CN108882229B - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN108882229B
CN108882229B CN201810552080.XA CN201810552080A CN108882229B CN 108882229 B CN108882229 B CN 108882229B CN 201810552080 A CN201810552080 A CN 201810552080A CN 108882229 B CN108882229 B CN 108882229B
Authority
CN
China
Prior art keywords
wireless access
access point
connection configuration
configuration
connection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810552080.XA
Other languages
Chinese (zh)
Other versions
CN108882229A (en
Inventor
吴培希
赵学礼
路飞云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lianshang Network Technology Co Ltd
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201810552080.XA priority Critical patent/CN108882229B/en
Publication of CN108882229A publication Critical patent/CN108882229A/en
Application granted granted Critical
Publication of CN108882229B publication Critical patent/CN108882229B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/30Connection release

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application discloses an information processing method and device. One embodiment of the method comprises: obtaining configuration information related to local storage of connection configurations of wireless access points, wherein the configuration information includes parameter thresholds of the connection configurations of the wireless access points, and one connection configuration record has information for connecting one wireless access point; based on the parameter threshold and the locally stored parameters of the connection configuration of the wireless access point, the connection configuration is selected for deletion. According to the embodiment of the application, the risk that the password in the connection configuration is cracked can be reduced by deleting the excessive connection configuration of the wireless access points.

Description

Information processing method and device
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to the technical field of internet, and particularly relates to an information processing method and device.
Background
With the development of wireless networks, more and more users begin to surf the internet by using wireless networks. The user can use the terminal equipment to surf the internet at any time and any place, and the method is convenient and quick. In the prior art, a great deal of information about wireless access points is stored in a terminal device.
Disclosure of Invention
The embodiment of the application provides an information processing method and device.
In a first aspect, some embodiments of the present application provide an information processing method, which is applied to a terminal device, and includes: acquiring configuration information related to local storage of connection configuration of wireless access points, wherein the configuration information comprises parameter thresholds of the connection configuration of the wireless access points, and one connection configuration record has information for connecting one wireless access point; and selecting the connection configuration for deletion based on the parameter threshold and the locally stored parameters of the connection configuration of the wireless access point.
In a second aspect, some embodiments of the present application provide an information processing method, applied to a network device, including: and in response to receiving a configuration information acquisition request sent by a terminal device, sending configuration information related to local storage of connection configuration of the wireless access point to the terminal device, so that the terminal device selects the connection configuration for deletion based on the parameter threshold and parameters of the locally stored connection configuration of the wireless access point, wherein the configuration information comprises the parameter threshold of the connection configuration of the wireless access point, and one connection configuration records information used for connecting one wireless access point.
In a third aspect, some embodiments of the present application provide an electronic device, comprising: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement a method as in any embodiment of the information processing method of the first aspect.
In a fourth aspect, some embodiments of the present application provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor, implements the method as in any of the embodiments of the information processing method of the first aspect.
In a fifth aspect, some embodiments of the present application provide an electronic device, comprising: one or more processors; a storage device for storing one or more programs which, when executed by one or more processors, cause the one or more processors to implement a method as in any embodiment of the information processing method of the second aspect.
In a sixth aspect, some embodiments of the present application provide a computer-readable storage medium on which a computer program is stored, which when executed by a processor, implements the method as in any one of the embodiments of the information processing method of the second aspect.
First, configuration information related to local storage of connection configuration of a wireless access point is acquired, wherein the configuration information includes a parameter threshold of the connection configuration of the wireless access point, and one connection configuration record has information for connecting one wireless access point; then, based on the parameter threshold and the locally stored parameters of the connection configuration of the wireless access point, the connection configuration is selected for deletion. According to the embodiment of the application, the risk that the password in the connection configuration is cracked can be reduced by deleting the excessive connection configuration of the wireless access points.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of an information processing method according to the present application;
FIG. 3 is a schematic diagram of an application scenario of an information processing method according to the present application;
FIG. 4 is a flow diagram of yet another embodiment of an information processing method according to the present application;
FIG. 5 is a flow diagram of yet another embodiment of an information processing method according to the present application;
FIG. 6 is a flow diagram of yet another embodiment of an information processing method according to the present application;
fig. 7 is a schematic flow chart of an alternative implementation of obtaining configuration information related to local storage of connection configuration of a wireless access point in an information processing method according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer system suitable for implementing a terminal device or a network device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows an exemplary system architecture 100 to which the information processing method of the embodiments of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a network device 105. The network 104 is used to provide a medium for communication links between the terminal devices 101, 102, 103 and the network device 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may use the terminal devices 101, 102, 103 to interact with the network device 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various client applications installed thereon, such as wireless access point type applications and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The network device 105 may be a network device that provides various services, for example, a background network device that receives the configuration information acquisition request sent by the terminal devices 101, 102, and 103. The background network device may analyze and perform other processing on the received data such as the configuration information acquisition request, and feed back a processing result (for example, configuration information) to the terminal device.
It should be noted that the information processing method provided by the embodiment corresponding to fig. 2 of the present application is generally executed by the terminal devices 101, 102, and 103. The information processing method applied to the network device in the embodiment of the present application is generally performed by the network device 105.
The network device 105 may be hardware or software. When the network device is hardware, it may be implemented as a distributed network device cluster formed by multiple network devices, or may be implemented as a single network device. When the network device is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and network devices in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and network devices, as desired for an implementation.
Continuing to refer to FIG. 2, a flow 200 of one embodiment of an information processing method according to the present application is shown. The information processing method is applied to the terminal equipment and comprises the following steps:
step 201, obtaining configuration information related to local storage of connection configuration of wireless access points, wherein the configuration information includes parameter threshold of connection configuration of wireless access points, and one connection configuration records information for connecting one wireless access point.
In the present embodiment, an execution subject (e.g., the terminal device shown in fig. 1) on which the information processing method is executed can acquire the configuration information. In particular, the configuration information relates to a local storage of connection configurations for the wireless access point. In some embodiments, multiple connection configurations (configs) may be stored locally, with different connection configurations corresponding to different wireless access points. The parameter threshold is a threshold set for a parameter of the connection configuration.
The connection configuration may include, for example, a connection password for the wireless access point, an identification of the wireless access point, and so on. In practice, the connection configuration of a wireless access point may have various parameters. For example, the parameters of the connection configuration may include, but are not limited to, at least one of: the number of connection configurations, the frequency of use of the connection configurations locally, the last time the connection configurations are used locally, and the time the connection configurations are created locally.
Step 202, selecting a connection configuration for deletion based on a parameter threshold and a locally stored parameter of the connection configuration of the wireless access point.
In this embodiment, the execution subject may select a connection configuration from connection configurations locally stored in the terminal device to delete the connection configuration based on a parameter threshold and a parameter of the locally stored connection configuration of the wireless access point.
In particular, the connection configuration to be deleted may be selected in a variety of ways from among locally stored connection configurations. The execution agent may compare a parameter of the locally stored connection configuration with a parameter threshold and select the parameter based on a numerical relationship between the parameter and the corresponding parameter threshold. For example, the parameter is creation time, the creation time may be compared with a parameter threshold of the creation time, and if the creation time of a certain connection configuration is prior to the parameter threshold of the creation time, the connection configuration is selected to be deleted. Or the parameters can be used for initial selection, and then certain parameters are compared with the parameter threshold. For example, n connection configurations with the earliest creation time may be selected, and the connection configuration with the usage frequency exceeding the preset threshold may be determined from the n connection configurations to be deleted.
In practice, the deleted connection configuration may be created by the system of the terminal device or by an application installed in the terminal device. For example, when the operation right of the terminal device is a root right, the connection configuration created by the system may be deleted.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the information processing method according to the present embodiment. The application scenario is implemented in a terminal device. In the application scenario of fig. 3, the terminal device 301 obtains configuration information 302 related to local storage of connection configurations of wireless access points, where the configuration information includes parameter thresholds 303 of the connection configurations of the wireless access points, and one connection configuration is recorded with information for connecting to one wireless access point. Based on the parameter threshold 303 and the locally stored parameters 304 of the connection configuration of the wireless access point, the connection configuration 305 is selected for deletion.
According to the method provided by the embodiment of the application, the risk that the password in the connection configuration is cracked can be reduced by deleting the excessive connection configuration of the wireless access points. Meanwhile, the information stored on the terminal equipment can be simplified, and a certain memory space is released. And, through the parameter of the connection configuration stored locally, can combine the particular situation of the local connection configuration to delete the connection configuration rationally.
With further reference to FIG. 4, a flow 400 of yet another embodiment of an information processing method is shown. The flow 400 of the information processing method includes the following steps:
step 401, obtaining configuration information related to local storage of connection configuration of wireless access points, where the configuration information includes parameter thresholds of connection configuration of the wireless access points, and one connection configuration record has information for connecting one wireless access point.
In the present embodiment, an execution subject (e.g., the terminal device shown in fig. 1) on which the information processing method is executed can acquire the configuration information. In particular, the configuration information relates to a local storage of connection configurations for the wireless access point. A plurality of connection configurations may be stored locally, with different connection configurations corresponding to different wireless access points. The parameter threshold is a threshold set for a parameter of the connection configuration.
Step 402, in response to determining that the number of locally stored connection configurations of the wireless access point exceeds a number threshold, selecting a connection configuration for deletion based on at least one of creation time and usage information of the locally stored connection configurations of the wireless access point.
In this embodiment, the execution main body may select a connection configuration from the locally stored connection configurations and delete the selected connection configuration based on at least one of the creation time and the usage information of the locally stored connection configurations of the wireless access point, in response to determining that the number of the locally stored connection configurations of the wireless access point exceeds the number threshold. The usage information is information used locally for the connection configuration and may include frequency of use and/or time of last use, etc.
A number of connection configurations may be stored locally, some of which may be selected for deletion when the number exceeds a number threshold. In particular, the execution body may select the connection configuration in various ways. For example, the execution body may delete a preset number of connection configurations that are created before the creation time. The execution main body may select one or more connection configurations having the last use time in each connection configuration to delete the connection configuration.
The embodiment may reasonably determine the number of deleted connection configurations based on the number threshold of connection configurations. And delete according to creation time, situation of use. The connection configuration to be deleted is comprehensively determined by utilizing multiple factors, so that the connection configuration can be more reasonably deleted, and the risk of cracking the password in the connection configuration can be reduced to a certain extent.
In some optional implementations of this embodiment, step 402 may include:
and deleting the connection configuration of at least one wireless access point based on the number threshold of the connection configurations of the wireless access points and the sequence of the creation time of the connection configuration of each wireless access point.
In this embodiment, the execution main body deletes the connection configuration of at least one wireless access point based on the number threshold of the connection configurations of the wireless access points and the sequence of the creation time of the connection configuration of each wireless access point.
In practice, the execution body may determine the connection configuration to be deleted in various ways. For example, the execution subject may determine whether the number of local connection configurations exceeds a number threshold, and if the number of local connection configurations exceeds the number threshold, delete a preset number of connection configurations whose creation time is prior.
In some application scenarios of this embodiment, the deleting the connection configuration of at least one wireless access point based on the number threshold of the connection configurations of the wireless access points and the sequence of the creation time of the connection configuration of each wireless access point may include the following steps:
determining a difference between a number of locally stored connection configurations of the wireless access point and a number threshold;
determining connection configurations of different wireless access points with previous creation time from the locally stored connection configurations of the wireless access points;
deleting the determined connection configuration of the wireless access point.
In this embodiment, the execution main body may sequence each connection configuration according to the order of creation time. And determines a difference number of connection configurations from the end of the sequence at which the creation time precedes. And delete the determined connection configuration.
In these application scenarios, based on the threshold number of connection configurations and the creation time, the number of connection configurations to be deleted can be reasonably determined according to the local specific situation, and which connection configurations to delete can be reasonably determined.
In some optional implementations of this embodiment, step 402 may include:
and deleting the connection configuration of at least one wireless access point based on the number threshold and the size of the local use frequency of the connection configuration of each wireless access point.
In this embodiment, the execution body selects at least one connection configuration based on the number threshold and the size of the local frequency of use of each local connection configuration, and deletes the at least one connection configuration. Specifically, the usage frequency may be a usage frequency within a preset historical time period, such as a usage frequency within the last month.
In practice, the execution body may select the connection configuration for deletion in various ways. For example, the execution body may determine whether the number of local connection configurations exceeds a number threshold, and if the number of local connection configurations exceeds the number threshold, delete a preset number of connection configurations with a lower frequency of use. When determining the connection configuration with a lower frequency of use, the frequency of use of each connection configuration may be compared, and the connection configuration with a lower frequency of use may be selected.
In some application scenarios of this embodiment, the deleting the connection configuration of at least one wireless access point based on the number threshold and the size of the local use frequency of the connection configuration of each wireless access point may include the following steps:
determining a difference between a number of locally stored connection configurations for the wireless access point and a number threshold;
determining the connection configuration of different wireless access points with lower local use frequency from the locally stored connection configurations of the wireless access points;
deleting the determined connection configuration of the wireless access point.
In this embodiment, when determining a connection configuration with a lower frequency of use, the connection configurations may be sorted according to the frequency of use to obtain a sequence. And selects a connection configuration from the end where the sequence is used less frequently.
In these application scenarios, the connection configuration may be determined for deletion according to the frequency of use. Therefore, the connection configuration with low use frequency can be deleted according to the local specific use frequency of the connection configuration, and the connection configuration with high use frequency is reserved. And the number of connection configurations to be deleted is reasonably determined according to the parameter threshold.
With further reference to FIG. 5, a flow 500 of yet another embodiment of an information processing method is shown. The process 500 of the information processing method includes the following steps:
step 501, obtaining configuration information related to local storage of connection configuration of wireless access points, wherein the configuration information includes parameter thresholds of the connection configuration of the wireless access points, and one connection configuration records information for connecting one wireless access point.
In the present embodiment, an execution subject (e.g., the terminal device shown in fig. 1) on which the information processing method is executed can acquire the configuration information. In particular, the configuration information relates to a local storage of connection configurations for the wireless access point. A plurality of connection configurations may be stored locally, with different connection configurations corresponding to different wireless access points. The parameter threshold is a threshold set for a parameter of the connection configuration.
Step 502, in response to determining that a creation time of the locally stored at least one connection configuration precedes a creation time threshold, deleting the at least one connection configuration.
In this embodiment, the parameter threshold may further include a creation time threshold. In addition to deleting the connection configuration according to the quantity threshold, the execution subject may delete the at least one connection configuration in response to determining that a creation time of the at least one locally stored connection configuration precedes the creation time threshold.
In particular, the creation time of each connection configuration stored locally may be traversed and compared to a creation time threshold. And if the comparison result is that the creation time threshold is prior, deleting the connection configuration. All connection configurations stored locally and having a creation time prior to the creation time threshold may eventually be deleted.
According to the embodiment, the connection configuration with the early creation time is accurately deleted by using the creation time threshold, and the risk that the password in the connection configuration is cracked can be reduced to a certain extent.
With further reference to FIG. 6, a flow 600 of yet another embodiment of an information processing method is shown. The flow 600 of the information processing method includes the following steps:
step 601, obtaining configuration information related to local storage of connection configuration of wireless access points, wherein the configuration information includes parameter threshold of connection configuration of wireless access points, and one connection configuration records information for connecting one wireless access point.
In the present embodiment, an execution subject (e.g., the terminal device shown in fig. 1) on which the information processing method is executed can acquire the configuration information. In particular, the configuration information relates to a local storage of connection configurations for the wireless access point. A plurality of connection configurations may be stored locally, with different connection configurations corresponding to different wireless access points. The parameter threshold is a threshold set for a parameter of the connection configuration.
In response to determining that the locally stored connection configuration of the at least one wireless access point has a local frequency of use less than a frequency of use threshold, the connection configuration of the at least one wireless access point is deleted, step 602.
In this embodiment, the executing entity deletes the connection configuration of the at least one wireless access point in response to determining that the local usage frequency of the locally stored connection configuration of the at least one wireless access point is smaller than the usage frequency threshold. The present embodiment may compare the local frequency of use of each connection configuration with the frequency of use threshold, and delete the connection configuration if the comparison result is less than the frequency of use threshold.
In this embodiment, based on the usage frequency threshold, the connection configuration with a low usage frequency is deleted, so that the connection configuration is reasonably deleted.
In some optional implementations of any of the above embodiments of the information processing method of the present application, acquiring configuration information related to local storage of connection configuration of the wireless access point (e.g., step 201 in fig. 2, step 401 in fig. 4, step 501 in fig. 5, and step 601 in fig. 6) may include:
step 701, sending a configuration information acquisition request to a network device.
In these alternative implementations, an execution subject (e.g., the terminal device shown in fig. 1) on which the information processing method operates may send a configuration information acquisition request to the network device to acquire the configuration information. The configuration information acquisition request is a request for acquiring configuration information.
Step 702, in response to not receiving the configuration information returned by the network device within the preset time length, determining the configuration information received from the network device for the last time locally as the configuration information related to the local storage of the connection configuration of the wireless access point.
In these alternative implementations, the executing entity may determine, in response to not receiving the configuration information returned by the network device within the preset time period, the configuration information received from the network device last time locally as the configuration information related to the local storage of the connection configuration of the wireless access point. That is, after the configuration information is not received for a period of time, the latest configuration information stored locally may be used as the configuration information related to the local storage of the connection configuration of the wireless access point.
In step 703, in response to receiving the configuration information returned by the network device within the preset time period, determining the configuration information returned by the network device as configuration information related to local storage of the connection configuration of the wireless access point.
In these alternative implementations, the executing entity may determine, in response to receiving the configuration information returned by the network device within the preset time period, the configuration information returned by the network device as configuration information related to local storage of the connection configuration of the wireless access point.
It should be noted that the execution main body may alternatively execute the step 702 and the step 703 based on whether the configuration information returned by the network device is received within a preset time period.
The embodiment can provide an alternative scheme for acquiring the configuration information when the configuration information is not acquired from the network device, so as to ensure that the terminal device can acquire the configuration information.
The application also discloses an embodiment of the information processing method. The information processing method is applied to network equipment and comprises the following steps:
in response to receiving a configuration information acquisition request sent by a terminal device, sending configuration information related to local storage of connection configuration of wireless access points to the terminal device, so that the terminal device selects the connection configuration for deletion based on a parameter threshold and parameters of the locally stored connection configuration of the wireless access points, wherein the configuration information comprises the parameter threshold of the connection configuration of the wireless access points, and one connection configuration records information used for connecting one wireless access point.
According to the method provided by the embodiment of the application, the risk that the password in the connection configuration is cracked can be reduced by deleting the excessive connection configuration of the wireless access points. Meanwhile, the information stored on the terminal equipment can be simplified, and a certain memory space is released. And, through the parameter of the connection configuration stored locally, can combine the particular situation of the local connection configuration to delete the connection configuration rationally.
Referring now to FIG. 8, shown is a block diagram of a computer system 800 suitable for use in implementing the electronic device of an embodiment of the present application. The electronic device shown in fig. 8 is only an example, and should not bring any limitation to the functions and the use range of the embodiment of the present application.
As shown in fig. 8, the computer system 800 includes a Central Processing Unit (CPU)801 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)802 or a program loaded from a storage section 808 into a Random Access Memory (RAM) 803. In the RAM 803, various programs and data necessary for the operation of the system 800 are also stored. The CPU 801, ROM 802, and RAM 803 are connected to each other via a bus 804. An input/output (I/O) interface 805 is also connected to bus 804.
The following components are connected to the I/O interface 805: an input portion 806 including a keyboard, a mouse, and the like; an output section 807 including a signal such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 808 including a hard disk and the like; and a communication section 809 including a network interface card such as a LAN card, a modem, or the like. The communication section 809 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 805 as necessary. A removable medium 811 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 810 as necessary, so that a computer program read out therefrom is mounted on the storage section 808 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program can be downloaded and installed from a network through the communication section 809 and/or installed from the removable medium 811. The computer program performs the above-described functions defined in the method of the present application when executed by the Central Processing Unit (CPU) 801. It should be noted that the computer readable medium of the present application can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the apparatus described in the above embodiments; or may be present separately and not assembled into the device. The computer readable medium carries one or more programs which, when executed by the apparatus, cause the apparatus to: obtaining configuration information related to local storage of connection configurations of wireless access points, wherein the configuration information comprises parameter thresholds of the connection configurations of the wireless access points, and one connection configuration record has information for connecting one wireless access point; and selecting the connection configuration for deletion based on the parameter threshold and the locally stored parameters of the connection configuration of the wireless access point.
The foregoing description is only exemplary of the preferred embodiments of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (8)

1. An information processing method is applied to a wireless access point application installed on a terminal device, and comprises the following steps:
acquiring configuration information related to local storage of connection configuration of wireless access points, wherein the configuration information comprises parameter thresholds of the connection configuration of the wireless access points, and one connection configuration record has information for connecting one wireless access point;
selecting a connection configuration for deletion based on the parameter threshold and a locally stored parameter of the connection configuration of the wireless access point;
in response to the parameter threshold comprising a quantity threshold, selecting a connection configuration for deletion based on the parameter threshold and a locally stored parameter of a connection configuration of a wireless access point, comprising: in response to determining that the number of locally stored connection configurations for a wireless access point exceeds the number threshold, selecting a connection configuration for deletion based on the locally stored creation time and usage information for the connection configuration for the wireless access point;
in response to the usage information including a frequency of use, selecting a connection configuration for deletion based on locally stored creation time and usage information for the connection configuration for the wireless access point, comprising:
when the operation authority of the wireless access point application on the terminal equipment is a root authority, deleting the connection configuration of at least one wireless access point based on the number threshold and the size of the local use frequency of the connection configuration of each wireless access point;
the obtaining configuration information related to local storage of connection configuration of a wireless access point includes: sending a configuration information acquisition request to network equipment; in response to the fact that the configuration information returned by the network equipment is not received within the preset time length, determining the configuration information received from the network equipment for the last time locally as configuration information related to local storage of connection configuration of the wireless access point;
wherein the obtaining configuration information related to local storage of connection configuration for a wireless access point further comprises:
in response to receiving configuration information returned by the network equipment within a preset time length, determining the configuration information returned by the network equipment as configuration information related to local storage of connection configuration of the wireless access point;
the configuration information acquisition request includes locally stored use frequencies of the connection configurations of the respective wireless access points.
2. The method of claim 1, wherein selecting a connection configuration for deletion based on the locally stored creation time and usage information for the connection configuration of the wireless access point in response to determining that the number of locally stored connection configurations for the wireless access point exceeds the number threshold further comprises:
deleting the at least one locally stored connection configuration in response to determining that a creation time of the at least one connection configuration precedes a creation time threshold.
3. The method of claim 1, wherein the deleting the connection configuration of at least one wireless access point based on the number threshold and a size of a frequency of use of the connection configuration of each wireless access point locally comprises:
determining a difference between a number of locally stored connection configurations for the wireless access point and the number threshold;
determining the connection configuration of the different wireless access points with lower local use frequency from the locally stored connection configurations of the wireless access points;
deleting the determined connection configuration of the wireless access point.
4. An information processing method applied to a network device includes:
in response to receiving a configuration information acquisition request sent by a terminal device, sending configuration information related to local storage of connection configuration of a wireless access point to the terminal device, so that the terminal device selects the connection configuration for deletion based on a parameter threshold and a parameter of the locally stored connection configuration of the wireless access point, wherein the configuration information comprises the parameter threshold of the connection configuration of the wireless access point, and one connection configuration records information used for connecting one wireless access point;
wherein, in response to that the parameter threshold includes a quantity threshold, the wireless access point application installed in the terminal device selects a connection configuration for deletion based on the parameter threshold and a locally stored parameter of the connection configuration of the wireless access point, and includes:
in response to determining that the number of locally stored connection configurations for a wireless access point exceeds the number threshold, selecting a connection configuration for deletion based on the locally stored creation time and usage information for the connection configuration for the wireless access point;
in response to the usage information including a frequency of use, selecting for deletion a connection configuration based on locally stored creation time and usage information for the connection configuration for the wireless access point, comprising:
when the operation authority of the wireless access point application to the terminal equipment is a root authority, deleting the connection configuration of at least one wireless access point based on the number threshold and the size of the local use frequency of the connection configuration of each wireless access point;
the terminal equipment sends a configuration information acquisition request to network equipment; in response to the fact that the configuration information returned by the network equipment is not received within the preset time length, determining the configuration information received from the network equipment for the last time in the local area as the configuration information related to the local storage of the connection configuration of the wireless access point;
the wireless access point application responds to configuration information returned by the network equipment received within a preset time length, and the configuration information returned by the network equipment is determined as configuration information related to local storage of connection configuration of the wireless access point;
the configuration information acquisition request includes locally stored use frequencies of the connection configurations of the respective wireless access points.
5. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-3.
6. A computer-readable storage medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method according to any one of claims 1-3.
7. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method as recited in claim 4.
8. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method as claimed in claim 4.
CN201810552080.XA 2018-05-31 2018-05-31 Information processing method and device Active CN108882229B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810552080.XA CN108882229B (en) 2018-05-31 2018-05-31 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810552080.XA CN108882229B (en) 2018-05-31 2018-05-31 Information processing method and device

Publications (2)

Publication Number Publication Date
CN108882229A CN108882229A (en) 2018-11-23
CN108882229B true CN108882229B (en) 2022-05-31

Family

ID=64335197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810552080.XA Active CN108882229B (en) 2018-05-31 2018-05-31 Information processing method and device

Country Status (1)

Country Link
CN (1) CN108882229B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112261677A (en) * 2020-10-15 2021-01-22 北京小米移动软件有限公司 Hotspot information processing method and device, terminal and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163400A (en) * 2015-08-20 2015-12-16 广东欧珀移动通信有限公司 WIFI hotspot connection control method and system and mobile terminal
CN105491642A (en) * 2015-11-25 2016-04-13 小米科技有限责任公司 Network connection method and device
CN105517189A (en) * 2015-11-27 2016-04-20 小米科技有限责任公司 Method and apparatus for realizing WIFI connection
CN106131929A (en) * 2016-08-03 2016-11-16 北京小米移动软件有限公司 WiFi access-in point information method for cleaning and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101313526B (en) * 2005-11-02 2015-04-22 美商内数位科技公司 Method and system for autonomous channel coordination for a wireless distribution system
CN103533563B (en) * 2013-10-21 2016-08-17 深圳市金立通信设备有限公司 The restoration methods of a kind of WLAN account and terminal
CN104601801B (en) * 2014-12-24 2017-05-17 广东欧珀移动通信有限公司 WiFi hotspot connecting method and system for mobile terminal with screen locked
CN104539497B (en) * 2015-01-30 2018-03-02 小米科技有限责任公司 Method for connecting network and device
CN106550423A (en) * 2016-11-04 2017-03-29 广东欧珀移动通信有限公司 A kind of access point management method and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105163400A (en) * 2015-08-20 2015-12-16 广东欧珀移动通信有限公司 WIFI hotspot connection control method and system and mobile terminal
CN105491642A (en) * 2015-11-25 2016-04-13 小米科技有限责任公司 Network connection method and device
CN105517189A (en) * 2015-11-27 2016-04-20 小米科技有限责任公司 Method and apparatus for realizing WIFI connection
CN106131929A (en) * 2016-08-03 2016-11-16 北京小米移动软件有限公司 WiFi access-in point information method for cleaning and device

Also Published As

Publication number Publication date
CN108882229A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN107302597B (en) Message file pushing method and device
CN109388626B (en) Method and apparatus for assigning numbers to services
CN109684188B (en) Test method and device
CN109710507B (en) Automatic testing method and device
CN109582873B (en) Method and device for pushing information
CN108011949B (en) Method and apparatus for acquiring data
CN109862100B (en) Method and device for pushing information
CN110019263B (en) Information storage method and device
CN109240802B (en) Request processing method and device
CN111338810A (en) Method and apparatus for storing information
CN109472540B (en) Service processing method and device
CN109992719B (en) Method and apparatus for determining push priority information
CN111352957A (en) Remote dictionary service optimization method and related equipment
CN109873731B (en) Test method, device and system
CN108882229B (en) Information processing method and device
CN110740138B (en) Data transmission method and device
CN108804442B (en) Serial number generation method and device
CN109947613B (en) File reading test method and device
CN111460273B (en) Information pushing method and device
CN113722007A (en) Configuration method, device and system of VPN branch equipment
CN113760678A (en) Statistical method and device for page rendering duration
CN111737218A (en) File sharing method and device
CN109213815B (en) Method, device, server terminal and readable medium for controlling execution times
CN107066342B (en) Information display method and device
CN108089823B (en) Information output method and device for storage system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant