CN109429229B - Method, device and computer readable storage medium for acquiring network access information - Google Patents

Method, device and computer readable storage medium for acquiring network access information Download PDF

Info

Publication number
CN109429229B
CN109429229B CN201710792292.0A CN201710792292A CN109429229B CN 109429229 B CN109429229 B CN 109429229B CN 201710792292 A CN201710792292 A CN 201710792292A CN 109429229 B CN109429229 B CN 109429229B
Authority
CN
China
Prior art keywords
wireless network
terminal
password
network
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710792292.0A
Other languages
Chinese (zh)
Other versions
CN109429229A (en
Inventor
张燕
钟俊葳
丁海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710792292.0A priority Critical patent/CN109429229B/en
Publication of CN109429229A publication Critical patent/CN109429229A/en
Application granted granted Critical
Publication of CN109429229B publication Critical patent/CN109429229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a device for acquiring network access information and a computer readable storage medium, and belongs to the technical field of networks. The method comprises the following steps: sending a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal; receiving at least one wireless network password and at least one second wireless network identifier belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identifier are provided by the server; deleting the password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords; and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers. The terminal deletes the wireless network password of the non-public network, and generates the network access information only according to the rest wireless network password and the first wireless network identifier, thereby improving the accuracy.

Description

Method, device and computer readable storage medium for acquiring network access information
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method and an apparatus for acquiring network access information, and a computer-readable storage medium.
Background
With the development of network technology, a WiFi (Wireless Fidelity) network has become a Wireless network commonly used in people's daily life and work. Generally, a user can access the WiFi network using the terminal only when the user knows network access information of the WiFi network, where the network access information includes a WiFi network password and a WiFi network identifier. However, in order to enable the user to access the WiFi network using the terminal without knowing the network access information, a password sharing APP (APPlication) is created. The terminal can acquire the network access information through the password sharing APP, and then accesses and visits the WiFi network based on the network access information.
Currently, a method for acquiring network access information is provided, and the process may be as follows: the terminal sends a password acquisition request to the server, wherein the password acquisition request carries at least one WiFi network identifier searched by the terminal. The server receives the password acquisition request, and searches in a password library based on at least one WiFi network identifier; and when the WiFi network password is found, sending the inquired WiFi network password to the terminal. And the terminal receives the WiFi network password and forms the WiFi network password and the WiFi network identifier into network access information.
In the process of implementing the invention, the inventor finds that the prior art has at least the following problems:
network access information of the private WiFi network may be acquired through the method, however, the private WiFi network is personal property and is generally not allowed to be accessed by others under the condition of not being allowed. Therefore, the method can acquire an invalid WiFi network, resulting in poor accuracy.
Disclosure of Invention
The embodiment of the invention provides a method, a device and a computer readable storage medium for acquiring network access information, which can solve the problem of poor accuracy. The technical scheme is as follows:
in a first aspect, a method for acquiring network access information is provided, which is applied to a terminal, and the method includes:
sending a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal;
receiving at least one wireless network password and at least one second wireless network identifier belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identifier are provided by the server;
deleting the password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords;
and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers.
In a second aspect, a method for acquiring network access information is provided, and is applied to a server, and the method includes:
receiving a password acquisition request sent by a terminal, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal;
performing a lookup in a database based on the at least one wireless network identification;
and when the at least one wireless network password and the second wireless network identifier which belongs to the non-public network in the at least one first wireless network are found, the at least one wireless network password and the second wireless network identifier are sent to the terminal.
In a third aspect, an apparatus for acquiring network access information is provided, where the apparatus is applied to a terminal, and the apparatus includes:
a first sending module, configured to send a password obtaining request to a server, where the password obtaining request carries at least one first wireless network identifier searched by the terminal;
the first receiving module is used for receiving at least one wireless network password provided by the server and a second wireless network identifier belonging to a non-public network in at least one first wireless network;
the deleting module is used for deleting the password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords;
and the generating module is used for generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers.
In a fourth aspect, an apparatus for acquiring network access information is provided, where the apparatus is applied to a server, and the apparatus includes:
the second receiving module is used for receiving a password acquisition request sent by a terminal, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal;
the searching module is used for searching in a database based on the at least one wireless network identifier;
and the second sending module is used for sending the at least one wireless network password and the second wireless network identifier to the terminal when the at least one wireless network password and the second wireless network identifier which belongs to the non-public network in the at least one first wireless network are found.
In a fifth aspect, an apparatus for acquiring network access information is provided, which is applied to a terminal, and includes a processor and a memory, where at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the operations performed in the method for acquiring network access information according to the first aspect.
In a sixth aspect, there is provided an apparatus for obtaining network access information, which is applied to a server, and includes a processor and a memory, where at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the memory, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the operations performed in the method for obtaining network access information according to the second aspect.
In a seventh aspect, a computer-readable storage medium is provided, which is applied to a terminal, and has at least one instruction, at least one program, a set of codes, or a set of instructions stored therein, where the instruction, the program, the set of codes, or the set of instructions is loaded and executed by a processor to implement the operations performed in the method for acquiring network access information according to the first aspect.
In an eighth aspect, a computer-readable storage medium applied to a server is provided, where at least one instruction, at least one program, a set of codes, or a set of instructions is stored in the computer-readable storage medium, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by a processor to implement the operations performed in the method for acquiring network access information according to the second aspect.
In the embodiment of the invention, a terminal sends a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal; receiving at least one wireless network password and at least one second wireless network identification belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identification are provided by the server; deleting the password corresponding to the second wireless network identifier from at least one wireless network password to obtain the rest wireless network passwords; and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers. The terminal deletes the wireless network password of the non-public network and generates the network access information only according to the rest wireless network password and the first wireless network identifier, so that the generated network access information does not contain the network access information of the non-public network, and the accuracy is improved.
Drawings
FIG. 1 is a schematic illustration of an implementation environment provided by an embodiment of the invention;
fig. 2 is a flowchart of a method for acquiring network access information according to an embodiment of the present invention;
fig. 3 is a flowchart of another method for acquiring network access information according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for acquiring network access information according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for acquiring network access information according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an apparatus for acquiring network access information according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an apparatus for acquiring network access information according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of an apparatus for acquiring network access information according to an embodiment of the present invention;
fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 10 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Fig. 1 is a schematic diagram of an implementation environment provided by an embodiment of the present invention, and referring to fig. 1, the implementation environment includes a plurality of terminals 101 and at least one server 102. The terminal 101 and the server 102 are connected via a network. The terminal 101 runs a password sharing APP associated with the server 102, and can log in the server 102 based on the password sharing APP, so as to interact with the server 102. The password sharing APP can be any APP capable of providing access service of a wireless network, such as a master key, a WiFi manager or a password cracker.
The terminal 101 may be any Device capable of searching the surroundings through a WiFi module to obtain a wireless network identifier, such as a mobile phone terminal Device, a PAD (PAD) terminal Device, or a computer terminal Device.
The server 102 is a server 102 providing a background service for the terminal 101, and may be one server 102, a server 102 cluster composed of a plurality of servers 102, or a cloud computing server 102 center, which is not limited in this embodiment of the present invention. In one possible implementation, the server 102 may be a background server of the password-sharing APP installed in the terminal 101.
When the terminal 101 accesses the wireless network, the terminal 101 needs to obtain network access information, where the network access information includes a wireless network password and a wireless network identifier. When the network access information is not stored in the terminal 101, the terminal 101 may search for surrounding wireless network identifications and then request a wireless network password from the server 102 based on the searched wireless network identifications. The server 102 stores a database, where the database includes network access information of a plurality of wireless networks with known passwords, and the network access information of each wireless network stores a wireless network identifier and a wireless network password of the wireless network. Since the database may include network access information for non-public networks, to identify which wireless networks are non-public networks and which are public networks, the server 102 trains an identification model for identifying whether a wireless network is a non-public network. The server 102 transmits the recognition model to the terminal 101. The terminal 101 receives the identification model, identifies whether the third wireless network of the terminal 101 is a non-public network or not according to the historical connection characteristics of the third wireless network accessed historically within the first designated number of days and the identification model, obtains an identification result, and sends the identification result of the third wireless network to the server 102. The server 102 stores the identification result of the third wireless network in the database so as to mark whether the network type of the third wireless network is an open network or a non-open network. Of course, the server 102 may label only the non-public network or only the public network in the database according to the recognition result. The server 102 may store the wireless network password, the wireless network identification, and the identification result in the form of a tag. For example, a tag is set in the database for each wireless network, and a wireless network password, a wireless network identifier, and an identification result of the wireless network are stored in the tag of each wireless network.
When the terminal 101 requests the server 102 for the wireless network password of the searched at least one first wireless network, the server 102 searches in the database based on the at least one first wireless network identifier; and when the at least one wireless network password and the second wireless network identifier belonging to the non-public network in the at least one first wireless network are found, sending the at least one wireless network password and the second wireless network identifier to the terminal 101. The terminal 101 receives at least one wireless network password and a second wireless network identifier belonging to a non-public network, which are provided by the server 102, deletes a password corresponding to the second wireless network identifier from the at least one wireless network password to obtain a remaining wireless network password, and generates network access information of the first wireless network based on the remaining wireless network password and the remaining first wireless network identifier. The terminal deletes the wireless network password of the non-public network and generates the network access information only according to the rest wireless network password and the first wireless network identifier, so that the generated network access information does not contain the network access information of the non-public network, and the accuracy is improved.
The wireless network identifier may be a name and/or a MAC (Media Access Control) address of the wireless network. The network access information comprises a wireless network identification and a wireless network password. The non-public network refers to a private network or an undisclosed enterprise network, and the like. The wireless network is any wireless network which can be logged in by a password, such as a WiFi network.
Fig. 2 is a flowchart of a method for obtaining network access information according to an exemplary embodiment, and in the embodiment of the present invention, a process of identifying and updating a wireless network in a database based on a historical connection characteristic and an identification model of a third wireless network that a terminal accesses historically is mainly described. As shown in fig. 2, the method is applied between a terminal and a server, and comprises the following steps.
201. The terminal acquires historical connection characteristics of the terminal to the third wireless network within a first designated number of days, wherein the historical connection characteristics are used for indicating a connection rule of the terminal to the third wireless network in a historical networking process.
In order to prevent personal property from being invaded, the terminal acquires the historical connection characteristics of the terminal to the third wireless network within the first specified number of days, and then identifies whether the third wireless network is a non-public network or not based on the historical connection characteristics and the identification model. To enable updating and collecting data, the terminal may obtain a historical connection feature once each time a trigger condition is reached. The triggering condition may be that the number of days when the terminal accesses the third wireless network reaches a first specified number of days, or the terminal requests a password from the server, or the terminal requests a password every preset period, etc.
The third wireless network is any wireless network which is accessed by the terminal in history. For each wireless network which the terminal has access to historically, the terminal determines the historical connection characteristics of the terminal to the wireless network within the first specified number of days through the following steps (1) to (3).
(1) And the terminal acquires the connection information of the terminal to the third wireless network within the first appointed days, wherein the connection information comprises the time range of the terminal accessing the third wireless network.
The terminal stores the connection information and date of the terminal in the history connection record each time the terminal accesses the wireless network. Therefore, the terminal may obtain connection information of the terminal to the third wireless network within the first specified number of days from the historical connection record, and the process may be: the terminal acquires the connection information of the terminal to the third wireless network within the first appointed days from the historical connection record according to the wireless network identifier of the third wireless network and the first appointed days, wherein the connection information comprises the time range of the terminal to access the third wireless network, and the connection information also comprises the wireless network identifier, the terminal identifier and the date of the third wireless network. The date is used for the date attribute of the date. Therefore, the connection information may include a date attribute instead of the date, and the date attribute may be directly read from the connection information.
(2) The terminal determines at least one first characteristic of the terminal to the third wireless network based on the connection information, wherein each first characteristic is used for indicating the connection rule of the terminal to the third wireless network every day in a first specified number of days.
The connection information includes sub-information of the terminal to the third wireless network each day for a first specified number of days. Each piece of sub information is used for indicating the connection condition of the terminal in each time period in the day. And for each piece of sub information, the terminal determines a plurality of time periods, determines a characteristic value corresponding to each time period according to the sub information, and combines the characteristic value corresponding to each time period into a first characteristic. And the characteristic value corresponding to each time period is used for indicating whether the terminal is connected with the third wireless network in the time period.
And for each time period, the terminal determines whether the terminal accesses the third wireless network in the time period according to the sub-information, if the terminal accesses the third wireless network, the characteristic value of the time period is set to be 1, and if the terminal does not access the third wireless network, the characteristic value of the time period is set to be 0.
The time span of each time segment may be equal or unequal, and this is not particularly limited in the embodiment of the present invention. In addition, the number of the time periods may also be set and changed as needed, which is not specifically limited in the embodiment of the present invention. And, the greater the number of time periods, the more accurate the recognition result.
For example, since 1 day includes 24 hours, the terminal may take 1 hour of each day as one sub-period; one or more sub-periods in succession are determined as a period. For example, the terminal divides 1 day into 24 sub-time periods, each of which is respectively: 0: 00-0: 59, 1: 00-1: 59, 2: 00-2: 59, 3: 00-3: 59, 4: 00-4: 59, 5: 00-5: 59, 6: 00-6: 59, 7: 00-7: 59, 8: 00-8: 59, 9: 00-9: 59, 10: 00-10: 59, 11: 00-11: 59, 12: 00-12: 59. The terminal determines one to 6 consecutive sub-periods as one period. Thus, the terminal may get 144(24 × 6) time segments. The first feature is an array of 144 bits, which can be expressed as:
feature_today(1)=Array(max(array(0)),
max(array(0),array(1)),
max(array(0),array(1),array(2)),
max(array(0),array(1),array(2),array(3)),
max(array(0),array(1),array(2),array(3),array(4)),
max(array(0),array(1),array(2),array(3),array(4),array(5)),
max(array(1)),
max(array(1),array(2)),
max(array(1),array(2),array(3)),
……
max(array(12),array(0),array(1),array(2),array(3),array(4))
wherein feature _ today (1) is the first feature. array (n) indicates whether the terminal accesses the third wireless network between the nth: 00 to nth: 59 of the day. The value range of n is [0,12 ]. max (array (a), … …, array (b)) indicates whether the terminal accesses the third wireless network between the a:00 th and b:59 th of the day.
(3) The terminal determines a historical connection characteristic based on the at least one first characteristic of the third wireless network and the first specified number of days.
And the terminal accumulates each first characteristic to obtain a second characteristic, and normalizes the second characteristic based on the first specified days to obtain the historical connection characteristic.
The first feature and the second feature are both multi-dimensional arrays, and the first feature and the second feature comprise the same number of bits. And for each bit, accumulating the characteristic value of the bit in each first characteristic by the terminal to obtain the characteristic value of the bit in the second characteristic.
For example, the terminal determines three first features, respectively (1,1,1,1 … … 0,0,0), (1,1,1 … … 0,0,0), (1,1,1,1 … … 0,0,0), and the terminal accumulates each first feature to obtain a second feature of (3,3,3,3 … … 0,0, 0).
The terminal normalizes the second characteristic based on the first specified days to obtain the historical connection characteristic, which can be realized by the following formula one:
the formula I is as follows: input _ destination (2)/feature _ active _ destination
input is the historical connection feature, feature _ today (2) is the second feature, feature _ active _ day is the first specified number of days,/represents a divide by each digit.
Because the time of the user at home is short in the working day, the connection rule of the terminal to the third wireless network is generally working time disconnection and rest time connection; on the other hand, on working days, the time that the user is at home is long, and the connection rule of the terminal to the third wireless network is generally that the terminal is connected for most of the time. Therefore, different date attributes correspond to different connection laws. In order to improve the identification accuracy, the terminal combines the date attribute of the date included in the first specified number of days when determining the historical connection feature. Correspondingly, the steps can be as follows:
and (I) when the date attribute of the date included in the first appointed number of days only comprises working days or non-working days, accumulating each first characteristic by the terminal to obtain a second characteristic, and performing normalization processing on the second characteristic based on the first appointed number of days to obtain historical connection characteristics.
And (II) when the date attribute of the date contained in the first specified number of days comprises working days and non-working days, the terminal determines a third feature according to each first feature corresponding to the working days, determines a fourth feature according to each first feature corresponding to the non-working days, and splices the third feature and the fourth feature to obtain the historical connection feature.
The terminal determines a first characteristic corresponding to a working day and a first characteristic corresponding to a non-working day from at least one first characteristic, and determines working day days and non-working day days in a day included in a first designated number of days. And the terminal accumulates each first characteristic corresponding to the working day to obtain a fifth characteristic, and normalizes the fifth characteristic based on the number of days of the working day to obtain a third characteristic. Similarly, the terminal accumulates each first feature corresponding to the non-working days to obtain a sixth feature, and performs normalization processing on the sixth feature based on the number of days of the non-working days to obtain a fourth feature.
The terminal normalizes the fifth characteristic based on the number of days of a working day to obtain the third characteristic, and the step of obtaining the third characteristic can be realized by the following formula two:
the formula II is as follows: input1 ═ weekday _ feature./weekday _ active _ day
input1 is the third feature, weekday _ feature is the fifth feature, and weekday _ active _ day is the number of days of the day,/indicates the division by each bit.
The terminal normalizes the sixth characteristic based on the number of days of non-working days to obtain the fourth characteristic, which can be realized by the following formula three:
the formula III is as follows: input2 ═ weekend _ feature./weekend _ active _ day
input2 is the fourth feature, web _ feature is the sixth feature, and web _ active _ day is the number of days off weekday,/indicates the division by each digit.
Correspondingly, the step of splicing the third feature and the fourth feature by the terminal to obtain the historical connection feature can be realized by the following formula four:
the formula four is as follows: input1+ + input2
Wherein input is a history connection feature, input1 is a third feature, input2 is a fourth feature, and, + indicates that concatenation is performed according to a feature value.
It should be noted that, when the terminal splices the third feature and the fourth feature, the terminal may splice the feature value of the last bit in the third feature and the feature value of the first bit in the fourth feature to obtain the historical connection feature. The terminal may also splice the feature value of the last bit in the fourth feature value with the feature value of the first bit in the third feature value to obtain the historical connection feature.
For example, the third feature and the fourth feature are 144-bit arrays respectively, and the terminal concatenates the third feature and the fourth feature to obtain a 288-bit array of the historical connection feature.
202. And the terminal inputs the historical connection characteristics into the identification model and outputs an identification result, and the identification model is used for identifying whether the third wireless network is a non-public network.
Before the step, the server trains the recognition model and issues the recognition model to the terminal; the terminal stores the recognition model. The recognition model may be
Figure BDA0001399524710000101
Wherein s is sum (input.
Wherein p is the probability that the third wireless network is a non-public network, input is the historical connection characteristic of the third wireless network, b is the real number obtained by the training of the server, w is the entity array obtained by the training, and the digit of the entity array is equal to the digit of the historical connection characteristic. e is a numerical constant, typically 2.7182. Denotes bit-wise multiplication.
And the terminal outputs the historical connection characteristics of the third wireless network into the identification model to obtain the probability that the third wireless network is a non-public network. And when the probability is greater than a preset threshold value, the terminal determines that the identification result is that the third wireless network is a non-public network. And when the probability is not greater than a preset threshold value, the terminal determines that the identification result is that the third wireless network is a non-public network. The preset threshold may be set and changed as needed, and in the embodiment of the present invention, the preset threshold is not specifically limited. For example, the preset threshold may be 80% or 90%, etc.
The process of training and issuing the recognition model by the server can be realized by the following steps (1) to (4), and comprises the following steps:
(1) the server acquires sample data, wherein the sample data comprises a first preset number of first type historical connection features and a second preset number of second type historical connection features, the first type of historical connection features are historical connection features of the terminal on the public network within a second appointed number of days, and the second type of historical connection features are historical connection features of the terminal on the non-public network within a third appointed number of days.
For each of the first type of historical connection features, the terminal obtains connection information for a fourth wireless network that is open for a second specified number of days, the connection information including a time range for the terminal to access the fourth wireless network. The terminal determines at least one seventh characteristic of the terminal to the fourth wireless network based on the connection information, and determines the first type of historical connection characteristic according to the at least one seventh characteristic of the fourth wireless network and the second specified number of days. The terminal sends the first type of historical connection feature to the server.
Similarly, for each second type of historical connection feature, the terminal obtains connection information for a third specified number of days for a fifth wireless network that is not public, the connection information including a time range for the terminal to access the fifth wireless network. The terminal determines at least one eighth characteristic of the terminal to the fifth wireless network based on the connection information, and determines the second type of historical connection characteristic according to the at least one eighth characteristic of the fifth wireless network and the third specified number of days. The terminal sends the second type of historical connection feature to the server.
The first preset number and the second preset number may be equal or unequal. The second and third specified number of days may or may not be equal. In order to simplify the processing procedure and improve the accuracy, in the embodiment of the present invention, the first preset number and the second preset number are equal, and the second specified number of days and the third specified number of days are equal.
It should be noted that, in this step, the process of determining the historical connection characteristics based on the connection information may also be performed on the server side. For each first-type historical connection feature, the terminal acquires connection information of a fourth wireless network which is open within a second specified number of days, sends the connection information to the server, and the server receives the connection information and determines the first-type historical connection feature based on the connection information.
And for each second type of connection feature, the terminal acquires connection information of a fifth wireless network which is not open within a third designated number of days, sends the connection information to the server, and the server receives the connection information and determines the second type of historical connection feature based on the connection information.
(2) And the server generates an identification model according to the first preset number of first type historical connection features and the second preset number of second type historical connection features.
The server conducts training according to a first preset number of first-class historical connection features, a second preset number of second-class historical connection features and a preset training algorithm to obtain a recognition model, and the recognition model is used for recognizing whether the wireless network is a non-public network or not. The input of the identification model is the historical connection characteristic of the terminal to a certain wireless network, and the output is the identification result of the wireless network.
The preset training algorithm is a logistic regression model comprising w and b, a first preset number of first type historical connection features and a second preset number of second type historical connection features are input into the logistic regression model to obtain w and b, and the recognition model is determined according to w and b:
Figure BDA0001399524710000111
wherein s is sum (input.
(3) The server sends the recognition model to the terminal.
In a first implementation manner, in order to obtain more identification results of wireless networks, in this step, the server sends the identification model to all terminals that install the password sharing APP, and the terminals identify whether the wireless network that the terminals have historically accessed is a non-public network based on the identification model. Correspondingly, the steps can be as follows:
and the server acquires the terminal identification of the installed shared password APP, and sends the identification model to the terminal based on the acquired terminal identification.
It should be noted that, when the server has trained the recognition model, the server sends the recognition model to the terminal currently installed with the password sharing APP. However, some terminals do not install the password sharing APP when the server has trained the recognition model, and install the password sharing APP after the server has trained the recognition model for a while. In order to enable the terminals which install the password sharing APP later to identify whether the wireless network accessed historically is a non-public network or not through the identification model, the server sends the identification model to the terminal after the terminal installs the password sharing APP. The server may also send the identification model to the terminal that has installed the password-shared APP most recently in a centralized manner every first preset time period, and then send the identification model to the terminal installed within the first preset time period before the current time every first preset time period.
The first preset time period may be set and changed as needed, and in the embodiment of the present invention, the first preset time period is not specifically limited. For example, the first preset time period may be 1 month, 20 days, or the like. The terminal Identifier may be a GUID (global Unique Identifier) of the terminal or a user account registered in the server by the user. The user account may be a nickname or a user's telephone number, etc.
In a second implementation manner, since the identification model is used to identify whether a wireless network accessed by the terminal historically is a non-public network, and a malicious terminal wants to make all networks public, the malicious terminal may report falsely. In order to avoid the false report of the malicious user, in this step, the server may not send the identification model to all terminals that install the password sharing APP, but only send the identification model to the terminals that are not the malicious user. Correspondingly, the steps can be as follows:
and the server determines a non-malicious terminal identifier from the terminal identifiers of the installed password sharing APP, and sends the identification model to the non-malicious terminal based on the non-malicious terminal identifier.
The server (I) can store a malicious terminal identification library, and the malicious terminal identification library comprises the terminal identification of the malicious terminal. Correspondingly, the step of determining the non-malicious terminal identifier from the terminal identifiers of the installed password sharing APP by the server may be: and the server determines the terminal identification which is not included in the malicious terminal identification library from the terminal identifications of the installed password sharing APP, and determines the determined terminal identification as the non-malicious terminal identification.
And (II) because the malicious terminal may not have a non-public network of the malicious terminal, the malicious terminal can frequently request a password from the server. Therefore, a terminal that requests a password from the server more frequently is generally a malicious terminal, and a terminal that requests a password from the server less frequently is generally a non-malicious terminal. Correspondingly, the step of determining the non-malicious terminal identifier from the terminal identifiers of the installed password sharing APP by the server may be:
the server counts the number of times of requests of each terminal with the installed password sharing APP for the password from the server, obtains terminal identifications with the request number less than the preset number of times from the terminal identifications with the installed password sharing APP according to the number of times of requests of each terminal for the password from the server, and determines the obtained terminal identifications to be non-malicious terminal identifications.
In order to improve the accuracy, the server may also count the number of times of requests for the password from the server within a second preset time before the current time by each terminal having installed the password sharing APP, and determine the terminal identifier with the number of requests lower than the preset number of times as the non-malicious terminal identifier. The second preset time length and the preset times can be set and changed according to needs, and in the embodiment of the invention, the second preset time length and the preset times are not particularly limited. For example, the second preset time period may be 1 month, 2 months, or the like. The preset number of times may be 10 or 20, etc.
And (III) the malicious terminal does not have a non-public network of the malicious terminal, so that the malicious terminal can frequently request a password from the server. Therefore, the terminals with a large number of wireless network identifiers requesting the password from the server are generally malicious terminals, and the terminals with a small number of wireless network identifiers requesting the password from the server are generally non-malicious terminals. Correspondingly, the step of determining the non-malicious terminal identifier from the terminal identifiers of the installed password sharing APP by the server may be:
the server counts the number of the wireless network identifications of the passwords requested by each terminal with the password sharing APP to the server, acquires the terminal identifications of which the number is lower than the preset number from the terminal identifications with the password sharing APP according to the number of the wireless network identifications of the passwords requested by each terminal to the server, and determines the acquired terminal identifications as the non-malicious terminal identifications.
Similarly, in order to improve the accuracy, the server may only count the number of the wireless network identifiers of each terminal with the password sharing APP installed requesting the password from the server within a third preset time before the current time, and determine that the terminal identifiers with the number of the wireless network identifiers lower than the preset number are non-malicious terminal identifiers. The third preset time period and the second preset time period may be equal or unequal. In addition, the third preset duration and the preset number may be set and changed as needed, and in the embodiment of the present invention, neither the third preset duration nor the preset number is specifically limited. For example, the third preset duration is 1 month or 2 months. The predetermined number may be 15 or 20, etc.
203. And the terminal sends the third wireless network identification and the identification result to the server so that the server marks the third wireless network based on the identification result.
204. And the server receives the third wireless network identification and the identification result sent by the terminal, and marks the third wireless network according to the identification result.
After the server receives the identification result of the third wireless network, the server updates the identification result to the database, and the process may be: the server determines whether the identification result of the third wireless network is stored in the database, and if the identification result of the third wireless network is stored in the database, the identification result of the third wireless network stored in the database is updated to the identification result sent by the terminal.
As the malicious terminal is prevented from reporting falsely, the server determines that the third wireless network is the non-public network as long as one terminal reports that the third wireless network is the non-public network. Correspondingly, the steps can be as follows:
and when the identification result indicates that the third wireless network is the public network and the identification result of the third wireless network is not stored in the database, storing the identification result into a label corresponding to the third wireless network. And when the identification result indicates that the third wireless network is a non-public network, updating the identification result into a label corresponding to the third wireless network.
In this step, in order to avoid the false report of the malicious terminal, when the server receives the third wireless network identifier and the identification result sent by the terminal, it is determined whether the terminal is the malicious terminal; if the terminal is a malicious terminal, discarding the third wireless network identifier and the identification result sent by the terminal; and if the terminal is a non-malicious terminal, the step of marking the third wireless network according to the identification result is executed.
In this step, in order to improve accuracy, the server may mark the third wireless network based on the identification result of the plurality of terminals on the third wireless network. The process may be:
the server counts the number of first terminals of which the identification results indicate that the third wireless network is a non-public network and the number of second terminals of which the identification results indicate that the third wireless network is the non-public network in the terminals reporting the identification results of the third wireless network, and determines that the third wireless network is the non-public network when the number of the first terminals is larger than the number of the second terminals, and modifies the identification results in the tags of the third wireless network into the non-public network. And when the number of the first terminals is not more than the number of the second terminals, the server determines that the third wireless network is an open network, and modifies the identification result in the label of the third wireless network into the open network.
It should be noted that, in this step, when the server receives the third wireless network identifier and the identification result sent by the terminal, the server may not mark the third wireless network according to the identification result. And deleting the tags of the wireless networks of the non-public networks in the database according to the identification result, thereby not providing the wireless network passwords of the non-public networks for other terminals subsequently. Accordingly, step 204 may be replaced with: and the server receives the third wireless network identification and the identification result sent by the terminal. And when the identification result indicates that the third wireless network is a non-public network, deleting the label of the third wireless network in the database.
It should be noted that, in the embodiment of the present invention, the server directly reports the identification result. In practical application, the server can also identify the information by itself. Accordingly, the process may be:
the terminal sends connection information of the terminal to the third wireless network within the first specified number of days to the server. The server receives the connection information, determines historical connection characteristics of the terminal to the third wireless network according to the connection information, obtains an identification result of the third wireless network according to the historical connection characteristics and the identification model, and marks the third wireless network according to the identification result.
In the embodiment of the invention, the terminal identifies the third wireless network which is accessed by the terminal in history according to the identification model to obtain the identification result, and reports the identification of the third wireless network and the identification result to the server. And the server marks the third wireless network according to the identification result. The recognition result is obtained by the terminal according to the recognition model, so that the recognition accuracy is improved. And the server marks the third wireless network according to the identification result so as to be convenient for subsequently informing the terminal requesting the password which is the non-public network, so that the terminal deletes the wireless network password of the non-public network, only generates the network access information of the public network, and improves the accuracy. The invention can also effectively avoid the problem of user complaints caused by using a non-public network, and the accuracy is higher and higher along with the increase of the number of the reporting terminals
The above steps are the process of the server marking the wireless network with known password in the database. After the server marks the wireless network, the terminal can request the wireless network password and the identifier of the non-public network in the wireless network password from the server through the following steps, and the wireless network password of the non-public network in the wireless network password provided by the server is filtered, so that the accuracy is improved. Fig. 3 is a flowchart of a method for acquiring network access information, which is applied between a terminal and a server according to an exemplary embodiment, and includes the following steps.
301. The terminal sends a password acquisition request to the server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal.
When a function button of a wireless network of the terminal is in an open state, the terminal searches a wireless network identifier in real time; when the terminal searches for the wireless network identifier, the searched wireless network identifier is referred to as a first wireless network identifier for the convenience of distinguishing. For each searched first wireless network, the terminal determines whether network access information of the first wireless network identifier is stored locally; when the network access information of the first wireless network identifier is not stored locally, in order to acquire a password, the terminal sends a password acquisition request to the server, wherein the password acquisition request carries the first wireless network identifier of the terminal.
A password sharing APP is installed in the terminal, and the terminal can send a password acquisition request to the server through the password sharing APP. Correspondingly, the step of sending the password obtaining request to the server by the terminal may be: and calling a password sharing APP in the terminal, and sending a password acquisition request to the server through the password sharing APP. The terminal can call the password sharing APP through a system Scan list.
When the network access information of the first wireless network identifier is stored locally, the terminal accesses the first wireless network based on the network access information, and the process may be: the terminal acquires a first wireless network identifier and a wireless network password from the network access information, and sends an access request to a router of the first wireless network based on the wireless network identifier, wherein the access request carries the wireless network password. The router receives the access request, and allows the terminal to access the first wireless network when the wireless network password and the stored wireless network password are met.
302. And the server receives a password acquisition request sent by the terminal and searches in a database based on at least one wireless network identifier.
The server stores a database, the database comprises a plurality of wireless network tags with known passwords, and the wireless network identifier, the wireless network password and the identification result of any wireless network are stored in the tag of any wireless network. And for each first wireless network identification carried by the password acquisition request, searching in a database according to the first wireless network identification. If the label corresponding to the first wireless network is inquired in the database, the server acquires the wireless network password and the identification result of the first wireless network from the label. And if the label corresponding to the first wireless network is not inquired in the database, continuously inquiring the next first wireless network until all the first wireless network identifications carried by the password acquisition request are inquired.
When the wireless network password of at least one first wireless network is inquired, the server determines whether a non-public network exists in the at least one first wireless network according to the identification result of the at least one wireless network. If there is a non-public network in the at least one first wireless network, the server determines a second network identifier belonging to the non-public network in the at least one first wireless network, and then performs step 303. If the non-public network does not exist in the at least one first wireless network, the server directly sends the inquired at least one wireless network password to the terminal.
303. And when the at least one wireless network password and the second wireless network identifier belonging to the non-public network in the at least one first wireless network are found, the server sends the at least one wireless network password and the second wireless network identifier to the terminal.
When the label of the first wireless network is inquired, the wireless network password and the identification result of the first wireless network are obtained from the label, and the second wireless network identifier which belongs to the non-public network is determined from at least one first wireless network according to the identification result.
304. And the terminal receives the at least one wireless network password and the second wireless network identifier which are sent by the server, deletes the password corresponding to the second wireless network identifier from the at least one wireless network password, and obtains the rest wireless network passwords.
The second wireless network identification belongs to the network identification of the non-public network, and the second wireless network identification belonging to the non-public network is obtained by identifying any terminal based on the historical connection characteristics and the identification model of the wireless network accessed by the terminal. In the embodiment of the invention, the terminal deletes the password corresponding to the second wireless network identifier from at least one wireless network password, thereby effectively avoiding the problem of user complaints caused by using a non-public network.
305. And the terminal generates network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers.
For each of the remaining first wireless networks, the terminal combines the wireless network password and the wireless network identifier of the first wireless network into network access information of the first wireless network. The first wireless network is subsequently accessed directly based on the network access information of the first wireless network.
It should be noted that, if there is no non-public network in at least one first wireless network, that is, each first wireless network queried by the server is a public network, steps 304 and 305 may be replaced with:
and the terminal receives at least one inquired wireless network password sent by the server, and generates network access information of the first wireless network based on each wireless network password and each first wireless network identifier.
It should be noted that the terminal in step 301-305 and the terminal in step 201-204 above may be the same terminal or different terminals.
In the embodiment of the invention, a terminal sends a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal; receiving at least one wireless network password and at least one second wireless network identification belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identification are provided by the server; deleting the password corresponding to the second wireless network identifier from at least one wireless network password to obtain the rest wireless network passwords; and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers. The terminal deletes the wireless network password of the non-public network and generates the network access information only according to the rest wireless network password and the first wireless network identifier, so that the generated network access information does not contain the network access information of the non-public network, and the accuracy is improved.
Fig. 4 is a schematic structural diagram of an apparatus for acquiring network access information according to an exemplary embodiment, where the apparatus is applied in a terminal. Referring to fig. 4, the apparatus includes:
a first sending module 401, configured to send a password obtaining request to a server, where the password obtaining request carries at least one first wireless network identifier searched by a terminal;
a first receiving module 402, configured to receive at least one wireless network password provided by a server and a second wireless network identifier belonging to a non-public network in at least one first wireless network;
a deleting module 403, configured to delete a password corresponding to the second wireless network identifier from the at least one wireless network password to obtain a remaining wireless network password;
a generating module 404, configured to generate network access information of the first wireless network based on the remaining wireless network password and the remaining first wireless network identifier.
In one possible implementation manner, the second wireless network identifier belonging to the non-public network is obtained by identifying any terminal based on the historical connection characteristics and the identification model of the wireless network accessed by the terminal.
Referring to fig. 5, in one possible implementation, the apparatus further includes:
a first obtaining module 405, configured to obtain a historical connection characteristic of the terminal to the third wireless network within a first specified number of days, where the historical connection characteristic is used to indicate a connection rule of the terminal to the third wireless network in a historical networking process;
the identification module 406 is configured to input the historical connection characteristics into an identification model, and output an identification result, where the identification model is used to identify whether the third wireless network is a non-public network;
a third sending module 407, configured to send the third wireless network identifier and the identification result to the server, so that the server marks the third wireless network based on the identification result.
In a possible implementation manner, the first obtaining module 405 is further configured to obtain connection information of the terminal to the third wireless network within a first specified number of days, where the connection information includes a time range in which the terminal accesses the third wireless network; determining at least one first characteristic of the terminal to the third wireless network based on the connection information, wherein each first characteristic is used for indicating the connection rule of the terminal to the third wireless network every day within a first specified number of days; an historical connection characteristic is determined based on the at least one first characteristic of the third wireless network and the first specified number of days.
In a possible implementation manner, the first obtaining module 405 is further configured to, when the date attribute of the date included in the first specified number of days only includes a working day or a non-working day, accumulate each first feature to obtain a second feature, and perform normalization processing on the second feature based on the first specified number of days to obtain a historical connection feature;
the first obtaining module 405 is further configured to, when the date attribute of the date included in the first specified number of days includes both a working day and a non-working day, determine a third feature according to each first feature corresponding to the working day, determine a fourth feature according to each first feature corresponding to the non-working day, and splice the third feature and the fourth feature to obtain the historical connection feature.
In the embodiment of the invention, a terminal sends a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal; receiving at least one wireless network password and at least one second wireless network identification belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identification are provided by the server; deleting the password corresponding to the second wireless network identifier from at least one wireless network password to obtain the rest wireless network passwords; and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers. The terminal deletes the wireless network password of the non-public network and generates the network access information only according to the rest wireless network password and the first wireless network identifier, so that the generated network access information does not contain the network access information of the non-public network, and the accuracy is improved.
Fig. 6 is a schematic structural diagram of an apparatus for acquiring network access information according to an exemplary embodiment, where the apparatus is applied in a server. Referring to fig. 6, the apparatus includes:
a second receiving module 501, configured to receive a password obtaining request sent by a terminal, where the password obtaining request carries at least one first wireless network identifier searched by the terminal;
a lookup module 502 configured to perform a lookup in a database based on at least one first wireless network identifier;
a second sending module 503, configured to send the at least one wireless network password and the second wireless network identifier to the terminal when the at least one wireless network password and the second wireless network identifier belonging to the non-public network in the at least one first wireless network are found.
Referring to fig. 7, in one possible implementation, the apparatus further includes:
a third receiving module 504, configured to receive a third wireless network identifier and an identification result sent by the terminal, where the identification result is used to indicate whether the third wireless network is a non-public network;
and a marking module 505, configured to mark the third wireless network according to the identification result.
In a possible implementation manner, the marking module 505 is further configured to store the identification result into a tag corresponding to the third wireless network when the identification result indicates that the third wireless network is a public network and the database does not store the identification result of the third wireless network;
and the marking module 505 is further configured to update the identification result to a tag corresponding to the third wireless network when the identification result indicates that the third wireless network is a non-public network.
Referring to fig. 8, in one possible implementation, the apparatus further includes:
a second obtaining module 506, configured to obtain sample data, where the sample data includes a first preset number of first type historical connection features and a second preset number of second type historical connection features, the first type of historical connection features are historical connection features of the terminal on the public network in a second specified number of days, and the second type of historical connection features are historical connection features of the terminal on the non-public network in a third specified number of days;
a generating module 507, configured to generate an identification model according to a first preset number of first type historical connection features and a second preset number of second type historical connection features;
a fourth sending module 508, configured to send the recognition model to the terminal.
In the embodiment of the invention, a terminal sends a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal; receiving at least one wireless network password and at least one second wireless network identification belonging to a non-public network in the first wireless network, wherein the at least one wireless network password and the second wireless network identification are provided by the server; deleting the password corresponding to the second wireless network identifier from at least one wireless network password to obtain the rest wireless network passwords; and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers. The terminal deletes the wireless network password of the non-public network and generates the network access information only according to the rest wireless network password and the first wireless network identifier, so that the generated network access information does not contain the network access information of the non-public network, and the accuracy is improved.
It should be noted that: in the apparatus for acquiring network access information according to the foregoing embodiment, when acquiring network access information, only the division of the functional modules is described as an example, and in practical applications, the function distribution may be completed by different functional modules according to needs, that is, the internal structure of the apparatus is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the apparatus for acquiring network access information and the method for acquiring network access information provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 9 is a schematic structural diagram of a terminal according to an embodiment of the present invention. The terminal may be configured to implement the functions performed by the terminal in the method for acquiring network access information shown in the above embodiments. Specifically, the method comprises the following steps:
terminal 900 can include RF (Radio Frequency) circuitry 910, memory 920 including one or more computer-readable storage media, input unit 930, display unit 940, sensors 950, audio circuitry 960, transmission module 970, processor 980 including one or more processing cores, and power supply 990, among other components. Those skilled in the art will appreciate that the terminal structure shown in fig. 9 does not constitute a limitation of the terminal, and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the RF circuit 910 may be used for receiving and transmitting signals during a message transmission or call, and in particular, for receiving downlink information from a base station and then processing the received downlink information by the one or more processors 980; in addition, data relating to uplink is transmitted to the base station. In general, RF circuit 910 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuit 910 may also communicate with networks and other terminals through wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, SMS (Short Messaging Service), and the like.
The memory 920 may be used to store software programs and modules corresponding to the terminal as shown in the above exemplary embodiments, and the processor 980 may execute various functional applications and data processing, such as implementing video-based interaction, by running the software programs and modules stored in the memory 920. The memory 920 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the terminal 900, and the like. Further, the memory 920 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 920 may also include a memory controller to provide the processor 980 and the input unit 930 with access to the memory 920.
The input unit 930 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, the input unit 930 may include a touch-sensitive surface 931 and other input terminals 932. The touch-sensitive surface 931, also referred to as a touch screen or a touch pad, may collect a user's touch operations on or near the touch-sensitive surface 931 (e.g., a user's operation on or near the touch-sensitive surface 931 using a finger, a stylus, or any other suitable object or attachment) and drive the corresponding link according to a predetermined program. Alternatively, the touch sensitive surface 931 may include both a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 980, and can receive and execute commands sent by the processor 980. In addition, the touch sensitive surface 931 may be implemented in various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 930 may also include other input terminals 932 in addition to the touch-sensitive surface 931. In particular, other input terminals 932 may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 940 may be used to display information input by or provided to the user and various graphical user interfaces of the terminal 900, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 940 may include a Display panel 941, and optionally, the Display panel 941 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 931 may overlay the display panel 941, and when a touch operation is detected on or near the touch-sensitive surface 931, the touch operation is transmitted to the processor 980 to determine the type of touch event, and the processor 980 then provides a corresponding visual output on the display panel 941 according to the type of touch event. Although in FIG. 9 the touch-sensitive surface 931 and the display panel 941 are shown as two separate components to implement input and output functions, in some embodiments the touch-sensitive surface 931 and the display panel 941 may be integrated to implement input and output functions.
The terminal 900 can also include at least one sensor 950, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display panel 941 according to the brightness of ambient light, and a proximity sensor that may turn off the display panel 941 and/or a backlight when the terminal 900 is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when the mobile phone is stationary, and can be used for applications of recognizing the posture of the mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured in the terminal 900, detailed descriptions thereof are omitted.
Audio circuitry 960, speaker 961, microphone 962 may provide an audio interface between a user and terminal 900. The audio circuit 960 may transmit the electrical signal converted from the received audio data to the speaker 961, and convert the electrical signal into a sound signal for output by the speaker 961; on the other hand, the microphone 962 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 960, and outputs the audio data to the processor 980 for processing, and then transmits the audio data to another terminal via the RF circuit 910, or outputs the audio data to the memory 920 for further processing. The audio circuit 960 may also include an earbud jack to provide communication of peripheral headphones with the terminal 900.
The terminal 900, through the transmission module 970, can assist a user in sending and receiving e-mail, browsing web pages, accessing streaming media, etc., which provides the user with wireless or wired broadband internet access. Although fig. 9 shows the transmission module 970, it is understood that it does not belong to the essential constitution of the terminal 900 and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 980 is a control center of the terminal 900, links various parts of the entire handset using various interfaces and lines, and performs various functions of the terminal 900 and processes data by operating or executing software programs and/or modules stored in the memory 920 and calling data stored in the memory 920, thereby integrally monitoring the handset. Optionally, processor 980 may include one or more processing cores; preferably, the processor 980 may integrate an application processor, which primarily handles operating systems, user interfaces, applications, etc., and a modem processor, which primarily handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 980.
The terminal 900 also includes a power supply 990 (e.g., a battery) for supplying power to the various components, which may be logically connected to the processor 980 via a power management system, for managing charging, discharging, and power consumption via the power management system. Power supply 990 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuits, power converters or inverters, power status indicators, and the like.
Although not shown, the terminal 900 may further include a camera, a bluetooth module, etc., which will not be described herein. Specifically, in this embodiment, the display unit of the terminal 900 is a touch screen display, and the terminal 900 further includes a memory and at least one instruction, at least one program, a code set, or an instruction set, where the at least one instruction, the at least one program, the code set, or the instruction set is stored in the memory and configured to be loaded and executed by one or more processors, so as to implement the operations executed in the method for acquiring network access information in the foregoing embodiments.
Fig. 10 is a schematic structural diagram of a server according to an embodiment of the present invention; the server 1000 may have relatively large differences in configuration or performance, and may include one or more Central Processing Units (CPUs) 1022 (e.g., one or more processors) and memory 1032, one or more storage media 1030 (e.g., one or more mass storage devices) storing applications 1042 or data 1044. Memory 1032 and storage medium 1030 may be, among other things, transient or persistent storage. The program stored on the storage medium 1030 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, a central processor 1022 may be disposed in communication with the storage medium 1030, and configured to execute a series of instruction operations in the storage medium 1030 on the server 1000.
The Server 1000 may also include one or more power supplies 1026, one or more wired or wireless network interfaces 1050, one or more input-output interfaces 1058, one or more keyboards 1056, and/or one or more operating systems 1041, such as a Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTMAnd so on.
The server 1000 may be configured to perform the steps performed by the server in the method for acquiring network access information provided in the foregoing embodiments.
The device for acquiring network access information, which is applied to a terminal, includes a processor and a memory, where the memory stores at least one instruction, at least one section of program, code set, or instruction set, and the instruction, the program, the code set, or the instruction set is loaded and executed by the processor to implement the operations executed by the terminal in the method for acquiring network access information of the foregoing embodiment.
The device for acquiring network access information, which is applied to the server, includes a processor and a memory, where the memory stores at least one instruction, at least one section of program, code set, or instruction set, and the instruction, the program, the code set, or the instruction set is loaded and executed by the processor to implement the operations executed by the server in the method for acquiring network access information of the foregoing embodiment.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium is applied to a terminal, and at least one instruction, at least one program, a code set, or a set of instructions is stored in the computer-readable storage medium, where the instruction, the program, the code set, or the set of instructions are loaded and executed by a processor to implement the operations performed by the terminal in the method for acquiring network access information according to the foregoing embodiments.
An embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium is applied to a server, and at least one instruction, at least one program, a code set, or a set of instructions is stored in the computer-readable storage medium, where the instruction, the program, the code set, or the set of instructions is loaded and executed by a processor to implement the operations performed by the server in the method for acquiring network access information according to the foregoing embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (13)

1. A method for acquiring network access information is applied to a terminal, and the method comprises the following steps:
sending a password acquisition request to a server, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal;
receiving at least one wireless network password provided by the server and a second wireless network identifier belonging to a non-public network in at least one first wireless network, wherein the second wireless network identifier belonging to the non-public network is obtained by identifying any terminal based on historical connection characteristics and an identification model of the terminal accessing the wireless network;
deleting the password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords;
and generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers.
2. The method of claim 1, wherein prior to sending the password acquisition request to the server, the method further comprises:
acquiring historical connection characteristics of the terminal to a third wireless network within a first specified number of days, wherein the historical connection characteristics are used for indicating a connection rule of the terminal to the third wireless network in a historical networking process;
inputting the historical connection characteristics into an identification model, and outputting an identification result, wherein the identification model is used for identifying whether the third wireless network is a non-public network;
and sending a third wireless network identification and the identification result to the server so that the server marks the third wireless network based on the identification result.
3. The method of claim 2, wherein obtaining the historical connection characteristics of the terminal to the third wireless network for the first specified number of days comprises:
acquiring connection information of the terminal to the third wireless network within the first appointed days, wherein the connection information comprises a time range of the terminal accessing the third wireless network;
determining at least one first characteristic of the terminal to the third wireless network based on the connection information, wherein each first characteristic is used for indicating the connection rule of the terminal to the third wireless network every day in the first specified number of days;
determining the historical connection characteristic based on at least one first characteristic of the third wireless network and the first specified number of days.
4. The method of claim 3, wherein determining the historical connection characteristic based on the at least one first characteristic of the third wireless network and the first specified number of days comprises:
when the date attribute of the date included in the first appointed number of days only comprises working days or non-working days, accumulating each first characteristic to obtain a second characteristic, and performing normalization processing on the second characteristic based on the first appointed number of days to obtain the historical connection characteristic;
when the date attribute of the date included in the first appointed number of days includes not only the working day but also the non-working day, determining a third feature according to each first feature corresponding to the working day, determining a fourth feature according to each first feature corresponding to the non-working day, and splicing the third feature and the fourth feature to obtain the historical connection feature.
5. A method for obtaining network access information, which is applied to a server, the method comprises:
receiving a third wireless network identifier and an identification result sent by a terminal, wherein the identification result is used for indicating whether the third wireless network is a non-public network;
marking the third wireless network in a database according to the identification result;
receiving a password acquisition request sent by the terminal, wherein the password acquisition request carries at least one first wireless network identifier searched by the terminal;
performing a lookup in the database based on the at least one first wireless network identification;
when at least one wireless network password and a second wireless network identifier which belongs to a non-public network in at least one first wireless network are found, the at least one wireless network password and the second wireless network identifier are sent to the terminal, the at least one wireless network password and the second wireless network identifier are used for the terminal to delete a password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords, and network access information of the first wireless network is generated based on the rest wireless network passwords and the rest first wireless network identifiers.
6. The method of claim 5, wherein the tagging the third wireless network in a database according to the identification result comprises:
when the identification result indicates that the third wireless network is an open network and the identification result of the third wireless network is not stored in the database, storing the identification result into a tag corresponding to the third wireless network in the database;
and when the identification result indicates that the third wireless network is a non-public network, updating the identification result into a label corresponding to the third wireless network in a database.
7. The method according to claim 5 or 6, wherein before the receiving the password acquisition request sent by the terminal, the method further comprises:
acquiring sample data, wherein the sample data comprises a first preset number of first type historical connection features and a second preset number of second type historical connection features, the first type of historical connection features are historical connection features of the terminal on the public network within a second appointed number of days, and the second type of historical connection features are historical connection features of the terminal on the non-public network within a third appointed number of days;
generating an identification model according to the first preset number of first type historical connection features and the second preset number of second type historical connection features;
and sending the recognition model to a terminal.
8. An apparatus for acquiring network access information, applied to a terminal, the apparatus comprising:
a first sending module, configured to send a password obtaining request to a server, where the password obtaining request carries at least one first wireless network identifier searched by the terminal;
the first receiving module is used for receiving at least one wireless network password provided by the server and a second wireless network identifier belonging to a non-public network in at least one first wireless network, wherein the second wireless network identifier belonging to the non-public network is obtained by identifying any terminal based on historical connection characteristics and an identification model of the terminal accessing the wireless network;
the deleting module is used for deleting the password corresponding to the second wireless network identifier from the at least one wireless network password to obtain the rest wireless network passwords;
and the generating module is used for generating network access information of the first wireless network based on the rest wireless network passwords and the rest first wireless network identifiers.
9. An apparatus for acquiring network access information, applied to a server, the apparatus comprising:
the third receiving module is used for receiving a third wireless network identifier and an identification result sent by the terminal, wherein the identification result is used for indicating whether the third wireless network is a non-public network;
the marking module is used for marking the third wireless network in a database according to the identification result;
a second receiving module, configured to receive a password acquisition request sent by the terminal, where the password acquisition request carries at least one first wireless network identifier searched by the terminal;
a lookup module configured to perform a lookup in the database based on the at least one first wireless network identifier;
the second sending module is configured to send the at least one wireless network password and the second wireless network identifier to the terminal when finding out the at least one wireless network password and the second wireless network identifier, which belongs to a non-public network, in the at least one first wireless network, where the at least one wireless network password and the second wireless network identifier are used for the terminal to delete a password corresponding to the second wireless network identifier from the at least one wireless network password, so as to obtain a remaining wireless network password, and generate the network access information of the first wireless network based on the remaining wireless network password and the remaining first wireless network identifier.
10. An apparatus for obtaining network access information, the apparatus being applied to a terminal and comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the operations performed in the method for obtaining network access information according to any claim from 1 to 4.
11. An apparatus for obtaining network access information, the apparatus being applied to a server and comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the instruction, the program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the operations performed in the method for obtaining network access information according to any claim from 5 to 7.
12. A computer-readable storage medium, applied to a terminal, storing at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the operations performed in the method for acquiring network access information according to any one of claims 1 to 4.
13. A computer-readable storage medium, applied to a server, storing at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the operations performed in the method for acquiring network access information according to any one of claims 5 to 7.
CN201710792292.0A 2017-09-05 2017-09-05 Method, device and computer readable storage medium for acquiring network access information Active CN109429229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710792292.0A CN109429229B (en) 2017-09-05 2017-09-05 Method, device and computer readable storage medium for acquiring network access information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710792292.0A CN109429229B (en) 2017-09-05 2017-09-05 Method, device and computer readable storage medium for acquiring network access information

Publications (2)

Publication Number Publication Date
CN109429229A CN109429229A (en) 2019-03-05
CN109429229B true CN109429229B (en) 2021-06-01

Family

ID=65514141

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710792292.0A Active CN109429229B (en) 2017-09-05 2017-09-05 Method, device and computer readable storage medium for acquiring network access information

Country Status (1)

Country Link
CN (1) CN109429229B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951846B (en) * 2019-03-25 2020-10-27 腾讯科技(深圳)有限公司 Wireless network identification method and device, storage medium and computer equipment
CN110519130B (en) * 2019-07-16 2021-06-29 中移(杭州)信息技术有限公司 Equipment network access method and system
CN117596600A (en) * 2023-12-06 2024-02-23 北京清远博创科技有限公司 Wireless network access method, system and routing device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685750A (en) * 2012-06-12 2012-09-19 刘梦阳 Method for accessing wireless network, equipment and wireless network system
CN103458408A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
CN103458409A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
CN104618873A (en) * 2015-01-15 2015-05-13 腾讯科技(深圳)有限公司 Method and device for sharing access point information
US9686238B1 (en) * 2016-07-07 2017-06-20 Oceus Networks Inc. Secure network enrollment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9531835B2 (en) * 2007-02-13 2016-12-27 Devicescape Software, Inc. System and method for enabling wireless social networking
CN104506501A (en) * 2014-12-12 2015-04-08 中兴通讯股份有限公司 Method and system for realizing shared WALN (Wireless Local Area Network) management and WLAN shared registration server
CN106385679A (en) * 2016-08-30 2017-02-08 乐视控股(北京)有限公司 WIFI password sharing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102685750A (en) * 2012-06-12 2012-09-19 刘梦阳 Method for accessing wireless network, equipment and wireless network system
CN103458408A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
CN103458409A (en) * 2013-08-19 2013-12-18 小米科技有限责任公司 Network connection method and network sharing method and device
CN104618873A (en) * 2015-01-15 2015-05-13 腾讯科技(深圳)有限公司 Method and device for sharing access point information
US9686238B1 (en) * 2016-07-07 2017-06-20 Oceus Networks Inc. Secure network enrollment

Also Published As

Publication number Publication date
CN109429229A (en) 2019-03-05

Similar Documents

Publication Publication Date Title
US10972425B2 (en) Method, device and system for service platform address resolution
CN107562835B (en) File searching method and device, mobile terminal and computer readable storage medium
CN105471931B (en) Method, device and system for inquiring service data
CN105429775B (en) Method and device for reporting log
CN107204964B (en) Authority management method, device and system
CN104112213A (en) Method and apparatus of recommendation information
WO2019128598A1 (en) Application processing method, electronic device, and computer readable storage medium
CN104951432A (en) Information processing method and device
CN104516888B (en) The permission querying method and device of multidimensional data
CN109429229B (en) Method, device and computer readable storage medium for acquiring network access information
CN110008234B (en) Service data searching method and device and electronic equipment
CN108809805B (en) Information interaction method and system and public account client
CN110633438B (en) News event processing method, terminal, server and storage medium
CN113420051A (en) Data query method and device, electronic equipment and storage medium
US10298590B2 (en) Application-based service providing method, apparatus, and system
CN110555155B (en) Article information recommendation method, device and storage medium
CN114595124A (en) Time sequence abnormity detection model evaluation method, related device and storage medium
JP6915074B2 (en) Message notification method and terminal
CN114840565A (en) Sampling query method, device, electronic equipment and computer readable storage medium
CN114115895A (en) Code query method and device, electronic equipment and storage medium
CN111274463B (en) Information display method, device and storage medium based on IM contact person grouping setting
CN112445967B (en) Information pushing method and device, readable storage medium and information pushing system
CN108804434B (en) Message query method, server and terminal equipment
CN114648336A (en) Face payment method and device, electronic equipment and storage medium
CN111294275B (en) User information indexing method, device, server and storage medium of IM tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant