CN109429229A - Obtain the method, apparatus and computer readable storage medium of network access information - Google Patents
Obtain the method, apparatus and computer readable storage medium of network access information Download PDFInfo
- Publication number
- CN109429229A CN109429229A CN201710792292.0A CN201710792292A CN109429229A CN 109429229 A CN109429229 A CN 109429229A CN 201710792292 A CN201710792292 A CN 201710792292A CN 109429229 A CN109429229 A CN 109429229A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- terminal
- network
- password
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a kind of method, apparatus and computer readable storage medium for obtaining network access information, belong to network technique field.Method includes: to send password acquisition request to server, and the password acquisition request carries at least one first wireless network identification that the terminal searching arrives;Receive the second wireless network mark for belonging to non-public network at least one wireless network password and at least one first wireless network that the server provides;The second wireless network is deleted from least one described wireless network password and identifies corresponding password, obtains remaining wireless network password;Based on the remaining wireless network password and remaining first wireless network identification, the network access information of the first wireless network is generated.Terminal deletes the wireless network password of non-public network in the present invention, generates network access information according only to remaining wireless network password and the first wireless network identification, improves accuracy.
Description
Technical field
The present invention relates to network technique field, in particular to a kind of method, apparatus and calculating for obtaining network access information
Machine readable storage medium storing program for executing.
Background technique
With the development of network technology, WiFi (Wireless Fidelity, Wireless Fidelity) network has become people day
Common a kind of wireless network in normal life and work.Under normal circumstances, user is only in the network insertion for knowing WiFi network
When information, ability using terminal accesses WiFi network, which includes WiFi network password and WiFi network mark.
However in order to enable user in the case where not knowing network access information, could be used that terminal access WiFi network, rise
Password shares APP (APPlication, application program).Terminal can share APP by password and obtain network access information, after
It is continuous to access based on the network access information and access WiFi network.
Currently, providing a kind of method for obtaining network access information, process can be with are as follows: terminal to server sends password
Acquisition request, at least one WiFi network mark which searches.Server receives password and obtains
Request is taken, is identified based at least one WiFi network, is searched in cryptographic libraries;When finding WiFi network password, to
The WiFi network password that terminal is sent a query to.Terminal receives WiFi network password, by the WiFi network password and WiFi network
Identify network consisting access information.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
The network access information of private WiFi network may be got by the above method, however private WiFi network is
Personal property is usually that other people is not allowed to access in the case where not being allowed to.Therefore, the above method can be got in vain
WiFi network causes accuracy poor.
Summary of the invention
The embodiment of the invention provides a kind of method, apparatus and computer-readable storage medium for obtaining network access information
Matter can solve the problem of accuracy difference.Technical solution is as follows:
In a first aspect, providing a kind of method for obtaining network access information, it is applied to terminal, which comprises
Password acquisition request is sent to server, the password acquisition request carries at least one that the terminal searching arrives
First wireless network identification;
It receives and belongs at least one wireless network password and at least one first wireless network that the server provides
The second wireless network of non-public network identifies;
The second wireless network is deleted from least one described wireless network password and identifies corresponding password, is remained
Remaining wireless network password;
Based on the remaining wireless network password and remaining first wireless network identification, the net of the first wireless network is generated
Network access information.
Second aspect provides a kind of method for obtaining network access information, is applied to server, which comprises
The password acquisition request that terminal is sent is received, the password acquisition request carries at least one that the terminal searching arrives
A first wireless network identification;
It is searched in the database based at least one described wireless network identification;
Belong to non-public network when finding at least one wireless network password and at least one first wireless network
When second wireless network identifies, Xiang Suoshu terminal sends at least one described wireless network password and the second wireless network mark
Know.
The third aspect provides a kind of device for obtaining network access information, is applied to terminal, and described device includes:
First sending module, for sending password acquisition request to server, the password acquisition request carries the end
Hold at least one first wireless network identification searched;
First receiving module, for receive at least one wireless network password that the server provides and at least one the
Belong to the second wireless network mark of non-public network in one wireless network;
Removing module is corresponded to for deleting the second wireless network mark from least one described wireless network password
Password, obtain remaining wireless network password;
Generation module, for based on the remaining wireless network password and remaining first wireless network identification, generating the
The network access information of one wireless network.
Fourth aspect provides a kind of device for obtaining network access information, is applied to server, and described device includes:
Second receiving module, for receiving the password acquisition request of terminal transmission, described in the password acquisition request carries
At least one first wireless network identification that terminal searching arrives;
Searching module, for being searched in the database based at least one described wireless network identification;
Second sending module is found at least one wireless network password and at least one first wireless network for working as
When belonging to the second wireless network mark of non-public network, Xiang Suoshu terminal sends at least one described wireless network password and institute
State second wireless network mark.
5th aspect provides a kind of device for obtaining network access information, is applied to terminal, and described device includes processing
Device and memory are stored at least one instruction, at least a Duan Chengxu, code set or instruction set, the finger in the memory
It enables, described program, the code set or described instruction collection are loaded by the processor and executed to realize as described in relation to the first aspect
Acquisition network access information method in performed operation.
6th aspect provides a kind of device for obtaining network access information, is applied to server, and described device includes place
Device and memory are managed, is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the memory, it is described
Instruction, described program, the code set or described instruction collection are loaded by the processor and are executed to realize such as second aspect institute
Performed operation in the method for the acquisition network access information stated.
7th aspect, provides a kind of computer readable storage medium, is applied to terminal, the computer-readable storage medium
At least one instruction, at least a Duan Chengxu, code set or instruction set, described instruction, described program, the code are stored in matter
The method that collection or described instruction collection are loaded by processor and executed to realize acquisition network access information as described in relation to the first aspect
In performed operation.
Eighth aspect provides a kind of computer readable storage medium, is applied to server, the computer-readable storage
At least one instruction, at least a Duan Chengxu, code set or instruction set, described instruction, described program, the generation are stored in medium
Code collection or described instruction collection are loaded as processor and are executed the side to realize the acquisition network access information as described in second aspect
Performed operation in method.
In embodiments of the present invention, terminal to server sends password acquisition request, the password acquisition request carried terminal
The first wireless network identification of at least one searched;Receive at least one wireless network password and at least one that server provides
Belong to the second wireless network mark of non-public network in a first wireless network;It is deleted from least one wireless network password
Second wireless network identifies corresponding password, obtains remaining wireless network password;Based on remaining wireless network password and remaining
First wireless network identification generates the network access information of the first wireless network.Terminal is by the nothing of non-public network in the present invention
Line network cipher is deleted, and generates network access information according only to remaining wireless network password and the first wireless network identification, because
This, does not include the network access information of non-public network, improves accuracy in the network access information of generation.
Detailed description of the invention
Fig. 1 is a kind of schematic diagram of implementation environment provided in an embodiment of the present invention;
Fig. 2 is a kind of method flow diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 3 is another method flow diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 4 is a kind of apparatus structure schematic diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 5 is a kind of apparatus structure schematic diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 6 is a kind of apparatus structure schematic diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 7 is a kind of apparatus structure schematic diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 8 is a kind of apparatus structure schematic diagram for obtaining network access information provided in an embodiment of the present invention;
Fig. 9 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention;
Figure 10 is a kind of structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of schematic diagram of implementation environment provided in an embodiment of the present invention, and referring to Fig. 1, which includes more
A terminal 101 and at least one server 102.Pass through network connection between terminal 101 and server 102.It is run in terminal 101
The associated password of server 102 shares APP, based on password share APP can with login service device 102, thus with server 102 into
Row interaction.Password, which shares APP, can be capable of providing wireless network for skeleton key, house keeper WiFi or password cracking device etc. are any
The APP of the access service of network.
Terminal 101 can set for mobile phone terminal equipment, PAD (Portable Android Device, tablet computer) terminal
Standby or pcs terminal equipment etc. is any to be scanned for surrounding by WiFi module, and setting for wireless network identification is obtained
It is standby.
Server 102, which refers to, provides the server 102 of background service for terminal 101, can be a server 102, or
102 cluster of server or 102 center of cloud computing server that person is made of several servers 102, the present invention are real
Example is applied not limit this.In one possible implementation, server 102 can be total to for the password installed in terminal 101
Enjoy the background server of APP.
When accessing wireless network, terminal 101 needs to obtain network access information terminal 101, the network access information packet
Include wireless network password and wireless network identification.When not storing the network access information in terminal 101, terminal 101 can be with
Wireless network identification around searching for, is then based on the wireless network identification searched, requests wireless network from server 102
Password.Storing data library in server 102 includes the network access information of the wireless network of multiple known passwords in database,
The wireless network identification and wireless network password of the wireless network are stored in the network access information of each wireless network.Due to number
According to the network access information that may include non-public network in library, therefore, in order to identify which wireless network is non-public net
Network, which wireless network are open networks, and the training identification model of server 102, wireless network is the identification model for identification
No is non-public network.Server 102 sends the identification model to terminal 101.Terminal 101 receives the identification model, to history
History connection features of the third wireless network of access in the first given number of days, according to the history connection features and the identification mould
Type identifies whether 101 third wireless network of terminal is non-public network, obtains recognition result, sends third to server 102
The recognition result of wireless network.Server 102 stores the recognition result of third wireless network in the database, so as to mark this
The network type of three wireless networks is open network or non-public network.Certainly, server 102 can also be tied according to identification
Fruit only marks non-public network in the database or only marks open network.Server 102 storage wireless network password,
When wireless network identification and recognition result, it can store in the form of a label.For example, being in the database respectively each wireless network
Label is arranged in network, stored in the label of each wireless network the wireless network password of the wireless network, wireless network identification and
Recognition result.
When terminal 101 requests the wireless network password of at least one the first wireless network of search to server 102, clothes
Business device 102 is based at least one first wireless network identification and is searched in the database;When finding at least one wireless network
When belonging to the second wireless network mark of non-public network in network password and at least one first wireless network, sent out to terminal 101
At least one wireless network password and second wireless network is given to identify.Terminal 101 receives at least one nothing that server 102 provides
Line network cipher and the second wireless network mark for belonging to non-public network, delete second from least one wireless network password
The corresponding password of wireless network identification obtains remaining wireless network password, based on remaining wireless network password and remaining first
Wireless network identification generates the network access information of the first wireless network.Since terminal is close by the wireless network of non-public network
Code is deleted, and generates network access information, therefore, generation according only to remaining wireless network password and the first wireless network identification
The network access information for not including non-public network in network access information, improves accuracy.
Wireless network identification can be title and/or MAC (Media Access Control, the media visit of wireless network
Ask control) address.Network access information includes wireless network identification and wireless network password.Non-public network refers to private network
Or underground enterprise network etc..Wireless network is any wireless network for needing password that can just log in, for example, WiFi net
Network.
Fig. 2 is a kind of flow chart of the acquisition network access information method proposed according to an exemplary embodiment, in this hair
The history connection features and identification model of the third wireless network accessed based on terminal to history are mainly described in bright embodiment,
The process of identification update is carried out to the wireless network in database.As shown in Fig. 2, this method apply terminal and server it
Between, include the following steps.
201, terminal obtains history connection features of the terminal to third wireless network in the first given number of days, which connects
It connects feature and is used to indicate terminal in history networking process to the connection rule of third wireless network.
Personal property is occupied in order to prevent, terminal acquisition terminal going through in the first given number of days to third wireless network
History connection features, it is subsequent to be based on the history connection features and identification model, identify whether the third wireless network is non-public net
Network.In order to realize update and collect data, terminal can obtain a history connection features when often reaching trigger condition.It should
Trigger condition can be to reach the first given number of days or terminal close to server request when terminal accesses third wireless network
Code or terminal are every predetermined period etc..
Wherein, third wireless network is any wireless network of terminal history access.For each of terminal history access
Wireless network, terminal all pass through following steps (1) to (3) and determine history of the terminal to the wireless network in the first given number of days
Connection features.
(1) terminal obtains link information of the terminal to third wireless network in the first given number of days, the link information packet
Include the time range of terminal access third wireless network.
Terminal, can be by the link information of terminal and date storage in history linkage record in access wireless network every time
In.Therefore, terminal can be from connection of the acquisition terminal to third wireless network in the first given number of days in history linkage record
Information, the process can be with are as follows: terminal is connected according to the wireless network identification and the first given number of days of third wireless network from history
Link information of the terminal to third wireless network in the first given number of days is obtained in record, in addition to including eventually in the link information
The time range into third wireless network is terminated, can also include the wireless network mark of third wireless network in the link information
Knowledge, terminal iidentification and date.The date is used for the date property on the date.It therefore, can not also include day in the link information
Phase, and including date property, it is subsequent directly to read date property from the link information.
(2) terminal is based on the link information, determines terminal at least one fisrt feature of third wireless network, Mei Ge
One feature is used to indicate terminal in the first given number of days daily to the connection rule of third wireless network.
The link information include terminal in the first given number of days daily to the sub-information of third wireless network.Every height letter
Breath is used to indicate connection of the terminal within this day in each period.For each sub-information, terminal determines multiple times
Section, determines corresponding characteristic value of each period according to the sub-information, by corresponding eigenvalue cluster of each period at the first spy
Sign.Wherein, corresponding characteristic value of each period is used to indicate whether terminal connects third wireless network during this period of time.
For each period, terminal determines whether terminal accesses third wireless network in the period according to the sub-information
Network, will if not accessing third wireless network if access third wireless network, sets 1 for the characteristic value of the period
The characteristic value of the period is set as 0.
The time span of each period can be equal, can also be unequal, in embodiments of the present invention, does not make to have to this
Body limits.Also, the number of period, which also can according to need, to be configured and changes, in embodiments of the present invention, to this
It is not specifically limited.Also, the number of period is more, and recognition result is more accurate.
For example, due to 1 day include 24 hours, terminal can by daily 1 hour be used as a sub- period;
The continuous one or more sub- period is determined as a period.For example, terminal was divided into 24 sub- periods for 1 day,
Each sub- period is respectively as follows: 0:00~0:59,1:00~1:59,2:00~2:59,3:00~3:59,4:00~4:59,5:
00~5:59,6:00~6:59,7:00~7:59,8:00~8:59,9:00~9:59,10:00~10:59,11:00~11:
59,12:00~12:59.Continuous one to 6 sub- periods are determined as a period by terminal.Therefore, terminal can obtain
To 144 (24*6) a periods.Then the array that fisrt feature is 144, fisrt feature can indicate are as follows:
Feature_today (1)=Array (max (array (0)),
max(array(0),array(1)),
max(array(0),array(1),array(2)),
max(array(0),array(1),array(2),array(3)),
max(array(0),array(1),array(2),array(3),array(4)),
max(array(0),array(1),array(2),array(3),array(4),array(5)),
max(array(1)),
max(array(1),array(2)),
max(array(1),array(2),array(3)),
……
max(array(12),array(0),array(1),array(2),array(3),array(4))
Wherein, feature_today (1) is fisrt feature.Array (n) indicates the terminal in the n-th: 00~n of this day:
Whether third wireless network is accessed between 59.The value range of n is [0,12].Max (array (a) ... ..., array (b)) table
Show whether the terminal accesses third wireless network between a:00~b:59 of this day.
(3) terminal determines that history connects according at least one fisrt feature and the first given number of days of third wireless network
Feature.
Terminal adds up each fisrt feature, obtains second feature, by second feature be based on the first given number of days into
Row normalized obtains history connection features.
Fisrt feature and second feature are Multidimensional numerical, and the digit that fisrt feature and second feature include is identical.It is right
In every, terminal adds up the characteristic value of this in each fisrt feature, obtains the characteristic value of this in second feature.
For example, terminal determines three fisrt feature, respectively (1,1,1,1 ... 0,0,0), (1,1,1,1 ... 0,0,
0), (1,1,1,1 ... 0,0,0), terminal adds up each fisrt feature, obtain second feature be (3,3,3,3 ... 0,
0,0)。
Second feature is based on the step of the first given number of days is normalized, obtains history connection features by terminal can
To be realized by following formula one:
Formula one: input=feature_today (2) ./feature_active_day
Input is history connection features, and feature_today (2) is second feature, feature_active_day the
One given number of days ,/expression are divided by by each.
Due on weekdays when, user is in, and the time is shorter, and terminal is generally work to the connection rule of third wireless network
It is not connected to as the time, time of having a rest connection;And when nonworkdays, user is in, and the time is longer, and terminal is to third wireless network
The connection rule generally most of the time all connects.Therefore, different date property, corresponding different connection rule.In order to mention
Height identification accuracy, terminal is when determining history connection features, in conjunction with the date property on included date in the first given number of days.
Correspondingly, this step can be with are as follows:
(1) when the date property on date included in the first given number of days only includes working day or nonworkdays, eventually
Each fisrt feature is added up at end, obtains second feature, second feature is based on the first given number of days, place is normalized
Reason, obtains history connection features.
(2) when it further includes nonworkdays that the date property on date included in the first given number of days, which had both included working day,
Terminal determines third feature according to working day corresponding each fisrt feature, and according to nonworkdays corresponding each first
Feature determines fourth feature, and third feature and fourth feature are spliced, and obtains history connection features.
Terminal determines working day corresponding fisrt feature and nonworkdays corresponding from least one fisrt feature
One feature, and determine working day number of days and nonworkdays number of days in the first given number of days interior included date.Terminal is by work
Day, corresponding each fisrt feature added up, and obtains fifth feature, fifth feature is normalized based on working day number of days
Processing, obtains third feature.Equally, terminal adds up the corresponding each fisrt feature of nonworkdays, obtains sixth feature,
Sixth feature is based on nonworkdays number of days to be normalized, obtains fourth feature.
Wherein, the step of fifth feature is normalized based on working day number of days, is obtained third feature by terminal can
To be realized by following formula two:
Formula two: input1=weekday_feature./weekday_active_day
Input1 is third feature, and weekday_feature is fifth feature, and weekday_active_day is working day
Number of days ,/expression are divided by by each.
Sixth feature is based on the step of nonworkdays number of days is normalized, obtains fourth feature by terminal to lead to
Cross the realization of following formula three:
Formula three: input2=weekend_feature./weekend_active_day
Input2 is fourth feature, and weekend_feature is sixth feature, and weekend_active_day is inoperative
Day number of days ,/expression are divided by by each.
Correspondingly, terminal splices third feature and fourth feature, the step of obtaining history connection features, can lead to
Cross the realization of following formula four:
Formula four: input=input1++input2
Wherein, input is history connection features, and input1 is third feature, and input2 is fourth feature, ++ it indicates by spy
Value indicative is spliced.
It should be noted that when terminal is spliced third feature and fourth feature, terminal can will be in third feature
Primary characteristic value is spliced in last characteristic value and fourth feature, obtains history connection features.Terminal can also
Spliced with primary characteristic value in the characteristic value and third feature by last in fourth feature value, obtains history company
Connect feature.
For example, third feature and fourth feature are one 144 arrays respectively, terminal is by third feature and fourth feature
Spliced, obtained history connection features are one 288 arrays.
202, terminal inputs history connection features in identification model, exports recognition result, identification model for identification the
Whether three wireless networks are non-public network.
Before this step, server training identification model issues identification model to terminal;The terminal storage identification mould
Type.The identification model can beWherein, s=sum (input.*w).
Wherein, p is the probability that third wireless network is non-public network, and input is that the history of third wireless network connects
Feature, b are the real number that server training obtains, and w is the entity array that training obtains, and the digit of the entity array and history connect
The digit for connecing feature is equal.E is numeric constant, generally takes 2.7182..* indicate that step-by-step is multiplied.
For terminal by the history connection features output identification model of third wireless network, obtaining third wireless network is non-public affairs
Open the probability of network.When the probability be greater than preset threshold, terminal determine the recognition result be third wireless network be non-public net
Network.When the probability be not more than preset threshold, terminal determine the recognition result be third wireless network be non-public network.Wherein,
Preset threshold, which can according to need, to be configured and changes, and in embodiments of the present invention, is not especially limited to preset threshold.Example
Such as, preset threshold can be 80% or 90% etc..
Wherein, it server training and issues the process of the identification model and can be realized by following steps (1) to (4), packet
It includes:
(1) server obtain sample data, sample data include the first preset number first kind history connection features with
The second class history connection features of second preset number, first kind history connection features are that terminal is specified second to open network
History connection features in number of days, the second class history connection features be terminal to non-public network going through in third given number of days
History connection features.
For each first kind history connection features, terminal obtains specified second to disclosed 4th wireless network is belonged to
Link information in number of days, the link information include the time range that terminal accesses the 4th wireless network.Terminal is based on the connection
Information, determine terminal at least one seventh feature of the 4th wireless network, according to the 4th wireless network at least one the 7th
Feature and the second given number of days determine the first kind history connection features.Terminal to server sends first kind history connection
Feature.
Equally, for each second class history connection features, terminal, which is obtained, to exist to belonging to private 5th wireless network
Link information in third given number of days, the link information include the time range that terminal accesses the 5th wireless network.Terminal base
In the link information, determine terminal at least one eighth feature of the 5th wireless network, at least according to the 5th wireless network
One eighth feature and third given number of days determine the second class history connection features.Terminal to server sends second class
History connection features.
First preset number and the second preset number can be equal, can also be unequal.Second given number of days and third refer to
Determining number of days can be equal, can also be unequal.In order to simplify treatment process and improve accuracy, in embodiments of the present invention,
Take the first preset number and the second preset number is equal and the second given number of days and third given number of days it is equal.
It should be noted that in this step, being based on link information, determining that the process of history connection features can also take
Business device side executes.Then for each first kind history connection features, terminal is obtained to belonging to disclosed 4th wireless network the
Link information in two given number of days sends the link information to server, and server receives the link information, is based on the connection
Information determines the first kind history connection features.
For each second class connection features, terminal, which is obtained, specifies day in third to belonging to private 5th wireless network
Link information in number sends the link information to server, and server receives the link information, is determined based on the link information
The second class history connection features.
(2) server is gone through according to the first preset number first kind history connection features and the second class of the second preset number
History connection features generate identification model.
Server connects according to the first preset number first kind history connection features, the second class history of the second preset number
It connects feature and default training algorithm is trained, obtain identification model, whether wireless network is non-to the identification model for identification
Open network.The input of identification model is terminal to the history connection features of some wireless network, is exported as the wireless network
Recognition result.
Wherein, default training algorithm is the Logic Regression Models comprising w and b, by the first preset number first kind
In the second class history connection features input logic regression model of history connection features and the second preset number, w and b, root are obtained
According to w and b, identification model is determined:
Wherein, s=sum (input.*w).
(3) server sends the identification model to terminal.
The first implementation, in order to obtain the recognition result of more wireless networks, in this step, server is to peace
All terminals that dress password shares APP send the identification model, are accessed by terminal based on the identification model identification terminal history
Whether wireless network is non-public network.Correspondingly, this step can be with are as follows:
Server obtains the terminal iidentification for having installed shared password APP, and the terminal iidentification based on acquisition, sending to terminal should
Identification model.
It should be noted that server shares APP to password has currently been installed when server has trained the identification model
Terminal send the identification model.However it is shared to be fitted without password when server has trained identification model for some terminals
APP, and trained identification model that password is just installed after for a period of time in server and shared APP.In order to enable these pacify later
The terminal for filling the shared APP of password identifies whether the wireless network of history access is non-public network also by the identification model, clothes
Device be engaged in after terminal installation password shares APP, server sends the identification model to the terminal.Server can also be with every mistake
One preset duration concentrates the terminal for sharing APP to nearest installation password to send the identification model, then the every mistake first of server is default
Duration, the terminal installed in the first preset duration before current time to the set-up time send the identification model.
First preset duration, which can according to need, to be configured and changes, in embodiments of the present invention, to first it is default when
Length is not especially limited.For example, the first preset duration can be 1 month or 20 days etc..Terminal iidentification can be terminal
User's account that GUID (Globally Unique Identifier, globally unique identifier) or user register in the server
Number.The user account can be the pet name or the telephone number of user etc..
Second of implementation, since whether the identification model wireless network that terminal history accesses for identification is non-public affairs
Network is opened, malicious peer wishes it is all open network by all-network, therefore malicious peer may will do it falseness and report.In order to
It avoids malicious user from carrying out falseness to report, in this step, server can not also share all terminals of APP to installation password
The identification model is sent, and only sends the identification model to the terminal of non-malicious user.Correspondingly, this step can be with are as follows:
Server determines non-malicious terminal iidentification from the terminal iidentification for having installed the shared APP of password, whole based on non-malicious
End mark, sends the identification model to non-malicious terminal.
(1) it can store malicious peer home banking in server, include the end of malicious peer in the malicious peer home banking
End mark.Correspondingly, the step of server from the terminal iidentification for having installed the shared APP of password, determines non-malicious terminal iidentification
It can be with are as follows: server determines the end for being not included on malicious peer home banking from the terminal iidentification installed password and share APP
End mark, is determined as non-malicious terminal iidentification for the terminal iidentification determined.
(2) since malicious peer oneself non-public network, malicious peer can often may not request to server close
Code.Therefore, the generally malicious peer more to the number of server request password, the number to server request password are less
Generally non-malicious terminal.Correspondingly, server from the terminal iidentification for having installed the shared APP of password, determines non-malicious end
The step of end mark, can be with are as follows:
Server statistics have installed the request number of times that password shares each terminal to server request password of APP, according to
The request number of times of each terminal to server request password, from the terminal iidentification for having installed the shared APP of password, acquisition request time
Number is less than the terminal iidentification of preset times, and the terminal iidentification that will acquire is determined as non-malicious terminal iidentification.
In order to improve accuracy, server can also only count each terminal for having installed the shared APP of password when current
Between in pervious second preset duration to the request number of times of server request password, request number of times is lower than to the terminal of preset times
Mark is determined as non-malicious terminal iidentification.Second preset duration and preset times can be configured and change as needed,
In embodiments of the present invention, the second preset duration and preset times are all not especially limited.For example, the second preset duration can be with
It is 1 month or 2 months etc..Preset times can be 10 or 20 etc..
(3) since oneself non-public network, malicious peer often can not request password to server to malicious peer.
Therefore, the generally malicious peer more to the wireless network identification number of server request password, requests password to server
Wireless network identification it is small numbers of generally non-malicious terminal.Correspondingly, server from installed password share APP end
In the mark of end, the step of determining non-malicious terminal iidentification, can be with are as follows:
Server statistics have installed the wireless network identification number that password shares each terminal to server request password of APP
Mesh requests the wireless network identification number of password according to each terminal to server, from the terminal mark for having installed the shared APP of password
In knowledge, the terminal iidentification that wireless network identification number is lower than preset number is obtained, the terminal iidentification that will acquire is determined as non-malicious
Terminal iidentification.
Equally, in order to improve accuracy, server, which can also only count to have installed password and share each terminal of APP, is working as
To the wireless network identification number of server request password in preceding time pervious third preset duration, by wireless network identification number
Mesh is determined as non-malicious terminal iidentification lower than the terminal iidentification of preset number.Third preset duration and the second preset duration can phases
Deng can also be unequal.Also, third preset duration and preset number can be configured and change as needed, at this
In inventive embodiments, third preset duration and preset number are all not especially limited.For example, third preset duration is 1 month
Or 2 months.Preset number can be 15 or 20 etc..
203, terminal to server sends third wireless network identification and recognition result, so that server is based on recognition result
Third wireless network is marked.
204, the third wireless network identification and recognition result that server receiving terminal is sent, according to recognition result, to the
Three wireless networks are marked.
After server receives the recognition result of third wireless network, server updates the recognition result to database
In, which can be with are as follows: server determines the recognition result that third wireless network whether is stored in database, if it does, will
The recognition result of the third wireless network stored in database is updated to the recognition result of terminal transmission.
It is reported due to avoiding malicious peer from carrying out falseness, as long as having a terminal to report third wireless network is non-public net
Network, server determine that third wireless network is non-public network.Correspondingly, this step can be with are as follows:
When recognition result instruction third wireless network is to disclose network, and do not have to store third wireless network in database
When recognition result, by recognition result storage into the corresponding label of third wireless network.When recognition result instruction third is wireless
When network is non-public network, recognition result is updated into the corresponding label of third wireless network.
In this step, in order to avoid malicious peer carry out falseness report, server receive terminal transmission third without
When line network identity and recognition result, determine whether the terminal is malicious peer;If the terminal is malicious peer, the end is abandoned
Hold the third wireless network identification sent and recognition result;If the terminal is non-malicious terminal, just execute according to recognition result,
The step of third wireless network is marked.
In this step, in order to improve accuracy, server can also knowledge based on multiple terminals to third wireless network
Not as a result, third wireless network is marked.The process can be with are as follows:
Server statistics report in the terminal of the recognition result of third wireless network, and recognition result indicates third wireless network
The second terminal number that non-public network is indicated for the first terminal number and recognition result of non-public network, works as first terminal
When number is greater than second terminal number, server determines that the third wireless network is non-public network, by the third wireless network
Label in recognition result be revised as non-public network.When first terminal number is not more than second terminal number, server
Determine that the recognition result in the label of the third wireless network for open network, is revised as open net by the third wireless network
Network.
It should be noted that in this step, server receives the third wireless network identification and identification of terminal transmission
When as a result, third wireless network can not be marked according to the recognition result.And according to the recognition result, by database
In non-public network wireless network label delete, so that subsequent do not provide the wireless network of non-public network for other terminals
Password.Correspondingly, step 204 could alternatively be: the third wireless network identification and recognition result that server receiving terminal is sent.
When recognition result instruction third wireless network is non-public network, the label of third wireless network in database is deleted.
It should be noted that being that server directly reports recognition result in embodiments of the present invention.And in practical application
In, it can also be identified by server oneself.Correspondingly, the process can be with are as follows:
Terminal to server sends link information of the terminal to third wireless network in the first given number of days.Server connects
The link information is received, according to the link information, determines that terminal to the history connection features of third wireless network, is connected according to history
Feature and identification model obtain the recognition result of third wireless network, according to the recognition result, mark to third wireless network
Note.
In embodiments of the present invention, the third wireless network that terminal history accesses is known according to identification model by terminal
Not, recognition result is obtained, reports third wireless network identification and recognition result to server.Server according to the recognition result,
Third wireless network is marked.Since recognition result is what terminal was identified according to identification model, this improves knowledges
Other accuracy.Also, third wireless network is marked, according to the recognition result in order to subsequent notification in server
Which is non-public network to the terminal of request password, so that terminal deletes the wireless network password of non-public network, is only generated
The network access information of open network, improves accuracy.The present invention can also effectively evade to be led because using non-public network
The customer complaint problem of cause, also, with the increase of reporting terminal quantity, accuracy is higher and higher
Above step is the process that the wireless network of password known in database is marked in server.Server is to nothing
After gauze network is marked, terminal can request wireless network password and wireless network close by following steps from server
The mark of non-public network in code, the wireless network password of non-public network carries out in the wireless network password that server is provided
Filtering, to improve accuracy.Fig. 3 is a kind of stream of the acquisition network access information method proposed according to an exemplary embodiment
Cheng Tu, this method are applied between terminal and server, are included the following steps.
301, terminal to server send password acquisition request, the password acquisition request carried terminal search at least one
A first wireless network identification.
When the function button of the wireless network of terminal is in the open state, terminal can search for wireless network identification in real time;
When terminal searching is to wireless network identification, for the ease of distinguishing, the wireless network identification searched is known as the first wireless network
Network mark.For each of searching the first wireless network, terminal determines local whether stores first wireless network identification
Network access information;When not storing the network access information of the first wireless network identification locally, in order to obtain password, terminal is to clothes
Device of being engaged in sends password acquisition request, the password acquisition request carried terminal first wireless network identification.
Password is installed in terminal and shares APP, terminal can share APP by password asks to server transmission password acquisition
It asks.Correspondingly, terminal to server send the step of password acquisition request can be with are as follows: call password to share APP in terminal, pass through
Password shares APP and sends password acquisition request to server.Wherein, terminal can pass through system Scan list (scan list)
Password is called to share APP.
When the network access information of first wireless network identification is locally stored, terminal is based on the network access information,
The first wireless network is accessed, which can be with are as follows: terminal obtains the first wireless network identification and nothing from the network access information
Line network cipher is based on wireless network identification, sends access request to the router of the first wireless network, which carries
The wireless network password.Router receives the access request, when the wireless network password and stored wireless network password,
The terminal is allowed to access first wireless network.
302, the password acquisition request that server receiving terminal is sent, based at least one wireless network identification in database
In searched.
Storing data library in server includes the label of the wireless network of multiple known passwords, Ren Yiwu in the database
Wireless network identification, wireless network password and the recognition result of any wireless network are stored in the label of gauze network.For close
The first wireless network identification of each of code acquisition request carrying, is searched according to first wireless network identification in database.
If inquiring the corresponding label of the first wireless network in the database, server obtains first wireless network from the label
The wireless network password and recognition result of network.If not inquiring the corresponding label of the first wireless network in the database,
Continue to inquire next first wireless network, all first wireless network marks until having inquired password acquisition request carrying
Know.
When inquiring the wireless network password of at least one the first wireless network, server is according at least one wireless network
The recognition result of network determines at least one first wireless network with the presence or absence of non-public network.If at least one first nothing
There are non-public network in gauze network, server determines the second net for belonging to non-public network at least one first wireless network
Network mark, then executes step 303.If non-public network is not present at least one first wireless network, server is direct
At least one the wireless network password sent a query to the terminal.
303, belong to non-public net when finding at least one wireless network password and at least one first wireless network
When the second wireless network mark of network, server sends at least one wireless network password and second wireless network mark to terminal
Know.
When inquiring the label of the first wireless network, wireless network password is obtained from the label and this is first wireless
The recognition result of network determines that determination belongs to non-public network from least one first wireless network according to the recognition result
Second wireless network mark.
304, terminal receives at least one wireless network password and the second nothing for receiving server offer that server is sent
Line network identity deletes second wireless network from least one wireless network password and identifies corresponding password, obtains remaining nothing
Line network cipher.
Second wireless network identifies the network identity for belonging to non-public network, belongs to the second wireless network of non-public network
Mark by any terminal based on to itself access wireless network history connection features and identification model identified to obtain.At this
In inventive embodiments, terminal deletes second wireless network from least one wireless network password and identifies corresponding password, thus
Effectively evade because of customer complaint problem caused by using non-public network.
305, terminal is based on remaining wireless network password and remaining first wireless network identification, generates the first wireless network
Network access information.
For remaining each first wireless network, terminal is by the wireless network password and wireless network of first wireless network
The network access information of network mark the first wireless network of composition.The subsequent network access information for being directly based upon first wireless network
Access first wireless network.
It should be noted that if there is no non-public networks namely server to look at least one first wireless network
Each of asking the first wireless network is open network, then step 304 and 305 could alternatively be:
Terminal receives at least one wireless network password inquired that server is sent, and is based on each wireless network password
With each first wireless network identification, the network access information of the first wireless network is generated.
It should be noted that the terminal in terminal and above step 201-204 in step 301-305 can be same
Terminal, or different terminals.
In embodiments of the present invention, terminal to server sends password acquisition request, the password acquisition request carried terminal
The first wireless network identification of at least one searched;Receive at least one wireless network password and at least one that server provides
Belong to the second wireless network mark of non-public network in a first wireless network;It is deleted from least one wireless network password
Second wireless network identifies corresponding password, obtains remaining wireless network password;Based on remaining wireless network password and remaining
First wireless network identification generates the network access information of the first wireless network.Terminal is by the nothing of non-public network in the present invention
Line network cipher is deleted, and generates network access information according only to remaining wireless network password and the first wireless network identification, because
This, does not include the network access information of non-public network, improves accuracy in the network access information of generation.
Fig. 4 is a kind of apparatus structure schematic diagram of the acquisition network access information proposed according to an exemplary embodiment, should
Device is applied in terminal.Referring to fig. 4, which includes:
First sending module 401, for sending password acquisition request, the search of password acquisition request carried terminal to server
The first wireless network identification of at least one arrived;
First receiving module 402, for receive server offer at least one wireless network password and at least one the
Belong to the second wireless network mark of non-public network in one wireless network;
Removing module 403, it is corresponding close for deleting second wireless network mark from least one wireless network password
Code, obtains remaining wireless network password;
Generation module 404, for generating first based on remaining wireless network password and remaining first wireless network identification
The network access information of wireless network.
In a possible implementation, the second wireless network mark for belonging to non-public network is based on by any terminal
The history connection features and identification model of itself access wireless network are identified to obtain.
Referring to Fig. 5, in a possible implementation, the device further include:
First obtains module 405, connects for obtaining terminal to history of the third wireless network in the first given number of days
Feature, history connection features are used to indicate terminal in history networking process to the connection rule of third wireless network;
Identification module 406 exports recognition result, identification model is used for inputting history connection features in identification model
In identification third wireless network whether be non-public network;
Third sending module 407, for sending third wireless network identification and recognition result to server, so that server
Third wireless network is marked based on recognition result.
In a possible implementation, first obtains module 405, is also used to obtain terminal and exists to third wireless network
Link information in first given number of days, link information include the time range of terminal access third wireless network;Based on connection
Information determines terminal at least one fisrt feature of third wireless network, and each fisrt feature is used to indicate terminal first
Daily to the connection rule of third wireless network in given number of days;According at least one fisrt feature of third wireless network and
One given number of days determines history connection features.
In a possible implementation, first obtains module 405, is also used to when included day in the first given number of days
When the date property of phase only includes working day or nonworkdays, each fisrt feature is added up, obtains second feature, it will
Second feature is based on the first given number of days and is normalized, and obtains history connection features;
First obtains module 405, is also used to when the date property on included date in the first given number of days both include work
When day further includes nonworkdays, according to working day corresponding each fisrt feature, third feature is determined, and according to nonworkdays
Corresponding each fisrt feature, determines fourth feature, third feature and fourth feature is spliced, and it is special to obtain history connection
Sign.
In embodiments of the present invention, terminal to server sends password acquisition request, the password acquisition request carried terminal
The first wireless network identification of at least one searched;Receive at least one wireless network password and at least one that server provides
Belong to the second wireless network mark of non-public network in a first wireless network;It is deleted from least one wireless network password
Second wireless network identifies corresponding password, obtains remaining wireless network password;Based on remaining wireless network password and remaining
First wireless network identification generates the network access information of the first wireless network.Terminal is by the nothing of non-public network in the present invention
Line network cipher is deleted, and generates network access information according only to remaining wireless network password and the first wireless network identification, because
This, does not include the network access information of non-public network, improves accuracy in the network access information of generation.
Fig. 6 is a kind of apparatus structure schematic diagram of the acquisition network access information proposed according to an exemplary embodiment, should
Device is applied in server.Referring to Fig. 6, which includes:
Second receiving module 501, for receiving the password acquisition request of terminal transmission, password acquisition request carried terminal is searched
At least one first wireless network identification that rope arrives;
Searching module 502, for being searched in the database based at least one first wireless network identification;
Second sending module 503 finds at least one wireless network password and at least one first wireless network for working as
When belonging to the second wireless network mark of non-public network in network, at least one wireless network password and the second nothing are sent to terminal
Line network identity.
Referring to Fig. 7, in a possible implementation, the device further include:
Third receiving module 504, for receiving the third wireless network identification and recognition result of terminal transmission, recognition result
It is used to indicate whether third wireless network is non-public network;
Mark module 505, for according to recognition result, third wireless network to be marked.
In a possible implementation, mark module 505 is also used to indicate that third wireless network is when recognition result
Open network, and when not having to store the recognition result of third wireless network in database, by recognition result storage to third without
In the corresponding label of gauze network;
Mark module 505 is also used to when recognition result indicates that third wireless network is non-public network, by recognition result
It updates in the corresponding label of third wireless network.
Referring to Fig. 8, in a possible implementation, device further include:
Second obtains module 506, and for obtaining sample data, sample data includes the first preset number first kind history
The second class history connection features of connection features and the second preset number, first kind history connection features are terminal to open network
History connection features in the second given number of days, the second class history connection features are that terminal is specified in third to non-public network
History connection features in number of days;
Generation module 507, for according to the first preset number first kind history connection features and the second preset number
Second class history connection features generate identification model;
4th sending module 508, for sending identification model to terminal.
In embodiments of the present invention, terminal to server sends password acquisition request, the password acquisition request carried terminal
The first wireless network identification of at least one searched;Receive at least one wireless network password and at least one that server provides
Belong to the second wireless network mark of non-public network in a first wireless network;It is deleted from least one wireless network password
Second wireless network identifies corresponding password, obtains remaining wireless network password;Based on remaining wireless network password and remaining
First wireless network identification generates the network access information of the first wireless network.Terminal is by the nothing of non-public network in the present invention
Line network cipher is deleted, and generates network access information according only to remaining wireless network password and the first wireless network identification, because
This, does not include the network access information of non-public network, improves accuracy in the network access information of generation.
It should be understood that the device provided by the above embodiment for obtaining network access information is obtaining network access information
When, only the example of the division of the above functional modules, in practical application, it can according to need and divide above-mentioned function
With being completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete above description
All or part of function.In addition, the device provided by the above embodiment for obtaining network access information and acquisition network insertion
The embodiment of the method for information belongs to same design, and specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 9 is a kind of structural schematic diagram of terminal provided in an embodiment of the present invention.The terminal can be used for implementing above-mentioned reality
Apply function performed by the terminal in the method for obtaining network access information shown by example.Specifically:
Terminal 900 may include RF (Radio Frequency, radio frequency) circuit 910, include one or more meter
The memory 920 of calculation machine readable storage medium storing program for executing, display unit 940, sensor 950, voicefrequency circuit 960, passes input unit 930
The components such as defeated module 970, the processor 980 for including one or more than one processing core and power supply 990.This field
Technical staff is appreciated that the restriction of the not structure paired terminal of terminal structure shown in Fig. 9, may include than illustrate it is more or
Less component perhaps combines certain components or different component layouts.Wherein:
RF circuit 910 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, one or the processing of more than one processor 980 are transferred to;In addition, the data for being related to uplink are sent to
Base station.In general, RF circuit 910 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillators, uses
Family identity module (SIM) card, transceiver, coupler, LNA (Low Noise Amplifier, low-noise amplifier), duplex
Device etc..In addition, RF circuit 910 can also be communicated with network and other terminals by wireless communication.The wireless communication can make
With any communication standard or agreement, and including but not limited to GSM (Global System of Mobile communication, entirely
Ball mobile communcations system), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code
Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple
Access, wideband code division multiple access), LTE (Long Term Evolution, long term evolution), Email, SMS (Short
Messaging Service, short message service) etc..
Memory 920 can be used for storing software program and module, the institute of the terminal as shown by the above exemplary embodiments
Corresponding software program and module, processor 980 are stored in the software program and module of memory 920 by operation, from
And application and data processing are performed various functions, such as realize the interaction based on video.Memory 920 can mainly include storage
Program area and storage data area, wherein storing program area can application program needed for storage program area, at least one function
(such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for terminal 900
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 920 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.Correspondingly, memory 920 can also include Memory Controller, to provide processor 980 and 930 pairs of input unit storages
The access of device 920.
Input unit 930 can be used for receiving the number or character information of input, and generate and user setting and function
Control related keyboard, mouse, operating stick, optics or trackball signal input.Specifically, input unit 930 may include touching
Sensitive surfaces 931 and other input terminals 932.Touch sensitive surface 931, also referred to as touch display screen or Trackpad are collected and are used
Family on it or nearby touch operation (such as user using any suitable object or attachment such as finger, stylus in touch-sensitive table
Operation on face 931 or near touch sensitive surface 931), and corresponding linked set is driven according to preset formula.It is optional
, touch sensitive surface 931 may include both touch detecting apparatus and touch controller.Wherein, touch detecting apparatus detection is used
The touch orientation at family, and touch operation bring signal is detected, transmit a signal to touch controller;Touch controller is from touch
Touch information is received in detection device, and is converted into contact coordinate, then gives processor 980, and can receive processor 980
The order sent simultaneously is executed.Furthermore, it is possible to using multiple types such as resistance-type, condenser type, infrared ray and surface acoustic waves
Realize touch sensitive surface 931.In addition to touch sensitive surface 931, input unit 930 can also include other input terminals 932.Specifically,
Other input terminals 932 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.),
One of trace ball, mouse, operating stick etc. are a variety of.
Display unit 940 can be used for showing information input by user or the information and terminal 900 that are supplied to user
Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof.
Display unit 940 may include display panel 941, optionally, can use LCD (Liquid Crystal Display, liquid crystal
Show device), the forms such as OLED (Organic Light-Emitting Diode, Organic Light Emitting Diode) configure display panel
941.Further, touch sensitive surface 931 can cover display panel 941, when touch sensitive surface 931 detects touching on it or nearby
After touching operation, processor 980 is sent to determine the type of touch event, is followed by subsequent processing device 980 according to the type of touch event
Corresponding visual output is provided on display panel 941.Although touch sensitive surface 931 and display panel 941 are conducts in Fig. 9
Two independent components realize input and input function, but in some embodiments it is possible to by touch sensitive surface 931 and display
Panel 941 is integrated and realizes and outputs and inputs function.
Terminal 900 may also include at least one sensor 950, such as optical sensor, motion sensor and other sensings
Device.Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 941, and proximity sensor can close display when terminal 900 is moved in one's ear
Panel 941 and/or backlight.As a kind of motion sensor, gravity accelerometer can detect in all directions (generally
Three axis) acceleration size, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (ratio
Such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap);Extremely
In other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensors that terminal 900 can also configure, herein
It repeats no more.
Voicefrequency circuit 960, loudspeaker 961, microphone 962 can provide the audio interface between user and terminal 900.Audio
Electric signal after the audio data received conversion can be transferred to loudspeaker 961, be converted to sound by loudspeaker 961 by circuit 960
Sound signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 962, after being received by voicefrequency circuit 960
Audio data is converted to, then by after the processing of audio data output processor 980, such as another end is sent to through RF circuit 910
End, or audio data is exported to memory 920 to be further processed.Voicefrequency circuit 960 is also possible that earphone jack,
To provide the communication of peripheral hardware earphone Yu terminal 900.
Terminal 900 can help user to send and receive e-mail, browse webpage and access streaming video by transmission module 970
Deng, it for user provide broadband internet wirelessly or non-wirelessly access.It, can be with although Fig. 9 shows transmission module 970
Understand, and be not belonging to must be configured into for terminal 900, can according to need the range in the essence for not changing invention completely
It is interior and omit.
Processor 980 is the control centre of terminal 900, utilizes each portion of various interfaces and route link whole mobile phone
Point, by running or execute the software program and/or module that are stored in memory 920, and calls and be stored in memory 920
Interior data execute the various functions and processing data of terminal 900, to carry out integral monitoring to mobile phone.Optionally, processor
980 may include one or more processing cores;Preferably, processor 980 can integrate application processor and modem processor,
Wherein, the main processing operation system of application processor, user interface and application program etc., modem processor mainly handles nothing
Line communication.It is understood that above-mentioned modem processor can not also be integrated into processor 980.
Terminal 900 further includes the power supply 990 (such as battery) powered to all parts, it is preferred that power supply can pass through electricity
Management system and processor 980 are logically contiguous, to realize management charging, electric discharge and power consumption by power-supply management system
The functions such as management.Power supply 990 can also include one or more direct current or AC power source, recharging system, power supply event
Hinder the random components such as detection circuit, power adapter or inverter, power supply status indicator.
Although being not shown, terminal 900 can also include camera, bluetooth module etc., and details are not described herein.Specifically in this reality
Apply in example, the display unit of terminal 900 is touch-screen display, terminal 900 further include have memory and at least one instruction,
At least a Duan Chengxu, code set or instruction set, wherein at least one instruction, an at least Duan Chengxu, code set or instruction set storage
It in memory, and is configured to be loaded and executed by one or more than one processor, to realize in above-described embodiment
Obtain operation performed in the method for network access information.
Figure 10 is a kind of structural schematic diagram of server provided in an embodiment of the present invention;The server 1000 can because configuration or
Performance is different and generates bigger difference, may include one or more central processing units (central
Processing units, CPU) 1022 (for example, one or more processors) and memory 1032, one or one with
The storage medium 1030 (such as one or more mass memory units) of upper storage application program 1042 or data 1044.Its
In, memory 1032 and storage medium 1030 can be of short duration storage or persistent storage.It is stored in the program of storage medium 1030
It may include one or more modules (diagram does not mark), each module may include to the series of instructions in server
Operation.Further, central processing unit 1022 can be set to communicate with storage medium 1030, execute on server 1000
Series of instructions operation in storage medium 1030.
Server 1000 can also include one or more power supplys 1026, one or more wired or wireless nets
Network interface 1050, one or more input/output interfaces 1058, one or more keyboards 1056, and/or, one or
More than one operating system 1041, such as Windows ServerTM, Mac OS XTM, UnixTM,LinuxTM, FreeBSDTMDeng
Deng.
The server 1000 can be used for executing to be serviced in the method provided by the above embodiment for obtaining network access information
Step performed by device.
The embodiment of the invention also provides a kind of device for obtaining network access information, which is applied to terminal, the dress
It sets including processor and memory, is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in memory,
Instruction, program, code set or instruction set are loaded by processor and are executed the acquisition network access information to realize above-described embodiment
Method in operation performed by terminal.
The embodiment of the invention also provides a kind of device for obtaining network access information, which is applied to server, should
Device includes processor and memory, and at least one instruction, at least a Duan Chengxu, code set or instruction are stored in memory
Collection, instruction, program, code set or instruction set are loaded by processor and are executed the acquisition network insertion letter to realize above-described embodiment
Operation performed by server in the method for breath.
The embodiment of the invention also provides a kind of computer readable storage medium, which is applied to
Terminal is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the computer readable storage medium, should
Instruction, the program, the code set or the instruction set are loaded by processor and executed to be connect with the acquisition network for realizing above-described embodiment
Enter operation performed by terminal in the method for information.
The embodiment of the invention also provides a kind of computer readable storage medium, which is applied to
Server is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the computer readable storage medium,
The instruction, the program, the code set or the instruction set are loaded by processor and are executed the acquisition network to realize above-described embodiment
Operation performed by server in the method for access information.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware
It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable
In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and
Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.
Claims (15)
1. a kind of method for obtaining network access information, which is characterized in that be applied to terminal, which comprises
Send password acquisition request to server, the password acquisition request carry that the terminal searching arrives at least one first
Wireless network identification;
It receives at least one wireless network password and at least one first wireless network that the server provides and belongs to non-public affairs
Open the second wireless network mark of network;
The second wireless network is deleted from least one described wireless network password and identifies corresponding password, obtains remaining nothing
Line network cipher;
Based on the remaining wireless network password and remaining first wireless network identification, the network for generating the first wireless network is connect
Enter information.
2. the method according to claim 1, wherein the second wireless network mark for belonging to non-public network
By any terminal based on to itself access wireless network history connection features and identification model identified to obtain.
3. the method according to claim 1, wherein it is described to server send password acquisition request before, institute
State method further include:
Obtain history connection features of the terminal to third wireless network in the first given number of days, the history connection features
The terminal is used to indicate in history networking process to the connection rule of the third wireless network;
The history connection features are inputted in identification model, export recognition result, the identification model for identification described the
Whether three wireless networks are non-public network;
Third wireless network identification and the recognition result are sent to the server, so that the server is based on the identification
As a result the third wireless network is marked.
4. according to the method described in claim 3, it is characterized in that, described obtain the terminal to third wireless network first
History connection features in given number of days, comprising:
Obtain link information of the terminal to the third wireless network in first given number of days, the link information
The time range of the third wireless network is accessed including the terminal;
Based on the link information, determine the terminal at least one fisrt feature of the third wireless network, Mei Ge
One feature is used to indicate the terminal in first given number of days daily to the connection rule of the third wireless network;
According at least one fisrt feature of the third wireless network and first given number of days, the history connection is determined
Feature.
5. according to the method described in claim 4, it is characterized in that, it is described according to the third wireless network at least one
One feature and first given number of days, determine the history connection features, comprising:
It, will be each when the date property on included date in first given number of days only includes working day or nonworkdays
Fisrt feature adds up, and obtains second feature, the second feature is based on first given number of days, place is normalized
Reason, obtains the history connection features;
When it further includes nonworkdays that the date property on included date in first given number of days, which had both included working day, according to
Working day corresponding each fisrt feature determines third feature, and according to the corresponding each fisrt feature of nonworkdays, determines
Fourth feature splices the third feature and the fourth feature, obtains the history connection features.
6. a kind of method for obtaining network access information, which is characterized in that be applied to server, which comprises
Receive the password acquisition request that terminal is sent, the password acquisition request carry that the terminal searching arrives at least one the
One wireless network identification;
It is searched in the database based at least one described first wireless network identification;
Belong to the second of non-public network when finding at least one wireless network password and at least one first wireless network
When wireless network identification, Xiang Suoshu terminal sends at least one described wireless network password and second wireless network mark.
7. according to the method described in claim 6, it is characterized in that, it is described receive terminal send password acquisition request before,
The method also includes:
The third wireless network identification and recognition result that the terminal is sent are received, it is wireless that the recognition result is used to indicate third
Whether network is non-public network;
According to the recognition result, the third wireless network is marked.
8. wireless to the third the method according to the description of claim 7 is characterized in that described according to the recognition result
Network is marked, comprising:
When the recognition result indicates that the third wireless network is open network, and without storing described the in the database
When the recognition result of three wireless networks, by recognition result storage into the corresponding label of the third wireless network;
When the recognition result indicates that the third wireless network is non-public network, the recognition result is updated to described
In the corresponding label of third wireless network.
9. method according to claim 6 or 7, which is characterized in that it is described receive terminal send password acquisition request it
Before, the method also includes:
Sample data is obtained, the sample data includes the first preset number first kind history connection features and the second present count
The second class history connection features of mesh, first kind history connection features are terminal to open network going through in the second given number of days
History connection features, the second class history connection features are that terminal connects spy to history of the non-public network in third given number of days
Sign;
Connected according to the first preset number first kind history connection features and the second class history of second preset number
Feature is connect, identification model is generated;
The identification model is sent to terminal.
10. a kind of device for obtaining network access information, which is characterized in that be applied to terminal, described device includes:
First sending module, for sending password acquisition request to server, the password acquisition request carries the terminal and searches
At least one first wireless network identification that rope arrives;
First receiving module, for receiving at least one wireless network password and at least one first nothing that the server provides
Belong to the second wireless network mark of non-public network in gauze network;
Removing module, it is corresponding close for deleting the second wireless network mark from least one described wireless network password
Code, obtains remaining wireless network password;
Generation module, for generating the first nothing based on the remaining wireless network password and remaining first wireless network identification
The network access information of gauze network.
11. a kind of device for obtaining network access information, which is characterized in that be applied to server, described device includes:
Second receiving module, for receiving the password acquisition request of terminal transmission, the password acquisition request carries the terminal
The first wireless network identification of at least one searched;
Searching module, for being searched in the database based at least one described first wireless network identification;
Second sending module belongs to for working as to find at least one wireless network password and at least one first wireless network
When the second wireless network mark of non-public network, Xiang Suoshu terminal sends at least one described wireless network password and described the
Two wireless network identifications.
12. it is a kind of obtain network access information device, which is characterized in that be applied to terminal, described device include processor and
Memory is stored at least one instruction, at least a Duan Chengxu, code set or instruction set, described instruction, institute in the memory
Program, the code set or described instruction collection is stated to be loaded by the processor and executed to realize such as any power of claim 1 to 5
Benefit requires operation performed in the method for the acquisition network access information.
13. a kind of device for obtaining network access information, which is characterized in that be applied to server, described device includes processor
And memory, it is stored at least one instruction, at least a Duan Chengxu, code set or instruction set in the memory, described instruction,
Described program, the code set or described instruction collection are loaded by the processor and are executed to realize as claim 6 to 9 is any
Operation performed in the method for network access information is obtained described in claim.
14. a kind of computer readable storage medium, which is characterized in that be applied to terminal, in the computer readable storage medium
Be stored at least one instruction, at least a Duan Chengxu, code set or instruction set, described instruction, described program, the code set or
Described instruction collection is loaded by processor and is executed to realize that acquisition network according to any one of claims 1 to 5 connects
Enter operation performed in the method for information.
15. a kind of computer readable storage medium, which is characterized in that be applied to server, the computer readable storage medium
In be stored at least one instruction, at least a Duan Chengxu, code set or instruction set, described instruction, described program, the code set
Or described instruction collection is as processor loads and executes to realize the acquisition network as described in claim 6 to 9 any claim
Performed operation in the method for access information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710792292.0A CN109429229B (en) | 2017-09-05 | 2017-09-05 | Method, device and computer readable storage medium for acquiring network access information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710792292.0A CN109429229B (en) | 2017-09-05 | 2017-09-05 | Method, device and computer readable storage medium for acquiring network access information |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109429229A true CN109429229A (en) | 2019-03-05 |
CN109429229B CN109429229B (en) | 2021-06-01 |
Family
ID=65514141
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710792292.0A Active CN109429229B (en) | 2017-09-05 | 2017-09-05 | Method, device and computer readable storage medium for acquiring network access information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109429229B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951846A (en) * | 2019-03-25 | 2019-06-28 | 腾讯科技(深圳)有限公司 | Wireless network recognition methods, device, storage medium and computer equipment |
CN110519130A (en) * | 2019-07-16 | 2019-11-29 | 中移(杭州)信息技术有限公司 | Equipment method of network entry and system |
CN115226074A (en) * | 2021-03-31 | 2022-10-21 | 深圳市万普拉斯科技有限公司 | Data backup method, device and system and electronic equipment |
CN117596600A (en) * | 2023-12-06 | 2024-02-23 | 北京清远博创科技有限公司 | Wireless network access method, system and routing device |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080195741A1 (en) * | 2007-02-13 | 2008-08-14 | Devicescape Software, Inc. | System and method for enabling wireless social networking |
CN102685750A (en) * | 2012-06-12 | 2012-09-19 | 刘梦阳 | Method for accessing wireless network, equipment and wireless network system |
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN103458408A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN104506501A (en) * | 2014-12-12 | 2015-04-08 | 中兴通讯股份有限公司 | Method and system for realizing shared WALN (Wireless Local Area Network) management and WLAN shared registration server |
CN104618873A (en) * | 2015-01-15 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method and device for sharing access point information |
CN106385679A (en) * | 2016-08-30 | 2017-02-08 | 乐视控股(北京)有限公司 | WIFI password sharing method and device |
US9686238B1 (en) * | 2016-07-07 | 2017-06-20 | Oceus Networks Inc. | Secure network enrollment |
-
2017
- 2017-09-05 CN CN201710792292.0A patent/CN109429229B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080195741A1 (en) * | 2007-02-13 | 2008-08-14 | Devicescape Software, Inc. | System and method for enabling wireless social networking |
CN102685750A (en) * | 2012-06-12 | 2012-09-19 | 刘梦阳 | Method for accessing wireless network, equipment and wireless network system |
CN103458409A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN103458408A (en) * | 2013-08-19 | 2013-12-18 | 小米科技有限责任公司 | Network connection method and network sharing method and device |
CN104506501A (en) * | 2014-12-12 | 2015-04-08 | 中兴通讯股份有限公司 | Method and system for realizing shared WALN (Wireless Local Area Network) management and WLAN shared registration server |
CN104618873A (en) * | 2015-01-15 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method and device for sharing access point information |
US9686238B1 (en) * | 2016-07-07 | 2017-06-20 | Oceus Networks Inc. | Secure network enrollment |
CN106385679A (en) * | 2016-08-30 | 2017-02-08 | 乐视控股(北京)有限公司 | WIFI password sharing method and device |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109951846A (en) * | 2019-03-25 | 2019-06-28 | 腾讯科技(深圳)有限公司 | Wireless network recognition methods, device, storage medium and computer equipment |
CN110519130A (en) * | 2019-07-16 | 2019-11-29 | 中移(杭州)信息技术有限公司 | Equipment method of network entry and system |
CN110519130B (en) * | 2019-07-16 | 2021-06-29 | 中移(杭州)信息技术有限公司 | Equipment network access method and system |
CN115226074A (en) * | 2021-03-31 | 2022-10-21 | 深圳市万普拉斯科技有限公司 | Data backup method, device and system and electronic equipment |
CN117596600A (en) * | 2023-12-06 | 2024-02-23 | 北京清远博创科技有限公司 | Wireless network access method, system and routing device |
CN117596600B (en) * | 2023-12-06 | 2024-06-11 | 北京清远博创科技有限公司 | Wireless network access method, system and routing device |
Also Published As
Publication number | Publication date |
---|---|
CN109429229B (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105824958B (en) | A kind of methods, devices and systems of inquiry log | |
CN104639672B (en) | The method and apparatus for carrying out domain name mapping | |
CN104618217B (en) | Share method, terminal, server and the system of resource | |
CN107204964B (en) | Authority management method, device and system | |
CN107357725B (en) | Application testing method and device | |
CN104618873B (en) | Access-in point information sharing method and device | |
CN104427074B (en) | A kind of methods, devices and systems for showing incoming information | |
CN106612250A (en) | Resource utilization authority judgment system and method | |
CN109429229A (en) | Obtain the method, apparatus and computer readable storage medium of network access information | |
CN104699501B (en) | A kind of method and device for running application program | |
CN111078556B (en) | Application testing method and device | |
CN109857297A (en) | Information processing method and terminal device | |
CN104253870B (en) | The method and apparatus of control data access cycle | |
CN106713608A (en) | Application function state modifying method and apparatus, and terminal | |
CN107465802A (en) | A kind of methods, devices and systems for showing communication message | |
CN104424211A (en) | Microblog-based service data release method, device and system | |
CN106919458A (en) | The method and device of Hook target kernel functions | |
CN108537027A (en) | Resource allocation methods and device, terminal, computer readable storage medium | |
CN108897846A (en) | Information search method, equipment and computer readable storage medium | |
CN108809805A (en) | A kind of information interacting method, system and public's account client | |
CN110445746A (en) | Cookie acquisition methods, device and storage equipment | |
CN106708500B (en) | Unload the display methods and device at interface | |
CN105897917B (en) | Multi-medium data sharing method and device | |
CN104966205A (en) | Object draw-off method and apparatus | |
CN107766351A (en) | The recognition methods of file directory and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |