WO2019228257A1 - Method for identifying type of wireless hotspot, and network device thereof - Google Patents

Method for identifying type of wireless hotspot, and network device thereof Download PDF

Info

Publication number
WO2019228257A1
WO2019228257A1 PCT/CN2019/088297 CN2019088297W WO2019228257A1 WO 2019228257 A1 WO2019228257 A1 WO 2019228257A1 CN 2019088297 W CN2019088297 W CN 2019088297W WO 2019228257 A1 WO2019228257 A1 WO 2019228257A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless hotspot
hotspot
wireless
type
authentication
Prior art date
Application number
PCT/CN2019/088297
Other languages
French (fr)
Chinese (zh)
Inventor
罗琨
韩洲
程磊根
Original Assignee
上海连尚网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201810600611.8A external-priority patent/CN110557800B/en
Application filed by 上海连尚网络科技有限公司 filed Critical 上海连尚网络科技有限公司
Priority to SG11202011923PA priority Critical patent/SG11202011923PA/en
Publication of WO2019228257A1 publication Critical patent/WO2019228257A1/en
Priority to US17/106,189 priority patent/US11368901B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection

Definitions

  • the present application relates to the field of computers, and in particular, to a method for identifying a type of a wireless hotspot and a network device thereof.
  • many open hotspots require user authentication before they can connect.
  • users need to enter information such as mobile phone numbers for authentication before allowing users to access the Internet through wireless hotspots.
  • users search for nearby wireless hotspots they may find a large number of nearby wireless hotspots; wireless hotspots are roughly divided into encrypted hotspots that require a password to connect and open hotspots that can be connected without a password; open hotspots can be further divided into Authenticated hotspots and open hotspots that require authentication to connect.
  • the wireless hotspot is not connected, it is difficult to distinguish which category the wireless hotspot belongs to.
  • An object of the present application is to provide a method for identifying a type of a wireless hotspot and a network device thereof to solve the problem of confirming the type of a wireless hotspot.
  • a method for identifying a type of a wireless hotspot is provided, which is applied to a network device and includes: in response to receiving a type confirmation request for a first wireless hotspot, obtaining information of the first wireless hotspot , The type confirmation request is used to request the type of the first wireless hotspot; based on the information of the first wireless hotspot and the information of multiple second wireless hotspots in a preset hotspot set, find a connection with the first wireless hotspot The same or similar second wireless hotspot, the type of the second wireless hotspot is an open wireless hotspot requiring authentication; and in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, The type of hotspot is identified as an open wireless hotspot that requires authentication.
  • a computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the present application.
  • a network device includes a processor, and the processor executes an instruction according to the method described in the present application.
  • the method for identifying the type of a wireless hotspot and the network device provided by the present application can confirm whether the requested wireless hotspot is a wireless hotspot requiring identity authentication according to the type confirmation request and a set of hotspots preset by the network device.
  • FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to an embodiment of the present application.
  • the terminal and the network device each include one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
  • processors CPUs
  • input / output interfaces output interfaces
  • network interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • flashRAM flash memory
  • Computer-readable media includes permanent and non-persistent, removable and non-removable media.
  • Information storage can be accomplished by any method or technology.
  • Information may be computer-readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, tape disk storage or other magnetic storage devices or any other non-transmitting medium can be used to store information that can be accessed by computing devices.
  • computer-readable media does not include non-transitory computer-readable media, such as modulated data signals and carrier waves.
  • the terminal referred to in the present invention includes, but is not limited to, any electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touch panel), such as a mobile electronic product such as a smart phone or a tablet computer.
  • the mobile electronic product may Use any operating system, such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance.
  • the hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • PLDs field programmable gate arrays
  • DSPs digital signal processors
  • embedded devices and more.
  • the network device includes, but is not limited to, a cloud composed of a computer, a network host, a single network server, multiple network server sets, or multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a type of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad hoc network), and the like.
  • the terminal and the network device may also be programs running on the terminal, the network device, or a device formed by integrating the terminal and the network device over a network.
  • FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to some embodiments of the present application. Steps S101 to S103 shown in FIG. 1 are mainly performed by network devices. As shown in FIG. 1, in an embodiment of the present application, a method for identifying a type of a wireless hotspot includes:
  • step S101 in response to receiving a type confirmation request for a first wireless hotspot, information of the first wireless hotspot is obtained, and the type confirmation request is used to request a type of the first wireless hotspot.
  • this type of confirmation request can come from the terminal or from within the network device.
  • the first wireless hotspot has not yet confirmed the type, for example, the type has not been confirmed by the sender of the type confirmation request.
  • the terminal sends a type confirmation request, and the type confirmation request carries the identifier of the first wireless hotspot to further obtain the information of the first wireless hotspot.
  • the first wireless hotspot list may also be collected by a network device such as a server to confirm the type of the first wireless hotspot.
  • Step S102 Find a second wireless hotspot that is the same as or similar to the first wireless hotspot based on the information of the first wireless hotspot and information of multiple second wireless hotspots in a preset set of hotspots.
  • the type of wireless hotspot is an open wireless hotspot that requires authentication.
  • the network device can access a preset hotspot set, and the hotspot set contains information of a plurality of second wireless hotspots.
  • the second wireless hotspot is an open wireless hotspot that has been identified as requiring authentication.
  • authentication is required to access the Internet, such as authentication through an authentication page.
  • the network device may add a second wireless hotspot that has been identified as an open hotspot that requires authentication to the hotspot set.
  • Step S103 In response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, identify the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
  • the first wireless hotspot that is the same as or similar to the second wireless hotspot is also marked as an open wireless hotspot that requires authentication.
  • the fact that the first wireless hotspot is the same as the second wireless hotspot means that the identifiers and physical addresses of the first wireless hotspot and the second wireless hotspot are the same.
  • the SSID and BSSID of the first wireless hotspot and the second wireless hotspot are the same.
  • a method for determining that the first wireless hotspot is similar to the second wireless hotspot will be specifically described in the following embodiments.
  • the wireless hotspot requested by the terminal or the network device can be used to confirm whether the type of authentication is required.
  • the type confirmation request is from a terminal, and the type confirmation request includes an identifier of the first wireless hotspot scanned by the terminal.
  • the method of this embodiment further includes the following steps: in response to the type of the first wireless hotspot being identified as an open wireless hotspot requiring authentication, feeding back to the terminal identification information of the first wireless hotspot and corresponding to the identification information
  • the tag is used to indicate that the type of the first wireless hotspot is an open wireless hotspot requiring authentication.
  • the application running on the terminal may send a type confirmation request to the network device, and the type confirmation request carries the identifier of the first wireless hotspot to request to determine whether any of the first wireless hotspots is an open wireless hotspot requiring authentication.
  • the network device determines whether the first wireless hotspot is the same as or similar to the second wireless hotspot based on the identification of the first wireless hotspot and other related information of the first wireless hotspot, such as location information, manufacturer source fields, and the like. When the first wireless hotspot is the same as or similar to the second wireless hotspot, the first wireless hotspot is an open wireless hotspot that requires authentication.
  • the network device feeds back to the terminal the identification information of the first wireless hotspot and a label corresponding to the identification information, where the label indicates that the type of the wireless hotspot is an open wireless hotspot that requires authentication.
  • the type confirmation request sent by the application running on the terminal to the network device may include a hotspot information acquisition request sent by the terminal to the network device, where the hotspot information acquisition request is used to request the network device to the wireless hotspot scanned by the terminal
  • the hotspot information acquisition request may include an identification (such as an SSID) of the wireless hotspot scanned by the terminal, and is used to request the network device to provide the type of the wireless hotspot and the encrypted hotspot in the scanned wireless hotspot.
  • the terminal device can distinguish whether the wireless hotspots it scans are encrypted hotspots or open hotspots, but it is difficult to distinguish whether open hotspots require authentication, so the above type of confirmation request can be mainly used to request network devices to feedback open hotspots type.
  • the method of this embodiment before acquiring the information of the first wireless hotspot, further includes: acquiring connection data generated from a terminal based on a connection operation of the terminal to the second wireless hotspot; In response to the connection data indicating that authentication is required to connect to the second wireless hotspot, identify the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and add 25 the second wireless hotspot to the hotspot Collection.
  • an application installed on a terminal can detect connection data generated by a user's connection operation to connect to a wireless hotspot. When a connection to a wireless hotspot is found, authentication data such as an authentication page is generated, and the wireless hotspot is generated. Identifying an open wireless hotspot that requires authentication, that is, a second wireless hotspot, and reporting the recognition result to the network device for the network device to add the information of the second wireless hotspot to the hotspot set.
  • the application may send the connection data generated by the connection operation to the second wireless hotspot to the network device through the terminal, and the network device responds to the connection data to indicate that authentication is required to connect to the second wireless hotspot. Identifying the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and adding the second wireless hotspot to the hotspot set.
  • the information of the first wireless hotspot or the second wireless hotspot includes at least one of the following: an identifier of the first wireless hotspot or the second wireless hotspot; the first wireless hotspot or the first wireless hotspot Location information of two wireless hotspots; a vendor source field of the first wireless hotspot or the second wireless hotspot.
  • the identifier may include an SSID (Service Set Identifier, service set identifier); the location information may include a geographic hash code (geohash); and the vendor source field may include a BSSID (Basic Service Set Identifier, basic service set identifier) Top six.
  • the second wireless hotspot similar to the first wireless hotspot includes: the same identifier as the first wireless hotspot and the same vendor source field as the first wireless hotspot or A similar second wireless hotspot; or a second wireless hotspot that is the same as the identifier of the first wireless hotspot and the location information indicates that it is in the same area as the first wireless hotspot; or The identification of the hotspot is similar and the location information indicates a second wireless hotspot within the same area as the first wireless hotspot.
  • the second wireless hotspot when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the manufacturer source fields are the same or similar, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and BSSID of the first wireless hotspot, and the network device queries the SSID and BSSID of the second wireless hotspot in a preset set of hotspots. When the bits are the same, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the second wireless hotspot when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots.
  • the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the second wireless hotspot when the identifications of the second wireless hotspot and the first wireless hotspot are similar and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots.
  • the second wireless hotspot is similar to the SSID of the first wireless hotspot and the first
  • the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the location information includes a hash code of a geographic location
  • the location information indicates that the location is in the same area as the first wireless hotspot includes: the first wireless hotspot and the second wireless hotspot Geo-location hash codes for hotspots have the same area fields.
  • the latitude and longitude of wireless hotspots are converted into hash codes (geohash) by geohash algorithm. Strings similar to each other indicate similar distances. The prefix matching of strings can be used to determine the distance between several wireless hotspots.
  • the length of the geohash encoding can determine the distance accuracy. For example, when the geohash base32 encoding length is 8, the accuracy is about 19 meters, and when the geohash base32 encoding length is 9, the accuracy is about 2 meters.
  • the encoding length can be selected according to the data.
  • the latitude interval of the earth is [-90,90] and the latitude of the center point is 39.928167.
  • the latitude 39.928167 can be approximated by the following algorithm:
  • the longitude interval of the earth is [-180, 180], and the longitude of the center point can be coded 116.389550.
  • the code generated by latitude is 1011100011
  • the code generated by longitude is 1101001011.
  • the longitude in the even digits and the latitude in the odd digits and combine the two strings to generate a new string: 11100 11101 00100 01111.
  • the second wireless hotspot and the first wireless hotspot can also calculate their geohash codes.
  • the second wireless hotspot and the first wireless hotspot have 8 geohash codes, and the first 6 bits of the geohash code of the center point can be set as Area field. If the geographic location hash codes of the second wireless hotspot and the first wireless hotspot are the first 6 bits, that is, the area fields are the same, it means that the second wireless hotspot and the first wireless hotspot are in the same area.
  • the length of the area field can be set freely according to the actual accuracy requirements.
  • the identifiers of the second wireless hotspot and the first wireless hotspot are similar to each other.
  • the edit distance between the identifier of the first wireless hotspot and the identifier of the second wireless hotspot is similar to a preset. Within the threshold.
  • Edit Distance also known as Levenshtein distance
  • Permissible editing operations include replacing one character with another, inserting a character, and deleting a character.
  • edit distance between cafe and coffee you can calculate according to the order of cafe ⁇ caffe ⁇ coffe ⁇ coffee.
  • the smaller the edit distance the greater the similarity between the two strings.
  • d [i, 5j] min (d [i-1, j] +1, d [i, j-1] +1, d [i-1, j-1] + temp) ... ............(1);
  • the edit distance can be calculated according to formula (2):
  • Edit distance 1-D [n, m] / max (str1 string length, str2 string length) ... (2);
  • D [n, m] is the last bit of the edit distance calculation matrix.
  • the edit distance algorithm is used to calculate the second wireless hotspot SSID and the first wireless hotspot SSID to obtain its edit distance.
  • the similarity of the two SSIDs is filtered by a preset similarity threshold. When the editing distance is within the preset similarity threshold, it is determined that the SSID of the second wireless hotspot is similar to the SSID of the first wireless hotspot. If the second wireless hotspot and the first wireless hotspot are still in the same area, it can be basically determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type of the second wireless hotspot in response to the connection data indicating that authentication is required to connect to the second wireless hotspot, is identified as an open wireless hotspot that requires authentication, and the first The step of adding two wireless hotspots to the hotspot set includes:
  • connection data indicating that authentication is required when connecting to the second wireless hotspot and the connection time indicated by the connection authentication data is within a preset time threshold, identifying the type of the second wireless hotspot as an open that requires authentication A wireless hotspot, and adding the second wireless hotspot to the hotspot set.
  • a data list may be generated; the data list may include a wireless hotspot identification, information that the wireless hotspot needs authentication, and a connection time.
  • a preset time threshold By setting a preset time threshold, only authentication wireless hotspot tags are added to wireless hotspots of connection data generated within the preset time threshold, and open wireless hotspots that have generated authentication in the recent period of time can be filtered to exclude outdated data. Keep your data fresh.
  • the method may further include the following steps: in response to obtaining the information from the terminal, Connection data generated by a connection operation of the first wireless hotspot, updating the type of the first wireless hotspot; wherein the connection data is used to indicate that a password is required to connect to the first wireless hotspot, or is used to indicate connection to the first wireless hotspot Authentication is required when the first wireless hotspot is required, or it is used to indicate that direct connection to the first wireless hotspot is allowed.
  • the types of the first wireless hotspot include encrypted wireless hotspots that require a password, open wireless hotspots that require authentication, or authentication-free ones. Open wireless hotspots.
  • the type of the first wireless hotspot can be updated according to the actually generated connection data to correct the type of the wireless hotspot that is incorrectly identified or changed.
  • the connection data generated from the terminal connected to the first wireless hotspot is collected, and the type of the first wireless hotspot is identified based on the connection data.
  • the first wireless hotspot is identified as an encrypted wireless hotspot that requires a password, and the type of the first wireless hotspot is updated accordingly.
  • the first wireless hotspot can be directly connected without authentication or password, and the wireless hotspot is identified as an open wireless hotspot without authentication, and the type of the first wireless hotspot is updated accordingly.
  • the first wireless hotspot is identified as an open wireless hotspot that requires authentication, and the first wireless hotspot is used as the second wireless hotspot to join the hotspot. Collection.
  • the wireless hotspot type can also be updated according to the above method.
  • a computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the application.
  • a network device includes a processor, and the processor executes an instruction according to the method described in the present application.
  • the network device obtains information of the first wireless hotspot in response to receiving a type confirmation request for the first wireless hotspot sent by the terminal, and the type confirmation request is used to request the type of the first wireless hotspot;
  • the information of the first wireless hotspot and the information of a plurality of second wireless hotspots in a preset hotspot set are searched to find a second wireless hotspot that is the same as or similar to the first wireless hotspot.
  • the type of the second wireless hotspot is An open wireless hotspot requiring authentication; in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, the network device identifies the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
  • this application may be implemented in software and / or a combination of software and hardware, for example, it may be implemented using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • ASIC application specific integrated circuit
  • the software program of the present application may be executed by a processor to implement the steps or functions described above.
  • the software program (including related data structures) of the present application can be stored in a computer-readable recording medium, such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some steps or functions of this application may be implemented by hardware, for example, as a circuit that cooperates with a processor to perform each step or function.
  • a part of the application may be applied as a computer program product, such as a computer program instruction, which, when executed by a computer, may call or provide the method and / or technical solution according to the application through the operation of the computer.
  • the program instructions for invoking the method of the present application may be stored in a fixed or removable recording medium, and / or transmitted through a data stream in a broadcast or other signal bearing medium, and / or stored in The program instructions are executed in a working memory of a computer device.
  • an embodiment according to the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, a trigger is triggered
  • the device operates based on the aforementioned method and / or technical solution according to various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The purpose of the present application is to provide a method for identifying a type of wireless hotspot, and a network device, said method comprising: in response to receiving a type confirmation request concerning a first wireless hotspot, obtaining information about the first wireless hotspot, said type confirmation request being used for requesting that the type of the first wireless hotspot be provided; on the basis of information of the first wireless hotspot and information of a plurality of second wireless hotspots in a preset hotspot set, searching for a second wireless hotspot which is the same as, or similar to, the first wireless hotspot, the type of said second wireless hotspot being an open wireless hotspot which requires authentication; in response to finding a second wireless hotspot which is the same as, or similar to, the first wireless hotspot, identifying the type of the first wireless hotspot as an open wireless hotspot which requires authentication. In the method for identifying a type of wireless hotspot, and network device thereof, provided by the present application, the type of wireless hotspot that is requested can be confirmed.

Description

一种用于识别无线热点的类型的方法及其网络设备Method for identifying type of wireless hotspot and network equipment thereof 技术领域Technical field
本申请涉及计算机领域,尤其涉及一种用于识别无线热点的类型的方法及其网络设备。The present application relates to the field of computers, and in particular, to a method for identifying a type of a wireless hotspot and a network device thereof.
背景技术Background technique
现有技术中,许多开放热点需要用户认证方可连接,例如,需用户输入手机号码等信息进行认证后,才允许用户通过无线热点接入因特网。当用户搜索附近的无线热点时,可能会发现周围大量的无线热点;无线热点大致分为需要输入密码才可连接的加密热点以及无需密码也能连接的开放热点;开放热点又可进一步分为无需认证的开放热点以及需要通过认证才能连接的开放热点。然而这些无线热点对于用户来说,如果不进行连接操作,则很难区分该无线热点究竟属于哪一类。In the prior art, many open hotspots require user authentication before they can connect. For example, users need to enter information such as mobile phone numbers for authentication before allowing users to access the Internet through wireless hotspots. When users search for nearby wireless hotspots, they may find a large number of nearby wireless hotspots; wireless hotspots are roughly divided into encrypted hotspots that require a password to connect and open hotspots that can be connected without a password; open hotspots can be further divided into Authenticated hotspots and open hotspots that require authentication to connect. However, for users, if the wireless hotspot is not connected, it is difficult to distinguish which category the wireless hotspot belongs to.
发明内容Summary of the Invention
本申请的一个目的是提供一种用于识别无线热点的类型的方法及其网络设备,以解决确认无线热点类型的问题。An object of the present application is to provide a method for identifying a type of a wireless hotspot and a network device thereof to solve the problem of confirming the type of a wireless hotspot.
根据本申请的一个方面,提供一种用于识别无线热点的类型的方法,应用于网络设备,包括:响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。According to an aspect of the present application, a method for identifying a type of a wireless hotspot is provided, which is applied to a network device and includes: in response to receiving a type confirmation request for a first wireless hotspot, obtaining information of the first wireless hotspot , The type confirmation request is used to request the type of the first wireless hotspot; based on the information of the first wireless hotspot and the information of multiple second wireless hotspots in a preset hotspot set, find a connection with the first wireless hotspot The same or similar second wireless hotspot, the type of the second wireless hotspot is an open wireless hotspot requiring authentication; and in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, The type of hotspot is identified as an open wireless hotspot that requires authentication.
根据本申请的另一个方面,提供一种计算机可读存储介质,所述计算机可 读存储介质存储指令,所述指令根据本申请所述的方法进行执行。According to another aspect of the present application, a computer-readable storage medium is provided, where the computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the present application.
根据本申请的又一个方面,提供一种网络设备,所述网络设备包括处理器,所述处理器根据本申请所述的方法执行指令。According to yet another aspect of the present application, a network device is provided. The network device includes a processor, and the processor executes an instruction according to the method described in the present application.
本申请提供的用于识别无线热点的类型的方法及其网络设备,可以根据类型确认请求,结合网络设备预设的热点集合,对请求的无线热点确认其是否为需身份认证的无线热点。The method for identifying the type of a wireless hotspot and the network device provided by the present application can confirm whether the requested wireless hotspot is a wireless hotspot requiring identity authentication according to the type confirmation request and a set of hotspots preset by the network device.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:Other features, objects, and advantages of the present application will become more apparent by reading the detailed description of the non-limiting embodiments with reference to the following drawings:
图1示出了本申请实施例的用于识别无线热点的类型的方法的流程示意图。FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to an embodiment of the present application.
附图中相同或相似的附图标记代表相同或相似的部件。The same or similar reference numerals in the drawings represent the same or similar components.
具体实施方式Detailed ways
下面结合附图对本申请作进一步详细描述。The present application is described in further detail below with reference to the drawings.
在本申请一个典型的配置中,终端、网络设备均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。In a typical configuration of this application, the terminal and the network device each include one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
20内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flashRAM)。内存是计算机可读介质的示例。20 Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of a computer-readable medium.
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问 的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。Computer-readable media includes permanent and non-persistent, removable and non-removable media. Information storage can be accomplished by any method or technology. Information may be computer-readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, tape disk storage or other magnetic storage devices or any other non-transmitting medium can be used to store information that can be accessed by computing devices. As defined herein, computer-readable media does not include non-transitory computer-readable media, such as modulated data signals and carrier waves.
本发明所指终端包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的电子产品,例如智能手机、平板电脑等移动电子产品,所述移动电子产品可以采用任意操作系统,如android操作系统、iOS操作系统等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述终端和网络设备还可以是运行于所述终端、网络设备、或终端与网络设备过网络相集成所构成的设备上的程序。The terminal referred to in the present invention includes, but is not limited to, any electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touch panel), such as a mobile electronic product such as a smart phone or a tablet computer. The mobile electronic product may Use any operating system, such as android operating system, iOS operating system, etc. Wherein, the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance. The hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (ASIC), and programmable logic. Devices (PLDs), field programmable gate arrays (FPGAs), digital signal processors (DSPs), embedded devices, and more. The network device includes, but is not limited to, a cloud composed of a computer, a network host, a single network server, multiple network server sets, or multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a type of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets. The network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad hoc network), and the like. Preferably, the terminal and the network device may also be programs running on the terminal, the network device, or a device formed by integrating the terminal and the network device over a network.
图1示出了本申请一些实施例的用于识别无线热点的类型的方法的流程示意图。图1所示的步骤S101至S103的执行主体主要为网络设备。如图1所示,在本申请一实施例中,用于识别无线热点的类型的方法包括:FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to some embodiments of the present application. Steps S101 to S103 shown in FIG. 1 are mainly performed by network devices. As shown in FIG. 1, in an embodiment of the present application, a method for identifying a type of a wireless hotspot includes:
步骤S101,响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型。In step S101, in response to receiving a type confirmation request for a first wireless hotspot, information of the first wireless hotspot is obtained, and the type confirmation request is used to request a type of the first wireless hotspot.
其中,该类型确认请求可来自终端,也可来自网络设备内部。第一无线热点尚未确认类型,例如尚未被所述类型确认请求的发送方确认类型。例如终端发送类型确认请求,类型确认请求携带第一无线热点的标识,以进一步获取第一无线热点的信息。也可以由服务器等网络设备收集第一无线热点名单,以对第一无线热点的类型进行确认。Among them, this type of confirmation request can come from the terminal or from within the network device. The first wireless hotspot has not yet confirmed the type, for example, the type has not been confirmed by the sender of the type confirmation request. For example, the terminal sends a type confirmation request, and the type confirmation request carries the identifier of the first wireless hotspot to further obtain the information of the first wireless hotspot. The first wireless hotspot list may also be collected by a network device such as a server to confirm the type of the first wireless hotspot.
步骤S102,基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点。Step S102: Find a second wireless hotspot that is the same as or similar to the first wireless hotspot based on the information of the first wireless hotspot and information of multiple second wireless hotspots in a preset set of hotspots. The type of wireless hotspot is an open wireless hotspot that requires authentication.
其中,网络设备可访问预设的热点集合,热点集合内包含若干第二无线热点的信息。第二无线热点为已确认为需要认证的开放无线热点。当用户连接需要认证的开放无线热点时,需要进行认证才可接入因特网,例如通过认证页面进行认证。网络设备可将已确认为需要认证的开放热点的第二无线热点添加至热点集合中。The network device can access a preset hotspot set, and the hotspot set contains information of a plurality of second wireless hotspots. The second wireless hotspot is an open wireless hotspot that has been identified as requiring authentication. When a user connects to an open wireless hotspot that requires authentication, authentication is required to access the Internet, such as authentication through an authentication page. The network device may add a second wireless hotspot that has been identified as an open hotspot that requires authentication to the hotspot set.
步骤S103,响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。Step S103: In response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, identify the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
其中,通过比较第一无线热点与第二无线热点的信息,对于与第二无线热点相同或相似的第一无线热点,将其也标记为需要认证的开放无线热点。第一无线热点与第二无线热点相同是指第一无线热点与第二无线热点的标识和物理地址相同,例如第一无线热点与第二无线热点的SSID和BSSID均相同。判定第一无线热点与第二无线热点相似的方法将在下述实施例中具体介绍。Wherein, by comparing the information of the first wireless hotspot and the second wireless hotspot, the first wireless hotspot that is the same as or similar to the second wireless hotspot is also marked as an open wireless hotspot that requires authentication. The fact that the first wireless hotspot is the same as the second wireless hotspot means that the identifiers and physical addresses of the first wireless hotspot and the second wireless hotspot are the same. For example, the SSID and BSSID of the first wireless hotspot and the second wireless hotspot are the same. A method for determining that the first wireless hotspot is similar to the second wireless hotspot will be specifically described in the following embodiments.
通过本申请实施例的方法,可以根据终端或网络设备的类型确认请求,结合网络设备的热点集合,对终端或网络设备请求的无线热点确认其是否需要认证的类型。According to the method in the embodiment of the present application, according to the type confirmation request of the terminal or the network device, and combined with the hotspot set of the network device, the wireless hotspot requested by the terminal or the network device can be used to confirm whether the type of authentication is required.
在本申请一些实施例中,所述类型确认请求来自终端,且所述类型确认请求包括所述终端扫描到的所述第一无线热点的标识。本实施例的方法还包括以下步骤:响应于所述第一无线热点的类型被识别为需要认证的开放无线热点,向所述终端反馈所述第一无线热点的标识信息以及与该标识信息对应的标签,所述标签用于指示所述第一无线热点的类型为需要认证的开放无线热点。In some embodiments of the present application, the type confirmation request is from a terminal, and the type confirmation request includes an identifier of the first wireless hotspot scanned by the terminal. The method of this embodiment further includes the following steps: in response to the type of the first wireless hotspot being identified as an open wireless hotspot requiring authentication, feeding back to the terminal identification information of the first wireless hotspot and corresponding to the identification information The tag is used to indicate that the type of the first wireless hotspot is an open wireless hotspot requiring authentication.
其中,终端上运行的应用程序可向网络设备发送类型确认请求,该类型确认请求携带第一无线热点的标识,以请求判断任意第一无线热点是否为需要认证的开放无线热点。网络设备根据第一无线热点的标识以及第一无线热点的其他相关信息,例如位置信息、厂商来源字段等,判断第一无线热点与第二无线热点是否相同或相似。当第一无线热点与第二无线热点相同或相似时,第一无线热点即为需要认证的开放无线热点。网络设备向该终端反馈第一无线热点的标识信息以及与该标识信息对应的标签,该标签指示无线热点的类型为需要认证的开放无线热点。在一些实施例中,终端上运行的应用程序向网络设备发送的类型确认请求可以包括终端向网络设备发送的热点信息获取请求,该热点信 息获取请求用于向网络设备请求终端扫描到的无线热点的信息;在一些实施例中,该热点信息获取请求可以包括终端扫描到的无线热点的标识(如SSID),并用于请求网络设备提供无线热点的类型以及扫描到的无线热点中的加密热点的密码;在一些实施例中,由于终端设备可以区分其扫描到的无线热点为加密热点还是开放热点,但难以区分开放热点是否需要认证,故上述类型确认请求可主要用于请求网络设备反馈开放热点的类型。The application running on the terminal may send a type confirmation request to the network device, and the type confirmation request carries the identifier of the first wireless hotspot to request to determine whether any of the first wireless hotspots is an open wireless hotspot requiring authentication. The network device determines whether the first wireless hotspot is the same as or similar to the second wireless hotspot based on the identification of the first wireless hotspot and other related information of the first wireless hotspot, such as location information, manufacturer source fields, and the like. When the first wireless hotspot is the same as or similar to the second wireless hotspot, the first wireless hotspot is an open wireless hotspot that requires authentication. The network device feeds back to the terminal the identification information of the first wireless hotspot and a label corresponding to the identification information, where the label indicates that the type of the wireless hotspot is an open wireless hotspot that requires authentication. In some embodiments, the type confirmation request sent by the application running on the terminal to the network device may include a hotspot information acquisition request sent by the terminal to the network device, where the hotspot information acquisition request is used to request the network device to the wireless hotspot scanned by the terminal In some embodiments, the hotspot information acquisition request may include an identification (such as an SSID) of the wireless hotspot scanned by the terminal, and is used to request the network device to provide the type of the wireless hotspot and the encrypted hotspot in the scanned wireless hotspot. Password; in some embodiments, because the terminal device can distinguish whether the wireless hotspots it scans are encrypted hotspots or open hotspots, but it is difficult to distinguish whether open hotspots require authentication, so the above type of confirmation request can be mainly used to request network devices to feedback open hotspots type.
在本申请一些实施例中,本实施例的方法在获取所述第一无线热点的信息之前还包括:获取来自终端的、基于该终端对所述第二无线热点的连接操作生成的连接数据;响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将25该第二无线热点添加至所述热点集合中。In some embodiments of the present application, before acquiring the information of the first wireless hotspot, the method of this embodiment further includes: acquiring connection data generated from a terminal based on a connection operation of the terminal to the second wireless hotspot; In response to the connection data indicating that authentication is required to connect to the second wireless hotspot, identify the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and add 25 the second wireless hotspot to the hotspot Collection.
在一些实施例中,安装于终端的应用程序,可以检测用户连接无线热点的连接操作生成的连接数据,当发现连接某个无线热点时,产生了例如认证页面等认证数据后,将该无线热点识别为需要认证的开放无线热点,即第二无线热点,并将识别结果上报给网络设备,以供网络设备将该第二无线热点的信息添加至热点集合中。在一些实施例中,应用程序可通过终端将对所述第二无线热点的连接操作生成的连接数据发送给网络设备,网络设备响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。In some embodiments, an application installed on a terminal can detect connection data generated by a user's connection operation to connect to a wireless hotspot. When a connection to a wireless hotspot is found, authentication data such as an authentication page is generated, and the wireless hotspot is generated. Identifying an open wireless hotspot that requires authentication, that is, a second wireless hotspot, and reporting the recognition result to the network device for the network device to add the information of the second wireless hotspot to the hotspot set. In some embodiments, the application may send the connection data generated by the connection operation to the second wireless hotspot to the network device through the terminal, and the network device responds to the connection data to indicate that authentication is required to connect to the second wireless hotspot. Identifying the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and adding the second wireless hotspot to the hotspot set.
具体地,所述第一无线热点或所述第二无线热点的信息包括以下至少一项:所述第一无线热点或所述第二无线热点的标识;所述第一无线热点或所述第二无线热点的位置信息;所述第一无线热点或所述第二无线热点的厂商来源字段。在一些实施例中,标识可包括SSID(Service Set Identifier,服务集标识);位置信息可包括地理位置哈希编码(geohash);厂商来源字段可包括BSSID(Basic Service Set Identifier,基本服务集标识)的前六位。Specifically, the information of the first wireless hotspot or the second wireless hotspot includes at least one of the following: an identifier of the first wireless hotspot or the second wireless hotspot; the first wireless hotspot or the first wireless hotspot Location information of two wireless hotspots; a vendor source field of the first wireless hotspot or the second wireless hotspot. In some embodiments, the identifier may include an SSID (Service Set Identifier, service set identifier); the location information may include a geographic hash code (geohash); and the vendor source field may include a BSSID (Basic Service Set Identifier, basic service set identifier) Top six.
相应地,在本申请一些实施例中,与所述第一无线热点相似的第二无线热点包括:与所述第一无线热点的标识相同并且与所述第一无线热点的厂商来源字段相同或相似的第二无线热点;或者,与所述第一无线热点的标识相同并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点;或者, 与所述第一无线热点的标识相似并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点。Correspondingly, in some embodiments of the present application, the second wireless hotspot similar to the first wireless hotspot includes: the same identifier as the first wireless hotspot and the same vendor source field as the first wireless hotspot or A similar second wireless hotspot; or a second wireless hotspot that is the same as the identifier of the first wireless hotspot and the location information indicates that it is in the same area as the first wireless hotspot; or The identification of the hotspot is similar and the location information indicates a second wireless hotspot within the same area as the first wireless hotspot.
在一些实施例中,当第二无线热点与第一无线热点的标识相同并且厂商来源字段相同或相似时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和BSSID,网络设备查询预设的热点集合中第二无线热点的SSID和BSSID,当第二无线热点与第一无线热点的SSID相同并且BSSID前六位相同时,判定第二无线热点与第一无线热点相似。In some embodiments, when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the manufacturer source fields are the same or similar, it may be determined that the second wireless hotspot is similar to the first wireless hotspot. For example, the type confirmation request includes the SSID and BSSID of the first wireless hotspot, and the network device queries the SSID and BSSID of the second wireless hotspot in a preset set of hotspots. When the bits are the same, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
在一些实施例中,当第二无线热点与第一无线热点的标识相同并且位置信息指示在同一区域内时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和位置信息,网络设备查询预设的热点集合中第二无线热点的SSID和位置信息,当第二无线热点与第一无线热点的SSID相同并且第二无线热点与第一无线热点的位置信息指示在同一区域内时,判定第二无线热点与第一无线热点相似。In some embodiments, when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot. For example, the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots. When the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
在一些实施例中,当第二无线热点与第一无线热点的标识相似并且位置信息指示在同一区域内时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和位置信息,网络设备查询预设的热点集合中第二无线热点的SSID和位置信息,当第二无线热点与第一无线热点的SSID相似并且第二无线热点与第一无线热点的位置信息指示在同一区域内时,判定第二无线热点与第一无线热点相似。In some embodiments, when the identifications of the second wireless hotspot and the first wireless hotspot are similar and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot. For example, the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots. When the second wireless hotspot is similar to the SSID of the first wireless hotspot and the first When the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
在本申请一些实施例中,所述位置信息包括地理位置的哈希编码,所述位置信息指示与所述第一无线热点在同一区域内包括:所述第一无线热点与所述第二无线热点的地理位置哈希编码具有相同的区域字段。In some embodiments of the present application, the location information includes a hash code of a geographic location, and the location information indicates that the location is in the same area as the first wireless hotspot includes: the first wireless hotspot and the second wireless hotspot Geo-location hash codes for hotspots have the same area fields.
例如,通过geohash算法将无线热点的纬度和经度分别转换为哈希编码(geohash),字符串相似的表示距离相近,可以利用字符串的前缀匹配来确定若干无线热点之间的距离。geohash编码的长度可以决定距离精度,例如,当geohash base32编码长度为8时,精度在19米左右,而当geohash base32编码长度为9时,精度在2米左右。编码长度可以根据数据情况进行选择。For example, the latitude and longitude of wireless hotspots are converted into hash codes (geohash) by geohash algorithm. Strings similar to each other indicate similar distances. The prefix matching of strings can be used to determine the distance between several wireless hotspots. The length of the geohash encoding can determine the distance accuracy. For example, when the geohash base32 encoding length is 8, the accuracy is about 19 meters, and when the geohash base32 encoding length is 9, the accuracy is about 2 meters. The encoding length can be selected according to the data.
例如地球纬度区间是[-90,90],设中心点纬度是39.928167,可以通过下面算法对纬度39.928167进行逼近编码:For example, the latitude interval of the earth is [-90,90] and the latitude of the center point is 39.928167. The latitude 39.928167 can be approximated by the following algorithm:
1)区间[-90,90]进行二分为[-90,0),[0,90],称为左右区间,可以确定39.928167属于右区间[0,90],给标记为1;1) The interval [-90,90] is divided into [-90,0), [0,90], which is called the left and right interval. It can be determined that 39.928167 belongs to the right interval [0,90], and the label is 1.
2)接着将区间[0,90]进行二分为[0,45),[45,90],可以确定39.928167属于左区间[0,45),给标记为0;2) Then divide the interval [0,90] into [0,45) and [45,90], it can be determined that 39.928167 belongs to the left interval [0,45), and the label is 0;
3)递归上述过程39.928167总是属于某个区间[a,b],随着每次迭代区间[a,b]总在缩小,并越来越逼近39.928167;3) The above process recursively 39.928167 always belongs to a certain interval [a, b], with each iteration the interval [a, b] is always shrinking and getting closer to 39.928167;
4)如果给定的纬度x(39.928167)属于左区间,则记录0,如果属于右区间则记录1,这样随着算法的进行会产生一个序列1011100,序列的长度跟给定的区间划分次数有关。4) If the given latitude x (39.928167) belongs to the left interval, then record 0, if it belongs to the right interval, then record 1, so that as the algorithm proceeds, a sequence 1011100 is generated, and the length of the sequence is related to the number of intervals given. .
同理,地球经度区间是[-180,180],可以对中心点经度116.389550进行编码。In the same way, the longitude interval of the earth is [-180, 180], and the longitude of the center point can be coded 116.389550.
通过上述计算,纬度产生的编码为10111 00011,经度产生的编码为1101001011。偶数位放经度,奇数位放纬度,把2串编码组合生成新串:11100 11101 00100 01111。Through the above calculations, the code generated by latitude is 1011100011, and the code generated by longitude is 1101001011. Put the longitude in the even digits and the latitude in the odd digits, and combine the two strings to generate a new string: 11100 11101 00100 01111.
最后使用用0-9、b-z(去掉a,i,1,o)这32个字母进行base32编码,首先将11100 11101 00100 01111转成十进制,对应着28、29、4、15,十进制对应的编码就是wx4g,作为中心点的geohash编码。Finally, use the 32 letters 0-9, bz (remove a, i, 1, o) to perform base32 encoding. First convert 11100, 11101, 00100, 01111 to decimal, corresponding to 28, 29, 4, 15, and the corresponding decimal encoding. It is wx4g, the geohash encoding as the center point.
同理,第二无线热点和第一无线热点也可分别计算其geohash编码,例如,第二无线热点和第一无线热点的geohash编码分别为8位,可以设中心点的geohash编码前6位为区域字段。如果第二无线热点和第一无线热点的地理位置哈希编码前6位,即区域字段相同,即表明第二无线热点和第一无线热点在同一区域内。区域字段的长度可以根据实际精度需要自由设定。Similarly, the second wireless hotspot and the first wireless hotspot can also calculate their geohash codes. For example, the second wireless hotspot and the first wireless hotspot have 8 geohash codes, and the first 6 bits of the geohash code of the center point can be set as Area field. If the geographic location hash codes of the second wireless hotspot and the first wireless hotspot are the first 6 bits, that is, the area fields are the same, it means that the second wireless hotspot and the first wireless hotspot are in the same area. The length of the area field can be set freely according to the actual accuracy requirements.
在本申请一些实施例中,所述第二无线热点与所述第一无线热点的标识相似包括:所述第一无线热点的标识与所述第二无线热点的标识的编辑距离在预设相似度阈值内。In some embodiments of the present application, the identifiers of the second wireless hotspot and the first wireless hotspot are similar to each other. The edit distance between the identifier of the first wireless hotspot and the identifier of the second wireless hotspot is similar to a preset. Within the threshold.
其中,编辑距离(Edit Distance),又称Levenshtein距离,是指两个字串之间,由一个转成另一个所需的最少编辑操作次数。许可的编辑操作包括将一个字符替换成另一个字符,插入一个字符,删除一个字符。例如,要计算cafe和coffee的编辑距离可根据cafe→caffe→coffe→coffee的顺序进行计算。一般来 说,编辑距离越小,两个串的相似度越大。Among them, Edit Distance, also known as Levenshtein distance, refers to the minimum number of editing operations required to change from one string to another between two strings. Permissible editing operations include replacing one character with another, inserting a character, and deleting a character. For example, to calculate the edit distance between cafe and coffee, you can calculate according to the order of cafe → caffe → coffe → coffee. In general, the smaller the edit distance, the greater the similarity between the two strings.
例如,对于两个字符串str1和str2,设第二无线热点SSID为str1,第一无线热点SSID为str02。生成如下矩阵:For example, for the two strings str1 and str2, let the second wireless hotspot SSID be str1 and the first wireless hotspot SSID be str02. Generate the following matrix:
 Zh  Zh ss tt rr 00 22
 Zh 00 11 22 33 44 55
ss 11  Zh  Zh  Zh  Zh  Zh
tt 22  Zh  Zh  Zh  Zh  Zh
rr 33  Zh  Zh  Zh  Zh  Zh
ll 44  Zh  Zh  Zh  Zh D[n,m]D [n, m]
根据公式(1)计算矩阵中每个单元的值:Calculate the value of each cell in the matrix according to formula (1):
d[i,5j]=min(d[i-1,j]+1、d[i,j-1]+1、d[i-1,j-1]+temp)..................(1);d [i, 5j] = min (d [i-1, j] +1, d [i, j-1] +1, d [i-1, j-1] + temp) ... ............(1);
其中,当str1[i]==str2[j]时,temp=0;否则,temp=1。i、j为自然数且i≥2,j≥2。d[i-1,j]+1表示增加操作,d[i,j-1]+1表示删除操作,d[i-1,j-1]+temp表示替换操作。Among them, when str1 [i] == str2 [j], temp = 0; otherwise, temp = 1. i and j are natural numbers and i≥2, j≥2. d [i-1, j] +1 represents an increase operation, d [i, j-1] +1 represents a delete operation, and d [i-1, j-1] + temp represents a replacement operation.
编辑距离可根据公式(2)计算得到:The edit distance can be calculated according to formula (2):
编辑距离=1-D[n,m]/max(str1字符串长度,str2字符串长度)......(2);Edit distance = 1-D [n, m] / max (str1 string length, str2 string length) ... (2);
其中,D[n,m]为编辑距离计算矩阵的最后一位。Among them, D [n, m] is the last bit of the edit distance calculation matrix.
利用编辑距离算法对第二无线热点SSID与第一无线热点SSID进行计算,得到其编辑距离。通过预设相似度阈值对两个SSID相似度进行筛选,当编辑距离在预设相似度阈值之内时,确定第二无线热点与所述第一无线热点的SSID相似。如果第二无线热点与所述第一无线热点还在同一区域内时,可基本判定第二无线热点与所述第一无线热点相似。The edit distance algorithm is used to calculate the second wireless hotspot SSID and the first wireless hotspot SSID to obtain its edit distance. The similarity of the two SSIDs is filtered by a preset similarity threshold. When the editing distance is within the preset similarity threshold, it is determined that the SSID of the second wireless hotspot is similar to the SSID of the first wireless hotspot. If the second wireless hotspot and the first wireless hotspot are still in the same area, it can be basically determined that the second wireless hotspot is similar to the first wireless hotspot.
在本申请一些实施例中,前述响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中的步骤,包括:In some embodiments of the present application, in response to the connection data indicating that authentication is required to connect to the second wireless hotspot, the type of the second wireless hotspot is identified as an open wireless hotspot that requires authentication, and the first The step of adding two wireless hotspots to the hotspot set includes:
响应于所述连接数据指示连接所述第二无线热点时需要认证且该连接认证数据指示的连接时间在预设时间阈值之内,将该所述第二无线热点的类型识 别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。In response to the connection data indicating that authentication is required when connecting to the second wireless hotspot and the connection time indicated by the connection authentication data is within a preset time threshold, identifying the type of the second wireless hotspot as an open that requires authentication A wireless hotspot, and adding the second wireless hotspot to the hotspot set.
在一些实施例中,当网络设备收集来自终端设备的无线热点的连接数据时,可生成数据列表;该数据列表可包含无线热点标识、无线热点需要认证的信息、以及连接时间。通过设置预设时间阈值,仅对在预设时间阈值之内产生的连接数据的无线热点添加认证无线热点标签,可筛选出最近一段时间内产生认证情况的开放无线热点,以排除过期的数据,保持数据的鲜活性。In some embodiments, when a network device collects connection data from a wireless hotspot of a terminal device, a data list may be generated; the data list may include a wireless hotspot identification, information that the wireless hotspot needs authentication, and a connection time. By setting a preset time threshold, only authentication wireless hotspot tags are added to wireless hotspots of connection data generated within the preset time threshold, and open wireless hotspots that have generated authentication in the recent period of time can be filtered to exclude outdated data. Keep your data fresh.
在本申请一些实施例中,该方法在将该第一无线热点的类型识别为需要认证的开放无线热点之后,还包括可包括以下步骤:响应于获取到来自终端的、基于该终端对所述第一无线热点的连接操作生成的连接数据,更新所述第一无线热点的类型;其中,所述连接数据用于指示连接所述第一无线热点时需要提供密码、或者用于指示连接所述第一无线热点时需要进行认证、或者用于指示允许直接连接所述第一无线热点,所述第一无线热点的类型包括需要提供密码的加密无线热点、需要认证的开放无线热点或者无需认证的开放无线热点。In some embodiments of the present application, after the method identifies the type of the first wireless hotspot as an open wireless hotspot requiring authentication, the method may further include the following steps: in response to obtaining the information from the terminal, Connection data generated by a connection operation of the first wireless hotspot, updating the type of the first wireless hotspot; wherein the connection data is used to indicate that a password is required to connect to the first wireless hotspot, or is used to indicate connection to the first wireless hotspot Authentication is required when the first wireless hotspot is required, or it is used to indicate that direct connection to the first wireless hotspot is allowed. The types of the first wireless hotspot include encrypted wireless hotspots that require a password, open wireless hotspots that require authentication, or authentication-free ones. Open wireless hotspots.
通过上述实施例,可以根据实际产生的连接数据,更新第一无线热点的类型,以对被错误识别或发生变化的无线热点的类型进行纠错。例如,收集来自于终端的因连接第一无线热点而产生的连接数据,基于连接数据对第一无线热点的类型进行识别。例如,基于对连接数据分析确定连接第一无线热点需要提供密码,则将该第一无线热点识别为需要提供密码的加密无线热点,并相应更新该第一无线热点的类型。或者,基于对连接数据分析确定该第一无线热点无需认证或密码即可直接连接,则将该无线热点识别为无需认证的开放无线热点,并相应更新该第一无线热点的类型。又如,基于对连接数据分析确定连接该第一无线热点需要认证的,则将该第一无线热点识别为需认证的开放无线热点,并将该第一无线热点作为第二无线热点,加入热点集合中。通过上述步骤,就可将错误标记为需认证的开放无线热点的情况改正。According to the foregoing embodiment, the type of the first wireless hotspot can be updated according to the actually generated connection data to correct the type of the wireless hotspot that is incorrectly identified or changed. For example, the connection data generated from the terminal connected to the first wireless hotspot is collected, and the type of the first wireless hotspot is identified based on the connection data. For example, based on the analysis of the connection data, it is determined that a password is required to connect to the first wireless hotspot, then the first wireless hotspot is identified as an encrypted wireless hotspot that requires a password, and the type of the first wireless hotspot is updated accordingly. Alternatively, based on the analysis of the connection data, it is determined that the first wireless hotspot can be directly connected without authentication or password, and the wireless hotspot is identified as an open wireless hotspot without authentication, and the type of the first wireless hotspot is updated accordingly. As another example, if it is determined that authentication is required to connect to the first wireless hotspot based on the analysis of the connection data, the first wireless hotspot is identified as an open wireless hotspot that requires authentication, and the first wireless hotspot is used as the second wireless hotspot to join the hotspot. Collection. Through the above steps, the situation where the error is marked as an open wireless hotspot to be authenticated can be corrected.
此外,对于无线热点类型发生实际变化的情况,例如,原有不需要身份认证的无线热点变为加密无线热点,也可根据上述方法更新无线热点类型。In addition, for the actual change of the wireless hotspot type, for example, the original wireless hotspot that does not require identity authentication becomes an encrypted wireless hotspot, the wireless hotspot type can also be updated according to the above method.
根据本申请的另一个方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储指令,所述指令根据本申请所述的方法进行执行。According to another aspect of the present application, a computer-readable storage medium is provided, where the computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the application.
根据本申请的又一个方面,提供一种网络设备,所述网络设备包括处理器, 所述处理器根据本申请所述的方法执行指令。According to another aspect of the present application, a network device is provided. The network device includes a processor, and the processor executes an instruction according to the method described in the present application.
例如,网络设备响应于接收到终端发送的针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;网络设备基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;网络设备响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。For example, the network device obtains information of the first wireless hotspot in response to receiving a type confirmation request for the first wireless hotspot sent by the terminal, and the type confirmation request is used to request the type of the first wireless hotspot; The information of the first wireless hotspot and the information of a plurality of second wireless hotspots in a preset hotspot set are searched to find a second wireless hotspot that is the same as or similar to the first wireless hotspot. The type of the second wireless hotspot is An open wireless hotspot requiring authentication; in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, the network device identifies the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various modifications and variations to this application without departing from the spirit and scope of this application. In this way, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalent technologies, this application also intends to include these modifications and variations.
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。It should be noted that this application may be implemented in software and / or a combination of software and hardware, for example, it may be implemented using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device. In one embodiment, the software program of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software program (including related data structures) of the present application can be stored in a computer-readable recording medium, such as a RAM memory, a magnetic or optical drive or a floppy disk and the like. In addition, some steps or functions of this application may be implemented by hardware, for example, as a circuit that cooperates with a processor to perform each step or function.
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。而调用本申请的方法的程序指令,可能被存储在固定的或可移动的记录介质中,和/或通过广播或其他信号承载媒体中的数据流而被传输,和/或被存储在根据所述程序指令运行的计算机设备的工作存储器中。在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。In addition, a part of the application may be applied as a computer program product, such as a computer program instruction, which, when executed by a computer, may call or provide the method and / or technical solution according to the application through the operation of the computer. The program instructions for invoking the method of the present application may be stored in a fixed or removable recording medium, and / or transmitted through a data stream in a broadcast or other signal bearing medium, and / or stored in The program instructions are executed in a working memory of a computer device. Here, an embodiment according to the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, a trigger is triggered The device operates based on the aforementioned method and / or technical solution according to various embodiments of the present application.
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现 本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。It is obvious to a person skilled in the art that the present application is not limited to the details of the above exemplary embodiments, and can be implemented in other specific forms without departing from the spirit or basic features of the application. Therefore, the embodiments are to be regarded as exemplary and non-limiting in every respect. The scope of the present application is defined by the appended claims rather than the above description, and therefore is intended to fall within the claims. All changes within the meaning and scope of the equivalent requirements are included in this application. Any reference signs in the claims should not be construed as limiting the claims involved. In addition, it is obvious that the word "comprising" does not exclude other units or steps, and that the singular does not exclude the plural. A plurality of units or devices stated in a device claim may also be implemented by one unit or device through software or hardware. Words such as first and second are used to indicate names, but not in any particular order.

Claims (11)

  1. 一种用于识别无线热点的类型的方法,应用于网络设备,其特征在于,包括:A method for identifying the type of a wireless hotspot, which is applied to a network device and is characterized in that it includes:
    响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;In response to receiving a type confirmation request for a first wireless hotspot, acquiring information of the first wireless hotspot, the type confirmation request being used to request a type of the first wireless hotspot;
    基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;Find a second wireless hotspot that is the same as or similar to the first wireless hotspot based on the information of the first wireless hotspot and information of multiple second wireless hotspots in a preset hotspot set The type is an open wireless hotspot that requires authentication;
    响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。In response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, the type of the first wireless hotspot is identified as an open wireless hotspot requiring authentication.
  2. 根据权利要求1所述的方法,其中,所述类型确认请求来自终端,且所述类型确认请求包括所述终端扫描到的所述第一无线热点的标识;The method according to claim 1, wherein the type confirmation request is from a terminal, and the type confirmation request includes an identification of the first wireless hotspot scanned by the terminal;
    该方法还包括:响应于所述第一无线热点的类型被识别为需要认证的开放无线热点,向所述终端反馈所述第一无线热点的标识信息以及与该标识信息对应的标签,所述标签用于指示所述第一无线热点的类型为需要认证的开放无线热点。The method further includes: in response to the type of the first wireless hotspot being identified as an open wireless hotspot requiring authentication, feeding back to the terminal identification information of the first wireless hotspot and a tag corresponding to the identification information, the The tag is used to indicate that the type of the first wireless hotspot is an open wireless hotspot that requires authentication.
  3. 根据权利要求1所述的方法,该方法在获取所述第一无线热点的信息之前还包括:The method according to claim 1, before obtaining the information of the first wireless hotspot, further comprising:
    获取来自终端的、基于该终端对所述第二无线热点的连接操作生成的连接数据;Acquiring connection data from a terminal that is generated based on the terminal's connection operation to the second wireless hotspot;
    响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。In response to the connection data indicating that authentication is required when connecting to the second wireless hotspot, identify the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and add the second wireless hotspot to the hotspot set in.
  4. 根据权利要求1所述的方法,其特征在于,所述第一无线热点或所述第二无线热点的信息包括以下至少一项:The method according to claim 1, wherein the information of the first wireless hotspot or the second wireless hotspot comprises at least one of the following:
    所述第一无线热点或所述第二无线热点的标识;Identification of the first wireless hotspot or the second wireless hotspot;
    所述第一无线热点或所述第二无线热点的位置信息;Location information of the first wireless hotspot or the second wireless hotspot;
    所述第一无线热点或所述第二无线热点的厂商来源字段。A vendor source field of the first wireless hotspot or the second wireless hotspot.
  5. 根据权利要求4所述的方法,其特征在于,与所述第一无线热点相似的第 二无线热点包括:The method according to claim 4, wherein the second wireless hotspot similar to the first wireless hotspot comprises:
    与所述第一无线热点的标识相同并且与所述第一无线热点的厂商来源字段相似的第二无线热点;A second wireless hotspot that has the same identifier as the first wireless hotspot and is similar to the vendor source field of the first wireless hotspot;
    与所述第一无线热点的标识相同并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点;或者Is the same as the identifier of the first wireless hotspot and the location information indicates a second wireless hotspot in the same area as the first wireless hotspot; or
    与所述第一无线热点的标识相似并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点。Similar to the identification of the first wireless hotspot and the location information indicates a second wireless hotspot in the same area as the first wireless hotspot.
  6. 根据权利要求5所述的方法,其特征在于,所述位置信息包括地理位置的哈希编码,所述位置信息指示与所述第一无线热点在同一区域内包括:The method according to claim 5, wherein the location information comprises a hash code of a geographic location, and the location information indicating that the location is in the same area as the first wireless hotspot comprises:
    所述第一无线热点与所述第二无线热点的地理位置哈希编码具有相同的区域字段。The geographic hash codes of the first wireless hotspot and the second wireless hotspot have the same area field.
  7. 根据权利要求5所述的筛选方法,其特征在于,所述第二无线热点与所述第一无线热点的标识相似包括:所述第一无线热点的标识与所述第二无线热点的标识的编辑距离在预设相似度阈值内。The screening method according to claim 5, wherein the identification of the second wireless hotspot similar to the identification of the first wireless hotspot comprises: the identification of the first wireless hotspot and the identification of the second wireless hotspot The edit distance is within a preset similarity threshold.
  8. 根据权利要求3所述的方法,其特征在于,响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中,包括:The method according to claim 3, wherein in response to the connection data indicating that authentication is required when connecting to the second wireless hotspot, identifying the type of the second wireless hotspot as an open wireless hotspot requiring authentication, And adding the second wireless hotspot to the hotspot set includes:
    响应于所述连接数据指示连接所述第二无线热点时需要认证且该连接数据指示的连接时间在预设时间阈值之内,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。In response to the connection data indicating that authentication is required when connecting to the second wireless hotspot and the connection time indicated by the connection data is within a preset time threshold, identifying the type of the second wireless hotspot as an open wireless that requires authentication A hotspot, and adding the second wireless hotspot to the hotspot set.
  9. 根据权利要求1所述的方法,其特征在于,该方法在将该第一无线热点的类型识别为需要认证的开放无线热点之后,还包括:The method according to claim 1, wherein after identifying the type of the first wireless hotspot as an open wireless hotspot requiring authentication, the method further comprises:
    响应于获取到来自终端的、基于该终端对所述第一无线热点的连接操作生成的连接数据,更新所述第一无线热点的类型,其中,所述连接数据用于指示连接所述第一无线热点时需要提供密码、或者用于指示连接所述第一无线热点时需要进行认证、或者用于指示允许直接连接所述第一无线热点,所述第一无线热点的类型包括需要提供密码的加密无线热点、需要认证的开放无线热点或者无需认证的开放无线热点。In response to acquiring connection data from a terminal that is generated based on the terminal's connection operation to the first wireless hotspot, the type of the first wireless hotspot is updated, where the connection data is used to indicate connection to the first wireless hotspot The wireless hotspot needs to provide a password, or is used to indicate that authentication is required when connecting to the first wireless hotspot, or is used to indicate that direct connection to the first wireless hotspot is allowed. The type of the first wireless hotspot includes a password that needs to be provided. Encrypted wireless hotspots, open wireless hotspots that require authentication, or open wireless hotspots that do not require authentication.
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储指 令,所述指令根据权利要求1至9中任一项所述的方法进行执行。A computer-readable storage medium, characterized in that the computer-readable storage medium stores instructions, and the instructions are executed according to the method according to any one of claims 1 to 9.
  11. 一种网络设备,其特征在于,所述网络设备包括处理器,所述处理器根据权利要求1至9中任一项所述的方法执行指令。A network device, wherein the network device includes a processor, and the processor executes instructions according to the method of any one of claims 1 to 9.
PCT/CN2019/088297 2018-06-01 2019-05-24 Method for identifying type of wireless hotspot, and network device thereof WO2019228257A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG11202011923PA SG11202011923PA (en) 2018-06-01 2019-05-24 A method for identifying a type of a wireless hotspot and a network device thereof
US17/106,189 US11368901B2 (en) 2018-06-01 2020-11-30 Method for identifying a type of a wireless hotspot and a network device thereof

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201810557552.0 2018-06-01
CN201810557552 2018-06-01
CN201810600611.8A CN110557800B (en) 2018-06-01 2018-06-12 Method for identifying type of wireless hotspot and network equipment thereof
CN201810600611.8 2018-06-12

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/106,189 Continuation US11368901B2 (en) 2018-06-01 2020-11-30 Method for identifying a type of a wireless hotspot and a network device thereof

Publications (1)

Publication Number Publication Date
WO2019228257A1 true WO2019228257A1 (en) 2019-12-05

Family

ID=68697409

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/088297 WO2019228257A1 (en) 2018-06-01 2019-05-24 Method for identifying type of wireless hotspot, and network device thereof

Country Status (1)

Country Link
WO (1) WO2019228257A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301567A (en) * 2021-04-29 2021-08-24 海尔(深圳)研发有限责任公司 Network distribution method and device and intelligent household equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533608A (en) * 2013-09-30 2014-01-22 深圳市同洲电子股份有限公司 Wireless hotspot SSID (service set identifier) naming method and wireless hotspot identification method and equipment
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN106162649A (en) * 2015-04-20 2016-11-23 中兴通讯股份有限公司 A kind of identify the method for WAP legitimacy, terminal and system
CN106341861A (en) * 2015-07-08 2017-01-18 腾讯科技(深圳)有限公司 Method and system for recognizing wireless access point and server
CN106792704A (en) * 2015-11-24 2017-05-31 中国移动通信集团公司 A kind of method and device for detecting fishing access point
WO2017128546A1 (en) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for securely accessing wifi network
US20180014243A1 (en) * 2015-07-08 2018-01-11 Tencent Technology (Shenzhen) Company Limited Method for identifying wireless ap, server, system, and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533608A (en) * 2013-09-30 2014-01-22 深圳市同洲电子股份有限公司 Wireless hotspot SSID (service set identifier) naming method and wireless hotspot identification method and equipment
CN106162649A (en) * 2015-04-20 2016-11-23 中兴通讯股份有限公司 A kind of identify the method for WAP legitimacy, terminal and system
CN106341861A (en) * 2015-07-08 2017-01-18 腾讯科技(深圳)有限公司 Method and system for recognizing wireless access point and server
US20180014243A1 (en) * 2015-07-08 2018-01-11 Tencent Technology (Shenzhen) Company Limited Method for identifying wireless ap, server, system, and computer storage medium
CN105162768A (en) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 Method and device for detecting phishing Wi-Fi hotspots
CN106792704A (en) * 2015-11-24 2017-05-31 中国移动通信集团公司 A kind of method and device for detecting fishing access point
WO2017128546A1 (en) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 Method and apparatus for securely accessing wifi network

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301567A (en) * 2021-04-29 2021-08-24 海尔(深圳)研发有限责任公司 Network distribution method and device and intelligent household equipment
CN113301567B (en) * 2021-04-29 2022-11-18 海尔(深圳)研发有限责任公司 Network distribution method and device and intelligent household equipment

Similar Documents

Publication Publication Date Title
KR102079860B1 (en) Text address processing method and device
US11368901B2 (en) Method for identifying a type of a wireless hotspot and a network device thereof
JP6599906B2 (en) Login account prompt
TWI659300B (en) Method and device for providing equipment identification
US20150161207A1 (en) Assisting query and querying
EP3767483A1 (en) Method, device, system, and server for image retrieval, and storage medium
WO2019205373A9 (en) Similar user search apparatus and method, and computer readable storage medium
WO2022100154A1 (en) Artificial intelligence-based address standardization method and apparatus, device and storage medium
CN108563697B (en) Data processing method, device and storage medium
CN113282799B (en) Node operation method, node operation device, computer equipment and storage medium
WO2018010693A1 (en) Method and apparatus for identifying information from rogue base station
CN108684044B (en) User behavior detection system, method and device
CN108449778B (en) Wireless access point display method and device and terminal equipment
WO2023040530A1 (en) Webpage content traceability method, knowledge graph construction method and related device
CN106202440B (en) Data processing method, device and equipment
WO2019228257A1 (en) Method for identifying type of wireless hotspot, and network device thereof
CN111782728A (en) Data synchronization method, device, electronic equipment and medium
CN105843809B (en) Data processing method and device
CN114240344A (en) Enterprise personnel data processing method and device, computer equipment and storage medium
US11394748B2 (en) Authentication method for anonymous account and server
CN110427538B (en) Data query method, data storage method, data query device, data storage device and electronic equipment
CN112800033B (en) Data operation request processing method and device, computer equipment and storage medium
WO2018082252A1 (en) Detection processing method, apparatus and device for mobile terminal and computer storage medium
CN113672669A (en) Data query method and device based on distributed storage
CN109522014B (en) Algorithm processing method based on new product development, electronic device and readable storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19812053

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/03/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19812053

Country of ref document: EP

Kind code of ref document: A1