CN107872791A - Access point connection method and device - Google Patents
Access point connection method and device Download PDFInfo
- Publication number
- CN107872791A CN107872791A CN201610842670.7A CN201610842670A CN107872791A CN 107872791 A CN107872791 A CN 107872791A CN 201610842670 A CN201610842670 A CN 201610842670A CN 107872791 A CN107872791 A CN 107872791A
- Authority
- CN
- China
- Prior art keywords
- access point
- identification information
- history
- pseudo
- connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of access point connection method and device, belong to radio network technique field.Method includes:After it is determined that current access point to be connected is history access point, judge progress privacy settings whether is needed when connect described access point;If privacy settings need to be carried out when connecting described access point, for the terminal generation specified pseudo- identification information inconsistent with each identification information in history identification information;According to the specified pseudo- identification information and the connection password of described access point generation connection request;The connection request is sent to described access point, process is established to complete connection.The present invention is after it is determined that access point to be connected is history access point, if it is determined that it is currently needed for carrying out privacy settings, then terminal voluntarily generates one when connecting the access point from original pseudo- identification information, after so terminal initiates connection request, access point just can not associate the pseudo- identification information with historical record, avoid privacy of user leakage.
Description
Technical field
The present invention relates to radio network technique field, more particularly to a kind of access point connection method and device.
Background technology
Radio network technique develops rapidly, surfs the Net and provides a great convenience whenever and wherever possible for people.When terminal connects
To after access point, user can easily carry out web page access, video-see etc. by terminal and operate.
Terminal can record MAC (the Media Access of the access point in one access point of connection for the first time in the prior art
Control, medium access control) address and connection password.When so connecting the access point next time, terminal can automatic root
According to the connection password and own MAC address of preservation connection request is initiated to the access point.Similarly, access point also can be to terminal
MAC Address is recorded, and when the terminal again attempts to connection next time, the access point can be known according to the historical record of storage
Whether the terminal once connected.
During the present invention is realized, inventor has found that prior art at least has problems with:
Terminal, which initiates a connection request, just to be needed to report once the MAC Address of itself, in the non-first connection of terminal, is connect
Whether access point can be known before user come excessively current location, in particular for the access point of public place according to historical record
For this can severe leakage privacy of user, above-mentioned connected mode security is poor.
The content of the invention
In order to solve problem of the prior art, the embodiments of the invention provide a kind of access point connection method and device.Institute
It is as follows to state technical scheme:
On the one hand, there is provided a kind of access point connection method, methods described include:
After it is determined that current access point to be connected is history access point, judge whether to need when connecting described access point into
Row privacy settings, the history access point refer to the access point connected;
If privacy settings need to be carried out when connecting described access point, for terminal generation and each in history identification information
The inconsistent specified pseudo- identification information of identification information, the history identification information are that history makes when connecting the history access point
Identification information;
According to the specified pseudo- identification information and the connection password of described access point generation connection request;
The connection request is sent to described access point, process is established to complete connection.
On the other hand, there is provided a kind of access point attachment means, described device include:
Judge module, for after it is determined that current access point to be connected is history access point, judging connecing described in connection
Whether need to carry out privacy settings during access point, the history access point refers to the access point connected;
Generation module, if for privacy settings need to be carried out when connecting described access point, for terminal generation and history mark
Know the specified pseudo- identification information that each identification information is inconsistent in information, the history identification information is described in history connection
The identification information used during history access point;
The generation module, it is additionally operable to be connected according to the specified pseudo- identification information and the generation of the connection password of described access point
Connect request;
Sending module, for sending the connection request to described access point, process is established to complete connection.
The beneficial effect that technical scheme provided in an embodiment of the present invention is brought is:
It is determined that current access point to be connected be before after the history access point that had connected, terminal can voluntarily judge
Whether need to carry out privacy settings when connecting the access point, terminal connects the access point before voluntarily generating one if necessary
When from original pseudo- identification information, after such terminal initiates connection request, access point just will can not wrap in the connection request
The pseudo- identification information included associates with historical record, realizes and connects same access point by different identification information, avoids
Privacy of user is revealed, for example access point has no way of whether coming current location before knowing user, this kind of connected mode security
It is more excellent.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, make required in being described below to embodiment
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the present invention, for
For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings
Accompanying drawing.
Fig. 1 is a kind of configuration diagram of access point connecting system provided in an embodiment of the present invention;
Fig. 2A is a kind of flow chart of access point connection method provided in an embodiment of the present invention;
Fig. 2 B are a kind of schematic diagrames for setting the page provided in an embodiment of the present invention;
Fig. 2 C are a kind of flow charts of access point connection method provided in an embodiment of the present invention;
Fig. 2 D are a kind of flow charts of access point connection method provided in an embodiment of the present invention;
Fig. 3 is a kind of flow chart of access point connection method provided in an embodiment of the present invention;
Fig. 4 is a kind of structural representation of access point attachment means provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of terminal provided in an embodiment of the present invention.
Embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with accompanying drawing to embodiment party of the present invention
Formula is described in further detail.
Fig. 1 is a kind of configuration diagram of access point connecting system provided in an embodiment of the present invention.Access point connection system
The specific linker that can behave as being arranged in terminal of system.So that the identification information of terminal is MAC Address as an example, the access point connects
Welding system may include following several functional units:User's setting unit 101, MAC Address generation unit 102, MAC Address storage are single
103 and Wifi of member connection units 104.
Wherein, user can voluntarily be set by user's setting unit 101 in the history access point that connected which
Access point carries out privacy settings, and privacy policy corresponding to setting.User is protected if necessary to a new pseudo- MAC Address
Privacy, then MAC Address generation unit 102 from behavior terminal generate a new MAC Address.MAC Address memory cell 103, use
In all history access points for connecting of record terminal, and the MAC Address that terminal uses when connecting these history access points.
In the embodiment of the present invention, the MAC Address that terminal uses when history connects these history access points is referred to as history identification information.
Wifi connection units 104, for when user needs to connect a certain access point, first passing through user's setting unit 101
It is determined that whether need to carry out privacy settings when connecting the access point;If privacy settings need not be carried out, directly according to end
The MAC Address of itself and the connection password of the access point is held to be attached;, then need to if necessary to carry out privacy settings from MAC
Location generation unit 102 obtains a new pseudo- MAC Address, then determines to connect before terminal by MAC Address memory cell 103
Whether this pseudo- MAC Address was used during the access point;If used, MAC Address generation unit 102 need to regenerate one
Individual pseudo- MAC Address;If do not used, terminal according to the pseudo- MAC Address and connection password generation connection request, and to this
Access point initiates connection request, completes connection and establishes process.
Fig. 2A is a kind of flow chart of access point connection method provided in an embodiment of the present invention.Interaction agent is terminal and connect
Access point.Referring to Fig. 2A, method flow provided in an embodiment of the present invention includes:
201st, terminal judges whether current access point to be connected is history access point;If current access point to be connected is
History access point, then perform following step 202;If the current non-history access point of access point to be connected, performs following step
210。
Wherein, history access point refers to the access point that terminal once connected.In embodiments of the present invention, terminal is each
During secondary connection wireless network, the MAC Address that itself can be used to the MAC Address of corresponding access point and when connecting this access point
Recorded.Such as between the MAC Address that terminal can be stored with the access point MAC Address described in table 1 below and terminal uses
Mapping table.
Table 1
The MAC Address that terminal uses | The MAC Address of access point |
MAC Address 1 | MAC Address _ a |
MAC Address 2 | MAC Address _ b |
…… | …… |
MAC Address N | MAC Address _ n |
So terminal is after detecting that user attempts one access point of connection, according in the inquiry of the MAC Address of the access point
State whether table 1 can be history access point with the current access point to be connected of determination.If the MAC Address of the access point appears in
In above-mentioned table 1, then it is history access point to show the access point.
202nd, after it is determined that current access point to be connected is history access point, terminal judge be when connecting the access point
It is no to carry out privacy settings;If privacy settings need to be carried out when connecting the access point, following step 203 is performed;If connecting
Privacy settings need not be carried out during the access point, then performs following step 208.
In embodiments of the present invention, can be to different types of access in order to protect privacy of user when connecting wireless network
Point carries out privacy settings.That is, when needing in addition to itself original MAC Address, terminal can also be generated voluntarily in addition
Pseudo- MAC Address.Go to connect using different MAC Address for same access point, so that access point can not be by it with depositing
The historical record (MAC Address of each terminal connected) of storage associates, and realizes protection privacy of user.Wherein, need to carry out
The access point that the access point of privacy settings is usually set in public places, because the potential safety hazard of this kind of access point is typically most
Big.Can be without privacy settings for the access point positioned at the private site such as family or company.Certainly, user can root
Privacy settings is carried out to which history access point according to the actual demand selection of itself.
Wherein, when each history access point connected to terminal carries out privacy settings, following manner can be taken to realize:
Terminal shows a setting page as shown in Figure 2 B, and the setting page includes the MAC of each history access point connected
Address and privacy settings selections.It should be noted that each history access point corresponds to a privacy settings selections.Its
In, the MAC Address and privacy settings selections of history access point can be similar to as the data entries set on the page
An associated person information entry in address list.For a history access point, when terminal detects user to the history
After the trigger action of the privacy settings selections of access point, the drop-down list of the privacy settings selections can be shown.The drop-down list
In may include " without privacy settings " sublist item and " connection N days then carry out privacy settings ", " carry out privacy after connection n times
Setting " etc. is related to the sublist item of privacy policy.After the clicking operation of any sublist item in detecting user to drop-down list,
Obtain the privacy policy set and preserve the corresponding relation between the identification information of the history access point and the privacy policy.For
Each history access point, the selection of privacy policy is carried out with aforesaid way can be taken per family.
After privacy settings is carried out for history access point, when subsequent terminal is intended to connect a certain history access point, it can take down
The mode of stating judges whether that privacy settings need to be carried out:
After the first situation, the corresponding relation between the identification information and privacy policy of the above-mentioned history access point of inquiry,
If it is corresponding " without privacy settings " to obtain current access point to be connected, directly determining need not when connecting the access point
Carry out privacy settings.
After second of situation, the corresponding relation between the identification information and privacy policy of the above-mentioned history access point of inquiry,
If privacy policy as current access point to be connected corresponding similar " carrying out privacy settings after connection n times " is obtained, eventually
Establish the first connection number of connection before this connection of end statistics with the access point, and obtain the set in privacy policy
Two connection numbers;If the first connection number is more than the second connection number, it is determined that need to carry out privacy settings when connecting access point.
By privacy policy be more than 5 times connection after carry out privacy settings exemplified by, if then terminal before this connection with the access
Point established 6 connections, then just needs to carry out privacy settings when this connects the access point.
The third situation, after the corresponding relation between inquiring about the identification information and privacy policy of above-mentioned history access point,
If privacy policy as current access point to be connected corresponding similar " connection carries out privacy settings after N days " is obtained, eventually
When holding the first duration between statistics current Connection Time and last Connection Time, and obtaining set in privacy policy second
It is long;If the first duration is more than the second duration, it is determined that need to carry out privacy settings when connecting the access point.Using privacy policy as away from
Exemplified by privacy settings being carried out after being more than 5 days from last time connection, if then this connection of terminal 6 days away from last time connection,
Just need to carry out privacy settings so when this connects the access point.
If the 203, need to carry out privacy settings when connecting the access point, terminal generates the first pseudo- MAC Address.
In the disclosed embodiments, if needing to carry out privacy settings when connecting the access point, then terminal just needs weight
A newly-generated new MAC Address.This new MAC Address is to be different from a pseudo- MAC outside the MAC Address that dispatches from the factory of terminal
Address.That is, for the situation for needing progress privacy settings, in addition to first connection, terminal connects equal during the access point each time
The pseudo- MAC Address used during the connection access point different from the past can be generated.
204th, terminal judges whether each MAC Address of the first pseudo- MAC Address and history MAC Address is inconsistent;If
First pseudo- MAC Address and each MAC Address are inconsistent, then perform following step 205;If the first pseudo- MAC Address is gone through with this
A MAC Address is consistent in history MAC Address, then performs following step 207.
It should be noted that history MAC Address herein refer to be that terminal once connected used during the access point
MAC Address.Because pseudo- MAC Address is generated by terminal at random, it is possible that situation about repeatedly generating, current in order to determine
Whether used, also needed in the first pseudo- MAC Address and the history MAC Address before first pseudo- MAC Address terminal of generation
Each MAC Address is compared one by one.Wherein, the history MAC Address can acquire from above-mentioned table 1.
If the 205, the first pseudo- MAC Address and each MAC Address are inconsistent, terminal according to the first pseudo- MAC Address and
The connection password of the access point generates the first connection request, and first connection request is sent to the access point.
If the first pseudo- MAC Address is inconsistent with each MAC Address, prove connecting the access point before terminal
When the first pseudo- MAC Address was not used, can connect in the connection password generation first according to the first pseudo- MAC Address and the access point
After connecing request, first connection request is sent to the access point.
It should be noted that terminal can also preserve the MAC Address and the first puppet of the access point according to the form described in table 1
Corresponding relation between MAC Address.That is, by the corresponding relation between the MAC Address of the access point and the first pseudo- MAC Address more
Newly into above-mentioned table 1.
206th, access point is after the first connection request is received, and judges whether is connection password that the first connection request includes
With preset password match;If matching, the first pseudo- MAC Address is preserved, and successful connection information is issued to terminal, connection is completed and builds
Vertical process.
In embodiments of the present invention, the owner that preset password refers to the access point is that the connection that wireless network is set is close
Code.Access point issues successful connection information to terminal, completed it is determined that after the connection password and preset password match that terminal is sent
Process is established in connection.In addition, access point can also preserve to the first pseudo- MAC Address, to enter to the equipment for connecting wireless network
Row record.
For above-mentioned steps 201 to the access point connection shown in step 206, the first pseudo- MAC Address refers to right
The specified pseudo- identification information referred in claim.That is, terminal, after pseudo- identification information is generated for the first time, this pseudo- identification information is just
It is inconsistent with each identification information in history identification information, therefore this pseudo- identification information is defined as initiating to access point
The specified pseudo- identification information used during connection request.For this situation, with the first pseudo- MAC Address to specifying pseudo- identification information to enter
Row refers to.
Referring to Fig. 2 C, if terminal is judged in the first pseudo- MAC Address and the history MAC Address in above-mentioned steps 204
Some MAC Address is consistent, then terminal can skip above-mentioned steps 205 and 206 and perform following step 207 to step 209.
207th, after it is determined that the first pseudo- MAC Address is consistent with a MAC Address in the history MAC Address, terminal is given birth to again
Into pseudo- MAC Address, until obtaining the second pseudo- MAC Address inconsistent with each MAC Address in the history MAC Address.
208th, terminal generates the second connection request according to the connection password of the second pseudo- MAC Address and the access point, is connect to this
Access point sends second connection request.
209th, access point is after the second connection request is received, and judges whether is connection password that the second connection request includes
With preset password match;If matching, the second pseudo- MAC Address is preserved, and successful connection information is issued to terminal, connection is completed and builds
Vertical process.
It is pseudo- for the access point connection shown in above-mentioned steps 201 to step 204, step 207 to step 209, second
MAC Address is to refer to the specified pseudo- identification information referred in claims.That is, terminal is generating pseudo- identification information for the first time
Afterwards, this pseudo- identification information is consistent with an identification information in history identification information, therefore terminal need to regenerate one with going through
The inconsistent pseudo- identification information of each identification information in history identification information, and this pseudo- identification information is defined as to access
Point initiates the specified pseudo- identification information used during connection request.For this situation, with the second pseudo- MAC Address to specifying pseudo- mark
Information is referred to.
No matter for for above-mentioned any situation, after obtaining specifying pseudo- identification information, can preserve the access point
The first corresponding relation between identification information and specified pseudo- identification information.If to be subsequently again coupled to the access point, in life
During Cheng Xin pseudo- identification information, based on first corresponding relation, judge whether new pseudo- identification information is specified with this generation
Pseudo- identification information is identical.
Referring to Fig. 2 D, if terminal judges that current access point to be connected accesses for non-history in above-mentioned steps 201
Point, then terminal can skip above-mentioned steps 202 to 210 and directly perform following step 210 and 211.
If the 210th, the current non-history access point of access point to be connected, terminal is according to the MAC Address of itself and the access
The connection password of point generates the 3rd connection request, and terminal sends the 3rd connection request to the access point.
Wherein, the MAC Address of itself refers to the MAC Address set when terminal is dispatched from the factory.
211st, access point is after the 3rd connection request is received, and judges whether is connection password that the 3rd connection request includes
With preset password match;If matching, the MAC Address that the 3rd connection request includes is preserved, and successful connection is issued to terminal
Information, complete connection and establish process.
Method provided in an embodiment of the present invention, it is determined that current access point to be connected be before the history that had connected
After access point, whether terminal needs to carry out privacy settings when voluntarily can judge to connect the access point, and terminal is voluntarily if necessary
From original pseudo- identification information when connecting the access point before generation one, after such terminal initiates connection request, access
The pseudo- identification information that point just can not include the connection request associates with historical record, realizes and is believed by different identification
Breath connects same access point, avoids privacy of user leakage, for example access point has no way of whether coming current institute before knowing user
On ground, this kind of connected mode security is more excellent.
Fig. 3 is a kind of flow chart of access point connection method provided in an embodiment of the present invention.Referring to Fig. 3, the present invention is implemented
The method flow that example provides includes:
301st, after it is determined that current access point to be connected is history access point, judge whether to need when connecting access point into
Row privacy settings;If privacy settings need to be carried out when connecting access point, following step 302 is performed.
Wherein, history access point refers to the access point connected.
If the 302, privacy settings need to be carried out when connecting the access point, for terminal generation with it is each in history identification information
The inconsistent specified pseudo- identification information of individual identification information, the history identification information are that history connects what is used during history access point
Identification information.
303rd, according to the connection password generation connection request for specifying pseudo- identification information and the access point.
304th, the connection request is sent to the access point, process is established to complete connection.
Method provided in an embodiment of the present invention, it is determined that current access point to be connected be before the history that had connected
After access point, whether terminal needs to carry out privacy settings when voluntarily can judge to connect the access point, and terminal is voluntarily if necessary
From original pseudo- identification information when connecting the access point before generation one, after such terminal initiates connection request, access
The pseudo- identification information that point just can not include the connection request associates with historical record, realizes and is believed by different identification
Breath connects same access point, avoids privacy of user leakage, for example access point has no way of whether coming current institute before knowing user
On ground, this kind of connected mode security is more excellent.
Fig. 4 is a kind of structural representation of access point attachment means provided in an embodiment of the present invention.Referring to Fig. 4, the device
Including:Judge module 401, generation module 402, sending module 403.
Judge module 401, for after it is determined that current access point to be connected is history access point, judging described in connection
Whether need to carry out privacy settings during access point, the history access point refers to the access point connected;
Generation module 402, if for privacy settings need to be carried out when connecting described access point, for terminal generation and history
The inconsistent specified pseudo- identification information of each identification information in identification information, the history identification information connect institute for history
State the identification information used during history access point;
Generation module 402, it is additionally operable to be connected according to the specified pseudo- identification information and the generation of the connection password of described access point
Connect request;
Sending module 403, for sending connection request to the access point, process is established to complete connection.
In another embodiment, the device also includes:
First preserving module, for preserving between the identification information of described access point and the specified pseudo- identification information
One corresponding relation.
In another embodiment, the generation module 402, for generating a pseudo- identification information for the terminal;Sentence
Whether the disconnected pseudo- identification information and each identification information in the history identification information are inconsistent;It is determined that the pseudo- mark
Know in information and the history identification information each identification information it is inconsistent after, the pseudo- identification information is defined as described
Specify pseudo- identification information;After it is determined that the pseudo- identification information is consistent with an identification information in the history identification information, it is
The terminal regenerates pseudo- identification information again, until obtaining differing with each identification information in the history identification information
The specified pseudo- identification information caused;
Generation module 402, being additionally operable to please according to the described second pseudo- identification information and the second connection of the connection password generation
Ask;
Sending module 403, it is additionally operable to send second connection request to described access point.
In another embodiment, the device also includes:
Display module 404, the page is set for showing, the identification information for setting the page to include each history access point
And privacy settings selections;
Acquisition module 405, for for a history access point, when detecting the privacy settings to the history access point
After the trigger action of option, the privacy policy of setting is obtained;
Second preserving module 406, between identification information and the privacy policy for preserving the history access point
Second corresponding relation.
In another embodiment, the judge module 401, in second corresponding relation of storage, obtaining
The privacy policy matched with described access point;Establish the first connection time of connection before counting this connection with described access point
Number;Obtain the second connection number set in the privacy policy;If the first connection number is more than the described second connection time
Number, it is determined that need to carry out privacy settings when connecting described access point.
In another embodiment, the judge module 401, in second corresponding relation of storage, obtaining
The privacy policy matched with described access point;Count the first duration between current Connection Time and last Connection Time;Obtain
Take the second duration set in the privacy policy;If first duration is more than second duration, it is determined that in connection institute
Privacy settings need to be carried out when stating access point.
Device provided in an embodiment of the present invention, it is determined that current access point to be connected be before the history that had connected
After access point, whether terminal needs to carry out privacy settings when voluntarily can judge to connect the access point, and terminal is voluntarily if necessary
From original pseudo- identification information when connecting the access point before generation one, after such terminal initiates connection request, access
The pseudo- identification information that point just can not include the connection request associates with historical record, realizes and is believed by different identification
Breath connects same access point, avoids privacy of user leakage, for example access point has no way of whether coming current institute before knowing user
On ground, this kind of connected mode security is more excellent.
It should be noted that:The access point attachment means that above-described embodiment provides are when connecting access point, only with above-mentioned each
The division progress of functional module, can be as needed and by above-mentioned function distribution by different work(for example, in practical application
Energy module is completed, i.e., the internal structure of device is divided into different functional modules, to complete whole described above or portion
Divide function.In addition, the access point attachment means that above-described embodiment provides belong to same design with access point connection method embodiment,
Its specific implementation process refers to embodiment of the method, repeats no more here.
Fig. 5 is a kind of terminal provided in an embodiment of the present invention, and the terminal can be used for performing what is provided in above-described embodiment
Access point connection method.Referring to Fig. 5, the terminal 500 includes:
RF (Radio Frequency, radio frequency) circuit 110, include one or more computer-readable storage mediums
Memory 120, input block 130, display unit 140, sensor 150, voicefrequency circuit 160, the WiFi (Wireless of matter
Fidelity, Wireless Fidelity) module 170, include one or the processor 180 and power supply of more than one processing core
190 grade parts., can be with it will be understood by those skilled in the art that the restriction of the terminal structure shown in Fig. 5 not structure paired terminal
Including than illustrating more or less parts, either combining some parts or different parts arrangement.Wherein:
RF circuits 110 can be used for receive and send messages or communication process in, the reception and transmission of signal, especially, by base station
After downlink information receives, transfer to one or more than one processor 180 is handled;In addition, it is sent to up data are related to
Base station.Generally, RF circuits 110 include but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, use
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuits 110 can also be communicated by radio communication with network and other equipment.Radio communication, which can use, appoints
(Global System of Mobile communication, the whole world are moved for one communication standard or agreement, including but not limited to GSM
Dynamic communication system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short
Messaging Service, Short Message Service) etc..
Memory 120 can be used for storage software program and module, and processor 180 is stored in memory 120 by operation
Software program and module, so as to perform various function application and data processing.Memory 120 can mainly include storage journey
Sequence area and storage data field, wherein, storing program area can storage program area, the application program (ratio needed at least one function
Such as sound-playing function, image player function) etc.;Storage data field can store uses created number according to terminal 500
According to (such as voice data, phone directory etc.) etc..In addition, memory 120 can include high-speed random access memory, can also wrap
Include nonvolatile memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Correspondingly, memory 120 can also include Memory Controller, to provide processor 180 and input block 130 to memory
120 access.
Input block 130 can be used for the numeral or character information for receiving input, and generation is set with user and function
Control relevant keyboard, mouse, action bars, optics or the input of trace ball signal.Specifically, input block 130 may include to touch
Sensitive surfaces 131 and other input equipments 132.Touch sensitive surface 131, also referred to as touch display screen or Trackpad, collect and use
Family on or near it touch operation (such as user using any suitable object or annex such as finger, stylus in touch-sensitive table
Operation on face 131 or near touch sensitive surface 131), and corresponding attachment means are driven according to formula set in advance.It is optional
, touch sensitive surface 131 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and the signal that touch operation is brought is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection means, and is converted into contact coordinate, then gives processor 180, and can reception processing device 180
The order sent simultaneously is performed.Furthermore, it is possible to using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 131.Except touch sensitive surface 131, input block 130 can also include other input equipments 132.Specifically,
Other input equipments 132 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One or more in trace ball, mouse, action bars etc..
Display unit 140 can be used for display by the information of user's input or be supplied to the information and terminal 500 of user
Various graphical user interface, these graphical user interface can be made up of figure, text, icon, video and its any combination.
Display unit 140 may include display panel 141, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the form such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
141.Further, touch sensitive surface 131 can cover display panel 141, when touch sensitive surface 131 detects touching on or near it
After touching operation, processor 180 is sent to determine the type of touch event, is followed by subsequent processing type of the device 180 according to touch event
Corresponding visual output is provided on display panel 141.Although in Figure 5, touch sensitive surface 131 and display panel 141 are conducts
Two independent parts come realize input and output function, but in some embodiments it is possible to by touch sensitive surface 131 with display
Panel 141 is integrated and realizes input and output function.
Terminal 500 may also include at least one sensor 150, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 141, and proximity transducer can close display when terminal 500 is moved in one's ear
Panel 141 and/or backlight.As one kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axles) acceleration size, size and the direction of gravity are can detect that when static, available for identification mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
The other sensors such as the gyroscope that can also configure in terminal 500, barometer, hygrometer, thermometer, infrared ray sensor, herein
Repeat no more.
Voicefrequency circuit 160, loudspeaker 161, microphone 162 can provide the COBBAIF between user and terminal 500.Audio
Electric signal after the voice data received conversion can be transferred to loudspeaker 161, sound is converted to by loudspeaker 161 by circuit 160
Sound signal exports;On the other hand, the voice signal of collection is converted to electric signal by microphone 162, after being received by voicefrequency circuit 160
Voice data is converted to, then after voice data output processor 180 is handled, through RF circuits 110 to be sent to such as another end
End, or voice data is exported to memory 120 further to handle.Voicefrequency circuit 160 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone and terminal 500.
WiFi belongs to short range wireless transmission technology, and terminal 500 can help user's transceiver electronicses by WiFi module 170
Mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.
Processor 180 is the control centre of terminal 500, utilizes various interfaces and each portion of connection whole mobile phone
Point, by running or performing the software program and/or module that are stored in memory 120, and call and be stored in memory 120
Interior data, the various functions and processing data of terminal 500 are performed, so as to carry out integral monitoring to mobile phone.Optionally, processor
180 may include one or more processing cores;Preferably, processor 180 can integrate application processor and modem processor,
Wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor mainly handles nothing
Line communicates.It is understood that above-mentioned modem processor can not also be integrated into processor 180.
Terminal 500 also includes the power supply 190 (such as battery) to all parts power supply, it is preferred that power supply can pass through electricity
Management system and processor 180 are logically contiguous, so as to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 190 can also include one or more direct current or AC power, recharging system, power supply event
The random component such as barrier detection circuit, power supply changeover device or inverter, power supply status indicator.
Although being not shown, terminal 500 can also include camera, bluetooth module etc., will not be repeated here.Specifically in this reality
To apply in example, the display unit of terminal is touch-screen display, and terminal also includes memory, and one or more than one
Program, one of them or more than one program storage are configured to by one or more than one processing in memory
Device execution states one or more than one program bag contains the instruction for being used for performing above-mentioned access point connection method.
One of ordinary skill in the art will appreciate that hardware can be passed through by realizing all or part of step of above-described embodiment
To complete, by program the hardware of correlation can also be instructed to complete, described program can be stored in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only storage, disk or CD etc..
The foregoing is only presently preferred embodiments of the present invention, be not intended to limit the invention, it is all the present invention spirit and
Within principle, any modification, equivalent substitution and improvements made etc., it should be included in the scope of the protection.
Claims (12)
1. a kind of access point connection method, it is characterised in that methods described includes:
After it is determined that current access point to be connected is history access point, judge whether to need when connecting described access point to carry out hidden
Set up illegally and put, the history access point refers to the access point connected;
If privacy settings need to be carried out when connecting described access point, identified for terminal generation with each in history identification information
The inconsistent specified pseudo- identification information of information, the history identification information are that history connects what is used during the history access point
Identification information;
According to the specified pseudo- identification information and the connection password of described access point generation connection request;
The connection request is sent to described access point, process is established to complete connection.
2. according to the method for claim 1, it is characterised in that methods described also includes:
Preserve the first corresponding relation between the identification information of described access point and the specified pseudo- identification information.
3. according to the method for claim 1, it is characterised in that described for terminal generation and each in history identification information
The inconsistent specified pseudo- identification information of identification information, including:
A pseudo- identification information is generated for the terminal;
Judge whether the pseudo- identification information is inconsistent with each identification information in the history identification information;
After it is determined that each identification information is inconsistent in the pseudo- identification information and the history identification information, by the puppet
Identification information is defined as the specified pseudo- identification information;
After it is determined that the pseudo- identification information is consistent with an identification information in the history identification information, weighed again for the terminal
Newly-generated pseudo- identification information, until obtain with each identification information in the history identification information it is inconsistent it is described specify
Pseudo- identification information.
4. according to the method for claim 1, it is characterised in that methods described also includes:
Display sets the page, the identification information and privacy settings selections that set the page to include each history access point;
For a history access point, after the trigger action to the privacy settings selections of the history access point is detected, obtain
Take the privacy policy of setting;
Preserve the second corresponding relation between the identification information of the history access point and the privacy policy.
5. according to the method for claim 4, it is characterised in that whether the judgement needs to carry out when connecting described access point
Privacy settings, including:
In second corresponding relation of storage, the privacy policy matched with described access point is obtained;
Establish the first connection number of connection before counting this connection with described access point;
Obtain the second connection number set in the privacy policy;
If the first connection number is more than the described second connection number, it is determined that need to carry out privacy when connecting described access point
Set.
6. according to the method for claim 4, it is characterised in that whether the judgement needs to carry out when connecting described access point
Privacy settings, including:
In second corresponding relation of storage, the privacy policy matched with described access point is obtained;
Count the first duration between current Connection Time and last Connection Time;
Obtain the second duration set in the privacy policy;
If first duration is more than second duration, it is determined that need to carry out privacy settings when connecting described access point.
7. a kind of access point attachment means, it is characterised in that described device includes:
Judge module, for after it is determined that current access point to be connected is history access point, judging in connection described access point
When whether need to carry out privacy settings, the history access point refers to the access point connected;
Generation module, if for privacy settings need to be carried out when connecting described access point, believe for terminal generation with history identification
The inconsistent specified pseudo- identification information of each identification information in breath, the history identification information are that history connects the history
The identification information used during access point;
The generation module, being additionally operable to please according to the specified pseudo- identification information and the generation connection of the connection password of described access point
Ask;
Sending module, for sending the connection request to described access point, process is established to complete connection.
8. device according to claim 7, it is characterised in that described device also includes:
First preserving module, for preserving the first couple between the identification information of described access point and the specified pseudo- identification information
It should be related to.
9. device according to claim 7, it is characterised in that the generation module, for generating one for the terminal
Pseudo- identification information;Judge whether the pseudo- identification information is inconsistent with each identification information in the history identification information;
After it is determined that each identification information is inconsistent in the pseudo- identification information and the history identification information, pseudo- identified described
Information is defined as the specified pseudo- identification information;It is determined that the pseudo- identification information and a mark in the history identification information
After information is consistent, pseudo- identification information is regenerated again for the terminal, until obtaining and each in the history identification information
The inconsistent specified pseudo- identification information of identification information.
10. device according to claim 7, it is characterised in that described device also includes:
Display module, the page is set for showing, the identification information that the page including each history access point is set and hidden
Private setting options;
Acquisition module, for for a history access point, when detecting to the privacy settings selections of the history access point
After trigger action, the privacy policy of setting is obtained;
Second preserving module, the identification information for preserving the history access point are corresponding with second between the privacy policy
Relation.
11. device according to claim 10, it is characterised in that the judge module, for described the second of storage
In corresponding relation, the privacy policy matched with described access point is obtained;Established with described access point before counting this connection
First connection number of connection;Obtain the second connection number set in the privacy policy;If the first connection number is big
Number is connected in described second, it is determined that need to carry out privacy settings when connecting described access point.
12. device according to claim 10, it is characterised in that the judge module, for described the second of storage
In corresponding relation, the privacy policy matched with described access point is obtained;Count current Connection Time and last Connection Time it
Between the first duration;Obtain the second duration set in the privacy policy;If first duration is more than second duration,
Then determine that when connecting described access point privacy settings need to be carried out.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610842670.7A CN107872791B (en) | 2016-09-22 | 2016-09-22 | Access point connection method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610842670.7A CN107872791B (en) | 2016-09-22 | 2016-09-22 | Access point connection method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107872791A true CN107872791A (en) | 2018-04-03 |
CN107872791B CN107872791B (en) | 2020-04-21 |
Family
ID=61751153
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610842670.7A Active CN107872791B (en) | 2016-09-22 | 2016-09-22 | Access point connection method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107872791B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111954283A (en) * | 2019-05-17 | 2020-11-17 | 华为技术有限公司 | Method and terminal for accessing wireless local area network |
CN113545130A (en) * | 2019-03-04 | 2021-10-22 | 思科技术公司 | Fast roaming and unifying policy for wireless clients using distributed hashing |
CN114710376A (en) * | 2020-12-16 | 2022-07-05 | 深圳Tcl新技术有限公司 | Connection control method and device of gateway equipment, gateway equipment and storage medium |
WO2023231019A1 (en) * | 2022-06-02 | 2023-12-07 | Oppo广东移动通信有限公司 | Wireless communication method, and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120076072A1 (en) * | 2010-09-24 | 2012-03-29 | Marc Jalfon | System and method for maintaining privacy in a wireless network |
CN103442097A (en) * | 2013-08-30 | 2013-12-11 | 烽火通信科技股份有限公司 | System and method for controlling WiFi terminal access authority by home gateway |
CN104754560A (en) * | 2013-12-30 | 2015-07-01 | 华为终端有限公司 | Position privacy protection method, device and system |
-
2016
- 2016-09-22 CN CN201610842670.7A patent/CN107872791B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120076072A1 (en) * | 2010-09-24 | 2012-03-29 | Marc Jalfon | System and method for maintaining privacy in a wireless network |
CN103119974A (en) * | 2010-09-24 | 2013-05-22 | 英特尔公司 | System and method for maintaining privacy in a wireless network |
CN103442097A (en) * | 2013-08-30 | 2013-12-11 | 烽火通信科技股份有限公司 | System and method for controlling WiFi terminal access authority by home gateway |
CN104754560A (en) * | 2013-12-30 | 2015-07-01 | 华为终端有限公司 | Position privacy protection method, device and system |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113545130A (en) * | 2019-03-04 | 2021-10-22 | 思科技术公司 | Fast roaming and unifying policy for wireless clients using distributed hashing |
CN111954283A (en) * | 2019-05-17 | 2020-11-17 | 华为技术有限公司 | Method and terminal for accessing wireless local area network |
WO2020233538A1 (en) * | 2019-05-17 | 2020-11-26 | 华为技术有限公司 | Method for accessing wireless local area network and terminal |
CN114710376A (en) * | 2020-12-16 | 2022-07-05 | 深圳Tcl新技术有限公司 | Connection control method and device of gateway equipment, gateway equipment and storage medium |
CN114710376B (en) * | 2020-12-16 | 2024-03-12 | 深圳Tcl新技术有限公司 | Connection control method and device of gateway equipment, gateway equipment and storage medium |
WO2023231019A1 (en) * | 2022-06-02 | 2023-12-07 | Oppo广东移动通信有限公司 | Wireless communication method, and device |
Also Published As
Publication number | Publication date |
---|---|
CN107872791B (en) | 2020-04-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105024984B (en) | Authority setting method, apparatus and system | |
CN107094294A (en) | Method for connecting network and device | |
CN104902531B (en) | Connect method, application authorization server, terminal and the router of network | |
CN103475914B (en) | Video playing method, video playing device, terminal equipment and server | |
CN106331372B (en) | Data transmission method and mobile terminal | |
CN106068020A (en) | Hinting abnormal states method and device | |
CN104852802B (en) | Auth method, equipment and system | |
CN103312597B (en) | A kind of speech message generation method and device | |
CN104699501B (en) | A kind of method and device for running application program | |
CN104901991A (en) | Methods, devices and system for transferring virtual resource | |
CN107872791A (en) | Access point connection method and device | |
CN106603740B (en) | It is connected to the network abnormal processing method and terminal device | |
CN105246075B (en) | access point connection method and device | |
CN107590397A (en) | A kind of method and apparatus for showing embedded webpage | |
CN107423099A (en) | Key programming method, server, terminal, key programming system and storage medium | |
CN104363590A (en) | Access point connection method and device | |
CN107743108A (en) | A kind of Media Access Control address recognition methods and device | |
CN107622137A (en) | The method and apparatus for searching speech message | |
CN105488433B (en) | Terminal key generation method and device | |
CN104166899B (en) | The method and terminal of voice interface | |
CN107404720A (en) | The method and relevant device that a kind of wireless setting information is reset | |
CN103458010B (en) | Member registration method, device, server and mobile terminal | |
CN107993300A (en) | A kind of Work attendance method and device based on intelligent terminal | |
CN107249168A (en) | A kind of data directional transmissions and method of reseptance and device | |
CN107786423A (en) | A kind of method and system of instant messaging |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |