WO2019228257A1 - 一种用于识别无线热点的类型的方法及其网络设备 - Google Patents

一种用于识别无线热点的类型的方法及其网络设备 Download PDF

Info

Publication number
WO2019228257A1
WO2019228257A1 PCT/CN2019/088297 CN2019088297W WO2019228257A1 WO 2019228257 A1 WO2019228257 A1 WO 2019228257A1 CN 2019088297 W CN2019088297 W CN 2019088297W WO 2019228257 A1 WO2019228257 A1 WO 2019228257A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless hotspot
hotspot
wireless
type
authentication
Prior art date
Application number
PCT/CN2019/088297
Other languages
English (en)
French (fr)
Inventor
罗琨
韩洲
程磊根
Original Assignee
上海连尚网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201810600611.8A external-priority patent/CN110557800B/zh
Application filed by 上海连尚网络科技有限公司 filed Critical 上海连尚网络科技有限公司
Priority to SG11202011923PA priority Critical patent/SG11202011923PA/en
Publication of WO2019228257A1 publication Critical patent/WO2019228257A1/zh
Priority to US17/106,189 priority patent/US11368901B2/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/08Access restriction or access information delivery, e.g. discovery data delivery
    • H04W48/14Access restriction or access information delivery, e.g. discovery data delivery using user query or user detection

Definitions

  • the present application relates to the field of computers, and in particular, to a method for identifying a type of a wireless hotspot and a network device thereof.
  • many open hotspots require user authentication before they can connect.
  • users need to enter information such as mobile phone numbers for authentication before allowing users to access the Internet through wireless hotspots.
  • users search for nearby wireless hotspots they may find a large number of nearby wireless hotspots; wireless hotspots are roughly divided into encrypted hotspots that require a password to connect and open hotspots that can be connected without a password; open hotspots can be further divided into Authenticated hotspots and open hotspots that require authentication to connect.
  • the wireless hotspot is not connected, it is difficult to distinguish which category the wireless hotspot belongs to.
  • An object of the present application is to provide a method for identifying a type of a wireless hotspot and a network device thereof to solve the problem of confirming the type of a wireless hotspot.
  • a method for identifying a type of a wireless hotspot is provided, which is applied to a network device and includes: in response to receiving a type confirmation request for a first wireless hotspot, obtaining information of the first wireless hotspot , The type confirmation request is used to request the type of the first wireless hotspot; based on the information of the first wireless hotspot and the information of multiple second wireless hotspots in a preset hotspot set, find a connection with the first wireless hotspot The same or similar second wireless hotspot, the type of the second wireless hotspot is an open wireless hotspot requiring authentication; and in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, The type of hotspot is identified as an open wireless hotspot that requires authentication.
  • a computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the present application.
  • a network device includes a processor, and the processor executes an instruction according to the method described in the present application.
  • the method for identifying the type of a wireless hotspot and the network device provided by the present application can confirm whether the requested wireless hotspot is a wireless hotspot requiring identity authentication according to the type confirmation request and a set of hotspots preset by the network device.
  • FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to an embodiment of the present application.
  • the terminal and the network device each include one or more processors (CPUs), input / output interfaces, network interfaces, and memory.
  • processors CPUs
  • input / output interfaces output interfaces
  • network interfaces network interfaces
  • memory volatile and non-volatile memory
  • Memory may include non-persistent memory, random access memory (RAM), and / or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of a computer-readable medium.
  • RAM random access memory
  • flashRAM flash memory
  • Computer-readable media includes permanent and non-persistent, removable and non-removable media.
  • Information storage can be accomplished by any method or technology.
  • Information may be computer-readable instructions, data structures, modules of a program, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), and read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technologies, read-only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, Magnetic tape cartridges, tape disk storage or other magnetic storage devices or any other non-transmitting medium can be used to store information that can be accessed by computing devices.
  • computer-readable media does not include non-transitory computer-readable media, such as modulated data signals and carrier waves.
  • the terminal referred to in the present invention includes, but is not limited to, any electronic product that can perform human-computer interaction with a user (for example, human-computer interaction through a touch panel), such as a mobile electronic product such as a smart phone or a tablet computer.
  • the mobile electronic product may Use any operating system, such as android operating system, iOS operating system, etc.
  • the network device includes an electronic device capable of automatically performing numerical calculation and information processing according to an instruction set or stored in advance.
  • the hardware includes, but is not limited to, a microprocessor, an application specific integrated circuit (ASIC), and programmable logic.
  • PLDs field programmable gate arrays
  • DSPs digital signal processors
  • embedded devices and more.
  • the network device includes, but is not limited to, a cloud composed of a computer, a network host, a single network server, multiple network server sets, or multiple servers; here, the cloud is composed of a large number of computers or network servers based on Cloud Computing, Among them, cloud computing is a type of distributed computing, a virtual supercomputer composed of a group of loosely coupled computer sets.
  • the network includes, but is not limited to, the Internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless ad hoc network (Ad hoc network), and the like.
  • the terminal and the network device may also be programs running on the terminal, the network device, or a device formed by integrating the terminal and the network device over a network.
  • FIG. 1 is a schematic flowchart of a method for identifying a type of a wireless hotspot according to some embodiments of the present application. Steps S101 to S103 shown in FIG. 1 are mainly performed by network devices. As shown in FIG. 1, in an embodiment of the present application, a method for identifying a type of a wireless hotspot includes:
  • step S101 in response to receiving a type confirmation request for a first wireless hotspot, information of the first wireless hotspot is obtained, and the type confirmation request is used to request a type of the first wireless hotspot.
  • this type of confirmation request can come from the terminal or from within the network device.
  • the first wireless hotspot has not yet confirmed the type, for example, the type has not been confirmed by the sender of the type confirmation request.
  • the terminal sends a type confirmation request, and the type confirmation request carries the identifier of the first wireless hotspot to further obtain the information of the first wireless hotspot.
  • the first wireless hotspot list may also be collected by a network device such as a server to confirm the type of the first wireless hotspot.
  • Step S102 Find a second wireless hotspot that is the same as or similar to the first wireless hotspot based on the information of the first wireless hotspot and information of multiple second wireless hotspots in a preset set of hotspots.
  • the type of wireless hotspot is an open wireless hotspot that requires authentication.
  • the network device can access a preset hotspot set, and the hotspot set contains information of a plurality of second wireless hotspots.
  • the second wireless hotspot is an open wireless hotspot that has been identified as requiring authentication.
  • authentication is required to access the Internet, such as authentication through an authentication page.
  • the network device may add a second wireless hotspot that has been identified as an open hotspot that requires authentication to the hotspot set.
  • Step S103 In response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, identify the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
  • the first wireless hotspot that is the same as or similar to the second wireless hotspot is also marked as an open wireless hotspot that requires authentication.
  • the fact that the first wireless hotspot is the same as the second wireless hotspot means that the identifiers and physical addresses of the first wireless hotspot and the second wireless hotspot are the same.
  • the SSID and BSSID of the first wireless hotspot and the second wireless hotspot are the same.
  • a method for determining that the first wireless hotspot is similar to the second wireless hotspot will be specifically described in the following embodiments.
  • the wireless hotspot requested by the terminal or the network device can be used to confirm whether the type of authentication is required.
  • the type confirmation request is from a terminal, and the type confirmation request includes an identifier of the first wireless hotspot scanned by the terminal.
  • the method of this embodiment further includes the following steps: in response to the type of the first wireless hotspot being identified as an open wireless hotspot requiring authentication, feeding back to the terminal identification information of the first wireless hotspot and corresponding to the identification information
  • the tag is used to indicate that the type of the first wireless hotspot is an open wireless hotspot requiring authentication.
  • the application running on the terminal may send a type confirmation request to the network device, and the type confirmation request carries the identifier of the first wireless hotspot to request to determine whether any of the first wireless hotspots is an open wireless hotspot requiring authentication.
  • the network device determines whether the first wireless hotspot is the same as or similar to the second wireless hotspot based on the identification of the first wireless hotspot and other related information of the first wireless hotspot, such as location information, manufacturer source fields, and the like. When the first wireless hotspot is the same as or similar to the second wireless hotspot, the first wireless hotspot is an open wireless hotspot that requires authentication.
  • the network device feeds back to the terminal the identification information of the first wireless hotspot and a label corresponding to the identification information, where the label indicates that the type of the wireless hotspot is an open wireless hotspot that requires authentication.
  • the type confirmation request sent by the application running on the terminal to the network device may include a hotspot information acquisition request sent by the terminal to the network device, where the hotspot information acquisition request is used to request the network device to the wireless hotspot scanned by the terminal
  • the hotspot information acquisition request may include an identification (such as an SSID) of the wireless hotspot scanned by the terminal, and is used to request the network device to provide the type of the wireless hotspot and the encrypted hotspot in the scanned wireless hotspot.
  • the terminal device can distinguish whether the wireless hotspots it scans are encrypted hotspots or open hotspots, but it is difficult to distinguish whether open hotspots require authentication, so the above type of confirmation request can be mainly used to request network devices to feedback open hotspots type.
  • the method of this embodiment before acquiring the information of the first wireless hotspot, further includes: acquiring connection data generated from a terminal based on a connection operation of the terminal to the second wireless hotspot; In response to the connection data indicating that authentication is required to connect to the second wireless hotspot, identify the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and add 25 the second wireless hotspot to the hotspot Collection.
  • an application installed on a terminal can detect connection data generated by a user's connection operation to connect to a wireless hotspot. When a connection to a wireless hotspot is found, authentication data such as an authentication page is generated, and the wireless hotspot is generated. Identifying an open wireless hotspot that requires authentication, that is, a second wireless hotspot, and reporting the recognition result to the network device for the network device to add the information of the second wireless hotspot to the hotspot set.
  • the application may send the connection data generated by the connection operation to the second wireless hotspot to the network device through the terminal, and the network device responds to the connection data to indicate that authentication is required to connect to the second wireless hotspot. Identifying the type of the second wireless hotspot as an open wireless hotspot requiring authentication, and adding the second wireless hotspot to the hotspot set.
  • the information of the first wireless hotspot or the second wireless hotspot includes at least one of the following: an identifier of the first wireless hotspot or the second wireless hotspot; the first wireless hotspot or the first wireless hotspot Location information of two wireless hotspots; a vendor source field of the first wireless hotspot or the second wireless hotspot.
  • the identifier may include an SSID (Service Set Identifier, service set identifier); the location information may include a geographic hash code (geohash); and the vendor source field may include a BSSID (Basic Service Set Identifier, basic service set identifier) Top six.
  • the second wireless hotspot similar to the first wireless hotspot includes: the same identifier as the first wireless hotspot and the same vendor source field as the first wireless hotspot or A similar second wireless hotspot; or a second wireless hotspot that is the same as the identifier of the first wireless hotspot and the location information indicates that it is in the same area as the first wireless hotspot; or The identification of the hotspot is similar and the location information indicates a second wireless hotspot within the same area as the first wireless hotspot.
  • the second wireless hotspot when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the manufacturer source fields are the same or similar, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and BSSID of the first wireless hotspot, and the network device queries the SSID and BSSID of the second wireless hotspot in a preset set of hotspots. When the bits are the same, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the second wireless hotspot when the identifiers of the second wireless hotspot and the first wireless hotspot are the same and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots.
  • the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the second wireless hotspot when the identifications of the second wireless hotspot and the first wireless hotspot are similar and the location information indicates that they are in the same area, it may be determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type confirmation request includes the SSID and location information of the first wireless hotspot, and the network device queries the SSID and location information of the second wireless hotspot in a preset set of hotspots.
  • the second wireless hotspot is similar to the SSID of the first wireless hotspot and the first
  • the location information of the two wireless hotspots and the first wireless hotspot are in the same area, it is determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the location information includes a hash code of a geographic location
  • the location information indicates that the location is in the same area as the first wireless hotspot includes: the first wireless hotspot and the second wireless hotspot Geo-location hash codes for hotspots have the same area fields.
  • the latitude and longitude of wireless hotspots are converted into hash codes (geohash) by geohash algorithm. Strings similar to each other indicate similar distances. The prefix matching of strings can be used to determine the distance between several wireless hotspots.
  • the length of the geohash encoding can determine the distance accuracy. For example, when the geohash base32 encoding length is 8, the accuracy is about 19 meters, and when the geohash base32 encoding length is 9, the accuracy is about 2 meters.
  • the encoding length can be selected according to the data.
  • the latitude interval of the earth is [-90,90] and the latitude of the center point is 39.928167.
  • the latitude 39.928167 can be approximated by the following algorithm:
  • the longitude interval of the earth is [-180, 180], and the longitude of the center point can be coded 116.389550.
  • the code generated by latitude is 1011100011
  • the code generated by longitude is 1101001011.
  • the longitude in the even digits and the latitude in the odd digits and combine the two strings to generate a new string: 11100 11101 00100 01111.
  • the second wireless hotspot and the first wireless hotspot can also calculate their geohash codes.
  • the second wireless hotspot and the first wireless hotspot have 8 geohash codes, and the first 6 bits of the geohash code of the center point can be set as Area field. If the geographic location hash codes of the second wireless hotspot and the first wireless hotspot are the first 6 bits, that is, the area fields are the same, it means that the second wireless hotspot and the first wireless hotspot are in the same area.
  • the length of the area field can be set freely according to the actual accuracy requirements.
  • the identifiers of the second wireless hotspot and the first wireless hotspot are similar to each other.
  • the edit distance between the identifier of the first wireless hotspot and the identifier of the second wireless hotspot is similar to a preset. Within the threshold.
  • Edit Distance also known as Levenshtein distance
  • Permissible editing operations include replacing one character with another, inserting a character, and deleting a character.
  • edit distance between cafe and coffee you can calculate according to the order of cafe ⁇ caffe ⁇ coffe ⁇ coffee.
  • the smaller the edit distance the greater the similarity between the two strings.
  • d [i, 5j] min (d [i-1, j] +1, d [i, j-1] +1, d [i-1, j-1] + temp) ... ............(1);
  • the edit distance can be calculated according to formula (2):
  • Edit distance 1-D [n, m] / max (str1 string length, str2 string length) ... (2);
  • D [n, m] is the last bit of the edit distance calculation matrix.
  • the edit distance algorithm is used to calculate the second wireless hotspot SSID and the first wireless hotspot SSID to obtain its edit distance.
  • the similarity of the two SSIDs is filtered by a preset similarity threshold. When the editing distance is within the preset similarity threshold, it is determined that the SSID of the second wireless hotspot is similar to the SSID of the first wireless hotspot. If the second wireless hotspot and the first wireless hotspot are still in the same area, it can be basically determined that the second wireless hotspot is similar to the first wireless hotspot.
  • the type of the second wireless hotspot in response to the connection data indicating that authentication is required to connect to the second wireless hotspot, is identified as an open wireless hotspot that requires authentication, and the first The step of adding two wireless hotspots to the hotspot set includes:
  • connection data indicating that authentication is required when connecting to the second wireless hotspot and the connection time indicated by the connection authentication data is within a preset time threshold, identifying the type of the second wireless hotspot as an open that requires authentication A wireless hotspot, and adding the second wireless hotspot to the hotspot set.
  • a data list may be generated; the data list may include a wireless hotspot identification, information that the wireless hotspot needs authentication, and a connection time.
  • a preset time threshold By setting a preset time threshold, only authentication wireless hotspot tags are added to wireless hotspots of connection data generated within the preset time threshold, and open wireless hotspots that have generated authentication in the recent period of time can be filtered to exclude outdated data. Keep your data fresh.
  • the method may further include the following steps: in response to obtaining the information from the terminal, Connection data generated by a connection operation of the first wireless hotspot, updating the type of the first wireless hotspot; wherein the connection data is used to indicate that a password is required to connect to the first wireless hotspot, or is used to indicate connection to the first wireless hotspot Authentication is required when the first wireless hotspot is required, or it is used to indicate that direct connection to the first wireless hotspot is allowed.
  • the types of the first wireless hotspot include encrypted wireless hotspots that require a password, open wireless hotspots that require authentication, or authentication-free ones. Open wireless hotspots.
  • the type of the first wireless hotspot can be updated according to the actually generated connection data to correct the type of the wireless hotspot that is incorrectly identified or changed.
  • the connection data generated from the terminal connected to the first wireless hotspot is collected, and the type of the first wireless hotspot is identified based on the connection data.
  • the first wireless hotspot is identified as an encrypted wireless hotspot that requires a password, and the type of the first wireless hotspot is updated accordingly.
  • the first wireless hotspot can be directly connected without authentication or password, and the wireless hotspot is identified as an open wireless hotspot without authentication, and the type of the first wireless hotspot is updated accordingly.
  • the first wireless hotspot is identified as an open wireless hotspot that requires authentication, and the first wireless hotspot is used as the second wireless hotspot to join the hotspot. Collection.
  • the wireless hotspot type can also be updated according to the above method.
  • a computer-readable storage medium stores instructions, and the instructions are executed according to a method described in the application.
  • a network device includes a processor, and the processor executes an instruction according to the method described in the present application.
  • the network device obtains information of the first wireless hotspot in response to receiving a type confirmation request for the first wireless hotspot sent by the terminal, and the type confirmation request is used to request the type of the first wireless hotspot;
  • the information of the first wireless hotspot and the information of a plurality of second wireless hotspots in a preset hotspot set are searched to find a second wireless hotspot that is the same as or similar to the first wireless hotspot.
  • the type of the second wireless hotspot is An open wireless hotspot requiring authentication; in response to finding a second wireless hotspot that is the same as or similar to the first wireless hotspot, the network device identifies the type of the first wireless hotspot as an open wireless hotspot that requires authentication.
  • this application may be implemented in software and / or a combination of software and hardware, for example, it may be implemented using an application specific integrated circuit (ASIC), a general purpose computer, or any other similar hardware device.
  • ASIC application specific integrated circuit
  • the software program of the present application may be executed by a processor to implement the steps or functions described above.
  • the software program (including related data structures) of the present application can be stored in a computer-readable recording medium, such as a RAM memory, a magnetic or optical drive or a floppy disk and the like.
  • some steps or functions of this application may be implemented by hardware, for example, as a circuit that cooperates with a processor to perform each step or function.
  • a part of the application may be applied as a computer program product, such as a computer program instruction, which, when executed by a computer, may call or provide the method and / or technical solution according to the application through the operation of the computer.
  • the program instructions for invoking the method of the present application may be stored in a fixed or removable recording medium, and / or transmitted through a data stream in a broadcast or other signal bearing medium, and / or stored in The program instructions are executed in a working memory of a computer device.
  • an embodiment according to the present application includes a device including a memory for storing computer program instructions and a processor for executing program instructions, wherein when the computer program instructions are executed by the processor, a trigger is triggered
  • the device operates based on the aforementioned method and / or technical solution according to various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本申请的目的是提供一种用于识别无线热点的类型的方法及网络设备,该方法包括:响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。本申请提供的用于识别无线热点的类型的方法及其网络设备,可以对请求的无线热点确认类型。

Description

一种用于识别无线热点的类型的方法及其网络设备 技术领域
本申请涉及计算机领域,尤其涉及一种用于识别无线热点的类型的方法及其网络设备。
背景技术
现有技术中,许多开放热点需要用户认证方可连接,例如,需用户输入手机号码等信息进行认证后,才允许用户通过无线热点接入因特网。当用户搜索附近的无线热点时,可能会发现周围大量的无线热点;无线热点大致分为需要输入密码才可连接的加密热点以及无需密码也能连接的开放热点;开放热点又可进一步分为无需认证的开放热点以及需要通过认证才能连接的开放热点。然而这些无线热点对于用户来说,如果不进行连接操作,则很难区分该无线热点究竟属于哪一类。
发明内容
本申请的一个目的是提供一种用于识别无线热点的类型的方法及其网络设备,以解决确认无线热点类型的问题。
根据本申请的一个方面,提供一种用于识别无线热点的类型的方法,应用于网络设备,包括:响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。
根据本申请的另一个方面,提供一种计算机可读存储介质,所述计算机可 读存储介质存储指令,所述指令根据本申请所述的方法进行执行。
根据本申请的又一个方面,提供一种网络设备,所述网络设备包括处理器,所述处理器根据本申请所述的方法执行指令。
本申请提供的用于识别无线热点的类型的方法及其网络设备,可以根据类型确认请求,结合网络设备预设的热点集合,对请求的无线热点确认其是否为需身份认证的无线热点。
附图说明
通过阅读参照以下附图所作的对非限制性实施例所作的详细描述,本申请的其它特征、目的和优点将会变得更明显:
图1示出了本申请实施例的用于识别无线热点的类型的方法的流程示意图。
附图中相同或相似的附图标记代表相同或相似的部件。
具体实施方式
下面结合附图对本申请作进一步详细描述。
在本申请一个典型的配置中,终端、网络设备均包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
20内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flashRAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问 的信息。按照本文中的界定,计算机可读介质不包括非暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
本发明所指终端包括但不限于任何一种可与用户进行人机交互(例如通过触摸板进行人机交互)的电子产品,例如智能手机、平板电脑等移动电子产品,所述移动电子产品可以采用任意操作***,如android操作***、iOS操作***等。其中,所述网络设备包括一种能够按照事先设定或存储的指令,自动进行数值计算和信息处理的电子设备,其硬件包括但不限于微处理器、专用集成电路(ASIC)、可编程逻辑器件(PLD)、现场可编程门阵列(FPGA)、数字信号处理器(DSP)、嵌入式设备等。所述网络设备包括但不限于计算机、网络主机、单个网络服务器、多个网络服务器集或多个服务器构成的云;在此,云由基于云计算(Cloud Computing)的大量计算机或网络服务器构成,其中,云计算是分布式计算的一种,由一群松散耦合的计算机集组成的一个虚拟超级计算机。所述网络包括但不限于互联网、广域网、城域网、局域网、VPN网络、无线自组织网络(Ad Hoc网络)等。优选地,所述终端和网络设备还可以是运行于所述终端、网络设备、或终端与网络设备过网络相集成所构成的设备上的程序。
图1示出了本申请一些实施例的用于识别无线热点的类型的方法的流程示意图。图1所示的步骤S101至S103的执行主体主要为网络设备。如图1所示,在本申请一实施例中,用于识别无线热点的类型的方法包括:
步骤S101,响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型。
其中,该类型确认请求可来自终端,也可来自网络设备内部。第一无线热点尚未确认类型,例如尚未被所述类型确认请求的发送方确认类型。例如终端发送类型确认请求,类型确认请求携带第一无线热点的标识,以进一步获取第一无线热点的信息。也可以由服务器等网络设备收集第一无线热点名单,以对第一无线热点的类型进行确认。
步骤S102,基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点。
其中,网络设备可访问预设的热点集合,热点集合内包含若干第二无线热点的信息。第二无线热点为已确认为需要认证的开放无线热点。当用户连接需要认证的开放无线热点时,需要进行认证才可接入因特网,例如通过认证页面进行认证。网络设备可将已确认为需要认证的开放热点的第二无线热点添加至热点集合中。
步骤S103,响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。
其中,通过比较第一无线热点与第二无线热点的信息,对于与第二无线热点相同或相似的第一无线热点,将其也标记为需要认证的开放无线热点。第一无线热点与第二无线热点相同是指第一无线热点与第二无线热点的标识和物理地址相同,例如第一无线热点与第二无线热点的SSID和BSSID均相同。判定第一无线热点与第二无线热点相似的方法将在下述实施例中具体介绍。
通过本申请实施例的方法,可以根据终端或网络设备的类型确认请求,结合网络设备的热点集合,对终端或网络设备请求的无线热点确认其是否需要认证的类型。
在本申请一些实施例中,所述类型确认请求来自终端,且所述类型确认请求包括所述终端扫描到的所述第一无线热点的标识。本实施例的方法还包括以下步骤:响应于所述第一无线热点的类型被识别为需要认证的开放无线热点,向所述终端反馈所述第一无线热点的标识信息以及与该标识信息对应的标签,所述标签用于指示所述第一无线热点的类型为需要认证的开放无线热点。
其中,终端上运行的应用程序可向网络设备发送类型确认请求,该类型确认请求携带第一无线热点的标识,以请求判断任意第一无线热点是否为需要认证的开放无线热点。网络设备根据第一无线热点的标识以及第一无线热点的其他相关信息,例如位置信息、厂商来源字段等,判断第一无线热点与第二无线热点是否相同或相似。当第一无线热点与第二无线热点相同或相似时,第一无线热点即为需要认证的开放无线热点。网络设备向该终端反馈第一无线热点的标识信息以及与该标识信息对应的标签,该标签指示无线热点的类型为需要认证的开放无线热点。在一些实施例中,终端上运行的应用程序向网络设备发送的类型确认请求可以包括终端向网络设备发送的热点信息获取请求,该热点信 息获取请求用于向网络设备请求终端扫描到的无线热点的信息;在一些实施例中,该热点信息获取请求可以包括终端扫描到的无线热点的标识(如SSID),并用于请求网络设备提供无线热点的类型以及扫描到的无线热点中的加密热点的密码;在一些实施例中,由于终端设备可以区分其扫描到的无线热点为加密热点还是开放热点,但难以区分开放热点是否需要认证,故上述类型确认请求可主要用于请求网络设备反馈开放热点的类型。
在本申请一些实施例中,本实施例的方法在获取所述第一无线热点的信息之前还包括:获取来自终端的、基于该终端对所述第二无线热点的连接操作生成的连接数据;响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将25该第二无线热点添加至所述热点集合中。
在一些实施例中,安装于终端的应用程序,可以检测用户连接无线热点的连接操作生成的连接数据,当发现连接某个无线热点时,产生了例如认证页面等认证数据后,将该无线热点识别为需要认证的开放无线热点,即第二无线热点,并将识别结果上报给网络设备,以供网络设备将该第二无线热点的信息添加至热点集合中。在一些实施例中,应用程序可通过终端将对所述第二无线热点的连接操作生成的连接数据发送给网络设备,网络设备响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。
具体地,所述第一无线热点或所述第二无线热点的信息包括以下至少一项:所述第一无线热点或所述第二无线热点的标识;所述第一无线热点或所述第二无线热点的位置信息;所述第一无线热点或所述第二无线热点的厂商来源字段。在一些实施例中,标识可包括SSID(Service Set Identifier,服务集标识);位置信息可包括地理位置哈希编码(geohash);厂商来源字段可包括BSSID(Basic Service Set Identifier,基本服务集标识)的前六位。
相应地,在本申请一些实施例中,与所述第一无线热点相似的第二无线热点包括:与所述第一无线热点的标识相同并且与所述第一无线热点的厂商来源字段相同或相似的第二无线热点;或者,与所述第一无线热点的标识相同并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点;或者, 与所述第一无线热点的标识相似并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点。
在一些实施例中,当第二无线热点与第一无线热点的标识相同并且厂商来源字段相同或相似时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和BSSID,网络设备查询预设的热点集合中第二无线热点的SSID和BSSID,当第二无线热点与第一无线热点的SSID相同并且BSSID前六位相同时,判定第二无线热点与第一无线热点相似。
在一些实施例中,当第二无线热点与第一无线热点的标识相同并且位置信息指示在同一区域内时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和位置信息,网络设备查询预设的热点集合中第二无线热点的SSID和位置信息,当第二无线热点与第一无线热点的SSID相同并且第二无线热点与第一无线热点的位置信息指示在同一区域内时,判定第二无线热点与第一无线热点相似。
在一些实施例中,当第二无线热点与第一无线热点的标识相似并且位置信息指示在同一区域内时,可判定第二无线热点与第一无线热点相似。例如,类型确认请求包含第一无线热点的SSID和位置信息,网络设备查询预设的热点集合中第二无线热点的SSID和位置信息,当第二无线热点与第一无线热点的SSID相似并且第二无线热点与第一无线热点的位置信息指示在同一区域内时,判定第二无线热点与第一无线热点相似。
在本申请一些实施例中,所述位置信息包括地理位置的哈希编码,所述位置信息指示与所述第一无线热点在同一区域内包括:所述第一无线热点与所述第二无线热点的地理位置哈希编码具有相同的区域字段。
例如,通过geohash算法将无线热点的纬度和经度分别转换为哈希编码(geohash),字符串相似的表示距离相近,可以利用字符串的前缀匹配来确定若干无线热点之间的距离。geohash编码的长度可以决定距离精度,例如,当geohash base32编码长度为8时,精度在19米左右,而当geohash base32编码长度为9时,精度在2米左右。编码长度可以根据数据情况进行选择。
例如地球纬度区间是[-90,90],设中心点纬度是39.928167,可以通过下面算法对纬度39.928167进行逼近编码:
1)区间[-90,90]进行二分为[-90,0),[0,90],称为左右区间,可以确定39.928167属于右区间[0,90],给标记为1;
2)接着将区间[0,90]进行二分为[0,45),[45,90],可以确定39.928167属于左区间[0,45),给标记为0;
3)递归上述过程39.928167总是属于某个区间[a,b],随着每次迭代区间[a,b]总在缩小,并越来越逼近39.928167;
4)如果给定的纬度x(39.928167)属于左区间,则记录0,如果属于右区间则记录1,这样随着算法的进行会产生一个序列1011100,序列的长度跟给定的区间划分次数有关。
同理,地球经度区间是[-180,180],可以对中心点经度116.389550进行编码。
通过上述计算,纬度产生的编码为10111 00011,经度产生的编码为1101001011。偶数位放经度,奇数位放纬度,把2串编码组合生成新串:11100 11101 00100 01111。
最后使用用0-9、b-z(去掉a,i,1,o)这32个字母进行base32编码,首先将11100 11101 00100 01111转成十进制,对应着28、29、4、15,十进制对应的编码就是wx4g,作为中心点的geohash编码。
同理,第二无线热点和第一无线热点也可分别计算其geohash编码,例如,第二无线热点和第一无线热点的geohash编码分别为8位,可以设中心点的geohash编码前6位为区域字段。如果第二无线热点和第一无线热点的地理位置哈希编码前6位,即区域字段相同,即表明第二无线热点和第一无线热点在同一区域内。区域字段的长度可以根据实际精度需要自由设定。
在本申请一些实施例中,所述第二无线热点与所述第一无线热点的标识相似包括:所述第一无线热点的标识与所述第二无线热点的标识的编辑距离在预设相似度阈值内。
其中,编辑距离(Edit Distance),又称Levenshtein距离,是指两个字串之间,由一个转成另一个所需的最少编辑操作次数。许可的编辑操作包括将一个字符替换成另一个字符,***一个字符,删除一个字符。例如,要计算cafe和coffee的编辑距离可根据cafe→caffe→coffe→coffee的顺序进行计算。一般来 说,编辑距离越小,两个串的相似度越大。
例如,对于两个字符串str1和str2,设第二无线热点SSID为str1,第一无线热点SSID为str02。生成如下矩阵:
    s t r 0 2
  0 1 2 3 4 5
s 1          
t 2          
r 3          
l 4         D[n,m]
根据公式(1)计算矩阵中每个单元的值:
d[i,5j]=min(d[i-1,j]+1、d[i,j-1]+1、d[i-1,j-1]+temp)..................(1);
其中,当str1[i]==str2[j]时,temp=0;否则,temp=1。i、j为自然数且i≥2,j≥2。d[i-1,j]+1表示增加操作,d[i,j-1]+1表示删除操作,d[i-1,j-1]+temp表示替换操作。
编辑距离可根据公式(2)计算得到:
编辑距离=1-D[n,m]/max(str1字符串长度,str2字符串长度)......(2);
其中,D[n,m]为编辑距离计算矩阵的最后一位。
利用编辑距离算法对第二无线热点SSID与第一无线热点SSID进行计算,得到其编辑距离。通过预设相似度阈值对两个SSID相似度进行筛选,当编辑距离在预设相似度阈值之内时,确定第二无线热点与所述第一无线热点的SSID相似。如果第二无线热点与所述第一无线热点还在同一区域内时,可基本判定第二无线热点与所述第一无线热点相似。
在本申请一些实施例中,前述响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中的步骤,包括:
响应于所述连接数据指示连接所述第二无线热点时需要认证且该连接认证数据指示的连接时间在预设时间阈值之内,将该所述第二无线热点的类型识 别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。
在一些实施例中,当网络设备收集来自终端设备的无线热点的连接数据时,可生成数据列表;该数据列表可包含无线热点标识、无线热点需要认证的信息、以及连接时间。通过设置预设时间阈值,仅对在预设时间阈值之内产生的连接数据的无线热点添加认证无线热点标签,可筛选出最近一段时间内产生认证情况的开放无线热点,以排除过期的数据,保持数据的鲜活性。
在本申请一些实施例中,该方法在将该第一无线热点的类型识别为需要认证的开放无线热点之后,还包括可包括以下步骤:响应于获取到来自终端的、基于该终端对所述第一无线热点的连接操作生成的连接数据,更新所述第一无线热点的类型;其中,所述连接数据用于指示连接所述第一无线热点时需要提供密码、或者用于指示连接所述第一无线热点时需要进行认证、或者用于指示允许直接连接所述第一无线热点,所述第一无线热点的类型包括需要提供密码的加密无线热点、需要认证的开放无线热点或者无需认证的开放无线热点。
通过上述实施例,可以根据实际产生的连接数据,更新第一无线热点的类型,以对被错误识别或发生变化的无线热点的类型进行纠错。例如,收集来自于终端的因连接第一无线热点而产生的连接数据,基于连接数据对第一无线热点的类型进行识别。例如,基于对连接数据分析确定连接第一无线热点需要提供密码,则将该第一无线热点识别为需要提供密码的加密无线热点,并相应更新该第一无线热点的类型。或者,基于对连接数据分析确定该第一无线热点无需认证或密码即可直接连接,则将该无线热点识别为无需认证的开放无线热点,并相应更新该第一无线热点的类型。又如,基于对连接数据分析确定连接该第一无线热点需要认证的,则将该第一无线热点识别为需认证的开放无线热点,并将该第一无线热点作为第二无线热点,加入热点集合中。通过上述步骤,就可将错误标记为需认证的开放无线热点的情况改正。
此外,对于无线热点类型发生实际变化的情况,例如,原有不需要身份认证的无线热点变为加密无线热点,也可根据上述方法更新无线热点类型。
根据本申请的另一个方面,提供一种计算机可读存储介质,所述计算机可读存储介质存储指令,所述指令根据本申请所述的方法进行执行。
根据本申请的又一个方面,提供一种网络设备,所述网络设备包括处理器, 所述处理器根据本申请所述的方法执行指令。
例如,网络设备响应于接收到终端发送的针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;网络设备基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;网络设备响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的精神和范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。
需要注意的是,本申请可在软件和/或软件与硬件的组合体中被实施,例如,可采用专用集成电路(ASIC)、通用目的计算机或任何其他类似硬件设备来实现。在一个实施例中,本申请的软件程序可以通过处理器执行以实现上文所述步骤或功能。同样地,本申请的软件程序(包括相关的数据结构)可以被存储到计算机可读记录介质中,例如,RAM存储器,磁或光驱动器或软磁盘及类似设备。另外,本申请的一些步骤或功能可采用硬件来实现,例如,作为与处理器配合从而执行各个步骤或功能的电路。
另外,本申请的一部分可被应用为计算机程序产品,例如计算机程序指令,当其被计算机执行时,通过该计算机的操作,可以调用或提供根据本申请的方法和/或技术方案。而调用本申请的方法的程序指令,可能被存储在固定的或可移动的记录介质中,和/或通过广播或其他信号承载媒体中的数据流而被传输,和/或被存储在根据所述程序指令运行的计算机设备的工作存储器中。在此,根据本申请的一个实施例包括一个装置,该装置包括用于存储计算机程序指令的存储器和用于执行程序指令的处理器,其中,当该计算机程序指令被该处理器执行时,触发该装置运行基于前述根据本申请的多个实施例的方法和/或技术方案。
对于本领域技术人员而言,显然本申请不限于上述示范性实施例的细节,而且在不背离本申请的精神或基本特征的情况下,能够以其他的具体形式实现 本申请。因此,无论从哪一点来看,均应将实施例看作是示范性的,而且是非限制性的,本申请的范围由所附权利要求而不是上述说明限定,因此旨在将落在权利要求的等同要件的含义和范围内的所有变化涵括在本申请内。不应将权利要求中的任何附图标记视为限制所涉及的权利要求。此外,显然“包括”一词不排除其他单元或步骤,单数不排除复数。装置权利要求中陈述的多个单元或装置也可以由一个单元或装置通过软件或者硬件来实现。第一,第二等词语用来表示名称,而并不表示任何特定的顺序。

Claims (11)

  1. 一种用于识别无线热点的类型的方法,应用于网络设备,其特征在于,包括:
    响应于接收到针对第一无线热点的类型确认请求,获取所述第一无线热点的信息,该类型确认请求用于请求提供第一无线热点的类型;
    基于所述第一无线热点的信息以及预设的热点集合中的多个第二无线热点的信息,查找与所述第一无线热点相同或相似的第二无线热点,所述第二无线热点的类型为需要认证的开放无线热点;
    响应于查找到与所述第一无线热点相同或相似的第二无线热点,将该第一无线热点的类型识别为需要认证的开放无线热点。
  2. 根据权利要求1所述的方法,其中,所述类型确认请求来自终端,且所述类型确认请求包括所述终端扫描到的所述第一无线热点的标识;
    该方法还包括:响应于所述第一无线热点的类型被识别为需要认证的开放无线热点,向所述终端反馈所述第一无线热点的标识信息以及与该标识信息对应的标签,所述标签用于指示所述第一无线热点的类型为需要认证的开放无线热点。
  3. 根据权利要求1所述的方法,该方法在获取所述第一无线热点的信息之前还包括:
    获取来自终端的、基于该终端对所述第二无线热点的连接操作生成的连接数据;
    响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。
  4. 根据权利要求1所述的方法,其特征在于,所述第一无线热点或所述第二无线热点的信息包括以下至少一项:
    所述第一无线热点或所述第二无线热点的标识;
    所述第一无线热点或所述第二无线热点的位置信息;
    所述第一无线热点或所述第二无线热点的厂商来源字段。
  5. 根据权利要求4所述的方法,其特征在于,与所述第一无线热点相似的第 二无线热点包括:
    与所述第一无线热点的标识相同并且与所述第一无线热点的厂商来源字段相似的第二无线热点;
    与所述第一无线热点的标识相同并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点;或者
    与所述第一无线热点的标识相似并且所述位置信息指示与所述第一无线热点在同一区域内的第二无线热点。
  6. 根据权利要求5所述的方法,其特征在于,所述位置信息包括地理位置的哈希编码,所述位置信息指示与所述第一无线热点在同一区域内包括:
    所述第一无线热点与所述第二无线热点的地理位置哈希编码具有相同的区域字段。
  7. 根据权利要求5所述的筛选方法,其特征在于,所述第二无线热点与所述第一无线热点的标识相似包括:所述第一无线热点的标识与所述第二无线热点的标识的编辑距离在预设相似度阈值内。
  8. 根据权利要求3所述的方法,其特征在于,响应于所述连接数据指示连接所述第二无线热点时需要认证,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中,包括:
    响应于所述连接数据指示连接所述第二无线热点时需要认证且该连接数据指示的连接时间在预设时间阈值之内,将该所述第二无线热点的类型识别为需要认证的开放无线热点,并将该第二无线热点添加至所述热点集合中。
  9. 根据权利要求1所述的方法,其特征在于,该方法在将该第一无线热点的类型识别为需要认证的开放无线热点之后,还包括:
    响应于获取到来自终端的、基于该终端对所述第一无线热点的连接操作生成的连接数据,更新所述第一无线热点的类型,其中,所述连接数据用于指示连接所述第一无线热点时需要提供密码、或者用于指示连接所述第一无线热点时需要进行认证、或者用于指示允许直接连接所述第一无线热点,所述第一无线热点的类型包括需要提供密码的加密无线热点、需要认证的开放无线热点或者无需认证的开放无线热点。
  10. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储指 令,所述指令根据权利要求1至9中任一项所述的方法进行执行。
  11. 一种网络设备,其特征在于,所述网络设备包括处理器,所述处理器根据权利要求1至9中任一项所述的方法执行指令。
PCT/CN2019/088297 2018-06-01 2019-05-24 一种用于识别无线热点的类型的方法及其网络设备 WO2019228257A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
SG11202011923PA SG11202011923PA (en) 2018-06-01 2019-05-24 A method for identifying a type of a wireless hotspot and a network device thereof
US17/106,189 US11368901B2 (en) 2018-06-01 2020-11-30 Method for identifying a type of a wireless hotspot and a network device thereof

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
CN201810557552.0 2018-06-01
CN201810557552 2018-06-01
CN201810600611.8A CN110557800B (zh) 2018-06-01 2018-06-12 一种用于识别无线热点的类型的方法及其网络设备
CN201810600611.8 2018-06-12

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US17/106,189 Continuation US11368901B2 (en) 2018-06-01 2020-11-30 Method for identifying a type of a wireless hotspot and a network device thereof

Publications (1)

Publication Number Publication Date
WO2019228257A1 true WO2019228257A1 (zh) 2019-12-05

Family

ID=68697409

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/088297 WO2019228257A1 (zh) 2018-06-01 2019-05-24 一种用于识别无线热点的类型的方法及其网络设备

Country Status (1)

Country Link
WO (1) WO2019228257A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301567A (zh) * 2021-04-29 2021-08-24 海尔(深圳)研发有限责任公司 用于配网的方法、装置和智能家居设备

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533608A (zh) * 2013-09-30 2014-01-22 深圳市同洲电子股份有限公司 无线热点ssid的命名方法、无线热点识别方法及设备
CN105162768A (zh) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 检测钓鱼Wi-Fi热点的方法及装置
CN106162649A (zh) * 2015-04-20 2016-11-23 中兴通讯股份有限公司 一种识别无线接入点合法性的方法、终端及***
CN106341861A (zh) * 2015-07-08 2017-01-18 腾讯科技(深圳)有限公司 一种识别无线接入点的方法、服务器及***
CN106792704A (zh) * 2015-11-24 2017-05-31 ***通信集团公司 一种检测钓鱼接入点的方法及装置
WO2017128546A1 (zh) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 一种WiFi网络安全接入方法及装置
US20180014243A1 (en) * 2015-07-08 2018-01-11 Tencent Technology (Shenzhen) Company Limited Method for identifying wireless ap, server, system, and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103533608A (zh) * 2013-09-30 2014-01-22 深圳市同洲电子股份有限公司 无线热点ssid的命名方法、无线热点识别方法及设备
CN106162649A (zh) * 2015-04-20 2016-11-23 中兴通讯股份有限公司 一种识别无线接入点合法性的方法、终端及***
CN106341861A (zh) * 2015-07-08 2017-01-18 腾讯科技(深圳)有限公司 一种识别无线接入点的方法、服务器及***
US20180014243A1 (en) * 2015-07-08 2018-01-11 Tencent Technology (Shenzhen) Company Limited Method for identifying wireless ap, server, system, and computer storage medium
CN105162768A (zh) * 2015-07-31 2015-12-16 腾讯科技(深圳)有限公司 检测钓鱼Wi-Fi热点的方法及装置
CN106792704A (zh) * 2015-11-24 2017-05-31 ***通信集团公司 一种检测钓鱼接入点的方法及装置
WO2017128546A1 (zh) * 2016-01-29 2017-08-03 宇龙计算机通信科技(深圳)有限公司 一种WiFi网络安全接入方法及装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113301567A (zh) * 2021-04-29 2021-08-24 海尔(深圳)研发有限责任公司 用于配网的方法、装置和智能家居设备
CN113301567B (zh) * 2021-04-29 2022-11-18 海尔(深圳)研发有限责任公司 用于配网的方法、装置和智能家居设备

Similar Documents

Publication Publication Date Title
KR102079860B1 (ko) 텍스트 주소 처리 방법 및 장치
US11368901B2 (en) Method for identifying a type of a wireless hotspot and a network device thereof
JP6599906B2 (ja) ログインアカウントのプロンプト
TWI659300B (zh) 一種設備標識提供方法及裝置
US20150161207A1 (en) Assisting query and querying
EP3767483A1 (en) Method, device, system, and server for image retrieval, and storage medium
WO2019205373A9 (zh) 相似用户查找装置、方法及计算机可读存储介质
WO2022100154A1 (zh) 基于人工智能的地址标准化方法、装置、设备和存储介质
CN108563697B (zh) 一种数据处理方法、装置和存储介质
CN113282799B (zh) 节点的操作方法、装置、计算机设备和存储介质
WO2018010693A1 (zh) 识别伪基站信息的方法及装置
CN108684044B (zh) 一种用户行为检测***、方法及装置
CN108449778B (zh) 一种无线接入点展示方法及装置、以及终端设备
WO2023040530A1 (zh) 网页内容溯源方法、知识图谱构建方法以及相关设备
CN106202440B (zh) 数据处理方法、装置及设备
WO2019228257A1 (zh) 一种用于识别无线热点的类型的方法及其网络设备
CN111782728A (zh) 一种数据同步方法、装置、电子设备及介质
CN105843809B (zh) 数据处理方法和装置
CN114240344A (zh) 企业人员数据处理方法、装置、计算机设备和存储介质
US11394748B2 (en) Authentication method for anonymous account and server
WO2018082252A1 (zh) 移动终端的检测处理方法、装置、设备和计算机存储介质
CN113672669A (zh) 基于分布式存储的数据查询方法及装置
CN109522014B (zh) 基于新产品开发的算法处理方法、电子装置及可读存储介质
CN109032655B (zh) 一种监控实例的配置方法、服务器及计算机可读存储介质
CN112800033A (zh) 数据操作请求处理方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19812053

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 22/03/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19812053

Country of ref document: EP

Kind code of ref document: A1