WO2019141192A1 - Wi-Fi连接方法、计算机设备及存储介质 - Google Patents
Wi-Fi连接方法、计算机设备及存储介质 Download PDFInfo
- Publication number
- WO2019141192A1 WO2019141192A1 PCT/CN2019/072010 CN2019072010W WO2019141192A1 WO 2019141192 A1 WO2019141192 A1 WO 2019141192A1 CN 2019072010 W CN2019072010 W CN 2019072010W WO 2019141192 A1 WO2019141192 A1 WO 2019141192A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access point
- wireless access
- webpage module
- server
- list
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Definitions
- the present application relates to network technologies, and in particular, to a Wi-Fi connection method, a computer device, and a storage medium.
- Wi-Fi Wi-Fi in the following two ways:
- Wi-Fi access point For the encrypted wireless access point (Wi-Fi access point), the user needs to actively provide access information such as password information;
- third-party applications can provide users with access information of encrypted wireless access points to connect encrypted wireless access points according to the obtained access information.
- mode 1) if the user does not know the access information of the encrypted wireless access point, it cannot connect to the encrypted wireless access point, thereby affecting the user's use.
- mode 2) although the user can be made Connected to an encrypted wireless access point, but requires additional installation of third-party applications by the user, thereby increasing the occupation of system resources and the like.
- a Wi-Fi connection method, a computer device, and a storage medium are provided in the present application.
- a Wi-Fi connection method includes: a webpage module acquires a first Wi-Fi list scanned by a terminal, and the webpage module is pre-existing locally or locally acquired according to a predetermined manner; determining the first a selected wireless access point in the Wi-Fi list; when the selected wireless access point is a connectable encrypted wireless access point, the connection is based on access information from the selected wireless access point of the server Selected wireless access point.
- a computer apparatus comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the program as implemented above Said method.
- a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the method as described above.
- the user can automatically connect to the encrypted wireless access point without actively providing the access information of the encrypted wireless access point, so that even if the user does not know the encrypted wireless access point.
- the access information does not affect the user's use, and the user does not need to install additional third-party applications, thereby reducing the occupation of system resources.
- FIG. 1 is a flow chart of a first embodiment of a Wi-Fi connection method in accordance with the present application.
- FIG. 2 is a flow chart of a second embodiment of a Wi-Fi connection method in accordance with the present application.
- FIG. 3 illustrates a block diagram of an exemplary computer system/server 12 suitable for use in implementing embodiments of the present application.
- a Wi-Fi connection scheme is proposed, which can obtain access information and connect the encrypted wireless access point without installing a third-party application.
- FIG. 1 is a flow chart of a first embodiment of a Wi-Fi connection method in accordance with the present application. As shown in FIG. 1, the following specific implementation manners are included.
- the webpage module obtains the first Wi-Fi list scanned by the terminal, and the webpage module is pre-existing locally or locally acquired according to a predetermined manner.
- the web page module determines a selected wireless access point in the first Wi-Fi list.
- the webpage module connects the selected wireless access point based on the access information from the selected wireless access point of the server.
- the terminal includes, but is not limited to, any smart terminal device that can perform human-computer interaction with a user and can implement a wireless communication function, such as a smart phone, a tablet computer, a notebook computer, and the like.
- the smart terminal device can adopt any operating system, such as an Android operating system, an iOS operating system, a Windows operating system, and the like.
- the server includes, but is not limited to, a cloud service device and an offsite storage service device.
- a cloud service device preferably the server is a cloud service device.
- the web page module can be pre-existing locally or locally obtained in a predetermined manner.
- the webpage module can be pre-existing locally, and the pre-existing local webpage module can be read through the local storage address.
- the webpage module may be transmitted to the local device by a device other than the terminal through a transmission protocol, which may be a short-range communication protocol or the like.
- the webpage module can be downloaded to the local by the application in the terminal through the access URL.
- the web page module can include a web page file, such as an html file or the like. It should be noted that the html file is only an example, and is not a limitation. Those skilled in the art can understand that other webpage files applicable to the solution of the present application are included in the scope of the present application.
- the access information of the wireless access point represents information required for authentication by the wireless access point; in some embodiments, the access information of the wireless access point includes, but is not limited to, a password of the wireless access point, a wireless access point Certification information, etc.
- the webpage module can include code or scripts for facilitating connection to a webpage of the Wi-Fi network; as previously described, an application in the terminal can download the webpage module to the local by accessing a web address corresponding to the webpage module And running the webpage module to present a webpage for assisting in connecting to the Wi-Fi network to the user.
- the webpage of the present application for assisting in connecting to a Wi-Fi network may be implemented based on a Progressive Web App (PWA).
- PWA Progressive Web App
- an application that downloads and runs a webpage module can include a browser or other application capable of running and rendering a webpage.
- the web address corresponding to the web page module may be obtained based on the user's operation; for example, obtaining the web address by acquiring the content input by the user in the address of the browser, or obtaining the web address or the like by the user clicking the link operation.
- the web page corresponding to the web page module can be from a terminal or other application. In this embodiment, the manner of obtaining the web address corresponding to the webpage module is not limited.
- the webpage module may first obtain the first Wi-Fi list scanned by the terminal, where the first Wi-Fi list includes information of nearby wireless access points scanned by the terminal.
- the webpage module can obtain the first Wi-Fi list by the first interface of the application running the webpage module.
- the application running the webpage module is a browser
- the webpage module can obtain the first Wi-Fi list composed of nearby wireless access points scanned by the terminal through the first interface of the browser.
- the webpage module invokes the first interface, initiates a request to the operating system of the terminal through the first interface, and obtains a first wifi list returned by the operating system.
- the specific interface of the first interface is not limited, as long as the webpage module can complete the operation of acquiring the information of the wireless access point scanned by the terminal.
- the webpage module may upload the obtained first Wi-Fi list to the server, and obtain a second Wi-Fi list returned by the server, where the second Wi-Fi list includes an identifier of the connectable encrypted wireless access point.
- the webpage module may first determine whether the terminal is connected to the mobile data network, and if connected, upload the first Wi-Fi list to the server directly through the mobile data network. If not connected, the terminal may be instructed to connect to the mobile data network, or display a prompt message for prompting the user to connect to the mobile data network. After being connected to the mobile data network, upload the first Wi-Fi list to the mobile data network. server.
- the types of wireless access points may include, but are not limited to, open wireless access points, encrypted wireless access points, and authenticated wireless access points.
- An open wireless access point refers to a wireless access point that can be directly connected; an encrypted wireless access point refers to a wireless access point that needs to provide access information; an authenticated wireless access point refers to a wireless access point that does not need to provide access information.
- a wireless access point that needs to be authenticated for example, a wireless access point that needs to input a mobile phone number through a web page for authentication, and a wireless access point that needs to provide authentication information of an application that cooperates with the merchant, such as a wireless access point provided by the merchant. Access points, etc.
- the connectable encrypted wireless access point in the second Wi-Fi list represents an encrypted wireless access point at which the server can provide corresponding access information.
- the second Wi-Fi list includes an identifier of the connectable encrypted wireless access point to enable the web page module to identify the connectable encrypted wireless access point.
- the second Wi-Fi list includes connectable encrypted wireless access points and other wireless access points; in this case, the connectable encrypted wireless access can be marked in the second Wi-Fi list Pointing so that the connectable encrypted wireless access point is identified; in this embodiment, the manner of marking the encrypted wireless access point that can be connected is not limited.
- the webpage module can prompt the user for the connectable encrypted wireless access point according to the second Wi-Fi list.
- the webpage module may display the first Wi-Fi list or the second Wi-Fi list to the user, and further display the prompt on the displayed first or second Wi-Fi list by means of text or graphics.
- Information to inform users which encrypted wireless access points are connectable For example, a "key" icon is displayed behind each connectable encrypted wireless access point, or "connectable" is displayed; the user can use the displayed icon or text to determine which encrypted wireless access points can be connected.
- the user can select the displayed wireless access point.
- the selected wireless access point may be an open wireless access point, an encrypted wireless access point, or an authenticated wireless access point.
- the connection can be made directly; if the selected wireless access point is an authenticated wireless access point, the user can be directed for authentication; if the selected wireless access is selected
- the inbound point is an encrypted wireless access point, and the webpage module may request the access information of the selected wireless access point from the server, and receive the access information of the selected wireless access point returned by the server, and according to the obtained The access information is connected to the selected wireless access point.
- the webpage module after acquiring the wireless access point selected by the user, the webpage module requests the access information of the selected wireless access point to the server.
- the server may provide access information of some or all of the connectable encrypted wireless access points in the second Wi-Fi list to the terminal, for example, the server may return to the second Wi-Fi list.
- the webpage module can receive the access information of the connectable encrypted wireless access point returned by the server, for example, at the receiving server
- the returned second Wi-Fi list is obtained together with access information of the connectable encrypted wireless access point therein.
- the webpage module does not need to request the access information of the selected wireless access point to the server, and directly obtains the obtained access information according to the selected wireless access point. Simplify the process by connecting to the selected wireless access point.
- the user selects the wireless access point; in other embodiments, the server may select and notify the webpage module, or may be selected by the webpage module.
- the server may select and notify the webpage module, or may be selected by the webpage module.
- one of the best encrypted signal points can be selected from the connectable encrypted wireless access points; for example, it is evaluated according to the information of the encrypted wireless access point, and an encrypted wireless access with the highest evaluation value is selected. Point, as the selected wireless access point, and so on.
- the webpage module can connect to the selected wireless access point according to the access information of the selected wireless access point. Specifically, the webpage module may connect the selected wireless access point according to the access information of the selected wireless access point through the second interface of the application running the webpage module.
- the webpage module can connect the selected wireless access point according to the access information of the selected wireless access point through the second interface of the browser. For example, the webpage module invokes the second interface, and sends an instruction for indicating the connection of the wireless access point through the second interface, and the system connects the corresponding wireless access point based on the instruction.
- the specific interface of the second interface is not limited, as long as it can support the webpage module to complete the operation of connecting the wireless access point.
- the webpage module can also prompt the user whether the connection to the selected wireless access point is successful or not. If the connection fails, the webpage module can obtain the reselected wireless access point and when the reselected wireless access point is available When the connected encrypted wireless access point is connected, the reselected wireless access point or the like is connected according to the access information of the reselected wireless access point from the server.
- FIG. 2 is a flow chart of a second embodiment of a Wi-Fi connection method in accordance with the present application. As shown in FIG. 2, the following specific implementation manners are included.
- the webpage module obtains the first Wi-Fi list scanned by the terminal.
- the webpage module can be downloaded to the local by an application in the terminal, such as a browser, by accessing a web address.
- the webpage module may obtain the first Wi-Fi list by using a first interface of the application running the webpage module, where the first Wi-Fi list includes each wireless access point scanned by the terminal.
- the web page module determines if the terminal is connected to the mobile data network, and if so, executes 204, and if not, executes 203.
- the webpage module instructs the terminal to connect to the mobile data network, or displays prompt information for prompting the user to connect to the mobile data network. After the connection is successful, execution 204 is performed.
- the web page module uploads the first Wi-Fi list to the server.
- the webpage module obtains a second Wi-Fi list returned by the server, and the second Wi-Fi list includes an identifier of the connectable encrypted wireless access point.
- Types of wireless access points may include: open wireless access points, encrypted wireless access points, and authenticated wireless access points.
- the web page module prompts the user for a connectable encrypted wireless access point based on the second Wi-Fi list.
- the webpage module may display the second Wi-Fi list (which may also be the first Wi-Fi list) to the user, and further display the prompt information on the displayed second Wi-Fi list by means of text or graphics, etc., Tell the user which encrypted wireless access points are connectable.
- the second Wi-Fi list which may also be the first Wi-Fi list
- the webpage module determines the selected wireless access point based on a user selection operation of the displayed wireless access point.
- the user can select the displayed wireless access point.
- the selected wireless access point may be an open wireless access point, an encrypted wireless access point, or an authenticated wireless access point.
- the webpage module when the selected wireless access point is a connectable encrypted wireless access point, the webpage module requests the server for access information of the selected wireless access point.
- the webpage module receives the access information of the selected wireless access point returned by the server, and connects the selected wireless access point according to the acquired access information.
- the webpage module after acquiring the wireless access point selected by the user, requests the access information of the selected wireless access point to the server.
- the server may provide access information of some or all of the connectable encrypted wireless access points in the second Wi-Fi list to the terminal, for example, the server may return to the second Wi-Fi list.
- the webpage module can receive the access information of the connectable encrypted wireless access point returned by the server, for example, at the receiving server
- the returned second Wi-Fi list is obtained together with access information of the connectable encrypted wireless access point therein.
- the webpage module does not need to request the access information of the selected wireless access point to the server, and directly obtains the obtained access information according to the selected wireless access point. Simplify the process by connecting to the selected wireless access point.
- the webpage module can connect the selected wireless access point according to the access information of the selected wireless access point through an application running the webpage module, such as the second interface of the browser.
- the webpage module can also prompt the user whether the connection to the selected wireless access point is successful or not. If the connection fails, the webpage module can obtain the reselected wireless access point and when the reselected wireless access point is available When the connected encrypted wireless access point is connected, the reselected wireless access point or the like is connected according to the access information of the reselected wireless access point from the server.
- the user can automatically connect to the encrypted wireless access point without actively providing the access information of the encrypted wireless access point, so that even if the user does not know the connection of the encrypted wireless access point. Incoming information does not affect the user's use, and the user does not need to install additional third-party applications, thereby reducing the occupation of system resources.
- FIG. 3 illustrates a block diagram of an exemplary computer system/server 12 suitable for use in implementing embodiments of the present application.
- the computer system/server 12 shown in FIG. 3 is merely an example and should not impose any limitation on the function and scope of use of the embodiments of the present application.
- computer system/server 12 is embodied in the form of a general purpose computing device.
- the components of computer system/server 12 may include, but are not limited to, one or more processors (processing units) 16, memory 28, and a bus 18 that connects different system components, including memory 28 and processor 16.
- Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a graphics acceleration port, a processor, or a local bus using any of a variety of bus structures.
- these architectures include, but are not limited to, an Industry Standard Architecture (ISA) bus, a Micro Channel Architecture (MAC) bus, an Enhanced ISA Bus, a Video Electronics Standards Association (VESA) local bus, and peripheral component interconnects ( PCI) bus.
- ISA Industry Standard Architecture
- MAC Micro Channel Architecture
- VESA Video Electronics Standards Association
- PCI peripheral component interconnects
- Computer system/server 12 typically includes a variety of computer system readable media. These media can be any available media that can be accessed by computer system/server 12, including both volatile and non-volatile media, removable and non-removable media.
- Memory 28 may include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32.
- Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media.
- storage system 34 may be used to read and write non-removable, non-volatile magnetic media (not shown in Figure 3, commonly referred to as a "hard disk drive”).
- a disk drive for reading and writing to a removable non-volatile disk (such as a "floppy disk”), and a removable non-volatile disk (such as a CD-ROM, DVD-ROM) may be provided.
- each drive can be coupled to bus 18 via one or more data medium interfaces.
- Memory 28 can include at least one program product having a set (e.g., at least one) of program modules configured to perform the functions of the various embodiments of the present application.
- a program/utility 40 having a set (at least one) of program modules 42 may be stored, for example, in memory 28, such program modules 42 including, but not limited to, an operating system, one or more applications, other programs Modules and program data, each of these examples or some combination may include an implementation of a network environment.
- Program module 42 typically performs the functions and/or methods of the embodiments described herein.
- Computer system/server 12 may also be in communication with one or more external devices 14 (e.g., a keyboard, pointing device, display 24, etc.), and may also be in communication with one or more devices that enable a user to interact with the computer system/server 12. And/or in communication with any device (e.g., network card, modem, etc.) that enables the computer system/server 12 to communicate with one or more other computing devices. This communication can take place via an input/output (I/O) interface 22. Also, computer system/server 12 may also communicate with one or more networks (e.g., a local area network (LAN), a wide area network (WAN), and/or a public network, such as the Internet) through network adapter 20. As shown in FIG.
- LAN local area network
- WAN wide area network
- public network such as the Internet
- network adapter 20 communicates with other modules of computer system/server 12 via bus 18. It should be understood that although not shown in the figures, other hardware and/or software modules may be utilized in conjunction with computer system/server 12, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, Tape drives and data backup storage systems.
- the processor 16 executes various functional applications and data processing by running a program stored in the memory 28, for example, implementing the method in the embodiment shown in Fig. 1 or 2.
- the present application also discloses a computer readable storage medium having stored thereon a computer program that, when executed by a processor, implements the method of the embodiment shown in FIG. 1 or 2.
- the computer readable medium can be a computer readable signal medium or a computer readable storage medium.
- the computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the above. More specific examples (non-exhaustive lists) of computer readable storage media include: electrical connections having one or more wires, a portable computer disk, a hard disk, a random access memory (RAM), a read only memory (ROM), Erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disk read only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
- a computer readable storage medium can be any tangible medium that can contain or store a program, which can be used by or in connection with an instruction execution system, apparatus or device.
- a computer readable signal medium may include a data signal that is propagated in the baseband or as part of a carrier, carrying computer readable program code. Such propagated data signals can take a variety of forms including, but not limited to, electromagnetic signals, optical signals, or any suitable combination of the foregoing.
- the computer readable signal medium can also be any computer readable medium other than a computer readable storage medium, which can transmit, propagate, or transport a program for use by or in connection with the instruction execution system, apparatus, or device. .
- Program code embodied on a computer readable medium can be transmitted by any suitable medium, including but not limited to wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
- Computer program code for performing the operations of the present application may be written in one or more programming languages, or a combination thereof, including an object oriented programming language such as Java, Smalltalk, C++, and conventional A procedural programming language - such as the "C" language or a similar programming language.
- the program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer, partly on the remote computer, or entirely on the remote computer or server.
- the remote computer can be connected to the user's computer through any kind of network, including a local area network (LAN) or a wide area network (WAN), or can be connected to an external computer (eg, using an Internet service provider) Internet connection).
- LAN local area network
- WAN wide area network
- Internet service provider Internet service provider
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of hardware plus software functional units.
- the above-described integrated unit implemented in the form of a software functional unit can be stored in a computer readable storage medium.
- the software functional unit described above is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to perform the methods described in various embodiments of the present application. Part of the steps.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
- Information Transfer Between Computers (AREA)
Abstract
本申请公开了Wi-Fi连接方法、计算机设备及存储介质,其中方法包括:网页模块获取终端扫描到的第一Wi-Fi列表,网页模块为预存在本地或按照预定方式获取到本地的;确定第一Wi-Fi列表中的选定的无线接入点;当选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的选定的无线接入点的接入信息,连接选定的无线接入点。应用本申请所述方案,用户无需提供接入信息即可连接到加密无线接入点,而且无需安装第三方应用,从而减少了对于系统资源的占用等。
Description
本申请涉及网络技术,特别涉及Wi-Fi连接方法、计算机设备及存储介质。
现有技术中,用户通常采用以下两种方式来连接Wi-Fi:
1)通过终端中的系统自带的Wi-Fi连接页面进行连接,对于加密无线接入点(Wi-Fi接入点),用户需要主动提供接入信息如密码信息;
2)通过第三方应用(APP)进行连接,通常来说,这类第三方应用可以向用户提供一些加密无线接入点的接入信息,以便根据获取到的接入信息连接加密无线接入点。
但是,对于方式1)来说,如果用户不知道加密无线接入点的接入信息,则无法连接到加密无线接入点,从而影响了用户使用,对于方式2)来说,虽然可以使用户连接到加密无线接入点,但需要用户额外安装第三方应用,从而增大了对于系统资源的占用等。
【发明内容】
本申请中提供了Wi-Fi连接方法、计算机设备及存储介质。
根据本申请的一些实施例的一种Wi-Fi连接方法,包括:网页模块获取终端扫描到的第一Wi-Fi列表,网页模块为预存在本地或按照预定方式获取到本地的;确定第一Wi-Fi列表中的选定的无线接入点;当选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的选定的无线接入点的接入信息,连接选定的无线接入点。
根据本申请的一些实施例的一种计算机设备,包括存储器、处理器及存储 在所述存储器上并可在所述处理器上运行的计算机程序,所述处理器执行所述程序时实现如以上所述的方法。
根据本申请的一些实施例的一种计算机可读存储介质,其上存储有计算机程序,所述程序被处理器执行时实现如以上所述的方法。
基于上述介绍可以看出,采用本申请所述方案,用户无需主动提供加密无线接入点的接入信息,即可自动连接到加密无线接入点,这样,即便用户不知道加密无线接入点的接入信息,也不会影响用户的使用,而且,用户无需额外安装第三方应用,从而减少了对于系统资源的占用等。
图1为根据本申请所述的Wi-Fi连接方法的第一实施例的流程图。
图2为根据本申请所述的Wi-Fi连接方法的第二实施例的流程图。
图3示出了适于用来实现本申请实施方式的示例性计算机系统/服务器12的框图。
本申请中提出一种Wi-Fi连接方案,可在无需安装第三方应用的情况下,获得加密无线接入点的接入信息并进行连接。
为了使本申请的技术方案更加清楚、明白,以下参照附图并举实施例,对本申请所述方案进行进一步说明。
显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其它实施例,都属于本申请保护的范围。
图1为根据本申请所述的Wi-Fi连接方法的第一实施例的流程图。如图1所示,包括以下具体实现方式。
在101中,网页模块获取终端扫描到的第一Wi-Fi列表,网页模块为预存在本地或按照预定方式获取到本地的。
在102中,网页模块确定第一Wi-Fi列表中的选定的无线接入点。
在103中,当选定的无线接入点为可连接的加密无线接入点时,网页模块根据来自服务器的选定的无线接入点的接入信息,连接选定的无线接入点。
所述终端包括但不限于任何一种可与用户进行人机交互并能够实现无线通信功能的智能终端设备,如智能手机、平板电脑、笔记本电脑等。所述智能终端设备可以采用任意操作系统,如Android操作系统、iOS操作系统、Windows操作系统等。
所述服务器,包括但不限于云端服务设备和异地存储服务设备等。在本申请的一些实施例中,优选所述服务器为云端服务设备。
网页模块可为预存在本地或按照预定方式获取到本地的。比如,网页模块可预存在本地,并可通过本地存储地址来读取预存在本地的网页模块。再比如,网页模块可由终端以外的设备通过传输协议传输到本地,所述传输协议可为近距离通信协议等。再比如,网页模块可由终端中的应用通过访问网址下载到本地。在一些实施例中,网页模块可包括网页文件,例如,html文件等。需要说明的是,html文件仅为举例,而非表示限制,本领域技术人员可以理解,其它可适用于本申请的方案的网页文件,均应包含在本申请的范围内。
无线接入点的接入信息表示通过无线接入点的认证所需的信息;在一些实施例中,无线接入点的接入信息包括但不限于无线接入点的密码、无线接入点的认证信息等。
在一些实施例中,网页模块可包括用于辅助连接Wi-Fi网络的网页的代码或脚本;如前所述,终端中的应用可通过访问与网页模块对应的网址,将网页模块下载至本地,并运行该网页模块,以将用于辅助连接Wi-Fi网络的网页呈现给用户。在一些实施例中,本申请的用于辅助连接Wi-Fi网络的网页可基于渐进性网页应用(PWA,Progressive Web App)实现。
在一些实施例中,下载并运行网页模块的应用可以包括浏览器或其它能够 运行并呈现网页的应用。在一些实施例中,与网页模块对应的网址可基于用户的操作获得;例如,通过获取用户在浏览器的地址中输入的内容来获得网址,或通过用户点击链接的操作来获得网址等。在一些实施例中,网页模块对应的网址可来自终端或其它应用。本实施例中不限定与网页模块对应的网址的获取方式。
网页模块可首先获取终端扫描到的第一Wi-Fi列表,第一Wi-Fi列表中包括终端扫描到的附近的无线接入点的信息。
在一些实施例中,网页模块可通过运行网页模块的应用的第一接口来获取第一Wi-Fi列表。比如,运行网页模块的应用为浏览器,那么,网页模块可通过浏览器的第一接口来获取由终端扫描到的附近的无线接入点组成的第一Wi-Fi列表。例如,网页模块调用第一接口,通过第一接口向终端的操作系统发起请求,并获得操作系统返回的第一wifi列表。
本实施例中,第一接口具体为何种接口不作限制,只要能够支持网页模块完成获取终端扫描到的无线接入点的信息的操作即可。
网页模块可将获取到的第一Wi-Fi列表上传到服务器,并获取服务器返回的第二Wi-Fi列表,第二Wi-Fi列表中包括可连接的加密无线接入点的标识。
在将第一Wi-Fi列表上传到服务器之前,网页模块还可先确定终端是否已连接到移动数据网络,如果已连接,则可直接通过移动数据网络将第一Wi-Fi列表上传到服务器,如果未连接,则可指示终端连接到移动数据网络,或者,展示用于提示用户连接移动数据网络的提示信息,待连接到移动数据网络后,通过移动数据网络将第一Wi-Fi列表上传到服务器。
在实际应用中,无线接入点的类型可包括但不限于:开放式无线接入点、加密无线接入点以及认证无线接入点等。开放式无线接入点是指可直接进行连接的无线接入点;加密无线接入点是指需要提供接入信息的无线接入点;认证无线接入点是指不需要提供接入信息但需要进行认证的无线接入点,比如,需要通过web页面输入手机号来进行认证的无线接入点、又比如需要向商家提供的无线接入点提供与该商家合作的应用的认证信息的无线接入点等。
第二Wi-Fi列表中的可连接的加密无线接入点表示服务器可提供相应的接入信息的加密无线接入点。第二Wi-Fi列表中包括可连接的加密无线接入点的标识,以使网页模块能够识别出可连接的加密无线接入点。在一些实施例中,第二Wi-Fi列表中包括可连接的加密无线接入点以及其它无线接入点;在此情况下,第二Wi-Fi列表中可标记可连接的加密无线接入点,以使可连接的加密无线接入点被识别;本实施例中,对标记可连接的加密无线接入点的方式不作限定。
相应地,网页模块可根据第二Wi-Fi列表向用户提示可连接的加密无线接入点。例如,网页模块可将第一Wi-Fi列表或第二Wi-Fi列表展示给用户,并可通过文字或图形等形式,在所展示的第一或第二Wi-Fi列表上进一步展示出提示信息,以告知用户哪些加密无线接入点可连接。比如,在每个可连接的加密无线接入点后面展示一个“钥匙”图标,或者,展示“可连接”字样;用户可通过所展示的图标或文字来确定哪些加密无线接入点可以连接。
用户可对所展示的无线接入点进行选择,选定的无线接入点可能是开放式无线接入点,也可能是加密无线接入点,还可能是认证无线接入点。
如果选定的无线接入点是开放式无线接入点,则可直接进行连接;如果选定的无线接入点是认证无线接入点,则可引导用户进行认证;如果选定的无线接入点是加密无线接入点,则网页模块可向服务器请求选定的无线接入点的接入信息,并接收服务器返回的选定的无线接入点的接入信息,进而根据获取到的接入信息连接选定的无线接入点。
上述处理方式中,网页模块在获取到用户选定的无线接入点后,再向服务器请求选定的无线接入点的接入信息。作为另外一种处理方式,服务器可将第二Wi-Fi列表中的部分或全部可连接的加密无线接入点的接入信息提供给终端,例如,服务器在返回第二Wi-Fi列表时可一并提供第二Wi-Fi列表中包括的可连接的加密无线接入点的接入信息;网页模块可接收服务器返回的可连接的加密无线接入点的接入信息,例如,在接收服务器返回的第二Wi-Fi列表时一并获得其中的可连接的加密无线接入点的接入信息。这样,网页模块在获取到用户选定的无线接入点后,无需再向服务器请求选定的无线接入点的接入信息,直接 根据选定的无线接入点的已获得的接入信息连接选定的无线接入点即可,从而简化了处理流程。
另外,上述实施例中,都是由用户来进行无线接入点的选择;在其它实施例中,也可以由服务器来进行选择并通知网页模块,或者,还可以由网页模块来进行选择。比如,可从可连接的加密无线接入点中选出信号质量最好的一个;又比如,根据加密无线接入点的信息对其进行评估,并选出评估值最高的一个加密无线接入点,作为选定的无线接入点,等等。
网页模块可根据选定的无线接入点的接入信息,连接选定的无线接入点。具体地,网页模块可通过运行网页模块的应用的第二接口,根据选定的无线接入点的接入信息连接选定的无线接入点。
比如,运行网页模块的应用为浏览器,那么,网页模块可通过浏览器的第二接口,根据选定的无线接入点的接入信息连接选定的无线接入点。例如,网页模块调用第二接口,通过第二接口发出用于指示连接无线接入点的指令,系统基于该指令连接相应的无线接入点。
第二接口具体为何种接口不作限制,只要能够支持网页模块完成连接无线接入点的操作即可。
网页模块还可提示用户与选定的无线接入点连接成功还是失败,如果连接失败,那么网页模块可获取重新选定的无线接入点,并在当重新选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的重新选定的无线接入点的接入信息,连接重新选定的无线接入点等。
图2为根据本申请所述的Wi-Fi连接方法的第二实施例的流程图。如图2所示,包括以下具体实现方式。
在201中,网页模块获取终端扫描到的第一Wi-Fi列表。
网页模块可由终端中的应用,如浏览器,通过访问网址下载到本地。
网页模块可通过运行网页模块的应用的第一接口来获取第一Wi-Fi列表,第一Wi-Fi列表中包括终端扫描到的附近的各无线接入点。
在202中,网页模块确定终端是否已连接到移动数据网络,如果是,则执行204,如果否,则执行203。
在203中,网页模块指示终端连接到移动数据网络,或展示用于提示用户连接移动数据网络的提示信息,连接成功后,执行204。
在204中,网页模块将第一Wi-Fi列表上传到服务器。
在205中,网页模块获取服务器返回的第二Wi-Fi列表,第二Wi-Fi列表中包括可连接的加密无线接入点的标识。
无线接入点的类型可包括:开放式无线接入点、加密无线接入点以及认证无线接入点等。
在206中,网页模块根据第二Wi-Fi列表向用户提示可连接的加密无线接入点。
网页模块可将第二Wi-Fi列表(也可以是第一Wi-Fi列表)展示给用户,并通过文字或图形等形式在所展示的第二Wi-Fi列表上进一步展示出提示信息,以告知用户哪些加密无线接入点可连接。
在207中,网页模块根据用户对所展示的无线接入点进行的选择操作,确定选定的无线接入点。
用户可对所展示的无线接入点进行选择,选定的无线接入点可能是开放式无线接入点,也可能是加密无线接入点,还可能是认证无线接入点。
在208中,当选定的无线接入点为可连接的加密无线接入点时,网页模块向服务器请求选定的无线接入点的接入信息。
在209中,网页模块接收服务器返回的选定的无线接入点的接入信息,根据获取到的接入信息连接选定的无线接入点。
本实施例中,网页模块在获取到用户选定的无线接入点后,再向服务器请求选定的无线接入点的接入信息。作为另外一种处理方式,服务器可将第二Wi-Fi列表中的部分或全部可连接的加密无线接入点的接入信息提供给终端,例如,服务器在返回第二Wi-Fi列表时可一并提供第二Wi-Fi列表中包括的可连接的加密无线接入点的接入信息;网页模块可接收服务器返回的可连接的加密无 线接入点的接入信息,例如,在接收服务器返回的第二Wi-Fi列表时一并获得其中的可连接的加密无线接入点的接入信息。这样,网页模块在获取到用户选定的无线接入点后,无需再向服务器请求选定的无线接入点的接入信息,直接根据选定的无线接入点的已获得的接入信息连接选定的无线接入点即可,从而简化了处理流程。
另外,网页模块可通过运行网页模块的应用如浏览器的第二接口,根据选定的无线接入点的接入信息连接选定的无线接入点。
网页模块还可提示用户与选定的无线接入点连接成功还是失败,如果连接失败,那么网页模块可获取重新选定的无线接入点,并在当重新选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的重新选定的无线接入点的接入信息,连接重新选定的无线接入点等。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其它顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其它实施例中的相关描述。
总之,采用上述各方法实施例所述方案,用户无需主动提供加密无线接入点的接入信息,即可自动连接到加密无线接入点,这样,即便用户不知道加密无线接入点的接入信息,也不会影响用户的使用,而且,用户无需额外安装第三方应用,从而减少了对于系统资源的占用等。
图3示出了适于用来实现本申请实施方式的示例性计算机系统/服务器12的框图。图3显示的计算机系统/服务器12仅仅是一个示例,不应对本申请实施例的功能和使用范围带来任何限制。
如图3所示,计算机系统/服务器12以通用计算设备的形式表现。计算机系统/服务器12的组件可以包括但不限于:一个或者多个处理器(处理单元)16,存储器28,连接不同系统组件(包括存储器28和处理器16)的总线18。
总线18表示几类总线结构中的一种或多种,包括存储器总线或者存储器控制器,外围总线,图形加速端口,处理器或者使用多种总线结构中的任意总线结构的局域总线。举例来说,这些体系结构包括但不限于工业标准体系结构(ISA)总线,微通道体系结构(MAC)总线,增强型ISA总线、视频电子标准协会(VESA)局域总线以及外围组件互连(PCI)总线。
计算机系统/服务器12典型地包括多种计算机系统可读介质。这些介质可以是任何能够被计算机系统/服务器12访问的可用介质,包括易失性和非易失性介质,可移动的和不可移动的介质。
存储器28可以包括易失性存储器形式的计算机系统可读介质,例如随机存取存储器(RAM)30和/或高速缓存存储器32。计算机系统/服务器12可以进一步包括其它可移动/不可移动的、易失性/非易失性计算机系统存储介质。仅作为举例,存储系统34可以用于读写不可移动的、非易失性磁介质(图3未显示,通常称为“硬盘驱动器”)。尽管图3中未示出,可以提供用于对可移动非易失性磁盘(例如“软盘”)读写的磁盘驱动器,以及对可移动非易失性光盘(例如CD-ROM,DVD-ROM或者其它光介质)读写的光盘驱动器。在这些情况下,每个驱动器可以通过一个或者多个数据介质接口与总线18相连。存储器28可以包括至少一个程序产品,该程序产品具有一组(例如至少一个)程序模块,这些程序模块被配置以执行本申请各实施例的功能。
具有一组(至少一个)程序模块42的程序/实用工具40,可以存储在例如存储器28中,这样的程序模块42包括——但不限于——操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。程序模块42通常执行本申请所描述的实施例中的功能和/或方法。
计算机系统/服务器12也可以与一个或多个外部设备14(例如键盘、指向设备、显示器24等)通信,还可与一个或者多个使得用户能与该计算机系统/服务器12交互的设备通信,和/或与使得该计算机系统/服务器12能与一个或多个其它计算设备进行通信的任何设备(例如网卡,调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口22进行。并且,计算机系统/服务器12还可以通过网络适配器20与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图3所示,网络适配器20通过总线18与计算机系统/服务器12的其它模块通信。应当明白,尽管图中未示出,可以结合计算机系统/服务器12使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。
处理器16通过运行存储在存储器28中的程序,从而执行各种功能应用以及数据处理,例如实现图1或2所示实施例中的方法。
本申请同时公开了一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时将实现如图1或2所示实施例中的方法。
可以采用一个或多个计算机可读的介质的任意组合。计算机可读介质可以是计算机可读信号介质或者计算机可读存储介质。计算机可读存储介质例如可以是——但不限于——电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。计算机可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式计算机磁盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑磁盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。在本文件中,计算机可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。
计算机可读的信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了计算机可读的程序代码。这种传播的数据信号可以采用多种形式,包括——但不限于——电磁信号、光信号或上述的任意合适的组合。计算机可读的信号介质还可以是计算机可读存储介质以外的任何计算机可读介质,该计算机可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。
计算机可读介质上包含的程序代码可以用任何适当的介质传输,包括——但不限于——无线、电线、光缆、RF等等,或者上述的任意合适的组合。
可以以一种或多种程序设计语言或其组合来编写用于执行本申请操作的计算机程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、Smalltalk、C++,还包括常规的过程式程序设计语言—诸如”C”语言或类似的程序设计语言。程序代码可以完全地在用户计算机上执行、部分地在用户计算机上执行、作为一个独立的软件包执行、部分在用户计算机上部分在远程计算机上执行、或者完全在远程计算机或服务器上执行。在涉及远程计算机的情形中,远程计算机可以通过任意种类的网络——包括局域网(LAN)或广域网(WAN)—连接到用户计算机,或者,可以连接到外部计算机(例如利用因特网服务提供商来通过因特网连接)。
在本申请所提供的几个实施例中,应该理解到,所揭露的装置和方法等,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中, 也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用硬件加软件功能单元的形式实现。
上述以软件功能单元的形式实现的集成的单元,可以存储在一个计算机可读取存储介质中。上述软件功能单元存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器(processor)执行本申请各个实施例所述方法的部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述仅为本申请的较佳实施例而已,并不用以限制本申请,凡在本申请的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本申请保护的范围之内。
Claims (11)
- 一种Wi-Fi连接方法,其特征在于,包括:网页模块获取终端扫描到的第一Wi-Fi列表,所述网页模块为预存在本地或按照预定方式获取到本地的;确定所述第一Wi-Fi列表中的选定的无线接入点;当所述选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的所述选定的无线接入点的接入信息,连接所述选定的无线接入点。
- 根据权利要求1所述的方法,其特征在于,所述网页模块获取终端扫描到的第一Wi-Fi列表,包括:所述网页模块通过运行所述网页模块的应用的第一接口获取所述第一Wi-Fi列表。
- 根据权利要求1所述的方法,其特征在于,根据来自服务器的所述选定的无线接入点的接入信息连接所述选定的无线接入点,包括:所述网页模块通过运行所述网页模块的应用的第二接口,根据所述接入信息连接所述无线接入点。
- 根据权利要求1所述的方法,其特征在于,该方法还包括:所述网页模块将所述第一Wi-Fi列表上传到服务器;所述网页模块获取服务器返回的第二Wi-Fi列表,所述第二Wi-Fi列表中包括可连接的加密无线接入点的标识。
- 根据权利要求4所述的方法,其特征在于,该方法还包括:所述网页模块根据所述第二Wi-Fi列表向用户提示可连接的加密无线接入点;所述确定所述第一Wi-Fi列表中的选定的无线接入点包括:所述网页模块根据用户对所展示的无线接入点进行的选择操作,确定所述选定的无线接入点;所述当所述选定的无线接入点为可连接的加密无线接入点时,根据来自服 务器的所述选定的无线接入点的接入信息,连接所述Wi-Fi接入点,包括:当所述选定的无线接入点为可连接的加密无线接入点时,所述网页模块向服务器请求所述选定的无线接入点的接入信息;所述网页模块接收服务器返回的所述选定的无线接入点的接入信息,根据所述接入信息连接所述选定的无线接入点。
- 根据权利要求4所述的方法,其特征在于,该方法还包括:所述网页模块获取服务器返回的所述第二Wi-Fi列表中包括的可连接的加密无线接入点的接入信息。
- 根据权利要求4所述的方法,其特征在于,所述网页模块将所述第一Wi-Fi列表上传到服务器之前,该方法还包括:若所述终端未连接到移动数据网络,所述网页模块指示所述终端连接到移动数据网络,或展示用于提示用户连接所述移动数据网络的提示信息。
- 根据权利要求1所述的方法,其特征在于,所述连接所述选定的接入点之后,进一步包括:若连接失败,则所述网页模块确定重新选定的无线接入点,当所述重新选定的无线接入点为可连接的加密无线接入点时,根据来自服务器的所述重新选定的无线接入点的接入信息,连接所述重新选定的无线接入点。
- 根据权利要求1所述的方法,其特征在于,所述预定方式包括:由所述终端中的应用通过访问网址下载到本地;或者,由所述终端以外的设备通过传输协议传输到本地。
- 一种计算机设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其特征在于,所述处理器执行所述程序时实现如权利要求1~9中任一项所述的方法。
- 一种计算机可读存储介质,其上存储有计算机程序,其特征在于,所 述程序被处理器执行时实现如权利要求1~9中任一项所述的方法。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810039724.5A CN108135026B (zh) | 2018-01-16 | 2018-01-16 | Wi-Fi连接方法、计算机设备及存储介质 |
CN201810039724.5 | 2018-01-16 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019141192A1 true WO2019141192A1 (zh) | 2019-07-25 |
Family
ID=62400690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2019/072010 WO2019141192A1 (zh) | 2018-01-16 | 2019-01-16 | Wi-Fi连接方法、计算机设备及存储介质 |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108135026B (zh) |
WO (1) | WO2019141192A1 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108135026B (zh) * | 2018-01-16 | 2022-02-25 | 上海尚往网络科技有限公司 | Wi-Fi连接方法、计算机设备及存储介质 |
CN109446449B (zh) * | 2018-10-09 | 2022-05-10 | 南京尚网网络科技有限公司 | 一种预先刷新资讯页面内容的方法及设备 |
CN110248396B (zh) * | 2019-06-21 | 2021-10-22 | 惠州Tcl移动通信有限公司 | 一种无线网络多接入点选择方法、智能终端及存储介质 |
CN111182532B (zh) * | 2019-06-26 | 2022-07-29 | 腾讯科技(深圳)有限公司 | 无线局域网连接方法、装置、系统、设备及存储介质 |
CN112040564B (zh) * | 2020-08-25 | 2023-02-28 | 北京大米科技有限公司 | 信息传输方法、可读存储介质和电子设备 |
CN114205824B (zh) * | 2021-08-31 | 2024-09-24 | 浙江绍兴苏泊尔生活电器有限公司 | 一种家电产品连接到无线网络的方法 |
CN114980270A (zh) * | 2022-05-12 | 2022-08-30 | 上海华客信息科技有限公司 | Wifi连接的管理方法、系统、设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458409A (zh) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | 网络连接方法、网络共享方法及装置 |
CN103458408A (zh) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | 网络连接方法、网络共享方法及装置 |
US20140194062A1 (en) * | 2013-01-04 | 2014-07-10 | Nokia Corporation | Method, apparatus, and computer program product for wireless short-range communication |
CN105682015A (zh) * | 2016-04-05 | 2016-06-15 | 上海连尚网络科技有限公司 | 一种用于建立无线连接的方法与设备 |
CN108135026A (zh) * | 2018-01-16 | 2018-06-08 | 上海连尚网络科技有限公司 | Wi-Fi连接方法、计算机设备及存储介质 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103874018B (zh) * | 2014-02-21 | 2018-03-20 | 小米科技有限责任公司 | 接入点信息共享方法及装置 |
US9742775B2 (en) * | 2014-07-01 | 2017-08-22 | Google Inc. | Wireless local area network access |
CN106658666B (zh) * | 2015-10-29 | 2022-01-04 | 上海尚往网络科技有限公司 | 一种用于建立无线连接的方法与设备 |
CN105873239B (zh) * | 2015-12-14 | 2017-10-17 | 上海连尚网络科技有限公司 | 用于为用户设备的应用建立无线连接的方法 |
CN107295607A (zh) * | 2017-07-05 | 2017-10-24 | 上海连尚网络科技有限公司 | 用于连接无线接入点的方法和设备 |
-
2018
- 2018-01-16 CN CN201810039724.5A patent/CN108135026B/zh active Active
-
2019
- 2019-01-16 WO PCT/CN2019/072010 patent/WO2019141192A1/zh active Application Filing
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140194062A1 (en) * | 2013-01-04 | 2014-07-10 | Nokia Corporation | Method, apparatus, and computer program product for wireless short-range communication |
CN103458409A (zh) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | 网络连接方法、网络共享方法及装置 |
CN103458408A (zh) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | 网络连接方法、网络共享方法及装置 |
CN105682015A (zh) * | 2016-04-05 | 2016-06-15 | 上海连尚网络科技有限公司 | 一种用于建立无线连接的方法与设备 |
CN108135026A (zh) * | 2018-01-16 | 2018-06-08 | 上海连尚网络科技有限公司 | Wi-Fi连接方法、计算机设备及存储介质 |
Also Published As
Publication number | Publication date |
---|---|
CN108135026B (zh) | 2022-02-25 |
CN108135026A (zh) | 2018-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019141192A1 (zh) | Wi-Fi连接方法、计算机设备及存储介质 | |
US10747857B2 (en) | Event-based security challenges | |
US9021468B1 (en) | Bundling extension installation with web browser installation | |
US9454540B2 (en) | Systems and methods for sharing files among multiple terminals | |
US10069832B2 (en) | Ephemeral applications | |
EP3203709B1 (en) | Cloud service server and method for managing cloud service server | |
US9948750B2 (en) | Tailoring content to be delivered to mobile device based upon features of mobile device | |
WO2019072214A1 (zh) | Wifi热点分享方法、设备及存储介质 | |
JP6018316B2 (ja) | 端末認証登録システム、端末認証登録方法およびプログラム | |
US11620035B2 (en) | Streamlined hosted applications | |
US9805181B1 (en) | Messaging channel for web pages and web applications | |
US20130042310A1 (en) | Method and system for automatic authentication | |
WO2019042116A1 (zh) | 一种网络连接的处理方法、装置、设备和计算机存储介质 | |
US9300610B2 (en) | System and method for selecting a file stored on a cloud server | |
CN111538922B (zh) | 链接跳转方法、应用客户端、设备及存储介质 | |
US20180337922A1 (en) | Method and device for controlling smart device, server and storage medium | |
US20200220824A1 (en) | Method, a device and a storage medium of forwarding voice information in instant messaging | |
US9449194B2 (en) | Secure access to running client application features from a browser application | |
US9288189B2 (en) | Retrieving both sensitive and non-sensitive content in a secure manner | |
US9763082B2 (en) | Optimizing setup for wireless devices | |
CN108601064B (zh) | 一种提供及获取无线接入点相关信息的方法 | |
JP6021723B2 (ja) | 管理サーバ、通信端末、ユーザ登録システム及びユーザ登録方法 | |
CN115080065A (zh) | 分享方法、装置、电子设备及可读介质 | |
CN110597525A (zh) | 用于安装应用的方法和装置 | |
JP7570193B2 (ja) | 情報処理装置、アプリケーションの起動方法及びプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19741752 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
32PN | Ep: public notification in the ep bulletin as address of the adressee cannot be established |
Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 16.10.2020) |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 19741752 Country of ref document: EP Kind code of ref document: A1 |