CN110167027B - Method, equipment and storage medium for acquiring access password of wireless access point - Google Patents

Method, equipment and storage medium for acquiring access password of wireless access point Download PDF

Info

Publication number
CN110167027B
CN110167027B CN201910436350.5A CN201910436350A CN110167027B CN 110167027 B CN110167027 B CN 110167027B CN 201910436350 A CN201910436350 A CN 201910436350A CN 110167027 B CN110167027 B CN 110167027B
Authority
CN
China
Prior art keywords
user
access point
wireless access
client
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910436350.5A
Other languages
Chinese (zh)
Other versions
CN110167027A (en
Inventor
万玉权
吴培希
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co.,Ltd.
Original Assignee
Shanghai Shangxiang Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shangxiang Network Technology Co ltd filed Critical Shanghai Shangxiang Network Technology Co ltd
Priority to CN201910436350.5A priority Critical patent/CN110167027B/en
Publication of CN110167027A publication Critical patent/CN110167027A/en
Application granted granted Critical
Publication of CN110167027B publication Critical patent/CN110167027B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/03Protecting confidentiality, e.g. by encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point

Abstract

The application provides a method, equipment and a storage medium for acquiring an access password of a wireless access point, and relates to the technical field of networks. The method comprises the following steps: a first client receives a connection request of a wireless access point sent by a first user, and the wireless access point has an affiliation with a second user; sending a friend adding request to a second client of a second user, and requesting an access password of the wireless access point to the second client when the friend adding request is successfully added; and connecting the wireless access point according to the access password. In the technical scheme, on the premise of ensuring the rights and interests of the second user, the first user can be safely and conveniently connected with the network, and network sharing is realized; and the first user and the second user establish a friend relationship, which is beneficial to promoting network sharing among subsequent users.

Description

Method, equipment and storage medium for acquiring access password of wireless access point
Technical Field
The present invention relates to the field of network technologies, and in particular, to a method, a device, and a storage medium for acquiring an access password of a wireless access point.
Background
Wireless networks play an important role in the work and life of people, and currently, the connection mode of wireless networks mainly includes: firstly, a user manually inputs an access password to connect a wireless network; and secondly, connecting the wireless network through a third-party networking platform, wherein the third-party networking platform stores access passwords of a large number of wireless access points, so that a user does not need to manually input the access passwords.
There are also a number of wireless networks currently available that are personal and have no access codes stored on third party networking platforms, and therefore, other users cannot connect to these networks without permission. However, individuals belonging to the wireless networks often want to share own networks to friends, so that the sharing of the wireless networks is effectively realized, and the internet access requirements of certain users can be met.
Disclosure of Invention
In view of the above, the present application provides a method, an apparatus and a storage medium for obtaining an access password of a wireless access point, which are at least to solve one of the above technical problems to a first extent.
In order to achieve the above object, a first aspect of the present application provides a method for obtaining an access password of a wireless access point, where the method is applied to a first client, where a first user logs in to the first client, and the method includes:
receiving a connection request of a first user for selecting to connect a first wireless access point, wherein the first wireless access point has an affiliation with a second user;
judging whether a friend relationship exists between the first user and the second user or not;
and if the friend adding request does not exist, sending a friend adding request to the second user, and if the friend adding request exists, requesting an access password of the first wireless access point to the second user.
Optionally, the method further includes:
receiving an access password of the first wireless access point sent by the second user;
and connecting the first wireless access point according to the access password.
Optionally, the determining whether the first user and the second user have a friend relationship includes:
sending a friend relation query request to a server according to the user identification of the first user and the hotspot identification of the first wireless access point, wherein the server stores the corresponding relation between the hotspot identifications of one or more wireless access points and the user identification of the home user and the corresponding relation between the user identifications of the users with established friend relation;
receiving a query result sent by the server;
and judging whether the first user and the second user have a friend relationship according to the query result.
Optionally, the determining whether the first user and the second user have a friend relationship includes:
requesting a user identification of the second user from a server;
acquiring a user identifier of the second user;
and judging whether the first user and the second user have a friend relationship or not according to the user identification of the second user.
Optionally, the requesting, from the second user, an access password of the first wireless access point includes:
sending a password obtaining request to the second client;
and displaying the access password sent by the second client in a session frame of the first user and the second user.
Optionally, the connecting the first wireless access point according to the access password includes:
identifying the access password in the session box;
and connecting the first wireless access point according to the identified access password.
Optionally, the accessing password is an accessing password ciphertext, and the connecting the first wireless access point according to the accessing password includes:
decrypting the access password ciphertext to obtain an access password plaintext;
and connecting the first wireless access point according to the access password plaintext.
Optionally, before receiving the connection request that the first user selects to connect to the first wireless access point, the method further includes:
scanning surrounding wireless access points;
sending a hotspot tag inquiry request to a server according to the hotspot identification of the scanned wireless access point, wherein the hotspot tag is used for identifying whether the wireless access point is an access point which can be connected with a user establishing a friend relationship with a second user to which the wireless access point belongs;
receiving a hotspot tag sent by the server;
and correspondingly displaying the hot spot identification of the scanned wireless access point and the hot spot label.
In order to achieve the above object, a second aspect of the present application provides a method for sending a wireless access point access password, where the method is applied to a second client, and the method includes:
receiving a friend adding request sent by a first client, wherein the friend adding request is sent based on a connection request of a first wireless access point, and the first wireless access point has an affiliation with a second user logged on a second client;
adding a first user as a friend;
receiving a password obtaining request sent by the first user, and obtaining an access password of the first wireless access point;
and sending the access password to the first user.
Optionally, the adding the first user as a friend includes:
and displaying the friend adding request, and adding the first user as a friend when receiving the addition confirmation information of the second user.
Optionally, before sending the access password to the first user, the method further includes:
judging whether the access password is sent as a ciphertext or not, and encrypting the access password to obtain an access password ciphertext if the judgment result is yes;
the sending the access password to the first user includes: and sending the access password ciphertext to the first user.
Optionally, before sending the access password ciphertext to the first user, the method further includes:
obtaining the permitted bandwidth of the first user for connecting the wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
and judging whether the bandwidth occupied by the first client connected with the wireless access point exceeds the permitted bandwidth or not, and limiting the speed of the first client when the judgment result is yes.
Optionally, before sending the access password ciphertext to the first client, the method further includes:
obtaining the allowable connection duration of the wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
and judging whether the first client is successfully connected with the first wireless access point within the allowable connection duration, and sending connection overtime information to the first client when the judgment result is negative.
To achieve the above object, a third aspect of the present application provides an electronic device comprising a memory and a processor;
the memory has stored thereon a computer program which, when executed by the processor, implements a method as provided in the first or second aspect of the application.
To achieve the above object, a fourth aspect of the present application provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method as provided in the first or second aspect of the present application.
According to the technical scheme, when a first user connects a wireless access point which belongs to a second user and is automatically managed by the second user to access a password, a friend adding request is sent to the second client through the first client, and the second user obtains the access password of the wireless access point after the friend adding request is successfully added, so that the wireless access point which belongs to the second user is connected according to the access password; in the process, on the premise of ensuring the rights and interests of the second user, the first user can be safely and conveniently connected with the network, and network sharing is realized; and the first user and the second user establish a friend relationship, which is beneficial to promoting network sharing among subsequent users.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart of a method for obtaining an access password of a wireless access point according to some embodiments of the present application;
FIG. 2 is a schematic view of a display interface of a wireless access point and a hotspot tag;
fig. 3 is a schematic view of a display interface of a friend address book of a first user;
fig. 4 is a flowchart of a method for obtaining an access password of a wireless access point according to some embodiments of the present application;
fig. 5 is a schematic structural diagram of an apparatus for obtaining an access password of a wireless access point according to some embodiments of the present application;
fig. 6 is a schematic structural diagram of an apparatus for obtaining an access password of a wireless access point according to some embodiments of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to some embodiments of the present application.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the application mainly aims at the problem that in the related technology, for wireless networks which belong to individuals and have no access password stored in a third-party networking platform, other users cannot connect the networks when the users are not permitted, and how to effectively realize the sharing of the wireless networks so as to meet the internet surfing requirements of certain users.
In order to facilitate the distinction, in the method, a user with networking requirements is called a first user, and a networking application client owned by the first user is called a first client; and the user to which the wireless access point belongs is called a second user, the second user comprises a host of the wireless network and other users who have the hotspot passwords, such as other members in a home, and the networking application client owned by the second user is called a second client. When a first user connects a wireless access point which belongs to a second user and is automatically managed by the second user to access a password, a friend adding request is sent to the second client through the first client, a friend relationship between the first user and the second user is established, and then the access password of the wireless access point is acquired to connect a wireless network; on the premise of ensuring the rights and interests of the second user, the first user can be safely and conveniently connected with the network, and network sharing is realized; and the first user and the second user establish a friend relationship, which is beneficial to promoting network sharing among subsequent users. Wherein, the meaning of "belonging" is: the second user holds a second client with a specific wireless access point, which is called as belonging to the second user, i.e. the wireless access point has an affiliation with the second user.
The following describes in detail a method, an apparatus, and a storage medium for obtaining an access password of a wireless access point, which are provided by the present application, with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for obtaining an access password of a wireless access point according to some embodiments of the present disclosure, which is applied to a first client, and as shown in fig. 1, the method for obtaining an access password of a wireless access point includes:
step 101: receiving a connection request of a first user for selecting to connect a first wireless access point, wherein the first wireless access point has an affiliation with a second user;
in some embodiments of the present application, step 101 further comprises, before:
step A1: scanning surrounding wireless access points;
step A2: sending a hot spot label inquiry request to a server according to the scanned hot spot identification of the wireless access point;
in some embodiments of the present application, a correspondence between a hotspot identification of one or more wireless access points and a hotspot tag is stored in a server. The hotspot identification includes SSID (Service Set Identifier, chinese), BSSID (basic Service Set Identifier, chinese), hotspot name, and the like. The hotspot tag is used for identifying whether the wireless access point is a hotspot which can be connected by a user establishing a friend relationship with a second user to which the wireless access point belongs; specifically, the hotspot tags may be classified, and include a hotspot tag used for identifying the wireless access point as directly connectable, that is, an access password of the wireless access point is stored in the server, and the hotspot tag is, for example, "directly connectable, free to connect"; a hotspot tag for identifying a wireless access point as password-free, e.g., "free connection"; for identifying a hotspot tag attributed to the second user and having an access password, i.e. a hotspot to which the wireless access point can connect for a user having a buddy relationship with the second user to whom it is attributed, e.g. "buddy connection".
Further, when the server receives the hot spot tag query request, the server acquires the hot spot tag from the corresponding relationship between the hot spot tag and the hot spot tag according to the hot spot tag included in the hot spot tag query request, and correspondingly sends the hot spot tag and the hot spot tag to the first client. For example, the hotspot name and the hotspot tag are correspondingly sent to the first client.
Step A3: receiving a hot spot label sent by a server;
specifically, a hotspot identification and a corresponding hotspot tag sent by the server are received.
Step A4: and correspondingly displaying the hot spot identification of the scanned wireless access point and the hot spot label to the first user.
As shown in fig. 2, the first user may further slide the display interface upward to display the hotspot identifications and hotspot tags of other scanned wireless access points, and may further click one of the wireless access points to send a connection request to the first client.
Correspondingly, step 101 may specifically be to receive a connection request of a wireless access point with a hotspot tag of "buddy connection" selected by the first user in the display interface.
Step 102: judging whether a friend relationship exists between the first user and the second user or not; and if the friend adding request does not exist, sending a friend adding request to the second user, and if the friend adding request exists, requesting an access password of the first wireless access point to the second user.
In one embodiment, the determining whether the first user and the second user have a friend relationship includes: sending a friend relation query request to a server according to the user identification of the first user and the hotspot identification of the wireless access point selected by the first user, and receiving a query result sent by the server; and determining that the friend relationship between the first user and the second user is not established according to the query result.
The server side stores a hotspot information table and a friend relation table; the hotspot information table comprises the corresponding relation between hotspot identifications of one or more wireless access points and user identifications of attributive users; the friend relation table comprises the corresponding relation of the user identification of the user with established friend relation; when the server receives the friend relation query request, searching the corresponding user identification of the second user in the hotspot information table according to the hotspot identification included in the friend relation query request; and judging whether the friend relation table contains the corresponding relation between the user identification of the second user and the user identification included in the friend relation query request or not according to the user identification of the second user, and sending a query result to the first client.
In another embodiment, the determining whether the first user and the second user have a friend relationship includes: requesting a user identification of a second user to which the first wireless access point belongs from a server; acquiring a user identifier of a second user; and judging whether the first user and the second user have a friend relationship or not according to the user identification of the first user and the acquired user identification of the second user.
The first client stores a friend relation table, the friend relation table comprises user identifications of users with established friend relations, whether the friend relation table comprises the user identifications of the second users or not is judged according to the user identifications of the second users, and a query result of whether the first users and the second users have friend relations or not is obtained.
Further, when the first client determines that the friend relationship between the first user and the second user is established according to the query result, the first client directly requests the second client for the access password of the wireless access point.
Further, before requesting an access password of the wireless access point from the second client, the method further includes: and receiving the adding success information sent by the second client.
In some embodiments of the present application, requesting an access password of the wireless access point from the second client comprises:
and sending a password obtaining request to a second client, and displaying an access password sent by the second client in a session frame of the first user and the second user.
Specifically, an address book of a first user is displayed, the first user selects a second user needing to obtain an access password from the address book, and when the second user selected by the first user is received, a password obtaining request is sent to a second client, the access password sent by the second client is received, and the access password sent by the second client is displayed in a session frame between the first user and the second user. The display interface of the address book is shown in fig. 3, each friend contact corresponds to one-key password inquiry control, and when a first user clicks one of the controls, the first client sends a password acquisition request to a corresponding second client.
Step 103: and connecting the wireless access point according to the acquired access password.
Specifically, an access password is intercepted in a session frame of a first user and a second user, and a wireless access point is connected according to the intercepted access password.
In some embodiments of the present application, connecting the wireless access point according to the intercepted access password comprises: and inputting the intercepted access password into a password input frame, and sending the access password to a system of the terminal equipment when receiving the confirmation information of the first user so as to enable the system of the terminal equipment to be connected with the wireless access point according to the access password.
In other embodiments of the present application, connecting the wireless access point according to the intercepted access password comprises: and sending the access password to the system of the terminal equipment to enable the system of the terminal equipment to be connected with the wireless access point according to the access password.
In some embodiments of the present application, the access password sent by the second client is an access password ciphertext, and step 103 further includes:
decrypting the access password ciphertext to obtain an access password plaintext;
and connecting the wireless access point according to the access password plaintext.
Further, when the access password sent by the second client is the access password ciphertext, the second user can set a connection permission duration, and when the first client is not successfully connected with the wireless access point within the connection permission duration, connection timeout information is sent to the first client; correspondingly, the method further comprises the following steps:
receiving connection overtime information sent by a second client;
clearing the displayed access password in the dialog box of the first user and the second user.
Therefore, the access password displayed in the conversation frame of the first user and the second user is emptied in time, so that the phenomenon that the second user is threatened by security due to the fact that the access password is stolen is avoided, and network security is improved.
In some embodiments of the present application, after the first client successfully connects to the wireless access point according to the access password, the method may further include: the second user is appreciated. Among them, the form of the appreciation is, for example, a gift delivery, a virtual coin appreciation, or the like.
In some embodiments of the present application, before step 101, further comprising: and receiving a registration request sent by the first user, completing the account registration of the first user and displaying a registration result.
Therefore, when the first user connects the wireless access point which belongs to the second user and the second user manages the access password by self, a friend adding request is sent to the second client through the first client, and the access password of the wireless access point is obtained to the second user after the friend adding request is successfully added, so that the wireless access point which belongs to the second user is connected according to the access password; in the process, on the premise of ensuring the rights and interests of the second user, the first user can be safely and conveniently connected with the network, and network sharing is realized; and the first user and the second user establish a friend relationship, which is beneficial to promoting network sharing among subsequent users.
Fig. 4 is a method for acquiring an access password of a wireless access point according to some embodiments of the present application, which is applied to a second client, and as shown in fig. 4, the method for acquiring an access password of a wireless access point includes:
step 201: receiving a friend adding request sent by a first client, wherein the friend adding request is sent based on a connection request of a wireless access point, and the first wireless access point has an affiliation with a second user;
specifically, when a first client receives a connection request of a wireless access point sent by a first user, a friend adding request is sent to a second client, and after a friend relationship is established between the first user and a second user, an access password of the wireless access point belonging to the second user is acquired from the second user.
Step 202: adding a first user as a friend;
specifically, the received friend adding request is displayed, and the first user is added as a friend when the addition confirmation information of the second user is received.
In some embodiments of the present application, after adding the first user as a friend, the method further includes: and sending the information of successful addition to the first client.
Step 203: receiving a password acquisition request sent by a first client to acquire an access password of a wireless access point;
in some embodiments of the present application, obtaining the access password of the wireless access point comprises: acquiring an access password input by a second user; the access password input by the second user can be acquired in the session box of the first user and the second user, and the access password input box can be displayed to acquire the access password input by the second user in the access password input box.
In further embodiments of the present application, obtaining the access password of the wireless access point comprises: and acquiring an access password of the wireless access point stored by the access terminal.
Step 204: and sending the access password to the first client so that the first client is connected with the wireless access point according to the access password.
In some embodiments of the present application, step 204 may further include, before:
judging whether the obtained access password is sent as a ciphertext or not, and encrypting the access password to obtain an access password ciphertext if the judgment result is yes;
specifically, when receiving a request for obtaining an access password, a second client displays a session frame of a first user and a second user, wherein the session frame interface comprises an option control in an access password sending mode, so that the second user can select the access password to be sent as a plaintext or a ciphertext; or when the second client receives the request for obtaining the access password, the second client displays an access password input box, and the interface of the access password input box comprises an option control in an access password sending mode, so that the second user can select the access password to be sent as a plaintext or a ciphertext. Correspondingly, the second client monitors the trigger event of the option control, judges whether the access password sending form corresponding to the monitored trigger event is ciphertext sending or not when the trigger event is monitored, and encrypts the access password to obtain the access password ciphertext when the judgment result is yes. Accordingly, step 204 includes: and sending the access password ciphertext to the first client.
In some embodiments of the present application, when the second user selects the access password to send to the first client in a ciphertext form, the second user may further set a permitted bandwidth for the first client to connect to the wireless access point; correspondingly, before sending the access password ciphertext to the first client, the method further includes: obtaining the allowable connection duration of a wireless access point;
after sending the access password ciphertext to the first client, the method further includes: and judging whether the bandwidth occupied by the first client connected with the wireless access point exceeds the allowable bandwidth or not, and limiting the speed of the first client when the judgment result is yes.
In some embodiments of the present application, when the second user selects the access password to send to the first client in a ciphertext form, the second user may further set a connection permission duration for the first client to connect to the wireless access point; correspondingly, before sending the access password ciphertext to the first client, the method further includes: obtaining the allowable connection duration of a wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
and judging whether the first client successfully connects the wireless access point within the allowable connection duration, and sending connection overtime information to the first client when the judgment result is negative.
In other embodiments of the present application, when the second user selects the access password to send to the first client in a ciphertext form, the second user may further set a permitted bandwidth and a permitted connection duration for the first client to connect to the wireless access point, and correspondingly, before sending the access password ciphertext to the first client, the method further includes: obtaining the allowable bandwidth and the allowable connection duration of a wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
step B1: judging whether the bandwidth occupied by the first client connected with the wireless access point exceeds the permitted bandwidth, if so, limiting the speed of the first client, otherwise, executing the step B2;
step B2: judging whether the time length of the first client side for connecting the wireless access point exceeds the allowable connection time length, if so, sending connection overtime information to the first client side, and ending; otherwise, return to step B1.
In some embodiments of the present application, after step 204, the method further includes: a reward from a first client is received.
In some embodiments of the present application, before step 201, the method further includes: and receiving a registration request sent by the second user, completing account registration of the second user and displaying a registration result.
Therefore, when receiving a friend adding request sent by a first client, a second client sends an access password of the wireless access point to the first client by adding the first user as a friend and receiving an access password obtaining request sent by the first client, so that the first user can be safely and conveniently connected to a network on the premise of ensuring the rights and interests of the second user, and network sharing is realized; and the second user establishes a friend relationship with the first user, which is beneficial to promoting network sharing among subsequent users.
The above is a method for obtaining an access password of a wireless access point according to an embodiment of the present application, and corresponding to the above method, the present invention further provides a network connection device, and since an implementation scheme for solving the problem of the device is similar to the above method, corresponding contents to the method part may refer to the detailed description of the above method embodiment, and are not repeated in the following. It is understood that the apparatus provided in the present application may include a unit or a module capable of performing each step of the above method examples, and the unit or the module may be implemented by hardware, software or a combination of hardware and software, and the present invention is not limited thereto. The following description is made in conjunction with fig. 5 and 6.
Fig. 5 is a schematic structural diagram of a network connection device according to some embodiments of the present application, applied to a first client, as shown in fig. 5, where the network connection device includes:
a receiving module 301, configured to receive a connection request of a wireless access point sent by a first user, where the wireless access point is a hot spot connectable to a user who establishes a friend relationship with a second user to which the wireless access point belongs;
a sending module 302, configured to send a request for adding a friend to a second client;
an obtaining module 303, configured to request an access password of the wireless access point from the second client when adding a friend successfully;
and a connection module 304, configured to connect the wireless access point according to the access password.
The sending module 302 is specifically configured to send a request for adding a friend to the second client after the determining module determines that the friend relationship between the first user and the second user is not established.
In some embodiments of the present application, the method further includes a determining module, specifically configured to:
sending a friend relation query request to a server according to the user identification of the first user and the hotspot identification of the wireless access points, wherein the server stores the corresponding relation between the hotspot identifications of one or more wireless access points and the user identification of the home user and the corresponding relation between the user identifications of the users with established friend relations;
receiving a query result sent by a server;
and determining that the friend relationship between the first user and the second user is not established according to the query result.
The determining module may be further configured to:
requesting a user identification of a second user to which the first wireless access point belongs from a server; acquiring a user identifier of a second user; and judging whether the first user and the second user have a friend relationship or not according to the user identification of the first user and the acquired user identification of the second user. The first client stores a friend relation table, the friend relation table comprises user identifications of users with established friend relations, whether the friend relation table comprises the user identifications of the second users or not is judged according to the user identifications of the second users, and a query result of whether the first users and the second users have friend relations or not is obtained.
In some embodiments of the present application, the obtaining module 303 is specifically configured to:
sending a password obtaining request to a second client;
and displaying the access password sent by the second client in a session box of the first user and the second user.
In some embodiments of the present application, the connection module 304 is specifically configured to:
intercepting an access password in a session box of a first user and a second user;
and connecting the wireless access point according to the intercepted access password.
In some embodiments of the present application, the access password is an access password ciphertext, and the connection module 304 is further configured to:
decrypting the access password ciphertext to obtain an access password plaintext;
and connecting the wireless access point according to the access password plaintext.
In some embodiments of the present application, the receiving module 301 is further configured to: receiving connection overtime information sent by a second client;
the device still includes: and a clearing module, configured to clear the access password in the session box when the receiving module 301 receives the connection timeout information sent by the second client.
In some embodiments of the present application, the apparatus further comprises: a scanning module and a display module;
a scanning module, configured to scan surrounding wireless access points before the receiving module 301 receives a connection request of a wireless access point sent by a first user;
the sending module 302 is further configured to send a hot spot tag query request to the server according to the hot spot identifier of the scanned wireless access point, where the hot spot tag is used to identify whether the wireless access point is a hot spot connectable to the user who establishes a friend relationship with the second user to which the wireless access point belongs;
the receiving module 301 is further configured to receive a hotspot tag sent by a server;
and the display module is also used for correspondingly displaying the hot spot identification of the scanned wireless access point and the hot spot label.
In some embodiments of the present application, the apparatus further comprises:
and a reward module for rewarding the second user after the connection module 304 successfully connects to the wireless access point.
Fig. 6 is a schematic structural diagram of a network connection device according to some embodiments of the present application, applied to a second client, as shown in fig. 6, where the network connection device includes:
a receiving module 401, configured to receive a friend adding request sent by a first client, where the friend adding request is sent based on a connection request of a wireless access point, and the first wireless access point has an affiliation with a second user;
an adding module 402, configured to add the first user as a friend;
the receiving module 401 is further configured to receive a password obtaining request sent by a first client;
an obtaining module 403, configured to obtain an access password of the wireless access point;
a sending module 404, configured to send the access password to the first client, so that the first client connects to the wireless access point according to the access password.
In some embodiments of the present application, the adding module 402 is specifically configured to:
and displaying a friend adding request, and adding the first user as a friend when receiving the addition confirmation information of the second user.
In some embodiments of the present application, the apparatus further comprises:
the first judgment module is used for judging whether the access password is sent as a ciphertext;
the encryption module is used for encrypting the access password to obtain an access password ciphertext when the judgment result of the judgment module is yes;
correspondingly, the sending module 404 is specifically configured to send the access password ciphertext to the first client.
In some embodiments of the present application, the obtaining module 403 is further configured to obtain a permitted bandwidth of the first client connecting to the wireless access point;
the device still includes:
the second judgment module is used for judging whether the bandwidth occupied by the first client side connected with the wireless access point exceeds the allowable bandwidth or not;
and the speed limiting module is used for limiting the speed of the first client when the judgment result of the second judgment module is yes.
In some embodiments of the present application, the obtaining module 403 is further configured to obtain a connection permission duration of the wireless access point;
the device still includes:
the third judging module is used for judging whether the first client side is successfully connected with the wireless access point within the allowable connection duration;
the sending module 404 is further configured to send connection timeout information to the first client if the determination result of the third determining module is negative.
In some embodiments of the present application, the receiving module 401 is further configured to receive the reward from the first client after the sending module 404 sends the access password to the first client.
The network connection device provided by the embodiment of the present application has the same effect as the method for acquiring the access password of the wireless access point provided by the foregoing embodiment, in view of the same inventive concept.
The embodiment of the present application further provides an electronic device corresponding to the method for acquiring an access password of a wireless access point provided in the foregoing embodiment, where the electronic device may be an electronic device for a client, such as a mobile phone, a notebook computer, a tablet computer, a desktop computer, and the like, so as to execute the method for acquiring an access password of a wireless access point.
Fig. 7 is a schematic view of an electronic device according to some embodiments of the present application, and as shown in fig. 7, the electronic device includes: memory 501, processor 502, bus 503, and communication interface 504;
the memory 501, the processor 502 and the communication interface 504 are connected by a bus 503; the memory 501 stores a computer program that can be executed on the processor 502, and when the computer program is executed by the processor 502, the method for acquiring a wireless access point access password applied to a first client or the method for acquiring a wireless access point access password applied to a second client, which are provided by any of the foregoing embodiments, is implemented.
Further, the Memory 501 may include a high-speed Random Access Memory (RAM), and may also include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The processor 502 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 502. The Processor 502 may also be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components.
The bus 503 may be an ISA (English: Industry Standard Architecture; Chinese: Industry Standard Architecture) bus, a PCI (English: Peripheral Component Interconnect; Chinese: Peripheral Component Interconnect) bus, an EISA (English: Extended Industry Standard Architecture; Chinese: Extended Industry Standard Architecture) bus, or the like.
The electronic device provided by the embodiment of the application and the method for acquiring the access password of the wireless access point provided by the embodiment of the application have the same inventive concept and have the same beneficial effects as the method adopted, operated or realized by the electronic device.
The present application further provides a computer readable medium corresponding to the method for acquiring a wireless access point access password provided in the foregoing embodiments, and a computer program (i.e., a program product) is stored on the computer readable medium, and when the computer program is executed by a processor, the computer program implements the method for acquiring a wireless access point access password applied to a first client or the method for acquiring a wireless access point access password applied to a second client, provided in any of the foregoing embodiments.
The computer-readable storage medium includes, but is not limited to, a phase change memory (PRAM), a Static Random Access Memory (SRAM), a Dynamic Random Access Memory (DRAM), other types of Random Access Memories (RAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a flash memory, or other optical and magnetic storage media, which are not described in detail herein.
The computer-readable storage medium provided by the embodiment of the present application and the method for obtaining the access password of the wireless access point provided by the embodiment of the present application have the same beneficial effects as the method adopted, operated or implemented by the application program stored in the computer-readable storage medium.
It should be noted that:
in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only for the preferred embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered within the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. A method for obtaining an access password of a wireless access point is applied to a first client, and a first user logs in the first client, and the method comprises the following steps:
receiving a connection request of a first user for selecting to connect a first wireless access point, wherein the first wireless access point has an affiliation with a second user;
judging whether a friend relationship exists between the first user and the second user or not;
if the friend adding request does not exist, sending a friend adding request to the second user, and if the friend adding request exists, requesting an access password of the first wireless access point to the second user;
the method further comprises the following steps: receiving an access password of the first wireless access point sent by the second user, and connecting the first wireless access point according to the access password;
wherein, the judging whether the first user and the second user have a friend relationship includes:
sending a friend relation query request to a server according to the user identification of the first user and the hotspot identification of the first wireless access point, wherein the server stores the corresponding relation between the hotspot identifications of one or more wireless access points and the user identification of the home user and the corresponding relation between the user identifications of the users with established friend relation;
receiving a query result sent by the server;
and judging whether the first user and the second user have a friend relationship according to the query result.
2. The method of claim 1, wherein determining whether the first user has a friend relationship with the second user comprises:
requesting a user identification of the second user from a server;
acquiring a user identifier of the second user;
and judging whether the first user and the second user have a friend relationship or not according to the user identification of the second user.
3. The method of claim 1 or 2, wherein the requesting the second user for the access password of the first wireless access point comprises:
sending a password obtaining request to a second client;
and displaying the access password sent by the second client in a session frame of the first user and the second user.
4. The method of claim 3, wherein said connecting the first wireless access point according to the access password comprises:
identifying the access password in the session box;
and connecting the first wireless access point according to the identified access password.
5. The method of claim 3, wherein the access password is an access password cryptogram, and wherein the connecting the first wireless access point according to the access password comprises:
decrypting the access password ciphertext to obtain an access password plaintext;
and connecting the first wireless access point according to the access password plaintext.
6. The method of claim 3, wherein prior to receiving the connection request from the first user to select the first wireless access point, further comprising:
scanning surrounding wireless access points;
sending a hotspot tag inquiry request to a server according to the hotspot identification of the scanned wireless access point, wherein the hotspot tag is used for identifying whether the wireless access point is an access point which can be connected with a user establishing a friend relationship with a second user to which the wireless access point belongs;
receiving a hotspot tag sent by the server;
and correspondingly displaying the hot spot identification of the scanned wireless access point and the hot spot label.
7. A method for sending a wireless access point access password, applied to a second client, includes:
receiving a friend adding request sent by a first client, wherein the friend adding request is sent based on a connection request of a first wireless access point, and the first wireless access point has an affiliation with a second user logged on a second client;
adding a first user as a friend;
receiving a password obtaining request sent by the first user, and obtaining an access password of the first wireless access point;
and sending the access password to the first user.
8. The method of claim 7, wherein adding the first user as a friend comprises:
and displaying the friend adding request, and adding the first user as a friend when receiving the addition confirmation information of the second user.
9. The method of claim 8, wherein prior to sending the access password to the first user, further comprising:
judging whether the access password is sent as a ciphertext or not, and encrypting the access password to obtain an access password ciphertext if the judgment result is yes;
the sending the access password to the first user includes: and sending the access password ciphertext to the first user.
10. The method of claim 9, wherein prior to sending the access password ciphertext to the first user, further comprising:
obtaining the permitted bandwidth of the first user for connecting the wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
and judging whether the bandwidth occupied by the first client connected with the wireless access point exceeds the permitted bandwidth or not, and limiting the speed of the first client when the judgment result is yes.
11. The method of claim 9 or 10, wherein before sending the access password ciphertext to the first client, the method further comprises:
obtaining the allowable connection duration of the wireless access point;
after sending the access password ciphertext to the first client, the method further includes:
and judging whether the first client is successfully connected with the first wireless access point within the allowable connection duration, and sending connection overtime information to the first client when the judgment result is negative.
12. An electronic device comprising a memory and a processor;
the memory has stored thereon a computer program which, when executed by the processor, implements the method of any of claims 1-6 or 7-11.
13. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6 or 9-11.
CN201910436350.5A 2019-05-23 2019-05-23 Method, equipment and storage medium for acquiring access password of wireless access point Active CN110167027B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910436350.5A CN110167027B (en) 2019-05-23 2019-05-23 Method, equipment and storage medium for acquiring access password of wireless access point

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910436350.5A CN110167027B (en) 2019-05-23 2019-05-23 Method, equipment and storage medium for acquiring access password of wireless access point

Publications (2)

Publication Number Publication Date
CN110167027A CN110167027A (en) 2019-08-23
CN110167027B true CN110167027B (en) 2022-04-05

Family

ID=67632429

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910436350.5A Active CN110167027B (en) 2019-05-23 2019-05-23 Method, equipment and storage medium for acquiring access password of wireless access point

Country Status (1)

Country Link
CN (1) CN110167027B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112351424B (en) * 2020-07-28 2024-03-12 深圳Tcl新技术有限公司 Wireless networking management method, system, device and computer readable storage medium
CN111901445A (en) * 2020-09-08 2020-11-06 上海连尚网络科技有限公司 Method and equipment for inquiring password of wireless access point

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401884A (en) * 2013-08-16 2013-11-20 深信服网络科技(深圳)有限公司 Authentication method and system for public wireless environment Internet access based on micro message
CN105307169A (en) * 2015-09-18 2016-02-03 腾讯科技(深圳)有限公司 Access method, device and system for guest network
CN106559787A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 Method for network access, apparatus and system
CN108156647A (en) * 2017-12-19 2018-06-12 北京小米移动软件有限公司 Password acquisition methods and device
CN108934009A (en) * 2017-05-27 2018-12-04 华为技术有限公司 A kind of WiFi network cut-in method, apparatus and system
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401884A (en) * 2013-08-16 2013-11-20 深信服网络科技(深圳)有限公司 Authentication method and system for public wireless environment Internet access based on micro message
CN105307169A (en) * 2015-09-18 2016-02-03 腾讯科技(深圳)有限公司 Access method, device and system for guest network
CN106559787A (en) * 2015-09-30 2017-04-05 腾讯科技(深圳)有限公司 Method for network access, apparatus and system
CN108934009A (en) * 2017-05-27 2018-12-04 华为技术有限公司 A kind of WiFi network cut-in method, apparatus and system
CN109756915A (en) * 2017-11-03 2019-05-14 阿里巴巴集团控股有限公司 A kind of wireless network management method and system
CN108156647A (en) * 2017-12-19 2018-06-12 北京小米移动软件有限公司 Password acquisition methods and device

Also Published As

Publication number Publication date
CN110167027A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
US10063547B2 (en) Authorization authentication method and apparatus
US8787947B2 (en) Application discovery on mobile devices
WO2017000830A1 (en) Cross-terminal login-free method and device
CN107395903B (en) Communication method, data processing platform and communication system
CN105682015A (en) Method and device for establishing wireless connection
CN102821104A (en) Authorization method, authorization device and authorization system
US11172520B2 (en) Connection method and device
US11146519B1 (en) Techniques for multi-agent messaging
KR20110132392A (en) User challenge using information based on geography or user identity
US11166252B2 (en) Registration of devices for use of one or more services
CN110167027B (en) Method, equipment and storage medium for acquiring access password of wireless access point
CN105141789B (en) Unknown phone number labeling method and device
JP2008242989A (en) Invitational membership service providing system and guest duplicate registration authentication method
CN108809969B (en) Authentication method, system and device
CN104980420A (en) Business processing method, device, terminal and server
US8621581B2 (en) Protecting authentication information of user applications when access to a users email account is compromised
US10432740B2 (en) Method and apparatus for accessing OTT application and pushing message by server
CN113946739A (en) Sensitive data query method, device, equipment and storage medium
CN106936686A (en) A kind of immediate communication platform for supporting safety moving to handle official business
JP6972417B2 (en) Mobile devices, systems, access methods, and programs
CN106102063B (en) Wireless network authorization method, device and system
US8966588B1 (en) Systems and methods of establishing a secure connection between a remote platform and a base station device
KR20110068058A (en) Method and system for web service sso using user session information of usi system
US20100180323A1 (en) Stateful server based social networking using mobile devices
US20070067619A1 (en) Authentication apparatus, authentication method, recording medium storing authentication program and computer data signal embodied in carrier wave

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210422

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 201306, N2025 building, 24 building, Xincheng Road, 2 mud town, Shanghai, Pudong New Area

Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant