CN110401944B - Network connection method, server and mobile terminal - Google Patents

Network connection method, server and mobile terminal Download PDF

Info

Publication number
CN110401944B
CN110401944B CN201910429616.3A CN201910429616A CN110401944B CN 110401944 B CN110401944 B CN 110401944B CN 201910429616 A CN201910429616 A CN 201910429616A CN 110401944 B CN110401944 B CN 110401944B
Authority
CN
China
Prior art keywords
password
network
data
network connection
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910429616.3A
Other languages
Chinese (zh)
Other versions
CN110401944A (en
Inventor
钟豪
丁海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910429616.3A priority Critical patent/CN110401944B/en
Publication of CN110401944A publication Critical patent/CN110401944A/en
Application granted granted Critical
Publication of CN110401944B publication Critical patent/CN110401944B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/086Access security using security domains
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/80Arrangements enabling lawful interception [LI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention relates to a network connection method, a server and a mobile terminal, which are characterized in that password data to be identified are obtained; performing safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified; determining a reference network connection password for the target network based on the security password data; and sending the reference network connection password of the target network to the mobile terminal so that the mobile terminal establishes connection with the target network based on the network connection password, and giving a prompt for setting a safe wireless network password to a user through big data modeling operation, thereby effectively preventing the loss of the user caused by brute force cracking.

Description

Network connection method, server and mobile terminal
Technical Field
The present disclosure relates to the field of network security technologies, and in particular, to a network connection method, a server, and a mobile terminal.
Background
With the popularization of networks and various electronic devices, more and more users surf the internet through the electronic devices, and various network security problems are brought along therewith, such as the problem that the network quality of the users is reduced due to the fact that networking passwords are cracked.
In the prior art, the network security of the user can be ensured by the following methods: (1) checking whether the network of the user is a phishing wireless network; (2) checking whether the network of the user is a counterfeit and forged public wireless network; (3) checking whether the network of the user can automatically jump to a phishing website; (4) sending a prompt to the user whether the periphery is risky wireless network; (5) the number of connected persons of the current network is checked. Therefore, the existing security strategies do not relate to solving the problem of violent network rubbing.
In view of violence rubbing the net and probably obtaining user's privacy, reduce network experience, destroy the peripheral safety of wireless network, current scheme does not provide the effective measure to preventing violence rubbing the net. Therefore, it is desirable to provide a network connection scheme that prevents brute force from breaking the network connection password.
Disclosure of Invention
The disclosure provides a network connection method, a server and a mobile terminal, which can greatly improve the security of a wireless network. The disclosure is realized by the following technical scheme:
in one aspect, the present disclosure provides a network connection method, including:
acquiring password data to be identified;
performing safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified;
determining a reference network connection password for the target network based on the security password data;
sending the reference network connection password of the target network to a mobile terminal so that the mobile terminal establishes connection with the target network based on the network connection password;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
In another aspect, the present disclosure provides a network connection server comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by the processor to implement the method of network connection as described above.
In another aspect, the present disclosure provides a network connection method, including:
responding to a network connection password request instruction triggered by a user, and sending a network connection password acquisition request to a server, wherein the network connection password request instruction comprises a network connection password of a target network;
receiving a reference network connection password of the target network, which is sent by the server, wherein the reference network connection password is a network connection password determined by security password data in the password data to be identified, which is obtained by the server through performing security password identification on the acquired password data to be identified based on a security password identification model;
determining a network connection password of a target network based on the reference network connection password;
establishing a connection with the target network based on the network connection password of the target network;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
In another aspect, the present disclosure provides a network-connected mobile terminal comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by the processor to implement the network-connected method as described above.
In another aspect, the present disclosure provides a network connection method, including:
the server acquires password data to be identified;
the server carries out safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified;
the server determines a reference network connection password of the target network based on the security password data;
the server sends the reference network connection password of the target network to the mobile terminal;
the mobile terminal determines a network connection password of a target network based on the reference network connection password;
the mobile terminal establishes connection with the target network based on the network connection password of the target network;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
The invention provides a network connection method, a server and a mobile terminal, which are characterized in that security password identification is carried out on acquired password data to be identified through a security password identification model to obtain security password data in the password data to be identified, and a network connection password of a target network is determined based on the security password data, so that the network connection password is utilized to establish connection with the target network. According to the method and the device, the safety password is obtained through big data modeling operation, and the prompt for setting the safety wireless network password is provided for the user based on the safety password, so that the user can conveniently and safely connect the network, and the loss of the network safety problem to the user is effectively reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions and advantages of the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic view of an actual application scenario of a network connection method according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a network connection method according to an embodiment of the present invention;
fig. 3 is a flowchart illustrating another network connection method according to an embodiment of the present invention;
fig. 4 is a flowchart illustrating a method for hiding a wireless network according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a method for setting up a wireless network according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a method for sharing a wireless network according to an embodiment of the present invention;
fig. 7 is a flowchart illustrating a method for automatically performing network connection according to an embodiment of the present invention;
fig. 8 is a flowchart of an operation of turning on a "network with violence prevention" by a terminal according to an embodiment of the present invention;
fig. 9 is a flowchart illustrating an operation of a terminal automatically connecting to a network according to an embodiment of the present invention;
FIG. 10 is a schematic diagram of a user interface for reminding of security password settings according to an embodiment of the present invention;
FIG. 11 is a schematic view of a user interface for entering a "safe health check-up" page according to an embodiment of the present invention;
fig. 12 is a schematic view of a user interface for activating a violent-defense network-rubbing function according to an embodiment of the present invention;
fig. 13 is a schematic diagram of a user interface for selecting a hidden wireless network according to an embodiment of the present invention;
fig. 14 is a flowchart illustrating a method for network connection from the perspective of a terminal according to an embodiment of the present invention;
fig. 15 is a flowchart illustrating a method for network connection from the perspective of an overall system according to an embodiment of the present invention;
fig. 16 is a schematic structural diagram of a network connection device according to an embodiment of the present invention;
fig. 17 is a schematic structural diagram of another network connection device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The following describes the method of networking of the present invention, and the present specification provides the method steps as described in the examples or flowcharts, but may include more or less steps based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the system or server product may be implemented in a sequential or parallel manner (e.g., parallel processor or multi-threaded environment) according to the embodiments or methods shown in the figures.
Fig. 1 is a schematic view of an actual application scenario of the network connection method according to the embodiment of the present invention, as shown in fig. 1, the application scenario includes a cloud 01, a user side 02, a wireless router 03, and a violent network-gramming end 04.
Specifically, the cloud 01 may operate through a server, and the server may be controlled by a terminal connected to the server, and may include an independently operating server, or a distributed server, or a server cluster including a plurality of servers. The cloud 01 may include a network communication unit, a processor, a memory, and the like.
Specifically, the user terminal 02 is a device capable of connecting to a wireless network, and may include: the physical devices may also include software running in the physical devices, such as applications, and the like. The user terminal 02 may be a mobile terminal of a mobile user.
Specifically, the wireless router 03 may be regarded as a repeater, and broadcasts a broadband network signal received from a wall of a home to a user terminal within a preset range through an antenna. The current wireless router on the market can only support the simultaneous online use of less than 15-20 devices. The signal range of a general wireless router is 50 meters in radius, and the signal range of some wireless routers reaches 300 meters in radius.
Specifically, the violence setoff network 04 is a user end that needs to be intercepted, because the violence setoff network 04 is not connected to the network through a line provided by a regular internet Service provider isp (internet Service provider). Violence grabs net end 04 also for the equipment that can connect wireless network, can include: the physical devices may also include software running in the physical devices, such as applications, and the like. The network violence rubbing end 04 can be a mobile terminal of a network violence rubbing user, hereinafter referred to as "other user end".
The specific work flow comprises the following steps:
1. the big data center collects password samples, performs characteristic analysis, establishes a WiFi password classification model, continuously trains the model through deep learning, and outputs the model to identify the WiFi password security; and simultaneously outputting the safe WiFi passwords to each terminal. And the big data center feeds back a closed loop to continuously correct the model according to the terminal password sample.
2. The terminal prompts a safety identification result according to the model; recommending a security password to the user when the weak password is identified,
3. the terminal provides and closes the wiFi broadcast function, reaches the purpose that intercepts violence and explains and rub the net through keeping apart peripheral security threat.
The user may set the router to a hidden state, i.e. turn off the broadcast function of the router. Before setting the router, the user end needs to log in a network control server (not shown in the figure) through '192.168.1.1' to save the setting authority of the user and set a button for hiding the router to be closed.
4. The terminal provides a hidden WiFi list management function, so that a legal user can freely surf the internet.
Fig. 2 is a schematic flow chart of a network connection method provided in an embodiment of the present invention, as shown in fig. 2, the method is a method for a user side to interact with a server and a network control server, and specifically includes:
s201: the server acquires password data to be identified.
In the embodiment of the present specification, the password data to be recognized is mass password data acquired by a cloud, and the mass password data may be used by a user in a network, or may be generated by software through a password generation algorithm and is not used in the network.
S203: and the server performs safe password identification on the password data to be identified based on a safe password identification model to obtain the safe password data in the password data to be identified.
Specifically, the establishing method of the secure password identification model includes:
(1) and acquiring password training data, wherein the password training data comprises password information of different security levels, and the password information of different security levels is marked with different password security level identifications. Specifically, different levels of cryptographic security may be divided into secure cryptographic information and non-secure cryptographic information. The safety password information is used for indicating that the password is not cracked violently, and the non-safety password information is used for indicating that the password is cracked violently. Different password security levels can also be divided into low, medium and high security levels, and the specific classification can be set according to actual needs.
When the training data is password data used by a user in the network, the safe password information is used for identifying that the password is not cracked by a violent network-rubbing end in the network, and the non-safe password information is used for identifying that the password is cracked by the violent network-rubbing end in the network; when the training data is generated by software through a password generation algorithm and password data which is not used in a network, the safe password identification is used for identifying that the password is not cracked by the violence network-rubbing end simulated by the software, and the non-safe password identification is used for identifying that the password is cracked by the violence network-rubbing end simulated by the software.
In some embodiments of the present specification, the obtaining of the password training data may be receiving first password data reported by the mobile terminal; or collecting password sample data from the Internet; screening the password sample data by using a preset security rule to obtain second password data; and finally, acquiring password training data based on the first password data and/or the second password data. The password sample data collected from the internet may be, for example, password sample data acquired from a third-party search website, and the security rule may be specifically set by a technical expert, for example, the preset security rule specifies that the number of bits is greater than or equal to 8 bits, and the password sample data composed of a character string, letters, and numbers is secure password data.
In some embodiments, obtaining the cipher training data based on the first cipher data and/or the second cipher data may specifically include: preprocessing the first password data and/or the second password data to obtain first preprocessed password data and/or second preprocessed password data; classifying the first preprocessed password data and/or the second preprocessed password data according to password security levels to obtain first classified password data and/or second classified password data with different password security levels; and marking the password security level of the first classified password data and/or the second classified password data to obtain password training data.
(2) And training a preset machine learning model based on the password training data to obtain a safe password identification model.
Specifically, password training data marked with different password security level identifications are input into a preset machine learning model for training to obtain a password identification model capable of identifying passwords with different security levels. The machine learning model includes, but is not limited to, a decision tree, a random forest, a logistic regression, and other machine learning models. The pre-set machine learning model may be automatically selected according to a tool, such as CoreML provided by apple inc.
In some embodiments, the testing password sample data may be used to evaluate the quality of the preset machine learning model, which may specifically include the following steps: inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used; obtaining test password sample data; inputting the test password sample data into the to-be-used security password identification model for training to obtain a test result; evaluating the quality of the to-be-used secure password identification model based on the test result; when the quality evaluation passes, using the to-be-used safety password identification model as the safety password identification model; and when the quality evaluation is not passed, adjusting model parameters in the to-be-used security password recognition model, and retraining the to-be-used security password recognition model until the quality evaluation is passed. The obtaining mode of the test password sample data can be consistent with the obtaining mode of the training data.
In the embodiments of the present specification, the password training data may be updated according to a preset period, and after desensitization processing is performed on the updated password training data, a secure password identification model is obtained by retraining, so that security of network connection may be further ensured. The preset period can be set according to actual needs, for example, set to be one week, one month, and the like. Generally, the shorter the update period (preset period), the higher the accuracy of the training data, and correspondingly, the more accurately and effectively the non-secure password can be recognized by the trained secure password recognition model, so that the security of network connection can be improved; the longer the period of updating, the larger the amount of training data, and the more resources the data processing occupies.
S205: the server determines a reference network connection password for the target network based on the security password data.
The determination mode of the reference network connection password comprises the following steps: the server acquires password data to be identified; the server carries out safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified; the server determines a reference network connection password for the target network based on the security password data.
S207: the mobile terminal responds to a network connection password request instruction triggered by a user and sends a network connection password acquisition request to the server, wherein the network connection password request instruction comprises a network connection password of a target network. The network connection password request instruction comprises: the method comprises the steps that an instruction triggered by a first operation of a violent network rubbing prevention operation area of a preset interface or an instruction triggered by a second operation of preset push information is used for indicating whether the safety of a network connection password of a target network needs to be confirmed or not. The first operation and the second operation may include, but are not limited to, single click, double click, left click, right click, slide, and the like.
S209: the server sends the reference network connection password of the target network to the mobile terminal; and the reference network connection password is a network connection password determined by the security password data in the password data to be identified, which is obtained by the server through security password identification on the acquired password data to be identified based on a security password identification model.
Specifically, when the server judges that the network connection password of the target network is the non-secure password information, the server sends the reference network connection password of the target network to the mobile terminal. S211: and the mobile terminal determines the network connection password of the target network based on the reference network connection password.
Specifically, the network connection password of the target network is determined according to the reference security password data, which may be directly used as the network connection password of the target network; or generating new security password data according to the reference security password data, and then using the new security password data as a network connection password of the target network. Wherein, new security cipher data is generated according to the reference security cipher data, and the new security cipher data can be generated according to the digit number, cipher composition (for example, composed of letters, numbers and special characters), cipher sorting mode, etc. of the security cipher data.
S213: and the mobile terminal establishes connection with the target network based on the network connection password of the target network.
Further, after determining the network connection password of the target network according to the security password data, the method described in this specification further includes: the network connection password is stored locally, so that the trouble of manually inputting the password again when the user connects to the network next time or later is reduced.
According to the network connection method provided by the embodiment of the specification, a brute force cracking scheme is avoided through big data modeling operation, a prompt for setting a security wireless network password is given to a user, and security password data are automatically stored, so that the security of network connection is greatly improved, and the user experience is also improved.
S215: the mobile terminal obtains a list of accessible networks within a preset range.
In the step, the accessible network is an accessible wireless network, and since the WiFi or the hotspot in the prior art both propagate wireless signals in a broadcasting manner, the user terminal can access the WiFi or the hotspot connection network through the wireless signals, and therefore, the user terminal can acquire information of one or more accessible wireless networks nearby through searching. The preset range refers to the signal range of a wireless network, and the signal range of the current wireless network is approximately a range of 50-300 meters in radius.
S217: the mobile terminal selects a target network in the list.
Specifically, the user selects a target network from a list of accessible networks at the user end.
S219: the mobile terminal sends a hidden state setting request of a target network to the network control server.
Specifically, in response to an instruction for setting a target network to be in a hidden state by a user, a hidden state setting request of the target network is sent to a network control server, where the hidden state setting request carries operation permission information of a requester.
When a user does not want a target network to be discovered by other user terminals and tries to brute force to crack the target network, a hidden state setting request can be sent to the target network through the user terminal or the display terminal of the wireless network.
The hidden state setting request carries operation authority information of a requester.
When a user operates the state of the wireless network, the user is required to have related rights. In this embodiment of the present specification, the operation authority information of the requester may be information such as an account number and an ID of a user who sends a wireless network setting request.
The user side of the requesting party can register information such as an account number or an ID to the wireless network in advance, and if the operation authority information is the information registered in advance, the user is determined to have the operation authority.
In the scheme of the embodiment of the specification, the threat of the surrounding environment of the wireless network to the user information security is considered, and the WiFi is closed or the hot spot broadcasting is prohibited through the router management setting, so that an isolated security environment is created for the user. The target network is set to be in a hidden state, so that the target network is not discovered by other user sides, other users are prevented from attempting to crack the connection password of the target network in a brute force cracking mode, and the safety of network connection is improved from the source.
S221: the network control server determines the operation authority of the user according to the operation authority information; and when the operation authority of the user is allowed to set a hidden state, the network control server sets the target network to be in the hidden state.
S223: and the network control server returns a response message of successful hidden state setting to the mobile terminal.
Fig. 3 is a schematic flowchart of a network connection method provided in an embodiment of the present invention, and as shown in fig. 3, the method may be applied to a server, and specifically includes:
s301: password data to be identified is acquired.
S303: and carrying out safe password identification on the password data based on a safe password identification model to obtain the safe password data in the password data to be identified.
S305: a reference network connection password for the target network is determined based on the security password data.
S307: and sending the reference network connection password of the target network to a mobile terminal so that the mobile terminal establishes connection with the target network based on the network connection password.
The present disclosure provides a network connection server comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by the processor to implement a method of network connection as described above.
Fig. 4 is a schematic flowchart of another network connection method provided in an embodiment of the present invention, and as shown in fig. 4, the method may be applied to a user side, and specifically includes:
s401: responding to a network connection password request instruction triggered by a user, and sending a network connection password acquisition request to a server, wherein the network connection password request instruction comprises a network connection password of a target network;
s403: receiving a reference network connection password of the target network sent by a server; and the reference network connection password is a network connection password determined by the security password data in the password data to be identified, which is obtained by the server through security password identification on the acquired password data to be identified based on a security password identification model.
S405: determining a network connection password for the target network based on the reference network connection password.
S407: establishing a connection with the target network based on the network connection password of the target network.
Fig. 5 is a flowchart illustrating a method for hiding a wireless network according to an embodiment of the present invention, as shown in fig. 5, specifically including:
s501: and acquiring a list of accessible networks in a preset range.
S503: a target network is selected in the list.
S505: and sending a hidden state setting request of the target network to a network control server.
The present disclosure provides a network-connected mobile terminal comprising a processor and a memory, wherein the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by the processor to implement the network-connected method as described above.
Fig. 6 is a flowchart illustrating a method for sharing a wireless network according to an embodiment of the present invention, as shown in fig. 6, specifically including:
after step S505, the method further includes:
s601: responding to a sharing instruction of the target network, and acquiring connection information of the target network, wherein the connection information comprises: information of a service set identifier of the target network, a unique identifier of the target network, and a network connection password of the target network.
The wireless network is hidden, and other clients cannot actively discover the existence of the wireless network and connect to the wireless network. And the client side or the client side of the wireless network responds to the sharing instruction of the target network triggered by the user to acquire the connection information of the target network, so that the information of the target network can be shared to the object to be shared.
S603: and sending the connection information to an object to be shared so that the object to be shared is automatically connected with the target network according to the connection information.
And the object to be shared can be connected with the target network through the connection information of the target network after acquiring the information of the wireless network in the hidden state.
Specifically, the connection information may be packaged in a two-dimensional code or other communication module and shared with the object to be shared, and the object to be shared obtains the connection information from the two-dimensional code or other communication module by recognizing and reading the two-dimensional code or other communication module. Wherein the other communication module may comprise iBeacon equipped with bluetooth low energy communication functionality.
The method in the embodiment of the present description may be used in a wireless local area network environment, and particularly, may be used to set a home WiFi automatic connection function, so that limited users may safely surf the internet, and other users may find and connect to the wireless network only by obtaining connection information of a hidden network as an object to be shared. In the prior art, the sharing user needs to respectively inform the account number and the password to the object to be shared, the object to be shared finds the account number of the wireless network again, and the user can input the password manually to connect the wireless network. Therefore, the scheme of the specification improves the convenience of other users for connecting the network while ensuring the network connection safety.
Fig. 7 is a schematic flowchart of a method for automatically performing network connection according to an embodiment of the present invention, and as shown in fig. 7, the method specifically includes:
s701: and acquiring the service set identification of the target network.
Specifically, the mobile terminal obtains a service set identifier of the target network, where the service set identifier may be an account name of the target network.
S703: and determining the service set of the target network according to the service set identification of the target network.
The wireless network corresponding to the service set identification of the target network is a subset of the service set of the target network, and therefore, the service set of the target network can be determined according to the service set identification of the target network.
S705: and sending a connection request with the target network to a service set of the target network, wherein the connection request carries the unique identifier and the network connection password of the target network, so that the service set establishes connection with the target network based on the unique identifier and the network connection password.
The service set of the target network may control each wireless network in its service set according to the connection request.
The network connection password in this step is already stored locally before step S701, so that an automatic connection with the target network can be established through the service set identifier, the unique identifier, and the network connection password of the target network.
The network connection scheme of the embodiment of the present specification is further described below by taking an application scenario as an example to solve the environmental security problem of violence catching up with a WiFi user at home, the terminal starts the "violence catching up with a network" operation flow chart as shown in fig. 8, and before "start", the terminal logs in preset application software.
(1) And the application software of the terminal receives the safety password recommendation push (push).
The server periodically evaluates the security of the WiFi passwords and pushes an updating instruction to the terminal equipment every month.
And after the terminal receives the updating instruction or when the user actively clicks a related entrance of the 'violence prevention network rubbing' interface, pulling the safety password to the background and pushing the safety password to the foreground.
(2) And the user selects to directly accept the pushed password as the WiFi password or the password modified based on the pushed password as the WiFi password.
(3) The user autonomously enters the WiFi security experience interface.
(4) The user clicks the virtual key for preventing violence and rubbing the network.
The user clicks an interface to prevent violence from catching up with the network, and can select and input a WiFi password to facilitate subsequent automatic connection; and simultaneously, the encryption is stored to a hidden WiFi list at the terminal.
The terminal sends a setting instruction to the router and modifies the router setting.
(5) The terminal application software judges whether the WiFi password is stored, if yes, the WiFi password and the WiFi password are stored in an encrypted manner; and if not, encrypting and storing the WiFi.
The next time the user needs to connect to the network via WiFi, the flow chart is shown in fig. 9.
(1) WiFi is selected from the hidden WiFi list.
And the user clicks automatic internet access and selects the hidden WiFi from the hidden WiFi list.
(2) Judging whether the WiFi password is stored locally or not, and if so, automatically connecting WiFi; if not, automatically connecting WiFi after a WiFi password is input in the popped password input window.
When a user enters a WiFi security physical examination interface, a recommended item for preventing violence and getting online can be seen; or the personalized push reminds the user of the guiding operation page of the item, and the user can conveniently realize safe internet surfing according to the guidance of the recommended item or the guiding operation page.
The specific interactive interface legend is as follows:
(1) the setting of the security password is prompted through the personalized push, which is specifically shown in fig. 10.
Specifically, when the user clicks on the link "do your WiFi password secure? And when the user needs to check, the server inputs the password of the current wireless network connected by the user into a security password library for matching, if the password passes the matching, a popup window of ' your WiFi password security ' is popped up, otherwise, the popup window of ' your WiFi password is not secure, and the security password is referred to: and a pop-up window. The reference security password obtained after the security password identification model identifies is stored in the security password library.
(2) By "my" click on "physical exam" button, as shown in detail in FIG. 11.
(3) Clicking to turn on the safety physical examination page to open the violence-preventing network-rubbing function, which is specifically shown in fig. 12.
Specifically, for example, if the information such as "whether the check is counterfeit and counterfeit public WiFi" or "whether the check will automatically jump to a fishing website" is displayed as unsafe after the "security check-up" is performed in step (2), the user may "turn on" the anti-violence setoff function, or may actively "turn on" the anti-violence setoff function in order to prevent the user from being violently setoff the network if the display result is safe.
Further, when the user actively turns on the anti-violence and anti-network-rubbing function, the mobile terminal reports the password currently connected with the WiFi to the server, the server inputs the password currently connected with the wireless network of the user into the security password library for matching, if the password is matched with the security password library, a prompt popup window of ' your WiFi password security ' is popped up, otherwise, the popup window of ' your WiFi password is not secure, and the safe password is referred to: a prompt popup window. The reference security password obtained after the security password identification model identifies is stored in the security password library.
(4) And selecting the hidden WiFi secure internet access from the WiFi list on the home page, as shown in fig. 13.
The embodiment of the present invention further provides a flow diagram of a method for performing network connection from the perspective of a terminal, and please refer to fig. 14 specifically.
The specific steps are executed as follows:
1) a user enters an anti-violence network rubbing interface through a WiFi manager, and starts an anti-violence network rubbing processing flow;
2) the terminal checks whether a password for turning on WiFi for preventing violence and catching up the network is stored at present;
3) step 2, checking that the WiFi password is not stored, popping a window to prompt and requiring a user to input the current WiFi password, and after the processing is finished, switching to the step 5;
4) step 2, checking the stored WiFi password, and directly entering the step 5 for processing;
5) the terminal uses a WiFi password classification model to perform security identification on the WiFi password;
6) step 5, if the current WiFi password is not safe, the popup window recommends a safe WiFi password to be displayed to the user; after the treatment is finished, the step 8 is carried out;
7) step 5, after the safety of the current WiFi password is identified, directly entering step 10 for processing;
8) after the popup window in the step 6 prompts a safe WiFi password to the user, the user selects not to process, the step 10 is directly entered, and otherwise, the step 9 is entered;
9) guiding the user to leave the WiFi manager, and manually entering a system list to modify the security password of the current WiFi; after the treatment is finished, manually returning to the WiFi manager, and continuing the treatment in the step 10;
10) connecting a WiFi test by using a currently set WiFi password to verify the correctness of the password;
11) if the password verification in the step 10 fails, the process of 'violence prevention and network rubbing' is started to fail, and the user needs to return to the step 1 again;
12) the password verification in the step 10 is passed, the WiFi manager stores the WiFi information currently connected, including SSID, BSSID and WiFi password, and then the step 13 is carried out;
13) hiding the WiFi broadcast currently connected through routing setting to isolate the security threat of the periphery;
14) adding the current WiFi to a hidden WiFi management list;
15) after the subsequent user enters the WiFi manager, WiFi can be selected to surf the Internet through the hidden WiFi management list in the step 14;
16) the WiFi manager periodically backs up the hidden WiFi to the cloud end, and periodically checks whether the WiFi passwords in the hidden WiFi list are expired; and synchronizing the security password of the big data center to the terminal at regular time, and prompting the user to modify the password in a PUSH mode.
The embodiment of the specification improves the safety of the authentication information for connecting the WiFi by detecting the safety of the WiFi password for connecting the user and/or providing the safe WiFi password for the user, enables the WiFi not to be broadcasted outwards by hiding the WiFi, enables unauthorized users to be incapable of cracking the password for connecting the network by violence after finding the WiFi, and improves the safety of the WiFi network.
The embodiment of the present invention further provides a flowchart of a method for performing network connection from the perspective of the overall system, and please refer to fig. 15 specifically.
The specific steps are executed as follows:
1) the big data center stores enough password samples after a period of accumulation; the big data center can store massive password information reported by the terminal in the month of adulthood;
2) the password samples derived by the expert system are generally security password samples summarized according to cryptography and other systems (such as a hundred-degree search engine), and are data sets obtained after the expert analysis and summarization screening;
3) deriving a password data sample through data retrieval, and preprocessing the password data sample; the technical means includes that the method can be used for removing the unique attribute, processing the missing value and the like which conform to the engineering practice method;
4) carrying out characteristic engineering, and carrying out characteristic analysis and selection; the technical means comprises numerical characteristic analysis, category characteristic analysis and the like which can be used according with engineering practice methods;
5) extracting a password training sample and a test sample according to the characteristic engineering result to prepare for model analysis; meanwhile, the generation rule of the security password is analyzed, and an algorithm basis is provided for the generation of the security password;
6) selecting a model algorithm, and performing model training on training sample data; the algorithm types comprise general algorithms such as a neural network, a combined tree, a linear model and the like, and need to be selected according to actual training samples;
7) after the model training is finished, model evaluation is required; evaluating according to the test sample data;
8) if the quality of the evaluation model is good, the model is output outwards; if the evaluation result is poor, adjusting the model parameters in the to-be-used safety password identification model, and retraining the model;
9) according to the terminal security password request, the big data center platform generates a password at regular time by using a security password algorithm and identifies by using a model;
10) if the identification result is the safe password, synchronizing to the terminal; otherwise, regenerating the password and continuing the identification process;
11) the terminal feeds back a password sample to the big data center in a closed loop according to a processing result of starting the 'violence prevention network rubbing';
12) the terminal uses the model to carry out password identification according to the password identification request for starting the 'network preventing violence from catching up with the network', and simultaneously, the closed loop feeds back a password sample to the big data center.
An embodiment of the present invention further provides a network connection device, as shown in fig. 16, the device includes:
the first obtaining module 1601 is configured to obtain password data to be identified.
An identifying module 1603, configured to perform security password identification on the password data to be identified based on a security password identification model to obtain security password data in the password data to be identified.
A first determining module 1605, configured to determine a reference network connection password of the target network based on the security password data.
A first sending module 1607, configured to send the reference network connection password of the target network to the mobile terminal, so that the mobile terminal establishes a connection with the target network based on the network connection password.
An embodiment of the present invention further provides a network connection device, as shown in fig. 17, the network connection device includes:
a second sending module 1701, configured to send a network connection password obtaining request to a server in response to a network connection password request instruction triggered by a user, where the network connection password request instruction includes a network connection password of a target network;
a receiving module 1703, configured to receive a reference network connection password of the target network sent by the server; the reference network connection password is a network connection password determined by security password data in the password data to be identified, which is obtained by the server through performing security password identification on the acquired password data to be identified based on a security password identification model;
a second determining module 1705, configured to determine a network connection password of the target network based on the reference network connection password;
a connection module 1707, configured to establish a connection with the target network based on the network connection password of the target network.
In the embodiments of the present disclosure, the memory may be used to store software programs and modules, and the processor executes various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
As can be seen from the above embodiments of the network connection method, the server, and the mobile terminal provided by the present invention, in the solution of the embodiment of the present disclosure, the WiFi manager grasps the WiFi connection information of the user, and provides a routing security check function. In the routing setting item, a safety password for avoiding brute force cracking is provided for each user through big data modeling, and the safety of WiFi is improved through customized recommendation items such as hidden WiFi broadcast, set guidance and the like.
The embodiment of the network connection method, the server and the mobile terminal provided by the invention is suitable for scenes of wireless local area networks such as families, and firstly, a brute force cracking scheme is avoided through big data modeling operation, and a safe WiFi password prompt is set for a user; secondly, the WiFi broadcast is closed through the router management setting, and an isolated safe environment is created for users; and thirdly, a family WiFi automatic connection function is set, so that limited users can safely surf the internet. Through preventing violence and rubbing the net, provide safe wiFi environment for every user, improve user's security and participation sense. When avoiding violence rubbing the net, can promote the net speed, the user experience of reinforcing housekeeper product feels.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the apparatus, system and server embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (14)

1. A method of network connectivity, the method comprising:
acquiring password data to be identified;
performing safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified;
determining a reference network connection password for the target network based on the security password data;
sending the reference network connection password of the target network to a mobile terminal so that the mobile terminal establishes connection with the target network based on the reference network connection password;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
2. The method of claim 1, wherein obtaining the cryptographic training data comprises:
receiving first password data reported by a mobile terminal;
collecting password sample data from the Internet;
screening the password sample data by using a preset security rule to obtain second password data;
obtaining cipher training data based on the first cipher data and/or the second cipher data.
3. The method of claim 1, wherein training a preset machine learning model based on the password training data to obtain a secure password recognition model comprises:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
obtaining test password sample data;
inputting the test password sample data into the to-be-used security password identification model for training to obtain a test result;
evaluating the quality of the to-be-used secure password identification model based on the test result;
when the quality evaluation passes, using the to-be-used safety password identification model as the safety password identification model;
and when the quality evaluation is not passed, adjusting model parameters in the to-be-used security password recognition model, and retraining the to-be-used security password recognition model until the quality evaluation is passed.
4. A method of network connectivity, the method comprising:
responding to a network connection password request instruction triggered by a user, and sending a network connection password acquisition request to a server, wherein the network connection password request instruction comprises a network connection password of a target network;
receiving a reference network connection password of the target network sent by a server; the reference network connection password is a network connection password determined by security password data in the password data to be identified, which is obtained by the server through performing security password identification on the acquired password data to be identified based on a security password identification model;
determining a network connection password of a target network based on the reference network connection password;
establishing a connection with the target network based on the network connection password of the target network;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
5. The method of claim 4, wherein the network connection password request instruction comprises:
the instruction is triggered by the first operation of the violent-force-preventing network-rubbing operation area of the preset interface;
or, an instruction triggered by a second operation of presetting push information, where the push information is used to indicate whether security of a network connection password of the target network needs to be confirmed.
6. The method of claim 4, wherein determining the network connection password for the target network based on the reference network connection password comprises:
taking the reference network connection password as a network connection password of a target network;
or the like, or, alternatively,
generating a new security password according to the reference network connection password;
and taking the new security password as a network connection password of the target network.
7. The method of claim 4, further comprising:
acquiring a list of accessible networks in a preset range;
selecting a target network in the list;
and sending a hidden state setting request of the target network to a network control server.
8. The method of claim 7, wherein sending the hidden state setting request of the target network to the network control server comprises:
responding to an instruction of a user for setting a target network to be in a hidden state, and sending a hidden state setting request of the target network to a network control server, wherein the hidden state setting request carries operation authority information of a requester, so that the network control server determines the operation authority of the user according to the operation authority information; and when the operation authority of the user is allowed to set a hidden state, the network control server sets the target network to be in the hidden state.
9. The method of claim 7, wherein after the sending the hidden state setting request of the target network to the network control server, the method further comprises:
responding to a sharing instruction of the target network triggered by a user, and acquiring connection information of the target network, wherein the connection information comprises: information of a service set identifier of the target network, a unique identifier of the target network and a network connection password of the target network;
and sending the connection information to an object to be shared so that the object to be shared is automatically connected with the target network according to the connection information.
10. The method of any of claims 4-7, wherein after determining the network connection password for the target network based on the reference network connection password, the method further comprises:
storing the network connection password locally;
correspondingly, the connection with the target network is established based on the network connection password of the target network, including;
and automatically connecting the target network by using the locally stored network connection password.
11. The method of claim 10, wherein said automatically connecting to the target network using the locally stored network connection password comprises:
acquiring a service set identifier of the target network;
determining a service set of the target network according to the service set identification of the target network;
and sending a connection request with the target network to a service set of the target network, wherein the connection request carries the unique identifier and the network connection password of the target network, so that the service set establishes connection with the target network based on the unique identifier and the network connection password.
12. A method of network connectivity, the method comprising:
the server acquires password data to be identified;
the server carries out safe password identification on the password data to be identified based on a safe password identification model to obtain safe password data in the password data to be identified;
the server determines a reference network connection password of the target network based on the security password data;
the method comprises the steps that a mobile terminal responds to a network connection password request instruction triggered by a user and sends a network connection password acquisition request to a server, wherein the network connection password request instruction comprises a network connection password of a target network;
the mobile terminal receives a reference network connection password of the target network sent by the server;
the mobile terminal determines a network connection password of a target network based on the reference network connection password;
the mobile terminal establishes connection with the target network based on the network connection password of the target network;
the establishment method of the secure password identification model comprises the following steps:
classifying the password data according to password security levels to obtain classified password data with different password security levels;
marking the classified password data with password security levels to obtain password training data, wherein the password training data comprise password information with different security levels, and the password information with different security levels is marked with different password security level identifications;
training a preset machine learning model based on the password training data to obtain a safe password identification model;
training a preset machine learning model based on the password training data to obtain a safe password identification model, including:
inputting the password training data into a preset machine learning model for training to obtain a safety password identification model to be used;
inputting the obtained test password sample data into the to-be-used security password identification model for testing and evaluation;
and acquiring a security password identification model based on the test and evaluation results.
13. A network connection server, characterized in that the server comprises a processor and a memory, in which at least one instruction, at least one program, a set of codes or a set of instructions is stored, which is loaded and executed by the processor to implement the method of network connection according to any one of claims 1 to 3.
14. A network-connected mobile terminal, characterized in that the mobile terminal comprises a processor and a memory, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which is loaded and executed by the processor to implement the method of network connection according to any of claims 4 to 11.
CN201910429616.3A 2019-05-22 2019-05-22 Network connection method, server and mobile terminal Active CN110401944B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910429616.3A CN110401944B (en) 2019-05-22 2019-05-22 Network connection method, server and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910429616.3A CN110401944B (en) 2019-05-22 2019-05-22 Network connection method, server and mobile terminal

Publications (2)

Publication Number Publication Date
CN110401944A CN110401944A (en) 2019-11-01
CN110401944B true CN110401944B (en) 2022-01-14

Family

ID=68323047

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910429616.3A Active CN110401944B (en) 2019-05-22 2019-05-22 Network connection method, server and mobile terminal

Country Status (1)

Country Link
CN (1) CN110401944B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112839333B (en) * 2021-01-08 2022-04-29 支付宝(杭州)信息技术有限公司 Service processing method and device based on wireless communication

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101257489A (en) * 2008-03-20 2008-09-03 陈珂 Method for protecting account number safety
CN101295333A (en) * 2007-04-28 2008-10-29 佛山市顺德区顺达电脑厂有限公司 Artificial neural network cipher system and cipher recognizing method using the same
CN101854627A (en) * 2009-03-31 2010-10-06 邱宏达 Login authentication system and method
CN103634786A (en) * 2013-11-14 2014-03-12 北京奇虎科技有限公司 Method and system for security detection and repair of wireless network
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107094294B (en) * 2016-02-18 2020-06-02 腾讯科技(深圳)有限公司 Network connection method and device
US9852287B1 (en) * 2016-10-04 2017-12-26 International Business Machines Corporation Cognitive password pattern checker to enforce stronger, unrepeatable passwords

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101295333A (en) * 2007-04-28 2008-10-29 佛山市顺德区顺达电脑厂有限公司 Artificial neural network cipher system and cipher recognizing method using the same
CN101257489A (en) * 2008-03-20 2008-09-03 陈珂 Method for protecting account number safety
CN101854627A (en) * 2009-03-31 2010-10-06 邱宏达 Login authentication system and method
CN103634786A (en) * 2013-11-14 2014-03-12 北京奇虎科技有限公司 Method and system for security detection and repair of wireless network
CN105141631A (en) * 2015-09-21 2015-12-09 宇龙计算机通信科技(深圳)有限公司 Terminal, server and account security login method, device and system

Also Published As

Publication number Publication date
CN110401944A (en) 2019-11-01

Similar Documents

Publication Publication Date Title
EP3497609B1 (en) Detecting scripted or otherwise anomalous interactions with social media platform
US10042992B2 (en) Image based CAPTCHA challenges
US9794228B2 (en) Security challenge assisted password proxy
US9306889B2 (en) Method and device for processing messages
CN103379099B (en) Hostile attack identification method and system
CN112417439A (en) Account detection method, device, server and storage medium
CN109951436B (en) Trusted terminal verification method and device
US10284561B2 (en) Method and server for providing image captcha
CN104125485B (en) A kind of user profile shared method, equipment and system
EP3830723B1 (en) Increasing security of a password-protected resource based on publicly available data
CN109426700B (en) Data processing method, data processing device, storage medium and electronic device
CN107517180B (en) Login method and device
CN114338064B (en) Method, device, system, equipment and storage medium for identifying network traffic type
CN110572302B (en) Diskless local area network scene identification method and device and terminal
CN110401944B (en) Network connection method, server and mobile terminal
CN113132329A (en) WEBSHELL detection method, device, equipment and storage medium
Akhuseyinoglu et al. AntiWare: An automated Android malware detection tool based on machine learning approach and official market metadata
CN112738738B (en) Friend adding method, device, equipment and storage medium
CN110602709B (en) Network data security method and device of wearable device and storage medium
CN114189366B (en) Account correlation method, terminal and server
CN112632140A (en) Course recommendation method, device, equipment and storage medium
KR101620953B1 (en) Image captcha providing method and server
CN117633772A (en) Prompting method and prompting device for password recovery and password recovery system
CN105553997A (en) Authentication information input method and device
CN114491559A (en) System testing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant