CN108616886B - Method and equipment for generating wireless access point topological network - Google Patents

Method and equipment for generating wireless access point topological network Download PDF

Info

Publication number
CN108616886B
CN108616886B CN201611154971.7A CN201611154971A CN108616886B CN 108616886 B CN108616886 B CN 108616886B CN 201611154971 A CN201611154971 A CN 201611154971A CN 108616886 B CN108616886 B CN 108616886B
Authority
CN
China
Prior art keywords
wireless access
access point
access points
target wireless
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611154971.7A
Other languages
Chinese (zh)
Other versions
CN108616886A (en
Inventor
万玉权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Zhangmen Science and Technology Co Ltd
Original Assignee
Shanghai Zhangmen Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Zhangmen Science and Technology Co Ltd filed Critical Shanghai Zhangmen Science and Technology Co Ltd
Priority to CN201611154971.7A priority Critical patent/CN108616886B/en
Publication of CN108616886A publication Critical patent/CN108616886A/en
Application granted granted Critical
Publication of CN108616886B publication Critical patent/CN108616886B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The method comprises the steps that a target wireless access point is determined by user equipment according to a wireless access point connected with the user, and the target wireless access point and peripheral wireless access points corresponding to the target wireless access point are sent to network equipment; the network equipment acquires a target wireless access point and a peripheral wireless access point corresponding to the target wireless access point, and establishes a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points so as to realize risk judgment based on the wireless topological network, thereby realizing more accurate positioning of the wireless access points with risks and protecting personal privacy safety when a user uses the wireless access points.

Description

Method and equipment for generating wireless access point topological network
Technical Field
The present application relates to the field of computers, and in particular, to a method and an apparatus for generating a wireless access point topology network.
Background
With the development of communication technologies and user equipment (e.g., smart phones and tablet computers), the uplink and downlink data rates supported by wireless networks are increased by times, and now more and more applications are applied to data services. Wireless access point (Wifi hotspot) sharing is also increasingly sought by people as a function that can share a personal private network to others for use. At present, the relation between wireless hotspots is not drawn into a topological graph similar to a map based on hotspot sharing operation of a user, and a wireless access point coordinate map is drawn based on the topological graph.
Content of application
An object of the present application is to provide a method and an apparatus for generating a wireless access point topological network, which draw a wireless access point topological network diagram including interrelations between wireless access points, and perform access point risk judgment by using the wireless access point topological network diagram.
According to an aspect of the present application, there is provided a method for generating a wireless access point topology network at a network device, the method comprising:
acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
and establishing a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points.
Further, after the target wireless access point and the corresponding peripheral wireless access points are obtained, the method includes:
one or more wireless access points are selected from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point.
Further, the preset rule includes:
determining the evaluation value of each peripheral wireless access point based on any one or a combination of several of the signal intensity of each peripheral wireless access point, the distance between each peripheral wireless access point and the target wireless access point, the connection success rate and the network speed;
and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral access points with the evaluation value larger than or equal to the preset screening evaluation value as the auxiliary wireless access points of the target wireless access point.
Further, establishing a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points, comprising:
and judging whether the auxiliary wireless access points of the target wireless access points have an intersection relation or not, and if so, determining a wireless access point topological network according to the intersection relation.
Further, determining whether an intersection relationship exists between the auxiliary wireless access points of the plurality of target wireless access points includes:
if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points.
Further, determining whether an intersection relationship exists between the auxiliary wireless access points of the plurality of target wireless access points includes:
and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points.
Further, after the target wireless access point and the corresponding peripheral wireless access points are obtained, the method further includes:
and if the wireless access points of the same or similar identification information sent by a plurality of user equipment are acquired simultaneously, determining the target wireless access point according to a judgment rule.
Further, the determination rule includes at least any one of:
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point;
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point;
and if the wireless access points of the same or similar identification information sent by the plurality of user equipment are acquired simultaneously, and the wireless access point sent by each user equipment is determined, selecting one wireless access point from the plurality of wireless access points as the target wireless access point.
Further, selecting one wireless access point from a plurality of wireless access points as the target wireless access point comprises:
and determining the target wireless access point according to the received signal strength of each wireless access point.
Further, selecting one wireless access point from a plurality of wireless access points as the target wireless access point comprises:
determining whether there is a secondary wireless access point of the same or similar identification information between the plurality of wireless access points,
and if the identification information exists, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points corresponding to each wireless access point and having the same or similar identification information.
Further, after establishing a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points, the method includes:
acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point;
determining a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point;
and determining whether the target wireless access point is at risk by comparing the identification information of the target wireless access point with the identification information of the peripheral wireless access points of the reference wireless access point.
Further, after the topology network between the plurality of target wireless access points is established based on the peripheral wireless access points of the target wireless access points, the method further includes:
and determining the actual geographic position of the target wireless access point through the geographic position and the received signal strength when one or more user devices transmit the target wireless access point.
Further, after determining the actual geographic location of the target wireless access point according to the geographic location and the received signal strength of the one or more user equipments when transmitting the target wireless access point, the method further includes:
and feeding back the actual geographic position of the target wireless access point to the user equipment based on a connection request of the wireless access point sent by the user equipment.
Further, the connection request of the wireless access point includes a connection request of the target wireless access point or a connection request of a peripheral wireless access point of the target wireless access point.
According to another aspect of the present application, there is provided a method for generating a wireless access point topology network at a user equipment, the method comprising:
determining a target wireless access point according to the wireless access point connected with the user;
and sending the target wireless access point and the corresponding peripheral wireless access points to network equipment.
According to yet another aspect of the present application, there is provided a method of generating a wireless access point topology network, the method including:
the user equipment determines a target wireless access point according to the wireless access point connected with the user;
the user equipment sends the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the network equipment acquires a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
the network device establishes a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points.
According to another aspect of the present application, there is also provided a network device for generating a wireless access point topology network, the network device including:
the acquisition device is used for acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
and generating means for establishing a topological network among the plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points.
Further, the network device includes:
the selection device is used for selecting one or more wireless access points from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point.
Further, the preset rule includes:
determining the evaluation value of each peripheral wireless access point based on any one or a combination of several of the signal intensity of each peripheral wireless access point, the distance between each peripheral wireless access point and the target wireless access point, the connection success rate and the network speed;
and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral access points with the evaluation value larger than or equal to the preset screening evaluation value as the auxiliary wireless access points of the target wireless access point.
Further, the generating means is configured to:
and judging whether the auxiliary wireless access points of the target wireless access points have an intersection relation or not, and if so, determining a wireless access point topological network according to the intersection relation.
Further, the generating means is configured to:
if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points.
Further, the generating means is configured to:
and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points.
Further, the network device further includes:
and the determining device is used for determining the target wireless access point according to the judgment rule if the wireless access points of the same or similar identification information sent by the user equipment are simultaneously obtained.
Further, the determination rule includes at least any one of:
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point;
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point;
and if the wireless access point sent by each user equipment is determined through the sharing operation of the wireless access points which simultaneously acquire the same or similar identification information sent by the plurality of user equipment, selecting one wireless access point from the plurality of wireless access points as the target wireless access point.
Further, the determining means is configured to:
and determining the target wireless access point according to the received signal strength of each wireless access point.
Further, the determining means is configured to:
determining whether there is a secondary wireless access point of the same or similar identification information between the plurality of wireless access points,
and if the identification information exists, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points corresponding to each wireless access point and having the same or similar identification information.
Further, the network device further includes:
the device comprises an acquisition request device, a processing device and a processing device, wherein the acquisition request device is used for acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point;
the searching device is used for determining a reference wireless access point with the same or similar identification information in the wireless access point topological network based on the identification information of the target wireless access point;
the comparison device is used for comparing the identification information of the target wireless access point with the identification information of the peripheral wireless access points of the reference wireless access point so as to determine whether the target wireless access point has risks or not;
further, the network device further includes:
and the positioning device is used for determining the actual geographic position of the target wireless access point through the geographic position and the received signal strength when one or more user devices transmit the target wireless access point.
Further, the network device further includes:
and the feedback device is used for feeding back the actual geographic position of the target wireless access point to the user equipment based on the connection request of the wireless access point sent by the user equipment.
Further, the connection request of the wireless access point includes a connection request of the target wireless access point or a connection request of a peripheral wireless access point of the target wireless access point.
According to another aspect of the present application, there is also provided a user equipment for generating a wireless access point topology network, the user equipment comprising:
the connecting device is used for determining a target wireless access point according to the wireless access point connected by the user;
and the sending device is used for sending the target wireless access point and the corresponding peripheral wireless access points to the network equipment.
According to another aspect of the present application, there is also provided a system for generating a wireless access point topology network, wherein the system includes: the network equipment comprises a connecting device and a sending device, the network equipment comprises an acquiring device and a generating device,
the connecting device is used for determining a target wireless access point according to the wireless access point connected by the user;
the transmitting device is used for transmitting the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the acquisition device is used for acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
the generating device is used for establishing a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points.
Compared with the prior art, the method and the device have the advantages that the target wireless access point is determined by the user equipment according to the wireless access point connected with the user, and the target wireless access point and the corresponding peripheral wireless access points are sent to the network equipment; the method comprises the following steps that network equipment acquires a target wireless access point and peripheral wireless access points corresponding to the target wireless access point, and establishes a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points so as to realize risk judgment based on a wireless topological network, wherein the specific judgment process comprises the following steps: acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point; determining a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point; whether the target wireless access point has risks or not is determined by comparing the identification information of the target wireless access point with the identification information of the peripheral wireless access points of the reference wireless access point, so that the wireless access point with risks can be more accurately positioned, and the personal privacy safety of a user when the user uses the wireless access point is protected.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 illustrates a flow diagram of a method of generating a wireless access point topology network in accordance with an aspect of the subject application;
fig. 2 is a schematic flowchart illustrating a method for performing a risk judgment of a wireless access point based on a wireless access point topology network according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a method for determining coordinates of a target wireless access point in a preferred embodiment of the present application;
FIG. 4 illustrates a schematic diagram of an apparatus for generating a wireless access point topology network according to yet another aspect of the present application;
fig. 5 shows a schematic structural diagram of an apparatus for generating a wireless access point topology network according to a preferred embodiment of another aspect of the present application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
Fig. 1 illustrates a flowchart of a method for generating a wireless access point topology network at a network device according to an aspect of the present application; the method comprises the following steps: step S1 and step S2, wherein in step S1, a target wireless access point and its corresponding peripheral wireless access points are obtained; in step S2, a topological network is established among the plurality of target wireless access points based on the neighboring wireless access points of the target wireless access points.
Specifically, in step S1, a target wireless access point and its corresponding peripheral wireless access points are obtained; in the embodiment of the application, a target wireless access point is determined according to the wireless access point sent by the user equipment, and the information of the peripheral wireless access points of the target wireless access point is obtained; here, when a user performs a sharing operation of a wireless access point through a user device, such as sharing a wireless access point name, a password, etc. of a certain wireless access point to a cloud, the wireless access point is a target wireless access point, and the cloud obtains the wireless access point name, the password, etc. of the target wireless access point and also obtains peripheral wireless access point information of the target wireless access point, where the peripheral wireless access point information of the target wireless access point is some wireless access points obtained by scanning a geographic location of the user device when the user device currently shares the wireless access point, and the peripheral wireless access point information includes a wireless access point name (SSID), a BSSID or a MAC address, a Received Signal Strength (RSSI), a geographic location, and base station information, so as to compare with peripheral wireless access point information of other target wireless access points according to the obtained peripheral wireless access point information, and determining whether an intersection relation exists, and drawing a wireless access point topological network graph by using the intersection relation.
Specifically, in step S2, a topological network is established among a plurality of target wireless access points based on neighboring wireless access points of the target wireless access points. Here, a wireless access point topology network is determined according to an intersection relationship between peripheral wireless access point information of a plurality of target wireless access points, wherein the wireless access point topology network includes the target wireless access point information and corresponding peripheral wireless access point information. In one embodiment, the peripheral wireless access points of one target wireless access point A are a, B, c and d, the peripheral wireless access points of another target wireless access point B are a, B, e and f, determining as wireless access points a and B according to the intersection between the respective peripheral wireless access points of the target wireless access points a and B, connecting a target wireless access point A and a target wireless access point B with wireless access points a and B respectively in a wireless topological network diagram, and the wireless access point names, the geographic positions, the received signal strengths and other attribute information of the target wireless access point A and the target wireless access point B are drawn in a topological graph, and attribute information such as wireless access point names, geographical positions, received signal strengths, base station information and the like of the wireless access points a and b are plotted in the topological graph, namely, the connection relation among the wireless access points and the attribute information of the wireless access points are in the topological graph. Here, the target wireless access point B may be a peripheral wireless access point of the target wireless access point a, and the cloud determines the target wireless access point based on the sharing operation of the user equipment through the sharing operation of the user equipment, and each target wireless access point in the wireless topology network may be a peripheral wireless access point of another target wireless access point and does not exist in the wireless access point topology network map in an isolated manner, so that the risk judgment of the wireless access point can be performed by using the generated wireless access point topology network map, and a risky wireless access point such as an emulational wireless access point and a phishing wireless access point can be located.
Preferably, the method further comprises step S11: one or more wireless access points are selected from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point. And screening the peripheral wireless access point information according to a preset rule to obtain the auxiliary wireless access point information of the target wireless access point. Here, after determining the target wireless access point according to the sharing operation of the user equipment and acquiring the information of the peripheral wireless access points of the target wireless access point in step S1, because the data amount in the actually drawn topology map is huge as long as the user equipment scans the peripheral wireless access points that are all the target wireless access points, a part of the wireless access points can be selected from the peripheral wireless access points corresponding to the target wireless access point as the auxiliary wireless access points of the target wireless access point according to a preset rule, so as to reduce the data amount, for example, N wireless access points are selected from the N peripheral wireless access points as the auxiliary wireless access points, thereby avoiding the tedious problem that some unstable peripheral wireless access points need to compare whether there is an intersection relationship or not, drawing an unstable topology network map, if some peripheral wireless access points are scanned by the user equipment, and the received signal strength is extremely weak and unstable, and the peripheral wireless access points can be abandoned, and in the generated wireless topological network diagram, the target wireless access point has no relation with the peripheral wireless access points.
More preferably, in step S11, the evaluation value of each peripheral wireless access point is determined based on any one or a combination of several of the signal strength of each peripheral wireless access point, the distance from the target wireless access point, the connection success rate and the network speed; and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral access points with the evaluation value larger than or equal to the preset screening evaluation value as the auxiliary wireless access points of the target wireless access point. For example, an evaluation value may be obtained according to the signal strength of each peripheral wireless access point and a weighted average of the distance between each peripheral wireless access point and the target wireless access point, then a corresponding peripheral wireless access point with a larger evaluation value is selected according to the evaluation value of each peripheral wireless access point, and the selected wireless access point is used as an auxiliary wireless access point; for another example, the received signal strength in each piece of peripheral wireless access point information may also be compared, and the peripheral wireless access point corresponding to the received signal strength greater than or equal to the preset signal strength threshold value is used as the screened auxiliary wireless access point information. Here, when some wireless access points are selected from the peripheral wireless access points as the auxiliary wireless access points, the selection may be performed according to the received signal strength of each peripheral wireless access point, for example, the peripheral wireless access points corresponding to the received signal strength greater than or equal to the preset signal strength threshold are used as the information of the selected auxiliary wireless access points, and the peripheral wireless access points with stronger RSSI are retained.
Preferably, in step S2, it is determined whether an intersection relationship exists between the auxiliary wireless access points of the target wireless access points, and if yes, the wireless access point topology network is determined according to the intersection relationship. Here, one implementation may be: if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points. The implementation mode can also be as follows: and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points. When the wireless access point topological network graph is drawn, the intersection relationship between each target wireless access point and the intersection relationship between the corresponding peripheral wireless access points are determined according to any one or combination of several of identification information (SSID and BSSID of the wireless access points), received signal strength, base station information and geographic position of the wireless access points, for example, a user shares one target wireless access point and another user shares another target wireless access point with the same SSID (name of the wireless access point), but the MAC addresses and the geographic positions are different, the two shared wireless access points can be judged to belong to different target wireless access points, and the two wireless access points exist in the wireless topological network graph and have respective relationship networks; for another example, the peripheral wireless access points of the target wireless access point 1 and the peripheral wireless access points of the target wireless access point 2 have an intersection relationship, that is, there are wireless access points with the same name in the peripheral wireless access points, the geographic positions are the same, the base station information is the same, and the intersection relationship between the wireless access points, that is, there are the names of the wireless access points and associated attribute information, such as the current geographic position, the base station information, the received signal strength, etc., will be reflected in the generated wireless access point topology network diagram, so that the generated topology diagram is used to perform risk judgment of the wireless access points or identify simulation requests of non-clients, etc.
In the embodiment of the application, a wireless access point topological network is determined according to an intersection relation among auxiliary wireless access point information of a plurality of target wireless access points, wherein the wireless access point topological network comprises the target wireless access point information and corresponding auxiliary wireless access point information. The method comprises the steps of screening out a part of wireless access points from peripheral wireless access points corresponding to a target wireless access point to serve as auxiliary wireless access points of the target wireless access point, using the part of wireless access points as topological network graphs of the wireless access points, drawing the topological network graphs by using intersection relations among information of the auxiliary wireless access points of the target wireless access points, reducing data volume in actual operation, avoiding excessive tedious work of comparing the intersection relations, ensuring that the generated topological graphs are accurate and stable, and containing accurate wireless access point information so as to facilitate the subsequent use of the topological graphs for identifying simulation requests of non-clients or carrying out risk judgment of the wireless access points and the like.
Preferably, the method further includes step S10, if the wireless access points of the same or similar identification information sent by multiple user equipments are simultaneously acquired, determining the target wireless access point according to a determination rule. In an embodiment, if the sharing operation of the multiple user equipments on the same or similar wireless access point names is simultaneously obtained, the target wireless access point is determined according to a judgment rule. Here, in step S1, after determining a target wireless access point according to the sharing operation of the user equipment and acquiring the information of the peripheral wireless access points of the target wireless access point, if the sharing operation of multiple user equipments on the same or similar wireless access point names is acquired at the same time, it is necessary to determine which wireless access point corresponding to the sharing operation performed by the user equipment is the target wireless access point. In a specific embodiment, the determination rule includes at least any one of: if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point; if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point; and if the wireless access points of the same or similar identification information sent by the plurality of user equipment are acquired simultaneously, and the wireless access point sent by each user equipment is determined, selecting one wireless access point from the plurality of wireless access points as the target wireless access point. Optionally, selecting one wireless access point from a plurality of wireless access points as the target wireless access point may be implemented as follows: and determining the target wireless access point according to the received signal strength of each wireless access point.
The following implementations are also possible: and judging whether auxiliary wireless access points with the same or similar identification information exist among the plurality of wireless access points, and if so, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points with the same or similar identification information corresponding to each wireless access point. For example, a target wireless access point a sent by multiple user equipment is acquired simultaneously, and an auxiliary wireless access point corresponding to the target wireless access point a sent by the first user equipment is a: -20db, secondary wireless access point b: -50 db; the auxiliary wireless access point corresponding to the target wireless access point a sent by the second user equipment is a: -30db, secondary wireless access point c: -60 db; it is determined which user equipment transmits the target wireless access point a to be reserved based on the received signal strength of the common auxiliary wireless access point a, for example, the target wireless access point a transmitted by the first user equipment is taken as the target wireless access point in the topological network, and its corresponding auxiliary wireless access points a and b are both reserved.
In the embodiment of the application, based on the sharing operation of each user equipment on the same wireless access point name, comparing the received signal strength of the shared wireless access point corresponding to each sharing operation, and taking the shared wireless access point with the maximum received signal strength as the target wireless access point; and judging whether the peripheral wireless access point information of the shared wireless access points corresponding to each sharing operation has an intersection relation or not based on the sharing operation of each user equipment on the same wireless access point name, and if not, taking the shared wireless access points corresponding to each sharing operation as the target wireless access points. For example, if the sharing operation of the user equipment a and the user equipment B to the wireless access point with the wireless access point name M is simultaneously acquired, whether the wireless access points corresponding to the acquired sharing operation are the same is judged according to the MAC address, the geographic position and the like, if the wireless access points are the same target wireless access point n, which device to keep the information of the target wireless access point shared by the devices and the information of the peripheral wireless access points of the target wireless access point n is determined according to the signal intensity of the target wireless access point n received by the user equipment a and the signal intensity of the target wireless access point n received by the user equipment B, if the received signal intensity of the user equipment a is stronger, the user equipment a is closer to the target wireless access point, and the information of the shared target wireless access point and the scanned information of the peripheral wireless access point are more representative as the reference value of the production topological graph, therefore, the shared wireless access point corresponding to the user equipment A with the maximum received signal strength is used as the target wireless access point, and the information of the peripheral wireless access points scanned by the user equipment A is obtained; judging whether the wireless access point shared by the user equipment A is the same as the wireless access point shared by the user equipment B or not, and judging whether an intersection relationship exists between the information of the peripheral wireless access points scanned by the user equipment A and the information of the peripheral wireless access points scanned by the user equipment B or not, for example, if the wireless access points scanned by the user equipment A and the user equipment B do not have the same wireless access point name and have different geographic positions, the geographic position of the wireless access point shared by the user equipment A is different from the geographic position of the wireless access point shared by the user equipment B, and the base station information is different, determining that the wireless access point shared by the user equipment A is actually two different wireless access points although having the same wireless access point name, and sharing the wireless access points to the cloud as target wireless access points, and simultaneously acquire their corresponding peripheral wireless access points.
Preferably, after determining the wireless access point topology network according to the intersection relationship between the peripheral wireless access point information of the plurality of target wireless access points in step S2, the method further includes: step S20 to step S22, as shown in FIG. 2; step S20, acquiring a request of a target wireless access point sent by a user equipment and identification information of peripheral wireless access points of the target wireless access point; step S21, determining a reference wireless access point with the same or similar identification information in the wireless access point topological network based on the identification information of the target wireless access point; step S22, comparing the identification information of the target wireless access point and the peripheral wireless access points of the reference wireless access point to determine whether the target wireless access point is at risk.
In a specific embodiment, a user requests to acquire a connection password of a wireless access point B, a cloud acquires a connection request of the user of the wireless access point B and acquires peripheral wireless access points of the wireless access point B, target wireless access point information and peripheral wireless access point information corresponding to primary key information in the topological network are determined according to primary key information in a wireless access point name of the wireless access point B, wherein the primary key information is generated by SSID and BSSID of the wireless access point, for example, the wireless access point name of the wireless access point B is called as @ aabb, the primary key information is aabb, and the target wireless access point A corresponding to the aabb is found in the topological network according to the aabb, comparing the peripheral wireless access points of the wireless access point B with the peripheral wireless access points of the target wireless access point A, if the peripheral wireless access points are different, indicating that the wireless access point B is an isolated point in the topological network diagram and has a risk, further judging whether the risk exists or not, further judging according to the SSID, the BSSID, the base station information and the geographic position of the wireless access point B, and feeding back the final risk judgment result to the user.
Preferably, the target wireless access point information and the corresponding peripheral wireless access point information in the wireless access point topology network respectively include a geographical location and a received signal strength corresponding to each of the target wireless access point information and the peripheral wireless access point information. The wireless access point topological network comprises target wireless access point information and peripheral wireless access point information, wherein the target wireless access point information and the peripheral wireless access point information respectively comprise corresponding geographic positions and received signal strength, and the target wireless access point information is the geographic position where the user equipment is connected with the target wireless access point to share the wireless access point. Specifically, the process of calculating the coordinate of a certain WiFi wireless access point is as follows:
in a preferred embodiment of the present application, after step S2, the method further includes: step S201, in step S201, the actual geographic location of the target wireless access point is determined according to the geographic location and the received signal strength when one or more user equipments transmit the target wireless access point. Optionally, three user equipments may be selected to position the target wireless access point according to a three-point positioning method, and the specific implementation manner may be: determining any three user equipment having history sharing operation on the target wireless access point, and acquiring the geographical positions and the received signal strength of the three user equipment in the wireless access point topological network when the three user equipment have history sharing operation on the target wireless access point; and determining the actual geographic position of the target wireless access point according to the geographic positions and the received signal strengths of the three user equipment in the wireless access point topological network.
Here, as shown in fig. 3, a schematic diagram of a method for determining coordinates of a target wireless access point according to a preferred embodiment of the present application is shown, where each wireless access point has a received signal strength, and when the user equipment is at different distances from the wireless access point, the received signal strength is different, and the distance from the current user equipment to the wireless access point can be calculated, so that the coordinates of the target wireless access point in a wireless access point topology network diagram can be determined according to a three-point positioning rule and an actual coordinate position of each user equipment, and the specific process is as follows: determining any three user equipments, such as the user equipment A, B, C, having a history sharing operation on the target wireless access point a, and acquiring a geographical location and a received signal strength of the user equipment A, B, C having a history sharing operation on the target wireless access point a, wherein the geographical location is represented by longitude and latitude, such as the longitude and latitude of the user equipment a is (la1, lo1), the signal strength of the received target wireless access point a is rsi 1, the longitude and latitude of the user equipment B is (la2, lo2), the signal strength of the received target wireless access point a is rsi 2, the longitude and latitude of the user equipment a is (la3, lo3), the signal strength of the received target wireless access point a is rsi 3, the received signal strength is converted into a distance with the current longitude and latitude center of each user equipment as the center of a circle, and if the received signal strength is-70 dbm, the converted into a distance representing that the current user equipment is 300m away from the target wireless access point, the received signal strength is-20 dbm, the conversion into the distance represents that the distance between the current user equipment and the target wireless access point is 800m, the method for converting the received signal strength into the distance is only an example, circles are drawn by taking the converted distance as a radius to obtain three circles, and the longitude and latitude at the intersection of the three circles are taken as the coordinates of the target wireless access point a, so that the actual geographic position of the target wireless access point a can be determined.
In this embodiment of the application, after determining the actual geographic location of the target wireless access point according to the geographic location and the received signal strength when the target wireless access point is transmitted by one or more user equipments in step S201, the method further includes: step S202, based on the connection request of the wireless access point sent by the user equipment, the actual geographic position of the target wireless access point is fed back to the user equipment.
For example, with continued reference to fig. 3, after determining the actual geographic location of the target wireless access point according to the geographic locations and received signal strengths of the three user equipments in the wireless access point topological network, the actual geographic location of the target access point is fed back to the user equipment based on an access point connection request sent by the user equipment. Here, the wireless access point connection request includes the target wireless access point connection request or a peripheral wireless access point connection request of the target wireless access point. In the wireless access point topology network, a target wireless access point is opposite, and a corresponding peripheral wireless access point may be a target wireless access point, and the original target wireless access point is changed to a peripheral wireless access point. In an embodiment of the application, when a request for connecting a target wireless access point is obtained from a user equipment, an actual geographic location of the target wireless access point can be fed back to the user equipment, for example, a wireless access point established by a certain merchant and having a merchant name as a wireless access point name, when the user equipment requests to connect the wireless access point, the actual geographic location of the merchant is fed back to the user equipment, and some merchant activities are pushed, so that a user can conveniently go to the merchant to perform consumption behaviors according to the pushed merchant activities and the actual geographic location. In another embodiment of the application, when the user equipment requests a peripheral wireless access point connected with the target wireless access point, the actual geographic position of the target wireless access point is fed back to the user equipment, and some merchant preferential activities are pushed, so that the user can check the preferential activities, and the user can consume the preferential activities of merchants corresponding to the target wireless access point nearby conveniently.
According to another aspect of the present application, there is provided a method for generating a wireless access point topology network at a user equipment, the method comprising: step S1', determining a target wireless access point according to the wireless access point connected by the user; and step S2', sending the target wireless access point and the corresponding peripheral wireless access points to the network equipment. The cloud topological network diagram is established based on the target access point and the corresponding surrounding access points, and the user equipment sends the wireless access points connected with the user equipment and the surrounding wireless access points scanned by the current equipment to the cloud so as to provide a data base for the cloud to establish the wireless access point topological network.
According to yet another aspect of the present application, there is provided a method of generating a wireless access point topology network, the method including: the user equipment determines a target wireless access point according to the wireless access point connected with the user; the user equipment sends the target wireless access point and the corresponding peripheral wireless access points to network equipment; the network equipment acquires a target wireless access point and peripheral wireless access points corresponding to the target wireless access point; the network device establishes a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points. By the method, an unprecedented wireless access point topological network in the prior art is established, the risk of the wireless access point can be judged, some simulation requests of non-clients can be identified, and the target wireless access point can be positioned.
FIG. 4 illustrates a schematic diagram of a network device architecture for generating a wireless access point topology network according to yet another aspect of the subject application; the network device 1 includes: the device comprises an acquisition device 01 and a generation device 02, wherein the acquisition device 01 is used for acquiring a target wireless access point and a peripheral wireless access point corresponding to the target wireless access point; the generating means 02 is used for establishing a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points.
The above devices are operated continuously, and herein, those skilled in the art should understand that "continuously" means that the above devices are operated in real time or according to the set or real-time adjusted operating mode requirement.
The network device 1 may be one server, a plurality of servers connected via a local area network, a plurality of servers connected via the internet, or a cloud including a plurality of servers. Here, the Cloud is composed of a large number of computers or network servers based on Cloud Computing (Cloud Computing), which is a kind of distributed Computing, a super virtual computer composed of a group of loosely coupled computer sets.
Specifically, the obtaining device 01 is configured to obtain a target wireless access point and a peripheral wireless access point corresponding to the target wireless access point; in the embodiment of the application, a target wireless access point is determined according to a wireless access point sent by user equipment, and peripheral wireless access point information of the target wireless access point is obtained; here, when a user performs a sharing operation of a wireless access point through a user device, such as sharing a wireless access point name, a password, etc. of a certain wireless access point to a cloud, the wireless access point is a target wireless access point, and the cloud obtains the wireless access point name, the password, etc. of the target wireless access point and also obtains peripheral wireless access point information of the target wireless access point, where the peripheral wireless access point information of the target wireless access point is some wireless access points obtained by scanning a geographic location of the user device when the user device currently shares the wireless access point, and the peripheral wireless access point information includes a wireless access point name (SSID), a BSSID or a MAC address, a Received Signal Strength (RSSI), a geographic location, and base station information, so as to compare with peripheral wireless access point information of other target wireless access points according to the obtained peripheral wireless access point information, and determining whether an intersection relation exists, and drawing a wireless access point topological network graph by using the intersection relation.
Specifically, the generating device 02 is configured to establish a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points. Here, a wireless access point topology network is determined according to an intersection relationship between peripheral wireless access point information of a plurality of target wireless access points, wherein the wireless access point topology network includes the target wireless access point information and corresponding peripheral wireless access point information. In one embodiment, the peripheral wireless access points of one target wireless access point A are a, B, c and d, the peripheral wireless access points of another target wireless access point B are a, B, e and f, determining as wireless access points a and B according to the intersection between the respective peripheral wireless access points of the target wireless access points a and B, connecting a target wireless access point A and a target wireless access point B with wireless access points a and B respectively in a wireless topological network diagram, and the wireless access point names, the geographic positions, the received signal strengths and other attribute information of the target wireless access point A and the target wireless access point B are drawn in a topological graph, and attribute information such as wireless access point names, geographical positions, received signal strengths, base station information and the like of the wireless access points a and b are plotted in the topological graph, namely, the connection relation among the wireless access points and the attribute information of the wireless access points are in the topological graph. Here, the target wireless access point B may be a peripheral wireless access point of the target wireless access point a, and the cloud determines the target wireless access point based on the sharing operation of the user equipment through the sharing operation of the user equipment, and each target wireless access point in the wireless topology network may be a peripheral wireless access point of another target wireless access point and does not exist in the wireless access point topology network map in an isolated manner, so that the risk judgment of the wireless access point can be performed by using the generated wireless access point topology network map, and a risky wireless access point such as an emulational wireless access point and a phishing wireless access point can be located.
Preferably, the apparatus 1 further comprises screening means 11: the method comprises the steps of selecting one or more wireless access points from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point. And screening the peripheral wireless access point information according to a preset rule to obtain the auxiliary wireless access point information of the target wireless access point. After the target wireless access point is determined according to the sharing operation of the user equipment and the information of the peripheral wireless access points of the target wireless access point is obtained, because the user equipment only needs to scan the peripheral wireless access points which are all used as the target wireless access points, the data amount in the actually drawn topological graph is huge, therefore, partial wireless access points can be screened from the peripheral wireless access points corresponding to the target wireless access points according to the preset rules to be used as auxiliary wireless access points of the target wireless access point, the data amount is reduced, for example, N wireless access points are screened from N peripheral wireless access points to be used as auxiliary wireless access points, the trouble that whether intersection relation exists in comparison of some unstable peripheral wireless access points is avoided, and the unstable topological network graph is drawn, if some peripheral wireless access points are scanned by the user equipment, and the received signal strength is extremely weak and unstable, and the peripheral wireless access points can be abandoned, and in the generated wireless topological network diagram, the target wireless access point has no relation with the peripheral wireless access points.
More preferably, the screening device 11 is configured to determine the evaluation value of each peripheral wireless access point based on any one or a combination of several of the signal strength of each peripheral wireless access point, the distance from the target wireless access point, the connection success rate, and the network speed; and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral access points with the evaluation value larger than or equal to the preset screening evaluation value as the auxiliary wireless access points of the target wireless access point. For example, an evaluation value may be obtained according to the signal strength of each peripheral wireless access point and a weighted average of the distance between each peripheral wireless access point and the target wireless access point, then a corresponding peripheral wireless access point with a larger evaluation value is selected according to the evaluation value of each peripheral wireless access point, and the selected wireless access point is used as an auxiliary wireless access point; for another example, the received signal strength in each piece of peripheral wireless access point information may also be compared, and the peripheral wireless access point corresponding to the received signal strength greater than or equal to the preset signal strength threshold value is used as the screened auxiliary wireless access point information. Here, when some wireless access points are selected from the peripheral wireless access points as the auxiliary wireless access points, the selection may be performed according to the received signal strength of each peripheral wireless access point, for example, the peripheral wireless access points corresponding to the received signal strength greater than or equal to the preset signal strength threshold are used as the information of the selected auxiliary wireless access points, and the peripheral wireless access points with stronger RSSI are retained.
Preferably, the generating device 02 is configured to determine whether an intersection relationship exists between the auxiliary wireless access points of the multiple target wireless access points, and if yes, determine the wireless access point topology network according to the intersection relationship. Here, one implementation may be: if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points. The implementation mode can also be as follows: and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points. When the wireless access point topological network graph is drawn, the intersection relationship between each target wireless access point and the intersection relationship between the corresponding peripheral wireless access points are determined according to any one or combination of several of identification information (SSID and BSSID of the wireless access points), received signal strength, base station information and geographic position of the wireless access points, for example, a user shares one target wireless access point and another user shares another target wireless access point with the same SSID (name of the wireless access point), but the MAC addresses and the geographic positions are different, the two shared wireless access points can be judged to belong to different target wireless access points, and the two wireless access points exist in the wireless topological network graph and have respective relationship networks; for another example, the peripheral wireless access points of the target wireless access point 1 and the peripheral wireless access points of the target wireless access point 2 have an intersection relationship, that is, there are wireless access points with the same name in the peripheral wireless access points, the geographic positions are the same, the base station information is the same, and the intersection relationship between the wireless access points, that is, there are the names of the wireless access points and associated attribute information, such as the current geographic position, the base station information, the received signal strength, etc., will be reflected in the generated wireless access point topology network diagram, so that the generated topology diagram is used to perform risk judgment of the wireless access points or identify simulation requests of non-clients, etc.
In the embodiment of the application, a wireless access point topological network is determined according to an intersection relation among auxiliary wireless access point information of a plurality of target wireless access points, wherein the wireless access point topological network comprises the target wireless access point information and corresponding auxiliary wireless access point information. The method comprises the steps of screening out a part of wireless access points from peripheral wireless access points corresponding to a target wireless access point to serve as auxiliary wireless access points of the target wireless access point, using the part of wireless access points as topological network graphs of the wireless access points, drawing the topological network graphs by using intersection relations among information of the auxiliary wireless access points of the target wireless access points, reducing data volume in actual operation, avoiding excessive tedious work of comparing the intersection relations, ensuring that the generated topological graphs are accurate and stable, and containing accurate wireless access point information so as to facilitate the subsequent use of the topological graphs for identifying simulation requests of non-clients or carrying out risk judgment of the wireless access points and the like.
Preferably, the device 1 further includes a determining device 10, configured to determine the target wireless access point according to a determination rule if the wireless access points of the same or similar identification information sent by multiple user equipments are simultaneously acquired. In an embodiment, if the sharing operation of the multiple user equipments on the same or similar wireless access point names is simultaneously obtained, the target wireless access point is determined according to a judgment rule. Here, after determining a target wireless access point according to the sharing operation of the user equipment and acquiring the peripheral wireless access point information of the target wireless access point, the determining device 10 is configured to determine which wireless access point corresponding to the sharing operation performed by the user equipment is the target wireless access point if the sharing operation performed by the plurality of user equipment on the same or similar wireless access point names is acquired at the same time. In a specific embodiment, the determination rule includes at least any one of: if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point; if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point; and if the wireless access points of the same or similar identification information sent by the plurality of user equipment are acquired simultaneously, and the wireless access point sent by each user equipment is determined, selecting one wireless access point from the plurality of wireless access points as the target wireless access point. Optionally, selecting one wireless access point from a plurality of wireless access points as the target wireless access point may be implemented as follows: and determining the target wireless access point according to the received signal strength of each wireless access point.
The following implementations are also possible: and judging whether auxiliary wireless access points with the same or similar identification information exist among the plurality of wireless access points, and if so, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points with the same or similar identification information corresponding to each wireless access point. For example, a target wireless access point a sent by multiple user equipment is acquired simultaneously, and an auxiliary wireless access point corresponding to the target wireless access point a sent by the first user equipment is a: -20db, secondary wireless access point b: -50 db; the auxiliary wireless access point corresponding to the target wireless access point a sent by the second user equipment is a: -30db, secondary wireless access point c: -60 db; it is determined which user equipment transmits the target wireless access point a to be reserved based on the received signal strength of the common auxiliary wireless access point a, for example, the target wireless access point a transmitted by the first user equipment is taken as the target wireless access point in the topological network, and its corresponding auxiliary wireless access points a and b are both reserved.
In the embodiment of the application, based on the sharing operation of each user equipment on the same wireless access point name, comparing the received signal strength of the shared wireless access point corresponding to each sharing operation, and taking the shared wireless access point with the maximum received signal strength as the target wireless access point; and judging whether the peripheral wireless access point information of the shared wireless access points corresponding to each sharing operation has an intersection relation or not based on the sharing operation of each user equipment on the same wireless access point name, and if not, taking the shared wireless access points corresponding to each sharing operation as the target wireless access points. For example, if the sharing operation of the user equipment a and the user equipment B to the wireless access point with the wireless access point name M is simultaneously acquired, whether the wireless access points corresponding to the acquired sharing operation are the same is judged according to the MAC address, the geographic position and the like, if the wireless access points are the same target wireless access point n, which device to keep the information of the target wireless access point shared by the devices and the information of the peripheral wireless access points of the target wireless access point n is determined according to the signal intensity of the target wireless access point n received by the user equipment a and the signal intensity of the target wireless access point n received by the user equipment B, if the received signal intensity of the user equipment a is stronger, the user equipment a is closer to the target wireless access point, and the information of the shared target wireless access point and the scanned information of the peripheral wireless access point are more representative as the reference value of the production topological graph, therefore, the shared wireless access point corresponding to the user equipment A with the maximum received signal strength is used as the target wireless access point, and the information of the peripheral wireless access points scanned by the user equipment A is obtained; judging whether the wireless access point shared by the user equipment A is the same as the wireless access point shared by the user equipment B or not, and judging whether an intersection relationship exists between the information of the peripheral wireless access points scanned by the user equipment A and the information of the peripheral wireless access points scanned by the user equipment B or not, for example, if the wireless access points scanned by the user equipment A and the user equipment B do not have the same wireless access point name and have different geographic positions, the geographic position of the wireless access point shared by the user equipment A is different from the geographic position of the wireless access point shared by the user equipment B, and the base station information is different, determining that the wireless access point shared by the user equipment A is actually two different wireless access points although having the same wireless access point name, and sharing the wireless access points to the cloud as target wireless access points, and simultaneously acquire their corresponding peripheral wireless access points.
Fig. 5 is a schematic structural diagram of a network device for generating a wireless access point topology network according to a preferred embodiment of another aspect of the present application, where the network device 1 further includes an acquisition requesting device 20, a searching device 21, and a comparing device 22; the obtaining request device 20 obtains a request of a target wireless access point sent by a user equipment and identification information of peripheral wireless access points of the target wireless access point; the searching device 21 determines a reference wireless access point with the same or similar identification information in the wireless access point topological network based on the identification information of the target wireless access point; the comparison means 22 determines whether the target wireless access point is at risk by comparing the identification information of the target wireless access point with the identification information of the peripheral wireless access points of the reference wireless access point.
In a specific embodiment, a user requests to acquire a connection password of a wireless access point B, a cloud acquires a connection request of the user of the wireless access point B and acquires peripheral wireless access points of the wireless access point B, target wireless access point information and peripheral wireless access point information corresponding to primary key information in the topological network are determined according to primary key information in a wireless access point name of the wireless access point B, wherein the primary key information is generated by SSID and BSSID of the wireless access point, for example, the wireless access point name of the wireless access point B is called as @ aabb, the primary key information is aabb, and the target wireless access point A corresponding to the aabb is found in the topological network according to the @ ab, comparing the peripheral wireless access points of the wireless access point B with the peripheral wireless access points of the target wireless access point A, if the peripheral wireless access points are different, indicating that the wireless access point B is an isolated point in the topological network diagram and has a risk, further judging whether the risk exists or not, further judging according to the SSID, the BSSID, the base station information and the geographic position of the wireless access point B, and feeding back the final risk judgment result to the user.
Preferably, the target wireless access point information and the corresponding peripheral wireless access point information in the wireless access point topology network respectively include a geographical location and a received signal strength corresponding to each of the target wireless access point information and the peripheral wireless access point information. The wireless access point topological network comprises target wireless access point information and peripheral wireless access point information, wherein the target wireless access point information and the peripheral wireless access point information respectively comprise corresponding geographic positions and received signal strength, and the target wireless access point information is the geographic position where the user equipment is connected with the target wireless access point to share the wireless access point. Specifically, the process of calculating the coordinate of a certain WiFi wireless access point is as follows:
in a preferred embodiment of the present application, with continued reference to fig. 5, the network device 1 further includes: a positioning device 201; the positioning device 201 is used to determine the actual geographic location of the target wireless access point through the geographic location and the received signal strength of one or more user equipments when transmitting the target wireless access point. Optionally, three user equipments may be selected to position the target wireless access point according to a three-point positioning method, and the specific implementation manner may be: determining any three user equipment having history sharing operation on the target wireless access point, and acquiring the geographical positions and the received signal strength of the three user equipment in the wireless access point topological network when the three user equipment have history sharing operation on the target wireless access point; and determining the actual geographic position of the target wireless access point according to the geographic positions and the received signal strengths of the three user equipment in the wireless access point topological network.
Here, as shown in fig. 3, a schematic diagram of a method for determining coordinates of a target wireless access point according to a preferred embodiment of the present application is shown, where each wireless access point has a received signal strength, and when the user equipment is not at the same distance from the wireless access point, the received signal strength is different, and the distance from the current user equipment to the wireless access point can be calculated, so that the coordinates of the target wireless access point in a wireless access point topological network diagram can be determined according to a three-dimensional positioning rule and an actual coordinate position of each user equipment, and the specific process is as follows: determining any three user equipments, such as the user equipment A, B, C, having a history sharing operation on the target wireless access point a, and acquiring a geographical location and a received signal strength of the user equipment A, B, C having a history sharing operation on the target wireless access point a, wherein the geographical location is represented by longitude and latitude, such as the longitude and latitude of the user equipment a is (la1, lo1), the signal strength of the received target wireless access point a is rsi 1, the longitude and latitude of the user equipment B is (la2, lo2), the signal strength of the received target wireless access point a is rsi 2, the longitude and latitude of the user equipment a is (la3, lo3), the signal strength of the received target wireless access point a is rsi 3, the received signal strength is converted into a distance with the current longitude and latitude center of each user equipment as the center of a circle, and if the received signal strength is-70 dbm, the converted into a distance representing that the current user equipment is 300m away from the target wireless access point, the received signal strength is-20 dbm, the conversion into the distance represents that the distance between the current user equipment and the target wireless access point is 800m, the method for converting the received signal strength into the distance is only an example, circles are drawn by taking the converted distance as a radius to obtain three circles, and the longitude and latitude at the intersection of the three circles are taken as the coordinates of the target wireless access point a, so that the actual geographic position of the target wireless access point a can be determined.
In this embodiment of the application, after determining the actual geographic location of the target wireless access point according to the geographic location and the received signal strength when one or more user equipments send the target wireless access point, the network equipment further includes a feedback device 202, configured to feedback the actual geographic location of the target wireless access point to the user equipment based on a connection request of the wireless access point sent by the user equipment.
For example, with continued reference to fig. 3, the actual geographic location of the target wireless access point is fed back to the user device based on a wireless access point connection request sent by the user device. Here, the wireless access point connection request includes the target wireless access point connection request or a peripheral wireless access point connection request of the target wireless access point. In the wireless access point topology network, a target wireless access point is opposite, and a corresponding peripheral wireless access point may be a target wireless access point, and the original target wireless access point is changed to a peripheral wireless access point. In an embodiment of the application, when a request for connecting a target wireless access point is obtained from a user equipment, an actual geographic location of the target wireless access point can be fed back to the user equipment, for example, a wireless access point established by a certain merchant and having a merchant name as a wireless access point name, when the user equipment requests to connect the wireless access point, the actual geographic location of the merchant is fed back to the user equipment, and some merchant activities are pushed, so that a user can conveniently go to the merchant to perform consumption behaviors according to the pushed merchant activities and the actual geographic location. In another embodiment of the application, when the user equipment requests a peripheral wireless access point connected with the target wireless access point, the actual geographic position of the target wireless access point is fed back to the user equipment, and some merchant preferential activities are pushed, so that the user can check the preferential activities, and the user can consume the preferential activities of merchants corresponding to the target wireless access point nearby conveniently.
According to another aspect of the present application, there is also provided a user equipment for generating a wireless access point topology network, where the user equipment 2 includes: connection means 01' for determining a target wireless access point from the wireless access points to which the user is connected; and a sending device 02' configured to send the target wireless access point and its corresponding peripheral wireless access points to a network device. The cloud topological network diagram is established based on the target access point and the corresponding surrounding access points, and the user equipment sends the wireless access points connected with the user equipment and the surrounding wireless access points scanned by the current equipment to the cloud so as to provide a data base for the cloud to establish the wireless access point topological network.
According to another aspect of the present application, there is also provided a system for generating a wireless access point topology network, wherein the system includes: the network equipment comprises network equipment 1 and user equipment 2, wherein the user equipment 2 comprises a connecting device and a sending device, the network equipment 1 comprises an acquiring device and a generating device, and the connecting device is used for determining a target wireless access point according to a wireless access point connected with a user; the transmitting device is used for transmitting the target wireless access point and the corresponding peripheral wireless access points to network equipment; the acquisition device is used for acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point; the generating device is used for establishing a topological network among a plurality of target wireless access points based on the peripheral wireless access points of the target wireless access points. By the method, a wireless access point topological network which is not available in the prior art is established, the judgment of the risk of the wireless access point, the identification of some simulation requests of non-clients and the positioning of a target wireless access point can be realized, the use value is high, and more convenient service in the field of the wireless access point is provided for users.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Program instructions which invoke the methods of the present application may be stored on a fixed or removable recording medium and/or transmitted via a data stream on a broadcast or other signal-bearing medium and/or stored within a working memory of a computer device operating in accordance with the program instructions. An embodiment according to the present application comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or a solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not any particular order.

Claims (30)

1. A method for generating a wireless access point topology network at a network device side, wherein the method comprises:
acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
establishing a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points;
acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point;
determining a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point;
and determining whether the target wireless access point is at risk or not by comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point or not.
2. The method of claim 1, wherein after acquiring the target wireless access point and the corresponding peripheral wireless access points, the method comprises:
one or more wireless access points are selected from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point.
3. The method of claim 2, wherein the preset rules comprise:
determining the evaluation value of each peripheral wireless access point based on any one or a combination of several of the signal intensity of each peripheral wireless access point, the distance between each peripheral wireless access point and the target wireless access point, the connection success rate and the network speed;
and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral wireless access points with the evaluation value larger than or equal to the preset screening evaluation value as auxiliary wireless access points of the target wireless access point.
4. The method of claim 2 or 3, wherein establishing a topological network between a plurality of target wireless access points based on surrounding wireless access points of the target wireless access points comprises:
and judging whether the auxiliary wireless access points of the target wireless access points have an intersection relation or not, and if so, determining a wireless access point topological network according to the intersection relation.
5. The method of claim 4, wherein determining whether an intersection relationship exists between secondary wireless access points of the plurality of target wireless access points comprises:
if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points.
6. The method of claim 4, wherein determining whether an intersection relationship exists between secondary wireless access points of the plurality of target wireless access points comprises:
and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points.
7. The method of claim 1, wherein after acquiring the target wireless access point and the corresponding peripheral wireless access points, the method further comprises:
and if the wireless access points of the same or similar identification information sent by a plurality of user equipment are acquired simultaneously, determining the target wireless access point according to a judgment rule.
8. The method of claim 7, wherein the decision rule comprises at least any one of:
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point;
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point;
and if the wireless access points of the same or similar identification information sent by the plurality of user equipment are acquired simultaneously, and the wireless access point sent by each user equipment is determined, selecting one wireless access point from the plurality of wireless access points as the target wireless access point.
9. The method of claim 8, wherein selecting a wireless access point from a plurality of wireless access points as the target wireless access point comprises:
and determining the target wireless access point according to the received signal strength of each wireless access point.
10. The method of claim 8, wherein selecting a wireless access point from a plurality of wireless access points as the target wireless access point comprises:
determining whether there is a secondary wireless access point of the same or similar identification information between the plurality of wireless access points,
and if the identification information exists, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points corresponding to each wireless access point and having the same or similar identification information.
11. The method of claim 1, wherein after establishing a topological network among a plurality of target wireless access points based on neighboring wireless access points of the target wireless access points, further comprising:
and determining the actual geographic position of the target wireless access point through the geographic position and the received signal strength when one or more user devices transmit the target wireless access point.
12. The method of claim 11, wherein determining the actual geographic location of the target wireless access point from the geographic location and received signal strength of the one or more user devices transmitting the target wireless access point further comprises:
and feeding back the actual geographic position of the target wireless access point to the user equipment based on a connection request of the wireless access point sent by the user equipment.
13. The method of claim 12, wherein the connection request of the wireless access point comprises a connection request of the target wireless access point or a connection request of a peripheral wireless access point of the target wireless access point.
14. A method for generating a wireless access point topology network at a user equipment, wherein the method comprises:
determining a target wireless access point according to the wireless access point connected with the user;
sending the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the method comprises the steps of sending a request of a target wireless access point and identification information of peripheral wireless access points of the target wireless access point to network equipment, enabling the network equipment to determine a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point, and determining whether the target wireless access point is at risk or not by comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point or not.
15. A method of generating a wireless access point topology network, wherein the method comprises:
the user equipment determines a target wireless access point according to the wireless access point connected with the user;
the user equipment sends the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the network equipment acquires a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
the network equipment establishes a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points;
the network equipment acquires a request of a target wireless access point sent by the user equipment and identification information of peripheral wireless access points of the target wireless access point;
the network equipment determines a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point;
and the network equipment determines whether the target wireless access point is at risk or not by comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point or not.
16. A network device that generates a wireless access point topology network, wherein the network device comprises:
the acquisition device is used for acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
generating means for establishing a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points;
the device comprises an acquisition request device, a processing device and a processing device, wherein the acquisition request device is used for acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point;
the searching device is used for determining a reference wireless access point with the same or similar identification information in the wireless access point topological network based on the identification information of the target wireless access point;
and the comparison device is used for comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point so as to determine whether the target wireless access point has risks.
17. The network device of claim 16, wherein the network device comprises:
the selection device is used for selecting one or more wireless access points from peripheral wireless access points of a target wireless access point based on a preset rule to serve as auxiliary wireless access points of the target wireless access point.
18. The network device of claim 17, wherein the preset rules comprise:
determining the evaluation value of each peripheral wireless access point based on any one or a combination of several of the signal intensity of each peripheral wireless access point, the distance between each peripheral wireless access point and the target wireless access point, the connection success rate and the network speed;
and comparing the evaluation value of each peripheral wireless access point, and taking the peripheral access points with the evaluation value larger than or equal to the preset screening evaluation value as the auxiliary wireless access points of the target wireless access point.
19. The network device of claim 17 or 18, wherein the generating means is configured to:
and judging whether the auxiliary wireless access points of the target wireless access points have an intersection relation or not, and if so, determining a wireless access point topological network according to the intersection relation.
20. The network device of claim 19, wherein the generating means is configured to:
if the multiple target wireless access points have the auxiliary wireless access points with the same or similar identification information, the intersection relationship exists among the auxiliary wireless access points of the multiple target wireless access points.
21. The network device of claim 19, wherein the generating means is configured to:
and determining the intersection relationship among the auxiliary wireless access points of the target wireless access points through any one or any combination of the received signal strength, the base station information and the geographic position of the wireless access points.
22. The network device of claim 16, wherein the network device further comprises:
and the determining device is used for determining the target wireless access point according to the judgment rule if the wireless access points of the same or similar identification information sent by the user equipment are simultaneously obtained.
23. The network device of claim 22, wherein the decision rule comprises at least any one of:
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is used as the target wireless access point;
if the wireless access points of the same or similar identification information sent by a plurality of user equipment are simultaneously obtained, the wireless access point sent by each user equipment is not taken as the target wireless access point;
and if the wireless access point sent by each user equipment is determined through the sharing operation of the wireless access points which simultaneously acquire the same or similar identification information sent by the plurality of user equipment, selecting one wireless access point from the plurality of wireless access points as the target wireless access point.
24. The network device of claim 23, wherein the determining means is configured to:
and determining the target wireless access point according to the received signal strength of each wireless access point.
25. The network device of claim 23, wherein the determining means is configured to:
determining whether there is a secondary wireless access point of the same or similar identification information between the plurality of wireless access points,
and if the identification information exists, determining the target wireless access point according to the received signal strength of the auxiliary wireless access points corresponding to each wireless access point and having the same or similar identification information.
26. The network device of claim 16, wherein the network device further comprises:
and the positioning device is used for determining the actual geographic position of the target wireless access point through the geographic position and the received signal strength when one or more user devices transmit the target wireless access point.
27. The network device of claim 26, wherein the network device further comprises:
and the feedback device is used for feeding back the actual geographic position of the target wireless access point to the user equipment based on the connection request of the wireless access point sent by the user equipment.
28. The network device of claim 27, wherein the connection request of the wireless access point comprises a connection request of the target wireless access point or a connection request of a peripheral wireless access point of the target wireless access point.
29. A user equipment for generating a wireless access point topology network, wherein the user equipment comprises:
the connecting device is used for determining a target wireless access point according to the wireless access point connected by the user;
the sending device is used for sending the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the sending device is used for sending the request of the target wireless access point and the identification information of the peripheral wireless access points of the target wireless access point to the network equipment so that the network equipment can determine the reference wireless access points with the same or similar identification information in the wireless access point topological network based on the identification information of the target wireless access point, and whether the target wireless access point is at risk or not can be determined by comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point or not.
30. A system for generating a wireless access point topology network, wherein the system comprises: the network equipment comprises a connecting device and a sending device, the network equipment comprises an acquiring device, a generating device, an acquiring request device, a searching device and a comparing device,
the connecting device is used for determining a target wireless access point according to the wireless access point connected by the user;
the transmitting device is used for transmitting the target wireless access point and the corresponding peripheral wireless access points to network equipment;
the acquisition device is used for acquiring a target wireless access point and peripheral wireless access points corresponding to the target wireless access point;
the generating device is used for establishing a topological network among a plurality of target wireless access points based on peripheral wireless access points of the target wireless access points;
the acquisition request device is used for acquiring a request of a target wireless access point sent by user equipment and identification information of peripheral wireless access points of the target wireless access point;
the searching device is used for determining a reference wireless access point with the same or similar identification information in a wireless access point topological network based on the identification information of the target wireless access point;
the comparison device is used for comparing whether the identification information of the peripheral wireless access points of the target wireless access point is the same as the identification information of the peripheral wireless access points of the reference wireless access point so as to determine whether the target wireless access point has risks.
CN201611154971.7A 2016-12-14 2016-12-14 Method and equipment for generating wireless access point topological network Active CN108616886B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611154971.7A CN108616886B (en) 2016-12-14 2016-12-14 Method and equipment for generating wireless access point topological network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611154971.7A CN108616886B (en) 2016-12-14 2016-12-14 Method and equipment for generating wireless access point topological network

Publications (2)

Publication Number Publication Date
CN108616886A CN108616886A (en) 2018-10-02
CN108616886B true CN108616886B (en) 2021-06-08

Family

ID=63658196

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611154971.7A Active CN108616886B (en) 2016-12-14 2016-12-14 Method and equipment for generating wireless access point topological network

Country Status (1)

Country Link
CN (1) CN108616886B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929938B (en) * 2021-01-27 2022-05-03 华中师范大学 AP topological relation graph generation method and system based on wireless log information
CN115471929B (en) * 2021-05-24 2024-08-27 北京骑胜科技有限公司 Unlocking method and device and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101657040A (en) * 2008-08-21 2010-02-24 华为技术有限公司 Method, device and system for finding wireless network topology
TW201218842A (en) * 2010-10-27 2012-05-01 Lanready Technologies Inc allows the plurality of wireless access points to quickly and automatically form a wireless network topology
CN102480744A (en) * 2010-11-22 2012-05-30 丛林网络公司 Automatic access point location, planning, and coverage optimization
CN105187281A (en) * 2014-06-23 2015-12-23 中兴通讯股份有限公司 Topological graph drawing method and device
CN106162804A (en) * 2016-06-24 2016-11-23 上海连尚网络科技有限公司 For providing the method and apparatus of the access information of wireless access focus

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7808959B2 (en) * 2007-03-15 2010-10-05 Alpha Networks Inc. Topology system of wireless network with dynamic balance
US8763082B2 (en) * 2008-05-13 2014-06-24 At&T Mobility Ii Llc Interactive client management of an access control list
CN101588518B (en) * 2009-06-29 2011-12-28 中国移动通信集团广东有限公司肇庆分公司 Transport network topological structure safety analytical method and implementation system
CN104995987B (en) * 2013-07-30 2019-03-26 华为技术有限公司 The topological construction method and wireless site of WLAN grid network
CN105682033B (en) * 2016-01-19 2019-01-25 福建师范大学 A kind of neighbour's detection method based on mobile AP

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101657040A (en) * 2008-08-21 2010-02-24 华为技术有限公司 Method, device and system for finding wireless network topology
TW201218842A (en) * 2010-10-27 2012-05-01 Lanready Technologies Inc allows the plurality of wireless access points to quickly and automatically form a wireless network topology
CN102480744A (en) * 2010-11-22 2012-05-30 丛林网络公司 Automatic access point location, planning, and coverage optimization
CN105187281A (en) * 2014-06-23 2015-12-23 中兴通讯股份有限公司 Topological graph drawing method and device
CN106162804A (en) * 2016-06-24 2016-11-23 上海连尚网络科技有限公司 For providing the method and apparatus of the access information of wireless access focus

Also Published As

Publication number Publication date
CN108616886A (en) 2018-10-02

Similar Documents

Publication Publication Date Title
TWI687877B (en) User matching method, message client, server and system of location-based service (LBS)
WO2017020552A1 (en) Method and device for providing access point information of wireless access point
EP3544336B1 (en) Information transmission
WO2017020553A1 (en) Method and device for establishing wireless connection
CN111221484B (en) Screen projection method and device
CN111935820B (en) Positioning implementation method based on wireless network and related equipment
CN107172209B (en) Information pushing method and device
WO2021254261A1 (en) Device positioning method and apparatus
US20180295658A1 (en) Method for establishing wireless connection for application of user equipment
CN106658665A (en) Method and apparatus for establishing wireless connection
CN108024308B (en) Method and equipment for sharing and connecting wireless access points
US9614915B2 (en) Seamless peer to peer internet connectivity
CN109413759B (en) Method and equipment for wireless connection
CN109246658B (en) Method and equipment for transmitting no-flow data
US11758502B2 (en) Determining a set of access points in response to a geo-location request
CN107567071B (en) Method and equipment for inquiring wireless hotspot
CN108616886B (en) Method and equipment for generating wireless access point topological network
CN108289290B (en) Method and equipment for connecting intelligent wearable equipment and wireless access point
CN107977366B (en) Data output method and device for coordinate system and terminal
JP5654448B2 (en) Area event indication
CN108228610B (en) Method and equipment for storing and updating wireless access point data
KR20130000824A (en) System and method for positioning terminal, positioning apparatus and driving method thereof, cloud computing service apparatus and driving method thereof, access point and driving method thereof, terminal
JP2011521516A5 (en)
CN111615174B (en) Method for identifying wireless network, terminal device and computer readable storage medium
US10306585B2 (en) Signal determining method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant