CN111866995A - WeChat applet-based intelligent device network distribution method and system - Google Patents

WeChat applet-based intelligent device network distribution method and system Download PDF

Info

Publication number
CN111866995A
CN111866995A CN202010727097.1A CN202010727097A CN111866995A CN 111866995 A CN111866995 A CN 111866995A CN 202010727097 A CN202010727097 A CN 202010727097A CN 111866995 A CN111866995 A CN 111866995A
Authority
CN
China
Prior art keywords
information
network
protocol
determining
field
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010727097.1A
Other languages
Chinese (zh)
Other versions
CN111866995B (en
Inventor
陈秋羽
许力文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangyun Internet Of Things Technology Guangzhou Co ltd
Original Assignee
Guangyun Internet Of Things Technology Guangzhou Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangyun Internet Of Things Technology Guangzhou Co ltd filed Critical Guangyun Internet Of Things Technology Guangzhou Co ltd
Priority to CN202010727097.1A priority Critical patent/CN111866995B/en
Publication of CN111866995A publication Critical patent/CN111866995A/en
Application granted granted Critical
Publication of CN111866995B publication Critical patent/CN111866995B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to the technical field of wireless communication, in particular to a WeChat applet-based intelligent device network distribution method and system. The method comprises the steps of firstly obtaining access signature information and access records of the intelligent equipment when a distribution network request sent by a WeChat small program is detected, secondly extracting a signature field set of the access signature information and record list information of the access records, secondly determining equipment safety indexes of the intelligent equipment based on each digital signature and corresponding networking information thereof, and determining network safety levels corresponding to the equipment safety indexes, further determining protocol layer characteristic information and a data forwarding path according to the obtained data authority information of the Wi-Fi router, and finally sending access prompt information to the Wi-Fi router after the network safety levels are determined to reach a reference safety level determined according to the protocol layer characteristic information and the data forwarding path so as to realize one-key distribution of the intelligent equipment. Therefore, frequent interaction of the intelligent equipment and the Wi-Fi router in the distribution network process can be avoided, and distribution network accuracy and distribution network reliability are improved.

Description

WeChat applet-based intelligent device network distribution method and system
Technical Field
The invention relates to the technical field of wireless communication, in particular to a WeChat applet-based intelligent device network distribution method and system.
Background
With the development of communication technology, wireless networks are applied more and more widely. Wi-Fi is a main implementation mode of wireless communication, and can wirelessly connect intelligent devices with each other and realize remote information transmission and data interaction of the intelligent devices.
When the smart device accesses a new Wi-Fi network, frequent access authentication and access operations are required, which may cause the following two technical problems.
(1) The intelligent equipment and the Wi-Fi router are required to interact for many times, the time consumed by the distribution network of the intelligent equipment is increased, and if the intelligent equipment fails in the operation process of the distribution network, the accuracy of the distribution network can be reduced.
(2) When the network is distributed, the memory resources of the Wi-Fi router need to be occupied, and when the number of the intelligent devices for distributing the network in the same time period is large, the memory resources of the Wi-Fi router are insufficient, so that the network distribution failure of part of the intelligent devices is caused.
In conclusion, the existing intelligent equipment network distribution technology has the technical problems of long time consumption, low accuracy and low reliability.
Disclosure of Invention
The invention provides a WeChat applet-based intelligent device network distribution method and system, aiming at solving the technical problems of long network distribution time consumption, low accuracy and low reliability in the related technology.
The method for distributing the network to the intelligent equipment based on the WeChat small program comprises the following steps:
when a distribution network request sent by a WeChat applet installed in an intelligent device is detected, acquiring network access signature information of the intelligent device and a network access record of the intelligent device in a set time period;
extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
determining a network access behavior track of the intelligent equipment in the set time period based on each digital signature and the corresponding networking information thereof, determining an equipment safety index of the intelligent equipment from the network access behavior track, and determining a network safety level corresponding to the equipment safety index from a preset safety detection list;
acquiring data authority information of a Wi-Fi router and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data authority information;
and determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying a device check code of the intelligent device to the Wi-Fi router when the network security level reaches the reference security level, so that the Wi-Fi router accesses the intelligent device to a Wi-Fi network corresponding to the Wi-Fi router through the device check code.
Optionally, determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path includes:
protocol information of communication between the Wi-Fi router and a plurality of other devices, which is included in the protocol layer characteristic information, is obtained, and a protocol field in each piece of protocol information and a field signature corresponding to the protocol field are extracted;
mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a matching degree between the mapping field and a field signature corresponding to the mapping field;
and carrying out weighted summation on the matching degree corresponding to each path node according to the holding time of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
Optionally, the extracting a protocol field in each piece of protocol information and a field signature corresponding to the protocol field includes:
determining a field splitting identification set of each piece of protocol information and constructing a protocol layer network of each piece of protocol information; the field splitting identification set comprises a plurality of splitting identifications with splitting priority, and the protocol layer network comprises a plurality of sub-networks with different protocol confidence degrees;
acquiring a median of the splitting priority, and determining at least two second splitting identifications with splitting permission from a plurality of first splitting identifications corresponding to the median;
splitting each piece of protocol information according to the position of the second splitting identifier in each piece of protocol information to obtain a plurality of information fields; extracting field description characteristics of each information field, calculating the cosine distance between each field description characteristic and preset description characteristics, and selecting a set number of information fields corresponding to the field description characteristics with the largest cosine distance as protocol fields;
determining first address information of each protocol field in a file directory of a byte code file of the corresponding protocol information, analyzing the first address information to obtain second address information which has a default association relation with the first address information, and generating a field signature corresponding to each protocol field according to an address path between the first address information and the second address information.
Optionally, determining a network access behavior track of the smart device in the set time period based on each digital signature and the networking information corresponding to the digital signature comprises:
clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element;
converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a set file generated by table driving, sequentially loading each set file into a preset identification thread according to the size sequence of the number of the clustering elements in the clustering set corresponding to the set file, and operating the identification thread to obtain a common networking record corresponding to each set file; wherein the common networking records are networking records with overlapping among the networking information of different clustering elements in the same clustering set;
pre-generating a plurality of behavior data packets used for representing the network access behavior of the intelligent equipment based on each digital signature and the corresponding networking information thereof, and performing node processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
Optionally, generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information includes:
connecting the initial nodes according to the second node pointing information to obtain an initial behavior track;
and smoothing the initial behavior track by adopting a weighting coefficient corresponding to the signature random number of the digital signature to obtain the network access behavior track.
Optionally, determining an equipment security index of the intelligent device from the network access behavior track, and determining a network security level corresponding to the equipment security index from a preset security detection list, includes:
dividing the network access behavior track according to a set step length to obtain a plurality of track intervals;
determining network access state data of the intelligent equipment corresponding to each track interval;
calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index;
extracting index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
The intelligent equipment distribution network system based on the WeChat small program comprises intelligent equipment, a server and a Wi-Fi router; the server is communicated with the intelligent equipment, the Wi-Fi router and a WeChat applet installed in the intelligent equipment;
the WeChat applet is to: sending a distribution network request to the server;
the server is configured to:
when the distribution network request is detected, acquiring network access signature information of the intelligent equipment and a network access record of the intelligent equipment in a set time period;
extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
determining a network access behavior track of the intelligent equipment in the set time period based on each digital signature and the corresponding networking information thereof, determining an equipment safety index of the intelligent equipment from the network access behavior track, and determining a network safety level corresponding to the equipment safety index from a preset safety detection list;
acquiring data authority information of a Wi-Fi router and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data authority information;
determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying an equipment check code of the intelligent equipment to the Wi-Fi router when the network security level reaches the reference security level;
the Wi-Fi router is to:
and accessing the intelligent equipment to the Wi-Fi network corresponding to the Wi-Fi router through the equipment check code.
Optionally, the determining, by the server, the reference security level of the Wi-Fi router according to the protocol layer feature information and the data forwarding path specifically includes:
protocol information of communication between the Wi-Fi router and a plurality of other devices, which is included in the protocol layer characteristic information, is obtained, and a protocol field in each piece of protocol information and a field signature corresponding to the protocol field are extracted;
mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a matching degree between the mapping field and a field signature corresponding to the mapping field;
and carrying out weighted summation on the matching degree corresponding to each path node according to the holding time of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
Optionally, the determining, by the server, the network access behavior trajectory of the smart device within the set time period based on each digital signature and the networking information corresponding to the digital signature includes:
clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element;
converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a set file generated by table driving, sequentially loading each set file into a preset identification thread according to the size sequence of the number of the clustering elements in the clustering set corresponding to the set file, and operating the identification thread to obtain a common networking record corresponding to each set file; wherein the common networking records are networking records with overlapping among the networking information of different clustering elements in the same clustering set;
pre-generating a plurality of behavior data packets used for representing the network access behavior of the intelligent equipment based on each digital signature and the corresponding networking information thereof, and performing node processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
Optionally, the determining, by the server, the device security index of the intelligent device from the network access behavior trajectory, and determining, from a preset security detection list, a network security level corresponding to the device security index by the server includes:
dividing the network access behavior track according to a set step length to obtain a plurality of track intervals;
determining network access state data of the intelligent equipment corresponding to each track interval;
calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index;
extracting index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
The invention provides a network distribution method and system of intelligent equipment based on a WeChat small program, firstly, when a network distribution request sent by the WeChat small program is detected, network access signature information and a network access record of the intelligent equipment are obtained, secondly, extracting a signature field set of the network access signature information and record list information of the network access record, then determining equipment safety indexes of the intelligent equipment and determining network safety levels corresponding to the equipment safety indexes based on each digital signature and the corresponding networking information, and finally, after the network security level is determined to reach the reference security level determined according to the protocol layer feature information and the data forwarding path, access prompt information is sent to the Wi-Fi router so as to realize the one-key distribution of the intelligent equipment. Therefore, frequent interaction of the intelligent equipment and the Wi-Fi router in the distribution network process can be avoided, and distribution network accuracy and distribution network reliability are improved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic system architecture diagram of a wechat applet-based intelligent device distribution network system.
Fig. 2 is a flowchart of a wechat applet-based intelligent device network distribution method.
Fig. 3 is a functional module block diagram of the intelligent device distribution network device based on the wechat applet.
Fig. 4 is a schematic diagram of a hardware configuration of a server in the system shown in fig. 1.
Detailed Description
The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
In order to solve the problems of long distribution network consumption time, low distribution network accuracy and low distribution network reliability of the existing intelligent device distribution network technology, the embodiment of the invention provides an intelligent device distribution network method and system based on a WeChat small program, which can realize one-key distribution of an intelligent device and a Wi-Fi router through the WeChat small program, so that the distribution network time consumption can be effectively reduced, frequent interaction of the intelligent device and the Wi-Fi router in the distribution network process is avoided, and the distribution network accuracy and the distribution network reliability are improved.
To achieve the above object, please first refer to fig. 1, which provides a schematic system architecture of a distribution network system 100 for smart devices based on a wechat applet, where the distribution network system 100 may include a smart device 110, a server 120, and a Wi-Fi router 130. The server 120 is respectively communicated with the intelligent device 110 and the Wi-Fi router 130, and the intelligent device 110 is provided with a wechat applet 140 communicated with the server 120. In this embodiment, the smart device 110 may be a mobile phone, a tablet computer, a notebook computer, or the like, and the server 120 may be a server corresponding to the wechat applet 140.
On the basis, the intelligent device distribution network system 100 shown in fig. 1 can realize one-key distribution of the intelligent device 110 and the Wi-Fi router 130, so that the distribution network speed, accuracy and reliability are improved. In detail, please refer to fig. 2 in combination, a network distribution method for intelligent devices based on a wechat applet is provided, where the method may be applied to the server 120 in fig. 1, a processor 121, a network interface 122 and a memory 123 as shown in fig. 3 are integrated in the server 120, when the server 120 executes the method, the processor 121 retrieves a computer program from the memory 123 through the network interface 122, and when the processor 121 executes the computer program, the network distribution method for intelligent devices as described in steps S210 to S250 shown in fig. 2 is implemented.
Step S210, when a distribution network request sent by a WeChat applet installed in an intelligent device is detected, network access signature information of the intelligent device and a network access record of the intelligent device in a set time period are obtained.
In this embodiment, the intelligent device starts the wechat applet when receiving a first operation instruction input by a user, and the wechat applet sends the distribution network request to the server after starting and when receiving a second operation instruction input by the user.
In this embodiment, the network access signature information is authentication information of the smart device when the smart device accesses the network, and the network access record includes networking information of the smart device and other routers (wired or wireless).
Step S220, extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer.
Step S230, determining a network access behavior track of the intelligent device in the set time period based on each digital signature and the networking information corresponding to the digital signature, determining a device security index of the intelligent device from the network access behavior track, and determining a network security level corresponding to the device security index from a preset security detection list.
In this embodiment, the network access behavior trajectory is used to describe interaction behavior data between the intelligent device and different routers, the device security index is used to describe data security of the intelligent device in the network access process, and the network security level represents an influence of the intelligent device on the data security of the router.
Step S240, acquiring data authority information of the Wi-Fi router and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data authority information.
In this embodiment, the data permission information is used to characterize the data processing permission supported by the Wi-Fi router, the protocol layer characteristic information is protocol information for the Wi-Fi router to communicate with other devices, and the data forwarding path characterizes path information for the Wi-Fi router to forward data exchanged between different devices.
Step S250, determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying a device check code of the intelligent device to the Wi-Fi router when the network security level reaches the reference security level, so that the Wi-Fi router accesses the intelligent device to a Wi-Fi network corresponding to the Wi-Fi router through the device check code.
It can be understood that, through the above steps S210 to S250, firstly, when a distribution network request sent by the wechat applet is detected, network access signature information and a network access record of the smart device are obtained, secondly, a signature field set of the network access signature information and record list information of the network access record are extracted, then, based on each digital signature and corresponding networking information thereof, an equipment security index of the smart device is determined, and a network security level corresponding to the equipment security index is determined, further, according to the obtained data authority information of the Wi-Fi router, protocol layer feature information and a data forwarding path are determined, and finally, after it is determined that the network security level reaches a reference security level determined according to the protocol layer feature information and the data forwarding path, access prompt information is sent to the Wi-Fi router to implement one-key distribution of the smart device. Therefore, frequent interaction of the intelligent equipment and the Wi-Fi router in the distribution network process can be avoided, and distribution network accuracy and distribution network reliability are improved.
In a specific implementation process, in order to accurately and reliably determine the reference security level of the Wi-Fi router so as to ensure that the smart device and the Wi-Fi router are quickly and safely connected to each other, the determining, according to the protocol layer characteristic information and the data forwarding path, the reference security level of the Wi-Fi router in step S250 may specifically include the following steps S251 to S254.
Step S251, obtaining protocol information, included in the protocol layer feature information, of the Wi-Fi router communicating with multiple other devices, and extracting a protocol field in each piece of protocol information and a field signature corresponding to the protocol field.
Step S252, mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature, so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a degree of match between the mapped field and its corresponding field signature.
And step S253, carrying out weighted summation on the matching degrees corresponding to the path nodes according to the holding duration of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
In executing the contents described in the above steps S251 to S253, the length of time that the path node keeps in the data forwarding path can be taken into account, so that weighting is performed when calculating the reference security level according to the matching degree between the mapping field and the field signature corresponding thereto. Therefore, the reference security level of the Wi-Fi router can be accurately and reliably determined, and the intelligent device and the Wi-Fi router can be rapidly and safely distributed.
In a more specific embodiment, in order to accurately extract the protocol field and the field signature so as to accurately determine the reference security level of the Wi-Fi router, the extraction of the protocol field and the field signature corresponding to the protocol field in each piece of protocol information, which is described in step S251, may include the following steps S2511 to S2514.
Step S2511, determining a field splitting identification set of each protocol message and constructing a protocol layer network of each protocol message; the field splitting identification set comprises a plurality of splitting identifications with splitting priority, and the protocol layer network comprises a plurality of sub-networks with different protocol confidence degrees.
Step S2512, a median of the splitting priorities is obtained, and at least two second splitting identifiers having splitting permissions are determined from the plurality of first splitting identifiers corresponding to the median.
Step S2513, splitting each piece of protocol information according to the position of the second splitting identifier in each piece of protocol information to obtain a plurality of information fields; and extracting the field description characteristics of each information field, calculating the cosine distance between each field description characteristic and preset description characteristics, and selecting the information fields corresponding to the field description characteristics with the set number and the largest cosine distance as protocol fields.
Step S2514, determining first address information of each protocol field in a file directory of a byte code file of the protocol information corresponding to each protocol field, analyzing the first address information to obtain second address information having a default association relationship with the first address information, and generating a field signature corresponding to each protocol field according to an address path between the first address information and the second address information.
It is understood that through the descriptions of the above steps S2511 to S2514, the protocol field and the field signature can be accurately extracted so as to accurately determine the reference security level of the Wi-Fi router.
When the inventor implements the method, the problem that the network access behavior track is interrupted frequently occurs when the network access behavior track is determined. After the inventor researches and analyzes the problem, it is found that the main reason for the problem is that relevance between networking information of different digital signatures is not taken into consideration, and in order to improve the problem, in step S230, a networking behavior trajectory of the smart device within the set time period is determined based on each digital signature and the networking information corresponding to the digital signature, which may specifically include the contents described in the following steps S2311 to S2313.
Step S2311, clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element.
Step S2312, converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a setting file generated by table driving, sequentially loading each setting file into a preset identification thread according to the size sequence of the number of clustering elements in the clustering set corresponding to the setting file, and obtaining a common networking record corresponding to each setting file by operating the identification thread; wherein the common networking record is a networking record in which an overlap exists between networking information of different clustering elements in the same clustering set.
Step S2313, pre-generating a plurality of behavior data packets for representing the network access behaviors of the intelligent equipment based on each digital signature and the networking information corresponding to the digital signature, and performing nodularization processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
In a specific implementation process, based on the content described in the above step S2311 to step S2313, the relevance between networking information of different digital signatures can be taken into account, so that when the network access behavior trajectory is determined, the network access behavior trajectory is prevented from being interrupted, and the integrity of the network access behavior trajectory is ensured.
On the basis, the generating of the network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information in step S2313 may specifically include the following steps: connecting the initial nodes according to the second node pointing information to obtain an initial behavior track; and smoothing the initial behavior track by adopting a weighting coefficient corresponding to the signature random number of the digital signature to obtain the network access behavior track. Therefore, the noise node of the network access behavior track can be eliminated, and the accuracy of the network access behavior track is ensured.
In a specific implementation, the determining, in step S230, the device security index of the intelligent device from the network access behavior trajectory, and determining, from a preset security detection list, a network security level corresponding to the device security index may specifically include the contents described in the following steps S2321 to S2324.
Step S2321, the network access behavior track is divided according to a set step length to obtain a plurality of track intervals.
Step S2322, determining the network access state data of the intelligent device corresponding to each track interval.
Step S2323, calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index.
Step S2324, extracting the index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
In a specific implementation process, by executing the contents described in the above steps S2321 to S2324, the network security level of the device security index can be indirectly determined based on the security detection list, so that the reliability of the network security level can be ensured.
Optionally, in order to ensure the accuracy of the protocol layer characteristic information and the integrity of the data forwarding path, the acquiring of the data authority information of the Wi-Fi router and determining the protocol layer characteristic information and the data forwarding path of the Wi-Fi router according to the data authority information described in step S240 may specifically include what is described in the following steps S241 to S244.
Step S241, sending a request instruction for calling data permission information of the Wi-Fi server to the Wi-Fi router through a permission authentication interface of the Wi-Fi router; wherein, the request instruction carries authorization information of the server.
Step S242, receiving data authority information sorted out by the Wi-Fi router according to the authorization information in the request instruction; wherein the data permission information comprises information of all permission levels of the Wi-Fi router.
Step S243, listing the data access records under each authority level in the data authority information, and establishing a data access record list; the data access record list comprises a plurality of list lists, and each list has different list dimension information.
Step S244, extracting the protocol layer characteristic information of the Wi-Fi router from the data authority information according to the list dimension information, and determining the data forwarding path based on the distribution information of the protocol layer characteristic information in the data authority information.
It can be understood that, through the descriptions of the above steps S241 to S244, the accuracy of the protocol layer characteristic information can be ensured, so that the data forwarding path is completely determined based on the protocol layer characteristic information.
In an alternative embodiment, the determining the data forwarding path based on the distribution information of the protocol layer characteristic information in the data authority information described in step S244 may specifically include the following steps S2441 to S2444.
Step S2441, extracting information topology of distribution information of the protocol layer characteristic information in the data authority information and determining each protocol information packet of the distribution information; and determining a dynamic protocol type and a static protocol type corresponding to the protocol layer characteristic information based on the information topology, and determining whether the type of each protocol information is the dynamic protocol type or the static protocol type according to a configuration script in each protocol information packet.
Step S2442, determining the information coincidence ratio between each protocol information packet of the protocol layer characteristic information under the static protocol type and each protocol information packet of the protocol layer characteristic information under the dynamic protocol type based on the protocol information packet of the protocol layer characteristic information under the dynamic protocol type and the protocol packet encapsulation information thereof.
Step S2443, according to the information overlap ratio, dividing the protocol information packet whose information overlap ratio between the protocol layer feature information in the static protocol category and the protocol information packet in the dynamic protocol category is greater than a set overlap ratio into the dynamic protocol category.
Step S2444, listing the protocol information packets under the dynamic protocol category, setting a protocol priority for each protocol information packet according to the information overlap ratio between the protocol information packets under the dynamic protocol category, sorting the protocol information packets under the dynamic protocol category according to the size sequence of the protocol priority, and determining the data forwarding path according to the sorting result.
It can be understood that based on the above steps S2441 to S2444, the data forwarding path can be accurately determined, and confusion of the data forwarding path is avoided.
Based on the same inventive concept, an intelligent device distribution network system 100 based on the wechat applet is also provided, in which,
the WeChat applet 140 is configured to: sending a distribution network request to the server 120;
the server 120 is configured to:
when the distribution network request is detected, acquiring network access signature information of the intelligent device 110 and a network access record of the intelligent device in a set time period;
extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
determining a network access behavior track of the intelligent equipment in the set time period based on each digital signature and the corresponding networking information thereof, determining an equipment safety index of the intelligent equipment from the network access behavior track, and determining a network safety level corresponding to the equipment safety index from a preset safety detection list;
acquiring data authority information of the Wi-Fi router 130 and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router 130 according to the data authority information;
determining a reference security level of the Wi-Fi router 130 according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying a device check code of the intelligent device 110 to the Wi-Fi router 130 when the network security level reaches the reference security level;
the Wi-Fi router 130 is configured to:
and accessing the intelligent device 110 to the Wi-Fi network corresponding to the Wi-Fi router 130 through the device check code.
Optionally, the determining, by the server 120, the reference security level of the Wi-Fi router according to the protocol layer feature information and the data forwarding path specifically includes:
protocol information of communication between the Wi-Fi router and a plurality of other devices, which is included in the protocol layer characteristic information, is obtained, and a protocol field in each piece of protocol information and a field signature corresponding to the protocol field are extracted;
mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a matching degree between the mapping field and a field signature corresponding to the mapping field;
and carrying out weighted summation on the matching degree corresponding to each path node according to the holding time of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
Optionally, the determining, by the server 120, the network access behavior trajectory of the smart device 110 within the set time period based on each digital signature and the corresponding networking information thereof includes:
clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element;
converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a set file generated by table driving, sequentially loading each set file into a preset identification thread according to the size sequence of the number of the clustering elements in the clustering set corresponding to the set file, and operating the identification thread to obtain a common networking record corresponding to each set file; wherein the common networking records are networking records with overlapping among the networking information of different clustering elements in the same clustering set;
pre-generating a plurality of behavior data packets used for representing the network access behavior of the intelligent equipment based on each digital signature and the corresponding networking information thereof, and performing node processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
Optionally, the determining, by the server 120, the device security index of the intelligent device from the network access behavior trajectory, and determining, from a preset security detection list, a network security level corresponding to the device security index includes:
dividing the network access behavior track according to a set step length to obtain a plurality of track intervals;
determining network access state data of the intelligent equipment corresponding to each track interval;
calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index;
extracting index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
Based on the same inventive concept, please refer to fig. 3 in combination, a network distribution device 300 for an intelligent device based on a wechat applet is further provided, and the device is applied to the server 120 in fig. 1, and specifically includes the following functional modules:
the request detection module 310 is configured to, when a distribution network request sent by a wechat applet installed in an intelligent device is detected, obtain network access signature information of the intelligent device and a network access record of the intelligent device in a set time period;
an information extraction module 320, configured to extract a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
a track determining module 330, configured to determine, based on each digital signature and networking information corresponding to the digital signature, a network access behavior track of the intelligent device in the set time period, determine a device security index of the intelligent device from the network access behavior track, and determine, from a preset security detection list, a network security level corresponding to the device security index;
the path determining module 340 is configured to obtain data permission information of a Wi-Fi router and determine protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data permission information;
and a distribution network indication module 350, configured to determine a reference security level of the Wi-Fi router according to the protocol layer feature information and the data forwarding path, and send access prompt information carrying a device check code of the smart device to the Wi-Fi router when the network security level reaches the reference security level, so that the Wi-Fi router accesses the smart device to a Wi-Fi network corresponding to the Wi-Fi router through the device check code.
For the description of the functional modules, please refer to the description of the method shown in fig. 2, which is not repeated herein.
On the basis of the above, please refer to fig. 4 in combination, a hardware structure diagram of a server 120 is provided, where the server 120 includes a processor 121 and a memory 122, which are in communication with each other, and the processor 121 retrieves a computer program from the memory 122 and implements the method shown in fig. 2 by running the computer program.
Further, a computer-readable storage medium is also provided, on which a computer program is stored, which, when running in the memory 122 in fig. 4, implements the method as shown in fig. 2.
In summary, based on the above-mentioned scheme provided in this embodiment, first, when a distribution network request sent by a wechat applet is detected, network access signature information and a network access record of an intelligent device are obtained, then, a signature field set of the network access signature information and record list information of the network access record are extracted, then, an equipment security index of the intelligent device is determined based on each digital signature and corresponding networking information thereof, and a network security level corresponding to the equipment security index is determined, further, protocol layer feature information and a data forwarding path are determined according to the obtained data authority information of the Wi-Fi router, and finally, after it is determined that the network security level reaches a reference security level determined according to the protocol layer feature information and the data forwarding path, access prompt information is sent to the Wi-Fi router to implement one-key distribution of the intelligent device. Therefore, frequent interaction of the intelligent equipment and the Wi-Fi router in the distribution network process can be avoided, and distribution network accuracy and distribution network reliability are improved.

Claims (10)

1. A WeChat applet-based intelligent device network distribution method is characterized by comprising the following steps:
when a distribution network request sent by a WeChat applet installed in an intelligent device is detected, acquiring network access signature information of the intelligent device and a network access record of the intelligent device in a set time period;
extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
determining a network access behavior track of the intelligent equipment in the set time period based on each digital signature and the corresponding networking information thereof, determining an equipment safety index of the intelligent equipment from the network access behavior track, and determining a network safety level corresponding to the equipment safety index from a preset safety detection list;
acquiring data authority information of a Wi-Fi router and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data authority information;
and determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying a device check code of the intelligent device to the Wi-Fi router when the network security level reaches the reference security level, so that the Wi-Fi router accesses the intelligent device to a Wi-Fi network corresponding to the Wi-Fi router through the device check code.
2. The method of claim 1, wherein determining a reference security level for the Wi-Fi router based on the protocol layer characteristic information and the data forwarding path comprises:
protocol information of communication between the Wi-Fi router and a plurality of other devices, which is included in the protocol layer characteristic information, is obtained, and a protocol field in each piece of protocol information and a field signature corresponding to the protocol field are extracted;
mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a matching degree between the mapping field and a field signature corresponding to the mapping field;
and carrying out weighted summation on the matching degree corresponding to each path node according to the holding time of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
3. The method of claim 2, wherein extracting the protocol field and the field signature corresponding to the protocol field in each piece of protocol information comprises:
determining a field splitting identification set of each piece of protocol information and constructing a protocol layer network of each piece of protocol information; the field splitting identification set comprises a plurality of splitting identifications with splitting priority, and the protocol layer network comprises a plurality of sub-networks with different protocol confidence degrees;
acquiring a median of the splitting priority, and determining at least two second splitting identifications with splitting permission from a plurality of first splitting identifications corresponding to the median;
splitting each piece of protocol information according to the position of the second splitting identifier in each piece of protocol information to obtain a plurality of information fields; extracting field description characteristics of each information field, calculating the cosine distance between each field description characteristic and preset description characteristics, and selecting a set number of information fields corresponding to the field description characteristics with the largest cosine distance as protocol fields;
determining first address information of each protocol field in a file directory of a byte code file of the corresponding protocol information, analyzing the first address information to obtain second address information which has a default association relation with the first address information, and generating a field signature corresponding to each protocol field according to an address path between the first address information and the second address information.
4. The method of claim 1, wherein determining the network entry behavior trajectory of the smart device within the set time period based on each digital signature and its corresponding networking information comprises:
clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element;
converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a set file generated by table driving, sequentially loading each set file into a preset identification thread according to the size sequence of the number of the clustering elements in the clustering set corresponding to the set file, and operating the identification thread to obtain a common networking record corresponding to each set file; wherein the common networking records are networking records with overlapping among the networking information of different clustering elements in the same clustering set;
pre-generating a plurality of behavior data packets used for representing the network access behavior of the intelligent equipment based on each digital signature and the corresponding networking information thereof, and performing node processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
5. The method of claim 4, wherein generating the network access behavior track of the smart device in the set time period based on the initial node pointing information and the second node pointing information comprises:
connecting the initial nodes according to the second node pointing information to obtain an initial behavior track;
and smoothing the initial behavior track by adopting a weighting coefficient corresponding to the signature random number of the digital signature to obtain the network access behavior track.
6. The method according to claim 1, wherein determining an equipment security index of the intelligent device from the network access behavior trace, and determining a network security level corresponding to the equipment security index from a preset security detection list comprises:
dividing the network access behavior track according to a set step length to obtain a plurality of track intervals;
determining network access state data of the intelligent equipment corresponding to each track interval;
calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index;
extracting index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
7. An intelligent device distribution network system based on a WeChat applet is characterized by comprising an intelligent device, a server and a Wi-Fi router; the server is communicated with the intelligent equipment, the Wi-Fi router and a WeChat applet installed in the intelligent equipment;
the WeChat applet is to: sending a distribution network request to the server;
the server is configured to:
when the distribution network request is detected, acquiring network access signature information of the intelligent equipment and a network access record of the intelligent equipment in a set time period;
extracting a signature field set of the network access signature information and record list information of the network access record; the signature field set comprises n digital signatures, the record list information comprises n pieces of networking information, each digital signature corresponds to one piece of networking information, and n is a positive integer;
determining a network access behavior track of the intelligent equipment in the set time period based on each digital signature and the corresponding networking information thereof, determining an equipment safety index of the intelligent equipment from the network access behavior track, and determining a network safety level corresponding to the equipment safety index from a preset safety detection list;
acquiring data authority information of a Wi-Fi router and determining protocol layer characteristic information and a data forwarding path of the Wi-Fi router according to the data authority information;
determining a reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path, and sending access prompt information carrying an equipment check code of the intelligent equipment to the Wi-Fi router when the network security level reaches the reference security level;
the Wi-Fi router is to:
and accessing the intelligent equipment to the Wi-Fi network corresponding to the Wi-Fi router through the equipment check code.
8. The system of claim 7, wherein the server determining the reference security level of the Wi-Fi router according to the protocol layer characteristic information and the data forwarding path specifically comprises:
protocol information of communication between the Wi-Fi router and a plurality of other devices, which is included in the protocol layer characteristic information, is obtained, and a protocol field in each piece of protocol information and a field signature corresponding to the protocol field are extracted;
mapping each protocol field to a node information set of a corresponding path node in the data forwarding path according to the field signature so as to obtain a mapping field of each protocol field in the corresponding node information set; determining a matching degree between the mapping field and a field signature corresponding to the mapping field;
and carrying out weighted summation on the matching degree corresponding to each path node according to the holding time of each path node in the data forwarding path to obtain the reference security level of the Wi-Fi router.
9. The system of claim 7, wherein the server determines the network entry behavior trajectory of the smart device within the set time period based on each digital signature and its corresponding networking information comprises:
clustering the digital signature by adopting a preset model according to the random number characteristics of the signature random number of the digital signature to obtain at least two cluster sets; the preset model is a multi-dimensional feature mean model, and one digital signature in each cluster set corresponds to one cluster element;
converting networking information corresponding to each clustering element in each clustering set into information streams, importing each group of information streams into a set file generated by table driving, sequentially loading each set file into a preset identification thread according to the size sequence of the number of the clustering elements in the clustering set corresponding to the set file, and operating the identification thread to obtain a common networking record corresponding to each set file; wherein the common networking records are networking records with overlapping among the networking information of different clustering elements in the same clustering set;
pre-generating a plurality of behavior data packets used for representing the network access behavior of the intelligent equipment based on each digital signature and the corresponding networking information thereof, and performing node processing on each behavior data packet to obtain an initial node and first node pointing information corresponding to the initial node; and modifying the first node pointing information corresponding to the initial node according to the common networking record corresponding to each set file to obtain second node pointing information, and generating a network access behavior track of the intelligent device in the set time period based on the initial node and the second node pointing information.
10. The system of claim 7, wherein the server determines the device security index of the smart device from the network entry behavior trace, and determining the network security level corresponding to the device security index from a preset security detection list comprises:
dividing the network access behavior track according to a set step length to obtain a plurality of track intervals;
determining network access state data of the intelligent equipment corresponding to each track interval;
calculating state evaluation coefficients of each group of network access state data in a state set corresponding to the network access behavior track, combining the state evaluation coefficients into a state evaluation array according to the interval centrality of the corresponding track interval, and determining the state evaluation array as the equipment safety index;
extracting index characteristic information corresponding to the equipment safety index, searching a safety detection index which is the same as the index characteristic information in a preset safety detection list, and determining the detection level of the safety detection index corresponding to the safety detection list as the network safety level of the equipment safety index.
CN202010727097.1A 2020-07-26 2020-07-26 WeChat applet-based intelligent device network distribution method and system Active CN111866995B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010727097.1A CN111866995B (en) 2020-07-26 2020-07-26 WeChat applet-based intelligent device network distribution method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010727097.1A CN111866995B (en) 2020-07-26 2020-07-26 WeChat applet-based intelligent device network distribution method and system

Publications (2)

Publication Number Publication Date
CN111866995A true CN111866995A (en) 2020-10-30
CN111866995B CN111866995B (en) 2021-01-19

Family

ID=72950504

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010727097.1A Active CN111866995B (en) 2020-07-26 2020-07-26 WeChat applet-based intelligent device network distribution method and system

Country Status (1)

Country Link
CN (1) CN111866995B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114125840A (en) * 2021-10-18 2022-03-01 广州鲁邦通物联网科技股份有限公司 Wireless communication method, system and gateway equipment based on LoRa
CN115866597A (en) * 2021-09-24 2023-03-28 青岛海尔科技有限公司 Method and device for sending password information, storage medium and electronic device

Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0841789A2 (en) * 1996-09-11 1998-05-13 Nippon Telegraph And Telephone Corporation Contents transmission control method with user authentication functions
CN101242410A (en) * 2008-03-11 2008-08-13 南京邮电大学 Grid subjective trust processing method based on simple object access protocol
CN102315974A (en) * 2011-10-17 2012-01-11 北京邮电大学 Stratification characteristic analysis-based method and apparatus thereof for on-line identification for TCP, UDP flows
CN102438047A (en) * 2011-12-13 2012-05-02 北京航空航天大学 Dynamic adaptive method of safety of cloud service under mobile internet environment
US20130254521A1 (en) * 2012-03-22 2013-09-26 International Business Machines Corporation Simulated Network Boot Environment for Bootstrap Redirection
CN103646197A (en) * 2013-12-12 2014-03-19 中国石油大学(华东) User credibility authentication system and method based on user behaviors
US20140108783A1 (en) * 2012-10-16 2014-04-17 UKD Company Limited Virtual network building system, virtual network building method, small terminal, and authentication server
US8839437B2 (en) * 2006-04-27 2014-09-16 The Invention Science Fund I, Llc Multi-network virus immunization
WO2014161277A1 (en) * 2013-07-10 2014-10-09 中兴通讯股份有限公司 Method and system for connecting portable wlan hotspot
CN104615922A (en) * 2015-02-02 2015-05-13 同济大学 Identity authentication device and method based on user software behavior mode
CN105681352A (en) * 2016-03-21 2016-06-15 深圳融腾科技有限公司 Wi-Fi access security control method and system
US20160285856A1 (en) * 2009-08-12 2016-09-29 Amazon Technologies, Inc. Authentication manager
US20170208526A1 (en) * 2016-01-20 2017-07-20 Cisco Technology, Inc. System and method to provide small cell power control and load balancing for high mobility user equipment in a network environment
CN107580302A (en) * 2017-09-12 2018-01-12 东莞微蜂创联网络科技有限公司 The method and system of wechat small routine and Transfer Parameters is accessed using Wi Fi fad problems
CN108667813A (en) * 2018-04-18 2018-10-16 珠海横琴盛达兆业科技投资有限公司 Net system method in a kind of login based on small routine
CN108990062A (en) * 2018-07-13 2018-12-11 全讯汇聚网络科技(北京)有限公司 Intelligent and safe Wi-Fi management method and system
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system
CN109600298A (en) * 2018-11-15 2019-04-09 安徽信果网络科技有限公司 A kind of mobile phone interface simulative display system based on wechat small routine
CN110095992A (en) * 2019-06-21 2019-08-06 南京邮电大学 Smart home system based on wechat small routine
CN110234117A (en) * 2019-06-27 2019-09-13 杭州博联智能科技股份有限公司 IOT equipment distribution method, apparatus, equipment and medium based on small routine
CN110300410A (en) * 2019-06-14 2019-10-01 深圳志合天成科技有限公司 A kind of method that smart machine passes through browser distribution to internet
CN110505262A (en) * 2018-05-18 2019-11-26 深信服科技股份有限公司 Dynamic differential phase method, system, Cloud Server and storage medium under cloud environment
CN110650070A (en) * 2018-06-26 2020-01-03 九阳股份有限公司 Household appliance network configuration method and WiFi module
CN110691397A (en) * 2018-07-05 2020-01-14 腾讯科技(深圳)有限公司 WIFI sharing method, WIFI connection device and computer-readable storage medium
CN111010663A (en) * 2018-10-08 2020-04-14 腾讯科技(深圳)有限公司 Information sharing method and device, storage medium and computer equipment
CN111212431A (en) * 2020-03-11 2020-05-29 徐苗 WiFi access position signal consensus system and method based on block chain
CN111371807A (en) * 2020-03-24 2020-07-03 河南信大网御科技有限公司 Security system based on access layer, construction method thereof, terminal and storage medium
CN111400758A (en) * 2020-03-16 2020-07-10 沈寿娟 Access right verification method, device and system applied to Internet of things
CN111405595A (en) * 2020-03-20 2020-07-10 太仓市同维电子有限公司 Router configuration and maintenance method based on WeChat small program

Patent Citations (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0841789A2 (en) * 1996-09-11 1998-05-13 Nippon Telegraph And Telephone Corporation Contents transmission control method with user authentication functions
US8839437B2 (en) * 2006-04-27 2014-09-16 The Invention Science Fund I, Llc Multi-network virus immunization
CN101242410A (en) * 2008-03-11 2008-08-13 南京邮电大学 Grid subjective trust processing method based on simple object access protocol
US20160285856A1 (en) * 2009-08-12 2016-09-29 Amazon Technologies, Inc. Authentication manager
CN102315974A (en) * 2011-10-17 2012-01-11 北京邮电大学 Stratification characteristic analysis-based method and apparatus thereof for on-line identification for TCP, UDP flows
CN102438047A (en) * 2011-12-13 2012-05-02 北京航空航天大学 Dynamic adaptive method of safety of cloud service under mobile internet environment
US20130254521A1 (en) * 2012-03-22 2013-09-26 International Business Machines Corporation Simulated Network Boot Environment for Bootstrap Redirection
US20140108783A1 (en) * 2012-10-16 2014-04-17 UKD Company Limited Virtual network building system, virtual network building method, small terminal, and authentication server
WO2014161277A1 (en) * 2013-07-10 2014-10-09 中兴通讯股份有限公司 Method and system for connecting portable wlan hotspot
CN103646197A (en) * 2013-12-12 2014-03-19 中国石油大学(华东) User credibility authentication system and method based on user behaviors
CN104615922A (en) * 2015-02-02 2015-05-13 同济大学 Identity authentication device and method based on user software behavior mode
US20170208526A1 (en) * 2016-01-20 2017-07-20 Cisco Technology, Inc. System and method to provide small cell power control and load balancing for high mobility user equipment in a network environment
CN105681352A (en) * 2016-03-21 2016-06-15 深圳融腾科技有限公司 Wi-Fi access security control method and system
CN107580302A (en) * 2017-09-12 2018-01-12 东莞微蜂创联网络科技有限公司 The method and system of wechat small routine and Transfer Parameters is accessed using Wi Fi fad problems
CN108667813A (en) * 2018-04-18 2018-10-16 珠海横琴盛达兆业科技投资有限公司 Net system method in a kind of login based on small routine
CN110505262A (en) * 2018-05-18 2019-11-26 深信服科技股份有限公司 Dynamic differential phase method, system, Cloud Server and storage medium under cloud environment
CN110650070A (en) * 2018-06-26 2020-01-03 九阳股份有限公司 Household appliance network configuration method and WiFi module
CN110691397A (en) * 2018-07-05 2020-01-14 腾讯科技(深圳)有限公司 WIFI sharing method, WIFI connection device and computer-readable storage medium
CN108990062A (en) * 2018-07-13 2018-12-11 全讯汇聚网络科技(北京)有限公司 Intelligent and safe Wi-Fi management method and system
CN111010663A (en) * 2018-10-08 2020-04-14 腾讯科技(深圳)有限公司 Information sharing method and device, storage medium and computer equipment
CN109600298A (en) * 2018-11-15 2019-04-09 安徽信果网络科技有限公司 A kind of mobile phone interface simulative display system based on wechat small routine
CN109548018A (en) * 2019-01-11 2019-03-29 腾讯科技(深圳)有限公司 Wireless network access method, device, equipment and system
CN110300410A (en) * 2019-06-14 2019-10-01 深圳志合天成科技有限公司 A kind of method that smart machine passes through browser distribution to internet
CN110095992A (en) * 2019-06-21 2019-08-06 南京邮电大学 Smart home system based on wechat small routine
CN110234117A (en) * 2019-06-27 2019-09-13 杭州博联智能科技股份有限公司 IOT equipment distribution method, apparatus, equipment and medium based on small routine
CN111212431A (en) * 2020-03-11 2020-05-29 徐苗 WiFi access position signal consensus system and method based on block chain
CN111400758A (en) * 2020-03-16 2020-07-10 沈寿娟 Access right verification method, device and system applied to Internet of things
CN111405595A (en) * 2020-03-20 2020-07-10 太仓市同维电子有限公司 Router configuration and maintenance method based on WeChat small program
CN111371807A (en) * 2020-03-24 2020-07-03 河南信大网御科技有限公司 Security system based on access layer, construction method thereof, terminal and storage medium

Non-Patent Citations (5)

* Cited by examiner, † Cited by third party
Title
PENGFEI LIU; PANLONG YANG; WEN-ZHAN SONG; YUBO YAN; XIANG-YANG L: ""Real-time Identification of Rogue WiFi Connections Using Environment-Independent Physical Features"", 《IEEE INFOCOM 2019 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS》 *
ULRICH HERBERG; THOMAS CLAUSEN; JEROME MILAN: "Digital Signatures for Admittance Control in the Optimized Link", 《2010 INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGY AND APPLICATIONS》 *
UTKU GÜNAY ACER; AIDAN BORAN; CLAUDIO FORLIVESI; WERNER LIEKENS;: ""Sensing WiFi network for personal IoT analytics"", 《2015 5TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS (IOT)》 *
张芳: "谈无线局域网WLAN的安全协议的改进", 《 辽宁师专学报(自然科学版)》 *
王易川; 李文钧: "基于ZigBee、WiFi和云服务器集群的智能家居系统设计", 《物联网技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115866597A (en) * 2021-09-24 2023-03-28 青岛海尔科技有限公司 Method and device for sending password information, storage medium and electronic device
CN114125840A (en) * 2021-10-18 2022-03-01 广州鲁邦通物联网科技股份有限公司 Wireless communication method, system and gateway equipment based on LoRa

Also Published As

Publication number Publication date
CN111866995B (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN109688186B (en) Data interaction method, device, equipment and readable storage medium
EP3178011B1 (en) Method and system for facilitating terminal identifiers
EP3905622A1 (en) Botnet detection method and system, and storage medium
CN109635019B (en) Request processing method, device, equipment and storage medium
CN110719199B (en) Network automatic testing and fault positioning method and device
CN111866995B (en) WeChat applet-based intelligent device network distribution method and system
CN111061685B (en) Log query method and device, node equipment and storage medium
CN105187392A (en) Mobile terminal malicious software detection method based on network access point and system thereof
CN114124476B (en) Sensitive information leakage vulnerability detection method, system and device for Web application
CN110888838A (en) Object storage based request processing method, device, equipment and storage medium
CN105516395A (en) Network address assignment method and device
CN106255082A (en) The recognition methods of a kind of refuse messages and system
CN111464513A (en) Data detection method, device, server and storage medium
CN113098852B (en) Log processing method and device
CN104967603A (en) Application account security verification method and apparatus
CN105049452B (en) Switching method, device and the intelligent terminal of resource downloading mode
CN111371811B (en) Resource calling method, resource calling device, client and service server
CN112199624A (en) Data access control method, device, electronic device and storage medium
CN111064729A (en) Message processing method and device, storage medium and electronic device
CN108650274B (en) Network intrusion detection method and system
CN114244555B (en) Security policy adjusting method
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
CN108156071A (en) To method, terminal device and the computer readable storage medium of community's addition member
CN114567613A (en) Real IP identification method, device, electronic equipment and storage medium
WO2021155529A1 (en) Resource deletion method, apparatus, and device, and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An intelligent device distribution network method and system based on wechat applet

Effective date of registration: 20210518

Granted publication date: 20210119

Pledgee: Bank of China Limited Guangzhou Development Zone Branch

Pledgor: Guangyun Internet of things technology (Guangzhou) Co.,Ltd.

Registration number: Y2021980003758

PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20210601

Granted publication date: 20210119

Pledgee: Bank of China Limited Guangzhou Development Zone Branch

Pledgor: Guangyun Internet of things technology (Guangzhou) Co.,Ltd.

Registration number: Y2021980003758

PC01 Cancellation of the registration of the contract for pledge of patent right
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: An intelligent device distribution network method and system based on wechat applet

Effective date of registration: 20210607

Granted publication date: 20210119

Pledgee: Bank of China Limited Guangzhou Development Zone Branch

Pledgor: Guangyun Internet of things technology (Guangzhou) Co.,Ltd.

Registration number: Y2021980004456

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20230620

Granted publication date: 20210119

Pledgee: Bank of China Limited Guangzhou Development Zone Branch

Pledgor: Guangyun Internet of things technology (Guangzhou) Co.,Ltd.

Registration number: Y2021980004456

PC01 Cancellation of the registration of the contract for pledge of patent right