CN107690175A - A kind of method and apparatus for being used to manage WAP - Google Patents
A kind of method and apparatus for being used to manage WAP Download PDFInfo
- Publication number
- CN107690175A CN107690175A CN201710713123.3A CN201710713123A CN107690175A CN 107690175 A CN107690175 A CN 107690175A CN 201710713123 A CN201710713123 A CN 201710713123A CN 107690175 A CN107690175 A CN 107690175A
- Authority
- CN
- China
- Prior art keywords
- access point
- wireless access
- type information
- password
- open
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 42
- 230000015654 memory Effects 0.000 claims description 26
- 238000004590 computer program Methods 0.000 claims description 13
- 230000004044 response Effects 0.000 claims description 5
- 230000006855 networking Effects 0.000 abstract description 18
- 238000004891 communication Methods 0.000 description 7
- 230000005291 magnetic effect Effects 0.000 description 7
- 238000012795 verification Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000003993 interaction Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000005294 ferromagnetic effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 1
- 238000001228 spectrum Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/20—Selecting an access point
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
The purpose of the application is to provide a kind of method for managing WAP;Obtain one or more WAPs obtained by user equipment scans;The type information of the WAP is determined from multiple access point type information;One or more of WAPs and corresponding type information are presented according to the type information of the WAP;Wherein, the multiple access point type information includes open class, encryption but with class and can need in cipher type at least two.Compared with prior art, the application can efficiently reduce user in order to which the invalid connection realized networking and carried out in multiple WAPs is attempted, and so as to save the running cost of user, greatly improve Consumer's Experience.
Description
Technical Field
The present application relates to the field of communications, and more particularly, to a technique for managing wireless access points.
Background
With the development of internet technology, it has become a daily habit of internet users to connect and surf the internet anywhere and anytime through a wireless network, such as a WiFi (wireless fidelity) network, and generally, an internet user needs to click a wireless access point in a wireless access point list scanned by own device to try to connect, but the user at this time cannot accurately judge from the existing information in the wireless access point list: for the own device, which wireless access points are clicked and which wireless access points can be clicked to connect, in order to realize wireless connection, a user may need to click a plurality of different wireless access points for a plurality of times to try to connect, so that invalid connection attempts inevitably exist, the invalid connection attempts increase the operation cost of the user, even the user still cannot surf the internet smoothly after a plurality of invalid attempts, and the user experience of network connection is poor.
Disclosure of Invention
It is an object of the present application to provide a method and apparatus for managing wireless access points.
According to an aspect of the present application, there is provided a method for managing a wireless access point, the method comprising:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
According to another aspect of the present application, there is also provided an apparatus for managing a wireless access point, including:
one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
According to another aspect of the present application, there is also provided a computer-readable storage medium having a computer program stored thereon, the computer program being executable by a processor to:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
Compared with the prior art, the method and the device for determining the access point type information of the wireless access points scan by the user equipment have the advantages that the access point type information is determined for one or more wireless access points scanned by the user equipment, for example, the wireless access points are in an open type, an encrypted but available type or a password-needed type, and the type information corresponding to each wireless access point is correspondingly presented while the one or more wireless access points are presented for the user according to the type information corresponding to the wireless access points, so that the user is helped to judge: for the own device, which wireless access points can be connected currently and in what way, the user is guided to select the wireless access point needing to be connected. Therefore, based on the application, invalid connection attempts of a user in a plurality of wireless access points for realizing networking can be effectively reduced, so that the operation cost of the user is saved, and the user experience is greatly improved. Meanwhile, when the user equipment can request the password which can be used for connection from the corresponding network equipment through the third-party networking application loaded on the equipment, the times of the third-party networking application requesting the corresponding network equipment can be effectively reduced based on the application, and therefore network resources are saved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method for managing wireless access points in accordance with an aspect of the subject application;
fig. 2 shows a flow diagram of a method for managing wireless access points, according to one embodiment of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an android operating system, an iOS operating system, etc. The network device includes an electronic device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and hardware thereof includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is composed of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, one virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Embodiments of the present application provide a method for managing wireless access points, which may be implemented in a corresponding user device, or through execution of a third-party application in a corresponding user device, which may include, but is not limited to, a third-party networking application.
In the present application, the network device may store passwords of a certain number of wireless access points or other information related to the wireless access points. In one implementation, the network device may correspond to a platform that provides shared use of a large number of wireless access points for internet users.
Fig. 1 illustrates a flow diagram of a method for managing wireless access points in accordance with an aspect of the subject application. Wherein the method comprises step S11, step S12 and step S13.
In step S11, one or more wireless access points scanned by the user equipment are obtained. In one implementation, the application program may be a third-party application program loaded on the user equipment, for example, the third-party networking application acquires one or more wireless access points scanned by a system application of the user equipment or other applications; or the third party networking application itself directly scans out one or more wireless access points around the current user equipment.
Next, in step S12, type information of the wireless access point is determined from a plurality of access point type information. Here, the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class. In one implementation, a type standard for classifying the wireless access points, that is, access point type information, may be preset based on a requirement of an actual application, and in one implementation, a third-party application, for example, a third-party networking application, may identify and determine a wireless access point corresponding to at least two access point type information in an open type, an encrypted but available type, and a required password type. When the user equipment, for example, a third-party application in the user equipment acquires one or more wireless access points, the type information of the wireless access points can be judged by referring to the classified type standard. In one implementation, the open class may further include an open class based on web authentication and a general open class. In one implementation, the encrypted but available class may further include both a case where a corresponding connection configuration file is stored locally and a case where a corresponding password is stored by a corresponding network device. In one implementation, the type information corresponding to the wireless access point is recorded or stored in the user equipment.
In one embodiment, in step S12, for the one or more wireless access points, an open access point of the one or more wireless access points may be identified and the type information of the open access point may be determined to be an open class. In one implementation, the wireless access point may be determined to be an open class by scanning for preliminary information in the obtained wireless access point list, for example, unencrypted information of the wireless access point displayed in the wireless access point list of the system application. In an implementation manner, if the open class may be further divided into an open class based on web authentication and a general open class, the user equipment may send, to the network equipment, an inquiry request as to whether the wireless access point of which the type information is the open class needs web authentication, and if it can be determined that the wireless access point needs web authentication through the related information of the wireless access point stored in the network equipment, for example, the wireless access point in the network equipment has description information that needs web authentication, the network equipment returns a result of the inquiry request to the user equipment, thereby determining which specific case the wireless access belongs to the open class.
Or, in step S12, for a non-open access point of the one or more wireless access points, if the non-open access point locally stores a corresponding connection profile in the user equipment, determining that the type information of the non-open access point is an encrypted but available class; otherwise, determining the type information of the non-open access point as the password class. Here, the non-open access point includes other access points besides the open access point, such as a wireless access point that may include encryption by various encryption methods, and the connection to the non-open access point requires corresponding password information. In one implementation, the connection profile locally stored by the user equipment includes information required for enabling the user equipment to connect to the corresponding wireless access point, for example, password information of the wireless access point may be included, and identification information of the wireless access point, such as SSID information of the wireless access point, BSSID information, and the like, may also be included. Further, in an implementation manner, the connection configuration file may also include a plurality of password information of the wireless access point. In one implementation manner, the wireless access point obtained by scanning is a non-open access point if the wireless access point is judged not to be an open access point, and then the wireless access point is searched in a local storage of the user equipment to inquire whether a connection configuration file corresponding to the wireless access point exists or not, and if the connection configuration file exists, the type information of the non-open access point is determined to be encrypted but available; and if not, determining the type information of the non-open access point as the required password class.
Further, in step S12, if the type information of the non-open access point is the password-required class, a password query request of the wireless access point whose type information is the password-required class may be sent to a network device; and if the password response of the network equipment to the password inquiry request comprises that the wireless access point stores a corresponding password in the network equipment, updating the type information of the wireless access point to be encrypted but available. Here, the encrypted but available wireless access point may further include two cases that a corresponding connection configuration file is stored locally and a corresponding password is stored in a corresponding network device. The situation that the corresponding connection configuration file is locally stored can be directly judged in the user equipment, and for the situation that the corresponding password is stored in the corresponding network equipment, the network equipment is generally required to search and query to confirm whether the available password exists. Further, in practical applications, if only a part of the user devices are present, the corresponding password stored in the corresponding network device by the wireless access point may be used, for example, the user device installed with the third-party networking application, or, for example, the user device installed with the third-party networking application and corresponding to a certain level of user devices, where the type information of the wireless access point is the case where the corresponding password is stored in the corresponding network device. Here, the third-party networking application on the user equipment sends a password query request to the network equipment, or sends a password request subsequently, and the network equipment may determine whether the user equipment and the wireless access point belong to the class in which the corresponding password is stored in the corresponding network equipment according to the source of the request or the identification information of the user equipment included in the request.
Alternatively, in step S12, an open type query request about the wireless access point whose type information is open type may be further sent to the network device; and updating the type information of the wireless access point to be a common open type or an open type based on page authentication according to the response message of the network equipment to the open type inquiry request. For example, the user equipment can connect to the open-type wireless access point without a password, wherein for the common open-type wireless access point, the user equipment can directly perform network communication; for an open-type wireless access point based on page authentication, after connecting to the wireless access point, the user equipment also needs to pass page authentication to perform network communication. Typical page authentication methods include: inputting a mobile phone number for receiving the dynamic verification code on the authentication page, inputting the dynamic verification code received by the mobile phone into the authentication page and submitting an authentication request; and the server receives the dynamic verification code uploaded by the user through the authentication request and compares the dynamic verification code with the verification code sent by the user in winter, and if the dynamic verification code is the same as the verification code, the page authentication is passed. Generally, the network device stores the open state of each wireless access point, and the user device can obtain that the open type of the wireless access point is a common open type or an open type based on page authentication by sending an open type query request of an open type wireless access point to the network device, and update the type information of the wireless access point according to the open type query request, so that clearer type information is provided for the user, the connection efficiency is further improved, and the user connection experience is improved.
Next, in step S13, the one or more wireless access points and the corresponding type information may be presented according to the type information of the wireless access points. Here, the different types of information may be labeled in any form of words, graphics, and the like, for example, the different types of information may be directly represented by text information, and for example, different types of information may be represented by icons based on different colors. In one implementation, the list of one or more wireless access points may be presented in a third-party application of the user equipment, and the corresponding type information may be presented at a corresponding location of each of the wireless access points in the list. In an implementation manner, the type information corresponding to each wireless access point can be loaded and presented in a wireless access point list corresponding to a system application of the user equipment. It should be understood by those skilled in the art that the above-mentioned presentation of one or more wireless access points and corresponding type information is only an example, and other presentation of one or more wireless access points and corresponding type information, which may be present or later come, should be included in the scope of the present application if applicable, and is included by reference herein.
The method and the device for determining the access point type information of the wireless access points scan by the user equipment, for example, the wireless access points are in one of an open type, an encrypted but available type or a password-needed type, and according to the type information corresponding to the wireless access points, the type information corresponding to each wireless access point is correspondingly presented while the one or more wireless access points are presented for the user, so as to help the user to judge: for the own device, which wireless access points can be connected currently and in what way, the user is guided to select the wireless access point needing to be connected. Therefore, based on the application, invalid connection attempts of a user in a plurality of wireless access points for realizing networking can be effectively reduced, so that the operation cost of the user is saved, and the user experience is greatly improved. Meanwhile, when the user equipment can request the password which can be used for connection from the corresponding network equipment through the third-party networking application loaded on the equipment, the times of the third-party networking application requesting the corresponding network equipment can be effectively reduced based on the application, and therefore network resources are saved.
Fig. 2 shows a flow diagram of a method for managing wireless access points, according to one embodiment of the present application. Wherein the method includes step S11 ', step S12 ', step S13 ', step S14 ', step S15 ', step S16 ' and step S17 '. The steps S11 ', S12 ', and S13 ' are the same as or similar to the steps S11, S12, and S13 in fig. 1, and are not repeated herein and are included herein by reference.
Specifically, in step S14', the user equipment may acquire the wireless access point to which the user selects to connect; next, in step S15', a corresponding connection operation may be performed according to the type information of the wireless access point.
In practical application, based on the type information corresponding to the wireless access point provided by the application, invalid connection attempts performed by a user in a plurality of wireless access points for realizing networking can be effectively reduced, for example, for hot spots for prompting a password class, if the current user does not know the password, the hot spots can be unselected, so that invalid operation is avoided; for another example, if the success rate of the connection of the encrypted but available wireless access point is high, the user can select the encrypted but available wireless access by himself or can be guided to select the encrypted but available wireless access, so as to improve the connection efficiency; furthermore, if the encrypted but available wireless access point further includes two specific cases of locally storing the corresponding connection configuration file and the corresponding network device storing the corresponding password, the third-party networking application in the user device can distinguish different cases and select whether to request the password from the corresponding network device, and if the corresponding connection configuration file is locally stored, the third-party networking application does not need to request the network device, so that the number of times of requesting the corresponding network device by the third-party networking application can be effectively reduced, and the network resource is saved; for another example, if the open class can be further divided into an open class based on web authentication and a general open class, the method has a guiding value for user operations, for example, for a part of users who do not want to perform web authentication, the wireless access point can be conveniently avoided based on the prompt of type information. Therefore, based on the application, the user can quickly select the wireless access point based on own requirements and operation preference, and the success rate of connection can be effectively ensured.
Further, in one embodiment, in step S15', if the type information of the wireless connection point is the password-required class, a password input box is presented for the user to input the password information of the wireless access point. Here, the password information may be manually input by the user, or other format information including the password information may be submitted by the user.
Or, if the type information of the wireless access point is encrypted but available, directly connecting the wireless access point by using the connection configuration file corresponding to the wireless access point and stored locally by the user equipment or the access point password information provided by the network equipment to the user equipment. Here, if the wireless access point needs to acquire the access point password information from the network device, after the user device receives the access point secret information, the encrypted but available wireless access point presentation information may be correspondingly adjusted to a connection configuration file corresponding to the wireless access point stored locally, so as to provide the most accurate guidance information for the user.
Or, if the type information of the wireless access point is an open type, directly connecting the wireless access point. Including direct connection or connection operation based on web authentication.
In one embodiment of the present application, the method further includes steps S16 ' and S17 ', wherein, in step S16 ', the type information of the wireless access point is updated according to the type information of the wireless access point and the connection result information of the connection operation; next, in step S17', the one or more wireless access points may be re-presented according to the updated type information of the wireless access points. Here, the user device, for example, the wireless access point presentation interface of the third party connection application in the user device, may be automatically reloaded or reloaded based on a loading instruction of the user. In one implementation, the connection result may include information about whether the connection is successful or other prompt information occurring during the connection process.
Based on this, one possible embodiment is that, in step S16', if the type information of the wireless access point is encrypted but available class and the connection result information of the connection operation is connection failure, the type information of the wireless access point is updated to be the required password class. Further, the connection configuration file corresponding to the wireless access point, which is locally stored by the user equipment, may also be deleted, for example, the locally stored password information may be deleted.
Further, in an implementation manner, if the type information of the wireless access point is encrypted but the corresponding connection configuration file is locally stored in the available class, and the connection result information of the connection operation is a connection failure, a password query request of the wireless access point may be sent to a corresponding network device first. If the password response of the network equipment to the password inquiry request comprises that the wireless access point stores a corresponding new password in the network equipment, returning the new password to the user equipment, configuring and storing the new password as a new connection configuration file, and trying to connect again, wherein if the connection is successful, the type information of the wireless access point is encrypted but the available class is kept unchanged. If the network device does not have a new password corresponding to the wireless access point after query, the type information of the wireless access point is updated to be the type of the needed password, and further, a connection configuration file, such as password information, corresponding to the wireless access point, which is locally stored by the user device, can be deleted.
In one embodiment, the type information of the wireless access point is a required password type, and after a user inputs the password information of the wireless access point and successfully connects to a corresponding wireless network, a connection configuration file corresponding to the wireless access point is generated based on the password information and is stored, and the type information is updated to an encrypted but usable type, or a specific type of locally stored corresponding connection configuration file is further presented on an interface.
An embodiment of the present application further provides an apparatus for managing a wireless access point, where the apparatus includes:
one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
Further, the program of the apparatus may also be used to perform corresponding operations in other related embodiments based on the above operations.
Embodiments of the present application further provide a computer-readable storage medium, on which a computer program is stored, where the computer program can be executed by a processor to perform the following operations:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
Further, the computer program may also be adapted to be executed by the processor for corresponding operations in other related embodiments based on the above-described operations.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. Computer-readable media herein can be any available computer-readable storage media or communication media that can be accessed by a computer.
Communication media includes media by which communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.
Claims (11)
1. A method for managing a wireless access point, wherein the method comprises:
acquiring one or more wireless access points scanned by user equipment;
determining type information of the wireless access point from a plurality of access point type information;
presenting the one or more wireless access points and corresponding type information according to the type information of the wireless access points;
wherein the plurality of access point type information includes at least two of an open class, an encrypted but available class, and a required password class.
2. The method of claim 1, wherein the method further comprises:
acquiring the wireless access point selected to be connected by a user;
and executing corresponding connection operation according to the type information of the wireless access point.
3. The method of claim 2, wherein the performing the corresponding connection operation according to the type information of the wireless access point comprises:
if the type information of the wireless access point is the type of the required password, presenting a password input box for the user to input the password information of the wireless access point; or,
if the type information of the wireless access point is encrypted but available, directly connecting the wireless access point by using a connection configuration file corresponding to the wireless access point and stored locally by the user equipment or access point password information provided by the network equipment to the user equipment; or,
and if the type information of the wireless access point is an open type, directly connecting the wireless access point.
4. The method of claim 2 or 3, wherein the method further comprises:
updating the type information of the wireless access point according to the type information of the wireless access point and the connection result information of the connection operation;
re-presenting the one or more wireless access points according to the updated type information of the wireless access points.
5. The method of claim 4, wherein the updating the type information of the wireless access point according to the type information of the wireless access point and the connection result information of the connection operation comprises:
and if the type information of the wireless access point is encrypted but available and the connection result information of the connection operation is connection failure, updating the type information of the wireless access point to be in need of password class.
6. The method of claim 5, wherein the updating the type information of the wireless access point to require a cipher class further comprises:
and deleting the connection configuration file corresponding to the wireless access point, which is locally stored by the user equipment.
7. The method of claim 1, wherein the determining type information of the wireless access point from a plurality of access point type information comprises:
for the one or more wireless access points, identifying an open access point in the one or more wireless access points and determining that the type information of the open access point is an open class; or,
for a non-open access point of the one or more wireless access points, if the non-open access point locally stores a corresponding connection configuration file in the user equipment, determining that the type information of the non-open access point is an encrypted but available class; otherwise, determining the type information of the non-open access point as the password class.
8. The method of claim 7, wherein the determining type information for the wireless access point from a plurality of access point type information further comprises:
sending a password inquiry request of the wireless access point with the type information of the required password class to network equipment;
and if the password response of the network equipment to the password inquiry request comprises that the wireless access point stores a corresponding password in the network equipment, updating the type information of the wireless access point to be encrypted but available.
9. The method of claim 7, wherein the determining type information for the wireless access point from a plurality of access point type information further comprises:
sending an open type query request about the wireless access point of which the type information is an open type to network equipment;
and updating the type information of the wireless access point to be a common open type or an open type based on page authentication according to the response message of the network equipment to the open type inquiry request.
10. An apparatus for managing a wireless access point, wherein the apparatus comprises:
one or more processors;
a memory; and
one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the one or more processors, the programs comprising instructions for performing the method of any of claims 1-9.
11. A computer-readable storage medium, on which a computer program is stored, the computer program being executable by a processor to perform the method of any one of claims 1-9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710713123.3A CN107690175B (en) | 2017-08-18 | 2017-08-18 | Method and equipment for managing wireless access point |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710713123.3A CN107690175B (en) | 2017-08-18 | 2017-08-18 | Method and equipment for managing wireless access point |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107690175A true CN107690175A (en) | 2018-02-13 |
CN107690175B CN107690175B (en) | 2020-09-15 |
Family
ID=61153464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710713123.3A Active CN107690175B (en) | 2017-08-18 | 2017-08-18 | Method and equipment for managing wireless access point |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107690175B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449778A (en) * | 2018-06-01 | 2018-08-24 | 上海连尚网络科技有限公司 | A kind of wireless access point methods of exhibiting and device and terminal device |
CN109195202A (en) * | 2018-09-29 | 2019-01-11 | 上海连尚网络科技有限公司 | For identifying the method and apparatus of wireless access point |
CN109327517A (en) * | 2018-10-09 | 2019-02-12 | 上海连尚网络科技有限公司 | Obtain the method and apparatus of wireless access point network state |
CN110191479A (en) * | 2019-06-27 | 2019-08-30 | 深圳市奥克多普科技有限公司 | A kind of WIFI connection method and device |
CN111182532A (en) * | 2019-06-26 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Wireless local area network connection method, device, system, equipment and storage medium |
CN111726806A (en) * | 2019-03-21 | 2020-09-29 | 上海博泰悦臻电子设备制造有限公司 | Wireless network connection method, terminal and computer storage medium |
CN111741510A (en) * | 2020-05-25 | 2020-10-02 | 杭州涂鸦信息技术有限公司 | Method for automatically updating networking information, intelligent equipment and router |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN104394263A (en) * | 2014-09-30 | 2015-03-04 | 小米科技有限责任公司 | Accessing point list displaying method and device |
US9253672B1 (en) * | 2013-12-31 | 2016-02-02 | Joingo, Llc | System and method for measuring the quantity, type and transmission quality of mobile communication devices within a defined geographical area |
CN106488585A (en) * | 2015-09-02 | 2017-03-08 | 腾讯科技(深圳)有限公司 | Display control method and system in wireless connection realization |
-
2017
- 2017-08-18 CN CN201710713123.3A patent/CN107690175B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
US9253672B1 (en) * | 2013-12-31 | 2016-02-02 | Joingo, Llc | System and method for measuring the quantity, type and transmission quality of mobile communication devices within a defined geographical area |
CN104394263A (en) * | 2014-09-30 | 2015-03-04 | 小米科技有限责任公司 | Accessing point list displaying method and device |
CN106488585A (en) * | 2015-09-02 | 2017-03-08 | 腾讯科技(深圳)有限公司 | Display control method and system in wireless connection realization |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108449778A (en) * | 2018-06-01 | 2018-08-24 | 上海连尚网络科技有限公司 | A kind of wireless access point methods of exhibiting and device and terminal device |
CN108449778B (en) * | 2018-06-01 | 2021-03-26 | 上海连尚网络科技有限公司 | Wireless access point display method and device and terminal equipment |
CN109195202A (en) * | 2018-09-29 | 2019-01-11 | 上海连尚网络科技有限公司 | For identifying the method and apparatus of wireless access point |
CN109327517A (en) * | 2018-10-09 | 2019-02-12 | 上海连尚网络科技有限公司 | Obtain the method and apparatus of wireless access point network state |
CN109327517B (en) * | 2018-10-09 | 2022-05-20 | 上海尚往网络科技有限公司 | Method and equipment for acquiring network state of wireless access point |
CN111726806A (en) * | 2019-03-21 | 2020-09-29 | 上海博泰悦臻电子设备制造有限公司 | Wireless network connection method, terminal and computer storage medium |
CN111182532A (en) * | 2019-06-26 | 2020-05-19 | 腾讯科技(深圳)有限公司 | Wireless local area network connection method, device, system, equipment and storage medium |
CN110191479A (en) * | 2019-06-27 | 2019-08-30 | 深圳市奥克多普科技有限公司 | A kind of WIFI connection method and device |
CN110191479B (en) * | 2019-06-27 | 2022-03-04 | 澳克多普有限公司 | WIFI connection method and device |
CN111741510A (en) * | 2020-05-25 | 2020-10-02 | 杭州涂鸦信息技术有限公司 | Method for automatically updating networking information, intelligent equipment and router |
Also Published As
Publication number | Publication date |
---|---|
CN107690175B (en) | 2020-09-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107690175B (en) | Method and equipment for managing wireless access point | |
US11294983B2 (en) | Inferred user identity in content distribution | |
CN108632253B (en) | Client data security access method and device based on mobile terminal | |
US10645568B2 (en) | Carrier configuration processing method, device and system, and computer storage medium | |
EP3203709B1 (en) | Cloud service server and method for managing cloud service server | |
JP6438031B2 (en) | Client download and installation method and apparatus | |
CN110909373B (en) | Access control method, equipment, system and storage medium | |
CN109462601B (en) | Multi-platform access method and device based on eSIM | |
CN107517461B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
CN108924833B (en) | Method and equipment for authorizing user equipment to connect wireless access point | |
CN110113747B (en) | Method and equipment for connecting hidden wireless access point | |
US20200196149A1 (en) | Method and a device for performing wireless connection pre-authorization on a user device | |
CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
US12045680B2 (en) | Barcode-based enrollment of devices with a management service | |
CN108038177B (en) | Method and equipment for providing label page | |
CN105873180A (en) | Method for establishing wireless connection at network device side, method for establishing wireless connection at user device side, network device and user device for establishing wireless connection, system for establishing wireless connection | |
CN105224870A (en) | Suspected virus applies the method and apparatus uploaded | |
WO2019179476A1 (en) | Wireless access point related information providing and acquisition method | |
EP3762832A1 (en) | Customized application architecture utilizing sparse and base metadata layers | |
WO2022083695A1 (en) | Multi-factor authentication of internet of things devices | |
CN108471635B (en) | Method and apparatus for connecting wireless access points | |
CN110333914B (en) | Method and device for executing target operation | |
CN109245938B (en) | Method and equipment for executing resource configuration operation of user | |
CN114296651A (en) | Method and equipment for storing user-defined data information | |
CN106851648B (en) | Method, device and system for sharing access information of wireless access point |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210406 Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Shanghai Shangxiang Network Technology Co.,Ltd. Address before: 200120 2, building 979, Yun Han Road, mud town, Pudong New Area, Shanghai Patentee before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd. |