CN110022322B - MAC address protection method and terminal equipment - Google Patents

MAC address protection method and terminal equipment Download PDF

Info

Publication number
CN110022322B
CN110022322B CN201910299408.6A CN201910299408A CN110022322B CN 110022322 B CN110022322 B CN 110022322B CN 201910299408 A CN201910299408 A CN 201910299408A CN 110022322 B CN110022322 B CN 110022322B
Authority
CN
China
Prior art keywords
mac address
terminal device
request message
user interface
allowing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910299408.6A
Other languages
Chinese (zh)
Other versions
CN110022322A (en
Inventor
李顺真
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201910299408.6A priority Critical patent/CN110022322B/en
Publication of CN110022322A publication Critical patent/CN110022322A/en
Application granted granted Critical
Publication of CN110022322B publication Critical patent/CN110022322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/622Layer-2 addresses, e.g. medium access control [MAC] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a MAC address protection method and terminal equipment, wherein the method comprises the following steps: receiving a request message, wherein the request message is used for requesting to acquire the MAC address of the terminal equipment; and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface. Therefore, the MAC address protection method provided by the invention can effectively prevent others from maliciously collecting the MAC address of the terminal equipment, and avoids the condition that inconvenience is caused to users due to MAC address leakage.

Description

MAC address protection method and terminal equipment
Technical Field
The embodiment of the invention relates to the technical field of terminal equipment, in particular to a Media Access Control (MAC) Address protection method and terminal equipment.
Background
A WIFI (WIreless-Fidelity, mobile hotspot) probe refers to a terminal device that can identify a detection range and start a WIFI receiving function based on a WIFI detection technology, and acquire an MAC address of the terminal device.
Merely revealing the MAC address itself does not cause disclosure of personal privacy information, but the MAC address in combination with other data easily causes disclosure of personal privacy information of a user. For example, a company with a WIFI probe may use the MAC address in combination with other data (e.g., correspondence between the MAC address and the terminal device identification information, the contact number, the internet access information, etc.) to accurately obtain the identification information, the contact number, the internet access information, etc. of the terminal device. Some companies also analyze the daily behavior of the user according to the identification information, contact number, internet access information and the like of the terminal device, and/or push advertisements to the user of the terminal device, which causes unnecessary disturbance to the user.
Therefore, in the prior art, the MAC address of the terminal device is easy to leak, which is inconvenient for the user.
Disclosure of Invention
The embodiment of the invention provides an MAC address protection method and terminal equipment, and aims to solve the problem that in the prior art, the MAC address of the terminal equipment is easy to leak and inconvenient for users.
In order to solve the technical problem, the invention is realized as follows:
in a first aspect, an embodiment of the present invention provides a MAC address protection method, which is applied to a terminal device, and the method includes:
receiving a request message, wherein the request message is used for requesting to acquire the MAC address of the terminal equipment;
and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface.
In a second aspect, an embodiment of the present invention provides a terminal device, where the terminal device includes:
a receiving module, configured to receive a request message, where the request message is used to request to acquire an MAC address of the terminal device;
and the control module is used for responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired or not according to the input on the first user interface.
In a third aspect, an embodiment of the present invention provides another terminal device, including a processor, a memory, and a computer program stored on the memory and operable on the processor, where the computer program, when executed by the processor, implements the steps of the MAC address protection method described above.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements the steps of the MAC address protection method described above.
In the embodiment of the invention, terminal equipment receives a request message, wherein the request message is used for requesting to acquire an MAC address of the terminal equipment; and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface. Therefore, the MAC address protection method provided by the embodiment of the invention can effectively prevent others from maliciously collecting the MAC address of the terminal equipment, and avoids the condition that inconvenience is caused to users due to MAC address leakage.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a flowchart of a MAC address protection method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a user interface provided by an embodiment of the invention;
fig. 3 is a second flowchart of a MAC address protection method according to an embodiment of the present invention;
FIG. 4 is a second schematic diagram of a user interface provided by the embodiment of the invention;
fig. 5 is one of the structural diagrams of the terminal device provided in the embodiment of the present invention;
fig. 6 is a second structural diagram of a terminal device according to the embodiment of the present invention;
fig. 7 is a third structural diagram of a terminal device according to an embodiment of the present invention;
fig. 8 is a fourth structural diagram of a terminal device according to an embodiment of the present invention;
fig. 9 is a schematic diagram of a hardware structure of a terminal device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart of a MAC address protection method provided in an embodiment of the present invention, where the MAC address protection method is applied to a terminal device, as shown in fig. 1, and includes the following steps:
step 101, receiving a request message, where the request message is used to request to acquire the MAC address of the terminal device.
In this step, the terminal device receives a request message, where the request message is used to request to acquire an MAC address of the terminal device. The request message may be a request message sent by a WIFI probe, and may also be a request message sent by an application running on the terminal device.
It can be understood that, when the terminal device enters the detection range of the WIFI probe, if the WIFI reception function of the terminal device is in an on state (due to the popularization of connecting to the wireless network through WIFI, the WIFI reception function of the terminal device is usually in an always on state), the WIFI probe can detect the terminal device and send a request message to the terminal device for requesting to acquire the MAC address of the terminal device.
In some embodiments of the present invention, some applications running on the terminal device may also obtain the MAC address of the terminal device, and the request message may also be a request message sent by the applications running on the terminal device.
Step 102, responding to the request message, allowing to acquire the temporary MAC address of the terminal device, or displaying a first user interface, and determining whether to allow to acquire the MAC address of the terminal device according to the input on the first user interface.
In this step, the terminal device may allow acquiring the temporary MAC address of the terminal device in response to the request message. The temporary MAC address of the terminal device may also be a randomly generated MAC address, or may also be a dynamic MAC address, where the dynamic MAC address is a dynamically changing MAC address, for example, a MAC address that changes every preset time.
The terminal device may also display a first user interface in response to the request message, and determine whether to allow acquisition of the MAC address of the terminal device according to an input on the mobile terminal interface. The first user interface is used for a user to select whether the MAC address of the terminal device is allowed to be acquired or not, the user can select the MAC address in the first user interface according to an actual request, and the terminal device determines whether the MAC address of the terminal device is allowed to be acquired or not according to the input of the user in the first user interface. Specifically, in the case of receiving a first input at the first user interface, allowing acquisition of the MAC address of the terminal device; and in the case that a second input at the first user interface is received, prohibiting the acquisition of the MAC address of the terminal device.
It is understood that malicious leakage of the MAC address may be caused by the action that not all applications running on the terminal device attempt to acquire the MAC address of the terminal device, for example, only third-party applications may cause malicious leakage of the MAC address. Therefore, in some embodiments of the present invention, if the request message is a request message sent by an application running on the terminal device, the terminal device may first determine whether the application sending the request message is a preset application (for example, an application with a risk of MAC address leakage, or a third-party application), and if the application sending the request message is the preset application, further execute step 102; on the contrary, if the application program sending the request message is not the preset application program, the process is ended or the MAC address of the terminal device is directly allowed to be acquired in response to the request message.
It is understood that, in step 102, the terminal device opens the authority to acquire the temporary MAC address in response to the request message, and allows the terminal device or the third-party application to acquire the temporary MAC address of the terminal device, or displays a first user interface, and determines whether to open the authority to acquire the MAC address according to an input of the user on the first user interface, so as to determine whether to allow the terminal device or the third-party application to acquire the MAC address of the terminal device.
In this embodiment of the present invention, the terminal device may be a mobile terminal device, for example: mobile phones, Tablet Personal computers (Tablet Personal Computer), Laptop computers (Laptop Computer), Personal Digital Assistants (PDA), Mobile Internet Devices (MID) or Wearable devices (Wearable Device), digital cameras, and the like; but also fixed terminal equipment such as computers and the like.
In this embodiment, the MAC address protection method receives a request message, where the request message is used to request to acquire an MAC address of the terminal device; and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface. Therefore, the MAC address protection method provided by the embodiment can effectively prevent others from maliciously collecting the MAC address of the terminal device, and avoid the inconvenience caused by the MAC address leakage to the user.
Optionally, the allowing to acquire the temporary MAC address of the terminal device includes:
randomly generating an MAC address and allowing the randomly generated MAC address to be acquired;
or, allowing to acquire a dynamic MAC address of the terminal device, where the dynamic MAC address is a MAC address that changes at preset intervals.
In this embodiment, the temporary MAC address may be a randomly generated MAC address, or may also be a dynamic MAC address, where the dynamic MAC address is a dynamically changing MAC address, for example, a MAC address that changes every preset time.
Specifically, the terminal device may randomly generate a MAC address in response to the request message, and allow to acquire the randomly generated MAC address, where the randomly generated MAC address may be any randomly generated character string, for example, a character string in a randomly generated MAC address format, or another character string in any other randomly generated format.
The terminal device may also allow acquisition of a dynamic MAC address of the terminal device in response to the request message, the dynamic MAC address may be periodically changed or may be non-periodically changed, and is valid only for the lifetime of each dynamic MAC address regardless of whether the dynamic MAC address is periodically changed. For example, assuming that the dynamic MAC address changes to a first MAC address at time T0 and to a second MAC address at time T1 after T0, the first MAC address is valid for a time period between T0 and T1. The dynamic MAC address may change regularly or irregularly, which is not specifically limited in this embodiment of the present invention.
It should be noted that the fixed MAC address of the terminal device always exists on the terminal device, and one terminal device may simultaneously exist two MAC addresses, that is: one fixed MAC address, one temporary MAC address, but only one MAC address is valid at the same time.
In this embodiment, the terminal device only allows to acquire the temporary MAC address of the terminal device after receiving the request message, and the disclosure of the temporary MAC address does not cause disclosure of other privacy information associated with the MAC address of the user, so that inconvenience brought to the user by the disclosure of the MAC address can be effectively avoided.
Optionally, the allowing to acquire the temporary MAC address of the terminal device in response to the request message includes:
detecting whether the MAC address of the terminal equipment is in an encrypted state or not in response to the request message;
and under the condition that the MAC address of the terminal equipment is in an encrypted state, allowing the temporary MAC address of the terminal equipment to be acquired.
In this embodiment, after receiving the request message, the terminal device first detects whether the MAC address of the terminal device is in an encrypted state, and if the MAC address of the terminal device is in the encrypted state, it indicates that the user does not want to acquire the MAC at will, and the terminal device only allows to acquire the temporary MAC address. Therefore, the MAC address of the terminal equipment can be effectively prevented from being leaked, and inconvenience is avoided for users.
In some embodiments of the present invention, the terminal device may provide a user interface for a user to select whether to encrypt the MAC address of the terminal device, for example, as shown in fig. 2, fig. 2 is one of schematic user interfaces provided in the embodiments of the present invention, and the user may select to turn on or turn off the MAC address encryption function of the terminal device in an interface 200 shown in fig. 2.
Therefore, the user can encrypt or decrypt the MAC address of the terminal equipment according to the actual requirement of the user, and convenience is provided for the user. Specifically, when a user needs to acquire the MAC address of the terminal device, the MAC address encryption function of the terminal device may be turned off; when the user does not need to acquire the MAC address of the terminal equipment, the MAC address encryption function of the terminal equipment can be started, so that the MAC address can be prevented from being maliciously collected.
It should be noted that, in some embodiments of the present invention, if the MAC address of the terminal device is in an encrypted state, the terminal device may not allow to acquire any information (for example, not allow to acquire the temporary MAC address and not allow to acquire the MAC address).
Optionally, the allowing to acquire the temporary MAC address of the terminal device in response to the request message includes:
displaying a second user interface in response to the request message;
in the event that a third input is received at the second user interface, allowing the temporary MAC address of the terminal device to be obtained.
In this embodiment, after receiving the request message, the terminal device displays a second user interface for a user to select whether to allow the MAC address of the terminal device to be acquired. The user can select the second user interface according to an actual request, and the terminal device determines whether to allow the acquisition of the MAC address of the terminal device according to the input of the user on the second user interface. The second user interface may be the same interface as the first user interface, or may be different from the first user interface.
Specifically, the terminal device allows the temporary MAC address of the terminal device to be acquired when receiving a third input on the second user interface, where the third input is a selection input that does not allow the MAC address of the terminal device to be acquired. Conversely, the terminal device allows the MAC address of the terminal device to be obtained if a fourth input at the second user interface is received, the fourth input being a selection input allowing the MAC address of the terminal device to be obtained.
In this way, the embodiment provides the second user interface for the user to select, and then determines whether to allow the MAC address of the terminal device to be acquired according to the selection of the user, so that the user can select according to the actual requirement of the user, thereby bringing convenience to the user.
Referring to fig. 3, fig. 3 is a second flowchart of a MAC address protection method provided in an embodiment of the present invention, where the method is applied to a terminal device, and the main difference between this embodiment and the embodiment shown in fig. 1 is that this embodiment defines details for determining whether to acquire a MAC address according to a user input, and as shown in fig. 3, includes the following steps:
step 301, receiving a request message, where the request message is used to request to acquire the MAC address of the terminal device.
Step 301 is the same as step 101 in the embodiment shown in fig. 1 of the present invention, and is not described herein again.
Step 302, in response to the request message, displaying a first user interface.
In this step, the terminal device responds to the request message, and displays a first user interface, where the first user interface is used for a user to select whether to allow acquiring the MAC address of the terminal device.
For example, referring to fig. 4, fig. 4 is a second schematic diagram of a user interface provided in the embodiment of the present invention, where the first user interface may be an interface 400 shown in fig. 4, the interface 400 includes a first key 401 (a button shown in fig. 4 that allows acquiring a MAC address) and a second key 402 (a button shown in fig. 4 that does not allow acquiring a MAC address), and the terminal device determines whether to allow acquiring a MAC address of the terminal device according to a selection input of the user to the first key 401 or the second key 402.
Step 303, in case of receiving a first input at the first user interface, allowing to obtain the MAC address of the terminal device.
In this step, the terminal device allows acquiring the MAC address of the terminal device when receiving a first input in the first user interface, where the first input is a selection input allowing acquiring the MAC address of the terminal device.
For example, when the first user interface is the interface 400 shown in FIG. 4, the first input includes a selection input for the first button 401 shown in FIG. 4. I.e. in case a selection input to the first key 401 is received, the acquisition of the MAC address of the terminal device is allowed.
And 304, under the condition that a second input in the first user interface is received, forbidding to acquire the MAC address of the terminal equipment.
In this step, the terminal device prohibits acquiring the MAC address of the terminal device when receiving a second input in the first user interface, where the second input is a selection input that does not permit acquiring the MAC address of the terminal device.
For example, when the first user interface is the interface 400 shown in FIG. 4, the second input comprises a selection input for the second button 402 shown in FIG. 4. I.e. in case a selection input to the second key 402 is received, the acquisition of the MAC address of the terminal device is prohibited.
The prohibiting of acquiring the MAC address of the terminal device may include not allowing to acquire any information, and may also include allowing only to acquire a temporary MAC address of the terminal device, but not allowing to acquire a real MAC address of the terminal device.
In this embodiment, in the MAC address protection method, a terminal device receives a request message, where the request message is used to request to acquire an MAC address of the terminal device; displaying a first user interface in response to the request message; allowing acquisition of the MAC address of the terminal device in case of receiving a first input at the first user interface; and in the case that a second input at the first user interface is received, prohibiting the acquisition of the MAC address of the terminal device. Therefore, the MAC address protection method provided by the embodiment of the invention can effectively prevent others from maliciously collecting the MAC address of the terminal equipment, and avoids the condition that inconvenience is caused to users due to MAC address leakage.
Referring to fig. 5, fig. 5 is a structural diagram of a terminal device according to an embodiment of the present invention, which can implement details of the MAC address protection method in the foregoing embodiment and achieve the same effect. As shown in fig. 6, the terminal device 500 includes a receiving module 501 and a control module 502 connected to each other, wherein:
a receiving module 501, configured to receive a request message, where the request message is used to request to acquire an MAC address of the terminal device;
a control module 502, configured to, in response to the request message, allow to acquire the temporary MAC address of the terminal device, or display a first user interface, and determine whether to allow to acquire the MAC address of the terminal device according to an input on the first user interface.
Optionally, the control module 502 is specifically configured to:
randomly generating an MAC address and allowing the randomly generated MAC address to be acquired;
or, allowing to acquire a dynamic MAC address of the terminal device, where the dynamic MAC address is a MAC address that changes at preset intervals.
Referring to fig. 6, fig. 6 is a second schematic structural diagram of a terminal device according to an embodiment of the present invention, and as shown in fig. 6, the control module 502 includes:
a first allowing unit 5021, configured to allow obtaining of the MAC address of the terminal device in a case where a first input at the first user interface is received;
a prohibiting unit 5022, configured to prohibit obtaining the MAC address of the terminal device if a second input at the first user interface is received.
Optionally, referring to fig. 7, fig. 7 is a third schematic structural diagram of a terminal device according to an embodiment of the present invention, and as shown in fig. 7, the control module 502 includes:
a detecting unit 5023, configured to detect whether the MAC address of the terminal device is in an encrypted state in response to the request message;
a second allowing unit 5024, configured to allow obtaining of the temporary MAC address of the terminal device when the MAC address of the terminal device is in an encrypted state.
Optionally, referring to fig. 8, fig. 8 is a fourth schematic structural diagram of a terminal device according to an embodiment of the present invention, as shown in fig. 8, the control module 502 includes:
a display unit 5025 for displaying a second user interface in response to the request message;
a third allowing unit 5026, configured to allow the temporary MAC address of the terminal device to be acquired if a third input is received at the second user interface.
In this embodiment, the terminal device receives a request message, where the request message is used to request to acquire an MAC address of the terminal device; and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface. Therefore, the terminal equipment can effectively prevent others from maliciously collecting the MAC address of the terminal equipment, and the condition that inconvenience is caused to a user due to the fact that the MAC address is leaked is avoided.
Fig. 9 is a schematic diagram of a hardware structure of a terminal device for implementing various embodiments of the present invention, and as shown in fig. 9, the terminal device 900 includes, but is not limited to: a radio frequency unit 901, a network module 902, an audio output unit 903, an input unit 904, a sensor 905, a display unit 906, a user input unit 907, an interface unit 908, a memory 909, a processor 910, and a power supply 911. Those skilled in the art will appreciate that the terminal device configuration shown in fig. 9 does not constitute a limitation of the terminal device, and that the terminal device may include more or fewer components than shown, or combine certain components, or a different arrangement of components. In the embodiment of the present invention, the terminal device includes, but is not limited to, a mobile phone, a tablet computer, a notebook computer, a palm computer, a vehicle-mounted terminal device, a wearable device, a pedometer, and the like.
Wherein, the processor 910 is configured to:
receiving a request message, wherein the request message is used for requesting to acquire the MAC address of the terminal equipment;
and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface.
Optionally, the obtaining the temporary MAC address of the terminal device performed by the processor 910 includes:
randomly generating an MAC address and allowing the randomly generated MAC address to be acquired;
or, allowing to acquire a dynamic MAC address of the terminal device, where the dynamic MAC address is a MAC address that changes at preset intervals.
Optionally, the determining, by the processor 910, whether to allow acquiring the MAC address of the terminal device according to the input on the first user interface includes:
allowing acquisition of the MAC address of the terminal device in case of receiving a first input at the first user interface;
and in the case that a second input at the first user interface is received, prohibiting the acquisition of the MAC address of the terminal device.
Optionally, the allowing, performed by the processor 910 in response to the request message, to acquire the temporary MAC address of the terminal device includes:
detecting whether the MAC address of the terminal equipment is in an encrypted state or not in response to the request message;
and under the condition that the MAC address of the terminal equipment is in an encrypted state, allowing the temporary MAC address of the terminal equipment to be acquired.
Optionally, the processor 910 performs, in response to the request message, allowing to acquire the temporary MAC address of the terminal device, including:
displaying a second user interface in response to the request message;
in the event that a third input is received at the second user interface, allowing the temporary MAC address of the terminal device to be obtained.
In this embodiment, the terminal device receives a request message, where the request message is used to request to acquire an MAC address of the terminal device; and responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired according to input on the first user interface. Therefore, the terminal equipment can effectively prevent others from maliciously collecting the MAC address of the terminal equipment, and the condition that inconvenience is caused to a user due to the fact that the MAC address is leaked is avoided.
It should be understood that, in the embodiment of the present invention, the radio frequency unit 901 may be used for receiving and sending signals during a message transmission and reception process or a call process, and specifically, after receiving downlink data from a base station, the downlink data is processed by the processor 910; in addition, the uplink data is transmitted to the base station. Generally, the radio frequency unit 901 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier, a duplexer, and the like. In addition, the radio frequency unit 901 can also communicate with a network and other devices through a wireless communication system.
The terminal device provides wireless broadband internet access to the user through the network module 902, such as helping the user send and receive e-mails, browse webpages, access streaming media, and the like.
The audio output unit 903 may convert audio data received by the radio frequency unit 901 or the network module 902 or stored in the memory 909 into an audio signal and output as sound. Also, the audio output unit 903 may also provide audio output related to a specific function performed by the terminal apparatus 900 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output unit 903 includes a speaker, a buzzer, a receiver, and the like.
The input unit 904 is used to receive audio or video signals. The input Unit 904 may include a Graphics Processing Unit (GPU) 9041 and a microphone 9042, and the Graphics processor 9041 processes image data of a still picture or video obtained by an image capturing device (such as a camera) in a video capture mode or an image capture mode. The processed image frames may be displayed on the display unit 906. The image frames processed by the graphic processor 9041 may be stored in the memory 909 (or other storage medium) or transmitted via the radio frequency unit 901 or the network module 902. The microphone 9042 can receive sounds and can process such sounds into audio data. The processed audio data may be converted into a format output transmittable to a mobile communication base station via the radio frequency unit 901 in case of the phone call mode.
The terminal device 900 also includes at least one sensor 905, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor includes an ambient light sensor that can adjust the brightness of the display panel 9061 according to the brightness of ambient light, and a proximity sensor that can turn off the display panel 9061 and/or backlight when the terminal device 900 is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally three axes), detect the magnitude and direction of gravity when stationary, and can be used to identify the terminal device posture (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration identification related functions (such as pedometer, tapping), and the like; the sensors 905 may also include a fingerprint sensor, a pressure sensor, an iris sensor, a molecular sensor, a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, etc., which are not described in detail herein.
The display unit 906 is used to display information input by the user or information provided to the user. The Display unit 906 may include a Display panel 9061, and the Display panel 9061 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
The user input unit 907 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the terminal device. Specifically, the user input unit 907 includes a touch panel 9071 and other input devices 9072. The touch panel 9071, also referred to as a touch screen, may collect touch operations by a user on or near the touch panel 9071 (e.g., operations by a user on or near the touch panel 9071 using a finger, a stylus, or any other suitable object or accessory). The touch panel 9071 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 910, receives a command from the processor 910, and executes the command. In addition, the touch panel 9071 may be implemented by using various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The user input unit 907 may include other input devices 9072 in addition to the touch panel 9071. Specifically, the other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (such as a volume control key, a switch key, and the like), a track ball, a mouse, and a joystick, which are not described herein again.
Further, the touch panel 9071 may be overlaid on the display panel 9061, and when the touch panel 9071 detects a touch operation on or near the touch panel 9071, the touch panel is transmitted to the processor 910 to determine the type of the touch event, and then the processor 910 provides a corresponding visual output on the display panel 9061 according to the type of the touch event. Although in fig. 9, the touch panel 9071 and the display panel 9061 are implemented as two independent components to implement the input and output functions of the terminal device, in some embodiments, the touch panel 9071 and the display panel 9061 may be integrated to implement the input and output functions of the terminal device, which is not limited herein.
The interface unit 908 is an interface for connecting an external device to the terminal apparatus 900. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The interface unit 908 may be used to receive input (e.g., data information, power, etc.) from external devices and transmit the received input to one or more elements within the terminal apparatus 900 or may be used to transmit data between the terminal apparatus 900 and external devices.
The memory 909 may be used to store software programs as well as various data. The memory 909 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 909 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The processor 910 is a control center of the terminal device, connects various parts of the entire terminal device with various interfaces and lines, and performs various functions of the terminal device and processes data by running or executing software programs and/or modules stored in the memory 909 and calling data stored in the memory 909, thereby performing overall monitoring of the terminal device. Processor 910 may include one or more processing units; preferably, the processor 910 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 910.
The terminal device 900 may further include a power supply 911 (e.g., a battery) for supplying power to various components, and preferably, the power supply 911 may be logically connected to the processor 910 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.
In addition, the terminal device 900 includes some functional modules that are not shown, and are not described in detail here.
Preferably, an embodiment of the present invention further provides a terminal device, which includes a processor 910, a memory 909, and a computer program that is stored in the memory 909 and can be run on the processor 910, and when the computer program is executed by the processor 910, the computer program implements each process executed by the terminal device in the above-mentioned MAC address protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements each process of the above-mentioned MAC address protection method embodiment, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here. The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (9)

1. A MAC address protection method is applied to terminal equipment, and is characterized by comprising the following steps:
receiving a request message, wherein the request message is used for requesting to acquire the MAC address of the terminal equipment;
responding to the request message, allowing to acquire the temporary MAC address of the terminal equipment, or displaying a first user interface, and determining whether to allow to acquire the MAC address of the terminal equipment according to input on the first user interface;
the allowing to acquire the temporary MAC address of the terminal device in response to the request message includes:
detecting whether the MAC address of the terminal equipment is in an encrypted state or not in response to the request message;
and under the condition that the MAC address of the terminal equipment is in an encrypted state, allowing the temporary MAC address of the terminal equipment to be acquired.
2. The method of claim 1, wherein the allowing for obtaining the temporary MAC address of the terminal device comprises:
randomly generating an MAC address and allowing the randomly generated MAC address to be acquired;
or, allowing to acquire a dynamic MAC address of the terminal device, where the dynamic MAC address is a MAC address that changes at preset intervals.
3. The method of claim 1, wherein determining whether to allow acquisition of the MAC address of the terminal device based on the input on the first user interface comprises:
allowing acquisition of the MAC address of the terminal device in case of receiving a first input at the first user interface;
and in the case that a second input at the first user interface is received, prohibiting the acquisition of the MAC address of the terminal device.
4. The method according to claim 1 or 2, wherein the allowing to acquire the temporary MAC address of the terminal device in response to the request message comprises:
displaying a second user interface in response to the request message;
in the event that a third input is received at the second user interface, allowing the temporary MAC address of the terminal device to be obtained.
5. A terminal device, characterized in that the terminal device comprises:
a receiving module, configured to receive a request message, where the request message is used to request to acquire an MAC address of the terminal device;
the control module is used for responding to the request message, allowing the temporary MAC address of the terminal equipment to be acquired, or displaying a first user interface, and determining whether the MAC address of the terminal equipment is allowed to be acquired or not according to input on the first user interface;
the control module includes:
a detection unit configured to detect whether the MAC address of the terminal device is in an encrypted state in response to the request message;
a second allowing unit, configured to allow acquisition of the temporary MAC address of the terminal device when the MAC address of the terminal device is in an encrypted state.
6. The terminal device of claim 5, wherein the control module is specifically configured to:
randomly generating an MAC address and allowing the randomly generated MAC address to be acquired;
or, allowing to acquire a dynamic MAC address of the terminal device, where the dynamic MAC address is a MAC address that changes at preset intervals.
7. The terminal device of claim 5, wherein the control module comprises:
a first allowing unit configured to allow acquisition of the MAC address of the terminal device in a case where a first input at the first user interface is received;
a prohibiting unit configured to prohibit acquisition of the MAC address of the terminal device in a case where a second input at the first user interface is received.
8. The terminal device according to claim 5 or 6, wherein the control module comprises:
a display unit for displaying a second user interface in response to the request message;
a third allowing unit configured to allow acquisition of the temporary MAC address of the terminal device in a case where a third input at the second user interface is received.
9. A terminal device comprising a processor, a memory and a computer program stored on the memory and executable on the processor, the computer program, when executed by the processor, implementing the steps of the medium access control, MAC, address protection method according to any one of claims 1 to 4.
CN201910299408.6A 2019-04-15 2019-04-15 MAC address protection method and terminal equipment Active CN110022322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910299408.6A CN110022322B (en) 2019-04-15 2019-04-15 MAC address protection method and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910299408.6A CN110022322B (en) 2019-04-15 2019-04-15 MAC address protection method and terminal equipment

Publications (2)

Publication Number Publication Date
CN110022322A CN110022322A (en) 2019-07-16
CN110022322B true CN110022322B (en) 2021-07-20

Family

ID=67191306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910299408.6A Active CN110022322B (en) 2019-04-15 2019-04-15 MAC address protection method and terminal equipment

Country Status (1)

Country Link
CN (1) CN110022322B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047587A (en) * 2006-06-30 2007-10-03 华为技术有限公司 System and method for access external network of non-radio local network terminal
KR20120131763A (en) * 2011-05-26 2012-12-05 한국남부발전 주식회사 Apparatus for monitoring of power plant using mobile terminal
CN104812019A (en) * 2015-03-13 2015-07-29 深信服网络科技(深圳)有限公司 Wireless network access method, wireless access equipment and wireless control equipment
CN107786972A (en) * 2016-08-31 2018-03-09 华为技术有限公司 The method, terminal and access point of association are established in WLAN
CN108833607A (en) * 2018-06-12 2018-11-16 腾讯科技(深圳)有限公司 Physical address acquisition methods, device and readable medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101047587A (en) * 2006-06-30 2007-10-03 华为技术有限公司 System and method for access external network of non-radio local network terminal
KR20120131763A (en) * 2011-05-26 2012-12-05 한국남부발전 주식회사 Apparatus for monitoring of power plant using mobile terminal
CN104812019A (en) * 2015-03-13 2015-07-29 深信服网络科技(深圳)有限公司 Wireless network access method, wireless access equipment and wireless control equipment
CN107786972A (en) * 2016-08-31 2018-03-09 华为技术有限公司 The method, terminal and access point of association are established in WLAN
CN108833607A (en) * 2018-06-12 2018-11-16 腾讯科技(深圳)有限公司 Physical address acquisition methods, device and readable medium

Also Published As

Publication number Publication date
CN110022322A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
CN110995923B (en) Screen projection control method and electronic equipment
CN109194818B (en) Information processing method and terminal
CN108279948B (en) Application program starting method and mobile terminal
CN109710349B (en) Screen capturing method and mobile terminal
CN108629171B (en) Unread message processing method and terminal
CN110188524B (en) Information encryption method, information decryption method and terminal
CN111464428B (en) Audio processing method, server, electronic device, and computer-readable storage medium
CN110457935B (en) Permission configuration method and terminal equipment
CN111597540B (en) Login method of application program, electronic device and readable storage medium
CN111107223B (en) Message processing method and electronic equipment
CN109815679B (en) Authority management method and mobile terminal
CN111125680A (en) Permission setting method and terminal equipment
CN110032422B (en) Application management method, terminal equipment and computer readable storage medium
CN109753776B (en) Information processing method and device and mobile terminal
CN111310250A (en) Application sharing method and electronic equipment
CN110851408A (en) File compression method, file decompression method and electronic equipment
CN108391305B (en) WiFi hotspot selection method and terminal equipment
CN111159738A (en) Permission configuration method, application login method and device
CN110022322B (en) MAC address protection method and terminal equipment
CN110995816B (en) Sharing method and electronic device
CN111356096B (en) Information sending method and electronic equipment
CN110717163B (en) Interaction method and terminal equipment
CN110032861B (en) Password setting method and terminal equipment
CN110084004B (en) Permission configuration method and terminal equipment
CN109788129B (en) Message display method and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant