[go: up one dir, main page]

CN107872791B - Access point connection method and device - Google Patents

Access point connection method and device Download PDF

Info

Publication number
CN107872791B
CN107872791B CN201610842670.7A CN201610842670A CN107872791B CN 107872791 B CN107872791 B CN 107872791B CN 201610842670 A CN201610842670 A CN 201610842670A CN 107872791 B CN107872791 B CN 107872791B
Authority
CN
China
Prior art keywords
access point
identification information
connection
historical
pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610842670.7A
Other languages
Chinese (zh)
Other versions
CN107872791A (en
Inventor
刘杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201610842670.7A priority Critical patent/CN107872791B/en
Publication of CN107872791A publication Critical patent/CN107872791A/en
Application granted granted Critical
Publication of CN107872791B publication Critical patent/CN107872791B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses an access point connection method and device, and belongs to the technical field of wireless networks. The method comprises the following steps: after determining that the current access point to be connected is a historical access point, judging whether privacy setting is needed when the access point is connected; if privacy setting is needed when the access point is connected, generating appointed pseudo identification information which is inconsistent with each identification information in the historical identification information for the terminal; generating a connection request according to the appointed pseudo identification information and the connection password of the access point; and sending the connection request to the access point to complete the connection establishment process. According to the invention, after the access point to be connected is determined to be the historical access point, if the privacy setting is determined to be needed currently, the terminal automatically generates the pseudo identification information which is never used when the access point is connected, so that after the terminal initiates a connection request, the access point cannot associate the pseudo identification information with the historical record, and the privacy disclosure of a user is avoided.

Description

Access point connection method and device
Technical Field
The present invention relates to the field of wireless network technologies, and in particular, to a method and an apparatus for connecting an access point.
Background
The rapid development of wireless network technology provides great convenience for people to surf the internet anytime and anywhere. After the terminal is connected to the access point, the user can conveniently perform operations such as web page access, video watching and the like through the terminal.
In the prior art, when a terminal initially connects to an access point, a Media Access Control (MAC) address and a connection password of the access point are recorded. Therefore, when the access point is connected next time, the terminal can automatically initiate a connection request to the access point according to the stored connection password and the MAC address of the terminal. Similarly, the access point will also record the MAC address of the terminal, and when the terminal tries to connect again next time, the access point can know whether the terminal has been connected according to the stored history.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
when the terminal initiates a connection request, the terminal needs to report the MAC address of the terminal once, and when the terminal is not connected for the first time, the access point can know whether the user is in the current location before according to the history, and particularly the privacy of the user can be seriously revealed for the access point in a public place, so that the security of the connection mode is poor.
Disclosure of Invention
In order to solve the problems in the prior art, embodiments of the present invention provide an access point connection method and apparatus. The technical scheme is as follows:
in one aspect, a method for connecting an access point is provided, and the method includes:
after determining that the current access point to be connected is a history access point, judging whether privacy setting is needed or not when the current access point is connected, wherein the history access point refers to the connected access point;
if privacy setting is needed when the access point is connected, generating appointed pseudo identification information which is inconsistent with each identification information in the historical identification information for the terminal, wherein the historical identification information is identification information used when the historical access point is connected in a historical mode;
generating a connection request according to the appointed pseudo identification information and the connection password of the access point;
and sending the connection request to the access point to complete the connection establishment process.
In another aspect, an access point connection apparatus is provided, the apparatus including:
the device comprises a judging module and a judging module, wherein the judging module is used for judging whether privacy setting is needed when the access point is connected or not after the access point to be connected is determined to be a historical access point, and the historical access point refers to the connected access point;
a generating module, configured to generate, for a terminal, designated pseudo identifier information that is inconsistent with each identifier information in history identifier information if privacy setting is required when the access point is connected, where the history identifier information is identifier information used when the history access point is connected historically;
the generating module is further configured to generate a connection request according to the specified pseudo identification information and the connection password of the access point;
a sending module, configured to send the connection request to the access point to complete a connection establishment procedure.
The technical scheme provided by the embodiment of the invention has the following beneficial effects:
after determining that the current access point to be connected is a history access point which is connected before, the terminal can automatically judge whether privacy setting is needed or not when the access point is connected, if so, the terminal automatically generates pseudo identification information which is never used before the access point is connected, and therefore after the terminal initiates a connection request, the access point cannot associate the pseudo identification information included in the connection request with the history record, the same access point is connected through different identification information, the privacy of a user is prevented from being disclosed, for example, the access point cannot know whether the user comes to the current place before, and the connection mode is high in safety.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic architecture diagram of an access point connection system according to an embodiment of the present invention;
fig. 2A is a flowchart of an access point connection method according to an embodiment of the present invention;
FIG. 2B is a diagram of a setup page according to an embodiment of the present invention;
fig. 2C is a flowchart of an access point connection method according to an embodiment of the present invention;
fig. 2D is a flowchart of an access point connection method according to an embodiment of the present invention;
fig. 3 is a flowchart of an access point connection method according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an access point connection apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail with reference to the accompanying drawings.
Fig. 1 is a schematic architecture diagram of an access point connection system according to an embodiment of the present invention. The access point connection system may be embodied as a connection program installed on the terminal. Taking the identification information of the terminal as the MAC address as an example, the access point connection system may include the following functional units: a user setting unit 101, a MAC address generating unit 102, a MAC address storing unit 103, and a Wifi connecting unit 104.
The user can set which access point of the connected history access points is to be subjected to privacy setting and set a corresponding privacy policy by himself/herself through the user setting unit 101. If a new pseudo MAC address is needed to protect the privacy of the user, the MAC address generation unit 102 generates a new MAC address for the terminal itself. A MAC address storage unit 103, configured to record all history access points to which the terminal has connected and MAC addresses used by the terminal when connecting the history access points. In the embodiment of the present invention, the MAC addresses used by the terminal when these history access points are historically connected are referred to as history identification information.
The Wifi connection unit 104 is configured to, when a user needs to connect to a certain access point, first determine, by the user setting unit 101, whether privacy setting is needed when the user connects to the access point; if the privacy setting is not needed, the connection is directly carried out according to the MAC address of the terminal and the connection password of the access point; if privacy setting is needed, a new pseudo MAC address needs to be acquired from the MAC address generating unit 102, and then the MAC address storage unit 103 determines whether the pseudo MAC address is used when the terminal is previously connected to the access point; if the pseudo MAC address is used, the MAC address generating unit 102 needs to generate a pseudo MAC address again; if not, the terminal generates a connection request according to the pseudo MAC address and the connection password, and initiates the connection request to the access point to complete the connection establishment process.
Fig. 2A is a flowchart of an access point connection method according to an embodiment of the present invention. The interactive main bodies are terminals and access points. Referring to fig. 2A, a method flow provided by the embodiment of the present invention includes:
201. the terminal judges whether the current access point to be connected is a historical access point; if the access point to be connected is a history access point, executing the following step 202; if the access point to be connected currently is not the historical access point, the following step 210 is executed.
Wherein the history access point refers to an access point to which the terminal has been connected. In the embodiment of the invention, each time the terminal is connected with the wireless network, the MAC address of the corresponding access point and the MAC address used by the terminal when the terminal is connected with the access point are recorded. For example, the terminal stores a table of correspondence between the MAC addresses of the access points and the MAC addresses used by the terminal, as described in table 1 below.
TABLE 1
MAC address used by terminal MAC address of access point
MAC Address 1 MAC Address _ a
MAC Address 2 MAC Address _ b
…… ……
MAC address N MAC Address _ n
Thus, after detecting that the user tries to connect to an access point, the terminal can determine whether the current access point to be connected is a history access point by inquiring the table 1 according to the MAC address of the access point. If the MAC address of the access point appears in table 1 above, this indicates that the access point is a historical access point.
202. After determining that the current access point to be connected is a historical access point, the terminal judges whether privacy setting is needed when the access point is connected; if the privacy setting is needed when the access point is connected, executing the following step 203; if no privacy settings are required while connecting to the access point, step 208, described below, is performed.
In the embodiment of the invention, in order to protect the privacy of users when connecting to the wireless network, privacy setting is carried out on different types of access points. That is, the terminal may generate a pseudo MAC address by itself in addition to its original MAC address when necessary. Different MAC addresses are used for the same access point to connect, so that the access point cannot associate the access point with the stored history records (the MAC addresses of all connected terminals), and the privacy of users is protected. The access point to be privacy-set is usually an access point set in a public place, because the security risk of such an access point is usually the greatest. Privacy settings may not be made for access points located in private locations such as homes or businesses. Of course, the user can select which historical access point to set privacy according to the actual requirements of the user.
When privacy setting is performed on each history access point connected by the terminal, the following method can be adopted: the terminal displays a setup page as shown in fig. 2B, which includes the MAC addresses of the respective connected history access points and privacy setting options. It should be noted that each history access point corresponds to one privacy setting option. The MAC address and privacy setting options of a history access point can be used as an information entry on a setting page, similar to a contact information entry in an address list. For a history access point, after the terminal detects the triggering operation of the user on the privacy setting option of the history access point, a drop-down list of the privacy setting option can be displayed. The drop-down list may include sub-entries related to privacy policies, such as "do not perform privacy setting", and "perform privacy setting after N days of connection", "perform privacy setting after N times of connection", and the like. And after the clicking operation of the user on any sub-table entry in the pull-down list is detected, acquiring the set privacy policy and storing the corresponding relation between the identification information of the historical access point and the privacy policy. For each historical access point, the user can select the privacy policy in the manner described above.
After privacy setting is performed on the history access point, when a subsequent terminal wants to connect to a history access point, the following method can be adopted to judge whether privacy setting is required:
in the first case, after the corresponding relationship between the identification information of the historical access point and the privacy policy is queried, if the corresponding 'privacy setting is not performed' of the current access point to be connected is obtained, it is directly determined that the privacy setting is not required when the access point is connected.
In the second situation, after the corresponding relation between the identification information of the historical access point and the privacy policy is inquired, if the privacy policy that the access point to be connected at present corresponds to and is similar to the privacy policy of 'setting privacy after connecting for N times' is obtained, the terminal counts the first connection times of connection with the access point before the connection, and obtains the second connection times set in the privacy policy; and if the first connection times are larger than the second connection times, determining that privacy setting is needed when the access point is connected. For example, if the privacy policy is set to be greater than 5 times of connection, if the terminal has established 6 times of connection with the access point before the current connection, the privacy setting is required when the terminal connects to the access point this time.
In the third situation, after the corresponding relation between the identification information of the historical access point and the privacy policy is inquired, if the privacy policy that the access point to be connected at present corresponds to and is similar to the privacy policy of 'setting privacy after connecting for N days' is obtained, the terminal counts the first time length between the current connection time and the last connection time, and obtains the second time length set in the privacy policy; and if the first duration is longer than the second duration, determining that privacy setting is needed when the access point is connected. Taking the privacy policy as an example, if the privacy setting is performed after the last connection is more than 5 days, if the current connection of the terminal is already 6 days from the last connection, the privacy setting is required when the current connection is performed with the access point.
203. And if privacy setting is needed when the access point is connected, the terminal generates a first pseudo MAC address.
In the embodiment of the disclosure, if privacy setting is required when connecting to the access point, the terminal needs to regenerate a new MAC address. The new MAC address is a pseudo MAC address distinguished from the factory MAC address of the terminal. That is, in the case where privacy setting is required, a terminal generates a pseudo MAC address different from that used in the past when connecting to the access point every time the terminal connects to the access point, except for initial connection.
204. The terminal judges whether the first pseudo MAC address is inconsistent with each MAC address of the historical MAC addresses; if the first pseudo MAC address is not consistent with each MAC address, the following step 205 is executed; if the first pseudo MAC address matches one of the historical MAC addresses, step 207 is performed.
Note that, the historical MAC address herein refers to a MAC address used when the terminal once connects to the access point. Since the pseudo MAC address is randomly generated by the terminal, a situation of repeated generation may occur, and in order to determine whether the currently generated first pseudo MAC address is used by the terminal before, the first pseudo MAC address needs to be compared with each MAC address in the historical MAC addresses one by one. Wherein the historical MAC address can be obtained from table 1.
205. And if the first pseudo MAC address is not consistent with each MAC address, the terminal generates a first connection request according to the first pseudo MAC address and the connection password of the access point and sends the first connection request to the access point.
If the first pseudo MAC address is inconsistent with each MAC address, the terminal is proved not to use the first pseudo MAC address before the terminal is connected with the access point, and the first connection request can be sent to the access point after the first connection request is generated according to the first pseudo MAC address and the connection password of the access point.
It should be noted that the terminal also stores the correspondence between the MAC address of the access point and the first pseudo MAC address in the form described in table 1. That is, the correspondence between the MAC address of the access point and the first pseudo MAC address is updated to table 1.
206. After receiving the first connection request, the access point judges whether a connection password included in the first connection request is matched with a preset password; if the connection is matched with the first pseudo MAC address, the first pseudo MAC address is stored, and the connection success information is sent to the terminal to complete the connection establishment process.
In the embodiment of the present invention, the preset password refers to a connection password set for the wireless network by the owner of the access point. And after determining that the connection password sent by the terminal is matched with the preset password, the access point sends connection success information to the terminal to complete the connection establishment process. The access point also stores the first pseudo MAC address for recording to devices connected to the wireless network.
For the access point connection cases shown in the above steps 201 to 206, the first pseudo MAC address refers to the specified pseudo identification information mentioned in the claims. That is, after the terminal generates the pseudo identification information for the first time, the pseudo identification information is inconsistent with each identification information in the history identification information, so that the pseudo identification information is determined as the specified pseudo identification information used when the access point initiates the connection request. For this case, the designation pseudo identification information is referred to as a first pseudo MAC address.
Referring to fig. 2C, if the terminal determines in step 204 that the first pseudo MAC address coincides with one of the historical MAC addresses, the terminal skips steps 205 and 206 and performs steps 207 to 209.
207. And after the first pseudo MAC address is determined to be consistent with one MAC address in the historical MAC addresses, the terminal regenerates the pseudo MAC address until a second pseudo MAC address which is inconsistent with each MAC address in the historical MAC addresses is obtained.
208. And the terminal generates a second connection request according to the second pseudo MAC address and the connection password of the access point and sends the second connection request to the access point.
209. After receiving the second connection request, the access point judges whether a connection password included in the second connection request is matched with a preset password; and if the connection is matched with the first pseudo MAC address, the second pseudo MAC address is stored, and the connection success information is sent to the terminal to complete the connection establishment process.
For the access point connection cases shown in the above steps 201 to 204 and 207 to 209, the second pseudo MAC address refers to the specified pseudo identification information mentioned in the claims. That is, after the terminal generates the pseudo identifier information for the first time, the pseudo identifier information is consistent with one identifier information in the history identifier information, so the terminal needs to generate a pseudo identifier information inconsistent with each identifier information in the history identifier information again, and determine the pseudo identifier information as the designated pseudo identifier information used when the connection request is initiated to the access point. For this case, the designation pseudo identification information is referred to with a second pseudo MAC address.
In any of the above cases, after obtaining the specified pseudo identification information, the first correspondence between the identification information of the access point and the specified pseudo identification information is maintained. And if the access point is connected again subsequently, judging whether the new pseudo identification information is the same as the appointed pseudo identification information generated this time or not based on the first corresponding relation when generating the new pseudo identification information.
Referring to fig. 2D, if the terminal determines that the access point to be currently connected is a non-history access point in step 201, the terminal skips steps 202 to 210 and directly performs steps 210 and 211 described below.
210. And if the access point to be connected is not the historical access point, the terminal generates a third connection request according to the MAC address of the terminal and the connection password of the access point, and the terminal sends the third connection request to the access point.
Wherein, the MAC address of the terminal refers to the MAC address set when the terminal leaves the factory.
211. After receiving the third connection request, the access point judges whether a connection password included in the third connection request is matched with a preset password; if the connection request is matched with the MAC address, the MAC address included in the third connection request is stored, connection success information is sent to the terminal, and the connection establishing process is completed.
According to the method provided by the embodiment of the invention, after the current access point to be connected is determined to be the history access point which is connected before, the terminal can automatically judge whether privacy setting is needed or not when the access point is connected, if so, the terminal automatically generates pseudo identification information which is never used before the access point is connected, so that after the terminal initiates a connection request, the access point cannot associate the pseudo identification information included in the connection request with the history record, the same access point is connected through different identification information, the privacy of a user is prevented from being leaked, for example, the access point cannot know whether the user comes to the current location before, and the connection mode is high in safety.
Fig. 3 is a flowchart of an access point connection method according to an embodiment of the present invention. Referring to fig. 3, a method flow provided by the embodiment of the present invention includes:
301. after determining that the current access point to be connected is a historical access point, judging whether privacy setting is needed when the access point is connected; if privacy settings are required when connecting to the access point, the following step 302 is performed.
Wherein historical access points refer to connected access points.
302. If privacy setting is needed when the access point is connected, generating appointed pseudo identification information which is inconsistent with each identification information in the historical identification information for the terminal, wherein the historical identification information is identification information used when the historical access point is connected in a historical mode.
303. And generating a connection request according to the specified pseudo identification information and the connection password of the access point.
304. The connection request is sent to the access point to complete the connection establishment procedure.
According to the method provided by the embodiment of the invention, after the current access point to be connected is determined to be the history access point which is connected before, the terminal can automatically judge whether privacy setting is needed or not when the access point is connected, if so, the terminal automatically generates pseudo identification information which is never used before the access point is connected, so that after the terminal initiates a connection request, the access point cannot associate the pseudo identification information included in the connection request with the history record, the same access point is connected through different identification information, the privacy of a user is prevented from being leaked, for example, the access point cannot know whether the user comes to the current location before, and the connection mode is high in safety.
Fig. 4 is a schematic structural diagram of an access point connection apparatus according to an embodiment of the present invention. Referring to fig. 4, the apparatus includes: a judging module 401, a generating module 402 and a sending module 403.
A determining module 401, configured to determine whether privacy setting is needed when an access point to be connected is connected after determining that the access point to be connected is a history access point, where the history access point refers to a connected access point;
a generating module 402, configured to generate, for a terminal, designated pseudo identifier information that is inconsistent with each identifier information in history identifier information if privacy setting is required when the access point is connected, where the history identifier information is identifier information used when the history access point is connected historically;
a generating module 402, configured to generate a connection request according to the specified pseudo identification information and the connection password of the access point;
a sending module 403, configured to send a connection request to the access point to complete a connection establishment procedure.
In another embodiment, the apparatus further comprises:
a first storing module, configured to store a first corresponding relationship between the identification information of the access point and the specified pseudo identification information.
In another embodiment, the generating module 402 is configured to generate a pseudo identification information for the terminal; judging whether the pseudo identification information is inconsistent with each identification information in the historical identification information or not; determining the pseudo identification information as the designated pseudo identification information after determining that the pseudo identification information is inconsistent with each identification information in the historical identification information; after determining that the pseudo identification information is consistent with one identification information in the historical identification information, regenerating pseudo identification information for the terminal again until the appointed pseudo identification information inconsistent with each identification information in the historical identification information is obtained;
a generating module 402, configured to generate a second connection request according to the second pseudo identification information and the connection password;
a sending module 403, configured to send the second connection request to the access point.
In another embodiment, the apparatus further comprises:
a display module 404, configured to display a setting page, where the setting page includes identification information of each historical access point and privacy setting options;
an obtaining module 405, configured to, for a history access point, obtain a set privacy policy after detecting a trigger operation on a privacy setting option of the history access point;
a second storing module 406, configured to store a second correspondence between the identification information of the historical access point and the privacy policy.
In another embodiment, the determining module 401 is configured to obtain a privacy policy matched with the access point from the stored second corresponding relationship; counting the first connection times of the connection established with the access point before the current connection; acquiring a second connection frequency set in the privacy policy; and if the first connection times are larger than the second connection times, determining that privacy setting is needed when the access point is connected.
In another embodiment, the determining module 401 is configured to obtain a privacy policy matched with the access point from the stored second corresponding relationship; counting a first time length between the current connection time and the last connection time; acquiring a second time length set in the privacy policy; and if the first duration is longer than the second duration, determining that privacy setting is needed when the access point is connected.
According to the device provided by the embodiment of the invention, after the current access point to be connected is determined to be the history access point which is connected before, the terminal can automatically judge whether privacy setting is needed or not when the access point is connected, if so, the terminal automatically generates the pseudo identification information which is never used before when the access point is connected, so that after the terminal initiates a connection request, the access point cannot associate the pseudo identification information included in the connection request with the history record, the same access point is connected through different identification information, the privacy of a user is prevented from being leaked, for example, the access point cannot know whether the user comes to the current location before, and the connection mode is high in safety.
It should be noted that: in the access point connection device provided in the above embodiment, when connecting an access point, only the division of the above functional modules is taken as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the embodiments of the access point connection device and the access point connection method provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the embodiments of the methods and are not described herein again.
Fig. 5 is a terminal according to an embodiment of the present invention, where the terminal may be configured to perform the access point connection method provided in the foregoing embodiment. Referring to fig. 5, the terminal 500 includes:
RF (Radio Frequency) circuitry 110, memory 120 including one or more computer-readable storage media, input unit 130, display unit 140, sensor 150, audio circuitry 160, WiFi (wireless fidelity) module 170, processor 180 including one or more processing cores, and power supply 190. Those skilled in the art will appreciate that the terminal structure shown in fig. 5 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 110 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, receives downlink information from a base station and then sends the received downlink information to the one or more processors 180 for processing; in addition, data relating to uplink is transmitted to the base station. In general, the RF circuitry 110 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuitry 110 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, SMS (short messaging Service), etc.
The memory 120 may be used to store software programs and modules, and the processor 180 executes various functional applications and data processing by operating the software programs and modules stored in the memory 120. The memory 120 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 500, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 120 may further include a memory controller to provide the processor 180 and the input unit 130 with access to the memory 120.
The input unit 130 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 130 may include a touch-sensitive surface 131 as well as other input devices 132. The touch-sensitive surface 131, also referred to as a touch display screen or a touch pad, may collect touch operations by a user on or near the touch-sensitive surface 131 (e.g., operations by a user on or near the touch-sensitive surface 131 using a finger, a stylus, or any other suitable object or attachment), and drive the corresponding connection device according to a predetermined program. Alternatively, the touch sensitive surface 131 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 180, and can receive and execute commands sent by the processor 180. Additionally, the touch-sensitive surface 131 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch-sensitive surface 131, the input unit 130 may also include other input devices 132. In particular, other input devices 132 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 140 may be used to display information input by or provided to a user and various graphical user interfaces of the terminal 500, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 140 may include a Display panel 141, and optionally, the Display panel 141 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 131 may cover the display panel 141, and when a touch operation is detected on or near the touch-sensitive surface 131, the touch operation is transmitted to the processor 180 to determine the type of the touch event, and then the processor 180 provides a corresponding visual output on the display panel 141 according to the type of the touch event. Although in FIG. 5, touch-sensitive surface 131 and display panel 141 are shown as two separate components to implement input and output functions, in some embodiments, touch-sensitive surface 131 may be integrated with display panel 141 to implement input and output functions.
The terminal 500 can also include at least one sensor 150, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 141 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 141 and/or a backlight when the terminal 500 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 500, detailed descriptions thereof are omitted.
Audio circuitry 160, speaker 161, and microphone 162 may provide an audio interface between a user and terminal 500. The audio circuit 160 may transmit the electrical signal converted from the received audio data to the speaker 161, and convert the electrical signal into a sound signal for output by the speaker 161; on the other hand, the microphone 162 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 160, and then outputs the audio data to the processor 180 for processing, and then to the RF circuit 110 to be transmitted to, for example, another terminal, or outputs the audio data to the memory 120 for further processing. The audio circuit 160 may also include an earbud jack to provide communication of peripheral headphones with the terminal 500.
WiFi belongs to a short-distance wireless transmission technology, and the terminal 500 can help a user send and receive e-mails, browse web pages, access streaming media, and the like through the WiFi module 170, and it provides wireless broadband internet access for the user.
The processor 180 is a control center of the terminal 500, connects various parts of the entire handset using various interfaces and lines, and performs various functions of the terminal 500 and processes data by operating or executing software programs and/or modules stored in the memory 120 and calling data stored in the memory 120, thereby performing overall monitoring of the handset. Optionally, processor 180 may include one or more processing cores; preferably, the processor 180 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 180.
The terminal 500 further includes a power supply 190 (e.g., a battery) for supplying power to the various components, which may preferably be logically connected to the processor 180 via a power management system, such that functions of managing charging, discharging, and power consumption are performed via the power management system. The power supply 190 may also include any component including one or more of a dc or ac power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
Although not shown, the terminal 500 may further include a camera, a bluetooth module, etc., which will not be described herein. Specifically, in this embodiment, the display unit of the terminal is a touch screen display, the terminal further includes a memory, and one or more programs, where the one or more programs are stored in the memory, and the one or more programs are configured to be executed by the one or more processors and include instructions for executing the access point connection method.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (14)

1. A method for access point connectivity, the method comprising:
after determining that the current access point to be connected is a historical access point, obtaining a privacy policy corresponding to the historical access point from a second corresponding relation between the stored identification information of the historical access point and the privacy policy;
judging whether privacy setting is needed when the access points are connected according to the privacy policy, wherein the historical access points refer to the connected access points;
if privacy setting is needed when the access point is connected, generating appointed pseudo identification information which is inconsistent with each identification information in the historical identification information for the terminal, wherein the historical identification information is identification information used when the historical access point is connected in a historical mode;
generating a connection request according to the appointed pseudo identification information and the connection password of the access point;
and sending the connection request to the access point to complete the connection establishment process.
2. The method of claim 1, further comprising:
and storing a first corresponding relation between the identification information of the access point and the appointed pseudo identification information.
3. The method according to claim 1, wherein the generating of the designated pseudo identification information inconsistent with each identification information in the historical identification information for the terminal comprises:
generating a pseudo identification information for the terminal;
judging whether the pseudo identification information is inconsistent with each identification information in the historical identification information or not;
determining the pseudo identification information as the designated pseudo identification information after determining that the pseudo identification information is inconsistent with each identification information in the historical identification information;
and after determining that the pseudo identification information is consistent with one identification information in the historical identification information, regenerating pseudo identification information for the terminal again until the appointed pseudo identification information inconsistent with each identification information in the historical identification information is obtained.
4. The method of claim 1, further comprising:
displaying a setting page, wherein the setting page comprises identification information of each historical access point and privacy setting options;
for a historical access point, acquiring a set privacy policy after detecting the trigger operation of a privacy setting option of the historical access point;
and storing a second corresponding relation between the identification information of the historical access point and the privacy policy.
5. The method of claim 4, wherein determining whether privacy settings are needed when connecting to the access point according to the privacy policy comprises:
counting the first connection times of the connection established with the access point before the current connection;
acquiring a second connection frequency set in the privacy policy;
and if the first connection times are larger than the second connection times, determining that privacy setting is needed when the access point is connected.
6. The method of claim 4, wherein determining whether privacy settings are needed when connecting to the access point according to the privacy policy comprises:
counting a first time length between the current connection time and the last connection time;
acquiring a second time length set in the privacy policy;
and if the first duration is longer than the second duration, determining that privacy setting is needed when the access point is connected.
7. An access point connection apparatus, the apparatus comprising:
the judging module is used for acquiring a privacy policy corresponding to the historical access point from a second corresponding relation between the stored identification information of the historical access point and the privacy policy after the current access point to be connected is determined to be the historical access point; judging whether privacy setting is needed when the access points are connected according to the privacy policy, wherein the historical access points refer to the connected access points;
a generating module, configured to generate, for a terminal, designated pseudo identifier information that is inconsistent with each identifier information in history identifier information if privacy setting is required when the access point is connected, where the history identifier information is identifier information used when the history access point is connected historically;
the generating module is further configured to generate a connection request according to the specified pseudo identification information and the connection password of the access point;
a sending module, configured to send the connection request to the access point to complete a connection establishment procedure.
8. The apparatus of claim 7, further comprising:
a first storing module, configured to store a first corresponding relationship between the identification information of the access point and the specified pseudo identification information.
9. The apparatus of claim 7, wherein the generating module is configured to generate a pseudo identification information for the terminal; judging whether the pseudo identification information is inconsistent with each identification information in the historical identification information or not; determining the pseudo identification information as the designated pseudo identification information after determining that the pseudo identification information is inconsistent with each identification information in the historical identification information; and after determining that the pseudo identification information is consistent with one identification information in the historical identification information, regenerating pseudo identification information for the terminal again until the appointed pseudo identification information inconsistent with each identification information in the historical identification information is obtained.
10. The apparatus of claim 7, further comprising:
the display module is used for displaying a setting page, and the setting page comprises identification information of each historical access point and privacy setting options;
the acquisition module is used for acquiring a set privacy policy for a historical access point after detecting the trigger operation of the privacy setting option of the historical access point;
and the second storage module is used for storing a second corresponding relation between the identification information of the historical access point and the privacy policy.
11. The apparatus according to claim 10, wherein the determining module is configured to count a first connection number of times that a connection with the access point is established before the current connection; acquiring a second connection frequency set in the privacy policy; and if the first connection times are larger than the second connection times, determining that privacy setting is needed when the access point is connected.
12. The apparatus according to claim 10, wherein the determining module is configured to count a first duration between a current connection time and a last connection time; acquiring a second time length set in the privacy policy; and if the first duration is longer than the second duration, determining that privacy setting is needed when the access point is connected.
13. A terminal, characterized in that the terminal comprises a processor and a memory for storing at least one program code, which is loaded by the processor and which performs the access point connection method according to any of claims 1 to 6.
14. A computer-readable storage medium for storing at least one program code for performing the access point connection method of any of claims 1 to 6.
CN201610842670.7A 2016-09-22 2016-09-22 Access point connection method and device Active CN107872791B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610842670.7A CN107872791B (en) 2016-09-22 2016-09-22 Access point connection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610842670.7A CN107872791B (en) 2016-09-22 2016-09-22 Access point connection method and device

Publications (2)

Publication Number Publication Date
CN107872791A CN107872791A (en) 2018-04-03
CN107872791B true CN107872791B (en) 2020-04-21

Family

ID=61751153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610842670.7A Active CN107872791B (en) 2016-09-22 2016-09-22 Access point connection method and device

Country Status (1)

Country Link
CN (1) CN107872791B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10728807B1 (en) * 2019-03-04 2020-07-28 Cisco Technology, Inc. Fast roaming and uniform policy for wireless clients with distributed hashing
CN111954283B (en) * 2019-05-17 2025-04-25 华为技术有限公司 A method and terminal for accessing wireless local area network
CN114710376B (en) * 2020-12-16 2024-03-12 深圳Tcl新技术有限公司 Connection control method and device of gateway equipment, gateway equipment and storage medium
WO2023231019A1 (en) * 2022-06-02 2023-12-07 Oppo广东移动通信有限公司 Wireless communication method, and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103119974A (en) * 2010-09-24 2013-05-22 英特尔公司 System and method for maintaining privacy in a wireless network
CN103442097A (en) * 2013-08-30 2013-12-11 烽火通信科技股份有限公司 System and method for controlling WiFi terminal access authority by home gateway
CN104754560A (en) * 2013-12-30 2015-07-01 华为终端有限公司 Position privacy protection method, device and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103119974A (en) * 2010-09-24 2013-05-22 英特尔公司 System and method for maintaining privacy in a wireless network
CN103442097A (en) * 2013-08-30 2013-12-11 烽火通信科技股份有限公司 System and method for controlling WiFi terminal access authority by home gateway
CN104754560A (en) * 2013-12-30 2015-07-01 华为终端有限公司 Position privacy protection method, device and system

Also Published As

Publication number Publication date
CN107872791A (en) 2018-04-03

Similar Documents

Publication Publication Date Title
US10269163B2 (en) Method and apparatus for switching real-time image in instant messaging
CN106534072B (en) user information authorization method, device, equipment and system
CN106371964B (en) Method and device for prompting message
CN103347003B (en) A kind of Voice over Internet method, Apparatus and system
CN107786424B (en) Audio and video communication method, terminal and server
CN104135728B (en) Method for connecting network and device
CN104348943A (en) Incoming call prompt method and incoming call prompt device
HK1204373A1 (en) A launch control method and apparatus for application programs
CN106775833A (en) device driver loading method, terminal and system
CN106302603A (en) The method and apparatus remotely deleting information
CN107872791B (en) Access point connection method and device
CN109039989B (en) Address resolution protocol spoofing detection method, host and computer-readable storage medium
CN107423099B (en) Key code programming method, server, terminal, key code programming system and storage medium
CN107562586A (en) A kind of internal-memory detection method, equipment and computer-readable storage medium
CN106603740A (en) Network connection abnormality processing method and terminal equipment
CN104660769B (en) A kind of methods, devices and systems for adding associated person information
CN107104930A (en) It is a kind of that the methods, devices and systems for checking authority are set
CN104917905B (en) Processing method, terminal and the server of Stranger Calls
CN111107223B (en) A message processing method and electronic device
CN106470234B (en) Equipment discovery method and device
CN105577712B (en) A kind of file uploading method, device and system
CN106658360A (en) A data transmission method and device
CN104966024B (en) A kind of method and device of protection database
CN110891262A (en) Bluetooth pairing method, system and terminal equipment
CN107148011B (en) Method, device and system for executing target service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant