WO2019047022A1 - Wifi共享方法、移动终端及计算机可读存储介质 - Google Patents
Wifi共享方法、移动终端及计算机可读存储介质 Download PDFInfo
- Publication number
- WO2019047022A1 WO2019047022A1 PCT/CN2017/100566 CN2017100566W WO2019047022A1 WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1 CN 2017100566 W CN2017100566 W CN 2017100566W WO 2019047022 A1 WO2019047022 A1 WO 2019047022A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- wireless terminal
- wifi
- connection
- fingerprint
- wifi sharing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Definitions
- the present invention relates to the field of wireless network technologies, and in particular, to a WIFI sharing method, a mobile terminal, and a computer readable storage medium.
- WIFI networks basically support WIFI networks.
- the commonly used WIFI network is shared by means of a password.
- the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is allowed to establish a connection with the WIFI network; if the password is incorrect, then Refused to connect.
- the main purpose of the present invention is to provide a WIFI sharing method, a terminal, and a computer readable storage medium, which are intended to solve the technical problem that a shared WIFI is easily broken by an illegal user.
- the present invention provides a WIFI sharing method, where the WIFI sharing method includes the following steps:
- the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
- connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
- the wireless terminal has connection rights, establish a connection with the wireless terminal.
- the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
- the method before the step of starting the hotspot sharing function and starting the timing when the WIFI sharing instruction is received, the method further includes:
- the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
- the method further includes:
- the method further includes:
- the method further includes:
- the corresponding traffic usage abnormality information is output, and the traffic usage abnormality information includes the device identification information of the wireless terminal.
- the method further includes:
- the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
- the method further includes:
- connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
- the present invention further provides a WIFI sharing terminal, where the WIFI sharing terminal includes a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor, When the WIFI sharing program is executed by the processor, the following steps are implemented:
- the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
- connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
- the wireless terminal has connection rights, establish a connection with the wireless terminal.
- the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
- the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
- the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
- the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
- connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
- the present invention further provides a computer readable storage medium, where the WIFI sharing program is stored, wherein when the WIFI sharing program is executed by a processor, the WIFI as described above is implemented. The steps to share the method.
- the invention starts the WIFI hotspot sharing function when receiving the WIFI sharing instruction, and starts timing; if receiving the connection request sent by the wireless terminal within the preset connection time, determining the location according to the fingerprint information included in the connection request Whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establish a connection with the wireless terminal.
- the WIFI sharing terminal of the present invention verifies the identity of the WIFI accessor by combining the sending time of the connection request and the fingerprint information, and accesses the WIFI when the request sending time and the fingerprint information of the WIFI accessor satisfy the requirements.
- the connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
- FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal according to an embodiment of the present invention
- FIG. 2 is a schematic flowchart of a first embodiment of a WIFI sharing method according to the present invention
- FIG. 3 is a schematic flowchart of a second embodiment of a WIFI sharing method according to the present invention.
- FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
- the main idea of the solution of the embodiment of the present invention is: when receiving the WIFI sharing instruction, the WIFI hotspot sharing function is started, and the timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the connection request.
- the fingerprint information included therein determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
- the WIFI sharing method in the embodiment of the present invention is mainly applied to a WIFI sharing terminal, and the WIFI sharing terminal can be implemented in multiple manners.
- the terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
- FIG. 1 is a schematic structural diagram of hardware of a WIFI sharing terminal involved in an embodiment of the present invention.
- the WIFI sharing terminal may include a processor 1001 (for example, a CPU), and a communication bus. 1002, user interface 1003, network interface 1004, memory 1005.
- the communication bus 1002 is configured to implement connection communication between the components; the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard); the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
- the user interface 1003 may include a fingerprint collector (fingerprint sensor), a display (Display), an input unit such as a keyboard (Keyboard);
- the network interface 1004 may optionally Including standard wired interface, wireless interface (such as WI-FI interface); memory 1005 can be high-speed RAM memory or stable memory (non-volatile Alternatively, the memory 1005 may alternatively be a storage device independent of the processor 1001 described above.
- the mobile terminal may further include a camera (front camera), a flash (front flash), and RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
- sensors such as light sensors, motion sensors, and other sensors.
- the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor can adjust the brightness of the display according to the brightness of the ambient light, and the proximity sensor can close the display and/or according to the distance between the photosensitive device and the reference object.
- the gravity acceleration sensor can detect the magnitude of acceleration in each direction (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
- the mobile terminal can also be equipped with other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. No longer.
- FIG. 1 does not constitute a limitation of the WIFI sharing terminal, and may include more or less components than those illustrated, or combine some components, or different component arrangements.
- the memory 1005 as a computer readable storage medium of FIG. 1 can include an operating system, a network communication module, and a WIFI sharing program.
- the network communication module is mainly used to connect to a server for data communication with the server; and the processor 1001 can call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
- connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
- the wireless terminal has connection rights, establish a connection with the wireless terminal.
- the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
- processor 1001 may also call the WIFI sharing program stored in the memory 1005 and perform the following operations:
- connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
- the invention provides a WIFI sharing method.
- FIG. 2 is a schematic flowchart diagram of a first embodiment of a WIFI sharing method according to the present invention.
- the method for sharing a WIFI terminal includes the following steps:
- Step S10 when receiving the WIFI sharing instruction, start the WIFI hotspot sharing function, and start timing
- WIFI networks basically support WIFI networks.
- the commonly used WIFI network is shared by means of a password.
- the user When the user connects to the WIFI network, the user needs to input a fixed WIFI password on the mobile terminal. If the password is correct, the mobile terminal is connected to the WIFI network; if the password is incorrect, then Refused to connect.
- this method of sharing WIFI by password has certain security problems. It is easy for an illegal user to decipher the WIFI password through a cracking software such as a WIFI master key, thereby connecting to the WIFI network without the permission of the WIFI provider.
- the use of network resources brings loss of data traffic to WIFI providers and reduces network security.
- a WIFI sharing method which verifies the access authority of the access terminal by means of fingerprint verification, thereby effectively preventing the WIFI network from being maliciously cracked by an illegal user, thereby improving the security of the WIFI network.
- the WIFI sharing method in this embodiment is applied to a WIFI sharing terminal, and the WIFI sharing terminal has a WIFI hotspot function, and can provide a WIFI network (hotspot) for surrounding wireless terminals.
- the WIFI sharing terminal may be a mobile terminal such as a mobile phone, a tablet computer, a palmtop computer, a portable media player, a wearable device, a smart bracelet, or a fixed terminal such as a digital TV or a PC terminal.
- a mobile phone will be taken as an example for description.
- WIFI provides the user (hereinafter referred to as the user) mobile phone with WIFI hotspot sharing function; at this time, WIFI provides users to provide WIFI network (hotspot) to friends through their own mobile phones (hereinafter referred to as connected users), so that the tablet connected to the user (Of course, it can also be a wireless terminal such as a mobile phone, a laptop computer, a smart bracelet, etc.) can access the Internet through the WIFI network; at this time, the user will click the WIFI sharing option on the system setting page of the mobile phone to trigger the WIFI sharing instruction;
- the WIFI sharing instruction may also be triggered by inputting the instruction text or instruction code corresponding to the WIFI sharing instruction by means of text input; of course, the WIFI sharing instruction may be triggered by voice input.
- the mobile phone When receiving the WIFI sharing instruction, the mobile phone will open the WIFI hotspot sharing function according to the WIFI sharing instruction, and call the wireless signal transmitting module in the mobile phone to transmit a corresponding wireless signal, so that the wireless terminal in the wireless signal range can search. To the wireless signal.
- the user's mobile phone starts the WIFI hotspot sharing function, it will automatically start timing to record the sharing duration of the WIFI hotspot.
- Step S20 If the connection request sent by the wireless terminal is received within the preset connection time, determine whether the wireless terminal has the connection permission according to the fingerprint information included in the connection request.
- the connected user when the user's mobile phone is provided to transmit a wireless signal, the connected user can search for the wireless signal on the tablet computer. At this time, the connected user can operate on the tablet, select the WIFI network corresponding to the wireless signal to connect, and trigger the corresponding connection instruction; when receiving the connection instruction of the connected user, the tablet computer displays the fingerprint input information, prompting the connection.
- the user enters fingerprint data; the connected user can input fingerprint data according to the information in the fingerprint sensing area of the tablet (or an external fingerprint sensing device); when receiving the fingerprint data, the tablet computer generates a corresponding connection according to the fingerprint data. And requesting, and sending the connection request to the mobile phone of the providing user, wherein the connection request includes fingerprint information corresponding to the fingerprint data.
- the user's mobile phone When receiving the connection request, the user's mobile phone first obtains the current time information, and calculates a waiting time from the start of the WIFI hotspot sharing function to the reception of the connection request; if the waiting time is greater than the preset connection time , the phone will directly reject the connection request from the tablet and return the connection rejection information to the tablet.
- the preset connection time may be preset by the providing user, which may be understood as a secure connection time.
- the mobile phone when the mobile phone initiates the WIFI hotspot sharing function, other wireless terminals may send a connection request to the mobile phone; If a legitimate user uses a wireless terminal to apply for connection to WIFI normally, it should request to establish a connection with the mobile phone within a certain period of time when the mobile phone starts the WIFI hotspot sharing function. If the illegal user connects to the WIFI through brute force, it often happens on the mobile phone. WIFI hotspot sharing function after a while. Therefore, in this embodiment, the mobile phone of the user is started to start timing when the WIFI hotspot sharing function is started. If the connection request sent by the tablet is received after the preset connection time is passed, the mobile phone directly rejects the tablet. Establish a connection and return a connection reject message to the tablet.
- the phone receives a connection request from the tablet within the preset connection time, the phone will also need to further verify the connection rights of the tablet to determine whether to establish a connection with the tablet. Specifically, the mobile phone parses the connection request, obtains the fingerprint information included in the connection request, and determines whether the tablet computer has the connection right according to the fingerprint information. If it is determined according to the fingerprint information that the tablet computer has the connection right, the process goes to step S30; if it is determined that the tablet computer does not have the connection right, the mobile phone returns the rejection connection information to the tablet computer.
- the process of determining, by the mobile phone, whether the tablet computer has the connection permission according to the fingerprint information may be: when the mobile phone acquires the fingerprint information, the mobile phone database is queried, and the fingerprint information is compared with the preset valid fingerprint in the database. Yes, it is determined whether the fingerprint information matches the preset valid fingerprint.
- the preset valid fingerprint is to provide the user's own fingerprint; that is, the mobile phone will compare the fingerprint information in the connection request sent by the tablet with the fingerprint of the providing user, if the two match, then the description
- the fingerprint information sent by the tablet is derived from the user, and it is considered that the connection operation of the tablet is authorized by the user, and since the connection request is received within the preset connection time, the description is provided.
- the user activates the WIFI hotspot sharing function of the mobile phone, the user inputs the fingerprint on the tablet connected to the user, and authorizes the connected user to use the shared WIFI. In this case, the mobile phone will consider that the tablet has the connection right.
- the user may be provided to enter in advance. Specifically, the user can click the effective fingerprint setting option on the system setting page of the mobile phone to trigger the effective fingerprint setting instruction; of course, the user can also trigger the input of the effective fingerprint setting instruction corresponding to the instruction text or the instruction code by means of text input.
- a valid fingerprint setting instruction of course, it is also possible to trigger a valid fingerprint setting instruction by means of voice input.
- the mobile phone receives the valid fingerprint setting instruction that provides the user trigger, it starts to enter the effective fingerprint setting mode; at this time, the mobile phone will output a prompt message to prompt the user to place the finger on the fingerprint collector of the mobile phone (or external fingerprint collection).
- the device is configured to input fingerprint data, wherein the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
- the prompt information may be outputted by voice, or may be related information displayed on the screen of the mobile phone.
- Step S30 If the wireless terminal has a connection right, establish a connection with the wireless terminal.
- the user's mobile phone is determined according to the fingerprint information to determine that the tablet computer has the connection right, the user of the tablet computer is considered to be a legitimate user, and the mobile phone allows the tablet computer to access the WIFI network and establish a network connection with the tablet computer. And return the corresponding connection success information to the tablet.
- the WIFI hotspot sharing function when the WIFI sharing instruction is received, the WIFI hotspot sharing function is started, and timing is started; if the connection request sent by the wireless terminal is received within the preset connection time, according to the fingerprint included in the connection request The information determines whether the wireless terminal has connection authority; if the wireless terminal has connection authority, establishes a connection with the wireless terminal.
- the WIFI sharing terminal in this embodiment combines the sending time of the connection request with the fingerprint information to verify the identity of the WIFI accessor, and when the WIFI accessor's request sending time and fingerprint information meet the requirements, the WIFI access is performed. The connection is established, thereby effectively avoiding the loss caused by the WIFI network to the WIFI provider after being maliciously cracked by the illegal user, thereby improving the network security.
- FIG. 3 is a schematic flowchart diagram of a second embodiment of a WIFI sharing method according to the present invention.
- step S30 the method further includes:
- Step S40 Send a fingerprint information clearing instruction to the wireless terminal, so that the wireless terminal clears the fingerprint information in the cache according to the fingerprint information clearing instruction.
- a fingerprint information clearing command will also be sent to the tablet to clear the fingerprint information that the tablet uses for authentication.
- the tablet computer queries the cache information according to the fingerprint information clearing instruction to obtain the corresponding fingerprint information, and clears the fingerprint information from the cache.
- FIG. 4 is a schematic flowchart diagram of a third embodiment of a WIFI sharing method according to the present invention.
- the method further includes:
- Step S50 Obtain device identification information of the wireless terminal, and record network usage of the wireless terminal.
- the network usage of the tablet computer can also be monitored.
- the mobile phone obtains device identification information of the tablet, and the device identification information may include one or more of a device ID, a MAC address, and an IP address of the tablet in the WIFI network.
- the mobile phone also monitors the network usage of the tablet in real time and records the health content in the web log, and the recorded content may include the connection duration and data of the tablet. Transmission traffic, instantaneous transmission rate, website access records, etc., of course, may also include other content.
- the content of the monitoring and recording may also be set by the providing user, and the mobile phone monitors and records according to the setting of the providing user.
- the mobile phone may also take corresponding measures. Specifically, if the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic (for which the normal traffic can be preset by the user), the mobile phone considers that the tablet computer is abnormally using the network at this time, and the mobile phone will Outputs the corresponding traffic usage exception information, and the traffic usage abnormality information includes the device identification information of the tablet, so that the providing user can learn that the traffic usage of the tablet at this time is abnormal according to the information; wherein abnormal information is used for the traffic, It can be output in the form of voice, or it can display relevant information on the screen of the mobile phone.
- the preset normal traffic for which the normal traffic can be preset by the user
- the mobile phone detects that the data transmission traffic of the tablet computer is greater than the preset normal traffic, and can directly disconnect the connection with the tablet computer, thereby avoiding the use of abnormal traffic to the user, thereby contributing to the improvement of network security. Sex.
- the preset permission time can be set in the mobile phone.
- the mobile phone can automatically disconnect from the tablet computer, so as to prevent the tablet computer from connecting for too long traffic for a long time. .
- the present invention also provides a WIFI sharing terminal.
- the WIFI sharing terminal of the present invention comprises a processor, a memory, and a WIFI sharing program stored on the memory and executable by the processor.
- the WIFI sharing program is executed by the processor, the following steps are implemented:
- the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
- connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
- the wireless terminal has connection rights, establish a connection with the wireless terminal.
- the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
- the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
- the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
- the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
- connection request sent by the wireless terminal is received when the preset connection time is passed, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
- the present invention also provides a computer readable storage medium.
- the WIFI sharing program is stored on the computer readable storage medium of the present invention, wherein when the WIFI sharing program is executed by the processor, the following steps are implemented:
- the WIFI hotspot sharing function When receiving the WIFI sharing instruction, the WIFI hotspot sharing function is turned on, and the timing is started;
- connection request sent by the wireless terminal is received within the preset connection time, determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right;
- the wireless terminal has connection rights, establish a connection with the wireless terminal.
- the step of determining, according to the fingerprint information included in the connection request, whether the wireless terminal has a connection right includes:
- the fingerprint of the user is acquired by the fingerprint collector, and an effective fingerprint is set according to the fingerprint data.
- the corresponding traffic usage abnormality information is output, where the traffic usage abnormality information includes the device identification information of the wireless terminal.
- the wireless terminal When the preset permission time elapses, the wireless terminal is disconnected.
- connection request sent by the wireless terminal is received when the preset connection time passes, the connection with the wireless terminal is refused, and the connection rejection information is returned to the wireless terminal.
- portions of the technical solution of the present invention that contribute substantially or to the prior art may be embodied in the form of a software product stored in a storage medium (such as a ROM/RAM as described above). , a disk, an optical disk, including a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- a terminal device which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Abstract
本发明公开了一种WIFI共享方法,该方法包括:在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。本发明还公开了一种WIFI共享终端和计算机可读存储介质。本发明结合连接请求的发送时间和指纹信息对WIFI接入者的身份进行验证,当WIFI接入者的请求发送时间和指纹信息均满足要求时方与WIFI接入者建立连接,从而有效避免WIFI网络被非法用户恶意破解后给WIFI提供者带来损失,提高了网络安全性。
Description
技术领域
本发明涉及无线网络技术领域,尤其涉及一种WIFI共享方法、移动终端及计算机可读存储介质。
背景技术
目前的移动终端基本都支持WIFI网络。常用的WIFI网络是通过密码的方式进行共享的,用户在连接WIFI网络时,需要在移动终端上输入固定WIFI的密码,若密码正确,则允许移动终端与WIFI网络建立连接;若密码错误,则拒绝连接。
但这种通过密码进行WIFI共享的方法存在一定的安全性问题,非法用户很容易通过WIFI万能钥匙之类的破解软件对WIFI密码进行破译,从而在未经WIFI提供者许可的情况下连接WIFI网络使用网络资源,给WIFI提供者带来了数据流量损失,降低了网络安全性。
发明内容
本发明的主要目的在于提供一种WIFI共享方法、终端及计算机可读存储介质,旨在解决共享WIFI容易被非法用户破解连接的技术问题。
为实现上述目的,本发明提供一种WIFI共享方法,所述WIFI共享方法包括以下步骤:
在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
若所述无线终端具有连接权限,则与所述无线终端建立连接。
可选地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:
查询数据库,获取预设有效指纹;
判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
可选地,所述在接收到WIFI共享指令时,开启热点共享功能,并开始计时的步骤之前,还包括:
在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹。
可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:
向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:
获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。
可选地,所述获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录的步骤之后,还包括:
若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息。
可选地,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:
在经过预设许可时间时,与所述无线终端断开连接。
可选地,所述在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时的步骤之后,还包括:
若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。
此外,为实现上述目的,本发明还提供一种WIFI共享终端,所述WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现以下步骤:
在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
若所述无线终端具有连接权限,则与所述无线终端建立连接。
可选地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:
查询数据库,获取预设有效指纹;
判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
在经过预设许可时间时,与所述无线终端断开连接。
可选地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。
此外,为实现上述目的,本发明还提供一种计算机可读存储介质,所述计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现如上述的WIFI共享方法的步骤。
本发明通过在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。通过以上方式,本发明的WIFI共享终端结合连接请求的发送时间和指纹信息对WIFI接入者的身份进行验证,当WIFI接入者的请求发送时间和指纹信息均满足要求时方与WIFI接入者建立连接,从而有效避免WIFI网络被非法用户恶意破解后给WIFI提供者带来的损失,提高了网络安全性。
附图说明
图1是本发明实施例方案涉及的WIFI共享终端的硬件结构示意图;
图2为本发明WIFI共享方法第一实施例的流程示意图;
图3为本发明WIFI共享方法第二实施例的流程示意图;
图4为本发明WIFI共享方法第三实施例的流程示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例方案的主要思路是:在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。
本发明实施例涉及的WIFI共享方法主要应用于WIFI共享终端,该WIFI共享终端可以通过多种方式实现。例如,该终端可以是诸如手机、平板电脑、掌上电脑、便捷式媒体播放器、可穿戴设备、智能手环等移动终端,还可以是诸如数字TV、PC终端等固定终端。
后续描述中将以手机为例进行说明,本领域技术人员将理解的是,除了特别用于移动目的的元件之外,根据本发明的实施方式的构造也能够应用于其它类型的终端。
参照图1,图1为本发明实施例方案中涉及的WIFI共享终端的硬件结构示意图。本发明实施例中,WIFI共享终端可以包括处理器1001(例如CPU),通信总线
1002,用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信;用户接口1003可以包括指纹采集器(指纹传感器)、显示屏(Display)、输入单元比如键盘(Keyboard);网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口);存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile
memory),例如磁盘存储器,存储器1005可选的还可以是独立于前述处理器1001的存储装置。
可选地,该移动终端还可以包括摄像头(前置摄像头)、闪光灯(前置闪光灯)、RF(Radio
Frequency,射频)电路,传感器、音频电路、WiFi模块等等。其中,传感器比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示屏的亮度,接近传感器可根据感光设备与参照物的距离,关闭显示屏和/或背光。作为运动传感器的一种,重力加速度传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别终端姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;当然,该移动终端还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
本领域技术人员可以理解,图1中示出的硬件结构并不构成对WIFI共享终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
继续参照图1,图1中作为一种计算机可读存储介质的存储器1005可以包括操作系统、网络通信模块以及WIFI共享程序。
在图1中,网络通信模块主要用于连接服务器,与服务器进行数据通信;而处理器1001可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
若所述无线终端具有连接权限,则与所述无线终端建立连接。
进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:
查询数据库,获取预设有效指纹;
判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
在经过预设许可时间时,与所述无线终端断开连接。
进一步地,处理器1001还可以调用存储器1005中存储的WIFI共享程序,并执行以下操作:
若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。
基于上述WIFI共享终端的硬件结构,提出本发明WIFI共享方法的各个实施例。
本发明提供一种WIFI共享方法。
参照图2,图2为本发明WIFI共享方法第一实施例的流程示意图。
本实施例中,所述WIFI共享终端方法包括以下步骤:
步骤S10,在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
目前的移动终端基本都支持WIFI网络。常用的WIFI网络是通过密码的方式进行共享的,用户在连接WIFI网络时,需要在移动终端上输入固定WIFI的密码,若密码正确,则运行移动终端与WIFI网络建立连接;若密码错误,则拒绝连接。但这种通过密码进行WIFI共享的方法存在一定的安全性问题,非法用户很容易通过WIFI万能钥匙之类的破解软件对WIFI密码进行破译,从而在未经WIFI提供者许可的情况下连接WIFI网络使用网络资源,给WIFI提供者带来了数据流量损失,降低了网络安全性。
基于上述问题,本实施例中提出一种WIFI共享方法,通过指纹验证的方式对接入终端的权限进行验证,有效避免WIFI网络被非法用户恶意破解,提高了WIFI网络的安全性。
具体地,本实施例中的WIFI共享方法应用于WIFI共享终端,该WIFI共享终端具有WIFI热点功能,可以为周围的无线终端提供WIFI网络(热点)。其中,该WIFI共享终端可以是诸如手机、平板电脑、掌上电脑、便捷式媒体播放器、可穿戴设备、智能手环等移动终端,还可以是诸如数字TV、PC终端等固定终端。本实施例中将以手机为例进行说明。WIFI提供用户(后续简称提供用户)的手机具有WIFI热点共享功能;此时WIFI提供用户希望通过自己的手机提供WIFI网络(热点)给朋友(后续称为连接用户),以使连接用户的平板电脑(当然还可以是手机、笔记本电脑、智能手环等无线终端)可通过该WIFI网络进行上网;此时提供用户将在自己手机的系统设置页面点击WIFI共享选项,触发WIFI共享指令;当然提供用户也可以通过文字输入的方式,通过输入WIFI共享指令对应的指令文字或指令代码,触发WIFI共享指令;当然还可以是通过语音输入的方式触发WIFI共享指令。手机在接收到该WIFI共享指令时,将会根据该WIFI共享指令开启WIFI热点共享功能,调用手机中的无线信号发射模块发射出对应的无线信号,从而使得该无线信号范围内的无线终端可以搜索到该无线信号。提供用户的手机在启动WIFI热点共享功能时,还将自动开始计时,以记录WIFI热点的共享时长。
步骤S20,若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
本实施例中,提供用户的手机发射出无线信号时,连接用户即可在其平板电脑上搜索到该无线信号。此时连接用户可在平板电脑上进行操作,选择该无线信号对应的WIFI网络进行连接,触发相应的连接指令;平板电脑在接收到连接用户的连接指令时,将会显示指纹录入信息,提示连接用户录入指纹数据;连接用户可根据该信息在平板电脑的指纹感应区(或是外接的指纹感应设备)录入指纹数据;平板电脑在接收到该指纹数据时,会根据该指纹数据生成对应的连接请求,并向提供用户的手机发送该连接请求,其中该连接请求中包括了该指纹数据对应的指纹信息。
提供用户的手机在接收到该连接请求时,首先会获取当前时间信息,计算出从启动WIFI热点共享功能到接收到该连接请求为止,一共经过的等待时间;若该等待时间大于预设连接时间,则手机会直接拒绝该平板电脑的连接请求,并向平板电脑返回拒绝连接信息。其中,该预设连接时间可以是由提供用户预先设置的,可理解为一个安全连接时间;本实施例中在手机启动WIFI热点共享功能时,其它的无线终端即可向手机发送连接请求;若是合法用户使用无线终端正常申请连接WIFI,则应该是在手机启动WIFI热点共享功能的一定时间内即请求与手机建立连接,而若是非法用户通过暴力破解的方式连接WIFI,则往往是发生在手机启动WIFI热点共享功能的一段时间之后。因此本实施例中,提供用户的手机在启动WIFI热点共享功能时即开始计时,如果是在经过了预设连接时间时才接收到平板电脑发送的连接请求,则手机会直接拒绝与该平板电脑建立连接,并向平板电脑返回拒绝连接信息。
另一方面,如果手机是在预设连接时间内接收到平板电脑发送的连接请求,则手机还将需要对平板电脑的连接权限进行进一步验证,从而确定是否与平板电脑建立连接。具体地,手机会对该连接请求进行解析,获取该连接请求中包括的指纹信息,并根据该指纹信息判断平板电脑是否具有连接权限。如果根据该指纹信息判断平板电脑具有连接权限,则进入步骤S30;若判断平板电脑不具有连接权限,则手机会向平板电脑返回拒绝连接信息。
进一步地,本实施例中手机根据指纹信息判断平板电脑是否具有连接权限的过程可以是这样的:手机在获取指纹信息时,将查询内存数据库,将该指纹信息与数据库中预设有效指纹进行比对,判断该指纹信息与预设有效指纹是否匹配。其中,关于该预设有效指纹,是提供用户自己的指纹;也就是说,手机将会将平板电脑发送的连接请求中的指纹信息与提供用户的指纹进行比对,如果两者匹配,则说明平板电脑发送的指纹信息正是来源于提供用户,并认为此时平板电脑的连接操作是得到了提供用户授权的,而又由于该连接请求是在预设连接时间内接收到的,则说明提供用户在启动手机的WIFI热点共享功能后,即在连接用户的平板电脑录入自己指纹,授权连接用户使用该共享WIFI,在该情况下,手机将认为平板电脑具有连接权限。
再进一步地,对于预设有效指纹,可以是有提供用户提前录入的。具体地,提供用户可以在手机的系统设置页面点击有效指纹设置选项,从而触发有效指纹设置指令;当然用户也可以通过文字输入的方式,通过输入有效指纹设置指令对应的指令文字或指令代码,触发有效指纹设置指令;当然还可以是通过语音输入的方式触发有效指纹设置指令。手机在接收到提供用户触发的有效指纹设置指令时,即开始进入有效指纹设置模式;此时手机将输出提示信息,以提示提供用户将手指置于手机的指纹采集器上(或外接的指纹采集设备),以录入指纹数据,其中提示信息可以是以语音的方式输出,也可以是在手机屏幕上显示相关的提示信息。提供用户根据提示进行操作,将手指置于手机的指纹采集器上时,手机即通过指纹采集器获取到提供用户的指纹数据,并根据该指纹数据设置有效指纹。
步骤S30,若所述无线终端具有连接权限,则与所述无线终端建立连接。
本实施例中,提供用户的手机如果根据该指纹信息判断平板电脑具有连接权限,则认为平板电脑的使用者为合法用户,此时手机允许平板电脑接入WIFI网络,与平板电脑建立网络连接,并向平板电脑返回对应的连接成功信息。
本实施例中,通过在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。通过以上方式,本实施例WIFI共享终端结合连接请求的发送时间和指纹信息对WIFI接入者的身份进行验证,当WIFI接入者的请求发送时间和指纹信息均满足要求时方与WIFI接入者建立连接,从而有效避免WIFI网络被非法用户恶意破解后给WIFI提供者带来的损失,提高了网络安全性。
参照图3,图3为本发明WIFI共享方法第二实施例的流程示意图。
基于上述图2所示实施例,步骤S30之后,还包括:
步骤S40,向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
本实施例中,为了防止连接用户利用平板电脑中的指纹信息(提供用户的指纹)进行二次连接,同时也避免该平板中的指纹信息被其它非法用户窃取,手机与平板电脑建立连接时,还将向平板电脑发送指纹信息清除指令,以清除平板电脑用于验证的指纹信息。平板电脑在接收到手机发送的指纹信息清除指令时,将根据该指纹信息清除指令在缓存中进行查询,以获取到对应的指纹信息,并将该指纹信息从缓存中清除。在平板电脑断开与手机的连接后,若想重新进行连接,则此时需要重新获得提供用户的指纹信息;即需要重新获得提供用户的授权,才可再次与提供用户的手机进行连接,从而进一步提高了网络安全性。
参照图4,图4为本发明WIFI共享方法第三实施例的流程示意图。
基于上述图2或图3所示实施例,步骤S30之后,还包括:
步骤S50,获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。
本实施例中,手机在与平板电脑建立连接后,还可以对平板电脑的网络使用情况进行监控。具体地,手机在与平板电脑建立连接后,将会获取该平板电脑的设备标识信息,该设备标识信息可包括平板电脑在WIFI网络中的设备ID、MAC地址、IP地址中的一种或多种,当然还可以包括其它的设备标识信息;同时,手机还会对平板电脑的网络使用情况进行实时监控、并将健康内容记录到网络日志中,记录的内容可以包括平板电脑的连接时长、数据传输流量、瞬时传输速率、网站访问记录等,当然还可以包括其它的内容。而在具体实施中,监控和记录的内容也可以是由提供用户自己进行设置,手机则根据提供用户的设置进行监控和记录。
进一步地,手机在对平板电脑的网络使用情况进行监控的过程中,若发现平板电脑对网络的使用异常,还可以采取相应的处理措施。具体地,若手机检测到平板电脑的数据传输流量大于预设正常流量(对于该预设正常流量可以由用户进行预先设置),则手机会认为平板电脑此时正异常使用网络,此时手机会输出对应的流量使用异常信息,该流量使用异常信息中包括平板电脑的设备标识信息,从而使得提供用户可根据该信息了解到平板电脑此时的流量使用情况异常;其中对于该流量使用异常信息,可以是以语音的方式输出,也可以是在手机屏幕上显示相关的信息。当然,除了输出语音提醒,手机在检测到平板电脑的数据传输流量大于预设正常流量,还可以直接断开与平板电脑的连接,避免流量使用异常给提供用户带来损失,有利于提高网络安全性。
再进一步地,手机中还可以设置预设许可时间,在平板电脑的连接时长经过该预设许可时间时,手机可自动断开与平板电脑的连接,避免平板电脑长时间连接使用过多的流量。
此外,本发明还提供一种WIFI共享终端。
本发明WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现以下步骤:
在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
若所述无线终端具有连接权限,则与所述无线终端建立连接。
进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:
查询数据库,获取预设有效指纹;
判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
在经过预设许可时间时,与所述无线终端断开连接。
进一步地,所述WIFI共享程序被所述处理器执行时,还实现以下步骤:
若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息
其中,所述WIFI共享程序被执行时所实现的方法可参照本发明WIFI共享方法的各个实施例,此处不再赘述。
此外,本发明还提供一种计算机可读存储介质。
本发明计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现以下步骤:
在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;
若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;
若所述无线终端具有连接权限,则与所述无线终端建立连接。
进一步地,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:
查询数据库,获取预设有效指纹;
判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
在经过预设许可时间时,与所述无线终端断开连接。
进一步地,所述WIFI共享程序被处理器执行时,还实现以下步骤:
若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。
其中,所述WIFI共享程序被执行时所实现的方法可参照本发明WIFI共享方法的各个实施例,此处不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上所述的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例所述的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。
Claims (10)
- 一种WIFI共享方法,其特征在于,所述WIFI共享方法包括以下步骤:在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时;若在预设连接时间内接收到无线终端发送的连接请求,则根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限;若所述无线终端具有连接权限,则与所述无线终端建立连接。
- 如权利要求1所述的WIFI共享方法,其特征在于,所述根据所述连接请求中包括的指纹信息判断所述无线终端是否具有连接权限的步骤包括:查询数据库,获取预设有效指纹;判断所述连接请求中包括的指纹信息与所述预设有效指纹是否匹配,从而判断所述无线终端是否具有连接权限。
- 如权利要求2所述的WIFI共享方法,其特征在于,所述在接收到WIFI共享指令时,开启热点共享功能,并开始计时的步骤之前,还包括:在接收到有效指纹设置指令时,通过指纹采集器获取用户的指纹,并根据所述指纹数据设置有效指纹。
- 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:向所述无线终端发送指纹信息清除指令,以使所述无线终端根据所述指纹信息清除指令清除缓存中的所述指纹信息。
- 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录。
- 如权利要求5所述的WIFI共享方法,其特征在于,所述获取所述无线终端的设备标识信息,并对所述无线终端的网络使用情况进行记录的步骤之后,还包括:若检测到所述无线终端的数据传输流量大于预设正常流量,则输出对应的流量使用异常信息,所述流量使用异常信息中包括所述无线终端的设备标识信息。
- 如权利要求1所述的WIFI共享方法,其特征在于,所述若所述无线终端具有连接权限,则与所述无线终端建立连接的步骤之后,还包括:在经过预设许可时间时,与所述无线终端断开连接。
- 如权利要求1所述的WIFI共享方法,其特征在于,所述在接收到WIFI共享指令时,开启WIFI热点共享功能,并开始计时的步骤之后,还包括:若在经过预设连接时间时接收到无线终端发送的连接请求,则拒绝与所述无线终端建立连接,并向所述无线终端返回拒绝连接信息。
- 一种WIFI共享终端,其特征在于,所述WIFI共享终端包括处理器、存储器、以及存储在所述存储器上并可被所述处理器执行的WIFI共享程序,所述WIFI共享程序被所述处理器执行时,实现如权利要求1至8中任一项所述的WIFI共享方法的步骤。
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质上存储有WIFI共享程序,其中所述WIFI共享程序被处理器执行时,实现如权利要求1至8中任一项所述的WIFI共享方法的步骤。
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201780096577.9A CN111316684A (zh) | 2017-09-05 | 2017-09-05 | Wifi共享方法、移动终端及计算机可读存储介质 |
| PCT/CN2017/100566 WO2019047022A1 (zh) | 2017-09-05 | 2017-09-05 | Wifi共享方法、移动终端及计算机可读存储介质 |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2017/100566 WO2019047022A1 (zh) | 2017-09-05 | 2017-09-05 | Wifi共享方法、移动终端及计算机可读存储介质 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2019047022A1 true WO2019047022A1 (zh) | 2019-03-14 |
Family
ID=65633616
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2017/100566 Ceased WO2019047022A1 (zh) | 2017-09-05 | 2017-09-05 | Wifi共享方法、移动终端及计算机可读存储介质 |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN111316684A (zh) |
| WO (1) | WO2019047022A1 (zh) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113993103A (zh) * | 2021-10-22 | 2022-01-28 | 安徽江淮汽车集团股份有限公司 | 用于车载终端的网络自动互联方法 |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN114173323A (zh) * | 2020-08-21 | 2022-03-11 | 中芯未来(北京)科技有限公司 | 基于端和云结合的钓鱼WiFi检测方法 |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104618905A (zh) * | 2015-03-09 | 2015-05-13 | 广东欧珀移动通信有限公司 | Wifi热点共享方法及移动终端 |
| US20170094054A1 (en) * | 2015-08-03 | 2017-03-30 | Huizhou Tcl Mobile Communication Co., Ltd | Methods of sharing a wifi hotspot and associated electronic devices |
| CN106936604A (zh) * | 2017-03-10 | 2017-07-07 | 南京航空航天大学 | 一种移动设备共享网络流量系统及其方法 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104105170A (zh) * | 2014-08-04 | 2014-10-15 | 上海斐讯数据通信技术有限公司 | 一种双频路由器的WiFi保护设置扫描连接方法及系统 |
| CN105307242A (zh) * | 2015-11-13 | 2016-02-03 | 魅族科技(中国)有限公司 | 一种Wi-Fi网络使用方法及终端 |
| CN106851642A (zh) * | 2017-02-16 | 2017-06-13 | 深圳市欣博跃电子有限公司 | 无线上网授权方法及装置 |
-
2017
- 2017-09-05 CN CN201780096577.9A patent/CN111316684A/zh active Pending
- 2017-09-05 WO PCT/CN2017/100566 patent/WO2019047022A1/zh not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN104618905A (zh) * | 2015-03-09 | 2015-05-13 | 广东欧珀移动通信有限公司 | Wifi热点共享方法及移动终端 |
| US20170094054A1 (en) * | 2015-08-03 | 2017-03-30 | Huizhou Tcl Mobile Communication Co., Ltd | Methods of sharing a wifi hotspot and associated electronic devices |
| CN106936604A (zh) * | 2017-03-10 | 2017-07-07 | 南京航空航天大学 | 一种移动设备共享网络流量系统及其方法 |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN113993103A (zh) * | 2021-10-22 | 2022-01-28 | 安徽江淮汽车集团股份有限公司 | 用于车载终端的网络自动互联方法 |
| CN113993103B (zh) * | 2021-10-22 | 2024-01-19 | 安徽江淮汽车集团股份有限公司 | 用于车载终端的网络自动互联方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN111316684A (zh) | 2020-06-19 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2014030889A1 (en) | Method and apparatus for sharing content | |
| WO2020224246A1 (zh) | 基于区块链的数据管理方法、装置、设备和存储介质 | |
| WO2014200240A1 (en) | Method and apparatus for registering wireless device in wireless communication system | |
| WO2019144738A1 (zh) | 金融业务的验证方法、装置、设备和计算机存储介质 | |
| WO2015020360A1 (ko) | 무선 통신 시스템에서 기기 등록 및 인증을 수행하는 방법 및 장치 | |
| WO2015108330A1 (en) | Electronic device for controlling an external device using a number and method thereof | |
| WO2018233352A1 (zh) | 数据传输方法、装置、终端以及计算机可读存储介质 | |
| WO2015072783A1 (en) | Method and apparatus for connecting communication of electronic devices | |
| WO2018166099A1 (zh) | 信息泄露检测方法及装置、服务器及计算机可读存储介质 | |
| WO2017119548A1 (ko) | 보안성이 강화된 사용자 인증방법 | |
| WO2020042464A1 (zh) | 数据交互方法、装置、设备及可读存储介质 | |
| WO2020091525A1 (ko) | 생체 인증을 이용한 결제 방법 및 그 전자 장치 | |
| WO2012099402A2 (en) | Method and apparatus for phone communication using home network | |
| WO2020253120A1 (zh) | 网页注册方法、系统、设备和计算机存储介质 | |
| WO2020027461A1 (ko) | 전자 장치 및 전자 장치에서의 긴급 호 처리 방법 | |
| WO2019194427A1 (ko) | 외부 전자 장치의 키와 관련된 어플리케이션을 관리하는 전자 장치 및 전자 장치의 동작 방법 | |
| WO2020171466A1 (ko) | 전자 장치 및 전자 장치에서의 인증 방법 | |
| EP3097743A1 (en) | Electronic device for controlling an external device using a number and method thereof | |
| WO2019066521A1 (en) | ELECTRONIC DEVICE AND METHOD FOR CONTROLLING ELECTRONIC DEVICE | |
| WO2023128341A1 (ko) | 동형 암호화된 데이터를 이용한 부정 거래 탐지 방법 및 시스템 | |
| WO2015046954A1 (ko) | 핫스팟 기능이 있는 전자기기에 접속하는 방법 및 장치 | |
| WO2017111483A1 (ko) | 생체 정보 기반 인증 장치, 이와 연동하는 제어 서버 및 어플리케이션 서버, 그리고 이들의 동작 방법 | |
| WO2019047022A1 (zh) | Wifi共享方法、移动终端及计算机可读存储介质 | |
| WO2021049681A1 (ko) | 클라우드 서버를 기초로 인증을 수행하는 전자 장치 및 그 제어 방법 | |
| WO2020138806A1 (en) | Electronic apparatus and control method thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17924497 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 17924497 Country of ref document: EP Kind code of ref document: A1 |