WO2019024733A1 - 无线接入点认证信息的查询方法与设备 - Google Patents

无线接入点认证信息的查询方法与设备 Download PDF

Info

Publication number
WO2019024733A1
WO2019024733A1 PCT/CN2018/096992 CN2018096992W WO2019024733A1 WO 2019024733 A1 WO2019024733 A1 WO 2019024733A1 CN 2018096992 W CN2018096992 W CN 2018096992W WO 2019024733 A1 WO2019024733 A1 WO 2019024733A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless access
access point
authentication information
user equipment
server
Prior art date
Application number
PCT/CN2018/096992
Other languages
English (en)
French (fr)
Inventor
吴培希
Original Assignee
上海连尚网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海连尚网络科技有限公司 filed Critical 上海连尚网络科技有限公司
Publication of WO2019024733A1 publication Critical patent/WO2019024733A1/zh
Priority to US16/776,537 priority Critical patent/US20200169884A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/20Selecting an access point
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present application relates to the field of information technology, and in particular, to a method and device for querying wireless access point authentication information.
  • a user who continuously moves needs to access a wireless access point having a different coverage range, and thus needs to continuously obtain authentication information of the currently shared accessible wireless access point.
  • the first solution is to deliver all or a large number of wireless access point authentication information to the user equipment in advance, and the second scheme is based on the scanned wireless connection.
  • the in-point list queries the server for the authentication information of the wireless access point in real time.
  • Scheme 1 has a large security risk because a large number of wireless access point authentication information is stored on the user equipment; scheme 2 can query the authentication information of the wireless access point in real time, but since the user's mobile terminal device is every 10 seconds The surrounding channel will be scanned. If the scanned wireless access point changes, the authentication information of the wireless access point needs to be re-queried to the server. If the query is not performed, the wireless access point authentication information may not be updated in time, but frequently. The query not only increases the load pressure on the server side, but also consumes user data traffic.
  • An object of the present invention is to provide a method and a device for querying wireless access point authentication information, which are used to solve the problem that the user equipment frequently requests the wireless access point authentication information to cause excessive pressure on the server end in the prior art.
  • the present application provides a method for querying wireless access point authentication information on a server side, where the method includes:
  • the query request sent by the user equipment is obtained, and the target wireless access point is determined according to the query request, including:
  • the wireless access point included in the scan list is determined as the target wireless access point.
  • the method further includes:
  • the association rules include:
  • the associated wireless access point of any wireless access point includes other wireless access points in one or more scan lists that include the wireless access point.
  • the authentication information includes a hotspot password and/or whether there is a hotspot password identifier.
  • the present application further provides a method for querying wireless access point authentication information at a user equipment end, where the method includes:
  • the authentication information cache Querying, in the authentication information cache, the authentication information of the target wireless access point, where the authentication information cache is used to save the authentication information of the wireless access point acquired from the server;
  • the authentication information of the target wireless access point exists in the authentication information cache, the authentication information of the target wireless access point is read;
  • the authentication information of the target wireless access point and its associated wireless access point determined by the server based on the query request is received and saved.
  • determining the target wireless access point that needs to be queried includes:
  • the wireless access point included in the scan list is determined as the target wireless access point.
  • the authentication information includes a hotspot password and/or whether there is a hotspot password identifier.
  • the authentication information of the target wireless access point and the associated wireless access point determined by the server based on the query request sent by the server further includes:
  • the authentication information in the authentication information cache is sequentially deleted in chronological order.
  • the authentication information of the target wireless access point and the associated wireless access point determined by the server based on the query request sent by the server further includes:
  • the authentication information in the authentication information cache is used to connect to the corresponding wireless access point, the authentication information is deleted from the authentication information cache.
  • the present application provides an apparatus for querying wireless access point authentication information at a server side, the apparatus including a memory for storing computer program instructions and a processor for executing program instructions. Wherein, when the computer program instruction is executed by the processor, the device is triggered to perform the foregoing method for querying the wireless access point authentication information at the server end.
  • the present application further provides an apparatus for querying wireless access point authentication information at a user equipment end, the apparatus comprising a memory for storing computer program instructions and a processor for executing program instructions, wherein When the computer program instructions are executed by the processor, the device is triggered to perform the foregoing method for querying the wireless access point authentication information at the user equipment end.
  • the present application also provides a computer readable medium having stored thereon computer readable instructions executable by a processor to implement the aforementioned method for querying wireless access point authentication information at a server side and A method for querying wireless access point authentication information at a user equipment end.
  • the solution provided by the present application can obtain the determined target wireless access point according to the wireless access point scan list sent by the user, and further obtain the authentication information of the corresponding wireless access point and save the information to the user mobile device.
  • first search for the corresponding wireless access point authentication information in the user mobile device and submit the query request to the server only if the corresponding authentication information does not exist in the mobile device, thereby reducing interaction with the server.
  • the number of times reduces the load pressure on the server, saves data traffic of the user's mobile device, and ensures timely update of the wireless access point authentication information on the user's mobile device.
  • FIG. 1 is a flowchart of a method for querying wireless access point authentication information on a server side according to an embodiment of the present application.
  • FIG. 2 is a flowchart of a method for querying wireless access point authentication information at a user equipment end according to an embodiment of the present disclosure.
  • FIG. 3 is a schematic diagram of a preferred association process for generating a scan list according to a user equipment according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic diagram of a target wireless access point returned by a server and an associated wireless access point thereof according to an embodiment of the present disclosure.
  • FIG. 5 is a schematic diagram of a user equipment accessing a corresponding wireless access point by using authentication information in a local cache in a mobile scenario according to an embodiment of the present disclosure.
  • the terminal, the device of the service network, and the trusted party each include one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage,
  • computer readable media does not include non-transitory computer readable media, such as modulated data signals and carrier waves.
  • the embodiment of the present application provides a method for querying the wireless access point authentication information on the server side. As shown in FIG. 1 , the method specifically includes the following steps:
  • Step S101 Acquire a query request sent by the user equipment, and determine a target wireless access point according to the query request.
  • Step S102 determining, according to the association rule, a wireless access point associated with the target wireless access point
  • Step S103 Acquire authentication information of the target wireless access point and its associated wireless access point
  • Step S104 Send the authentication information to the user equipment.
  • the solution is particularly suitable for a scenario in which a user equipment enters a different wireless access point coverage when moving and needs to obtain authentication information of an accessible shared wireless access point, and can scan according to a wireless access point provided by the user equipment.
  • the list determines a plurality of wireless access points associated with the wireless access point in the scan list, and further returns the obtained authentication information of the wireless access point and its associated wireless access point to the user equipment for use by the user equipment for authentication.
  • Information is accessed to the corresponding wireless access point, as shown in Figure 5.
  • the terminal in the figure is the user equipment, and the scanned hotspot is a wireless access point, and the associated hotspot is a wireless access point that is associated with the scanned wireless access point.
  • the user equipment refers to a mobile terminal device that the user can carry and can be used to connect to the wireless access point, and the user equipment obtains the access permission to the wireless access point by providing a corresponding access password to the wireless access point. Thereby accessing the internet through the wireless access point.
  • a wireless access point that is, a wifi hotspot, is used to provide a network access service to a wireless user. It is a bridge between a wireless network and a wired network, and provides a wireless signal covering a certain range, and the coverage can be spherical.
  • the identifier of the wireless access point is an SSID (Service Set Identifier), and the wireless access user identifies different wireless access points by using the SSID.
  • the access access of the wireless access point can be set to use the password and not to use the password.
  • the access of the wireless access point needs to provide an access password to avoid unauthorized users. At present, many commercial users such as restaurants, coffee shops, shopping malls, etc. will provide free wireless access points for other users.
  • the access information such as the access password and the authentication information are saved and inquired, so that multiple service providers can provide the access, storage, query and update services of the wireless access point authentication information, and the wireless access user does not need to find the wireless access.
  • the authentication information of the point can be obtained by the wireless access point authentication information service provided by the service provider, and the authentication information of the wireless access point to be connected can be obtained, and then the wireless access point is further accessed and the Internet is accessed.
  • the mobile terminal device periodically scans the surrounding wireless channel to obtain a wireless access point that can be used for access. Since one wireless access point has a certain coverage, the user's mobile terminal device scans through the wireless channel. The number of wireless access points is often multiple. The scanned multiple access points are scanned lists obtained by the user equipment. The user can determine which wireless access point to connect by selecting the identifier of the wireless access point in the scan list.
  • the wireless channel is also referred to as a channel, a frequency band, and is a data signal transmission channel that uses a wireless signal (electromagnetic wave) as a transmission carrier.
  • the wireless access point can operate on multiple wireless channels.
  • the center frequency of channel 1 is 2412MHz, the frequency range is 2401 ⁇ 2423MHz, the center frequency of channel 2 is 2417MHz, the frequency range is 2406 ⁇ 2428MHz, the center frequency of channel 6 is 2437MHz, and the frequency range is 2426 ⁇ 2448MHz.
  • the center frequency of 11 is 2462 MHz, and its frequency range is 2451 to 2473 MHz. It can be seen that the frequency ranges used by the three channels 1, 6, and 11 are completely uninterrupted, that is, three mutually non-overlapping channels are often said, and the wireless access points using the three channels respectively are not generated. Signal interference.
  • the user equipment scans the wireless channel to obtain a scan list.
  • the scan list includes all searchable wireless access points.
  • the identifier of the wireless access point ie, the SSID
  • the identifier of the wireless access point is usually readable.
  • the string is convenient for the user to identify different wireless access points. For example, a user obtains a scan list through one wireless channel scan.
  • the scan list includes three wireless access points, and the identifiers are AP1, AP2, and AP3, respectively.
  • the user equipment After obtaining the scan list, the user equipment needs to submit a query request to the background server that stores a large number of wireless access point authentication information in order to obtain the authentication information corresponding to the wireless access point in the scan list, and the background server queries the corresponding authentication information.
  • the query request sent by the user equipment includes a scan list obtained by scanning through the wireless channel, and the scan list includes the identifier of the wireless access point.
  • the user equipment may have access to other wireless access points or may not be connected to the wireless device. If the access point is not connected to the wireless access point, the user equipment needs to submit a query request to the background server through its own mobile data connection such as GPRS, 3G or 4G network. If other wireless access points have been accessed, the user equipment can pass The accessed wireless access point submits a query request to the server.
  • the authentication information of the wireless access point includes a hotspot password and/or whether there is a hotspot password identifier
  • the hotspot password is an access password used to verify the validity of the user's access, and only the user who can provide the legal access password is Allow access
  • the SSID of a wireless access point is “ChinaNet-S2G4”
  • the corresponding access password is “123456”.
  • the authentication information of the wireless access point may also include additional information such as a router MAC address, a router encryption method, a communication channel, and the like.
  • the background server first obtains whether the wireless access point has a hotspot password identifier, and if the hotspot password identifier in the authentication information of the wireless access point is true, the wireless access point is If there is a password, the next step is to obtain the corresponding hotspot password. If the hotspot password is false in the authentication information of the wireless access point, the wireless access point has no password, and the next step is to obtain the hot password. operating.
  • the background server directly sends the identifier and the password together. Therefore, the solution of the embodiment of the present application can perform database query according to actual requirements, avoiding invalid query operations, reducing database resource consumption, and improving query efficiency.
  • the server After receiving the query request submitted by the user equipment, the server needs to determine the wireless access point therein as the wireless access point for which the authentication information is to be searched, that is, the target wireless access point, and the server saves according to the target wireless access point.
  • the query of the wireless access point authentication information is obtained, and the corresponding authentication information is obtained. If there is no corresponding authentication information in the database, the corresponding authentication information is set to a null value.
  • the server queries by using the identity of the target wireless access point. Since the query request includes multiple wireless access points, the target wireless access point may be only one wireless access point selected by the user, or may be a set including multiple wireless access points.
  • the server After the server obtains the target wireless access point as the query input, it needs to expand the wireless access point to be queried before performing the authentication information query. Since the wireless access point included in the scan list sent by the user equipment is only the scan result obtained when the user is in a certain position during the mobile process, the user may have moved to some of the returned wireless access point authentication information. Outside the coverage of the wireless access point, and within the coverage of some new wireless access points, it is necessary to submit a new scan list to the server, even if the user can temporarily stay to access the wireless access to the authentication information. Point, but as long as the user moves beyond the coverage of the wireless access point, a new wireless access point query request needs to be sent to the server. Therefore, continuous real-time authentication information query not only increases the response pressure of the server, but also continuously consumes the user's data traffic, which is not a good solution.
  • the embodiment of the present application expands the wireless access point to be queried to include a set of target wireless access points and their associated wireless access points by using an association rule of the wireless access point, as shown in FIG. 4 .
  • the terminal in the figure is the user equipment
  • the scanned hotspot is the wireless access point
  • the neighbor hotspot is the associated wireless access point.
  • the solution provided by the embodiment of the present application further performs a deduplication operation on the extended wireless access point, removes the repeated wireless access point according to the SSID of the wireless access point, and then according to the de-weighted wireless access point set. Query the authentication information.
  • the associated wireless access point of a certain wireless access point may be referred to as a geographic location and the other wireless access point.
  • the wireless access points are adjacent to each other, and the coverage of the respective wireless signals has a certain overlapping wireless access point.
  • the user may move from the coverage of one wireless access point to the coverage of its associated wireless access point while moving, so continuous Internet access can be achieved by successively accessing the wireless access point and its associated wireless access point. Reduce the possibility of disconnection from the Internet.
  • the association rules between the wireless access point and its associated wireless access point are pre-established and continuously updated, for example, based on the most recently obtained scan list.
  • the method for determining the associated wireless access point of a certain wireless access point in the embodiment of the present application is to determine that all the wireless access points in the same scan list sent by the user equipment are associated with each other, that is, the same scan list.
  • the associated wireless access point of any one of the wireless access points is all other wireless access points in the scan list except the wireless access point, for example, a user equipment terminal received by the server in an authentication information query scenario. 1
  • the scan list sent as shown in FIG.
  • the server may establish a mapping table for each wireless access point and its associated wireless access point, and when the user submits the query request, query the corresponding associated wireless access point according to the submitted wireless access point, due to the submitted There may be multiple wireless access points, so there may be more than one associated wireless access point in the final query. More specifically, the server establishes a mapping database table to the SSID of the associated wireless access point through the identity of the wireless access point, ie, the SSID.
  • association rules have been established on the server: "Associated wireless access point of AP1 is ⁇ AP2, AP3 ⁇ ", "Associated wireless access point of AP2 is ⁇ AP1, AP3 ⁇ ", "Association of AP3"
  • the wireless access point is ⁇ AP1, AP2 ⁇ .
  • the server When a user makes a query request to the server for the wireless access point AP1 that wants to access, the server first determines AP1 as the target wireless access point, and then associates The rule set is to find the association rule related to AP1.
  • the associated association rule is "AP1's associated wireless access point is ⁇ AP2, AP3 ⁇ ". It can be seen that the associated wireless access point of AP1 is AP2 and AP3.
  • the association rule obtained by the server for querying AP1 and AP2 respectively is "the associated wireless access point of AP1 is ⁇ AP2, AP3 ⁇ ", " AP2's associated wireless access point is ⁇ AP1, AP3 ⁇ , and the repeated wireless access points in the associated wireless access point set are removed, and the associated wireless access points of ⁇ AP1, AP2 ⁇ are finally obtained as ⁇ AP1, AP2, AP3. ⁇ .
  • the association rules established on the server are not static. Since the information of the wireless access point changes frequently, the associated association rules also need to be continuously updated to adapt to the changed wireless access environment.
  • the server still adds the new associated wireless access point of a certain wireless access point to the association rule by using the scan list submitted by the user equipment as the basis for updating the association rule.
  • An associated wireless access point for any wireless access point includes other wireless access points in one or more scan lists that include the wireless access point.
  • the user equipment terminal 2 submits a new scan list, which includes three wireless access points, and the identifiers are: AP1, AP4, and AP5, as shown in FIG. 3, the server receives the scan.
  • the association rule of the AP1 is updated to "AP1's associated wireless access point is ⁇ AP2, AP3, AP4, AP5 ⁇ ", and the two new associated wireless access points AP4 and AP5 are added to the association rule of AP1.
  • a user submits an authentication information query request of AP1, and the server queries the associated wireless access point of AP1 as ⁇ AP2, AP3, AP4, AP5 ⁇ .
  • the server expands the target wireless access point, and the obtained result includes a set of the target wireless access point and its associated wireless access point, and the number of wireless access points in the set may be one or more, and then The wireless access point in this set queries the corresponding authentication information in the database, and the simplest authentication information only contains the access password information.
  • the server receives the query request submitted by the user for the wireless access point AP1, and obtains the associated wireless access point of AP1 as ⁇ AP2, AP3, AP4, AP5 ⁇ after querying the association rule of AP1, and then wirelessly
  • the access point set ⁇ AP1, AP2, AP3, AP4, AP5 ⁇ queries the corresponding access password, and obtains the corresponding information of the wireless access point and the access password ⁇ "AP1", “PASS1" ⁇ , ⁇ "AP2", “ PASS2” ⁇ , ⁇ “AP3”, “PASS3” ⁇ , ⁇ “AP4”, “PASS4” ⁇ , ⁇ “AP5”, “PASS5” ⁇ .
  • the server After the server obtains the authentication information corresponding to the target wireless access point and its associated wireless access point, the server returns the authentication information to the user equipment that submits the query request for storage by the user equipment.
  • the embodiment of the present application further provides a method for querying the wireless access point authentication information at the user equipment end. As shown in FIG. 2, the method specifically includes the following steps:
  • S205 Receive and save, by the server, authentication information of the target wireless access point and its associated wireless access point determined according to the query request.
  • the solution is used to query the locally stored wireless access point authentication information at the user equipment end and submit the authentication information query request of the target wireless access point to the server.
  • An object of the present application is to reduce the interaction with the server. Therefore, the server returns the authentication information of the submitted wireless access point and the associated wireless access point to the user equipment when receiving the first query request of the user equipment.
  • the user equipment end saves the received authentication information in the local cache, and first searches the local cache for the authentication information of the wireless access point when the scan list changes, and then submits the query request to the server without checking.
  • the scheme first obtains a list of wireless access points obtained by channel scanning, and the wireless access point list is a scan list, and then the wireless access point included therein is determined as a target wireless access point, and the target wireless access point is to be obtained.
  • the wireless access point of the authentication information may also be the wireless access point that the user wants to access. Therefore, the target wireless access point may be one or more, and is determined according to a specific situation.
  • the target wireless access points are distinguished by their respective identification information.
  • the user equipment After the target wireless access point is obtained, the user equipment needs to obtain the authentication information of at least one wireless access point in the target wireless access point for wireless access.
  • the solution provided in the embodiment of the present application is to first search for the authentication information corresponding to the target wireless access point in the local authentication information cache, and if the corresponding authentication information can be found, the corresponding authentication can be directly read from the authentication information cache. Information, there is no need to make a query request to the target wireless access point to the server. If the user equipment is the first time to install the client APP provided by the wireless access authentication information service provider, the local authentication information cache has no data, and the corresponding wireless access point authentication information query request needs to be submitted and the authentication information returned according to the server end. Fill it up.
  • the policy may choose not to send a query request to the server, and only access the corresponding wireless access in the local authentication information cache.
  • the wireless access point in the local authentication information cache that does not have the corresponding authentication information may be sent to the server as the wireless access point to be queried to obtain the authentication information of the wireless access points.
  • the scan list obtained by the user equipment end through channel scanning includes three wireless access points: AP1, AP2, and AP3. In this case, the local authentication information cache is first searched, and one data exists in the local authentication information cache.
  • the target wireless access point AP2 can query the corresponding authentication information "PASS2", so that the wireless access point AP2 can be accessed by reading the authentication information from the cache, or Send a query request of AP1 and AP3 to the server to obtain corresponding authentication information.
  • the user equipment end may submit a query request of the target wireless access point to the server to obtain the authentication information. And after receiving the authentication information of the target wireless access point and its associated wireless access point sent by the server, the authentication information is saved in the local authentication information cache for later query and use. Taking the foregoing scenario as an example, the user equipment obtains a scan list including three wireless access points AP1, AP2, and AP3, if there is no authentication information of any one of AP1, AP2, and AP3 in the local authentication information cache.
  • the user equipment submits ⁇ AP1, AP2, AP3 ⁇ as the target wireless access point to the server, and the server expands it to ⁇ AP1, AP2, AP3, AP4, AP5 ⁇ , where AP4 and AP5 are associated wireless connections of AP1.
  • query the database that holds the authentication information to obtain the authentication information ⁇ "AP1", “PASS1" ⁇ , ⁇ "AP3", “PASS3" ⁇ , ⁇ "AP5", "PASS5" ⁇ , and the user equipment receiving server returns The authentication information corresponding to AP1, AP3, and AP5 is saved in the authentication information cache.
  • the capacity of the content of the local authentication information cache can be preset in advance in order to avoid the information leakage problem caused by the increase of the cache information in the cache, and the performance of the cache information.
  • An upper limit value so that when the newly acquired wireless access point authentication information is saved, it is determined that the upper limit value of the capacity is not exceeded, and if it is exceeded, the authentication information in the local authentication information cache is deleted in time sequence, and the specific time standard may be Set according to the user's needs, such as the time of the last use, the latest update information update time, and so on.
  • the authentication information stored in the cache is found to be connected to the corresponding wireless access point after the failure, which indicates that the authentication information of the wireless access point has changed, and the authentication information in the current cache has expired, so
  • the invalid authentication information is cleared from the authentication information cache, and the wireless access point corresponding to the invalidation authentication information may be further submitted to the server to notify the wireless access point that the wireless access point has failed, and the server end performs corresponding to the wireless access point. Failure handling.
  • the embodiment of the present application further provides an apparatus for querying wireless access point authentication information on a server side, where the apparatus includes a memory for storing computer program instructions and a processor for executing program instructions, wherein the computer When the program instructions are executed by the processor, the device is triggered to perform the aforementioned method for querying the wireless access point authentication information at the server side.
  • the embodiment of the present application further provides an apparatus for querying wireless access point authentication information at a user equipment end, where the apparatus includes a memory for storing computer program instructions and a processor for executing program instructions, where When the computer program instructions are executed by the processor, the device is triggered to perform the foregoing method for querying the wireless access point authentication information at the user equipment end.
  • the embodiment of the present application further provides a computer readable medium having stored thereon computer readable instructions executable by a processor to implement the foregoing method for querying wireless access point authentication information at a server end.
  • the solution provided by the present application can obtain the determined target wireless access point according to the wireless access point scan list sent by the user, and further obtain the authentication information of the corresponding wireless access point and save the information to the user mobile device.
  • first search for the corresponding wireless access point authentication information in the user mobile device and submit the query request to the server only if the corresponding authentication information does not exist in the mobile device, thereby reducing the number of interactions with the server.
  • Reduce the load pressure on the server save the data traffic of the user's mobile device, and ensure the timely update of the wireless access point authentication information on the user's mobile device.
  • the present application can be implemented in software and/or a combination of software and hardware, for example, using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • the software program of the present application can be executed by a processor to implement the steps or functions described above.
  • the software programs (including related data structures) of the present application can be stored in a computer readable recording medium such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some of the steps or functions of the present application may be implemented in hardware, for example, as a circuit that cooperates with a processor to perform various steps or functions.
  • a portion of the present application can be applied as a computer program product, such as computer program instructions, which, when executed by a computer, can invoke or provide a method and/or technical solution in accordance with the present application.
  • the program instructions for invoking the method of the present application may be stored in a fixed or removable recording medium, and/or transmitted by a data stream in a broadcast or other signal bearing medium, and/or stored in a The working memory of the computer device in which the program instructions are run.
  • an embodiment in accordance with the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, triggering
  • the apparatus operates based on the aforementioned methods and/or technical solutions in accordance with various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请提供了一种无线接入点认证信息的查询方法与设备,能够根据用户发送的无线接入点扫描列表获得确定的目标无线接入点,再进一步获取相应无线接入点的认证信息并保存到用户移动设备中,在进行无线接入时先在用户移动设备中查找相应的无线接入点认证信息,只有在移动设备中不存在相应认证信息的情况下才向服务器提交查询请求,从而能够减少与服务器的交互次数,降低服务器的负载压力,节省用户移动设备的数据流量,还能保证无线接入点认证信息在用户移动设备上的及时更新。

Description

无线接入点认证信息的查询方法与设备 技术领域
本申请涉及信息技术领域,尤其涉及一种无线接入点认证信息的查询方法与设备。
背景技术
当前,在用户使用移动终端设备进行无线接入的场景下,持续移动的用户需要接入具有不同覆盖范围的无线接入点,因此需要不断获得当前分享的可接入无线接入点的认证信息。将无线接入点的认证信息提供给用户的现有技术主要存在两种方案,方案一是预先下发全部或大量无线接入点认证信息到用户设备上,方案二是根据扫描到的无线接入点列表实时向服务器查询无线接入点的认证信息。方案一由于将大量无线接入点认证信息存放在用户设备上,因此存在较大的安全风险;方案二可以实时查询无线接入点的认证信息,但是由于用户的移动终端设备每隔10秒就会扫描周围信道,只要扫描到的无线接入点发生变化,就需要重新向服务器查询无线接入点的认证信息,如果不进行查询可能会导致无线接入点认证信息更新不及时,而频繁的查询不但增加服务器端的负载压力,也会耗费用户的数据流量。
申请内容
本申请的一个目的是提供一种无线接入点认证信息的查询方法与设备,用以解决现有技术下用户设备频繁请求无线接入点认证信息造成服务器端压力过大的问题。
为实现上述目的,本申请提供了一种用于在服务器端查询无线接入点认证信息的方法,其中,该方法包括:
获取用户设备发送的查询请求,并根据所述查询请求确定目标无线接入点;
根据关联规则,确定与所述目标无线接入点关联的无线接入点;
获取所述目标无线接入点及其关联无线接入点的认证信息;
将所述认证信息发送到所述用户设备。
进一步地,获取用户设备发送的查询请求,并根据所述查询请求确定目标无线接入点,包括:
获取用户设备发送的查询请求,其中,所述查询请求包括所述用户设备获取的扫描列表,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
将所述扫描列表中包含的无线接入点确定为目标无线接入点。
进一步地,该方法还包括:
获取任一用户设备发送的扫描列表,其中,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
所述关联规则包括:
任一无线接入点的关联无线接入点包括包含该无线接入点的一个或多个扫描列表中的其他无线接入点。
进一步地,所述认证信息包括热点密码和/或是否有热点密码标识。
本申请还提供了一种用于在用户设备端查询无线接入点认证信息的方法,其中,该方法包括:
确定需要查询的目标无线接入点;
在认证信息缓存中查找所述目标无线接入点的认证信息,其中,所述认证信息缓存用于保存从服务器获取的无线接入点的认证信息;
在所述认证信息缓存中存在所述目标无线接入点的认证信息时,读取所述目标无线接入点的认证信息;
在所述认证信息缓存中不存在所述目标无线接入点的认证信息时,向所述服务器发送查询请求;
接收并保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息。
进一步地,确定需要查询的目标无线接入点,包括:
获取通过信道扫描得到的扫描列表,其中,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
将所述扫描列表中包含的无线接入点确定为目标无线接入点。
进一步地,所述认证信息包括热点密码和/或是否有热点密码标识。
进一步地,保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息,还包括:
在所述认证信息缓存的内容容量超过预设上限值后,按照时间顺序依次删除所述认证信息缓存中的认证信息。
进一步地,保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息,还包括:
在使用所述认证信息缓存中的认证信息连接相应的无线接入点失败后,将所述认证信息从所述认证信息缓存中删除。
基于本申请的另一方面,本申请提供了一种用于在服务器端查询无线接入点认证信息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行前述用于在服务器端查询无线接入点认证信息的方法。
此外,本申请还提供了一种用于在用户设备端查询无线接入点认证信息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行前述用于在用户设备端查询无线接入点认证信息的方法。
本申请还提供了一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现前述用于在服务器端查询无线接入点认证信息的方法和用于在用户设备端查询无线接入点认证信息的方法。
与现有技术相比,本申请提供的方案能够根据用户发送的无线接入点扫描列表获得确定的目标无线接入点,再进一步获取相应无线接入点的认证信息并保存到用户移动设备中,在进行无线接入时先在用户移动设备中查找相应的无线接入点认证信息,只有在移动设备中不存在相应认证信息的情况下才向服务器提交查询请求,从而能够减少与服务器的交互次数,降低服务器的负载压力,节省用户移动设备的数据流量,还能保证无线接入点认证信息在用户移动设备上的及时更新。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1为本申请实施例提供的一种用于在服务器端查询无线接入点认证信息的方法流程图。
图2为本申请实施例提供的一种用于在用户设备端查询无线接入点认证信息的方法流程图。
图3为本申请实施例提供的一种优选的根据用户设备提交的扫描列表生成关联规则的示意图。
图4为本申请实施例提供的服务器返回的目标无线接入点及其关联无线接入点的示意图。
图5为本申请实施例提供的用户设备在移动场景下使用本地缓存中认证信息接入对应无线接入点的示意图。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、服务网络的设备和可信方均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读 光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
本申请实施例提供了一种用于在服务器端查询无线接入点认证信息的方法,如图1所示,该方法具体包括如下步骤:
步骤S101,获取用户设备发送的查询请求,并根据所述查询请求确定目标无线接入点;
步骤S102,根据关联规则,确定与所述目标无线接入点关联的无线接入点;
步骤S103,获取所述目标无线接入点及其关联无线接入点的认证信息;
步骤S104,将所述认证信息发送到所述用户设备。
该方案尤其适合用于用户设备在移动时进入不同的无线接入点覆盖范围并需要获取可接入的分享无线接入点的认证信息的场景,能够根据用户设备提供的无线接入点的扫描列表确定与扫描列表中的无线接入点其关联的多个无线接入点,再进一步将获取的无线接入点及其关联无线接入点的认证信息返回给用户设备,供用户设备使用认证信息接入到相应的无线接入点,如图5所示。图中的终端即用户设备,扫描到的热点即无线接入点,关联热点即与扫描到的无线接入点有一定关联的无线接入点。
在此,用户设备指的是用户可携带的、可用于连接无线接入点的移动终端设备,用户设备通过向无线接入点提供相应的访问密码来获得对该无线接入点的接入许可,从而通过该无线接入点访问互联网络。
无线接入点即wifi热点,用于向无线用户提供网络接入服务,是无线网络与有线网络间沟通的桥梁,其提供能覆盖一定范围的无线信号,覆盖范围可以是球形。无线接入点的标识为SSID(Service Set Identifier,服务集标识),无线访问用户通过SSID来识别不同的无线接入点。无线接入点的许可接入可设置为使用密码和不使用密码两种方式,通常无线接入点的接入是需要提供访问密码的,以避免未经授权的用户进行接入。当前,有 很多商业用户如餐厅、咖啡店、商场等会提供免费的无线接入点给其他用户使用,这些免费使用的无线接入点也需要知道访问密码才能接入,因此产生了对无线接入点的访问密码等认证信息的保存和查询需求,从而促使多家服务供应商提供无线接入点认证信息的获取、存储、查询和更新服务,无线接入用户自己不需要去查找无线接入点的认证信息,只要通过服务供应商提供的无线接入点认证信息服务就可以获得想要连接的无线接入点的认证信息,再进一步接入该无线接入点并访问互联网。
移动终端设备会周期性地对周围的无线信道进行扫描,以获取可用于接入的无线接入点,由于一个无线接入点具有一定的覆盖范围,因此用户的移动终端设备通过无线信道扫描得到的无线接入点往往是多个,扫描得到的多个无线接入点即用户设备获取的扫描列表,用户可以通过选择扫描列表中无线接入点的标识来确定要连接哪个无线接入点。
在此,无线信道也称作通道(Channel)、频段,是以无线信号(电磁波)作为传输载体的数据信号传送通道。无线接入点可在多个无线信道上运行,目前主流的无线网络设备不管是支持802.11b/g标准还是支持802.11b/g/n标准一般都支持13个信道。这13个信道的中心频率虽然不同,但是因为都占据一定的频率范围,所以会有一些相互重叠的情况。以常用的2.4GHz(=2400MHz)频带的信道划分为例,每个信道具有不同的中心频率,每个信道的有效宽度是20MHz,另外还有2MHz的强制隔离频带(类似于公路上的隔离带)。其中信道1的中心频率为2412MHz,其频率范围为2401~2423MHz,信道2的中心频率为2417MHz,其频率范围为2406~2428MHz,信道6的中心频率为2437MHz,其频率范围为2426~2448MHz,信道11的中心频率为2462MHz,其频率范围为2451~2473MHz。由此可知,其中1、6、11三个信道使用的频率范围是完全没有交叠的,即常说的三个互不重叠的信道,分别使用这三个信道的无线接入点不会产生信号的干扰。
用户设备通过无线信道扫描得到扫描列表,扫描列表包括所有可搜索到的无线接入点,在向用户展示时通常只显示无线接入点的标识即SSID,无线接入点的标识通常是可读的字符串,方便用户识别不同的无线接入点,例如,某用户通过一次无线信道扫描得到一个扫描列表,扫描列表中包括 三个无线接入点,标识分别为AP1、AP2、AP3。
用户设备在得到扫描列表后,为了得到扫描列表中无线接入点对应的认证信息,需要向保存有大量无线接入点认证信息的后台服务器提交查询请求,由后台服务器查询到相应的认证信息后再返回给用户设备。在此,用户设备发送的查询请求中包含通过无线信道扫描得到的扫描列表,扫描列表中包含无线接入点的标识,此时用户设备可能已经接入其它无线接入点也可能未接入无线接入点,如果未接入无线接入点,用户设备需要通过自身的移动数据连接如GPRS、3G或4G网络向后台服务器提交查询请求,如果已经接入其它无线接入点,用户设备可通过接入的无线接入点向服务器提交查询请求。
在此,无线接入点的认证信息包括热点密码和/或是否有热点密码标识,热点密码是用于对用户的接入合法性进行检验的访问密码,只有能提供合法访问密码的用户才被允许接入,例如,一个无线接入点的SSID为“ChinaNet-S2G4”,其对应的访问密码为“123456”,则无线访问用户在连接“ChinaNet-S2G4”时,访问密码输入“123456”才能成功接入。此外,无线接入点的认证信息还可以包括额外信息如路由器MAC地址、路由器加密方式、通信信道等。在本申请实施例提供的方案中,后台服务器首先获取无线接入点的是否有热点密码标识,如果该无线接入点的认证信息中的是否有热点密码标识为真,说明该无线接入点有密码,则再进行下一步获取相应的热点密码;如果该无线接入点的认证信息中的是否有热点密码标识为假,说明该无线接入点没有密码,无需进行下一步的获取热点密码操作。与本申请实施例提供的方案不同的是,现有技术下是后台服务器直接一起下发标识和密码的。从而,本申请实施例的方案能根据实际需求进行数据库查询,避免无效的查询操作,能减少数据库资源的消耗,提高查询效率。
服务器在接收到用户设备提交的查询请求后,需要将其中的无线接入点确定为要进行认证信息查找的无线接入点,即目标无线接入点,服务器根据目标无线接入点在保存有无线接入点认证信息的数据库中查询,得到相应的认证信息,如果在数据库中没有相应的认证信息,则相应的认证信 息设置为空值。在此,服务器通过使用目标无线接入点的标识来进行查询。由于查询请求中包含多个无线接入点,目标无线接入点可以只是用户选择的一个无线接入点,也可以是包含多个无线接入点的集合。
服务器获得作为查询输入的目标无线接入点后,在进行认证信息查询前,还需要对要查询的无线接入点进行扩展。由于用户设备发送的扫描列表中包含的无线接入点只是用户在移动过程中处于某个位置时得到的扫描结果,用户在收到返回的无线接入点认证信息时很可能已经移动到了某些无线接入点的覆盖范围之外,而位于某些新的无线接入点的覆盖范围内,又需要向服务器提交新的扫描列表,即使用户可以暂时停留以接入到达认证信息的无线接入点,但是只要用户移动到该无线接入点的覆盖范围之外,就需要向服务器发送新的无线接入点的查询请求。因此,不断进行实时的认证信息查询,既增加了服务器的响应压力,也会不断消耗用户的数据流量,并不是较好的解决方案。
本申请实施例通过无线接入点的关联规则将要查询的无线接入点扩展为包含目标无线接入点及其关联无线接入点的集合,如图4所示。图中的终端即用户设备,扫描到的热点即无线接入点,邻居热点即关联无线接入点。通过上述无线接入点的扩展能在一次数据库查询中对更多的无线接入点标识进行查询,也能获得更多的无线接入点认证信息并发送给用户设备,因此提高了服务器的查询效率,也减少了用户设备的流量消耗。在此,本申请实施例提供的方案还对扩展后的无线接入点执行去重操作,根据无线接入点的SSID去掉重复的无线接入点,再根据去重后的无线接入点集合进行认证信息的查询。
在此,某个无线接入点的关联无线接入点即与该无线接入点存在关联关系的其它无线接入点,存在关联关系的其它无线接入点例如可以指的是地理位置与该无线接入点相邻,各自无线信号的覆盖范围存在一定重叠的无线接入点。用户在移动时可能从一个无线接入点的覆盖范围移动到其关联无线接入点的覆盖范围,因此通过先后接入该无线接入点及其关联无线接入点可实现持续的互联网访问,减少与互联网断开的可能性。
在服务器端,无线接入点及其关联无线接入点间的关联规则是预先建 立并持续更新的,例如可以根据最近获得的扫描列表进行更新。本申请实施例中确定某个无线接入点的关联无线接入点的方法是将用户设备发送的同一个扫描列表中所有的无线接入点确定互为关联无线接入点,即同一扫描列表中任何一个无线接入点的关联无线接入点是该扫描列表中除了该无线接入点外的所有其它无线接入点,例如,某个认证信息查询场景中服务器接收到的一个用户设备终端1发送的扫描列表,如图3所示,其中包括三个无线接入点,标识分别为:AP1、AP2和AP3,则AP1、AP2和AP3互为关联无线接入点,即AP1的关联无线接入点是AP2和AP3,AP2的关联无线接入点为AP1和AP3,AP3的关联无线接入点是AP1和AP2。由此,服务器可为每个无线接入点及其关联无线接入点建立映射表,在用户提交查询请求时,根据提交的无线接入点查询到对应的关联无线接入点,由于提交的无线接入点可能是多个,因此最终查询得到的关联无线接入点也可能是多个。更具体地,服务器通过无线接入点的标识即SSID建立到关联无线接入点的SSID的映射数据库表。
在上述示例中,服务器上已经建立了三条关联规则:“AP1的关联无线接入点为{AP2,AP3}”,“AP2的关联无线接入点为{AP1,AP3}”,“AP3的关联无线接入点为{AP1,AP2}”,当某个用户对想要接入的无线接入点AP1向服务器提出查询请求后,服务器会先将AP1确定为目标无线接入点,再在关联规则集中查找与AP1相关的关联规则,找到的关联规则为“AP1的关联无线接入点为{AP2,AP3}”,由此可知AP1的关联无线接入点为AP2和AP3。如果用户想要获得认证信息的无线接入点为{AP1,AP2},则服务器分别对AP1和AP2进行查询得到的关联规则为“AP1的关联无线接入点为{AP2,AP3}”,“AP2的关联无线接入点为{AP1,AP3}”,去掉关联无线接入点集合中重复的无线接入点,最终得到{AP1,AP2}的关联无线接入点为{AP1,AP2,AP3}。
服务器上建立的关联规则并不是一成不变的,由于无线接入点的信息变化较为频繁,与之对应的关联规则也需要持续更新以适应改变的无线接入环境。服务器仍然以用户设备提交的扫描列表作为关联规则更新的依据,将某个无线接入点的新的关联无线接入点加入到关联规则中。任一无线接 入点的关联无线接入点包括包含该无线接入点的一个或多个扫描列表中的其他无线接入点。仍以前述场景为例,有用户设备终端2提交了新的扫描列表,其中包含三个无线接入点,标识分别为:AP1、AP4和AP5,如图3所示,则服务器接收到该扫描列表后将AP1的关联规则更新为“AP1的关联无线接入点为{AP2,AP3,AP4,AP5}”,两个新的关联无线接入点AP4和AP5加入到了AP1的关联规则中,如果有用户提交AP1的认证信息查询请求,服务器对AP1的关联无线接入点的查询结果是{AP2,AP3,AP4,AP5}。
服务器对目标无线接入点进行扩展,得到的结果是包括目标无线接入点及其关联无线接入点的集合,此集合中的无线接入点个数可能是1个或多个,再对此集合中的无线接入点在数据库中查询对应的认证信息,最简单的认证信息只包含访问密码信息。仍以上述场景为例,服务器接收用户提交的对无线接入点AP1的查询请求,经过查询AP1的关联规则得到AP1的关联无线接入点为{AP2,AP3,AP4,AP5},再对无线接入点的集合{AP1,AP2,AP3,AP4,AP5}查询对应的访问密码,得到无线接入点与访问密码的对应信息{{“AP1”,“PASS1”},{“AP2”,“PASS2”},{“AP3”,“PASS3”},{“AP4”,“PASS4”},{“AP5”,“PASS5”}}。
服务器查询得到目标无线接入点及其关联无线接入点对应的认证信息后,再把认证信息返回到提交该查询请求的用户设备上,供用户设备保存。
本申请实施例还提供了一种用于在用户设备端查询无线接入点认证信息的方法,如图2所示,该方法具体包括如下步骤:
S201,确定需要查询的目标无线接入点;
S202,在认证信息缓存中查找所述目标无线接入点的认证信息,其中,所述认证信息缓存用于保存从服务器获取的无线接入点的认证信息;
S203,在所述认证信息缓存中存在所述目标无线接入点的认证信息时,读取所述目标无线接入点的认证信息;
S204,在所述认证信息缓存中不存在所述目标无线接入点的认证信息时,向所述服务器发送查询请求;
S205,接收并保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息。
该方案用于在用户设备端查询本地保存的无线接入点认证信息并向服务器端提交目标无线接入点的认证信息查询请求。本申请的一个目的是减少与服务器的交互,因此,服务器会在接收到用户设备的首次查询请求时会将其提交的无线接入点及关联无线接入点的认证信息返回给用户设备端,用户设备端将接收到的认证信息保存在本地缓存中,在扫描列表发生变化时先在本地缓存中查找无线接入点的认证信息,在没有查到的情况下再向服务器提交查询请求。
该方案首先获取通过信道扫描得到的无线接入点列表,无线接入点列表即扫描列表,再将其中包含的无线接入点确定为目标无线接入点,目标无线接入点即是要获得认证信息的无线接入点,也可以是用户想要接入的无线接入点,因此,目标无线接入点可以是一个或多个,根据具体情况确定。在此,目标无线接入点通过各自的标识信息进行区分。
得到目标无线接入点后,用户设备需要获得目标无线接入点中至少一个无线接入点的认证信息,用于进行无线接入。本申请实施例中提供的方案是先在本地的认证信息缓存中查找目标无线接入点对应的认证信息,如果能查到相应的认证信息,就可以直接从认证信息缓存中读取相应的认证信息,不需要向服务器发生目标无线接入点的查询请求。如果用户设备是首次安装无线接入认证信息服务商提供的客户端APP,则本地的认证信息缓存是没有数据的,需要提交相应的无线接入点认证信息查询请求并根据服务器端返回的认证信息进行填充。另外,可能只有部分目标无线接入点的认证信息在本地认证信息缓存中存在,此时的策略可以选择不向服务器发送查询请求,只接入本地认证信息缓存中存在认证信息的相应无线接入点,还可以将本地认证信息缓存中不存在相应认证信息的无线接入点作为要查询的无线接入点发送给服务器,以获得这些无线接入点的认证信息。仍以前述场景为例,用户设备端通过信道扫描得到的扫描列表包括三个无线接入点:AP1、AP2和AP3,此时先在本地认证信息缓存中查找,本地认证信息缓存中存在一条数据{“AP2”,“PASS2”},因此目标无线接入点 AP2可查询到对应的认证信息“PASS2”,从而可以通过从缓存中读取此认证信息来接入无线接入点AP2,也可以向服务器端发送AP1和AP3的查询请求以获得相应的认证信息。
如果目标无线接入点中的一个或多个无线接入点在本地认证信息缓存中不存在对应的认证信息,那么用户设备端就可以向服务器提交目标无线接入点的查询请求来获得认证信息,并在接收到服务器发送的目标无线接入点及其关联无线接入点的认证信息后将这些认证信息保存到本地的认证信息缓存中,供以后查询使用。仍以前述场景为例,用户设备得到包含三个无线接入点AP1、AP2和AP3的扫描列表,如果在本地认证信息缓存中不存在AP1、AP2和AP3中任何一个无线接入点的认证信息,则用户设备将{AP1,AP2,AP3}作为目标无线接入点提交给服务器端,服务器将其扩展为{AP1,AP2,AP3,AP4,AP5},这里AP4和AP5是AP1的关联无线接入点,查询保存认证信息的数据库得到认证信息{{“AP1”,“PASS1”},{“AP3”,“PASS3”},{“AP5”,“PASS5”}},用户设备端接收服务器返回的对应AP1、AP3和AP5的认证信息并保存到认证信息缓存中。
为避免只往缓存中添加认证信息导致缓存越来越大所可能带来的信息泄漏问题和缓存查询速度降低的性能问题,本申请实施例为本地认证信息缓存的内容能使用的容量预先设置了一个上限值,从而在保存新获取的无线接入点认证信息时先确定没有超过容量上限值,如果超过就按照时间顺序对本地认证信息缓存中的认证信息进行删除,具体的时间标准可以根据用户的需要设定,如最近一次使用的时间、最近一次认证信息更新时间等。
此外,缓存中保存的认证信息在使用后被发现连接对应的无线接入点失败,这说明该无线接入点的认证信息已经发生了改变,当前缓存中的认证信息已经失效了,因此需要将失效的认证信息从认证信息缓存中清除,还可以进一步将失效认证信息对应的无线接入点提交给服务器端,告知该无线接入点已经失效,服务器端再对该无线接入点进行相应的失效处理。
本申请实施例还提供了一种用于在服务器端查询无线接入点认证信 息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行前述用于在服务器端查询无线接入点认证信息的方法。
本申请实施例还提供了一种用于在用户设备端查询无线接入点认证信息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行前述用于在用户设备端查询无线接入点认证信息的方法。
本申请实施例还提供了一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现前述用于在服务器端查询无线接入点认证信息的方法和用于在用户设备端查询无线接入点认证信息的方法。
综上所述,本申请提供的方案能够根据用户发送的无线接入点扫描列表获得确定的目标无线接入点,再进一步获取相应无线接入点的认证信息并保存到用户移动设备中,在进行无线接入时先在用户移动设备中查找相应的无线接入点认证信息,只有在移动设备中不存在相应认证信息的情况下才向服务器提交查询请求,从而能够减少与服务器的交互次数,降低服务器的负载压力,节省用户移动设备的数据流量,还能保证无线接入点认证信息在用户移动设备上的及时更新。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。而调用本申请的方法的程序指令,可能被存储在固定的或可移动的记录介质中,和/或通过广播或其他信号承载媒体中 的数据流而被传输,和/或被存储在根据所述程序指令运行的计算机设备的工作存储器中。在此,根据本申请的一个实施例包括一个设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。设备权利要求中陈述的多个设备也可以由一个设备通过软件或者硬件来实现。

Claims (12)

  1. 一种用于在服务器端查询无线接入点认证信息的方法,其中,该方法包括:
    获取用户设备发送的查询请求,并根据所述查询请求确定目标无线接入点;
    根据关联规则,确定与所述目标无线接入点关联的无线接入点;
    获取所述目标无线接入点及其关联无线接入点的认证信息;
    将所述认证信息发送到所述用户设备。
  2. 根据权利要求1所述的方法,其中,获取用户设备发送的查询请求,并根据所述查询请求确定目标无线接入点,包括:
    获取用户设备发送的查询请求,其中,所述查询请求包括所述用户设备获取的扫描列表,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
    将所述扫描列表中包含的无线接入点确定为目标无线接入点。
  3. 根据权利要求1或2所述的方法,其中,该方法还包括:
    获取任一用户设备发送的扫描列表,其中,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
    所述关联规则包括:
    任一无线接入点的关联无线接入点包括包含该无线接入点的一个或多个扫描列表中的其他无线接入点。
  4. 根据权利要求1所述的方法,其中,所述认证信息包括热点密码和/或是否有热点密码标识。
  5. 一种用于在用户设备端查询无线接入点认证信息的方法,其中,该方法包括:
    确定需要查询的目标无线接入点;
    在认证信息缓存中查找所述目标无线接入点的认证信息,其中,所述认证信息缓存用于保存从服务器获取的无线接入点的认证信息;
    在所述认证信息缓存中存在所述目标无线接入点的认证信息时,读取所述目标无线接入点的认证信息;
    在所述认证信息缓存中不存在所述目标无线接入点的认证信息时,向 所述服务器发送查询请求;
    接收并保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息。
  6. 根据权利要求5所述的方法,其中,确定需要查询的目标无线接入点,包括:
    获取通过信道扫描得到的扫描列表,其中,所述扫描列表包含所述用户设备扫描到的无线接入点的标识信息;
    将所述扫描列表中包含的无线接入点确定为目标无线接入点。
  7. 根据权利要求5所述的方法,其中,所述认证信息包括热点密码和/或是否有热点密码标识。
  8. 根据权利要求5所述的方法,其中,保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息,还包括:
    在所述认证信息缓存的内容容量超过预设上限值后,按照时间顺序依次删除所述认证信息缓存中的认证信息。
  9. 根据权利要求5所述的方法,其中,保存服务器发送的基于所述查询请求确定的目标无线接入点及其关联无线接入点的认证信息,还包括:
    在使用所述认证信息缓存中的认证信息连接相应的无线接入点失败后,将所述认证信息从所述认证信息缓存中删除。
  10. 一种用于在服务器端查询无线接入点认证信息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行权利要求1至4中任一项所述的方法。
  11. 一种用于在用户设备端查询无线接入点认证信息的设备,该设备包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该设备执行权利要求5至9中任一项所述的方法。
  12. 一种计算机可读介质,其上存储有计算机可读指令,所述计算机可读指令可被处理器执行以实现如权利要求1至9中任一项所述的方法。
PCT/CN2018/096992 2017-08-02 2018-07-25 无线接入点认证信息的查询方法与设备 WO2019024733A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/776,537 US20200169884A1 (en) 2017-08-02 2020-01-30 Methods and devices for querying authentication information of a wireless access point

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710653369.6A CN107979841B (zh) 2017-08-02 2017-08-02 无线接入点认证信息的查询方法与设备
CN201710653369.6 2017-08-02

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/776,537 Continuation US20200169884A1 (en) 2017-08-02 2020-01-30 Methods and devices for querying authentication information of a wireless access point

Publications (1)

Publication Number Publication Date
WO2019024733A1 true WO2019024733A1 (zh) 2019-02-07

Family

ID=62012341

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/096992 WO2019024733A1 (zh) 2017-08-02 2018-07-25 无线接入点认证信息的查询方法与设备

Country Status (3)

Country Link
US (1) US20200169884A1 (zh)
CN (1) CN107979841B (zh)
WO (1) WO2019024733A1 (zh)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107979841B (zh) * 2017-08-02 2020-11-03 上海连尚网络科技有限公司 无线接入点认证信息的查询方法与设备
CN115150456B (zh) * 2018-06-05 2024-05-24 阿里巴巴集团控股有限公司 分发、转发任务信息的方法、装置及存储介质
CN108848505B (zh) * 2018-07-10 2021-05-07 上海尚往网络科技有限公司 一种无线连接方法及设备
CN109548025B (zh) * 2018-12-29 2022-12-30 上海掌门科技有限公司 管理路由设备所提供无线接入点的使用权限的方法与设备
CN109660990A (zh) * 2019-02-18 2019-04-19 上海连尚网络科技有限公司 用于扫描无线接入点的方法和设备
CN110139277B (zh) * 2019-04-19 2022-09-23 奇安信科技集团股份有限公司 无线热点的检测方法及装置
CN112929877B (zh) * 2021-02-07 2023-03-24 展讯半导体(南京)有限公司 一种获取签约配置信息的方法、通信装置及芯片
JP7245273B2 (ja) * 2021-03-19 2023-03-23 本田技研工業株式会社 通信制御装置、移動体、通信制御方法、及びプログラム
CN116319103B (zh) * 2023-05-22 2023-08-08 拓尔思天行网安信息技术有限责任公司 一种网络可信接入认证方法、装置、系统及存储介质

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104350802A (zh) * 2014-04-16 2015-02-11 华为技术有限公司 无线局域网络wlan的接入方法、终端及服务器
CN106851641A (zh) * 2016-12-22 2017-06-13 上海斐讯数据通信技术有限公司 一种实现与多个wifi网络认证的统一认证系统及方法
CN107979841A (zh) * 2017-08-02 2018-05-01 上海连尚网络科技有限公司 无线接入点认证信息的查询方法与设备

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060129813A1 (en) * 2004-12-15 2006-06-15 Vidya Narayanan Methods of authenticating electronic devices in mobile networks
CN101119199A (zh) * 2006-08-02 2008-02-06 西安电子科技大学 一种在无线局域网中的安全快速切换方法
CN101079891B (zh) * 2007-06-15 2010-12-15 清华大学 基于无线局域网安全标准wapi的无线交换网络重认证方法
CN101707769A (zh) * 2009-11-18 2010-05-12 中兴通讯股份有限公司 一种在无线局域网中wapi重认证的方法及系统
CN101800982B (zh) * 2010-01-15 2012-12-05 西安电子科技大学 无线局域网切换快速认证安全性增强方法
CN102685742B (zh) * 2011-03-15 2016-01-27 中国移动通信集团公司 一种wlan接入认证方法和装置
US9026163B2 (en) * 2012-03-31 2015-05-05 Intel Corporation Methods and arrangements to offload scans of a large scan list
CN103298072A (zh) * 2013-07-02 2013-09-11 张洁昕 自动连接WiFi接入点的方法、系统和移动通信终端
CN103458409A (zh) * 2013-08-19 2013-12-18 小米科技有限责任公司 网络连接方法、网络共享方法及装置
CN103475996B (zh) * 2013-08-19 2017-06-16 小米科技有限责任公司 网络连接方法、网络共享方法及装置
US9572097B2 (en) * 2014-10-13 2017-02-14 International Business Machines Corporation Determining a preferred WIFI hotspot
US9456389B2 (en) * 2014-10-14 2016-09-27 Fortinet, Inc. Dynamic generation of per-station realm lists for hot spot connections
US10021618B2 (en) * 2015-04-30 2018-07-10 Google Technology Holdings LLC Apparatus and method for cloud assisted wireless mobility
US10111095B2 (en) * 2016-03-14 2018-10-23 Verizon Patent And Licensing Inc. Caching a pairwise master key for dropped wireless local area network (WLAN) connections to prevent re-authentication
CN105682015B (zh) * 2016-04-05 2017-10-31 上海连尚网络科技有限公司 一种用于建立无线连接的方法与设备

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104350802A (zh) * 2014-04-16 2015-02-11 华为技术有限公司 无线局域网络wlan的接入方法、终端及服务器
CN106851641A (zh) * 2016-12-22 2017-06-13 上海斐讯数据通信技术有限公司 一种实现与多个wifi网络认证的统一认证系统及方法
CN107979841A (zh) * 2017-08-02 2018-05-01 上海连尚网络科技有限公司 无线接入点认证信息的查询方法与设备

Also Published As

Publication number Publication date
CN107979841A (zh) 2018-05-01
CN107979841B (zh) 2020-11-03
US20200169884A1 (en) 2020-05-28

Similar Documents

Publication Publication Date Title
WO2019024733A1 (zh) 无线接入点认证信息的查询方法与设备
CN109673037B (zh) 一种网络功能发现方法及设备
US8831660B2 (en) System, method and apparatus for dynamic wireless network discovery
US10264439B2 (en) Method and apparatus for discovering devices and application users
WO2017173858A1 (zh) 一种用于建立无线连接的方法与设备
EP4167625A1 (en) Communication method and apparatus
US9736767B2 (en) Identification-assisted wireless network connections
US9247489B2 (en) System and method for ANDSF enhancement with ANQP server capability
WO2019095889A1 (zh) 通过nrf进行nf发现的方法、设备及可读存储介质
EP3544336B1 (en) Information transmission
US11540244B2 (en) MEC information obtaining method and apparatus
JP2009520433A (ja) アソシエーション/認証前におけるクエリのローミングのための端末、アクセスポイント、および方法
EP2849498A1 (en) Method of accessing, by wireless device, information mapped to currently positioned space by using network access device, and device for accessing information mapped to currently positioned space by using network access device
US10715958B2 (en) Service discovery with beacons having ranked neighboring services
CN109413759B (zh) 一种用于进行无线连接的方法与设备
US10356707B2 (en) Wireless local area network connection method, mobile terminal, and storage medium
EP2625666B1 (en) Methods and apparatus for obtaining a service
US10070359B2 (en) Dynamic generation of per-station realm lists for hot spot connections
US11627466B2 (en) Updating automatic access parameters for wireless local area networks
KR101748302B1 (ko) 공통 anqp 그룹 버전을 이용한 anqp 질의 시스템 및 방법
KR20090043216A (ko) 단말 기반의 네트워크 정보 업데이트 장치 및 방법
US9432465B1 (en) Service discovery with beacons having ranked neighboring services
US20230362268A1 (en) Apparatus, method and computer program
WO2023216960A1 (zh) 数据处理方法、装置、核心网节点、电子设备和存储介质
KR20140118500A (ko) 듀얼 주파수 대역에서의 무선통신 시스템 및 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18841747

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC , EPO FORM 1205A DATED 19.05.2020.

122 Ep: pct application non-entry in european phase

Ref document number: 18841747

Country of ref document: EP

Kind code of ref document: A1