CN106851648B - A method, device and system for sharing access information of wireless access points - Google Patents
A method, device and system for sharing access information of wireless access points Download PDFInfo
- Publication number
- CN106851648B CN106851648B CN201710087036.1A CN201710087036A CN106851648B CN 106851648 B CN106851648 B CN 106851648B CN 201710087036 A CN201710087036 A CN 201710087036A CN 106851648 B CN106851648 B CN 106851648B
- Authority
- CN
- China
- Prior art keywords
- information
- access point
- user equipment
- access information
- wireless access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012795 verification Methods 0.000 claims description 91
- 230000015654 memory Effects 0.000 claims description 24
- 238000012545 processing Methods 0.000 claims description 22
- 238000007781 pre-processing Methods 0.000 claims description 18
- 238000000060 site-specific infrared dichroism spectroscopy Methods 0.000 description 13
- 230000003993 interaction Effects 0.000 description 10
- 230000008569 process Effects 0.000 description 7
- 238000004364 calculation method Methods 0.000 description 6
- 230000010365 information processing Effects 0.000 description 6
- 238000004590 computer program Methods 0.000 description 4
- 230000005291 magnetic effect Effects 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000011217 control strategy Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000002085 persistent effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000001151 other effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000003936 working memory Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
技术领域technical field
本申请涉及通信领域,尤其涉及一种用于分享无线接入点的接入信息的技术。The present application relates to the field of communications, and in particular, to a technology for sharing access information of wireless access points.
背景技术Background technique
当用户设备的系统尝试连接某无线接入点(例如WiFi热点),需要在系统的无线网络配置文件产生一条对应的配置信息。用户设备连接某个无线接入点,均是系统根据无线网络配置文件中的某一条配置信息(例如,包括该无线接入点的SSID及相应的接入密码)来进行的。这些配置信息与连接成功与否无关,对应的接入信息的有效性则通过尝试连接对应无线接入点的连接结果确定。When the system of the user equipment tries to connect to a certain wireless access point (such as a WiFi hotspot), a corresponding configuration information needs to be generated in the wireless network configuration file of the system. The user equipment connects to a certain wireless access point by the system according to a certain piece of configuration information in the wireless network configuration file (for example, including the SSID of the wireless access point and the corresponding access password). The configuration information has nothing to do with whether the connection is successful or not, and the validity of the corresponding access information is determined by the connection result of attempting to connect to the corresponding wireless access point.
但是,若用户设备分享某个无线接入点的接入信息,但是当前无法或不必连接该无线接入点,也就不会产生相应的配置信息,从而相应的接入信息的有效性也未得到验证。However, if the user equipment shares the access information of a certain wireless access point, but currently cannot or does not need to connect to the wireless access point, the corresponding configuration information will not be generated, and the validity of the corresponding access information will not be affected. Get verified.
发明内容SUMMARY OF THE INVENTION
本申请的一个目的是提供一种用于分享无线接入点的接入信息的方法、装置与系统。An object of the present application is to provide a method, apparatus and system for sharing access information of a wireless access point.
根据本申请的一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的方法,该方法包括:According to an aspect of the present application, a method for sharing access information of a wireless access point on a user equipment side is provided, the method comprising:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并根据所述第二配置信息连接所述用户设备与所述目标无线接入点以验证所述接入信息;If not, add second configuration information corresponding to the target wireless access point according to the access information, and connect the user equipment and the target wireless access point according to the second configuration information to verify the connection input information;
当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。When the access information is verified, the access information is shared to the corresponding network device.
根据本申请的另一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的方法,该方法包括:According to another aspect of the present application, a method for sharing access information of a wireless access point on a user equipment side is provided, the method comprising:
获取目标无线接入点的待分享接入信息;Obtain the access information to be shared of the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,将所述待分享接入信息发送至对应的网络设备。If not, send the access information to be shared to the corresponding network device.
根据本申请的又一个方面,提供了一种在网络设备端用于分享无线接入点的接入信息的方法,该方法包括:According to yet another aspect of the present application, a method for sharing access information of a wireless access point on a network device side is provided, the method comprising:
接收用户分享的目标无线接入点的接入信息;Receive the access information of the target wireless access point shared by the user;
对所述接入信息进行预处理;preprocessing the access information;
将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备以验证所述接入信息;sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point to verify the access information;
当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。When the access information passes the verification, the access information is written into the corresponding wireless access point information database.
根据本申请的一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的装置,该装置包括:According to an aspect of the present application, an apparatus for sharing access information of a wireless access point on a user equipment side is provided, the apparatus comprising:
第一一模块,用于获取目标无线接入点待分享的接入信息;The first module is used to obtain the access information to be shared by the target wireless access point;
第一二模块,用于检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;The first and second modules are configured to detect whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
第一三模块,用于若所述第一配置信息不可更新且不可新建,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并根据所述第二配置信息连接所述用户设备与所述目标无线接入点以验证所述接入信息;The first and third modules are configured to add second configuration information corresponding to the target wireless access point according to the access information if the first configuration information cannot be updated and cannot be newly created, and connect according to the second configuration information the user equipment and the target wireless access point to authenticate the access information;
第一四模块,用于当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。The first and fourth modules are configured to share the access information to the corresponding network device when the access information passes the verification.
根据本申请的另一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的装置,该装置包括:According to another aspect of the present application, an apparatus for sharing access information of a wireless access point on a user equipment side is provided, the apparatus comprising:
第二一模块,用于获取目标无线接入点待分享的接入信息;The second module is used to obtain the access information to be shared by the target wireless access point;
第二二模块,用于检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;The second and second modules are configured to detect whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
第二三模块,用于若所述第一配置信息不可更新且不可新建,将所述接入信息发送至对应的网络设备。The second and third modules are configured to send the access information to the corresponding network device if the first configuration information cannot be updated and cannot be newly created.
根据本申请的又一个方面,提供了一种在网络设备端用于分享无线接入点的接入信息的装置,该装置包括:According to yet another aspect of the present application, an apparatus for sharing access information of a wireless access point on a network device side is provided, the apparatus comprising:
第三一模块,用于接收用户分享的目标无线接入点的接入信息;The third module is used to receive the access information of the target wireless access point shared by the user;
第三二模块,用于对所述接入信息进行预处理;The third and second modules are configured to preprocess the access information;
第三三模块,用于将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备以验证所述接入信息;The third and third modules are configured to send the preprocessed access information to the user equipment requesting to connect to the target wireless access point to verify the access information;
第三四模块,用于当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。The third and fourth modules are configured to write the access information into the corresponding wireless access point information base when the access information passes the verification.
根据本申请的一个方面,提供了一种用于分享无线接入点的接入信息的方法,该方法包括:According to an aspect of the present application, a method for sharing access information of a wireless access point is provided, the method comprising:
用户设备获取目标无线接入点待分享的接入信息;The user equipment obtains the access information to be shared by the target wireless access point;
所述用户设备检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;The user equipment detects whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,所述用户设备将所述接入信息发送至对应的网络设备;If not, the user equipment sends the access information to the corresponding network device;
所述网络设备接收用户分享的目标无线接入点的接入信息;The network device receives the access information of the target wireless access point shared by the user;
所述网络设备对所述接入信息进行预处理;The network device preprocesses the access information;
所述网络设备将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备以验证所述接入信息;The network device sends the preprocessed access information to the user equipment requesting to connect to the target wireless access point to verify the access information;
当所述接入信息通过验证,所述网络设备将所述接入信息写入对应的无线接入点信息库。When the access information is verified, the network device writes the access information into the corresponding wireless access point information database.
根据本申请的另一个方面,提供了一种用于分享无线接入点的接入信息的系统,该系统包括上文所述的在用户设备端用于分享无线接入点的接入信息的装置,以及上文所述的在网络设备端用于分享无线接入点的接入信息的装置。According to another aspect of the present application, there is provided a system for sharing access information of a wireless access point, the system including the above-mentioned user equipment side for sharing the access information of a wireless access point The apparatus, and the above-mentioned apparatus for sharing the access information of the wireless access point on the network device side.
根据本申请的一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的设备,该设备包括:According to an aspect of the present application, a device for sharing access information of a wireless access point on a user equipment side is provided, the device comprising:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并根据所述第二配置信息连接所述用户设备与所述目标无线接入点以验证所述接入信息;If not, add second configuration information corresponding to the target wireless access point according to the access information, and connect the user equipment and the target wireless access point according to the second configuration information to verify the connection input information;
当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。When the access information is verified, the access information is shared to the corresponding network device.
根据本申请的另一个方面,提供了一种在用户设备端用于分享无线接入点的接入信息的设备,该设备包括:According to another aspect of the present application, there is provided a device for sharing access information of a wireless access point on a user equipment side, the device comprising:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,将所述接入信息发送至对应的网络设备。If not, send the access information to the corresponding network device.
根据本申请的又一个方面,提供了一种在网络设备端用于分享无线接入点的接入信息的设备,该设备包括:According to yet another aspect of the present application, a device for sharing access information of a wireless access point at a network device end is provided, the device comprising:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
接收用户分享的目标无线接入点的接入信息;Receive the access information of the target wireless access point shared by the user;
对所述接入信息进行预处理;preprocessing the access information;
将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备以验证所述接入信息;sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point to verify the access information;
当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。When the access information passes the verification, the access information is written into the corresponding wireless access point information database.
根据本申请的一个方面,提供了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to one aspect of the present application, there is provided a computer-readable storage medium comprising instructions that, when executed, cause a system to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并根据所述第二配置信息连接所述用户设备与所述目标无线接入点以验证所述接入信息;If not, add second configuration information corresponding to the target wireless access point according to the access information, and connect the user equipment and the target wireless access point according to the second configuration information to verify the connection input information;
当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。When the access information is verified, the access information is shared to the corresponding network device.
根据本申请的另一个方面,提供了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to another aspect of the present application, there is provided a computer-readable storage medium comprising instructions that, when executed, cause a system to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,将所述接入信息发送至对应的网络设备。If not, send the access information to the corresponding network device.
根据本申请的又一个方面,提供了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to yet another aspect of the present application, there is provided a computer-readable storage medium comprising instructions that, when executed, cause a system to:
接收用户分享的目标无线接入点的接入信息;Receive the access information of the target wireless access point shared by the user;
对所述接入信息进行预处理;preprocessing the access information;
将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备以验证所述接入信息;sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point to verify the access information;
当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。When the access information passes the verification, the access information is written into the corresponding wireless access point information database.
与现有技术相比,本申请通过新增配置信息,在应用无法读取或更新系统的无线网络配置文件、尤其是在运行Android 6.0或更高版本的设备上,实现了对用户分享到网络设备(例如云端服务器)的无线热点接入信息的验证;而通过在不同的终端上验证无线接入点接入信息的正确性,解决了第三方联网工具无法访问无线配置文件、因而无法验证用户分享的接入信息是否正确的问题,提高了系统资源的利用率和用户使用效率,改善了用户使用体验。Compared with the prior art, by adding configuration information, the application can not read or update the wireless network configuration file of the system, especially on devices running Android 6.0 or higher, to realize sharing to the network for users. Verification of wireless hotspot access information of devices (such as cloud servers); and by verifying the correctness of wireless access point access information on different terminals, it solves the problem that third-party networking tools cannot access wireless configuration files and thus cannot authenticate users The question of whether the shared access information is correct improves the utilization rate of system resources and user efficiency, and improves the user experience.
附图说明Description of drawings
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:Other features, objects and advantages of the present application will become more apparent by reading the detailed description of non-limiting embodiments made with reference to the following drawings:
图1示出根据本申请一个实施例的一种在用户设备端用于分享无线接入点的接入信息的方法;FIG. 1 shows a method for sharing access information of a wireless access point on a user equipment side according to an embodiment of the present application;
图2示出根据本申请另一个实施例的一种用于分享无线接入点的接入信息的方法;FIG. 2 shows a method for sharing access information of a wireless access point according to another embodiment of the present application;
图3示出根据本申请又一个实施例的一种用于分享无线接入点的接入信息的系统。FIG. 3 shows a system for sharing access information of wireless access points according to yet another embodiment of the present application.
附图中相同或相似的附图标记代表相同或相似的部件。The same or similar reference numbers in the drawings represent the same or similar parts.
具体实施方式Detailed ways
下面结合附图对本申请作进一步详细描述。The present application will be described in further detail below with reference to the accompanying drawings.
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。Memory may include non-persistent memory in computer readable media, random access memory (RAM) and/or non-volatile memory in the form of, for example, read only memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes both persistent and non-permanent, removable and non-removable media, and storage of information may be implemented by any method or technology. Information may be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase-change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), Flash Memory or other memory technology, Compact Disc Read Only Memory (CD-ROM), Digital Versatile Disc (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape disk storage or other magnetic storage devices or any other non-transmission medium that can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, excludes non-transitory computer-readable media, such as modulated data signals and carrier waves.
本申请所指设备包括但不限于用户设备、网络设备、或用户设备与网络设备通过网络相集成所构成的设备。,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述设备还可以是运行于所述用户设备、网络设备、或用户设备与网络设备、网络设备、触摸终端或网络设备与触摸终端通过网络相集成所构成的设备上的程序。The equipment referred to in this application includes, but is not limited to, user equipment, network equipment, or equipment formed by integrating user equipment and network equipment through a network. , the mobile electronic product can adopt any operating system, such as android operating system, iOS operating system and so on. Wherein, the network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), programmable logic Device (PLD), Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. The network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad Hoc network), and the like. Preferably, the device may also be a program running on the user equipment, network equipment, or a device formed by user equipment and network equipment, network equipment, touch terminal or network equipment and touch terminal integrated through a network.
当然,本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。Of course, those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible devices that may appear in the future, if applicable to this application, should also be included within the protection scope of this application, and are included in this application by reference. this.
在本申请的描述中,“多个”的含义是两个或者更多,除非另有明确具体的限定。In the description of this application, "plurality" means two or more, unless expressly and specifically defined otherwise.
图1示出根据本申请一个方面的一种在用户设备端用于分享无线接入点的接入信息的方法,该方法包括步骤S11、步骤S12、步骤S13和步骤S14。FIG. 1 shows a method for sharing access information of a wireless access point on a user equipment side according to an aspect of the present application, the method includes step S11 , step S12 , step S13 and step S14 .
其中,在步骤S11中,信息验证分享装置获取目标无线接入点待分享的接入信息;在步骤S12中,信息验证分享装置检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;若否,在步骤S13中,信息验证分享装置根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并通过根据所述第二配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息;在步骤S14中,当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。Wherein, in step S11, the information verification and sharing device obtains the access information to be shared by the target wireless access point; in step S12, the information verification and sharing device detects the first configuration corresponding to the target wireless access point in the user equipment Whether the information can be updated or newly created; if not, in step S13, the information verification and sharing device adds the second configuration information corresponding to the target wireless access point according to the access information, and connects by connecting according to the second configuration information The user equipment and the target wireless access point verify the access information; in step S14, when the access information passes the verification, the access information is shared with the corresponding network device.
具体而言,在步骤S11中,信息验证分享装置获取目标无线接入点待分享的接入信息,例如,参考图1,用户希望分享某无线接入点(AP,Access Point)的接入信息,例如该无线接入点(例如WiFi热点)的SSID、接入密码等,并在用户设备通过手动输入的方式向用户设备输入了该无线接入点的SSID、接入密码;其中,无线接入点的SSID也可通过用户在用户设备所扫描到的无线接入点列表中选取某个接入点等方式确定。从而,即获取了该无线接入点的接入信息。Specifically, in step S11, the information verification and sharing apparatus obtains the access information to be shared by the target wireless access point. For example, referring to FIG. 1, the user wishes to share the access information of a certain wireless access point (AP, Access Point). , such as the SSID, access password, etc. of the wireless access point (such as a WiFi hotspot), and the user equipment has entered the SSID and access password of the wireless access point to the user equipment by manual input; wherein, the wireless access point The SSID of the access point may also be determined by the user selecting an access point from the list of wireless access points scanned by the user equipment. Thus, the access information of the wireless access point is acquired.
接着,在步骤S12中,信息验证分享装置检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;其中,在一些情况下,该第一配置信息仅供具有相应权限的指定应用执行修改、更新等操作,例如在Android 6.0或更高版本系统中,某个无线接入点对应的配置信息只能由创建它的应用修改。例如,用户用于分享无线接入点接入信息的应用(下称本应用)向系统发起更新或新建对应目标无线接入点(用户希望分享接入信息的无线接入点)的第一配置信息的请求,根据系统返回的结果,确定该第一配置信息是否可更新或新建,例如该用户设备运行Android 6.0或更高版本的操作系统,并且该应用请求更新或新建的第一配置信息已经存在且是由其他应用创建的,则对该第一配置信息的更新或新建被阻止,即,该第一配置信息不可更新且不可新建。Next, in step S12, the information verification and sharing apparatus detects whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created; The specified application of the corresponding permission performs operations such as modification and update. For example, in the Android 6.0 or higher version system, the configuration information corresponding to a wireless access point can only be modified by the application that created it. For example, the application used by the user to share the access information of the wireless access point (hereinafter referred to as the application) initiates an update to the system or creates a new first configuration corresponding to the target wireless access point (the wireless access point the user wishes to share the access information with) Information request, according to the result returned by the system, determine whether the first configuration information can be updated or newly created, for example, the user equipment runs the operating system of Android 6.0 or higher, and the first configuration information requested to be updated or newly created by the application has been If the first configuration information exists and is created by other applications, the update or new creation of the first configuration information is blocked, that is, the first configuration information cannot be updated or newly created.
然后,在上述第一配置信息不可更新且不可新建的情况下,在步骤S13中,信息验证分享装置根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并通过根据所述第二配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息。例如,在系统的无线网络配置文件中,新增一条第二配置信息,其中该第二配置信息与上述第一配置信息均对应于目标无线接入点(例如,记录有相同的SSID)。此时,由于该第二配置信息由本应用所创建,因此也可由其修改。Then, in the case that the above-mentioned first configuration information cannot be updated and cannot be newly created, in step S13, the information verification and sharing apparatus adds the second configuration information corresponding to the target wireless access point according to the access information, and passes the corresponding second configuration information according to the access information. The second configuration information connects the user equipment with the target wireless access point to verify the access information. For example, in the wireless network configuration file of the system, a new piece of second configuration information is added, wherein the second configuration information and the above-mentioned first configuration information both correspond to the target wireless access point (for example, the same SSID is recorded). At this time, since the second configuration information is created by this application, it can also be modified by it.
最后,在步骤S14中,信息验证分享装置当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。例如,根据用户由提供的目标无线接入点对应的接入信息,创建第二配置信息后,根据该第二配置信息尝试连接用户设备和无线接入点,连接成功则将该条由用户提供的目标无线接入点的接入信息分享至网络设备,如云端服务器。后续,当其他用户设备请求目标无线接入点的接入信息,即可将其返回。Finally, in step S14, when the access information passes the verification, the information verification and sharing device shares the access information to the corresponding network device. For example, according to the access information corresponding to the target wireless access point provided by the user, after creating the second configuration information, try to connect the user equipment and the wireless access point according to the second configuration information. The access information of the target wireless access point is shared with network devices, such as cloud servers. Subsequently, when other user equipment requests the access information of the target wireless access point, it can return it.
其中优选地,若上述第一配置信息可更新或新建,信息验证分享装置根据所述接入信息更新或新建所述第一配置信息,并通过根据所述第一配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息。例如,系统还没有连接过该目标无线接入点,因而不存在相应的第一配置信息,其可新建;又例如,当系统设置允许任意应用修改该第一配置信息内容,则该第一配置信息可更新或可新建。此时,根据用户提供的目标无线接入点对应的接入信息更新或新建第一配置信息,用户设备据其尝试连接无线接入点,连接成功则用户所提供的接入信息通过验证,并可将该条由用户提供的目标无线接入点的接入信息分享至网络设备;连接失败则舍弃用户所提供的接入信息。Preferably, if the above-mentioned first configuration information can be updated or newly created, the information verification and sharing device updates or newly creates the first configuration information according to the access information, and connects the user equipment with the user equipment according to the first configuration information. the target wireless access point to verify the access information. For example, the system has not been connected to the target wireless access point, so there is no corresponding first configuration information, which can be newly created; for another example, when the system settings allow any application to modify the content of the first configuration information, the first configuration Information can be updated or new. At this time, the first configuration information is updated or newly created according to the access information corresponding to the target wireless access point provided by the user, and the user equipment attempts to connect to the wireless access point according to it. If the connection is successful, the access information provided by the user passes the verification, and The access information of the target wireless access point provided by the user can be shared with the network device; if the connection fails, the access information provided by the user is discarded.
另外,优选地,当用户提供的目标无线接入点的接入信息通过验证,删除上述第二配置信息或第一配置信息。当用户仅是为了分享目标无线接入点的接入信息而生成或修改了第二配置信息或第一配置信息、且该第二配置信息或第一配置信息对于系统而言并无其他作用的情况下,可将其删除,以将系统恢复至接入信息分享操作前的状态,避免影响系统稳定性或降低用户的操作体验;特别地,若第一配置信息和第二配置信息均存在,由于它们对应同一个无线接入点,当系统连接目标无线接入点时可能会引起系统不稳定甚至崩溃,因此,删除第一配置信息、第二配置信息中的至少一项,使得系统的无线网络配置文件中关于目标无线接入点的配置信息至多仅有一条,避免了以上问题的发生。删除操作可由本应用提示用户进入系统设置完成。In addition, preferably, when the access information of the target wireless access point provided by the user passes the verification, the above-mentioned second configuration information or the first configuration information is deleted. When the user only generates or modifies the second configuration information or the first configuration information for the purpose of sharing the access information of the target wireless access point, and the second configuration information or the first configuration information has no other effect on the system In this case, it can be deleted to restore the system to the state before the access information sharing operation, so as to avoid affecting the system stability or reducing the user's operating experience; in particular, if both the first configuration information and the second configuration information exist, Since they correspond to the same wireless access point, when the system is connected to the target wireless access point, the system may become unstable or even crash. Therefore, delete at least one of the first configuration information and the second configuration information, so that the wireless There is at most one piece of configuration information about the target wireless access point in the network configuration file, which avoids the above problems. The deletion operation can be completed by the application prompting the user to enter the system settings.
需要理解的是,所述用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等;所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。It should be understood that the user equipment includes but is not limited to any mobile electronic product that can perform human-computer interaction with the user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc.; the network equipment It includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions. Its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible future devices, if applicable to the present application, should also be included within the protection scope of the present application, and are incorporated herein by reference.
根据本申请的另一个方面,公开了一种用于分享无线接入点的接入信息的方法,该方法包括步骤S21、步骤S22和步骤S23。According to another aspect of the present application, a method for sharing access information of a wireless access point is disclosed, the method comprising step S21, step S22 and step S23.
其中,在步骤S21中,信息分享装置2获取目标无线接入点待分享的接入信息;在步骤S22中,信息分享装置2检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;若否,在步骤S23中,信息分享装置2将所述接入信息分享至对应的网络设备。Wherein, in step S21, the information sharing apparatus 2 obtains the access information to be shared by the target wireless access point; in step S22, the information sharing apparatus 2 detects the first configuration corresponding to the target wireless access point in the user equipment Whether the information can be updated or newly created; if not, in step S23, the information sharing apparatus 2 shares the access information to the corresponding network device.
具体而言,在步骤S21中,信息分享装置2获取目标无线接入点待分享的接入信息。例如,用户希望分享某无线接入点(AP,Access Point)的接入信息,例如该无线接入点(例如WiFi热点)的SSID、接入密码等,并在第一用户设备通过手动输入的方式向第一用户设备输入了该无线接入点的SSID、接入密码;其中,无线接入点的SSID也可通过用户在第一用户设备所扫描到的无线接入点列表中选取某个接入点等方式确定。从而,即获取了该无线接入点的接入信息。Specifically, in step S21, the information sharing apparatus 2 acquires the access information to be shared by the target wireless access point. For example, the user wishes to share the access information of a wireless access point (AP, Access Point), such as the SSID and access password of the wireless access point (such as a WiFi hotspot), and manually enter the information on the first user equipment The SSID and access password of the wireless access point are input to the first user equipment by means of the method; wherein, the SSID of the wireless access point can also be selected by the user from the list of wireless access points scanned by the first user equipment. Access point, etc. Thus, the access information of the wireless access point is acquired.
然后,在步骤S22中,信息分享装置2检测所述目标无线接入点在第一用户设备中对应的第一配置信息是否可更新或新建;其中,在一些情况下,该第一配置信息仅供具有相应权限的指定应用执行修改、更新等操作,例如在Android 6.0或更高版本系统中,某个无线接入点对应的配置信息只能由创建它的应用修改。例如,用户用于分享无线接入点接入信息的应用(下称本应用)向系统发起更新或新建对应目标无线接入点(用户希望分享接入信息的无线接入点)的第一配置信息的请求,根据系统返回的结果,确定该第一配置信息是否可更新或新建,例如该第一用户设备运行Android 6.0或更高版本的操作系统,并且该应用请求更新或新建的第一配置信息已经存在且是由其他应用创建的,则对该第一配置信息的更新或新建被阻止,即,该第一配置信息不可更新且不可新建。Then, in step S22, the information sharing apparatus 2 detects whether the first configuration information corresponding to the target wireless access point in the first user equipment can be updated or newly created; wherein, in some cases, the first configuration information is only For specified applications with corresponding permissions to perform operations such as modification and update. For example, in Android 6.0 or later systems, the configuration information corresponding to a wireless access point can only be modified by the application that created it. For example, the application used by the user to share the access information of the wireless access point (hereinafter referred to as the application) initiates an update to the system or creates a new first configuration corresponding to the target wireless access point (the wireless access point the user wishes to share the access information with) Information request, according to the result returned by the system, determine whether the first configuration information can be updated or newly created, for example, the first user equipment runs the operating system of Android 6.0 or higher, and the application requests the updated or newly created first configuration If the information already exists and is created by other applications, the update or new creation of the first configuration information is blocked, that is, the first configuration information cannot be updated and cannot be newly created.
接着,在上述第一配置信息不可更新且不可新建的情况下,在步骤S23中,信息分享装置2将所述接入信息分享至对应的网络设备。例如,在第一配置信息不可更新且不可新建的情况下,该用户用于分享无线接入点接入信息的应用(下称本应用)通过第一用户设备将接入信息分享至云端服务器,而不事先对该接入信息是否可用于连接目标无线接入点进行验证。Next, in the case that the above-mentioned first configuration information cannot be updated and cannot be newly created, in step S23, the information sharing apparatus 2 shares the access information to the corresponding network device. For example, in the case where the first configuration information cannot be updated and cannot be newly created, the application used by the user to share the access information of the wireless access point (hereinafter referred to as the application) shares the access information to the cloud server through the first user equipment, It does not verify in advance whether the access information can be used to connect to the target wireless access point.
其中优选地,还需满足预定的接入信息分享频次阈值,才将用户提供的接入信息分享至对应的网络设备。例如,对于第一用户设备而言,其在一天内分享同一个或不同的无线接入点的接入信息的次数,需小于一个阈值;又例如,对于同一个无线接入点(例如目标无线接入点)而言,其在一天内被分享接入信息(未被验证)的次数,需小于另一个阈值。从而在采取这样的频控策略后,一方面可避免恶意用户分享大量不可用于连接目标无线接入点的接入信息;另一方面,能避免网络设备被分享大量关于目标无线接入点的不可用于连接的接入信息(例如无效密码),从而避免后续接入信息的验证过程效率低下而消耗系统资源、影响用户使用体验。Preferably, the access information provided by the user is shared to the corresponding network device only after meeting a predetermined frequency threshold of access information sharing. For example, for the first user equipment, the number of times it shares the access information of the same or different wireless access points in one day needs to be less than a threshold; for another example, for the same wireless access point (for example, the target wireless access point) Access point), the number of times its access information is shared (unverified) in a day needs to be less than another threshold. Therefore, after adopting such a frequency control strategy, on the one hand, malicious users can be prevented from sharing a large amount of access information that cannot be used to connect to the target wireless access point; Access information that cannot be used for connection (for example, an invalid password), so as to avoid inefficiency in the verification process of subsequent access information, which consumes system resources and affects user experience.
其中,优选地,对于所述第一配置信息是否可更新或新建,是基于预定规则进行的;预定规则包括以下至少一项:(1)若所述第一配置信息仅供所述用户设备中指定应用或系统程序访问,并存在于所述用户设备,则所述第一配置信息不可更新且不可新建;(2)若所述第一配置信息仅供所述用户设备中指定应用或系统程序访问,但未存在于所述用户设备,则所述第一配置信息可新建;(3)若所述第一配置信息可供所述用户设备中任意应用或系统程序访问,则所述第一配置信息可更新或可新建。例如,所述第一配置信息仅供创建它的应用访问,并且该第一配置信息已经被本应用以外的其他应用创建,则该第一配置信息不可更新且不可新建;又例如,系统还没有连接过该目标无线接入点,因而不存在相应的第一配置信息,其可新建;再例如,当系统设置允许任意应用修改该第一配置信息内容,则该第一配置信息可更新或可新建。Wherein, preferably, whether the first configuration information can be updated or newly created is based on a predetermined rule; the predetermined rule includes at least one of the following: (1) If the first configuration information is only used in the user equipment If the specified application or system program is accessed and exists in the user equipment, the first configuration information cannot be updated and cannot be newly created; (2) If the first configuration information can only be accessed by the specified application or system program in the user equipment , but does not exist in the user equipment, the first configuration information can be newly created; (3) If the first configuration information can be accessed by any application or system program in the user equipment, the first configuration information Information can be updated or new. For example, the first configuration information can only be accessed by the application that created it, and the first configuration information has been created by other applications other than this application, then the first configuration information cannot be updated or newly created; for another example, the system has not The target wireless access point has been connected, so there is no corresponding first configuration information, which can be newly created; for another example, when the system settings allow any application to modify the content of the first configuration information, the first configuration information can be updated or can be New.
而若上述第一配置信息可更新或可新建,信息分享装置2根据所述接入信息更新或新建所述第一配置信息,并通过根据所述第一配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息;当所述接入信息通过验证,信息分享装置2将所述接入信息分享至所述网络设备。例如,系统还没有连接过该目标无线接入点,因而不存在相应的第一配置信息,其可新建;又例如,当系统设置允许任意应用修改该第一配置信息内容,则该第一配置信息可更新或可新建。此时,根据用户提供的目标无线接入点对应的接入信息更新或新建第一配置信息,用户设备据其尝试连接无线接入点,连接成功则用户所提供的接入信息通过验证,并可将该条由用户提供的目标无线接入点的接入信息分享至网络设备;连接失败则舍弃用户所提供的接入信息。If the above-mentioned first configuration information can be updated or newly created, the information sharing apparatus 2 updates or newly created the first configuration information according to the access information, and connects the user equipment with the user equipment according to the first configuration information. The target wireless access point verifies the access information; when the access information passes the verification, the information sharing apparatus 2 shares the access information to the network device. For example, the system has not been connected to the target wireless access point, so there is no corresponding first configuration information, which can be newly created; for another example, when the system settings allow any application to modify the content of the first configuration information, the first configuration Information can be updated or new. At this time, the first configuration information is updated or newly created according to the access information corresponding to the target wireless access point provided by the user, and the user equipment attempts to connect to the wireless access point according to it. If the connection is successful, the access information provided by the user passes the verification, and The access information of the target wireless access point provided by the user can be shared with the network device; if the connection fails, the access information provided by the user is discarded.
需要理解的是,所述第一用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等;所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。It should be understood that the first user equipment includes but is not limited to any mobile electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc.; the A network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions. Its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), and programmable logic devices (PLDs). , Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible future devices, if applicable to the present application, should also be included within the protection scope of the present application, and are incorporated herein by reference.
根据本申请的又一个方面,公开了一种在网络设备端用于分享无线接入点的接入信息的方法,该方法包括步骤S31、步骤S32、步骤S33和步骤S34。According to yet another aspect of the present application, a method for sharing access information of a wireless access point on a network device side is disclosed, the method includes step S31 , step S32 , step S33 and step S34 .
其中,在步骤S31中,网络处理装置3接收用户分享的目标无线接入点的接入信息;在步骤S32中,网络处理装置3对所述接入信息进行预处理;在步骤S33中,网络处理装置3通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息;在步骤S34中,网络处理装置3当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。Wherein, in step S31, the network processing device 3 receives the access information of the target wireless access point shared by the user; in step S32, the network processing device 3 preprocesses the access information; in step S33, the network The processing device 3 verifies the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point; in step S34, the network processing device 3 verifies the access information when the access information is After the information is verified, the access information is written into the corresponding wireless access point information database.
具体而言,在步骤S31中,网络处理装置3接收用户分享的目标无线接入点的接入信息。例如,用户希望分享目标无线接入点(AP,Access Point)的接入信息,例如该目标无线接入点(例如WiFi热点)的SSID、接入密码等,并通过网络从其所操作的第一用户设备分享至网络设备,例如云端服务器。Specifically, in step S31, the network processing device 3 receives the access information of the target wireless access point shared by the user. For example, the user wishes to share the access information of the target wireless access point (AP, Access Point), such as the SSID, access password, etc. of the target wireless access point (such as a WiFi hotspot), and use the A user equipment is shared to a network device, such as a cloud server.
随后,在步骤S32中,网络处理装置3对所述接入信息进行预处理。例如,将之前接收到的用户通过第一用户设备分享的、目标无线接入点的接入信息写入网络设备(例如云端服务器)的待验证信息库;或在接收用户通过第一用户设备分享的、目标无线接入点的接入信息后,根据预定规则对其进行筛选通过后,将其写入网络设备(例如云端服务器)的待验证信息库。Subsequently, in step S32, the network processing apparatus 3 preprocesses the access information. For example, the previously received access information of the target wireless access point shared by the user through the first user equipment is written into the to-be-verified information database of the network device (such as a cloud server); or when the receiving user shares through the first user equipment After the access information of the target wireless access point is screened and passed according to the predetermined rule, it is written into the information database to be verified of the network device (for example, the cloud server).
接着,在步骤S33中,网络处理装置3通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息。例如,用户通过第二用户设备发出连接所述目标无线接入点的请求;基于该请求,网络设备(例如云端服务器)将上述经过预处理的、由第一用户设备所分享目标无线接入点的接入信息发送至第二用户设备,供第二用户设备尝试与目标无线接入点建立连接,并完成该接入信息有效性的验证。Next, in step S33, the network processing apparatus 3 verifies the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point. For example, the user sends a request to connect to the target wireless access point through the second user equipment; based on the request, the network device (such as a cloud server) sends the preprocessed target wireless access point shared by the first user equipment The access information is sent to the second user equipment for the second user equipment to try to establish a connection with the target wireless access point, and to complete the verification of the validity of the access information.
其中,优选地,在步骤S33中,网络处理装置3将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备;然后,网络处理装置3接收所述用户设备返回的、基于所述接入信息与所述目标无线接入点的连接结果信息;若所述连接结果信息包括连接成功,则所述接入信息通过验证。例如,在发出关于目标无线接入点的第二用户设备接收到网络设备返回的、由第一用户设备提供的待验证的接入信息后,第二用户设备基于该接入信息尝试连接目标无线接入点,并获得该次尝试的连接结果信息,其中,该连接结果包括连接成功或连接失败;当该连接结果包括连接成功,则本次连接所用的接入信息即通过验证,为目标无线接入点的有效接入信息。其中,连接结果还可包括上下行数据量等信息。另外,发送至第二用户设备的接入信息可以为包括上述第一用户设备提供的接入信息在内的多条接入信息,第二用户设备对其依次进行验证。Wherein, preferably, in step S33, the network processing device 3 sends the preprocessed access information to the user equipment requesting to connect to the target wireless access point; then, the network processing device 3 receives the user equipment The returned connection result information based on the access information and the target wireless access point; if the connection result information includes a successful connection, the access information passes the verification. For example, after the second user equipment that issues the target wireless access point receives the access information to be authenticated and provided by the first user equipment and returned by the network device, the second user equipment attempts to connect to the target wireless access point based on the access information access point, and obtain the connection result information of this attempt, wherein the connection result includes connection success or connection failure; when the connection result includes connection success, the access information used in this connection is verified and is the target wireless Valid access information for the access point. The connection result may also include information such as the amount of uplink and downlink data. In addition, the access information sent to the second user equipment may be multiple pieces of access information including the access information provided by the first user equipment, and the second user equipment verifies them in sequence.
更优选地,网络处理装置3将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备;然后,网络处理装置3接收所述用户设备返回的、基于所述接入信息与所述目标无线接入点的连接结果信息;若所述连接结果信息包括连接成功,则所述接入信息通过验证。同时发送所述接入信息给多个请求接入信息的用户设备,只要该接入信息在任一用户设备上通过验证,该接入信息即通过验证,因此可提高所述接入信息的验证效率。More preferably, the network processing device 3 sends the preprocessed access information to the user equipment requesting to connect to the target wireless access point; then, the network processing device 3 receives the information returned by the user equipment based on the The connection result information between the access information and the target wireless access point; if the connection result information includes a successful connection, the access information passes the verification. The access information is sent to multiple user equipments that request access information at the same time. As long as the access information passes the verification on any user equipment, the access information passes the verification. Therefore, the verification efficiency of the access information can be improved. .
最后,在步骤S34中,网络处理装置3当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。例如,第二用户设备基于上述由第一用户设备分享至网络设备的接入信息尝试连接目标无线接入点并连接成功,该条接入信息通过验证,则将该接入信息写入对应的无线接入点信息库。例如,对应的无线接入点信息库存有目标无线接入点的识别信息、经验证的接入信息等,供后续请求连接目标无线接入点的设备建立连接之用。当然,若之前将该条接入信息保存于待验证信息库,可将其从待验证信息库删除,即,将该条接入信息移入对应的无线接入点信息库;或将该条接入信息的状态由未验证标记为已验证,并删除关于目标无线接入点的其他的不同的接入信息。Finally, in step S34, when the access information passes the verification, the network processing device 3 writes the access information into the corresponding wireless access point information database. For example, the second user equipment attempts to connect to the target wireless access point based on the access information shared by the first user equipment to the network device, and the connection succeeds, and the access information passes the verification, and then writes the access information into the corresponding wireless access point. Wireless access point information base. For example, the corresponding wireless access point information inventory contains the identification information of the target wireless access point, verified access information, etc., which are used by the device that subsequently requests to connect to the target wireless access point to establish a connection. Of course, if the piece of access information was previously stored in the information base to be verified, it can be deleted from the information base to be verified, that is, the piece of access information is moved into the corresponding wireless access point information base; or the piece of access information can be deleted. The status of the incoming information is marked from unauthenticated to authenticated, and other disparate access information about the target wireless access point is deleted.
其中,优选地,第二用户设备需满足以下至少一项要求:(1)当前应用在所述第二用户设备上的使用频次信息等于或大于预定的应用使用频次阈值信息;(2)所述第二用户设备的系统配置信息满足预定的系统配置要求;(3)无线接入点在所述第二用户设备中的配置信息可供所述第二用户设备中任意应用或系统程序访问。Wherein, preferably, the second user equipment needs to meet at least one of the following requirements: (1) the usage frequency information of the current application on the second user equipment is equal to or greater than the predetermined application usage frequency threshold information; (2) the The system configuration information of the second user equipment meets predetermined system configuration requirements; (3) the configuration information of the wireless access point in the second user equipment can be accessed by any application or system program in the second user equipment.
在一定时间范围内,当前应用在所述第二用户设备上的使用频次信息,在一定程度上可以反映对应用户关于当前应用的用户忠诚度,若当前应用在所述第二用户设备上的使用频次信息等于或大于预定的应用使用频次阈值信息,即可控制为由较为忠诚的用户协助验证接入信息的有效性,避免由于无效接入信息的存在而降低新用户的使用体验而造成新用户流失;所述第二用户设备的系统配置信息满足预定的系统配置要求,则可从系统层面保证了接入信息有效性验证的可行性,例如在Android 6.0以下版本的设备上进行验证,避免Android 6.0以上版本系统由于不可更新且不可新建配置文件、从而无法验证的情况,或在其他平台例如iOS、Windows设备或指定操作系统版本的设备上进行验证,提升用户体验和验证效率;同样地,无线接入点在所述第二用户设备中的配置信息可供所述第二用户设备中任意应用或系统程序访问,避免由于不可更新且不可新建配置文件、从而无法验证的情况发生,提升用户体验和验证效率。Within a certain time range, the usage frequency information of the current application on the second user equipment can reflect the user loyalty of the corresponding user about the current application to a certain extent. If the current application is used on the second user equipment If the frequency information is equal to or greater than the predetermined application frequency threshold information, it can be controlled to use the more loyal users to assist in verifying the validity of the access information, so as to avoid the new users’ experience caused by the existence of invalid access information that reduces the use experience of new users. If the system configuration information of the second user equipment meets the predetermined system configuration requirements, the feasibility of the validity verification of the access information can be guaranteed from the system level. The system of version 6.0 and above cannot be verified because it cannot be updated and new configuration files cannot be created, or verification is performed on other platforms such as iOS, Windows devices or devices with specified operating system versions to improve user experience and verification efficiency; Similarly, wireless The configuration information of the access point in the second user equipment can be accessed by any application or system program in the second user equipment, avoiding the situation that cannot be verified because the configuration file cannot be updated and cannot be newly created, and the user experience is improved and verification efficiency.
优选地,在验证目标无线接入点的接入信息之前,对其进行的预处理包括以下至少一项:(1)当存在所述目标无线接入点的相同接入信息的分享记录,舍弃所述接入信息;(2)当所述用户的分享频次信息超过用户分享频次阈值或所述目标无线接入点的分享频次信息超过热点分享频次阈值,舍弃所述接入信息;(3)当所述无线接入点信息库中存在所述目标无线接入点的接入信息记录,舍弃所述接入信息。Preferably, before verifying the access information of the target wireless access point, the preprocessing on it includes at least one of the following: (1) when there is a sharing record of the same access information of the target wireless access point, discard the the access information; (2) when the sharing frequency information of the user exceeds the user sharing frequency threshold or the sharing frequency information of the target wireless access point exceeds the hotspot sharing frequency threshold, the access information is discarded; (3) When the access information record of the target wireless access point exists in the wireless access point information base, the access information is discarded.
例如,当存在所述目标无线接入点的相同接入信息的分享记录,即同样的接入信息在之前已经被分享过,则舍弃所述接入信息而不将其加入对应的待验证信息库,避免重复,或在将该条接入信息加入对应的待验证信息库中,后续将待验证信息库中相同的接入信息合并;又例如,当所述用户的分享频次信息超过第一用户设备对应用户的分享频次阈值,例如一天之内分享相同或不同的无线接入点的接入信息的次数,或所述目标无线接入点的分享频次信息超过热点分享频次阈值,即目标无线接入点被分享过于频繁,舍弃所述接入信息,在网络设备端对用户分享频次和目标无线接入点被分享频次进行限制,从而避免恶意用户分享大量不可用于连接目标无线接入点的接入信息,以及避免网络设备被分享大量关于目标无线接入点的不可用于连接的接入信息(例如无效密码)而使得后续接入信息的验证过程效率低下而消耗系统资源、影响用户使用体验;而当所述无线接入点信息库中存在所述目标无线接入点的接入信息记录,舍弃所述接入信息,则是在网络设备已经留存有经验证的目标无线接入点的接入信息,即无需再对其验证。For example, when there is a sharing record of the same access information of the target wireless access point, that is, the same access information has been shared before, the access information is discarded and not added to the corresponding information to be verified database to avoid duplication, or add the piece of access information to the corresponding information database to be verified, and subsequently combine the same access information in the information database to be verified; another example, when the user's sharing frequency information exceeds the first The sharing frequency threshold of the user corresponding to the user equipment, such as the number of times the access information of the same or different wireless access points is shared in one day, or the sharing frequency information of the target wireless access point exceeds the hotspot sharing frequency threshold, that is, the target wireless access point The access point is shared too frequently, the access information is discarded, and the user sharing frequency and the target wireless access point sharing frequency are limited on the network device side, so as to prevent malicious users from sharing a large amount of unusable connection to the target wireless access point. access information, and avoid network devices from sharing a large amount of access information about the target wireless access point that is not available for connection (such as invalid passwords), which makes the verification process of subsequent access information inefficient, consumes system resources, and affects users. When the access information record of the target wireless access point exists in the wireless access point information database, and the access information is discarded, it means that the verified target wireless access point has been stored in the network device. The access information of the point, that is, it does not need to be verified again.
优选地,当所述接入信息在分享前已通过验证,网络处理装置3将所述接入信息写入对应的无线接入点信息库。例如,当第一用户设备在本地即可完成对目标无线接入点接入信息的验证过程,如在第一用户设备运行Android 6.0以下版本操作系统、或相应的配置信息可更新或可新建等情况下,且该接入信息通过验证,则直接将该接入信息写入网络设备的无线接入点信息库供后续连接使用,而不将其作为待验证的接入信息写入待验证信息库。Preferably, when the access information has passed the verification before sharing, the network processing device 3 writes the access information into the corresponding wireless access point information database. For example, the verification process of the access information of the target wireless access point can be completed when the first user equipment is locally, for example, the first user equipment runs an operating system below Android 6.0, or the corresponding configuration information can be updated or newly created, etc. In this case, and the access information passes the verification, the access information is directly written into the wireless access point information database of the network device for use in subsequent connections, instead of being written into the information to be verified as the access information to be verified. library.
需要理解的是,所述第一用户设备、所述第二用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等;所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。It should be understood that the first user equipment and the second user equipment include but are not limited to any mobile electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touchpad), such as a smart phone , tablet computer, etc.; the network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASIC), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible future devices, if applicable to the present application, should also be included within the protection scope of the present application, and are incorporated herein by reference.
基于以上所述的在用户设备端用于分享无线接入点的接入信息的方法、在网络设备端用于分享无线接入点的接入信息的方法,参考图2,本申请还公开了一种用于分享无线接入点的接入信息的方法,该方法包括:Based on the above-mentioned method for sharing the access information of the wireless access point at the user equipment side and the method for sharing the access information of the wireless access point at the network equipment side, referring to FIG. 2 , the present application also discloses A method for sharing access information of a wireless access point, the method comprising:
用户设备获取目标无线接入点待分享的接入信息;The user equipment obtains the access information to be shared by the target wireless access point;
所述用户设备检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;The user equipment detects whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,所述用户设备将所述接入信息发送至对应的网络设备;If not, the user equipment sends the access information to the corresponding network device;
所述网络设备接收用户分享的目标无线接入点的接入信息;The network device receives the access information of the target wireless access point shared by the user;
所述网络设备对所述接入信息进行预处理;The network device preprocesses the access information;
所述网络设备通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息;The network device verifies the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point;
当所述接入信息通过验证,所述网络设备将所述接入信息写入对应的无线接入点信息库。When the access information is verified, the network device writes the access information into the corresponding wireless access point information database.
根据本申请的另一个方面,公开了一种在用户设备端用于分享无线接入点的接入信息的信息分享装置,该信息分享装置2包括第二一模块21、第二二模块22和第二三模块23。According to another aspect of the present application, an information sharing apparatus for sharing access information of a wireless access point on a user equipment side is disclosed. The information sharing apparatus 2 includes a second-first module 21 , a second-second module 22 and The second and third modules 23 .
其中,第二一模块21获取目标无线接入点待分享的接入信息;第二二模块22检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;若否,第二三模块23将所述接入信息分享至对应的网络设备。The second-first module 21 obtains the access information to be shared by the target wireless access point; the second-second module 22 detects whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created; if No, the second and third modules 23 share the access information to the corresponding network device.
具体而言,第二一模块21获取目标无线接入点待分享的接入信息。例如,用户希望分享某无线接入点(AP,Access Point)的接入信息,例如该无线接入点(例如WiFi热点)的SSID、接入密码等,并在第一用户设备通过手动输入的方式向第一用户设备输入了该无线接入点的SSID、接入密码;其中,无线接入点的SSID也可通过用户在第一用户设备所扫描到的无线接入点列表中选取某个接入点等方式确定。从而,即获取了该无线接入点的接入信息。Specifically, the second-first module 21 acquires the access information to be shared by the target wireless access point. For example, the user wishes to share the access information of a wireless access point (AP, Access Point), such as the SSID and access password of the wireless access point (such as a WiFi hotspot), and manually enter the information on the first user equipment The SSID and access password of the wireless access point are input to the first user equipment by means of the method; wherein, the SSID of the wireless access point can also be selected by the user from the list of wireless access points scanned by the first user equipment. Access point, etc. Thus, the access information of the wireless access point is acquired.
然后,第二二模块22检测所述目标无线接入点在第一用户设备中对应的第一配置信息是否可更新或新建;其中,在一些情况下,该第一配置信息仅供具有相应权限的指定应用执行修改、更新等操作,例如在Android6.0或更高版本系统中,某个无线接入点对应的配置信息只能由创建它的应用修改。例如,用户用于分享无线接入点接入信息的应用(下称本应用)向系统发起更新或新建对应目标无线接入点(用户希望分享接入信息的无线接入点)的第一配置信息的请求,根据系统返回的结果,确定该第一配置信息是否可更新或新建,例如该第一用户设备运行Android 6.0或更高版本的操作系统,并且该应用请求更新或新建的第一配置信息已经存在且是由其他应用创建的,则对该第一配置信息的更新或新建被阻止,即,该第一配置信息不可更新且不可新建。Then, the second second module 22 detects whether the first configuration information corresponding to the target wireless access point in the first user equipment can be updated or newly created; wherein, in some cases, the first configuration information is only for those who have the corresponding authority For example, in Android 6.0 or later systems, the configuration information corresponding to a wireless access point can only be modified by the application that created it. For example, the application used by the user to share the access information of the wireless access point (hereinafter referred to as the application) initiates an update to the system or creates a new first configuration corresponding to the target wireless access point (the wireless access point the user wishes to share the access information with) Information request, according to the result returned by the system, determine whether the first configuration information can be updated or newly created, for example, the first user equipment runs the operating system of Android 6.0 or higher, and the application requests the updated or newly created first configuration If the information already exists and is created by other applications, the update or new creation of the first configuration information is blocked, that is, the first configuration information cannot be updated and cannot be newly created.
接着,在上述第一配置信息不可更新且不可新建的情况下,第二三模块23将所述接入信息分享至对应的网络设备。例如,在第一配置信息不可更新且不可新建的情况下,该用户用于分享无线接入点接入信息的应用(下称本应用)通过第一用户设备将接入信息分享至云端服务器,而不事先对该接入信息是否可用于连接目标无线接入点进行验证。Next, in the case that the above-mentioned first configuration information cannot be updated and cannot be newly created, the second and third modules 23 share the access information to the corresponding network device. For example, in the case where the first configuration information cannot be updated and cannot be newly created, the application used by the user to share the access information of the wireless access point (hereinafter referred to as the application) shares the access information to the cloud server through the first user equipment, It does not verify in advance whether the access information can be used to connect to the target wireless access point.
其中优选地,还需满足预定的接入信息分享频次阈值,才将用户提供的接入信息分享至对应的网络设备。例如,对于第一用户设备而言,其在一天内分享同一个或不同的无线接入点的接入信息的次数,需小于一个阈值;又例如,对于同一个无线接入点(例如目标无线接入点)而言,其在一天内被分享接入信息(未被验证)的次数,需小于另一个阈值。从而在采取这样的频控策略后,一方面可避免恶意用户分享大量不可用于连接目标无线接入点的接入信息;另一方面,能避免网络设备被分享大量关于目标无线接入点的不可用于连接的接入信息(例如无效密码),从而避免后续接入信息的验证过程效率低下而消耗系统资源、影响用户使用体验。Preferably, the access information provided by the user is shared to the corresponding network device only after meeting a predetermined frequency threshold of access information sharing. For example, for the first user equipment, the number of times it shares the access information of the same or different wireless access points in one day needs to be less than a threshold; for another example, for the same wireless access point (for example, the target wireless access point) Access point), the number of times its access information is shared (unverified) in a day needs to be less than another threshold. Therefore, after adopting such a frequency control strategy, on the one hand, malicious users can be prevented from sharing a large amount of access information that cannot be used to connect to the target wireless access point; Access information that cannot be used for connection (for example, an invalid password), so as to avoid inefficiency in the verification process of subsequent access information, which consumes system resources and affects user experience.
其中,优选地,对于所述第一配置信息是否可更新或新建,是基于预定规则进行的;预定规则包括以下至少一项:(1)若所述第一配置信息仅供所述用户设备中指定应用或系统程序访问,并存在于所述用户设备,则所述第一配置信息不可更新且不可新建;(2)若所述第一配置信息仅供所述用户设备中指定应用或系统程序访问,但未存在于所述用户设备,则所述第一配置信息可新建;(3)若所述第一配置信息可供所述用户设备中任意应用或系统程序访问,则所述第一配置信息可更新或可新建。例如,所述第一配置信息仅供创建它的应用访问,并且该第一配置信息已经被本应用以外的其他应用创建,则该第一配置信息不可更新且不可新建;又例如,系统还没有连接过该目标无线接入点,因而不存在相应的第一配置信息,其可新建;再例如,当系统设置允许任意应用修改该第一配置信息内容,则该第一配置信息可更新或可新建。Wherein, preferably, whether the first configuration information can be updated or newly created is based on a predetermined rule; the predetermined rule includes at least one of the following: (1) If the first configuration information is only used in the user equipment If the specified application or system program is accessed and exists in the user equipment, the first configuration information cannot be updated and cannot be newly created; (2) If the first configuration information can only be accessed by the specified application or system program in the user equipment , but does not exist in the user equipment, the first configuration information can be newly created; (3) If the first configuration information can be accessed by any application or system program in the user equipment, the first configuration information Information can be updated or new. For example, the first configuration information can only be accessed by the application that created it, and the first configuration information has been created by other applications other than this application, then the first configuration information cannot be updated or newly created; for another example, the system has not The target wireless access point has been connected, so there is no corresponding first configuration information, which can be newly created; for another example, when the system settings allow any application to modify the content of the first configuration information, the first configuration information can be updated or can be New.
而若上述第一配置信息可更新或可新建,信息分享装置2根据所述接入信息更新或新建所述第一配置信息,并通过根据所述第一配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息;当所述接入信息通过验证,信息分享装置2将所述接入信息分享至所述网络设备。例如,系统还没有连接过该目标无线接入点,因而不存在相应的第一配置信息,其可新建;又例如,当系统设置允许任意应用修改该第一配置信息内容,则该第一配置信息可更新或可新建。此时,根据用户提供的目标无线接入点对应的接入信息更新或新建第一配置信息,用户设备据其尝试连接无线接入点,连接成功则用户所提供的接入信息通过验证,并可将该条由用户提供的目标无线接入点的接入信息分享至网络设备;连接失败则舍弃用户所提供的接入信息。If the above-mentioned first configuration information can be updated or newly created, the information sharing apparatus 2 updates or newly created the first configuration information according to the access information, and connects the user equipment with the user equipment according to the first configuration information. The target wireless access point verifies the access information; when the access information passes the verification, the information sharing apparatus 2 shares the access information to the network device. For example, the system has not been connected to the target wireless access point, so there is no corresponding first configuration information, which can be newly created; for another example, when the system settings allow any application to modify the content of the first configuration information, the first configuration Information can be updated or new. At this time, the first configuration information is updated or newly created according to the access information corresponding to the target wireless access point provided by the user, and the user equipment attempts to connect to the wireless access point according to it. If the connection is successful, the access information provided by the user passes the verification, and The access information of the target wireless access point provided by the user can be shared with the network device; if the connection fails, the access information provided by the user is discarded.
需要理解的是,所述第一用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等;所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。It should be understood that the first user equipment includes but is not limited to any mobile electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touchpad), such as a smart phone, a tablet computer, etc.; the A network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions. Its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASICs), and programmable logic devices (PLDs). , Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible future devices, if applicable to the present application, should also be included within the protection scope of the present application, and are incorporated herein by reference.
根据本申请的又一个方面,公开了一种在网络设备端用于分享无线接入点的接入信息的网络处理装置,该网络处理装置3包括第三一模块31、第三二模块32、第三三模块33和第三四模块34。According to yet another aspect of the present application, a network processing apparatus for sharing access information of a wireless access point on a network device side is disclosed. The network processing apparatus 3 includes a third first module 31, a third second module 32, The third third module 33 and the third fourth module 34 .
其中,第三一模块31接收用户分享的目标无线接入点的接入信息;第三二模块32对所述接入信息进行预处理;第三三模块33通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息;第三四模块34当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。The third-first module 31 receives the access information of the target wireless access point shared by the user; the third-second module 32 preprocesses the access information; the third-third module 33 processes the preprocessed access information by The third and fourth modules 34 write the access information into the corresponding wireless access point when the access information passes the verification. entry point repository.
具体而言,第三一模块31接收用户分享的目标无线接入点的接入信息。例如,用户希望分享目标无线接入点(AP,Access Point)的接入信息,例如该目标无线接入点(例如WiFi热点)的SSID、接入密码等,并通过网络从其所操作的第一用户设备分享至网络设备,例如云端服务器。Specifically, the third-first module 31 receives the access information of the target wireless access point shared by the user. For example, the user wishes to share the access information of the target wireless access point (AP, Access Point), such as the SSID, access password, etc. of the target wireless access point (such as a WiFi hotspot), and use the A user equipment is shared to a network device, such as a cloud server.
随后,第三二模块32对所述接入信息进行预处理。例如,将之前接收到的用户通过第一用户设备分享的、目标无线接入点的接入信息写入网络设备(例如云端服务器)的待验证信息库;或在接收用户通过第一用户设备分享的、目标无线接入点的接入信息后,根据预定规则对其进行筛选通过后,将其写入网络设备(例如云端服务器)的待验证信息库。Then, the third second module 32 preprocesses the access information. For example, the previously received access information of the target wireless access point shared by the user through the first user equipment is written into the to-be-verified information database of the network device (such as a cloud server); or when the receiving user shares through the first user equipment After the access information of the target wireless access point is screened and passed according to the predetermined rule, it is written into the information database to be verified of the network device (for example, the cloud server).
接着,第三三模块33通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息。例如,用户通过第二用户设备发出连接所述目标无线接入点的请求;基于该请求,网络设备(例如云端服务器)将上述经过预处理的、由第一用户设备所分享目标无线接入点的接入信息发送至第二用户设备,供第二用户设备尝试与目标无线接入点建立连接,并完成该接入信息有效性的验证。Next, the third third module 33 verifies the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point. For example, the user sends a request to connect to the target wireless access point through the second user equipment; based on the request, the network device (such as a cloud server) sends the preprocessed target wireless access point shared by the first user equipment The access information is sent to the second user equipment for the second user equipment to try to establish a connection with the target wireless access point, and to complete the verification of the validity of the access information.
其中,优选地,第三三模块33将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备;然后,网络处理装置3接收所述用户设备返回的、基于所述接入信息与所述目标无线接入点的连接结果信息;若所述连接结果信息包括连接成功,则所述接入信息通过验证。例如,在发出关于目标无线接入点的第二用户设备接收到网络设备返回的、由第一用户设备提供的待验证的接入信息后,第二用户设备基于该接入信息尝试连接目标无线接入点,并获得该次尝试的连接结果信息,其中,该连接结果包括连接成功或连接失败;当该连接结果包括连接成功,则本次连接所用的接入信息即通过验证,为目标无线接入点的有效接入信息。其中,连接结果还可包括上下行数据量等信息。另外,发送至第二用户设备的接入信息可以为包括上述第一用户设备提供的接入信息在内的多条接入信息,第二用户设备对其依次进行验证。Wherein, preferably, the third third module 33 sends the preprocessed access information to the user equipment requesting to connect to the target wireless access point; then, the network processing device 3 receives the information returned by the user equipment based on The connection result information between the access information and the target wireless access point; if the connection result information includes a successful connection, the access information passes the verification. For example, after the second user equipment that issues the target wireless access point receives the access information to be authenticated and provided by the first user equipment and returned by the network device, the second user equipment attempts to connect to the target wireless access point based on the access information access point, and obtain the connection result information of this attempt, wherein the connection result includes connection success or connection failure; when the connection result includes connection success, the access information used in this connection is verified and is the target wireless Valid access information for the access point. The connection result may also include information such as the amount of uplink and downlink data. In addition, the access information sent to the second user equipment may be multiple pieces of access information including the access information provided by the first user equipment, and the second user equipment verifies them in sequence.
更优选地,网络处理装置3将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备;然后,网络处理装置3接收所述用户设备返回的、基于所述接入信息与所述目标无线接入点的连接结果信息;若所述连接结果信息包括连接成功,则所述接入信息通过验证。同时发送所述接入信息给多个请求接入信息的用户设备,只要该接入信息在任一用户设备上通过验证,该接入信息即通过验证,因此可提高所述接入信息的验证效率。More preferably, the network processing device 3 sends the preprocessed access information to the user equipment requesting to connect to the target wireless access point; then, the network processing device 3 receives the information returned by the user equipment based on the The connection result information between the access information and the target wireless access point; if the connection result information includes a successful connection, the access information passes the verification. The access information is sent to multiple user equipments that request access information at the same time. As long as the access information passes the verification on any user equipment, the access information passes the verification. Therefore, the verification efficiency of the access information can be improved. .
最后,第三四模块34当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。例如,第二用户设备基于上述由第一用户设备分享至网络设备的接入信息尝试连接目标无线接入点并连接成功,该条接入信息通过验证,则将该接入信息写入对应的无线接入点信息库。例如,对应的无线接入点信息库存有目标无线接入点的识别信息、经验证的接入信息等,供后续请求连接目标无线接入点的设备建立连接之用。当然,若之前将该条接入信息保存于待验证信息库,可将其从待验证信息库删除,即,将该条接入信息移入对应的无线接入点信息库;或将该条接入信息的状态由未验证标记为已验证,并删除关于目标无线接入点的其他的不同的接入信息。Finally, when the access information passes the verification, the third and fourth modules 34 write the access information into the corresponding wireless access point information database. For example, the second user equipment attempts to connect to the target wireless access point based on the access information shared by the first user equipment to the network device, and the connection succeeds, and the access information passes the verification, and then writes the access information into the corresponding wireless access point. Wireless access point information base. For example, the corresponding wireless access point information inventory contains the identification information of the target wireless access point, verified access information, etc., which are used by the device that subsequently requests to connect to the target wireless access point to establish a connection. Of course, if the piece of access information was previously stored in the information base to be verified, it can be deleted from the information base to be verified, that is, the piece of access information is moved into the corresponding wireless access point information base; or the piece of access information can be deleted. The status of the incoming information is marked from unauthenticated to authenticated, and other disparate access information about the target wireless access point is deleted.
其中,优选地,第二用户设备需满足以下至少一项要求:(1)当前应用在所述第二用户设备上的使用频次信息等于或大于预定的应用使用频次阈值信息;(2)所述第二用户设备的系统配置信息满足预定的系统配置要求;(3)无线接入点在所述第二用户设备中的配置信息可供所述第二用户设备中任意应用或系统程序访问。Wherein, preferably, the second user equipment needs to meet at least one of the following requirements: (1) the usage frequency information of the current application on the second user equipment is equal to or greater than the predetermined application usage frequency threshold information; (2) the The system configuration information of the second user equipment meets predetermined system configuration requirements; (3) the configuration information of the wireless access point in the second user equipment can be accessed by any application or system program in the second user equipment.
在一定时间范围内,当前应用在所述第二用户设备上的使用频次信息,在一定程度上可以反映对应用户关于当前应用的用户忠诚度,若当前应用在所述第二用户设备上的使用频次信息等于或大于预定的应用使用频次阈值信息,即可控制为由较为忠诚的用户协助验证接入信息的有效性,避免由于无效接入信息的存在而降低新用户的使用体验而造成新用户流失;所述第二用户设备的系统配置信息满足预定的系统配置要求,则可从系统层面保证了接入信息有效性验证的可行性,例如在Android 6.0以下版本的设备上进行验证,避免Android 6.0以上版本系统由于不可更新且不可新建配置文件、从而无法验证的情况,或在其他平台例如iOS、Windows设备或指定操作系统版本的设备上进行验证,提升用户体验和验证效率;同样地,无线接入点在所述第二用户设备中的配置信息可供所述第二用户设备中任意应用或系统程序访问,避免由于不可更新且不可新建配置文件、从而无法验证的情况发生,提升用户体验和验证效率。Within a certain time range, the usage frequency information of the current application on the second user equipment can reflect the user loyalty of the corresponding user about the current application to a certain extent. If the current application is used on the second user equipment If the frequency information is equal to or greater than the predetermined application frequency threshold information, it can be controlled to use the more loyal users to assist in verifying the validity of the access information, so as to avoid the new users’ experience caused by the existence of invalid access information that reduces the use experience of new users. If the system configuration information of the second user equipment meets the predetermined system configuration requirements, the feasibility of the validity verification of the access information can be guaranteed from the system level. The system of version 6.0 and above cannot be verified because it cannot be updated and new configuration files cannot be created, or verification is performed on other platforms such as iOS, Windows devices or devices with specified operating system versions to improve user experience and verification efficiency; Similarly, wireless The configuration information of the access point in the second user equipment can be accessed by any application or system program in the second user equipment, avoiding the situation that cannot be verified because the configuration file cannot be updated and cannot be newly created, and the user experience is improved and verification efficiency.
优选地,在验证目标无线接入点的接入信息之前,对其进行的预处理包括以下至少一项:(1)当存在所述目标无线接入点的相同接入信息的分享记录,舍弃所述接入信息;(2)当所述用户的分享频次信息超过用户分享频次阈值或所述目标无线接入点的分享频次信息超过热点分享频次阈值,舍弃所述接入信息;(3)当所述无线接入点信息库中存在所述目标无线接入点的接入信息记录,舍弃所述接入信息。Preferably, before verifying the access information of the target wireless access point, the preprocessing on it includes at least one of the following: (1) when there is a sharing record of the same access information of the target wireless access point, discard the the access information; (2) when the sharing frequency information of the user exceeds the user sharing frequency threshold or the sharing frequency information of the target wireless access point exceeds the hotspot sharing frequency threshold, the access information is discarded; (3) When the access information record of the target wireless access point exists in the wireless access point information base, the access information is discarded.
例如,当存在所述目标无线接入点的相同接入信息的分享记录,即同样的接入信息在之前已经被分享过,则舍弃所述接入信息而不将其加入对应的待验证信息库,避免重复,或在将该条接入信息加入对应的待验证信息库中,后续将待验证信息库中相同的接入信息合并;又例如,当所述用户的分享频次信息超过第一用户设备对应用户的分享频次阈值,例如一天之内分享相同或不同的无线接入点的接入信息的次数,或所述目标无线接入点的分享频次信息超过热点分享频次阈值,即目标无线接入点被分享过于频繁,舍弃所述接入信息,在网络设备端对用户分享频次和目标无线接入点被分享频次进行限制,从而避免恶意用户分享大量不可用于连接目标无线接入点的接入信息,以及避免网络设备被分享大量关于目标无线接入点的不可用于连接的接入信息(例如无效密码)而使得后续接入信息的验证过程效率低下而消耗系统资源、影响用户使用体验;而当所述无线接入点信息库中存在所述目标无线接入点的接入信息记录,舍弃所述接入信息,则是在网络设备已经留存有经验证的目标无线接入点的接入信息,即无需再对其验证。For example, when there is a sharing record of the same access information of the target wireless access point, that is, the same access information has been shared before, the access information is discarded and not added to the corresponding information to be verified database to avoid duplication, or add the piece of access information to the corresponding information database to be verified, and subsequently combine the same access information in the information database to be verified; another example, when the user's sharing frequency information exceeds the first The sharing frequency threshold of the user corresponding to the user equipment, such as the number of times the access information of the same or different wireless access points is shared in one day, or the sharing frequency information of the target wireless access point exceeds the hotspot sharing frequency threshold, that is, the target wireless access point The access point is shared too frequently, the access information is discarded, and the user sharing frequency and the target wireless access point sharing frequency are limited on the network device side, so as to prevent malicious users from sharing a large amount of unusable connection to the target wireless access point. access information, and avoid network devices from sharing a large amount of access information about the target wireless access point that is not available for connection (such as invalid passwords), which makes the verification process of subsequent access information inefficient, consumes system resources, and affects users. When the access information record of the target wireless access point exists in the wireless access point information database, and the access information is discarded, it means that the verified target wireless access point has been stored in the network device. The access information of the point, that is, it does not need to be verified again.
优选地,当所述接入信息在分享前已通过验证,网络处理装置3将所述接入信息写入对应的无线接入点信息库。例如,当第一用户设备在本地即可完成对目标无线接入点接入信息的验证过程,如在第一用户设备运行Android 6.0以下版本操作系统、或相应的配置信息可更新或可新建等情况下,且该接入信息通过验证,则直接将该接入信息写入网络设备的无线接入点信息库供后续连接使用,而不将其作为待验证的接入信息写入待验证信息库。Preferably, when the access information has passed the verification before sharing, the network processing device 3 writes the access information into the corresponding wireless access point information database. For example, the verification process of the access information of the target wireless access point can be completed when the first user equipment is locally, for example, the first user equipment runs an operating system below Android 6.0, or the corresponding configuration information can be updated or newly created, etc. In this case, and the access information passes the verification, the access information is directly written into the wireless access point information database of the network device for use in subsequent connections, instead of being written into the information to be verified as the access information to be verified. library.
需要理解的是,所述第一用户设备、所述第二用户设备包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的移动电子产品,例如智能手机、平板电脑等;所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。本领域技术人员应能理解上述设备仅为举例,其他现有的或今后可能出现的设备如可适用于本申请,也应包含在本申请保护范围以内,并在此以引用方式包含于此。It should be understood that the first user equipment and the second user equipment include but are not limited to any mobile electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touchpad), such as a smart phone , tablet computer, etc.; the network device includes an electronic device that can automatically perform numerical calculation and information processing according to pre-set or stored instructions, and its hardware includes but is not limited to microprocessors, application-specific integrated circuits (ASIC), Programmable Logic Device (PLD), Field Programmable Gate Array (FPGA), Digital Signal Processor (DSP), Embedded Devices, etc. The network device includes, but is not limited to, a computer, a network host, a single network server, multiple network server sets, or a cloud composed of multiple servers; here, a cloud is composed of a large number of computers or network servers based on cloud computing, Among them, cloud computing is a kind of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. Those skilled in the art should understand that the above-mentioned devices are only examples, and other existing or possible future devices, if applicable to the present application, should also be included within the protection scope of the present application, and are incorporated herein by reference.
基于以上所述的在用户设备端用于分享无线接入点的接入信息的信息分享装置、在网络设备端用于分享无线接入点的接入信息的网络处理装置,参考图3,本申请还公开了一种用于分享无线接入点的接入信息的系统。Based on the above-mentioned information sharing apparatus for sharing access information of wireless access points on the user equipment side, and network processing apparatus for sharing access information of wireless access points on the network equipment side, referring to FIG. The application also discloses a system for sharing access information of wireless access points.
根据本申请的一个方面,公开了一种在用户设备端用于分享无线接入点的接入信息的设备,其中,该设备包括:According to an aspect of the present application, a device for sharing access information of a wireless access point on a user equipment side is disclosed, wherein the device includes:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并通过根据所述第二配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息;If not, add second configuration information corresponding to the target wireless access point according to the access information, and verify the user equipment by connecting the user equipment and the target wireless access point according to the second configuration information access information;
当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。When the access information is verified, the access information is shared to the corresponding network device.
根据本申请的另一个方面,公开了一种在用户设备端用于分享无线接入点的接入信息的设备,其中,该设备包括:According to another aspect of the present application, a device for sharing access information of a wireless access point at the user equipment side is disclosed, wherein the device includes:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,将所述接入信息发送至对应的网络设备。If not, send the access information to the corresponding network device.
根据本申请的又一个方面,公开了一种在网络设备端用于分享无线接入点的接入信息的设备,其中,该设备包括:According to another aspect of the present application, a device for sharing access information of a wireless access point on a network device side is disclosed, wherein the device includes:
处理器;以及processor; and
被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:memory arranged to store computer-executable instructions which, when executed, cause the processor to:
接收用户分享的目标无线接入点的接入信息;Receive the access information of the target wireless access point shared by the user;
对所述接入信息进行预处理;preprocessing the access information;
通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息;verifying the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point;
当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。When the access information passes the verification, the access information is written into the corresponding wireless access point information database.
根据本申请的一个方面,公开了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to one aspect of the present application, there is disclosed a computer-readable storage medium comprising instructions that, when executed, cause a system to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,根据所述接入信息添加所述目标无线接入点对应的第二配置信息,并通过根据所述第二配置信息连接所述用户设备与所述目标无线接入点来验证所述接入信息;If not, add second configuration information corresponding to the target wireless access point according to the access information, and verify the user equipment by connecting the user equipment and the target wireless access point according to the second configuration information access information;
当所述接入信息通过验证,将所述接入信息分享至对应的网络设备。When the access information is verified, the access information is shared to the corresponding network device.
根据本申请的另一个方面,公开了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to another aspect of the present application, there is disclosed a computer-readable storage medium comprising instructions that, when executed, cause a system to:
获取目标无线接入点待分享的接入信息;Obtain the access information to be shared by the target wireless access point;
检测所述目标无线接入点在用户设备中对应的第一配置信息是否可更新或新建;Detecting whether the first configuration information corresponding to the target wireless access point in the user equipment can be updated or newly created;
若否,将所述接入信息发送至对应的网络设备。If not, send the access information to the corresponding network device.
根据本申请的又一个方面,公开了一种包括指令的计算机可读存储介质,所述指令在被执行时使得系统进行以下操作:According to yet another aspect of the present application, there is disclosed a computer-readable storage medium comprising instructions that, when executed, cause a system to:
接收用户分享的目标无线接入点的接入信息;Receive the access information of the target wireless access point shared by the user;
对所述接入信息进行预处理;preprocessing the access information;
通过将预处理后的所述接入信息发送至请求连接所述目标无线接入点的用户设备来验证所述接入信息;verifying the access information by sending the preprocessed access information to the user equipment requesting to connect to the target wireless access point;
当所述接入信息通过验证,将所述接入信息写入对应的无线接入点信息库。When the access information passes the verification, the access information is written into the corresponding wireless access point information database.
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。It should be noted that the present application may be implemented in software and/or a combination of software and hardware, eg, an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device. In one embodiment, the software program of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs of the present application (including associated data structures) may be stored on a computer-readable recording medium, such as RAM memory, magnetic or optical drives or floppy disks, and the like. In addition, some steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。而调用本申请的方法的程序指令,可能被存储在固定的或可移动的记录介质中,和/或通过广播或其他信号承载媒体中的数据流而被传输,和/或被存储在根据所述程序指令运行的计算机设备的工作存储器中。在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。In addition, a part of the present application can be applied as a computer program product, such as computer program instructions, which when executed by a computer, through the operation of the computer, can invoke or provide methods and/or technical solutions according to the present application. The program instructions for invoking the methods of the present application may be stored in fixed or removable recording media, and/or transmitted via data streams in broadcast or other signal-bearing media, and/or stored in accordance with the in the working memory of the computer device on which the program instructions are executed. Here, an embodiment according to the present application includes an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein, when the computer program instructions are executed by the processor, a trigger is The apparatus operates based on the aforementioned methods and/or technical solutions according to various embodiments of the present application.
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。It will be apparent to those skilled in the art that the present application is not limited to the details of the above-described exemplary embodiments, but that the present application can be implemented in other specific forms without departing from the spirit or essential characteristics of the present application. Accordingly, the embodiments are to be regarded in all respects as illustrative and not restrictive, and the scope of the application is to be defined by the appended claims rather than the foregoing description, which is therefore intended to fall within the scope of the claims. All changes within the meaning and scope of the equivalents of , are included in this application. Any reference signs in the claims shall not be construed as limiting the involved claim. Furthermore, it is clear that the word "comprising" does not exclude other units or steps and the singular does not exclude the plural. Several units or means recited in the device claims can also be realized by one unit or means by means of software or hardware. The terms first, second, etc. are used to denote names and do not denote any particular order.
Claims (29)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710087036.1A CN106851648B (en) | 2017-02-17 | 2017-02-17 | A method, device and system for sharing access information of wireless access points |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710087036.1A CN106851648B (en) | 2017-02-17 | 2017-02-17 | A method, device and system for sharing access information of wireless access points |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106851648A CN106851648A (en) | 2017-06-13 |
| CN106851648B true CN106851648B (en) | 2020-08-14 |
Family
ID=59128598
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710087036.1A Active CN106851648B (en) | 2017-02-17 | 2017-02-17 | A method, device and system for sharing access information of wireless access points |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106851648B (en) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115314976A (en) * | 2021-05-06 | 2022-11-08 | Oppo广东移动通信有限公司 | Network connection method and device, and storage medium |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005004438A1 (en) * | 2003-06-18 | 2005-01-13 | Interlink Networks, Inc. | Enhanced shared secret provisioning protocol |
| CN105144773A (en) * | 2013-02-21 | 2015-12-09 | 诺基亚技术有限公司 | Updating stored information about wireless access points |
| CN105873049A (en) * | 2016-01-18 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and equipment for obtaining shared wireless access point |
| CN105873177A (en) * | 2016-01-18 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and equipment for obtaining access information of shared wireless access point |
| CN105979567A (en) * | 2016-05-13 | 2016-09-28 | 上海连尚网络科技有限公司 | Method, device and system for determining access information of wireless access point |
| CN106793155A (en) * | 2016-11-18 | 2017-05-31 | 重庆零度智控智能科技有限公司 | Network channel system of selection, device and terminal |
-
2017
- 2017-02-17 CN CN201710087036.1A patent/CN106851648B/en active Active
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2005004438A1 (en) * | 2003-06-18 | 2005-01-13 | Interlink Networks, Inc. | Enhanced shared secret provisioning protocol |
| CN105144773A (en) * | 2013-02-21 | 2015-12-09 | 诺基亚技术有限公司 | Updating stored information about wireless access points |
| CN105873049A (en) * | 2016-01-18 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and equipment for obtaining shared wireless access point |
| CN105873177A (en) * | 2016-01-18 | 2016-08-17 | 上海连尚网络科技有限公司 | Method and equipment for obtaining access information of shared wireless access point |
| CN105979567A (en) * | 2016-05-13 | 2016-09-28 | 上海连尚网络科技有限公司 | Method, device and system for determining access information of wireless access point |
| CN106793155A (en) * | 2016-11-18 | 2017-05-31 | 重庆零度智控智能科技有限公司 | Network channel system of selection, device and terminal |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106851648A (en) | 2017-06-13 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12355741B2 (en) | Controlling access to resources on a network | |
| US11089023B2 (en) | Computer readable storage media for tiered connection pooling and methods and systems for utilizing same | |
| US11303449B2 (en) | User device validation at an application server | |
| CN107480555B (en) | Database access authority control method and device based on block chain | |
| US9769266B2 (en) | Controlling access to resources on a network | |
| US9860187B2 (en) | Enrolling a mobile device with an enterprise mobile device management environment | |
| JP5429912B2 (en) | Authentication system, authentication server, service providing server, authentication method, and program | |
| CN110602216B (en) | Method and device for using single account by multiple terminals, cloud server and storage medium | |
| US20170316497A1 (en) | Method for creating, registering, revoking authentication information and server using the same | |
| CN109462601B (en) | Multi-platform access method and device based on eSIM | |
| CN110069908A (en) | A kind of authority control method and device of block chain | |
| WO2016146007A1 (en) | Method and device for checking verification code | |
| US9178860B2 (en) | Out-of-path, content-addressed writes with untrusted clients | |
| CN107396364B (en) | Method and equipment for carrying out wireless connection pre-authorization on user equipment | |
| CN110069911A (en) | Access control method, device, system, electronic equipment and readable storage medium | |
| CN107566329A (en) | A kind of access control method and device | |
| CN119317916A (en) | Network-aware endpoint data loss prevention for web transactions | |
| TW201335777A (en) | Distributed data storing and accessing system and method | |
| CN109995821A (en) | Method and system, the client, server, object storage system of file upload | |
| CN107396362A (en) | A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization | |
| CN114614998B (en) | Account identity verification method, device, computer device and storage medium | |
| US20150295918A1 (en) | User authentication system in web mash-up circumstance and authenticating method thereof | |
| CN106851648B (en) | A method, device and system for sharing access information of wireless access points | |
| KR102071281B1 (en) | Method for intergraged authentication thereof | |
| CN110740139A (en) | secret key device and secret key management method, system, equipment and computer medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant | ||
| CP03 | Change of name, title or address | ||
| CP03 | Change of name, title or address |
Address after: Room 80536, Shanghai Patentee after: Shanghai Zongzhang Technology Group Co.,Ltd. Country or region after: China Address before: Room 80536, Shanghai Patentee before: SHANGHAI ZHANGMEN SCIENCE AND TECHNOLOGY Co.,Ltd. Country or region before: China |