WO2019047022A1 - Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur - Google Patents

Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur Download PDF

Info

Publication number
WO2019047022A1
WO2019047022A1 PCT/CN2017/100566 CN2017100566W WO2019047022A1 WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1 CN 2017100566 W CN2017100566 W CN 2017100566W WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless terminal
wifi
connection
fingerprint
wifi sharing
Prior art date
Application number
PCT/CN2017/100566
Other languages
English (en)
Chinese (zh)
Inventor
周洋
Original Assignee
深圳传音通讯有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳传音通讯有限公司 filed Critical 深圳传音通讯有限公司
Priority to CN201780096577.9A priority Critical patent/CN111316684A/zh
Priority to PCT/CN2017/100566 priority patent/WO2019047022A1/fr
Publication of WO2019047022A1 publication Critical patent/WO2019047022A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless network technologies, and in particular, to a WIFI sharing method, a mobile terminal, and a computer readable storage medium.
  • WIFI networks basically support WIFI networks.
  • the commonly used WIFI network is shared by means of a password.
  • the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is allowed to establish a connection with the WIFI network; if the password is incorrect, then Refused to connect.
  • the main purpose of the present invention is to provide a WIFI sharing method, a terminal, and a computer readable storage medium, which are intended to solve the technical problem that a shared WIFI is easily broken by an illegal user.
  • the present invention provides a WIFI sharing method, where the WIFI sharing method includes the following steps:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the method before the step of starting the hotspot sharing function and starting the timing when the WIFI sharing instruction is received, the method further includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the corresponding traffic usage abnormality information is output, and the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the method further includes:
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • the method further includes:
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention further provides a WIFI sharing terminal, where the WIFI sharing terminal includes a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor, When the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention further provides a computer readable storage medium, where the WIFI sharing program is stored, wherein when the WIFI sharing program is executed by a processor, the WIFI as described above is implemented. The steps to share the method.
  • the invention starts the WIFI hotspot sharing function when receiving the WIFI sharing instruction, and starts timing; if receiving the connection request sent by the wireless terminal within the preset connection time, determining the location according to the fingerprint information included in the connection request Whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establish a connection with the wireless terminal.
  • the WIFI sharing terminal of the present invention verifies the identity of the WIFI accessor by combining the sending time of the connection request and the fingerprint information, and accesses the WIFI when the request sending time and the fingerprint information of the WIFI accessor satisfy the requirements.
  • the connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
  • FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a first embodiment of a WIFI sharing method according to the present invention
  • FIG. 3 is a schematic flowchart of a second embodiment of a WIFI sharing method according to the present invention.
  • FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
  • the main idea of the solution of the embodiment of the present invention is: when receiving the WIFI sharing instruction, the WIFI hotspot sharing function is started, and the timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the connection request.
  • the fingerprint information included therein determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
  • the WIFI sharing method in the embodiment of the present invention is mainly applied to a WIFI sharing terminal, and the WIFI sharing terminal can be implemented in multiple manners.
  • the terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
  • FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal involved in an embodiment of the present invention.
  • the WIFI sharing terminal may include a processor 1001 (for example, a CPU), and a communication bus. 1002, user interface 1003, network interface 1004, memory 1005.
  • the communication bus 1002 is configured to implement connection communication between the components; the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard); the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard);
  • the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • the mobile terminal may further include a camera (front camera), a flash (front flash), and RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • sensors such as light sensors, motion sensors, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display according to the brightness of the ambient light, and the proximity sensor can close the display and/or according to the distance between the photosensitive device and the reference object.
  • the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile terminal can also be equipped with other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. No longer.
  • FIG. 1 does not constitute a limitation of the WIFI sharing terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements.
  • the memory 1005 as a computer readable storage medium of FIG. 1 can include an operating system, a network communication module, and a WIFI sharing program.
  • the network communication module is mainly used to connect to a server for data communication with the server; and the processor 1001 can call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the invention provides a WIFI sharing method.
  • FIG. 2 is a schematic flowchart diagram of a first embodiment of a WIFI sharing method according to the present invention.
  • the method for sharing a WIFI terminal includes the following steps:
  • Step S10 when receiving the WIFI sharing instruction, start the WIFI hotspot sharing function, and start timing
  • WIFI networks basically support WIFI networks.
  • the commonly used WIFI network is shared by means of a password.
  • the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is connected to the WIFI network; if the password is incorrect, then Refused to connect.
  • this method of sharing WIFI by password has certain security problems. It is easy for an illegal user to decipher the WIFI password through a cracking software such as a WIFI master key, thereby connecting to the WIFI network without the permission of the WIFI provider.
  • the use of network resources brings loss of data traffic to WIFI providers and reduces network security.
  • a WIFI sharing method which verifies the access authority of the access terminal by means of fingerprint verification, thereby effectively preventing the WIFI network from being maliciously cracked by an illegal user, thereby improving the security of the WIFI network.
  • the WIFI sharing method in this embodiment is applied to a WIFI sharing terminal, and the WIFI sharing terminal has a WIFI hotspot function, and can provide a WIFI network (hotspot) for surrounding wireless terminals.
  • the WIFI sharing terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
  • a mobile phone will be taken as an example for description.
  • WIFI provides the user (hereinafter referred to as the user) mobile phone with WIFI hotspot sharing function; at this time, WIFI provides users to provide WIFI network (hotspot) to friends through their own mobile phones (hereinafter referred to as connected users), so that the tablet connected to the user (Of course, it can also be a wireless terminal such as a mobile phone, a laptop computer, a smart bracelet, etc.) can access the Internet through the WIFI network; at this time, the user will click the WIFI sharing option on the system setting page of the mobile phone to trigger the WIFI sharing instruction;
  • the WIFI sharing instruction may also be triggered by inputting the instruction text or instruction code corresponding to the WIFI sharing instruction by means of text input; of course, the WIFI sharing instruction may be triggered by voice input.
  • the mobile phone When receiving the WIFI sharing instruction, the mobile phone will open the WIFI hotspot sharing function according to the WIFI sharing instruction, and call the wireless signal transmitting module in the mobile phone to transmit a corresponding wireless signal, so that the wireless terminal in the wireless signal range can search. To the wireless signal.
  • the user's mobile phone starts the WIFI hotspot sharing function, it will automatically start timing to record the sharing duration of the WIFI hotspot.
  • Step S20 If the connection request sent by the wireless terminal is received within the preset connection time, determine whether the wireless terminal has the connection permission according to the fingerprint information included in the connection request.
  • the connected user when the user's mobile phone is provided to transmit a wireless signal, the connected user can search for the wireless signal on the tablet computer. At this time, the connected user can operate on the tablet, select the WIFI network corresponding to the wireless signal to connect, and trigger the corresponding connection instruction; when receiving the connection instruction of the connected user, the tablet computer displays the fingerprint input information, prompting the connection.
  • the user enters fingerprint data; the connected user can input fingerprint data according to the information in the fingerprint sensing area of the tablet (or an external fingerprint sensing device); when receiving the fingerprint data, the tablet computer generates a corresponding connection according to the fingerprint data. And requesting, and sending the connection request to the mobile phone of the providing user, wherein the connection request includes fingerprint information corresponding to the fingerprint data.
  • the user's mobile phone When receiving the connection request, the user's mobile phone first obtains the current time information, and calculates a waiting time from the start of the WIFI hotspot sharing function to the reception of the connection request; if the waiting time is greater than the preset connection time , the phone will directly reject the connection request from the tablet and return the connection rejection information to the tablet.
  • the preset connection time may be preset by the providing user, which may be understood as a secure connection time.
  • the mobile phone when the mobile phone initiates the WIFI hotspot sharing function, other wireless terminals may send a connection request to the mobile phone; If a legitimate user uses a wireless terminal to apply for connection to WIFI normally, it should request to establish a connection with the mobile phone within a certain period of time when the mobile phone starts the WIFI hotspot sharing function. If the illegal user connects to the WIFI through brute force, it often happens on the mobile phone. WIFI hotspot sharing function after a while. Therefore, in this embodiment, the mobile phone of the user is started to start timing when the WIFI hotspot sharing function is started. If the connection request sent by the tablet is received after the preset connection time is passed, the mobile phone directly rejects the tablet. Establish a connection and return a connection reject message to the tablet.
  • the phone receives a connection request from the tablet within the preset connection time, the phone will also need to further verify the connection rights of the tablet to determine whether to establish a connection with the tablet. Specifically, the mobile phone parses the connection request, obtains the fingerprint information included in the connection request, and determines whether the tablet computer has the connection right according to the fingerprint information. If it is determined according to the fingerprint information that the tablet computer has the connection right, the process goes to step S30; if it is determined that the tablet computer does not have the connection right, the mobile phone returns the rejection connection information to the tablet computer.
  • the process of determining, by the mobile phone, whether the tablet computer has the connection permission according to the fingerprint information may be: when the mobile phone acquires the fingerprint information, the mobile phone database is queried, and the fingerprint information is compared with the preset valid fingerprint in the database. Yes, it is determined whether the fingerprint information matches the preset valid fingerprint.
  • the preset valid fingerprint is to provide the user's own fingerprint; that is, the mobile phone will compare the fingerprint information in the connection request sent by the tablet with the fingerprint of the providing user, if the two match, then the description
  • the fingerprint information sent by the tablet is derived from the user, and it is considered that the connection operation of the tablet is authorized by the user, and since the connection request is received within the preset connection time, the description is provided.
  • the user activates the WIFI hotspot sharing function of the mobile phone, the user inputs the fingerprint on the tablet connected to the user, and authorizes the connected user to use the shared WIFI. In this case, the mobile phone will consider that the tablet has the connection right.
  • the user may be provided to enter in advance. Specifically, the user can click the effective fingerprint setting option on the system setting page of the mobile phone to trigger the effective fingerprint setting instruction; of course, the user can also trigger the input of the effective fingerprint setting instruction corresponding to the instruction text or the instruction code by means of text input.
  • a valid fingerprint setting instruction of course, it is also possible to trigger a valid fingerprint setting instruction by means of voice input.
  • the mobile phone receives the valid fingerprint setting instruction that provides the user trigger, it starts to enter the effective fingerprint setting mode; at this time, the mobile phone will output a prompt message to prompt the user to place the finger on the fingerprint collector of the mobile phone (or external fingerprint collection).
  • the device is configured to input fingerprint data, wherein the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
  • the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
  • Step S30 If the wireless terminal has a connection right, establish a connection with the wireless terminal.
  • the user's mobile phone is determined according to the fingerprint information to determine that the tablet computer has the connection right, the user of the tablet computer is considered to be a legitimate user, and the mobile phone allows the tablet computer to access the WIFI network and establish a network connection with the tablet computer. And return the corresponding connection success information to the tablet.
  • the WIFI hotspot sharing function when the WIFI sharing instruction is received, the WIFI hotspot sharing function is started, and timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the fingerprint included in the connection request The information determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
  • the WIFI sharing terminal in this embodiment combines the sending time of the connection request with the fingerprint information to verify the identity of the WIFI accessor, and when the WIFI accessor's request sending time and fingerprint information meet the requirements, the WIFI access is performed. The connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
  • FIG. 3 is a schematic flowchart diagram of a second embodiment of a WIFI sharing method according to the present invention.
  • step S30 the method further includes:
  • Step S40 Send a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.
  • a fingerprint information clearing command will also be sent to the tablet to clear the fingerprint information that the tablet uses for authentication.
  • the tablet computer queries the cache information according to the fingerprint information clearing instruction to obtain the corresponding fingerprint information, and clears the fingerprint information from the cache.
  • FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
  • the method further includes:
  • Step S50 Obtain device identification information of the wireless terminal, and record network usage of the wireless terminal.
  • the network usage of the tablet computer can also be monitored.
  • the mobile phone obtains device identification information of the tablet, and the device identification information may include one or more of a device ID, a MAC address, and an IP address of the tablet in the WIFI network.
  • the mobile phone also monitors the network usage of the tablet in real time and records the health content in the web log, and the recorded content may include the connection duration and data of the tablet. Transmission traffic, instantaneous transmission rate, website access records, etc., of course, may also include other content.
  • the content of the monitoring and recording may also be set by the providing user, and the mobile phone monitors and records according to the setting of the providing user.
  • the mobile phone may also take corresponding measures. Specifically, if the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic (for which the normal traffic can be preset by the user), the mobile phone considers that the tablet computer is abnormally using the network at this time, and the mobile phone will Outputs the corresponding traffic usage exception information, and the traffic usage abnormality information includes the device identification information of the tablet, so that the providing user can learn that the traffic usage of the tablet at this time is abnormal according to the information; wherein abnormal information is used for the traffic, It can be output in the form of voice, or it can display relevant information on the screen of the mobile phone.
  • the preset normal traffic for which the normal traffic can be preset by the user
  • the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic, and can directly disconnect the connection with the tablet computer, thereby avoiding the use of abnormal traffic to the user, thereby contributing to the improvement of network security. Sex.
  • the preset permission time can be set in the mobile phone.
  • the mobile phone can automatically disconnect from the tablet computer, so as to prevent the tablet computer from connecting for too long traffic for a long time. .
  • the present invention also provides a WIFI sharing terminal.
  • the WIFI sharing terminal of the present invention comprises a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor.
  • the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time is passed, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention also provides a computer readable storage medium.
  • the WIFI sharing program is stored on the computer readable storage medium of the present invention, wherein when the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • portions of the technical solution of the present invention that contribute substantially or to the prior art may be embodied in the form of a software product stored in a storage medium (such as a ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • a terminal device which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

La présente invention concerne un procédé de partage WiFi. Le procédé comprend les étapes consistant à : lors de la réception d'une instruction de partage WiFi, activer une fonction de partage de point d'accès sans fil WiFi, et lancer une mesure d'un temps cumulé ; si une demande de connexion envoyée par un terminal sans fil est reçue au cours d'une durée de connexion prédéterminée, alors déterminer, selon des informations d'empreinte numérique contenues dans la demande de connexion, si le terminal sans fil a une permission de connexion ; et si tel est le cas, alors établir une connexion au terminal sans fil. La présente invention concerne également un terminal de partage WiFi et un support de stockage lisible par ordinateur. Par combinaison d'un instant d'envoi d'une demande de connexion et utilisation d'informations d'empreinte numérique pour authentifier l'identité d'un utilisateur d'accès WiFi, la présente invention autorise uniquement l'accès à l'utilisateur d'accès WiFi quand l'instant d'envoi et les informations d'empreinte numérique satisfont tous les deux des exigences, ce qui permet d'empêcher efficacement une intrusion malveillante dans un réseau WiFi par un utilisateur illégitime et une perte subséquente du fournisseur de réseau WiFi, et d'améliorer la sécurité du réseau.
PCT/CN2017/100566 2017-09-05 2017-09-05 Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur WO2019047022A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201780096577.9A CN111316684A (zh) 2017-09-05 2017-09-05 Wifi共享方法、移动终端及计算机可读存储介质
PCT/CN2017/100566 WO2019047022A1 (fr) 2017-09-05 2017-09-05 Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/100566 WO2019047022A1 (fr) 2017-09-05 2017-09-05 Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur

Publications (1)

Publication Number Publication Date
WO2019047022A1 true WO2019047022A1 (fr) 2019-03-14

Family

ID=65633616

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100566 WO2019047022A1 (fr) 2017-09-05 2017-09-05 Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur

Country Status (2)

Country Link
CN (1) CN111316684A (fr)
WO (1) WO2019047022A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113993103A (zh) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114173323A (zh) * 2020-08-21 2022-03-11 中芯未来(北京)科技有限公司 基于端和云结合的钓鱼WiFi检测方法

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618905A (zh) * 2015-03-09 2015-05-13 广东欧珀移动通信有限公司 Wifi热点共享方法及移动终端
US20170094054A1 (en) * 2015-08-03 2017-03-30 Huizhou Tcl Mobile Communication Co., Ltd Methods of sharing a wifi hotspot and associated electronic devices
CN106936604A (zh) * 2017-03-10 2017-07-07 南京航空航天大学 一种移动设备共享网络流量系统及其方法

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104105170A (zh) * 2014-08-04 2014-10-15 上海斐讯数据通信技术有限公司 一种双频路由器的WiFi保护设置扫描连接方法及系统
CN105307242A (zh) * 2015-11-13 2016-02-03 魅族科技(中国)有限公司 一种Wi-Fi网络使用方法及终端
CN106851642A (zh) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 无线上网授权方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618905A (zh) * 2015-03-09 2015-05-13 广东欧珀移动通信有限公司 Wifi热点共享方法及移动终端
US20170094054A1 (en) * 2015-08-03 2017-03-30 Huizhou Tcl Mobile Communication Co., Ltd Methods of sharing a wifi hotspot and associated electronic devices
CN106936604A (zh) * 2017-03-10 2017-07-07 南京航空航天大学 一种移动设备共享网络流量系统及其方法

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113993103A (zh) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法
CN113993103B (zh) * 2021-10-22 2024-01-19 安徽江淮汽车集团股份有限公司 用于车载终端的网络自动互联方法

Also Published As

Publication number Publication date
CN111316684A (zh) 2020-06-19

Similar Documents

Publication Publication Date Title
WO2014030889A1 (fr) Procédé et appareil de partage de contenu
WO2015020360A1 (fr) Procédé et dispositif pour enregistrer et certifier un dispositif dans un système de communications sans fil
WO2019144738A1 (fr) Procédé de vérification de service financier, appareil et dispositif, et support d'informations informatique
WO2019174090A1 (fr) Procédé, appareil et dispositif de commande de partage de fichier de capture d'écran, et support de stockage informatique
WO2020224246A1 (fr) Procédé et appareil de gestion de données fondée sur une chaîne de blocs, dispositif et support d'informations
WO2018233352A1 (fr) Procédé de transmission de données, dispositif, terminal, et support de stockage lisible par ordinateur
WO2013025085A2 (fr) Appareil et procédé permettant de prendre en charge un nuage de famille dans un système informatique en nuage
EP3008957A1 (fr) Procédé et appareil d'enregistrement de dispositif sans fil dans un système de communication sans fil
WO2015108330A1 (fr) Dispositif électronique de commande d'un dispositif externe à l'aide d'un numéro et procédé associé
WO2017119548A1 (fr) Procédé d'authentification d'utilisateur à sécurité renforcée
WO2012099402A2 (fr) Procédé et appareil de communication téléphonique utilisant un réseau domestique
WO2020253120A1 (fr) Procédé, système et dispositif d'enregistrement de page web, et support de stockage informatique
EP3097743A1 (fr) Dispositif électronique de commande d'un dispositif externe à l'aide d'un numéro et procédé associé
WO2017111483A1 (fr) Dispositif d'authentification basée sur des données biométriques, serveur de commande et serveur d'application relié à celui-ci, et procédé de commande associé
EP3673467A1 (fr) Dispositif électronique et procédé de commande de dispositif électronique
WO2018053904A1 (fr) Procédé et terminal de traitement d'informations
WO2015046954A1 (fr) Appareil et procédé permettant d'accéder à un dispositif électronique ayant une fonction de point d'accès sans fil
WO2019047022A1 (fr) Procédé de partage wifi, terminal mobile et support de stockage lisible par ordinateur
WO2020027461A1 (fr) Dispositif électronique et procédé de traitement d'appel d'urgence dans un dispositif électronique
WO2021049681A1 (fr) Dispositif électronique permettant d'effectuer une authentification se basant sur un serveur en nuage, et procédé de commande pour celui-ci
WO2020138806A1 (fr) Appareil électronique et procédé de commande de celui-ci
WO2023128341A1 (fr) Procédé et système de détection de transaction frauduleuse à l'aide de données chiffrées de manière homomorphe
WO2019194427A1 (fr) Dispositif électronique permettant de gérer une application se rapportant à une clé d'un dispositif électronique externe, et procédé de fonctionnement de dispositif électronique
WO2022197023A1 (fr) Système de fourniture de service, et terminal et procédé de traitement de système de fourniture de service
WO2021025322A1 (fr) Dispositif électronique d'activation d'une application à travers un compte clé, et système le comprenant

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17924497

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17924497

Country of ref document: EP

Kind code of ref document: A1