[go: up one dir, main page]

WO2019047022A1 - Wifi sharing method, mobile terminal, and computer readable storage medium - Google Patents

Wifi sharing method, mobile terminal, and computer readable storage medium Download PDF

Info

Publication number
WO2019047022A1
WO2019047022A1 PCT/CN2017/100566 CN2017100566W WO2019047022A1 WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1 CN 2017100566 W CN2017100566 W CN 2017100566W WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless terminal
wifi
connection
fingerprint
wifi sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2017/100566
Other languages
French (fr)
Chinese (zh)
Inventor
周洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Transsion Communication Co Ltd
Original Assignee
Shenzhen Transsion Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Transsion Communication Co Ltd filed Critical Shenzhen Transsion Communication Co Ltd
Priority to PCT/CN2017/100566 priority Critical patent/WO2019047022A1/en
Priority to CN201780096577.9A priority patent/CN111316684A/en
Publication of WO2019047022A1 publication Critical patent/WO2019047022A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Definitions

  • the present invention relates to the field of wireless network technologies, and in particular, to a WIFI sharing method, a mobile terminal, and a computer readable storage medium.
  • WIFI networks basically support WIFI networks.
  • the commonly used WIFI network is shared by means of a password.
  • the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is allowed to establish a connection with the WIFI network; if the password is incorrect, then Refused to connect.
  • the main purpose of the present invention is to provide a WIFI sharing method, a terminal, and a computer readable storage medium, which are intended to solve the technical problem that a shared WIFI is easily broken by an illegal user.
  • the present invention provides a WIFI sharing method, where the WIFI sharing method includes the following steps:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the method before the step of starting the hotspot sharing function and starting the timing when the WIFI sharing instruction is received, the method further includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the method further includes:
  • the method further includes:
  • the method further includes:
  • the corresponding traffic usage abnormality information is output, and the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the method further includes:
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • the method further includes:
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention further provides a WIFI sharing terminal, where the WIFI sharing terminal includes a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor, When the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention further provides a computer readable storage medium, where the WIFI sharing program is stored, wherein when the WIFI sharing program is executed by a processor, the WIFI as described above is implemented. The steps to share the method.
  • the invention starts the WIFI hotspot sharing function when receiving the WIFI sharing instruction, and starts timing; if receiving the connection request sent by the wireless terminal within the preset connection time, determining the location according to the fingerprint information included in the connection request Whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establish a connection with the wireless terminal.
  • the WIFI sharing terminal of the present invention verifies the identity of the WIFI accessor by combining the sending time of the connection request and the fingerprint information, and accesses the WIFI when the request sending time and the fingerprint information of the WIFI accessor satisfy the requirements.
  • the connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
  • FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of a first embodiment of a WIFI sharing method according to the present invention
  • FIG. 3 is a schematic flowchart of a second embodiment of a WIFI sharing method according to the present invention.
  • FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
  • the main idea of the solution of the embodiment of the present invention is: when receiving the WIFI sharing instruction, the WIFI hotspot sharing function is started, and the timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the connection request.
  • the fingerprint information included therein determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
  • the WIFI sharing method in the embodiment of the present invention is mainly applied to a WIFI sharing terminal, and the WIFI sharing terminal can be implemented in multiple manners.
  • the terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
  • FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal involved in an embodiment of the present invention.
  • the WIFI sharing terminal may include a processor 1001 (for example, a CPU), and a communication bus. 1002, user interface 1003, network interface 1004, memory 1005.
  • the communication bus 1002 is configured to implement connection communication between the components; the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard); the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard);
  • the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
  • the mobile terminal may further include a camera (front camera), a flash (front flash), and RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • sensors such as light sensors, motion sensors, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display according to the brightness of the ambient light, and the proximity sensor can close the display and/or according to the distance between the photosensitive device and the reference object.
  • the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile terminal can also be equipped with other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. No longer.
  • FIG. 1 does not constitute a limitation of the WIFI sharing terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements.
  • the memory 1005 as a computer readable storage medium of FIG. 1 can include an operating system, a network communication module, and a WIFI sharing program.
  • the network communication module is mainly used to connect to a server for data communication with the server; and the processor 1001 can call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the invention provides a WIFI sharing method.
  • FIG. 2 is a schematic flowchart diagram of a first embodiment of a WIFI sharing method according to the present invention.
  • the method for sharing a WIFI terminal includes the following steps:
  • Step S10 when receiving the WIFI sharing instruction, start the WIFI hotspot sharing function, and start timing
  • WIFI networks basically support WIFI networks.
  • the commonly used WIFI network is shared by means of a password.
  • the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is connected to the WIFI network; if the password is incorrect, then Refused to connect.
  • this method of sharing WIFI by password has certain security problems. It is easy for an illegal user to decipher the WIFI password through a cracking software such as a WIFI master key, thereby connecting to the WIFI network without the permission of the WIFI provider.
  • the use of network resources brings loss of data traffic to WIFI providers and reduces network security.
  • a WIFI sharing method which verifies the access authority of the access terminal by means of fingerprint verification, thereby effectively preventing the WIFI network from being maliciously cracked by an illegal user, thereby improving the security of the WIFI network.
  • the WIFI sharing method in this embodiment is applied to a WIFI sharing terminal, and the WIFI sharing terminal has a WIFI hotspot function, and can provide a WIFI network (hotspot) for surrounding wireless terminals.
  • the WIFI sharing terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
  • a mobile phone will be taken as an example for description.
  • WIFI provides the user (hereinafter referred to as the user) mobile phone with WIFI hotspot sharing function; at this time, WIFI provides users to provide WIFI network (hotspot) to friends through their own mobile phones (hereinafter referred to as connected users), so that the tablet connected to the user (Of course, it can also be a wireless terminal such as a mobile phone, a laptop computer, a smart bracelet, etc.) can access the Internet through the WIFI network; at this time, the user will click the WIFI sharing option on the system setting page of the mobile phone to trigger the WIFI sharing instruction;
  • the WIFI sharing instruction may also be triggered by inputting the instruction text or instruction code corresponding to the WIFI sharing instruction by means of text input; of course, the WIFI sharing instruction may be triggered by voice input.
  • the mobile phone When receiving the WIFI sharing instruction, the mobile phone will open the WIFI hotspot sharing function according to the WIFI sharing instruction, and call the wireless signal transmitting module in the mobile phone to transmit a corresponding wireless signal, so that the wireless terminal in the wireless signal range can search. To the wireless signal.
  • the user's mobile phone starts the WIFI hotspot sharing function, it will automatically start timing to record the sharing duration of the WIFI hotspot.
  • Step S20 If the connection request sent by the wireless terminal is received within the preset connection time, determine whether the wireless terminal has the connection permission according to the fingerprint information included in the connection request.
  • the connected user when the user's mobile phone is provided to transmit a wireless signal, the connected user can search for the wireless signal on the tablet computer. At this time, the connected user can operate on the tablet, select the WIFI network corresponding to the wireless signal to connect, and trigger the corresponding connection instruction; when receiving the connection instruction of the connected user, the tablet computer displays the fingerprint input information, prompting the connection.
  • the user enters fingerprint data; the connected user can input fingerprint data according to the information in the fingerprint sensing area of the tablet (or an external fingerprint sensing device); when receiving the fingerprint data, the tablet computer generates a corresponding connection according to the fingerprint data. And requesting, and sending the connection request to the mobile phone of the providing user, wherein the connection request includes fingerprint information corresponding to the fingerprint data.
  • the user's mobile phone When receiving the connection request, the user's mobile phone first obtains the current time information, and calculates a waiting time from the start of the WIFI hotspot sharing function to the reception of the connection request; if the waiting time is greater than the preset connection time , the phone will directly reject the connection request from the tablet and return the connection rejection information to the tablet.
  • the preset connection time may be preset by the providing user, which may be understood as a secure connection time.
  • the mobile phone when the mobile phone initiates the WIFI hotspot sharing function, other wireless terminals may send a connection request to the mobile phone; If a legitimate user uses a wireless terminal to apply for connection to WIFI normally, it should request to establish a connection with the mobile phone within a certain period of time when the mobile phone starts the WIFI hotspot sharing function. If the illegal user connects to the WIFI through brute force, it often happens on the mobile phone. WIFI hotspot sharing function after a while. Therefore, in this embodiment, the mobile phone of the user is started to start timing when the WIFI hotspot sharing function is started. If the connection request sent by the tablet is received after the preset connection time is passed, the mobile phone directly rejects the tablet. Establish a connection and return a connection reject message to the tablet.
  • the phone receives a connection request from the tablet within the preset connection time, the phone will also need to further verify the connection rights of the tablet to determine whether to establish a connection with the tablet. Specifically, the mobile phone parses the connection request, obtains the fingerprint information included in the connection request, and determines whether the tablet computer has the connection right according to the fingerprint information. If it is determined according to the fingerprint information that the tablet computer has the connection right, the process goes to step S30; if it is determined that the tablet computer does not have the connection right, the mobile phone returns the rejection connection information to the tablet computer.
  • the process of determining, by the mobile phone, whether the tablet computer has the connection permission according to the fingerprint information may be: when the mobile phone acquires the fingerprint information, the mobile phone database is queried, and the fingerprint information is compared with the preset valid fingerprint in the database. Yes, it is determined whether the fingerprint information matches the preset valid fingerprint.
  • the preset valid fingerprint is to provide the user's own fingerprint; that is, the mobile phone will compare the fingerprint information in the connection request sent by the tablet with the fingerprint of the providing user, if the two match, then the description
  • the fingerprint information sent by the tablet is derived from the user, and it is considered that the connection operation of the tablet is authorized by the user, and since the connection request is received within the preset connection time, the description is provided.
  • the user activates the WIFI hotspot sharing function of the mobile phone, the user inputs the fingerprint on the tablet connected to the user, and authorizes the connected user to use the shared WIFI. In this case, the mobile phone will consider that the tablet has the connection right.
  • the user may be provided to enter in advance. Specifically, the user can click the effective fingerprint setting option on the system setting page of the mobile phone to trigger the effective fingerprint setting instruction; of course, the user can also trigger the input of the effective fingerprint setting instruction corresponding to the instruction text or the instruction code by means of text input.
  • a valid fingerprint setting instruction of course, it is also possible to trigger a valid fingerprint setting instruction by means of voice input.
  • the mobile phone receives the valid fingerprint setting instruction that provides the user trigger, it starts to enter the effective fingerprint setting mode; at this time, the mobile phone will output a prompt message to prompt the user to place the finger on the fingerprint collector of the mobile phone (or external fingerprint collection).
  • the device is configured to input fingerprint data, wherein the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
  • the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
  • Step S30 If the wireless terminal has a connection right, establish a connection with the wireless terminal.
  • the user's mobile phone is determined according to the fingerprint information to determine that the tablet computer has the connection right, the user of the tablet computer is considered to be a legitimate user, and the mobile phone allows the tablet computer to access the WIFI network and establish a network connection with the tablet computer. And return the corresponding connection success information to the tablet.
  • the WIFI hotspot sharing function when the WIFI sharing instruction is received, the WIFI hotspot sharing function is started, and timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the fingerprint included in the connection request The information determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
  • the WIFI sharing terminal in this embodiment combines the sending time of the connection request with the fingerprint information to verify the identity of the WIFI accessor, and when the WIFI accessor's request sending time and fingerprint information meet the requirements, the WIFI access is performed. The connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
  • FIG. 3 is a schematic flowchart diagram of a second embodiment of a WIFI sharing method according to the present invention.
  • step S30 the method further includes:
  • Step S40 Send a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.
  • a fingerprint information clearing command will also be sent to the tablet to clear the fingerprint information that the tablet uses for authentication.
  • the tablet computer queries the cache information according to the fingerprint information clearing instruction to obtain the corresponding fingerprint information, and clears the fingerprint information from the cache.
  • FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
  • the method further includes:
  • Step S50 Obtain device identification information of the wireless terminal, and record network usage of the wireless terminal.
  • the network usage of the tablet computer can also be monitored.
  • the mobile phone obtains device identification information of the tablet, and the device identification information may include one or more of a device ID, a MAC address, and an IP address of the tablet in the WIFI network.
  • the mobile phone also monitors the network usage of the tablet in real time and records the health content in the web log, and the recorded content may include the connection duration and data of the tablet. Transmission traffic, instantaneous transmission rate, website access records, etc., of course, may also include other content.
  • the content of the monitoring and recording may also be set by the providing user, and the mobile phone monitors and records according to the setting of the providing user.
  • the mobile phone may also take corresponding measures. Specifically, if the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic (for which the normal traffic can be preset by the user), the mobile phone considers that the tablet computer is abnormally using the network at this time, and the mobile phone will Outputs the corresponding traffic usage exception information, and the traffic usage abnormality information includes the device identification information of the tablet, so that the providing user can learn that the traffic usage of the tablet at this time is abnormal according to the information; wherein abnormal information is used for the traffic, It can be output in the form of voice, or it can display relevant information on the screen of the mobile phone.
  • the preset normal traffic for which the normal traffic can be preset by the user
  • the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic, and can directly disconnect the connection with the tablet computer, thereby avoiding the use of abnormal traffic to the user, thereby contributing to the improvement of network security. Sex.
  • the preset permission time can be set in the mobile phone.
  • the mobile phone can automatically disconnect from the tablet computer, so as to prevent the tablet computer from connecting for too long traffic for a long time. .
  • the present invention also provides a WIFI sharing terminal.
  • the WIFI sharing terminal of the present invention comprises a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor.
  • the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time is passed, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • the present invention also provides a computer readable storage medium.
  • the WIFI sharing program is stored on the computer readable storage medium of the present invention, wherein when the WIFI sharing program is executed by the processor, the following steps are implemented:
  • the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
  • connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
  • the wireless terminal has connection rights, establish a connection with the wireless terminal.
  • the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
  • the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
  • the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
  • the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
  • connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
  • portions of the technical solution of the present invention that contribute substantially or to the prior art may be embodied in the form of a software product stored in a storage medium (such as a ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
  • a terminal device which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

Disclosed in the present invention is a WiFi sharing method. The method comprises: upon receiving a WiFi sharing instruction, activating a WiFi hotspot sharing function, and initiating a measurement of an accumulated time; if a connection request sent by a wireless terminal is received within a predetermined connection duration, then determining, according to fingerprint information contained in the connection request, whether the wireless terminal has connection permission; and if so, then establishing a connection to the wireless terminal. Disclosed in the present invention are a WiFi sharing terminal and computer readable storage medium. By combining a send-out time of a connection request and using fingerprint information to authenticate the identity of a WiFi access user, the present invention only grants access to the WiFi access user when the send-out time and fingerprint information both meet requirements, thus effectively preventing a malicious WiFi network breach by an illegitimate user and subsequent loss of the WiFi network provider, and improving network security.

Description

WIFI共享方法、移动终端及计算机可读存储介质  WIFI sharing method, mobile terminal and computer readable storage medium

技术领域Technical field

本发明涉及无线网络技术领域,尤其涉及一种WIFI共享方法、移动终端及计算机可读存储介质。The present invention relates to the field of wireless network technologies, and in particular, to a WIFI sharing method, a mobile terminal, and a computer readable storage medium.

背景技术Background technique

目前的移动终端基本都支持WIFI网络。常用的WIFI网络是通过密码的方式进行共享的,用户在连接WIFI网络时,需要在移动终端上输入固定WIFI的密码,若密码正确,则允许移动终端与WIFI网络建立连接;若密码错误,则拒绝连接。Current mobile terminals basically support WIFI networks. The commonly used WIFI network is shared by means of a password. When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is allowed to establish a connection with the WIFI network; if the password is incorrect, then Refused to connect.

但这种通过密码进行WIFI共享的方法存在一定的安全性问题,非法用户很容易通过WIFI万能钥匙之类的破解软件对WIFI密码进行破译,从而在未经WIFI提供者许可的情况下连接WIFI网络使用网络资源,给WIFI提供者带来了数据流量损失,降低了网络安全性。However, this method of sharing WIFI by password has certain security problems. It is easy for an illegal user to decipher the WIFI password through a cracking software such as a WIFI master key, thereby connecting to the WIFI network without the permission of the WIFI provider. The use of network resources brings loss of data traffic to WIFI providers and reduces network security.

发明内容Summary of the invention

本发明的主要目的在于提供一种WIFI共享方法、终端及计算机可读存储介质,旨在解决共享WIFI容易被非法用户破解连接的技术问题。The main purpose of the present invention is to provide a WIFI sharing method, a terminal, and a computer readable storage medium, which are intended to solve the technical problem that a shared WIFI is easily broken by an illegal user.

为实现上述目的,本发明提供一种WIFI共享方法,所述WIFI共享方法包括以下步骤:To achieve the above objective, the present invention provides a WIFI sharing method, where the WIFI sharing method includes the following steps:

在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;

若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;

若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal.

可选地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:Optionally, the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:

查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint;

判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority.

可选地,所述在接收到WIFI共享指令时,开启热点共享功能,并开始计时的步骤之前,还包括:Optionally, before the step of starting the hotspot sharing function and starting the timing when the WIFI sharing instruction is received, the method further includes:

在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹。Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.

可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:Optionally, after the step of establishing a connection with the wireless terminal, if the wireless terminal has a connection right, the method further includes:

向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:Optionally, after the step of establishing a connection with the wireless terminal, if the wireless terminal has a connection right, the method further includes:

获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal.

可选地,所述获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录的步骤之后,还包括:Optionally, after the step of acquiring the device identification information of the wireless terminal and recording the network usage of the wireless terminal, the method further includes:

若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息。If it is detected that the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, and the traffic usage abnormality information includes the device identification information of the wireless terminal.

可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:Optionally, after the step of establishing a connection with the wireless terminal, if the wireless terminal has a connection right, the method further includes:

在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected.

可选地,所述在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时的步骤之后,还包括:Optionally, after the step of starting the WIFI hotspot sharing function and starting the timing when the WIFI sharing instruction is received, the method further includes:

若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。If the connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.

此外,为实现上述目的,本发明还提供一种WIFI共享终端,所述WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现以下步骤:In addition, to achieve the above object, the present invention further provides a WIFI sharing terminal, where the WIFI sharing terminal includes a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor, When the WIFI sharing program is executed by the processor, the following steps are implemented:

在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;

若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;

若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal.

可选地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:Optionally, the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:

查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint;

判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority.

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息If the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected.

可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Optionally, when the WIFI sharing program is executed by the processor, the following steps are further implemented:

若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。If the connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.

此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现如上述的WIFI共享方法的步骤。In addition, in order to achieve the above object, the present invention further provides a computer readable storage medium, where the WIFI sharing program is stored, wherein when the WIFI sharing program is executed by a processor, the WIFI as described above is implemented. The steps to share the method.

本发明通过在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。通过以上方式,本发明的WIFI共享终端结合连接请求的发送时间和指纹信息对WIFI接入者的身份进行验证,当WIFI接入者的请求发送时间和指纹信息均满足要求时方与WIFI接入者建立连接,从而有效避免WIFI网络被非法用户恶意破解后给WIFI提供者带来的损失,提高了网络安全性。The invention starts the WIFI hotspot sharing function when receiving the WIFI sharing instruction, and starts timing; if receiving the connection request sent by the wireless terminal within the preset connection time, determining the location according to the fingerprint information included in the connection request Whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establish a connection with the wireless terminal. In the above manner, the WIFI sharing terminal of the present invention verifies the identity of the WIFI accessor by combining the sending time of the connection request and the fingerprint information, and accesses the WIFI when the request sending time and the fingerprint information of the WIFI accessor satisfy the requirements. The connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.

附图说明DRAWINGS

图1是本发明实施例方案涉及的WIFI共享终端的硬件结构示意图;1 is a schematic structural diagram of hardware of a WIFI sharing terminal according to an embodiment of the present invention;

图2为本发明WIFI共享方法第一实施例的流程示意图;2 is a schematic flowchart of a first embodiment of a WIFI sharing method according to the present invention;

图3为本发明WIFI共享方法第二实施例的流程示意图;3 is a schematic flowchart of a second embodiment of a WIFI sharing method according to the present invention;

图4为本发明WIFI共享方法第三实施例的流程示意图。FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.

本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The implementation, functional features, and advantages of the present invention will be further described in conjunction with the embodiments.

具体实施方式Detailed ways

应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。It is understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.

本发明实施例方案的主要思路是:在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。The main idea of the solution of the embodiment of the present invention is: when receiving the WIFI sharing instruction, the WIFI hotspot sharing function is started, and the timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the connection request The fingerprint information included therein determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.

本发明实施例涉及的WIFI共享方法主要应用于WIFI共享终端,该WIFI共享终端可以通过多种方式实现。例如,该终端可以是诸如手机、平板电脑、掌上电脑、便捷式媒体播放器、可穿戴设备、智能手环等移动终端,还可以是诸如数字TV、PC终端等固定终端。The WIFI sharing method in the embodiment of the present invention is mainly applied to a WIFI sharing terminal, and the WIFI sharing terminal can be implemented in multiple manners. For example, the terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.

后续描述中将以手机为例进行说明,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于其它类型的终端。The following description will be made by taking a mobile phone as an example, and those skilled in the art will understand that the configuration according to an embodiment of the present invention can be applied to other types of terminals in addition to components particularly for mobile purposes.

参照图1,图1为本发明实施例方案中涉及的WIFI共享终端的硬件结构示意图。本发明实施例中,WIFI共享终端可以包括处理器1001(例如CPU),通信总线 1002,用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信;用户接口1003可以包括指纹采集器(指纹传感器)、显示屏(Display)、输入单元比如键盘(Keyboard);网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口);存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器,存储器1005可选的还可以是独立于前述处理器1001的存储装置。Referring to FIG. 1, FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal involved in an embodiment of the present invention. In the embodiment of the present invention, the WIFI sharing terminal may include a processor 1001 (for example, a CPU), and a communication bus. 1002, user interface 1003, network interface 1004, memory 1005. The communication bus 1002 is configured to implement connection communication between the components; the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard); the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.

可选地,该移动终端还可以包括摄像头(前置摄像头)、闪光灯(前置闪光灯)、RF(Radio Frequency,射频)电路,传感器、音频电路、WiFi模块等等。其中,传感器比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示屏的亮度,接近传感器可根据感光设备与参照物的距离,关闭显示屏和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;当然,该移动终端还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。Optionally, the mobile terminal may further include a camera (front camera), a flash (front flash), and RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more. Among them, sensors such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display according to the brightness of the ambient light, and the proximity sensor can close the display and/or according to the distance between the photosensitive device and the reference object. Backlighting. As a kind of motion sensor, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the attitude of the terminal (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; of course, the mobile terminal can also be equipped with other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. No longer.

本领域技术人员可以理解,图1中示出的硬件结构并不构成对WIFI共享终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。It will be understood by those skilled in the art that the hardware structure shown in FIG. 1 does not constitute a limitation of the WIFI sharing terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements.

继续参照图1,图1中作为一种计算机可读存储介质的存储器1005可以包括操作系统、网络通信模块以及WIFI共享程序。With continued reference to FIG. 1, the memory 1005 as a computer readable storage medium of FIG. 1 can include an operating system, a network communication module, and a WIFI sharing program.

在图1中,网络通信模块主要用于连接服务器,与服务器进行数据通信;而处理器1001可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:In FIG. 1, the network communication module is mainly used to connect to a server for data communication with the server; and the processor 1001 can call the WIFI sharing program stored in the memory 1005 and perform the following operations:

在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;

若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;

若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal.

进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:Further, the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:

查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint;

判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority.

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息If the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected.

进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:Further, the processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:

若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。If the connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.

基于上述WIFI共享终端的硬件结构,提出本发明WIFI共享方法的各个实施例。Based on the hardware structure of the above WIFI sharing terminal, various embodiments of the WIFI sharing method of the present invention are proposed.

本发明提供一种WIFI共享方法。The invention provides a WIFI sharing method.

参照图2,图2为本发明WIFI共享方法第一实施例的流程示意图。Referring to FIG. 2, FIG. 2 is a schematic flowchart diagram of a first embodiment of a WIFI sharing method according to the present invention.

本实施例中,所述WIFI共享终端方法包括以下步骤:In this embodiment, the method for sharing a WIFI terminal includes the following steps:

步骤S10,在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;Step S10, when receiving the WIFI sharing instruction, start the WIFI hotspot sharing function, and start timing;

目前的移动终端基本都支持WIFI网络。常用的WIFI网络是通过密码的方式进行共享的,用户在连接WIFI网络时,需要在移动终端上输入固定WIFI的密码,若密码正确,则运行移动终端与WIFI网络建立连接;若密码错误,则拒绝连接。但这种通过密码进行WIFI共享的方法存在一定的安全性问题,非法用户很容易通过WIFI万能钥匙之类的破解软件对WIFI密码进行破译,从而在未经WIFI提供者许可的情况下连接WIFI网络使用网络资源,给WIFI提供者带来了数据流量损失,降低了网络安全性。Current mobile terminals basically support WIFI networks. The commonly used WIFI network is shared by means of a password. When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is connected to the WIFI network; if the password is incorrect, then Refused to connect. However, this method of sharing WIFI by password has certain security problems. It is easy for an illegal user to decipher the WIFI password through a cracking software such as a WIFI master key, thereby connecting to the WIFI network without the permission of the WIFI provider. The use of network resources brings loss of data traffic to WIFI providers and reduces network security.

基于上述问题,本实施例中提出一种WIFI共享方法,通过指纹验证的方式对接入终端的权限进行验证,有效避免WIFI网络被非法用户恶意破解,提高了WIFI网络的安全性。Based on the above problem, in this embodiment, a WIFI sharing method is proposed, which verifies the access authority of the access terminal by means of fingerprint verification, thereby effectively preventing the WIFI network from being maliciously cracked by an illegal user, thereby improving the security of the WIFI network.

具体地,本实施例中的WIFI共享方法应用于WIFI共享终端,该WIFI共享终端具有WIFI热点功能,可以为周围的无线终端提供WIFI网络(热点)。其中,该WIFI共享终端可以是诸如手机、平板电脑、掌上电脑、便捷式媒体播放器、可穿戴设备、智能手环等移动终端,还可以是诸如数字TV、PC终端等固定终端。本实施例中将以手机为例进行说明。WIFI提供用户(后续简称提供用户)的手机具有WIFI热点共享功能;此时WIFI提供用户希望通过自己的手机提供WIFI网络(热点)给朋友(后续称为连接用户),以使连接用户的平板电脑(当然还可以是手机、笔记本电脑、智能手环等无线终端)可通过该WIFI网络进行上网;此时提供用户将在自己手机的系统设置页面点击WIFI共享选项,触发WIFI共享指令;当然提供用户也可以通过文字输入的方式,通过输入WIFI共享指令对应的指令文字或指令代码,触发WIFI共享指令;当然还可以是通过语音输入的方式触发WIFI共享指令。手机在接收到该WIFI共享指令时,将会根据该WIFI共享指令开启WIFI热点共享功能,调用手机中的无线信号发射模块发射出对应的无线信号,从而使得该无线信号范围内的无线终端可以搜索到该无线信号。提供用户的手机在启动WIFI热点共享功能时,还将自动开始计时,以记录WIFI热点的共享时长。Specifically, the WIFI sharing method in this embodiment is applied to a WIFI sharing terminal, and the WIFI sharing terminal has a WIFI hotspot function, and can provide a WIFI network (hotspot) for surrounding wireless terminals. The WIFI sharing terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal. In this embodiment, a mobile phone will be taken as an example for description. WIFI provides the user (hereinafter referred to as the user) mobile phone with WIFI hotspot sharing function; at this time, WIFI provides users to provide WIFI network (hotspot) to friends through their own mobile phones (hereinafter referred to as connected users), so that the tablet connected to the user (Of course, it can also be a wireless terminal such as a mobile phone, a laptop computer, a smart bracelet, etc.) can access the Internet through the WIFI network; at this time, the user will click the WIFI sharing option on the system setting page of the mobile phone to trigger the WIFI sharing instruction; The WIFI sharing instruction may also be triggered by inputting the instruction text or instruction code corresponding to the WIFI sharing instruction by means of text input; of course, the WIFI sharing instruction may be triggered by voice input. When receiving the WIFI sharing instruction, the mobile phone will open the WIFI hotspot sharing function according to the WIFI sharing instruction, and call the wireless signal transmitting module in the mobile phone to transmit a corresponding wireless signal, so that the wireless terminal in the wireless signal range can search. To the wireless signal. When the user's mobile phone starts the WIFI hotspot sharing function, it will automatically start timing to record the sharing duration of the WIFI hotspot.

步骤S20,若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;Step S20: If the connection request sent by the wireless terminal is received within the preset connection time, determine whether the wireless terminal has the connection permission according to the fingerprint information included in the connection request.

本实施例中,提供用户的手机发射出无线信号时,连接用户即可在其平板电脑上搜索到该无线信号。此时连接用户可在平板电脑上进行操作,选择该无线信号对应的WIFI网络进行连接,触发相应的连接指令;平板电脑在接收到连接用户的连接指令时,将会显示指纹录入信息,提示连接用户录入指纹数据;连接用户可根据该信息在平板电脑的指纹感应区(或是外接的指纹感应设备)录入指纹数据;平板电脑在接收到该指纹数据时,会根据该指纹数据生成对应的连接请求,并向提供用户的手机发送该连接请求,其中该连接请求中包括了该指纹数据对应的指纹信息。In this embodiment, when the user's mobile phone is provided to transmit a wireless signal, the connected user can search for the wireless signal on the tablet computer. At this time, the connected user can operate on the tablet, select the WIFI network corresponding to the wireless signal to connect, and trigger the corresponding connection instruction; when receiving the connection instruction of the connected user, the tablet computer displays the fingerprint input information, prompting the connection. The user enters fingerprint data; the connected user can input fingerprint data according to the information in the fingerprint sensing area of the tablet (or an external fingerprint sensing device); when receiving the fingerprint data, the tablet computer generates a corresponding connection according to the fingerprint data. And requesting, and sending the connection request to the mobile phone of the providing user, wherein the connection request includes fingerprint information corresponding to the fingerprint data.

提供用户的手机在接收到该连接请求时,首先会获取当前时间信息,计算出从启动WIFI热点共享功能到接收到该连接请求为止,一共经过的等待时间;若该等待时间大于预设连接时间,则手机会直接拒绝该平板电脑的连接请求,并向平板电脑返回拒绝连接信息。其中,该预设连接时间可以是由提供用户预先设置的,可理解为一个安全连接时间;本实施例中在手机启动WIFI热点共享功能时,其它的无线终端即可向手机发送连接请求;若是合法用户使用无线终端正常申请连接WIFI,则应该是在手机启动WIFI热点共享功能的一定时间内即请求与手机建立连接,而若是非法用户通过暴力破解的方式连接WIFI,则往往是发生在手机启动WIFI热点共享功能的一段时间之后。因此本实施例中,提供用户的手机在启动WIFI热点共享功能时即开始计时,如果是在经过了预设连接时间时才接收到平板电脑发送的连接请求,则手机会直接拒绝与该平板电脑建立连接,并向平板电脑返回拒绝连接信息。When receiving the connection request, the user's mobile phone first obtains the current time information, and calculates a waiting time from the start of the WIFI hotspot sharing function to the reception of the connection request; if the waiting time is greater than the preset connection time , the phone will directly reject the connection request from the tablet and return the connection rejection information to the tablet. The preset connection time may be preset by the providing user, which may be understood as a secure connection time. In this embodiment, when the mobile phone initiates the WIFI hotspot sharing function, other wireless terminals may send a connection request to the mobile phone; If a legitimate user uses a wireless terminal to apply for connection to WIFI normally, it should request to establish a connection with the mobile phone within a certain period of time when the mobile phone starts the WIFI hotspot sharing function. If the illegal user connects to the WIFI through brute force, it often happens on the mobile phone. WIFI hotspot sharing function after a while. Therefore, in this embodiment, the mobile phone of the user is started to start timing when the WIFI hotspot sharing function is started. If the connection request sent by the tablet is received after the preset connection time is passed, the mobile phone directly rejects the tablet. Establish a connection and return a connection reject message to the tablet.

另一方面,如果手机是在预设连接时间内接收到平板电脑发送的连接请求,则手机还将需要对平板电脑的连接权限进行进一步验证,从而确定是否与平板电脑建立连接。具体地,手机会对该连接请求进行解析,获取该连接请求中包括的指纹信息,并根据该指纹信息判断平板电脑是否具有连接权限。如果根据该指纹信息判断平板电脑具有连接权限,则进入步骤S30;若判断平板电脑不具有连接权限,则手机会向平板电脑返回拒绝连接信息。On the other hand, if the phone receives a connection request from the tablet within the preset connection time, the phone will also need to further verify the connection rights of the tablet to determine whether to establish a connection with the tablet. Specifically, the mobile phone parses the connection request, obtains the fingerprint information included in the connection request, and determines whether the tablet computer has the connection right according to the fingerprint information. If it is determined according to the fingerprint information that the tablet computer has the connection right, the process goes to step S30; if it is determined that the tablet computer does not have the connection right, the mobile phone returns the rejection connection information to the tablet computer.

进一步地,本实施例中手机根据指纹信息判断平板电脑是否具有连接权限的过程可以是这样的:手机在获取指纹信息时,将查询内存数据库,将该指纹信息与数据库中预设有效指纹进行比对,判断该指纹信息与预设有效指纹是否匹配。其中,关于该预设有效指纹,是提供用户自己的指纹;也就是说,手机将会将平板电脑发送的连接请求中的指纹信息与提供用户的指纹进行比对,如果两者匹配,则说明平板电脑发送的指纹信息正是来源于提供用户,并认为此时平板电脑的连接操作是得到了提供用户授权的,而又由于该连接请求是在预设连接时间内接收到的,则说明提供用户在启动手机的WIFI热点共享功能后,即在连接用户的平板电脑录入自己指纹,授权连接用户使用该共享WIFI,在该情况下,手机将认为平板电脑具有连接权限。Further, in the embodiment, the process of determining, by the mobile phone, whether the tablet computer has the connection permission according to the fingerprint information may be: when the mobile phone acquires the fingerprint information, the mobile phone database is queried, and the fingerprint information is compared with the preset valid fingerprint in the database. Yes, it is determined whether the fingerprint information matches the preset valid fingerprint. Wherein, the preset valid fingerprint is to provide the user's own fingerprint; that is, the mobile phone will compare the fingerprint information in the connection request sent by the tablet with the fingerprint of the providing user, if the two match, then the description The fingerprint information sent by the tablet is derived from the user, and it is considered that the connection operation of the tablet is authorized by the user, and since the connection request is received within the preset connection time, the description is provided. After the user activates the WIFI hotspot sharing function of the mobile phone, the user inputs the fingerprint on the tablet connected to the user, and authorizes the connected user to use the shared WIFI. In this case, the mobile phone will consider that the tablet has the connection right.

再进一步地,对于预设有效指纹,可以是有提供用户提前录入的。具体地,提供用户可以在手机的系统设置页面点击有效指纹设置选项,从而触发有效指纹设置指令;当然用户也可以通过文字输入的方式,通过输入有效指纹设置指令对应的指令文字或指令代码,触发有效指纹设置指令;当然还可以是通过语音输入的方式触发有效指纹设置指令。手机在接收到提供用户触发的有效指纹设置指令时,即开始进入有效指纹设置模式;此时手机将输出提示信息,以提示提供用户将手指置于手机的指纹采集器上(或外接的指纹采集设备),以录入指纹数据,其中提示信息可以是以语音的方式输出,也可以是在手机屏幕上显示相关的提示信息。提供用户根据提示进行操作,将手指置于手机的指纹采集器上时,手机即通过指纹采集器获取到提供用户的指纹数据,并根据该指纹数据设置有效指纹。Further, for the preset valid fingerprint, the user may be provided to enter in advance. Specifically, the user can click the effective fingerprint setting option on the system setting page of the mobile phone to trigger the effective fingerprint setting instruction; of course, the user can also trigger the input of the effective fingerprint setting instruction corresponding to the instruction text or the instruction code by means of text input. A valid fingerprint setting instruction; of course, it is also possible to trigger a valid fingerprint setting instruction by means of voice input. When the mobile phone receives the valid fingerprint setting instruction that provides the user trigger, it starts to enter the effective fingerprint setting mode; at this time, the mobile phone will output a prompt message to prompt the user to place the finger on the fingerprint collector of the mobile phone (or external fingerprint collection). The device is configured to input fingerprint data, wherein the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone. When the user is prompted to operate according to the prompt and the finger is placed on the fingerprint collector of the mobile phone, the mobile phone obtains the fingerprint data of the user through the fingerprint collector, and sets a valid fingerprint according to the fingerprint data.

步骤S30,若所述无线终端具有连接权限,则与所述无线终端建立连接。Step S30: If the wireless terminal has a connection right, establish a connection with the wireless terminal.

本实施例中,提供用户的手机如果根据该指纹信息判断平板电脑具有连接权限,则认为平板电脑的使用者为合法用户,此时手机允许平板电脑接入WIFI网络,与平板电脑建立网络连接,并向平板电脑返回对应的连接成功信息。In this embodiment, if the user's mobile phone is determined according to the fingerprint information to determine that the tablet computer has the connection right, the user of the tablet computer is considered to be a legitimate user, and the mobile phone allows the tablet computer to access the WIFI network and establish a network connection with the tablet computer. And return the corresponding connection success information to the tablet.

本实施例中,通过在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。通过以上方式,本实施例WIFI共享终端结合连接请求的发送时间和指纹信息对WIFI接入者的身份进行验证,当WIFI接入者的请求发送时间和指纹信息均满足要求时方与WIFI接入者建立连接,从而有效避免WIFI网络被非法用户恶意破解后给WIFI提供者带来的损失,提高了网络安全性。In this embodiment, when the WIFI sharing instruction is received, the WIFI hotspot sharing function is started, and timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the fingerprint included in the connection request The information determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal. In the above manner, the WIFI sharing terminal in this embodiment combines the sending time of the connection request with the fingerprint information to verify the identity of the WIFI accessor, and when the WIFI accessor's request sending time and fingerprint information meet the requirements, the WIFI access is performed. The connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.

参照图3,图3为本发明WIFI共享方法第二实施例的流程示意图。Referring to FIG. 3, FIG. 3 is a schematic flowchart diagram of a second embodiment of a WIFI sharing method according to the present invention.

基于上述图2所示实施例,步骤S30之后,还包括:Based on the embodiment shown in FIG. 2, after step S30, the method further includes:

步骤S40,向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Step S40: Send a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

本实施例中,为了防止连接用户利用平板电脑中的指纹信息(提供用户的指纹)进行二次连接,同时也避免该平板中的指纹信息被其它非法用户窃取,手机与平板电脑建立连接时,还将向平板电脑发送指纹信息清除指令,以清除平板电脑用于验证的指纹信息。平板电脑在接收到手机发送的指纹信息清除指令时,将根据该指纹信息清除指令在缓存中进行查询,以获取到对应的指纹信息,并将该指纹信息从缓存中清除。在平板电脑断开与手机的连接后,若想重新进行连接,则此时需要重新获得提供用户的指纹信息;即需要重新获得提供用户的授权,才可再次与提供用户的手机进行连接,从而进一步提高了网络安全性。In this embodiment, in order to prevent the connected user from using the fingerprint information in the tablet (providing the fingerprint of the user) for secondary connection, and also preventing the fingerprint information in the tablet from being stolen by other illegal users, when the mobile phone establishes a connection with the tablet computer, A fingerprint information clearing command will also be sent to the tablet to clear the fingerprint information that the tablet uses for authentication. When receiving the fingerprint information clearing instruction sent by the mobile phone, the tablet computer queries the cache information according to the fingerprint information clearing instruction to obtain the corresponding fingerprint information, and clears the fingerprint information from the cache. After the tablet disconnects from the mobile phone, if you want to re-connect, you need to re-acquire the user's fingerprint information; that is, you need to re-authorize the user to connect with the user's mobile phone. Further improved network security.

参照图4,图4为本发明WIFI共享方法第三实施例的流程示意图。Referring to FIG. 4, FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.

基于上述图2或图3所示实施例,步骤S30之后,还包括:Based on the embodiment shown in FIG. 2 or FIG. 3, after step S30, the method further includes:

步骤S50,获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。Step S50: Obtain device identification information of the wireless terminal, and record network usage of the wireless terminal.

本实施例中,手机在与平板电脑建立连接后,还可以对平板电脑的网络使用情况进行监控。具体地,手机在与平板电脑建立连接后,将会获取该平板电脑的设备标识信息,该设备标识信息可包括平板电脑在WIFI网络中的设备ID、MAC地址、IP地址中的一种或多种,当然还可以包括其它的设备标识信息;同时,手机还会对平板电脑的网络使用情况进行实时监控、并将健康内容记录到网络日志中,记录的内容可以包括平板电脑的连接时长、数据传输流量、瞬时传输速率、网站访问记录等,当然还可以包括其它的内容。而在具体实施中,监控和记录的内容也可以是由提供用户自己进行设置,手机则根据提供用户的设置进行监控和记录。In this embodiment, after the mobile phone establishes a connection with the tablet computer, the network usage of the tablet computer can also be monitored. Specifically, after establishing a connection with the tablet, the mobile phone obtains device identification information of the tablet, and the device identification information may include one or more of a device ID, a MAC address, and an IP address of the tablet in the WIFI network. Of course, other device identification information may also be included; at the same time, the mobile phone also monitors the network usage of the tablet in real time and records the health content in the web log, and the recorded content may include the connection duration and data of the tablet. Transmission traffic, instantaneous transmission rate, website access records, etc., of course, may also include other content. In the specific implementation, the content of the monitoring and recording may also be set by the providing user, and the mobile phone monitors and records according to the setting of the providing user.

进一步地,手机在对平板电脑的网络使用情况进行监控的过程中,若发现平板电脑对网络的使用异常,还可以采取相应的处理措施。具体地,若手机检测到平板电脑的数据传输流量大于预设正常流量(对于该预设正常流量可以由用户进行预先设置),则手机会认为平板电脑此时正异常使用网络,此时手机会输出对应的流量使用异常信息,该流量使用异常信息中包括平板电脑的设备标识信息,从而使得提供用户可根据该信息了解到平板电脑此时的流量使用情况异常;其中对于该流量使用异常信息,可以是以语音的方式输出,也可以是在手机屏幕上显示相关的信息。当然,除了输出语音提醒,手机在检测到平板电脑的数据传输流量大于预设正常流量,还可以直接断开与平板电脑的连接,避免流量使用异常给提供用户带来损失,有利于提高网络安全性。Further, in the process of monitoring the network usage of the tablet computer, if the mobile phone is found to be abnormal in the use of the network, the mobile phone may also take corresponding measures. Specifically, if the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic (for which the normal traffic can be preset by the user), the mobile phone considers that the tablet computer is abnormally using the network at this time, and the mobile phone will Outputs the corresponding traffic usage exception information, and the traffic usage abnormality information includes the device identification information of the tablet, so that the providing user can learn that the traffic usage of the tablet at this time is abnormal according to the information; wherein abnormal information is used for the traffic, It can be output in the form of voice, or it can display relevant information on the screen of the mobile phone. Of course, in addition to outputting a voice reminder, the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic, and can directly disconnect the connection with the tablet computer, thereby avoiding the use of abnormal traffic to the user, thereby contributing to the improvement of network security. Sex.

再进一步地,手机中还可以设置预设许可时间,在平板电脑的连接时长经过该预设许可时间时,手机可自动断开与平板电脑的连接,避免平板电脑长时间连接使用过多的流量。Further, the preset permission time can be set in the mobile phone. When the connection time of the tablet passes the preset permission time, the mobile phone can automatically disconnect from the tablet computer, so as to prevent the tablet computer from connecting for too long traffic for a long time. .

此外,本发明还提供一种WIFI共享终端。In addition, the present invention also provides a WIFI sharing terminal.

本发明WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现以下步骤:The WIFI sharing terminal of the present invention comprises a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor. When the WIFI sharing program is executed by the processor, the following steps are implemented:

在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;

若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;

若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal.

进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:Further, the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:

查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint;

判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority.

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息If the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected.

进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息If the connection request sent by the wireless terminal is received when the preset connection time is passed, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.

其中,所述WIFI共享程序被执行时所实现的方法可参照本发明WIFI共享方法的各个实施例,此处不再赘述。For the method that is implemented when the WIFI sharing program is executed, refer to various embodiments of the WIFI sharing method of the present invention, and details are not described herein again.

此外,本发明还提供一种计算机可读存储介质。Moreover, the present invention also provides a computer readable storage medium.

本发明计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现以下步骤:The WIFI sharing program is stored on the computer readable storage medium of the present invention, wherein when the WIFI sharing program is executed by the processor, the following steps are implemented:

在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;

若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;

若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal.

进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:Further, the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:

查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint;

判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority.

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息If the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected.

进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:Further, when the WIFI sharing program is executed by the processor, the following steps are also implemented:

若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。If the connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.

其中,所述WIFI共享程序被执行时所实现的方法可参照本发明WIFI共享方法的各个实施例,此处不再赘述。For the method that is implemented when the WIFI sharing program is executed, refer to various embodiments of the WIFI sharing method of the present invention, and details are not described herein again.

需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。It is to be understood that the term "comprises", "comprising", or any other variants thereof, is intended to encompass a non-exclusive inclusion, such that a process, method, article, or It also includes other elements that are not explicitly listed, or elements that are inherent to such a process, method, item, or system. An element defined by the phrase "comprising a ..." does not exclude the presence of additional equivalent elements in a process, method, article, or system that includes the element, without further limitation.

上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the embodiments of the present invention are merely for the description, and do not represent the advantages and disadvantages of the embodiments.

通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better. Implementation. Based on such understanding, portions of the technical solution of the present invention that contribute substantially or to the prior art may be embodied in the form of a software product stored in a storage medium (such as a ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.

以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。The above are only the preferred embodiments of the present invention, and are not intended to limit the scope of the invention, and the equivalent structure or equivalent process transformations made by the description of the present invention and the drawings are directly or indirectly applied to other related technical fields. The same is included in the scope of patent protection of the present invention.

Claims (10)

一种WIFI共享方法,其特征在于,所述WIFI共享方法包括以下步骤: A WIFI sharing method, characterized in that the WIFI sharing method comprises the following steps: 在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started; 若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;If the connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right; 若所述无线终端具有连接权限,则与所述无线终端建立连接。If the wireless terminal has connection rights, establish a connection with the wireless terminal. 如权利要求1所述的WIFI共享方法,其特征在于,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:The method of claim 1 , wherein the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right comprises: 查询数据库,获取预设有效指纹;Query the database to obtain the preset valid fingerprint; 判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。Determining whether the fingerprint information included in the connection request matches the preset valid fingerprint, thereby determining whether the wireless terminal has connection authority. 如权利要求2所述的WIFI共享方法,其特征在于,所述在接收到WIFI共享指令时,开启热点共享功能,并开始计时的步骤之前,还包括:The WIFI sharing method according to claim 2, wherein the step of enabling the hotspot sharing function and starting the timing when the WIFI sharing instruction is received further includes: 在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹。Upon receiving the valid fingerprint setting instruction, the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data. 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:The WIFI sharing method according to claim 1, wherein the step of establishing a connection with the wireless terminal if the wireless terminal has a connection right further comprises: 向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。Sending a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction. 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:The WIFI sharing method according to claim 1, wherein the step of establishing a connection with the wireless terminal if the wireless terminal has a connection right further comprises: 获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。Obtaining device identification information of the wireless terminal, and recording network usage of the wireless terminal. 如权利要求5所述的WIFI共享方法,其特征在于,所述获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录的步骤之后,还包括:The WIFI sharing method according to claim 5, wherein after the step of acquiring the device identification information of the wireless terminal and recording the network usage of the wireless terminal, the method further includes: 若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息。If it is detected that the data transmission traffic of the wireless terminal is greater than the preset normal traffic, the corresponding traffic usage abnormality information is output, and the traffic usage abnormality information includes the device identification information of the wireless terminal. 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:The WIFI sharing method according to claim 1, wherein the step of establishing a connection with the wireless terminal if the wireless terminal has a connection right further comprises: 在经过预设许可时间时,与所述无线终端断开连接。When the preset permission time elapses, the wireless terminal is disconnected. 如权利要求1所述的WIFI共享方法,其特征在于,所述在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时的步骤之后,还包括:The WIFI sharing method according to claim 1, wherein the step of starting the WIFI hotspot sharing function and starting the timing when the WIFI sharing instruction is received further includes: 若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。If the connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal. 一种WIFI共享终端,其特征在于,所述WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现如权利要求1至8中任一项所述的WIFI共享方法的步骤。A WIFI sharing terminal, comprising: a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor, where the WIFI sharing program is processed The steps of the WIFI sharing method according to any one of claims 1 to 8 are implemented when the device is executed. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现如权利要求1至8中任一项所述的WIFI共享方法的步骤。 A computer readable storage medium, wherein the computer readable storage medium stores a WIFI sharing program, wherein when the WIFI sharing program is executed by a processor, the method of any one of claims 1 to 8 is implemented The steps of the WIFI sharing method described.
PCT/CN2017/100566 2017-09-05 2017-09-05 Wifi sharing method, mobile terminal, and computer readable storage medium Ceased WO2019047022A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
PCT/CN2017/100566 WO2019047022A1 (en) 2017-09-05 2017-09-05 Wifi sharing method, mobile terminal, and computer readable storage medium
CN201780096577.9A CN111316684A (en) 2017-09-05 2017-09-05 WIFI sharing method, mobile terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/100566 WO2019047022A1 (en) 2017-09-05 2017-09-05 Wifi sharing method, mobile terminal, and computer readable storage medium

Publications (1)

Publication Number Publication Date
WO2019047022A1 true WO2019047022A1 (en) 2019-03-14

Family

ID=65633616

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/100566 Ceased WO2019047022A1 (en) 2017-09-05 2017-09-05 Wifi sharing method, mobile terminal, and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN111316684A (en)
WO (1) WO2019047022A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113993103A (en) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 Network automatic interconnection method for vehicle-mounted terminal

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114173323A (en) * 2020-08-21 2022-03-11 中芯未来(北京)科技有限公司 Fishing WiFi detection method based on combination of terminal and cloud

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618905A (en) * 2015-03-09 2015-05-13 广东欧珀移动通信有限公司 WIFI hotspot sharing method and mobile terminal
US20170094054A1 (en) * 2015-08-03 2017-03-30 Huizhou Tcl Mobile Communication Co., Ltd Methods of sharing a wifi hotspot and associated electronic devices
CN106936604A (en) * 2017-03-10 2017-07-07 南京航空航天大学 A mobile device sharing network traffic system and method thereof

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104105170A (en) * 2014-08-04 2014-10-15 上海斐讯数据通信技术有限公司 Connection method and connection system for WiFi protected setup scanning of dual-band router
CN105307242A (en) * 2015-11-13 2016-02-03 魅族科技(中国)有限公司 Wi-Fi network application method and terminal
CN106851642A (en) * 2017-02-16 2017-06-13 深圳市欣博跃电子有限公司 Wireless networking authorization method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104618905A (en) * 2015-03-09 2015-05-13 广东欧珀移动通信有限公司 WIFI hotspot sharing method and mobile terminal
US20170094054A1 (en) * 2015-08-03 2017-03-30 Huizhou Tcl Mobile Communication Co., Ltd Methods of sharing a wifi hotspot and associated electronic devices
CN106936604A (en) * 2017-03-10 2017-07-07 南京航空航天大学 A mobile device sharing network traffic system and method thereof

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113993103A (en) * 2021-10-22 2022-01-28 安徽江淮汽车集团股份有限公司 Network automatic interconnection method for vehicle-mounted terminal
CN113993103B (en) * 2021-10-22 2024-01-19 安徽江淮汽车集团股份有限公司 Network automatic interconnection method for vehicle-mounted terminal

Also Published As

Publication number Publication date
CN111316684A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
WO2014030889A1 (en) Method and apparatus for sharing content
WO2020224246A1 (en) Block chain-based data management method and apparatus, device and storage medium
WO2014200240A1 (en) Method and apparatus for registering wireless device in wireless communication system
WO2019144738A1 (en) Financial service verification method, apparatus and device, and computer storage medium
WO2015020360A1 (en) Method and device for registering and certifying device in wireless communication system
WO2015108330A1 (en) Electronic device for controlling an external device using a number and method thereof
WO2015072783A1 (en) Method and apparatus for connecting communication of electronic devices
WO2018233352A1 (en) Data transmission method, device, terminal and computer readable storage medium
WO2018166099A1 (en) Information leakage detection method and device, server, and computer-readable storage medium
WO2017119548A1 (en) Security-reinforced user authentication method
WO2020042464A1 (en) Data interaction method, apparatus and device, and readable storage medium
WO2020091525A1 (en) Payment method using biometric authentication and electronic device therefor
WO2012099402A2 (en) Method and apparatus for phone communication using home network
WO2020253120A1 (en) Webpage registration method, system and device, and computer storage medium
WO2020027461A1 (en) Electronic device and emergency call processing method in electronic device
WO2019194427A1 (en) Electronic device for managing application relating to key of external electronic device, and operating method of electronic device
WO2020171466A1 (en) Electronic device, and authentication method in electronic device
EP3097743A1 (en) Electronic device for controlling an external device using a number and method thereof
WO2019066521A1 (en) Electronic device and method of controlling electronic device
WO2023128341A1 (en) Method and system for fraudulent transaction detection using homomorphically encrypted data
WO2015046954A1 (en) Apparatus and method for accessing electronic device having hot spot function
WO2021056833A1 (en) Private information protection method and device for private contact, and readable storage medium
WO2017111483A1 (en) Biometric data-based authentication device, control server and application server linked to same, and method for operating same
WO2019047022A1 (en) Wifi sharing method, mobile terminal, and computer readable storage medium
WO2020138806A1 (en) Electronic apparatus and control method thereof

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17924497

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17924497

Country of ref document: EP

Kind code of ref document: A1