[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN111615171B - Access method and device of wireless local area network - Google Patents

Access method and device of wireless local area network Download PDF

Info

Publication number
CN111615171B
CN111615171B CN202010505969.XA CN202010505969A CN111615171B CN 111615171 B CN111615171 B CN 111615171B CN 202010505969 A CN202010505969 A CN 202010505969A CN 111615171 B CN111615171 B CN 111615171B
Authority
CN
China
Prior art keywords
local area
wireless local
area network
version
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010505969.XA
Other languages
Chinese (zh)
Other versions
CN111615171A (en
Inventor
丁文涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co ltd
Original Assignee
Shanghai Shangxiang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shangxiang Network Technology Co ltd filed Critical Shanghai Shangxiang Network Technology Co ltd
Priority to CN202010505969.XA priority Critical patent/CN111615171B/en
Publication of CN111615171A publication Critical patent/CN111615171A/en
Application granted granted Critical
Publication of CN111615171B publication Critical patent/CN111615171B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an access method and device of a wireless local area network, and relates to the technical field of wireless networks. The specific implementation mode comprises the following steps: responding to the starting of the network access application, and acquiring a scanning result of the wireless local area network at the network access application; the network access application acquires the selection information of the user in the scanning result and determines the target wireless local area network indicated by the selection information; and responding to the operating system version of the terminal being a target version, accessing the target wireless local area network by a slave object installed in the terminal, wherein the slave object is an application or a plug-in. According to the method and the device, when the access mode of the network access application needs user confirmation, the slave object is used for accessing the network, inconvenience brought to the user by the user confirmation operation can be avoided, and the user does not need to confirm again when the user selects the target wireless local area network, so that the target wireless local area network is accessed quickly.

Description

Access method and device of wireless local area network
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of wireless networks, and particularly relates to an access method and device of a wireless local area network.
Background
With the development of internet technology, more and more users access the internet using various terminals, wherein mobile terminals are widely used due to their portable characteristics. The user can use the mobile terminal to perform various daily activities in the life such as office work, entertainment and the like. The mobile device is generally unable to connect to the physical network, and thus in the related art, the networks that the mobile terminal can access generally include a wireless local area network and a mobile network.
In order to facilitate the user's access to the wlan, some network access applications for accessing the wlan have been developed. The user starts the application at the mobile terminal, and then the mobile terminal can be accessed to the wireless local area network.
Disclosure of Invention
Provided are an access method, an access device, an electronic device and a storage medium for a wireless local area network.
According to a first aspect, there is provided an access method for a wireless local area network, where the method is used for a terminal, the terminal is installed with a main object, and the main object is a network access application, and the method includes: responding to the starting of the main object, and acquiring a scanning result of the wireless local area network at the main object; acquiring the selection information of the user in the scanning result at the main object, and determining a target wireless local area network indicated by the selection information; and responding to that the operating system version of the terminal is a target version, accessing the target wireless local area network through a slave object installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the master object is a user confirmation access mode, and the network access mode in the slave object is a non-user confirmation access mode.
According to a second aspect, there is provided an access apparatus for a wireless local area network, the access apparatus being used for a terminal, the terminal being installed with a main object, the main object being a network access application, the apparatus comprising: an acquisition unit configured to acquire a scan result for a wireless local area network at a main object in response to the main object starting; a determining unit configured to acquire, at the main object, selection information of the user in the scanning result, and determine a target wireless local area network indicated by the selection information; and the access unit is configured to respond to that the operating system version of the terminal is a target version, and access the target wireless local area network through a slave object installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the master object is a user confirmation access mode, and the network access mode in the slave object is a non-user confirmation access mode.
According to a third aspect, there is provided an electronic device comprising: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement a method as in any embodiment of an access method for a wireless local area network.
According to a fourth aspect, a computer-readable storage medium is provided, having stored thereon a computer program which, when executed by a processor, performs the method of any of the embodiments of the access method as a wireless local area network.
According to the scheme of the application, when the access mode of the network access application needs user confirmation, the slave object is used for accessing the network, so that the inconvenience brought to the user by the user confirmation operation can be avoided, and when the user selects the target wireless local area network, the target wireless local area network can be accessed quickly without user confirmation.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
FIG. 1 is an exemplary system architecture diagram to which some embodiments of the present application may be applied;
fig. 2 is a flowchart of one embodiment of an access method of a wireless local area network according to the present application;
fig. 3 is a schematic diagram of an application scenario of an access method of a wireless local area network according to the present application;
fig. 4 is a flowchart of yet another embodiment of an access method of a wireless local area network according to the present application;
Fig. 5 is a schematic structural diagram of an embodiment of an access device of a wireless local area network according to the present application;
fig. 6 is a block diagram of an electronic device for implementing an access method of a wireless local area network according to an embodiment of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows an exemplary system architecture 100 to which embodiments of the wireless local area network access method or the wireless local area network access device of the present application may be applied.
As shown in fig. 1, system architecture 100 may include end devices 101, 102, 103, media 104, and router 105. Medium 104 is the medium used to provide communication links between end devices 101, 102, 103 and router 105. The medium 104 may include various access types, such as wireless communication links.
A user may use the end devices 101, 102, 103 to interact with the router 105 over the medium 104 to receive or send messages or the like. Various communication client applications, such as a network access application, a live application, an instant messaging tool, a mailbox client, social platform software, and the like, may be installed on the terminal devices 101, 102, 103.
Here, the terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The router 105 may be a router providing a wireless local area network, e.g. a router providing a wireless local area network to the terminal devices 101, 102, 103.
It should be noted that the access method of the wireless local area network provided in the embodiment of the present application may be executed by the terminal devices 101, 102, and 103, and accordingly, the access apparatus of the wireless local area network may be disposed in the terminal devices 101, 102, and 103.
It should be understood that the number of end devices, networks, and routers in fig. 1 is merely illustrative. There may be any number of end devices, networks, and routers, as desired for an implementation.
Continuing to refer to fig. 2, a flow 200 of one embodiment of a method for accessing a wireless local area network in accordance with the present application is shown. The method is used for a terminal, the terminal is provided with a main object, the main object is a network access application, and the access method of the wireless local area network comprises the following steps:
in step 201, in response to the main object starting, a scanning result of the wireless local area network is acquired at the main object.
In the present embodiment, an execution subject (e.g., a terminal device shown in fig. 1) on which an access method of a wireless local area network (wifi) is executed may be installed with a network access application (app) as a main object. The execution subject may acquire a scan result of the wireless lan at the master object when the master object is activated. The scan result may be obtained by the execution main body scanning the main object in real time, or may be obtained by the execution main body scanning the wireless lan in advance.
A network access application is an application that may assist a terminal in accessing a wireless local area network. The terminal can obtain the scanning result of the wireless local area network in the network access application, namely, the network access application is utilized, and the scanned wireless local area network is accessed.
And 202, acquiring the selection information of the user in the scanning result at the main object, and determining the target wireless local area network indicated by the selection information.
In this embodiment, the executing body may obtain, in the main object, selection information of the user in the scanning result, determine a wireless local area network indicated by the selection information, and use the wireless local area network as a target wireless local area network. Specifically, the scanning result is the scanned wireless local area network. The execution subject may display the scanning result, specifically, the name of each scanned wireless local area network, on a display of the electronic device. In which a user of the electronic device can make a selection, thereby generating selection information.
Step 203, responding to that the operating system version of the terminal is a target version, accessing the target wireless local area network through a slave object installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the master object is a user confirmation access mode, and the network access mode in the slave object is a non-user confirmation access mode.
In this embodiment, the executing entity may access the target wireless lan through the slave object of the electronic device when the version of the operating system of the electronic device is the target version. The slave object is software capable of running independently, and specifically may be an application, that is, a standard application, or may be a plug-in. The slave object may be installed in real time in the electronic device or may be installed in advance.
Optionally, the slave object may support access to the wireless local area network, that is, the slave object may access the wireless local area network, and the slave object may not support or perform acquisition of the password of the target wireless local area network. Specifically, the target wireless lan to be accessed may be a wireless lan without a password, or the execution subject may obtain a password in the main object or other applications that may implement independent access to the wireless lan.
The user confirms the access mode, namely, before the electronic equipment is connected with the target wireless local area network, the electronic equipment displays the information to be confirmed so that the user can confirm whether to connect to the target wireless local area network. If the user does not perform the confirmation operation on the information to be confirmed, the electronic equipment cannot be connected to the target wireless local area network. In this way, to access the target wireless lan, the electronic device needs to perform two operations, the first operation is to select from the scanning results, and the second operation is to perform a confirmation operation. Correspondingly, the non-user confirmation access mode means that the electronic equipment directly accesses the target wireless local area network without confirmation operation of the user before being connected with the target wireless local area network. In this way, the user does not need to perform two operations, only needs to select among the scanning results, and does not need to perform the above-described confirmation operation.
In practice, the execution subject may access the target wireless local area network from the object in various ways. For example, the executing entity may start the slave object and access the target wireless lan in the slave object.
The method provided by the above embodiment of the present application, when the access mode of the master object needs to be confirmed by the user, the slave object is used to access the network, which can avoid the inconvenience brought to the user by the confirmation operation performed by the user, and when the user has selected the target wireless local area network, the target wireless local area network is accessed quickly without the user's reconfirmation.
In some optional implementations of this embodiment, the accessing the target wireless lan through the slave object installed in the terminal in step 203 may include: and calling the slave object installed in the terminal to access the target wireless local area network at the master object.
In these alternative implementations, the executing entity may access the target wireless lan by invoking the slave object in the master object. According to the method, the user can open the main object by calling the auxiliary object, and the terminal can be quickly accessed to the target wireless local area network without confirming operation.
In some optional application scenarios of these implementations, the invoking, at the master object in these implementations, the slave object installed in the terminal to access the target wireless local area network may include: acquiring calling information of the slave object in the master object, and calling the slave object in the master object through the calling information; and responding to a network access instruction generated on the master object to the slave object, and initiating the access of the target wireless local area network through the called slave object, wherein the network access instruction carries the identification of the target wireless local area network, the Service Set Identification (SSID) of the target wireless local area network and the password of the target wireless local area network.
In these alternative application scenarios, the execution agent may first obtain call information to call the slave object. Then, the executing body may generate a network access instruction to the slave object, and initiate access to the target wireless local area network through the called slave object. In practice, the executing body may output the network access instruction from the master object to the slave object after generating the network access instruction, so as to enable the master object to control the slave object through the instruction, that is, enable the slave object to initiate access to the target wireless local area network.
The calling information refers to information required for calling the slave object at the master object, and may include calling parameters (for example, an identifier of the called slave object), an interface of the call, and the like. Specifically, the execution main body may directly obtain the call information from a local or other electronic device, or may generate the call information in real time.
These application scenarios may first invoke the slave object and then issue a network access instruction to the slave object to facilitate access to the wireless local area network. In addition, the application scenes can provide the information required for accessing the wireless local area network to the slave object through the identification, the SSID and the password of the target wireless local area network, thereby ensuring that the slave object can be successfully accessed into the target wireless local area network.
In some optional application scenarios of these implementations, the invoking, at the master object, a slave object installed in the terminal to access the target wireless local area network in these implementations may include: responding to a network access instruction generated on a master object to a slave object, and generating calling information comprising the network access instruction on the master object, wherein the calling information is used for calling the slave object, and the network access instruction carries an identifier of a target wireless local area network, a Service Set Identifier (SSID) of the target wireless local area network and a password of the target wireless local area network; and calling the slave object to initiate the access of the target wireless local area network at the master object through the calling information.
In these optional application scenarios, the execution main body may directly add the network access instruction in the calling information, that is, generate the calling information including the network access instruction, so as to directly issue the network access instruction while calling the slave object, thereby increasing the speed of accessing the target wireless local area network and achieving efficient access of the target wireless local area network.
In any application scenario above, after determining the target wireless local area network indicated by the selection information in step 202, the method may further include: at the master object, a password for the target wireless local area network is determined.
Specifically, the execution subject may determine, in the master object, a password of the target wireless local area network after determining the target wireless local area network. That is, the execution subject may determine a password of the target wireless lan using the master object, and access to the target wireless lan through the slave object may be achieved using the password. Specifically, the master object has a function of acquiring a password, so that the execution body can access the target wireless lan from the slave object by using the acquired password.
The implementation modes can utilize the main object to determine the password of the target wireless local area network, so as to realize the access of the target wireless local area network from the object.
In some optional cases of these application scenarios, the determining, at the master object, the password of the target wireless local area network may include: acquiring the input password as the password of the target wireless local area network at the main object; or at the main object, the password of the target wireless local area network is obtained from the server side.
In these optional cases, the execution subject may obtain the password input by the user in the main object, and use the password as the password of the target wireless lan. In addition, the execution main body can also obtain the password of the target wireless local area network from the server.
The terminal under these circumstances can acquire the password of the target wireless local area network in various ways, thereby ensuring that the terminal accesses the target wireless local area network.
In some optional implementations of this embodiment, step 203 may include: responding to the fact that the operating system version of the terminal is a target version, and judging whether the terminal is provided with a slave object or not; if the terminal is judged not to be provided with the slave object, the slave object is arranged, and the target wireless local area network is accessed through the slave object arranged in the terminal.
In these optional implementation manners, the executing entity may first determine whether the slave object is installed in the electronic device when determining that the operating system version of the electronic device is the target version. If the slave object is installed, the execution main body can directly load the slave object to realize the access to the target wireless local area network. If not, the execution body can download and install the slave object, so as to smoothly load the slave object, and realize the access of the slave object to the target wireless local area network.
In order to reduce the steps of confirmation operation of the user, the implementation modes can install the slave objects in real time so as to ensure that the target wireless network is accessed quickly without the confirmation operation of the user.
With continuing reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the access method of the wireless lan according to the embodiment. In the application scenario of fig. 3, the execution subject 301 obtains a scan result 303 for the wireless local area network at the main subject in response to the main subject starting 302. The execution main body 301 obtains the selection information of the user in the scanning result at the main object, and determines the target wireless local area network indicated by the selection information. The execution main body 301 responds to that the operating system version of the terminal is a target version, and accesses the target wireless local area network through a slave object 304 installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the main object is a user confirmation access mode, and the network access mode in the slave object is a non-user confirmation access mode.
With further reference to fig. 4, a flow 400 of yet another embodiment of an access method for a wireless local area network is shown. The method is used for a terminal, the terminal is provided with a main object, and the main object is a network access application. The process 400 includes the following steps:
Step 401, in response to the main object starting, a scanning result of the wireless local area network is obtained at the main object.
In this embodiment, an execution subject (e.g., the terminal device shown in fig. 1) on which the access method of the wireless local area network operates may be installed with a master object. The execution subject may acquire a scan result of the wireless lan at the master object when the master object is activated.
And 402, acquiring the selection information of the user in the scanning result at the main object, and determining the target wireless local area network indicated by the selection information.
In this embodiment, the executing entity may obtain, in the main object, selection information of the user in the scanning result, determine a wireless local area network indicated by the selection information, and use the wireless local area network as a target wireless local area network. Specifically, the scanning result is the respective scanned wlan. The execution body may display the scanning result on a display of the electronic device.
Step 403, determining whether the os version of the terminal is a reference version or a version newer than the reference version, where the network access mode of the terminal in the reference version and the terminal in the version newer than the reference version is the user confirmation access mode.
In this embodiment, the execution subject may determine whether the os version of the terminal is a reference version or a version newer than the reference version. Specifically, the network access method of the reference version and the terminal of the version newer than the reference version is the user confirmation access method in the main object. And the terminal of the version before the reference version adopts the non-user confirmation access mode as the network access mode of the main object.
For example, the network access method of the android system version android q at the master object is the user confirmed access method, and the network access method before the version is the non-user confirmed access method.
Step 404, if the operating system version of the terminal is determined to be the reference version or the version newer than the reference version, the operating system version of the terminal is used as the target version, and the target wireless local area network is accessed through a slave object installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the master object is a user-confirmed access mode, and the network access mode in the slave object is a non-user-confirmed access mode.
In this embodiment, the executing entity may take the operating system version of the electronic device as the target version if the determination result is yes.
The embodiment can quickly and accurately judge whether the terminal is the target version or not by comparing the old version with the new version with the reference version. Meanwhile, the main object is a new configuration of the target version, is suitable for the system version of the terminal, and can better realize the functions of scanning, acquiring selection information and the like.
In some optional application scenarios of these implementations, the target software development kit SDK version of the slave object is an old version released before the reference version, and the target SDK version of the master object is an operating system version of the terminal.
In these alternative application scenarios, the Target software development kit Version (Target SDK Version) of the slave object is not the Target Version, i.e., the reference Version is newer than the Target software development kit Version of the slave object. In contrast, the target software development kit version of the master object is the reference version, or a version that is newer than the reference version.
The application scenes accurately determine the version of the application access wireless local area network by limiting the target SDK version, thereby ensuring that the terminal can directly access the target wireless local area network without the confirmation of a user.
With further reference to fig. 5, as an implementation of the methods shown in the above figures, the present application provides an embodiment of an access apparatus for a wireless local area network, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and besides the features described below, the embodiment of the apparatus may further include the same or corresponding features or effects as the embodiment of the method shown in fig. 2. The device can be applied to various electronic equipment.
As shown in fig. 5, the access apparatus 500 of the wireless lan of the present embodiment includes: an acquisition unit 501, a determination unit 502 and an access unit 503. The acquiring unit 501 is configured to respond to the starting of the main object, and acquire the scanning result of the wireless local area network at the main object; a determining unit 502 configured to obtain, at the main object, selection information of the user in the scanning result, and determine a target wireless local area network indicated by the selection information; the access unit 503 is configured to access the target wireless lan through a slave object installed in the terminal in response to that the operating system version of the terminal is a target version, where the slave object is an application or a plug-in, the network access mode of the terminal in the target version is a user-confirmed access mode in the master object, and the network access mode in the slave object is a non-user-confirmed access mode.
In this embodiment, specific processes of the obtaining unit 501, the determining unit 502, and the accessing unit 503 of the access apparatus 500 of the wireless lan and technical effects brought by the specific processes may refer to related descriptions of step 201, step 202, and step 203 in the corresponding embodiment of fig. 2, which are not described herein again.
In some optional implementations of this embodiment, the access unit is further configured to perform responding that the operating system version of the terminal is the target version as follows: judging whether the version of the operating system of the terminal is a reference version or a version which is new to the reference version, wherein the network access mode of the terminal of the reference version and the terminal of the version which is new to the reference version is the user confirmation access mode in the main object; and if the operating system version of the terminal is judged to be the reference version or the version which is newer than the reference version, taking the operating system version of the terminal as the target version.
In some optional implementations of this embodiment, the target software development kit SDK version of the slave object is an old version released before the reference version, and the target SDK version of the master object is an operating system version of the terminal.
In some optional implementations of the embodiment, the access unit is further configured to perform the access to the target wireless local area network from the object installed by the terminal as follows: and calling the slave object installed in the terminal to access the target wireless local area network at the master object.
In some optional implementations of this embodiment, the accessing unit is further configured to execute the following steps of, at the master object, invoking a slave object installed in the terminal to access the target wireless local area network: acquiring calling information of the slave object in the master object, and calling the slave object in the master object through the calling information; and responding to a network access instruction generated on the master object to the slave object, and initiating the access of the target wireless local area network through the called slave object, wherein the network access instruction carries the identification of the target wireless local area network, the Service Set Identification (SSID) of the target wireless local area network and the password of the target wireless local area network.
In some optional implementations of this embodiment, the accessing unit is further configured to execute the following steps of, at the master object, invoking a slave object installed in the terminal to access the target wireless local area network: responding to a network access instruction generated on a master object to a slave object, and generating calling information comprising the network access instruction on the master object, wherein the calling information is used for calling the slave object, and the network access instruction carries an identifier of a target wireless local area network, a Service Set Identifier (SSID) of the target wireless local area network and a password of the target wireless local area network; and calling the slave object to initiate the access of the target wireless local area network at the master object through the calling information.
In some optional implementations of this embodiment, the apparatus further includes: and a password determination unit configured to determine, at the master object, a password of the target wireless local area network after determining the target wireless local area network indicated by the selection information.
In some optional implementations of this embodiment, the password determining unit is further configured to determine the password of the target wireless lan at the primary object by: acquiring the input password as the password of the target wireless local area network at the main object; or at the main object, the password of the target wireless local area network is obtained from the server side.
In some optional implementations of this embodiment, the accessing unit is further configured to perform the password-based accessing, at the target wireless local area network from the object, as follows: and responding to a generated network access instruction of the slave object, initiating the access of the target wireless local area network at the slave object, wherein the network access instruction carries the identification of the target wireless local area network, the Service Set Identification (SSID) of the target wireless local area network and the password.
In some optional implementations of this embodiment, the accessing unit is further configured to perform accessing, by the slave object installed in the terminal, the target wireless local area network in response to the operating system version of the terminal being the target version, as follows: responding to the fact that the operating system version of the terminal is a target version, and judging whether the terminal is provided with a slave object or not; if the terminal is judged not to be provided with the slave object, the slave object is arranged, and the target wireless local area network is accessed through the slave object arranged in the terminal.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided.
Fig. 6 is a block diagram of an electronic device according to an access method of a wireless local area network according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic devices may also represent various forms of mobile devices, such as personal digital processors, cellular telephones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their access and relationships, and their functions, are meant to be examples only, and are not intended to limit implementations of the applications described and/or claimed herein.
As shown in fig. 6, the electronic apparatus includes: one or more processors 601, memory 602, and interfaces for accessing various components, including high-speed interfaces and low-speed interfaces. The various components are interfaced with each other using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be accessed, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 6, one processor 601 is taken as an example.
The memory 602 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method for accessing a wireless local area network provided by the present application. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to execute the access method of a wireless local area network provided by the present application.
The memory 602 is used as a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the access method of the wireless local area network in the embodiment of the present application (for example, the obtaining unit 501, the determining unit 502, and the accessing unit 503 shown in fig. 5). The processor 601 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 602, that is, implements the access method of the wireless local area network in the above method embodiments.
The memory 602 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created according to use of the access electronic device of the wireless local area network, and the like. Further, the memory 602 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory 602 may optionally include memory located remotely from the processor 601, which may be accessed by the accessing electronics of the wireless local area network via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the access method of the wireless local area network may further include: an input device 603 and an output device 604. The processor 601, memory 602, input device 603, and output device 604 may be accessed via a bus or other means, such as via a bus in fig. 6.
The input device 603 may receive input numeric or character information and generate key signal inputs related to user settings and function controls of the wireless local area network accessing electronic equipment, such as an input device like a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointer stick, one or more mouse buttons, a track ball, a joystick, etc. The output devices 604 may include a display device, auxiliary lighting devices (e.g., LEDs), and tactile feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user may provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, which may be described as: a processor includes an acquisition unit, a determination unit, and an access unit. The names of these units do not in some cases constitute a limitation on the units themselves, and for example, the acquiring unit may also be described as a "unit that acquires a scanning result for a wireless local area network at a main object in response to the main object starting".
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be separate and not assembled into the device. The computer readable medium carries one or more programs which, when executed by the apparatus, cause the apparatus to: responding to the starting of the main object, and acquiring a scanning result of the wireless local area network at the main object; acquiring the selection information of the user in the scanning result at the main object, and determining a target wireless local area network indicated by the selection information; and responding to that the operating system version of the terminal is a target version, accessing the target wireless local area network through a slave object installed in the terminal, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version in the master object is a user confirmation access mode, and the network access mode in the slave object is a non-user confirmation access mode.
The foregoing description is only exemplary of the preferred embodiments of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements in which any combination of the features described above or their equivalents does not depart from the spirit of the invention disclosed above. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. An access method of a wireless local area network is used for a terminal, the terminal is provided with a main object, and the main object is a network access application, and the method comprises the following steps:
acquiring a scanning result of a wireless local area network at the main object in response to the main object starting;
acquiring the selection information of the user in the scanning result at the main object, and determining a target wireless local area network indicated by the selection information;
responding to the operating system version of the terminal being a target version, accessing the target wireless local area network through a slave object installed in the terminal, and the method comprises the following steps: and calling a slave object installed in the terminal to access the target wireless local area network at the master object, wherein the slave object is an application or a plug-in, the network access mode of the terminal of the target version at the master object is a user confirmed access mode, and the network access mode at the slave object is a non-user confirmed access mode.
2. The method of claim 1, wherein the responding that the operating system version of the terminal is a target version comprises:
judging whether the operating system version of the terminal is a reference version or a version which is new to the reference version, wherein the network access mode of the terminal of the reference version and the terminal of the version which is new to the reference version is a user confirmation access mode;
and if the operating system version of the terminal is judged to be the reference version or the version which is new to the reference version, taking the operating system version of the terminal as a target version.
3. The method of claim 2, wherein the target Software Development Kit (SDK) version of the slave object is an old version released before the reference version, and the target SDK version of the master object is an operating system version of the terminal.
4. The method of claim 1, wherein the invoking, at the master object, a slave object installed with the terminal to access the target wireless local area network comprises:
acquiring calling information of the slave object in the master object, and calling the slave object in the master object through the calling information;
And responding to a network access instruction for the slave object generated by the master object, and initiating the access of a target wireless local area network through the called slave object, wherein the network access instruction carries an identifier of the target wireless local area network, a Service Set Identifier (SSID) of the target wireless local area network and a password of the target wireless local area network.
5. The method of claim 1, wherein the invoking, at the master object, a slave object installed with the terminal to access the target wireless local area network comprises:
in response to a network access instruction for the slave object generated in the master object, generating invocation information including the network access instruction in the master object, wherein the invocation information is used for invoking the slave object, and the network access instruction carries an identifier of the target wireless local area network, a Service Set Identifier (SSID) of the target wireless local area network, and a password of the target wireless local area network;
and calling the slave object at the master object to initiate the access of the target wireless local area network through the calling information.
6. The method of claim 4 or 5, wherein after the determining the target wireless local area network indicated by the selection information, the method further comprises:
And determining the password of the target wireless local area network at the main object.
7. The method of claim 6, wherein said determining, at said primary object, a password for said target wireless local area network comprises:
acquiring the input password as the password of the target wireless local area network at the main object; or
And acquiring the password of the target wireless local area network from a server side at the main object.
8. The method according to one of claims 1 to 5, wherein the accessing the target wireless local area network through a slave object installed with the terminal in response to the operating system version of the terminal being a target version comprises:
responding to that the operating system version of the terminal is a target version, and judging whether the terminal is provided with the slave object;
and if the terminal is judged not to be provided with the slave object, the slave object is installed, and the target wireless local area network is accessed through the slave object installed in the terminal.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
10. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN202010505969.XA 2020-06-05 2020-06-05 Access method and device of wireless local area network Active CN111615171B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010505969.XA CN111615171B (en) 2020-06-05 2020-06-05 Access method and device of wireless local area network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010505969.XA CN111615171B (en) 2020-06-05 2020-06-05 Access method and device of wireless local area network

Publications (2)

Publication Number Publication Date
CN111615171A CN111615171A (en) 2020-09-01
CN111615171B true CN111615171B (en) 2022-05-24

Family

ID=72205667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010505969.XA Active CN111615171B (en) 2020-06-05 2020-06-05 Access method and device of wireless local area network

Country Status (1)

Country Link
CN (1) CN111615171B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112118576B (en) * 2020-09-22 2023-02-14 上海连尚网络科技有限公司 Method and apparatus for networking over wireless hotspots
CN112118611B (en) * 2020-09-22 2022-09-16 上海连尚网络科技有限公司 Method and device for connecting wireless hotspot

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281755A (en) * 2013-05-28 2013-09-04 北京推博信息技术有限公司 WIFI (wireless fidelity) network access method and device, electronic equipment and communication system
CN107046686A (en) * 2016-03-04 2017-08-15 腾讯科技(深圳)有限公司 The treating method and apparatus of radio network information
CN107046688A (en) * 2017-03-07 2017-08-15 腾讯科技(深圳)有限公司 A kind of connection method of WLAN and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103281755A (en) * 2013-05-28 2013-09-04 北京推博信息技术有限公司 WIFI (wireless fidelity) network access method and device, electronic equipment and communication system
CN107046686A (en) * 2016-03-04 2017-08-15 腾讯科技(深圳)有限公司 The treating method and apparatus of radio network information
CN107046688A (en) * 2017-03-07 2017-08-15 腾讯科技(深圳)有限公司 A kind of connection method of WLAN and device

Also Published As

Publication number Publication date
CN111615171A (en) 2020-09-01

Similar Documents

Publication Publication Date Title
WO2018103484A1 (en) Data processing method, apparatus and system for live broadcast page
JP7167222B2 (en) APPLET DATA ACQUISITION METHOD, APPARATUS, DEVICE, AND STORAGE MEDIUM
CN110032512B (en) Debugging method of small program, related equipment and terminal
JP6588017B2 (en) Seamless call transition
WO2020207454A1 (en) Information pushing method and device
CN111666546B (en) Application login method and device
CN105740048A (en) Image management method, device and system
WO2018077041A1 (en) Method and apparatus for running application
CN112433788A (en) Applet running method and device, electronic equipment and storage medium
CN106027631B (en) Data transmission method and device
CN111615171B (en) Access method and device of wireless local area network
CN112346612B (en) Page display method and device
CN112966201B (en) Object processing method, device, electronic equipment and storage medium
CN113971277A (en) Multi-user login method and device
CN111884847B (en) Method and device for processing fault
WO2023169193A1 (en) Method and device for generating smart contract
CN111770170A (en) Request processing method, device, equipment and computer storage medium
CN112118576B (en) Method and apparatus for networking over wireless hotspots
CN111988829B (en) Access method and device of wireless local area network
CN112752323B (en) Method and device for changing hot spot access state
CN112770415B (en) Information processing method and device for wireless hotspots
CN106209601B (en) State update message pushing method and device
CN111506499B (en) Method and device for detecting availability of parameters in applet and electronic equipment
CN111177558B (en) Channel service construction method and device
CN114265714A (en) Drive control method and device based on cloud mobile phone and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210416

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, Pudong New Area pilot Free Trade Zone, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 201306, N2025 building, 24 building, Xincheng Road, 2 mud town, Shanghai, Pudong New Area

Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant