CN106412907B - Network access method, related equipment and system - Google Patents

Network access method, related equipment and system Download PDF

Info

Publication number
CN106412907B
CN106412907B CN201610826490.XA CN201610826490A CN106412907B CN 106412907 B CN106412907 B CN 106412907B CN 201610826490 A CN201610826490 A CN 201610826490A CN 106412907 B CN106412907 B CN 106412907B
Authority
CN
China
Prior art keywords
dimensional code
hotspot
mobile terminal
information
access information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610826490.XA
Other languages
Chinese (zh)
Other versions
CN106412907A (en
Inventor
张海龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201610826490.XA priority Critical patent/CN106412907B/en
Publication of CN106412907A publication Critical patent/CN106412907A/en
Priority to PCT/CN2017/095315 priority patent/WO2018049940A1/en
Application granted granted Critical
Publication of CN106412907B publication Critical patent/CN106412907B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention provides a network access method, related equipment and a system, wherein the method comprises the following steps: establishing a hotspot and generating access information of the hotspot, wherein the access information comprises a hotspot name and a random password corresponding to the hotspot name; encrypting the access information; and generating a two-dimensional code from the encrypted access information so that the terminal equipment can access the hotspot through the two-dimensional code. The embodiment of the invention can improve the security of network access.

Description

Network access method, related equipment and system
Technical Field
The invention relates to the technical field of internet, in particular to a network access method, related equipment and a system.
Background
With the rapid development of information technology, mobile terminals (such as mobile phones, tablet computers, and the like) are updated more and more frequently. At present, the function of moving the mobile phone is provided for users in the market when the mobile phone is changed. The function can copy the whole old mobile phone data, software and the like to a new mobile phone without changing the mobile phone, thereby providing convenience for users to change the mobile phone, but before moving the data, if the mobile terminal is accessed into unknown terminal equipment, information leakage can be caused, and therefore, the safety of data migration is reduced.
Disclosure of Invention
The embodiment of the invention provides a network access method, related equipment and a system, aiming at improving the security of network access.
A first aspect of an embodiment of the present invention provides a network access method, including:
establishing a hotspot and generating access information of the hotspot, wherein the access information comprises a hotspot name and a random password corresponding to the hotspot name;
encrypting the access information;
and generating a two-dimensional code from the encrypted access information so that the terminal equipment can access the hotspot through the two-dimensional code.
A second aspect of the embodiments of the present invention provides a network access method, including:
identifying information of a two-dimensional code generated by a mobile terminal;
decrypting the information to obtain access information, wherein the access information comprises a hotspot name and a random password;
and searching a hotspot according to the hotspot name, and accessing the hotspot through the random password.
A third aspect of the embodiments of the present invention provides a mobile terminal, including:
the device comprises an establishing unit, a receiving unit and a sending unit, wherein the establishing unit is used for establishing a hotspot and generating access information of the hotspot, and the access information comprises a hotspot name and a random password corresponding to the hotspot name;
an encryption unit, configured to encrypt the access information;
and the generating unit is used for generating the encrypted access information into a two-dimensional code so that the terminal equipment can access the hotspot through the two-dimensional code.
A fourth aspect of the embodiments of the present invention provides a terminal device, including:
an identification unit for identifying information of a two-dimensional code generated by a mobile terminal;
the decryption unit is used for decrypting the information to obtain access information, and the access information comprises a hotspot name and a random password;
and the access unit is used for searching the hot spot according to the hot spot name and accessing the hot spot through the random password.
A fifth aspect of an embodiment of the present invention provides a mobile terminal, including:
a processor and a memory; wherein the processor performs some or all of the steps of the method described in the first aspect by calling code or instructions in the memory.
A sixth aspect of the embodiments of the present invention provides a terminal device, including:
a processor and a memory; wherein the processor performs some or all of the steps of the method described in the first aspect by calling code or instructions in the memory.
A seventh aspect of the present invention provides a network access system, including:
a mobile terminal as described in the third aspect and a terminal device as described in the fourth aspect.
The embodiment of the invention has the following beneficial effects:
the embodiment of the invention establishes the hotspot, generates the access information of the hotspot, encrypts the access information, and generates the two-dimensional code of the encrypted access information, so that the terminal equipment can access the hotspot through the two-dimensional code. Therefore, the access information can be encrypted, and the encrypted access information is generated into the two-dimensional code, so that the network access security can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic network architecture diagram of a network access system according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a network access method according to a first embodiment of the present invention;
fig. 3 is a flowchart illustrating a network access method according to a second embodiment of the present invention;
fig. 4a is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention;
fig. 4b is a schematic structural diagram of an encryption unit of the mobile terminal depicted in fig. 4a according to an embodiment of the present invention;
fig. 5a is a schematic structural diagram of a terminal device according to a first embodiment of the present invention;
fig. 5b is a schematic structural diagram of an identification unit of the terminal device depicted in fig. 5a according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a mobile terminal according to a second embodiment of the present invention;
fig. 7 is a schematic structural diagram of a terminal device according to a second embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of the invention and in the accompanying drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The data described in the embodiments of the present invention may include applications (e.g., social applications, video applications, photographing applications, game applications, etc.), folders, files (e.g., text files, video files, audio files, photos, etc.), cache data, data to be migrated, etc., which are merely illustrative and not exhaustive, and include but not limited to the above data.
The Mobile terminal or the terminal device described in the embodiment of the present invention may include a smart Phone (such as an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a notebook computer, a Mobile Internet device (MID, Mobile Internet Devices), a wearable device, etc., which are merely examples, but are not exhaustive, and include but are not limited to the Mobile terminal or the terminal device. Certainly, the terminal device mentioned in the embodiment of the present invention may be the same as the mobile terminal, for example, the terminal device is a mobile phone, and the mobile terminal is another mobile phone; the terminal device may also be different from the mobile terminal, for example, the terminal device is a mobile phone, and the mobile terminal is a tablet computer.
The data transmission channels described in the embodiments of the present invention may include, but are not limited to: the mobile terminal comprises a hotspot, bluetooth, infrared, Wireless Fidelity (Wi-Fi), a wire and the like, specifically, when the hotspot is opened at the mobile terminal, the terminal equipment is connected with the mobile terminal, and a data transmission channel can be established between the hotspot and the mobile terminal; the Bluetooth is opened at the mobile terminal, the terminal equipment is connected with the mobile terminal, and a data transmission channel can be established between the mobile terminal and the terminal equipment; opening infrared at the mobile terminal, connecting the terminal equipment with the mobile terminal, and establishing a data transmission channel between the terminal equipment and the mobile terminal; the mobile terminals are connected with a certain Wi-Fi, the terminal equipment is indirectly connected with the mobile terminals, and a data transmission channel can be established between the mobile terminals and the terminal equipment; the mobile terminal and the terminal equipment are connected through a wire, and a data transmission channel can be established between the mobile terminal and the terminal equipment.
Referring to fig. 1, fig. 1 provides a network architecture of a network access system according to an embodiment of the present invention, where the network architecture may include: mobile terminal and terminal equipment. The mobile terminal and the terminal device can establish communication connection through a Wi-Fi network, a mobile communication network (such as 2G, 3G, 4G, 5G and the like), and a wired network. In the embodiment of the invention, the mobile terminal can establish the hotspot and generate access information of the hotspot, the access information comprises a hotspot name and a random password corresponding to the hotspot name, the mobile terminal encrypts the access information, generates a two-dimensional code from the encrypted access information so that the terminal equipment can identify the two-dimensional code, identifies the information of the two-dimensional code generated by the mobile terminal, decrypts the information to obtain the access information, the access information comprises the hotspot name and the random password, searches the hotspot according to the hotspot name, and accesses the hotspot through the random password. After the terminal device accesses the hotspot established by the mobile terminal, data migration can be further performed.
Referring to fig. 2, a network architecture of a network access system described in fig. 1 is a flowchart illustrating a first embodiment of a network access method according to an embodiment of the present invention. The network access method described in this embodiment includes the following steps:
201. establishing a hotspot and generating access information of the hotspot, wherein the access information comprises a hotspot name and a random password corresponding to the hotspot name.
The mobile terminal may establish a hotspot and may generate a hotspot name according to a preset manner, for example, oppo _ r9_ xxxx, where oppo _ r9 is a fixed mark, xxxx is a random code, and the fixed mark and the random code form the hotspot name. Random algorithm can be adopted to generate random passwords corresponding to the hotspot names, access information is formed by the hotspot names and the random passwords corresponding to the hotspot names, and other terminal equipment can be accessed to the hotspots according to the access information. Because the hotspot name and the corresponding password are both generated randomly, the security of the hotspot can be improved.
202. And encrypting the access information.
The access information can be encrypted by adopting an encryption algorithm, and the security of the encrypted access information is higher. Of course, one or more times of encryption may be employed for the access information, where one encryption may improve the security of the access information, and the security of the access information may be higher after multiple encryptions, but the computational complexity may also be increased, and in addition, the decryption may also be relatively complex.
Alternatively, step 201 may comprise the steps of:
21) acquiring unique identification information of the mobile terminal;
22) and encrypting the access information according to the unique identification information.
Wherein, the unique identification information may include but is not limited to: an Integrated Circuit Card Identification (ICCID), an International Mobile Equipment Identity (IMEI), a phone number, a character string input by a user from a Mobile terminal, iris information, fingerprint information, face information, and the like. Further, the unique identification information can be used as a key, and a certain encryption algorithm is adopted to encrypt the access information. Among other things, the encryption algorithm may include, but is not limited to: a symmetric encryption algorithm, an asymmetric encryption algorithm, an exclusive-or encryption algorithm, and the like.
Optionally, the encrypting the access information according to the unique identification information may include the following steps:
220) acquiring a current position;
221) determining a target encryption algorithm corresponding to the current position according to the mapping relation between the encryption algorithm and the position;
222) and encrypting the access information by using the unique identification information as a secret key and adopting the target encryption algorithm.
The user location may be obtained through a Global Positioning System (GPS), or the current location may be obtained through a Wi-Fi Positioning technology. The mapping between encryption algorithms and locations may be predetermined, e.g., a location a for one encryption algorithm, a location B for one encryption algorithm, a location C for one encryption algorithm, etc. Therefore, different encryption algorithms can be adopted to encrypt the access information at different positions, and further, the unique identification information is used as a key, and the target encryption algorithm corresponding to the current position is adopted to encrypt the access information, so that the access difficulty of other terminal equipment accessing the mobile terminal can be increased, and the access security before data migration can be determined.
203. And generating a two-dimensional code from the encrypted access information so that the terminal equipment can access the hotspot through the two-dimensional code.
The encrypted access information can be generated into a two-dimensional code, the two-dimensional code can be a two-dimensional code picture, the two-dimensional code can be displayed on a display interface of the mobile terminal, and the two-dimensional code can be broadcasted within a preset range. The two-dimensional code can be identified by other terminal equipment. The preset range may be specified by system default or by a user.
Optionally, the two-dimensional code may be a one-time two-dimensional code, that is, the two-dimensional code may be destroyed or invalidated by itself after the terminal device accesses the mobile terminal once, and after the two-dimensional code is destroyed or invalidated, the corresponding hotspot name and the corresponding random password thereof may also be cleared. Of course, the two-dimensional code may also be set to a number of times of use, within the number of times of use, the two-dimensional code is valid, and outside the number of times of use, the two-dimensional code is invalid.
Optionally, the two-dimensional code may have a certain valid time period, and if the two-dimensional code is not in the valid time period, the two-dimensional code cannot be validated. For example, the valid time of the two-dimensional code is within 24 hours of the current start, and after 24 hours of the current time, the two-dimensional code is invalidated.
Optionally, after the terminal device successfully accesses the hot spot of the mobile terminal, the mobile terminal may open the at least one data transmission channel (except for the hot spot) and establish a connection with the terminal device. For example, the mobile terminal may be in wired connection with the terminal device, and at the same time, the connection between the mobile terminal and the terminal device may be established through bluetooth. Of course, the mobile terminal may start the hotspot after receiving the migration instruction, and establish a connection between the mobile terminal and the terminal device.
Further, the mobile terminal may migrate the data to be migrated in the mobile terminal to the terminal device.
In the process of transmitting the data to be migrated to the terminal device, the data to be migrated can be subjected to data compression, so that the memory space of the data to be migrated is reduced, and the data migration efficiency is improved. Of course, the specific data compression level may be determined according to actual situations.
Optionally, in the process of transmitting the data to be migrated to the terminal device, the data to be migrated may be divided into a plurality of data sets according to the importance of the data to be migrated, and each data set may determine a transmission priority according to the importance, for example, the higher the importance of a certain data set is, the higher the priority is, the transmission is performed, conversely, the lower the importance of a certain data set is, the later the transmission is, and thus, the data to be migrated may be guaranteed to be transmitted in order.
Alternatively, multiple threads or multiple processes can be adopted to migrate the data to be migrated to the terminal device. For example, the data to be migrated is divided into a plurality of data sets, and each data set can adopt one thread or process for transmitting the data set to the terminal device, so that the data migration efficiency can be improved.
Optionally, the transmitting the data to be migrated to the terminal device may include:
dividing the data to be migrated into K data sets, wherein K is an integer greater than 1;
determining the use frequency of the K data sets in the mobile terminal;
and migrating the K data sets to the terminal equipment according to a high-priority migration principle of using frequency.
The data to be migrated may be divided into K data sets, where K is an integer greater than 1, where K may be specified by system statistics (e.g., K applications, which may be referred to as K data sets) or by a user. The use frequency of each data set in the K data sets can be respectively determined, the migration order of the K data sets can be determined according to the order from high use frequency to low use frequency, that is, the data sets with higher use frequency are migrated earlier, and the data sets with lower use frequency are migrated later, and the data to be migrated can be transmitted to the terminal device according to the migration order.
The embodiment of the invention establishes the hotspot, generates the access information of the hotspot, encrypts the access information, and generates the two-dimensional code of the encrypted access information, so that the terminal equipment can access the hotspot through the two-dimensional code. Therefore, the access information can be encrypted, and the encrypted access information is generated into the two-dimensional code, so that the difficulty in obtaining the access information is increased, and the network access safety can be improved. Therefore, after the hotspot established by the mobile terminal is accessed by the terminal equipment, data migration can be further carried out, and the data migration can be safely realized.
In accordance with the above, please refer to fig. 3, which is a flowchart illustrating a network access method according to a second embodiment of the present invention. The network access method described in this embodiment includes the following steps:
301. information identifying a two-dimensional code generated by a mobile terminal.
The terminal equipment can scan the two-dimensional code displayed on the mobile terminal to obtain information of the two-dimensional code, and specifically, image recognition is carried out on the two-dimensional code in the scanning process, so that the information can be obtained.
Optionally, the information identifying the two-dimensional code generated by the mobile terminal includes the following steps:
judging whether the two-dimensional code is clear or not, if not, performing image enhancement processing on the two-dimensional code, and then identifying the two-dimensional code after the image enhancement processing, wherein the image enhancement processing can include but is not limited to: wavelet denoising, histogram equalization, local denoising, and the like.
Alternatively, the information for identifying the two-dimensional code generated by the mobile terminal may include the following steps.
11) When the terminal equipment scans the two-dimensional code generated by the mobile terminal, judging whether the definition of the two-dimensional code is greater than a preset threshold value or not;
12) if yes, sending a verification request to the mobile terminal;
13) and when receiving the confirmation information sent by the mobile terminal in response to the verification request, analyzing the two-dimensional code to obtain the information.
Optionally, when the terminal device scans the two-dimensional code generated by the mobile terminal, it may be determined whether the definition of the two-dimensional code is greater than a preset threshold, where the definition is prior art in the field of image processing technology and is not described herein again. When the definition of the two-dimensional code is larger than a preset threshold value, the two-dimensional code is clear, and the two-dimensional code can be identified. Therefore, the verification request can be sent to the mobile terminal, and after the mobile terminal responds to the verification request, the confirmation information can be sent to the terminal equipment, so that the terminal equipment can further analyze the two-dimensional code to obtain the information in the two-dimensional code. Wherein the preset threshold value can be set by a user or defaulted by a system.
Optionally, before the information identifying the two-dimensional code generated by the mobile terminal, the method may further include the following steps: and judging whether the two-dimensional code is in an effective time period, if so, executing the step 302.
302. And decrypting the information to obtain access information, wherein the access information comprises a hotspot name and a random password.
The terminal device may decrypt the information according to a decryption algorithm corresponding to the encryption algorithm used in the network access method described in fig. 2, so as to obtain access information, where the access information may include a hotspot name and a random password.
303. And searching a hotspot according to the hotspot name, and accessing the hotspot through the random password.
The method comprises the steps of scanning according to a hotspot name to obtain a hotspot corresponding to the hotspot name, and writing a random password after the hotspot is searched, so that the hotspot is accessed.
It can be seen that, the embodiment of the present invention identifies the information of the two-dimensional code generated by the mobile terminal, decrypts the information to obtain the access information, and the access information includes the hotspot name and the random password, searches for the hotspot according to the hotspot name, and accesses the hotspot through the random password. Therefore, the information can be identified through the two-dimensional code and decrypted to obtain the access information, so that the difficulty in obtaining the access information is increased, and the network access safety can be improved. Therefore, after the hotspot established by the mobile terminal is accessed by the terminal equipment, data migration can be further carried out, and the data migration can be safely realized.
In accordance with the foregoing, the following is an apparatus for implementing the network access method, and specifically includes:
please refer to fig. 4a, which is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention. The mobile terminal described in this embodiment includes: the establishing unit 401, the encrypting unit 402 and the generating unit 403 are specifically as follows:
the establishing unit 401 is configured to establish a hotspot and generate access information of the hotspot, where the access information includes a hotspot name and a random password corresponding to the hotspot name;
an encrypting unit 402, configured to encrypt the access information;
a generating unit 403, configured to generate a two-dimensional code from the encrypted access information, so that a terminal device accesses the hotspot through the two-dimensional code.
Alternatively, as shown in fig. 4b, the encryption unit 402 of the mobile terminal depicted in fig. 4a may include: the first obtaining module 4021 and the first encrypting module 4022 are as follows:
a first obtaining module 4021, configured to obtain unique identification information of the mobile terminal;
the first encryption module 4022 is configured to encrypt the access information according to the unique identification information.
Optionally, the first encryption module 4022 may include: a second obtaining module (not shown), a determining module (not shown), and a second encrypting module (not shown), which are as follows:
the second acquisition module is used for acquiring the current position;
the determining module is used for determining a target encryption algorithm corresponding to the current position according to the mapping relation between the encryption algorithm and the position;
and the second encryption module is used for encrypting the access information by taking the unique identification information as a secret key and adopting the target encryption algorithm.
The mobile terminal described by the embodiment of the invention can establish the hotspot and generate the access information of the hotspot, wherein the access information comprises the hotspot name and the random password corresponding to the hotspot name, the access information is encrypted, and the encrypted access information is generated into the two-dimensional code so that the terminal equipment can access the hotspot through the two-dimensional code. Therefore, the access information can be encrypted, and the encrypted access information is generated into the two-dimensional code, so that the difficulty in obtaining the access information is increased, and the network access safety can be improved.
Please refer to fig. 5a, which is a schematic structural diagram of a mobile terminal according to a first embodiment of the present invention. The mobile terminal described in this embodiment includes: the identification unit 501, the decryption unit 502 and the access unit 503 are specifically as follows:
an identifying unit 501 for identifying information of a two-dimensional code generated by a mobile terminal;
a decryption unit 502, configured to decrypt the information to obtain access information, where the access information includes a hotspot name and a random password;
an accessing unit 503, configured to search for a hotspot according to the hotspot name, and access the hotspot through the random password.
Alternatively, as shown in fig. 5b, the identification unit 501 of the terminal device depicted in fig. 5a may include: the determining module 5011, the sending module 5012, and the analyzing module 5013 are as follows:
the judging module 5011 is configured to judge whether the definition of the two-dimensional code is greater than a preset threshold when the terminal device scans the two-dimensional code generated by the mobile terminal;
a sending module 5012, configured to send an authentication request to the mobile terminal if the determination result of the determining module is yes;
the parsing module 5013 is configured to parse the two-dimensional code to obtain information when receiving the confirmation information sent by the mobile terminal in response to the verification request.
It can be seen that, the embodiment of the present invention identifies the information of the two-dimensional code generated by the mobile terminal, decrypts the information to obtain the access information, and the access information includes the hotspot name and the random password, searches for the hotspot according to the hotspot name, and accesses the hotspot through the random password. Therefore, the information can be identified through the two-dimensional code and decrypted to obtain the access information, so that the difficulty in obtaining the access information is increased, and the network access safety can be improved.
Fig. 6 is a schematic structural diagram of a mobile terminal according to a second embodiment of the present invention. The mobile terminal described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, e.g., a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 being connected by a bus 5000.
The input device 1000 may be a touch panel, a physical button, or a mouse.
The output device 2000 may be a display screen.
The memory 4000 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 4000 is used for storing a set of program codes, and the input device 1000, the output device 2000 and the processor 3000 are used for calling the program codes stored in the memory 4000 to execute the following operations:
the processor 3000 is configured to:
establishing a hotspot and generating access information of the hotspot, wherein the access information comprises a hotspot name and a random password corresponding to the hotspot name;
encrypting the access information;
and generating a two-dimensional code from the encrypted access information so that the terminal equipment can access the hotspot through the two-dimensional code.
Optionally, the processor 3000 encrypts the access information, including:
acquiring unique identification information of the mobile terminal;
and encrypting the access information according to the unique identification information.
Optionally, the processor 3000 encrypts the access information according to the unique identification information, including:
acquiring a current position;
determining a target encryption algorithm corresponding to the current position according to a mapping relation between the encryption algorithm and the position;
and encrypting the access information by using the unique identification information as a secret key and adopting the target encryption algorithm.
Fig. 7 is a schematic structural diagram of a terminal device according to a second embodiment of the present invention. The terminal device described in this embodiment includes: at least one input device 1000; at least one output device 2000; at least one processor 3000, e.g., a CPU; and a memory 4000, the input device 1000, the output device 2000, the processor 3000, and the memory 4000 being connected by a bus 5000.
The input device 1000 may be a touch panel, a physical button, or a mouse.
The output device 2000 may be a display screen.
The memory 4000 may be a high-speed RAM memory, or may be a nonvolatile memory such as a magnetic disk memory. The memory 4000 is used for storing a set of program codes, and the input device 1000, the output device 2000 and the processor 3000 are used for calling the program codes stored in the memory 4000 to execute the following operations:
the processor 3000 is configured to:
identifying information of a two-dimensional code generated by a mobile terminal;
decrypting the information to obtain access information, wherein the access information comprises a hotspot name and a random password;
and searching a hotspot according to the hotspot name, and accessing the hotspot through the random password.
Optionally, the processor 3000 identifies information of a two-dimensional code generated by the mobile terminal, including:
when terminal equipment scans a two-dimensional code generated by a mobile terminal, judging whether the definition of the two-dimensional code is greater than a preset threshold value or not;
if yes, sending a verification request to the mobile terminal;
and when receiving confirmation information sent by the mobile terminal in response to the verification request, analyzing the two-dimensional code to obtain information.
Further, an embodiment of the present invention also provides a network access system, which includes a mobile terminal as described in fig. 4a or fig. 4b and a terminal device as described in fig. 5a or fig. 5 b.
An embodiment of the present invention further provides a computer storage medium, where the computer storage medium may store a program, and when the program is executed, the computer storage medium includes some or all of the steps of any one of the network access methods described in the above method embodiments.
While the invention has been described in connection with various embodiments, other variations to the disclosed embodiments can be understood and effected by those skilled in the art in practicing the claimed invention, from a review of the drawings, the disclosure, and the appended claims. In the claims, the word "comprising" does not exclude other elements or steps, and the word "a" or "an" does not exclude a plurality. A single processor or other unit may fulfill the functions of several items recited in the claims. The mere fact that certain measures are recited in mutually different dependent claims does not indicate that a combination of these measures cannot be used to advantage.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus (device), or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein. A computer program stored/distributed on a suitable medium supplied together with or as part of other hardware, may also take other distributed forms, such as via the Internet or other wired or wireless telecommunication systems.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the invention has been described in conjunction with specific features and embodiments thereof, it will be evident that various modifications and combinations can be made thereto without departing from the spirit and scope of the invention. Accordingly, the specification and figures are merely exemplary of the invention as defined in the appended claims and are intended to cover any and all modifications, variations, combinations, or equivalents within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. A network access method, comprising:
establishing a hotspot and generating access information of the hotspot, wherein the access information comprises a hotspot name and a random password corresponding to the hotspot name;
acquiring unique identification information of the mobile terminal;
acquiring a current position;
determining a target encryption algorithm corresponding to the current position according to a mapping relation between the encryption algorithm and the position; wherein different locations have different encryption algorithms;
taking the unique identification information as a secret key, and encrypting the access information by adopting the target encryption algorithm;
generating a two-dimensional code from the encrypted access information so that the terminal equipment can access the hotspot through the two-dimensional code; the two-dimensional code has a valid time period and only takes effect in the valid time period; and the two-dimension code has preset use times, the two-dimension code is effective within the preset use times, and the two-dimension code is invalid outside the use times.
2. A network access method, wherein a decryption algorithm corresponding to the encryption algorithm used in the network access method according to claim 1 is adopted, and the method comprises:
identifying information of a two-dimensional code generated by a mobile terminal; judging whether the two-dimensional code is in an effective time period;
if so, decrypting the information to obtain access information, wherein the access information comprises a hotspot name and a random password;
and searching a hotspot according to the hotspot name, and accessing the hotspot through the random password.
3. The method according to claim 2, wherein the information for identifying the two-dimensional code generated by the mobile terminal comprises:
when terminal equipment scans a two-dimensional code generated by a mobile terminal, judging whether the definition of the two-dimensional code is greater than a preset threshold value or not;
if yes, sending a verification request to the mobile terminal;
and when receiving confirmation information sent by the mobile terminal in response to the verification request, analyzing the two-dimensional code to obtain information.
4. A mobile terminal, comprising:
the device comprises an establishing unit, a receiving unit and a sending unit, wherein the establishing unit is used for establishing a hotspot and generating access information of the hotspot, and the access information comprises a hotspot name and a random password corresponding to the hotspot name;
an encryption unit, configured to encrypt the access information;
the generating unit is used for generating the encrypted access information into a two-dimensional code so that the terminal equipment can access the hotspot through the two-dimensional code; the two-dimensional code has a valid time period and only takes effect in the valid time period; the two-dimension code has preset use times, the two-dimension code is valid within the preset use times, and the two-dimension code is invalid outside the use times;
the encryption unit includes:
the first acquisition module is used for acquiring the unique identification information of the mobile terminal;
the first encryption module is used for encrypting the access information according to the unique identification information;
the first encryption module comprises:
the second acquisition module is used for acquiring the current position;
the determining module is used for determining a target encryption algorithm corresponding to the current position according to the mapping relation between the encryption algorithm and the position; wherein different locations have different encryption algorithms;
and the second encryption module is used for encrypting the access information by taking the unique identification information as a secret key and adopting the target encryption algorithm.
5. A terminal device comprising a decryption unit corresponding to the encryption unit comprised by the mobile terminal according to claim 4,
further comprising:
an identification unit for identifying information of a two-dimensional code generated by a mobile terminal; judging whether the two-dimensional code is in an effective time period;
the decryption unit is further configured to decrypt the information to obtain access information if the two-dimensional code is within an effective time period, where the access information includes a hotspot name and a random password;
and the access unit is used for searching the hot spot according to the hot spot name and accessing the hot spot through the random password.
6. The terminal device according to claim 5, wherein the identification unit comprises:
the judging module is used for judging whether the definition of the two-dimensional code is greater than a preset threshold value or not when the terminal equipment scans the two-dimensional code generated by the mobile terminal;
the sending module is used for sending a verification request to the mobile terminal if the judgment result of the judging module is positive;
and the analysis module is used for analyzing the two-dimensional code to obtain information when receiving the confirmation information sent by the mobile terminal in response to the verification request.
7. A mobile terminal, comprising:
a processor and a memory; wherein the processor executes the method of any one of claim 1 by calling code or instructions in the memory.
8. A terminal device, comprising:
a processor and a memory; wherein the processor performs the method of any one of claims 2 or 3 by calling code or instructions in the memory.
9. A network access system, comprising: a mobile terminal according to any of claims 6 to 8 and a terminal device according to claim 5 or 6.
CN201610826490.XA 2016-09-14 2016-09-14 Network access method, related equipment and system Active CN106412907B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201610826490.XA CN106412907B (en) 2016-09-14 2016-09-14 Network access method, related equipment and system
PCT/CN2017/095315 WO2018049940A1 (en) 2016-09-14 2017-07-31 Network access method, related device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610826490.XA CN106412907B (en) 2016-09-14 2016-09-14 Network access method, related equipment and system

Publications (2)

Publication Number Publication Date
CN106412907A CN106412907A (en) 2017-02-15
CN106412907B true CN106412907B (en) 2020-02-14

Family

ID=57997236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610826490.XA Active CN106412907B (en) 2016-09-14 2016-09-14 Network access method, related equipment and system

Country Status (2)

Country Link
CN (1) CN106412907B (en)
WO (1) WO2018049940A1 (en)

Families Citing this family (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106412907B (en) * 2016-09-14 2020-02-14 Oppo广东移动通信有限公司 Network access method, related equipment and system
CN106657166B (en) * 2017-03-09 2019-09-17 腾讯科技(深圳)有限公司 A kind of method of authentication, terminal device and server
CN107949068A (en) * 2017-12-08 2018-04-20 鸿合科技股份有限公司 A kind of method and apparatus of wireless connection
CN108055474A (en) * 2018-01-15 2018-05-18 上海小蚁科技有限公司 Polyphaser synchronous method, apparatus and system, storage medium
CN109587665B (en) * 2018-11-20 2023-06-06 陕西师范大学 WiFi networking method and device without SSID broadcasting
CN110049019B (en) * 2019-03-26 2020-09-01 合肥工业大学 Active and safe medical Internet of things equipment identification and monitoring method
CN109977720B (en) * 2019-03-28 2021-07-20 尤尼泰克(嘉兴)信息技术有限公司 Method and device for rapidly analyzing two-dimensional code image
CN111355771A (en) * 2019-05-22 2020-06-30 鸿合科技股份有限公司 File transmission method and device, electronic equipment and storage medium
CN112020120A (en) * 2019-05-28 2020-12-01 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and system
CN113301563A (en) * 2020-02-05 2021-08-24 阿里巴巴集团控股有限公司 Network configuration method, device, equipment and storage medium
CN111465005A (en) * 2020-03-30 2020-07-28 维沃移动通信有限公司 Hotspot sharing method and electronic equipment
CN113839826B (en) * 2020-06-23 2024-04-30 中兴通讯股份有限公司 Method and device for detecting windows terminal and computer readable storage medium
CN112351424B (en) * 2020-07-28 2024-03-12 深圳Tcl新技术有限公司 Wireless networking management method, system, device and computer readable storage medium
CN112351471B (en) * 2020-08-24 2024-04-30 深圳Tcl新技术有限公司 Method for accessing device to gateway, gateway device and computer readable storage medium
CN112351421B (en) * 2020-09-14 2024-02-06 深圳Tcl新技术有限公司 Control method, control device and computer storage medium for data transmission
CN112367181B (en) * 2020-09-29 2022-10-18 歌尔科技有限公司 Camera network distribution method, device, equipment and medium
CN112261651B (en) * 2020-10-20 2023-06-23 北京字节跳动网络技术有限公司 Terminal control method, device, terminal and storage medium
CN112312372A (en) * 2020-10-26 2021-02-02 Oppo广东移动通信有限公司 Network access method and system
CN112311602A (en) * 2020-10-30 2021-02-02 上海中通吉网络技术有限公司 Data packet capturing processing method, device and equipment
CN112364333B (en) * 2020-11-30 2023-10-24 中国银行股份有限公司 Method and system for providing service by using two-dimension code and code communication platform
CN114630314B (en) * 2020-12-10 2023-09-05 中移(苏州)软件技术有限公司 Updating method, device, equipment and storage medium of terminal information base
CN112788576B (en) * 2020-12-16 2022-12-02 青岛海尔科技有限公司 Equipment offline processing method and system, storage medium and electronic device
CN113055973B (en) * 2021-03-08 2022-10-21 读书郎教育科技有限公司 Electronic equipment hotspot sharing method
CN113596832B (en) * 2021-06-11 2024-03-22 青岛海尔科技有限公司 Network connection establishment method and device, storage medium and electronic device
CN113873511A (en) * 2021-07-16 2021-12-31 天翼智慧家庭科技有限公司 Zigbee safety network access method and system based on remote verification
CN114189861B (en) * 2021-11-24 2023-10-20 阿里巴巴(中国)有限公司 Wireless network connection method, device and system
CN115297463B (en) * 2022-06-22 2024-04-19 青岛海尔科技有限公司 Equipment binding method and device, storage medium and electronic device
CN115174372A (en) * 2022-06-23 2022-10-11 盒马(中国)有限公司 Network distribution method, device, system, equipment and storage medium
CN114862427B (en) * 2022-07-06 2022-11-22 一物一码数据(广州)实业有限公司 Quality detection tracking method based on two-dimensional code

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301344A (en) * 2013-07-17 2015-01-21 北京奇虎科技有限公司 File transfer method, terminal and system
CN105099670A (en) * 2015-07-13 2015-11-25 深圳市金立通信设备有限公司 Encryption method and terminal
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8347090B2 (en) * 2006-10-16 2013-01-01 Nokia Corporation Encryption of identifiers in a communication system
CN103476030B (en) * 2013-08-29 2016-12-28 小米科技有限责任公司 Mobile terminal connects the method for network, mobile terminal and terminal unit
EP2890170A1 (en) * 2013-12-17 2015-07-01 Deutsche Telekom AG Method and system for barcode and link initiated hotspot auto-login in WLANs
CN105282824A (en) * 2014-06-03 2016-01-27 中兴通讯股份有限公司 File sharing method based on wireless communication and wireless communication terminal
CN104993981B (en) * 2015-05-14 2018-12-11 小米科技有限责任公司 Control the method and device of equipment access
CN106412907B (en) * 2016-09-14 2020-02-14 Oppo广东移动通信有限公司 Network access method, related equipment and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301344A (en) * 2013-07-17 2015-01-21 北京奇虎科技有限公司 File transfer method, terminal and system
CN105099670A (en) * 2015-07-13 2015-11-25 深圳市金立通信设备有限公司 Encryption method and terminal
CN105120456A (en) * 2015-09-08 2015-12-02 南京创维信息技术研究院有限公司 Method and system for intelligent device to access to wireless network quickly

Also Published As

Publication number Publication date
CN106412907A (en) 2017-02-15
WO2018049940A1 (en) 2018-03-22

Similar Documents

Publication Publication Date Title
CN106412907B (en) Network access method, related equipment and system
US11057378B2 (en) Device and method of setting or removing security on content
US10305889B2 (en) Identity authentication method and device and storage medium
EP3146744B1 (en) Method, apparatus, and system for providing a security check
US11444774B2 (en) Method and system for biometric verification
CN104125055B (en) Encryption and decryption method and electronic equipment
US10659226B2 (en) Data encryption method, decryption method, apparatus, and system
CN110011954B (en) Homomorphic encryption-based biological identification method, device, terminal and business server
JP6814147B2 (en) Terminals, methods, non-volatile storage media
WO2017050093A1 (en) Login information input method, login information storage method, and associated device
US20150163065A1 (en) Identity authentication method and apparatus and server
US20180294965A1 (en) Apparatus, method and computer program product for authentication
CN112949545B (en) Method, apparatus, computing device and medium for recognizing face image
US10462125B2 (en) Method of pushing passwords, pushing system and terminal device
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
JP2015115079A (en) Method and apparatus for input verification
WO2020232854A1 (en) Vehicle unlocking method and apparatus, and computer device and storage medium
WO2018166484A1 (en) Data encryption and decryption methods and apparatuses, electronic device and readable storage medium
CN110619228B (en) File decryption method, file encryption method, file management system and storage medium
KR20150100602A (en) Data storing and reading methods, apparatuses and devices
WO2018049911A1 (en) Data migration method and related products
CN106161365B (en) Data processing method and device and terminal
CN113052044A (en) Method, apparatus, computing device, and medium for recognizing iris image
CN106570410B (en) Data encryption method, data decryption method, device and system
CN111125742A (en) File management method, intelligent terminal and device with storage function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant after: OPPO Guangdong Mobile Communications Co., Ltd.

Address before: Changan town in Guangdong province Dongguan 523860 usha Beach Road No. 18

Applicant before: Guangdong Opel Mobile Communications Co., Ltd.

GR01 Patent grant
GR01 Patent grant