Unlock instant, AI-driven research and patent intelligence for your innovation.

System-level WiFi cloud unlocking method

A system-level, unlocking technology, applied in wireless communication, access restrictions, electrical components, etc., can solve problems such as no way to obtain, affect user experience, and cannot obtain the system WiFi list, so as to meet the effect of individual needs

Active Publication Date: 2016-05-04
厦门众联世纪股份有限公司
View PDF9 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of mobile terminals, wireless LAN WiFi has become the standard configuration of various mobile terminals. Through this configuration, the mobile terminal can scan the nearby WiFi hotspots, use the WiFi hotspots to surf the Internet, and when the wireless LAN is started, the wireless LAN interface will display For the scanned WiFi hotspots, the user can manually connect to the scanned WiFi hotspots. If there are WiFi hotspots that have been connected to the scanned hotspots, the system can automatically connect to the WiFi hotspots. The WiFi hotspots usually have a connection password. It can prevent network snags and ensure communication security. During the WiFi connection process, for WiFi hotspots with passwords, you need to enter the password; according to the location of the mobile terminal, there may be free WiFi hotspots in the scanned WiFi hotspot list, such as: operation Commercial WiFi hotspots (China Mobile, China Telecom, China Unicom), public WiFi, commercial WiFi hotspots, etc., users usually choose to connect to free WiFi hotspots that are scanned out at will, and random selection leads to connected WiFi hotspots are usually not optimal. Affect the Internet experience; although it is a free WiFi hotspot, it usually needs to enter a password during the connection process, and the process of obtaining the password (such as: inquiry, query) will also bring inconvenience to the user and affect the user experience;
[0003] In the prior art, an application in which users provide screenshots to unlock WiFi has been developed. The realization principle of this function is: firstly, the software is configured with a character feature library containing various systems and models; The text recognition algorithm of the system WiFi page to achieve the best recognition effect; the above application guides the user to take a screenshot of the system WiFi list after the user authorizes the photo and location permissions, and after recognizing the SSID of the WiFi on the screenshot of the system WiFi list, add Go to the GPS to request unlocking from the server; the server checks whether there is any free WiFi that has been shared in the database according to the SSID and GPS information reported by the mobile terminal, and returns the query result; the above application then guides the user to copy the password according to the unlocking result. System WiFi page connection; because the mobile phone system attaches great importance to the security and privacy protection of users, it also imposes many restrictions on application developers. Various permissions, such as photo album, location, notification, etc., the above permissions are indispensable; under the established mobile phone system restrictions, in order to allow users to get the best unlocking connection experience, the above application unlocks the WiFi function for screenshots, there is no way to obtain To the data of the system WiFi list; for the function developed by the above application, although the unlocking process has been designed and developed for users better than other applications on the market, the overall implementation process is still too cumbersome, and there are many parts that affect the user experience
[0004] As for the unlocking function, there have been developed products that are unlocked in the app, and it cannot be implemented on all mobile phone system platforms due to system permissions

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] A system-level WiFi cloud unlocking method, the method is specifically as follows:

[0022] The first step is to set the description name of the system WiFi list unlock logo; through user-defined changes, complete the setting of the description name;

[0023] The second step is to create a listening thread and register a hotspot help tool. The application needs to add the developer certificate authorization application WiFi interface first. When the application starts, the registration monitoring interface of the mobile phone is called. When the system WiFi list initiates scanning, pre-connection and other actions, it will call back to the application; when the system WiFi has relevant feedback, Notify to the application for processing; when the system WiFi has an operation type that is in the WiFi list scanning notification callback; obtain the scanned hotspot list; judge whether there is a scanned list identification that is being processed, and if it is being process...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a system-level WiFi cloud unlocking method, and the method comprises the following specific steps: 1, completing the setting of a called description name; 2, building a monitoring thread, and reminding a user of the matching of a cloud password; 3, processing a WiFi unlocking application, and initializing a parameter container; 4, obtaining the current WiFi information, and carrying out the traversal of a WiFi list; 5, filtering repeated BSSIDs in the list; 6, judging whether the WiFi of the same BSSIDs in a scanned WiFi list contains local unlocked data or not: carrying out direct writing-in if the WiFi of the same BSSIDs in the scanned WiFi list contains local unlocked data, or else, carrying out the next step of unlocking application; 7, carrying out the unlocking application for an encrypted hot spot, and enabling the successfully-unlocked data to be stored locally; 8, finding a password from a list according to an SSID of a returned password, and setting the password; 9, carrying out the updating of data in a front-end list. The method can achieve the WiFi no-sensing unlocking to access to a network. The method supports that a user customizes and changes the description name, and meets the personalized demands of the user.

Description

technical field [0001] The invention relates to an unlocking method, in particular to a system-level WiFi cloud unlocking method, and belongs to the technical field of wireless network communication. Background technique [0002] With the development of mobile terminals, wireless LAN WiFi has become the standard configuration of various mobile terminals. Through this configuration, the mobile terminal can scan the nearby WiFi hotspots, use the WiFi hotspots to surf the Internet, and when the wireless LAN is started, the wireless LAN interface will display For the scanned WiFi hotspots, the user can manually connect to the scanned WiFi hotspots. If there are WiFi hotspots that have been connected to the scanned hotspots, the system can automatically connect to the WiFi hotspots. The WiFi hotspots usually have a connection password. It can prevent network snags and ensure communication security. During the WiFi connection process, for WiFi hotspots with passwords, you need to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/16
Inventor 罗世辉胡晓芳郭路凯余志杰
Owner 厦门众联世纪股份有限公司