CN109996228B - Information processing method and electronic equipment - Google Patents

Information processing method and electronic equipment Download PDF

Info

Publication number
CN109996228B
CN109996228B CN201910253261.7A CN201910253261A CN109996228B CN 109996228 B CN109996228 B CN 109996228B CN 201910253261 A CN201910253261 A CN 201910253261A CN 109996228 B CN109996228 B CN 109996228B
Authority
CN
China
Prior art keywords
electronic device
verification information
information
electronic equipment
matching result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910253261.7A
Other languages
Chinese (zh)
Other versions
CN109996228A (en
Inventor
刘翔
刘力强
罗蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201910253261.7A priority Critical patent/CN109996228B/en
Publication of CN109996228A publication Critical patent/CN109996228A/en
Application granted granted Critical
Publication of CN109996228B publication Critical patent/CN109996228B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses an information processing method and electronic equipment, wherein the method comprises the following steps: the method comprises the steps that first electronic equipment obtains identification information representing an electronic equipment identification; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition; the first electronic equipment sends the identification information to second electronic equipment; the first electronic device obtains a matching result, wherein the matching result is obtained by the second electronic device based on the identification information matching and is used for indicating the existence state of third verification information corresponding to the identification information, and the third verification information can be the same as the first verification information; and if the matching result meets the execution condition, the first electronic equipment executes a processing command, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment.

Description

Information processing method and electronic equipment
Technical Field
The present application relates to the field of communications technologies, and in particular, to an information processing method and an electronic device.
Background
In the process that a user uses the electronic equipment, the verification information of the electronic equipment is leaked, and other users who know the verification information intentionally or unintentionally upload the verification information to the server, so that the server stores the verification information.
Disclosure of Invention
The embodiment of the application provides an information processing method, which comprises the following steps:
the method comprises the steps that first electronic equipment obtains identification information representing an electronic equipment identification; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition;
the first electronic equipment sends the identification information to second electronic equipment;
the first electronic device obtains a matching result, wherein the matching result is obtained by the second electronic device based on the identification information matching and is used for indicating the existence state of third verification information corresponding to the identification information, and the third verification information can be the same as the first verification information;
and if the matching result meets the execution condition, the first electronic equipment executes a processing command, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment.
In the foregoing solution, the executing, by the first electronic device, the processing command to enable the first verification information to be in a state that cannot be obtained by the second electronic device includes:
determining that the third verification information is in an available state according to the presence state indicated by the matching result;
and executing a processing command so that the first verification information can be in a state of being unavailable through the second electronic equipment.
In the foregoing solution, the matching result carries the third verification information, and before executing the processing command, the method further includes:
comparing the third verification information carried by the matching result with the first verification information of the first electronic equipment to obtain a comparison result;
and determining that the third verification information carried by the matching result is matched with the first verification information of the first electronic equipment based on the comparison result.
In the foregoing solution, the executing, by the first electronic device, the processing command to enable the first verification information to be in a state that cannot be obtained by the second electronic device includes:
and the first electronic equipment outputs prompt information, wherein the prompt information indicates the state that the third verification information can be obtained through the second electronic equipment.
In the foregoing solution, the executing, by the first electronic device, the processing command to enable the first verification information to be in a state that cannot be obtained by the second electronic device includes:
modifying the first verification information into fourth verification information;
notifying the fourth electronic device that has obtained the access right to reacquire the access right instead of the fourth authentication information.
In the foregoing solution, the notifying that the fourth electronic device having obtained the access right obtains the access right again by the fourth verification information instead, includes:
after the first electronic device modifies the first verification information into fourth verification information, the first electronic device notifies the fourth electronic device to change the fourth verification information into the fourth verification information to obtain the access right again.
In the foregoing solution, the modifying the first verification information into fourth verification information includes:
after the first electronic device notifies the fourth electronic device that the fourth authentication information is changed to obtain the access right again, the first electronic device modifies the first authentication information into fourth authentication information.
In the above scheme, the method further comprises:
receiving a connection request which is sent by fifth electronic equipment and carries the first verification information or the third verification information;
judging whether the fifth electronic equipment obtains the access right or not based on the connection request;
if the fifth electronic device obtains the access right, feeding back the fourth verification information to the fifth electronic device;
and if the fifth electronic device does not obtain the access right, not feeding back the fourth verification information to the fifth electronic device.
In the above scheme, the obtaining of the access right refers to: obtaining a right to access a second network through the first electronic device;
wherein the first electronic device is located in the second network and a first network, the first network is a network that can be established by the third electronic device and the first electronic device, and the second electronic device is located in the second network.
The present application further provides a first electronic device, including:
the first acquisition module is used for acquiring identification information representing an electronic equipment identification; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition;
the sending module is used for sending the identification information to second electronic equipment;
a second obtaining module, configured to obtain a matching result, where the matching result is obtained by the second electronic device based on the identification information, and is used to indicate an existence state of third verification information corresponding to the identification information, where the third verification information may be the same as the first verification information;
and the execution module is used for executing a processing command if the matching result meets the execution condition, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment.
In the foregoing solution, the executing module is specifically configured to determine that the third verification information is in an available state according to the presence state indicated by the matching result;
and executing a processing command so that the first verification information can be in a state of being unavailable through the second electronic equipment.
In the above scheme, the matching result carries the third verification information, and the first electronic device further includes a comparison module;
the comparison module is configured to compare the third verification information carried in the matching result with the first verification information of the first electronic device to obtain a comparison result;
and determining that the third verification information carried by the matching result is matched with the first verification information of the first electronic equipment based on the comparison result.
In the foregoing solution, the execution module is specifically configured to output a prompt message, where the prompt message indicates a state in which the third verification information can be obtained by the second electronic device.
In the foregoing solution, the execution module is specifically configured to modify the first verification information into fourth verification information;
notifying the fourth electronic device that has obtained the access right to reacquire the access right instead of the fourth authentication information.
In the foregoing solution, the executing module is specifically configured to, after the first verification information is modified into fourth verification information, notify the fourth electronic device to change the fourth verification information to obtain the access right again.
In the foregoing solution, the execution module is specifically configured to modify the first verification information into fourth verification information after notifying the fourth electronic device that the fourth verification information is changed to obtain the access right again.
In the foregoing solution, the first electronic device further includes:
the feedback module is used for receiving a connection request which is sent by fifth electronic equipment and carries the first verification information or the third verification information;
judging whether the fifth electronic equipment obtains the access right or not based on the connection request;
if the fifth electronic device obtains the access right, feeding back the fourth verification information to the fifth electronic device;
and if the fifth electronic device does not obtain the access right, not feeding back the fourth verification information to the fifth electronic device.
The application of the embodiment of the application has the following beneficial technical effects:
when the first electronic equipment determines that the matching result meets the execution condition based on the matching result returned by the second electronic equipment, the first electronic equipment executes the processing command, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment; therefore, leakage of the first verification information is avoided, and safety of user information is improved.
Drawings
Fig. 1 is a first schematic flow chart of an information processing method according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating an information processing method according to an embodiment of the present application;
fig. 3 is a third schematic flowchart of an information processing method according to an embodiment of the present application;
fig. 4 is a first schematic structural diagram of a first electronic device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a first electronic device according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the examples provided herein are merely illustrative of the present application and are not intended to limit the present application. In addition, the following examples are provided as partial examples for implementing the present application, not all examples for implementing the present application, and the technical solutions described in the examples of the present application may be implemented in any combination without conflict.
It should be noted that in the embodiments of the present application, the terms "comprises", "comprising" or any other variation thereof are intended to cover a non-exclusive inclusion, so that a method or apparatus including a series of elements includes not only the explicitly recited elements but also other elements not explicitly listed or inherent to the method or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other related elements in a method or apparatus including the element (e.g., steps in a method or elements in an apparatus, such as units that may be part of a circuit, part of a processor, part of a program or software, etc.).
For example, although the information processing method provided in the embodiment of the present application includes a series of steps, the information processing method provided in the embodiment of the present application is not limited to the described steps, and similarly, the video processing apparatus provided in the embodiment of the present application includes a series of modules, but the apparatus provided in the embodiment of the present application is not limited to include the modules explicitly described, and may further include a unit that is required to acquire related information or perform processing based on the information.
In the following description, references to the terms "first \ second \ third, etc" are only used to distinguish similar objects and do not denote a particular order, but rather the terms "first \ second \ third, etc" are used to indicate that a particular order or sequence may be interchanged where appropriate to enable the embodiments of the application described herein to be performed in an order other than that shown or described herein.
Fig. 1 is a schematic flow diagram of an information processing method provided in an embodiment of the present application, and referring to fig. 1, the information processing method provided in the embodiment of the present application includes:
step 101: the first electronic device obtains identification information characterizing the identity of the electronic device.
In some embodiments, the first electronic device has first authentication information for determining whether second authentication information transmitted by a third electronic device requesting to obtain access authority satisfies a condition.
In practical applications, the first electronic device may be a network Access device, such as a Wireless Access Point (AP), or a router device, for the electronic device to Access a network.
In some embodiments, the first electronic device itself stores identification information representing an identification of the electronic device, in actual implementation, the identification information of the first electronic device can uniquely identify the first electronic device, for example, the identification information may be a name of the first electronic device or a name of a wireless local area network where the first electronic device is located, when the first electronic device is a router device, the corresponding identification information may be a Service Set Identifier (SSID) corresponding to the router device, and of course, for uniquely identifying the first electronic device, the identification information may include multiple types of information, that is, the identification information includes an SSID and location information (such as a geographic location or a network location) of the first electronic device, where the SSID and the location information include a combination of multiple types of information.
In some embodiments, obtaining access rights refers to: obtaining a right to access a second network through a first electronic device; the first electronic device is located in the second network and the first network, and the first network is a network which can be established by the third electronic device and the first electronic device.
Taking the first electronic device as a routing device and the third electronic device as a terminal as an example, the routing device has password information (first authentication information) corresponding to the SSID, and the terminal device can obtain the right to access the internet (second network) through the routing device based on the password information; the routing device is located in the internet and a wireless local area network (first network), which can be established by the terminal and the routing device.
Step 102: and the first electronic equipment sends the identification information to the second electronic equipment.
In practical applications, the second electronic device may store third verification information that is the same as the first verification information of the first electronic device, and in this case, if other electronic devices obtain the first verification information through the second electronic device without permission, corresponding access rights may be obtained through the first verification information, which may further cause certain economic loss, information leakage, and the like to the user.
Taking the Wireless local area network as a Wireless Fidelity (WIFI) network as an example, the first user knows WIFI password information of the second user, and the first user uploads the password information to the server through an application program (such as a WIFI master key) in the terminal, so that the server stores the WIFI password of the second user.
In some embodiments, the sending of the identification information from the first electronic device to the second electronic device may be a periodic (specifically, may be set according to actual needs) sending, or sending when a trigger instruction is received.
Step 103: the first electronic device obtains a matching result, wherein the matching result is obtained by the second electronic device based on the identification information matching and is used for indicating the existence state of third verification information corresponding to the identification information, and the third verification information can be the same as the first verification information.
In practical implementation, after the first electronic device sends the identification information to the second electronic device, the second electronic device performs matching based on the identification information and identification information in a verification information list stored in the second electronic device, where the verification information list stores a corresponding relationship between the identification information and the verification information, and when matching is performed based on the identification information and corresponding verification information (i.e., third verification information) exists, the second electronic device returns a matching result indicating that the corresponding third verification information exists to the first electronic device; and when the corresponding third verification information is not matched based on the identification information, the second electronic equipment returns a matching result representing that the corresponding third verification information does not exist to the first electronic equipment.
In practical applications, the third verification information may be the same as or different from the first verification information, for example, after the user uploads the first verification information to the second electronic device, the first verification information is modified/updated, and the content of the third verification information in the second electronic device is still the original first verification information before modification/update, at this time, the first verification information of the first electronic device is different from the third verification information of the second electronic device; for another example, after the user uploads the first verification information to the second electronic device, the first verification information of the first electronic device is not modified, and at this time, the first verification information of the first electronic device is the same as the third verification information of the second electronic device.
Illustratively, still taking a wireless local area network as a WIFI network as an example, after a first user uploads a WIFI password to a server, a second user modifies the WIFI password, and at this time, the WIFI password stored in the server is different from the WIFI password of the first user; and if the first user uploads the WIFI password to the server, the second user does not modify the WIFI password, and the WIFI password stored in the server is the same as the WIFI password of the first user.
Step 104: and if the matching result meets the execution condition, the first electronic equipment executes the processing command, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment.
In some embodiments, when the matching result meets the execution condition, the first electronic device executes the processing command so that the first verification information can be in a state that cannot be obtained by the second electronic device, including:
the first electronic equipment determines that the third verification information is in an available state according to the existence state indicated by the matching result; and executing the processing command so that the first verification information can be in a state of being unavailable through the second electronic equipment. That is, as long as the second electronic device stores the third verification information, regardless of whether the third verification information is the same as the first verification information, in order to avoid an illegal user obtaining access right, the first electronic device is triggered to execute the processing command, so that the first verification information can be in a state that cannot be obtained through the second electronic device, such as modifying the first verification information.
Illustratively, after the routing device (first electronic device) sends the SSID to the server (second electronic device), the server inquires that there is WIFI password information corresponding to the SSID based on the SSID, in order to avoid the risk that an illegal user obtains a corresponding access right by acquiring a WIFI password stored in the server, the routing device does not determine whether the WIFI password stored in the server is the same as a WIFI password corresponding to the routing device, and directly executes a processing command, so that the WIFI password of the routing device is in a state that the WIFI password of the routing device cannot be acquired by the server.
In some embodiments, the matching result returned by the second electronic device not only indicates the existence state of the third verification information, but also carries the third verification information, at this time, before the first electronic device executes the processing command, the third verification information carried by the matching result is compared with the first verification information to determine whether the third verification information is the same as the first verification information, if it is determined based on the comparison result that the third verification information is matched with the first verification information of the first electronic device, it is determined that the first verification information is leaked, and the first electronic device is triggered to execute the processing command, so that the first verification information can be in a state that cannot be obtained by the second electronic device.
Here, that is, only if the third authentication information stored in the second electronic device is insufficient to trigger the first electronic device to execute the processing command, the first electronic device still needs to verify whether the first authentication information is the same as the first authentication information of itself, and executes the processing command only in the case of the same.
Still taking the wireless local area network as the WIFI network as an example, after the first user uploads the WIFI password of the second user to the server, there is a possibility that the second user modifies the WIFI password, therefore, after the first electronic device receives the matching result indicating that the WIFI password of the second user is stored in the server, it is still necessary to verify whether the WIFI password stored in the server is the same as the current WIFI password of the first electronic device, and only under the same condition, a processing instruction that the own WIFI password is in a state that cannot be acquired by the server is triggered to be executed, so that resource waste caused by executing the processing instruction is avoided under the condition that the WIFI password stored in the server is not matched with the current WIFI password of the first electronic device.
In some embodiments, when the matching result meets the execution condition, in order to enable the first verification information to be in a state that is not available through the second electronic device, the first electronic device outputs prompt information indicating a state that the third verification information is available through the second electronic device.
Specifically, the first electronic device may output the prompt information by at least one of the following methods:
the first electronic equipment is provided with an output device, and the first electronic equipment realizes local output of the prompt message through the output device of the first electronic equipment;
establishing communication connection between the first electronic equipment and target electronic equipment, and sending prompt information to the target electronic equipment by the first electronic equipment; the target electronic device may be any electronic device that establishes a communication connection with the first electronic device, or a specific electronic device that is set. Illustratively, the target electronic device may be a mobile terminal device of a first network where the first electronic device is located, such as a router device, which establishes a communication connection with a mobile phone of a configuration network, and the router device sends a prompt message to the mobile phone of the configuration network, so that the owner performs password modification after recognizing that there is a risk of password information leakage.
In some embodiments, in order to enable the first authentication information to be in a state that is not available through the second electronic device, the first electronic device may modify the first authentication information, in particular, the first electronic device modifies the first authentication information into fourth authentication information, the fourth authentication information being different from the first authentication information.
In actual implementation, after the first electronic device modifies the first verification information into the fourth verification information, in order to enable the fourth electronic device that has obtained the access right to obtain the access right again, the first electronic device notifies the fourth electronic device that the fourth verification information is modified into the fourth verification information to obtain the access right again.
In practical implementation, on the premise of ensuring security, in order to enable the fourth electronic device that has obtained the access right to obtain the access right again, the first electronic device may first notify the fourth electronic device that the fourth authentication information is changed to obtain the access right again, and then modify the first authentication information into the fourth authentication information. Here, the notification sent by the first electronic device to the fourth electronic device may include a modification time, for example, the first verification information is modified after 1 minute, or the first verification information is modified in X months, X days, and X minutes, and of course, the notification may not include the modification time.
In practical applications, when the first electronic device modifies the first verification information, there is a case that not all electronic devices having obtained the access right are in a connected state with the first verification information, and in this case, the electronic devices having obtained the access right that are not connected with the first electronic device cannot timely synchronize modification information (modified verification information), for example, a home router finds that a user has not come home when performing WIFI password modification, so that the mobile phone cannot obtain automatically modified WIFI password information. In some embodiments, after the first electronic device modifies the first verification information into the fourth verification information, if a connection request sent by the fifth electronic device is received, where the connection request carries the first verification information or the third verification information, the first electronic device determines whether it is necessary to notify the fifth electronic device to obtain access permission instead based on the fourth verification information, and performs a corresponding operation based on a determination result.
Here, for the electronic device that sends the connection request, the first electronic device does not feed back the fourth verification information to all the electronic devices that send the connection request, and in actual implementation, the first electronic device still further determines whether to feed back to the electronic device that sent the connection request based on the connection request.
In some embodiments, the first electronic device may determine whether it needs to notify the fifth electronic device to obtain the access right instead based on the fourth authentication information by:
the first electronic device judges whether the fifth electronic device obtains the access right, and if the fifth electronic device obtains the access right, fourth verification information is fed back to the fifth electronic device, so that the fifth electronic device obtains the access right based on the fourth verification information; and if the fifth electronic equipment does not obtain the access right, not feeding back the fourth verification information to the fifth electronic equipment. For example, the router determines, for a mobile phone sending a connection request, whether the mobile phone has been connected to the router before, that is, whether the mobile phone has accessed a wireless local area network in which the router is located, that is, whether the mobile phone has accessed the internet through the router, and if it is determined that the mobile phone has obtained an access right, feeds back modified authentication information, so as to prevent a new device that searches for identification information of the first electronic device from obtaining the modified authentication information when attempting to connect to the first electronic device, for example, prevent a mobile phone that has searched an SSID corresponding to the router from obtaining a modified password of a WIFI network when attempting to access to a corresponding WIFI network.
In some embodiments, after modifying the first verification information, the first electronic device sets a feedback time corresponding to the modified verification information, where the feedback time represents an effective duration of the modified verification information after the first electronic device modifies the verification information and automatically feeds back the modified verification information based on the received connection request, and the length of the feedback time may be set according to actual needs, such as X days/X weeks/X months. Accordingly, the first electronic device may determine whether it needs to notify the fifth electronic device to obtain the access right instead based on the fourth authentication information by:
the first electronic device judges whether the time is in feedback time or not based on the received time of the connection request of the fifth electronic device, and if the time is in the feedback time, fourth verification information is fed back to the fifth electronic device, so that the fifth electronic device obtains access authority based on the fourth verification information; and if the fourth authentication information is not in the feedback time, not feeding back the fourth authentication information to the fifth electronic equipment. That is, during the feedback time, the first electronic devices all feed back the modified authentication information (fourth authentication information) for the electronic devices that sent the connection request, and outside the feedback time, the first electronic devices do not all feed back the modified authentication information for the electronic devices that sent the connection request. For example, the router sets the feedback time to be one month after the WIFI password is modified, receives a connection request which is sent by the mobile phone and carries the WIFI password before modification after the router modifies the WIFI password, judges whether the time of receiving the connection request is within the feedback time, feeds the modified WIFI password back to the mobile phone if the time is within the feedback time, and does not feed the modified WIFI password if the time is not within the feedback time. Therefore, all new devices which rely on the server to search the identification information of the first electronic device in the future can be prevented from acquiring the modified verification information when trying to connect the first electronic device, and for example, a mobile phone which searches the SSID corresponding to the router is prevented from acquiring the modified password of the WIFI network when trying to access the corresponding WIFI network.
Next, an information processing method of the present application is described with a first electronic device as a wireless access device, a second electronic device as a server, and a third electronic device as a terminal as an example, where the wireless access device is located in the internet and a WIFI network, fig. 2 is a schematic flow diagram of the information processing method provided in the embodiment of the present application, and referring to fig. 2, the information processing method provided in the embodiment of the present application includes:
step 201: the wireless access equipment acquires the SSID of the WIFI network where the wireless access equipment is located.
Here, in practical applications, the SSID of the WIFI network is stored in the wireless access device, and the wireless access device may directly obtain the stored SSID, or the SSID of the WIFI network is stored in another electronic device connected to the wireless access device, and the wireless access device may obtain the SSID stored in the another electronic device through the established communication connection.
Step 202: the wireless access device sends the SSID to the server.
In practical implementation, the wireless access device may send the SSID to the server periodically, for example, once a day, or the wireless access device sends the SSID to the server when receiving an instruction sent by the management device connected to the wireless access device.
Step 203: the server compares the received SSID with the SSID stored by the server, judges whether a WIFI password corresponding to the SSID exists or not, and if yes, executes step 204; otherwise, step 207 is performed.
Step 204: and the server returns a first matching result indicating that the WIFI password corresponding to the SSID exists to the wireless access equipment.
Step 205: and the wireless access equipment modifies the WIFI password of the located WIFI network based on the first matching result.
Here, that is to say, once the wireless access device learns that the server stores the WIFI password corresponding to the SSID, the wireless access device performs the WIFI password modification, regardless of whether the WIFI password stored in the server is the same as the WIFI password of the current WIFI network.
Step 206: and the wireless access equipment informs the electronic equipment accessed to the WIFI network to access again based on the modified WIFI password.
Step 207: and the server returns a second matching result indicating that the WIFI password corresponding to the SSID does not exist to the wireless access equipment.
Step 208: the wireless access device does not process based on the second matching result.
Continuing to describe the information processing method of the present application by taking a first electronic device as a wireless access device, a second electronic device as a server, and a third electronic device as a terminal as an example, where the wireless access device is located in the internet and a WIFI network, fig. 3 is a schematic flow diagram of the information processing method provided in the embodiment of the present application, and referring to fig. 3, the information processing method provided in the embodiment of the present application includes:
step 301: the wireless access equipment acquires the SSID of the WIFI network where the wireless access equipment is located.
Here, in practical applications, the SSID of the WIFI network is stored in the wireless access device, and the wireless access device may directly obtain the stored SSID, or the SSID of the WIFI network is stored in another electronic device connected to the wireless access device, and the wireless access device may obtain the SSID stored in the another electronic device through the established communication connection.
Step 302: the wireless access device sends the SSID to the server.
In practical implementation, the wireless access device may send the SSID to the server periodically, for example, once a day, or the wireless access device sends the SSID to the server when receiving an instruction sent by the management device connected to the wireless access device.
Step 303: the server compares the received SSID with the SSID stored by the server, judges whether a WIFI password corresponding to the SSID exists or not, and if yes, executes step 304; otherwise, step 310 is performed.
Step 304: and the server returns a first matching result carrying the WIFI password corresponding to the SSID to the wireless access equipment.
Step 305: the wireless access equipment judges whether the WIFI password carried by the first matching result is the same as the WIFI password of the current WIFI network or not based on the first matching result, and if so, executes step 306; if not, go to step 310.
Step 306: and the wireless access equipment modifies the WIFI password of the current WIFI network.
Step 307: the wireless access equipment receives an access request sent by the electronic equipment, wherein the access request carries the WIFI password before modification.
Step 308: the wireless access equipment judges whether the electronic equipment is accessed to the WIFI network, and if the electronic equipment is accessed to the WIFI network, the step 309 is executed; otherwise, step 310 is performed.
Step 309: and the wireless access equipment informs the electronic equipment accessed to the WIFI network to access again based on the modified WIFI password.
Step 310: the wireless access device does not process it.
An embodiment of the present application further provides a first electronic device, and in some embodiments, the first electronic device may be implemented by software or hardware or a combination of software and hardware, and fig. 4 is a schematic structural diagram of the first electronic device provided in the embodiment of the present application, and referring to fig. 4, the first electronic device provided in the embodiment of the present application includes:
a first obtaining module 41, configured to obtain identification information representing an identifier of an electronic device; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition;
a sending module 42, configured to send the identification information to the second electronic device;
a second obtaining module 43, configured to obtain a matching result, where the matching result is obtained by the second electronic device based on the identification information, and is used to indicate an existence status of third verification information corresponding to the identification information, where the third verification information may be the same as the first verification information;
an executing module 44, configured to execute a processing command if the matching result meets an execution condition, so that the first verification information can be in a state that cannot be obtained by the second electronic device.
In some embodiments, the execution module is specifically configured to determine that the third verification information is in an available state according to the presence state indicated by the matching result;
and executing a processing command so that the first verification information can be in a state of being unavailable through the second electronic equipment.
In some embodiments, the matching result carries the third verification information, and the first electronic device further includes a comparison module;
the comparison module is configured to compare the third verification information carried in the matching result with the first verification information of the first electronic device to obtain a comparison result;
and determining that the third verification information carried by the matching result is matched with the first verification information of the first electronic equipment based on the comparison result.
In some embodiments, the execution module is specifically configured to output a prompt message, where the prompt message indicates a state in which the third verification information can be obtained by the second electronic device.
In some embodiments, the execution module is specifically configured to modify the first verification information into fourth verification information;
notifying the fourth electronic device that has obtained the access right to reacquire the access right instead of the fourth authentication information.
In some embodiments, the execution module is specifically configured to, after the first verification information is modified into fourth verification information, notify the fourth electronic device to change the fourth verification information to reacquire the access right.
In some embodiments, the execution module is specifically configured to modify the first authentication information into fourth authentication information after notifying the fourth electronic device to change to the fourth authentication information to regain the access right.
In some embodiments, the first electronic device further comprises:
the feedback module is used for receiving a connection request which is sent by fifth electronic equipment and carries the first verification information or the third verification information;
judging whether the fifth electronic equipment obtains the access right or not based on the connection request;
if the fifth electronic device obtains the access right, feeding back the fourth verification information to the fifth electronic device;
and if the fifth electronic device does not obtain the access right, not feeding back the fourth verification information to the fifth electronic device.
In some embodiments, the obtaining access rights refers to: obtaining a right to access a second network through the first electronic device;
wherein the first electronic device is located in the second network and a first network, the first network is a network that can be established by the third electronic device and the first electronic device, and the second electronic device is located in the second network.
Here, it should be noted that: similar to the above description of the method, the description of the beneficial effects of the method is not repeated, and for the technical details not disclosed in the first electronic device in the embodiment of the present application, please refer to the description of the embodiment of the information processing method in the present application.
Fig. 5 is a schematic structural diagram of a first electronic device according to an embodiment of the present disclosure, and referring to fig. 5, a first electronic device 50 according to an embodiment of the present disclosure includes:
at least one processor 51, memory 52, a user interface 53, and at least one network interface 54. The various components in the first electronic device are coupled together by a bus system 55. It will be appreciated that the bus system 55 is used to enable communications among the components of the connection. The bus system 55 includes a power bus, a control bus, and a status signal bus in addition to a data bus. For clarity of illustration, however, the various buses are labeled as bus system 55 in FIG. 5.
The user interface 53 may include, among other things, a display, a keyboard, a mouse, a trackball, a click wheel, a key, a button, a touch pad, or a touch screen.
It will be appreciated that the memory 52 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), a Flash Memory (Flash Memory), and the like. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), Synchronous Static Random Access Memory (SSRAM). The memory 52 described in the embodiments of the present application is intended to comprise these and any other suitable types of memory.
The memory 52 in the embodiments of the present application is capable of storing data to support the operation of the electronic device. Examples of such data include: any computer program for operating on an electronic device, such as an operating system and application programs. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application program may include various application programs.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information processing method comprising:
the method comprises the steps that first electronic equipment obtains identification information representing an electronic equipment identification; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition;
the first electronic equipment sends the identification information to second electronic equipment;
the first electronic device obtains a matching result, wherein the matching result is obtained by the second electronic device based on the identification information matching and is used for indicating the existence state of third verification information corresponding to the identification information, and the matching result also carries the third verification information;
if the matching result meets the execution condition and if the third verification information carried in the matching result is the same as the first verification information, the first electronic device executes a processing command to modify the first verification information, so that the first verification information can be in a state which cannot be obtained by the second electronic device.
2. The method of claim 1, wherein the first electronic device executing a process command to enable the first authentication information to be in a state unavailable through the second electronic device comprises:
determining that the third verification information is in an available state according to the presence state indicated by the matching result;
executing a processing command to modify the first authentication information so that the first authentication information can be in a state that is not available through the second electronic device.
3. The method of claim 2, wherein the matching result carries the third verification information, and before executing the processing command, the method further comprises:
comparing the third verification information carried by the matching result with the first verification information of the first electronic equipment to obtain a comparison result;
and determining that the third verification information carried by the matching result is matched with the first verification information of the first electronic equipment based on the comparison result.
4. The method of claim 1, wherein the first electronic device executing a process command to enable the first authentication information to be in a state unavailable through the second electronic device comprises:
and the first electronic equipment outputs prompt information, wherein the prompt information indicates the state that the third verification information can be obtained through the second electronic equipment.
5. The method of claim 1, wherein the first electronic device executing a process command to enable the first authentication information to be in a state unavailable through the second electronic device comprises:
modifying the first verification information into fourth verification information;
notifying the fourth electronic device that has obtained the access right to reacquire the access right instead of the fourth authentication information.
6. The method of claim 5, wherein said notifying a fourth electronic device that has obtained access rights reacquires said access rights in place of said fourth authentication information, comprising:
after the first electronic device modifies the first verification information into fourth verification information, the first electronic device notifies the fourth electronic device to change the fourth verification information into the fourth verification information to obtain the access right again.
7. The method of claim 5, wherein the modifying the first authentication information to fourth authentication information comprises:
after the first electronic device notifies the fourth electronic device that the fourth authentication information is changed to obtain the access right again, the first electronic device modifies the first authentication information into fourth authentication information.
8. The method of claim 5, wherein the method further comprises:
receiving a connection request which is sent by fifth electronic equipment and carries the first verification information or the third verification information;
judging whether the fifth electronic equipment obtains the access right or not based on the connection request;
if the fifth electronic device obtains the access right, feeding back the fourth verification information to the fifth electronic device;
and if the fifth electronic device does not obtain the access right, not feeding back the fourth verification information to the fifth electronic device.
9. The method of any one of claims 1 to 8,
the obtaining of the access right refers to: obtaining a right to access a second network through the first electronic device;
wherein the first electronic device is located in the second network and a first network, the first network is a network that can be established by the third electronic device and the first electronic device, and the second electronic device is located in the second network.
10. A first electronic device, comprising:
the first acquisition module is used for acquiring identification information representing an electronic equipment identification; the first electronic equipment is provided with first verification information, and the first verification information is used for determining whether second verification information sent by third electronic equipment requesting to obtain access authority meets a condition;
the sending module is used for sending the identification information to second electronic equipment;
a second obtaining module, configured to obtain a matching result, where the matching result is obtained by the second electronic device based on the identification information, and is used to indicate an existence state of third verification information corresponding to the identification information, and the matching result also carries the third verification information;
and the execution module is used for executing a processing command to modify the first verification information if the matching result meets the execution condition and if the third verification information carried in the matching result is the same as the first verification information, so that the first verification information can be in a state which cannot be obtained by the second electronic equipment.
CN201910253261.7A 2019-03-29 2019-03-29 Information processing method and electronic equipment Active CN109996228B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910253261.7A CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910253261.7A CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Publications (2)

Publication Number Publication Date
CN109996228A CN109996228A (en) 2019-07-09
CN109996228B true CN109996228B (en) 2021-04-13

Family

ID=67132077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910253261.7A Active CN109996228B (en) 2019-03-29 2019-03-29 Information processing method and electronic equipment

Country Status (1)

Country Link
CN (1) CN109996228B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581716A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Connection method of wireless access points and wireless access point equipment
CN106412884A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 WIFI connection management method and apparatus thereof

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2817917B1 (en) * 2012-02-20 2018-04-11 KL Data Security Pty Ltd Cryptographic method and system
CN103297408B (en) * 2012-03-02 2016-04-06 腾讯科技(深圳)有限公司 Login method and device and terminal, the webserver
CN106912048B (en) * 2013-12-20 2020-06-23 北京小米移动软件有限公司 Access point information sharing method and device
US9336378B2 (en) * 2014-03-31 2016-05-10 Google Inc. Credential sharing
CN104159226B (en) * 2014-07-24 2016-02-24 小米科技有限责任公司 Method for connecting network and device
CN105743844A (en) * 2014-12-08 2016-07-06 联想(北京)有限公司 Information processing method and electronic device
CN104618873B (en) * 2015-01-15 2018-11-30 腾讯科技(深圳)有限公司 Access-in point information sharing method and device
CN106162818A (en) * 2015-04-09 2016-11-23 厦门众联世纪科技有限公司 The method unlocking WIFI hot spot
US9652606B2 (en) * 2015-07-06 2017-05-16 Unisys Corporation Cloud-based active password manager
CN106714161B (en) * 2016-06-29 2019-02-05 腾讯科技(深圳)有限公司 Cut off method, equipment and the system of unauthorized mobile terminal network connection
CN106412911B (en) * 2016-11-25 2019-07-30 宇龙计算机通信科技(深圳)有限公司 Wireless access point monitoring method, device and electronic equipment
CN107645495A (en) * 2017-08-24 2018-01-30 上海斐讯数据通信技术有限公司 A kind of wireless network password sharing method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104581716A (en) * 2014-12-31 2015-04-29 广东欧珀移动通信有限公司 Connection method of wireless access points and wireless access point equipment
CN106412884A (en) * 2016-11-24 2017-02-15 北京小米移动软件有限公司 WIFI connection management method and apparatus thereof

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
腾达WiFi APP防蹭网保障家庭网络安全;胡浩;《计算机与网络》;20171226;全文 *

Also Published As

Publication number Publication date
CN109996228A (en) 2019-07-09

Similar Documents

Publication Publication Date Title
US8195124B2 (en) Apparatus and methods for managing time sensitive application privileges on a wireless device
CN107395593B (en) Vulnerability automatic protection method, firewall and storage medium
CN109391673B (en) Method, system and terminal equipment for managing update file
CN103826215A (en) Method and apparatus for carrying out root authority management at terminal equipment
CN106776917B (en) Method and device for acquiring resource file
CN110278192B (en) Method and device for accessing intranet by extranet, computer equipment and readable storage medium
CN106254528B (en) Resource downloading method and caching device
CN106713315B (en) Login method and device of plug-in application program
US9665732B2 (en) Secure Download from internet marketplace
WO2015102186A1 (en) Method for restricting use of terminal and system therefor
CN108494749B (en) Method, device and equipment for disabling IP address and computer readable storage medium
AU2014256198A1 (en) Terminal, network side device, terminal application control method, and system
CN112579997B (en) User permission configuration method and device, computer equipment and storage medium
US20170048097A1 (en) Managing devices through secondary communication channels
CN111385274A (en) Cross-network service calling method and device, feature gateway and identity verification system
CN109996228B (en) Information processing method and electronic equipment
CN110351719B (en) Wireless network management method, system, electronic equipment and storage medium
CN109462589B (en) Method, device and equipment for controlling network access of application program
CN109348472B (en) OTA (over the air) upgrading method and system based on single-point pushing
CN109474591B (en) Method and device for sharing accounts among multiple systems, electronic equipment and storage medium
KR101380041B1 (en) Automatic login system and method that use portable terminal
CN108664805B (en) Application program safety verification method and system
CN109548411B (en) Method and device for controlling controllable equipment to access network
CN108076009B (en) Resource sharing method, device and system
JP5357927B2 (en) COMMUNICATION DEVICE, DATA ACCESS METHOD, AND DATA ACCESS PROGRAM

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant