CN104703184B - A kind of safe Wi-Fi hotspot information issuing method - Google Patents

A kind of safe Wi-Fi hotspot information issuing method Download PDF

Info

Publication number
CN104703184B
CN104703184B CN201510075777.9A CN201510075777A CN104703184B CN 104703184 B CN104703184 B CN 104703184B CN 201510075777 A CN201510075777 A CN 201510075777A CN 104703184 B CN104703184 B CN 104703184B
Authority
CN
China
Prior art keywords
ssid
terminal
server
record
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510075777.9A
Other languages
Chinese (zh)
Other versions
CN104703184A (en
Inventor
郭蒙蒙
吴裔
农革
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sun Yat Sen University
Original Assignee
Sun Yat Sen University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sun Yat Sen University filed Critical Sun Yat Sen University
Priority to CN201510075777.9A priority Critical patent/CN104703184B/en
Publication of CN104703184A publication Critical patent/CN104703184A/en
Application granted granted Critical
Publication of CN104703184B publication Critical patent/CN104703184B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention discloses a kind of safe Wi-Fi hotspot information issuing method, including;Hot spot APi Broadcast SSIDs in its signal cover;Terminal Mj receives the SSID for recording all or part of hot spots on the way;Terminal Mj submits the SSID of all or part of hot spots of record to server;Server extracts search key from the SSID of reception, then server search and the relevant content of these keywords and analyzes it;Server will be analyzed, search result returns to terminal Mj;Terminal Mj to user be in referring back to analysis, search result, including use secure authentication information therein come the access operation that alerts or shield user to dangerous content.The present invention has following characteristics:Easy to operate, the scanning of hot spot SSID, search, analytic process are increasingly automated;Safe, terminal automatic fitration rubbish hot spot simultaneously alerts or shields access operation of the user to dangerous content.Widely used, hot spot SSID is an arbitrary character string, and arbitrary content can be arranged according to actual needs.

Description

A kind of safe Wi-Fi hotspot information issuing method
Technical field
The present invention relates to wireless communication fields and information security field, more particularly, to a kind of safe Wi-Fi hotspot Information issuing method.
Background technology
One is operated in AP(Access Point, hot spot)Institute of the WiFi equipment into its signal cover under pattern It includes SSID to have terminal broadcast(Service set identifier, service set)Hot information inside.The SSID It is a character string can arbitrarily set, 32 bytes of longest, terminal identifies by scanning SSID, connects hot spot.
Current Wi-Fi hotspot is omnipresent, and hot spot possessor can issue various using SSID as message carrier Information, user can check the SSID of periphery hot spot broadcast, example by mobile terminals such as mobile phone, tablet and portable computers whenever and wherever possible Such as:
(1)A kind of system and method for the unique identifier generating service point.Service point(Such as:Eating and drinking establishment, gas station Deng)Administrator by first terminal to Internet Server submit service point description information, server be locally stored clothes Be engaged in point description information and for each service point generate one comprising service point identification SSID.Service point administrator passes through first Terminal obtains the SSID that server generates and the hot spot for binding it to service point.Second terminal scans the hot spot institute to service point Service point identification therein is simultaneously sent to server by the SSID of broadcast, and server is according to service point identification in local search service Description information is simultaneously returned to second terminal by the description information of point.Thereafter, the description letter of service point is presented to user for second terminal Breath.
(2)By using wireless network in physical merchants place identity user.The SSID of each Wi-Fi hotspot is uniquely right The Ying Yuyi physical neighbors centered on the Wi-Fi hotspot are located at the SSID of all Wi-Fi hotspots of server storage of internet With the correspondence of physical neighbor.The SSID for the Wi-Fi hotspot that terminal receives is sent to server, server root by consumer Local data base is inquired according to SSID to obtain the physical neighbor of the Wi-Fi hotspot and position the position of consumer accordingly.Thereafter, it takes Business device pushes the advertisement of periphery businessman to consumer.
Include a globally unique mark by server generation in above technical scheme, in the SSID of each hot spot Symbol, index of the server locally preserving the description information of each hot spot and using its identifier as inquiry hot spot description information. Terminal extracts identifier from the SSID of hot spot and the identifier is sent to server, and the latter is according to identifier query and returns The description information of corresponding hot spot.
In these technical solutions, server preserves the identifier and its description information of each hot spot, and hot spot passes through SSID To issue the index for terminal searching to description information(That is identifier).These schemes are in a closed system to user Information is provided, this is closed to be characterized by:1)Index in SSID need to be in server registration;2)It is solid to index associated content It is fixed.Said program is issued and is shared into row information by SSID, and there are the not high deficiencies of dangerous and the degree of automation.
Invention content
To overcome at least one described in the above-mentioned prior art insufficient, a kind of high degree of automation of present invention offer and safety Property high safety Wi-Fi hotspot information issuing method.
In order to achieve the above object, technical scheme is as follows:
A kind of safe Wi-Fi hotspot information issuing method, including;
(1) hot spot APi Broadcast SSIDs in its signal cover;
(2) terminal Mj is received and is recorded the SSID of all or part of hot spots on the way;
(3) terminal Mj submits the SSID of all or part of hot spots recorded in step (2) to server S VR;
(4) server S VR extracts search key from the SSID that step (3) receives, and then server S VR is searched for With the relevant content of these keywords and analyze it;Thereafter, server S VR will be analyzed, search result returns to terminal Mj;
(5) terminal Mj is presented on analysis, the search result that step (4) returns to user, including uses safety mirror therein Information is determined to alert or shield access operation of the user to dangerous content.
Preferably, for the SSID of the hot spot APi by User Defined, which, which has, facilitates system to extract search therein Keyword format.
Different from prior art, in the hot information dissemination method of the present invention, hot spot possessor can freely set The content of SSID is set, i.e. SSID is an arbitrary character string;The hot spot SSID scanned is submitted to server by terminal, service Device analyzes SSID to obtain search key therein, and then server is locally, remotely or third-party server is searched Rope returns to terminal with the relevant information of these keywords.For example network address correspondence is then captured comprising a network address in SSID The content of website simultaneously generates result report to return to terminal;Or include the name " certain coffee shop " in a dining room in SSID, The information about " certain coffee shop " is then searched in internet and generates result report to return to terminal.
Technical solution used in the present invention is:Terminal scan and record on the way the SSID of hot spot and submit it to positioned at The server of internet, server analysis SSID, the relative content of search simultaneously return result to terminal, and terminal is to user Analysis, search result is presented and alerts or shield access of the user to dangerous content according to security authentication information therein Operation.
Preferably, step (2) the terminal Mj is received and the detailed process of the SSID that records all or part of hot spots on the way For:
(201) hot spot APi broadcasts the information of itself in its signal cover;
(202) terminal Mj filters the information of hot spot according to blacklist, and terminal Mj inquiry blacklists simultaneously judge wherein whether wrap Information containing specified hot spot;If then filtering the information of the hot spot;Or terminal Mj receives the information of hot spot according to white list, wherein Terminal Mj inquiry white lists and the information for judging wherein whether to include specified hot spot;If then receiving the information of the hot spot;Wherein Terminal Mj generates black, white list using one kind or in conjunction with a variety of methods, and black, white list is to be issued by server S VR or user It is self-defined;
(203) for terminal Mj according to regular expression list filtering hot information, each regular expression in list is one The match pattern of a SSID, terminal Mj judge whether the SSID of hot spot matches at least one regular expression;If then filtering should The information of hot spot;Or terminal Mj receives the information of hot spot according to regular expression list, wherein terminal Mj judges hot spot Whether SSID matches at least one regular expression;If then receiving the information of the hot spot;Wherein terminal Mj uses a kind of or knot A variety of methods are closed to generate regular expression list, regular expression list is issued by server S VR or User Defined;
(204) terminal Mj records the information for all or part of hot spots not filtered in hot information table;Wherein terminal Mj is by the generated time of record and generates the local zone time of terminal Mj and position when position is set as receiving hot information; And by the submission state initialization of record be " not submitting ".
Preferably, in the step (203), terminal Mj uses a kind of or a variety of patterns based on charactor comparison of combined use Matching process judges whether SSID matches at least one regular expression, including:(1)Come from front to back by character scan SSID It attempts to match each regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front.
Preferably, the terminal Mj scans all records that do not submit and judges the generated time of each record and current local Whether the interval of time exceeds pre-set threshold value;If then deleting the record;Terminal Mj scans all records that do not submit and judgement With the presence or absence of a plurality of record with identical SSID and MAC Address;If then therefrom selecting one to record and delete other records;
Terminal Mj selects one using a kind of or a variety of methods of combination from a plurality of record with identical SSID and MAC Address Item, including:(1)The interval of the generated time of computing terminal Mj current times and each record, the current locations computing terminal Mj with it is each The distance of the generation position of record, then calculates a priority according to time interval and positional distance and therefrom selects weights A maximum record;(2)One record of random selection.
Preferably, step (3) terminal Mj submits all or part of hot spots recorded in step (2) to server S VR The detailed process of SSID is:
(301)Terminal Mj scans the every hot spot that do not submit record and in local SSID analytical tables according to the SSID of hot spot Inquiry is recorded with the presence or absence of with the relevant analyses of the SSID;If analysis record exists and effectively, terminal Mj records the analysis It is presented to the user and sets " having been filed on " the submission state that hot spot records to;
In the step, whether the interval of the generated time of terminal Mj discriminatory analysis record and the current time of terminal is beyond pre- If threshold values;If so, analysis record is invalid;
In the step, whether the interval of the terminal Mj also generated times of discriminatory analysis record and hot spot record is beyond default valve Value;If so, analysis record is invalid;
(302)Terminal Mj sends all effective records that do not submit to server S VR;
In the step, terminal Mj sends the effective record that do not submit to server S VR using a kind of or a variety of methods of combination, Including:(1)Terminal Mj is submitted when accessing internet through hot spot by WiFi network interface and is recorded;(2)M1 is passing through mobile network Network interface submits record when accessing internet.
Preferably, step (4) the server S VR extracts search key from the SSID received, then server SVR is searched for and the relevant content of these keywords and is analyzed it, and detailed process is:
(401)Server S VR in the SSID analytical tables of Local or Remote database according to the SSID of hot spot inquiry whether In the presence of being recorded with the relevant analyses of the SSID and judge whether analysis record is effective;If then jumping to step(409);
In the step, server S VR judges that the interval of the generated time of each analysis record and the current time of server is It is no to exceed pre-set threshold value;If so, analysis record is invalid;
(402)Server S VR extracts the network address for including in SSID according to regular expression list, and each of list is just Then expression formula is a network address match pattern;
In the step, server S VR using it is a kind of or combine it is a variety of based on the method for mode matching of charactor comparison from SSID Middle extraction matches all character strings of at least one regular expression, including:(1)It is attempted from front to back by character scan SSID Match each regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front;
(403)To each network address of extraction, basis should in the network address of Local or Remote database describes table by server S VR Web site query is with the presence or absence of relative one or more description record;If description record is not present or fails, server SVR submits network address to third party's search server and is inquired by the latter and returned and the relevant description information of the network address;If description Record exists and effectively, then jumps to step(408);
In the step, server S VR judges that the interval of the generated time of each description record and the current time of server is It is no to exceed pre-set threshold value;If so, description record failure;
(404)Server S VR to carry out a plurality of description information of same network address by the degree of correlation of description information and network address Sequence, the wherein degree of correlation are defined as according to web page address, webpage title, web page contents, the security authentication letter in description information The weights that breath etc. is calculated;
(405)To each network address, server S VR records degree highest one or more associated therewith in description information table Description information and the current time for setting the generated time of description record to server;
(406)Server S VR is checked in step(405)Whether it include one in the web page contents of each description record generated Or multiple network address;If then SVR is added it in the two level list of websites field of corresponding description record;If otherwise jumping to step Suddenly(408);
(407)Server S VR is executed and step(403)Extremely(406)Identical process arranges to inquire and store two level network address The description information of each two level network address in table;
(408)Server S VR is packaged the description record of each network address and two level network address in SSID and remembers to generate the analysis of SSID It records and will analyze in record storage to the SSID analytical tables of Local or Remote database;Wherein, server S VR records analysis Generated time is set as the current time of server;
(409)The analysis record of SSID is returned to terminal Mj by server S VR.
Preferably, the analysis record of SSID is presented to the user by terminal Mj, including:Show network address and two level network address and basis Secure authentication info alert shields access operation of the user to dangerous web page contents.
Compared with prior art, the advantageous effect of technical solution of the present invention is:
(1) easy to operate, the scanning of hot spot SSID, search, analytic process are increasingly automated;
(2) safe, terminal automatic fitration rubbish hot spot simultaneously alerts or shields access behaviour of the user to dangerous content Make.
(3) widely used, hot spot SSID is an arbitrary character string, and arbitrary content can be arranged according to actual needs.
Description of the drawings
Fig. 1 is the system schematic of the present invention.
Fig. 2 is tables of data in the specific embodiment of the invention.
Fig. 3 is topological schematic diagram in the specific embodiment of the invention.
Fig. 4 is server analysis in the specific embodiment of the invention, searches for the flow chart of SSID relevant informations
Fig. 5 is the exemplary plot of hot information table in the specific embodiment of the invention.
Fig. 6 is the partial content exemplary plot that network address describes table in the specific embodiment of the invention.
Specific implementation mode
The attached figures are only used for illustrative purposes and cannot be understood as limitating the patent;
In order to more preferably illustrate that the present embodiment, the certain components of attached drawing have omission, zoom in or out, actual product is not represented Size;
To those skilled in the art, it is to be appreciated that certain known features and its explanation, which may be omitted, in attached drawing 's.
The following further describes the technical solution of the present invention with reference to the accompanying drawings and examples.
Embodiment 1
As shown in Figure 1, the present invention relates to the base station BS of the mobile networks such as server S VR, 3G or 4G positioned at internet, it is more A Wi-Fi hotspot { AP1 ..., APi ... } to periphery Broadcast SSIDs and it is multiple provide at least one WiFi network interface and At least one mobile network's interface terminal M1 ..., and Mj ... }.
A kind of safe hot information dissemination method, specifically includes:
(1) hot spot APi Broadcast SSIDs in its signal cover;
(2) terminal Mj is received by certain way and is recorded the SSID of all or part of hot spots on the way;
(3) terminal Mj is submitted all or part of hot spots recorded in step (2) by certain way to server S VR SSID;
(4) server S VR extracts search key by certain way from the SSID that step (3) receives, then SVR Search with the relevant content of these keywords and analyze it.Thereafter, SVR will be analyzed, search result returns to terminal Mj;
(5) terminal Mj is presented on analysis, the search result that step (4) returns by certain way to user, including uses it In secure authentication information alert or shield access operation of the user to dangerous content.
The present invention can provide service to anonymous and registration user.For sake of convenience, it uses below " user " and carrys out table Show anonymous and registration user.
In this specific embodiment, the relation database table that terminal and server uses is as shown in Figure 2:
Server D10 includes:
Hot information table D101:Record terminal is committed to the hot information of server, including { SSID, MAC Address, generation Time, generate position etc. fields.
Network address describes table D102:The network address description information that arrives of record whois lookup, including web page address, webpage title, Web page contents, two level list of websites, secure authentication information, the degree of correlation, generated time } etc. fields.
SSID analytical tables D103:Analysis result of the server to SSID is recorded, including { SSID, network address description information, is generated Time } etc. fields, wherein network address description information includes the description information for all network address for including in SSID.
User message table D104:The fields such as the information, including { user account, user password } of record registration user.
Terminal D 20 includes:
Hot information table D201:The hot information that generates on the way of record terminal, including SSID, MAC Address, generated time, Generate position, submit state etc. fields.
SSID analytical tables D202:Record the SSID analysis results that server returns, including { SSID, network address description information, life At the time } etc. fields.
User message table D203:Record log-on message of the registration user in server of currently used terminal, including { user Account, user password } etc. fields.
As shown in figure 3, user Alice carried terminals M1 is moved to E points from A points, AP1, AP2 and AP3 be Alice along by way of Three hot spots crossed, the information of each hot spot are as shown in Figure 5.
In this specific embodiment, terminal M1 implementation procedures S10 records the letter of hot spot on the way in hot information table Breath, is as follows:
Step S101:Hot spot AP1, AP2 and AP3 broadcast the information of itself, the information of hot spot in its signal cover SSID, MAC Address including hot spot etc..
Step S102:Terminal M1 filters the information of hot spot according to blacklist.M1 inquires blacklist and judges wherein whether wrap Information containing specified hot spot(Such as:Whether inquiry includes the MAC Address of specified hot spot);If then filtering the information of the hot spot. Similarly, M1 can also receive the information of hot spot according to white list, and whether wherein M1 inquires white list and judge wherein comprising specified The information of hot spot;If then receiving the information of the hot spot.
In the step, M1 generates black, white list using one kind or in conjunction with a variety of methods, including:(1)Server is issued; (2)User Defined.
In the step, registration user can report rubbish hot spot and submit the information of the hot spot to server, and server is being examined In blacklist after core(Or white list)Middle addition(Or it deletes)The information of the hot spot.
Step S103:Terminal M1 filters the information of hot spot according to regular expression list, each canonical table in list It is the match pattern of a SSID up to formula.M1 judges whether the SSID of hot spot matches at least one regular expression;If then crossing Filter the information of the hot spot.Similarly, M1 can also receive the information of hot spot according to regular expression list, and wherein M1 judges hot spot SSID whether match at least one regular expression;If then receiving the information of the hot spot.
In the step, M1 generates regular expression list using one kind or in conjunction with a variety of methods, including:(1)Server Publication;(2)User Defined.
In the step, M1 uses a kind of or be used in combination and a variety of to judge SSID based on the method for mode matching of charactor comparison Whether at least one regular expression is matched, including:(1)Attempt to match each regular expressions by character scan SSID from front to back Formula;(2)Attempt to match each regular expression by character scan SSID from back to front.
Step S104:Terminal M1 records the information for all or part of hot spots not filtered in hot information table.
In the step, M1 uses a kind of or select the one or more hot spots not filtered of record in conjunction with a variety of methods Information, including:(1)The information for the hot spot that record user specifies;(2)Record currently establishes the letter of the hot spot of wireless connection therewith Breath.
In the step, the local of M1 when M1 is set as the generated time of record and generation position to receive the information of hot spot Time and position and by the submission state initialization of record be " not submitting ".
Step S105:Terminate.
In this specific embodiment, terminal M1 implementation procedures S20 deletes the failure that do not submit in hot information table Record, is as follows:
S201:Terminal M1 scans all records that do not submit and judges generated time and the current local time of each record Whether interval exceeds pre-set threshold value;If then deleting the record.
S202:Terminal M1 scan all records that do not submit and judge whether it is a plurality of with identical SSID and MAC The record of location;If then therefrom selecting one to record and delete other records.
In the step, M1 is using a kind of or a variety of methods of combination from a plurality of record with identical SSID and MAC Address Selection one, including:(1)The interval of M1 current times and the generated time of each record is calculated, the current locations M1 and each note are calculated Then the distance of the generation position of record calculates a priority according to time interval and positional distance and therefrom selects weights most A big record;(2)One record of random selection.
S203:Terminate.
In this specific embodiment, terminal M1 implementation procedures S30 submits the record in hot information table to server SVR is as follows:
S301:Terminal M1 scans the every hot spot that do not submit record and in local SSID analytical tables according to the SSID of hot spot Inquiry is recorded with the presence or absence of with the relevant analyses of the SSID;If analysis record exists and effectively, which is recorded and presented by M1 It is set as " having been filed on " to user and by the submission state that hot spot records.
In the step, whether the interval of the generated time of M1 discriminatory analysis record and the current time of terminal is beyond default valve Value;If so, analysis record is invalid.
In the step, whether the interval of the generated time of M1 discriminatory analysis record and hot spot record exceeds pre-set threshold value;If It is then to analyze record in vain.
S302:Terminal M1 sends all effective records that do not submit to server S VR.
In the step, M1 sends the effective record that do not submit to SVR using a kind of or a variety of methods of combination, including:(1)M1 It submits and records when accessing internet through hot spot by WiFi network interface;(2)M1 is accessing interconnection by mobile network's interface Record is submitted when net.
S303:Terminate.
In this specific embodiment, server S VR implementation procedures S40(Fig. 4)Carry out every heat that analysing terminal M1 is submitted Point record, is as follows:
S401:Server S VR in the SSID analytical tables of Local or Remote database according to the SSID of hot spot inquiry whether In the presence of being recorded with the relevant analyses of the SSID and judge whether analysis record is effective;If then jumping to step S409.
In the step, SVR judges whether the generated time of each analysis record and the interval of the current time of server exceed Pre-set threshold value;If so, analysis record is invalid.
S402:Server S VR extracts the network address for including in SSID according to regular expression list, and each of list is just Then expression formula is a network address match pattern.
In the step, SVR is extracted based on the method for mode matching of charactor comparison from SSID using a kind of or combination is a variety of All character strings of at least one regular expression are matched, including:(1)Matching to be attempted by character scan SSID each from front to back Regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front.
S403:To each network address of extraction, basis should in the network address of Local or Remote database describes table by server S VR Web site query is with the presence or absence of relative one or more description record;If description record is not present or fails, SVR is to the Tripartite's search server submits network address and is inquired by the latter and returned and the relevant description information of the network address;If description record exists And effectively, then jump to step S408.
In the step, SVR judges whether the generated time of each description record and the interval of the current time of server exceed Pre-set threshold value;If so, description record failure.
S404:Server S VR to carry out a plurality of description information of same network address by the degree of correlation of description information and network address Sequence, the wherein degree of correlation are defined as according to web page address, webpage title, web page contents, the security authentication letter in description information The weights that breath etc. is calculated.
S405:To each network address, server S VR records degree highest one or more associated therewith in description information table Description information and the current time for setting the generated time of description record to server.
S406:Server S VR checks whether in the web page contents of the step S405 each description records generated include one Or multiple network address;If then SVR is added it in the two level list of websites field of corresponding description record;If otherwise jumping to step Rapid S408.
S407:Server S VR executes process identical with step S403 to S406 to inquire and store two level list of websites In each two level network address description information.
S408:Server S VR is packaged the description record of each network address and two level network address in SSID and remembers to generate the analysis of SSID It records and will analyze in record storage to the SSID analytical tables of Local or Remote database.Wherein, when the generation that SVR records analysis Between be set as the current time of server.
S409:The analysis record of SSID is returned to terminal M1 by server S VR.
S410:The analysis record of SSID is presented to the user by terminal M1, including:Show network address and two level network address and according to peace Full authentication information warning shields access operation etc. of the user to dangerous web page contents.
S411:Terminate.
For ease of understanding, a concrete application example is given below.
As shown in Fig. 3,5, anonymous Alice carried terminals M1 is moved to E points, the data of M1 and server SVR from A points Table is initially empty.The blacklist list of M1 includes the information of hot spot AP1, the regular expression list of the SSID matchings M1 of AP2.M1 In B points and the information of C points filtering AP1 and AP2 broadcast and receive the information of AP3 broadcast in D points.Thereafter, M1 is in hot information table The information of middle record AP3 and the information for submitting the hot spot to SVR in E points.
Since SSID analytical tables are initially empty, SVR fails to find in table to be recorded with the relevant analyses of the SSID of AP3, Then from network address " navigator.wifi.com " is extracted in SSID and in network address describes table inquiry with the network address is relevant retouches State record.It is initially empty since network address describes table, SVR fails to find in table related to network address " navigator.wifi.com " Description record, transfer ask third party's search server inquire and return and the relevant description information of the network address.Such as Fig. 6 institutes Show, SVR calculates the degree of correlation of each description information and network address and stores the highest three descriptions letter of the degree of correlation in network address describes table Breath.SVR then referral web site describe in each record of table whether comprising one or more network address and by query result storage to right In the two level list of websites field that should describe record.SVR using the identical mode with processing " navigator.wifi.com " come Inquire and store the description information of two level network address.Thereafter, SVR be packaged " navigator.wifi.com ", " news.wifi.com ", " video.wifi.com ", " audio.wifi.com ", and the description of " book.wifi.com " are remembered The analysis for recording to generate SSID records and analysis record is returned to M1.The analysis record of SSID is presented to user by M1, including: Show network address and two level network address and according to secure authentication information alert or the access operation for shielding user to dangerous web page contents.
Compared with the prior art, technical scheme of the present invention has following significant advantage:
(1) easy to operate, the scanning of hot spot SSID, search, analytic process are increasingly automated;
(2) safe, terminal automatic fitration rubbish hot spot simultaneously alerts or shields access behaviour of the user to dangerous content Make.
(3) widely used, hot spot SSID is an arbitrary character string, and arbitrary content can be arranged according to actual needs.
The publication of Wi-Fi hotspot information is issued and is shared into row information by SSID, and main thought all provides a user The relevant information of keyword included in SSID, and currently existing scheme is usually to provide a user letter in a closed system Breath, this is closed to be characterized by:1)Index in SSID need to be in server registration;2)Associated content is indexed to fix.
And the application is that information is provided a user in an open system, this opening is characterized by:1)SSID By User Defined, system can be facilitated to extract search key therein with certain format(I.e.:Index)Also may be used To be arbitrary;2)The program filters for running on user terminal go out to meet the SSID of condition and are sent to Internet Server, fortune Row extracts the keyword of search then in one or more third party contents in the program on server from the SSID received Relevant information is obtained in search application;
For above-mentioned first opening flag, it is proposed that in the concrete scheme that terminal receives, records and filter SSID, it is also proposed that The concrete scheme of search key in SSID is extracted in server;
For above-mentioned second opening flag, it is proposed that in server according to search key inquiry and Cache associativity content Concrete scheme, in addition terminal also local cache historical query record think after use;
In a specific embodiment, the application is to be refined to scheme by taking network address as an example, and propose and how to pass through Network address in SSID is nested in two level list of websites therein to obtain.
The same or similar label correspond to the same or similar components;
Position relationship described in attached drawing is used to only for illustration, should not be understood as the limitation to this patent;
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this All any modification, equivalent and improvement etc., should be included in the claims in the present invention made by within the spirit and principle of invention Protection domain within.

Claims (2)

1. a kind of safe Wi-Fi hotspot information issuing method, which is characterized in that including;
(1) hot spot APi Broadcast SSIDs in its signal cover;
(2) terminal Mj is received and is recorded the SSID of all or part of hot spots on the way;
(3) terminal Mj submits the SSID of all or part of hot spots recorded in step (2) to server S VR;
(4) server S VR extracts search key from the SSID that step (3) receives, then server S VR search with The relevant content of these keywords simultaneously analyzes it;Thereafter, server S VR will be analyzed, search result returns to terminal Mj;
(5) terminal Mj is presented on analysis, the search result that step (4) returns to user, including secure authentication therein is used to believe It ceases to alert or shield access operation of the user to dangerous content;
For the SSID of the hot spot APi by User Defined, which, which has, facilitates system to extract search key lattice therein Formula;
The detailed process for the SSID that step (2) the terminal Mj is received and recorded all or part of hot spots on the way is:
(201) hot spot APi broadcasts the information of itself in its signal cover;
(202) terminal Mj filters the information of hot spot according to blacklist, and whether terminal Mj inquiry blacklists simultaneously judge wherein comprising finger Determine the information of hot spot;If then filtering the information of the hot spot;Or terminal Mj receives the information of hot spot, wherein terminal according to white list Mj inquires white list and judges wherein whether to include the information of specified hot spot;If then receiving the information of the hot spot;Wherein terminal Mj generates black, white list using one kind or in conjunction with a variety of methods, and black, white list is to be issued by server S VR or user makes by oneself Justice;
(203) for terminal Mj according to regular expression list filtering hot information, each regular expression in list is one The match pattern of SSID, terminal Mj judge whether the SSID of hot spot matches at least one regular expression;If then filtering the heat The information of point;Or terminal Mj receives the information of hot spot according to regular expression list, wherein terminal Mj judges hot spot Whether SSID matches at least one regular expression;If then receiving the information of the hot spot;Wherein terminal Mj uses a kind of or knot A variety of methods are closed to generate regular expression list, regular expression list is issued by server S VR or User Defined;
(204) terminal Mj records the information for all or part of hot spots not filtered in hot information table;Wherein terminal Mj will The local zone time of terminal Mj and position when the generated time of record and generation position are set as receiving hot information;And It is " not submitting " by the submission state initialization of record;
In the step (203), terminal Mj using it is a kind of or be used in combination it is a variety of based on the method for mode matching of charactor comparison come Judge whether SSID matches at least one regular expression, including:(1)Matching to be attempted by character scan SSID each from front to back Regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front;
The terminal Mj scans all records that do not submit and judges the generated time of each record and the interval of current local time Whether pre-set threshold value is exceeded;If then deleting the record;Terminal Mj scans all records that do not submit and judges whether more Item has the record of identical SSID and MAC Address;If then therefrom selecting one to record and delete other records;Terminal Mj is used It is a kind of or select one from a plurality of record with the identical addresses SSID and MAC in conjunction with a variety of methods, including:(1)It calculates The interval of terminal Mj current times and the generated time of each record, the generation position of the current locations computing terminal Mj and each record Distance, then according to time interval and positional distance come calculate a priority and therefrom selection weights it is maximum one note Record;(2)One record of random selection;
Step (3) the terminal Mj submits the tool of the SSID of all or part of hot spots recorded in step (2) to server S VR Body process is:
(301)Terminal Mj scans the every hot spot that do not submit record and is inquired according to the SSID of hot spot in local SSID analytical tables It is recorded with the presence or absence of with the relevant analyses of the SSID;If analysis record exists and effectively, which is recorded and presented by terminal Mj It is set as " having been filed on " to user and by the submission state that hot spot records;In the step, the generation of terminal Mj discriminatory analysis record Whether the interval of the current time of time and terminal is beyond default
Threshold values;If so, analysis record is invalid;In the step, the terminal Mj generations that also discriminatory analysis record and hot spot record Between interval whether exceed pre-set threshold value;If so, analysis record is invalid;
(302)Terminal Mj sends all effective records that do not submit to server S VR;
In the step, terminal Mj uses effective record that is a kind of or combining a variety of methods not submitted to server S VR transmissions, packet It includes:(1)Terminal Mj is submitted when accessing internet through hot spot by WiFi network interfaces and is recorded;(2)Mj is passing through mobile network Interface submits record when accessing internet;
Step (4) the server S VR extracts search key from the SSID received, then server S VR search with The relevant content of these keywords simultaneously analyzes it, and detailed process is:
(401)Server S VR whether there is in the SSID analytical tables of Local or Remote database according to the SSID of hot spot inquiries It is recorded with the relevant analyses of the SSID and judges whether analysis record is effective;If then jumping to step(409);
In the step, server S VR judges whether the generated time of each analysis record and the interval of the current time of server surpass
Go out pre-set threshold value;If so, analysis record is invalid;
(402)Server S VR extracts the network address for including in SSID according to regular expression list, each canonical table in list It is a network address match pattern up to formula;In the step, server S VR uses a kind of or a variety of patterns based on charactor comparison of combination Matching process extracts all character strings for matching at least one regular expression from SSID, including:(1)Word is pressed from front to back Symbol scans SSID to attempt to match each regular expression;(2)Attempt to match each canonical by character scan SSID from back to front Expression formula;
(403)To each network address of extraction, server S VR is in the network address of Local or Remote database describes table according to the network address Inquiry is with the presence or absence of relative one or more description record;If description record be not present or fail, server S VR to Third party's search server submits network address and is inquired by the latter and returned and the relevant description information of the network address;If description record is deposited And effectively, then jump to step(408);
In the step, server S VR judges whether the generated time of each description record and the interval of the current time of server surpass Go out pre-set threshold value;If so, description record failure;
(404)Server S VR is ranked up a plurality of description information of same network address by the degree of correlation of description information and network address, Wherein the degree of correlation is defined as according to meters such as web page address, webpage title, web page contents, security authentication information in description information An obtained weights;
(405)To each network address, server S VR records highest one or more description of degree associated therewith in description information table Information and the current time for setting the generated time of description record to server;
(406)Server S VR is checked in step(405)In the web page contents of each description record generated whether comprising one or Multiple network address;If then SVR is added it in the two level list of websites field of corresponding description record;If otherwise jumping to step (408);
(407)Server S VR is executed and step(403)Extremely(406)Identical process is inquired and is stored in two level list of websites The description information of each two level network address;
(408)Server S VR is packaged the description record of each network address and two level network address in SSID and is recorded simultaneously to generate the analysis of SSID It will be in analysis record storage to the SSID analytical tables of Local or Remote database;Wherein, the generation that server S VR records analysis Time is set as the current time of server;
(409)The analysis record of SSID is returned to terminal Mj by server S VR.
2. safe Wi-Fi hotspot information issuing method according to claim 1, which is characterized in that terminal Mj is by SSID's Analysis record is presented to the user, including:Show network address and two level network address and according to secure authentication info alert or shielding user couple The access operation of dangerous web page contents.
CN201510075777.9A 2015-02-12 2015-02-12 A kind of safe Wi-Fi hotspot information issuing method Active CN104703184B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510075777.9A CN104703184B (en) 2015-02-12 2015-02-12 A kind of safe Wi-Fi hotspot information issuing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510075777.9A CN104703184B (en) 2015-02-12 2015-02-12 A kind of safe Wi-Fi hotspot information issuing method

Publications (2)

Publication Number Publication Date
CN104703184A CN104703184A (en) 2015-06-10
CN104703184B true CN104703184B (en) 2018-08-14

Family

ID=53349866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510075777.9A Active CN104703184B (en) 2015-02-12 2015-02-12 A kind of safe Wi-Fi hotspot information issuing method

Country Status (1)

Country Link
CN (1) CN104703184B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635102A (en) * 2015-10-30 2016-06-01 东莞酷派软件技术有限公司 Wi-Fi hot spot connection setting method and device
CN106686580A (en) * 2015-11-06 2017-05-17 北京金山安全软件有限公司 Wireless hotspot name display method and device
CN105517101A (en) * 2015-12-09 2016-04-20 广东顺德中山大学卡内基梅隆大学国际联合研究院 Classified display method and system of Wi-Fi hot spot SSI information
CN107493576B (en) * 2016-06-12 2020-09-18 上海连尚网络科技有限公司 Method and apparatus for determining security information for a wireless access point
CN106209918A (en) * 2016-09-13 2016-12-07 深圳市金立通信设备有限公司 The method of a kind of internet security management and terminal
CN106412910A (en) * 2016-10-27 2017-02-15 上海斐讯数据通信技术有限公司 Method for intelligently screening SSID access point and wireless terminal
CN112040529B (en) * 2020-09-11 2023-08-04 连尚(北京)网络科技有限公司 WiFi connection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741704A (en) * 2008-11-24 2010-06-16 J·彼得松 System and method for generating unique identifier of service point
WO2010150052A2 (en) * 2009-06-24 2010-12-29 Nokia Corporation Methods and apparatuses for avoiding denial of service attacks by rogue access points
CN103455758A (en) * 2013-08-22 2013-12-18 北京奇虎科技有限公司 Method and device for identifying malicious website
CN103476023A (en) * 2013-09-11 2013-12-25 福建星网锐捷网络有限公司 Configuration method of access point equipment, access controller and communication system
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103997771A (en) * 2014-05-15 2014-08-20 无锡风铃电子商务有限公司 System and method for achieving application and message triggering based on wireless access recognition technology

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101741704A (en) * 2008-11-24 2010-06-16 J·彼得松 System and method for generating unique identifier of service point
WO2010150052A2 (en) * 2009-06-24 2010-12-29 Nokia Corporation Methods and apparatuses for avoiding denial of service attacks by rogue access points
CN102804829A (en) * 2009-06-24 2012-11-28 诺基亚公司 Methods and apparatuses for avoiding denial of service attacks by rogue access points
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103455758A (en) * 2013-08-22 2013-12-18 北京奇虎科技有限公司 Method and device for identifying malicious website
CN103476023A (en) * 2013-09-11 2013-12-25 福建星网锐捷网络有限公司 Configuration method of access point equipment, access controller and communication system
CN103997771A (en) * 2014-05-15 2014-08-20 无锡风铃电子商务有限公司 System and method for achieving application and message triggering based on wireless access recognition technology

Also Published As

Publication number Publication date
CN104703184A (en) 2015-06-10

Similar Documents

Publication Publication Date Title
CN104703184B (en) A kind of safe Wi-Fi hotspot information issuing method
CN103825895B (en) A kind of information processing method and electronic equipment
Cunche et al. I know who you will meet this evening! linking wireless devices using wi-fi probe requests
CN104349423B (en) From the method, system and device of the WLAN (wireless local area network) that is dynamically connected
WO2015154454A1 (en) Wireless network connection method and device
TWI695271B (en) Information matching method and device
CN102737119B (en) The lookup method of URL(uniform resource locator), filter method and relevant device and system
KR20130120417A (en) Method for accessing mapped information on current space by wireless device using network access device and apparatus for accessing mapped information on current space using network access device
CN105162768A (en) Method and device for detecting phishing Wi-Fi hotspots
CN104955051B (en) Recognition methods, device and the sensor of a kind of WIFI that goes fishing
CN104320408A (en) Login method of WiFi access point (AP)
CN101931646A (en) Internet brows management method, system and terminal
CN104462285A (en) Privacy protection method for mobile service inquiry system
CN106162818A (en) The method unlocking WIFI hot spot
CN105142146A (en) Authentication method of WIFI hotspot access, device and system
CN105792215A (en) Detection method of pseudo base station and terminal thereof
CN107027121A (en) A kind of WiFi network safety access method and device
CN106507360A (en) A kind of WIFI network access control method and device
CN106714172A (en) WIFI hotspot processing method, device and system
CN106982434B (en) Wireless local area network security access method and device
WO2022029415A1 (en) Identifying wireless network devices
US9825895B2 (en) Method and system for exchanging messages on the basis of current position
CN113691609A (en) Data acquisition method and device, electronic equipment and storage medium
CN108738023A (en) Prevent method, Internet of Things server and the system of internet-of-things terminal access pseudo-base station
CN110891272B (en) Wireless network access authentication method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: Yunnan Hongxin Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023420000302

Denomination of invention: A Secure Method for Publishing WiFi Hotspot Information

Granted publication date: 20180814

License type: Common License

Record date: 20230821

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: ANHUI YUNSEN INTERNET OF THINGS TECHNOLOGY Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980053525

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20231221

EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: GUANGZHOU RISHUN ELECTRONIC TECHNOLOGY Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980053975

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20231225

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: GUANGDONG TECSUN TECHNOLOGY Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054607

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20231229

Application publication date: 20150610

Assignee: Huanyi (Guangdong) emergency safety Technology Group Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054606

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20231229

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: SHENZHEN RONGSHENG INTELLIGENT EQUIPMENT Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054616

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20231229

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: Guangzhou Kangpusi Network Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054833

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20240104

Application publication date: 20150610

Assignee: Guangdong Digital Smart City Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054832

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20240104

Application publication date: 20150610

Assignee: Guangdong Runyu Information Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2023980054831

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20240104

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: Hefei Baihe Intelligent Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2024980000462

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20240110

EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20150610

Assignee: Guangzhou Love Time Information Technology Co.,Ltd.

Assignor: SUN YAT-SEN University

Contract record no.: X2024980002510

Denomination of invention: A secure method for publishing WiFi hotspot information

Granted publication date: 20180814

License type: Common License

Record date: 20240306