CN111901445A - Method and equipment for inquiring password of wireless access point - Google Patents
Method and equipment for inquiring password of wireless access point Download PDFInfo
- Publication number
- CN111901445A CN111901445A CN202010932057.0A CN202010932057A CN111901445A CN 111901445 A CN111901445 A CN 111901445A CN 202010932057 A CN202010932057 A CN 202010932057A CN 111901445 A CN111901445 A CN 111901445A
- Authority
- CN
- China
- Prior art keywords
- password
- terminal
- wireless access
- access point
- point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 63
- 238000004891 communication Methods 0.000 claims abstract description 61
- 230000004044 response Effects 0.000 claims abstract description 19
- 238000001514 detection method Methods 0.000 claims abstract description 8
- 230000006855 networking Effects 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010586 diagram Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012216 screening Methods 0.000 description 3
- 239000000835 fiber Substances 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 238000011161 development Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
- H04L67/1061—Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
- H04L67/1068—Discovery involving direct consultation or announcement among potential requesting and potential source peers
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the application discloses a method and equipment for inquiring a password of a wireless access point. One embodiment of the method comprises: responding to the received password inquiry instruction, and detecting whether a second terminal exists nearby, wherein the second terminal is used for providing password information of the wireless access point; in response to the detection of the at least one second terminal, determining a target second terminal in the at least one second terminal according to the preset priority; and sending a password inquiry instruction to the target second terminal based on the point-to-point communication, and receiving a password inquiry result returned by the target second terminal through the point-to-point communication. By adopting the method, the non-networked terminal equipment can acquire the password of the available wireless access point.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for querying a password of a wireless access point.
Background
With the development of communication technology, wireless networks are widely used, and a password of a wireless access point is generally required for connecting the wireless networks through the wireless access point. Currently, a method for acquiring the password of the available wireless access point is to request the password from the server in a state where the terminal device is networked.
However, the method of requesting a password from a server in a state where terminal apparatuses are networked cannot cause an unconnected terminal apparatus to acquire a password of an available wireless access point.
Disclosure of Invention
The embodiment of the application provides a method and equipment for inquiring a password of a wireless access point.
In a first aspect, an embodiment of the present application provides a method for querying a password of a wireless access point, which is applied to a first terminal, and includes: responding to the received password inquiry instruction, and detecting whether a second terminal exists nearby, wherein the second terminal is used for providing password information of the wireless access point; in response to the detection of the at least one second terminal, determining a target second terminal in the at least one second terminal according to the preset priority; and sending a password inquiry instruction to the target second terminal based on the point-to-point communication, and receiving a password inquiry result returned by the target second terminal through the point-to-point communication.
In a second aspect, an embodiment of the present application provides a method for providing a password of a wireless access point, which is applied to a second terminal, and includes: in response to receiving a password inquiry command sent by a first terminal based on point-to-point communication, inquiring password information corresponding to the password inquiry command based on the network connection type of a second terminal; and sending a password inquiry result generated based on the password information to the first terminal through point-to-point communication.
In a third aspect, an embodiment of the present application provides an apparatus for querying a password of a wireless access point, where the apparatus is disposed in a first terminal, and the apparatus includes: the detection unit is configured to respond to the received password inquiry instruction and detect whether a second terminal exists nearby, wherein the second terminal is used for providing password information of the wireless access point; the determining unit is configured to determine a target second terminal in the at least one second terminal according to a preset priority level in response to the detection of the at least one second terminal; and the interaction unit is configured to send a password query instruction to the target second terminal based on the point-to-point communication and receive a password query result returned by the target second terminal through the point-to-point communication.
In a fourth aspect, an embodiment of the present application provides an apparatus for providing a password of a wireless access point, where the apparatus is disposed at a second terminal, and the apparatus includes: the inquiry unit is configured to respond to a password inquiry instruction sent by the first terminal based on point-to-point communication and inquire password information corresponding to the password inquiry instruction based on the network connection type of the second terminal; a transmitting unit configured to transmit a password inquiry result generated based on the password information to the first terminal through point-to-point communication.
In a fifth aspect, an embodiment of the present application provides a computer device, including: one or more processors; a storage device having one or more programs stored thereon; when executed by one or more processors, cause the one or more processors to implement a method as described in any implementation of the first aspect, or to implement a method as described in any implementation of the second aspect.
In a sixth aspect, the present application provides a computer-readable medium, on which a computer program is stored, which when executed by a processor implements the method described in any of the implementation manners in the first aspect, or implements the method described in any of the implementation manners in the second aspect.
According to the method and the device for inquiring the password of the wireless access point, when the password inquiry instruction is received, whether a second terminal for providing the password of the wireless access point exists nearby is detected, when the second terminal is detected to exist, a target second terminal is determined from a plurality of second terminals according to the preset priority, the password inquiry instruction is sent to the target second terminal based on point-to-point communication, the password inquiry result returned by the target second terminal through the point-to-point communication is received, and the non-networked terminal device can acquire the password of the available wireless access point.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture to which some embodiments of the present application may be applied;
FIG. 2 is a flow diagram for one embodiment of a method of querying a wireless access point for a password in accordance with the present application;
FIG. 3 is a flow diagram of another embodiment of a method of querying a wireless access point for a password in accordance with the present application;
FIG. 4 is a flow diagram for one embodiment of a method of providing a password for a wireless access point according to the present application;
FIG. 5 is a flow diagram illustrating an application scenario of a method of querying a wireless access point for a password according to the present application;
FIG. 6 is a schematic block diagram of a computer system suitable for use with the computer device of some embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the method of querying a wireless access point of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include a device 101, a device 102, a server 103, a network 104, and a network 105. Network 104 is the medium used to provide communication links between devices 101 and 102. The network 104 may include various point-to-point connection types, such as bluetooth connections or device direct connections, among others. Network 105 is the medium by which a communication link is provided between device 102 and device 103. Network 105 may include various connection types, such as wired, wireless target communication links, or fiber optic cables, to name a few.
In practice, a device may provide a respective network service by installing a respective client application or server application. After the device has installed the client application, it may be embodied as a client in network communications. Accordingly, after the server application is installed, it may be embodied as a server in network communications.
As an example, in fig. 1, the devices 101, 102 are embodied as clients, and the device 103 is embodied as a server. Specifically, the devices 101 and 102 may be clients installed with network connection software, and the device 103 may be a server providing a password inquiry service.
It should be noted that the method for querying the password of the wireless access point provided in the embodiment of the present application may be performed by the device 101, the device 102, or the device 103.
It should be understood that the number of networks and devices in fig. 1 is merely illustrative. There may be any number of networks and devices, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of a method of querying a wireless access point for a password in accordance with the present application is shown. The method for inquiring the password of the wireless access point is applied to the first terminal and can comprise the following steps:
In this embodiment, when a first terminal (for example, the device 101 shown in fig. 1) inquiring about the password of the wireless access point receives a password inquiry instruction, it may be detected whether a second terminal capable of providing the password information of the wireless access point exists in the vicinity of the first terminal by searching nearby bluetooth devices or by comparing distances between satellite positions of the devices, and the like.
In this embodiment, when the first terminal detects that one or more second terminals exist in the vicinity of the first terminal, a target second terminal may be determined among the one or more second terminals according to a preset priority for screening the second terminals. Wherein the target second terminal is a device which is determined by the first terminal in one or more second terminals and is to generate information interaction with the first terminal so as to acquire the password information of the wireless access point.
In this embodiment, the preset priority for screening the second terminal may be to perform screening sorting on the detected second terminal according to the device type of the second terminal, for example, to preferentially select a device of the server type, to secondarily select a device of the mobile terminal type, and the like; or the detected second terminals may be sorted according to the network connection types of the second terminals, for example, a device with the network connection type being a wired network is selected preferentially, a device with the network connection type being a mobile network is selected secondarily, and a device without networking is selected finally; for example, feedback information of the password information of the wireless access point provided by the user to each second terminal in the past may be acquired, the accuracies of the password information provided by each second terminal may be ranked according to the feedback information, and the second terminal with the higher accuracy of the provided password information may be preferentially selected.
And 203, sending a password query instruction to the target second terminal based on the point-to-point communication, and receiving a password query result returned by the target second terminal through the point-to-point communication.
In this embodiment, the first terminal may send a password query instruction to the target second terminal based on the peer-to-peer communication, and receive a password query result returned by the target second terminal through the peer-to-peer communication. The point-to-point communication can be a communication mode such as Bluetooth communication and the like which can realize direct connection between equipment; the password query instruction may include a password to query a specified/target wireless access point, or an identification of available wireless access points in the vicinity and a password; the password inquiry result may include a password of the first terminal-specified/target wireless access point, an identification and a password of a nearby available wireless access point, information indicating inquiry failure, and the like.
In the method for querying a password of a wireless access point, when a password query instruction is received, whether a second terminal for providing the password of the wireless access point exists in the vicinity is detected, when the second terminal is detected to exist, a target second terminal is determined from a plurality of second terminals according to a preset priority, the password query instruction is sent to the target second terminal based on point-to-point communication, and a password query result returned by the target second terminal through the point-to-point communication is received, so that a terminal device which is not connected to a network can obtain the password of the available wireless access point.
Optionally, determining a target second terminal in the at least one second terminal according to the preset priority, including: acquiring the network connection type of at least one second terminal; determining whether the at least one second terminal includes a fixed network connection device; and if the at least one second terminal comprises fixed network connection equipment, determining the fixed network connection equipment as a target second terminal.
In this embodiment, the first terminal may obtain the queried network connection type of each second terminal, and when the queried network connection type of each second terminal is a fixed network connection device connected through a fixed network, determine the fixed network connection device as the target second terminal. Wherein, the network connection type can comprise fixed network connection, mobile network connection, or non-networking type; the fixed network connection may be a wireless network (e.g., a wireless fidelity) or a wired network (e.g., an ethernet network). According to the embodiment, the fixed network connection device is preferentially determined as the target second terminal according to the network connection type of each second terminal, so that the consumption of data traffic can be reduced while the password information on the target second terminal is ensured to be kept updated so as to improve the accuracy of the password information provided by the target second terminal.
Optionally, if the at least one second terminal does not include the fixed network connection device, determining whether the at least one second terminal includes the mobile network connection device; and if the at least one second terminal comprises the mobile network connection equipment, determining the mobile network connection equipment as a target second terminal.
In this embodiment, when the first terminal queries that no fixed network connection device exists in each second terminal, it queries whether a mobile network device exists in each second terminal, and if the mobile network device exists, the mobile network device is determined as the target second terminal. The mobile network connection device may be a device that performs network connection using mobile data. In this embodiment, when the fixed network connection device does not exist in the second terminal, the mobile network device in the second terminal is determined as the target second terminal, so that the password information on the target second terminal can be kept updated, and the accuracy of the password information provided by the target second terminal is improved.
Optionally, if the at least one second terminal does not include a mobile network connected device, the non-networking device is determined as the target second terminal.
In this embodiment, when there is no mobile network connection device in each second terminal, a non-networking device that is not connected to any network is determined as a target second terminal. In this embodiment, when there is no fixed network connection device and no mobile network connection device in the second terminal, the non-networking device in the second terminal is taken as the target second terminal, and it is ensured that the non-networking device is taken as the target second terminal that can provide the password information in the case that there is no networking device in the second terminal.
With further reference to fig. 3, shown is a flow 300 of another embodiment of a method of querying a wireless access point for a password in accordance with the present application. The method of querying the password of the wireless access point may include the steps of:
And 303, sending a password query instruction to the target second terminal based on the point-to-point communication, and receiving a password query result returned by the target second terminal through the point-to-point communication.
In this embodiment, the descriptions of step 301, step 302, and step 303 are the same as the descriptions of step 201, step 202, and step 203, and are not repeated here.
And step 304, if the password inquiry result comprises the password information of the wireless access point, connecting the wireless access point by using the password information of the wireless access point.
In this embodiment, if the password query result returned by the target second terminal includes the password information of the wireless access, the first terminal may connect to the wireless access point through the password information of the wireless access point.
According to the method for inquiring the password of the wireless access point, when the first terminal receives the password inquiry instruction, whether a second terminal for providing the password of the wireless access point exists nearby is detected, when the second terminal is detected to exist, a target second terminal is determined from the plurality of second terminals according to the preset priority, the password inquiry instruction is sent to the target second terminal based on point-to-point communication, the password inquiry result returned by the target second terminal through the point-to-point communication is received, the terminal device which is not connected with the network is connected to the wireless access point according to the password information of the wireless access point in the password inquiry result, and the terminal device which is not connected with the network can be connected to the wireless access point.
Optionally, the password query instruction sent by the third terminal is received based on the point-to-point communication, and the password query result is returned to the third terminal.
In this embodiment, after the first terminal accesses the wireless access point by using the password information of the wireless access point acquired by the target second terminal, the first terminal may receive a password query instruction sent by another non-networked terminal device based on peer-to-peer communication, and return a password query result to a sending device of the password query instruction. The embodiment converts the device which has acquired the password information of the wireless access point and is connected to the wireless access point by using the password information from the role of the password inquiry device to the role of the password providing device, thereby further providing the password providing service for other non-networked terminals and improving the robustness of the password providing service.
In some optional implementations of the embodiments described above in connection with fig. 2 and 3, the method of querying a password of a wireless access point further comprises: if the password inquiry result does not include password information, determining an alternative second terminal in at least one second terminal according to the preset priority; and sending a password inquiry instruction to the alternative second terminal based on the point-to-point communication, and receiving a password inquiry result returned by the alternative second terminal through the point-to-point communication.
In this embodiment, if the password query result returned by the target second terminal and received by the first terminal does not include password information, the first terminal may continue to determine the candidate second terminal from the retrieved second terminals except the target second terminal according to the preset priority, send a password query instruction to the candidate second terminal based on the peer-to-peer communication, and receive the password query result returned by the candidate second terminal through the peer-to-peer communication. It can be understood that if the password query result returned by the alternative terminal does not include the password information, the next alternative second terminal can be determined in the retrieved second terminals according to the preset priority. In this embodiment, the success rate of obtaining the password information may be improved by setting a mechanism of the alternative second terminal.
With further reference to fig. 4, illustrated is a flow 400 of one embodiment of a method of providing a password for a wireless access point according to the present application. The method for providing the password of the wireless access point is applied to the second terminal and can comprise the following steps:
In this embodiment, when a second terminal (e.g., the device 102 shown in fig. 1) providing a password of a wireless access point receives a password inquiry instruction sent by a first terminal through point-to-point communication, the second terminal inquires password information based on its own network connection type and an inquiry instruction in the password inquiry instruction. The network connection type of the second terminal in this embodiment may be a fixed network connection device that connects to a fixed network, may be a mobile network connection device that connects to a mobile network, may be a device that does not connect to any network, and the like.
And 402, sending a password inquiry result generated based on the password information to the first terminal through point-to-point communication.
In this embodiment, the second terminal may generate a password query result according to the queried password information, and send the password query result to the first terminal through peer-to-peer communication. The second terminal can also encrypt the generated password query result and send the encrypted password query result to the first terminal.
In the method for providing the password of the wireless access point, after the second terminal receives the password query instruction sent by the first terminal based on the peer-to-peer communication, the password information corresponding to the password query instruction is queried based on the network connection type of the second terminal, and the query result is returned to the first terminal based on the peer-to-peer communication, so that the first terminal which is not networked can obtain the password information of the wireless access point.
Optionally, the second terminal includes a fixed network connection device, and based on the network connection type of the second terminal, queries password information corresponding to the password query instruction, including: responding to the password inquiry instruction to inquire the available wireless access point, and acquiring locally stored password information to be verified; and sending an authentication instruction containing password information to be authenticated to a server, receiving an authentication result returned by the server, and determining the password information to be authenticated as first password information according to the authentication result, wherein the first password information comprises an identifier of an available wireless access point and a password of the available wireless access point.
In this embodiment, if the second terminal is a fixed network connection device, when the password query instruction received by the second terminal is to query an available wireless access point, the second terminal may query locally stored identifiers of the available wireless access point and corresponding password information on the local machine; then, locally stored identification of the available wireless access point and corresponding password information are sent to a server for password information verification, and a verification result of the password information returned by the server is received; and if the verification result indicates that the password information is correct, the second terminal determines the identifier of the available wireless access point and the corresponding password information as first password information, wherein the first password information is the password information which can be returned to the first terminal and inquired based on the password inquiry instruction.
In this embodiment, the second terminal verifies the accuracy of the password information through the server, and returns the password information that passes the verification to the first terminal, so that the accuracy of the password information provided by the second terminal can be ensured, and the reliability of the service provided by the second terminal can be improved.
Optionally, in response to the password query instruction indicating to query the password of the target wireless access point, the password query instruction is sent to the server, and second password information returned by the server is received, where the second password information includes the password of the target wireless access point.
In this embodiment, if the second terminal is a fixed network connection device, when the query instruction received by the second terminal indicates to query the password of the target wireless access point, the second terminal sends a password query instruction including an identifier of the target wireless access point to the server, the server reads second password information corresponding to the identifier of the target wireless access point included in the password query instruction, and the second terminal caches the password information queried according to the identifier of the target wireless access point and the identifier of the target wireless access point in a local storage of the second terminal and returns the password information to the second terminal, where the second password information is the password information of the target wireless access point queried based on the password query instruction and can be returned to the first terminal.
In this embodiment, the second terminal queries the password information of the target wireless access point through the server and provides the password information to the first terminal, so that the accuracy of the password information provided by the second terminal can be ensured, and the service reliability of the second terminal can be improved. In addition, the second terminal stores the password information of the target wireless access point inquired by the server in a local cache, so that the second terminal is maintained, and the accuracy of the password information provided by the second terminal can be improved.
Optionally, the second terminal includes a mobile network connection device, and based on the network connection type of the second terminal, queries password information corresponding to the password query instruction, including: and in response to the password inquiry instruction indicating that the available wireless access point is inquired, acquiring locally stored third password information, wherein the third password information comprises the identification of the available wireless access point and the password of the available wireless access point.
In this embodiment, if the second terminal is a mobile network connection device, when the password query instruction received by the second terminal indicates to query the available wireless access point, the identifier and the password of the available wireless access point are obtained by reading the local storage, and the identifier and the password of the available wireless access point are used as the third password information provided to the first terminal. In this embodiment, when the second terminal is a mobile network connection device, consumption of mobile data generated when the second terminal initiates a query request to another device may be avoided by reading the local memory query password information.
Optionally, in response to the password query instruction indicating to query the password of the target wireless access point, locally stored fourth password information is obtained, where the fourth password information includes the password of the target wireless access point.
In this embodiment, if the second terminal is a mobile network connection device, when the password query instruction received by the second terminal is a password indicating to query the target wireless access point, the password information of the target wireless access point is obtained by reading the local storage, and the password information of the target wireless access point is used as fourth password information that can be provided to the first terminal. In this embodiment, when the second terminal is a mobile network connection device, mobile data consumption caused by initiating a query request to another device can be avoided by reading the local memory query password information.
Optionally, the obtaining of locally stored fourth password information includes: and responding to the situation that the fourth password information does not exist in the local storage, sending a password inquiry instruction to the server, and receiving the fourth password information returned by the server.
In this embodiment, if the second terminal does not inquire the fourth password information in the local storage, a password inquiry instruction indicating to inquire the password of the target wireless access point is sent to the server, and the fourth password information including the password of the target wireless access point returned by the server is received.
Optionally, the second terminal includes a non-networking device, and the querying, based on the network connection type of the second terminal, for the password information corresponding to the password query instruction includes: fifth password information stored in the non-networking device is acquired, wherein the fifth password information comprises an identification of an available wireless access point and a password of the available wireless access point.
In this embodiment, if the second terminal is a non-networking device, when the second terminal receives a password query instruction indicating to query an available wireless access point or to query a password of a target wireless access point, fifth password information corresponding to the password query instruction is obtained by reading data locally stored in the second terminal, where the fifth password information includes an identifier and a password of the available wireless access point or includes a password of the target wireless access point.
Referring to fig. 5, a schematic flowchart of an application scenario of the method for querying a password of a wireless access point according to the embodiment of the present application is shown, where the application scenario includes: step 501, a password inquiry device detects a password providing device nearby; step 502, the password inquiry device establishes a point-to-point communication connection with one detected password providing device of a plurality of password providing devices; step 503, the password inquiry device sends a password inquiry command to the password providing device which establishes the point-to-point communication connection; step 504, the password query device receives an encrypted password query result corresponding to the password query instruction and returned by the password providing device based on the point-to-point communication, and in step 504, the password query result returned by the password providing device may be a password query result obtained by querying a local storage or a password query result obtained by querying a password server; step 505, decrypting the encrypted password query result to obtain the identifier and the password of the available wireless access point, and connecting to the wireless access point; step 506, the connected password query device may be converted into a password providing device, receive password query instructions of other unconnected password query devices, and provide query services for the other unconnected password query devices.
Referring now to FIG. 6, a block diagram of a computer system 600 suitable for use in implementing a computing device (e.g., terminal device 101 or server 103 shown in FIG. 1) of an embodiment of the present application is shown. The network device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the method of the present application when executed by a Central Processing Unit (CPU) 601. It should be noted that the computer readable medium described herein can be a computer readable signal medium or a computer readable medium or any combination of the two. A computer readable medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a detection unit, a determination unit, and an interaction unit. Here, the names of these units do not constitute a limitation to the unit itself in some cases, and for example, the detection unit may also be described as a "unit that detects a password providing apparatus".
As another aspect, the present application also provides a computer-readable medium, which may be contained in the server or the terminal device described in the above embodiments; or may exist separately without being assembled into the server or terminal device. The computer readable medium carries one or more programs which, when executed by a processor, cause the processor to: responding to the received password inquiry instruction, and detecting whether a second terminal exists nearby, wherein the second terminal is used for providing password information of the wireless access point; in response to the detection of the at least one second terminal, determining a target second terminal in the at least one second terminal according to the preset priority; and sending a password inquiry instruction to the target second terminal based on the point-to-point communication, and receiving a password inquiry result returned by the target second terminal through the point-to-point communication. Alternatively, the one or more programs, when executed by the processor, cause the processor to: in response to receiving a password inquiry command sent by a first terminal based on point-to-point communication, inquiring password information corresponding to the password inquiry command based on the network connection type of a second terminal; and sending a password inquiry result generated based on the password information to the first terminal through point-to-point communication. The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (16)
1. A method for inquiring the password of a wireless access point is applied to a first terminal and comprises the following steps:
in response to receiving a password inquiry instruction, detecting whether a second terminal exists nearby, wherein the second terminal is used for providing password information of the wireless access point;
in response to the detection of at least one second terminal, determining a target second terminal in the at least one second terminal according to a preset priority;
and sending the password query instruction to the target second terminal based on point-to-point communication, and receiving a password query result returned by the target second terminal through the point-to-point communication.
2. The method of claim 1, wherein the determining a target second terminal among the at least one second terminal according to a preset priority comprises:
acquiring the network connection type of the at least one second terminal;
determining whether the at least one second terminal includes a fixed network connection device;
and if the at least one second terminal comprises the fixed network connection equipment, determining the fixed network connection equipment as the target second terminal.
3. The method of claim 2, wherein the method further comprises:
if the at least one second terminal does not comprise the fixed network connection equipment, determining whether the at least one second terminal comprises the mobile network connection equipment;
and if the at least one second terminal comprises the mobile network connection equipment, determining the mobile network connection equipment as the target second terminal.
4. The method of claim 3, wherein the method further comprises:
and if the at least one second terminal does not comprise the mobile network connection equipment, determining non-network connection equipment as the target second terminal.
5. The method of claim 1, wherein the method further comprises:
and if the password inquiry result comprises the password information of the wireless access point, connecting the wireless access point by using the password information of the wireless access point.
6. The method of claim 5, wherein the method further comprises:
and receiving a password inquiry instruction sent by a third terminal based on the point-to-point communication, and returning a password inquiry result to the third terminal.
7. The method of claim 1, wherein the method further comprises:
if the password query result does not include password information, determining an alternative second terminal in the at least one second terminal according to the preset priority;
and sending the password query instruction to the alternative second terminal based on the point-to-point communication, and receiving a password query result returned by the alternative second terminal through the point-to-point communication.
8. A method for providing a password of a wireless access point is applied to a second terminal and comprises the following steps:
in response to receiving a password inquiry instruction sent by a first terminal based on point-to-point communication, inquiring password information corresponding to the password inquiry instruction based on the network connection type of a second terminal;
and sending a password inquiry result generated based on the password information to the first terminal through the point-to-point communication.
9. The method of claim 8, wherein the second terminal comprises a fixed network connection device, and the querying for the password information corresponding to the password querying instruction based on the network connection type of the second terminal comprises:
responding to the password inquiry instruction to instruct to inquire an available wireless access point, and acquiring locally stored password information to be verified;
and sending an authentication instruction containing the password information to be authenticated to a server, receiving an authentication result returned by the server, and determining the password information to be authenticated as first password information according to the authentication result, wherein the first password information comprises an identification of an available wireless access point and a password of the available wireless access point.
10. The method of claim 9, wherein the method further comprises:
responding to the password inquiry instruction to indicate that the password of the target wireless access point is inquired, sending the password inquiry instruction to the server, and receiving second password information returned by the server, wherein the second password information comprises the password of the target wireless access point.
11. The method of claim 8, wherein the second terminal comprises a mobile network connection device, and the querying for the password information corresponding to the password querying instruction based on the network connection type of the second terminal comprises:
and in response to the password inquiry instruction indicating that the available wireless access point is inquired, acquiring locally stored third password information, wherein the third password information comprises the identification of the available wireless access point and the password of the available wireless access point.
12. The method of claim 11, wherein the method further comprises:
and in response to the password inquiry instruction indicating that the password of the target wireless access point is inquired, acquiring locally stored fourth password information, wherein the fourth password information comprises the password of the target wireless access point.
13. The method of claim 12, wherein the obtaining locally stored fourth cryptographic information comprises:
and responding to the situation that the fourth password information does not exist in the local storage, sending a password inquiry instruction to the server, and receiving the fourth password information returned by the server.
14. The method of claim 8, wherein the second terminal comprises a non-networking device, and the querying for the password information corresponding to the password query instruction based on the network connection type of the second terminal comprises:
and acquiring fifth password information stored in the non-networking equipment, wherein the fifth password information comprises the identification of the available wireless access point and the password of the available wireless access point.
15. A computer device, comprising:
one or more processors;
a storage device on which one or more programs are stored;
when executed by the one or more processors, cause the one or more processors to implement a method as claimed in any one of claims 1-7, or to implement a method as claimed in any one of claims 8-14.
16. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method of any one of claims 1 to 7 or carries out the method of any one of claims 8 to 14.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010932057.0A CN111901445A (en) | 2020-09-08 | 2020-09-08 | Method and equipment for inquiring password of wireless access point |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010932057.0A CN111901445A (en) | 2020-09-08 | 2020-09-08 | Method and equipment for inquiring password of wireless access point |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111901445A true CN111901445A (en) | 2020-11-06 |
Family
ID=73225159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010932057.0A Pending CN111901445A (en) | 2020-09-08 | 2020-09-08 | Method and equipment for inquiring password of wireless access point |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111901445A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090097661A1 (en) * | 2007-09-14 | 2009-04-16 | Security First Corporation | Systems and methods for managing cryptographic keys |
CN103402275A (en) * | 2013-07-26 | 2013-11-20 | 北京小米科技有限责任公司 | Method, terminal and system of sharing WiFi (Wireless Fidelity) link information |
CN104955048A (en) * | 2015-06-30 | 2015-09-30 | 北京奇虎科技有限公司 | WiFi (wireless fidelity) network login information sharing method, server, terminal and system |
CN104967995A (en) * | 2015-06-30 | 2015-10-07 | 北京奇虎科技有限公司 | A method, client and server for obtaining WIFI network password |
CN104980927A (en) * | 2015-06-30 | 2015-10-14 | 北京奇虎科技有限公司 | Method and device for sharing WiFi passwords |
CN105959971A (en) * | 2016-06-30 | 2016-09-21 | 维沃移动通信有限公司 | WiFi password sharing method and mobile terminal |
CN107231606A (en) * | 2017-07-19 | 2017-10-03 | 北京京东尚科信息技术有限公司 | WiFi method of network entry, intelligent hardware devices and electric terminal |
CN110167027A (en) * | 2019-05-23 | 2019-08-23 | 上海连尚网络科技有限公司 | A kind of method, equipment and storage medium obtaining wireless access point access pin |
CN110602692A (en) * | 2019-08-23 | 2019-12-20 | RealMe重庆移动通信有限公司 | Data updating method and device and electronic equipment |
-
2020
- 2020-09-08 CN CN202010932057.0A patent/CN111901445A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090097661A1 (en) * | 2007-09-14 | 2009-04-16 | Security First Corporation | Systems and methods for managing cryptographic keys |
CN103402275A (en) * | 2013-07-26 | 2013-11-20 | 北京小米科技有限责任公司 | Method, terminal and system of sharing WiFi (Wireless Fidelity) link information |
CN104955048A (en) * | 2015-06-30 | 2015-09-30 | 北京奇虎科技有限公司 | WiFi (wireless fidelity) network login information sharing method, server, terminal and system |
CN104967995A (en) * | 2015-06-30 | 2015-10-07 | 北京奇虎科技有限公司 | A method, client and server for obtaining WIFI network password |
CN104980927A (en) * | 2015-06-30 | 2015-10-14 | 北京奇虎科技有限公司 | Method and device for sharing WiFi passwords |
CN105959971A (en) * | 2016-06-30 | 2016-09-21 | 维沃移动通信有限公司 | WiFi password sharing method and mobile terminal |
CN107231606A (en) * | 2017-07-19 | 2017-10-03 | 北京京东尚科信息技术有限公司 | WiFi method of network entry, intelligent hardware devices and electric terminal |
CN110167027A (en) * | 2019-05-23 | 2019-08-23 | 上海连尚网络科技有限公司 | A kind of method, equipment and storage medium obtaining wireless access point access pin |
CN110602692A (en) * | 2019-08-23 | 2019-12-20 | RealMe重庆移动通信有限公司 | Data updating method and device and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109150978B (en) | Method and device for debugging micro service | |
CN110311983B (en) | Service request processing method, device and system, electronic equipment and storage medium | |
US11108761B2 (en) | Method, apparatus and system for remote control of intelligent device | |
CN112748962B (en) | Application loading method, device, electronic equipment and computer readable medium | |
CN110377440B (en) | Information processing method and device | |
CN110535659B (en) | Method, apparatus, electronic device and computer readable medium for processing data request | |
CN111510466B (en) | Data updating method and device for client, electronic equipment and readable medium | |
CN108833251B (en) | Method and apparatus for controlling network interconnection | |
CN111045833A (en) | Interface calling method and device | |
CN111460129A (en) | Method and device for generating identification, electronic equipment and storage medium | |
CN109471713B (en) | Method and device for inquiring information | |
CN114239010B (en) | Multi-node distributed authentication method, system, electronic equipment and medium | |
CN111447226A (en) | Method and device for detecting DNS hijacking | |
CN109218338B (en) | Information processing system, method and device | |
US20120246235A1 (en) | Attribute information sharing providing system, access information management device, access information proxy management device, method and program therefor | |
CN111273970B (en) | Calling method, device, system, medium and electronic equipment of intelligent contract | |
CN111901445A (en) | Method and equipment for inquiring password of wireless access point | |
CN111460020B (en) | Method, device, electronic equipment and medium for resolving message | |
CN109086210B (en) | Navigation information method and device for testing navigation application | |
CN110708657A (en) | Wireless access point connection method and device for mobile terminal | |
US9313272B2 (en) | Information processor and information processing method | |
CN111092949B (en) | Method and device for registering equipment | |
JP2020194988A (en) | Communication control method and communication system | |
CN114158021A (en) | Equipment access method, device, electronic equipment and storage medium | |
CN108811036B (en) | Method and apparatus for displaying wireless access point information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201106 |