WO2021104114A1 - 一种提供无线保真WiFi网络接入服务的方法及电子设备 - Google Patents

一种提供无线保真WiFi网络接入服务的方法及电子设备 Download PDF

Info

Publication number
WO2021104114A1
WO2021104114A1 PCT/CN2020/129593 CN2020129593W WO2021104114A1 WO 2021104114 A1 WO2021104114 A1 WO 2021104114A1 CN 2020129593 W CN2020129593 W CN 2020129593W WO 2021104114 A1 WO2021104114 A1 WO 2021104114A1
Authority
WO
WIPO (PCT)
Prior art keywords
electronic device
wifi network
configuration information
router
hidden
Prior art date
Application number
PCT/CN2020/129593
Other languages
English (en)
French (fr)
Inventor
刘烨
胡卫卫
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Publication of WO2021104114A1 publication Critical patent/WO2021104114A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/47Security arrangements using identity modules using near field communication [NFC] or radio frequency identification [RFID] modules
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Definitions

  • This application relates to the field of communication technology, and in particular to a method and electronic device for providing wireless fidelity WiFi network access services.
  • a family often has multiple electronic devices (for example, mobile phones, smart TVs, smart speakers, etc.) that can communicate with each other. These electronic devices can access a wireless fidelity (Wireless Fidelity, WiFi) network through a router, and then access the Internet.
  • a wireless fidelity Wireless Fidelity, WiFi
  • a user In order to add an electronic device to the Wi-Fi network created by the router, a user usually needs the following steps: turn on the WiFi switch, search for available Wi-Fi networks around, select the router's SSID, and enter a password. The steps are relatively cumbersome.
  • NFC Near Field Communication
  • the Wi-Fi network can adopt the open mode (Open), that is, no encryption at all.
  • Open an open mode
  • anyone can connect to the router to use the network.
  • the newly purchased router is in the Open mode after power on, and the user must manually set the encryption method to ensure the security of communication .
  • the current mainstream encryption methods include WEP, WPA/WPA2, WPA-PSK/WPA2-PSK.
  • a device equipped with an Android operating system performs a touch-and-connect operation when the WiFi network created by the router is in the Open mode.
  • the native code processing logic of the Android device has a problem, and the WiFi network is encrypted by mistake.
  • the pattern recognition is a WPA2 authentication method, which causes the Android device to be unable to connect to the WiFi network in the Open mode created by the router.
  • Android manufacturers can choose to use patch upgrades to solve the problem, but the patch upgrade method cannot cover all Android manufacturers' models, because the current patch upgrade rate of Android manufacturers is generally low, and basically the upgrade rate of new models is higher. , And the performance of the older products was not satisfactory.
  • This application provides a method for providing wireless fidelity WiFi network access services, which improves the success rate of Android devices connecting to a router with one touch.
  • the present application provides a method for providing Wi-Fi WiFi network access services.
  • the method includes: the first electronic device detects whether the first WiFi network configured by the first electronic device is encrypted; when the first WiFi network configured by the first electronic device is encrypted; When the network is not encrypted, a hidden WiFi network is created; the first electronic device sends the above-mentioned first configuration information of the hidden WiFi network to the second electronic device through near field communication NFC; the first electronic device obtains the target data sent by the second electronic device The first access request of the hidden WiFi network is hidden; in response to the first access request, the first electronic device establishes a communication connection with the second electronic device.
  • the first electronic device (for example, a router) can detect whether an unencrypted first WiFi network is configured, and if it detects that an unencrypted first WiFi network is configured, a hidden WiFi network is created, and the hidden WiFi network is hidden.
  • the configuration information of the network is sent to the second electronic device (for example, a mobile phone or a smart speaker).
  • the second electronic device can then touch the first electronic device, read the configuration information (for example, SSID and password) of the hidden WiFi network through NFC, and connect to the hidden WiFi network for communication.
  • an OPEN mode first WiFi network is activated (for example, after the first electronic device is powered on for the first time, an unencrypted first WiFi network is activated according to the factory settings, or the first electronic device is powered by The user configures an unencrypted first WiFi network), the user holds the second electronic device and touches the first electronic device actually connected to a hidden WiFi network, the hidden WiFi network is encrypted and invisible to other devices ( That is, other devices cannot scan the SSID of the hidden WiFi network).
  • the connection failure problem mentioned in the background technology section will not occur, and the first electronic device equipped with the Android operating system does not need to be upgraded to solve the problem, which significantly improves the user experience.
  • the above-mentioned hiding the configuration information of the WiFi network includes hiding at least one of the name or the password of the WiFi network.
  • the second electronic device is equipped with an Android operating system.
  • the second electronic device can also be equipped with other operating systems, such as an ios operating system.
  • the first electronic device when the first WiFi network configured by the first electronic device is encrypted, the first electronic device sends the second configuration information of the first WiFi network to the second electronic device through the near field communication NFC method, and then The first electronic device obtains a second access request for the first WiFi network sent by the second electronic device based on the second configuration information; in response to the second access request, the first electronic device establishes a communication connection with the second electronic device To communicate.
  • the second electronic device may send the third configuration information of the WiFi network to the first electronic device through NFC, and the first electronic device creates a WiFi network according to the third configuration information of the WiFi network.
  • the user can set the configuration information of the WiFi network on the second electronic device, and then touch the first electronic device to send the configuration information of the WiFi network to the first electronic device through NFC, and the first electronic device uses the WiFi The configuration information of the network creates a WiFi network. Then the second electronic device can directly connect to the WiFi network created by the first electronic device.
  • the second electronic device sends the second configuration information of the first WiFi network to the third electronic device through the near field communication NFC method, and then the third electronic device can follow the second configuration of the first WiFi network Information to create a WiFi network.
  • the second electronic device can transmit the configuration information of the first WiFi network of the first electronic device to the third electronic device by first touching the first electronic device and then touching the third electronic device.
  • the first configuration information of the aforementioned hidden WiFi network is sent to the second electronic device in a non-encrypted manner.
  • the present application provides an electronic device, including: one or more processors, one or more memories, and one or more computer programs; wherein the processor is coupled with the touch screen and the memory, and one or more of the foregoing A computer program is stored in the memory.
  • the processor executes one or more computer programs stored in the memory, so that the electronic device executes the information between multiple devices described in any one of the above Synchronization method.
  • the present application provides a computer storage medium, including computer instructions, which when the computer instructions run on an electronic device, cause the electronic device to execute the information between multiple devices as described in any one of the first aspect Synchronization method.
  • this application provides a computer program product, which when the computer program product runs on an electronic device, causes the electronic device to execute the method for information synchronization between multiple devices as described in any one of the first aspect.
  • the electronic device described in the second aspect provided above, the computer storage medium described in the third aspect, and the computer program product described in the fourth aspect can all implement the above-mentioned provision of wireless fidelity WiFi network access services.
  • the method, therefore, the beneficial effects that can be achieved can refer to the beneficial effects in the information synchronization provided above, which will not be repeated here.
  • FIG. 1 is a schematic diagram 1 of a WiFi network provided by an embodiment of this application.
  • FIG. 2 is a schematic structural diagram 1 of an electronic device provided by an embodiment of the application.
  • FIG. 3 is a schematic flowchart of a method for providing WiFi access services according to an embodiment of the application
  • FIG. 4 is a schematic diagram of an interface for connecting an electronic device to a WiFi network provided by an embodiment of the application
  • FIG. 5 is a schematic diagram of an interface for setting a WiFi network provided by an embodiment of the application.
  • FIG. 6 is a schematic diagram of a scenario in which WiFi networks are synchronized between different routers according to an embodiment of the application
  • FIG. 7 is a second structural diagram of an electronic device provided by an embodiment of this application.
  • FIG. 1 shows an example of a WiFi network 100 to which one or more of the apparatus, method, system, and/or computer program product described further herein may be applicable.
  • the depicted WiFi network 100 includes one or more electronic devices, such as a light bulb 102, a speaker 104, a mobile terminal 106, or other types of electronic devices in FIG. 1.
  • the electronic devices 102, 104, and 106 and other smart home devices are collectively referred to as "electronic devices”.
  • the bulb 102 can control changes in the light, such as changes in the color and brightness of the light.
  • the speaker 104 can have an integrated voice assistant module, which can provide interactive voice dialogue or query functions through a "wake-up word" (for example, "Hello, Xiaoyi"), and can also control other electronic devices (for example, control the light bulb 102). On or off).
  • the mobile terminal 106 shown in FIG. 1 is a mobile phone. Of course, it may also include a laptop computer, a desktop computer, a tablet computer, a wearable electronic device, a vehicle-mounted device, a virtual reality device, etc. The embodiment of this application does not do anything about this. limit.
  • the WiFi network 100 also includes a wireless router 108.
  • the router 108 is a device that provides Wi-Fi, and can transmit Internet information to a personal device (such as a computer, a mobile phone, or a tablet). These electronic devices will form a local area network (LAN) in the home.
  • the electronic devices can communicate through the wireless router 108 (for example, the light bulb 102 communicates with the speaker 104 through the wireless router 108).
  • the electronic device can also communicate with a remote server via a communication network (for example, a suitable communication network such as Long Term Evolution (LTE), Fifth Generation Mobile Communication (5G), etc.) through the wireless router 108.
  • LTE Long Term Evolution
  • 5G Fifth Generation Mobile Communication
  • electronic devices can also communicate directly (for example, through short-distance communication technologies such as Wi-Fi, NFC, and Bluetooth).
  • FIG. 1 the mobile terminal 106 shown in FIG. 1 will be used as an example to introduce the router access method
  • FIG. 2 shows a schematic structural diagram of the mobile terminal 106.
  • the mobile terminal 106 may include a processor 110, an external memory interface 120, an internal memory 121, a universal serial bus (USB) interface 130, a charging management module 140, a power management module 141, a battery 142, an antenna 1, and an antenna 2.
  • Mobile communication module 150 wireless communication module 160, audio module 170, speaker 170A, receiver 170B, microphone 170C, earphone interface 170D, sensor module 180, camera 193, display screen 194 and so on.
  • the structure illustrated in the embodiment of the present application does not constitute a specific limitation on the mobile terminal 106.
  • the mobile terminal 106 may include more or fewer components than shown, or combine certain components, or split certain components, or arrange different components.
  • the illustrated components can be implemented in hardware, software, or a combination of software and hardware.
  • the processor 110 may include one or more processing units.
  • the processor 110 may include an application processor (AP), a modem processor, a graphics processing unit (GPU), and an image signal processor. (image signal processor, ISP), controller, memory, video codec, digital signal processor (digital signal processor, DSP), baseband processor, and/or neural-network processing unit (NPU) Wait.
  • AP application processor
  • modem processor modem processor
  • GPU graphics processing unit
  • image signal processor image signal processor
  • ISP image signal processor
  • controller memory
  • video codec digital signal processor
  • DSP digital signal processor
  • NPU neural-network processing unit
  • the different processing units may be independent devices or integrated in one or more processors.
  • a memory may also be provided in the processor 110 to store instructions and data.
  • the memory in the processor 110 is a cache memory.
  • the memory can store instructions or data that have just been used or recycled by the processor 110. If the processor 110 needs to use the instruction or data again, it can be directly called from the memory. Repeated accesses are avoided, the waiting time of the processor 110 is reduced, and the efficiency of the system is improved.
  • the processor 110 may include one or more interfaces.
  • the interface may include an integrated circuit (inter-integrated circuit, I2C) interface, an integrated circuit built-in audio (inter-integrated circuit sound, I2S) interface, a pulse code modulation (pulse code modulation, PCM) interface, and a universal asynchronous transmitter/receiver (universal asynchronous) interface.
  • I2C integrated circuit
  • I2S integrated circuit built-in audio
  • PCM pulse code modulation
  • PCM pulse code modulation
  • UART universal asynchronous transmitter/receiver
  • MIPI mobile industry processor interface
  • GPIO general-purpose input/output
  • SIM subscriber identity module
  • USB Universal Serial Bus
  • the charging management module 140 is used to receive charging input from the charger.
  • the charger can be a wireless charger or a wired charger.
  • the charging management module 140 may receive the charging input of the wired charger through the USB interface 130.
  • the charging management module 140 may receive the wireless charging input through the wireless charging coil of the mobile terminal 106. While the charging management module 140 charges the battery 142, it can also supply power to the electronic device through the power management module 141.
  • the power management module 141 is used to connect the battery 142, the charging management module 140 and the processor 110.
  • the power management module 141 receives input from the battery 142 and/or the charging management module 140, and supplies power to the processor 110, the internal memory 121, the external memory, the display screen 194, the camera 193, and the wireless communication module 160.
  • the power management module 141 can also be used to monitor parameters such as battery capacity, battery cycle times, and battery health status (leakage, impedance).
  • the power management module 141 may also be provided in the processor 110.
  • the power management module 141 and the charging management module 140 may also be provided in the same device.
  • the wireless communication function of the mobile terminal 106 can be implemented by the antenna 1, the antenna 2, the mobile communication module 150, the wireless communication module 160, the modem processor, and the baseband processor.
  • the antenna 1 and the antenna 2 are used to transmit and receive electromagnetic wave signals.
  • Each antenna in the mobile terminal 106 can be used to cover a single or multiple communication frequency bands. Different antennas can also be reused to improve antenna utilization.
  • Antenna 1 can be multiplexed as a diversity antenna of a wireless local area network.
  • the antenna can be used in combination with a tuning switch.
  • the mobile communication module 150 can provide a wireless communication solution including 2G/3G/4G/5G and the like applied to the mobile terminal 106.
  • the mobile communication module 150 may include at least one filter, a switch, a power amplifier, a low noise amplifier (LNA), and the like.
  • the mobile communication module 150 can receive electromagnetic waves by the antenna 1, and perform processing such as filtering, amplifying and transmitting the received electromagnetic waves to the modem processor for demodulation.
  • the mobile communication module 150 can also amplify the signal modulated by the modem processor, and convert it into electromagnetic waves for radiation via the antenna 1.
  • at least part of the functional modules of the mobile communication module 150 may be provided in the processor 110.
  • at least part of the functional modules of the mobile communication module 150 and at least part of the modules of the processor 110 may be provided in the same device.
  • the wireless communication module 160 can provide applications on the mobile terminal 106, including wireless local area networks (WLAN) (such as wireless fidelity (Wi-Fi) networks), bluetooth (BT), and global navigation satellites. System (global navigation satellite system, GNSS), frequency modulation (FM), near field communication (NFC), infrared technology (infrared, IR) and other wireless communication solutions.
  • the wireless communication module 160 may be one or more devices integrating at least one communication processing module.
  • the wireless communication module 160 receives electromagnetic waves via the antenna 2, frequency modulates and filters the electromagnetic wave signals, and sends the processed signals to the processor 110.
  • the wireless communication module 160 may also receive a signal to be sent from the processor 110, perform frequency modulation, amplify, and convert it into electromagnetic waves to radiate through the antenna 2.
  • the antenna 1 of the mobile terminal 106 is coupled with the mobile communication module 150, and the antenna 2 is coupled with the wireless communication module 160, so that the mobile terminal 106 can communicate with the network and other devices through wireless communication technology.
  • the wireless communication technology may include global system for mobile communications (GSM), general packet radio service (GPRS), code division multiple access (CDMA), broadband Code division multiple access (wideband code division multiple access, WCDMA), time-division code division multiple access (TD-SCDMA), long term evolution (LTE), BT, GNSS, WLAN, NFC , FM, and/or IR technology, etc.
  • the GNSS may include global positioning system (GPS), global navigation satellite system (GLONASS), Beidou navigation satellite system (BDS), quasi-zenith satellite system (quasi -zenith satellite system, QZSS) and/or satellite-based augmentation systems (SBAS).
  • GPS global positioning system
  • GLONASS global navigation satellite system
  • BDS Beidou navigation satellite system
  • QZSS quasi-zenith satellite system
  • SBAS satellite-based augmentation systems
  • the mobile terminal 106 implements a display function through a GPU, a display screen 194, and an application processor.
  • the GPU is an image processing microprocessor, which is connected to the display screen 194 and the application processor.
  • the GPU is used to perform mathematical and geometric calculations and is used for graphics rendering.
  • the processor 110 may include one or more GPUs that execute program instructions to generate or change display information.
  • the display screen 194 is used to display images, videos, and the like.
  • the display screen 194 includes a display panel.
  • the display panel can adopt liquid crystal display (LCD), organic light-emitting diode (OLED), active matrix organic light-emitting diode or active-matrix organic light-emitting diode (active-matrix organic light-emitting diode).
  • LCD liquid crystal display
  • OLED organic light-emitting diode
  • active-matrix organic light-emitting diode active-matrix organic light-emitting diode
  • AMOLED flexible light-emitting diode (FLED), Miniled, MicroLed, Micro-oLed, quantum dot light-emitting diode (QLED), etc.
  • the mobile terminal 106 may include one or N display screens 194, and N is a positive integer greater than one.
  • the mobile terminal 106 can implement a shooting function through an ISP, a camera 193, a video codec, a GPU, a display screen 194, and an application processor.
  • the ISP is used to process the data fed back from the camera 193. For example, when taking a picture, the shutter is opened, the light is transmitted to the photosensitive element of the camera through the lens, the light signal is converted into an electrical signal, and the photosensitive element of the camera transfers the electrical signal to the ISP for processing and transforms it into an image visible to the naked eye.
  • ISP can also optimize the image noise, brightness, and skin color. ISP can also optimize the exposure, color temperature and other parameters of the shooting scene.
  • the ISP may be provided in the camera 193.
  • the camera 193 is used to capture still images or videos.
  • the object generates an optical image through the lens and is projected to the photosensitive element.
  • the photosensitive element may be a charge coupled device (CCD) or a complementary metal-oxide-semiconductor (CMOS) phototransistor.
  • CMOS complementary metal-oxide-semiconductor
  • the photosensitive element converts the optical signal into an electrical signal, and then transfers the electrical signal to the ISP to convert it into a digital image signal.
  • ISP outputs digital image signals to DSP for processing.
  • DSP converts digital image signals into standard RGB, YUV and other formats of image signals.
  • the mobile terminal 106 may include one or N cameras 193, and N is a positive integer greater than one.
  • Digital signal processors are used to process digital signals. In addition to digital image signals, they can also process other digital signals. For example, when the mobile terminal 106 selects the frequency point, the digital signal processor is used to perform Fourier transform on the energy of the frequency point.
  • Video codecs are used to compress or decompress digital video.
  • the mobile terminal 106 may support one or more video codecs. In this way, the mobile terminal 106 can play or record videos in multiple encoding formats, such as: moving picture experts group (MPEG) 1, MPEG2, MPEG3, MPEG4, and so on.
  • MPEG moving picture experts group
  • the external memory interface 120 may be used to connect an external memory card, such as a Micro SD card, so as to expand the storage capacity of the mobile terminal 106.
  • the external memory card communicates with the processor 110 through the external memory interface 120 to realize the data storage function. For example, save music, video and other files in an external memory card.
  • the internal memory 121 may be used to store computer executable program code, where the executable program code includes instructions.
  • the processor 110 executes various functional applications and data processing of the mobile terminal 106 by running instructions stored in the internal memory 121.
  • the internal memory 121 may include a storage program area and a storage data area.
  • the storage program area can store an operating system, an application program (such as a sound playback function, an image playback function, etc.) required by at least one function, and the like.
  • the data storage area can store data (such as audio data, phone book, etc.) created during the use of the mobile terminal 106.
  • the internal memory 121 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, a flash memory device, a universal flash storage (UFS), and the like.
  • UFS universal flash storage
  • the mobile terminal 106 can implement audio functions through the audio module 170, the speaker 170A, the receiver 170B, the microphone 170C, the earphone interface 170D, and the application processor. For example, music playback, recording, etc.
  • the audio module 170 is used to convert digital audio information into an analog audio signal for output, and is also used to convert an analog audio input into a digital audio signal.
  • the audio module 170 can also be used to encode and decode audio signals.
  • the audio module 170 may be provided in the processor 110, or part of the functional modules of the audio module 170 may be provided in the processor 110.
  • the speaker 170A also called “speaker” is used to convert audio electrical signals into sound signals.
  • the mobile terminal 106 can listen to music through the speaker 170A, or listen to a hands-free call.
  • the receiver 170B also called “earpiece” is used to convert audio electrical signals into sound signals.
  • the mobile terminal 106 answers a call or voice message, it can receive the voice by bringing the receiver 170B close to the human ear.
  • the microphone 170C also called “microphone”, “microphone”, is used to convert sound signals into electrical signals.
  • the user can make a sound by approaching the microphone 170C through the human mouth, and input the sound signal into the microphone 170C.
  • the mobile terminal 106 may be provided with at least one microphone 170C. In other embodiments, the mobile terminal 106 may be provided with two microphones 170C, which can implement noise reduction functions in addition to collecting sound signals. In other embodiments, the mobile terminal 106 may also be provided with three, four or more microphones 170C to collect sound signals, reduce noise, identify sound sources, and realize directional recording functions.
  • the earphone interface 170D is used to connect wired earphones.
  • the earphone interface 170D may be a USB interface 130, or a 3.5mm open mobile terminal platform (OMTP) standard interface, and a cellular telecommunications industry association (cellular telecommunications industry association of the USA, CTIA) standard interface.
  • OMTP open mobile terminal platform
  • CTIA cellular telecommunications industry association of the USA, CTIA
  • the sensor module 180 may include a pressure sensor, a gyroscope sensor, an air pressure sensor, a magnetic sensor, an acceleration sensor, a distance sensor, a proximity light sensor, a fingerprint sensor, a temperature sensor, a touch sensor, an ambient light sensor, a bone conduction sensor, etc.
  • the above-mentioned mobile terminal 106 may also include one or more devices such as buttons, motors, indicators, and SIM card interfaces, which are not limited in the embodiment of the present application.
  • FIG. 3 shows a signaling interaction diagram of the mobile terminal 106 accessing the WiFi network created by the router 108.
  • the router 108 detects whether the first WiFi network is encrypted, and the encryption mode of the WiFi network includes any of the following items: OPEN mode (ie "no encryption"), WEP, WPA/WPA2, WPA-PSK /WPA2-PSK. If the first WiFi network is encrypted, go to step 316; if the first WiFi network is not encrypted, go to step 304.
  • the first WiFi network may be a WiFi network configured by the router 108 itself, for example, a WiFi network created after the router 108 is powered on for the first time after leaving the factory.
  • step 302 can be replaced with: the router 108 detects whether it is in the factory state to determine whether the first WiFi network is encrypted.
  • the factory status stored by the router 108 is a Boolean factory_status. When factory_status is true, it means that the router 108 is in the factory state (that is, WiFi is not encrypted). When the factory_status is false, it means that the router 108 is in a non-factory state. After the router 108 is powered on, it determines that the first WiFi network is not encrypted by detecting that the factory_status flag is true.
  • the router 108 creates a hidden WiFi network.
  • the router 108 generates configuration information of the hidden WiFi network, and the configuration information of the hidden WiFi network includes the network name and password.
  • the router 108 may randomly generate configuration information for hiding the WiFi network according to certain rules.
  • the mobile terminal 106 approaches the NFC tag area of the router.
  • a label is affixed to the NFC read-write area of the router 108 to prompt the user to approach the router to achieve "one touch connection" (that is, to touch the router through NFC to connect to WiFi), and the user can hold it according to the location of the label
  • the mobile terminal 106 is close to the area where the label is attached.
  • step 308 the mobile terminal 106 requests to obtain WiFi network configuration information.
  • the mobile terminal 106 sends a request message to the router to request to read WiFi network configuration information.
  • the NFC module of the router 108 reads the hidden WiFi network configuration information.
  • the router 108 has two WiFi SSIDs, one is the SSID of the first WiFi network, and the other is the SSID of the hidden WiFi network created in step 304.
  • the NFC module of the router 108 obtains the configuration information of the hidden WiFi network created in step 304 instead of the SSID of the first WiFi network. In this way, the problem of failure to connect to the router mentioned in the background art will not occur.
  • the user terminal cannot scan the SSID of the hidden WiFi network, so the user is unaware of the behavior of the router creating the hidden WiFi network.
  • step 302 can be performed again between steps 308 and 310 to detect whether the first WiFi network is encrypted, and step 310 is performed after it is determined that the first WiFi network is not encrypted. Then, step 316 and step 318 are executed.
  • the router 108 can check whether the configured first WiFi network is encrypted once after it is powered on and start working, and after obtaining the request message of the mobile terminal 106 to read the WiFi network configuration information, judge whether the first WiFi network is encrypted again.
  • Step 310 is executed only after it is determined that the first WiFi network is not encrypted. This can ensure that the mobile terminal 106 can connect to the encrypted WiFi network.
  • the router 108 returns the configuration information of the hidden WiFi network to the mobile terminal 106.
  • the router 108 returns the configuration information of the hidden WiFi network to the mobile terminal 106 through NFC data exchange format (NDEF) message data.
  • NDEF NFC data exchange format
  • the router 108 sends the configuration information of the hidden WiFi network to the mobile terminal 106 in clear text (that is, the configuration information of the hidden WiFi network is not encrypted) through NFC.
  • step 314 the mobile terminal 106 connects to the hidden WiFi network, and successfully accesses the router.
  • the mobile terminal 106 displays a first user interface (for example, the user interface 400 shown in FIG. 4) in response to the hidden WiFi network configuration information obtained in step 312 .
  • the first user interface includes a prompt box 402, and the prompt box 402 contains prompt words "connect to the network (network SSID, the SSID in the example is "HUAWEI-07AW-NFC")?", a connection button 404, and a cancel button 406.
  • step 316 the router 108 sends the configuration information of the first WiFi network to the mobile terminal 106 via NFC.
  • the following step is further included before step 316: the mobile terminal 106 sends a request message for obtaining configuration information of the first WiFi network through NFC (provided that the mobile terminal 106 needs to be close to the router 108).
  • step 318 the router 108 establishes a WiFi connection with the mobile terminal 106.
  • the user configures the router 108 with the first WiFi network in OPEN mode, or the router 108 creates the first WiFi network for the first power-on use of the newly purchased router.
  • the router 108 can automatically create a hidden WiFi network, and send the configuration information of the hidden WiFi network to the mobile terminal 106 through NFC after the mobile terminal 106 touches the router 108, so that the mobile terminal 106 can be connected to the hidden WiFi network, thereby improving WiFi The security of the connection, and can avoid the connection failure problem mentioned in the background technology, so as to improve the success rate of connecting to the router.
  • the mobile terminal 106 can also set the WiFi name and password of the router 108 through NFC. As shown in Fig. 5, the mobile terminal 106 displays the WiFi setting interface 502. In the interface 502, enter the network name (SSID) 506, enter the password 508, and then click Next 510 to enter the prompt interface 504.
  • the interface 504 contains the prompt “Please come near The router completes the WiFi configuration”. The user brings the mobile terminal 106 close to the router's NFC reading and writing area according to the prompt, and the mobile terminal 106 sends the WiFi name and password to the router 108 via NFC. Then the router 108 creates a WiFi network according to the received WiFi name and password, and then the mobile terminal 106 can automatically connect to the WiFi network without touching the router.
  • the mobile terminal 106 can also clone the WiFi configuration information of the router through NFC, that is, copy the WiFi configuration information of one router to another router, so as to realize the synchronization of the WiFi configuration information of the two routers.
  • NFC wireless Fidelity
  • the user can use mobile terminal 106 to obtain WiFi configuration information of router 108 through NFC, and then move the mobile terminal close to router 602
  • the WiFi configuration information of the router 108 is sent to the router 602, so as to realize the synchronization of the configuration information of the router.
  • an embodiment of the present application discloses an electronic device, and the electronic device may specifically be the router device (for example, the router 108) in the foregoing embodiment.
  • the electronic device may include a communication module 701; one or more processors 702; one or more memories 703; one or more application programs (not shown); and one or more computer programs 704
  • the above-mentioned devices may be connected through one or more communication buses 705.
  • the memory 703 can be used to store data, software programs and software modules, and can be volatile memory (volatile memory), such as random-access memory (RAM); or non-volatile memory (non-volatile memory) For example, read-only memory (ROM), flash memory (flash memory), hard disk drive (HDD) or solid-state drive (SSD), or a combination of the foregoing types of memory.
  • volatile memory such as random-access memory (RAM); or non-volatile memory (non-volatile memory)
  • ROM read-only memory
  • flash memory flash memory
  • HDD hard disk drive
  • SSD solid-state drive
  • the memory 703 may store program code, and the program code is used to enable the processor 702 to execute the program code to execute the router access method provided in the embodiment of the present application.
  • a program code may be stored in the memory 703, and the program code is used to make the processor 702 execute the method steps executed on the router 108 side of FIG. 3 by executing the program code.
  • the communication module 701 may include a wireless communication module and/or a wired communication module, such as a Wi-Fi module, an NFC module, and may also include one or more of a Bluetooth module, an infrared module, an Ethernet communication module, etc., which can be used to send and receive information , The received information can also be sent to the processor 702 for processing; or, the signal generated by the processor 702 can be sent out.
  • a wireless communication module and/or a wired communication module such as a Wi-Fi module, an NFC module, and may also include one or more of a Bluetooth module, an infrared module, an Ethernet communication module, etc., which can be used to send and receive information .
  • the received information can also be sent to the processor 702 for processing; or, the signal generated by the processor 702 can be sent out.
  • the processor 702 is coupled to the communication module 701 and the memory 703.
  • the processor 702 can be any processing device, including but not limited to MIPS (microprocessor without interlocked piped stages) processor, microprocessor, digital signal processor, application specific integrated circuit circuit, microcontroller, state machine or any type of programmable Logical array.
  • the processor 702 is the control center of the communication device. It uses various interfaces and lines to connect the various parts of the entire communication device, runs or executes the software programs and/or modules stored in the memory 703, and calls the data stored in the memory 703. , Perform various functions of communication equipment and process data.
  • FIG. 7 is not used as a limitation to the structure of the electronic device involved in the embodiment of the present application.
  • the electronic device may also include other modules, such as sensors, power modules, etc., which will not be described here. Go into details.
  • the embodiments of the present application may divide the user equipment into functional modules according to the foregoing method examples.
  • each functional module may be divided corresponding to each function, or two or more functions may be integrated into one processing module.
  • the above-mentioned integrated modules can be implemented in the form of hardware or software functional modules. It should be noted that the division of modules in the embodiments of the present application is illustrative, and is only a logical function division, and there may be other division methods in actual implementation.
  • the functional units in the various embodiments of the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units may be integrated into one unit.
  • the above-mentioned integrated unit can be implemented in the form of hardware or software functional unit.
  • the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it can be stored in a computer readable storage medium.
  • the technical solutions of the embodiments of the present application are essentially or the part that contributes to the prior art, or all or part of the technical solutions can be embodied in the form of software products, and the computer software products are stored in a storage
  • the medium includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) or a processor to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage media include: flash memory, mobile hard disk, read-only memory, random access memory, magnetic disk or optical disk and other media that can store program codes.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供一种提供无线保真WiFi网络接入服务的方法及电子设备,方法包括第一电子设备检测到其配置的第一WiFi网络未加密时,再创建一个隐藏WiFi网络;接着第一电子设备通过近场通信NFC方式发送该隐藏WiFi网络的第一配置信息至第二电子设备,并接收第二电子设备基于第一配置信息发送的接入请求;响应于该第一接入请求,第一电子设备与第二电子设备建立起通信连接。

Description

一种提供无线保真WiFi网络接入服务的方法及电子设备
本申请要求在2019年11月25日提交中国国家知识产权局、申请号为201911167666.5的中国专利申请的优先权,发明名称为“一种提供无线保真WiFi网络接入服务的方法及电子设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及通信技术领域,尤其涉及一种提供无线保真WiFi网络接入服务方法及电子设备。
背景技术
随着智能家居技术的发展,一个家庭中往往具备多个能够互相通信的电子设备(例如,手机、智能电视、智能音箱等)。这些电子设备可以通过路由器接入无线保真(Wireless Fidelity,WiFi)网络,进而访问互联网。用户为了将电子设备加入至路由器创建的Wi-Fi网络,通常需要以下几个步骤:开启WiFi开关、搜索周围可用Wi-Fi网络、选择路由器的SSID、输入密码,步骤较为繁琐。
目前市面上支持近场通信(Near Field Communication,NFC)功能的电子设备通过触碰支持NFC的路由器,即可连接到WiFi网络而不用输入SSID密码(这种操作简称“一碰连”),这样便减少了用户输入密码连接Wi-Fi的繁琐操作。
Wi-Fi网络可以采用开放模式(Open),即完全不加密,任何人都可以连到路由器使用网络,用户新购买的路由器上电后处于Open模式,用户必须手动设置加密方式来保证通信的安全,目前主流的加密方式包括WEP、WPA/WPA2、WPA-PSK/WPA2-PSK。
现有技术中,搭载安卓操作系统的设备(简称安卓设备)在路由器创建的WiFi网络是Open模式的时候进行一碰连操作,安卓设备原生的代码处理逻辑有问题,错误地将WiFi网络的加密模式识别为WPA2类型的鉴权方式,导致安卓设备无法连接路由器创建的Open模式下的WiFi网络。为了解决该问题,安卓厂商可以选择采用补丁升级的方式解决,但是补丁升级的方式无法覆盖安卓厂商所有机型,因为目前安卓厂商补丁升级率普遍较低,基本上新款机型的升级率较高,而老款产品的表现差强人意。对消费者来说,补丁的作用太隐性,不能明显感知,所以重视程度也不够,甚至很多消费者对于补丁的作用一无所知。对厂商来说,补丁升级需要针对所有机型进行补丁开发,对厂商人力提出较高挑战。因此,需要提供一种除补丁升级外的解决安卓设备在WiFi是OPEN模式的时候也能执行一碰连接WiFi的解决方案。
发明内容
本申请提供一种提供无线保真WiFi网络接入服务方法,提高安卓设备一碰连接路由器的成功率。
为达到上述目的,本申请采用如下技术方案:
第一方面,本申请提供一种提供无线保真WiFi网络接入服务的方法,该方法包括:第一电子设备检测其配置的第一WiFi网络是否加密;当第一电子设备配置的第一WiFi网络未加密时,创建隐藏WiFi网络;第一电子设备通过近场通信NFC方式发送上述隐藏WiFi网络的 第一配置信息至第二电子设备;第一电子设备获取所述第二电子设备发送的针对上述隐藏WiFi网络的第一接入请求;响应于上述第一接入请求,第一电子设备与第二电子设备建立通信连接。
在上述方法中,第一电子设备(例如,路由器)可以检测是否配置了未加密的第一WiFi网络,如果检测到配置了未加密的第一WiFi网络则创建一个隐藏WiFi网络,将该隐藏WiFi网络的配置信息发送至第二电子设备(例如,手机或者智能音箱)。第二电子设备接着可以碰触第一电子设备,通过NFC读取该隐藏WiFi网络的配置信息(例如,SSID和密码)并接入至该隐藏WiFi网络进行通信。假定第一电子设备上电后启动了一个OPEN模式的第一WiFi网络(例如,第一电子设备第一次上电后根据出厂设置启动一个未加密的第一WiFi网络,或者第一电子设备由用户配置了一个未加密的第一WiFi网络),用户手持第二电子设备碰触第一电子设备实际连接到的是一个隐藏WiFi网络,该隐藏WiFi网络是加密的,而且对其他设备不可见(即,其他设备无法扫描到隐藏WiFi网络的SSID)。这样就不会产生背景技术部分提到的连接失败的问题,而且搭载安卓操作系统的第一电子设备不需要升级补丁即可解决该问题,显著提升了用户体验。
在一种可能的实现方式中,上述隐藏WiFi网络的配置信息包括隐藏WiFi网络的名称或密码中的至少一种。这样,用户通过第二电子设备碰触连接的是加密的WiFi网络,因此不会触发到背景技术部分提到的连接失败的问题,提升了用户体验。
在一种可能的实现方式中,第二电子设备搭载的是安卓操作系统,当然第二电子设备也可以搭载其他操作系统,例如ios操作系统。
在一种可能的实现方式中,当第一电子设备配置的第一WiFi网络加密时,第一电子设备通过近场通信NFC方式发送第一WiFi网络的第二配置信息至第二电子设备,接着第一电子设备获取第二电子设备基于该第二配置信息发送的针对第一WiFi网络的第二接入请求;响应于该第二接入请求,第一电子设备与第二电子设备建立通信连接进行通信。
在一种可能的实现方式中,第二电子设备可以通过NFC发送WiFi网络的第三配置信息至第一电子设备,第一电子设备根据上述WiFi网络的第三配置信息创建一个WiFi网络。通过该方法,用户可以通过在第二电子设备设置好WiFi网络的配置信息,接着通过碰触第一电子设备,通过NFC发送WiFi网络的配置信息至第一电子设备,第一电子设备利用该WiFi网络的配置信息创建一个WiFi网络。接着第二电子设备可以直接连接至第一电子设备创建的WiFi网络。
在一种可能的实现方式中,第二电子设备通过近场通信NFC方式发送第一WiFi网络的第二配置信息至第三电子设备,接着第三电子设备可以根据第一WiFi网络的第二配置信息创建WiFi网络。通过该方法,第二电子设备可以通过先碰触第一电子设备,再碰触第三电子设备的方式将第一电子设备的第一WiFi网络的配置信息传递至第三电子设备。
在一种可能的实现方式中,上述隐藏WiFi网络的第一配置信息是以非加密的方式发送至第二电子设备的。
第二方面,本申请提供一种电子设备,包括:一个或多个处理器、一个或多个存储器、以及一个或多个计算机程序;其中,处理器与触摸屏以及存储器均耦合,上述一个或多个计算机程序被存储在存储器中,当电子设备运行时,该处理器执行该存储器存储的一个或多个计算机程序,以使电子设备执行上述任一项所述的一种多设备之间的信息同步方法。
第三方面,本申请提供一种计算机存储介质,包括计算机指令,当计算机指令在电子设备上运行时,使得电子设备执行如第一方面中任一项所述的一种多设备之间的信息同步方法。
第四方面,本申请提供一种计算机程序产品,当计算机程序产品在电子设备上运行时,使得电子设备执行如第一方面中任一项所述的一种多设备之间的信息同步方法。
可以理解地,上述提供的第二方面所述的电子设备,第三方面所述的计算机存储介质,以及第四方面所述的计算机程序产品均可实现上述提供无线保真WiFi网络接入服务的方法,因此,其所能达到的有益效果可参考上文所提供的信息同步中的有益效果,此处不再赘述。
附图说明
图1为本申请实施例提供的一种WiFi网络示意图一;
图2为本申请实施例提供的一种电子设备的结构示意图一;
图3为本申请实施例提供的一种提供WiFi接入服务的方法流程示意图;
图4为本申请实施例提供的一种电子设备连接WiFi网络的界面示意图;
图5为本申请实施例提供的一种设置WiFi网络的界面示意图;
图6为本申请实施例提供的一种在不同路由器间同步WiFi网络的场景示意图;
图7为本申请实施例提供的一种电子设备的结构示意图二。
具体实施方式
下面将结合附图对本实施例的实施方式进行详细描述。
图1示出了本文中进一步描述的装置、方法、系统和/或计算机程序产品中的一个或多个可能适用的WiFi网络100的示例。所描绘的WiFi网络100包括一个或多个电子设备,例如图1中的灯泡102、音箱104、移动终端106或其他类型的电子设备。下文中,将电子设备102、104和106以及其他智能家居设备(诸如、电视、洗衣机、风扇、空调、安全系统等)统称为“电子设备”。其中,灯泡102可以控制灯光的变化,例如灯光颜色及亮度的变化。音箱104可以带有集成的语音助手模块,可通过一个“唤醒词”(例如,“你好,小艺”)提供交互式语音对话或查询功能,还可以控制其他电子设备(例如,控制灯泡102的开启或者关闭)。移动终端106在图1中示出的是手机,当然也可以包括膝上型计算机、台式计算机、平板计算机、可穿戴电子设备、车载设备、虚拟现实设备等,本申请实施例对此不做任何限制。
WiFi网络100还包括无线路由器108。路由器108是提供Wi-Fi的装置,可将互联网的资讯传送至个人装置(例如电脑、手机或平板电脑)。这些电子设备在家庭中会形成局部区域网络(LAN)。电子设备之间能够经由无线路由器108进行通信(例如,灯泡102通过无线路由器108与音箱104进行通信)。电子设备还能够通过无线路由器108经由通信网络(例如,长期演进(LTE)、第五代移动通信(5G)等合适的通信网络)与远端服务器通信。当然,电子设备之间还可以直接进行通信(例如,通过Wi-Fi、NFC、蓝牙等短距通信技术)。
下文中将以图1示出的移动终端106为例介绍路由器接入方法,图2示出了移动终端106的结构示意图。
移动终端106可以包括处理器110,外部存储器接口120,内部存储器121,通用串行总线(universal serial bus,USB)接口130,充电管理模块140,电源管理模块141,电池142,天线1,天线2,移动通信模块150,无线通信模块160,音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,传感器模块180,摄像头193以及显示屏194等。
可以理解的是,本申请实施例示意的结构并不构成对移动终端106的具体限定。在本申请另一些实施例中,移动终端106可以包括比图示更多或更少的部件,或者组合某些部件,或者拆分某些部件,或者不同的部件布置。图示的部件可以以硬件,软件或软件和硬件的组合实现。
处理器110可以包括一个或多个处理单元,例如:处理器110可以包括应用处理器 (application processor,AP),调制解调处理器,图形处理器(graphics processing unit,GPU),图像信号处理器(image signal processor,ISP),控制器,存储器,视频编解码器,数字信号处理器(digital signal processor,DSP),基带处理器,和/或神经网络处理器(neural-network processing unit,NPU)等。其中,不同的处理单元可以是独立的器件,也可以集成在一个或多个处理器中。
处理器110中还可以设置存储器,用于存储指令和数据。在一些实施例中,处理器110中的存储器为高速缓冲存储器。该存储器可以保存处理器110刚用过或循环使用的指令或数据。如果处理器110需要再次使用该指令或数据,可从所述存储器中直接调用。避免了重复存取,减少了处理器110的等待时间,因而提高了系统的效率。
在一些实施例中,处理器110可以包括一个或多个接口。接口可以包括集成电路(inter-integrated circuit,I2C)接口,集成电路内置音频(inter-integrated circuit sound,I2S)接口,脉冲编码调制(pulse code modulation,PCM)接口,通用异步收发传输器(universal asynchronous receiver/transmitter,UART)接口,移动产业处理器接口(mobile industry processor interface,MIPI),通用输入输出(general-purpose input/output,GPIO)接口,用户标识模块(subscriber identity module,SIM)接口,和/或通用串行总线(universal serial bus,USB)接口等。
充电管理模块140用于从充电器接收充电输入。其中,充电器可以是无线充电器,也可以是有线充电器。在一些有线充电的实施例中,充电管理模块140可以通过USB接口130接收有线充电器的充电输入。在一些无线充电的实施例中,充电管理模块140可以通过移动终端106的无线充电线圈接收无线充电输入。充电管理模块140为电池142充电的同时,还可以通过电源管理模块141为电子设备供电。
电源管理模块141用于连接电池142,充电管理模块140与处理器110。电源管理模块141接收电池142和/或充电管理模块140的输入,为处理器110,内部存储器121,外部存储器,显示屏194,摄像头193,和无线通信模块160等供电。电源管理模块141还可以用于监测电池容量,电池循环次数,电池健康状态(漏电,阻抗)等参数。在其他一些实施例中,电源管理模块141也可以设置于处理器110中。在另一些实施例中,电源管理模块141和充电管理模块140也可以设置于同一个器件中。
移动终端106的无线通信功能可以通过天线1,天线2,移动通信模块150,无线通信模块160,调制解调处理器以及基带处理器等实现。
天线1和天线2用于发射和接收电磁波信号。移动终端106中的每个天线可用于覆盖单个或多个通信频带。不同的天线还可以复用,以提高天线的利用率。例如:可以将天线1复用为无线局域网的分集天线。在另外一些实施例中,天线可以和调谐开关结合使用。
移动通信模块150可以提供应用在移动终端106上的包括2G/3G/4G/5G等无线通信的解决方案。移动通信模块150可以包括至少一个滤波器,开关,功率放大器,低噪声放大器(low noise amplifier,LNA)等。移动通信模块150可以由天线1接收电磁波,并对接收的电磁波进行滤波,放大等处理,传送至调制解调处理器进行解调。移动通信模块150还可以对经调制解调处理器调制后的信号放大,经天线1转为电磁波辐射出去。在一些实施例中,移动通信模块150的至少部分功能模块可以被设置于处理器110中。在一些实施例中,移动通信模块150的至少部分功能模块可以与处理器110的至少部分模块被设置在同一个器件中。
无线通信模块160可以提供应用在移动终端106上的包括无线局域网(wireless local area networks,WLAN)(如无线保真(wireless fidelity,Wi-Fi)网络),蓝牙(bluetooth,BT),全球导航卫星系统(global navigation satellite system,GNSS),调频(frequency modulation,FM),近距 离无线通信技术(near field communication,NFC),红外技术(infrared,IR)等无线通信的解决方案。无线通信模块160可以是集成至少一个通信处理模块的一个或多个器件。无线通信模块160经由天线2接收电磁波,将电磁波信号调频以及滤波处理,将处理后的信号发送到处理器110。无线通信模块160还可以从处理器110接收待发送的信号,对其进行调频,放大,经天线2转为电磁波辐射出去。
在一些实施例中,移动终端106的天线1和移动通信模块150耦合,天线2和无线通信模块160耦合,使得移动终端106可以通过无线通信技术与网络以及其他设备通信。所述无线通信技术可以包括全球移动通讯系统(global system for mobile communications,GSM),通用分组无线服务(general packet radio service,GPRS),码分多址接入(code division multiple access,CDMA),宽带码分多址(wideband code division multiple access,WCDMA),时分码分多址(time-division code division multiple access,TD-SCDMA),长期演进(long term evolution,LTE),BT,GNSS,WLAN,NFC,FM,和/或IR技术等。所述GNSS可以包括全球卫星定位系统(global positioning system,GPS),全球导航卫星系统(global navigation satellite system,GLONASS),北斗卫星导航系统(beidou navigation satellite system,BDS),准天顶卫星系统(quasi-zenith satellite system,QZSS)和/或星基增强系统(satellite based augmentation systems,SBAS)。
移动终端106通过GPU,显示屏194,以及应用处理器等实现显示功能。GPU为图像处理的微处理器,连接显示屏194和应用处理器。GPU用于执行数学和几何计算,用于图形渲染。处理器110可包括一个或多个GPU,其执行程序指令以生成或改变显示信息。
显示屏194用于显示图像,视频等。显示屏194包括显示面板。显示面板可以采用液晶显示屏(liquid crystal display,LCD),有机发光二极管(organic light-emitting diode,OLED),有源矩阵有机发光二极体或主动矩阵有机发光二极体(active-matrix organic light emitting diode的,AMOLED),柔性发光二极管(flex light-emitting diode,FLED),Miniled,MicroLed,Micro-oLed,量子点发光二极管(quantum dot light emitting diodes,QLED)等。在一些实施例中,移动终端106可以包括1个或N个显示屏194,N为大于1的正整数。
移动终端106可以通过ISP,摄像头193,视频编解码器,GPU,显示屏194以及应用处理器等实现拍摄功能。
ISP用于处理摄像头193反馈的数据。例如,拍照时,打开快门,光线通过镜头被传递到摄像头感光元件上,光信号转换为电信号,摄像头感光元件将所述电信号传递给ISP处理,转化为肉眼可见的图像。ISP还可以对图像的噪点,亮度,肤色进行算法优化。ISP还可以对拍摄场景的曝光,色温等参数优化。在一些实施例中,ISP可以设置在摄像头193中。
摄像头193用于捕获静态图像或视频。物体通过镜头生成光学图像投射到感光元件。感光元件可以是电荷耦合器件(charge coupled device,CCD)或互补金属氧化物半导体(complementary metal-oxide-semiconductor,CMOS)光电晶体管。感光元件把光信号转换成电信号,之后将电信号传递给ISP转换成数字图像信号。ISP将数字图像信号输出到DSP加工处理。DSP将数字图像信号转换成标准的RGB,YUV等格式的图像信号。在一些实施例中,移动终端106可以包括1个或N个摄像头193,N为大于1的正整数。
数字信号处理器用于处理数字信号,除了可以处理数字图像信号,还可以处理其他数字信号。例如,当移动终端106在频点选择时,数字信号处理器用于对频点能量进行傅里叶变换等。
视频编解码器用于对数字视频压缩或解压缩。移动终端106可以支持一种或多种视频编 解码器。这样,移动终端106可以播放或录制多种编码格式的视频,例如:动态图像专家组(moving picture experts group,MPEG)1,MPEG2,MPEG3,MPEG4等。
外部存储器接口120可以用于连接外部存储卡,例如Micro SD卡,实现扩展移动终端106的存储能力。外部存储卡通过外部存储器接口120与处理器110通信,实现数据存储功能。例如将音乐,视频等文件保存在外部存储卡中。
内部存储器121可以用于存储计算机可执行程序代码,所述可执行程序代码包括指令。处理器110通过运行存储在内部存储器121的指令,从而执行移动终端106的各种功能应用以及数据处理。内部存储器121可以包括存储程序区和存储数据区。其中,存储程序区可存储操作系统,至少一个功能所需的应用程序(比如声音播放功能,图像播放功能等)等。存储数据区可存储移动终端106使用过程中所创建的数据(比如音频数据,电话本等)等。此外,内部存储器121可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件,闪存器件,通用闪存存储器(universal flash storage,UFS)等。
移动终端106可以通过音频模块170,扬声器170A,受话器170B,麦克风170C,耳机接口170D,以及应用处理器等实现音频功能。例如音乐播放,录音等。
音频模块170用于将数字音频信息转换成模拟音频信号输出,也用于将模拟音频输入转换为数字音频信号。音频模块170还可以用于对音频信号编码和解码。在一些实施例中,音频模块170可以设置于处理器110中,或将音频模块170的部分功能模块设置于处理器110中。
扬声器170A,也称“喇叭”,用于将音频电信号转换为声音信号。移动终端106可以通过扬声器170A收听音乐,或收听免提通话。
受话器170B,也称“听筒”,用于将音频电信号转换成声音信号。当移动终端106接听电话或语音信息时,可以通过将受话器170B靠近人耳接听语音。
麦克风170C,也称“话筒”,“传声器”,用于将声音信号转换为电信号。当拨打电话或发送语音信息时,用户可以通过人嘴靠近麦克风170C发声,将声音信号输入到麦克风170C。移动终端106可以设置至少一个麦克风170C。在另一些实施例中,移动终端106可以设置两个麦克风170C,除了采集声音信号,还可以实现降噪功能。在另一些实施例中,移动终端106还可以设置三个,四个或更多麦克风170C,实现采集声音信号,降噪,还可以识别声音来源,实现定向录音功能等。
耳机接口170D用于连接有线耳机。耳机接口170D可以是USB接口130,也可以是3.5mm的开放移动电子设备平台(open mobile terminal platform,OMTP)标准接口,美国蜂窝电信工业协会(cellular telecommunications industry association of the USA,CTIA)标准接口。
传感器模块180可以包括压力传感器,陀螺仪传感器,气压传感器,磁传感器,加速度传感器,距离传感器,接近光传感器,指纹传感器,温度传感器,触摸传感器,环境光传感器,骨传导传感器等。
当然,上述移动终端106还可以包括按键、马达、指示器以及SIM卡接口等一项或多项器件,本申请实施例对此不做任何限制。
以下将结合附图详细阐述本申请实施例提供的一种路由器接入方法。为了实现电子设备接入路由器108创建的Wi-Fi网络,图3示出了移动终端106接入路由器108创建的WiFi网络的信令交互图。
参见图3,在步骤302,路由器108检测第一WiFi网络是否加密,WiFi网络的加密方式包括以下项的任一种:OPEN模式(即“不加密”)、WEP、WPA/WPA2、WPA-PSK/WPA2-PSK。 如果第一WiFi网络加密则执行步骤316;如果第一WiFi网络不加密则执行步骤304。其中,第一WiFi网络可以是路由器108自身配置的WiFi网络,例如,路由器108出厂后第一次上电启动后创建的WiFi网络。
一般来说,用户新购买的路由器第一次上电使用时WiFi处于open模式,方便用户接入并配置WiFi网络的名称(SSID)和密码。路由器在恢复出厂设置(也就是复位路由器)之后WiFi也会处于open模式,用户需要重新设置WiFi网络的名称(SSID)和密码。因此,在一种实现方式中,步骤302可以被替换为:路由器108检测其是否为出厂状态来判断第一WiFi网络是否加密。例如,路由器108存储的出厂状态为布尔值factory_status,当factory_status为真时,代表路由器108为出厂状态(也就代表WiFi不加密),当factory_status为假时,代表路由器108为非出厂状态。路由器108上电后通过检测出厂状态标志factory_status为真来确定第一WiFi网络不加密。
在步骤304,路由器108创建隐藏WiFi网络。在一种实现方式中,路由器108生成隐藏WiFi网络的配置信息,隐藏WiFi网络的配置信息包括网络名称和密码。例如,路由器108可以按照一定规则随机生成隐藏WiFi网络的配置信息。
在步骤306,移动终端106靠近路由器NFC标签区域。在一种实现方式中,路由器108的NFC读写区域贴有标签提示用户靠近路由器以实现“一碰连”(即,通过NFC方式碰触路由器实现连接WiFi的目的),用户可根据标签位置手持移动终端106靠近标签贴附的区域。
在步骤308,移动终端106请求获取WiFi网络配置信息。在一种实现方式中,移动终端106向路由器发送请求消息,请求读取WiFi网络配置信息。
在步骤310,路由器108的NFC模块读取隐藏WiFi网络配置信息。路由器108具有两个WiFi SSID,一个是第一WiFi网络的SSID,另一个是在步骤304创建的隐藏WiFi网络的SSID。在步骤310中,路由器108的NFC模块获取步骤304中创建的隐藏WiFi网络的配置信息,而非第一WiFi网络的SSID。这样就不会产生背景技术中提到的连接路由器失败的问题,对用户来说用户端无法扫描到隐藏WiFi网络的SSID,因此用户对路由器创建隐藏WiFi网络的行为是无感知的。
在一种实现方式中,在步骤308和310之间还可以再次执行步骤302以检测第一WiFi网络是否加密,在确定第一WiFi网络未加密后才执行步骤310,在确定第一WiFi网络加密后执行步骤316和步骤318。这样一来,路由器108可以在上电开始工作后检测一次其配置的第一WiFi网络是否加密,在获取到移动终端106的读取WiFi网络配置信息的请求消息后再次判断第一WiFi网络是否加密,确定第一WiFi网络未加密后才执行步骤310。这样可以确保移动终端106可以连接到加密的WiFi网络。
在步骤312,路由器108向移动终端106返回隐藏WiFi网络的配置信息。例如,路由器108通过NFC数据交换格式(NDEF)消息数据向移动终端106返回隐藏WiFi网络的配置信息。在一种实现方式中,路由器108通过NFC以明文(即,不对隐藏WiFi网络的配置信息进行加密)发送隐藏WiFi网络的配置信息至移动终端106。
在步骤314,移动终端106连接至隐藏WiFi网络,实现了成功接入路由器。
在一些实施例中,步骤314之前还可以包括以下步骤:移动终端106响应于步骤312获取到的隐藏WiFi网络的配置信息,显示第一用户界面(例如,图4中示出的用户界面400)。第一用户界面包含提示框402,提示框402中包含提示语“是否连接到网络(网络SSID,示例中的SSID为“HUAWEI-07AW-NFC”)?”、连接按钮404、取消按钮406。用户点击连接按钮404可以连接至网络“HUAWEI-07AW-NFC”,用户点击取消按钮406可以取消操作。
在步骤316,路由器108通过NFC发送第一WiFi网络的配置信息至移动终端106。在一些实现方式中,在步骤316之前还包括以下步骤:移动终端106通过NFC发送获取第一WiFi网络的配置信息的请求消息(前提是移动终端106需要靠近路由器108)。
在步骤318,路由器108与移动终端106建立起WiFi连接。
通过上述图3中所示的方法,针对用户为路由器108配置了OPEN模式的第一WiFi网络的情形,或者路由器108为新购买的第一次上电使用创建第一WiFi网络的情形。路由器108可以自动创建隐藏WiFi网络,并在移动终端106碰触路由器108后通过NFC发送隐藏WiFi网络的配置信息至移动终端106,这样就可以实现让移动终端106连接至隐藏WiFi网络,进而提升WiFi连接的安全性,而且可以规避背景技术部分提到的连接失败的问题,从而提升连接路由器的成功率。
在一些实施例中,移动终端106还可以通过NFC设置路由器108的WiFi名称和密码。如图5所示,移动终端106显示设置WiFi界面502,在界面502输入网络名称(SSID)506,输入密码508,接着点击下一步510即可进入提示界面504,界面504包含提示语“请靠近路由器完成WiFi配置”。用户根据提示将移动终端106靠近路由器NFC读写区域,移动终端106通过NFC发送WiFi名称和密码至路由器108。接着路由器108根据接收到的WiFi名称和密码创建WiFi网络,接着移动终端106可以自动连接至WiFi网络,无需再碰触路由器。
在一些实施例中,移动终端106还可以通过NFC克隆路由器的WiFi配置信息,即将一个路由器的WiFi配置信息复制到另一个路由器,实现两个路由器的WiFi配置信息的同步。例如,如图6所示,一个用户家中有多台路由器(例如,路由器602和路由器108),用户可以用移动终端106通过NFC先获取路由器108的WiFi配置信息,接着再将移动终端靠近路由器602将路由器108的WiFi配置信息发送至路由器602,进而实现路由器的配置信息的同步。
如图7所示,本申请实施例公开了一种电子设备,该电子设备具体可以为上述实施例中的路由器设备(例如,路由器108)。如图7所示,该电子设备可以包括通信模块701;一个或多个处理器702;一个或多个存储器703;一个或多个应用程序(未示出);以及一个或多个计算机程序704,上述各器件可以通过一个或多个通信总线705连接。
存储器703可用于存储数据、软件程序以及软件模块,可以是易失性存储器(volatile memory),例如随机存取存储器(random-access memory,RAM);或者非易失性存储器(non-volatile memory),例如只读存储器(read-only memory,ROM),快闪存储器(flash memory),硬盘(hard disk drive,HDD)或固态硬盘(solid-state drive,SSD),或者上述种类的存储器的组合。具体的,存储器703内可存储程序代码,该程序代码用于使处理器702通过执行该程序代码,执行本申请实施例提供的路由器接入方法。
例如,存储器703内可存储程序代码,该程序代码用于使处理器702通过执行该程序代码执行图3的路由器108侧执行的方法步骤。
通信模块701可以包括无线通信模块和/或有线通信模块,例如Wi-Fi模块、NFC模块、还可以包括蓝牙模块、红外模块、以太网通信模块等中的一个或多个,可以用于收发信息,还可以将接收到的信息给处理器702处理;或者,将处理器702生成的信号发送出去。
处理器702耦合到通信模块701、存储器703。处理器702可以是任何处理设备,包括但不限于MIPS(microprocessor without interlocked piped stages)处理器,微处理器,数字信号处理器,专用集成电路电路,微控制器,状态机或任何类型的可编程逻辑阵列。处理器702是通信设备的控制中心,利用各种接口和线路连接整个通信设备的各个部分,通过运行或执 行存储在存储器703内的软件程序和/或模块,以及调用存储在存储器703内的数据,执行通信设备的各种功能和处理数据。
此外,需要说明的是,图7所示结构并不作为对本申请实施例涉及的电子设备的结构的限制,该电子设备还可以包括其它模块,例如传感器、电源模块等,在此不再一一赘述。
本申请实施例可以根据上述方法示例对上述用户设备进行功能模块的划分,例如,可以对应各个功能划分各个功能模块,也可以将两个或两个以上的功能集成在一个处理模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。需要说明的是,本申请实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式。
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,仅以上述各功能模块的划分进行举例说明,实际应用中,可以根据需要而将上述功能分配由不同的功能模块完成,即将装置的内部结构划分成不同的功能模块,以完成以上描述的全部或者部分功能。上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请实施例各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请实施例的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)或处理器执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:快闪存储器、移动硬盘、只读存储器、随机存取存储器、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,仅为本申请实施例的具体实施方式,但本申请实施例的保护范围并不局限于此,任何在本申请实施例揭露的技术范围内的变化或替换,都应涵盖在本申请实施例的保护范围之内。因此,本申请实施例的保护范围应以所述权利要求的保护范围为准。

Claims (10)

  1. 一种提供无线保真WiFi网络接入服务的方法,其特征在于,包括:
    第一电子设备检测其配置的第一WiFi网络是否加密;
    当所述第一电子设备配置的第一WiFi网络未加密时,创建隐藏WiFi网络;
    所述第一电子设备通过近场通信NFC方式发送所述隐藏WiFi网络的第一配置信息至第二电子设备;
    所述第一电子设备获取所述第二电子设备基于所述第一配置信息发送的针对所述隐藏WiFi网络的第一接入请求;
    响应于所述第一接入请求,所述第一电子设备与所述第二电子设备建立通信连接。
  2. 根据权利要求1所述的方法,其特征在于,所述隐藏WiFi网络的配置信息包括所述隐藏WiFi网络的名称或密码中的至少一种。
  3. 根据权利要求1或2所述的方法,其特征在于,所述第二电子设备搭载有安卓操作系统。
  4. 根据权利要求1至3任一所述的方法,其特征在于,所述方法还包括:
    当所述第一电子设备配置的第一WiFi网络加密时,所述第一电子设备通过近场通信NFC方式发送所述第一WiFi网络的第二配置信息至第二电子设备;
    所述第一电子设备获取所述第二电子设备基于所述第二配置信息发送的针对所述第一WiFi网络的第二接入请求;
    响应于所述第二接入请求,所述第一电子设备与所述第二电子设备建立通信连接。
  5. 根据权利要求1至4任一所述的方法,其特征在于,所述方法还包括:
    所述第二电子设备通过近场通信NFC方式发送WiFi网络的第三配置信息至所述第一电子设备;
    所述第一电子设备根据所述WiFi网络的第三配置信息创建WiFi网络。
  6. 根据权利要求4所述的方法,其特征在于,所述方法还包括:
    所述第二电子设备通过近场通信NFC方式发送所述第一WiFi网络的第二配置信息至第三电子设备;
    所述第三电子设备根据所述第一WiFi网络的第二配置信息创建WiFi网络。
  7. 根据权利要求1至6任一所述的方法,其特征在于,所述隐藏WiFi网络的第一配置信息是以非加密的方式发送至第二电子设备的。
  8. 一种电子设备,其特征在于,包括:
    一个或多个处理器;
    存储器;
    通信模块;
    其中,所述存储器中存储有一个或多个计算机程序,所述一个或多个计算机程序包括指令,当所述指令被所述电子设备执行时,使得所述电子设备执行如权利要求1-7中任一项所述的一种提供无线保真WiFi网络接入服务的方法。
  9. 一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,其特征在于,当所述指令在电子设备上运行时,使得所述电子设备执行如权利要求1-7中任一项所述的一种提供无线保真WiFi网络接入服务的方法。
  10. 一种包含指令的计算机程序产品,其特征在于,当所述计算机程序产品在电子设备上运行时,使得所述电子设备执行如权利要求1-7中任一项所述的一种提供无线保真WiFi网 络接入服务的方法。
PCT/CN2020/129593 2019-11-25 2020-11-18 一种提供无线保真WiFi网络接入服务的方法及电子设备 WO2021104114A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911167666.5A CN111010693B (zh) 2019-11-25 2019-11-25 一种提供无线保真网络接入服务的方法及电子设备
CN201911167666.5 2019-11-25

Publications (1)

Publication Number Publication Date
WO2021104114A1 true WO2021104114A1 (zh) 2021-06-03

Family

ID=70113689

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/129593 WO2021104114A1 (zh) 2019-11-25 2020-11-18 一种提供无线保真WiFi网络接入服务的方法及电子设备

Country Status (2)

Country Link
CN (1) CN111010693B (zh)
WO (1) WO2021104114A1 (zh)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010693B (zh) * 2019-11-25 2023-10-03 华为技术有限公司 一种提供无线保真网络接入服务的方法及电子设备
CN114285737B (zh) * 2020-09-18 2023-09-22 华为技术有限公司 配置设备的方法及设备
CN114615660B (zh) * 2020-12-04 2024-10-18 华为技术有限公司 接入方法、系统及电子设备
CN113225715A (zh) * 2021-04-20 2021-08-06 广州朗国电子科技有限公司 一种无线模组的设置方法、电子设备、存储介质
CN115250544B (zh) * 2021-04-28 2024-08-27 华为技术有限公司 一种设备组网方法、电子设备及存储介质
CN113747543B (zh) * 2021-08-03 2022-11-25 荣耀终端有限公司 配网方法、设备、装置及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883315A (zh) * 2012-08-28 2013-01-16 中兴通讯股份有限公司 无线保真鉴权方法、系统及终端
CN104410969A (zh) * 2014-11-07 2015-03-11 广东欧珀移动通信有限公司 无线保真wifi热点隐藏方法及终端设备
CN105025472A (zh) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 一种wifi接入点加密隐藏及发现的方法及其系统
CN105554062A (zh) * 2015-11-30 2016-05-04 东莞酷派软件技术有限公司 一种文件传输方法、相关设备和系统
US20180332630A1 (en) * 2016-04-13 2018-11-15 Fortinet, Inc. Managing wireless client connections via near field communication
CN111010693A (zh) * 2019-11-25 2020-04-14 华为技术有限公司 一种提供无线保真WiFi网络接入服务的方法及电子设备

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8925042B2 (en) * 2010-04-30 2014-12-30 T-Mobile Usa, Inc. Connecting devices to an existing secure wireless network
CN105828326B (zh) * 2014-07-24 2021-01-01 中兴通讯股份有限公司 一种无线局域网的接入方法、无线访问节点
CN105472550A (zh) * 2014-08-19 2016-04-06 中兴通讯股份有限公司 一种wifi连接方法、装置及系统
CN104302015A (zh) * 2014-09-15 2015-01-21 浙江生辉照明有限公司 隐藏ssid的自动适配wi-fi网络连接方法及系统
CN107094294B (zh) * 2016-02-18 2020-06-02 腾讯科技(深圳)有限公司 网络连接方法及装置
US20170289159A1 (en) * 2016-03-31 2017-10-05 Intel IP Corporation Security support for free wi-fi and sponsored connectivity for paid wi-fi
CN107567017B (zh) * 2016-06-30 2021-07-09 华为技术有限公司 无线连接系统、装置及方法
CN106792622A (zh) * 2016-12-27 2017-05-31 广东欧珀移动通信有限公司 连接隐藏ap的方法与终端设备
CN110320811B (zh) * 2019-06-17 2021-12-14 华为技术有限公司 一种智能家居设备的接入方法及一种电子设备
CN110461024B (zh) * 2019-07-23 2021-01-29 深圳合强电子有限公司 智能设备与路由器自动连接的方法、路由器及智能设备

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102883315A (zh) * 2012-08-28 2013-01-16 中兴通讯股份有限公司 无线保真鉴权方法、系统及终端
CN105025472A (zh) * 2014-04-25 2015-11-04 Tcl集团股份有限公司 一种wifi接入点加密隐藏及发现的方法及其系统
CN104410969A (zh) * 2014-11-07 2015-03-11 广东欧珀移动通信有限公司 无线保真wifi热点隐藏方法及终端设备
CN105554062A (zh) * 2015-11-30 2016-05-04 东莞酷派软件技术有限公司 一种文件传输方法、相关设备和系统
US20180332630A1 (en) * 2016-04-13 2018-11-15 Fortinet, Inc. Managing wireless client connections via near field communication
CN111010693A (zh) * 2019-11-25 2020-04-14 华为技术有限公司 一种提供无线保真WiFi网络接入服务的方法及电子设备

Also Published As

Publication number Publication date
CN111010693A (zh) 2020-04-14
CN111010693B (zh) 2023-10-03

Similar Documents

Publication Publication Date Title
WO2021104114A1 (zh) 一种提供无线保真WiFi网络接入服务的方法及电子设备
WO2020253695A1 (zh) 一种智能家居设备的接入方法及一种电子设备
CN115209194B (zh) 一种通过遥控器实现一碰投屏的终端设备、方法以及系统
WO2021023220A1 (zh) 一种内容接续方法、系统及电子设备
WO2021052178A1 (zh) 一种Wi-Fi连接方法及设备
WO2021013156A1 (zh) 蓝牙切换方法及蓝牙设备
CN113630297B (zh) 一种控制第一设备的方法及终端
US12120596B2 (en) Method and device for controlling connection to network
WO2021037250A1 (zh) 一种无线局域网wlan网络接入方法及装置
WO2020062344A1 (zh) 一种数据传输方法及电子设备
CN111373713B (zh) 一种消息传输方法及设备
WO2021043045A1 (zh) 一种网络配置信息的配置方法及设备
WO2021017894A1 (zh) 一种使用远程sim模块的方法及电子设备
CN113038627B (zh) 一种文件分享方法、移动设备、计算机存储介质
EP4283931A1 (en) Nfc method and system, and electronic device
CN116114239B (zh) 音量管理的方法及电子设备
WO2022174718A1 (zh) 一种数据备份方法和电子设备
WO2023051204A1 (zh) 跨设备连接方法、电子设备及存储介质
WO2023025059A1 (zh) 一种通信系统及通信方法
WO2022095581A1 (zh) 数据传输方法及终端设备
WO2023071730A1 (zh) 声纹注册方法及电子设备
WO2024022154A1 (zh) 一种确定设备使用者的方法及相关装置
WO2024067110A1 (zh) 一种卡片的更新方法及相关装置
US20230337147A1 (en) Device Configuration Method and Device
WO2023241558A1 (zh) 通信方法、通信系统和鼠标

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20892627

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20892627

Country of ref document: EP

Kind code of ref document: A1