CN109996228A - A kind of information processing method and electronic equipment - Google Patents

A kind of information processing method and electronic equipment Download PDF

Info

Publication number
CN109996228A
CN109996228A CN201910253261.7A CN201910253261A CN109996228A CN 109996228 A CN109996228 A CN 109996228A CN 201910253261 A CN201910253261 A CN 201910253261A CN 109996228 A CN109996228 A CN 109996228A
Authority
CN
China
Prior art keywords
electronic equipment
verification information
information
matching result
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910253261.7A
Other languages
Chinese (zh)
Other versions
CN109996228B (en
Inventor
刘翔
刘力强
罗蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910253261.7A priority Critical patent/CN109996228B/en
Publication of CN109996228A publication Critical patent/CN109996228A/en
Application granted granted Critical
Publication of CN109996228B publication Critical patent/CN109996228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of information processing method and electronic equipment, method includes: the identification information that the first electronic equipment obtains characterization of electronic equipment mark;Wherein, first electronic equipment has the first verification information, and whether second verification information of first verification information for determining that the third electronic equipment of request gain access is sent meets condition;First electronic equipment sends the identification information to the second electronic equipment;First electronic equipment obtains matching result, the matching result is that second electronic equipment is obtained based on the identification information match, it is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third verification information can be identical with first verification information;If the matching result meets execution condition, first electronic equipment executes processing order, and first verification information is enabled to be in the state that can not be obtained by second electronic equipment.

Description

A kind of information processing method and electronic equipment
Technical field
This application involves field of communication technology more particularly to a kind of information processing methods and electronic equipment.
Background technique
User the case where leakage there are the verification information of electronic equipment, knows verifying during using electronic equipment Verification information is intentionally or accidentally uploaded to server by the other users of information, so that server is stored with verification information, at this In the case of kind, user without permission can obtain corresponding visit after obtaining verification information by server based on verification information It asks permission, in turn results in user information leakage, safety reduction etc..
Summary of the invention
The embodiment of the present application provides a kind of information processing method, comprising:
First electronic equipment obtains the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has First verification information, the second of third electronic equipment transmission of first verification information for determining request gain access Whether verification information meets condition;
First electronic equipment sends the identification information to the second electronic equipment;
First electronic equipment obtains matching result, and the matching result is that second electronic equipment is based on the mark Know information matches to obtain, is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third Verification information can be identical with first verification information;
If the matching result meets execution condition, first electronic equipment executes processing order, so that described the One verification information can be in the state that can not be obtained by second electronic equipment.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing The state that method is obtained by second electronic equipment, comprising:
The existence according to indicated by the matching result determines that the third verification information is in obtainable State;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition State.
In above scheme, the matching result carries the third verification information and also wraps before the execution processing order It includes:
First verifying of the third verification information and first electronic equipment that the matching result is carried Information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined First verification information of equipment matches.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing The state that method is obtained by second electronic equipment, comprising:
First electronic equipment exports prompt information, and the prompt information shows that the third verification information can pass through institute State the state of the second electronic equipment acquisition.
In above scheme, first electronic equipment executes processing order, and first verification information is enabled to be in nothing The state that method is obtained by second electronic equipment, comprising:
First verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice Ask permission.
In above scheme, the 4th electronic equipment for notifying gain access is changed to the 4th verification information Regain the access authority, comprising:
After first verification information is revised as the 4th verification information by first electronic equipment, first electricity Sub- equipment notifies the 4th electronic equipment to be changed to the 4th verification information and regain the access authority.
It is described that first verification information is revised as the 4th verification information in above scheme, comprising:
The 4th electronic equipment is notified to be changed to the 4th verification information and regain institute in first electronic equipment After stating access authority, first verification information is revised as the 4th verification information by first electronic equipment.
In above scheme, the method also includes:
Receive the connection for carrying first verification information or the third verification information of the 5th electronic equipment transmission Request;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th Electronic equipment.
In above scheme, the gain access refers to: obtaining and accesses the second network by first electronic equipment Permission;
Wherein, first electronic equipment is located at second network and first network, and the first network is described The network that three electronic equipments and first electronic equipment can be established, second electronic equipment are located at second network.
Present invention also provides a kind of first electronic equipments, comprising:
First obtains module, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment With the first verification information, first verification information is for determining what the third electronic equipment of request gain access was sent Whether the second verification information meets condition;
Sending module, for sending the identification information to the second electronic equipment;
Second obtains module, and for obtaining matching result, the matching result is described in second electronic equipment is based on Identification information match obtains, and is used to indicate the existence of the third verification information of the corresponding identification information, wherein described the Three verification informations can be identical with first verification information;
Execution module executes processing order, so that described first tests if meeting execution condition for the matching result Demonstrate,proving information can be in the state that can not be obtained by second electronic equipment.
In above scheme, the execution module, specifically for the existence according to indicated by the matching result, Determine that the third verification information is in obtainable state;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition State.
In above scheme, the matching result carries the third verification information, and first electronic equipment further includes ratio To module;
The comparison module, the third verification information for carrying the matching result are set with first electronics Standby first verification information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined First verification information of equipment matches.
In above scheme, the execution module is specifically used for output prompt information, and the prompt information shows the third The state that verification information can be obtained by second electronic equipment.
In above scheme, the execution module, specifically for first verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice Ask permission.
In above scheme, the execution module, specifically for first verification information is being revised as the 4th verifying letter After breath, the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
In above scheme, the execution module, specifically for notifying the 4th electronic equipment to be changed to the described 4th and test After card information regains the access authority, first verification information is revised as the 4th verification information.
In above scheme, first electronic equipment further include:
Feedback module, carrying first verification information or the third for receiving the transmission of the 5th electronic equipment are tested Demonstrate,prove the connection request of information;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th Electronic equipment.
Have following advantageous effects using the above embodiments of the present application:
The matching result that first electronic equipment is returned based on the second electronic equipment determines that matching result meets execution condition When, the first electronic equipment executes processing order, and the first verification information is in can not be by the acquisition of the second electronic equipment State;In this way, avoiding the leakage of the first verification information, the safety of user information is improved.
Detailed description of the invention
Fig. 1 is the flow diagram one of information processing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram two of information processing method provided by the embodiments of the present application;
Fig. 3 is the flow diagram three of information processing method provided by the embodiments of the present application;
Fig. 4 is the composed structure schematic diagram one of the first electronic equipment provided by the embodiments of the present application;
Fig. 5 is the composed structure schematic diagram two of the first electronic equipment provided by the embodiments of the present application.
Specific embodiment
With reference to the accompanying drawings and embodiments, the application is further elaborated.It should be appreciated that mentioned herein Embodiment is only used to explain the application, is not used to limit the application.In addition, embodiment provided below is for implementing The section Example of the application, rather than the whole embodiments for implementing the application are provided, in the absence of conflict, the application is implemented Example record technical solution can mode in any combination implement.
It should be noted that in the embodiment of the present application, the terms "include", "comprise" or its any other variant are intended to Cover non-exclusive inclusion, so that including the method for a series of elements or device not only includes wanting of being expressly recited Element, but also including other elements that are not explicitly listed, or further include for implementation method or device intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including the element Method or device in there is also other relevant factor (such as the step in method or the unit in device, for example, Unit can be partial circuit, segment processor, subprogram or software etc.).
For example, information processing method provided by the embodiments of the present application contains a series of step, but the application is implemented The information processing method that example provides is not limited to documented step, similarly, video process apparatus provided by the embodiments of the present application It include a series of modules, but device provided by the embodiments of the present application is not limited to include module be expressly recited, it can be with The unit of required setting when including to obtain relevant information or handled based on information.
In the following description, related term " first second third etc. " be only be the similar object of difference, The particular sorted for object is not represented, it is possible to understand that ground, " first second third etc. " can be interchanged in the case where permission Specific sequence or precedence so that the embodiment of the present application described herein can in addition to illustrate or describe herein with Outer sequence is implemented.
Fig. 1 is the flow diagram of information processing method provided by the embodiments of the present application, referring to Fig. 1, the embodiment of the present application The information processing method of offer includes:
Step 101: the first electronic equipment obtains the identification information of characterization of electronic equipment mark.
In some embodiments, the first electronic equipment has the first verification information, and the first verification information is for determining request Whether the second verification information that the third electronic equipment of gain access is sent meets condition.
In practical applications, the first electronic equipment can be the network access equipment for electronic device access network, Such as wireless access point (AP, Wireless Access Point) or router device.
In some embodiments, the first electronic equipment itself stores the identification information of characterization of electronic equipment mark, in reality When border is implemented, the identification information of the first electronic equipment can uniquely identify the first electronic equipment, such as the identification information can be with For the title of WLAN locating for the title of the first electronic equipment or the first electronic equipment, when the first electronic equipment is road When by device equipment, corresponding identification information can be the corresponding service set of routing device (SSID, Service Set Identifier), certainly, in order to uniquely identify the first electronic equipment, the information category that identification information is included can have more Kind, namely by the first electronic equipment of combination common ID of much information, such as identification information include that SSID and the first electronics are set Standby location information (such as geographical location or network site).
In some embodiments, gain access refers to: obtaining the permission that the second network is accessed by the first electronic equipment; Wherein, the first electronic equipment is located at the second network and first network, and first network is third electronic equipment and the first electronic equipment The network that can be established.
By taking the first electronic equipment is routing device, third electronic equipment is terminal as an example, routing device has corresponding SSID Encrypted message (the first verification information), terminal device can be obtained based on encrypted message through routing device access internet (the Two networks) permission;Wherein, routing device is located at internet and WLAN (first network), which can lead to It crosses terminal and routing device is established.
Step 102: the first electronic equipment sends the identification information to the second electronic equipment.
In practical applications, the second electronic equipment might have stored identical with the first verification information of the first electronic equipment Third verification information, in this case, if other electronic equipments are obtained in the case where without permission by the second electronic equipment First verification information can obtain corresponding access authority by the first verification information, and then may cause to user centainly Economic loss, information leakage etc..
For using above-mentioned WLAN as Wireless Fidelity (WIFI, Wireless Fidelity) network, the first user is obtained The WIFI encrypted message of cicada second user, the first user pass through the application program (such as WIFI skeleton key) in terminal for password Information is uploaded to server, so that the WIFI password of second user is stored in server, in this case, if third user The WIFI password that second user is known by the application program (such as WIFI skeleton key) in terminal, can not permit in second user Perhaps the WIFI network that second user is accessed in the case where accesses internet by the routing device of second user, causes the second use The economic loss at family.
In some embodiments, it can be that the period is (specific that the first electronic equipment, which sends identification information to the second electronic equipment, Can be set according to actual needs) transmission of property, or the transmission when receiving triggering command.
Step 103: the first electronic equipment obtains matching result, and matching result is that the second electronic equipment is based on identification information With obtaining, be used to indicate the existence of the third verification information of corresponding identification information, wherein third verification information can and first Verification information is identical.
Here, in actual implementation, after identification information is sent to the second electronic equipment by the first electronic equipment, the second electronics Equipment is matched based on identification information with the identification information in the verification information list itself stored, is deposited in verification information list The corresponding relationship for having stored up identification information and verification information, when based on identification information match to there are corresponding verification informations (i.e. the Three verification informations) when, the second electronic equipment returns to characterization, and there are the matching results of corresponding third verification information to the first electronics Equipment;When based on identification information be not matched to corresponding third verification information when, the second electronic equipment return characterization there is no pair The matching result for the third verification information answered gives the first electronic equipment.
In practical applications, third verification information can be same or different with the first verification information, for example, inciting somebody to action in user After first verification information is uploaded to the second electronic equipment, the first verification information is modified/updates, and in the second electronic equipment The content of third verification information be still the first verification information before original modification/update, at this point, the of the first electronic equipment One verification information is different from the third verification information of the second electronic equipment;For another example, the first verification information is uploaded to second by user After electronic equipment, the first verification information of the first electronic equipment is without modification, at this point, the first verifying letter of the first electronic equipment It ceases identical as the third verification information of the second electronic equipment.
Illustratively, still by taking WLAN is WIFI network as an example, when the first user uploads WIFI password to server Afterwards, second user is modified WIFI password, and the WIFI password stored in server at this time and the WIFI of the first user are close Code is different;And if the first user upload WIFI password to server after, second user does not modify to WIFI password, server The WIFI password of middle storage and the WIFI password of the first user are just identical.
Step 104: if matching result meets execution condition, the first electronic equipment executes processing order, so that first tests Demonstrate,proving information can be in the state that can not be obtained by the second electronic equipment.
In some embodiments, when matching result meets execution condition, the first electronic equipment executes processing order, so that First verification information can be in the state that can not be obtained by the second electronic equipment, comprising:
First electronic equipment existence according to indicated by matching result determines that third verification information is in obtainable State;Processing order is executed, the first verification information is enabled to be in the state that can not be obtained by the second electronic equipment.Namely Say, as long as storing third verification information in the second electronic equipment, regardless of third verification information and the first verification information whether phase Together, it in order to avoid illegal user's gain access, just triggers the first electronic equipment and executes processing order, so that the first verifying letter Breath can such as modify the first verification information in the state that can not be obtained by the second electronic equipment.
Illustratively, after routing device (the first electronic equipment) sends SSID to server (the second electronic equipment), Server is based on SSID inquiry and there is WIFI encrypted message corresponding with the SSID, in order to avoid illegal user is by obtaining clothes In business device after the WIFI password that stores, the risk of corresponding access authority is obtained, routing device does not go to verify to be stored in server Whether WIFI password WIFI password corresponding with itself is identical, processing order is directly executed, so that the WIFI password of itself is in The state that can not be obtained by server.
In some embodiments, the second electronic equipment return matching result in addition to instruction third verification information there are shapes Outside state, third verification information is also carried, at this point, the first electronic equipment carries matching result before executing processing order Third verification information is compared with the first verification information, to judge whether third verification information is identical as the first verification information, If being based on comparison result, determines that third verification information and the first verification information of the first electronic equipment match, be then considered as first There is leakage in verification information, the first electronic equipment of triggering executes processing order, and the first verification information, which is in, to be passed through The state that second electronic equipment obtains.
Here, that is to say, that be only to store third verification information in the second electronic equipment to be not enough to trigger the first electricity Sub- equipment executes processing order, the first electronic equipment still need to verify the first verification information and itself the first verification information whether phase Together, it only just goes to execute processing order under identical circumstances.
Still by taking WLAN is WIFI network as an example, due to uploading the WIFI password of second user in the first user extremely After server, there are the possibility of second user modification WIFI password, therefore, when the first electronic equipment receives instruction server In store the matching result of WIFI password of second user after, still need to verify the WIFI password stored in server and current the Whether the WIFI password of one electronic equipment is identical, and only just setting out under identical circumstances executes itself WIFI password and be in nothing The process instruction for the state that method is obtained by server, in this way, avoiding the WIFI password that stores in the server and current In the unmatched situation of WIFI password of first electronic equipment, the wasting of resources caused by processing order is executed.
In some embodiments, when matching result meets execution condition, in order to enable the first verification information can be in nothing Method passes through the state that the second electronic equipment obtains, and the first electronic equipment exports prompt information, which shows that third is verified The state that information can be obtained by the second electronic equipment.
Specifically, the first electronic equipment can at least one in the following manner output prompt information:
First electronic equipment is provided with output device, and the first electronic equipment realizes prompt information by the output device of itself Local output;
Establishing between first electronic equipment and target electronic device has a communication connection, the first electronic equipment send prompt information to Target electronic device;Wherein, target electronic device can have any electronics of communication connection to set to establish with the first electronic equipment It is standby, or be the specific electronic equipment set of setting.Illustratively, target electronic device can for first locating for the first electronic equipment The mobile terminal device of network, if router device and the foundation of the mobile phone of Configuration network have communication connection, router device is sent Prompt information is repaired to the mobile phone of Configuration network so that owner carries out password after recognizing that encrypted message has the risk leaked Change.
In some embodiments, in order to enable the first verification information can be in the shape that can not be obtained by the second electronic equipment State, the first electronic equipment can modify to the first verification information, and specifically, the first electronic equipment modifies the first verification information For the 4th verification information, the 4th verification information is different from the first verification information.
In actual implementation, after the first verification information is revised as the 4th verification information by the first electronic equipment, in order to make The 4th electronic equipment for obtaining access authority can regain access authority, and the first electronic equipment notifies the 4th electronic equipment It is changed to the 4th verification information and regains access authority.
In actual implementation, under the premise of guaranteeing safety, in order to make the 4th electronic equipment for obtaining access authority Access authority can be regained, the first electronic equipment can first notify the 4th electronic equipment to be changed to the 4th verification information and regain Access authority, then the first verification information is revised as the 4th verification information again by the first electronic equipment.Here, the first electronic equipment Being sent in the notice of the 4th electronic equipment may include modification time, e.g., after 1 minute modify to the first verification information or X It modifies for X points when year X month X day X, certainly, also may not include modification time in notice.
In practical applications, when the first electronic equipment modifies to the first verification information, exist and not all acquisition Cross the electronic equipment of access authority all therewith in connection status the case where, it is in this case, not connected therewith to be paid a visit Ask that the electronic equipment of permission just can not timely synchronous vacations information (modified verification information), such as family router hair Existing, user does not go home also when carrying out the modification of WIFI password, and such mobile phone can not just obtain the WIFI encrypted message modified automatically, because This, stored in the electronic equipment of the above-mentioned information of synchronous vacations not in time be modification before verification information, when it is above-mentioned not in time When the electronic equipment of synchronous vacations information sends connection request to the first electronic equipment again, the first electronic equipment need to be for reception To connection request judge whether to the electronic equipment synchronous vacations information.In some embodiments, it is incited somebody to action in the first electronic equipment First verification information is revised as after the 4th verification information, if receiving the connection request of the 5th electronic equipment transmission, the connection The first verification information or third verification information are carried in request, the first electronic equipment judges whether to need to notify the 5th electronic equipment It is instead based on the 4th verification information gain access, and corresponding operation is executed based on judging result.
Here, for for the electronic equipment for sending connection request, the first electronic equipment is not asked to all transmissions connection The electronic equipment asked feeds back the 4th verification information, and in actual implementation, the first electronic equipment is still to further based on connection request Determine whether that the electronic equipment for sending connection request is fed back.
In some embodiments, the first electronic equipment can judge whether to need to notify the 5th electronic equipment in the following way It is instead based on the 4th verification information gain access:
First electronic equipment judges whether the 5th electronic equipment obtained access authority, if the 5th electronic equipment obtained Access authority, the 4th verification information of feedback gives the 5th electronic equipment, so that the 5th electronic equipment is obtained based on the 4th verification information Access authority;If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the 5th electronic equipment.Example Such as, router judges whether be attached thereto before the mobile phone, i.e., whether accessed routing for the mobile phone for sending connection request WLAN where device, namely judge whether the mobile phone passes through router access and cross internet, however, it is determined that the mobile phone once obtained Access authority was obtained, modified verification information is just fed back, in this way, preventing from searching the new of the identification information of the first electronic equipment Equipment obtains modified verification information when attempting and connecting the first electronic equipment, such as prevents from searching router corresponding The mobile phone of SSID obtains the modified password of the WIFI network when attempting WIFI network corresponding to access.
In some embodiments, the first electronic equipment is after modifying to the first verification information, after corresponding modification is arranged Verification information feedback time, the feedback time characterize the first electronic equipment after carrying out verification information modification, based on reception The effective time of verification information after the connection request automatic feedback modification arrived, the length of feedback time can be carried out according to actual needs Setting, such as X days/X weeks/X month.Correspondingly, the first electronic equipment can judge whether to need to notify the 5th electronics in the following way Equipment is instead based on the 4th verification information gain access:
The time of connection request of first electronic equipment based on the 5th electronic equipment received, whether judge the time In feedback time, if the 4th verification information of feedback gives the 5th electronic equipment, so that the 5th electronics in feedback time Equipment is based on the 4th verification information gain access;If not feeding back the 4th verification information to the 5th in feedback time Electronic equipment.That is, for sending the electronic equipment of connection request, the first electronic equipment is fed back in feedback time Modified verification information (the 4th verification information), and outside feedback time, for sending the electronic equipment of connection request, first Electronic equipment does not feed back modified verification information.For example, router setting feedback time is after carrying out the modification of WIFI password One month, when router is after carrying out the modification of WIFI password, the company of the WIFI password before receiving the carrying modification of mobile phone transmission Request is connect, whether the time that router judgement receives connection request is in feedback time, will be modified if be in WIFI cipher feedback is to mobile phone, if be not in, does not feed back modified WIFI password.In this way, preventing from owning in future time By the new equipment of the identification information of server search to the first electronic equipment, just obtained when attempting and connecting the first electronic equipment Modified verification information such as prevents the mobile phone for searching the corresponding SSID of router from attempting the corresponding WIFI network of access When, just obtain the modified password of the WIFI network.
Next using the first electronic equipment as radio reception device, the second electronic equipment be server, third electronic equipment To be illustrated for terminal to the information processing method of the application, wherein radio reception device is located at internet and WIFI net Network, Fig. 2 is the flow diagram of information processing method provided by the embodiments of the present application, referring to fig. 2, provided by the embodiments of the present application Information processing method includes:
Step 201: the SSID of WIFI network where radio reception device obtains itself.
Here, in practical applications, the SSID of WIFI network is stored in radio reception device, radio reception device can be straight The SSID for taking storage is obtained, alternatively, storing the WIFI network in the other electronic equipments connecting with radio reception device SSID, radio reception device can obtain the SSID of other electronic equipment storages by the communication connection of foundation.
Step 202: radio reception device sends SSID to server.
In actual implementation, radio reception device can periodically send SSID to server, such as send once daily, or Person, radio reception device send SSID to server when receiving the instruction that coupled management equipment is sent.
Step 203: the SSID received is compared server with the SSID that itself is stored, judge whether there is with The corresponding WIFI password of SSID, and if it exists, execute step 204;Otherwise, step 207 is executed.
Step 204: server return instruction is wirelessly connect in the presence of the first matching result of WIFI password corresponding with SSID Enter equipment.
Step 205: radio reception device is based on the first matching result, repairs to the WIFI password of place WIFI network Change.
Here, that is to say, that radio reception device, which is once learnt in server, stores WIFI password corresponding with SSID Just carry out the modification of WIFI password, and though the WIFI password of the WIFI password stored in server and current WIFI network whether phase Together.
Step 206: the electronic equipment that radio reception device notice accessed WIFI network is based on modified WIFI password Re-start access.
Step 207: server returns to instruction, and there is no the second matching results of WIFI password corresponding with SSID to wireless Access device.
Step 208: radio reception device is based on the second matching result and does not deal with.
Continue using the first electronic equipment as radio reception device, the second electronic equipment is server, third electronic equipment is The information processing method of the application is illustrated for terminal, wherein radio reception device is located at internet and WIFI network, Fig. 3 is the flow diagram of information processing method provided by the embodiments of the present application, referring to Fig. 3, letter provided by the embodiments of the present application Ceasing processing method includes:
Step 301: the SSID of WIFI network where radio reception device obtains itself.
Here, in practical applications, the SSID of WIFI network is stored in radio reception device, radio reception device can be straight The SSID for taking storage is obtained, alternatively, storing the WIFI network in the other electronic equipments connecting with radio reception device SSID, radio reception device can obtain the SSID of other electronic equipment storages by the communication connection of foundation.
Step 302: radio reception device sends SSID to server.
In actual implementation, radio reception device can periodically send SSID to server, such as send once daily, or Person, radio reception device send SSID to server when receiving the instruction that coupled management equipment is sent.
Step 303: the SSID received is compared server with the SSID that itself is stored, judge whether there is with The corresponding WIFI password of SSID, and if it exists, execute step 304;Otherwise, step 310 is executed.
Step 304: the first matching result that server returns to carrying WIFI password corresponding with SSID is set to wireless access It is standby.
Step 305: radio reception device be based on the first matching result, judge the first matching result carry WIFI password and Whether the WIFI password of current WIFI network is identical, if identical, executes step 306;If it is not the same, executing step 310.
Step 306: radio reception device modifies to the WIFI password of current WIFI network.
Step 307: radio reception device receives the access request of electronic equipment transmission, before carrying modification in access request WIFI password.
Step 308: radio reception device judges whether electronic equipment accessed the WIFI network, if accessed, holds Row step 309;Otherwise, step 310 is executed.
Step 309: the electronic equipment that radio reception device notice accessed WIFI network is based on modified WIFI password Re-start access.
Step 310: radio reception device is not dealt with.
The embodiment of the present application also provides a kind of first electronic equipments, and in some embodiments, the first electronic equipment can lead to The mode for crossing software or hardware or soft or hard combination is implemented, and Fig. 4 is the composition knot of the first electronic equipment provided by the embodiments of the present application Structure schematic diagram, referring to fig. 4, the first electronic equipment provided by the embodiments of the present application includes:
First obtains module 41, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronics is set Standby to have the first verification information, first verification information is for determining that the third electronic equipment of request gain access is sent The second verification information whether meet condition;
Sending module 42, for sending the identification information to the second electronic equipment;
Second obtains module 43, and for obtaining matching result, the matching result is based on institute for second electronic equipment It states identification information match to obtain, is used to indicate the existence of the third verification information of the corresponding identification information, wherein described Third verification information can be identical with first verification information;
Execution module 44 executes processing order, so that described first if meeting execution condition for the matching result Verification information can be in the state that can not be obtained by second electronic equipment.
In some embodiments, the execution module, specifically for the presence according to indicated by the matching result State determines that the third verification information is in obtainable state;
Processing order is executed, first verification information is in can not be by second electronic equipment acquisition State.
In some embodiments, the matching result carries the third verification information, and first electronic equipment also wraps Include comparison module;
The comparison module, the third verification information for carrying the matching result are set with first electronics Standby first verification information is compared, and obtains comparison result;
Based on the comparison result, the third verification information and first electronics that the matching result carries are determined First verification information of equipment matches.
In some embodiments, the execution module, is specifically used for output prompt information, and the prompt information shows described The state that third verification information can be obtained by second electronic equipment.
In some embodiments, the execution module, specifically for first verification information is revised as the 4th verifying Information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the visit notice Ask permission.
In some embodiments, the execution module, specifically for testing first verification information is revised as the 4th After demonstrate,proving information, the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
In some embodiments, the execution module, specifically for notifying the 4th electronic equipment to be changed to described After four verification informations regain the access authority, first verification information is revised as the 4th verification information.
In some embodiments, first electronic equipment further include:
Feedback module, carrying first verification information or the third for receiving the transmission of the 5th electronic equipment are tested Demonstrate,prove the connection request of information;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, the 4th verification information is fed back to the 5th electronics Equipment;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the described 5th Electronic equipment.
In some embodiments, the gain access refers to: obtaining and accesses the second net by first electronic equipment The permission of network;
Wherein, first electronic equipment is located at second network and first network, and the first network is described The network that three electronic equipments and first electronic equipment can be established, second electronic equipment are located at second network.
It need to be noted that: above is referred to the description of the first electronic equipment, be with above method description it is similar, together The beneficial effect of method describes, and does not repeat them here, thin for undisclosed technology in the first electronic equipment described in the embodiment of the present application Section, please refers to the description of the application information processing method embodiment.
Fig. 5 is the composed structure schematic diagram of the first electronic equipment provided by the embodiments of the present application, and referring to Fig. 5, the application is real Applying the first electronic equipment 50 that example provides includes:
At least one processor 51, memory 52, user interface 53 and at least one network interface 54.First electronic equipment In various components be coupled by bus system 55.It is appreciated that bus system 55 is for realizing between these components Connection communication.Bus system 55 further includes that power bus, control bus and status signal are total in addition to including data/address bus Line.But for the sake of clear explanation, various buses are all designated as bus system 55 in Fig. 5.
Wherein, user interface 53 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch Plate or touch screen etc..
It is appreciated that memory 52 can be volatile memory or nonvolatile memory, may also comprise volatibility and Both nonvolatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory), Programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM (EPROM, Erasable Programmable Read-Only Memory), flash memory (Flash Memory) etc..Volatibility is deposited Reservoir can be random access memory (RAM, Random Access Memory), be used as External Cache.By showing Example property but be not restricted explanation, the RAM of many forms is available, such as static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory (SSRAM, Synchronous Static Random Access Memory).The memory 52 of the embodiment of the present application description is intended to include the storage of these and any other suitable type Device.
Memory 52 in the embodiment of the present application can storing data to support the operation of electronic equipment.These data are shown Example includes: any computer program for operating on an electronic device, such as operating system and application program.Wherein, operation system System includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various basic businesses and processing Hardware based task.Application program may include various application programs.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application should be based on the protection scope of the described claims.

Claims (10)

1. a kind of information processing method, comprising:
First electronic equipment obtains the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has first Verification information, the second verifying that first verification information is sent for determining the third electronic equipment of request gain access Whether information meets condition;
First electronic equipment sends the identification information to the second electronic equipment;
First electronic equipment obtains matching result, and the matching result is that second electronic equipment is believed based on the mark Breath matching obtains, and is used to indicate the existence of the third verification information of the corresponding identification information, wherein the third verifying Information can be identical with first verification information;
If the matching result meets execution condition, first electronic equipment executes processing order, so that described first tests Demonstrate,proving information can be in the state that can not be obtained by second electronic equipment.
2. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
The existence according to indicated by the matching result determines that the third verification information is in obtainable shape State;
Processing order is executed, first verification information is enabled to be in the shape that can not be obtained by second electronic equipment State.
3. according to the method described in claim 2, wherein, the matching result carries the third verification information, the execution Before processing order, further includes:
First verification information of the third verification information and first electronic equipment that the matching result is carried It is compared, obtains comparison result;
Based on the comparison result, the third verification information and first electronic equipment that the matching result carries are determined First verification information match.
4. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
First electronic equipment exports prompt information, and the prompt information shows that the third verification information can be by described the The state that two electronic equipments obtain.
5. according to the method described in claim 1, wherein, first electronic equipment executes processing order, so that described first Verification information can be in the state that can not be obtained by second electronic equipment, comprising:
First verification information is revised as the 4th verification information;
The 4th electronic equipment of gain access is changed to the 4th verification information and regains the access right notice Limit.
6. according to the method described in claim 5, wherein, the 4th electronic equipment for notifying gain access is changed to 4th verification information regains the access authority, comprising:
After first verification information is revised as the 4th verification information by first electronic equipment, first electronics is set It is standby that the 4th electronic equipment is notified to be changed to the 4th verification information and regain the access authority.
7. it is described that first verification information is revised as the 4th verification information according to the method described in claim 5, wherein, Include:
The 4th electronic equipment is notified to be changed to the 4th verification information and regain the visit in first electronic equipment After asking permission, first verification information is revised as the 4th verification information by first electronic equipment.
8. according to the method described in claim 5, wherein, the method also includes:
Receive the connection request for carrying first verification information or the third verification information of the 5th electronic equipment transmission;
Based on the connection request, judge whether the 5th electronic equipment obtained access authority;
If the 5th electronic equipment obtained access authority, feeds back the 4th verification information and set to the 5th electronics It is standby;
If the 5th electronic equipment did not obtained access authority, the 4th verification information is not fed back to the 5th electronics Equipment.
9. method according to any one of claims 1 to 8, wherein
The gain access refers to: obtaining the permission that the second network is accessed by first electronic equipment;
Wherein, first electronic equipment is located at second network and first network, and the first network is the third electricity The network that sub- equipment and first electronic equipment can be established, second electronic equipment are located at second network.
10. a kind of first electronic equipment, comprising:
First obtains module, for obtaining the identification information of characterization of electronic equipment mark;Wherein, first electronic equipment has First verification information, the second of third electronic equipment transmission of first verification information for determining request gain access Whether verification information meets condition;
Sending module, for sending the identification information to the second electronic equipment;
Second obtains module, and for obtaining matching result, the matching result is that second electronic equipment is based on the mark Information matches obtain, and are used to indicate the existence of the third verification information of the corresponding identification information, wherein the third is tested Demonstrate,proving information can be identical with first verification information;
Execution module executes processing order if meeting execution condition for the matching result, so that the first verifying letter Breath can be in the state that can not be obtained by second electronic equipment.
CN201910253261.7A 2019-03-29 2019-03-29 Information processing method and electronic equipment Active CN109996228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910253261.7A CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910253261.7A CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN109996228A true CN109996228A (en) 2019-07-09
CN109996228B CN109996228B (en) 2021-04-13

Family

ID=67132077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910253261.7A Active CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN109996228B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297628A (en) * 2021-12-29 2022-04-08 联想(北京)有限公司 Control method and device and electronic equipment

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103297408A (en) * 2012-03-02 2013-09-11 腾讯科技(深圳)有限公司 Login method and device, terminal and network server
CN103716793A (en) * 2013-12-20 2014-04-09 小米科技有限责任公司 Access point information sharing method and apparatus
CN104159226A (en) * 2014-07-24 2014-11-19 小米科技有限责任公司 Network connection method and device
US20140351586A1 (en) * 2012-02-20 2014-11-27 Lock Box Pty Ltd Cryptographic method and system
CN104581716A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Connection method of wireless access points and wireless access point equipment
CN104618873A (en) * 2015-01-15 2015-05-13 腾讯科技(深圳)有限公司 Method and device for sharing access point information
US20150278510A1 (en) * 2014-03-31 2015-10-01 Google Inc. Credential Sharing
CN105743844A (en) * 2014-12-08 2016-07-06 联想(北京)有限公司 Information processing method and electronic device
CN106162818A (en) * 2015-04-09 2016-11-23 厦门众联世纪科技有限公司 The method unlocking WIFI hot spot
US20170011213A1 (en) * 2015-07-06 2017-01-12 Unisys Corporation Cloud-based active password manager
CN106412884A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 WIFI connection management method and apparatus thereof
CN106412911A (en) * 2016-11-25 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Wireless access point monitoring method, wireless access point monitoring device and electronic equipment
CN106714161A (en) * 2016-06-29 2017-05-24 腾讯科技(深圳)有限公司 Method for cutting off network connection of unauthorized mobile terminal, equipment and system
CN107645495A (en) * 2017-08-24 2018-01-30 上海斐讯数据通信技术有限公司 A kind of wireless network password sharing method and system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140351586A1 (en) * 2012-02-20 2014-11-27 Lock Box Pty Ltd Cryptographic method and system
CN103297408A (en) * 2012-03-02 2013-09-11 腾讯科技(深圳)有限公司 Login method and device, terminal and network server
CN103716793A (en) * 2013-12-20 2014-04-09 小米科技有限责任公司 Access point information sharing method and apparatus
CN106912048A (en) * 2013-12-20 2017-06-30 小米科技有限责任公司 Access-in point information sharing method and device
US20150278510A1 (en) * 2014-03-31 2015-10-01 Google Inc. Credential Sharing
CN104159226A (en) * 2014-07-24 2014-11-19 小米科技有限责任公司 Network connection method and device
CN105743844A (en) * 2014-12-08 2016-07-06 联想(北京)有限公司 Information processing method and electronic device
CN104581716A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Connection method of wireless access points and wireless access point equipment
CN104618873A (en) * 2015-01-15 2015-05-13 腾讯科技(深圳)有限公司 Method and device for sharing access point information
CN106162818A (en) * 2015-04-09 2016-11-23 厦门众联世纪科技有限公司 The method unlocking WIFI hot spot
US20170011213A1 (en) * 2015-07-06 2017-01-12 Unisys Corporation Cloud-based active password manager
CN106714161A (en) * 2016-06-29 2017-05-24 腾讯科技(深圳)有限公司 Method for cutting off network connection of unauthorized mobile terminal, equipment and system
CN106412884A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 WIFI connection management method and apparatus thereof
CN106412911A (en) * 2016-11-25 2017-02-15 宇龙计算机通信科技(深圳)有限公司 Wireless access point monitoring method, wireless access point monitoring device and electronic equipment
CN107645495A (en) * 2017-08-24 2018-01-30 上海斐讯数据通信技术有限公司 A kind of wireless network password sharing method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡浩: "腾达WiFi APP防蹭网保障家庭网络安全", 《计算机与网络》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297628A (en) * 2021-12-29 2022-04-08 联想(北京)有限公司 Control method and device and electronic equipment

Also Published As

Publication number Publication date
CN109996228B (en) 2021-04-13

Similar Documents

Publication Publication Date Title
US6907551B2 (en) Fault notification method and related provider facility
US9173050B2 (en) Application store system and development method using the application store system
CN105978873A (en) Registration method and device of customized equipment
CN103634935B (en) WPS (Wi-Fi protected setup) or QSS (quick secure setup)-based network accessing method and device
CN101610226A (en) A kind of method and system of plug-in download
CN104579830B (en) service monitoring method and device
CN108206830A (en) Vulnerability scanning method, apparatus, computer equipment and storage medium
CN107145439B (en) Test request processing method and device
CN109618176A (en) A kind of processing method of live broadcast service, equipment and storage medium
CN108829838A (en) A kind of account information batch processing method and server
CN107026871A (en) Web vulnerability scanning method based on cloud computing
CN109491645A (en) Point methods, device, computer equipment and storage medium are buried based on interface element
CN110457629A (en) Permission processing, authority control method and device
CN110278192A (en) Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
CN109729535A (en) Opening base station method, apparatus, computer storage medium and equipment
CN108306882A (en) A kind of method and the network equipment of terminal access business
CN107196983A (en) A kind of resource distribution method and device
CN113672894A (en) Data processing method, device and equipment for identifying code request and storage medium
CN106031204B (en) Management of Virtual Subscriptions
CN109996228A (en) A kind of information processing method and electronic equipment
CN110336813A (en) A kind of access control method, device, equipment and storage medium
CN106791982A (en) Account management method and device
CN110535919A (en) Network access method and device of concentrator and power peak regulation system
CN110069277A (en) Using loading method, using online equipment, storage medium and device
CN108647077A (en) File management method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant