CN114828003B - Wireless network access system based on big data - Google Patents
Wireless network access system based on big data Download PDFInfo
- Publication number
- CN114828003B CN114828003B CN202210420337.2A CN202210420337A CN114828003B CN 114828003 B CN114828003 B CN 114828003B CN 202210420337 A CN202210420337 A CN 202210420337A CN 114828003 B CN114828003 B CN 114828003B
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- network
- wireless network
- module
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 claims abstract description 21
- 238000012795 verification Methods 0.000 claims description 32
- 238000012545 processing Methods 0.000 claims description 9
- 238000010408 sweeping Methods 0.000 claims description 3
- 238000004364 calculation method Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000012163 sequencing technique Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/068—Authentication using credential vaults, e.g. password manager applications or one time password [OTP] applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a wireless network access system and a method based on big data, wherein the wireless network access system comprises a first access judging module, a password sharing generating module and a second access judging module, wherein the first access judging module is used for judging whether a certain mobile terminal accesses a certain wireless network, when the certain mobile terminal accesses the certain wireless network, the mobile terminal is set to be the first mobile terminal, the wireless network is a network to be connected, the password sharing generating module is used for generating the password sharing information of the network to be connected of the first mobile terminal, and the second access judging module is used for collecting the information of the network to be connected and the first mobile terminal when the second mobile terminal scans the password sharing information of the network to be connected of the first mobile terminal, so as to judge whether the second mobile terminal is allowed to access the network to be connected, wherein the second mobile terminal is a mobile terminal which is never accessed to the network to be connected.
Description
Technical Field
The invention relates to the technical field of wireless networks, in particular to a wireless network access system based on big data.
Background
Wireless networks are networks that enable interconnection of various communication devices without wiring. Wireless networking technologies cover a wide range of technologies, including both global voice and data networks that allow users to establish long-range wireless connections, and infrared and radio frequency technologies that are optimized for short-range wireless connections. Wireless networks may be classified into wireless wide area networks, wireless local area networks, wireless metropolitan area networks, and wireless personal area networks according to differences in network coverage.
In the prior art, one is to access the wireless network by directly inputting a wireless password, and the other is to access the wireless network by scanning a two-dimensional code of a password sharing page of a terminal which is already accessed to the wireless network, but the wireless network access mode is quite unsafe.
Disclosure of Invention
The invention aims to provide a wireless network access system and a wireless network access method based on big data, so as to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: the wireless network access system based on big data comprises a first access judging module, a password sharing generating module and a second access judging module, wherein the first access judging module is used for judging whether a certain mobile terminal accesses a certain wireless network, when the certain mobile terminal accesses the certain wireless network, the mobile terminal is set to be the first mobile terminal, the wireless network is a network to be connected, the password sharing generating module is used for generating network password sharing information to be connected of the first mobile terminal, and the second access judging module is used for collecting the information of the network to be connected and the first mobile terminal when the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal to judge whether the second mobile terminal is allowed to access the network to be connected, wherein the second mobile terminal is a mobile terminal which is never accessed to the network to be connected.
Further, the wireless network access system further comprises an access mode judging module, a first mark adding module and a second mark adding module. The access mode judging module acquires an access mode of a certain mobile terminal accessing a certain wireless network, when the access mode is password input access, the first mark adding module adds a first mark to corresponding wireless network password sharing information of the mobile terminal, and when the access mode is access of sweeping wireless password sharing information of other terminals, the second mark adding module adds a second mark to corresponding wireless network password sharing information of the mobile terminal.
Further, the second access judging module includes a mark judging module, a second mark processing module, a second terminal verifying module and a connection allowing module, where the mark judging module is configured to judge a type of a mark on wireless password sharing information of the first mobile terminal, if the mark is the first mark, directly make the second terminal verifying module work, the second terminal verifying module is configured to verify the second mobile terminal, if the mark is the second mark, make the second mark processing module work, the second mark processing module includes a time length in use obtaining module, a time length in use comparing module, a number ratio obtaining module and a number ratio comparing module, where the time length in use obtaining module is configured to collect a time length in use after each mobile terminal accesses a network to be connected in a preset time period, where the time length in use comparing module is configured to compare a large-small relationship between a time length in use of the first mobile terminal accessing the network to be connected and an average value of a terminal other than the first mobile terminal, and make the second terminal verifying module work when the time length in use of the first mobile terminal accessing the network to be longer than the average value, and make the second terminal work ratio verifying module work when the time length in use of the first mobile terminal is longer than the average value, and make the number of the second terminal access module work ratio obtaining a number ratio of the second terminal to be equal to a number ratio of n=n and a number of the second access threshold value to be equal to 0; after the second terminal verification module verifies the second terminal, the connection allowing module enables the second mobile terminal to directly access the network to be connected.
Further, the second terminal verification module comprises a sharing frequency acquisition module, a sharing frequency comparison module and a comprehensive reference value comparison module; the sharing frequency acquisition module is used for acquiring the sharing frequency of the wireless network password information between the first mobile terminal and the second mobile terminal in the last period, the sharing frequency comparison module compares the sharing frequency with a sharing frequency threshold, when the sharing frequency is larger than the sharing frequency threshold, the second mobile terminal passes verification, and when the sharing frequency is smaller than the sharing frequency threshold, the comprehensive reference value comparison module works; the comprehensive reference value comparison module comprises a first reference value acquisition module, a second reference value acquisition module and a comprehensive reference value calculation module, wherein the first reference value acquisition module acquires a first reference value a which is a ratio of the time length of the same network signal used by the first mobile terminal and the second mobile terminal in the latest period to the time length of the latest period, the second reference value acquisition module acquires the number b of the wireless network signals used by the second mobile terminal in the latest period and a ratio c of the longest time of the wireless network used in the latest period, and acquires c/b as a second reference value, the comprehensive reference value calculation module calculates a comprehensive reference value X=0.72×a+0.28×c/b according to the first reference value and the second reference value, compares the comprehensive reference value with a comprehensive reference threshold, and when the comprehensive reference value is larger than the comprehensive reference threshold, the second mobile terminal is verified to pass.
Further, the wireless network access system further comprises a sharing verification module, the sharing verification module comprises a time interval verification module and an identity verification module, the time interval verification module is used for collecting that the time interval between the last operation application program of the first mobile terminal and the current time is a first time interval, when the duration of the first time interval is smaller than or equal to the duration threshold, the network password sharing information to be connected of the first mobile terminal is directly displayed, when the duration of the first time interval is larger than the duration threshold, the identity verification module is used for carrying out identity verification on a user of the first mobile terminal, and after the identity verification is passed, the network password sharing information to be connected of the first mobile terminal is displayed.
A wireless network access method based on big data, the wireless network access method comprising:
when the first mobile terminal accesses a certain wireless network, the wireless network is set as a network to be connected,
when the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal, wherein the second mobile terminal is a mobile terminal which is not accessed to the network to be connected,
and acquiring information of the network to be connected and the first mobile terminal, and judging whether the second mobile terminal is allowed to access the network to be connected.
Further, the wireless network access method further includes:
obtaining an access mode of a certain mobile terminal accessing a certain wireless network, adding a first mark to corresponding wireless network password sharing information of the mobile terminal when the access mode is password input,
when the access mode is to access the wireless password sharing information of other terminals, a second mark is added to the corresponding wireless network password sharing information of the mobile terminal.
Further, the collecting the information of the network to be connected and the first mobile terminal to determine whether to allow the second mobile terminal to access the network to be connected includes:
if the first mark is added on the wireless password sharing information of the first mobile terminal, the second mobile terminal is verified,
if a second mark is added on the wireless password sharing information, acquiring the use time length of each mobile terminal after the mobile terminal is accessed to the network to be connected in a preset time period, and if the use time length of the first mobile terminal accessed to the network to be connected is longer than the average value of the use time lengths of the terminals except the first mobile terminal, verifying the second mobile terminal;
otherwise, the number Nz of the access networks to be connected and the number N0 of the access networks to be connected through the first mobile terminal are obtained, the number ratio p=n0/Nz,
if the number duty ratio is smaller than the number duty ratio threshold value, verifying the second mobile terminal;
otherwise, refusing the second mobile terminal to access the network to be connected;
and after the second mobile terminal passes the verification, the second mobile terminal directly accesses the network to be connected.
Further, the verifying the second mobile terminal includes:
obtaining the sharing times of the wireless network password information between the first mobile terminal and the second mobile terminal in the last period of time,
if the sharing times is greater than or equal to the threshold value of the sharing times, the second mobile terminal passes the verification;
if the number of shares is less than the number of shares threshold,
the method comprises the steps of collecting the ratio of the time length of the first mobile terminal and the second mobile terminal which commonly use the same network signal in the last period to the time length of the last period as a first reference value a,
acquiring the number b of the types of wireless network signals used by the second mobile terminal and the duty ratio c of the longest time of the wireless network used in the wireless network signal to the length of the latest time in the latest time period, and acquiring c/b as a second reference value;
then the integrated reference value x=0.72×a+0.28×c/b;
if the integrated reference value is greater than the integrated reference threshold value, the second mobile terminal verifies passing;
otherwise, the second mobile terminal is refused to access the network to be connected. The analysis is performed from the two aspects of the first mobile terminal and the second mobile terminal, namely from the two aspects of the sharing end and the receiving section, so that the security of accessing the wireless network and the wireless network is improved.
Further, before the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal, the method further includes:
and acquiring the time interval between the last operation application program of the first mobile terminal and the current time as a first time interval, and if the time length of the first time interval is larger than the interval duration threshold value, performing identity authentication on the user by the first mobile terminal, and displaying the network password sharing information to be connected of the first mobile terminal after the identity authentication is passed.
Compared with the prior art, the invention has the following beneficial effects: when a certain mobile terminal connected with a wireless network is connected with the wireless network by scanning other mobile terminals, the method analyzes the time length of the mobile terminal connected with the wireless network accessing the wireless network and the wireless network password shared by the mobile terminal connected with the wireless network, and the historical wireless network use condition of the mobile terminal which wants to access the wireless network through the mobile terminal connected with the wireless network, and judges whether the mobile terminal is allowed to access the wireless network through the mobile terminal connected with the wireless network, thereby improving the safety of the wireless network and the safety of the wireless network accessing process.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
fig. 1 is a schematic block diagram of a wireless network access system based on big data according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, the present invention provides the following technical solutions: the wireless network access system based on big data comprises a first access judging module, a password sharing generating module and a second access judging module, wherein the first access judging module is used for judging whether a certain mobile terminal accesses a certain wireless network, when the certain mobile terminal accesses the certain wireless network, the mobile terminal is set to be the first mobile terminal, the wireless network is a network to be connected, the password sharing generating module is used for generating network password sharing information to be connected of the first mobile terminal, and the second access judging module is used for collecting the information of the network to be connected and the first mobile terminal when the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal to judge whether the second mobile terminal is allowed to access the network to be connected, wherein the second mobile terminal is a mobile terminal which is never accessed to the network to be connected.
The wireless network access system also comprises an access mode judging module, a first mark adding module and a second mark adding module. The access mode judging module acquires an access mode of a certain mobile terminal accessing a certain wireless network, when the access mode is password input access, the first mark adding module adds a first mark to corresponding wireless network password sharing information of the mobile terminal, and when the access mode is access of sweeping wireless password sharing information of other terminals, the second mark adding module adds a second mark to corresponding wireless network password sharing information of the mobile terminal.
The second access judging module comprises a mark judging module, a second mark processing module, a second terminal verifying module and a connection allowing module, wherein the mark judging module is used for judging the type of marks on wireless password sharing information of a first mobile terminal, if the marks are first marks, the second terminal verifying module is used for verifying the second mobile terminal, if the marks are second marks, the second mark processing module is used, the second mark processing module comprises a using time length acquiring module, a using time length comparing module, a number occupation ratio acquiring module and a number occupation ratio comparing module, the using time length acquiring module is used for acquiring the using time length of each mobile terminal after the mobile terminal is accessed to a network to be connected in a preset time period, the using time length comparing module is used for comparing the big-small relation between the using time length of the first mobile terminal accessed to the network to be connected and the average value of the using time lengths of terminals except the first mobile terminal, if the using time length of the first mobile terminal accessed to the network to be connected is larger than the average value, the second terminal verifying module is used for the second terminal to be connected when the using time length of the first mobile terminal is larger than the average value, the second terminal comparing module is used for obtaining the number of the second mobile terminal to be connected to the network to be connected with a number z=a number of the second mobile terminal to be connected with a threshold value, and the number of the second mobile terminal to be connected is smaller than a threshold value of the number z; after the second terminal verification module verifies the second terminal, the connection allowing module enables the second mobile terminal to directly access the network to be connected.
The second terminal verification module comprises a sharing frequency acquisition module, a sharing frequency comparison module and a comprehensive reference value comparison module; the sharing frequency acquisition module is used for acquiring the sharing frequency of the wireless network password information between the first mobile terminal and the second mobile terminal in the last period, the sharing frequency comparison module compares the sharing frequency with a sharing frequency threshold, when the sharing frequency is larger than the sharing frequency threshold, the second mobile terminal passes verification, and when the sharing frequency is smaller than the sharing frequency threshold, the comprehensive reference value comparison module works; the comprehensive reference value comparison module comprises a first reference value acquisition module, a second reference value acquisition module and a comprehensive reference value calculation module, wherein the first reference value acquisition module acquires a first reference value a which is a ratio of the time length of the same network signal used by the first mobile terminal and the second mobile terminal in the latest period to the time length of the latest period, the second reference value acquisition module acquires the number b of the wireless network signals used by the second mobile terminal in the latest period and a ratio c of the longest time of the wireless network used in the latest period, and acquires c/b as a second reference value, the comprehensive reference value calculation module calculates a comprehensive reference value X=0.72×a+0.28×c/b according to the first reference value and the second reference value, compares the comprehensive reference value with a comprehensive reference threshold, and when the comprehensive reference value is larger than the comprehensive reference threshold, the second mobile terminal is verified to pass.
The wireless network access system further comprises a sharing verification module, the sharing verification module comprises a time interval verification module and an identity verification module, the time interval verification module is used for collecting that the time interval between the last operation application program of the first mobile terminal and the current time is a first time interval, when the duration of the first time interval is smaller than or equal to the duration threshold, the network password sharing information to be connected of the first mobile terminal is directly displayed, when the duration of the first time interval is longer than the duration threshold, the identity verification module is used for carrying out identity verification on a user of the first mobile terminal, and after the identity verification is passed, the network password sharing information to be connected of the first mobile terminal is displayed.
A wireless network access method based on big data, the wireless network access method comprising:
when the first mobile terminal accesses a certain wireless network, the wireless network is set as a network to be connected,
when the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal, wherein the second mobile terminal is a mobile terminal which is not accessed to the network to be connected, and the scanning of the network password sharing information to be connected is to scan the two-dimensional code information of the connection password of the network to be connected;
and acquiring information of the network to be connected and the first mobile terminal, and judging whether the second mobile terminal is allowed to access the network to be connected.
The wireless network access method further comprises the following steps:
obtaining an access mode of a certain mobile terminal accessing a certain wireless network, adding a first mark to corresponding wireless network password sharing information of the mobile terminal when the access mode is password input,
when the access mode is to access the wireless password sharing information of other terminals, adding a second mark to the corresponding wireless network password sharing information of the mobile terminal, and if the first mobile terminal is also accessed to the network to be connected in a mode of scanning the sharing information of other mobile terminals, adding the second mark to the network password sharing information to be connected of the first mobile terminal;
the step of collecting the information of the network to be connected and the first mobile terminal to judge whether the second mobile terminal is allowed to access the network to be connected comprises the following steps:
if the first mark is added on the wireless password sharing information of the first mobile terminal, the second mobile terminal is verified,
if a second mark is added on the wireless password sharing information, acquiring the use time length of each mobile terminal after the mobile terminal is accessed to the network to be connected in a preset time period, and if the use time length of the first mobile terminal accessed to the network to be connected is longer than the average value of the use time lengths of the terminals except the first mobile terminal, verifying the second mobile terminal;
otherwise, the number Nz of the access networks to be connected and the number N0 of the access networks to be connected through the first mobile terminal are obtained, the number ratio p=n0/Nz,
if the number duty ratio is smaller than the number duty ratio threshold value, verifying the second mobile terminal;
otherwise, refusing the second mobile terminal to access the network to be connected;
when the second mobile terminal passes the verification, the second mobile terminal is directly accessed to the network to be connected; the method is used for verifying the first mobile terminal and preventing the first mobile terminal from maliciously sharing the password information of the network to be connected; when the duration of the first mobile terminal using the network to be connected is relatively short, whether the first mobile terminal threatens the uncertainty of the network to be connected is relatively high, and after the mobile terminals accessing the wireless network through the first mobile terminal are relatively more, the wireless network is easy to be congested, and other terminals are influenced to use the wireless network;
the verifying the second mobile terminal comprises the following steps:
acquiring the sharing times of the wireless network password information between the first mobile terminal and the second mobile terminal in the last period, wherein the sharing times are the sum of the times that the wireless network password sharing information of the first mobile terminal is accessed to the wireless network by scanning the wireless network password of the second mobile terminal and the times that the wireless network password sharing information of the second mobile terminal is accessed to the wireless network by scanning the wireless network password of the first mobile terminal;
if the sharing times is greater than or equal to the threshold value of the sharing times, the second mobile terminal passes the verification;
if the number of shares is less than the number of shares threshold,
collecting the ratio of the time length of the first mobile terminal and the second mobile terminal which jointly use the same network signal to the time length of the last period as a first reference value a, wherein a is equal to the time length of the first mobile terminal and the second mobile terminal which jointly use the same network signal divided by the time length of the last period;
acquiring the number b of the types of wireless network signals used by the second mobile terminal and the duty ratio c of the longest time of the wireless network used in the wireless network signal to the length of the latest time in the latest time period, and acquiring c/b as a second reference value; acquiring the using time length of the wireless network used by the second mobile terminal in the last period, sequencing the using time length of each wireless network according to the sequence from the long to the short, selecting the first using time length of sequencing divided by the last period of time length to obtain a duty ratio c, and multiplying the duty ratio c by 1/b to obtain a second reference value; when the second mobile terminal uses a plurality of wireless network types in a certain time period, namely the frequency of switching the wireless network is higher, and the duration of the wireless network is very short, the threat of the second mobile terminal to the wireless network is higher;
then the integrated reference value x=0.72×a+0.28×c/b;
if the integrated reference value is greater than the integrated reference threshold value, the second mobile terminal verifies passing; verifying the second mobile terminal to prevent the second terminal from maliciously connecting to the wireless network;
otherwise, the second mobile terminal is refused to access the network to be connected.
Before the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal, the method further comprises the following steps:
collecting a time interval between the last operation application program of the first mobile terminal and the current time as a first time interval, if the time length of the first time interval is larger than an interval duration threshold value, carrying out identity authentication on a user by the first mobile terminal, and displaying network password sharing information to be connected of the first mobile terminal after the identity authentication is passed; if the first time interval duration is smaller than or equal to the interval duration threshold, directly displaying network password sharing information to be connected of the first mobile terminal; the last operation application program of the first mobile terminal can be that the user replies information sent by others on the mobile terminal, the user searches on a webpage of the mobile terminal, the user browses on an e-commerce website, and the identity verification can be password verification, fingerprint verification, face recognition verification and the like.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Finally, it should be noted that: the foregoing description is only a preferred embodiment of the present invention, and the present invention is not limited thereto, but it is to be understood that modifications and equivalents of some of the technical features described in the foregoing embodiments may be made by those skilled in the art, although the present invention has been described in detail with reference to the foregoing embodiments. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (3)
1. The wireless network access system based on big data is characterized by comprising a first access judging module, a password sharing generating module and a second access judging module, wherein the first access judging module is used for judging whether a certain mobile terminal is accessed to a certain wireless network, when the certain mobile terminal is accessed to the certain wireless network, the mobile terminal is set to be the first mobile terminal, the wireless network is a network to be connected, the password sharing generating module is used for generating network password sharing information to be connected of the first mobile terminal, and the second access judging module is used for collecting the information of the network to be connected and the first mobile terminal when the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal to judge whether the second mobile terminal is allowed to access the network to be connected, wherein the second mobile terminal is a mobile terminal which is never accessed to the network to be connected;
the wireless network access system also comprises an access mode judging module, a first mark adding module and a second mark adding module; the access mode judging module acquires an access mode of a certain mobile terminal accessing a certain wireless network, when the access mode is password input access, the first mark adding module adds a first mark to corresponding wireless network password sharing information of the mobile terminal, and when the access mode is wireless network password sharing information of other mobile terminals access, the second mark adding module adds a second mark to corresponding wireless network password sharing information of the mobile terminal; the second access judging module comprises a mark judging module, a second mark processing module, a second mobile terminal verifying module and a connection allowing module, wherein the mark judging module is used for judging the type of marks on the wireless network password sharing information of the first mobile terminal, if the marks are first marks, the second mobile terminal verifying module is used for verifying the second mobile terminal, if the marks are second marks, the second mark processing module is used, the second mark processing module comprises a use time length acquiring module, a use time length comparing module, a number occupation ratio acquiring module and a number occupation ratio comparing module, the use time length acquiring module is used for acquiring the use time length of each mobile terminal after the mobile terminal is accessed to a network to be connected in a preset time period, the use time length comparing module is used for comparing the large-small relation between the use time length of the first mobile terminal accessed to the network to be connected and the average value of the use time length of the mobile terminals except the first mobile terminal, when the use time length of the first mobile terminal accessed to the network to be connected is larger than the average value, the second mobile terminal is enabled to be verified to be longer than the average value, the number of the second mobile terminal is enabled to be connected to be smaller than the average value, the number of the second mobile terminal is enabled to be connected to be equal to the number of the second mobile terminals to be connected to the network to be connected in a preset time period, the number of the network to be connected with a number of the mobile terminal to be equal to be connected with a threshold value, and the number of the mobile terminals to be connected to be equal to be smaller than the number to Z; after the second mobile terminal verification module verifies the second mobile terminal, the connection allowing module enables the second mobile terminal to directly access the network to be connected;
the access method of the wireless network access system comprises the following steps: when a first mobile terminal accesses a certain wireless network, setting the wireless network as a network to be connected, and when a second mobile terminal scans the password sharing information of the network to be connected of the first mobile terminal, wherein the second mobile terminal is a mobile terminal which is never accessed to the network to be connected, acquiring the information of the network to be connected and the first mobile terminal, and judging whether the second mobile terminal is allowed to be accessed to the network to be connected; the wireless network access method further comprises the following steps: acquiring an access mode of a certain mobile terminal accessing a certain wireless network, adding a first mark to corresponding wireless network password sharing information of the mobile terminal when the access mode is password input access, and adding a second mark to corresponding wireless network password sharing information of the mobile terminal when the access mode is password sweeping access of other mobile terminals;
the step of collecting the information of the network to be connected and the first mobile terminal to judge whether the second mobile terminal is allowed to access the network to be connected comprises the following steps: if the wireless network password sharing information of the first mobile terminal is added with a first mark, verifying the second mobile terminal, if the wireless network password sharing information is added with a second mark, collecting the use duration of each mobile terminal after being accessed into a network to be connected in a preset time period, and if the use duration of the first mobile terminal when being accessed into the network to be connected is longer than the average value of the use durations of the mobile terminals except the first mobile terminal, verifying the second mobile terminal; otherwise, the number Nz of the mobile terminals accessing the network to be connected and the number N0 of the mobile terminals accessing the network to be connected through the first mobile terminal are obtained, the number ratio P=N0/Nz is calculated, and if the number ratio is smaller than the number ratio threshold value, the second mobile terminal is verified; otherwise, refusing the second mobile terminal to access the network to be connected; and after the second mobile terminal passes the verification, the second mobile terminal directly accesses the network to be connected.
2. A big data based wireless network access system according to claim 1, wherein: the verifying the second mobile terminal comprises the following steps: acquiring the sharing times of the wireless network password sharing information between the first mobile terminal and the second mobile terminal in the last period, and if the sharing times are greater than or equal to a sharing times threshold value, verifying the second mobile terminal to pass; if the sharing frequency is smaller than the sharing frequency threshold, acquiring a first reference value a which is the ratio of the time length of the first mobile terminal and the time length of the second mobile terminal which jointly use the same network signal in the last period of time to the time length of the last period of time, acquiring the number b of types of wireless network signals used by the second mobile terminal in the last period of time and the ratio c of the longest time of the wireless network used in the second mobile terminal to the time length of the last period of time, and acquiring c/b as a second reference value; then the integrated reference value x=0.72×a+0.28×c/b; if the integrated reference value is greater than the integrated reference threshold value, the second mobile terminal verifies passing; otherwise, the second mobile terminal is refused to access the network to be connected.
3. A big data based wireless network access system according to claim 2, wherein: before the second mobile terminal scans the network password sharing information to be connected of the first mobile terminal, the method further comprises the following steps: and acquiring the time interval between the last operation application program of the first mobile terminal and the current time as a first time interval, and if the time length of the first time interval is larger than the interval duration threshold value, performing identity authentication on the user by the first mobile terminal, and displaying the network password sharing information to be connected of the first mobile terminal after the identity authentication is passed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210420337.2A CN114828003B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system based on big data |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210420337.2A CN114828003B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system based on big data |
CN202110354300.XA CN113099454B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system and method based on big data |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110354300.XA Division CN113099454B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system and method based on big data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114828003A CN114828003A (en) | 2022-07-29 |
CN114828003B true CN114828003B (en) | 2024-02-13 |
Family
ID=76672604
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110354300.XA Active CN113099454B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system and method based on big data |
CN202210420337.2A Active CN114828003B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system based on big data |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110354300.XA Active CN113099454B (en) | 2021-04-01 | 2021-04-01 | Wireless network access system and method based on big data |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN113099454B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
CN110113250A (en) * | 2019-04-24 | 2019-08-09 | 上海连尚网络科技有限公司 | A method of wireless access point is shared by instant message applications |
CN111010663A (en) * | 2018-10-08 | 2020-04-14 | 腾讯科技(深圳)有限公司 | Information sharing method and device, storage medium and computer equipment |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8909247B2 (en) * | 2011-11-08 | 2014-12-09 | At&T Mobility Ii Llc | Location based sharing of a network access credential |
CN104519020B (en) * | 2013-09-29 | 2017-10-13 | 阿里巴巴集团控股有限公司 | Manage method, server and the system of wireless network login password sharing function |
-
2021
- 2021-04-01 CN CN202110354300.XA patent/CN113099454B/en active Active
- 2021-04-01 CN CN202210420337.2A patent/CN114828003B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107295519A (en) * | 2017-08-21 | 2017-10-24 | 深圳市信锐网科技术有限公司 | A kind of wireless network access method, apparatus and system |
CN111010663A (en) * | 2018-10-08 | 2020-04-14 | 腾讯科技(深圳)有限公司 | Information sharing method and device, storage medium and computer equipment |
CN110113250A (en) * | 2019-04-24 | 2019-08-09 | 上海连尚网络科技有限公司 | A method of wireless access point is shared by instant message applications |
Also Published As
Publication number | Publication date |
---|---|
CN113099454A (en) | 2021-07-09 |
CN113099454B (en) | 2022-06-03 |
CN114828003A (en) | 2022-07-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110602691B (en) | Mobile communication method and device based on block chain network | |
US6157825A (en) | Cellular telephone anti-fraud system | |
WO2015154454A1 (en) | Wireless network connection method and device | |
KR20090036562A (en) | Method and system for controlling access to networks | |
CN107086979B (en) | User terminal verification login method and device | |
TW200307441A (en) | Method and system for authenticating user of data transfer device | |
CN111552932A (en) | Identity authentication method and device, electronic equipment and readable storage medium | |
CN106961683B (en) | Method and system for detecting illegal AP and discoverer AP | |
CN105101191B (en) | The method and device of wlan security mechanism setting | |
CN108540979A (en) | Pseudo- AP detection method and device based on fingerprint characteristic | |
CN111064711A (en) | Block chain-based data stream detection method and device and server | |
GB2393073A (en) | Certification scheme for hotspot services | |
CN103929723B (en) | Junk short message recognition method and device | |
CN114828003B (en) | Wireless network access system based on big data | |
CN103180861A (en) | User verification device and user verification method | |
CN110730488B (en) | Communication method, device, terminal and system based on block chain network | |
CN115474194A (en) | Security authentication method, device, equipment and storage medium | |
CN113536277A (en) | Authentication method, system, server, client and storage medium | |
CN102264070B (en) | Method and equipment for providing service data and executing access service | |
CN112235317B (en) | Third-party application login system and method based on big data | |
CN109379744B (en) | Pseudo base station identification method and device and communication terminal | |
CN112019483A (en) | Short message verification system and method for position authorization and verification of short message verification code | |
CN105472616A (en) | Wireless access point connection method and electronic equipment | |
GB2463732A (en) | A method and system of controlling access to a resource dependent on the location of the user | |
CN115174220B (en) | Physical layer security authentication method based on dynamic time warping |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20231224 Address after: Room A6-20E, Huijin Building B, Huijin City Commercial Plaza, Haiyuan Road, Kunming High tech Zone, Kunming City, Yunnan Province, 650106 Applicant after: Yunnan Feixin Technology Co.,Ltd. Address before: 215000 No.81 middle Changjiang Road, Kunshan City, Suzhou City, Jiangsu Province Applicant before: Wan Lamei |
|
GR01 | Patent grant | ||
GR01 | Patent grant |