CN110022561A - Information processing method and information processing unit - Google Patents
Information processing method and information processing unit Download PDFInfo
- Publication number
- CN110022561A CN110022561A CN201910256074.4A CN201910256074A CN110022561A CN 110022561 A CN110022561 A CN 110022561A CN 201910256074 A CN201910256074 A CN 201910256074A CN 110022561 A CN110022561 A CN 110022561A
- Authority
- CN
- China
- Prior art keywords
- particular network
- network
- log
- message
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Present disclose provides a kind of information processing methods, comprising: in the case where operating system had accessed particular network, the log-on message of access particular network is obtained by basic input output system, wherein log-on message is stored in history shutoff operation system;Whether the log-on message based on acquisition, the connection request that basic input output system detects particular network to be accessed meet condition of contact;And when the connection request of particular network to be accessed meets condition of contact, particular network is accessed.The disclosure additionally provides a kind of information processing unit.
Description
Technical field
This disclosure relates to a kind of information processing method and information processing unit.
Background technique
Either at operating system (Operation System, OS), or during power-on self-test, Yong Hudou
It can execute and first select specified network account, then be manually entered the sequence of operations such as password to realize the access of specified network.
During realizing disclosure design, inventor's discovery at least has the following deficiencies: in the related technology to be connect every time
Enter the wireless network, needs to repeat the specified network account of first selection, then be manually entered this sequence of operations of password, in network
In the case where unstable or network interruption, equally it is also required to execute the specified network account of first selection again, then be manually entered close
This sequence of operations of code, seriously affects the usage experience of user.
Summary of the invention
An aspect of this disclosure provides a kind of information processing method, comprising: had accessed ad hoc networks in operating system
In the case where network, the log-on message for accessing above-mentioned particular network is obtained by basic input output system, wherein above-mentioned login letter
Breath is stored when history closes aforesaid operations system, the above-mentioned log-on message based on acquisition, above-mentioned basic input output system
Whether the connection request that detection is intended to access above-mentioned particular network meets condition of contact, and works as the company for being intended to access above-mentioned particular network
When connecing request and meeting above-mentioned condition of contact, above-mentioned particular network is accessed.
Optionally, above-mentioned condition of contact includes the cryptographic Hash of above-mentioned log-on message, and above-mentioned detection is intended to access above-mentioned ad hoc networks
It includes: to obtain the above-mentioned corresponding Kazakhstan of connection request to be accessed above-mentioned particular network that whether the connection request of network, which meets condition of contact,
Whether uncommon value, and the corresponding cryptographic Hash of the above-mentioned connection request of detection are consistent with the cryptographic Hash of above-mentioned log-on message.
Optionally, the above method further include: when the connection request for being intended to access above-mentioned particular network does not meet above-mentioned connection strap
When part, prompt information is generated, to prompt user to input the log-on message of above-mentioned particular network.
Optionally, whether the connection request that above-mentioned basic input output system detection is intended to access above-mentioned particular network meets company
Narrow bars part includes: in aforesaid operations system by the start-up course before successfully starting up, and acquisition is intended to access above-mentioned particular network
Connection request, and/or in the operational process after aforesaid operations system is successfully started up, acquisition is intended to access above-mentioned particular network
Connection request.
Optionally, it includes: logical for obtaining above by basic input output system and accessing the log-on message of above-mentioned particular network
It crosses above-mentioned basic input output system and receives the log-on message for having accessed ad hoc networks that network-driven is sent, wherein above-mentioned net
Network driving has unified interface with above-mentioned basic input output system.
Another aspect of the disclosure provides a kind of information processing unit, comprising: obtains module, is configured in operation system
In the case that system had accessed particular network, the login letter for accessing above-mentioned particular network is obtained by basic input output system
Breath, wherein above-mentioned log-on message is stored when history closes aforesaid operations system, detection module, is configured to acquisition
Whether above-mentioned log-on message, the connection request that above-mentioned basic input output system detection is intended to access above-mentioned particular network meet connection
Condition and AM access module are configured to the access when the connection request for being intended to access above-mentioned particular network meets above-mentioned condition of contact
Above-mentioned particular network.
Optionally, above-mentioned condition of contact includes the cryptographic Hash of above-mentioned log-on message, and above-mentioned detection module includes: acquisition submodule
Block is configured to obtain the corresponding cryptographic Hash of the above-mentioned connection request to be accessed above-mentioned particular network and detection sub-module, configuration
It is whether consistent with the cryptographic Hash of above-mentioned log-on message to detect the corresponding cryptographic Hash of above-mentioned connection request.
Optionally, above-mentioned apparatus further include: generation module is configured to the connection request that ought be intended to access above-mentioned particular network not
When meeting above-mentioned condition of contact, prompt information is generated, to prompt user to input the log-on message of above-mentioned particular network.
Optionally, above-mentioned detection module is configured that in aforesaid operations system by the start-up course before successfully starting up, and is obtained
It must be intended to access the connection request of above-mentioned particular network, and/or in the operational process after aforesaid operations system is successfully started up,
Obtain the connection request for being intended to access above-mentioned particular network.
Optionally, above-mentioned acquisition module, which is configured that, receives what network-driven was sent by above-mentioned basic input output system
The log-on message of ad hoc networks was accessed, wherein above-mentioned network-driven and above-mentioned basic input output system have unified interface.
Another aspect of the disclosure provides a kind of computer system, comprising: one or more processors, storage dress
It sets, for storing one or more programs, wherein when one or more programs are executed by one or more processors, so that
The method of one or more processors realization any of the above-described.
Another aspect of the disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, this refers to
Enable the method for making processor realize any of the above-described when being executed by processor.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the applied field of information processing method and information processing unit according to the embodiment of the present disclosure
Scape;
Fig. 2 diagrammatically illustrates the flow chart of the information processing method according to the embodiment of the present disclosure;
Fig. 3 A is diagrammatically illustrated according to whether the connection request of the detection particular network to be accessed of the embodiment of the present disclosure accords with
Close the flow chart of condition of contact;
Fig. 3 B diagrammatically illustrates the flow chart of the information processing method according to another embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the block diagram of the information processing unit according to the embodiment of the present disclosure;
Fig. 5 A diagrammatically illustrates the block diagram of the detection module according to the embodiment of the present disclosure;
Fig. 5 B diagrammatically illustrates the block diagram of the information processing unit according to another embodiment of the disclosure;And
Fig. 6 diagrammatically illustrates the block diagram of the computer system according to the embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary
, and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining
Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin
It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid
Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein
The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of
Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood
Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification
Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to
Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C "
Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or
System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come
Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least
One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have
B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart
Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer,
The processor of special purpose computer or other programmable information processing units, so that these instructions are when executed by this processor can be with
Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard
The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger
The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system
System uses or instruction execution system is combined to use.
Terminal device has the demand of access wired or wireless network.Wireless network is the elongation technology of cable network, due to
Data are sended and received using the technological leapfrogging space such as less radio-frequency (Radio Frequency, RF), it is possible to reduce use electricity
Line connection, therefore Radio Network System not only can reach construction computer network system purpose, but also can allow equipment freely arrange with
It moves.The especially place in public opening or enterprises, wireless network can be as a supplements of existing cable network
Mode, the terminal device equipped with wireless network card wirelessly can be convenient access internet.
Wi-Fi is the important component of WLAN (Wireless LAN, WLAN), is that terminal device is allowed to connect
To the technology of WLAN, usually using 2.4G UHF or 5G SHF ISM radio frequency band.Being connected to WLAN is usually to have cryptoguard
, allow the terminal device within the scope of WLAN to input valid password and is followed by into network.
By taking this terminal device of computer as an example, from opening, the whole process that power supply completes starting to operating system is overall such as
Under: when pressing start key (power switch), mainboard powers on, and the control of operating system gives basic input output system
(Basic Input Output System, BIOS), since the hardware for supporting computer to operate normally includes but is not limited to store
Many equipment such as device, interruption and expansion card, therefore, the starting code of BIOS will execute power-on self-test (Power On Self
Test, POST) whether program to carry out each equipment inside detection system normal.Complete power-on self-test program is related to central processing unit
(Center Processing Unit, CPU), 640K base memory, the exented memory of 1M or more, read-only memory (ROM), master
In plate, complementary metal oxide semiconductor (Complementary Metal Oxide Semiconductor, CMOS) memory
The verification of system configuration, initialization Video Controller, test video memory examine vision signal and synchronization signal, cathode-ray
The interface testing of kinescope (Cathode Ray Tube, CRT), keyboard, floppy drive, hard disk and CD-ROM subsystem conduct a survey, right
Parallel port (printer) and serial port (RS232) are checked.When power-on self-test program is completed, system will be transferred under BIOS
One step is found operating system from A drive, C drive or CD-ROM and network server and is started, then gives control
Operating system, into the normal operating condition of operating system.
Network can be accessed in following several situations:
Situation one: network can be accessed during computer executes POST.
It should be noted that if select the network account to be connected during computer executes POST and input password,
Particular network can be accessed, but during next computer executes POST, it is desirable to access this ad hoc networks once accessed
Network then needs the network account for selecting the particular network again and is manually entered password.
Situation two: network can be accessed after the completion of os starting.
It should be noted that if select the network account to be connected after the completion of os starting and input password, it can
To access particular network, but after the completion of the restarting of subsequent operation system, it is desirable to access this ad hoc networks once accessed
Network then needs the network account for selecting the particular network again and is manually entered password.
Situation three: can be in unstable networks and suspension is followed by into network.
It should be noted that if during having accessed the particular network, the unstable networks and suspension, it is desirable in net
After network stablizes recovery, it is desirable to access this particular network once accessed, then need to select the network of the particular network again
Account is simultaneously manually entered password.
As it can be seen that in the related art, either during POST, or after the completion of os starting, or
It is to want to access this particular network once accessed again every time, be required to select again in unstable networks and after suspension
The network account of the particular network is simultaneously manually entered password, cannot achieve in the case where connecting the particular network, and next time is certainly
It is dynamic to access the particular network.And duplicate selection account and password is inputted, be not only inconvenient to be based on network protocol version
(Internet Protocol Version 4, IPV4/Internet Protocol Version's 6, IPV6) connects automatically
Net also will increase the number of user's manual operation, and intelligentized network insertion can not be brought to experience to user.
Based on this, present disclose provides a kind of information processing method, may be implemented under an operating system with execution POST's
In the process under BIOS particular network auto-associating, avoid the need for selecting the network account of the particular network again and be manually entered
Password accesses the troublesome operation of the particular network.Specifically, this method comprises: having accessed the feelings of particular network in operating system
Under condition, the log-on message of access particular network is obtained by basic input output system, wherein log-on message is closed in history and grasped
It is stored when making system, the log-on message based on acquisition, the connection that basic input output system detects particular network to be accessed is asked
Seeking Truth is no to meet condition of contact, and when the connection request of particular network to be accessed meets condition of contact, accesses particular network.
Fig. 1 diagrammatically illustrates the application scenarios of information processing method and information processing unit according to the embodiment of the present disclosure
100.It should be noted that being only the example that can apply the application scenarios of the embodiment of the present disclosure shown in Fig. 1, to help this field
Technical staff understands the technology contents of the disclosure, but be not meant to the embodiment of the present disclosure may not be usable for other equipment, system,
Environment or scene.
As shown in Figure 1, the method for network access that the disclosure provides, which can be applied, passes through router 102 in terminal device 101
The scene for accessing network 103, especially realizes network during the power-on self-test of terminal device 101 and after os starting
The scene of 103 connection auto-associatings.
Network 103 between terminal device 101 and router 102 to provide the medium of communication link.Network 103 can be with
Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101 and receive or send message etc. by network 103.It can be on terminal device 101
Various telecommunication customer end applications, such as shopping class application, web browser applications, searching class application, instant messaging work are installed
Tool, mailbox client, social platform software etc. (merely illustrative).
Terminal device 101 can be the various electronic equipments with display screen and supported web page browsing, including but unlimited
In smart phone, tablet computer, pocket computer on knee and desktop computer etc..
In application scenarios 100 shown in Fig. 1, if may be implemented once to connect a particular network at OS,
It can be directly accessed the ad hoc networks automatically without selecting the network account of the particular network again and being manually entered password under BIOS
Network.If also may be implemented once to connect a particular network under BIOS, it is not necessarily to select the net of the particular network again at OS
Network account is simultaneously manually entered password and can be directly accessed the particular network automatically.
It should be understood that the number of terminal device, network and router in Fig. 1 is only schematical.According to realization need
It wants, can have any number of terminal device, network and router, the disclosure is without limitation.
Fig. 2 diagrammatically illustrates the flow chart of the information processing method according to the embodiment of the present disclosure.
As shown in Fig. 2, this method includes operation S210~operation S230.Wherein:
It is obtained in the case where operating system had accessed particular network by basic input output system in operation S210
Take the log-on message of access particular network.
In operation S220, the log-on message based on acquisition, basic input output system detects the company of particular network to be accessed
Connect whether request meets condition of contact.
In operation S230, when the connection request of particular network to be accessed meets condition of contact, particular network is accessed.
In accordance with an embodiment of the present disclosure, log-on message may include the network account for the particular network of user's selection to be accessed
Number and the corresponding login password of the account.The log-on message can be that be successfully accessed this for the first time during POST specific
The log-on message inputted when network, input when being also possible to be successfully accessed the particular network for the first time after the completion of os starting
Log-on message, can also be in unstable networks, the login letter inputted when being successfully accessed the particular network for the first time before suspension
Breath.
User is by selection network account and when inputting password and being successfully accessed the particular network, the available login of BIOS
Information, once closing or reboot operation system, the log-on message can be stored in mainboard in history shutoff operation system
In BIOS.Particular network can be accessed based on the log-on message, therefore, which can be used as preset condition, inspection
Whether test allows to automatically access the particular network based on connection request.Specifically, if accessing particular network, once it receives
When the connection request of particular network to be accessed, the log-on message for including in the connection request of BIOS detection particular network to be accessed is
It is no consistent with log-on message in the BIOS for being stored in mainboard, if the two is consistent, allow to automatically access the particular network, if
The two is inconsistent, then does not allow to automatically access the particular network.
By embodiment of the disclosure, as long as user may be implemented accessed a particular network in an operating system, with
During power-on self-test afterwards, just it is not necessarily to select network account again and inputs the technical effect of password, user is avoided also to need
It executes selection network account and inputs the operation of password.As long as also may be implemented user accessed during power-on self-test it is specific
Network just avoids user from also needing to be implemented selection network without selecting network account again and inputting password in an operating system
Account and the operation for inputting password.As long as can also realize that user accessed a particular network, cause to break network signal is bad
In the case where net, without selecting network account again and inputting the technical effect of password, user is avoided also to need to be implemented selection net
Network account and the operation for inputting password.
Optionally, obtaining the log-on message of access particular network by basic input output system includes: by substantially defeated
Enter output system and receive the log-on message for having accessed ad hoc networks that network-driven is sent, wherein network-driven and basic input
Output system has unified interface.
In accordance with an embodiment of the present disclosure, BIOS can arrange unified interface with network drive (Network Driver),
After user passes through selection network account and inputs the log-on messages such as password, Network Driver is available to arrive the network account
And password, the account that BIOS is sent based on the unified interface acquisition arranged with network drive by Network Driver/close
The log-on messages such as family.
Optionally, basic input output system can in operating system by the start-up course before successfully starting up, such as
Https starting during power-on self-test, obtains the connection request of particular network to be accessed, detects the company of particular network to be accessed
Connect whether request meets condition of contact;It can also obtain in the operational process after operating system is successfully started up and be intended to access
Whether the connection request of particular network, the connection request for detecting particular network to be accessed meet condition of contact.
By embodiment of the disclosure, if the log-on message for being successfully accessed particular network was inputted, either later
Operating system access ad hoc networks by the power-on self-test process before successfully starting up, or after os starting later
Network all no longer needs to re-enter the log-on messages such as account/password, and the seamless connection network of particular network may be implemented, to use
Family provides intelligentized network insertion experience, realizes that access particular network is accessed with during power-on self-test in an operating system
The auto-associating of particular network brings intelligentized network insertion to experience to user.
Specifically, Fig. 3 A diagrammatically illustrates the connection request of the detection particular network to be accessed according to the embodiment of the present disclosure
Whether the flow chart of condition of contact is met.
As shown in Figure 3A, condition of contact includes the cryptographic Hash of log-on message, aforementioned operation S220 (detection ad hoc networks to be accessed
Whether the connection request of network meets condition of contact) it include operation S311 and operation S312.Wherein:
In operation S311, the corresponding cryptographic Hash of connection request of particular network to be accessed is obtained.
In operation S312, whether the corresponding cryptographic Hash of detection connection request is consistent with the cryptographic Hash of log-on message.
In accordance with an embodiment of the present disclosure, condition of contact can include but is not limited to the cryptographic Hash of log-on message, also known as hash
Function, hashing algorithm or hash function (Hash Function).The login letter for the access particular network that BIOS can will acquire
Breath is encrypted, and encrypted log-on message is stored in mainboard BIOS, for example, can pass through the SHA256 of abstract class
Algorithm is converted to the hash value that one group of cryptographic Hash size is 256.
In accordance with an embodiment of the present disclosure, when receiving connection request, it can use and be stored in stepping in mainboard BIOS
The identical encryption method of information is recorded, the cryptographic Hash of the log-on messages such as the corresponding account/password of connection request is obtained.Automatic comparison connects
It connects and the cryptographic Hash of the log-on message stored in corresponding cryptographic Hash and BIOS is requested to automatically access under the two unanimous circumstances
Particular network.
By embodiment of the disclosure, root is checked whether using the cryptographic Hash for the log-on message being stored in mainboard BIOS
Particular network, high safety and reliability are automatically accessed according to connection request.
Fig. 3 B diagrammatically illustrates the flow chart of the information processing method according to another embodiment of the disclosure.
As shown in Figure 3B, this method further includes operation S321 other than including aforementioned operation S210~operation S230: when
When the connection request of particular network to be accessed does not meet condition of contact, prompt information is generated, to prompt user to input particular network
Log-on message.
In accordance with an embodiment of the present disclosure, the login stored in the corresponding cryptographic Hash of automatic comparison connection request and mainboard BIOS
The cryptographic Hash of information shows that the connection request of particular network to be accessed does not meet condition of contact in the case where the two is inconsistent,
Do not allow then to automatically access particular network, while generating prompt information, to prompt user to input stepping on for the particular network to be accessed
Information is recorded, safeguards network security.
Fig. 4 diagrammatically illustrates the block diagram of the information processing unit according to the embodiment of the present disclosure.
As shown in figure 4, the information processing unit 400 includes obtaining module 410, detection module 420 and AM access module
430.Wherein:
Module 410 is obtained, is configured to pass through basic input and output in the case where operating system had accessed particular network
System obtains the log-on message of access particular network, wherein log-on message is stored in history shutoff operation system.
Detection module 420, is configured to the log-on message obtained, and basic input output system detects ad hoc networks to be accessed
Whether the connection request of network meets condition of contact.
AM access module 430 is configured to when the connection request of particular network to be accessed meets condition of contact, accesses ad hoc networks
Network.
By embodiment of the disclosure, as long as user may be implemented accessed a particular network in an operating system, with
During power-on self-test afterwards, just it is not necessarily to select network account again and inputs the technical effect of password, user is avoided also to need
It executes selection network account and inputs the operation of password.As long as also may be implemented user accessed during power-on self-test it is specific
Network just avoids user from also needing to be implemented selection network without selecting network account again and inputting password in an operating system
Account and the operation for inputting password.As long as can also realize that user accessed a particular network, cause to break network signal is bad
In the case where net, without selecting network account again and inputting the technical effect of password, user is avoided also to need to be implemented selection net
Network account and the operation for inputting password.
Optionally, obtaining the log-on message of access particular network by basic input output system includes: by substantially defeated
Enter output system and receive the log-on message for having accessed ad hoc networks that network-driven is sent, wherein network-driven and basic input
Output system has unified interface.
Optionally, whether the connection request that basic input output system detects particular network to be accessed meets condition of contact packet
It includes: in operating system by the start-up course before successfully starting up, obtaining the connection request of particular network to be accessed;And/or
Operating system successfully started up after operational process in, obtain the connection request of particular network to be accessed.
By embodiment of the disclosure, if the log-on message for being successfully accessed particular network was inputted, either later
Operating system access ad hoc networks by the power-on self-test process before successfully starting up, or after os starting later
Network all no longer needs to re-enter the log-on messages such as account/password, and the seamless connection network of particular network may be implemented, to use
Family provides intelligentized network insertion experience, realizes that access particular network is accessed with during power-on self-test in an operating system
The auto-associating of particular network brings intelligentized network insertion to experience to user.
Fig. 5 A diagrammatically illustrates the block diagram of the detection module according to the embodiment of the present disclosure.
As shown in Figure 5A, aforementioned detection module 420 includes obtaining submodule 511 and detection sub-module 512.Wherein:
Submodule 511 is obtained, is configured to obtain the corresponding cryptographic Hash of connection request of particular network to be accessed.
Detection sub-module 512, be configured to the corresponding cryptographic Hash of detection connection request whether the cryptographic Hash one with log-on message
It causes.
By embodiment of the disclosure, root is checked whether using the cryptographic Hash for the log-on message being stored in mainboard BIOS
Particular network, high safety and reliability are automatically accessed according to connection request.
Fig. 5 B diagrammatically illustrates the block diagram of the information processing unit according to another embodiment of the disclosure.
As shown in Figure 5 B, the information processing unit 500 is in addition to including aforementioned acquisition module 410, detection module 420 and connecing
Enter except module 430, further include generation module 521, is configured to not meet connection strap when the connection request of particular network to be accessed
When part, prompt information is generated, to prompt user to input the log-on message of particular network.
By embodiment of the disclosure, the login that is stored in the corresponding cryptographic Hash of automatic comparison connection request and mainboard BIOS
The cryptographic Hash of information shows that the connection request of particular network to be accessed does not meet condition of contact in the case where the two is inconsistent,
Do not allow then to automatically access particular network, while generating prompt information, to prompt user to input stepping on for the particular network to be accessed
Information is recorded, safeguards network security.
In module according to an embodiment of the present disclosure, submodule it is any number of or in which any number of at least partly
Function can be realized in a module.According to any one in the module of the embodiment of the present disclosure, submodule, unit, subelement
It is a or multiple can be split into multiple modules to realize.According to any one in the module of the embodiment of the present disclosure, submodule
Or multiple it can at least be implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic battle array
(PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC) are arranged, or can be by electricity
Road carries out hardware or the firmware of any other rational method that is integrated or encapsulating to realize, or with software, hardware and firmware
Any one in three kinds of implementations several appropriately combined is realized with wherein any.Alternatively, according to the embodiment of the present disclosure
Module, one or more of submodule can at least be implemented partly as computer program module, when the computer journey
When sequence module is run, corresponding function can be executed.
For example, obtain module 410, detection module 420, any number of in AM access module 430 and generation module 521 can
It is realized in a module with merging or any one module therein can be split into multiple modules.Alternatively, these moulds
At least partly function of one or more modules in block can be combined at least partly function of other modules, and at one
It is realized in module.In accordance with an embodiment of the present disclosure, module 410, detection module 420, AM access module 430 and generation module are obtained
At least one of 521 can at least be implemented partly as hardware circuit, such as field programmable gate array (FPGA), can compile
Journey logic array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can be with
It is realized by carrying out the hardware such as any other rational method that is integrated or encapsulating or firmware to circuit, or with software, hardware
And it any one in three kinds of implementations of firmware or several appropriately combined is realized with wherein any.Alternatively, obtaining module
410, at least one of detection module 420, AM access module 430 and generation module 521 can be at least implemented partly as
Computer program module can execute corresponding function when the computer program module is run.
Fig. 6 diagrammatically illustrates the block diagram of the computer system according to the embodiment of the present disclosure.Computer system shown in Fig. 6
An only example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, computer system 600 includes processor 610, computer readable storage medium 620.The department of computer science
System 600 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 610 for example may include general purpose microprocessor, instruction set processor and/or related chip group
And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 610 can also include using for caching
The onboard storage device on way.Processor 610 can be the different movements for executing the method flow according to the embodiment of the present disclosure
Single treatment unit either multiple processing units.
Computer readable storage medium 620, such as can be non-volatile computer readable storage medium, specific example
Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as
Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 620 may include computer program 621, which may include generation
Code/computer executable instructions execute processor 610 according to the embodiment of the present disclosure
Method or its any deformation.
Computer program 621 can be configured to have the computer program code for example including computer program module.Example
Such as, in the exemplary embodiment, the code in computer program 621 may include one or more program modules, for example including
621A, module 621B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can
To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 610
When execution, processor 610 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, obtaining module 410, detection module 420, AM access module 430 and generation module 521
At least one of can be implemented as the computer program module with reference to Fig. 6 description can be with when being executed by processor 610
Realize corresponding operating described above.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality
It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/
In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts
When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium
Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory
(ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light
Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more
Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box
The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical
On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants
It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule
The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist
In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can
To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure
Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents,
A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment,
But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.
Claims (10)
1. a kind of information processing method, comprising:
In the case where operating system had accessed particular network, is obtained by basic input output system and access the ad hoc networks
The log-on message of network, wherein the log-on message is stored when history closes the operating system;
The log-on message based on acquisition, the connection that the basic input output system detection is intended to access the particular network are asked
Seeking Truth is no to meet condition of contact;And
When the connection request for being intended to access the particular network meets the condition of contact, the particular network is accessed.
2. according to the method described in claim 1, wherein, the condition of contact includes the cryptographic Hash of the log-on message, described
Whether the connection request that detection is intended to access the particular network, which meets condition of contact, includes:
Obtain the corresponding cryptographic Hash of the connection request to be accessed the particular network;And
Whether consistent with the cryptographic Hash of the log-on message detect the corresponding cryptographic Hash of the connection request.
3. according to the method described in claim 1, further include:
When the connection request for being intended to access the particular network does not meet the condition of contact, prompt information is generated, to prompt to use
Family inputs the log-on message of the particular network.
4. according to the method described in claim 2, wherein, the basic input output system detection is intended to access the particular network
Connection request whether meet condition of contact and include:
In the operating system by the start-up course before successfully starting up, the connection that acquisition is intended to access the particular network is asked
It asks;And/or
In the operational process after the operating system is successfully started up, the connection that acquisition is intended to access the particular network is asked
It asks.
5. according to the method described in claim 1, wherein, described obtained by basic input output system accesses the ad hoc networks
The log-on message of network includes:
The log-on message for having accessed ad hoc networks that network-driven is sent is received by the basic input output system, wherein
The network-driven and the basic input output system have unified interface.
6. a kind of information processing unit, comprising:
Module is obtained, is configured to obtain in the case where operating system had accessed particular network by basic input output system
Take the log-on message for accessing the particular network, wherein the log-on message is stored when history closes the operating system;
Detection module, is configured to the log-on message obtained, and the basic input output system detection is intended to access described
Whether the connection request of particular network meets condition of contact;And
AM access module is configured to when the connection request for being intended to access the particular network meets the condition of contact, described in access
Particular network.
7. the apparatus according to claim 1, wherein the condition of contact includes the cryptographic Hash of the log-on message, described
Detection module includes:
Submodule is obtained, is configured to obtain the corresponding cryptographic Hash of the connection request to be accessed the particular network;And
Detection sub-module, be configured to detect the corresponding cryptographic Hash of the connection request whether the cryptographic Hash one with the log-on message
It causes.
8. the apparatus according to claim 1, further includes:
Generation module is configured to when the connection request for being intended to access the particular network does not meet the condition of contact, and generation mentions
Show information, to prompt user to input the log-on message of the particular network.
9. the apparatus of claim 2, wherein the detection module is configured that
In the operating system by the start-up course before successfully starting up, the connection that acquisition is intended to access the particular network is asked
It asks;And/or
In the operational process after the operating system is successfully started up, the connection that acquisition is intended to access the particular network is asked
It asks.
10. the apparatus according to claim 1, wherein the acquisition module is configured that
The log-on message for having accessed ad hoc networks that network-driven is sent is received by the basic input output system, wherein
The network-driven and the basic input output system have unified interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910256074.4A CN110022561B (en) | 2019-03-29 | 2019-03-29 | Information processing method and information processing apparatus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910256074.4A CN110022561B (en) | 2019-03-29 | 2019-03-29 | Information processing method and information processing apparatus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110022561A true CN110022561A (en) | 2019-07-16 |
CN110022561B CN110022561B (en) | 2020-10-27 |
Family
ID=67190339
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910256074.4A Active CN110022561B (en) | 2019-03-29 | 2019-03-29 | Information processing method and information processing apparatus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110022561B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113220359A (en) * | 2021-04-24 | 2021-08-06 | 深圳市骅鼎鹏智能科技有限公司 | Information processing method and device and energy storage system |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145965A (en) * | 2007-07-17 | 2008-03-19 | 中兴通讯股份有限公司 | A method and device for automatic login to telecommunication network management |
CN103368905A (en) * | 2012-03-29 | 2013-10-23 | 同方股份有限公司 | Trustable cipher module chip-based network access authentication method |
CN103379485A (en) * | 2012-04-24 | 2013-10-30 | 中国联合网络通信集团有限公司 | Wireless access equipment and encryption processing method thereof |
US20140075521A1 (en) * | 2012-09-11 | 2014-03-13 | Tencent Technology (Shenzhen) Company Limited | System and method for sharing login status between an application platform and an application |
US20140136828A1 (en) * | 2012-11-09 | 2014-05-15 | Insyde Software Corp. | Bios user interface control using mobile device |
CN105632157A (en) * | 2016-03-15 | 2016-06-01 | 彭云 | Intelligent control system, intelligent terminal and network equipment |
CN106792698A (en) * | 2017-02-20 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal |
CN107396357A (en) * | 2017-06-09 | 2017-11-24 | 上海斐讯数据通信技术有限公司 | A kind of wireless network connecting method and a kind of wireless routing device |
CN107613498A (en) * | 2017-10-26 | 2018-01-19 | 上海与德科技有限公司 | A kind of connection method of network communication and device |
-
2019
- 2019-03-29 CN CN201910256074.4A patent/CN110022561B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101145965A (en) * | 2007-07-17 | 2008-03-19 | 中兴通讯股份有限公司 | A method and device for automatic login to telecommunication network management |
CN103368905A (en) * | 2012-03-29 | 2013-10-23 | 同方股份有限公司 | Trustable cipher module chip-based network access authentication method |
CN103379485A (en) * | 2012-04-24 | 2013-10-30 | 中国联合网络通信集团有限公司 | Wireless access equipment and encryption processing method thereof |
US20140075521A1 (en) * | 2012-09-11 | 2014-03-13 | Tencent Technology (Shenzhen) Company Limited | System and method for sharing login status between an application platform and an application |
US20140136828A1 (en) * | 2012-11-09 | 2014-05-15 | Insyde Software Corp. | Bios user interface control using mobile device |
CN105632157A (en) * | 2016-03-15 | 2016-06-01 | 彭云 | Intelligent control system, intelligent terminal and network equipment |
CN106792698A (en) * | 2017-02-20 | 2017-05-31 | 广东欧珀移动通信有限公司 | A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal |
CN107396357A (en) * | 2017-06-09 | 2017-11-24 | 上海斐讯数据通信技术有限公司 | A kind of wireless network connecting method and a kind of wireless routing device |
CN107613498A (en) * | 2017-10-26 | 2018-01-19 | 上海与德科技有限公司 | A kind of connection method of network communication and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113220359A (en) * | 2021-04-24 | 2021-08-06 | 深圳市骅鼎鹏智能科技有限公司 | Information processing method and device and energy storage system |
Also Published As
Publication number | Publication date |
---|---|
CN110022561B (en) | 2020-10-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10581833B2 (en) | Electronic device and method for processing secure information | |
US10051559B2 (en) | Network connection method and user equipment | |
US9712524B2 (en) | Method and apparatus for user authentication | |
US10477599B2 (en) | Method and apparatus for managing wireless router and device connected thereto | |
US9117191B2 (en) | Automatic device inventory management for different types of devices | |
US20160294802A1 (en) | Accelerated passphrase verification | |
US9774599B2 (en) | Authenticating method and apparatus using electronic device | |
US9606957B2 (en) | Electronic device and method of linking a task thereof | |
US9602969B2 (en) | Method and electronic device for recognizing area | |
EP3591552B1 (en) | Protection system including machine learning snapshot evaluation | |
US9589122B2 (en) | Operation processing method and device | |
WO2014108005A1 (en) | Co-verification method, two-dimensional code generation method, and device and system therefor | |
US10212210B2 (en) | Electronic device and method of providing information about the access point (AP) | |
US10181024B2 (en) | Method, device, and system for updating authentication information | |
US10135816B2 (en) | Electronic device and method of transceiving data | |
US10554627B2 (en) | Proximity communication method and apparatus | |
US20160088476A1 (en) | Electronic device, accessory device, and method of authenticating accessory device | |
WO2015074443A1 (en) | An operation processing method and device | |
US20180063673A1 (en) | Method for recognizing location and electronic device implementing the same | |
US9398432B2 (en) | Electronic device and method for controlling emergency call in electronic device | |
US10366246B2 (en) | Electronic device and operating method thereof | |
CN106488534A (en) | Obtain the method and system of Network Access Point | |
CN112434278A (en) | Bare computer authentication method, apparatus, device and medium | |
CN110022561A (en) | Information processing method and information processing unit | |
CN113038192A (en) | Video processing method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |