CN113438712A - Wireless connection method and device - Google Patents

Wireless connection method and device Download PDF

Info

Publication number
CN113438712A
CN113438712A CN202110633150.6A CN202110633150A CN113438712A CN 113438712 A CN113438712 A CN 113438712A CN 202110633150 A CN202110633150 A CN 202110633150A CN 113438712 A CN113438712 A CN 113438712A
Authority
CN
China
Prior art keywords
slave device
access point
visible
master device
wireless access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110633150.6A
Other languages
Chinese (zh)
Inventor
李昊林
杜军红
葛振纲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Longcheer Technology Co Ltd
Original Assignee
Shanghai Longcheer Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Longcheer Technology Co Ltd filed Critical Shanghai Longcheer Technology Co Ltd
Priority to CN202110633150.6A priority Critical patent/CN113438712A/en
Publication of CN113438712A publication Critical patent/CN113438712A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application aims to provide a wireless connection method and equipment, wherein a visible white list is set in main equipment providing a wireless access point; the method comprises the steps that a master device responds to an operation of opening wireless connection, an image code is generated and displayed, so that a slave device responds to a scanned image code and sends a device identification of the slave device to the master device, the master device judges whether the slave device exists in a visible white list or not based on the device identification of the slave device, if yes, a visible instruction used for indicating a wireless access point provided for the slave device to be visible to the master device is sent to the slave device, the wireless access point provided by the master device is made visible to the slave device, wireless connection is established with the visible wireless access point, the wireless access point provided by the master device is prevented from being discovered and identified by any other device, safety protection of the wireless access point provided by the master device is achieved, and therefore privacy and safety of the wireless access point provided by the master device are conveniently and quickly improved.

Description

Wireless connection method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a wireless connection method and device.
Background
With the continuous development of intelligent internet surfing life, people have greater and greater requirements on wireless connection networks, such as wireless WiFi, hot spots, mobile data and the like. However, with the development of intelligent devices, more and more applications and methods for cracking personal hotspots appear in the market, so that the user intelligent device often faces the risk of being stolen after the personal hotspots are opened, and great troubles and even economic losses are brought to the user; meanwhile, after the WIFI setting is opened, the device needing to use the hotspot cannot rapidly identify the hotspot network needing to be accessed due to the complex surrounding network environment. In the prior art, when a WiFi switch is turned on an intelligent device, all networks in the range of the networks can be scanned, so that the problems of increase of power consumption of the intelligent device and overlarge occupation of reading and writing resources of the intelligent device are caused; when the intelligent equipment needs to use equipment providing a hot spot, the traditional mode is that the intelligent equipment can identify all equipment opening the WiFi function, namely all equipment with the WiFi function can be identified by the intelligent equipment, and scanning access or network tools or passwords transmitted through the mouth can be carried out through a WIFI protocol to crack the hot spot, so that network services of all equipment with the WiFi function can be used at will.
Disclosure of Invention
An object of the present application is to provide a wireless connection method and apparatus, which can conveniently and quickly improve privacy and security of a wireless access network.
According to an aspect of the present application, there is provided a wireless connection method applied to a master device, wherein the method includes:
setting a visible white list, wherein the visible white list comprises equipment identification of at least one visible equipment;
responding to the operation of opening the wireless connection, generating and displaying an image code, so that the slave device sends the device identification of the slave device to the master device in response to scanning the image code;
receiving the device identification of the slave device sent by the slave device;
determining whether the slave device is present in the visible whitelist based on a device identification of the slave device,
if yes, sending a visible instruction for indicating that the slave device can see the wireless access point provided by the master device to the slave device, so that the slave device can establish wireless connection with the visible wireless access point.
Further, in the above method, the method further includes:
the master device is provided with a first application program correspondingly matched with the slave device;
wherein, the responding to the operation of opening the wireless connection, generating and displaying an image code, comprises:
and through the first application program, opening the wireless connection of the main equipment, responding to the operation of opening the wireless connection, generating and displaying the image code.
Further, in the above method, the sending, to the slave device, a visible instruction indicating a wireless access point provided for the slave device to see the master device, so as to enable the slave device to establish a wireless connection with the visible wireless access point, includes:
sending, to the slave device, a visible instruction indicating that the master device provided wireless access point and access information thereof are visible to the slave device, so as to cause the slave device to establish a wireless connection with the wireless access point that is visible based on the access information.
Further, in the above method, the method further includes:
if not, sending a hiding continuous instruction for instructing to continuously hide the wireless access point provided by the master device to the slave device so as to make the wireless access point invisible to the slave device.
Further, in the above method, the method further includes:
and if not, responding to the operation of adding a white list to the slave equipment by the user corresponding to the master equipment, and adding the equipment identifier of the slave equipment to the visible white list.
According to another aspect of the present application, there is also provided a wireless connection method applied to a slave device, wherein the method includes:
in response to a scanning operation performed on an image code generated by a master device providing wireless connection, sending a device identification of the slave device to the master device to enable the master device to judge whether the slave device exists in a visible white list in the master device or not based on the device identification of the slave device, wherein the visible white list comprises device identifications of at least one visible device;
receiving a visible instruction returned by the master device and used for indicating that the slave device can be seen the wireless access point provided by the master device;
visually presenting, in response to the visual instruction, a wireless access point provided by the master device to cause the slave device to establish a wireless connection with the wireless access point.
Further, in the above method, the method further includes:
the slave equipment is provided with a second application program correspondingly matched with the master equipment;
wherein the transmitting the device identification of the slave device to the master device in response to the scanning operation performed on the image code generated by the master device providing the wireless connection comprises:
and scanning an image code generated by a master device providing wireless connection through the second application program and sending a device identification of the slave device to the master device in response to the scanning operation of the image code.
Further, in the above method, the receiving a visible instruction returned by the master device to indicate that the slave device is visible to a wireless access point provided by the master device, includes:
receiving a visible instruction returned by the master device and used for indicating that the slave device can be seen the wireless access point provided by the master device and the access information of the wireless access point;
wherein said visually presenting, in response to the visual instruction, the wireless access point provided by the master device to cause the slave device to establish a wireless connection with the wireless access point comprises:
and in response to the visible instruction, visually presenting the wireless access point provided by the master device and the access information thereof so as to enable the slave device to establish wireless connection with the wireless access point based on the access information.
According to another aspect of the present application, there is also provided a non-volatile storage medium having computer-readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the wireless connection method as described above.
According to another aspect of the present application, there is also provided a wirelessly connected master device, wherein the master device includes:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, the one or more computer-readable instructions cause the one or more processors to implement the wireless connection method at the master device side as described above.
According to another aspect of the present application, there is also provided a wirelessly connected slave device, wherein the slave device comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when the one or more computer readable instructions are executed by the one or more processors, the one or more processors realize the wireless connection method of the slave equipment end
Compared with the prior art, the method and the device have the advantages that the visible white list is arranged in the main device providing the wireless access point, and the visible white list comprises the device identification of at least one visible device; the method comprises the steps that a master device responds to an operation of opening wireless connection, generates and displays an image code, so that a slave device responds to scanning of the image code and sends a device identification of the slave device to the master device; after receiving the device identifier of the slave device, the master device determines whether the slave device exists in the visible white list based on the device identifier of the slave device, and if so, sends a visible instruction indicating that the slave device can see the wireless access point provided by the master device to the slave device, so that the slave device can visually present the wireless access point provided by the master device and establish wireless connection with the visible wireless access point, thereby avoiding the wireless access point provided by the master device from being discovered and identified by any other device, realizing the security protection of the wireless access point provided by the master device, and conveniently and quickly improving the privacy and security of the wireless access point provided by the master device and the wireless access network thereof.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a device interaction flow diagram of a wireless connection method in accordance with an aspect of the subject application;
fig. 2 is a schematic diagram illustrating a practical application scenario in a wireless connection method according to an aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
As shown in fig. 1, in one aspect of the present application, a device interaction flow diagram of a wireless connection method is provided, where the method includes a master device providing a wireless access point and a slave device needing to establish a wireless connection with the wireless access point provided by the master device to obtain a wireless connection network, where the master device includes, but is not limited to, a terminal device or a routing device that can raise the wireless access point, and the slave device includes, but is not limited to, a terminal device that needs to connect to the wireless access point to obtain the wireless connection network, and the terminal device includes, but is not limited to, a cell phone, an IPD, a personal computer, and other devices that need to obtain the wireless connection network. The method comprises a step S11, a step S12, a step S13, a step S14 and a step S15 executed by the master device and a step S21, a step S22 and a step S23 executed by the slave device, wherein the method specifically comprises the following steps:
step S11, the master device sets a visible white list, where the visible white list includes a device identifier of at least one visible device, so that each visible device in the visible white list can see a wireless access point provided by the master device after scanning an image code generated by the master device randomly or according to a preset image code generation rule.
Step S12, the master device responds to the operation of opening the wireless connection, generates and displays an image code, so that the slave device responds to the scanning of the image code and sends the device identification of the slave device to the master device; here, the master device may randomly generate an image code or generate an image code according to a preset image code generation rule in response to an operation of opening a wireless connection, so that the slave device scans when a wireless access point provided by the master device needs to be acquired. Here, the image code includes, but is not limited to, a bar code, a two-dimensional code, a multi-dimensional code, and the like, wherein the two-dimensional code and the multi-dimensional code may include characters, icons, and the like.
Step S21, the slave device sends the device identification of the slave device to the master device in response to the scanning operation of the image code generated by the master device providing wireless connection, so that the master device judges whether the slave device exists in a visible white list in the master device based on the device identification of the slave device, wherein the visible white list comprises the device identification of at least one visible device. The device identifier of the visible device and the device identifier of the slave device in the embodiment of the present application may include, but are not limited to, a device model, a Serial Number (SN), an International Mobile Equipment Identity (IMEI), and the like of the device, so as to uniquely identify the corresponding device.
Step S13, the master device receives the device identifier of the slave device sent by the slave device.
Step S14, the master device determines whether the slave device exists in the visible white list based on the device identifier of the slave device.
If the slave device is a visible device that indicates that the slave device belongs to the wireless access point provided by the master device for the master device, step S15 is executed, where in step S15, the master device sends a visible instruction to the slave device to indicate that the slave device is visible to the wireless access point provided by the master device, so that the slave device establishes a wireless connection with the visible wireless access point.
Step S22, the slave device receives a visible instruction returned by the master device to indicate that the slave device can see the wireless access point provided by the master device.
Step S23, the slave device visually presents the wireless access point provided by the master device in response to the visible instruction, so that the slave device establishes a wireless connection with the wireless access point.
Through the steps S11 to S15 and S21 to S23, the validity of the device identifier of the slave device sent by the slave device is judged by providing the visible white list set in the master device of the wireless access point, and after the slave device exists in the visible white list, the wireless access point provided by the master device is visible to the slave device, so that the slave device can visually present the wireless access point provided by the master device, and establish wireless connection with the visible wireless access point, thereby not only preventing the wireless access point provided by the master device from being discovered and identified by any other device, but also realizing the security protection of the wireless access point provided by the master device, and thus conveniently and quickly improving the privacy and security of the wireless access point provided by the master device and the wireless access network thereof.
Following the foregoing embodiments of the present application, an aspect of the present application provides a wireless connection method further including:
the master device is provided with a first application program correspondingly matched with the slave device, and the slave device is provided with a second application program correspondingly matched with the master device; the first application program and the second application program may be the same application program, or may be different application programs that are matched with each other. When the master device generates and displays an image code in response to an operation of opening a wireless connection, the method specifically includes: by the first application program, opening the wireless connection of the master device, responding to the operation of opening the wireless connection, randomly generating or generating and displaying an image code according to a preset image code generation rule, so that when the slave device responds to the scanning operation performed on the image code generated by the master device providing the wireless connection and sends the device identifier of the slave device to the master device, the image code generated by the master device providing the wireless connection can be scanned by the second application program correspondingly matched with the first application program installed by the master device, and the device identifier of the slave device is sent to the master device in response to the scanning operation performed on the image code, so that the wireless connection is opened by the first application program installed by the master device and the image code is generated and the image code displayed by the master device is scanned by the second application program installed by the slave device, the method and the device realize that the device identification of the slave device needing to acquire the wireless connection network is sent to the master device, so that the master device can judge whether the slave device is visible or not based on the device identification of the slave device.
Next, in order to facilitate that the slave device can establish a wireless connection with the wireless access point provided by the master device as soon as possible, in the foregoing embodiment of the present application, when the master device executes the step S15 to send, to the slave device, a visible instruction indicating that the slave device can see the wireless access point provided by the master device, so that the slave device establishes a wireless connection with the visible wireless access point, the method specifically includes: the master device sends a visible instruction to the slave device, wherein the visible instruction is used for indicating that the slave device can see the wireless access point and the access information thereof provided by the master device, namely the visible instruction carries the wireless access point and the access information thereof, so that the slave device establishes wireless connection with the visible wireless access point based on the access information. Further, on the slave device side, when the slave device performs step S22 to receive a visible instruction returned by the master device and used for indicating that the slave device is visible a wireless access point provided by the master device, the method specifically includes: the slave device receives a visible instruction returned by the master device and used for indicating that the slave device can be seen the wireless access point provided by the master device and the access information of the wireless access point; when the slave device performs the step S23 and responds to the visible instruction, visually presents the wireless access point provided by the master device, so that the slave device establishes a wireless connection with the wireless access point, and responds to the visible instruction, visually presents the wireless access point provided by the master device and the access information thereof, so that the slave device can establish a wireless connection with the wireless access point based on the access information, so that the visible instruction sent to the slave device by the master device is realized, the wireless access point provided by the master device can be seen, and the access information of the wireless access point can also be seen, so that the slave device can establish a wireless connection with the wireless access point based on the access information as soon as possible. Of course, in the process of establishing a wireless connection between the slave device and the wireless access point based on the access information, the slave device may input visible access information to the slave device by a user corresponding to the slave device to achieve the purpose of establishing a wireless connection with the wireless access point, or the slave device may automatically recognize the visible access information and automatically establish a wireless connection with the wireless access point based on the access information to achieve the purpose of automatically establishing a wireless connection between the slave device and the visible wireless access point.
Following the foregoing embodiments of the present application, an aspect of the present application provides a wireless connection method further including:
if not, the master device sends a hiding continuous instruction for indicating to continuously hide the wireless access point provided by the master device to the slave device, so that the slave device cannot see the wireless access point.
For example, in step S14, after the master device determines whether the slave device exists in the visible white list based on the device identifier of the slave device, if the device identifier of the slave device is not in the visible white list of the master device, which indicates that the slave device is an illegal device with respect to the master device, the master device sends a hiding continuation instruction to the slave device, which indicates to continue hiding the wireless access point provided by the master device from the slave device, so that the slave device continues to make the wireless access point invisible, and the wireless access point is hidden, i.e., invisible, from an illegal slave device that wants to acquire the wireless access point provided by the master device, which not only can protect the wireless access point provided by the master device from being exposed to the illegal device, but also can protect the security of the wireless access point provided by the master device.
Following the foregoing embodiments of the present application, an aspect of the present application provides a wireless connection method further including:
and if not, responding to the operation of adding a white list to the slave equipment by the user corresponding to the master equipment, and adding the equipment identifier of the slave equipment to the visible white list.
For example, in step S14, after the master device determines whether the slave device exists in the visible white list based on the device identifier of the slave device, if the device identifier of the slave device is not in the visible white list of the master device, it indicates that the slave device is an illegal device with respect to the master device, but if the slave device is a family or friend of the user corresponding to the master device, or a new legal device that is desired to be added, the user corresponding to the master device performs a new white list adding operation on the slave device, for example, performs an adding operation on the master device, or performs an input operation such as manual operation or voice operation, and adds the device identifier of the slave device to the visible white list, thereby adding the newly added visible device in the visible white list, and achieving the purpose of updating the visible white list.
As shown in fig. 2, in an actual application scenario of a wireless connection method provided in a preferred embodiment of the present application, a master device providing a wireless access point and a slave device needing to access the wireless access point to acquire a wireless connection network both need to install a corresponding application, for example, an Application Package (APK) of the application; when the main device opens a hotspot (here, the wireless access point provided by the main device is preferably the hotspot), randomly generating and displaying a two-dimensional code (here, the image code generated by the main device is preferably the two-dimensional code); when the APK is opened by the slave equipment, recording the equipment identification of the equipment, such as the equipment model, the SN number, the IMEI number and other information, so as to uniquely identify the slave equipment; the slave device scans the two-dimensional code generated by the master device through the APK and sends the device identification of the slave device to the master device for wireless connection permission verification access; the method comprises the steps that a master device judges whether a device identifier of a slave device provided by the slave device exists in a visible white list preset by the master device through an APK (advanced peripheral K), if the master device identifies that the slave device belongs to legal devices in the visible white list, a wireless access point is visible to the legal slave device, the slave device can see the wireless access point and establish wireless connection with the visible wireless access point through a mode of automatically identifying access information or inputting access information to acquire a wireless connection network provided by the wireless access point, and the privacy and the safety of the wireless access point provided by the master device and the wireless access network thereof are conveniently and quickly improved
Through the embodiment of the application, as applications for cracking the wireless access points are more and more in the market, slave devices of users, such as intelligent devices, are often exposed to the risk of being stolen after the personal wireless access points are opened; meanwhile, after the WIFI setting is opened, the slave device which needs to use the wireless connection network cannot rapidly identify the network of the wireless access point which needs to be accessed due to the complex surrounding network environment; based on the above phenomena, a wireless connection method provided in one aspect of the present application may be used to improve security and privacy of a hotspot network conveniently and quickly, for example, when a master device opens a hotspot, a two-dimensional code is randomly generated, corresponding APKs need to be installed on both the master device and a slave device, after the slave device scans the two-dimensional code generated by the master device through the APK, a device identifier (such as a device model, an SN number, an IMEI number, and the like) of the slave device is transmitted to the master device through the APK, and after the master device determines that the slave device is a device in a visible white list, a wireless access point provided by the master device is visible to the slave device, so that the slave device can identify a wireless access point opened by the master device after opening a WIFI switch and input a password for access.
According to another aspect of the present application, there is also provided a non-volatile storage medium having computer-readable instructions stored thereon, which, when executed by a processor, cause the processor to implement the wireless connection method as described above.
According to another aspect of the present application, there is also provided a wirelessly connected master device, wherein the master device includes:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the wireless connectivity methods described above.
Here, the details of each embodiment in the main device for wireless connection may specifically refer to the corresponding part of the embodiment of the wireless connection method at the main device side, and are not described herein again.
According to another aspect of the present application, there is also provided a wirelessly connected slave device, wherein the slave device comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the wireless connectivity methods described above.
Here, for details of each embodiment of the slave device for wireless connection, reference may be specifically made to corresponding portions of the embodiments of the wireless connection method of the slave device side, and details are not described herein again.
In summary, the present application sets a visible white list in a master device providing a wireless access point, where the visible white list includes a device identifier of at least one visible device; the method comprises the steps that a master device responds to an operation of opening wireless connection, generates and displays an image code, so that a slave device responds to scanning of the image code and sends a device identification of the slave device to the master device; after receiving the device identifier of the slave device, the master device determines whether the slave device exists in the visible white list based on the device identifier of the slave device, and if so, sends a visible instruction indicating that the slave device can see the wireless access point provided by the master device to the slave device, so that the slave device can visually present the wireless access point provided by the master device and establish wireless connection with the visible wireless access point, thereby avoiding the wireless access point provided by the master device from being discovered and identified by any other device, realizing the security protection of the wireless access point provided by the master device, and conveniently and quickly improving the privacy and security of the wireless access point provided by the master device and the wireless access network thereof.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (11)

1. A wireless connection method is applied to a main device side, wherein the method comprises the following steps:
setting a visible white list, wherein the visible white list comprises equipment identification of at least one visible equipment;
responding to the operation of opening the wireless connection, generating and displaying an image code, so that the slave device sends the device identification of the slave device to the master device in response to scanning the image code;
receiving the device identification of the slave device sent by the slave device;
determining whether the slave device is present in the visible whitelist based on a device identification of the slave device,
if yes, sending a visible instruction for indicating that the slave device can see the wireless access point provided by the master device to the slave device, so that the slave device can establish wireless connection with the visible wireless access point.
2. The method of claim 1, wherein the method further comprises:
the master device is provided with a first application program correspondingly matched with the slave device;
wherein, the responding to the operation of opening the wireless connection, generating and displaying an image code, comprises:
and through the first application program, opening the wireless connection of the main equipment, responding to the operation of opening the wireless connection, generating and displaying the image code.
3. The method of claim 1, wherein the sending, to the slave device, a visible instruction indicating a wireless access point provided to the slave device visible to the master device to cause the slave device to establish a wireless connection with the wireless access point visible comprises:
sending, to the slave device, a visible instruction indicating that the master device provided wireless access point and access information thereof are visible to the slave device, so as to cause the slave device to establish a wireless connection with the wireless access point that is visible based on the access information.
4. The method of claim 1, wherein the method further comprises:
if not, sending a hiding continuous instruction for instructing to continuously hide the wireless access point provided by the master device to the slave device so as to make the wireless access point invisible to the slave device.
5. The method of claim 1, wherein the method further comprises:
and if not, responding to the operation of adding a white list to the slave equipment by the user corresponding to the master equipment, and adding the equipment identifier of the slave equipment to the visible white list.
6. A wireless connection method is applied to a slave device, wherein the method comprises the following steps:
in response to a scanning operation performed on an image code generated by a master device providing wireless connection, sending a device identification of the slave device to the master device to enable the master device to judge whether the slave device exists in a visible white list in the master device or not based on the device identification of the slave device, wherein the visible white list comprises device identifications of at least one visible device;
receiving a visible instruction returned by the master device and used for indicating that the slave device can be seen the wireless access point provided by the master device;
visually presenting, in response to the visual instruction, a wireless access point provided by the master device to cause the slave device to establish a wireless connection with the wireless access point.
7. The method of claim 6, wherein the method further comprises:
the slave equipment is provided with a second application program correspondingly matched with the master equipment;
wherein the transmitting the device identification of the slave device to the master device in response to the scanning operation performed on the image code generated by the master device providing the wireless connection comprises:
and scanning an image code generated by a master device providing wireless connection through the second application program and sending a device identification of the slave device to the master device in response to the scanning operation of the image code.
8. The method of claim 6, wherein the receiving visible instructions returned by the master device to indicate a wireless access point provided to the slave device to view the master device comprises:
receiving a visible instruction returned by the master device and used for indicating that the slave device can be seen the wireless access point provided by the master device and the access information of the wireless access point;
wherein said visually presenting, in response to the visual instruction, the wireless access point provided by the master device to cause the slave device to establish a wireless connection with the wireless access point comprises:
and in response to the visible instruction, visually presenting the wireless access point provided by the master device and the access information thereof so as to enable the slave device to establish wireless connection with the wireless access point based on the access information.
9. A non-transitory storage medium having stored thereon computer readable instructions which, when executed by a processor, cause the processor to implement the method of any one of claims 1 to 8.
10. A wirelessly connected master device, wherein the master device comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-5.
11. A wirelessly connected slave device, wherein the slave device comprises:
one or more processors;
a computer-readable medium for storing one or more computer-readable instructions,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 6-8.
CN202110633150.6A 2021-06-07 2021-06-07 Wireless connection method and device Pending CN113438712A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110633150.6A CN113438712A (en) 2021-06-07 2021-06-07 Wireless connection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110633150.6A CN113438712A (en) 2021-06-07 2021-06-07 Wireless connection method and device

Publications (1)

Publication Number Publication Date
CN113438712A true CN113438712A (en) 2021-09-24

Family

ID=77803863

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110633150.6A Pending CN113438712A (en) 2021-06-07 2021-06-07 Wireless connection method and device

Country Status (1)

Country Link
CN (1) CN113438712A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115499199A (en) * 2022-09-14 2022-12-20 重庆长安汽车股份有限公司 Vehicle safety communication method and device, vehicle and storage medium
CN118101335A (en) * 2024-04-22 2024-05-28 国网江西省电力有限公司信息通信分公司 Zero-trust-edge-cloud cooperative security management and control system and method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130250324A1 (en) * 2012-03-21 2013-09-26 Xerox Corporation Method of wireless fidelity secure authentication
CN104378758A (en) * 2014-05-12 2015-02-25 腾讯科技(深圳)有限公司 Access point connecting method, terminal and server
CN104581997A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Mobile WIFI (wireless fidelity) hotspot connecting method and mobile equipment
CN105357740A (en) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 Wireless network access method and wireless access node
CN107734503A (en) * 2017-09-28 2018-02-23 苏州亿科赛卓电子科技有限公司 A kind of WLAN hot spot communication means and mobile terminal based on white list
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN108124297A (en) * 2015-08-05 2018-06-05 上海连尚网络科技有限公司 For providing the method and apparatus of the access-in point information of wireless access point
CN108924833A (en) * 2018-06-29 2018-11-30 连尚(新昌)网络科技有限公司 A kind of method and apparatus for authorized user device connection wireless access point
CN109005571A (en) * 2017-06-07 2018-12-14 中移(杭州)信息技术有限公司 A kind of method, apparatus and system for establishing WiFi connection
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device
CN111954218A (en) * 2019-05-17 2020-11-17 中兴通讯股份有限公司 WIFI hotspot sharing method and device
CN112600820A (en) * 2020-12-09 2021-04-02 腾讯科技(深圳)有限公司 Network connection method, device, computer equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130250324A1 (en) * 2012-03-21 2013-09-26 Xerox Corporation Method of wireless fidelity secure authentication
CN104378758A (en) * 2014-05-12 2015-02-25 腾讯科技(深圳)有限公司 Access point connecting method, terminal and server
CN104581997A (en) * 2014-12-29 2015-04-29 广东欧珀移动通信有限公司 Mobile WIFI (wireless fidelity) hotspot connecting method and mobile equipment
CN108124297A (en) * 2015-08-05 2018-06-05 上海连尚网络科技有限公司 For providing the method and apparatus of the access-in point information of wireless access point
CN105357740A (en) * 2015-09-23 2016-02-24 惠州Tcl移动通信有限公司 Wireless network access method and wireless access node
CN109005571A (en) * 2017-06-07 2018-12-14 中移(杭州)信息技术有限公司 A kind of method, apparatus and system for establishing WiFi connection
CN107734503A (en) * 2017-09-28 2018-02-23 苏州亿科赛卓电子科技有限公司 A kind of WLAN hot spot communication means and mobile terminal based on white list
CN107992768A (en) * 2017-11-29 2018-05-04 努比亚技术有限公司 A kind of method of information protection, terminal device and storage medium
CN108924833A (en) * 2018-06-29 2018-11-30 连尚(新昌)网络科技有限公司 A kind of method and apparatus for authorized user device connection wireless access point
CN109862605A (en) * 2019-01-22 2019-06-07 上海连尚网络科技有限公司 A kind of networking methods and equipment for terminal device
CN111954218A (en) * 2019-05-17 2020-11-17 中兴通讯股份有限公司 WIFI hotspot sharing method and device
CN112600820A (en) * 2020-12-09 2021-04-02 腾讯科技(深圳)有限公司 Network connection method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
马海峰, 四川科学技术出版社, pages: 173 - 175 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115499199A (en) * 2022-09-14 2022-12-20 重庆长安汽车股份有限公司 Vehicle safety communication method and device, vehicle and storage medium
CN118101335A (en) * 2024-04-22 2024-05-28 国网江西省电力有限公司信息通信分公司 Zero-trust-edge-cloud cooperative security management and control system and method

Similar Documents

Publication Publication Date Title
US20200177599A1 (en) Network connection method, hotspot terminal and management terminal
US8832796B2 (en) Wireless communication terminal, method for protecting data in wireless communication terminal, program for having wireless communication terminal protect data, and recording medium storing the program
CN104717223B (en) Data access method and device
WO2015070732A1 (en) Access control system, authorization method and device thereof, and storage medium
WO2018000834A1 (en) Wifi hotspot information modification method and device
US20180242239A1 (en) System and method of locating wireless connection among a plurality of wireless connections
US20210136577A1 (en) Method and a device for wireless connection
WO2016000589A1 (en) Method, system and apparatus for automatically connecting to wlan
US10263999B2 (en) System for securely accessing network address, and device and method therein
CN109831441B (en) Identity authentication method, system and related components
WO2020216231A1 (en) Method of sharing wireless access point by means of instant messaging software
KR100819678B1 (en) Authentification Method of Public Wireless LAN Service using CDMA authentification information
CN113438712A (en) Wireless connection method and device
JP2018533864A (en) Remote control method, device and portable terminal
CN113542201B (en) Access control method and equipment for Internet service
US20150067772A1 (en) Apparatus, method and computer-readable storage medium for providing notification of login from new device
CN105025484B (en) Access the method and device of Wi-Fi Hotspot
CN107483503A (en) A kind of application program login method, apparatus and system
JP7404907B2 (en) Systems and methods, computer-implemented methods, programs, and systems for location-aware two-factor authentication
CN107770835B (en) Method, equipment and computer storage medium for connecting wireless access point
KR20210011577A (en) Apparatus and Method for Personal authentication using Sim Toolkit and Applet
CN108377500A (en) A kind of wifi network connection method, device and equipment
US9143510B2 (en) Secure identification of intranet network
CN115906196A (en) Mobile storage method, device, equipment and storage medium
CN105871793A (en) Resource sharing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination