Invention content
To overcome at least one described in the above-mentioned prior art insufficient, a kind of high degree of automation of present invention offer and safety
Property high safety Wi-Fi hotspot information issuing method.
In order to achieve the above object, technical scheme is as follows:
A kind of safe Wi-Fi hotspot information issuing method, including;
(1) hot spot APi Broadcast SSIDs in its signal cover;
(2) terminal Mj is received and is recorded the SSID of all or part of hot spots on the way;
(3) terminal Mj submits the SSID of all or part of hot spots recorded in step (2) to server S VR;
(4) server S VR extracts search key from the SSID that step (3) receives, and then server S VR is searched for
With the relevant content of these keywords and analyze it;Thereafter, server S VR will be analyzed, search result returns to terminal
Mj;
(5) terminal Mj is presented on analysis, the search result that step (4) returns to user, including uses safety mirror therein
Information is determined to alert or shield access operation of the user to dangerous content.
Preferably, for the SSID of the hot spot APi by User Defined, which, which has, facilitates system to extract search therein
Keyword format.
Different from prior art, in the hot information dissemination method of the present invention, hot spot possessor can freely set
The content of SSID is set, i.e. SSID is an arbitrary character string;The hot spot SSID scanned is submitted to server by terminal, service
Device analyzes SSID to obtain search key therein, and then server is locally, remotely or third-party server is searched
Rope returns to terminal with the relevant information of these keywords.For example network address correspondence is then captured comprising a network address in SSID
The content of website simultaneously generates result report to return to terminal;Or include the name " certain coffee shop " in a dining room in SSID,
The information about " certain coffee shop " is then searched in internet and generates result report to return to terminal.
Technical solution used in the present invention is:Terminal scan and record on the way the SSID of hot spot and submit it to positioned at
The server of internet, server analysis SSID, the relative content of search simultaneously return result to terminal, and terminal is to user
Analysis, search result is presented and alerts or shield access of the user to dangerous content according to security authentication information therein
Operation.
Preferably, step (2) the terminal Mj is received and the detailed process of the SSID that records all or part of hot spots on the way
For:
(201) hot spot APi broadcasts the information of itself in its signal cover;
(202) terminal Mj filters the information of hot spot according to blacklist, and terminal Mj inquiry blacklists simultaneously judge wherein whether wrap
Information containing specified hot spot;If then filtering the information of the hot spot;Or terminal Mj receives the information of hot spot according to white list, wherein
Terminal Mj inquiry white lists and the information for judging wherein whether to include specified hot spot;If then receiving the information of the hot spot;Wherein
Terminal Mj generates black, white list using one kind or in conjunction with a variety of methods, and black, white list is to be issued by server S VR or user
It is self-defined;
(203) for terminal Mj according to regular expression list filtering hot information, each regular expression in list is one
The match pattern of a SSID, terminal Mj judge whether the SSID of hot spot matches at least one regular expression;If then filtering should
The information of hot spot;Or terminal Mj receives the information of hot spot according to regular expression list, wherein terminal Mj judges hot spot
Whether SSID matches at least one regular expression;If then receiving the information of the hot spot;Wherein terminal Mj uses a kind of or knot
A variety of methods are closed to generate regular expression list, regular expression list is issued by server S VR or User Defined;
(204) terminal Mj records the information for all or part of hot spots not filtered in hot information table;Wherein terminal
Mj is by the generated time of record and generates the local zone time of terminal Mj and position when position is set as receiving hot information;
And by the submission state initialization of record be " not submitting ".
Preferably, in the step (203), terminal Mj uses a kind of or a variety of patterns based on charactor comparison of combined use
Matching process judges whether SSID matches at least one regular expression, including:(1)Come from front to back by character scan SSID
It attempts to match each regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front.
Preferably, the terminal Mj scans all records that do not submit and judges the generated time of each record and current local
Whether the interval of time exceeds pre-set threshold value;If then deleting the record;Terminal Mj scans all records that do not submit and judgement
With the presence or absence of a plurality of record with identical SSID and MAC Address;If then therefrom selecting one to record and delete other records;
Terminal Mj selects one using a kind of or a variety of methods of combination from a plurality of record with identical SSID and MAC Address
Item, including:(1)The interval of the generated time of computing terminal Mj current times and each record, the current locations computing terminal Mj with it is each
The distance of the generation position of record, then calculates a priority according to time interval and positional distance and therefrom selects weights
A maximum record;(2)One record of random selection.
Preferably, step (3) terminal Mj submits all or part of hot spots recorded in step (2) to server S VR
The detailed process of SSID is:
(301)Terminal Mj scans the every hot spot that do not submit record and in local SSID analytical tables according to the SSID of hot spot
Inquiry is recorded with the presence or absence of with the relevant analyses of the SSID;If analysis record exists and effectively, terminal Mj records the analysis
It is presented to the user and sets " having been filed on " the submission state that hot spot records to;
In the step, whether the interval of the generated time of terminal Mj discriminatory analysis record and the current time of terminal is beyond pre-
If threshold values;If so, analysis record is invalid;
In the step, whether the interval of the terminal Mj also generated times of discriminatory analysis record and hot spot record is beyond default valve
Value;If so, analysis record is invalid;
(302)Terminal Mj sends all effective records that do not submit to server S VR;
In the step, terminal Mj sends the effective record that do not submit to server S VR using a kind of or a variety of methods of combination,
Including:(1)Terminal Mj is submitted when accessing internet through hot spot by WiFi network interface and is recorded;(2)M1 is passing through mobile network
Network interface submits record when accessing internet.
Preferably, step (4) the server S VR extracts search key from the SSID received, then server
SVR is searched for and the relevant content of these keywords and is analyzed it, and detailed process is:
(401)Server S VR in the SSID analytical tables of Local or Remote database according to the SSID of hot spot inquiry whether
In the presence of being recorded with the relevant analyses of the SSID and judge whether analysis record is effective;If then jumping to step(409);
In the step, server S VR judges that the interval of the generated time of each analysis record and the current time of server is
It is no to exceed pre-set threshold value;If so, analysis record is invalid;
(402)Server S VR extracts the network address for including in SSID according to regular expression list, and each of list is just
Then expression formula is a network address match pattern;
In the step, server S VR using it is a kind of or combine it is a variety of based on the method for mode matching of charactor comparison from SSID
Middle extraction matches all character strings of at least one regular expression, including:(1)It is attempted from front to back by character scan SSID
Match each regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front;
(403)To each network address of extraction, basis should in the network address of Local or Remote database describes table by server S VR
Web site query is with the presence or absence of relative one or more description record;If description record is not present or fails, server
SVR submits network address to third party's search server and is inquired by the latter and returned and the relevant description information of the network address;If description
Record exists and effectively, then jumps to step(408);
In the step, server S VR judges that the interval of the generated time of each description record and the current time of server is
It is no to exceed pre-set threshold value;If so, description record failure;
(404)Server S VR to carry out a plurality of description information of same network address by the degree of correlation of description information and network address
Sequence, the wherein degree of correlation are defined as according to web page address, webpage title, web page contents, the security authentication letter in description information
The weights that breath etc. is calculated;
(405)To each network address, server S VR records degree highest one or more associated therewith in description information table
Description information and the current time for setting the generated time of description record to server;
(406)Server S VR is checked in step(405)Whether it include one in the web page contents of each description record generated
Or multiple network address;If then SVR is added it in the two level list of websites field of corresponding description record;If otherwise jumping to step
Suddenly(408);
(407)Server S VR is executed and step(403)Extremely(406)Identical process arranges to inquire and store two level network address
The description information of each two level network address in table;
(408)Server S VR is packaged the description record of each network address and two level network address in SSID and remembers to generate the analysis of SSID
It records and will analyze in record storage to the SSID analytical tables of Local or Remote database;Wherein, server S VR records analysis
Generated time is set as the current time of server;
(409)The analysis record of SSID is returned to terminal Mj by server S VR.
Preferably, the analysis record of SSID is presented to the user by terminal Mj, including:Show network address and two level network address and basis
Secure authentication info alert shields access operation of the user to dangerous web page contents.
Compared with prior art, the advantageous effect of technical solution of the present invention is:
(1) easy to operate, the scanning of hot spot SSID, search, analytic process are increasingly automated;
(2) safe, terminal automatic fitration rubbish hot spot simultaneously alerts or shields access behaviour of the user to dangerous content
Make.
(3) widely used, hot spot SSID is an arbitrary character string, and arbitrary content can be arranged according to actual needs.
Embodiment 1
As shown in Figure 1, the present invention relates to the base station BS of the mobile networks such as server S VR, 3G or 4G positioned at internet, it is more
A Wi-Fi hotspot { AP1 ..., APi ... } to periphery Broadcast SSIDs and it is multiple provide at least one WiFi network interface and
At least one mobile network's interface terminal M1 ..., and Mj ... }.
A kind of safe hot information dissemination method, specifically includes:
(1) hot spot APi Broadcast SSIDs in its signal cover;
(2) terminal Mj is received by certain way and is recorded the SSID of all or part of hot spots on the way;
(3) terminal Mj is submitted all or part of hot spots recorded in step (2) by certain way to server S VR
SSID;
(4) server S VR extracts search key by certain way from the SSID that step (3) receives, then SVR
Search with the relevant content of these keywords and analyze it.Thereafter, SVR will be analyzed, search result returns to terminal Mj;
(5) terminal Mj is presented on analysis, the search result that step (4) returns by certain way to user, including uses it
In secure authentication information alert or shield access operation of the user to dangerous content.
The present invention can provide service to anonymous and registration user.For sake of convenience, it uses below " user " and carrys out table
Show anonymous and registration user.
In this specific embodiment, the relation database table that terminal and server uses is as shown in Figure 2:
Server D10 includes:
Hot information table D101:Record terminal is committed to the hot information of server, including { SSID, MAC Address, generation
Time, generate position etc. fields.
Network address describes table D102:The network address description information that arrives of record whois lookup, including web page address, webpage title,
Web page contents, two level list of websites, secure authentication information, the degree of correlation, generated time } etc. fields.
SSID analytical tables D103:Analysis result of the server to SSID is recorded, including { SSID, network address description information, is generated
Time } etc. fields, wherein network address description information includes the description information for all network address for including in SSID.
User message table D104:The fields such as the information, including { user account, user password } of record registration user.
Terminal D 20 includes:
Hot information table D201:The hot information that generates on the way of record terminal, including SSID, MAC Address, generated time,
Generate position, submit state etc. fields.
SSID analytical tables D202:Record the SSID analysis results that server returns, including { SSID, network address description information, life
At the time } etc. fields.
User message table D203:Record log-on message of the registration user in server of currently used terminal, including { user
Account, user password } etc. fields.
As shown in figure 3, user Alice carried terminals M1 is moved to E points from A points, AP1, AP2 and AP3 be Alice along by way of
Three hot spots crossed, the information of each hot spot are as shown in Figure 5.
In this specific embodiment, terminal M1 implementation procedures S10 records the letter of hot spot on the way in hot information table
Breath, is as follows:
Step S101:Hot spot AP1, AP2 and AP3 broadcast the information of itself, the information of hot spot in its signal cover
SSID, MAC Address including hot spot etc..
Step S102:Terminal M1 filters the information of hot spot according to blacklist.M1 inquires blacklist and judges wherein whether wrap
Information containing specified hot spot(Such as:Whether inquiry includes the MAC Address of specified hot spot);If then filtering the information of the hot spot.
Similarly, M1 can also receive the information of hot spot according to white list, and whether wherein M1 inquires white list and judge wherein comprising specified
The information of hot spot;If then receiving the information of the hot spot.
In the step, M1 generates black, white list using one kind or in conjunction with a variety of methods, including:(1)Server is issued;
(2)User Defined.
In the step, registration user can report rubbish hot spot and submit the information of the hot spot to server, and server is being examined
In blacklist after core(Or white list)Middle addition(Or it deletes)The information of the hot spot.
Step S103:Terminal M1 filters the information of hot spot according to regular expression list, each canonical table in list
It is the match pattern of a SSID up to formula.M1 judges whether the SSID of hot spot matches at least one regular expression;If then crossing
Filter the information of the hot spot.Similarly, M1 can also receive the information of hot spot according to regular expression list, and wherein M1 judges hot spot
SSID whether match at least one regular expression;If then receiving the information of the hot spot.
In the step, M1 generates regular expression list using one kind or in conjunction with a variety of methods, including:(1)Server
Publication;(2)User Defined.
In the step, M1 uses a kind of or be used in combination and a variety of to judge SSID based on the method for mode matching of charactor comparison
Whether at least one regular expression is matched, including:(1)Attempt to match each regular expressions by character scan SSID from front to back
Formula;(2)Attempt to match each regular expression by character scan SSID from back to front.
Step S104:Terminal M1 records the information for all or part of hot spots not filtered in hot information table.
In the step, M1 uses a kind of or select the one or more hot spots not filtered of record in conjunction with a variety of methods
Information, including:(1)The information for the hot spot that record user specifies;(2)Record currently establishes the letter of the hot spot of wireless connection therewith
Breath.
In the step, the local of M1 when M1 is set as the generated time of record and generation position to receive the information of hot spot
Time and position and by the submission state initialization of record be " not submitting ".
Step S105:Terminate.
In this specific embodiment, terminal M1 implementation procedures S20 deletes the failure that do not submit in hot information table
Record, is as follows:
S201:Terminal M1 scans all records that do not submit and judges generated time and the current local time of each record
Whether interval exceeds pre-set threshold value;If then deleting the record.
S202:Terminal M1 scan all records that do not submit and judge whether it is a plurality of with identical SSID and MAC
The record of location;If then therefrom selecting one to record and delete other records.
In the step, M1 is using a kind of or a variety of methods of combination from a plurality of record with identical SSID and MAC Address
Selection one, including:(1)The interval of M1 current times and the generated time of each record is calculated, the current locations M1 and each note are calculated
Then the distance of the generation position of record calculates a priority according to time interval and positional distance and therefrom selects weights most
A big record;(2)One record of random selection.
S203:Terminate.
In this specific embodiment, terminal M1 implementation procedures S30 submits the record in hot information table to server
SVR is as follows:
S301:Terminal M1 scans the every hot spot that do not submit record and in local SSID analytical tables according to the SSID of hot spot
Inquiry is recorded with the presence or absence of with the relevant analyses of the SSID;If analysis record exists and effectively, which is recorded and presented by M1
It is set as " having been filed on " to user and by the submission state that hot spot records.
In the step, whether the interval of the generated time of M1 discriminatory analysis record and the current time of terminal is beyond default valve
Value;If so, analysis record is invalid.
In the step, whether the interval of the generated time of M1 discriminatory analysis record and hot spot record exceeds pre-set threshold value;If
It is then to analyze record in vain.
S302:Terminal M1 sends all effective records that do not submit to server S VR.
In the step, M1 sends the effective record that do not submit to SVR using a kind of or a variety of methods of combination, including:(1)M1
It submits and records when accessing internet through hot spot by WiFi network interface;(2)M1 is accessing interconnection by mobile network's interface
Record is submitted when net.
S303:Terminate.
In this specific embodiment, server S VR implementation procedures S40(Fig. 4)Carry out every heat that analysing terminal M1 is submitted
Point record, is as follows:
S401:Server S VR in the SSID analytical tables of Local or Remote database according to the SSID of hot spot inquiry whether
In the presence of being recorded with the relevant analyses of the SSID and judge whether analysis record is effective;If then jumping to step S409.
In the step, SVR judges whether the generated time of each analysis record and the interval of the current time of server exceed
Pre-set threshold value;If so, analysis record is invalid.
S402:Server S VR extracts the network address for including in SSID according to regular expression list, and each of list is just
Then expression formula is a network address match pattern.
In the step, SVR is extracted based on the method for mode matching of charactor comparison from SSID using a kind of or combination is a variety of
All character strings of at least one regular expression are matched, including:(1)Matching to be attempted by character scan SSID each from front to back
Regular expression;(2)Attempt to match each regular expression by character scan SSID from back to front.
S403:To each network address of extraction, basis should in the network address of Local or Remote database describes table by server S VR
Web site query is with the presence or absence of relative one or more description record;If description record is not present or fails, SVR is to the
Tripartite's search server submits network address and is inquired by the latter and returned and the relevant description information of the network address;If description record exists
And effectively, then jump to step S408.
In the step, SVR judges whether the generated time of each description record and the interval of the current time of server exceed
Pre-set threshold value;If so, description record failure.
S404:Server S VR to carry out a plurality of description information of same network address by the degree of correlation of description information and network address
Sequence, the wherein degree of correlation are defined as according to web page address, webpage title, web page contents, the security authentication letter in description information
The weights that breath etc. is calculated.
S405:To each network address, server S VR records degree highest one or more associated therewith in description information table
Description information and the current time for setting the generated time of description record to server.
S406:Server S VR checks whether in the web page contents of the step S405 each description records generated include one
Or multiple network address;If then SVR is added it in the two level list of websites field of corresponding description record;If otherwise jumping to step
Rapid S408.
S407:Server S VR executes process identical with step S403 to S406 to inquire and store two level list of websites
In each two level network address description information.
S408:Server S VR is packaged the description record of each network address and two level network address in SSID and remembers to generate the analysis of SSID
It records and will analyze in record storage to the SSID analytical tables of Local or Remote database.Wherein, when the generation that SVR records analysis
Between be set as the current time of server.
S409:The analysis record of SSID is returned to terminal M1 by server S VR.
S410:The analysis record of SSID is presented to the user by terminal M1, including:Show network address and two level network address and according to peace
Full authentication information warning shields access operation etc. of the user to dangerous web page contents.
S411:Terminate.
For ease of understanding, a concrete application example is given below.
As shown in Fig. 3,5, anonymous Alice carried terminals M1 is moved to E points, the data of M1 and server SVR from A points
Table is initially empty.The blacklist list of M1 includes the information of hot spot AP1, the regular expression list of the SSID matchings M1 of AP2.M1
In B points and the information of C points filtering AP1 and AP2 broadcast and receive the information of AP3 broadcast in D points.Thereafter, M1 is in hot information table
The information of middle record AP3 and the information for submitting the hot spot to SVR in E points.
Since SSID analytical tables are initially empty, SVR fails to find in table to be recorded with the relevant analyses of the SSID of AP3,
Then from network address " navigator.wifi.com " is extracted in SSID and in network address describes table inquiry with the network address is relevant retouches
State record.It is initially empty since network address describes table, SVR fails to find in table related to network address " navigator.wifi.com "
Description record, transfer ask third party's search server inquire and return and the relevant description information of the network address.Such as Fig. 6 institutes
Show, SVR calculates the degree of correlation of each description information and network address and stores the highest three descriptions letter of the degree of correlation in network address describes table
Breath.SVR then referral web site describe in each record of table whether comprising one or more network address and by query result storage to right
In the two level list of websites field that should describe record.SVR using the identical mode with processing " navigator.wifi.com " come
Inquire and store the description information of two level network address.Thereafter, SVR be packaged " navigator.wifi.com ",
" news.wifi.com ", " video.wifi.com ", " audio.wifi.com ", and the description of " book.wifi.com " are remembered
The analysis for recording to generate SSID records and analysis record is returned to M1.The analysis record of SSID is presented to user by M1, including:
Show network address and two level network address and according to secure authentication information alert or the access operation for shielding user to dangerous web page contents.
Compared with the prior art, technical scheme of the present invention has following significant advantage:
(1) easy to operate, the scanning of hot spot SSID, search, analytic process are increasingly automated;
(2) safe, terminal automatic fitration rubbish hot spot simultaneously alerts or shields access behaviour of the user to dangerous content
Make.
(3) widely used, hot spot SSID is an arbitrary character string, and arbitrary content can be arranged according to actual needs.
The publication of Wi-Fi hotspot information is issued and is shared into row information by SSID, and main thought all provides a user
The relevant information of keyword included in SSID, and currently existing scheme is usually to provide a user letter in a closed system
Breath, this is closed to be characterized by:1)Index in SSID need to be in server registration;2)Associated content is indexed to fix.
And the application is that information is provided a user in an open system, this opening is characterized by:1)SSID
By User Defined, system can be facilitated to extract search key therein with certain format(I.e.:Index)Also may be used
To be arbitrary;2)The program filters for running on user terminal go out to meet the SSID of condition and are sent to Internet Server, fortune
Row extracts the keyword of search then in one or more third party contents in the program on server from the SSID received
Relevant information is obtained in search application;
For above-mentioned first opening flag, it is proposed that in the concrete scheme that terminal receives, records and filter SSID, it is also proposed that
The concrete scheme of search key in SSID is extracted in server;
For above-mentioned second opening flag, it is proposed that in server according to search key inquiry and Cache associativity content
Concrete scheme, in addition terminal also local cache historical query record think after use;
In a specific embodiment, the application is to be refined to scheme by taking network address as an example, and propose and how to pass through
Network address in SSID is nested in two level list of websites therein to obtain.
The same or similar label correspond to the same or similar components;
Position relationship described in attached drawing is used to only for illustration, should not be understood as the limitation to this patent;
Obviously, the above embodiment of the present invention be only to clearly illustrate example of the present invention, and not be pair
The restriction of embodiments of the present invention.For those of ordinary skill in the art, may be used also on the basis of the above description
To make other variations or changes in different ways.There is no necessity and possibility to exhaust all the enbodiments.It is all this
All any modification, equivalent and improvement etc., should be included in the claims in the present invention made by within the spirit and principle of invention
Protection domain within.