CN106851780B - Network connection method and terminal - Google Patents

Network connection method and terminal Download PDF

Info

Publication number
CN106851780B
CN106851780B CN201611121186.1A CN201611121186A CN106851780B CN 106851780 B CN106851780 B CN 106851780B CN 201611121186 A CN201611121186 A CN 201611121186A CN 106851780 B CN106851780 B CN 106851780B
Authority
CN
China
Prior art keywords
access point
service set
extended service
forbidden
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611121186.1A
Other languages
Chinese (zh)
Other versions
CN106851780A (en
Inventor
黄园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201611121186.1A priority Critical patent/CN106851780B/en
Publication of CN106851780A publication Critical patent/CN106851780A/en
Application granted granted Critical
Publication of CN106851780B publication Critical patent/CN106851780B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a network connection method and a terminal. The method comprises the following steps: when a terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network or not; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures; if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period; and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point. Therefore, by implementing the technical scheme provided by the invention, the terminal can be quickly connected with the Wi-Fi network, so that the user experience is improved.

Description

Network connection method and terminal
Technical Field
The invention relates to the field of terminals, in particular to a network connection method and a terminal.
Background
With the rapid development of the broadband industry and the popularization of the intelligent terminal, more and more users access the gateway through the intelligent terminal Wi-Fi to enjoy network services.
In the prior art, when a terminal fails to start an Access Point (AP) in an ESS (extended service set) network for multiple times, the ESS is disabled, and at this time, if a user moves into a range of another AP that can be normally connected, the ESS is not automatically reconnected, and the user needs to manually reselect the normal AP for connection.
It is noted that the ESS is an extended network, and the ESS may include a plurality of BSSs (Basic Service sets), wherein a BSS is a Basic component module of an 802.11 LAN. It will be appreciated that STAs that are capable of communicating wirelessly with each other may form a BSS, and that if a station moves out of the coverage area of the BSS, it will no longer be able to communicate with other members of the BSS. The STA is a client, can be a computer with a wireless network card, and can also be a smart phone with a Wi-Fi module. The STA may be mobile or fixed, and is the most basic component of the wireless lan.
Disclosure of Invention
The embodiment of the invention provides a network connection method and a terminal, which can enable the terminal to be connected with a Wi-Fi network quickly, so that the user experience is improved.
The first aspect of the embodiment of the invention discloses a network connection method, which comprises the following steps:
when a terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network or not; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
if the first access point belongs to the forbidden extended service set network, monitoring the signal strength of the first access point at a preset frequency within a preset time period;
and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point.
A second aspect of the present invention discloses a terminal, including:
the terminal comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether a first access point belongs to a forbidden extended service set network or not when the terminal scans the first access point through Wi-Fi; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
a monitoring unit, configured to monitor a signal strength of the first access point at a preset frequency within a preset time period if the first access point belongs to the prohibited extended service set network;
and the enabling unit is used for actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity.
A third aspect of the present invention discloses a terminal, including:
a memory storing executable program code;
a processor coupled with the memory;
the processor calls the executable program code stored in the memory to perform the method as described in the first aspect.
In the scheme of the embodiment of the invention, when a terminal scans a first access point through Wi-Fi, whether the first access point belongs to a forbidden extended service set network is judged; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures; if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period; and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point. Therefore, by implementing the technical scheme provided by the invention, the terminal can be quickly connected with the Wi-Fi network, so that the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart illustrating a method for network connection according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating another method for network connection according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating another method for network connection according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of another terminal according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an entity apparatus of a terminal according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an entity device of a mobile phone according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a network connection method and a terminal, which can enable the terminal to be connected with a Wi-Fi network quickly, so that the user experience is improved.
In order to make the technical solutions of the present invention better understood by those skilled in the art, the technical solutions in the embodiments of the present invention will be clearly described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The appearances of the phrases "first," "second," and "third," or the like, in the specification, claims, and figures are not necessarily all referring to the particular order in which they are presented. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In one embodiment of the present invention, a method of network connection is disclosed, the method comprising: when a terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network or not; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures; if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period; and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point.
Referring to fig. 1, fig. 1 is a method for network connection according to an embodiment of the present invention. As shown in fig. 1, a method for network connection according to an embodiment of the present invention includes the following steps:
s101, when the terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network.
It should be noted that the main execution body of the method is the terminal. The terminal includes, but is not limited to, an electronic device that can perform data transmission service through a network, such as a smart phone, a tablet computer, a computer, and a wearable device.
It should be noted that the basic service set is a basic component module of an 802.11 LAN. STAs capable of wireless communication with each other may form a bss (basic Service set). If a station moves out of the coverage area of the BSS, it will no longer be able to communicate with other members of the BSS. In addition, a plurality of BSSs may form an extended network, which is called an Extended Service Set (ESS) network, and STAs within an ESS network may communicate with each other, which is a larger-scale virtual BSS formed by a plurality of BSSs using the same SSID. The components that connect the BSSs are called distributed systems.
The SSID is a network identifier (e.g., TP _ Link _1201) of the ESS, the BSSID is an identifier of the BSS, the BSSID is actually a MAC address of the AP, the BSSID is used to identify the BSS managed by the AP, and the BSSID and the SSID are mapped one by one in the same AP. The SSID is the same within an ESS, but the BSSID corresponding to it is different for each AP within the ESS. If an AP can support multiple SSIDs simultaneously, the AP assigns different BSSIDs to correspond to the SSIDs.
In addition, it should be noted that the STA searches for APs using Scanning, searches for and connects to an AP, and searches for a new AP when roaming, on each available channel. For example, the network is discovered by listening to Beacon frames periodically sent by the AP, which provide information about the AP and the BSS where the AP is located: for another example, the STA sequentially sends out Probe Request frames in 13 channels, searches for an AP having the same SSID as the STA belongs to, and scans all the time if the AP having the same SSID cannot be found.
When the STA finds the AP with the same SSID as the STA, one AP with the strongest signal is selected from the APs with matched SSIDs according to the received AP signal strength, and then the authentication stage is entered. Only the station passing the identity authentication can carry out wireless access. Specifically, the STA sends an association request to the AP, and the AP returns an association response to the STA. Until this point, the access procedure is completed, and after the STA is initialized, it may start to transmit data frames to the AP.
The STA has established connection with the AP1, and still receives the identifications of other APs in the space, when the environment variable changes and finds that the service quality of the AP2 is due to the AP1, the STA sends an association request to the AP2, and the STA confirms an association response fed back by the AP 2. The AP2 notifies the AP1 via ethernet that the STA has been taken over by the AP 2.
However, in the present invention, when a terminal (STA) scans a first access point through Wi-Fi, it needs to determine whether the first access point belongs to a prohibited extended service set network. Wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
optionally, the determining whether the first access point belongs to a prohibited extended service set network includes: acquiring a list of forbidden extended service set networks; determining an identification of an access point included in each forbidden extended service set network in the list; matching the identity of the first access point with the determined identity of the access point to determine whether the first access point belongs to a forbidden extended service set network.
Optionally, the determining whether the first access point belongs to a prohibited extended service set network includes: acquiring an identifier of an extended service set network to which the first access point belongs; traversing a list of forbidden extended service set networks to determine whether the list includes an identification of an extended service set network to which the first access point belongs.
Wherein before the determining whether the new access point belongs to the forbidden extended service set network, the method further comprises:
when the terminal is detected to be failed to connect with a second access point, counting the failure times of connecting with the second access point; if the failure times are larger than a preset threshold value, determining an extended service set network to which the second access point belongs; setting the extended service set network to which the second access point belongs as a forbidden extended service set network so that the terminal cannot automatically connect to the access point in the forbidden extended server network.
And S102, if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period.
For example, the signal strength of the first ap may be detected within 5 minutes, and the predetermined frequency may be 10 detections per minute. The preset time period and the preset frequency are not limited herein.
It should be noted that the preset time period and the preset frequency may be defaults, or may be changed according to the remaining power of the battery.
For example, the more the current remaining power, the longer the preset time period can be set, and the higher the preset frequency can be set; conversely, the shorter the preset time period can be set, the lower the preset frequency can be set.
S103, if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, the forbidden extended service set network is actively enabled so that the terminal can automatically access the first access point.
Optionally, the actively enabling the forbidden ess network includes: acquiring a target identifier, wherein the target identifier is an identifier of a forbidden extended service set network to which the first access point belongs; removing the target identification from the forbidden server service set network list to enable the forbidden extended service set network.
It can be seen that, in the scheme of the embodiment of the present invention, when the terminal scans the first access point through Wi-Fi, it is determined whether the first access point belongs to a prohibited extended service set network; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures; if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period; and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point. Therefore, by implementing the technical scheme provided by the invention, the terminal can be quickly connected with the Wi-Fi network, so that the user experience is improved.
Referring to fig. 2, fig. 2 is a method for network connection according to an embodiment of the invention. As shown in fig. 2, a method for network connection according to an embodiment of the present invention includes the following steps:
s201, when the terminal is detected to be failed to connect with a second access point, counting the failure times of connecting with the second access point.
It should be noted that the main execution body of the method is the terminal. The terminal includes, but is not limited to, an electronic device that can perform data transmission service through a network, such as a smart phone, a tablet computer, a computer, and a wearable device.
S202, if the failure times are larger than a preset threshold value, determining the extended service set network to which the second access point belongs.
S203, setting the extended service set network to which the second access point belongs as a forbidden extended service set network so that the terminal cannot automatically connect with the access point in the forbidden extended server network.
S204, when the terminal scans the first access point through Wi-Fi, a forbidden list of the extended service set network is obtained.
S205, determining an identifier of an access point included in each forbidden extended service set network in the list.
S206, matching the identification of the first access point with the identification of the determined access point to judge whether the first access point belongs to a forbidden extended service set network.
Wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
it should be noted that the first access point and the second access point may be the same access point or different access points.
And S207, if the first access point belongs to the forbidden extended service set network, monitoring the signal strength of the first access point at a preset frequency within a preset time period.
And S208, if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, acquiring a target identifier.
Wherein the target identifier is an identifier of a forbidden extended service set network to which the first access point belongs;
s209, removing the target identification from the forbidden server service set network list to enable the forbidden extended service set network.
It can be seen that, in the scheme of the embodiment of the present invention, the step of actively enabling is extended, so that, in the case that the terminal does not participate manually, if the signal strength of the first access point monitored in the preset time period is always greater than the preset strength, the forbidden extended service set network is actively enabled, so that the terminal automatically accesses the first access point.
Referring to fig. 3, fig. 3 is a method for network connection according to an embodiment of the invention. As shown in fig. 3, a method for network connection according to an embodiment of the present invention includes the following steps:
s301, when the terminal is detected to fail to connect with the second access point, counting the failure times of connecting with the second access point.
It should be noted that the main execution body of the method is the terminal. The terminal includes, but is not limited to, an electronic device that can perform data transmission service through a network, such as a smart phone, a tablet computer, a computer, and a wearable device.
S302, if the failure times are larger than a preset threshold value, determining an extended service set network to which the second access point belongs.
S303, setting the extended service set network to which the second access point belongs as a prohibited extended service set network, so that the terminal cannot automatically connect to the access point in the prohibited extended server network.
S304, when the terminal scans a first access point through Wi-Fi, acquiring an identifier of an extended service set network to which the first access point belongs;
s305, traversing the forbidden list of the extended service set networks to determine whether the list contains the identification of the extended service set network to which the first access point belongs.
Wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
it should be noted that the first access point and the second access point may be the same access point or different access points.
S306, if the first access point belongs to the forbidden extended service set network, monitoring the signal strength of the first access point at a preset frequency within a preset time period;
s307, if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, acquiring a target identifier;
wherein the target identifier is an identifier of a forbidden extended service set network to which the first access point belongs;
s308, the target identification is removed from the forbidden server service set network list so as to enable the forbidden extended service set network.
It can be seen that, in the solution of the embodiment of the present invention, the step of determining whether the first access point belongs to the prohibited extended service set network is extended, when it is determined whether the first access point belongs to the prohibited extended service set network, the signal strength of the first access point needs to be continuously monitored to determine whether to actively enable the prohibited extended service set network, and after the prohibited extended service set network is actively enabled, the terminal may access the first access point.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 4, an embodiment of the present invention provides a terminal 400, where the terminal may be an electronic device such as a smart phone, a tablet computer, and a smart wearable device. The terminal 400 includes a judging unit 401, a monitoring unit 402, and an enabling unit 403.
A determining unit 401, configured to determine, when a terminal scans a first access point through Wi-Fi, whether the first access point belongs to a prohibited extended service set network; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
a monitoring unit 402, configured to monitor a signal strength of the first access point at a preset frequency within a preset time period if the first access point belongs to the prohibited extended service set network;
an enabling unit 403, configured to actively enable the forbidden ess network to enable the terminal to automatically access the first access point if the monitored signal strength of the first access point in the preset time period is always greater than a preset strength.
The determining unit 401, the monitoring unit 402, and the enabling unit 403 may be configured to execute the methods described in steps S101 to S103 in embodiment 1, and details of the method are described in embodiment 1, and are not described herein again.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 5, another terminal 500 according to an embodiment of the present invention is provided, where the terminal may be an electronic device such as a smart phone, a tablet computer, and a smart wearable device. The terminal 500 includes a judgment unit 501, a monitoring unit 502, an enabling unit 503, a counting unit 504, a determination unit 505, and a setting unit 506.
A counting unit 504, configured to count, when it is detected that the terminal fails to connect to the second access point, the number of times of failure in connecting to the second access point.
A determining unit 505, configured to determine, if the number of times of the failure is greater than a preset threshold, an extended service set network to which the second access point belongs.
A setting unit 506, configured to set the extended service set network to which the second access point belongs as a prohibited extended service set network so that the terminal cannot automatically connect to an access point in the prohibited extended server network.
A determining unit 501, configured to determine whether a first access point belongs to a prohibited extended service set network when a terminal scans the first access point through Wi-Fi.
Wherein the forbidden extended service set network refers to a network that is set to be forbidden due to multiple access failures.
The determining unit 501 includes a first acquiring subunit 5011, a determining subunit 5012, and a matching subunit 5013: the first acquiring subunit is configured to acquire a list of prohibited extended service set networks; the determining subunit is configured to determine an identifier of an access point included in each forbidden extended service set network in the list; the matching subunit is configured to match the identifier of the first access point with the identifier of the determined access point to determine whether the first access point belongs to a forbidden extended service set network.
A monitoring unit 502, configured to monitor a signal strength of the first access point at a preset frequency within a preset time period if the first access point belongs to the prohibited extended service set network;
an enabling unit 503, configured to actively enable the forbidden ess network to enable the terminal to automatically access the first access point if the monitored signal strength of the first access point in the preset time period is always greater than a preset strength.
Wherein the enabling unit 503 comprises an acquiring subunit and a shifting-out subunit; the acquiring subunit is configured to acquire a target identifier, where the target identifier is an identifier of a prohibited extended service set network to which the first access point belongs; the moving-out subunit is configured to move the target identifier out of the forbidden server service set network list to enable the forbidden extended service set network.
The determining unit 501, the monitoring unit 502, the enabling unit 503, the counting unit 504, the determining unit 505, and the setting unit 506 may be configured to execute the methods described in steps S201 to S209 in embodiment 2, and the detailed description refers to the description of the method in embodiment 2, and is not repeated herein.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a terminal according to an embodiment of the present invention. As shown in fig. 6, another terminal 600 according to an embodiment of the present invention is provided, where the terminal may be an electronic device such as a smart phone, a tablet computer, and an intelligent wearable device. The terminal 600 includes a terminal 600 including a judging unit 601, a monitoring unit 602, an enabling unit 603, a counting unit 604, a determining unit 605, and a setting unit 606.
A counting unit 604, configured to count, when it is detected that the terminal fails to connect to the second access point, the number of times of failure in connecting to the second access point.
A determining unit 605, configured to determine, if the number of times of the failure is greater than a preset threshold, an extended service set network to which the second access point belongs.
A setting unit 606, configured to set the extended service set network to which the second access point belongs as a prohibited extended service set network, so that the terminal cannot automatically connect to an access point in the prohibited extended server network.
The determining unit 601 is configured to determine whether a first access point belongs to a prohibited extended service set network when the terminal scans the first access point through Wi-Fi.
Wherein the forbidden extended service set network refers to a network that is set to be forbidden due to multiple access failures.
The judging unit 601 includes a second acquiring subunit and a traversing subunit; the second obtaining subunit is configured to obtain an identifier of an extended service set network to which the first access point belongs; the traversing subunit is configured to traverse the list of forbidden extended service set networks to determine whether the list includes an identifier of an extended service set network to which the first access point belongs.
A monitoring unit 602, configured to monitor a signal strength of the first access point at a preset frequency within a preset time period if the first access point belongs to the prohibited extended service set network.
An enabling unit 603, configured to actively enable the forbidden ess network to enable the terminal to automatically access the first access point if the monitored signal strength of the first access point in the preset time period is always greater than a preset strength.
Wherein the enabling unit 603 comprises an acquiring subunit and a shifting-out subunit; the acquiring subunit is configured to acquire a target identifier, where the target identifier is an identifier of a prohibited extended service set network to which the first access point belongs; the moving-out subunit is configured to move the target identifier out of the forbidden server service set network list to enable the forbidden extended service set network.
The determining unit 601, the monitoring unit 602, the enabling unit 603, the counting unit 604, the determining unit 605, and the setting unit 606 may be configured to execute the methods described in steps S301 to S308 in embodiment 3, and the detailed description refers to the description of the method in embodiment 3, and is not repeated herein.
Referring to fig. 7, in another embodiment of the present invention, a second terminal is provided. The second terminal 700 includes a CPU701, a memory 702, and a bus 703. The terminal 700 may be an electronic device with a call function, such as a smart phone, a tablet computer, and an intelligent wearable device.
The CPU701 executes a program pre-stored in the memory 702, and the execution process specifically includes:
when a terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network or not; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures;
if the first access point belongs to the forbidden extended service set network, monitoring the signal strength of the first access point at a preset frequency within a preset time period;
and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point.
Optionally, the determining whether the first access point belongs to a forbidden extended service set network includes:
acquiring a list of forbidden extended service set networks;
determining an identification of an access point included in each forbidden extended service set network in the list;
matching the identity of the first access point with the determined identity of the access point to determine whether the first access point belongs to a forbidden extended service set network.
Optionally, the determining whether the first access point belongs to a forbidden extended service set network includes:
acquiring an identifier of an extended service set network to which the first access point belongs;
traversing a list of forbidden extended service set networks to determine whether the list includes an identification of an extended service set network to which the first access point belongs.
Optionally, the actively enabling the disabled extended service set network includes:
acquiring a target identifier, wherein the target identifier is an identifier of a forbidden extended service set network to which the first access point belongs;
removing the target identification from the forbidden server service set network list to enable the forbidden extended service set network.
Optionally, before the determining whether the new access point belongs to the prohibited extended service set network, the executing process further includes:
when the terminal is detected to be failed to connect with a second access point, counting the failure times of connecting with the second access point;
if the failure times are larger than a preset threshold value, determining an extended service set network to which the second access point belongs;
setting the extended service set network to which the second access point belongs as a forbidden extended service set network so that the terminal cannot automatically connect to the access point in the forbidden extended server network.
It can be seen that, in the scheme of the embodiment of the present invention, when the terminal scans the first access point through Wi-Fi, it is determined whether the first access point belongs to a prohibited extended service set network; wherein the forbidden extended service set network refers to a network set as forbidden due to multiple access failures; if the first access point belongs to the forbidden extended service set, monitoring the signal strength of the first access point at a preset frequency within a preset time period; and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point. Therefore, by implementing the technical scheme provided by the invention, the terminal can be quickly connected with the Wi-Fi network, so that the user experience is improved.
Referring to fig. 8, fig. 8 is a block diagram of a part of a structure of a mobile phone related to a terminal according to an embodiment of the present invention. Referring to fig. 8, the handset includes: radio Frequency (RF) circuit 810, memory 820, input unit 830, display unit 840, sensor 850, audio circuit 860, Wireless Fidelity (Wi-Fi) module 870, processor 880, and power supply 890. Those skilled in the art will appreciate that the handset configuration shown in fig. 8 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 8:
the RF circuitry 810 may be used for the reception and transmission of information. In general, RF circuit 810 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 810 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for mobile communications (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 820 may be used to store software programs and modules, and the processor 880 executes various functional applications and data processing of the cellular phone by operating the software programs and modules stored in the memory 820. The memory 820 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program (such as a network connection function) required for at least one function, and the like; the storage data area may store data created according to the use of the handset (such as a list of forbidden extended service set networks, etc.), and the like. Further, the memory 820 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 830 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 830 may include a fingerprint module 831 and other input devices 832. Fingerprint module 831, the fingerprint data of the user on it can be gathered. Optionally, the fingerprint module 831 may include an optical fingerprint module, a capacitive fingerprint module, and a radio frequency fingerprint module. Taking the fingerprint module 831 as an example of a capacitive fingerprint module, the fingerprint module specifically includes sensing electrodes (n1 abnormal sensing electrodes and n2 normal sensing electrodes) and a signal processing circuit (such as an amplifying circuit, a noise suppression circuit, an analog-to-digital conversion circuit, etc.) connected to the sensing electrodes. The input unit 830 may include other input devices 832 in addition to the fingerprint module 831. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 840 may be used to display information input by the user or information provided to the user and various menus of the cellular phone. The display unit 840 may include a display screen 841, and the display screen 841 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like, as an option. Although in fig. 8, the fingerprint module 831 and the display 841 are two independent components to implement the input and output functions of the mobile phone, in some embodiments, the fingerprint module 831 and the display 841 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 850, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that adjusts the brightness of the display 841 based on the ambient light level, and a proximity sensor that turns off the display 841 and/or the backlight when the phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 860, speaker 881, and microphone 882 may provide an audio interface between the user and the cell phone. The audio circuit 860 may transmit the electrical signal converted from the received audio data to the speaker 881, and convert the electrical signal into a sound signal for output by the speaker 881; on the other hand, the microphone 882 converts the collected sound signals into electrical signals, which are received by the audio circuit 860 and converted into audio data, which are then processed by the audio data output processor 880 and transmitted via the RF circuit 810 to, for example, another cellular phone, or output the audio data to the memory 820 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to send and receive e-mails, browse webpages, access streaming media and the like through the WiFi module 870, and provides wireless broadband Internet access for the user. Although fig. 8 shows WiFi module 870, it is understood that it does not belong to the essential constitution of the handset, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 880 is a control center of the mobile phone, connects various parts of the entire mobile phone using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 820 and calling data stored in the memory 820, thereby integrally monitoring the mobile phone. Optionally, processor 880 may include one or more processing units; preferably, the processor 880 may integrate an application processor, which mainly handles operating systems, user interfaces, applications, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 880.
The handset also includes a power supply 890 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 880 via a power management system to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In the embodiments shown in fig. 1, fig. 2 and fig. 3, the method flows of the steps may be implemented based on the structure of the mobile phone.
In the embodiments shown in fig. 4, 5 and 6, the functions of the units can be implemented based on the structure of the mobile phone.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A method of network connectivity, the method comprising:
when a terminal scans a first access point through Wi-Fi, judging whether the first access point belongs to a forbidden extended service set network or not; wherein the forbidden extended service set network refers to a network which is set to be forbidden due to multiple access failures of a second access point;
if the first access point belongs to the forbidden extended service set network, monitoring the signal strength of the first access point at a preset frequency within a preset time period; the preset time period and the preset frequency are changed according to the residual capacity of the battery;
and if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity, actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point.
2. The method of claim 1, wherein the determining whether the first access point belongs to a forbidden extended service set network comprises:
acquiring a list of forbidden extended service set networks;
determining an identification of an access point included in each forbidden extended service set network in the list;
matching the identity of the first access point with the determined identity of the access point to determine whether the first access point belongs to a forbidden extended service set network.
3. The method of claim 1, wherein the determining whether the first access point belongs to a forbidden extended service set network comprises:
acquiring an identifier of an extended service set network to which the first access point belongs;
traversing a list of forbidden extended service set networks to determine whether the list includes an identification of an extended service set network to which the first access point belongs.
4. The method of claim 2 or 3, wherein actively enabling the barred extended service set network comprises:
acquiring a target identifier, wherein the target identifier is an identifier of a forbidden extended service set network to which the first access point belongs;
removing the target identification from the forbidden server service set network list to enable the forbidden extended service set network.
5. The method of any of claims 1 to 3, wherein before determining whether the first access point belongs to a forbidden extended service set network, the method further comprises:
when the terminal is detected to be failed to connect with a second access point, counting the failure times of connecting with the second access point;
if the failure times are larger than a preset threshold value, determining an extended service set network to which the second access point belongs;
setting the extended service set network to which the second access point belongs as a forbidden extended service set network so that the terminal cannot automatically connect to the access point in the forbidden extended server network.
6. A terminal, characterized in that the terminal comprises:
the terminal comprises a judging unit, a judging unit and a judging unit, wherein the judging unit is used for judging whether a first access point belongs to a forbidden extended service set network or not when the terminal scans the first access point through Wi-Fi; wherein the forbidden extended service set network refers to a network which is set to be forbidden due to multiple access failures of a second access point;
a monitoring unit, configured to monitor a signal strength of the first access point at a preset frequency within a preset time period if the first access point belongs to the prohibited extended service set network; the preset time period and the preset frequency are changed according to the residual capacity of the battery;
and the enabling unit is used for actively enabling the forbidden extended service set network to enable the terminal to automatically access the first access point if the monitored signal intensity of the first access point in the preset time period is always greater than the preset intensity.
7. The terminal of claim 6, wherein the determining unit comprises a first acquiring subunit, a determining subunit, and a matching subunit:
the first acquiring subunit is configured to acquire a list of prohibited extended service set networks;
the determining subunit is configured to determine an identifier of an access point included in each forbidden extended service set network in the list;
the matching subunit is configured to match the identifier of the first access point with the identifier of the determined access point to determine whether the first access point belongs to a forbidden extended service set network.
8. The terminal of claim 6, wherein the determining unit comprises a second obtaining sub-unit and a traversing sub-unit;
the second obtaining subunit is configured to obtain an identifier of an extended service set network to which the first access point belongs;
the traversing subunit is configured to traverse the list of forbidden extended service set networks to determine whether the list includes an identifier of an extended service set network to which the first access point belongs.
9. The terminal according to claim 7 or 8, wherein the enabling unit comprises an acquiring subunit and a shifting-out subunit;
the acquiring subunit is configured to acquire a target identifier, where the target identifier is an identifier of a prohibited extended service set network to which the first access point belongs;
the moving-out subunit is configured to move the target identifier out of the forbidden server service set network list to enable the forbidden extended service set network.
10. The terminal according to any of claims 6 to 8, characterized in that the terminal further comprises a statistics unit, a determination unit and a setting unit;
the statistical unit is used for counting the times of failure of connecting the second access point when the terminal is detected to fail to connect the second access point;
the determining unit is configured to determine, if the number of times of the failure is greater than a preset threshold, an extended service set network to which the second access point belongs;
the setting unit is configured to set the extended service set network to which the second access point belongs as a prohibited extended service set network, so that the terminal cannot automatically connect to an access point in the prohibited extended server network.
11. A terminal, comprising:
a memory storing an executable computer program;
a processor coupled with the memory;
the processor calls the executable computer program stored in the memory to perform the method of any one of claims 1 to 5.
CN201611121186.1A 2016-12-07 2016-12-07 Network connection method and terminal Active CN106851780B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611121186.1A CN106851780B (en) 2016-12-07 2016-12-07 Network connection method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611121186.1A CN106851780B (en) 2016-12-07 2016-12-07 Network connection method and terminal

Publications (2)

Publication Number Publication Date
CN106851780A CN106851780A (en) 2017-06-13
CN106851780B true CN106851780B (en) 2019-12-31

Family

ID=59139750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611121186.1A Active CN106851780B (en) 2016-12-07 2016-12-07 Network connection method and terminal

Country Status (1)

Country Link
CN (1) CN106851780B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979863B (en) * 2017-11-27 2020-03-17 Oppo广东移动通信有限公司 WiFi automatic connection method, system and terminal equipment
CN107889193B (en) * 2017-11-27 2020-05-05 Oppo广东移动通信有限公司 Network connection method, mobile terminal and computer readable storage medium
CN107708175B (en) * 2017-11-27 2020-02-14 Oppo广东移动通信有限公司 WiFi automatic connection method, system and terminal equipment
CN107820299A (en) * 2017-11-27 2018-03-20 广东欧珀移动通信有限公司 A kind of method for connecting network, network connection device and mobile terminal
CN108012308B (en) * 2017-11-27 2020-03-17 Oppo广东移动通信有限公司 Network connection method, mobile terminal and computer readable storage medium
CN107708176B (en) * 2017-11-27 2020-03-20 Oppo广东移动通信有限公司 Network connection method, network connection device and mobile terminal
CN107995645A (en) * 2017-11-28 2018-05-04 广东欧珀移动通信有限公司 Method for connecting network, mobile terminal and computer-readable recording medium
CN110312253B (en) * 2018-03-20 2022-08-09 杭州海康威视数字技术股份有限公司 Network access method, device and system
CN110162347B (en) * 2019-05-15 2023-05-16 苏州达家迎信息技术有限公司 Application program starting method, device, equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101076191A (en) * 2006-05-19 2007-11-21 美国博通公司 Method and system for providing addressing service in mobile terminal
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
CN103873456A (en) * 2012-12-18 2014-06-18 华为终端有限公司 Access control method of WiFi (wireless fidelity) equipment and WiFi equipment
CN104080148A (en) * 2013-03-29 2014-10-01 华为终端有限公司 Method and device for achieving rapid network connection

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI430596B (en) * 2010-02-22 2014-03-11 Ralink Technology Corp Method and apparatus for generating a forbidden channel list

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101076191A (en) * 2006-05-19 2007-11-21 美国博通公司 Method and system for providing addressing service in mobile terminal
CN102067678A (en) * 2008-03-26 2011-05-18 高通股份有限公司 Device managed access point lists in wireless communications
CN103873456A (en) * 2012-12-18 2014-06-18 华为终端有限公司 Access control method of WiFi (wireless fidelity) equipment and WiFi equipment
CN104080148A (en) * 2013-03-29 2014-10-01 华为终端有限公司 Method and device for achieving rapid network connection

Also Published As

Publication number Publication date
CN106851780A (en) 2017-06-13

Similar Documents

Publication Publication Date Title
CN106851780B (en) Network connection method and terminal
CN106714250B (en) Cell registration method and device and computer readable storage medium
CN111278001B (en) Terminal capability negotiation method, terminal equipment and network side equipment
US10813058B2 (en) Method for processing information and terminal device
CN106604314B (en) WiFi roaming network access method and terminal equipment
CN106888495B (en) Network access method and terminal
CN107480489B (en) unlocking control method and related product
CN106961676B (en) Network searching method, device and medium
CN106714275B (en) Wi-Fi connection method and mobile terminal
CN106961710B (en) Network access method and terminal
CN106446111B (en) Data migration method and terminal
CN106792819B (en) Method and device for reducing power consumption of mobile terminal
CN110022553B (en) User identity identification card management method and mobile terminal
CN106851755B (en) Cell registration method and device
CN106714277B (en) Network connection method and terminal
CN106604277B (en) Wireless network access method and mobile terminal
CN107113747B (en) Communication method, device, terminal and base station
CN111436059B (en) Terminal measurement processing method and terminal
CN111436088B (en) Cell reselection method, base station, user terminal and storage medium
CN112383928B (en) Cell reselection method, terminal equipment and storage medium
CN112469109A (en) Method for preferentially selecting ENDC cell, terminal device and storage medium
CN111641976A (en) Data transmission method, terminal equipment and network equipment
CN110351702B (en) System information area determining method, indicating method, terminal and network equipment
CN113141644A (en) Terminal power saving method based on wireless local area network connection and terminal
CN111988867B (en) Communication method with limited radio resource control and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant