CN110022561A - Information processing method and information processing unit - Google Patents

Information processing method and information processing unit Download PDF

Info

Publication number
CN110022561A
CN110022561A CN201910256074.4A CN201910256074A CN110022561A CN 110022561 A CN110022561 A CN 110022561A CN 201910256074 A CN201910256074 A CN 201910256074A CN 110022561 A CN110022561 A CN 110022561A
Authority
CN
China
Prior art keywords
particular network
network
log
message
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910256074.4A
Other languages
Chinese (zh)
Other versions
CN110022561B (en
Inventor
周储
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910256074.4A priority Critical patent/CN110022561B/en
Publication of CN110022561A publication Critical patent/CN110022561A/en
Application granted granted Critical
Publication of CN110022561B publication Critical patent/CN110022561B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Present disclose provides a kind of information processing methods, comprising: in the case where operating system had accessed particular network, the log-on message of access particular network is obtained by basic input output system, wherein log-on message is stored in history shutoff operation system;Whether the log-on message based on acquisition, the connection request that basic input output system detects particular network to be accessed meet condition of contact;And when the connection request of particular network to be accessed meets condition of contact, particular network is accessed.The disclosure additionally provides a kind of information processing unit.

Description

Information processing method and information processing unit
Technical field
This disclosure relates to a kind of information processing method and information processing unit.
Background technique
Either at operating system (Operation System, OS), or during power-on self-test, Yong Hudou It can execute and first select specified network account, then be manually entered the sequence of operations such as password to realize the access of specified network.
During realizing disclosure design, inventor's discovery at least has the following deficiencies: in the related technology to be connect every time Enter the wireless network, needs to repeat the specified network account of first selection, then be manually entered this sequence of operations of password, in network In the case where unstable or network interruption, equally it is also required to execute the specified network account of first selection again, then be manually entered close This sequence of operations of code, seriously affects the usage experience of user.
Summary of the invention
An aspect of this disclosure provides a kind of information processing method, comprising: had accessed ad hoc networks in operating system In the case where network, the log-on message for accessing above-mentioned particular network is obtained by basic input output system, wherein above-mentioned login letter Breath is stored when history closes aforesaid operations system, the above-mentioned log-on message based on acquisition, above-mentioned basic input output system Whether the connection request that detection is intended to access above-mentioned particular network meets condition of contact, and works as the company for being intended to access above-mentioned particular network When connecing request and meeting above-mentioned condition of contact, above-mentioned particular network is accessed.
Optionally, above-mentioned condition of contact includes the cryptographic Hash of above-mentioned log-on message, and above-mentioned detection is intended to access above-mentioned ad hoc networks It includes: to obtain the above-mentioned corresponding Kazakhstan of connection request to be accessed above-mentioned particular network that whether the connection request of network, which meets condition of contact, Whether uncommon value, and the corresponding cryptographic Hash of the above-mentioned connection request of detection are consistent with the cryptographic Hash of above-mentioned log-on message.
Optionally, the above method further include: when the connection request for being intended to access above-mentioned particular network does not meet above-mentioned connection strap When part, prompt information is generated, to prompt user to input the log-on message of above-mentioned particular network.
Optionally, whether the connection request that above-mentioned basic input output system detection is intended to access above-mentioned particular network meets company Narrow bars part includes: in aforesaid operations system by the start-up course before successfully starting up, and acquisition is intended to access above-mentioned particular network Connection request, and/or in the operational process after aforesaid operations system is successfully started up, acquisition is intended to access above-mentioned particular network Connection request.
Optionally, it includes: logical for obtaining above by basic input output system and accessing the log-on message of above-mentioned particular network It crosses above-mentioned basic input output system and receives the log-on message for having accessed ad hoc networks that network-driven is sent, wherein above-mentioned net Network driving has unified interface with above-mentioned basic input output system.
Another aspect of the disclosure provides a kind of information processing unit, comprising: obtains module, is configured in operation system In the case that system had accessed particular network, the login letter for accessing above-mentioned particular network is obtained by basic input output system Breath, wherein above-mentioned log-on message is stored when history closes aforesaid operations system, detection module, is configured to acquisition Whether above-mentioned log-on message, the connection request that above-mentioned basic input output system detection is intended to access above-mentioned particular network meet connection Condition and AM access module are configured to the access when the connection request for being intended to access above-mentioned particular network meets above-mentioned condition of contact Above-mentioned particular network.
Optionally, above-mentioned condition of contact includes the cryptographic Hash of above-mentioned log-on message, and above-mentioned detection module includes: acquisition submodule Block is configured to obtain the corresponding cryptographic Hash of the above-mentioned connection request to be accessed above-mentioned particular network and detection sub-module, configuration It is whether consistent with the cryptographic Hash of above-mentioned log-on message to detect the corresponding cryptographic Hash of above-mentioned connection request.
Optionally, above-mentioned apparatus further include: generation module is configured to the connection request that ought be intended to access above-mentioned particular network not When meeting above-mentioned condition of contact, prompt information is generated, to prompt user to input the log-on message of above-mentioned particular network.
Optionally, above-mentioned detection module is configured that in aforesaid operations system by the start-up course before successfully starting up, and is obtained It must be intended to access the connection request of above-mentioned particular network, and/or in the operational process after aforesaid operations system is successfully started up, Obtain the connection request for being intended to access above-mentioned particular network.
Optionally, above-mentioned acquisition module, which is configured that, receives what network-driven was sent by above-mentioned basic input output system The log-on message of ad hoc networks was accessed, wherein above-mentioned network-driven and above-mentioned basic input output system have unified interface.
Another aspect of the disclosure provides a kind of computer system, comprising: one or more processors, storage dress It sets, for storing one or more programs, wherein when one or more programs are executed by one or more processors, so that The method of one or more processors realization any of the above-described.
Another aspect of the disclosure provides a kind of computer-readable medium, is stored thereon with executable instruction, this refers to Enable the method for making processor realize any of the above-described when being executed by processor.
Detailed description of the invention
In order to which the disclosure and its advantage is more fully understood, referring now to being described below in conjunction with attached drawing, in which:
Fig. 1 diagrammatically illustrates the applied field of information processing method and information processing unit according to the embodiment of the present disclosure Scape;
Fig. 2 diagrammatically illustrates the flow chart of the information processing method according to the embodiment of the present disclosure;
Fig. 3 A is diagrammatically illustrated according to whether the connection request of the detection particular network to be accessed of the embodiment of the present disclosure accords with Close the flow chart of condition of contact;
Fig. 3 B diagrammatically illustrates the flow chart of the information processing method according to another embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the block diagram of the information processing unit according to the embodiment of the present disclosure;
Fig. 5 A diagrammatically illustrates the block diagram of the detection module according to the embodiment of the present disclosure;
Fig. 5 B diagrammatically illustrates the block diagram of the information processing unit according to another embodiment of the disclosure;And
Fig. 6 diagrammatically illustrates the block diagram of the computer system according to the embodiment of the present disclosure.
Specific embodiment
Hereinafter, will be described with reference to the accompanying drawings embodiment of the disclosure.However, it should be understood that these descriptions are only exemplary , and it is not intended to limit the scope of the present disclosure.In the following detailed description, to elaborate many specific thin convenient for explaining Section is to provide the comprehensive understanding to the embodiment of the present disclosure.It may be evident, however, that one or more embodiments are not having these specific thin It can also be carried out in the case where section.In addition, in the following description, descriptions of well-known structures and technologies are omitted, to avoid Unnecessarily obscure the concept of the disclosure.
Term as used herein is not intended to limit the disclosure just for the sake of description specific embodiment.It uses herein The terms "include", "comprise" etc. show the presence of the feature, step, operation and/or component, but it is not excluded that in the presence of Or add other one or more features, step, operation or component.
There are all terms (including technical and scientific term) as used herein those skilled in the art to be generally understood Meaning, unless otherwise defined.It should be noted that term used herein should be interpreted that with consistent with the context of this specification Meaning, without that should be explained with idealization or excessively mechanical mode.
It, in general should be according to this using statement as " at least one in A, B and C etc. " is similar to Field technical staff is generally understood the meaning of the statement to make an explanation (for example, " system at least one in A, B and C " Should include but is not limited to individually with A, individually with B, individually with C, with A and B, with A and C, have B and C, and/or System etc. with A, B, C).Using statement as " at least one in A, B or C etc. " is similar to, generally come Saying be generally understood the meaning of the statement according to those skilled in the art to make an explanation (for example, " having in A, B or C at least One system " should include but is not limited to individually with A, individually with B, individually with C, with A and B, have A and C, have B and C, and/or the system with A, B, C etc.).
Shown in the drawings of some block diagrams and/or flow chart.It should be understood that some sides in block diagram and/or flow chart Frame or combinations thereof can be realized by computer program instructions.These computer program instructions can be supplied to general purpose computer, The processor of special purpose computer or other programmable information processing units, so that these instructions are when executed by this processor can be with Creation is for realizing function/operation device illustrated in these block diagrams and/or flow chart.The technology of the disclosure can be hard The form of part and/or software (including firmware, microcode etc.) is realized.In addition, the technology of the disclosure, which can be taken, is stored with finger The form of computer program product on the computer readable storage medium of order, the computer program product is for instruction execution system System uses or instruction execution system is combined to use.
Terminal device has the demand of access wired or wireless network.Wireless network is the elongation technology of cable network, due to Data are sended and received using the technological leapfrogging space such as less radio-frequency (Radio Frequency, RF), it is possible to reduce use electricity Line connection, therefore Radio Network System not only can reach construction computer network system purpose, but also can allow equipment freely arrange with It moves.The especially place in public opening or enterprises, wireless network can be as a supplements of existing cable network Mode, the terminal device equipped with wireless network card wirelessly can be convenient access internet.
Wi-Fi is the important component of WLAN (Wireless LAN, WLAN), is that terminal device is allowed to connect To the technology of WLAN, usually using 2.4G UHF or 5G SHF ISM radio frequency band.Being connected to WLAN is usually to have cryptoguard , allow the terminal device within the scope of WLAN to input valid password and is followed by into network.
By taking this terminal device of computer as an example, from opening, the whole process that power supply completes starting to operating system is overall such as Under: when pressing start key (power switch), mainboard powers on, and the control of operating system gives basic input output system (Basic Input Output System, BIOS), since the hardware for supporting computer to operate normally includes but is not limited to store Many equipment such as device, interruption and expansion card, therefore, the starting code of BIOS will execute power-on self-test (Power On Self Test, POST) whether program to carry out each equipment inside detection system normal.Complete power-on self-test program is related to central processing unit (Center Processing Unit, CPU), 640K base memory, the exented memory of 1M or more, read-only memory (ROM), master In plate, complementary metal oxide semiconductor (Complementary Metal Oxide Semiconductor, CMOS) memory The verification of system configuration, initialization Video Controller, test video memory examine vision signal and synchronization signal, cathode-ray The interface testing of kinescope (Cathode Ray Tube, CRT), keyboard, floppy drive, hard disk and CD-ROM subsystem conduct a survey, right Parallel port (printer) and serial port (RS232) are checked.When power-on self-test program is completed, system will be transferred under BIOS One step is found operating system from A drive, C drive or CD-ROM and network server and is started, then gives control Operating system, into the normal operating condition of operating system.
Network can be accessed in following several situations:
Situation one: network can be accessed during computer executes POST.
It should be noted that if select the network account to be connected during computer executes POST and input password, Particular network can be accessed, but during next computer executes POST, it is desirable to access this ad hoc networks once accessed Network then needs the network account for selecting the particular network again and is manually entered password.
Situation two: network can be accessed after the completion of os starting.
It should be noted that if select the network account to be connected after the completion of os starting and input password, it can To access particular network, but after the completion of the restarting of subsequent operation system, it is desirable to access this ad hoc networks once accessed Network then needs the network account for selecting the particular network again and is manually entered password.
Situation three: can be in unstable networks and suspension is followed by into network.
It should be noted that if during having accessed the particular network, the unstable networks and suspension, it is desirable in net After network stablizes recovery, it is desirable to access this particular network once accessed, then need to select the network of the particular network again Account is simultaneously manually entered password.
As it can be seen that in the related art, either during POST, or after the completion of os starting, or It is to want to access this particular network once accessed again every time, be required to select again in unstable networks and after suspension The network account of the particular network is simultaneously manually entered password, cannot achieve in the case where connecting the particular network, and next time is certainly It is dynamic to access the particular network.And duplicate selection account and password is inputted, be not only inconvenient to be based on network protocol version (Internet Protocol Version 4, IPV4/Internet Protocol Version's 6, IPV6) connects automatically Net also will increase the number of user's manual operation, and intelligentized network insertion can not be brought to experience to user.
Based on this, present disclose provides a kind of information processing method, may be implemented under an operating system with execution POST's In the process under BIOS particular network auto-associating, avoid the need for selecting the network account of the particular network again and be manually entered Password accesses the troublesome operation of the particular network.Specifically, this method comprises: having accessed the feelings of particular network in operating system Under condition, the log-on message of access particular network is obtained by basic input output system, wherein log-on message is closed in history and grasped It is stored when making system, the log-on message based on acquisition, the connection that basic input output system detects particular network to be accessed is asked Seeking Truth is no to meet condition of contact, and when the connection request of particular network to be accessed meets condition of contact, accesses particular network.
Fig. 1 diagrammatically illustrates the application scenarios of information processing method and information processing unit according to the embodiment of the present disclosure 100.It should be noted that being only the example that can apply the application scenarios of the embodiment of the present disclosure shown in Fig. 1, to help this field Technical staff understands the technology contents of the disclosure, but be not meant to the embodiment of the present disclosure may not be usable for other equipment, system, Environment or scene.
As shown in Figure 1, the method for network access that the disclosure provides, which can be applied, passes through router 102 in terminal device 101 The scene for accessing network 103, especially realizes network during the power-on self-test of terminal device 101 and after os starting The scene of 103 connection auto-associatings.
Network 103 between terminal device 101 and router 102 to provide the medium of communication link.Network 103 can be with Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
User can be used terminal device 101 and receive or send message etc. by network 103.It can be on terminal device 101 Various telecommunication customer end applications, such as shopping class application, web browser applications, searching class application, instant messaging work are installed Tool, mailbox client, social platform software etc. (merely illustrative).
Terminal device 101 can be the various electronic equipments with display screen and supported web page browsing, including but unlimited In smart phone, tablet computer, pocket computer on knee and desktop computer etc..
In application scenarios 100 shown in Fig. 1, if may be implemented once to connect a particular network at OS, It can be directly accessed the ad hoc networks automatically without selecting the network account of the particular network again and being manually entered password under BIOS Network.If also may be implemented once to connect a particular network under BIOS, it is not necessarily to select the net of the particular network again at OS Network account is simultaneously manually entered password and can be directly accessed the particular network automatically.
It should be understood that the number of terminal device, network and router in Fig. 1 is only schematical.According to realization need It wants, can have any number of terminal device, network and router, the disclosure is without limitation.
Fig. 2 diagrammatically illustrates the flow chart of the information processing method according to the embodiment of the present disclosure.
As shown in Fig. 2, this method includes operation S210~operation S230.Wherein:
It is obtained in the case where operating system had accessed particular network by basic input output system in operation S210 Take the log-on message of access particular network.
In operation S220, the log-on message based on acquisition, basic input output system detects the company of particular network to be accessed Connect whether request meets condition of contact.
In operation S230, when the connection request of particular network to be accessed meets condition of contact, particular network is accessed.
In accordance with an embodiment of the present disclosure, log-on message may include the network account for the particular network of user's selection to be accessed Number and the corresponding login password of the account.The log-on message can be that be successfully accessed this for the first time during POST specific The log-on message inputted when network, input when being also possible to be successfully accessed the particular network for the first time after the completion of os starting Log-on message, can also be in unstable networks, the login letter inputted when being successfully accessed the particular network for the first time before suspension Breath.
User is by selection network account and when inputting password and being successfully accessed the particular network, the available login of BIOS Information, once closing or reboot operation system, the log-on message can be stored in mainboard in history shutoff operation system In BIOS.Particular network can be accessed based on the log-on message, therefore, which can be used as preset condition, inspection Whether test allows to automatically access the particular network based on connection request.Specifically, if accessing particular network, once it receives When the connection request of particular network to be accessed, the log-on message for including in the connection request of BIOS detection particular network to be accessed is It is no consistent with log-on message in the BIOS for being stored in mainboard, if the two is consistent, allow to automatically access the particular network, if The two is inconsistent, then does not allow to automatically access the particular network.
By embodiment of the disclosure, as long as user may be implemented accessed a particular network in an operating system, with During power-on self-test afterwards, just it is not necessarily to select network account again and inputs the technical effect of password, user is avoided also to need It executes selection network account and inputs the operation of password.As long as also may be implemented user accessed during power-on self-test it is specific Network just avoids user from also needing to be implemented selection network without selecting network account again and inputting password in an operating system Account and the operation for inputting password.As long as can also realize that user accessed a particular network, cause to break network signal is bad In the case where net, without selecting network account again and inputting the technical effect of password, user is avoided also to need to be implemented selection net Network account and the operation for inputting password.
Optionally, obtaining the log-on message of access particular network by basic input output system includes: by substantially defeated Enter output system and receive the log-on message for having accessed ad hoc networks that network-driven is sent, wherein network-driven and basic input Output system has unified interface.
In accordance with an embodiment of the present disclosure, BIOS can arrange unified interface with network drive (Network Driver), After user passes through selection network account and inputs the log-on messages such as password, Network Driver is available to arrive the network account And password, the account that BIOS is sent based on the unified interface acquisition arranged with network drive by Network Driver/close The log-on messages such as family.
Optionally, basic input output system can in operating system by the start-up course before successfully starting up, such as Https starting during power-on self-test, obtains the connection request of particular network to be accessed, detects the company of particular network to be accessed Connect whether request meets condition of contact;It can also obtain in the operational process after operating system is successfully started up and be intended to access Whether the connection request of particular network, the connection request for detecting particular network to be accessed meet condition of contact.
By embodiment of the disclosure, if the log-on message for being successfully accessed particular network was inputted, either later Operating system access ad hoc networks by the power-on self-test process before successfully starting up, or after os starting later Network all no longer needs to re-enter the log-on messages such as account/password, and the seamless connection network of particular network may be implemented, to use Family provides intelligentized network insertion experience, realizes that access particular network is accessed with during power-on self-test in an operating system The auto-associating of particular network brings intelligentized network insertion to experience to user.
Specifically, Fig. 3 A diagrammatically illustrates the connection request of the detection particular network to be accessed according to the embodiment of the present disclosure Whether the flow chart of condition of contact is met.
As shown in Figure 3A, condition of contact includes the cryptographic Hash of log-on message, aforementioned operation S220 (detection ad hoc networks to be accessed Whether the connection request of network meets condition of contact) it include operation S311 and operation S312.Wherein:
In operation S311, the corresponding cryptographic Hash of connection request of particular network to be accessed is obtained.
In operation S312, whether the corresponding cryptographic Hash of detection connection request is consistent with the cryptographic Hash of log-on message.
In accordance with an embodiment of the present disclosure, condition of contact can include but is not limited to the cryptographic Hash of log-on message, also known as hash Function, hashing algorithm or hash function (Hash Function).The login letter for the access particular network that BIOS can will acquire Breath is encrypted, and encrypted log-on message is stored in mainboard BIOS, for example, can pass through the SHA256 of abstract class Algorithm is converted to the hash value that one group of cryptographic Hash size is 256.
In accordance with an embodiment of the present disclosure, when receiving connection request, it can use and be stored in stepping in mainboard BIOS The identical encryption method of information is recorded, the cryptographic Hash of the log-on messages such as the corresponding account/password of connection request is obtained.Automatic comparison connects It connects and the cryptographic Hash of the log-on message stored in corresponding cryptographic Hash and BIOS is requested to automatically access under the two unanimous circumstances Particular network.
By embodiment of the disclosure, root is checked whether using the cryptographic Hash for the log-on message being stored in mainboard BIOS Particular network, high safety and reliability are automatically accessed according to connection request.
Fig. 3 B diagrammatically illustrates the flow chart of the information processing method according to another embodiment of the disclosure.
As shown in Figure 3B, this method further includes operation S321 other than including aforementioned operation S210~operation S230: when When the connection request of particular network to be accessed does not meet condition of contact, prompt information is generated, to prompt user to input particular network Log-on message.
In accordance with an embodiment of the present disclosure, the login stored in the corresponding cryptographic Hash of automatic comparison connection request and mainboard BIOS The cryptographic Hash of information shows that the connection request of particular network to be accessed does not meet condition of contact in the case where the two is inconsistent, Do not allow then to automatically access particular network, while generating prompt information, to prompt user to input stepping on for the particular network to be accessed Information is recorded, safeguards network security.
Fig. 4 diagrammatically illustrates the block diagram of the information processing unit according to the embodiment of the present disclosure.
As shown in figure 4, the information processing unit 400 includes obtaining module 410, detection module 420 and AM access module 430.Wherein:
Module 410 is obtained, is configured to pass through basic input and output in the case where operating system had accessed particular network System obtains the log-on message of access particular network, wherein log-on message is stored in history shutoff operation system.
Detection module 420, is configured to the log-on message obtained, and basic input output system detects ad hoc networks to be accessed Whether the connection request of network meets condition of contact.
AM access module 430 is configured to when the connection request of particular network to be accessed meets condition of contact, accesses ad hoc networks Network.
By embodiment of the disclosure, as long as user may be implemented accessed a particular network in an operating system, with During power-on self-test afterwards, just it is not necessarily to select network account again and inputs the technical effect of password, user is avoided also to need It executes selection network account and inputs the operation of password.As long as also may be implemented user accessed during power-on self-test it is specific Network just avoids user from also needing to be implemented selection network without selecting network account again and inputting password in an operating system Account and the operation for inputting password.As long as can also realize that user accessed a particular network, cause to break network signal is bad In the case where net, without selecting network account again and inputting the technical effect of password, user is avoided also to need to be implemented selection net Network account and the operation for inputting password.
Optionally, obtaining the log-on message of access particular network by basic input output system includes: by substantially defeated Enter output system and receive the log-on message for having accessed ad hoc networks that network-driven is sent, wherein network-driven and basic input Output system has unified interface.
Optionally, whether the connection request that basic input output system detects particular network to be accessed meets condition of contact packet It includes: in operating system by the start-up course before successfully starting up, obtaining the connection request of particular network to be accessed;And/or Operating system successfully started up after operational process in, obtain the connection request of particular network to be accessed.
By embodiment of the disclosure, if the log-on message for being successfully accessed particular network was inputted, either later Operating system access ad hoc networks by the power-on self-test process before successfully starting up, or after os starting later Network all no longer needs to re-enter the log-on messages such as account/password, and the seamless connection network of particular network may be implemented, to use Family provides intelligentized network insertion experience, realizes that access particular network is accessed with during power-on self-test in an operating system The auto-associating of particular network brings intelligentized network insertion to experience to user.
Fig. 5 A diagrammatically illustrates the block diagram of the detection module according to the embodiment of the present disclosure.
As shown in Figure 5A, aforementioned detection module 420 includes obtaining submodule 511 and detection sub-module 512.Wherein:
Submodule 511 is obtained, is configured to obtain the corresponding cryptographic Hash of connection request of particular network to be accessed.
Detection sub-module 512, be configured to the corresponding cryptographic Hash of detection connection request whether the cryptographic Hash one with log-on message It causes.
By embodiment of the disclosure, root is checked whether using the cryptographic Hash for the log-on message being stored in mainboard BIOS Particular network, high safety and reliability are automatically accessed according to connection request.
Fig. 5 B diagrammatically illustrates the block diagram of the information processing unit according to another embodiment of the disclosure.
As shown in Figure 5 B, the information processing unit 500 is in addition to including aforementioned acquisition module 410, detection module 420 and connecing Enter except module 430, further include generation module 521, is configured to not meet connection strap when the connection request of particular network to be accessed When part, prompt information is generated, to prompt user to input the log-on message of particular network.
By embodiment of the disclosure, the login that is stored in the corresponding cryptographic Hash of automatic comparison connection request and mainboard BIOS The cryptographic Hash of information shows that the connection request of particular network to be accessed does not meet condition of contact in the case where the two is inconsistent, Do not allow then to automatically access particular network, while generating prompt information, to prompt user to input stepping on for the particular network to be accessed Information is recorded, safeguards network security.
In module according to an embodiment of the present disclosure, submodule it is any number of or in which any number of at least partly Function can be realized in a module.According to any one in the module of the embodiment of the present disclosure, submodule, unit, subelement It is a or multiple can be split into multiple modules to realize.According to any one in the module of the embodiment of the present disclosure, submodule Or multiple it can at least be implemented partly as hardware circuit, such as field programmable gate array (FPGA), programmable logic battle array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC) are arranged, or can be by electricity Road carries out hardware or the firmware of any other rational method that is integrated or encapsulating to realize, or with software, hardware and firmware Any one in three kinds of implementations several appropriately combined is realized with wherein any.Alternatively, according to the embodiment of the present disclosure Module, one or more of submodule can at least be implemented partly as computer program module, when the computer journey When sequence module is run, corresponding function can be executed.
For example, obtain module 410, detection module 420, any number of in AM access module 430 and generation module 521 can It is realized in a module with merging or any one module therein can be split into multiple modules.Alternatively, these moulds At least partly function of one or more modules in block can be combined at least partly function of other modules, and at one It is realized in module.In accordance with an embodiment of the present disclosure, module 410, detection module 420, AM access module 430 and generation module are obtained At least one of 521 can at least be implemented partly as hardware circuit, such as field programmable gate array (FPGA), can compile Journey logic array (PLA), system on chip, the system on substrate, the system in encapsulation, specific integrated circuit (ASIC), or can be with It is realized by carrying out the hardware such as any other rational method that is integrated or encapsulating or firmware to circuit, or with software, hardware And it any one in three kinds of implementations of firmware or several appropriately combined is realized with wherein any.Alternatively, obtaining module 410, at least one of detection module 420, AM access module 430 and generation module 521 can be at least implemented partly as Computer program module can execute corresponding function when the computer program module is run.
Fig. 6 diagrammatically illustrates the block diagram of the computer system according to the embodiment of the present disclosure.Computer system shown in Fig. 6 An only example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 6, computer system 600 includes processor 610, computer readable storage medium 620.The department of computer science System 600 can execute the method according to the embodiment of the present disclosure.
Specifically, processor 610 for example may include general purpose microprocessor, instruction set processor and/or related chip group And/or special microprocessor (for example, specific integrated circuit (ASIC)), etc..Processor 610 can also include using for caching The onboard storage device on way.Processor 610 can be the different movements for executing the method flow according to the embodiment of the present disclosure Single treatment unit either multiple processing units.
Computer readable storage medium 620, such as can be non-volatile computer readable storage medium, specific example Including but not limited to: magnetic memory apparatus, such as tape or hard disk (HDD);Light storage device, such as CD (CD-ROM);Memory, such as Random access memory (RAM) or flash memory;Etc..
Computer readable storage medium 620 may include computer program 621, which may include generation Code/computer executable instructions execute processor 610 according to the embodiment of the present disclosure Method or its any deformation.
Computer program 621 can be configured to have the computer program code for example including computer program module.Example Such as, in the exemplary embodiment, the code in computer program 621 may include one or more program modules, for example including 621A, module 621B ....It should be noted that the division mode and number of module are not fixation, those skilled in the art can To be combined according to the actual situation using suitable program module or program module, when these program modules are combined by processor 610 When execution, processor 610 is executed according to the method for the embodiment of the present disclosure or its any deformation.
According to an embodiment of the invention, obtaining module 410, detection module 420, AM access module 430 and generation module 521 At least one of can be implemented as the computer program module with reference to Fig. 6 description can be with when being executed by processor 610 Realize corresponding operating described above.
The disclosure additionally provides a kind of computer readable storage medium, which can be above-mentioned reality It applies included in equipment/device/system described in example;Be also possible to individualism, and without be incorporated the equipment/device/ In system.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple program quilts When execution, the method according to the embodiment of the present disclosure is realized.
In accordance with an embodiment of the present disclosure, computer readable storage medium can be non-volatile computer-readable storage medium Matter, such as can include but is not limited to: portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), portable compact disc read-only memory (CD-ROM), light Memory device, magnetic memory device or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
It will be understood by those skilled in the art that the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination, even if such combination or combination are not expressly recited in the disclosure.Particularly, exist In the case where not departing from disclosure spirit or teaching, the feature recorded in each embodiment and/or claim of the disclosure can To carry out multiple combinations and/or combination.All these combinations and/or combination each fall within the scope of the present disclosure.
Although the disclosure, art technology has shown and described referring to the certain exemplary embodiments of the disclosure Personnel it should be understood that in the case where the spirit and scope of the present disclosure limited without departing substantially from the following claims and their equivalents, A variety of changes in form and details can be carried out to the disclosure.Therefore, the scope of the present disclosure should not necessarily be limited by above-described embodiment, But should be not only determined by appended claims, also it is defined by the equivalent of appended claims.

Claims (10)

1. a kind of information processing method, comprising:
In the case where operating system had accessed particular network, is obtained by basic input output system and access the ad hoc networks The log-on message of network, wherein the log-on message is stored when history closes the operating system;
The log-on message based on acquisition, the connection that the basic input output system detection is intended to access the particular network are asked Seeking Truth is no to meet condition of contact;And
When the connection request for being intended to access the particular network meets the condition of contact, the particular network is accessed.
2. according to the method described in claim 1, wherein, the condition of contact includes the cryptographic Hash of the log-on message, described Whether the connection request that detection is intended to access the particular network, which meets condition of contact, includes:
Obtain the corresponding cryptographic Hash of the connection request to be accessed the particular network;And
Whether consistent with the cryptographic Hash of the log-on message detect the corresponding cryptographic Hash of the connection request.
3. according to the method described in claim 1, further include:
When the connection request for being intended to access the particular network does not meet the condition of contact, prompt information is generated, to prompt to use Family inputs the log-on message of the particular network.
4. according to the method described in claim 2, wherein, the basic input output system detection is intended to access the particular network Connection request whether meet condition of contact and include:
In the operating system by the start-up course before successfully starting up, the connection that acquisition is intended to access the particular network is asked It asks;And/or
In the operational process after the operating system is successfully started up, the connection that acquisition is intended to access the particular network is asked It asks.
5. according to the method described in claim 1, wherein, described obtained by basic input output system accesses the ad hoc networks The log-on message of network includes:
The log-on message for having accessed ad hoc networks that network-driven is sent is received by the basic input output system, wherein The network-driven and the basic input output system have unified interface.
6. a kind of information processing unit, comprising:
Module is obtained, is configured to obtain in the case where operating system had accessed particular network by basic input output system Take the log-on message for accessing the particular network, wherein the log-on message is stored when history closes the operating system;
Detection module, is configured to the log-on message obtained, and the basic input output system detection is intended to access described Whether the connection request of particular network meets condition of contact;And
AM access module is configured to when the connection request for being intended to access the particular network meets the condition of contact, described in access Particular network.
7. the apparatus according to claim 1, wherein the condition of contact includes the cryptographic Hash of the log-on message, described Detection module includes:
Submodule is obtained, is configured to obtain the corresponding cryptographic Hash of the connection request to be accessed the particular network;And
Detection sub-module, be configured to detect the corresponding cryptographic Hash of the connection request whether the cryptographic Hash one with the log-on message It causes.
8. the apparatus according to claim 1, further includes:
Generation module is configured to when the connection request for being intended to access the particular network does not meet the condition of contact, and generation mentions Show information, to prompt user to input the log-on message of the particular network.
9. the apparatus of claim 2, wherein the detection module is configured that
In the operating system by the start-up course before successfully starting up, the connection that acquisition is intended to access the particular network is asked It asks;And/or
In the operational process after the operating system is successfully started up, the connection that acquisition is intended to access the particular network is asked It asks.
10. the apparatus according to claim 1, wherein the acquisition module is configured that
The log-on message for having accessed ad hoc networks that network-driven is sent is received by the basic input output system, wherein The network-driven and the basic input output system have unified interface.
CN201910256074.4A 2019-03-29 2019-03-29 Information processing method and information processing apparatus Active CN110022561B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910256074.4A CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910256074.4A CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Publications (2)

Publication Number Publication Date
CN110022561A true CN110022561A (en) 2019-07-16
CN110022561B CN110022561B (en) 2020-10-27

Family

ID=67190339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910256074.4A Active CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Country Status (1)

Country Link
CN (1) CN110022561B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220359A (en) * 2021-04-24 2021-08-06 深圳市骅鼎鹏智能科技有限公司 Information processing method and device and energy storage system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145965A (en) * 2007-07-17 2008-03-19 中兴通讯股份有限公司 A method and device for automatic login to telecommunication network management
CN103368905A (en) * 2012-03-29 2013-10-23 同方股份有限公司 Trustable cipher module chip-based network access authentication method
CN103379485A (en) * 2012-04-24 2013-10-30 中国联合网络通信集团有限公司 Wireless access equipment and encryption processing method thereof
US20140075521A1 (en) * 2012-09-11 2014-03-13 Tencent Technology (Shenzhen) Company Limited System and method for sharing login status between an application platform and an application
US20140136828A1 (en) * 2012-11-09 2014-05-15 Insyde Software Corp. Bios user interface control using mobile device
CN105632157A (en) * 2016-03-15 2016-06-01 彭云 Intelligent control system, intelligent terminal and network equipment
CN106792698A (en) * 2017-02-20 2017-05-31 广东欧珀移动通信有限公司 A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN107396357A (en) * 2017-06-09 2017-11-24 上海斐讯数据通信技术有限公司 A kind of wireless network connecting method and a kind of wireless routing device
CN107613498A (en) * 2017-10-26 2018-01-19 上海与德科技有限公司 A kind of connection method of network communication and device

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145965A (en) * 2007-07-17 2008-03-19 中兴通讯股份有限公司 A method and device for automatic login to telecommunication network management
CN103368905A (en) * 2012-03-29 2013-10-23 同方股份有限公司 Trustable cipher module chip-based network access authentication method
CN103379485A (en) * 2012-04-24 2013-10-30 中国联合网络通信集团有限公司 Wireless access equipment and encryption processing method thereof
US20140075521A1 (en) * 2012-09-11 2014-03-13 Tencent Technology (Shenzhen) Company Limited System and method for sharing login status between an application platform and an application
US20140136828A1 (en) * 2012-11-09 2014-05-15 Insyde Software Corp. Bios user interface control using mobile device
CN105632157A (en) * 2016-03-15 2016-06-01 彭云 Intelligent control system, intelligent terminal and network equipment
CN106792698A (en) * 2017-02-20 2017-05-31 广东欧珀移动通信有限公司 A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN107396357A (en) * 2017-06-09 2017-11-24 上海斐讯数据通信技术有限公司 A kind of wireless network connecting method and a kind of wireless routing device
CN107613498A (en) * 2017-10-26 2018-01-19 上海与德科技有限公司 A kind of connection method of network communication and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220359A (en) * 2021-04-24 2021-08-06 深圳市骅鼎鹏智能科技有限公司 Information processing method and device and energy storage system

Also Published As

Publication number Publication date
CN110022561B (en) 2020-10-27

Similar Documents

Publication Publication Date Title
US10581833B2 (en) Electronic device and method for processing secure information
US10051559B2 (en) Network connection method and user equipment
US9712524B2 (en) Method and apparatus for user authentication
US10477599B2 (en) Method and apparatus for managing wireless router and device connected thereto
US9117191B2 (en) Automatic device inventory management for different types of devices
US20160294802A1 (en) Accelerated passphrase verification
US9774599B2 (en) Authenticating method and apparatus using electronic device
US9606957B2 (en) Electronic device and method of linking a task thereof
US9602969B2 (en) Method and electronic device for recognizing area
EP3591552B1 (en) Protection system including machine learning snapshot evaluation
US9589122B2 (en) Operation processing method and device
WO2014108005A1 (en) Co-verification method, two-dimensional code generation method, and device and system therefor
US10212210B2 (en) Electronic device and method of providing information about the access point (AP)
US10181024B2 (en) Method, device, and system for updating authentication information
US10135816B2 (en) Electronic device and method of transceiving data
US10554627B2 (en) Proximity communication method and apparatus
US20160088476A1 (en) Electronic device, accessory device, and method of authenticating accessory device
WO2015074443A1 (en) An operation processing method and device
US20180063673A1 (en) Method for recognizing location and electronic device implementing the same
US9398432B2 (en) Electronic device and method for controlling emergency call in electronic device
US10366246B2 (en) Electronic device and operating method thereof
CN106488534A (en) Obtain the method and system of Network Access Point
CN112434278A (en) Bare computer authentication method, apparatus, device and medium
CN110022561A (en) Information processing method and information processing unit
CN113038192A (en) Video processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant