publication number
WO2018120553A1
WO2018120553A1 PCT/CN2017/082392 CN2017082392W WO2018120553A1 WO 2018120553 A1 WO2018120553 A1 WO 2018120553A1 CN 2017082392 W CN2017082392 W CN 2017082392W WO 2018120553 A1 WO2018120553 A1 WO 2018120553A1
Authority
WO
WIPO (PCT)
Prior art keywords
terminal
wireless network
network
bluetooth
information
Prior art date
Application number
PCT/CN2017/082392
Other languages
English (en)
French (fr)
Inventor
陶强
高光远
汤长伟
韩静
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780073316.5A priority Critical patent/CN109997378B/zh
Publication of WO2018120553A1 publication Critical patent/WO2018120553A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor

Definitions

  • the present application relates to the field of communications, and in particular, to a network sharing method and a terminal.
  • Wireless fidelity is a technology that connects a terminal to a network through an access point (AP) and provides wireless network access to the terminal.
  • the present application provides a method network sharing method and terminal, and aims to solve the problem of how to improve the coverage of Wi-Fi.
  • a first aspect of the present application provides a network sharing method, including: acquiring, by a first terminal, information of a wireless network, and transmitting information of the network to the second terminal.
  • the terminal accesses the wireless network through a Bluetooth connection. Because the first terminal sends the information of the wireless network to the second terminal, and according to the request for sharing the wireless network sent by the second terminal, sharing the wireless network with the second terminal through the Bluetooth personal area network function, so even
  • the second terminal is not in the coverage of the wireless network, and may also be accessed through the Bluetooth personal area network of the first terminal. It is equivalent to expanding the coverage of wireless networks.
  • a second aspect of the present application provides a terminal, where the terminal is a first terminal, and includes: a processor, configured to acquire information about a wireless network. And a communication component, configured to send information of the wireless network to the second terminal, and receive a request sent by the second terminal to share the wireless network.
  • the processor is further configured to enable a Bluetooth personal area network, where the Bluetooth personal area network is used by the second terminal to access the wireless network through a Bluetooth connection.
  • the terminal can use the Bluetooth personal area network to share the network for the second terminal. Even if the second terminal is not within the coverage of the wireless network, the terminal can access the wireless network through the Bluetooth personal area network of the first terminal. It is equivalent to expanding the coverage of wireless networks.
  • the first terminal sends the information of the wireless network to the second terminal, where the first terminal broadcasts a first message by using a Bluetooth, where the first message includes information of the wireless network.
  • the information of the wireless network includes the name of the wireless network and the physical address of the wireless network. Since Bluetooth is a common short-distance transmission method, and broadcasting the information of the wireless network through Bluetooth and sharing the wireless network using a Bluetooth personal area network, the technical implementation is uniform, and therefore, it has an advantage of being easy to implement.
  • the first message further includes: a signal strength of the wireless network detected by the first terminal.
  • the advantage of the transmitted signal strength is that the second terminal can display the signal strength in the list of wireless networks to provide reference information for the user to select the wireless network.
  • the receiving, by the first terminal, the request for sharing the wireless network by the second terminal includes: receiving, by the first terminal, a first request message sent by the second terminal, where the first terminal The request message carries a request code, and the function of the request code is to instruct the first terminal to verify whether the second terminal has the right to share the network through the Bluetooth. If the verification request code is invalid, the first terminal sends a first response message to the second terminal, where the first response message is used to indicate that the request of the second terminal is rejected.
  • the specific implementation manner of the first terminal to enable the Bluetooth personal area network is: if the request code is verified to be valid, the first terminal turns on the Bluetooth personal area network. The purpose of authentication is to improve the security of network sharing.
  • the method before the first terminal turns on the Bluetooth personal area network, the method further includes: the first terminal receiving the second request message sent by the second terminal, where the second request message carries the authentication request code
  • the function of the authentication request code is to request Bluetooth authentication. If the Bluetooth authentication succeeds, the first terminal sends a second response message to the second terminal, where the second response message carries a Bluetooth authentication success code, otherwise, the first terminal sends the second terminal to the second terminal. The message to reject the connection.
  • the purpose of authentication is to improve the security of network sharing.
  • the method before the first terminal turns on the Bluetooth personal area network, the method further includes: the first terminal receiving a password of the wireless network sent by the second terminal, where the first terminal receives The password is compared with the locally stored password to verify whether the password of the wireless network is correct. If not, the first terminal sends a message rejecting access to the network to the second terminal.
  • the specific manner in which the first terminal turns on the Bluetooth personal area network is: if the password of the wireless network is correct, the first terminal turns on the Bluetooth personal area network.
  • the purpose of password verification is to improve the security of network sharing.
  • a third aspect of the present application provides a network sharing method, including: receiving, by a second terminal, information of a wireless network sent by a first terminal, and sending a request for sharing the wireless network to the first terminal.
  • the second terminal accesses the wireless network by using a Bluetooth personal area network that is opened by the first terminal. Because the wireless personal network can be accessed through the Bluetooth personal area network opened by the first terminal, even if it is not within the coverage of the wireless network, the wireless network can be accessed, which is equivalent to expanding the coverage of the wireless network.
  • a fourth aspect of the present application provides a terminal, where the terminal is a second terminal, including: a processor, configured to receive information about a wireless network sent by the first terminal, and send the shared wireless network to the first terminal. And requesting access to the wireless network through a Bluetooth personal area network opened by the first terminal. Since the wireless personal network can be accessed through the Bluetooth personal area network opened by the first terminal, the wireless network can be accessed even if it is not within the coverage of the wireless network.
  • the receiving, by the second terminal, the information about the wireless network that is sent by the first terminal includes: receiving, by the second terminal, the first message by using a Bluetooth, where the first message includes information about the wireless network, where Description The information of the wireless network includes the name of the wireless network and the physical address of the wireless network.
  • the first message further includes: a first manner in which the first terminal accesses the wireless network, where the first mode is Wi-Fi.
  • the sending, by the second terminal, the request for sharing the wireless network to the first terminal includes: sending, by the second terminal, the first terminal to share the wireless network by using a Bluetooth mode A request message indicating that the wireless network is shared in a Bluetooth manner.
  • the method further includes: sending, by the second terminal, a second message to the third terminal
  • the second message includes information about the wireless network and a second mode in which the second terminal accesses the wireless network, where the second mode is Bluetooth.
  • the second terminal sends the information of the wireless network to the third terminal, so that the third terminal requests the second terminal to share the wireless network.
  • the method further includes: the second terminal receiving the second request message sent by the third terminal, where the second request message indicates The wireless network is shared with Wi-Fi hotspot functionality.
  • the second terminal turns on the Wi-Fi hotspot function of the local device, so that the third terminal accesses the wireless network by using the second terminal as an access point, so that the coverage of the wireless network can be further expanded.
  • the method further includes: the second terminal displaying the information of the wireless network in a list of the wireless network.
  • the purpose of displaying the information of the wireless network is to provide reference information for the user to select the wireless network.
  • the sending, by the second terminal, the request for sharing the wireless network to the first terminal includes: sending, by the second terminal, a first request message to the first terminal, where the first request message is carried a request code, the function of the request code is to instruct the first terminal to verify whether the second terminal has a right to share a network through Bluetooth.
  • the purpose of authentication is to improve the security of network sharing.
  • the method before the second terminal accesses the wireless network by using a Bluetooth personal area network that is enabled by the first terminal, the method further includes: the second terminal sending a second request to the first terminal The message, the second request message carries an authentication request code, to request the first terminal to perform Bluetooth authentication.
  • the purpose of authentication is to improve the security of network sharing.
  • the method before the second terminal accesses the wireless network by using the Bluetooth personal area network that is enabled by the first terminal, the method further includes: the second terminal displaying a prompt for inputting a password of the wireless network Block, after receiving the password of the wireless network, sending the password to the first terminal by using Bluetooth.
  • the purpose of password verification is to improve the security of network sharing.
  • FIG. 1 is a schematic diagram of an application scenario of a network sharing method according to an embodiment of the present disclosure
  • FIG. 2 is a schematic diagram of a network sharing method according to an embodiment of the present invention.
  • FIG. 3 is a schematic diagram of a second terminal displaying a network shared by a first terminal in a process of a network sharing method according to an embodiment of the present disclosure
  • FIG. 5 is a flowchart of still another network sharing method according to an embodiment of the present invention.
  • FIG. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
  • the router acts as an AP and provides a Wi-Fi network.
  • the radius of coverage of the Wi-Fi network is X.
  • the first terminal is within the coverage of the Wi-Fi network, and therefore, the Wi-Fi network can be accessed.
  • neither the second terminal nor the third terminal is in the coverage of the Wi-Fi network, and the Wi-Fi network cannot be accessed through the router.
  • Both the terminal and the router shown in Figure 1 follow the 802.11 protocol.
  • the technical solution disclosed in the embodiment of the present application is that the first terminal transmits the Wi-Fi signal, so that the second terminal that is not in the coverage of the Wi-Fi network accesses the Wi-Fi through the Bluetooth personal area network of the first terminal.
  • the third terminal that is not in the coverage of the Wi-Fi network negotiates the network access mode with the second terminal through the Bluetooth function, and in the case that the Bluetooth personal area network of the second terminal is occupied, the third terminal will The second terminal accesses the Wi-Fi network as a Wi-Fi hotspot.
  • S201 The first terminal acquires information of the Wi-Fi network.
  • the information of the Wi-Fi network includes but is not limited to: a name of the Wi-Fi network, a physical address of the Wi-Fi network, and a signal strength of the Wi-Fi network.
  • Wi-Fi network refers to a Wi-Fi network that is searched or connected by the first terminal.
  • S202 The first terminal sends the information of the Wi-Fi network to the second terminal.
  • the specific implementation process of S202 may include S2021-S2025:
  • the first terminal encapsulates the information of the Wi-Fi network into a scan result Scan Result data.
  • the data structure of the Scan Result data is:
  • the SSID indicates the name of the Wi-Fi network
  • the BSSID indicates the physical address of the Wi-Fi network
  • the level indicates the signal strength of the Wi-Fi network detected by the first terminal
  • the level is an optional parameter.
  • String represents the string type, and int represents the integer.
  • S2022 The first terminal broadcasts the first message by using Bluetooth, where the first message includes information of the Wi-Fi network.
  • the first message may include, but is not limited to, a manner in which the first terminal accesses the Wi-Fi network, and the method of accessing the Wi-Fi network is specifically Wi-Fi. Or Bluetooth.
  • the data structure of the message is:
  • the UUID is an identifier that indicates that the message carries information of the Wi-Fi network.
  • Special_ID1 and Access Method are key-value key-value pairs, Special_ID1 indicates the mode in which the first terminal accesses the Wi-Fi network, and Access Method indicates the value of Special_ID1, that is, the specific mode in which the first terminal accesses the Wi-Fi network, and the specific_ID1 is specific.
  • Special_ID2 and Scan Result are key-value pairs, Special_ID2 indicates information of the Wi-Fi network, and Scan Result is the value of Special_ID2, including the specific content of the information of the Wi-Fi network broadcast by the terminal.
  • the specific data structure of the Scan Result is as described above.
  • the message broadcast by the first terminal through Bluetooth is: UUID, Special_ID1, Wi-Fi, Special_ID2, ⁇ String SSID; String BSSID; int level; ⁇ .
  • the first terminal can broadcast a message carrying the information of the Wi-Fi network by using a low-power Bluetooth BLE.
  • the BLE interface start Advertising broadcast message can be invoked.
  • BLE broadcasts messages at regular intervals while accepting connection requests from other devices (low-power Bluetooth connections are instantaneous and only used to exchange real-time data). And low-power Bluetooth transmission distance is longer, up to 100m. So low-power Bluetooth can be used for message broadcast, device discovery, and instant messaging.
  • the first terminal may also use other short-range communication means to transmit information of the Wi-Fi network to the second terminal.
  • the first terminal uses the Bluetooth broadcast message, and the Bluetooth needs to be enabled first.
  • the first terminal may enable Bluetooth before S201 or S202, or enable Bluetooth after S201 or S2021, which is not limited.
  • S2023 The second terminal scans the Bluetooth signal, and if the Bluetooth signal sent by the first terminal is scanned, establishes a Bluetooth connection with the first terminal.
  • the second terminal receives the information in a corresponding manner.
  • NFC Near Field Communication
  • the second terminal scanning the Bluetooth signal is triggered by an instruction to search the Wi-Fi network, for example, the operation of the user on the second terminal generates an instruction to search for the Wi-Fi network, and the second terminal starts scanning the Bluetooth signal according to the instruction.
  • the second terminal periodically scans the Bluetooth signal automatically.
  • S2024 The second terminal receives the first message broadcast by the first terminal by using Bluetooth.
  • S2025 The second terminal obtains information of the Wi-Fi network by parsing the first message.
  • the first message received by the second terminal is: UUID, Special_ID1, Wi-Fi, Special_ID2, ⁇ String SSID; String BSSID; int level; ⁇ , and the UUID is parsed to confirm the information received by the Wi-Fi network.
  • Special_ID1 Wi-Fi obtains the manner in which the first terminal accesses the Wi-Fi network, and obtains the name of the Wi-Fi network according to Special_ID2, ⁇ String SSID; String BSSID; int level; ⁇ , Physical address and signal strength.
  • the second terminal receives the information of the Wi-Fi network sent by the first terminal.
  • S203 The second terminal displays information of the Wi-Fi network.
  • the second terminal displays the information of the Wi-Fi network in the local Wi-Fi network list.
  • the specific implementation manner includes S2031-S2032:
  • the second terminal calculates the relative signal strength by combining the signal strength of the Bluetooth and the signal strength of the Wi-Fi network.
  • Methods for calculating the relative signal strength include, but are not limited to, multiplying the strength of the Bluetooth signal by the signal strength of the Wi-Fi network to obtain a relative signal strength.
  • the relative signal strength is the parameter level in the Scan Result data.
  • the second terminal displays the information of the parsed Wi-Fi network into a local Wi-Fi network list, and optionally displays a relative signal strength.
  • a terminal broadcasts information of the Wi-Fi network through Bluetooth. After the second terminal receives the information of the Wi-Fi network and displays it in the Wi-Fi list, the second terminal also displays a Wi-Fi network named "123". .
  • the user can select to connect to the Wi-Fi network on the second terminal. As shown in FIG. 4, the user can select the Wi-Fi network "123" from the list of Wi-Fi networks. A connection is made to trigger a process in which the second terminal connects to the Wi-Fi network through Bluetooth technology.
  • S203 is an optional step, that is, the second terminal may also directly display the process of connecting to the received Wi-Fi network through Bluetooth technology without displaying the information of the received Wi-Fi network. .
  • S204 The second terminal sends a request for sharing the Wi-Fi network to the first terminal.
  • the first terminal accesses the Wi-Fi network by using Wi-Fi, so The second terminal requests the first terminal to access the Wi-Fi network in a Bluetooth manner.
  • the second terminal may also request the first terminal to access the Wi-Fi network in a Bluetooth manner without performing the foregoing determination.
  • the second terminal only requests the shared Wi-Fi network from the first terminal, and does not specify to share in Bluetooth or Wi-Fi mode.
  • the specific implementation manner of S204 is: the second terminal sends a first request message to the first terminal, where the first request message carries the request code, and the function of the request code is whether the second terminal has the right to share the network through the Bluetooth.
  • the request code is preset and can be customized by the user.
  • the request code can be a combination of symbols and/or values.
  • the first terminal turns on a Bluetooth personal area networking, and establishes a Bluetooth connection with the second terminal.
  • Bluetooth personal area network is a technology that shares the network by Bluetooth. After the Bluetooth personal area network is turned on, substantially, the link layer of the second terminal is transferred to the Bluetooth module of the second terminal, and the data received through the Bluetooth module can be forwarded to the Wi-Fi network through the link layer, from the Wi -Fi network received data, also available via Bluetooth The module forwards it out.
  • the specific implementation manner of the S205 may be: the first terminal turns on the Bluetooth personal area network by turning on the “Bluetooth Network Sharing” switch of the local device.
  • the second terminal turns on the Bluetooth and the first terminal pairing (as described above, if the second terminal and the first terminal have already sent the message using Bluetooth, it indicates that the Bluetooth pairing has been performed, then the step of skipping the Bluetooth pairing here, if the If a terminal does not establish a Bluetooth connection with the second terminal, pairing is required, and the "access network" switch of the Bluetooth network between the first terminal and the first terminal is started, that is, a Bluetooth connection is established with the second terminal.
  • the first terminal starts the Bluetooth personal area network function and establishes a Bluetooth connection with the second terminal if the verification request code is legal. (If the first terminal and the second terminal have established a Bluetooth connection before, the third terminal does not execute. The step of establishing a Bluetooth connection), if the verification request code is invalid, the first terminal sends a first response message to the second terminal, where the first response message is used to indicate that the request of the second terminal is rejected.
  • the second terminal accesses the Wi-Fi network by using a Bluetooth connection with the first terminal.
  • the first terminal if the first terminal does not access the Wi-Fi network before S206, the first terminal first needs to access the Wi-Fi network before the second terminal establishes the Bluetooth connection.
  • the Wi-Fi network is accessed through the Bluetooth personal area network of the first terminal. It is equivalent to expanding the coverage of Wi-Fi networks.
  • This way of sharing the network through Bluetooth can be realized only by using the Bluetooth function of the terminal, which can save power and have lower radiation than the existing method of increasing the transmission power of the hot spot.
  • FIG. 4 is still another network sharing method disclosed in the embodiment of the present application. Compared with FIG. 2, the difference is that the first terminal performs Bluetooth authentication on the second terminal before the Bluetooth personal area networking function is enabled. And/or verification of Wi-Fi passwords.
  • S405 The second terminal sends a second request message to the first terminal by using a Bluetooth mode based on a Generic Attribute Profile gatt, where the second request message carries an authentication request code to request the first terminal to perform Bluetooth authentication.
  • the role of the authentication request code is to request Bluetooth authentication.
  • the authentication code is preset and can be customized by the user.
  • the authentication code can be a combination of symbols and/or values.
  • the Generic Attribute Profile gatt is a low-power Bluetooth protocol.
  • the first terminal sends a second response message to the second terminal, where the second response message carries a Bluetooth authentication success code. Otherwise, the first terminal sends a message rejecting the connection to the second terminal.
  • the success code is used to indicate that the Bluetooth authentication is successful, and the success code is preset, and can be customized by the user.
  • the success code can be a combination of symbols and/or values.
  • Bluetooth authentication is that the first terminal confirms that the second terminal has the right to connect with the Bluetooth to improve the security of the communication.
  • S405-S406 is only an implementation method for Bluetooth function authentication between terminals, and second The terminal and the first terminal can also use other methods for Bluetooth function authentication.
  • the verification process of the Wi-Fi password is as shown in S407-S408:
  • the second terminal displays a prompt box for inputting a password of the Wi-Fi network, and after receiving the password of the Wi-Fi network, sends the password to the first terminal through the Bluetooth.
  • the second terminal may send a password to the first terminal by using a Bluetooth mode based on a Generic Attribute Profile gatt.
  • the password for the Wi-Fi network can be entered by the user in the prompt box.
  • the first terminal verifies whether the password of the Wi-Fi network is correct by comparing the received password with the locally stored password. If correct, the first terminal turns on the bluetooth personal area networking function, and the first The second terminal establishes a Bluetooth connection (if the first terminal and the second terminal have previously established a Bluetooth connection, the step of establishing a Bluetooth connection is not performed), otherwise, the second terminal is sent a message denying access to the network.
  • the message denying access to the network may be a message indicating that the Wi-Fi network has a wrong password.
  • S407 and S408 can be skipped.
  • the second terminal may send the account information to the first terminal, and if the account information of the second terminal is the same as the account information of the first terminal (for example, the first terminal and the second terminal log in to the same social account), Pass S407 and S408.
  • the second terminal may send the SIM card information to the first terminal, and if the SIM card of the second terminal is associated with the SIM card of the first terminal (for example, the relationship between the primary card and the secondary card), the S407 may also be skipped. And S408.
  • the other steps in FIG. 4 are the same as those in FIG. 3 and will not be described again here.
  • FIG. 5 is another network sharing disclosed in the embodiment of the present application. Compared with the method shown in FIG. 2 or FIG. 4, the main difference is that because the second terminal accesses the Wi-Fi network by using the Bluetooth personal area network, the Bluetooth personal area network function of the second terminal is occupied, and cannot be used again.
  • the Wi-Fi network is shared with the third terminal using the Bluetooth personal area network, and therefore, the second terminal shares the Wi-Fi network with the third terminal as a hotspot.
  • Figure 5 includes the following steps:
  • S501 The second terminal acquires information of the Wi-Fi network.
  • S502 The second terminal sends the information of the Wi-Fi network to the third terminal.
  • the Method is Bluetooth.
  • S503 The third terminal displays information of the Wi-Fi network.
  • S504 The third terminal sends a request for sharing the Wi-Fi network to the second terminal.
  • the second terminal accesses the Wi-Fi network by using the Bluetooth mode. Therefore, the third terminal requests the second terminal to use the Wi-Fi network. -Fi hotspot mode to access Wi-Fi network.
  • the third terminal may also request the Wi-Fi hotspot directly to the second terminal without performing the foregoing determination. Access to the Wi-Fi network. Alternatively, the third terminal only requests the shared Wi-Fi network from the second terminal, and does not specify the manner (Bluetooth or Wi-Fi mode) to share.
  • S505 The second terminal starts the Wi-Fi hotspot function.
  • the second terminal may first determine whether the Bluetooth personal area network function of the local device is occupied, and if yes, the second terminal turns on the Wi- Fi hotspot feature.
  • the third terminal connects the second terminal as a Wi-Fi hotspot to access the Wi-Fi network.
  • the second terminal after the second terminal accesses the Wi-Fi network that is not in the coverage area through the Bluetooth personal area network, the second terminal can also use the local device as the third terminal through the Wi-Fi hotspot function of the local device. Access to the hotspot of the Wi-Fi network.
  • the coverage radius of the Wi-Fi network is X
  • the broadcast range of the Bluetooth is Y.
  • the radius of the coverage of the Wi-Fi network can be extended to X+Y through the broadcast of the first terminal.
  • the wireless function of each terminal can realize the infinite expansion of the coverage of the Wi-Fi network.
  • the attenuation range of the signal attenuation can be considered to achieve a balance between the user experience and the extended range.
  • the manner of searching for a Wi-Fi network using Bluetooth broadcast is the same.
  • the terminal has used the Bluetooth personal area network to enter the Wi-Fi network. If so, because the Bluetooth shared network is occupied, you need to share the network through the Wi-Fi hotspot. If not, The network can be shared using a Bluetooth personal area network.
  • FIG. 6 is a terminal according to an embodiment of the present disclosure, including: a transceiver and a processor, where the transceiver includes a Bluetooth component and a Wi-Fi component.
  • the Bluetooth component is used to implement the steps of transmitting and receiving through Bluetooth in FIG. 2, FIG. 4 and FIG. 5 and the function of the Bluetooth personal area network
  • the Wi-Fi component is used to implement Wi-Fi network access through the router Wi-Fi hotspot and other
  • the terminal provides the function of a Wi-Fi hotspot.
  • the processor is configured to implement steps in addition to the functions of the communication component in FIGS. 2, 4, and 5, and to control the Bluetooth component and the Wi-Fi component to implement the above functions of the Bluetooth component and the Wi-Fi component, respectively. That is to say, the terminal shown in FIG. 6 may be the first terminal or the second terminal, or may be a terminal that combines the functions of the first terminal and the second terminal.
  • the terminal shown in FIG. 6 may further include a memory for storing an application and data generated by the processor during execution of the application.
  • the terminal shown in FIG. 6 may further include a radio frequency (RF) circuit that can integrate the wireless communication transmission function circuit and the reception function circuit.
  • RF circuits include, but are not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • the RF circuitry can communicate with the network and other devices via wireless communication.
  • the wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code). Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), Electronics Mail, Short Messaging Service (SMS), etc.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the processor may be composed of an integrated circuit (IC), for example, may be composed of a single packaged IC, or may be composed of a plurality of packaged ICs that have the same function or different functions.
  • the processor may include only a central processing unit (CPU), or may be a GPU, a digital signal processor (DSP), and a control chip in the communication unit (for example, a baseband chip). )The combination.
  • the CPU may be a single operation core, and may also include multiple operation cores.
  • the memory can be used to store software programs and modules, and the processor performs the steps in addition to the functions of the communication components in FIGS. 2, 4, and 5 by running software programs and modules stored in the storage unit.
  • the memory mainly includes a program storage area and a data storage area, wherein the program storage area can store an operating system, an application required for at least one function, and the like.
  • the data storage area can store data and the like generated during the running of the program.
  • the storage unit may include a volatile memory, such as non-volatile volatile random access memory (NVRAM), phase change random access memory (PRAM), magnetic Resistive random access memory (MRAM), etc., may also include non-volatile memory, such as at least one disk storage device, Electronically Erasable Programmable Read-Only Memory (EEPROM) Flash memory devices, such as NOR flash memory or NAND flash memory.
  • NVRAM non-volatile volatile random access memory
  • PRAM phase change random access memory
  • MRAM magnetic Resistive random access memory
  • EEPROM Electronically Erasable Programmable Read-Only Memory
  • the terminal may also include other input devices, sensors, display screens, and I/O subsystems.
  • the I/O subsystem includes controllers, sensor controllers, and display controllers for other input devices.
  • Wi-Fi Wireless Fidelity
  • Bluetooth Wireless Fidelity

Abstract

本申请提供了一种网络共享方法和终端。第一终端获取无线网络的信息,并将所述网络的信息发给第二终端。所述第一终端接收所述第二终端发送的共享所述无线网络的请求,所述第一终端开启蓝牙个人局域网功能,所述蓝牙个人局域网功能用于所述第二终端与所述第一终端通过蓝牙连接接入所述无线网络。因为第一终端将无线网络的信息发给第二终端,并依据所述第二终端发送的共享所述无线网络的请求,通过蓝牙个人局域网功能与所述第二终端共享无线网络,所以,即使第二终端不在无线网络的覆盖范围内,也可以通过第一终端的蓝牙个人局域网接入该无线网络。相当于扩大了无线网络的覆盖范围。

Description

一种网络共享方法及终端
本申请要求于2016年12月30日提交中国专利局、申请号为201611263410.0、发明名称为“一种提高WiFi信号覆盖范围的方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信领域,尤其涉及一种网络共享方法及终端。
背景技术
无线高保真(wireless fidelity,Wi-Fi)是一种通过接入点(access point,AP)将终端接入网络的技术,能够为终端提供无线的网络接入。
然而,因为Wi-Fi网络的覆盖范围有限,不在Wi-Fi网络的覆盖范围内的终端无法接入该Wi-Fi网络。所以,如何提高Wi-Fi网络的覆盖范围,成为目前亟待解决的问题。
发明内容
本申请提供了一种方法网络共享方法及终端,目的在于解决如何提高Wi-Fi的覆盖范围的问题。
为了实现上述目的,本申请提供了以下技术方案:
本申请的第一方面提供了一种网络共享方法,包括:第一终端获取无线网络的信息,并将所述网络的信息发给第二终端。所述第一终端接收所述第二终端发送的共享所述无线网络的请求,所述第一终端开启蓝牙个人局域网功能,所述蓝牙个人局域网功能用于所述第二终端与所述第一终端通过蓝牙连接接入所述无线网络。因为第一终端将无线网络的信息发给第二终端,并依据所述第二终端发送的共享所述无线网络的请求,通过蓝牙个人局域网功能与所述第二终端共享无线网络,所以,即使第二终端不在无线网络的覆盖范围内,也可以通过第一终端的蓝牙个人局域网接入该无线网络。相当于扩大了无线网络的覆盖范围。
本申请的第二方面提供了一种终端,所述终端为第一终端,包括:处理器,用于获取无线网络的信息。通信组件,用于将所述无线网络的信息发给第二终端,并接收所述第二终端发送的共享所述无线网络的请求。所述处理器还用于,开启蓝牙个人局域网,所述蓝牙个人局域网用于所述第二终端与所述终端通过蓝牙连接接入所述无线网络。所述终端能够使用蓝牙个人局域网为第二终端共享网络,即使第二终端不在无线网络的覆盖范围内,也可以通过第一终端的蓝牙个人局域网接入该无线网络。相当于扩大了无线网络的覆盖范围。
在一个实现方式中,所述第一终端将所述无线网络的信息发给第二终端包括:所述第一终端使用蓝牙广播第一消息,所述第一消息中包括所述无线网络的信息,所述 无线网络的信息包括所述无线网络的名称和所述无线网络的物理地址。因为蓝牙是一种常见的近距离传输方式,并且,通过蓝牙广播所述无线网络的信息和使用蓝牙个人局域网共享所述无线网络,在技术实现上具有一致性,所以,具有易于实现的优势。
在一个实现方式中,所述第一消息中还包括:所述第一终端检测到的所述无线网络的信号强度。发送信号强度的优势在于,以便于第二终端可以将信号强度显示在无线网络的列表中,为用户选择无线网络提供参考信息。
在一个实现方式中,所述第一终端接收所述第二终端发送的共享所述无线网络的请求包括:所述第一终端接收所述第二终端发送的第一请求消息,所述第一请求消息中携带请求码,请求码的功能为指示第一终端验证第二终端是否具有通过蓝牙共享网络的权限。如果验证请求码不合法,第一终端向第二终端发送第一响应消息,第一响应消息用于指示拒绝第二终端的请求。所述第一终端开启蓝牙个人局域网的具体实现方式为:如果验证所述请求码合法,所述第一终端开启蓝牙个人局域网。鉴权的目的在于提高网络共享的安全性。
在一个实现方式中,在所述第一终端开启蓝牙个人局域网之前,还包括:所述第一终端接收所述第二终端发送的第二请求消息,所述第二请求消息携带鉴权请求码,所述鉴权请求码的作用为请求进行蓝牙鉴权。如果蓝牙鉴权成功,所述第一终端向所述第二终端发送第二响应消息,所述第二响应消息携带蓝牙鉴权成功码,否则,所述第一终端向所述第二终端发送拒绝连接的消息。鉴权的目的在于提高网络共享的安全性。
在一个实现方式中,在所述第一终端开启蓝牙个人局域网之前,还包括:所述第一终端接收所述第二终端发送的所述无线网络的密码,所述第一终端通过将接收到的所述密码与本地存储的密码相比较,验证所述无线网络的密码是否正确,如果不正确,所述第一终端向所述第二终端发送拒绝接入网络的消息。所述第一终端开启蓝牙个人局域网的具体方式为:如果所述无线网络的密码正确,所述第一终端开启蓝牙个人局域网。密码验证的目的在于提高网络共享的安全性。
本申请的第三方面提供了一种网络共享方法,包括:第二终端接收第一终端发送的无线网络的信息,并向所述第一终端发送共享所述无线网络的请求。所述第二终端通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络。因为可以通过第一终端开启的蓝牙个人局域网接入无线网络,所以,即使不在无线网络的覆盖范围内,也可以接入无线网络,相当于扩大了无线网络的覆盖范围。
本申请的第四方面提供了一种终端,所述终端为第二终端,包括:处理器,用于接收第一终端发送的无线网络的信息,向所述第一终端发送共享所述无线网络的请求,并通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络。因为可以通过第一终端开启的蓝牙个人局域网接入无线网络,所以,即使不在无线网络的覆盖范围内,也可以接入无线网络。
在一个实现方式中,所述第二终端接收第一终端发送的无线网络的信息包括:所述第二终端通过蓝牙接收第一消息,所述第一消息中包括所述无线网络的信息,所述 无线网络的信息包括所述无线网络的名称和所述无线网络的物理地址。
在一个实现方式中,所述第一消息中还包括:所述第一终端接入所述无线网络的第一方式,所述第一方式为Wi-Fi。
在一个实现方式中,所述第二终端向所述第一终端发送共享所述无线网络的请求包括:所述第二终端向所述第一终端发送第一以蓝牙方式共享所述无线网络的请求消息,所述第一请求消息指示以蓝牙方式共享所述无线网络。
在一个实现方式中,在所述第二终端通过与所述第一终端间建立的蓝牙个人局域网,接入所述无线网络之后,还包括:所述第二终端向第三终端发送第二消息,所述第二消息中包括所述无线网络的信息和所述第二终端接入所述无线网络的第二方式,所述第二方式为蓝牙。第二终端将所述无线网络的信息发给第三终端,以便于第三终端向第二终端请求共享所述无线网络。
在一个实现方式中,在所述第二终端向第三终端发送第二消息之后,还包括:所述第二终端接收所述第三终端发送的第二请求消息,所述第二请求消息指示以Wi-Fi热点功能共享所述无线网络。所述第二终端开启本机的Wi-Fi热点功能,使得所述第三终端将所述第二终端作为接入点,接入所述无线网络,因此能够进一步扩大无线网络的覆盖范围。
在一个实现方式中,在所述第二终端接收第一终端发送的无线网络的信息之后,还包括:所述第二终端在无线网络的列表中显示所述无线网络的信息。显示所述无线网络的信息的目的在于,为用户选择所述无线网络提供参考信息。
在一个实现方式中,所述第二终端向所述第一终端发送共享所述无线网络的请求包括:所述第二终端向第一终端发送第一请求消息,所述第一请求消息中携带请求码,所述请求码的功能为指示所述第一终端验证所述第二终端是否具有通过蓝牙共享网络的权限。鉴权的目的在于提高网络共享的安全性。
在一个实现方式中,在所述第二终端通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络之前,还包括:所述第二终端向所述第一终端发送第二请求消息,所述第二请求消息携带鉴权请求码,以请求第一终端进行蓝牙鉴权。鉴权的目的在于提高网络共享的安全性。
在一个实现方式中,在所述第二终端通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络之前,还包括:所述第二终端显示输入所述无线网络的密码的提示框,在接收到所述无线网络的密码后,通过蓝牙向所述第一终端发送所述密码。密码验证的目的在于提高网络共享的安全性。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本发明实施例公开的网络共享方法的应用场景的示意图;
图2为本发明实施例公开的一种网络共享方法图;
图3为本发明实施例公开的一种网络共享方法过程中,第二终端显示第一终端共享的网络的示意图;
图4为本发明实施例公开的又一种网络共享方法的流程图;
图5为本发明实施例公开的又一种网络共享方法的流程图;
图6为本发明实施例公开的一种终端的结构示意图。
具体实施方式
如图1所示,路由器作为AP,提供Wi-Fi网络,Wi-Fi网络的覆盖范围的半径为X。第一终端在Wi-Fi网络的覆盖范围内,因此,可以接入该Wi-Fi网络。但是,第二终端和第三终端均不在该Wi-Fi网络的覆盖范围内,也就无法通过路由器接入该Wi-Fi网络。图1中所示的终端和路由器均遵循802.11协议。
本申请实施例公开的技术方案的目的在于,第一终端传递Wi-Fi信号,使得不在Wi-Fi网络的覆盖范围内的第二终端,通过第一终端的蓝牙个人局域网接入该Wi-Fi网络,进一步的,不在Wi-Fi网络的覆盖范围内的第三终端通过蓝牙功能与第二终端协商网络接入方式,在第二终端的蓝牙个人局域网被占用的情况下,第三终端将第二终端作为Wi-Fi热点接入该Wi-Fi网络。
图2为图1所示的终端1向终端2共享网络的具体过程,包括以下步骤:
S201:第一终端获取Wi-Fi网络的信息。
具体的,Wi-Fi网络的信息包括但不限于:Wi-Fi网络的名称、Wi-Fi网络的物理地址和Wi-Fi网络的信号强度。
具体的,S201中所述的“Wi-Fi网络”是指,第一终端搜索到的或者已连接的Wi-Fi网络。
S202:第一终端将Wi-Fi网络的信息发给第二终端。
可选的,S202的具体实现过程可以包括S2021-S2025:
S2021:第一终端将Wi-Fi网络的信息封装成浏览结果Scan Result数据。
Scan Result数据的数据结构为:
Figure PCTCN2017082392-appb-000001
其中,SSID表示Wi-Fi网络的名称,BSSID表示Wi-Fi网络的物理地址,level表示第一终端检测到的Wi-Fi网络的信号强度,level为可选参数。String表示字符串类型,int表示整型。
S2022:第一终端使用蓝牙广播第一消息,第一消息中包括Wi-Fi网络的信息。
除了Wi-Fi网络的信息之外,可选的,第一消息中还可以包括但不限于:第一终端接入Wi-Fi网络的方式,接入Wi-Fi网络的方式具体为Wi-Fi或蓝牙。
具体的,如表1所示,消息的数据结构为:
表1
Figure PCTCN2017082392-appb-000002
其中,UUID为标志符,标志该消息携带Wi-Fi网络的信息。Special_ID1和Access Method为键-值key-value对,Special_ID1表示第一终端接入Wi-Fi网络的方式,Access Method表示Special_ID1的值,即第一终端接入Wi-Fi网络的具体方式,Special_ID1具体为Wi-Fi或蓝牙。Special_ID2和Scan Result为key-value对,Special_ID2表示Wi-Fi网络的信息,Scan Result为Special_ID2的值,包括终端广播的Wi-Fi网络的信息的具体内容,Scan Result的具体数据结构如前述。
举例说明,本实施例中,第一终端通过蓝牙广播的消息为:UUID,Special_ID1,Wi-Fi,Special_ID2,{String SSID;String BSSID;int level;}。
第一终端可以使用低功耗的蓝牙BLE广播携带Wi-Fi网络的信息的消息,具体的,可以调用BLE接口start Advertising广播消息。BLE周期间隔地广播消息,同时可以接受来自其它设备的连接请求(低功耗蓝牙的连接是即时短暂的,只用于交换即时数据)。并且低功耗蓝牙的传输距离更长,可达100m。所以低功耗蓝牙可以用于消息广播、设备发现以及即时消息传输。除了蓝牙方式之外,第一终端也可以使用其它近距离通信手段向第二终端发送Wi-Fi网络的信息。
需要说明的是,第一终端使用蓝牙广播消息,需要先开启蓝牙,本实施例中,第一终端可以在S201或S202之前开启蓝牙,也可以在S201或S2021之后开启蓝牙,并不做限定。
S2023:第二终端扫描蓝牙信号,如果扫描到第一终端发出的蓝牙信号,则与第一终端建立蓝牙连接。
可选的,如果第一终端使用其它近距离通信手段例如近场通信(Near Field Communication,NFC)等向第二终端发送Wi-Fi网络的信息,则第二终端使用相应的方式接收。
可选的,第二终端扫描蓝牙信号由搜索Wi-Fi网络的指令触发,例如,用户在第二终端上的操作生成搜索Wi-Fi网络的指令,第二终端依据该指令开始扫描蓝牙信号。或者,第二终端周期性地自动扫描蓝牙信号。
S2024:第二终端接收第一终端通过蓝牙广播的第一消息。
S2025:第二终端通过解析第一消息,得到Wi-Fi网络的信息。
举例说明,第二终端接收到的第一消息为:UUID,Special_ID1,Wi-Fi,Special_ID2,{String SSID;String BSSID;int level;},解析出UUID,则确认接收到Wi-Fi网络的信息,依据Special_ID1,Wi-Fi获得第一终端接入Wi-Fi网络的方式,依据Special_ID2,{String SSID;String BSSID;int level;}获得Wi-Fi网络的名称、 物理地址和信号强度。
至此,第二终端接收到第一终端发送的Wi-Fi网络的信息。
S203:第二终端显示Wi-Fi网络的信息。
具体的,第二终端将Wi-Fi网络的信息显示在本地Wi-Fi网络列表中,可选的,具体实现方式包括S2031-S2032:
S2031:第二终端结合蓝牙的信号强度和Wi-Fi网络的信号强度,计算相对信号强度。
计算相对信号强度的方法包括但不限于:将蓝牙信号的强度与Wi-Fi网络的信号强度相乘,得到相对信号强度。相对信号强度为即为Scan Result数据中的参数level。
S2032:第二终端将解析出的Wi-Fi网络的信息显示到本地的Wi-Fi网络列表中,可选的,显示相对信号强度。
图3为第一终端和第二终端上显示的Wi-Fi网络的列表,其中,第一终端上显示搜索到家庭路由器创建的名称为“123”的Wi-Fi网络,在执行上述步骤:第一终端通过蓝牙广播Wi-Fi网络的信息,第二终端接收到Wi-Fi网络的信息后,显示在Wi-Fi列表中后,第二终端上也显示名称为“123”的Wi-Fi网络。
第二终端在搜索到Wi-Fi网络后,用户可在第二终端上选择连接Wi-Fi网络,以图4为例,用户可以从Wi-Fi网络的列表中选择Wi-Fi网络“123”进行连接,从而触发第二终端通过蓝牙技术连接到Wi-Fi网络的过程。
需要说明的是,S203为可选步骤,也就是说,第二终端也可以不显示接收到的Wi-Fi网络的信息,而直接自动发起通过蓝牙技术连接到接收到的Wi-Fi网络的过程。
以下将对第二终端通过蓝牙连接到Wi-Fi网络的过程进行说明。
S204:第二终端向第一终端发送共享Wi-Fi网络的请求。
可选的,如果S2022接收到的第一消息中包括Special_ID1和Access Method键-值对,且Access Method为Wi-Fi,则说明第一终端通过Wi-Fi方式接入Wi-Fi网络,所以,第二终端向第一终端请求以蓝牙方式接入Wi-Fi网络。
可选的,第二终端也可以不进行上述判定,而直接向第一终端请求以蓝牙方式接入Wi-Fi网络。
或者,可选的,第二终端仅向第一终端请求共享Wi-Fi网络,而不规定以蓝牙或者Wi-Fi方式共享。
可选的,S204的具体实现方式为:第二终端向第一终端发送第一请求消息,第一请求消息中携带请求码,请求码的功能为第二终端是否具有通过蓝牙共享网络的权限。所述请求码预先设置,可以由用户自定义,例如,请求码可以为符号和/或数值的组合。
S205:第一终端开启蓝牙个人局域网(Bluetooth personal area networking),并与第二终端建立蓝牙连接。
蓝牙个人局域网是一种通过蓝牙方式共享网络的技术。在开启蓝牙个人局域网后,实质上,第二终端的链路层转接到第二终端的蓝牙模块上,通过蓝牙模块接收的数据,可以通过链路层转发到Wi-Fi网络中,从Wi-Fi网络接收到的数据,也可以通过蓝牙 模块转发出去。
S205的具体实现方式可以为:第一终端通过开启本机的“蓝牙网络共享”开关,开启蓝牙个人局域网。第二终端开启蓝牙和第一终端配对(如前所述,如果第二终端与第一终端已经使用蓝牙发送过消息,则说明已经进行过蓝牙配对,则这里跳过蓝牙配对的步骤,如果第一终端与第二终端没有建立蓝牙连接,则需要进行配对),并且开启与第一终端之间的蓝牙网络的“访问网络”开关,即与第二终端建立蓝牙连接。
可选的,第一终端在验证请求码合法的情况下,开启蓝牙个人局域网功能,并与第二终端建立蓝牙连接(如果之前第一终端与第二终端已经建立了蓝牙连接,则不再执行建立蓝牙连接的步骤),如果验证请求码不合法,第一终端向第二终端发送第一响应消息,第一响应消息用于指示拒绝第二终端的请求。
S206:第二终端通过与第一终端的蓝牙连接,接入Wi-Fi网络。
需要说明的是,如果第一终端在S206之前,还没有接入Wi-Fi网络,则在S206第二终端建立蓝牙连接之前,第一终端要先接入Wi-Fi网络。
从图2可以看出,虽然第二终端不在Wi-Fi网络的覆盖范围内,但是通过第一终端的蓝牙个人局域网接入该Wi-Fi网络。相当于扩大了Wi-Fi网络的覆盖范围。
这种通过蓝牙共享网络的方式,仅利用终端的蓝牙功能即可实现,与现有的提高热点的发送功率的方式相比,能够节省功率,且具有较低的辐射。与现有的通过改进Wi-Fi芯片以使用Wi-Fi芯片作为中继的方式相比,因为不用升级硬件,所以具有较好的可实施性和较低的成本。
图4为本申请实施例公开的又一种网络共享方法,与图2相比,区别在于:第一终端在开启蓝牙个人局域网(Bluetooth personal area networking)功能之前,对第二终端进行蓝牙鉴权和/或Wi-Fi密码的验证。
蓝牙鉴权的具体实现方式如S405-S2042:
S405:第二终端使用基于通用属性配置文件(Generic Attribute Profile gatt)的蓝牙方式向第一终端发送第二请求消息,第二请求消息携带鉴权请求码,以请求第一终端进行蓝牙鉴权。
鉴权请求码的作用为请求进行蓝牙鉴权。鉴权码预先设置,可以由用户自定义。例如,鉴权码可以为符号和/或数值的组合。
通用属性配置文件(Generic Attribute Profile gatt)是一种低功耗的蓝牙协议。
S406:如果蓝牙鉴权成功,第一终端向第二终端发送第二响应消息,第二响应消息携带蓝牙鉴权成功码,否则,第一终端向第二终端发送拒绝连接的消息。
成功码的作用为指示蓝牙鉴权成功,成功码预先设置,可以由用户自定义,例如,成功码可以为符号和/或数值的组合。
蓝牙鉴权的目的在于,第一终端确认第二终端具有使用蓝牙与其连接的权限,以提高通信的安全性。S405-S406仅为终端之间进行蓝牙功能鉴权的一种实现方式,第二 终端和第一终端也可以使用其它方式进行蓝牙功能鉴权。
Wi-Fi密码的验证过程如S407-S408:
S407:第二终端显示输入Wi-Fi网络的密码的提示框,在接收到Wi-Fi网络的密码后,通过蓝牙向第一终端发送密码。
具体的,第二终端可以使用基于通用属性配置文件(Generic Attribute Profile gatt)的蓝牙方式向第一终端发送密码。
Wi-Fi网络的密码可以由用户在提示框中输入。
S408:第一终端通过将接收到的密码与本地存储的密码相比较,验证Wi-Fi网络的密码是否正确,如果正确,第一终端开启蓝牙个人局域网(bluetooth personal area networking)功能,并与第二终端建立蓝牙连接(如果之前第一终端与第二终端已经建立了蓝牙连接,则不再执行建立蓝牙连接的步骤),否则,向第二终端发送拒绝接入网络的消息。
拒绝接入网络的消息可以为提示Wi-Fi网络的密码错误的消息。
如果Wi-Fi网络无需密码,则可跳过S407和S408。
或者,第二终端可以向第一终端发送账号信息,如果第二终端的账号信息与第一终端的账号信息相同(例如第一终端与第二终端登陆了相同的社交账号),则也可以跳过S407和S408。
或者,第二终端可以向第一终端发送SIM卡信息,如果第二终端的SIM卡与第一终端的SIM卡相关联(例如,为主卡和副卡的关系),则也可以跳过S407和S408。图4中的其它步骤均与图3相同,这里不再赘述。
图1所示的第二终端在接入Wi-Fi网络后,第三终端可以通过第二终端的共享,接入该Wi-Fi网络,图5为本申请实施例公开的又一种网络共享方法,与图2或图4所示的方法相比,主要区别为:因为第二终端使用蓝牙个人局域网接入Wi-Fi网络,所以,第二终端的蓝牙个人局域网功能被占用,而无法再使用蓝牙个人局域网向第三终端共享Wi-Fi网络,因此,第二终端作为热点与第三终端共享Wi-Fi网络。
图5包括以下步骤:
S501:第二终端获取Wi-Fi网络的信息。
S502:第二终端将Wi-Fi网络的信息发给第三终端。
与图2以及图4不同的是,第二终端发给第三终端的消息中如果包括Special_ID1和Access Method键-值对,则Method为蓝牙。
S503:第三终端显示Wi-Fi网络的信息。
S504:第三终端向第二终端发送共享Wi-Fi网络的请求。
可选的,如果S502接收到Special_ID1和Access Method键-值对,且Access Method为蓝牙,则说明第二终端通过蓝牙方式接入Wi-Fi网络,所以,第三终端向第二终端请求以Wi-Fi热点方式接入Wi-Fi网络。
可选的,第三终端也可以不进行上述判定,而直接向第二终端请求以Wi-Fi热点 方式接入Wi-Fi网络。或者,第三终端仅向第二终端请求共享Wi-Fi网络,而不规定以何种方式(蓝牙或者Wi-Fi方式)共享。
S505:第二终端开启Wi-Fi热点功能。
可选的,如果第三终端没有规定第二终端以何种方式共享Wi-Fi网络,则第二终端可以先判断本机的蓝牙个人局域网功能是否被占用,如果是,第二终端开启Wi-Fi热点功能。
S506:第三终端将第二终端作为Wi-Fi热点连接,以接入Wi-Fi网络。
从图3可以看出,在第二终端通过蓝牙个人局域网接入不在覆盖范围内的Wi-Fi网络后,第二终端还可以通过本机的Wi-Fi热点功能,将本机作为第三终端接入该Wi-Fi网络的热点。
如图1所示,Wi-Fi网络的覆盖范围的半径为X,蓝牙的广播范围为Y,则通过第一终端的广播,Wi-Fi网络的覆盖范围的半径可以扩展到X+Y。从理论上看,通过各个终端的蓝牙功能,可以实现Wi-Fi网络的覆盖范围的无限扩展,而实际上,可以考虑信号的衰减控制扩展范围,达到用户体验和扩展范围的平衡。
结合图2和图5可以看出,对于任意一个终端,使用蓝牙广播搜索Wi-Fi网络的方式相同。而接入Wi-Fi网络的方式,需要考虑该终端是否已使用蓝牙个人局域网入Wi-Fi网络,如果是,则因为蓝牙共享网络被占用,所以需要通过Wi-Fi热点共享网络,如果否,可以使用蓝牙个人局域网共享网络。
图6为本申请实施例公开的一种终端,包括:收发器和处理器,其中,收发器包括蓝牙组件和Wi-Fi组件。蓝牙组件用于实现图2、图4以及图5中通过蓝牙发送和接收的步骤以及蓝牙个人局域网的功能,Wi-Fi组件用于实现通过路由器Wi-Fi热点接入Wi-Fi网络以及为其它终端提供Wi-Fi热点的功能。处理器用于实现图2、图4以及图5中除通信组件的功能之外的步骤,以及,控制蓝牙组件和Wi-Fi组件分别实现蓝牙组件和Wi-Fi组件的上述功能。也就是说,图6所示的终端,可以为第一终端或者第二终端,也可以为集合了第一终端和第二终端的功能的终端。
可选的,图6所示的终端还可以包括存储器,存储器用于存储应用程序以及处理器在执行应用程序的过程中产生的数据。
图6所示的终端还可以包括可以为集成了无线通信发送功能电路和接收功能电路的射频(Radio Frequency,RF)电路。通常,RF电路包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路还可以通过无线通信与网络和其它设备通信。所述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子 邮件、短消息服务(Short Messaging Service,SMS)等。
所述处理器可以由集成电路(Integrated Circuit,IC)组成,例如可以由单颗封装的IC所组成,也可以由连接多颗相同功能或不同功能的封装IC而组成。举例来说,处理器可以仅包括中央处理器(Central Processing Unit,简称CPU),也可以是GPU、数字信号处理器(Digital Signal Processor,简称DSP)、及通信单元中的控制芯片(例如基带芯片)的组合。在本发明实施方式中,CPU可以是单运算核心,也可以包括多运算核心。
存储器可用于存储软件程序以及模块,处理器通过运行存储在存储单元的软件程序以及模块,执行图2、图4以及图5中除通信组件的功能之外的步骤。存储器主要包括程序存储区和数据存储区,其中,程序存储区可存储操作系统、至少一个功能所需的应用程序等。数据存储区可存储根据在程序运行过程中产生的数据等。在本发明具体实施方式中,存储单元可以包括易失性存储器,例如非挥发性动态随机存取内存(Nonvolatile Random Access Memory,NVRAM)、相变化随机存取内存(Phase Change RAM,PRAM)、磁阻式随机存取内存(Magetoresistive RAM,MRAM)等,还可以包括非易失性存储器,例如至少一个磁盘存储器件、电子可擦除可编程只读存储器(Electrically ErasaBLE ProgrammaBLE Read-Only Memory,EEPROM)、闪存器件,例如反或闪存(NOR flash memory)或是反及闪存(NAND flash memory)。
可选的,终端还可以包括其他输入设备、传感器、显示屏和I/O子系统。I/O子系统包括其它输入设备的控制器、传感器控制器和显示控制器。
需要说明的是,上述实施例仅以Wi-Fi网络为例进行说明,除了Wi-Fi网络之外,其它的无线接入网络,例如蓝牙网络,也可以使用上述方法进行共享。

Claims (22)

  1. 一种网络共享方法,其特征在于,包括:
    第一终端获取无线网络的信息;
    所述第一终端将所述无线网络的信息发给第二终端;
    所述第一终端接收所述第二终端发送的共享所述无线网络的请求;
    所述第一终端开启蓝牙个人局域网,所述蓝牙个人局域网用于所述第二终端与所述第一终端通过蓝牙连接接入所述无线网络。
  2. 根据权利要求1所述的方法,其特征在于,所述第一终端将所述无线网络的信息发给第二终端包括:
    所述第一终端使用蓝牙广播第一消息,所述第一消息中包括所述无线网络的信息,所述无线网络的信息中包括所述无线网络的名称和所述无线网络的物理地址。
  3. 根据权利要求2所述的方法,其特征在于,所述无线网络的信息中还包括:
    所述第一终端检测到的所述无线网络的信号强度。
  4. 根据权利要求2或3所述的方法,其特征在于,所述第一消息中还包括:
    所述第一终端接入所述无线网络的方式,所述方式为Wi-Fi。
  5. 一种网络共享方法,其特征在于,包括:
    第二终端接收第一终端发送的无线网络的信息;
    所述第二终端向所述第一终端发送共享所述无线网络的请求;
    所述第二终端通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络。
  6. 根据权利要求5所述的方法,其特征在于,所述第二终端接收第一终端发送的无线网络的信息包括:
    所述第二终端通过蓝牙接收第一消息,所述第一消息中包括所述无线网络的信息,所述无线网络的信息包括所述无线网络的名称和所述无线网络的物理地址。
  7. 根据权利要求6所述的方法,其特征在于,所述第一消息中还包括:
    所述第一终端接入所述无线网络的第一方式,所述第一方式为Wi-Fi。
  8. 根据权利要求7所述的方法,其特征在于,所述第二终端向所述第一终端发送共享所述无线网络的请求包括:
    所述第二终端向所述第一终端发送第一请求消息,所述第一请求消息指示以蓝牙方式共享所述无线网络。
  9. 根据权利要求5-8任一项所述的方法,其特征在于,在所述第二终端通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络之后,还包括:
    所述第二终端向第三终端发送第二消息,所述第二消息中包括所述无线网络的信息和所述第二终端接入所述无线网络的第二方式,所述第二方式为蓝牙。
  10. 根据权利要求9所述的方法,其特征在于,在所述第二终端向第三终端发送第二消息之后,还包括:
    所述第二终端接收所述第三终端发送的第二请求消息,所述第二请求消息指示以 Wi-Fi热点功能共享所述无线网络;
    所述第二终端开启本机的Wi-Fi热点功能,使得所述第三终端将所述第二终端作为接入点,接入所述无线网络。
  11. 根据权利要求5-10任一项所述的方法,其特征在于,在所述第二终端接收第一终端发送的无线网络的信息之后,还包括:
    所述第二终端在无线网络的列表中显示所述无线网络的信息。
  12. 一种终端,其特征在于,所述终端为第一终端,包括:
    处理器,用于获取无线网络的信息;
    收发器,用于将所述无线网络的信息发给第二终端,并接收所述第二终端发送的共享所述无线网络的请求;
    所述处理器还用于,开启蓝牙个人局域网,所述蓝牙个人局域网用于所述第二终端与所述第一终端通过蓝牙连接接入所述无线网络。
  13. 根据权利要求12所述的终端,其特征在于,所述收发器包括蓝牙组件:
    所述蓝牙组件用于,使用蓝牙广播第一消息,所述第一消息中包括所述无线网络的信息,所述无线网络的信息中包括所述无线网络的所述无线网络的名称和所述无线网络的物理地址。
  14. 根据权利要求13所述的终端,其特征在于,所述无线网络的信息中还包括:
    所述终端检测到的所述无线网络的信号强度。
  15. 根据权利要求13所述的终端,其特征在于,所述第一消息中还包括:
    所述终端接入所述无线网络的方式,所述方式为Wi-Fi。
  16. 一种终端,其特征在于,所述终端为第二终端,包括:
    处理器,用于接收第一终端发送的无线网络的信息,向所述第一终端发送共享所述无线网络的请求,并通过所述第一终端开启的蓝牙个人局域网,接入所述无线网络。
  17. 根据权利要求16所述的终端,其特征在于,还包括:
    蓝牙组件;
    所述处理器用于接收第一终端发送的无线网络的信息包括:
    所述处理器用于,控制所述蓝牙组件接收第一消息,所述第一消息中包括所述无线网络的信息,所述无线网络的信息包括所述无线网络的名称和所述无线网络的物理地址。
  18. 根据权利要求17所述的终端,其特征在于,所述第一消息中还包括:
    所述第一终端接入所述无线网络的第一方式,所述第一方式为Wi-Fi。
  19. 根据权利要求17所述的终端,其特征在于,所述处理器用于向所述第一终端发送共享所述无线网络的请求包括:
    所述处理器用于,控制所述蓝牙组件向所述第一终端发送第一请求消息,所述第一请求消息指示以蓝牙方式共享所述无线网络。
  20. 根据权利要求17-19任一项所述的终端,其特征在于,所述处理器还用于:
    控制所述蓝牙组件在通过所述第一终端开启的蓝牙个人局域网,接入所述无线网 络之后,向第三终端发送第二消息,所述第二消息中包括所述无线网络的信息和所述第二终端接入所述无线网络的第二方式,所述第二方式为蓝牙。
  21. 根据权利要求20所述的终端,其特征在于,所述处理器还用于:
    控制所述蓝牙组件在所述向第三终端发送第二消息之后,接收所述第三终端发送的第二请求消息,所述第二请求消息指示以Wi-Fi热点功能共享所述无线网络;
    所述终端还包括:Wi-Fi组件;
    所述处理器还用于,控制所述Wi-Fi组件开启本机的Wi-Fi热点功能,使得所述第三终端将所述第二终端作为接入点,接入所述无线网络。
  22. 根据权利要求16-21任一项所述的终端,其特征在于,所述终端还包括:
    显示组件,用于在无线网络的列表中显示所述无线网络的信息。
PCT/CN2017/082392 2016-12-30 2017-04-28 一种网络共享方法及终端 WO2018120553A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780073316.5A CN109997378B (zh) 2016-12-30 2017-04-28 一种网络共享方法及终端

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201611263410.0 2016-12-30
CN201611263410 2016-12-30

Publications (1)

Publication Number Publication Date
WO2018120553A1 true WO2018120553A1 (zh) 2018-07-05

Family

ID=62706797

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/082392 WO2018120553A1 (zh) 2016-12-30 2017-04-28 一种网络共享方法及终端

Country Status (2)

Country Link
CN (1) CN109997378B (zh)
WO (1) WO2018120553A1 (zh)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109327865A (zh) * 2018-11-21 2019-02-12 Oppo(重庆)智能科技有限公司 网络共享方法及网络共享装置
CN112004217A (zh) * 2020-08-06 2020-11-27 Oppo(重庆)智能科技有限公司 一种网络接入方法、终端及存储介质
CN112020049A (zh) * 2019-05-30 2020-12-01 深圳富泰宏精密工业有限公司 网络连接方法及电子装置
CN112738785A (zh) * 2020-12-29 2021-04-30 青岛海尔科技有限公司 设备连接方法及装置、存储介质及电子装置
US11290875B2 (en) * 2017-08-10 2022-03-29 Espressif Systems (Shanghai) Co., Ltd. Bluetooth network and network configuration method

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115884444A (zh) * 2022-10-27 2023-03-31 张春帅 一种多个智能设备建立即时性无线通信交互网络的方法

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104243335A (zh) * 2014-09-30 2014-12-24 可牛网络技术(北京)有限公司 网络共享方法和装置
CN104968021A (zh) * 2015-06-25 2015-10-07 福州瑞芯微电子有限公司 一种蓝牙共享网络中的带宽控制方法和设备
CN105025430A (zh) * 2014-04-23 2015-11-04 中国科学院深圳先进技术研究院 一种网络共享的方法及系统
CN105407452A (zh) * 2015-10-27 2016-03-16 广东欧珀移动通信有限公司 在蓝牙共享网络下控制数据流量的方法和系统
US20160381641A1 (en) * 2015-06-26 2016-12-29 Itzik Shahar Devices and methods for transmit concurrency by conditioned signal combining

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102904782A (zh) * 2011-07-27 2013-01-30 中兴通讯股份有限公司 一种个人网组网方法及内部网关
CN104427579A (zh) * 2013-08-23 2015-03-18 中兴通讯股份有限公司 移动终端建立无线局域网的方法及移动终端
US10117085B2 (en) * 2014-05-19 2018-10-30 Aerohive Networks, Inc. Deployment of proximity beacon devices
US9980304B2 (en) * 2015-04-03 2018-05-22 Google Llc Adaptive on-demand tethering
CN105376696A (zh) * 2015-10-09 2016-03-02 惠州Tcl移动通信有限公司 数据传输方法以及智能终端

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105025430A (zh) * 2014-04-23 2015-11-04 中国科学院深圳先进技术研究院 一种网络共享的方法及系统
CN104243335A (zh) * 2014-09-30 2014-12-24 可牛网络技术(北京)有限公司 网络共享方法和装置
CN104968021A (zh) * 2015-06-25 2015-10-07 福州瑞芯微电子有限公司 一种蓝牙共享网络中的带宽控制方法和设备
US20160381641A1 (en) * 2015-06-26 2016-12-29 Itzik Shahar Devices and methods for transmit concurrency by conditioned signal combining
CN105407452A (zh) * 2015-10-27 2016-03-16 广东欧珀移动通信有限公司 在蓝牙共享网络下控制数据流量的方法和系统

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11290875B2 (en) * 2017-08-10 2022-03-29 Espressif Systems (Shanghai) Co., Ltd. Bluetooth network and network configuration method
CN109327865A (zh) * 2018-11-21 2019-02-12 Oppo(重庆)智能科技有限公司 网络共享方法及网络共享装置
CN109327865B (zh) * 2018-11-21 2022-02-18 Oppo(重庆)智能科技有限公司 网络共享方法及网络共享装置
CN112020049A (zh) * 2019-05-30 2020-12-01 深圳富泰宏精密工业有限公司 网络连接方法及电子装置
CN112020049B (zh) * 2019-05-30 2023-06-09 深圳富泰宏精密工业有限公司 网络连接方法及电子装置
CN112004217A (zh) * 2020-08-06 2020-11-27 Oppo(重庆)智能科技有限公司 一种网络接入方法、终端及存储介质
CN112004217B (zh) * 2020-08-06 2023-02-28 Oppo(重庆)智能科技有限公司 一种网络接入方法、终端及存储介质
CN112738785A (zh) * 2020-12-29 2021-04-30 青岛海尔科技有限公司 设备连接方法及装置、存储介质及电子装置

Also Published As

Publication number Publication date
CN109997378A (zh) 2019-07-09
CN109997378B (zh) 2021-05-04

Similar Documents

Publication Publication Date Title
WO2018120553A1 (zh) 一种网络共享方法及终端
US10848946B2 (en) Network access method, device, and system
CN110267327B (zh) 业务传输方法及装置
US11093598B2 (en) Identity authentication method and apparatus
US9198119B2 (en) Method and apparatus for peer-2-peer Wi-Fi ranging using near field communication
US9154955B1 (en) Authenticated delivery of premium communication services to trusted devices over an untrusted network
US7426382B2 (en) Contact validation and trusted contact updating in mobile wireless communications devices
EP2612515B1 (en) Roaming between networks employing different authentication protocols
CN110366112B (zh) 一种定位方法及相关设备
US20160242033A1 (en) Communication service using method and electronic device supporting the same
JP6040466B2 (ja) 通信制御方法、ユーザ機器、ネットワークサーバ、およびシステム
US9788202B2 (en) Method of accessing a WLAN access point
CN105493539A (zh) 转移wifi设置
WO2014019420A1 (zh) 无线接入点信息的发送方法、装置及移动终端
WO2016173339A1 (zh) 一种网络接入方法及移动通信终端
US11419163B2 (en) Secure wireless networks for vehicles
US10904756B2 (en) Authentication for next generation systems
WO2019085737A1 (zh) 获取、提供无线接入点接入信息的方法、设备以及介质
EP4142328A1 (en) Network authentication method and apparatus, and system
WO2017097129A1 (zh) 建立短距离无线通道的方法及装置
CA3073190C (en) Mobile number verification for mobile network-based authentication
US10581836B2 (en) Method for accessing a service and a corresponding server
US9154949B1 (en) Authenticated delivery of premium communication services to untrusted devices over an untrusted network
CN115699678A (zh) 设备注销的方法、设备注册的方法、通信设备和云平台
US20160196134A1 (en) Secure storage synchronization

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17888006

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17888006

Country of ref document: EP

Kind code of ref document: A1