CN110022561B - Information processing method and information processing apparatus - Google Patents

Information processing method and information processing apparatus Download PDF

Info

Publication number
CN110022561B
CN110022561B CN201910256074.4A CN201910256074A CN110022561B CN 110022561 B CN110022561 B CN 110022561B CN 201910256074 A CN201910256074 A CN 201910256074A CN 110022561 B CN110022561 B CN 110022561B
Authority
CN
China
Prior art keywords
specific network
network
login information
connection request
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910256074.4A
Other languages
Chinese (zh)
Other versions
CN110022561A (en
Inventor
周储
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910256074.4A priority Critical patent/CN110022561B/en
Publication of CN110022561A publication Critical patent/CN110022561A/en
Application granted granted Critical
Publication of CN110022561B publication Critical patent/CN110022561B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • H04W12/068Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure provides an information processing method, including: under the condition that the operating system has access to a specific network, obtaining login information of the specific network through the basic input output system, wherein the login information is stored when the operating system is closed historically; based on the obtained login information, the basic input and output system detects whether a connection request of a specific network to be accessed meets the connection condition; and accessing the specific network when the connection request to access the specific network meets the connection condition. The present disclosure also provides an information processing apparatus.

Description

Information processing method and information processing apparatus
Technical Field
The present disclosure relates to an information processing method and an information processing apparatus.
Background
In the Operating System (OS) or the power-on self-test process, the user may perform a series of operations, such as first selecting a designated network account and then manually inputting a password, to achieve access to a designated network.
In implementing the disclosed concept, the inventors found that there are at least the following drawbacks in the related art: each time the wireless network is accessed, a series of operations of firstly selecting a specified network account and then manually inputting a password need to be repeatedly executed, and under the condition that the network is unstable or the network is interrupted, a series of operations of firstly selecting the specified network account and then manually inputting the password also need to be executed again, so that the use experience of a user is seriously influenced.
Disclosure of Invention
One aspect of the present disclosure provides an information processing method, including: the method includes the steps that under the condition that an operating system has accessed a specific network, login information for accessing the specific network is obtained through a basic input output system, wherein the login information is stored when the operating system is closed historically, based on the obtained login information, the basic input output system detects whether a connection request for accessing the specific network meets connection conditions or not, and when the connection request for accessing the specific network meets the connection conditions, the specific network is accessed.
Optionally, the detecting of whether the connection request to access the specific network meets the connection condition includes: obtaining a hash value corresponding to the connection request to access the specific network, and detecting whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
Optionally, the method further includes: when the connection request to access the specific network does not accord with the connection condition, prompt information is generated to prompt a user to input login information of the specific network.
Optionally, the detecting, by the bios, whether the connection request to access the specific network meets a connection condition includes: obtaining a connection request to access the specific network during a starting process before the operating system is successfully started, and/or obtaining a connection request to access the specific network during a running process after the operating system is successfully started.
Optionally, the obtaining of the login information accessing the specific network through the bios includes: and receiving login information which is sent by a network driver and has access to a specific network through the basic input and output system, wherein the network driver and the basic input and output system have a unified interface.
Another aspect of the present disclosure provides an information processing apparatus including: the system comprises an acquisition module, a detection module and an access module, wherein the acquisition module is configured to acquire login information for accessing a specific network through a basic input output system under the condition that an operating system has accessed the specific network, the login information is stored when the operating system is closed historically, the detection module is configured to detect whether a connection request for accessing the specific network meets a connection condition or not based on the acquired login information, and the access module is configured to access the specific network when the connection request for accessing the specific network meets the connection condition.
Optionally, the connection condition includes a hash value of the login information, and the detection module includes: an obtaining submodule configured to obtain a hash value corresponding to the connection request to be accessed to the specific network, and a detecting submodule configured to detect whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
Optionally, the apparatus further comprises: and the generating module is configured to generate prompt information to prompt a user to input login information of the specific network when the connection request to be accessed to the specific network does not accord with the connection condition.
Optionally, the detection module is configured to: obtaining a connection request to access the specific network during a starting process before the operating system is successfully started, and/or obtaining a connection request to access the specific network during a running process after the operating system is successfully started.
Optionally, the obtaining module is configured to: and receiving login information which is sent by a network driver and has access to a specific network through the basic input and output system, wherein the network driver and the basic input and output system have a unified interface.
Another aspect of the present disclosure provides a computer system comprising: one or more processors, a storage device to store one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of the above.
Another aspect of the disclosure provides a computer-readable medium having stored thereon executable instructions that, when executed by a processor, cause the processor to implement the method of any of the above.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows an application scenario of an information processing method and an information processing apparatus according to an embodiment of the present disclosure;
FIG. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure;
fig. 3A schematically illustrates a flow chart of detecting whether a connection request to access a particular network meets a connection condition according to an embodiment of the disclosure;
FIG. 3B schematically shows a flow chart of an information processing method according to another embodiment of the present disclosure;
fig. 4 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure;
FIG. 5A schematically illustrates a block diagram of a detection module according to an embodiment of the present disclosure;
fig. 5B schematically shows a block diagram of an information processing apparatus according to another embodiment of the present disclosure; and
FIG. 6 schematically shows a block diagram of a computer system according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable information processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The terminal device has a need to access a wired or wireless network. The wireless network is an extension technology of a wired network, and because data is received and transmitted across space by using, for example, a Radio Frequency (RF) technology, the use of wire connection can be reduced, so that the wireless network system can achieve the purpose of building a computer network system, and devices can be freely arranged and moved. Especially in public open places or enterprises, a wireless network can be used as a supplementary mode of the existing wired network, and terminal equipment provided with a wireless network card can conveniently access the internet in a wireless mode.
Wi-Fi is an important component of a Wireless Local Area Network (WLAN), a technology that allows a terminal device to connect to a WLAN, typically using the 2.4G UHF or 5G SHF ISM radio frequency bands. Connecting to a WLAN is typically password protected, allowing terminal devices within range of the WLAN to access the network after entering a valid password.
Taking a computer as an example of a terminal device, the whole process from turning on the power supply to completing the startup of the operating system is as follows: when a start key (Power switch) is pressed, the main board is powered On, the control right of an operating System is handed to a Basic Input Output System (BIOS), and since hardware supporting normal operation of a computer includes, but is not limited to, a memory, an interrupt, an expansion card and other devices, a start code of the BIOS executes a Power On Self Test (POST) program to detect whether each device in the System is normal. The complete power-on self-test program relates to a Central Processing Unit (CPU), a 640K basic memory, an extended memory above 1M, a Read Only Memory (ROM), a mainboard, a system configuration in a Complementary Metal Oxide Semiconductor (CMOS) memory, a verification and initialization video controller for testing the video memory, checking video signals and synchronous signals, an interface test of a Cathode Ray Tube (CRT), a keyboard, a floppy drive, a hard disk and a CD-ROM subsystem for checking a parallel port (printer) and a serial port (RS 232). When the power-on self-check program is finished, the system will transfer to the next step of BIOS, searching the operating system from the A drive, the C drive or the CD-ROM and the network server for starting, then handing over the control right to the operating system, and entering the normal operation state of the operating system.
The network can be accessed in several cases:
the first condition is as follows: the network can be accessed during the process of executing the POST by the computer.
It should be noted that, if the network account to be connected is selected and the password is input during the POST execution of the computer, the specific network may be accessed, but in the next POST execution of the computer, the network account of the specific network needs to be selected again and the password needs to be manually input when the user wants to access the specific network that has been accessed.
Case two: the network may be accessed after the operating system boot is complete.
It should be noted that, if the network account to be connected is selected and the password is input after the operating system is started, the specific network may be accessed, but after the operating system is restarted next time, the network account of the specific network needs to be selected again and the password needs to be manually input when the specific network that has been accessed is desired to be accessed.
Case three: the network can be accessed after the network is unstable and disconnected.
It should be noted that, if the network is unstable and disconnected during the process of accessing the specific network, and it is desired to access the specific network that has been accessed once after the network is stable and recovered, it is necessary to select the network account of the specific network again and manually input the password.
It can be seen that, in the related art, no matter during POST, after the operating system is started up, or after the network is unstable and disconnected, each time the user wants to access the specific network that has been accessed, the user needs to select the network account of the specific network again and manually input the password, and the next time the user accesses the specific network automatically cannot be realized when the user connects the specific network. And repeated account selection and password input are inconvenient for automatic networking based on network Protocol versions (Internet Protocol Version 4, IPV4/Internet Protocol Version 6, IPV6), and the times of manual operation of a user are increased, so that intelligent network access experience cannot be brought to the user.
Based on this, the present disclosure provides an information processing method, which can implement automatic association of a specific network under a BIOS and in a process of executing a POST, and avoid a cumbersome operation of selecting a network account of the specific network again and manually inputting a password to access the specific network. Specifically, the method comprises the following steps: the method includes the steps that under the condition that an operating system has accessed a specific network, login information for accessing the specific network is obtained through a basic input output system, wherein the login information is stored when the operating system is closed historically, based on the obtained login information, the basic input output system detects whether a connection request for accessing the specific network meets connection conditions or not, and when the connection request for accessing the specific network meets the connection conditions, the specific network is accessed.
Fig. 1 schematically illustrates an application scenario 100 of an information processing method and an information processing apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the network access method provided by the present disclosure may be applied to a scenario in which the terminal device 101 accesses the network 103 through the router 102, and particularly, a scenario in which automatic association between network 103 connection is realized in a power-on self-test process of the terminal device 101 and after an operating system is started.
Network 103 is the medium used to provide communication links between terminal equipment 101 and router 102. Network 103 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user can use the terminal apparatus 101 to receive or transmit a message or the like through the network 103. Various messaging client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only) may be installed on terminal device 101.
Terminal device 101 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablets, laptop portable computers, desktop computers, and the like.
In the application scenario 100 shown in fig. 1, if a specific network is connected in the OS, the specific network can be automatically and directly accessed in the BIOS without selecting a network account of the specific network again and manually inputting a password. And if the BIOS is connected with a specific network once, the specific network can be automatically and directly accessed without selecting the network account of the specific network again and manually inputting a password under the OS.
It should be understood that the number of end devices, networks, and routers in fig. 1 is merely illustrative. There may be any number of end devices, networks, and routers, as desired for implementation, and the disclosure is not limited.
Fig. 2 schematically shows a flow chart of an information processing method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S210 to S230. Wherein:
in operation S210, in the case where the operating system has accessed the specific network, login information for accessing the specific network is acquired through the bios.
In operation S220, based on the obtained login information, the bios detects whether a connection request to access a specific network meets a connection condition.
In operation S230, the specific network is accessed when the connection request to access the specific network meets the connection condition.
According to an embodiment of the present disclosure, the login information may include a network account of a specific network selected by the user to be accessed, and a login password corresponding to the account. The login information may be login information input when the specific network is successfully accessed for the first time in the POST process, or input when the specific network is successfully accessed for the first time after the operation system is started, or input when the specific network is successfully accessed for the first time before the network is unstable and disconnected.
When the user successfully accesses the specific network by selecting the network account and inputting the password, the BIOS can acquire the login information, and once the operating system is closed or restarted, the login information is stored in the BIOS of the mainboard when the operating system is historically closed. The specific network can be accessed based on the login information, and therefore, the login information can be used as a preset condition to check whether the automatic access to the specific network based on the connection request is allowed. Specifically, if the specific network is accessed, once a connection request to access the specific network is received, the BIOS detects whether login information included in the connection request to access the specific network is identical to login information stored in the BIOS of the motherboard, and if the login information is identical to the login information, the BIOS allows the specific network to be automatically accessed, and if the login information is not identical to the login information, the BIOS does not allow the specific network to be automatically accessed.
By the embodiment of the disclosure, the technical effect that the user does not need to select the network account and input the password again in the subsequent power-on self-test process as long as the user accesses a specific network in the operating system can be realized, and the user is prevented from executing the operation of selecting the network account and inputting the password. The method and the device can also realize that the user does not need to select the network account and input the password again in the operating system as long as the user accesses a specific network in the power-on self-checking process, and avoid the user from further executing the operation of selecting the network account and inputting the password. The technical effect that the user does not need to select the network account and input the password again under the condition that the network is disconnected due to poor network signals as long as the user accesses a specific network can be achieved, and the user is prevented from executing the operation of selecting the network account and inputting the password.
Optionally, the obtaining login information for accessing a specific network through the bios includes: and receiving login information which is sent by a network driver and has access to a specific network through the basic input output system, wherein the network driver and the basic input output system have a unified interface.
According to the embodiment of the disclosure, the BIOS may agree with a unified interface with a Network Driver (Network Driver), after a user selects a Network account and inputs login information such as a password, the Network Driver may acquire the Network account and the password, and the BIOS acquires the login information such as an account/password transmitted by the Network Driver based on the unified interface agreed with the Network Driver.
Optionally, the bios may obtain a connection request to be accessed to the specific network in a starting process before the operating system is successfully started, for example, https starting in a power-on self-test process, and detect whether the connection request to be accessed to the specific network meets a connection condition; or in the running process after the operating system is successfully started, obtaining the connection request to be accessed to the specific network, and detecting whether the connection request to be accessed to the specific network meets the connection condition.
Through the embodiment of the disclosure, if the login information of successfully accessing the specific network is input, no matter the subsequent power-on self-test process before the operating system is successfully started or the subsequent operating system is started and then accessed to the specific network, the login information such as account numbers/passwords and the like does not need to be input again, the seamless connection of the specific network can be realized, the intelligent network access experience is provided for the user, the automatic association of accessing the specific network in the operating system and accessing the specific network in the power-on self-test process is realized, and the intelligent network access experience is brought for the user.
Specifically, fig. 3A schematically shows a flowchart for detecting whether a connection request to access a specific network meets a connection condition according to an embodiment of the present disclosure.
As shown in fig. 3A, the connection condition includes a hash value of the login information, and the operation S220 (detecting whether the connection request to access the specific network meets the connection condition) includes operations S311 and S312. Wherein:
in operation S311, a hash value corresponding to a connection request to access a specific network is obtained.
In operation S312, it is detected whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
According to an embodiment of the present disclosure, the connection condition may include, but is not limited to, a Hash value of the login information, which is also called a Hash Function, a Hash algorithm, or a Hash Function (Hash Function). The BIOS may encrypt the acquired login information for accessing to the specific network, and store the encrypted login information in the motherboard BIOS, for example, may convert the login information into a set of Hash values having a Hash value size of 256 bits by using the SHA256 algorithm of the abstract class.
According to the embodiment of the disclosure, when the connection request is received, the hash value of login information such as an account/password corresponding to the connection request can be obtained by using the same encryption method as the login information stored in the BIOS of the motherboard. And automatically comparing the hash value corresponding to the connection request with the hash value of the login information stored in the BIOS, and automatically accessing the specific network under the condition that the hash value corresponding to the connection request is consistent with the hash value of the login information stored in the BIOS.
According to the embodiment of the disclosure, whether the specific network is automatically accessed according to the connection request is checked by using the hash value of the login information stored in the BIOS of the mainboard, so that the safety and reliability are high.
Fig. 3B schematically shows a flow chart of an information processing method according to another embodiment of the present disclosure.
As shown in fig. 3B, the method includes, in addition to the aforementioned operations S210 to S230, an operation S321: when the connection request to access the specific network does not accord with the connection condition, prompt information is generated to prompt the user to input the login information of the specific network.
According to the embodiment of the disclosure, the hash value corresponding to the connection request is automatically compared with the hash value of the login information stored in the BIOS of the main board, and if the hash value corresponding to the connection request and the hash value of the login information stored in the BIOS of the main board are not consistent, the connection request to be accessed to the specific network is not qualified with the connection condition, the specific network is not allowed to be accessed automatically, and meanwhile, prompt information is generated to prompt a user to input the login information of the specific network to be accessed, so that the network security is maintained.
Fig. 4 schematically shows a block diagram of an information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 4, the information processing apparatus 400 includes an acquisition module 410, a detection module 420, and an access module 430. Wherein:
the obtaining module 410 is configured to obtain login information for accessing the specific network through the bios in a case where the operating system has accessed the specific network, wherein the login information is stored when the operating system is historically turned off.
The detection module 420 is configured to detect, based on the obtained login information, whether the connection request to access the specific network meets the connection condition.
The access module 430 is configured to access the specific network when the connection request to access the specific network meets the connection condition.
By the embodiment of the disclosure, the technical effect that the user does not need to select the network account and input the password again in the subsequent power-on self-test process as long as the user accesses a specific network in the operating system can be realized, and the user is prevented from executing the operation of selecting the network account and inputting the password. The method and the device can also realize that the user does not need to select the network account and input the password again in the operating system as long as the user accesses a specific network in the power-on self-checking process, and avoid the user from further executing the operation of selecting the network account and inputting the password. The technical effect that the user does not need to select the network account and input the password again under the condition that the network is disconnected due to poor network signals as long as the user accesses a specific network can be achieved, and the user is prevented from executing the operation of selecting the network account and inputting the password.
Optionally, the obtaining login information for accessing a specific network through the bios includes: and receiving login information which is sent by a network driver and has access to a specific network through the basic input output system, wherein the network driver and the basic input output system have a unified interface.
Optionally, the detecting, by the bios, whether the connection request to access the specific network meets the connection condition includes: obtaining a connection request to be accessed to a specific network in a starting process before an operating system is successfully started; and/or obtaining a connection request to access a particular network during operation after the operating system is successfully started.
Through the embodiment of the disclosure, if the login information of successfully accessing the specific network is input, no matter the subsequent power-on self-test process before the operating system is successfully started or the subsequent operating system is started and then accessed to the specific network, the login information such as account numbers/passwords and the like does not need to be input again, the seamless connection of the specific network can be realized, the intelligent network access experience is provided for the user, the automatic association of accessing the specific network in the operating system and accessing the specific network in the power-on self-test process is realized, and the intelligent network access experience is brought for the user.
Fig. 5A schematically illustrates a block diagram of a detection module according to an embodiment of the disclosure.
As shown in fig. 5A, the detection module 420 includes an obtaining sub-module 511 and a detection sub-module 512. Wherein:
the obtaining sub-module 511 is configured to obtain a hash value corresponding to the connection request to be accessed to the specific network.
The detecting sub-module 512 is configured to detect whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
According to the embodiment of the disclosure, whether the specific network is automatically accessed according to the connection request is checked by using the hash value of the login information stored in the BIOS of the mainboard, so that the safety and reliability are high.
Fig. 5B schematically shows a block diagram of an information processing apparatus according to another embodiment of the present disclosure.
As shown in fig. 5B, the information processing apparatus 500 includes, in addition to the aforementioned obtaining module 410, detecting module 420 and accessing module 430, a generating module 521 configured to generate a prompt message to prompt a user to input login information of a specific network when a connection request to access the specific network does not meet a connection condition.
According to the embodiment of the disclosure, the hash value corresponding to the connection request is automatically compared with the hash value of the login information stored in the BIOS of the main board, and if the hash value corresponding to the connection request and the hash value of the login information stored in the BIOS of the main board are not consistent, the connection request to be accessed to the specific network is not qualified with the connection condition, the specific network is not allowed to be accessed automatically, and the prompt information is generated at the same time, so that the user is prompted to input the login information of the specific network to be accessed, and the network security.
Any number of modules, sub-modules, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging the circuit, or in any one of three implementations, or in any suitable combination of any of the three. Alternatively, one or more of the modules, sub-modules according to embodiments of the disclosure may be implemented at least partly as computer program modules, which when executed may perform corresponding functions.
For example, any of the obtaining module 410, the detecting module 420, the accessing module 430, and the generating module 521 may be combined in one module to be implemented, or any one of the modules may be split into multiple modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the obtaining module 410, the detecting module 420, the accessing module 430, and the generating module 521 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware, and firmware, or any suitable combination of any of them. Alternatively, at least one of the obtaining module 410, the detecting module 420, the accessing module 430 and the generating module 521 may be at least partly implemented as a computer program module, which when executed may perform the respective functions.
FIG. 6 schematically shows a block diagram of a computer system according to an embodiment of the disclosure. The computer system illustrated in FIG. 6 is only one example and should not impose any limitations on the scope of use or functionality of embodiments of the disclosure.
As shown in fig. 6, computer system 600 includes a processor 610, a computer-readable storage medium 620. The computer system 600 may perform a method according to an embodiment of the disclosure.
In particular, the processor 610 may comprise, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 610 may also include onboard memory for caching purposes. The processor 610 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage medium 620, for example, may be a non-volatile computer-readable storage medium, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 620 may include a computer program 621, which computer program 621 may include code/computer-executable instructions that, when executed by the processor 610, cause the processor 610 to perform a method according to an embodiment of the disclosure, or any variation thereof.
The computer program 621 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 621 may include one or more program modules, including 621A, 621B, … …, for example. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 610 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 610.
According to an embodiment of the present invention, at least one of the obtaining module 410, the detecting module 420, the accessing module 430 and the generating module 521 may be implemented as a computer program module described with reference to fig. 6, which, when executed by the processor 610, may implement the respective operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
While the disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (10)

1. An information processing method comprising:
under the condition that an operating system has access to a specific network, obtaining login information of accessing the specific network through a basic input output system, wherein the login information is stored when the operating system is closed historically;
based on the obtained login information, the basic input and output system detects whether a connection request to be accessed to the specific network meets a connection condition; and
and when the connection request to be accessed to the specific network meets the connection condition, accessing to the specific network.
2. The method of claim 1, wherein the connection condition comprises a hash value of the login information, and the detecting whether the connection request to access the specific network meets the connection condition comprises:
obtaining a hash value corresponding to the connection request to be accessed to the specific network; and
and detecting whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
3. The method of claim 1, further comprising:
and when the connection request to be accessed to the specific network does not accord with the connection condition, generating prompt information to prompt a user to input login information of the specific network.
4. The method of claim 2, wherein the bios detecting whether the connection request to access the specific network meets a connection condition comprises:
obtaining a connection request to be accessed to the specific network in a starting process before the operating system is successfully started; and/or
And obtaining a connection request to access the specific network in the running process after the operating system is successfully started.
5. The method of claim 1, wherein the obtaining login information for accessing the particular network via a basic input output system comprises:
and receiving login information which is sent by a network driver and has access to a specific network through the basic input output system, wherein the network driver and the basic input output system have a unified interface.
6. An information processing apparatus comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is configured to acquire login information for accessing a specific network through a basic input output system under the condition that an operating system has accessed the specific network, and the login information is stored when the operating system is closed historically;
the detection module is configured to detect whether a connection request to be accessed to the specific network meets a connection condition or not by the basic input and output system based on the acquired login information; and
and the access module is configured to access the specific network when the connection request to access the specific network meets the connection condition.
7. The apparatus of claim 6, wherein the connection condition comprises a hash value of the login information, the detection module comprising:
an obtaining submodule configured to obtain a hash value corresponding to the connection request to be accessed to the specific network; and
and the detection submodule is configured to detect whether the hash value corresponding to the connection request is consistent with the hash value of the login information.
8. The apparatus of claim 6, further comprising:
and the generating module is configured to generate prompt information to prompt a user to input login information of the specific network when the connection request to be accessed to the specific network does not accord with the connection condition.
9. The apparatus of claim 7, wherein the detection module is configured to:
obtaining a connection request to be accessed to the specific network in a starting process before the operating system is successfully started; and/or
And obtaining a connection request to access the specific network in the running process after the operating system is successfully started.
10. The apparatus of claim 6, wherein the acquisition module is configured to:
and receiving login information which is sent by a network driver and has access to a specific network through the basic input output system, wherein the network driver and the basic input output system have a unified interface.
CN201910256074.4A 2019-03-29 2019-03-29 Information processing method and information processing apparatus Active CN110022561B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910256074.4A CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910256074.4A CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Publications (2)

Publication Number Publication Date
CN110022561A CN110022561A (en) 2019-07-16
CN110022561B true CN110022561B (en) 2020-10-27

Family

ID=67190339

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910256074.4A Active CN110022561B (en) 2019-03-29 2019-03-29 Information processing method and information processing apparatus

Country Status (1)

Country Link
CN (1) CN110022561B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113220359A (en) * 2021-04-24 2021-08-06 深圳市骅鼎鹏智能科技有限公司 Information processing method and device and energy storage system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145965A (en) * 2007-07-17 2008-03-19 中兴通讯股份有限公司 A method and device for automatic login to telecommunication network management
CN103368905A (en) * 2012-03-29 2013-10-23 同方股份有限公司 Trustable cipher module chip-based network access authentication method
CN103379485A (en) * 2012-04-24 2013-10-30 中国联合网络通信集团有限公司 Wireless access equipment and encryption processing method thereof

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9088559B2 (en) * 2012-09-11 2015-07-21 Tencent Technology (Shenzhen) Company Limited System and method for sharing login status between an application platform and an application
WO2014074704A1 (en) * 2012-11-09 2014-05-15 Insyde Software Corp. Bios user interface control using mobile device
CN105632157A (en) * 2016-03-15 2016-06-01 彭云 Intelligent control system, intelligent terminal and network equipment
CN106792698A (en) * 2017-02-20 2017-05-31 广东欧珀移动通信有限公司 A kind of Wireless Fidelity Wi Fi connection methods and mobile terminal
CN107396357A (en) * 2017-06-09 2017-11-24 上海斐讯数据通信技术有限公司 A kind of wireless network connecting method and a kind of wireless routing device
CN107613498A (en) * 2017-10-26 2018-01-19 上海与德科技有限公司 A kind of connection method of network communication and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145965A (en) * 2007-07-17 2008-03-19 中兴通讯股份有限公司 A method and device for automatic login to telecommunication network management
CN103368905A (en) * 2012-03-29 2013-10-23 同方股份有限公司 Trustable cipher module chip-based network access authentication method
CN103379485A (en) * 2012-04-24 2013-10-30 中国联合网络通信集团有限公司 Wireless access equipment and encryption processing method thereof

Also Published As

Publication number Publication date
CN110022561A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
US20220132314A1 (en) Method and system for controlling network access
US10348755B1 (en) Systems and methods for detecting network security deficiencies on endpoint devices
US9766900B2 (en) Booting a multi-node computer system from a primary node dynamically selected based on security setting criteria
US10601978B2 (en) Telecommunication device utilization based on heartbeat communication
EP2961123B1 (en) Information processing device and operation control method
US20110252153A1 (en) Securely providing session key information for user consent to remote management of a computer device
US11573845B2 (en) Remote debug for scaled computing environments
US11349651B2 (en) Measurement processing of high-speed cryptographic operation
US20070168747A1 (en) Information processing device and process control method
WO2017076051A1 (en) Method and apparatus for acquiring superuser permission
KR20200112494A (en) Electronic apparatus and method for controlling thereof
US10019577B2 (en) Hardware hardened advanced threat protection
US9058496B1 (en) Securely reconfiguring a multi-node system to prevent firmware rollback
US20190386974A1 (en) Data Trust Score
US9882931B1 (en) Systems and methods for detecting potentially illegitimate wireless access points
CN110022561B (en) Information processing method and information processing apparatus
US11184332B2 (en) User terminal device, electronic device, system comprising the same and control method thereof
US20210274573A1 (en) Abnormality Processing Method, Terminal Device and Storage Medium
US11861011B2 (en) Secure boot process
US10896047B2 (en) Booting a computer using a wireless network connection
US10862877B2 (en) System and method for tunneling of management traffic
KR102023424B1 (en) Method for setting configuration of application and testing method using thereof
WO2019179041A1 (en) Account login verification method and apparatus, and computer device and storage medium
US12007841B2 (en) Disaster recover preparedness with trusted firmware boot method over a smart phone
US10778650B2 (en) Systems and methods for management domain attestation service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant