CN106686527B - WIFI information identification method and terminal - Google Patents

WIFI information identification method and terminal Download PDF

Info

Publication number
CN106686527B
CN106686527B CN201611188227.9A CN201611188227A CN106686527B CN 106686527 B CN106686527 B CN 106686527B CN 201611188227 A CN201611188227 A CN 201611188227A CN 106686527 B CN106686527 B CN 106686527B
Authority
CN
China
Prior art keywords
wifi
wifi information
information
target
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611188227.9A
Other languages
Chinese (zh)
Other versions
CN106686527A (en
Inventor
区小东
陈就标
王爽
徐森圣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201611188227.9A priority Critical patent/CN106686527B/en
Publication of CN106686527A publication Critical patent/CN106686527A/en
Application granted granted Critical
Publication of CN106686527B publication Critical patent/CN106686527B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses a WIFI information identification method and a terminal, wherein the method comprises the following steps: after the application is run, triggering WIFI information identification according to first operation acquired on an application interface to obtain at least one piece of first WIFI information; analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information; obtaining a first key according to the first identification information and the second identification information; encrypting the first secret key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of WIFI information; acquiring at least one second WIFI information to be identified and the encryption result; and decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, and identifying the at least one second WIFI information to be identified as target WIFI information.

Description

WIFI information identification method and terminal
Technical Field
The invention relates to an information identification technology, in particular to a WIFI information identification method and a terminal.
Background
The information acquisition increasingly depends on the internet, and users can obtain various required information through resources on the internet. Firstly, networking is needed, namely, the local terminal can be communicated with the server at the background through a data network (2G/3G/4G) or WiFi network and the like, and then information interaction is carried out between the local terminal and the server at the background. WiFi networks are the primary choice for user networking because information transmission is more convenient and stable than data networks. At present, when identifying free WiFi, applications identified through the free WiFi installed on a local terminal need to be disconnected from a network, the applications are interacted with a server (such as an application server) corresponding to the applications, the local terminal scans nearby WiFi through the applications, and uploads the nearby WiFi to the server for identification, then, the server sends a corresponding connection password to the applications, a terminal side displays the hit WiFi into the free WiFi through the applications, and the free WiFi is provided for a user to select networking. In the related art, there is no effective solution to this problem.
Disclosure of Invention
In view of this, embodiments of the present invention provide a WIFI information identification method and a terminal, which at least solve the problems in the prior art.
The technical scheme of the embodiment of the invention is realized as follows:
the WIFI information identification method of the embodiment of the invention comprises the following steps:
after the application is run, triggering WIFI information identification according to first operation acquired on an application interface to obtain at least one piece of first WIFI information;
analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information;
obtaining a first key according to the first identification information and the second identification information;
encrypting the first secret key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of WIFI information;
acquiring at least one second WIFI information to be identified and the encryption result;
decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identifying the at least one second WIFI information to be identified as target WIFI information, and displaying the target WIFI information in the application interface;
and carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
In the foregoing solution, the at least one second WIFI information to be identified is a subset of the at least one first WIFI information, or is the same as the at least one first WIFI information.
In the above scheme, encrypting the first key according to an encryption policy to obtain an encryption result includes:
and encrypting the first target parameter corresponding to the first key according to the first key to obtain the encryption result, wherein the encryption result is used for login authentication of the WIFI information.
In the above scheme, encrypting the first key according to an encryption policy to obtain an encryption result includes:
encrypting a first target parameter corresponding to the first key according to the first key to obtain an encrypted target parameter;
converting the encrypted target parameters, taking the obtained conversion result as the encryption result,
and the encryption result is used for login authentication of the WIFI information.
In the above scheme, the method further comprises:
the first key and the first target parameter are both at least one;
setting each first key to be: the key pair uniquely corresponds to a first target parameter, and a matching relation pair is formed by the first key and the first target parameter;
the number of the matching relation pairs is at least one, and the length of each matching relation pair is different.
A terminal according to an embodiment of the present invention includes:
the triggering unit is used for triggering WIFI information identification according to first operation acquired on an application interface after an application is run to obtain at least one piece of first WIFI information;
the analysis unit is used for analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information;
the key processing unit is used for obtaining a first key according to the first identification information and the second identification information;
the encryption unit is used for encrypting the first secret key according to an encryption strategy to obtain an encryption result, and the encryption result is used for login authentication of WIFI information;
the acquisition unit is used for acquiring at least one second WIFI information to be identified and the encryption result;
the decryption unit is used for decrypting the encrypted result according to a decryption strategy corresponding to the encryption strategy, so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identify the at least one second WIFI information to be identified as target WIFI information, and display the target WIFI information in the application interface;
and the networking unit is used for carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
In the foregoing solution, the at least one second WIFI information to be identified is a subset of the at least one first WIFI information, or is the same as the at least one first WIFI information.
In the foregoing scheme, the encryption unit is further configured to:
and encrypting the first target parameter corresponding to the first key according to the first key to obtain the encryption result, wherein the encryption result is used for login authentication of the WIFI information.
In the foregoing scheme, the encryption unit is further configured to:
encrypting a first target parameter corresponding to the first key according to the first key to obtain an encrypted target parameter;
converting the encrypted target parameters, taking the obtained conversion result as the encryption result,
and the encryption result is used for login authentication of the WIFI information.
In the foregoing solution, the terminal further includes: a correspondence setting unit configured to:
the first key and the first target parameter are both at least one;
setting each first key to be: the key pair uniquely corresponds to a first target parameter, and a matching relation pair is formed by the first key and the first target parameter;
the number of the matching relation pairs is at least one, and the length of each matching relation pair is different.
The WIFI information identification method of the embodiment of the invention comprises the following steps: after the application is run, triggering WIFI information identification according to first operation acquired on an application interface to obtain at least one piece of first WIFI information; analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information; obtaining a first key according to the first identification information and the second identification information; encrypting the first secret key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of WIFI information; acquiring at least one second WIFI information to be identified and the encryption result; decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identifying the at least one second WIFI information to be identified as target WIFI information, and displaying the target WIFI information in the application interface; and carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
By adopting the embodiment of the invention, the terminal can locally obtain the first key according to the first identification information and the second identification information related to the first WIFI information, and encrypt the first key according to the encryption strategy to obtain the encryption result, wherein the encryption result is used for login authentication of the WIFI information. The method comprises the following steps of obtaining second WIFI information to be identified and an encryption result, locally and directly decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy at the terminal, carrying out login authentication and decryption on the second WIFI information to be identified, identifying the second WIFI information to be identified as target WIFI information, displaying the target WIFI information in an application interface for a user to select and then carrying out WIFI networking, and therefore, free WiFi can be locally identified at the terminal without networking. When the network state is not good or the user cannot be networked currently, the WIFI information can be identified.
Drawings
Fig. 1 is a schematic diagram of an alternative hardware architecture of a mobile terminal implementing various embodiments of the present invention;
FIG. 2 is a schematic diagram of a communication system of the mobile terminal shown in FIG. 1;
FIG. 3 is a diagram of hardware entities performing information interaction according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart illustrating a method according to an embodiment of the present invention;
fig. 5 is a UI display interface diagram of target WIFI information obtained by applying the embodiment of the present invention;
FIG. 6 is a diagram of a system architecture according to an embodiment of the present invention;
FIG. 7 is a flowchart illustrating a scenario in which the present invention is applied;
FIG. 8 is a schematic diagram of Key-value comparison in FIG. 7.
Detailed Description
The following describes the embodiments in further detail with reference to the accompanying drawings.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the description of the embodiments of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
In the following detailed description, numerous specific details are set forth in order to provide a thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without these specific details. In other instances, well-known methods, procedures, components, circuits, and networks disclosed have not been described in detail as not to unnecessarily obscure aspects of the embodiments.
In addition, although the terms "first", "second", etc. are used herein several times to describe various elements (or various thresholds or various applications or various instructions or various operations), etc., these elements (or thresholds or applications or instructions or operations) should not be limited by these terms. These terms are only used to distinguish one element (or threshold or application or instruction or operation) from another element (or threshold or application or instruction or operation). For example, a first operation may be referred to as a second operation, and a second operation may be referred to as a first operation, without departing from the scope of the invention, the first operation and the second operation being operations, except that they are not the same operation.
The steps in the embodiment of the present invention are not necessarily processed according to the described step sequence, and may be optionally rearranged in a random manner, or steps in the embodiment may be deleted, or steps in the embodiment may be added according to requirements.
The term "and/or" in embodiments of the present invention refers to any and all possible combinations including one or more of the associated listed items. It is also to be noted that: when used in this specification, the term "comprises/comprising" specifies the presence of stated features, integers, steps, operations, elements and/or components but does not preclude the presence or addition of one or more other features, integers, steps, operations, elements and/or components and/or groups thereof.
The intelligent terminal (e.g., mobile terminal) of the embodiments of the present invention may be implemented in various forms. For example, the mobile terminal described in the embodiments of the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a Digital broadcast receiver, a Personal Digital Assistant (PDA), a tablet computer (PAD), a Portable Multimedia Player (PMP), a navigation device, and the like, and a fixed terminal such as a Digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic diagram of an alternative hardware structure of a mobile terminal implementing various embodiments of the present invention.
The mobile terminal 100 may include a communication unit 110, an audio/video (a/V) input unit 120, a user input unit 130, a triggering unit 140, a parsing unit 141, a key processing unit 142, an encryption unit 143, an acquisition unit 144, a decryption unit 145, a networking unit 146, an output unit 150, a storage unit 160, an interface unit 170, a processing unit 180, a power supply unit 190, and the like. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network (or may be in electrical communication by wire if the mobile terminal is replaced with a fixed terminal). For example, when the communication unit is embodied as a wireless communication unit, it may include at least one of the broadcast receiving unit 111, the mobile communication unit 112, the wireless internet unit 113, the short-range communication unit 114, and the location information unit 115, which are optional and may be added or deleted according to different requirements.
The broadcast receiving unit 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication unit 112. The broadcast signal may exist in various forms, for example, it may exist in the form of an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), an Electronic Service Guide (ESG) of Digital Video Broadcasting Handheld (DVB-H), and the like. The broadcast receiving unit 111 can receive signal broadcasts by using various types of broadcast systems. In particular, the broadcast receiving unit 111 may receive Digital broadcasts by using a Digital Broadcasting system such as a Digital Multimedia Broadcasting-Terrestrial (DMB-T), a Digital Multimedia Broadcasting-Satellite (DMB-S), DVB-H, a data Broadcasting system of a Forward Link Media (Media Forward Link Only), an Integrated Services Digital Broadcasting-Terrestrial (ISDB-T), and the like. The broadcast receiving unit 111 may be configured to be suitable for various broadcast systems that provide broadcast signals as well as the above-described digital broadcast system. The broadcast signal and/or the broadcast-related information received via the broadcast receiving unit 111 may be stored in the storage unit 160 (or other type of storage medium).
The mobile communication unit 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet unit 113 supports wireless internet access of the mobile terminal. The unit may be internally or externally coupled to the terminal. The Wireless internet Access technology related to the unit may include Wireless Local Area network (Wi-Fi, WLAN), Wireless broadband (Wibro), worldwide interoperability for microwave Access (Wimax), High Speed Downlink Packet Access (HSDPA), and the like.
The short-range communication unit 114 is a unit for supporting short-range communication. Some examples of short-range communication technologies include bluetooth, Radio Frequency Identification (RFID), infrared data Association (IrDA), Ultra Wideband (UWB), zigbee, and the like.
The location information unit 115 is a unit for checking or acquiring location information of the mobile terminal. A typical example of the location information unit is a Global Positioning System (GPS). According to the current technology, the location information unit 115 calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. Further, the position information unit 115 can calculate the speed information by continuously calculating the current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 122, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the cameras 121 may be stored in the storage unit 160 (or other storage medium) or transmitted via the communication unit 110, and two or more cameras 121 may be provided according to the construction of the mobile terminal. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication unit 112 in case of the phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, a mouse, a touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), a wheel, a joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The triggering unit 140 is configured to trigger WIFI information identification according to a first operation acquired on an application interface after an application is run, so as to obtain at least one piece of first WIFI information; an analyzing unit 141, configured to analyze the at least one piece of first WIFI information to obtain first identification information and second identification information; a key processing unit 142, configured to obtain a first key according to the first identification information and the second identification information; the encryption unit 143 is configured to encrypt the first key according to an encryption policy to obtain an encryption result, where the encryption result is used for login authentication of WIFI information; an obtaining unit 144, configured to obtain at least one second WIFI information to be identified and the encryption result; the decryption unit 145 is configured to decrypt the encrypted result according to a decryption policy corresponding to the encryption policy, so as to perform login authentication and decryption on the at least one to-be-identified second WIFI information, identify the at least one to-be-identified second WIFI information as target WIFI information, and display the target WIFI information in the application interface; and a networking unit 146, configured to perform WIFI networking according to the second operation acting on the target WIFI information.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification unit, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification unit may store various information for authenticating a User using the mobile terminal 100 and may include a User identification Unit (UIM), a Subscriber identification unit (SIM), a Universal Subscriber identification Unit (USIM), and the like. In addition, a device having an identification unit (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output unit 152, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, the mobile terminal 100 may display a related User Interface (UI) or a Graphical User Interface (GUI). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The Display unit 151 may include at least one of a Liquid Crystal Display (LCD), a Thin Film Transistor LCD (TFT-LCD), an Organic Light-Emitting Diode (OLED) Display, a flexible Display, a three-dimensional (3D) Display, and the like. Some of these displays may be configured to be transparent to allow a user to see from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a Transparent Organic Light Emitting Diode (TOLED) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output unit 152 may convert audio data received by the communication unit 110 or stored in the storage unit 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output unit 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 152 may include a speaker, a buzzer, and the like.
The storage unit 160 may store software programs or the like for processing and controlling operations performed by the processing unit 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, and the like) that has been output or is to be output. Also, the storage unit 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The storage unit 160 may include at least one type of storage medium including a flash Memory, a hard disk, a multimedia card, a card-type Memory (e.g., SD or DX Memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic Memory, a magnetic disk, an optical disk, etc. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the storage unit 160 through a network connection.
The processing unit 180 generally controls the overall operation of the mobile terminal. For example, the processing unit 180 performs control and processing related to voice calls, data communications, video calls, and the like. As another example, the processing unit 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate the elements and components under the control of the processing unit 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, and an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the Processing unit 180. For a software implementation, the implementation such as a procedure or a function may be implemented with separate software units allowing to perform at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory unit 160 and executed by the processing unit 180. A specific hardware entity of the storage unit 160 may be a memory, and a specific hardware entity of the processing unit 180 may be a controller.
Up to now, the mobile terminal has been described in terms of its functions. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to an embodiment of the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication System includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global System for Mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of Mobile terminals 100, a plurality of Base Stations (BSs) 270, a Base Station Controller (BSC) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the BS270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 275.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz, 5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each partition of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT) 295 transmits a Broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving unit 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several satellites 300 are shown, for example, GPS satellites 300 may be employed. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The location information unit 115 as shown in fig. 1 is generally configured to cooperate with the satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station is processed within a particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC275 provides call resource allocation and mobility management functions including coordination of soft handoff procedures between the BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC280 interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
The mobile communication unit 112 of the communication unit 110 in the mobile terminal accesses the mobile communication network based on the necessary data (including the user identification information and the authentication information) of the mobile communication network (such as the mobile communication network of 2G/3G/4G, etc.) built in the mobile terminal to transmit the mobile communication data (including the uplink mobile communication data and the downlink mobile communication data) for the services of web browsing, network multimedia playing, etc. of the mobile terminal user.
The wireless internet unit 113 of the communication unit 110 performs a function of a wireless hotspot by operating a related protocol function of the wireless hotspot, the wireless hotspot supports access by a plurality of mobile terminals (any mobile terminal other than the mobile terminal), transmits mobile communication data (including uplink mobile communication data and downlink mobile communication data) for mobile terminal user's web browsing, network multimedia playing and other services by multiplexing the mobile communication connection between the mobile communication unit 112 and the mobile communication network, since the mobile terminal essentially multiplexes the mobile communication connection between the mobile terminal and the communication network for transmitting mobile communication data, the traffic of mobile communication data consumed by the mobile terminal is charged to the communication tariff of the mobile terminal by a charging entity on the side of the communication network, thereby consuming the data traffic of the mobile communication data included in the communication tariff contracted for use by the mobile terminal.
Fig. 3 is a schematic diagram of hardware entities performing information interaction in the embodiment of the present invention, where fig. 3 includes: a terminal device 1 and a server 2. The terminal device 1 is composed of terminal devices 11-14, and the terminal devices perform information interaction with a server through a wired network or a wireless network. The terminal equipment comprises mobile phones, desktop computers, PC machines, all-in-one machines and the like. By adopting the embodiment of the invention, after the terminal locally runs an application (such as an application for WIFI identification or a management application integrated with a WIFI identification function) and the WIFI information identification is triggered according to the first operation acquired on the application interface to obtain at least one piece of first WIFI information, which can be understood as all WIFI information searched by the terminal from nearby. After a key (such as a WIFI key) for WIFI information login authentication is obtained according to identification information (such as first identification information and second identification information) related to the first WIFI information, the obtained second WIFI information to be identified (the second WIFI information is a subset or all of the first WIFI information) is decrypted according to the key (such as the WIFI key), namely login authentication is broken, and the at least one second WIFI information to be identified is identified as target WIFI information. Specifically, as shown in fig. 3, the processing logic 10 of the terminal device includes: s1, triggering WIFI information identification according to the first operation acquired on the application interface to acquire at least one piece of first WIFI information; s2, analyzing the at least one piece of first WIFI information to obtain identification information formed by first identification information and second identification information related to the first WIFI information, and obtaining a first secret key according to the identification information; s3, encrypting the first key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of WIFI information; s4, decrypting the encrypted result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, and identifying the at least one second WIFI information to be identified as target WIFI information; and S5, displaying the target WIFI information in the application interface, and performing WIFI networking processing according to a second operation acting on the target WIFI information. In the embodiment of the invention, the server only provides WIFI information to the terminal, all identification processing logics are irrelevant to the server, and a mode that the connection can be successfully carried out only by a password or authentication login is originally required is identified into a mode that the connection can be successfully carried out directly without the password or the authentication login through a local WIFI information identification mechanism of the terminal.
The above example of fig. 3 is only an example of a system architecture for implementing the embodiment of the present invention, and the embodiment of the present invention is not limited to the system architecture described in the above fig. 3, and various embodiments of the method of the present invention are proposed based on the system architecture described in the above fig. 3.
As shown in fig. 4, a WIFI information identification method according to an embodiment of the present invention includes: after the application is run, WIFI information identification is triggered according to a first operation acquired on an application interface, and at least one piece of first WIFI information (101) is acquired. The at least one first WIFI information here may be understood as all WIFI information that can be searched from nearby, including that the WIFI signal quality is good and the WIFI signal quality is poor. In an actual application, if the application is an application for WIFI identification or a management application integrated with a WIFI identification function, after WIFI information identification is triggered, all nearby searched WIFI information is scanned to obtain at least one piece of first WIFI information used for generating a subsequent first secret key. And analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information (102). Here, the first identification information may be an SSID, and the second identification information may be a BSSID. SSID is an abbreviation of Service Set Identifier, referring to Service Set Identifier. The SSID technology can divide a wireless local area network into several sub-networks requiring different authentication, each sub-network requires independent authentication, and only users who pass authentication can enter the corresponding sub-network, so as to prevent unauthorized users from entering the network, for example, the CMCC is an SSID of china mobile. The BSSID is the Media Access Control (MAC) address of the router. And obtaining a first key (103) according to the first identification information and the second identification information. And when the first identification information is SSID and the second identification information is BSSID, obtaining Key according to the SSID and the BSSID, and taking the Key as a first Key. And encrypting the first secret key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of WIFI information (104). In an actual application, after a known parameter value corresponding to a first Key is obtained through local inquiry of a terminal, the Key is used for encrypting the value, the encrypted value is used as a WIFI password, and the WIFI password is used for login authentication of WIFI information. Certainly, for many security considerations such as security, decompilation prevention, and the like, the encrypted Value may be further subjected to security enhancement, for example, the encrypted Value may be further subjected to encryption processing, that is, the encrypted Value is converted into a password for WiFi connection through an algorithm, and is encrypted by XXTea to obtain a final WiFi password. At least one second WIFI information to be identified and the encryption result are obtained (105). Here, the second WIFI information is a subset or all of the first WIFI information. And decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identifying the at least one second WIFI information to be identified as target WIFI information, and displaying the target WIFI information in the application interface (106). Decrypting the obtained second WIFI information to be identified (the second WIFI information is a subset or all of the first WIFI information), and when the encryption strategy is as follows: after a known parameter value corresponding to a first Key is obtained through local inquiry of a terminal, the Key is used for encrypting the value, the encrypted value is used as a WIFI password, and the WIFI password is used for login authentication of WIFI information. The corresponding decryption policy is: the received encryption result is an encryption value, the encryption value is used as a WIFI password, in order to identify second WIFI information to be identified, which needs the password, as target WIFI information (free WIFI which does not need the password or does not need authentication login), the WIFI password is used for login authentication of the WIFI information, so that the encryption value used as the WIFI password is decrypted by using a Key corresponding to the value, login authentication cracking of the second WIFI information to be identified is realized, and the terminal user can use the WIFI information without the password or authentication login. And performing WIFI networking processing (107) according to a second operation acting on the target WIFI information.
By adopting the embodiment of the invention, networking is not needed, and the networking is necessary in the prior art; locally identifying whether the searched nearby WIFI is free WIFI or not at the terminal, and displaying the free WIFI for a user to select; in the prior art, the identification is carried out at a server and is only transmitted to a terminal side for display. Therefore, the embodiment of the invention does not need to network to request a background server when identifying the free WiFi, breaks through the limitation that the original identification of the free WiFi must depend on a data network (2G/3G/4G) or a WiFi network, thereby realizing the local identification of the free WiFi at the terminal without networking, and identifying the original mode that the connection can be successful only by needing a password or requiring authentication login into a mode that the connection can be successful directly without the password or requiring authentication login. The application scenarios of the embodiment of the invention comprise: and the free WiFi is identified in the state without the network, so that the user can select connection, and smooth switching from no network to the network is really realized. Except for the case of no network state, the method further comprises the following steps: under the scenes of 'weak network', even 'without sim card' and 'without data network', the free WiFi can be accessed to the Internet.
In one practical application, the operation of the user is received on an application for WIFI identification or a management application integrated with a WIFI identification function, a local "identification process" of the application is triggered to initiate identification, and the scanned nearby WIFI (SSID + BSSID) is transmitted to a local algorithm library. The local algorithm library converts the SSID and BSSID of the WiFi into a Key Value through an algorithm, transmits the Key Value into a local database, finds out the Value corresponding to the Key Value according to different matching rules (the Key and the Value are in one-to-one correspondence), encrypts the Value to obtain the encrypted Value and puts the encrypted Value into the local algorithm library. The local algorithm library converts the encrypted Value into a password for WiFi connection through an algorithm, further can be encrypted through XXTea and output to an 'identification process', and then the 'identification process' displays the WiFi as free WiFi according to the returned WiFi and the corresponding password; if no password is returned, no free WiFi is displayed. Identifying free WIFI at the terminal side, the method can be understood as storing encrypted authentication information locally, so that the WIFI can be decrypted locally by using the authentication information, namely, a WIFI password is broken, and the user side sees that: and entering the application, triggering and identifying, and directly presenting a free WIFI list for the user to select the target free WIFI with high WIFI quality from the free WIFI list. As shown in fig. 5, a schematic view of a user interface for finally obtaining free WIFI information is shown, in the user interface, a star-level reminder, one star, two stars, three stars, four stars, five stars, and the like, is provided behind a high-quality target free WIFI. The larger the number is, the higher the star level is, which indicates that the quality of the network signal provided by the corresponding target free WIFI is better.
The WIFI information identification method of the embodiment of the invention comprises the following steps: after the application is run, WIFI information identification is triggered according to a first operation acquired on the application interface, and at least one piece of first WIFI information is acquired. The at least one first WIFI information here may be understood as all WIFI information that can be searched from nearby, including that the WIFI signal quality is good and the WIFI signal quality is poor. In an actual application, if the application is an application for WIFI identification or a management application integrated with a WIFI identification function, after WIFI information identification is triggered, all nearby searched WIFI information is scanned to obtain at least one piece of first WIFI information used for generating a subsequent first secret key. And analyzing the at least one piece of first WIFI information to obtain first identification information and second identification information. Here, the first identification information may be an SSID, and the second identification information may be a BSSID. SSID is an abbreviation of Service Set Identifier, referring to Service Set Identifier. The SSID technology can divide a wireless local area network into several sub-networks requiring different authentication, each sub-network requires independent authentication, and only users who pass authentication can enter the corresponding sub-network, so as to prevent unauthorized users from entering the network, for example, the CMCC is an SSID of china mobile. The BSSID is the Media Access Control (MAC) address of the router. And obtaining a first key according to the first identification information and the second identification information. And when the first identification information is SSID and the second identification information is BSSID, obtaining Key according to the SSID and the BSSID, and taking the Key as a first Key.
And then, encrypting the first secret key according to an encryption strategy to obtain an encryption result, wherein the encryption result is used for login authentication of the WIFI information. Specifically, there are two implementation schemes: 1) and encrypting the first target parameter corresponding to the first key according to the first key to obtain the encrypted target parameter, converting the encrypted target parameter, and taking the obtained conversion result as the encryption result, wherein the encryption result is used for login authentication of the WIFI information. 2) And encrypting the first target parameter corresponding to the first key according to the first key to obtain the encryption result, wherein the encryption result is used for login authentication of the WIFI information. For the two specific implementation modes, in an actual application, after a known parameter value corresponding to the first Key is obtained through local inquiry from a terminal, the value is encrypted by using the Key, and the encrypted value is used as a WIFI password which is used for login authentication of WIFI information. Certainly, for many security considerations such as security, decompilation prevention, and the like, the encrypted Value may be further subjected to security enhancement, for example, the encrypted Value may be further subjected to encryption processing, that is, the encrypted Value is converted into a password for WiFi connection through an algorithm, and is encrypted by XXTea to obtain a final WiFi password. And acquiring at least one second WIFI information to be identified and the encryption result. Here, the second WIFI information is a subset or all of the first WIFI information. And decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identifying the at least one second WIFI information to be identified as target WIFI information, and displaying the target WIFI information in the application interface. Decrypting the obtained second WIFI information to be identified (the second WIFI information is a subset or all of the first WIFI information), and when the encryption strategy is as follows: after a known parameter value corresponding to a first Key is obtained through local inquiry of a terminal, the Key is used for encrypting the value, the encrypted value is used as a WIFI password, and the WIFI password is used for login authentication of WIFI information. The corresponding decryption policy is: the received encryption result is an encryption value, the encryption value is used as a WIFI password, in order to identify second WIFI information to be identified, which needs the password, as target WIFI information (free WIFI which does not need the password or does not need authentication login), the WIFI password is used for login authentication of the WIFI information, so that the encryption value used as the WIFI password is decrypted by using a Key corresponding to the value, login authentication cracking of the second WIFI information to be identified is realized, and the terminal user can use the WIFI information without the password or authentication login. And carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
By adopting the embodiment of the invention, networking is not needed, and the networking is necessary in the prior art; locally identifying whether the searched nearby WIFI is free WIFI or not at the terminal, and displaying the free WIFI for a user to select; in the prior art, the identification is carried out at a server and is only transmitted to a terminal side for display. Therefore, the embodiment of the invention does not need to network to request a background server when identifying the free WiFi, breaks through the limitation that the original identification of the free WiFi must depend on a data network (2G/3G/4G) or a WiFi network, thereby realizing the local identification of the free WiFi at the terminal without networking, and identifying the original mode that the connection can be successful only by needing a password or requiring authentication login into a mode that the connection can be successful directly without the password or requiring authentication login. The application scenarios of the embodiment of the invention comprise: and the free WiFi is identified in the state without the network, so that the user can select connection, and smooth switching from no network to the network is really realized. Except for the case of no network state, the method further comprises the following steps: under the scenes of 'weak network', even 'without sim card' and 'without data network', the free WiFi can be accessed to the Internet.
In one practical application, the operation of the user is received on an application for WIFI identification or a management application integrated with a WIFI identification function, a local "identification process" of the application is triggered to initiate identification, and the scanned nearby WIFI (SSID + BSSID) is transmitted to a local algorithm library. Here, the local database is obtained in the following manner: the local algorithm library is resident locally, and the local algorithm libraries of different applications are the same. The local database is different according to the geographic location of the user of the application, for example, the "free WiFi local database" of the user in beijing city is only free WiFi in beijing city. Therefore, the space size of the local database is reduced, and the occupation of the mobile phone space of the user is reduced. The local database can be packaged together with the installation package when the installation package of the application is generated, or dynamically issues updates according to different geographic positions on the cloud server. And after the SSID and BSSID of the WiFi are converted into a Key Value through an algorithm in the local algorithm library, the Key Value is transmitted into the local database, the Value corresponding to the Key Value is found out by the local database according to different matching rules (Key and Value are in one-to-one correspondence), and the Value is encrypted to obtain encrypted Value and put into the local algorithm library. The local algorithm library converts the encrypted Value into a password for WiFi connection through an algorithm, further can be encrypted through XXTea and output to an 'identification process', and then the 'identification process' displays the WiFi as free WiFi according to the returned WiFi and the corresponding password; if no password is returned, no free WiFi is displayed. Identifying free WIFI at the terminal side, the method can be understood as storing encrypted authentication information locally, so that the WIFI can be decrypted locally by using the authentication information, namely, a WIFI password is broken, and the user side sees that: and entering the application, triggering and identifying, and directly presenting a free WIFI list for the user to select the target free WIFI with high WIFI quality from the free WIFI list. As shown in fig. 5, a schematic view of a user interface for finally obtaining free WIFI information is shown, in the user interface, a star-level reminder, one star, two stars, three stars, four stars, five stars, and the like, is provided behind a high-quality target free WIFI. The larger the number is, the higher the star level is, which indicates that the quality of the network signal provided by the corresponding target free WIFI is better.
Based on the foregoing embodiments, in the WIFI information identification method according to the embodiments of the present invention, the first key and the first target parameter are both at least one. Each first key may be set to: the first key and the first target parameter form a matching relationship pair, the matching relationship pair is at least one, and the length of each matching relationship pair is different. Specifically, different Key values correspond to different Value values, for example, Key1 corresponds to Value1, Key2 corresponds to Value2, and the like. Meanwhile, the lengths of the corresponding relations of different 'Key-Value' are different. Therefore, the risk that the local database is cracked by the 'explosion database' can be greatly reduced through single matching and different relation lengths, and decompiling and decompilation can be realized.
As shown in fig. 6, the WIFI information identification system of the embodiment of the present invention includes a terminal 41 and a server 42. The server 42 only provides a data source of WIFI information, all identification processing logics are irrelevant to the server, and the terminal 41 identifies a mode that the connection can be successfully completed originally by requiring a password or requiring authentication login through a local WIFI information identification mechanism of the terminal, as a mode that the connection can be successfully completed directly without requiring a password or requiring authentication login. As for the terminal 41, it includes: the triggering unit 411 is configured to trigger WIFI information identification according to a first operation acquired on an application interface after an application is run, so as to obtain at least one piece of first WIFI information; an analyzing unit 412, configured to analyze the at least one piece of first WIFI information to obtain first identification information and second identification information; a key processing unit 413, configured to obtain a first key according to the first identification information and the second identification information; an encrypting unit 414, configured to encrypt the first key according to an encryption policy to obtain an encryption result, where the encryption result is used for login authentication of WIFI information; an obtaining unit 415, configured to obtain at least one second WIFI information to be identified and the encryption result; a decryption unit 416, configured to decrypt the encrypted result according to a decryption policy corresponding to the encryption policy, so as to perform login authentication decryption on the at least one to-be-identified second WIFI information, identify the at least one to-be-identified second WIFI information as target WIFI information, and display the target WIFI information in the application interface; a networking unit 417, configured to perform WIFI networking according to a second operation acting on the target WIFI information.
By adopting the embodiment of the invention, networking is not needed, and the networking is necessary in the prior art; locally identifying whether the searched nearby WIFI is free WIFI or not at the terminal, and displaying the free WIFI for a user to select; in the prior art, the identification is carried out at a server and is only transmitted to a terminal side for display. Therefore, the embodiment of the invention does not need to network to request a background server when identifying the free WiFi, breaks through the limitation that the original identification of the free WiFi must depend on a data network (2G/3G/4G) or a WiFi network, thereby realizing the local identification of the free WiFi at the terminal without networking, and identifying the original mode that the connection can be successful only by needing a password or requiring authentication login into a mode that the connection can be successful directly without the password or requiring authentication login. The application scenarios of the embodiment of the invention comprise: and the free WiFi is identified in the state without the network, so that the user can select connection, and smooth switching from no network to the network is really realized. Except for the case of no network state, the method further comprises the following steps: under the scenes of 'weak network', even 'without sim card' and 'without data network', the free WiFi can be accessed to the Internet.
In one practical application, the operation of the user is received on an application for WIFI identification or a management application integrated with a WIFI identification function, a local "identification process" of the application is triggered to initiate identification, and the scanned nearby WIFI (SSID + BSSID) is transmitted to a local algorithm library. The local algorithm library converts the SSID and BSSID of the WiFi into a Key Value through an algorithm, transmits the Key Value into a local database, finds out the Value corresponding to the Key Value according to different matching rules (the Key and the Value are in one-to-one correspondence), encrypts the Value to obtain the encrypted Value and puts the encrypted Value into the local algorithm library. The local algorithm library converts the encrypted Value into a password for WiFi connection through an algorithm, further can be encrypted through XXTea and output to an 'identification process', and then the 'identification process' displays the WiFi as free WiFi according to the returned WiFi and the corresponding password; if no password is returned, no free WiFi is displayed. Identifying free WIFI at the terminal side, the method can be understood as storing encrypted authentication information locally, so that the WIFI can be decrypted locally by using the authentication information, namely, a WIFI password is broken, and the user side sees that: and entering the application, triggering and identifying, and directly presenting a free WIFI list for the user to select the target free WIFI with high WIFI quality from the free WIFI list. As shown in fig. 5, a schematic view of a user interface for finally obtaining free WIFI information is shown, in the user interface, a star-level reminder, one star, two stars, three stars, four stars, five stars, and the like, is provided behind a high-quality target free WIFI. The larger the number is, the higher the star level is, which indicates that the quality of the network signal provided by the corresponding target free WIFI is better.
In an implementation manner of the embodiment of the present invention, the at least one second WIFI information to be identified is a subset of the at least one first WIFI information, or is the same as the at least one first WIFI information.
In an implementation manner of the embodiment of the present invention, the encryption unit is further configured to: and encrypting the first target parameter corresponding to the first key according to the first key to obtain the encryption result, wherein the encryption result is used for login authentication of the WIFI information.
In an implementation manner of the embodiment of the present invention, the encryption unit is further configured to: encrypting a first target parameter corresponding to the first key according to the first key to obtain an encrypted target parameter; and converting the encrypted target parameters, and taking an obtained conversion result as the encryption result, wherein the encryption result is used for login authentication of WIFI information.
In an implementation manner of the embodiment of the present invention, the terminal further includes: a correspondence setting unit configured to: the first key and the first target parameter are both at least one; setting each first key to be: the key pair uniquely corresponds to a first target parameter, and a matching relation pair is formed by the first key and the first target parameter; the number of the matching relation pairs is at least one, and the length of each matching relation pair is different.
For the processor for data Processing, when executing Processing, the processor can be implemented by a microprocessor, a Central Processing Unit (CPU), a DSP or an FPGA; for the storage medium, the storage medium contains operation instructions, which may be computer executable codes, and the operation instructions implement the steps in the flow of the information processing method according to the above-described embodiment of the present invention.
Here, it should be noted that: the above description related to the terminal and the server items is similar to the above description of the method, and the description of the beneficial effects of the same method is omitted for brevity. For technical details not disclosed in the embodiments of the terminal and the server of the present invention, please refer to the description of the embodiments of the method flow of the present invention.
The embodiment of the invention is explained by taking a practical application scene as an example as follows:
in an application scenario, for a scheme for identifying free WIFI, in the prior art, when identifying free WIFI, the application needs to be networked with a background server corresponding to the application, and uploads nearby WIFI scanned by a local application client to the background server for identification, and then sends down whether the WIFI is free WIFI and a corresponding connection password to the local application client, and the local application client displays the hit WIFI as free WIFI. Free WIFI is WIFI that can be freely connected provided through an application. In the application scene, the prior art is adopted, so that the WIFI information identification cannot be realized when the network state is not good or under the condition that a user cannot be networked currently.
For the application scenario, the embodiment of the invention is adopted, in brief, when other free WiFi is identified, a networking request background server is not needed any more, and the limitation that the original identification of the free WiFi must depend on a data network (2G/3G/4G) or a WiFi network is broken through, so that the identification of the free WiFi can be realized locally at a client. For the management application integrating the WIFI identification function, the scheme of this embodiment is applied to the management application, and when entering the management application to perform the identification operation, the free WIFI can be identified without networking, as shown in fig. 5. After the free WiFi is identified, the free WiFi in the column of 'safe free Internet surfing' can be clicked for connection.
For the application scenario, as shown in fig. 7, a specific process adopting the embodiment of the present invention includes:
step 301, according to the operation of the user, initiating identification in an "identification process" local to the application client at the terminal side, and transmitting the scanned nearby WiFi (ssid + bssid) into a "local algorithm library". Here, the "local algorithm library" is resident locally, and the "local algorithm libraries" of different application clients are all the same. The local database is different according to the geographic location of the user of the application client, for example, the free WiFi local database of the user in beijing city is only free WiFi in beijing city.
Step 302, the "local algorithm library" transforms the ssid and bssid of WiFi into a KEY value through algorithm, and transmits it to the "local database".
Step 303, finding out the value corresponding to the key value by the local database according to different matching rules, wherein the key and the value are in one-to-one correspondence, encrypting the output value and storing the encrypted value in the local algorithm database.
Step 304, the encrypted Value is converted into a password for WiFi connection through an algorithm by the local algorithm library, and the password is encrypted through XXTea and output to the identification process.
Step 305, displaying the returned WiFi and the corresponding password in the identification process as free WiFi according to the returned WiFi and the corresponding password; if no password is returned, no free WiFi is displayed.
In step 303, the "local database" retrieves different value values according to different Key value matches, as shown in fig. 8. Different Key values correspond to different values, e.g., Key1 corresponds to value1, Key2 corresponds to value2, etc. Meanwhile, the lengths of the corresponding relations of different Key-values are different, and the risk that the local database is cracked by the explosion database can be greatly reduced through single matching and different relation lengths.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments; and the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
Alternatively, the integrated unit of the present invention may be stored in a computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or a part contributing to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a removable storage device, a ROM, a RAM, a magnetic or optical disk, or various other media that can store program code.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (9)

1. A WIFI information identification method is characterized by comprising the following steps:
when the application runs and networking cannot be performed, triggering WIFI information identification according to first operation acquired on an application interface to obtain at least one piece of first WIFI information;
analyzing the at least one piece of first WIFI information to obtain a Service Set Identifier (SSID) and a media access control address (BSSID) of the router, and transmitting the SSID and the BSSID into a local algorithm library;
the local algorithm library converts the SSID and the BSSID to obtain a first secret key, and transmits the first secret key into a local database; the local database is different according to the geographic position of the user of the application, and is packaged together with the installation package when the installation package of the application is generated;
the local database searches a first target parameter corresponding to the first key according to a matching relation formed by the first key and the first target parameter; the matching relationship is single matching, and the lengths of matching relationship pairs formed by different keys and corresponding target parameters are different;
the local database encrypts the corresponding first target parameter according to the first key to obtain an encrypted target parameter, and transmits the encrypted target parameter into the local algorithm library;
the local algorithm library converts the encrypted target parameters, and an obtained conversion result is used as an encryption result which is used for login authentication of WIFI information;
acquiring at least one second WIFI information to be identified and acquiring the encryption result from the local algorithm library;
decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identifying the at least one second WIFI information to be identified as target WIFI information, performing descending order according to the network signal quality corresponding to the target WIFI information, and displaying the ordered target WIFI information in the application interface;
and carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
2. The method of claim 1, wherein the at least one second WIFI information to be identified is a subset of the at least one first WIFI information or is the same as the at least one first WIFI information.
3. The method of claim 1, further comprising:
and dynamically issuing and updating the local database by the cloud server according to different geographic positions of the user.
4. The method of claim 1, wherein displaying the ranked target WIFI information in the application interface comprises:
in the application interface, star-level reminding is carried out behind high-quality target WIFI information; the higher the star level is, the better the network signal quality provided by the corresponding target WIFI can be.
5. A terminal, characterized in that the terminal comprises:
the triggering unit is used for triggering WIFI information identification according to first operation acquired at an application interface when the application is operated and networking is impossible, and obtaining at least one piece of first WIFI information;
the analysis unit is used for analyzing the at least one piece of first WIFI information to obtain a Service Set Identifier (SSID) and a media access control address (BSSID) of the router, and transmitting the SSID and the BSSID into a local algorithm library;
the key processing unit is used for converting the SSID and the BSSID by the local algorithm library to obtain a first key and transmitting the first key into a local database; the local database is different according to the geographic position of the user of the application, and is packaged together with the installation package when the installation package of the application is generated;
the corresponding relation setting unit is used for searching a first target parameter corresponding to the first key by the local database according to a matching relation pair formed by the first key and the first target parameter; the matching relationship is single matching, and the lengths of matching relationship pairs formed by different keys and corresponding target parameters are different;
the encryption unit is used for encrypting the corresponding first target parameter by the local database according to the first key to obtain an encrypted target parameter and transmitting the encrypted target parameter into the local algorithm library; the local algorithm library converts the encrypted target parameters, and an obtained conversion result is used as an encryption result which is used for login authentication of WIFI information;
the acquisition unit is used for acquiring at least one piece of second WIFI information to be identified and acquiring the encryption result from the local algorithm library;
the decryption unit is used for decrypting the encryption result according to a decryption strategy corresponding to the encryption strategy, so as to perform login authentication and decryption on the at least one second WIFI information to be identified, identify the at least one second WIFI information to be identified as target WIFI information, perform descending order according to the network signal quality corresponding to the target WIFI information, and display the ordered target WIFI information in the application interface;
and the networking unit is used for carrying out WIFI networking processing according to a second operation acting on the target WIFI information.
6. The terminal of claim 5, wherein the at least one second WIFI information to be identified is a subset of the at least one first WIFI information or is the same as the at least one first WIFI information.
7. The terminal according to claim 5, further comprising an updating unit, configured to dynamically issue, by the cloud server, an update to the local database according to different geographic locations of the user.
8. The terminal of claim 5, wherein the decryption unit is further configured to:
in the application interface, star-level reminding is carried out behind high-quality target WIFI information; the higher the star level is, the better the network signal quality provided by the corresponding target WIFI can be.
9. A storage medium on which a computer program is stored, which computer program, when being executed by a processor, carries out the method according to any one of claims 1 to 4.
CN201611188227.9A 2016-12-20 2016-12-20 WIFI information identification method and terminal Active CN106686527B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611188227.9A CN106686527B (en) 2016-12-20 2016-12-20 WIFI information identification method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611188227.9A CN106686527B (en) 2016-12-20 2016-12-20 WIFI information identification method and terminal

Publications (2)

Publication Number Publication Date
CN106686527A CN106686527A (en) 2017-05-17
CN106686527B true CN106686527B (en) 2020-03-17

Family

ID=58869941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611188227.9A Active CN106686527B (en) 2016-12-20 2016-12-20 WIFI information identification method and terminal

Country Status (1)

Country Link
CN (1) CN106686527B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241727A (en) 2017-07-28 2017-10-10 上海连尚网络科技有限公司 Method and apparatus for obtaining WAP information
CN111866993B (en) * 2020-07-13 2021-12-14 腾讯科技(深圳)有限公司 Wireless local area network connection management method, device, software program and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253801A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 Method, device and system for realizing login authentication
CN105916103A (en) * 2016-07-07 2016-08-31 腾讯科技(深圳)有限公司 WLAN (Wireless Local Area Network) connecting method and device

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8555047B2 (en) * 2011-03-16 2013-10-08 Rammohan Malasani Wi-Fi router with integrated touch-screen and enhanced security features
US20150223059A1 (en) * 2013-03-01 2015-08-06 Intel Corporation Techniques for establishing access to a local wireless network
CN104735663A (en) * 2013-12-18 2015-06-24 韩燕� WIFI access authentication terminal
CN104735659A (en) * 2013-12-18 2015-06-24 韩燕� WIFI access authentication method and terminal
WO2015147034A1 (en) * 2014-03-28 2015-10-01 株式会社クボタ Access point device for work machine, communication system for work machine, and work machine
CN104796897A (en) * 2015-05-08 2015-07-22 李兴松 WIFI authentication mechanism and algorithm based on handheld device APP
CN104981000B (en) * 2015-07-20 2018-06-08 陕西师范大学 A kind of stealthy Wi-Fi hotspot automatic accessing device and method
CN105142135B (en) * 2015-08-18 2018-10-02 四川长虹电器股份有限公司 Based on the method for connecting the networking of agreement rapid configuration smart machine soon
CN105517102A (en) * 2015-11-20 2016-04-20 青岛海信移动通信技术股份有限公司 Method, device and equipment for enabling wireless network equipment to be connected with hot spot
CN105392133A (en) * 2015-11-26 2016-03-09 北京奇虎科技有限公司 Method and system for wireless function device to automatically access to wireless access point
CN105873184A (en) * 2016-03-28 2016-08-17 乐视控股(北京)有限公司 Network connection method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104253801A (en) * 2013-06-28 2014-12-31 中国电信股份有限公司 Method, device and system for realizing login authentication
CN105916103A (en) * 2016-07-07 2016-08-31 腾讯科技(深圳)有限公司 WLAN (Wireless Local Area Network) connecting method and device

Also Published As

Publication number Publication date
CN106686527A (en) 2017-05-17

Similar Documents

Publication Publication Date Title
CN106817671B (en) Networking information sharing method, first terminal and system
CN104902463B (en) Mobile terminal, multi-card management method of virtual card terminal of mobile terminal and server
US9208293B1 (en) Authentication for tag-based content delivery
WO2018045962A1 (en) Method, terminal, server, and system for location-based information early warning
CN106413128B (en) Projection method and mobile terminal
US20070192841A1 (en) Mutual authentication apparatus and method
CN108093019B (en) Member information refreshing method and terminal
CN108234556B (en) Item information reminding method, terminal and server
CN105681326A (en) Multilink data transmission device and method
CN106055199B (en) A kind of information synchronization method and electronic equipment
CN106778123B (en) Mobile terminal and hardware equipment authority management method thereof
KR20160125427A (en) Priority access to a priority access channel
CN106101137B (en) Information processing apparatus and information verification method
CN106332030B (en) A kind of communication means and device based on virtual card
WO2017113961A1 (en) Data encryption apparatus and method, and storage medium
CN104935577B (en) Authentication method, smart card cloud, the cloud APP, apparatus and system
CN105282155B (en) Authority control method, device and system for interaction between terminals
CN106686527B (en) WIFI information identification method and terminal
CN107070981B (en) Multi-terminal equipment cooperative control system and method
CN105991293A (en) Verification method and verification device
CN107194243B (en) Mobile terminal and method for installing application program
WO2016015643A1 (en) Call encryption method, communication terminal, base station and computer storage medium
CN106992857B (en) Machine-swiping verification method and device
CN106453915B (en) A kind of information processing method and mobile terminal
CN106228043B (en) Application icon hidden method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant