CN104980919B - The acquisition methods and equipment of information of network service - Google Patents

The acquisition methods and equipment of information of network service Download PDF

Info

Publication number
CN104980919B
CN104980919B CN201510243278.6A CN201510243278A CN104980919B CN 104980919 B CN104980919 B CN 104980919B CN 201510243278 A CN201510243278 A CN 201510243278A CN 104980919 B CN104980919 B CN 104980919B
Authority
CN
China
Prior art keywords
information
network
encryption information
smart machine
access point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510243278.6A
Other languages
Chinese (zh)
Other versions
CN104980919A (en
Inventor
樊家麟
黄秋志
徐印成
陈勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510243278.6A priority Critical patent/CN104980919B/en
Publication of CN104980919A publication Critical patent/CN104980919A/en
Application granted granted Critical
Publication of CN104980919B publication Critical patent/CN104980919B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The disclosure is directed to a kind of method and apparatus for obtaining information of network service, belong to network technique field.Method includes: the network information of the network of broadcast radio verifying within a preset range, and the smart machine in preset range is enabled to connect wireless authentication network;Receive the first encryption information that smart machine is sent by wireless authentication network;The second local encryption information is encrypted using the first encryption information, obtains key information;Information of network service is encrypted using the second encryption information, obtains network service encryption information;To smart machine " return " key" information and network service encryption information, so that smart machine obtains information of network service according to the first encryption information, key information and network service encryption information.The present invention is by obtaining information of network service according to the first encryption information, key information and network service encryption information.It is interacted since encryption information can be carried out with wireless access point, to obtain information of network service.Therefore, internet security is higher.

Description

The acquisition methods and equipment of information of network service
Technical field
This disclosure relates to network technique field, the in particular to acquisition methods and equipment of a kind of information of network service.
Background technique
With the development of science and technology, more and more smart machines connect wireless network by wireless access point.Smart machine When connecting wireless network, need to obtain the SSID (Service Set Identifier, service set), close of wireless network The information of network service such as code.The acquisition methods of information of network service are usually to be believed by wireless access point broadcasts network service at present Breath, smart machine receive the information of network service of broadcast, so that smart machine can be connected according to the information of network service received Wireless network.For example, the router of user's family can broadcast wireless networks SSID and password, the mobile phone of user can receive broadcast SSID and password, and the corresponding wireless network of SSID is connected according to password.
Since wireless access point can broadcast the information of network service of wireless network, so that wireless network signal All smart machines can receive information of network service in coverage area, and connect wireless network according to information of network service Network causes a possibility that network is by attack bigger, so that the safety of network reduces.
Summary of the invention
To overcome the problems in correlation technique, it present disclose provides a kind of acquisition methods of information of network service and sets It is standby.
According to the first aspect of the embodiments of the present disclosure, a kind of acquisition methods of information of network service, this method packet are provided It includes:
The network information of the network of broadcast radio verifying within a preset range, enables smart machine in the preset range Enough connect the wireless authentication network;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
The key information and the network service encryption information are returned to the smart machine, so that the smart machine According to first encryption information, the key information and the network service encryption information, the information of network service is obtained.
With reference to first aspect, in the first possible implementation of the first aspect, described to receive the smart machine Before the first encryption information sent by the wireless authentication network, further includes:
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the net Network information;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, set to the intelligence Standby return allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response.
With reference to first aspect, in the second possible implementation of the first aspect, described to be returned to the smart machine It returns before the key information and the network service encryption information, further includes:
The facility information that the smart machine is sent is received, the facility information includes at least hardware address and product serial Number;
According to the facility information, judge whether the smart machine is legitimate device;
When the smart machine is legitimate device, executes to the smart machine and return to the key information and the net The step of network service encryption information.
According to the second aspect of an embodiment of the present disclosure, a kind of acquisition methods of information of network service, this method packet are provided It includes:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter Breath.
In conjunction with second aspect, in the first possible implementation of the second aspect, the basis is received wireless The network information of network is verified, wireless authentication network is connected, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connection are sent to the wireless access point Request carries the network information, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returns Allow connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
According to the third aspect of an embodiment of the present disclosure, a kind of access point apparatus is provided, which includes:
Broadcast module, for the network information of the verifying network of broadcast radio within a preset range, so that the preset range Interior smart machine can connect the wireless authentication network;
First receiving module, the first encryption letter sent for receiving the smart machine by the wireless authentication network Breath;
First encrypting module is obtained for being encrypted using first encryption information to the second local encryption information To key information;
Second encrypting module obtains network for encrypting using second encryption information to information of network service Service encryption information;
First return module, for returning to the key information and network service encryption letter to the smart machine Breath, so that the smart machine is obtained according to first encryption information, the key information and the network service encryption information Take the information of network service.
In conjunction with the third aspect, in the first possible implementation of the third aspect, described access point equipment further include:
Second receiving module, the verifying network connecting request sent for receiving the smart machine, the verifying network Connection request carries the network information;
Module is obtained, the signal strength indication of the wireless authentication network is detected for obtaining the smart machine;
Second return module, for being connected to the network according to the verifying when the signal strength indication is greater than preset threshold Request, returning to the smart machine allows connection response, so that the smart machine is according to the permission connection response, connection The wireless authentication network.
In conjunction with the third aspect, in the second possible implementation of the third aspect, described access point equipment further include:
Third receiving module, the facility information sent for receiving the smart machine, the facility information include at least Hardware address and product ID;
Judgment module, for judging whether the smart machine is legitimate device according to the facility information;
Execution module, it is described close to smart machine return for executing when the smart machine is legitimate device The step of key information and the network service encryption information.
According to a fourth aspect of embodiments of the present disclosure, a kind of smart machine is provided, which includes:
Link block connects wireless authentication network for the network information according to the wireless authentication network received, described The network information of wireless authentication network is broadcasted within a preset range by wireless access point;
Sending module, for sending the first encryption letter to the wireless access point by the wireless authentication network in connection Breath, so that the wireless access point is according to first encryption information, " return " key" information and network service encryption information, it is described Key information is to obtain after being encrypted using first encryption information to the second encryption information of the wireless access point local It arrives, the network service encryption information is to be added using information of network service of second encryption information to the wireless access point It is obtained after close;
Receiving module, for receiving the key information and network service encryption letter that the wireless access point returns Breath;
First deciphering module obtains described for the key information to be decrypted according to first encryption information Second encryption information;
Second deciphering module, for the network service encryption information to be decrypted according to second encryption information, Obtain the information of network service.
In conjunction with fourth aspect, in the first possible implementation of the fourth aspect, the link block, for detecting The signal strength indication of the wireless authentication network;Verifying network connecting request is sent to the wireless access point and the signal is strong Angle value, the verifying network connecting request carries the network information, so that the wireless access point determines the signal strength When value is greater than preset threshold, returning allows connection response;When receiving the permission connection response of the wireless access point, connection The wireless authentication network.
According to a fifth aspect of the embodiments of the present disclosure, a kind of access point apparatus is provided, which includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The network information of the network of broadcast radio verifying within a preset range, enables smart machine in the preset range Enough connect the wireless authentication network;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
The key information and the network service encryption information are returned to the smart machine, so that the smart machine According to first encryption information, the key information and the network service encryption information, the information of network service is obtained.
According to a sixth aspect of an embodiment of the present disclosure, a kind of smart machine is provided, which includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter Breath.
The technical solution that the embodiment of the present disclosure provides has the benefit that
The first encryption information sent by receiving smart machine by wireless authentication network returns to basis to smart machine The key information and network service encryption information that first encryption information obtains, so that smart machine is according to the first encryption information, close Key information and network service encryption information obtain information of network service.Due to smart machine can first pass through wireless authentication network to Wireless access point send encryption information, wireless access point can according to smart machine send encryption information to information of network service into Row encryption, and network service encryption information is returned, so that network service encryption information can be decrypted in smart machine, to obtain Information of network service.Therefore, the safety of network is higher.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 4 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 5 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 6 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 7 is a kind of structural schematic diagram of smart machine shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of wireless access point shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of terminal shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, the net The acquisition methods of network information on services are applied to wireless access point.Wherein, wireless access point can integrally set for route switching access Standby and pure access point apparatus, such as wireless router, the present embodiment and subsequent embodiment do not have the type work of wireless access point Body limits.As shown in Figure 1, the acquisition methods of the information of network service include the following steps.
In a step 101, the network information of the network of broadcast radio verifying within a preset range, so that the intelligence in preset range Energy equipment can connect wireless authentication network.
In a step 102, the first encryption information that smart machine is sent by wireless authentication network is received.
In step 103, the second local encryption information is encrypted using the first encryption information, obtains key letter Breath.
At step 104, information of network service is encrypted using the second encryption information, obtains network service encryption letter Breath.
In step 105, to smart machine " return " key" information and network service encryption information so that smart machine according to First encryption information, key information and network service encryption information obtain information of network service.
As a kind of alternative embodiment, receive the first encryption information that smart machine is sent by wireless authentication network it Before, further includes:
The verifying network connecting request that smart machine is sent is received, verifying network connecting request carries the network information;
Obtain the signal strength indication that smart machine detects wireless authentication network;
When signal strength indication is greater than preset threshold, according to verifying network connecting request, allow to connect to smart machine return Response is connect, so that smart machine connects wireless authentication network according to connection response is allowed.
It is also wrapped as a kind of alternative embodiment to before smart machine " return " key" information and network service encryption information It includes:
The facility information that smart machine is sent is received, facility information includes at least hardware address and product ID;
According to facility information, judge whether smart machine is legitimate device;
When smart machine is legitimate device, execute to smart machine " return " key" information and network service encryption information Step.
The method that the embodiment of the present disclosure provides, the first encryption sent by receiving smart machine by wireless authentication network Information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, so that intelligence Equipment obtains information of network service according to the first encryption information, key information and network service encryption information.Due to smart machine Wireless authentication network can be first passed through and send encryption information to wireless access point, what wireless access point can be sent according to smart machine adds Confidential information encrypts information of network service, and returns to network service encryption information, so that smart machine can be to network service Encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer It repeats one by one.
Fig. 2 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, the net The acquisition methods of network information on services are applied to smart machine.Wherein, smart machine can be mobile for smart phone, tablet computer etc. Equipment, the present embodiment and subsequent embodiment do not make specific limit to the type of smart machine.As shown in Fig. 2, the network service is believed The acquisition methods of breath include the following steps.
In step 201, according to the network information of the wireless authentication network received, wireless authentication network is connected, wirelessly The network information of verifying network is broadcasted within a preset range by wireless access point.
In step 202, by the wireless authentication network in connection, the first encryption information is sent to wireless access point, is made Wireless access point according to the first encryption information, " return " key" information and network service encryption information, key information is using the One encryption information obtains after encrypting to the second encryption information of wireless access point local, and network service encryption information is to use Second encryption information obtains after encrypting to the information of network service of wireless access point.
In step 203, the key information and network service encryption information that wireless access point returns are received.
In step 204, key information is decrypted according to the first encryption information, obtains the second encryption information.
In step 205, network service encryption information is decrypted according to the second encryption information, obtains network service letter Breath.
Wireless authentication net is connected according to the network information of the wireless authentication network received as a kind of alternative embodiment Network, comprising:
Detect the signal strength indication of wireless authentication network;
Verifying network connecting request and signal strength indication are sent to wireless access point, verifying network connecting request carries network Information, when so that wireless access point determining that signal strength indication is greater than preset threshold, returning allows connection response;
When receiving the permission connection response of wireless access point, wireless authentication network is connected.
The method that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point, The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with It is high.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer It repeats one by one.
Fig. 3 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, such as Fig. 3 Shown, the acquisition methods of the information of network service are related in wireless access point and smart machine, include the following steps.
In step 301, the network information of wireless access point broadcast radio verifying within a preset range network.
Wherein, wireless access point can externally provide multiple wireless networks, and wireless authentication network is that wireless access point is external The network provided.Wireless authentication network is for smart machine in connection WiFi (Wireless Fidelity, Wireless Fidelity) The relevant information of smart machine is verified before, after being verified, smart machine can connect WiFi.
When the network information of the wireless access point network of broadcast radio verifying within a preset range, the network information of broadcast can be with For the SSID of wireless authentication network, the present embodiment does not make specific limit to the content of the network information.In addition, preset range can root It is set according to demand, the present embodiment is not especially limited this.For example, preset range can be to be with wireless access point in The heart, radius are the circular scope of 1m.When the position of smart machine exceeds preset range, smart machine cannot receive nothing The network information of line access point broadcast.After the relevant authentication for only passing through wireless authentication network due to smart machine, it can connect WiFi is connected, it, naturally can not be wireless by connecting when smart machine cannot receive the network information of wireless authentication network Network is verified to carry out relevant authentication, therefore, substantial portion of intelligence outside preset range can be limited through the above way and set Standby connection WiFi, reduces a possibility that network is by attack, to improve the safety of network.
In step 302, smart machine connects wireless authentication net according to the network information of the wireless authentication network received Network.
The present embodiment, according to the network information of the wireless authentication network received, connects wireless authentication net not to smart machine The mode of network specifically limits, including but not limited to following process:
(1) signal strength indication of smart machine detection wireless authentication network.
(2) smart machine sends verifying network connecting request and signal strength indication, verifying network connection to wireless access point Request carries the network information.
(3) wireless access point receives the verifying network connecting request that smart machine is sent.
(4) wireless access point obtains the signal strength indication that smart machine detects wireless authentication network.
(5) when signal strength indication is greater than preset threshold, wireless access point is set according to verifying network connecting request to intelligence Standby return allows connection response.
(6) when receiving the permission connection response of wireless access point, smart machine connects wireless authentication network.
It wherein, can be according to receiving the corresponding function of wireless authentication network signal in smart machine in above-mentioned steps (1) Rate, to determine the signal strength indication of wireless authentication network, the present embodiment is not especially limited this.In above-mentioned steps (2), intelligence Can equipment to wireless access point send verifying network connecting request and when signal strength indication, can will verifying network connecting request and Signal strength indication is sent to wireless access point simultaneously, can also first send to wireless access point and verify network connecting request, then to Wireless access point strength of transmitted signals value, the present embodiment are not especially limited this.
In above-mentioned steps (5), preset threshold can be configured according to demand, and the present embodiment does not limit this specifically It is fixed.For example, being made as example by percentage of signal strength indication, 100% is good for signal strength, and signal strength indication is strong by drop representation signal Degree gradually weakens.If the signal strength indication of wireless authentication network is 90%, and preset threshold is 80%.Due to wireless authentication network Signal strength indication be greater than preset threshold, thus wireless access point can to smart machine return allow connection response.
In step 303, smart machine sends the first encryption to wireless access point by the wireless authentication network in connection Information.
Wherein, the first encryption information can be a string of characters that smart machine generates at random.Alternatively, the first encryption information is also The first field can be generated by smart machine, be obtained after being encrypted to the first field, the present embodiment is not especially limited this.The One field can be a string of characters that smart machine generates at random, and encryption can be asymmetric to add by the way of asymmetric encryption The close key used can be not especially limited this for the pre-set public key of server side, the present embodiment.For example, can be used RSA Algorithm encrypts the first field.
In step 304, wireless access point receives the first encryption information that smart machine is sent by wireless authentication network.
In step 305, wireless access point encrypts the second local encryption information using the first encryption information, obtains To key information.
Wherein, the second encryption information can be a string of characters that smart machine generates at random.Alternatively, the second encryption information is also The second field can be generated by wireless access point, be obtained after being encrypted to the second field, the present embodiment is not especially limited this. Second field can be a string of characters that wireless access point generates at random, and encryption can be non-right by the way of asymmetric encryption Encrypting the key used can be referred to as the pre-set public key of server side, and the present embodiment is not especially limited this.It needs It is bright, to second in smart machine is used when encrypting to the first field in above-mentioned steps 303 key and this step Key used by field is encrypted may be the same or different, and the present embodiment is not especially limited this.
In addition, symmetric cryptography can be used when encrypting using the first encryption information to the second local encryption information Mode, the present embodiment is not especially limited this.For example, can according to AES (Advanced Encryption Standard, Advanced Encryption Standard) algorithm, the second local encryption information is encrypted using the first encryption information.
In order to further guarantee the safety of ciphering process, wireless access point can incite somebody to action after obtaining the second encryption information First encryption information and the second encryption information are sent to server, by server using the first encryption information to the second encryption information It is encrypted, key information is obtained, and to wireless access point " return " key" information, so that server can receive what server returned Key information, the present embodiment are not especially limited this.
Within step 306, wireless access point encrypts information of network service using the second encryption information, obtains network Service encryption information.
Wherein, information of network service may include the SSID and password of WiFi to be connected, and the present embodiment is not to network service The content of information makees specific limit.Wireless access point, can when being encrypted using the second encryption information to information of network service By the way of symmetric cryptography, the present embodiment is not especially limited this.
In step 307, wireless access point is to smart machine " return " key" information and network service encryption information.
Due to there are malicious user by illegality equipment connect WIFI a possibility that, wireless access point is set to intelligence Before standby " return " key" information and network service encryption information, the facility information of smart machine transmission can also be received, according to setting Standby information, judges whether smart machine is legitimate device, when smart machine is legitimate device, executes close to smart machine return The step of key information and network service encryption information, the present embodiment is not especially limited this.Wherein, facility information includes at least Hardware address and product ID, the present embodiment do not make specific limit to the content of facility information.
The whether legal process of above-mentioned verifying smart machine can also be executed by server, i.e., wireless access point is receiving After the facility information that smart machine is sent, facility information can be sent to server, by server according to facility information, judge intelligence Whether energy equipment is legitimate device.In addition, since wireless access point has a possibility that being forged, wireless access point exists When sending the facility information of smart machine to server, the facility information of itself can also be sent to server together, by taking Business device is verified, and the present embodiment is not especially limited this.For example, by taking a specific routing device product as an example, due to Routing device product may be by mountain vallage, and so as to cause network is connected by the routing device, there are certain risks.Therefore, road From equipment can be sent to server itself facility information and smart machine facility information, to transfer to server to be verified.
Due to being encrypted using the first encryption information to the second encryption information, obtaining key information in above-mentioned 305 Process can be executed by server, and therefore, in conjunction with the content in this step, server can connect in verifying smart machine and wirelessly After the facility information of access point is legal, then returns to wireless access point and the second encryption information is added using the first encryption information The key information obtained after close, the present embodiment are not especially limited this.By the above process, due to being closed in verifying equipment Under the premise of method, key information is returned again to execute the process of subsequent connection WiFi, to improve the safety of network.
For example, smart machine can send (T1) pk, repeater_data to wireless access point.Wherein, T1 is that intelligence is set Standby the first field generated, pk are the key that server provides, and (T1) pk is that first obtained after being encrypted according to key adds Confidential information, repeater_data are the facility information of smart machine.Wireless access point is receiving (T1) pk and repeater_ After data, T2 is produced, and send (T1) pk, repeater_data, (T2) pk and router_data to server.Wherein, T2 is the second field that wireless access point generates, and pk is the key that server provides, and (T2) pk is after being encrypted according to key The second obtained encryption information, router_data are the facility information of wireless access point.
Server receives (T1) pk, repeater_data, (T2) pk and router_data, can first verify Whether repeater_data and router_data is legal, after verifying repeater_data and router_data is legal, (T1) pk and (T2) pk are decrypted, obtain T1 and T2, then T2 is encrypted using T1, obtains (T2) T1, and to wireless Access point returns to (T2) T1.Wireless access point encrypts information of network service after receiving (T2) T1, using T2, obtains Network service encryption information finally returns to (T2) T1 and network service encryption information to smart machine.
In step 308, smart machine receives the key information and network service encryption information that wireless access point returns.
In a step 309, smart machine is decrypted key information according to the first encryption information, obtains the second encryption letter Breath.
Since key information is obtained after being encrypted using the first encryption information to the second encryption information, and Encryption Algorithm For symmetric encipherment algorithm, therefore, smart machine can be decrypted key information according to the first encryption information generated before, with Obtain the second encryption information.
In the step 310, smart machine is decrypted network service encryption information according to the second encryption information, obtains net Network information on services.
Due to network service encryption information be using the second encryption information information of network service is encrypted after obtain, and Encryption Algorithm is symmetric encipherment algorithm, and therefore, smart machine can be according to the second encryption information that above-mentioned steps 309 obtain to network Service encryption information is decrypted, to obtain information of network service.According to information of network service, corresponding WiFi can connect.
The method that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point, The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with It is high.
In addition, due to that can be compared by the signal strength indication for detecting smart machine with preset threshold, with limitation Whether signal strength indication smart machine not up to standard connects wireless authentication network, and can legal by verifying facility information, with It limits illegality equipment and connects wireless authentication network, to create a further reduction a possibility that network is by attack, and improve The safety of network.
Fig. 4 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment, the access point apparatus For executing the acquisition methods of information of network service provided by any embodiment in embodiment corresponding to above-mentioned Fig. 1 or Fig. 3 Function performed by middle wireless access point.Referring to Fig. 4, the access point apparatus include broadcast module 401, the first receiving module 402, First encrypting module 403, the second encrypting module 404 and the first return module 405.
The broadcast module 401 is configured as the network information of the network of broadcast radio verifying within a preset range, so that default Smart machine in range can connect wireless authentication network;
First receiving module 402 is configured as receiving the first encryption letter that smart machine is sent by wireless authentication network Breath;
First encrypting module 403 is configured as adding the second local encryption information using the first encryption information It is close, obtain key information;
Second encrypting module 404 is configured as encrypting information of network service using the second encryption information, obtains Network service encryption information;
First return module 405 is configured as making to smart machine " return " key" information and network service encryption information Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.
In one embodiment, referring to Fig. 5, which further includes the second receiving module 406, obtains module 407 And second return module 408.
Second receiving module 406 is configured as receiving the verifying network connecting request that smart machine is sent, and verifies network Connection request carries the network information;
The acquisition module 407 is configured as obtaining the signal strength indication that smart machine detects wireless authentication network;
Second return module 408 is configured as being connected to the network when signal strength indication is greater than preset threshold according to verifying Request, returning to smart machine allows connection response, so that smart machine connects wireless authentication net according to connection response is allowed Network.
In one embodiment, referring to Fig. 6, which further includes third receiving module 409, judgment module 410 And execution module 411.
The third receiving module 409 is configured as receiving the facility information that smart machine is sent, and facility information includes at least Hardware address and product ID;
The judgment module 410 is configured as judging whether smart machine is legitimate device according to facility information;
The execution module 411 is configured as executing and believing to smart machine " return " key" when smart machine is legitimate device The step of breath and network service encryption information.
The access point apparatus that the embodiment of the present disclosure provides, the sent by receiving smart machine by wireless authentication network One encryption information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, makes Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.Due to intelligence Energy equipment can first pass through wireless authentication network and send encryption information to wireless access point, and wireless access point can be sent out according to smart machine The encryption information sent encrypts information of network service, and returns to network service encryption information, so that smart machine can be to net Network service encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
Fig. 7 is a kind of structural schematic diagram of smart machine shown according to an exemplary embodiment, which is used for Execute in embodiment corresponding to above-mentioned Fig. 2 or Fig. 3 intelligence in the acquisition methods of information of network service provided by any embodiment Function performed by energy equipment.Referring to Fig. 7, the smart machine include link block 701, sending module 702, receiving module 703, First deciphering module 704 and the second deciphering module 705.
Link block 701 is configured as the network information according to the wireless authentication network received, connects wireless authentication net The network information of network, wireless authentication network is broadcasted within a preset range by wireless access point;
Sending module 702 is configured as through the wireless authentication network in connection, sends the first encryption to wireless access point Information, so that wireless access point is according to the first encryption information, " return " key" information and network service encryption information, key information It is obtained after being encrypted using the second encryption information of first encryption information to wireless access point local, network service encryption information It is obtained after being encrypted for the second encryption information of use to the information of network service of wireless access point;
Receiving module 703 is configured as receiving the key information and network service encryption information that wireless access point returns;
First deciphering module 704 is configured as that key information is decrypted according to the first encryption information, obtains second and adds Confidential information;
Second deciphering module 705 is configured as that network service encryption information is decrypted according to the second encryption information, obtains To information of network service.
In one embodiment, link block 701 are configured as the signal strength indication of detection wireless authentication network;Xiang Wu Line access point sends verifying network connecting request and signal strength indication, and verifying network connecting request carries the network information, so that nothing When line access point determines that signal strength indication is greater than preset threshold, returning allows connection response;When receive wireless access point permit Perhaps when connection response, wireless authentication network is connected.
The smart machine that the embodiment of the present disclosure provides, the wireless authentication net provided within a preset range by wireless access point Network sends the first encryption information to wireless access point, receives the key information that wireless access point is returned according to the first encryption information And network service encryption information, network service encryption information is decrypted according to the first encryption information and key information, is obtained Information of network service.Encryption information is sent to wireless access point since smart machine can first pass through wireless authentication network, is wirelessly connect Access point can encrypt information of network service according to the encryption information that smart machine is sent, and return to network service encryption letter Breath, so that network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the peace of network Full property is higher.
About the equipment in above-described embodiment, wherein modules execute the concrete mode of operation in related this method Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 8 is a kind of block diagram for wireless access point 800 shown according to an exemplary embodiment.For example, this is wireless Access point 800 may be provided as a server or routing device.Referring to Fig. 8, wireless access point 800 includes processing component 822, it further comprise one or more processors, and the memory resource as representated by memory 832, it can for storing By the instruction of the execution of processing component 822, such as application program.The application program stored in memory 832 may include one Or it is more than one each correspond to one group of instruction module.In addition, processing component 822 is configured as executing instruction, to hold It is wireless in the acquisition methods of information of network service provided by any embodiment in embodiment corresponding to the above-mentioned Fig. 1 or Fig. 3 of row Function performed by access point.
Wireless access point 800 can also include that a power supply module 826 is configured as executing the power supply of wireless access point 800 Management, a wired or wireless network interface 850 is configured as wireless access point 800 being connected to network and an input is defeated (I/O) interface 858 out.Wireless access point 800 can be operated based on the operating system for being stored in memory 832, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The wireless access point that the embodiment of the present disclosure provides, the sent by receiving smart machine by wireless authentication network One encryption information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, makes Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.Due to intelligence Energy equipment can first pass through wireless authentication network and send encryption information to wireless access point, and wireless access point can be sent out according to smart machine The encryption information sent encrypts information of network service, and returns to network service encryption information, so that smart machine can be to net Network service encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
Fig. 9 is a kind of block diagram of terminal 900 shown according to an exemplary embodiment.For example, terminal 900 can be movement Phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment, Personal digital assistant etc..
Referring to Fig. 9, terminal 900 may include following one or more components: processing component 902, memory 904, power supply Component 906, multimedia component 909, audio component 910, the interface 912 of input/output (I/O), sensor module 914, and Communication component 916.
The integrated operation of the usual controlling terminal 900 of processing component 902, such as with display, telephone call, data communication, phase Machine operation and record operate associated operation.Processing element 902 may include that one or more processors 920 refer to execute It enables, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more modules, just Interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, it is more to facilitate Interaction between media component 909 and processing component 902.
Memory 904 is configured as storing various types of data to support the operation in terminal 900.These data are shown Example includes the instruction of any application or method for operating in terminal 900, contact data, and telephone book data disappears Breath, picture, video etc..Memory 904 can be by any kind of volatibility or non-volatile memory device or their group It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash Device, disk or CD.
Electric power assembly 906 provides electric power for the various assemblies of terminal 900.Electric power assembly 906 may include power management system System, one or more power supplys and other with for terminal 900 generate, manage, and distribute the associated component of electric power.
Multimedia component 909 includes the screen of one output interface of offer between the terminal 900 and user.One In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers Body component 909 includes a front camera and/or rear camera.When terminal 900 is in operation mode, such as screening-mode or When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike Wind (MIC), when terminal 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched It is set to reception external audio signal.The received audio signal can be further stored in memory 904 or via communication set Part 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.
I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock Determine button.
Sensor module 914 includes one or more sensors, and the state for providing various aspects for terminal 900 is commented Estimate.For example, sensor module 914 can detecte the state that opens/closes of terminal 900, and the relative positioning of component, for example, it is described Component is the display and keypad of terminal 900, and sensor module 914 can also detect 900 1 components of terminal 900 or terminal Position change, the existence or non-existence that user contacts with terminal 900,900 orientation of terminal or acceleration/deceleration and terminal 900 Temperature change.Sensor module 914 may include proximity sensor, be configured to detect without any physical contact Presence of nearby objects.Sensor module 914 can also include optical sensor, such as CMOS or ccd image sensor, at As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between terminal 900 and other equipment.Terminal 900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation In example, communication component 916 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel. In one exemplary embodiment, the communication component 916 further includes near-field communication (NFC) module, to promote short range communication.Example Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology, Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 900 can be believed by one or more application specific integrated circuit (ASIC), number Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing corresponding to above-mentioned Fig. 2 or Fig. 3 Embodiment in information of network service provided by any embodiment acquisition methods in function performed by smart machine.
The terminal that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point, The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with It is high.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 920 of terminal 900 to complete the above method.For example, The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of terminal When row, the acquisition methods for executing a kind of information of network service are enabled the terminal to, this method comprises:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter Breath.
The computer readable storage medium that the embodiment of the present disclosure provides, is provided within a preset range by wireless access point Wireless authentication network sends the first encryption information to wireless access point, receives wireless access point and is returned according to the first encryption information Key information and network service encryption information, network service encryption information is carried out according to the first encryption information and key information Decryption, obtains information of network service.Encryption letter is sent to wireless access point since smart machine can first pass through wireless authentication network Breath, wireless access point can encrypt information of network service according to the encryption information that smart machine is sent, and return to network clothes Business encryption information, so that network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, The safety of network is higher.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.

Claims (8)

1. a kind of acquisition methods of information of network service, which is characterized in that be applied to wireless access point, which comprises
The network information of the network of broadcast radio verifying within a preset range, enables the smart machine in the preset range to connect Connect the wireless authentication network;
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the network letter Breath;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, returned to the smart machine Returning allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
Return to the key information and the network service encryption information to the smart machine so that the smart machine according to First encryption information, the key information and the network service encryption information, obtain the information of network service.
2. the method according to claim 1, wherein it is described to the smart machine return the key information and Before the network service encryption information, further includes:
The facility information that the smart machine is sent is received, the facility information includes at least hardware address and product ID;
According to the facility information, judge whether the smart machine is legitimate device;
When the smart machine is legitimate device, executes to the smart machine and return to the key information and network clothes The step of encryption information of being engaged in.
3. a kind of acquisition methods of information of network service, which is characterized in that be applied to smart machine, which comprises
According to the network information of the wireless authentication network received, wireless authentication network, the net of the wireless authentication network are connected Network information is broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that described wirelessly connect Access point is according to first encryption information, " return " key" information and network service encryption information, and the key information is using institute It states after the first encryption information encrypts the second encryption information of the wireless access point local and obtains, the network service adds Confidential information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the information of network service;
Wherein, the network information for the wireless authentication network that the basis receives connects wireless authentication network, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connecting request are sent to the wireless access point The network information is carried, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returning allows Connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
4. a kind of access point apparatus, which is characterized in that described access point equipment includes:
Broadcast module, for the network information of the verifying network of broadcast radio within a preset range, so that in the preset range Smart machine can connect the wireless authentication network;
Second receiving module, the verifying network connecting request sent for receiving the smart machine, the verifying network connection Request carries the network information;
Module is obtained, the signal strength indication of the wireless authentication network is detected for obtaining the smart machine;
Second return module, for when the signal strength indication is greater than preset threshold, according to the verifying network connecting request, Returning to the smart machine allows connection response, so that the smart machine is according to the permission connection response, described in connection Wireless authentication network;
First receiving module, the first encryption information sent for receiving the smart machine by the wireless authentication network;
First encrypting module is obtained close for being encrypted using first encryption information to the second local encryption information Key information;
Second encrypting module obtains network service for encrypting using second encryption information to information of network service Encryption information;
First return module makes for returning to the key information and the network service encryption information to the smart machine The smart machine is obtained according to first encryption information, the key information and the network service encryption information, obtains institute State information of network service.
5. access point apparatus according to claim 4, which is characterized in that described access point equipment further include:
Third receiving module, the facility information sent for receiving the smart machine, the facility information include at least hardware Address and product ID;
Judgment module, for judging whether the smart machine is legitimate device according to the facility information;
Execution module returns to the key letter for when the smart machine is legitimate device, executing to the smart machine The step of breath and the network service encryption information.
6. a kind of smart machine, which is characterized in that the smart machine includes:
Link block connects wireless authentication network for the network information according to the wireless authentication network received, described wireless The network information of verifying network is broadcasted within a preset range by wireless access point;
Sending module, for sending the first encryption information to the wireless access point, making by the wireless authentication network in connection The wireless access point is obtained according to first encryption information, " return " key" information and network service encryption information, the key Information is to obtain after being encrypted using first encryption information to the second encryption information of the wireless access point local, institute Stating network service encryption information is after being encrypted using information of network service of second encryption information to the wireless access point It obtains;
Receiving module, for receiving the key information and the network service encryption information that the wireless access point returns;
First deciphering module obtains described second for the key information to be decrypted according to first encryption information Encryption information;
Second deciphering module is obtained for the network service encryption information to be decrypted according to second encryption information The information of network service;
Wherein, the link block, for detecting the signal strength indication of the wireless authentication network;It is sent out to the wireless access point Verifying network connecting request and the signal strength indication are sent, the verifying network connecting request carries the network information, so that When the wireless access point determines that the signal strength indication is greater than preset threshold, returning allows connection response;It is described when receiving When the permission connection response of wireless access point, the wireless authentication network is connected.
7. a kind of access point apparatus characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The network information of the network of broadcast radio verifying within a preset range, enables the smart machine in the preset range to connect Connect the wireless authentication network;
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the network letter Breath;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, returned to the smart machine Returning allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
Return to the key information and the network service encryption information to the smart machine so that the smart machine according to First encryption information, the key information and the network service encryption information, obtain the information of network service.
8. a kind of smart machine characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
According to the network information of the wireless authentication network received, wireless authentication network, the net of the wireless authentication network are connected Network information is broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that described wirelessly connect Access point is according to first encryption information, " return " key" information and network service encryption information, and the key information is using institute It states after the first encryption information encrypts the second encryption information of the wireless access point local and obtains, the network service adds Confidential information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the information of network service;
Wherein, the network information for the wireless authentication network that the basis receives connects wireless authentication network, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connecting request are sent to the wireless access point The network information is carried, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returning allows Connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
CN201510243278.6A 2015-05-13 2015-05-13 The acquisition methods and equipment of information of network service Active CN104980919B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510243278.6A CN104980919B (en) 2015-05-13 2015-05-13 The acquisition methods and equipment of information of network service

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510243278.6A CN104980919B (en) 2015-05-13 2015-05-13 The acquisition methods and equipment of information of network service

Publications (2)

Publication Number Publication Date
CN104980919A CN104980919A (en) 2015-10-14
CN104980919B true CN104980919B (en) 2019-02-12

Family

ID=54276893

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510243278.6A Active CN104980919B (en) 2015-05-13 2015-05-13 The acquisition methods and equipment of information of network service

Country Status (1)

Country Link
CN (1) CN104980919B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105282158A (en) * 2015-10-28 2016-01-27 小米科技有限责任公司 Intelligent equipment networking method, routing equipment, intelligent equipment and system
CN107094294B (en) * 2016-02-18 2020-06-02 腾讯科技(深圳)有限公司 Network connection method and device
CN107864476A (en) * 2017-11-08 2018-03-30 上海创功通讯技术有限公司 The access authentication method and terminal of a kind of wireless network
CN108966233B (en) * 2018-09-20 2021-11-09 四川警盛科技有限公司 Network access control method and device
CN112601218B (en) * 2020-12-31 2022-12-02 青岛海尔科技有限公司 Wireless network configuration method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006080623A1 (en) * 2004-09-22 2006-08-03 Samsung Electronics Co., Ltd. Method and apparatus for managing communication security in wireless network
CN103929748A (en) * 2014-04-30 2014-07-16 普联技术有限公司 Internet of things wireless terminal, configuration method thereof and wireless network access point
CN104010352A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method and device for connecting router with intelligent device
CN104244245A (en) * 2014-09-12 2014-12-24 普联技术有限公司 Wireless access authentication method, wireless router device and wireless terminal
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101677269B (en) * 2008-09-17 2012-01-25 比亚迪股份有限公司 Method and system for transmitting keys

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2006080623A1 (en) * 2004-09-22 2006-08-03 Samsung Electronics Co., Ltd. Method and apparatus for managing communication security in wireless network
CN104427501A (en) * 2013-09-11 2015-03-18 腾讯科技(深圳)有限公司 Network access method, device and system
CN103929748A (en) * 2014-04-30 2014-07-16 普联技术有限公司 Internet of things wireless terminal, configuration method thereof and wireless network access point
CN104010352A (en) * 2014-05-19 2014-08-27 百度在线网络技术(北京)有限公司 Method and device for connecting router with intelligent device
CN104244245A (en) * 2014-09-12 2014-12-24 普联技术有限公司 Wireless access authentication method, wireless router device and wireless terminal

Also Published As

Publication number Publication date
CN104980919A (en) 2015-10-14

Similar Documents

Publication Publication Date Title
CN104852911B (en) Safe verification method, apparatus and system
CN110611905A (en) Information sharing method, terminal device, storage medium, and computer program product
KR101502249B1 (en) Device communication
CN105357262B (en) Apparatus control method and device
CN105744595B (en) Access method, apparatus, system and the storage medium of WLAN
CN104955031A (en) Information transmission method and device
CN104980919B (en) The acquisition methods and equipment of information of network service
US9571475B2 (en) Call encryption systems and methods
CN105282158A (en) Intelligent equipment networking method, routing equipment, intelligent equipment and system
CN104869612A (en) Method and device for accessing network
CN106060098B (en) Processing method, processing unit and the processing system of identifying code
KR102507113B1 (en) Method, Appratus and System of Monitoring Supporting for Encrypted Communication Session
CN106453052A (en) Message interaction method and apparatus thereof
CN104852800B (en) Data transmission method and device
CN109039860A (en) Send and show method and device, the identity authentication method and device of message
CN109246110A (en) data sharing method and device
CN112182624A (en) Encryption method, encryption device, storage medium and electronic equipment
CN108702288B (en) Data transmission method, equipment and system
CN105120452B (en) Transmit the method, apparatus and system of information
CN106534083B (en) Brush machine Tool validation method and device
CN105376399B (en) For controlling the method and device of smart machine
CN108712384B (en) Terminal authentication method and device, terminal and server
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN105812339A (en) Encryption and decryption method and device
CN109104361A (en) Instant communicating method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant