CN109996228A - A kind of information processing method and electronic equipment - Google Patents
A kind of information processing method and electronic equipment Download PDFInfo
- Publication number
- CN109996228A CN109996228A CN201910253261.7A CN201910253261A CN109996228A CN 109996228 A CN109996228 A CN 109996228A CN 201910253261 A CN201910253261 A CN 201910253261A CN 109996228 A CN109996228 A CN 109996228A
- Authority
- CN
- China
- Prior art keywords
- electronic equipment
- verification information
- information
- matching result
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/08—Access restriction or access information delivery, e.g. discovery data delivery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of information processing method and electronic equipment, method includes: the identification information that the first electronic equipment obtains characterization of electronic equipment mark;Wherein, first electronic equipment has the first verification information, and whether second verification information of first verification information for determining that the third electronic equipment of request gain access is sent meets condition;First electronic equipment sends the identification information to the second electronic equipment;First electronic equipment obtains matching result, the matching result is that second electronic equipment is obtained based on the identification information match, it is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third verification information can be identical with first verification information;If the matching result meets execution condition, first electronic equipment executes processing order, and first verification information is enabled to be in the state that can not be obtained by second electronic equipment.
Description
Technical field
This application involves field of communication technology more particularly to a kind of information processing methods and electronic equipment.
Background technique
User the case where leakage there are the verification information of electronic equipment, knows verifying during using electronic equipment
Verification information is intentionally or accidentally uploaded to server by the other users of information, so that server is stored with verification information, at this
In the case of kind, user without permission can obtain corresponding visit after obtaining verification information by server based on verification information
It asks permission, in turn results in user information leakage, safety reduction etc..
Summary of the invention
The embodiment of the present application provides a kind of information processing method, comprising:
First electronic equipment obtains the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has
First verification information, the second of third electronic equipment transmission of first verification information for determining request gain access
Whether verification information meets condition;
First electronic equipment sends the identification information to the second electronic equipment;
First electronic equipment obtains matching result, and the matching result is that second electronic equipment is based on the mark
Know information matches to obtain, is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third
Verification information can be identical with first verification information;
If the matching result meets execution condition, first electronic equipment executes processing order, so that described the
One verification information can be in the state that can not be obtained by second electronic equipment.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing
The state that method is obtained by second electronic equipment, comprising:
The existence according to indicated by the matching result determines that the third verification information is in obtainable
State;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition
State.
In above scheme, the matching result carries the third verification information and also wraps before the execution processing order
It includes:
First verifying of the third verification information and first electronic equipment that the matching result is carried
Information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined
First verification information of equipment matches.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing
The state that method is obtained by second electronic equipment, comprising:
First electronic equipment exports prompt information, and the prompt information shows that the third verification information can pass through institute
State the state of the second electronic equipment acquisition.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing
The state that method is obtained by second electronic equipment, comprising:
First verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice
Ask permission.
In above scheme, the 4th electronic equipment for notifying gain access is changed to the 4th verification information
Regain the access authority, comprising:
After first verification information is revised as the 4th verification information by first electronic equipment, first electricity
Sub- equipment notifies the 4th electronic equipment to be changed to the 4th verification information and regain the access authority.
It is described that first verification information is revised as the 4th verification information in above scheme, comprising:
The 4th electronic equipment is notified to be changed to the 4th verification information and regain institute in first electronic equipment
After stating access authority, first verification information is revised as the 4th verification information by first electronic equipment.
In above scheme, the method also includes:
Receive the connection for carrying first verification information or the third verification information of the 5th electronic equipment transmission
Request;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics
Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th
Electronic equipment.
In above scheme, the gain access refers to: obtaining and accesses the second network by first electronic equipment
Permission;
Wherein, first electronic equipment is located at second network and first network, and the first network is described
The network that three electronic equipments and first electronic equipment can be established, second electronic equipment are located at second network.
Present invention also provides a kind of first electronic equipments, comprising:
First obtains module, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment
With the first verification information, first verification information is for determining what the third electronic equipment of request gain access was sent
Whether the second verification information meets condition;
Sending module, for sending the identification information to the second electronic equipment;
Second obtains module, and for obtaining matching result, the matching result is described in second electronic equipment is based on
Identification information match obtains, and is used to indicate the existence of the third verification information of the corresponding identification information, wherein described the
Three verification informations can be identical with first verification information;
Execution module executes processing order, so that described first tests if meeting execution condition for the matching result
Demonstrate,proving information can be in the state that can not be obtained by second electronic equipment.
In above scheme, the execution module, specifically for the existence according to indicated by the matching result,
Determine that the third verification information is in obtainable state;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition
State.
In above scheme, the matching result carries the third verification information, and first electronic equipment further includes ratio
To module;
The comparison module, the third verification information for carrying the matching result are set with first electronics
Standby first verification information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined
First verification information of equipment matches.
In above scheme, the execution module is specifically used for output prompt information, and the prompt information shows the third
The state that verification information can be obtained by second electronic equipment.
In above scheme, the execution module, specifically for first verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice
Ask permission.
In above scheme, the execution module, specifically for first verification information is being revised as the 4th verifying letter
After breath, the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
In above scheme, the execution module, specifically for notifying the 4th electronic equipment to be changed to the described 4th and test
After card information regains the access authority, first verification information is revised as the 4th verification information.
In above scheme, first electronic equipment further include:
Feedback module, carrying first verification information or the third for receiving the transmission of the 5th electronic equipment are tested
Demonstrate,prove the connection request of information;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics
Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th
Electronic equipment.
Have following advantageous effects using the above embodiments of the present application:
The matching result that first electronic equipment is returned based on the second electronic equipment determines that matching result meets execution condition
When, the first electronic equipment executes processing order, and the first verification information is in can not be by the acquisition of the second electronic equipment
State;In this way, avoiding the leakage of the first verification information, the safety of user information is improved.
Detailed description of the invention
Fig. 1 is the flow diagram one of information processing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram two of information processing method provided by the embodiments of the present application;
Fig. 3 is the flow diagram three of information processing method provided by the embodiments of the present application;
Fig. 4 is the composed structure schematic diagram one of the first electronic equipment provided by the embodiments of the present application;
Fig. 5 is the composed structure schematic diagram two of the first electronic equipment provided by the embodiments of the present application.
Specific embodiment
With reference to the accompanying drawings and embodiments, the application is further elaborated.It should be appreciated that mentioned herein
Embodiment is only used to explain the application, is not used to limit the application.In addition, embodiment provided below is for implementing
The section Example of the application, rather than the whole embodiments for implementing the application are provided, in the absence of conflict, the application is implemented
Example record technical solution can mode in any combination implement.
It should be noted that in the embodiment of the present application, the terms "include", "comprise" or its any other variant are intended to
Cover non-exclusive inclusion, so that including the method for a series of elements or device not only includes wanting of being expressly recited
Element, but also including other elements that are not explicitly listed, or further include for implementation method or device intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element
Method or device in there is also other relevant factor (such as the step in method or the unit in device, for example,
Unit can be partial circuit, segment processor, subprogram or software etc.).
For example, information processing method provided by the embodiments of the present application contains a series of step, but the application is implemented
The information processing method that example provides is not limited to documented step, similarly, video process apparatus provided by the embodiments of the present application
It include a series of modules, but device provided by the embodiments of the present application is not limited to include module be expressly recited, it can be with
The unit of required setting when including to obtain relevant information or handled based on information.
In the following description, related term " first second third etc. " be only be the similar object of difference,
The particular sorted for object is not represented, it is possible to understand that ground, " first second third etc. " can be interchanged in the case where permission
Specific sequence or precedence so that the embodiment of the present application described herein can in addition to illustrate or describe herein with
Outer sequence is implemented.
Fig. 1 is the flow diagram of information processing method provided by the embodiments of the present application, referring to Fig. 1, the embodiment of the present application
The information processing method of offer includes:
Step 101: the first electronic equipment obtains the identification information of characterization of electronic equipment mark.
In some embodiments, the first electronic equipment has the first verification information, and the first verification information is for determining request
Whether the second verification information that the third electronic equipment of gain access is sent meets condition.
In practical applications, the first electronic equipment can be the network access equipment for electronic device access network,
Such as wireless access point (AP, Wireless Access Point) or router device.
In some embodiments, the first electronic equipment itself stores the identification information of characterization of electronic equipment mark, in reality
When border is implemented, the identification information of the first electronic equipment can uniquely identify the first electronic equipment, such as the identification information can be with
For the title of WLAN locating for the title of the first electronic equipment or the first electronic equipment, when the first electronic equipment is road
When by device equipment, corresponding identification information can be the corresponding service set of routing device (SSID, Service Set
Identifier), certainly, in order to uniquely identify the first electronic equipment, the information category that identification information is included can have more
Kind, namely by the first electronic equipment of combination common ID of much information, such as identification information include that SSID and the first electronics are set
Standby location information (such as geographical location or network site).
In some embodiments, gain access refers to: obtaining the permission that the second network is accessed by the first electronic equipment;
Wherein, the first electronic equipment is located at the second network and first network, and first network is third electronic equipment and the first electronic equipment
The network that can be established.
By taking the first electronic equipment is routing device, third electronic equipment is terminal as an example, routing device has corresponding SSID
Encrypted message (the first verification information), terminal device can be obtained based on encrypted message through routing device access internet (the
Two networks) permission;Wherein, routing device is located at internet and WLAN (first network), which can lead to
It crosses terminal and routing device is established.
Step 102: the first electronic equipment sends the identification information to the second electronic equipment.
In practical applications, the second electronic equipment might have stored identical with the first verification information of the first electronic equipment
Third verification information, in this case, if other electronic equipments are obtained in the case where without permission by the second electronic equipment
First verification information can obtain corresponding access authority by the first verification information, and then may cause to user centainly
Economic loss, information leakage etc..
For using above-mentioned WLAN as Wireless Fidelity (WIFI, Wireless Fidelity) network, the first user is obtained
The WIFI encrypted message of cicada second user, the first user pass through the application program (such as WIFI skeleton key) in terminal for password
Information is uploaded to server, so that the WIFI password of second user is stored in server, in this case, if third user
The WIFI password that second user is known by the application program (such as WIFI skeleton key) in terminal, can not permit in second user
Perhaps the WIFI network that second user is accessed in the case where accesses internet by the routing device of second user, causes the second use
The economic loss at family.
In some embodiments, it can be that the period is (specific that the first electronic equipment, which sends identification information to the second electronic equipment,
Can be set according to actual needs) transmission of property, or the transmission when receiving triggering command.
Step 103: the first electronic equipment obtains matching result, and matching result is that the second electronic equipment is based on identification information
With obtaining, be used to indicate the existence of the third verification information of corresponding identification information, wherein third verification information can and first
Verification information is identical.
Here, in actual implementation, after identification information is sent to the second electronic equipment by the first electronic equipment, the second electronics
Equipment is matched based on identification information with the identification information in the verification information list itself stored, is deposited in verification information list
The corresponding relationship for having stored up identification information and verification information, when based on identification information match to there are corresponding verification informations (i.e. the
Three verification informations) when, the second electronic equipment returns to characterization, and there are the matching results of corresponding third verification information to the first electronics
Equipment;When based on identification information be not matched to corresponding third verification information when, the second electronic equipment return characterization there is no pair
The matching result for the third verification information answered gives the first electronic equipment.
In practical applications, third verification information can be same or different with the first verification information, for example, inciting somebody to action in user
After first verification information is uploaded to the second electronic equipment, the first verification information is modified/updates, and in the second electronic equipment
The content of third verification information be still the first verification information before original modification/update, at this point, the of the first electronic equipment
One verification information is different from the third verification information of the second electronic equipment;For another example, the first verification information is uploaded to second by user
After electronic equipment, the first verification information of the first electronic equipment is without modification, at this point, the first verifying letter of the first electronic equipment
It ceases identical as the third verification information of the second electronic equipment.
Illustratively, still by taking WLAN is WIFI network as an example, when the first user uploads WIFI password to server
Afterwards, second user is modified WIFI password, and the WIFI password stored in server at this time and the WIFI of the first user are close
Code is different;And if the first user upload WIFI password to server after, second user does not modify to WIFI password, server
The WIFI password of middle storage and the WIFI password of the first user are just identical.
Step 104: if matching result meets execution condition, the first electronic equipment executes processing order, so that first tests
Demonstrate,proving information can be in the state that can not be obtained by the second electronic equipment.
In some embodiments, when matching result meets execution condition, the first electronic equipment executes processing order, so that
First verification information can be in the state that can not be obtained by the second electronic equipment, comprising:
First electronic equipment existence according to indicated by matching result determines that third verification information is in obtainable
State;Processing order is executed, the first verification information is enabled to be in the state that can not be obtained by the second electronic equipment.Namely
Say, as long as storing third verification information in the second electronic equipment, regardless of third verification information and the first verification information whether phase
Together, it in order to avoid illegal user's gain access, just triggers the first electronic equipment and executes processing order, so that the first verifying letter
Breath can such as modify the first verification information in the state that can not be obtained by the second electronic equipment.
Illustratively, after routing device (the first electronic equipment) sends SSID to server (the second electronic equipment),
Server is based on SSID inquiry and there is WIFI encrypted message corresponding with the SSID, in order to avoid illegal user is by obtaining clothes
In business device after the WIFI password that stores, the risk of corresponding access authority is obtained, routing device does not go to verify to be stored in server
Whether WIFI password WIFI password corresponding with itself is identical, processing order is directly executed, so that the WIFI password of itself is in
The state that can not be obtained by server.
In some embodiments, the second electronic equipment return matching result in addition to instruction third verification information there are shapes
Outside state, third verification information is also carried, at this point, the first electronic equipment carries matching result before executing processing order
Third verification information is compared with the first verification information, to judge whether third verification information is identical as the first verification information,
If being based on comparison result, determines that third verification information and the first verification information of the first electronic equipment match, be then considered as first
There is leakage in verification information, the first electronic equipment of triggering executes processing order, and the first verification information, which is in, to be passed through
The state that second electronic equipment obtains.
Here, that is to say, that be only to store third verification information in the second electronic equipment to be not enough to trigger the first electricity
Sub- equipment executes processing order, the first electronic equipment still need to verify the first verification information and itself the first verification information whether phase
Together, it only just goes to execute processing order under identical circumstances.
Still by taking WLAN is WIFI network as an example, due to uploading the WIFI password of second user in the first user extremely
After server, there are the possibility of second user modification WIFI password, therefore, when the first electronic equipment receives instruction server
In store the matching result of WIFI password of second user after, still need to verify the WIFI password stored in server and current the
Whether the WIFI password of one electronic equipment is identical, and only just setting out under identical circumstances executes itself WIFI password and be in nothing
The process instruction for the state that method is obtained by server, in this way, avoiding the WIFI password that stores in the server and current
In the unmatched situation of WIFI password of first electronic equipment, the wasting of resources caused by processing order is executed.
In some embodiments, when matching result meets execution condition, in order to enable the first verification information can be in nothing
Method passes through the state that the second electronic equipment obtains, and the first electronic equipment exports prompt information, which shows that third is verified
The state that information can be obtained by the second electronic equipment.
Specifically, the first electronic equipment can at least one in the following manner output prompt information:
First electronic equipment is provided with output device, and the first electronic equipment realizes prompt information by the output device of itself
Local output;
Establishing between first electronic equipment and target electronic device has a communication connection, the first electronic equipment send prompt information to
Target electronic device;Wherein, target electronic device can have any electronics of communication connection to set to establish with the first electronic equipment
It is standby, or be the specific electronic equipment set of setting.Illustratively, target electronic device can for first locating for the first electronic equipment
The mobile terminal device of network, if router device and the foundation of the mobile phone of Configuration network have communication connection, router device is sent
Prompt information is repaired to the mobile phone of Configuration network so that owner carries out password after recognizing that encrypted message has the risk leaked
Change.
In some embodiments, in order to enable the first verification information can be in the shape that can not be obtained by the second electronic equipment
State, the first electronic equipment can modify to the first verification information, and specifically, the first electronic equipment modifies the first verification information
For the 4th verification information, the 4th verification information is different from the first verification information.
In actual implementation, after the first verification information is revised as the 4th verification information by the first electronic equipment, in order to make
The 4th electronic equipment for obtaining access authority can regain access authority, and the first electronic equipment notifies the 4th electronic equipment
It is changed to the 4th verification information and regains access authority.
In actual implementation, under the premise of guaranteeing safety, in order to make the 4th electronic equipment for obtaining access authority
Access authority can be regained, the first electronic equipment can first notify the 4th electronic equipment to be changed to the 4th verification information and regain
Access authority, then the first verification information is revised as the 4th verification information again by the first electronic equipment.Here, the first electronic equipment
Being sent in the notice of the 4th electronic equipment may include modification time, e.g., after 1 minute modify to the first verification information or X
It modifies for X points when year X month X day X, certainly, also may not include modification time in notice.
In practical applications, when the first electronic equipment modifies to the first verification information, exist and not all acquisition
Cross the electronic equipment of access authority all therewith in connection status the case where, it is in this case, not connected therewith to be paid a visit
Ask that the electronic equipment of permission just can not timely synchronous vacations information (modified verification information), such as family router hair
Existing, user does not go home also when carrying out the modification of WIFI password, and such mobile phone can not just obtain the WIFI encrypted message modified automatically, because
This, stored in the electronic equipment of the above-mentioned information of synchronous vacations not in time be modification before verification information, when it is above-mentioned not in time
When the electronic equipment of synchronous vacations information sends connection request to the first electronic equipment again, the first electronic equipment need to be for reception
To connection request judge whether to the electronic equipment synchronous vacations information.In some embodiments, it is incited somebody to action in the first electronic equipment
First verification information is revised as after the 4th verification information, if receiving the connection request of the 5th electronic equipment transmission, the connection
The first verification information or third verification information are carried in request, the first electronic equipment judges whether to need to notify the 5th electronic equipment
It is instead based on the 4th verification information gain access, and corresponding operation is executed based on judging result.
Here, for for the electronic equipment for sending connection request, the first electronic equipment is not asked to all transmissions connection
The electronic equipment asked feeds back the 4th verification information, and in actual implementation, the first electronic equipment is still to further based on connection request
Determine whether that the electronic equipment for sending connection request is fed back.
In some embodiments, the first electronic equipment can judge whether to need to notify the 5th electronic equipment in the following way
It is instead based on the 4th verification information gain access:
First electronic equipment judges whether the 5th electronic equipment obtained access authority, if the 5th electronic equipment obtained
Access authority, the 4th verification information of feedback gives the 5th electronic equipment, so that the 5th electronic equipment is obtained based on the 4th verification information
Access authority;If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the 5th electronic equipment.Example
Such as, router judges whether be attached thereto before the mobile phone, i.e., whether accessed routing for the mobile phone for sending connection request
WLAN where device, namely judge whether the mobile phone passes through router access and cross internet, however, it is determined that the mobile phone once obtained
Access authority was obtained, modified verification information is just fed back, in this way, preventing from searching the new of the identification information of the first electronic equipment
Equipment obtains modified verification information when attempting and connecting the first electronic equipment, such as prevents from searching router corresponding
The mobile phone of SSID obtains the modified password of the WIFI network when attempting WIFI network corresponding to access.
In some embodiments, the first electronic equipment is after modifying to the first verification information, after corresponding modification is arranged
Verification information feedback time, the feedback time characterize the first electronic equipment after carrying out verification information modification, based on reception
The effective time of verification information after the connection request automatic feedback modification arrived, the length of feedback time can be carried out according to actual needs
Setting, such as X days/X weeks/X month.Correspondingly, the first electronic equipment can judge whether to need to notify the 5th electronics in the following way
Equipment is instead based on the 4th verification information gain access:
The time of connection request of first electronic equipment based on the 5th electronic equipment received, whether judge the time
In feedback time, if the 4th verification information of feedback gives the 5th electronic equipment, so that the 5th electronics in feedback time
Equipment is based on the 4th verification information gain access;If not feeding back the 4th verification information to the 5th in feedback time
Electronic equipment.That is, for sending the electronic equipment of connection request, the first electronic equipment is fed back in feedback time
Modified verification information (the 4th verification information), and outside feedback time, for sending the electronic equipment of connection request, first
Electronic equipment does not feed back modified verification information.For example, router setting feedback time is after carrying out the modification of WIFI password
One month, when router is after carrying out the modification of WIFI password, the company of the WIFI password before receiving the carrying modification of mobile phone transmission
Request is connect, whether the time that router judgement receives connection request is in feedback time, will be modified if be in
WIFI cipher feedback is to mobile phone, if be not in, does not feed back modified WIFI password.In this way, preventing from owning in future time
By the new equipment of the identification information of server search to the first electronic equipment, just obtained when attempting and connecting the first electronic equipment
Modified verification information such as prevents the mobile phone for searching the corresponding SSID of router from attempting the corresponding WIFI network of access
When, just obtain the modified password of the WIFI network.
Next using the first electronic equipment as radio reception device, the second electronic equipment be server, third electronic equipment
To be illustrated for terminal to the information processing method of the application, wherein radio reception device is located at internet and WIFI net
Network, Fig. 2 is the flow diagram of information processing method provided by the embodiments of the present application, referring to fig. 2, provided by the embodiments of the present application
Information processing method includes:
Step 201: the SSID of WIFI network where radio reception device obtains itself.
Here, in practical applications, the SSID of WIFI network is stored in radio reception device, radio reception device can be straight
The SSID for taking storage is obtained, alternatively, storing the WIFI network in the other electronic equipments connecting with radio reception device
SSID, radio reception device can obtain the SSID of other electronic equipment storages by the communication connection of foundation.
Step 202: radio reception device sends SSID to server.
In actual implementation, radio reception device can periodically send SSID to server, such as send once daily, or
Person, radio reception device send SSID to server when receiving the instruction that coupled management equipment is sent.
Step 203: the SSID received is compared server with the SSID that itself is stored, judge whether there is with
The corresponding WIFI password of SSID, and if it exists, execute step 204;Otherwise, step 207 is executed.
Step 204: server return instruction is wirelessly connect in the presence of the first matching result of WIFI password corresponding with SSID
Enter equipment.
Step 205: radio reception device is based on the first matching result, repairs to the WIFI password of place WIFI network
Change.
Here, that is to say, that radio reception device, which is once learnt in server, stores WIFI password corresponding with SSID
Just carry out the modification of WIFI password, and though the WIFI password of the WIFI password stored in server and current WIFI network whether phase
Together.
Step 206: the electronic equipment that radio reception device notice accessed WIFI network is based on modified WIFI password
Re-start access.
Step 207: server returns to instruction, and there is no the second matching results of WIFI password corresponding with SSID to wireless
Access device.
Step 208: radio reception device is based on the second matching result and does not deal with.
Continue using the first electronic equipment as radio reception device, the second electronic equipment is server, third electronic equipment is
The information processing method of the application is illustrated for terminal, wherein radio reception device is located at internet and WIFI network,
Fig. 3 is the flow diagram of information processing method provided by the embodiments of the present application, referring to Fig. 3, letter provided by the embodiments of the present application
Ceasing processing method includes:
Step 301: the SSID of WIFI network where radio reception device obtains itself.
Here, in practical applications, the SSID of WIFI network is stored in radio reception device, radio reception device can be straight
The SSID for taking storage is obtained, alternatively, storing the WIFI network in the other electronic equipments connecting with radio reception device
SSID, radio reception device can obtain the SSID of other electronic equipment storages by the communication connection of foundation.
Step 302: radio reception device sends SSID to server.
In actual implementation, radio reception device can periodically send SSID to server, such as send once daily, or
Person, radio reception device send SSID to server when receiving the instruction that coupled management equipment is sent.
Step 303: the SSID received is compared server with the SSID that itself is stored, judge whether there is with
The corresponding WIFI password of SSID, and if it exists, execute step 304;Otherwise, step 310 is executed.
Step 304: the first matching result that server returns to carrying WIFI password corresponding with SSID is set to wireless access
It is standby.
Step 305: radio reception device be based on the first matching result, judge the first matching result carry WIFI password and
Whether the WIFI password of current WIFI network is identical, if identical, executes step 306;If it is not the same, executing step 310.
Step 306: radio reception device modifies to the WIFI password of current WIFI network.
Step 307: radio reception device receives the access request of electronic equipment transmission, before carrying modification in access request
WIFI password.
Step 308: radio reception device judges whether electronic equipment accessed the WIFI network, if accessed, holds
Row step 309;Otherwise, step 310 is executed.
Step 309: the electronic equipment that radio reception device notice accessed WIFI network is based on modified WIFI password
Re-start access.
Step 310: radio reception device is not dealt with.
The embodiment of the present application also provides a kind of first electronic equipments, and in some embodiments, the first electronic equipment can lead to
The mode for crossing software or hardware or soft or hard combination is implemented, and Fig. 4 is the composition knot of the first electronic equipment provided by the embodiments of the present application
Structure schematic diagram, referring to fig. 4, the first electronic equipment provided by the embodiments of the present application includes:
First obtains module 41, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronics is set
Standby to have the first verification information, first verification information is for determining that the third electronic equipment of request gain access is sent
The second verification information whether meet condition;
Sending module 42, for sending the identification information to the second electronic equipment;
Second obtains module 43, and for obtaining matching result, the matching result is based on institute for second electronic equipment
It states identification information match to obtain, is used to indicate the existence of the third verification information of the corresponding identification information, wherein described
Third verification information can be identical with first verification information;
Execution module 44 executes processing order, so that described first if meeting execution condition for the matching result
Verification information can be in the state that can not be obtained by second electronic equipment.
In some embodiments, the execution module, specifically for the presence according to indicated by the matching result
State determines that the third verification information is in obtainable state;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition
State.
In some embodiments, the matching result carries the third verification information, and first electronic equipment also wraps
Include comparison module;
The comparison module, the third verification information for carrying the matching result are set with first electronics
Standby first verification information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined
First verification information of equipment matches.
In some embodiments, the execution module, is specifically used for output prompt information, and the prompt information shows described
The state that third verification information can be obtained by second electronic equipment.
In some embodiments, the execution module, specifically for first verification information is revised as the 4th verifying
Information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice
Ask permission.
In some embodiments, the execution module, specifically for testing first verification information is revised as the 4th
After demonstrate,proving information, the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
In some embodiments, the execution module, specifically for notifying the 4th electronic equipment to be changed to described
After four verification informations regain the access authority, first verification information is revised as the 4th verification information.
In some embodiments, first electronic equipment further include:
Feedback module, carrying first verification information or the third for receiving the transmission of the 5th electronic equipment are tested
Demonstrate,prove the connection request of information;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics
Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th
Electronic equipment.
In some embodiments, the gain access refers to: obtaining and accesses the second net by first electronic equipment
The permission of network;
Wherein, first electronic equipment is located at second network and first network, and the first network is described
The network that three electronic equipments and first electronic equipment can be established, second electronic equipment are located at second network.
It need to be noted that: above is referred to the description of the first electronic equipment, be with above method description it is similar, together
The beneficial effect of method describes, and does not repeat them here, thin for undisclosed technology in the first electronic equipment described in the embodiment of the present application
Section, please refers to the description of the application information processing method embodiment.
Fig. 5 is the composed structure schematic diagram of the first electronic equipment provided by the embodiments of the present application, and referring to Fig. 5, the application is real
Applying the first electronic equipment 50 that example provides includes:
At least one processor 51, memory 52, user interface 53 and at least one network interface 54.First electronic equipment
In various components be coupled by bus system 55.It is appreciated that bus system 55 is for realizing between these components
Connection communication.Bus system 55 further includes that power bus, control bus and status signal are total in addition to including data/address bus
Line.But for the sake of clear explanation, various buses are all designated as bus system 55 in Fig. 5.
Wherein, user interface 53 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch
Plate or touch screen etc..
It is appreciated that memory 52 can be volatile memory or nonvolatile memory, may also comprise volatibility and
Both nonvolatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory),
Programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM
(EPROM, Erasable Programmable Read-Only Memory), flash memory (Flash Memory) etc..Volatibility is deposited
Reservoir can be random access memory (RAM, Random Access Memory), be used as External Cache.By showing
Example property but be not restricted explanation, the RAM of many forms is available, such as static random access memory (SRAM, Static
Random Access Memory), synchronous static random access memory (SSRAM, Synchronous Static Random
Access Memory).The memory 52 of the embodiment of the present application description is intended to include the storage of these and any other suitable type
Device.
Memory 52 in the embodiment of the present application can storing data to support the operation of electronic equipment.These data are shown
Example includes: any computer program for operating on an electronic device, such as operating system and application program.Wherein, operation system
System includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various basic businesses and processing
Hardware based task.Application program may include various application programs.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.
Claims (10)
1. a kind of information processing method, comprising:
First electronic equipment obtains the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has first
Verification information, the second verifying that first verification information is sent for determining the third electronic equipment of request gain access
Whether information meets condition;
First electronic equipment sends the identification information to the second electronic equipment;
First electronic equipment obtains matching result, and the matching result is that second electronic equipment is believed based on the mark
Breath matching obtains, and is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third verifying
Information can be identical with first verification information;
If the matching result meets execution condition, first electronic equipment executes processing order, so that described first tests
Demonstrate,proving information can be in the state that can not be obtained by second electronic equipment.
2. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first
Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
The existence according to indicated by the matching result determines that the third verification information is in obtainable shape
State;
Processing order is executed, first verification information is enabled to be in the shape that can not be obtained by second electronic equipment
State.
3. according to the method described in claim 2, wherein, the matching result carries the third verification information, the execution
Before processing order, further includes:
First verification information of the third verification information and first electronic equipment that the matching result is carried
It is compared, obtains comparison result;
Based on the comparison result, the third verification information and first electronic equipment that the matching result carries are determined
First verification information match.
4. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first
Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
First electronic equipment exports prompt information, and the prompt information shows that the third verification information can be by described the
The state that two electronic equipments obtain.
5. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first
Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
First verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the access right notice
Limit.
6. according to the method described in claim 5, wherein, the 4th electronic equipment for notifying gain access is changed to
4th verification information regains the access authority, comprising:
After first verification information is revised as the 4th verification information by first electronic equipment, first electronics is set
It is standby that the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
7. it is described that first verification information is revised as the 4th verification information according to the method described in claim 5, wherein,
Include:
The 4th electronic equipment is notified to be changed to the 4th verification information and regain the visit in first electronic equipment
After asking permission, first verification information is revised as the 4th verification information by first electronic equipment.
8. according to the method described in claim 5, wherein, the method also includes:
Receive the connection request for carrying first verification information or the third verification information of the 5th electronic equipment transmission;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, feeds back the 4th verification information and set to the 5th electronics
It is standby;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the 5th electronics
Equipment.
9. method according to any one of claims 1 to 8, wherein
The gain access refers to: obtaining the permission that the second network is accessed by first electronic equipment;
Wherein, first electronic equipment is located at second network and first network, and the first network is the third electricity
The network that sub- equipment and first electronic equipment can be established, second electronic equipment are located at second network.
10. a kind of first electronic equipment, comprising:
First obtains module, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has
First verification information, the second of third electronic equipment transmission of first verification information for determining request gain access
Whether verification information meets condition;
Sending module, for sending the identification information to the second electronic equipment;
Second obtains module, and for obtaining matching result, the matching result is that second electronic equipment is based on the mark
Information matches obtain, and are used to indicate the existence of the third verification information of the corresponding identification information, wherein the third is tested
Demonstrate,proving information can be identical with first verification information;
Execution module executes processing order if meeting execution condition for the matching result, so that the first verifying letter
Breath can be in the state that can not be obtained by second electronic equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910253261.7A CN109996228B (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910253261.7A CN109996228B (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109996228A true CN109996228A (en) | 2019-07-09 |
CN109996228B CN109996228B (en) | 2021-04-13 |
Family
ID=67132077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910253261.7A Active CN109996228B (en) | 2019-03-29 | 2019-03-29 | Information processing method and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109996228B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114297628A (en) * | 2021-12-29 | 2022-04-08 | 联想(北京)有限公司 | Control method and device and electronic equipment |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297408A (en) * | 2012-03-02 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Login method and device, terminal and network server |
CN103716793A (en) * | 2013-12-20 | 2014-04-09 | 小米科技有限责任公司 | Access point information sharing method and apparatus |
CN104159226A (en) * | 2014-07-24 | 2014-11-19 | 小米科技有限责任公司 | Network connection method and device |
US20140351586A1 (en) * | 2012-02-20 | 2014-11-27 | Lock Box Pty Ltd | Cryptographic method and system |
CN104581716A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Connection method of wireless access points and wireless access point equipment |
CN104618873A (en) * | 2015-01-15 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method and device for sharing access point information |
US20150278510A1 (en) * | 2014-03-31 | 2015-10-01 | Google Inc. | Credential Sharing |
CN105743844A (en) * | 2014-12-08 | 2016-07-06 | 联想(北京)有限公司 | Information processing method and electronic device |
CN106162818A (en) * | 2015-04-09 | 2016-11-23 | 厦门众联世纪科技有限公司 | The method unlocking WIFI hot spot |
US20170011213A1 (en) * | 2015-07-06 | 2017-01-12 | Unisys Corporation | Cloud-based active password manager |
CN106412884A (en) * | 2016-11-24 | 2017-02-15 | 北京小米移动软件有限公司 | WIFI connection management method and apparatus thereof |
CN106412911A (en) * | 2016-11-25 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Wireless access point monitoring method, wireless access point monitoring device and electronic equipment |
CN106714161A (en) * | 2016-06-29 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Method for cutting off network connection of unauthorized mobile terminal, equipment and system |
CN107645495A (en) * | 2017-08-24 | 2018-01-30 | 上海斐讯数据通信技术有限公司 | A kind of wireless network password sharing method and system |
-
2019
- 2019-03-29 CN CN201910253261.7A patent/CN109996228B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140351586A1 (en) * | 2012-02-20 | 2014-11-27 | Lock Box Pty Ltd | Cryptographic method and system |
CN103297408A (en) * | 2012-03-02 | 2013-09-11 | 腾讯科技(深圳)有限公司 | Login method and device, terminal and network server |
CN103716793A (en) * | 2013-12-20 | 2014-04-09 | 小米科技有限责任公司 | Access point information sharing method and apparatus |
CN106912048A (en) * | 2013-12-20 | 2017-06-30 | 小米科技有限责任公司 | Access-in point information sharing method and device |
US20150278510A1 (en) * | 2014-03-31 | 2015-10-01 | Google Inc. | Credential Sharing |
CN104159226A (en) * | 2014-07-24 | 2014-11-19 | 小米科技有限责任公司 | Network connection method and device |
CN105743844A (en) * | 2014-12-08 | 2016-07-06 | 联想(北京)有限公司 | Information processing method and electronic device |
CN104581716A (en) * | 2014-12-31 | 2015-04-29 | 广东欧珀移动通信有限公司 | Connection method of wireless access points and wireless access point equipment |
CN104618873A (en) * | 2015-01-15 | 2015-05-13 | 腾讯科技(深圳)有限公司 | Method and device for sharing access point information |
CN106162818A (en) * | 2015-04-09 | 2016-11-23 | 厦门众联世纪科技有限公司 | The method unlocking WIFI hot spot |
US20170011213A1 (en) * | 2015-07-06 | 2017-01-12 | Unisys Corporation | Cloud-based active password manager |
CN106714161A (en) * | 2016-06-29 | 2017-05-24 | 腾讯科技(深圳)有限公司 | Method for cutting off network connection of unauthorized mobile terminal, equipment and system |
CN106412884A (en) * | 2016-11-24 | 2017-02-15 | 北京小米移动软件有限公司 | WIFI connection management method and apparatus thereof |
CN106412911A (en) * | 2016-11-25 | 2017-02-15 | 宇龙计算机通信科技(深圳)有限公司 | Wireless access point monitoring method, wireless access point monitoring device and electronic equipment |
CN107645495A (en) * | 2017-08-24 | 2018-01-30 | 上海斐讯数据通信技术有限公司 | A kind of wireless network password sharing method and system |
Non-Patent Citations (1)
Title |
---|
胡浩: "腾达WiFi APP防蹭网保障家庭网络安全", 《计算机与网络》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114297628A (en) * | 2021-12-29 | 2022-04-08 | 联想(北京)有限公司 | Control method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109996228B (en) | 2021-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6907551B2 (en) | Fault notification method and related provider facility | |
US9173050B2 (en) | Application store system and development method using the application store system | |
CN105978873A (en) | Registration method and device of customized equipment | |
CN103634935B (en) | WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device | |
CN101610226A (en) | A kind of method and system of plug-in download | |
CN104579830B (en) | service monitoring method and device | |
CN108206830A (en) | Vulnerability scanning method, apparatus, computer equipment and storage medium | |
CN107145439B (en) | Test request processing method and device | |
CN109618176A (en) | A kind of processing method of live broadcast service, equipment and storage medium | |
CN108829838A (en) | A kind of account information batch processing method and server | |
CN107026871A (en) | Web vulnerability scanning method based on cloud computing | |
CN109491645A (en) | Point methods, device, computer equipment and storage medium are buried based on interface element | |
CN110457629A (en) | Permission processing, authority control method and device | |
CN110278192A (en) | Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet | |
CN109729535A (en) | Opening base station method, apparatus, computer storage medium and equipment | |
CN108306882A (en) | A kind of method and the network equipment of terminal access business | |
CN107196983A (en) | A kind of resource distribution method and device | |
CN113672894A (en) | Data processing method, device and equipment for identifying code request and storage medium | |
CN106031204B (en) | Management of Virtual Subscriptions | |
CN109996228A (en) | A kind of information processing method and electronic equipment | |
CN110336813A (en) | A kind of access control method, device, equipment and storage medium | |
CN106791982A (en) | Account management method and device | |
CN110535919A (en) | Network access method and device of concentrator and power peak regulation system | |
CN110069277A (en) | Using loading method, using online equipment, storage medium and device | |
CN108647077A (en) | File management method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |