CN104980919B - The acquisition methods and equipment of information of network service - Google Patents
The acquisition methods and equipment of information of network service Download PDFInfo
- Publication number
- CN104980919B CN104980919B CN201510243278.6A CN201510243278A CN104980919B CN 104980919 B CN104980919 B CN 104980919B CN 201510243278 A CN201510243278 A CN 201510243278A CN 104980919 B CN104980919 B CN 104980919B
- Authority
- CN
- China
- Prior art keywords
- information
- network
- encryption information
- smart machine
- access point
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure is directed to a kind of method and apparatus for obtaining information of network service, belong to network technique field.Method includes: the network information of the network of broadcast radio verifying within a preset range, and the smart machine in preset range is enabled to connect wireless authentication network;Receive the first encryption information that smart machine is sent by wireless authentication network;The second local encryption information is encrypted using the first encryption information, obtains key information;Information of network service is encrypted using the second encryption information, obtains network service encryption information;To smart machine " return " key" information and network service encryption information, so that smart machine obtains information of network service according to the first encryption information, key information and network service encryption information.The present invention is by obtaining information of network service according to the first encryption information, key information and network service encryption information.It is interacted since encryption information can be carried out with wireless access point, to obtain information of network service.Therefore, internet security is higher.
Description
Technical field
This disclosure relates to network technique field, the in particular to acquisition methods and equipment of a kind of information of network service.
Background technique
With the development of science and technology, more and more smart machines connect wireless network by wireless access point.Smart machine
When connecting wireless network, need to obtain the SSID (Service Set Identifier, service set), close of wireless network
The information of network service such as code.The acquisition methods of information of network service are usually to be believed by wireless access point broadcasts network service at present
Breath, smart machine receive the information of network service of broadcast, so that smart machine can be connected according to the information of network service received
Wireless network.For example, the router of user's family can broadcast wireless networks SSID and password, the mobile phone of user can receive broadcast
SSID and password, and the corresponding wireless network of SSID is connected according to password.
Since wireless access point can broadcast the information of network service of wireless network, so that wireless network signal
All smart machines can receive information of network service in coverage area, and connect wireless network according to information of network service
Network causes a possibility that network is by attack bigger, so that the safety of network reduces.
Summary of the invention
To overcome the problems in correlation technique, it present disclose provides a kind of acquisition methods of information of network service and sets
It is standby.
According to the first aspect of the embodiments of the present disclosure, a kind of acquisition methods of information of network service, this method packet are provided
It includes:
The network information of the network of broadcast radio verifying within a preset range, enables smart machine in the preset range
Enough connect the wireless authentication network;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
The key information and the network service encryption information are returned to the smart machine, so that the smart machine
According to first encryption information, the key information and the network service encryption information, the information of network service is obtained.
With reference to first aspect, in the first possible implementation of the first aspect, described to receive the smart machine
Before the first encryption information sent by the wireless authentication network, further includes:
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the net
Network information;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, set to the intelligence
Standby return allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response.
With reference to first aspect, in the second possible implementation of the first aspect, described to be returned to the smart machine
It returns before the key information and the network service encryption information, further includes:
The facility information that the smart machine is sent is received, the facility information includes at least hardware address and product serial
Number;
According to the facility information, judge whether the smart machine is legitimate device;
When the smart machine is legitimate device, executes to the smart machine and return to the key information and the net
The step of network service encryption information.
According to the second aspect of an embodiment of the present disclosure, a kind of acquisition methods of information of network service, this method packet are provided
It includes:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected
The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing
For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt
It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes
Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter
Breath.
In conjunction with second aspect, in the first possible implementation of the second aspect, the basis is received wireless
The network information of network is verified, wireless authentication network is connected, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connection are sent to the wireless access point
Request carries the network information, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returns
Allow connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
According to the third aspect of an embodiment of the present disclosure, a kind of access point apparatus is provided, which includes:
Broadcast module, for the network information of the verifying network of broadcast radio within a preset range, so that the preset range
Interior smart machine can connect the wireless authentication network;
First receiving module, the first encryption letter sent for receiving the smart machine by the wireless authentication network
Breath;
First encrypting module is obtained for being encrypted using first encryption information to the second local encryption information
To key information;
Second encrypting module obtains network for encrypting using second encryption information to information of network service
Service encryption information;
First return module, for returning to the key information and network service encryption letter to the smart machine
Breath, so that the smart machine is obtained according to first encryption information, the key information and the network service encryption information
Take the information of network service.
In conjunction with the third aspect, in the first possible implementation of the third aspect, described access point equipment further include:
Second receiving module, the verifying network connecting request sent for receiving the smart machine, the verifying network
Connection request carries the network information;
Module is obtained, the signal strength indication of the wireless authentication network is detected for obtaining the smart machine;
Second return module, for being connected to the network according to the verifying when the signal strength indication is greater than preset threshold
Request, returning to the smart machine allows connection response, so that the smart machine is according to the permission connection response, connection
The wireless authentication network.
In conjunction with the third aspect, in the second possible implementation of the third aspect, described access point equipment further include:
Third receiving module, the facility information sent for receiving the smart machine, the facility information include at least
Hardware address and product ID;
Judgment module, for judging whether the smart machine is legitimate device according to the facility information;
Execution module, it is described close to smart machine return for executing when the smart machine is legitimate device
The step of key information and the network service encryption information.
According to a fourth aspect of embodiments of the present disclosure, a kind of smart machine is provided, which includes:
Link block connects wireless authentication network for the network information according to the wireless authentication network received, described
The network information of wireless authentication network is broadcasted within a preset range by wireless access point;
Sending module, for sending the first encryption letter to the wireless access point by the wireless authentication network in connection
Breath, so that the wireless access point is according to first encryption information, " return " key" information and network service encryption information, it is described
Key information is to obtain after being encrypted using first encryption information to the second encryption information of the wireless access point local
It arrives, the network service encryption information is to be added using information of network service of second encryption information to the wireless access point
It is obtained after close;
Receiving module, for receiving the key information and network service encryption letter that the wireless access point returns
Breath;
First deciphering module obtains described for the key information to be decrypted according to first encryption information
Second encryption information;
Second deciphering module, for the network service encryption information to be decrypted according to second encryption information,
Obtain the information of network service.
In conjunction with fourth aspect, in the first possible implementation of the fourth aspect, the link block, for detecting
The signal strength indication of the wireless authentication network;Verifying network connecting request is sent to the wireless access point and the signal is strong
Angle value, the verifying network connecting request carries the network information, so that the wireless access point determines the signal strength
When value is greater than preset threshold, returning allows connection response;When receiving the permission connection response of the wireless access point, connection
The wireless authentication network.
According to a fifth aspect of the embodiments of the present disclosure, a kind of access point apparatus is provided, which includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The network information of the network of broadcast radio verifying within a preset range, enables smart machine in the preset range
Enough connect the wireless authentication network;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
The key information and the network service encryption information are returned to the smart machine, so that the smart machine
According to first encryption information, the key information and the network service encryption information, the information of network service is obtained.
According to a sixth aspect of an embodiment of the present disclosure, a kind of smart machine is provided, which includes:
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected
The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing
For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt
It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes
Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter
Breath.
The technical solution that the embodiment of the present disclosure provides has the benefit that
The first encryption information sent by receiving smart machine by wireless authentication network returns to basis to smart machine
The key information and network service encryption information that first encryption information obtains, so that smart machine is according to the first encryption information, close
Key information and network service encryption information obtain information of network service.Due to smart machine can first pass through wireless authentication network to
Wireless access point send encryption information, wireless access point can according to smart machine send encryption information to information of network service into
Row encryption, and network service encryption information is returned, so that network service encryption information can be decrypted in smart machine, to obtain
Information of network service.Therefore, the safety of network is higher.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.
Fig. 1 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 3 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment.
Fig. 4 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 5 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 6 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment.
Fig. 7 is a kind of structural schematic diagram of smart machine shown according to an exemplary embodiment.
Fig. 8 is a kind of block diagram of wireless access point shown according to an exemplary embodiment.
Fig. 9 is a kind of block diagram of terminal shown according to an exemplary embodiment.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended
The example of device and method being described in detail in claims, some aspects of the invention are consistent.
Fig. 1 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, the net
The acquisition methods of network information on services are applied to wireless access point.Wherein, wireless access point can integrally set for route switching access
Standby and pure access point apparatus, such as wireless router, the present embodiment and subsequent embodiment do not have the type work of wireless access point
Body limits.As shown in Figure 1, the acquisition methods of the information of network service include the following steps.
In a step 101, the network information of the network of broadcast radio verifying within a preset range, so that the intelligence in preset range
Energy equipment can connect wireless authentication network.
In a step 102, the first encryption information that smart machine is sent by wireless authentication network is received.
In step 103, the second local encryption information is encrypted using the first encryption information, obtains key letter
Breath.
At step 104, information of network service is encrypted using the second encryption information, obtains network service encryption letter
Breath.
In step 105, to smart machine " return " key" information and network service encryption information so that smart machine according to
First encryption information, key information and network service encryption information obtain information of network service.
As a kind of alternative embodiment, receive the first encryption information that smart machine is sent by wireless authentication network it
Before, further includes:
The verifying network connecting request that smart machine is sent is received, verifying network connecting request carries the network information;
Obtain the signal strength indication that smart machine detects wireless authentication network;
When signal strength indication is greater than preset threshold, according to verifying network connecting request, allow to connect to smart machine return
Response is connect, so that smart machine connects wireless authentication network according to connection response is allowed.
It is also wrapped as a kind of alternative embodiment to before smart machine " return " key" information and network service encryption information
It includes:
The facility information that smart machine is sent is received, facility information includes at least hardware address and product ID;
According to facility information, judge whether smart machine is legitimate device;
When smart machine is legitimate device, execute to smart machine " return " key" information and network service encryption information
Step.
The method that the embodiment of the present disclosure provides, the first encryption sent by receiving smart machine by wireless authentication network
Information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, so that intelligence
Equipment obtains information of network service according to the first encryption information, key information and network service encryption information.Due to smart machine
Wireless authentication network can be first passed through and send encryption information to wireless access point, what wireless access point can be sent according to smart machine adds
Confidential information encrypts information of network service, and returns to network service encryption information, so that smart machine can be to network service
Encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer
It repeats one by one.
Fig. 2 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, the net
The acquisition methods of network information on services are applied to smart machine.Wherein, smart machine can be mobile for smart phone, tablet computer etc.
Equipment, the present embodiment and subsequent embodiment do not make specific limit to the type of smart machine.As shown in Fig. 2, the network service is believed
The acquisition methods of breath include the following steps.
In step 201, according to the network information of the wireless authentication network received, wireless authentication network is connected, wirelessly
The network information of verifying network is broadcasted within a preset range by wireless access point.
In step 202, by the wireless authentication network in connection, the first encryption information is sent to wireless access point, is made
Wireless access point according to the first encryption information, " return " key" information and network service encryption information, key information is using the
One encryption information obtains after encrypting to the second encryption information of wireless access point local, and network service encryption information is to use
Second encryption information obtains after encrypting to the information of network service of wireless access point.
In step 203, the key information and network service encryption information that wireless access point returns are received.
In step 204, key information is decrypted according to the first encryption information, obtains the second encryption information.
In step 205, network service encryption information is decrypted according to the second encryption information, obtains network service letter
Breath.
Wireless authentication net is connected according to the network information of the wireless authentication network received as a kind of alternative embodiment
Network, comprising:
Detect the signal strength indication of wireless authentication network;
Verifying network connecting request and signal strength indication are sent to wireless access point, verifying network connecting request carries network
Information, when so that wireless access point determining that signal strength indication is greater than preset threshold, returning allows connection response;
When receiving the permission connection response of wireless access point, wireless authentication network is connected.
The method that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point,
The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information
Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network
Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network
Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from
And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with
It is high.
All the above alternatives can form alternative embodiment of the invention using any combination, herein no longer
It repeats one by one.
Fig. 3 is a kind of flow chart of the acquisition methods of information of network service shown according to an exemplary embodiment, such as Fig. 3
Shown, the acquisition methods of the information of network service are related in wireless access point and smart machine, include the following steps.
In step 301, the network information of wireless access point broadcast radio verifying within a preset range network.
Wherein, wireless access point can externally provide multiple wireless networks, and wireless authentication network is that wireless access point is external
The network provided.Wireless authentication network is for smart machine in connection WiFi (Wireless Fidelity, Wireless Fidelity)
The relevant information of smart machine is verified before, after being verified, smart machine can connect WiFi.
When the network information of the wireless access point network of broadcast radio verifying within a preset range, the network information of broadcast can be with
For the SSID of wireless authentication network, the present embodiment does not make specific limit to the content of the network information.In addition, preset range can root
It is set according to demand, the present embodiment is not especially limited this.For example, preset range can be to be with wireless access point in
The heart, radius are the circular scope of 1m.When the position of smart machine exceeds preset range, smart machine cannot receive nothing
The network information of line access point broadcast.After the relevant authentication for only passing through wireless authentication network due to smart machine, it can connect
WiFi is connected, it, naturally can not be wireless by connecting when smart machine cannot receive the network information of wireless authentication network
Network is verified to carry out relevant authentication, therefore, substantial portion of intelligence outside preset range can be limited through the above way and set
Standby connection WiFi, reduces a possibility that network is by attack, to improve the safety of network.
In step 302, smart machine connects wireless authentication net according to the network information of the wireless authentication network received
Network.
The present embodiment, according to the network information of the wireless authentication network received, connects wireless authentication net not to smart machine
The mode of network specifically limits, including but not limited to following process:
(1) signal strength indication of smart machine detection wireless authentication network.
(2) smart machine sends verifying network connecting request and signal strength indication, verifying network connection to wireless access point
Request carries the network information.
(3) wireless access point receives the verifying network connecting request that smart machine is sent.
(4) wireless access point obtains the signal strength indication that smart machine detects wireless authentication network.
(5) when signal strength indication is greater than preset threshold, wireless access point is set according to verifying network connecting request to intelligence
Standby return allows connection response.
(6) when receiving the permission connection response of wireless access point, smart machine connects wireless authentication network.
It wherein, can be according to receiving the corresponding function of wireless authentication network signal in smart machine in above-mentioned steps (1)
Rate, to determine the signal strength indication of wireless authentication network, the present embodiment is not especially limited this.In above-mentioned steps (2), intelligence
Can equipment to wireless access point send verifying network connecting request and when signal strength indication, can will verifying network connecting request and
Signal strength indication is sent to wireless access point simultaneously, can also first send to wireless access point and verify network connecting request, then to
Wireless access point strength of transmitted signals value, the present embodiment are not especially limited this.
In above-mentioned steps (5), preset threshold can be configured according to demand, and the present embodiment does not limit this specifically
It is fixed.For example, being made as example by percentage of signal strength indication, 100% is good for signal strength, and signal strength indication is strong by drop representation signal
Degree gradually weakens.If the signal strength indication of wireless authentication network is 90%, and preset threshold is 80%.Due to wireless authentication network
Signal strength indication be greater than preset threshold, thus wireless access point can to smart machine return allow connection response.
In step 303, smart machine sends the first encryption to wireless access point by the wireless authentication network in connection
Information.
Wherein, the first encryption information can be a string of characters that smart machine generates at random.Alternatively, the first encryption information is also
The first field can be generated by smart machine, be obtained after being encrypted to the first field, the present embodiment is not especially limited this.The
One field can be a string of characters that smart machine generates at random, and encryption can be asymmetric to add by the way of asymmetric encryption
The close key used can be not especially limited this for the pre-set public key of server side, the present embodiment.For example, can be used
RSA Algorithm encrypts the first field.
In step 304, wireless access point receives the first encryption information that smart machine is sent by wireless authentication network.
In step 305, wireless access point encrypts the second local encryption information using the first encryption information, obtains
To key information.
Wherein, the second encryption information can be a string of characters that smart machine generates at random.Alternatively, the second encryption information is also
The second field can be generated by wireless access point, be obtained after being encrypted to the second field, the present embodiment is not especially limited this.
Second field can be a string of characters that wireless access point generates at random, and encryption can be non-right by the way of asymmetric encryption
Encrypting the key used can be referred to as the pre-set public key of server side, and the present embodiment is not especially limited this.It needs
It is bright, to second in smart machine is used when encrypting to the first field in above-mentioned steps 303 key and this step
Key used by field is encrypted may be the same or different, and the present embodiment is not especially limited this.
In addition, symmetric cryptography can be used when encrypting using the first encryption information to the second local encryption information
Mode, the present embodiment is not especially limited this.For example, can according to AES (Advanced Encryption Standard,
Advanced Encryption Standard) algorithm, the second local encryption information is encrypted using the first encryption information.
In order to further guarantee the safety of ciphering process, wireless access point can incite somebody to action after obtaining the second encryption information
First encryption information and the second encryption information are sent to server, by server using the first encryption information to the second encryption information
It is encrypted, key information is obtained, and to wireless access point " return " key" information, so that server can receive what server returned
Key information, the present embodiment are not especially limited this.
Within step 306, wireless access point encrypts information of network service using the second encryption information, obtains network
Service encryption information.
Wherein, information of network service may include the SSID and password of WiFi to be connected, and the present embodiment is not to network service
The content of information makees specific limit.Wireless access point, can when being encrypted using the second encryption information to information of network service
By the way of symmetric cryptography, the present embodiment is not especially limited this.
In step 307, wireless access point is to smart machine " return " key" information and network service encryption information.
Due to there are malicious user by illegality equipment connect WIFI a possibility that, wireless access point is set to intelligence
Before standby " return " key" information and network service encryption information, the facility information of smart machine transmission can also be received, according to setting
Standby information, judges whether smart machine is legitimate device, when smart machine is legitimate device, executes close to smart machine return
The step of key information and network service encryption information, the present embodiment is not especially limited this.Wherein, facility information includes at least
Hardware address and product ID, the present embodiment do not make specific limit to the content of facility information.
The whether legal process of above-mentioned verifying smart machine can also be executed by server, i.e., wireless access point is receiving
After the facility information that smart machine is sent, facility information can be sent to server, by server according to facility information, judge intelligence
Whether energy equipment is legitimate device.In addition, since wireless access point has a possibility that being forged, wireless access point exists
When sending the facility information of smart machine to server, the facility information of itself can also be sent to server together, by taking
Business device is verified, and the present embodiment is not especially limited this.For example, by taking a specific routing device product as an example, due to
Routing device product may be by mountain vallage, and so as to cause network is connected by the routing device, there are certain risks.Therefore, road
From equipment can be sent to server itself facility information and smart machine facility information, to transfer to server to be verified.
Due to being encrypted using the first encryption information to the second encryption information, obtaining key information in above-mentioned 305
Process can be executed by server, and therefore, in conjunction with the content in this step, server can connect in verifying smart machine and wirelessly
After the facility information of access point is legal, then returns to wireless access point and the second encryption information is added using the first encryption information
The key information obtained after close, the present embodiment are not especially limited this.By the above process, due to being closed in verifying equipment
Under the premise of method, key information is returned again to execute the process of subsequent connection WiFi, to improve the safety of network.
For example, smart machine can send (T1) pk, repeater_data to wireless access point.Wherein, T1 is that intelligence is set
Standby the first field generated, pk are the key that server provides, and (T1) pk is that first obtained after being encrypted according to key adds
Confidential information, repeater_data are the facility information of smart machine.Wireless access point is receiving (T1) pk and repeater_
After data, T2 is produced, and send (T1) pk, repeater_data, (T2) pk and router_data to server.Wherein,
T2 is the second field that wireless access point generates, and pk is the key that server provides, and (T2) pk is after being encrypted according to key
The second obtained encryption information, router_data are the facility information of wireless access point.
Server receives (T1) pk, repeater_data, (T2) pk and router_data, can first verify
Whether repeater_data and router_data is legal, after verifying repeater_data and router_data is legal,
(T1) pk and (T2) pk are decrypted, obtain T1 and T2, then T2 is encrypted using T1, obtains (T2) T1, and to wireless
Access point returns to (T2) T1.Wireless access point encrypts information of network service after receiving (T2) T1, using T2, obtains
Network service encryption information finally returns to (T2) T1 and network service encryption information to smart machine.
In step 308, smart machine receives the key information and network service encryption information that wireless access point returns.
In a step 309, smart machine is decrypted key information according to the first encryption information, obtains the second encryption letter
Breath.
Since key information is obtained after being encrypted using the first encryption information to the second encryption information, and Encryption Algorithm
For symmetric encipherment algorithm, therefore, smart machine can be decrypted key information according to the first encryption information generated before, with
Obtain the second encryption information.
In the step 310, smart machine is decrypted network service encryption information according to the second encryption information, obtains net
Network information on services.
Due to network service encryption information be using the second encryption information information of network service is encrypted after obtain, and
Encryption Algorithm is symmetric encipherment algorithm, and therefore, smart machine can be according to the second encryption information that above-mentioned steps 309 obtain to network
Service encryption information is decrypted, to obtain information of network service.According to information of network service, corresponding WiFi can connect.
The method that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point,
The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information
Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network
Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network
Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from
And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with
It is high.
In addition, due to that can be compared by the signal strength indication for detecting smart machine with preset threshold, with limitation
Whether signal strength indication smart machine not up to standard connects wireless authentication network, and can legal by verifying facility information, with
It limits illegality equipment and connects wireless authentication network, to create a further reduction a possibility that network is by attack, and improve
The safety of network.
Fig. 4 is a kind of structural schematic diagram of access point apparatus shown according to an exemplary embodiment, the access point apparatus
For executing the acquisition methods of information of network service provided by any embodiment in embodiment corresponding to above-mentioned Fig. 1 or Fig. 3
Function performed by middle wireless access point.Referring to Fig. 4, the access point apparatus include broadcast module 401, the first receiving module 402,
First encrypting module 403, the second encrypting module 404 and the first return module 405.
The broadcast module 401 is configured as the network information of the network of broadcast radio verifying within a preset range, so that default
Smart machine in range can connect wireless authentication network;
First receiving module 402 is configured as receiving the first encryption letter that smart machine is sent by wireless authentication network
Breath;
First encrypting module 403 is configured as adding the second local encryption information using the first encryption information
It is close, obtain key information;
Second encrypting module 404 is configured as encrypting information of network service using the second encryption information, obtains
Network service encryption information;
First return module 405 is configured as making to smart machine " return " key" information and network service encryption information
Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.
In one embodiment, referring to Fig. 5, which further includes the second receiving module 406, obtains module 407
And second return module 408.
Second receiving module 406 is configured as receiving the verifying network connecting request that smart machine is sent, and verifies network
Connection request carries the network information;
The acquisition module 407 is configured as obtaining the signal strength indication that smart machine detects wireless authentication network;
Second return module 408 is configured as being connected to the network when signal strength indication is greater than preset threshold according to verifying
Request, returning to smart machine allows connection response, so that smart machine connects wireless authentication net according to connection response is allowed
Network.
In one embodiment, referring to Fig. 6, which further includes third receiving module 409, judgment module 410
And execution module 411.
The third receiving module 409 is configured as receiving the facility information that smart machine is sent, and facility information includes at least
Hardware address and product ID;
The judgment module 410 is configured as judging whether smart machine is legitimate device according to facility information;
The execution module 411 is configured as executing and believing to smart machine " return " key" when smart machine is legitimate device
The step of breath and network service encryption information.
The access point apparatus that the embodiment of the present disclosure provides, the sent by receiving smart machine by wireless authentication network
One encryption information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, makes
Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.Due to intelligence
Energy equipment can first pass through wireless authentication network and send encryption information to wireless access point, and wireless access point can be sent out according to smart machine
The encryption information sent encrypts information of network service, and returns to network service encryption information, so that smart machine can be to net
Network service encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
Fig. 7 is a kind of structural schematic diagram of smart machine shown according to an exemplary embodiment, which is used for
Execute in embodiment corresponding to above-mentioned Fig. 2 or Fig. 3 intelligence in the acquisition methods of information of network service provided by any embodiment
Function performed by energy equipment.Referring to Fig. 7, the smart machine include link block 701, sending module 702, receiving module 703,
First deciphering module 704 and the second deciphering module 705.
Link block 701 is configured as the network information according to the wireless authentication network received, connects wireless authentication net
The network information of network, wireless authentication network is broadcasted within a preset range by wireless access point;
Sending module 702 is configured as through the wireless authentication network in connection, sends the first encryption to wireless access point
Information, so that wireless access point is according to the first encryption information, " return " key" information and network service encryption information, key information
It is obtained after being encrypted using the second encryption information of first encryption information to wireless access point local, network service encryption information
It is obtained after being encrypted for the second encryption information of use to the information of network service of wireless access point;
Receiving module 703 is configured as receiving the key information and network service encryption information that wireless access point returns;
First deciphering module 704 is configured as that key information is decrypted according to the first encryption information, obtains second and adds
Confidential information;
Second deciphering module 705 is configured as that network service encryption information is decrypted according to the second encryption information, obtains
To information of network service.
In one embodiment, link block 701 are configured as the signal strength indication of detection wireless authentication network;Xiang Wu
Line access point sends verifying network connecting request and signal strength indication, and verifying network connecting request carries the network information, so that nothing
When line access point determines that signal strength indication is greater than preset threshold, returning allows connection response;When receive wireless access point permit
Perhaps when connection response, wireless authentication network is connected.
The smart machine that the embodiment of the present disclosure provides, the wireless authentication net provided within a preset range by wireless access point
Network sends the first encryption information to wireless access point, receives the key information that wireless access point is returned according to the first encryption information
And network service encryption information, network service encryption information is decrypted according to the first encryption information and key information, is obtained
Information of network service.Encryption information is sent to wireless access point since smart machine can first pass through wireless authentication network, is wirelessly connect
Access point can encrypt information of network service according to the encryption information that smart machine is sent, and return to network service encryption letter
Breath, so that network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the peace of network
Full property is higher.
About the equipment in above-described embodiment, wherein modules execute the concrete mode of operation in related this method
Embodiment in be described in detail, no detailed explanation will be given here.
Fig. 8 is a kind of block diagram for wireless access point 800 shown according to an exemplary embodiment.For example, this is wireless
Access point 800 may be provided as a server or routing device.Referring to Fig. 8, wireless access point 800 includes processing component
822, it further comprise one or more processors, and the memory resource as representated by memory 832, it can for storing
By the instruction of the execution of processing component 822, such as application program.The application program stored in memory 832 may include one
Or it is more than one each correspond to one group of instruction module.In addition, processing component 822 is configured as executing instruction, to hold
It is wireless in the acquisition methods of information of network service provided by any embodiment in embodiment corresponding to the above-mentioned Fig. 1 or Fig. 3 of row
Function performed by access point.
Wireless access point 800 can also include that a power supply module 826 is configured as executing the power supply of wireless access point 800
Management, a wired or wireless network interface 850 is configured as wireless access point 800 being connected to network and an input is defeated
(I/O) interface 858 out.Wireless access point 800 can be operated based on the operating system for being stored in memory 832, such as Windows
ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM or similar.
The wireless access point that the embodiment of the present disclosure provides, the sent by receiving smart machine by wireless authentication network
One encryption information returns to the key information obtained according to the first encryption information and network service encryption information to smart machine, makes
Smart machine is obtained according to the first encryption information, key information and network service encryption information, obtains information of network service.Due to intelligence
Energy equipment can first pass through wireless authentication network and send encryption information to wireless access point, and wireless access point can be sent out according to smart machine
The encryption information sent encrypts information of network service, and returns to network service encryption information, so that smart machine can be to net
Network service encryption information is decrypted, to obtain information of network service.Therefore, the safety of network is higher.
Fig. 9 is a kind of block diagram of terminal 900 shown according to an exemplary embodiment.For example, terminal 900 can be movement
Phone, computer, digital broadcasting terminal, messaging device, game console, tablet device, Medical Devices, body-building equipment,
Personal digital assistant etc..
Referring to Fig. 9, terminal 900 may include following one or more components: processing component 902, memory 904, power supply
Component 906, multimedia component 909, audio component 910, the interface 912 of input/output (I/O), sensor module 914, and
Communication component 916.
The integrated operation of the usual controlling terminal 900 of processing component 902, such as with display, telephone call, data communication, phase
Machine operation and record operate associated operation.Processing element 902 may include that one or more processors 920 refer to execute
It enables, to perform all or part of the steps of the methods described above.In addition, processing component 902 may include one or more modules, just
Interaction between processing component 902 and other assemblies.For example, processing component 902 may include multi-media module, it is more to facilitate
Interaction between media component 909 and processing component 902.
Memory 904 is configured as storing various types of data to support the operation in terminal 900.These data are shown
Example includes the instruction of any application or method for operating in terminal 900, contact data, and telephone book data disappears
Breath, picture, video etc..Memory 904 can be by any kind of volatibility or non-volatile memory device or their group
It closes and realizes, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM) is erasable to compile
Journey read-only memory (EPROM), programmable read only memory (PROM), read-only memory (ROM), magnetic memory, flash
Device, disk or CD.
Electric power assembly 906 provides electric power for the various assemblies of terminal 900.Electric power assembly 906 may include power management system
System, one or more power supplys and other with for terminal 900 generate, manage, and distribute the associated component of electric power.
Multimedia component 909 includes the screen of one output interface of offer between the terminal 900 and user.One
In a little embodiments, screen may include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen
Curtain may be implemented as touch screen, to receive input signal from the user.Touch panel includes one or more touch sensings
Device is to sense the gesture on touch, slide, and touch panel.The touch sensor can not only sense touch or sliding action
Boundary, but also detect duration and pressure associated with the touch or slide operation.In some embodiments, more matchmakers
Body component 909 includes a front camera and/or rear camera.When terminal 900 is in operation mode, such as screening-mode or
When video mode, front camera and/or rear camera can receive external multi-medium data.Each front camera and
Rear camera can be a fixed optical lens system or have focusing and optical zoom capabilities.
Audio component 910 is configured as output and/or input audio signal.For example, audio component 910 includes a Mike
Wind (MIC), when terminal 900 is in operation mode, when such as call mode, recording mode, and voice recognition mode, microphone is matched
It is set to reception external audio signal.The received audio signal can be further stored in memory 904 or via communication set
Part 916 is sent.In some embodiments, audio component 910 further includes a loudspeaker, is used for output audio signal.
I/O interface 912 provides interface between processing component 902 and peripheral interface module, and above-mentioned peripheral interface module can
To be keyboard, click wheel, button etc..These buttons may include, but are not limited to: home button, volume button, start button and lock
Determine button.
Sensor module 914 includes one or more sensors, and the state for providing various aspects for terminal 900 is commented
Estimate.For example, sensor module 914 can detecte the state that opens/closes of terminal 900, and the relative positioning of component, for example, it is described
Component is the display and keypad of terminal 900, and sensor module 914 can also detect 900 1 components of terminal 900 or terminal
Position change, the existence or non-existence that user contacts with terminal 900,900 orientation of terminal or acceleration/deceleration and terminal 900
Temperature change.Sensor module 914 may include proximity sensor, be configured to detect without any physical contact
Presence of nearby objects.Sensor module 914 can also include optical sensor, such as CMOS or ccd image sensor, at
As being used in application.In some embodiments, which can also include acceleration transducer, gyro sensors
Device, Magnetic Sensor, pressure sensor or temperature sensor.
Communication component 916 is configured to facilitate the communication of wired or wireless way between terminal 900 and other equipment.Terminal
900 can access the wireless network based on communication standard, such as WiFi, 2G or 3G or their combination.In an exemplary implementation
In example, communication component 916 receives broadcast singal or broadcast related information from external broadcasting management system via broadcast channel.
In one exemplary embodiment, the communication component 916 further includes near-field communication (NFC) module, to promote short range communication.Example
Such as, NFC module can be based on radio frequency identification (RFID) technology, Infrared Data Association (IrDA) technology, ultra wide band (UWB) technology,
Bluetooth (BT) technology and other technologies are realized.
In the exemplary embodiment, terminal 900 can be believed by one or more application specific integrated circuit (ASIC), number
Number processor (DSP), digital signal processing appts (DSPD), programmable logic device (PLD), field programmable gate array
(FPGA), controller, microcontroller, microprocessor or other electronic components are realized, for executing corresponding to above-mentioned Fig. 2 or Fig. 3
Embodiment in information of network service provided by any embodiment acquisition methods in function performed by smart machine.
The terminal that the embodiment of the present disclosure provides, the wireless authentication network provided within a preset range by wireless access point,
The first encryption information is sent to wireless access point, receives key information and net that wireless access point is returned according to the first encryption information
Network service encryption information is decrypted network service encryption information according to the first encryption information and key information, obtains network
Information on services.Encryption information, wireless access point are sent to wireless access point since smart machine can first pass through wireless authentication network
Information of network service can be encrypted according to the encryption information that smart machine is sent, and return to network service encryption information, from
And network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore, the safety of network compared with
It is high.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
It such as include the memory 904 of instruction, above-metioned instruction can be executed by the processor 920 of terminal 900 to complete the above method.For example,
The non-transitorycomputer readable storage medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk
With optical data storage devices etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in the storage medium is held by the processor of terminal
When row, the acquisition methods for executing a kind of information of network service are enabled the terminal to, this method comprises:
According to the network information of the wireless authentication network received, wireless authentication network, the wireless authentication network are connected
The network information broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that the nothing
For line access point according to first encryption information, " return " key" information and network service encryption information, the key information is to adopt
It is obtained after being encrypted with the second encryption information of first encryption information to the wireless access point local, the network clothes
Business encryption information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the network service letter
Breath.
The computer readable storage medium that the embodiment of the present disclosure provides, is provided within a preset range by wireless access point
Wireless authentication network sends the first encryption information to wireless access point, receives wireless access point and is returned according to the first encryption information
Key information and network service encryption information, network service encryption information is carried out according to the first encryption information and key information
Decryption, obtains information of network service.Encryption letter is sent to wireless access point since smart machine can first pass through wireless authentication network
Breath, wireless access point can encrypt information of network service according to the encryption information that smart machine is sent, and return to network clothes
Business encryption information, so that network service encryption information can be decrypted in smart machine, to obtain information of network service.Therefore,
The safety of network is higher.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to of the invention its
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the invention, these modifications, purposes or
Person's adaptive change follows general principle of the invention and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and true scope and spirit of the invention are by following
Claim is pointed out.
It should be understood that the present invention is not limited to the precise structure already described above and shown in the accompanying drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present invention is limited only by the attached claims.
Claims (8)
1. a kind of acquisition methods of information of network service, which is characterized in that be applied to wireless access point, which comprises
The network information of the network of broadcast radio verifying within a preset range, enables the smart machine in the preset range to connect
Connect the wireless authentication network;
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the network letter
Breath;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, returned to the smart machine
Returning allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
Return to the key information and the network service encryption information to the smart machine so that the smart machine according to
First encryption information, the key information and the network service encryption information, obtain the information of network service.
2. the method according to claim 1, wherein it is described to the smart machine return the key information and
Before the network service encryption information, further includes:
The facility information that the smart machine is sent is received, the facility information includes at least hardware address and product ID;
According to the facility information, judge whether the smart machine is legitimate device;
When the smart machine is legitimate device, executes to the smart machine and return to the key information and network clothes
The step of encryption information of being engaged in.
3. a kind of acquisition methods of information of network service, which is characterized in that be applied to smart machine, which comprises
According to the network information of the wireless authentication network received, wireless authentication network, the net of the wireless authentication network are connected
Network information is broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that described wirelessly connect
Access point is according to first encryption information, " return " key" information and network service encryption information, and the key information is using institute
It states after the first encryption information encrypts the second encryption information of the wireless access point local and obtains, the network service adds
Confidential information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the information of network service;
Wherein, the network information for the wireless authentication network that the basis receives connects wireless authentication network, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connecting request are sent to the wireless access point
The network information is carried, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returning allows
Connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
4. a kind of access point apparatus, which is characterized in that described access point equipment includes:
Broadcast module, for the network information of the verifying network of broadcast radio within a preset range, so that in the preset range
Smart machine can connect the wireless authentication network;
Second receiving module, the verifying network connecting request sent for receiving the smart machine, the verifying network connection
Request carries the network information;
Module is obtained, the signal strength indication of the wireless authentication network is detected for obtaining the smart machine;
Second return module, for when the signal strength indication is greater than preset threshold, according to the verifying network connecting request,
Returning to the smart machine allows connection response, so that the smart machine is according to the permission connection response, described in connection
Wireless authentication network;
First receiving module, the first encryption information sent for receiving the smart machine by the wireless authentication network;
First encrypting module is obtained close for being encrypted using first encryption information to the second local encryption information
Key information;
Second encrypting module obtains network service for encrypting using second encryption information to information of network service
Encryption information;
First return module makes for returning to the key information and the network service encryption information to the smart machine
The smart machine is obtained according to first encryption information, the key information and the network service encryption information, obtains institute
State information of network service.
5. access point apparatus according to claim 4, which is characterized in that described access point equipment further include:
Third receiving module, the facility information sent for receiving the smart machine, the facility information include at least hardware
Address and product ID;
Judgment module, for judging whether the smart machine is legitimate device according to the facility information;
Execution module returns to the key letter for when the smart machine is legitimate device, executing to the smart machine
The step of breath and the network service encryption information.
6. a kind of smart machine, which is characterized in that the smart machine includes:
Link block connects wireless authentication network for the network information according to the wireless authentication network received, described wireless
The network information of verifying network is broadcasted within a preset range by wireless access point;
Sending module, for sending the first encryption information to the wireless access point, making by the wireless authentication network in connection
The wireless access point is obtained according to first encryption information, " return " key" information and network service encryption information, the key
Information is to obtain after being encrypted using first encryption information to the second encryption information of the wireless access point local, institute
Stating network service encryption information is after being encrypted using information of network service of second encryption information to the wireless access point
It obtains;
Receiving module, for receiving the key information and the network service encryption information that the wireless access point returns;
First deciphering module obtains described second for the key information to be decrypted according to first encryption information
Encryption information;
Second deciphering module is obtained for the network service encryption information to be decrypted according to second encryption information
The information of network service;
Wherein, the link block, for detecting the signal strength indication of the wireless authentication network;It is sent out to the wireless access point
Verifying network connecting request and the signal strength indication are sent, the verifying network connecting request carries the network information, so that
When the wireless access point determines that the signal strength indication is greater than preset threshold, returning allows connection response;It is described when receiving
When the permission connection response of wireless access point, the wireless authentication network is connected.
7. a kind of access point apparatus characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
The network information of the network of broadcast radio verifying within a preset range, enables the smart machine in the preset range to connect
Connect the wireless authentication network;
The verifying network connecting request that the smart machine is sent is received, the verifying network connecting request carries the network letter
Breath;
Obtain the signal strength indication that the smart machine detects the wireless authentication network;
When the signal strength indication is greater than preset threshold, according to the verifying network connecting request, returned to the smart machine
Returning allows connection response, so that the smart machine connects the wireless authentication network according to the permission connection response;
Receive the first encryption information that the smart machine is sent by the wireless authentication network;
The second local encryption information is encrypted using first encryption information, obtains key information;
Information of network service is encrypted using second encryption information, obtains network service encryption information;
Return to the key information and the network service encryption information to the smart machine so that the smart machine according to
First encryption information, the key information and the network service encryption information, obtain the information of network service.
8. a kind of smart machine characterized by comprising
Processor;
Memory for storage processor executable instruction;
Wherein, the processor is configured to:
According to the network information of the wireless authentication network received, wireless authentication network, the net of the wireless authentication network are connected
Network information is broadcasted within a preset range by wireless access point;
By the wireless authentication network in connection, the first encryption information is sent to the wireless access point, so that described wirelessly connect
Access point is according to first encryption information, " return " key" information and network service encryption information, and the key information is using institute
It states after the first encryption information encrypts the second encryption information of the wireless access point local and obtains, the network service adds
Confidential information is to obtain after being encrypted using information of network service of second encryption information to the wireless access point;
Receive the key information and the network service encryption information that the wireless access point returns;
The key information is decrypted according to first encryption information, obtains second encryption information;
The network service encryption information is decrypted according to second encryption information, obtains the information of network service;
Wherein, the network information for the wireless authentication network that the basis receives connects wireless authentication network, comprising:
Detect the signal strength indication of the wireless authentication network;
Verifying network connecting request and the signal strength indication, the verifying network connecting request are sent to the wireless access point
The network information is carried, when so that the wireless access point determining that the signal strength indication is greater than preset threshold, returning allows
Connection response;
When receiving the permission connection response of the wireless access point, the wireless authentication network is connected.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510243278.6A CN104980919B (en) | 2015-05-13 | 2015-05-13 | The acquisition methods and equipment of information of network service |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510243278.6A CN104980919B (en) | 2015-05-13 | 2015-05-13 | The acquisition methods and equipment of information of network service |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104980919A CN104980919A (en) | 2015-10-14 |
CN104980919B true CN104980919B (en) | 2019-02-12 |
Family
ID=54276893
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510243278.6A Active CN104980919B (en) | 2015-05-13 | 2015-05-13 | The acquisition methods and equipment of information of network service |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104980919B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105282158A (en) * | 2015-10-28 | 2016-01-27 | 小米科技有限责任公司 | Intelligent equipment networking method, routing equipment, intelligent equipment and system |
CN107094294B (en) * | 2016-02-18 | 2020-06-02 | 腾讯科技(深圳)有限公司 | Network connection method and device |
CN107864476A (en) * | 2017-11-08 | 2018-03-30 | 上海创功通讯技术有限公司 | The access authentication method and terminal of a kind of wireless network |
CN108966233B (en) * | 2018-09-20 | 2021-11-09 | 四川警盛科技有限公司 | Network access control method and device |
CN112601218B (en) * | 2020-12-31 | 2022-12-02 | 青岛海尔科技有限公司 | Wireless network configuration method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006080623A1 (en) * | 2004-09-22 | 2006-08-03 | Samsung Electronics Co., Ltd. | Method and apparatus for managing communication security in wireless network |
CN103929748A (en) * | 2014-04-30 | 2014-07-16 | 普联技术有限公司 | Internet of things wireless terminal, configuration method thereof and wireless network access point |
CN104010352A (en) * | 2014-05-19 | 2014-08-27 | 百度在线网络技术(北京)有限公司 | Method and device for connecting router with intelligent device |
CN104244245A (en) * | 2014-09-12 | 2014-12-24 | 普联技术有限公司 | Wireless access authentication method, wireless router device and wireless terminal |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101677269B (en) * | 2008-09-17 | 2012-01-25 | 比亚迪股份有限公司 | Method and system for transmitting keys |
-
2015
- 2015-05-13 CN CN201510243278.6A patent/CN104980919B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2006080623A1 (en) * | 2004-09-22 | 2006-08-03 | Samsung Electronics Co., Ltd. | Method and apparatus for managing communication security in wireless network |
CN104427501A (en) * | 2013-09-11 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Network access method, device and system |
CN103929748A (en) * | 2014-04-30 | 2014-07-16 | 普联技术有限公司 | Internet of things wireless terminal, configuration method thereof and wireless network access point |
CN104010352A (en) * | 2014-05-19 | 2014-08-27 | 百度在线网络技术(北京)有限公司 | Method and device for connecting router with intelligent device |
CN104244245A (en) * | 2014-09-12 | 2014-12-24 | 普联技术有限公司 | Wireless access authentication method, wireless router device and wireless terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104980919A (en) | 2015-10-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104852911B (en) | Safe verification method, apparatus and system | |
CN110611905A (en) | Information sharing method, terminal device, storage medium, and computer program product | |
CN104869612B (en) | Access the method and device of network | |
KR101502249B1 (en) | Device communication | |
CN105357262B (en) | Apparatus control method and device | |
CN105744595B (en) | Access method, apparatus, system and the storage medium of WLAN | |
CN104955031A (en) | Information transmission method and device | |
US9571475B2 (en) | Call encryption systems and methods | |
CN105282158A (en) | Intelligent equipment networking method, routing equipment, intelligent equipment and system | |
CN104980919B (en) | The acquisition methods and equipment of information of network service | |
CN106060098B (en) | Processing method, processing unit and the processing system of identifying code | |
KR102507113B1 (en) | Method, Appratus and System of Monitoring Supporting for Encrypted Communication Session | |
CN109039860A (en) | Send and show method and device, the identity authentication method and device of message | |
CN104852800B (en) | Data transmission method and device | |
CN109246110A (en) | data sharing method and device | |
CN112182624A (en) | Encryption method, encryption device, storage medium and electronic equipment | |
CN104331672A (en) | Method and device for performing confidential treatment on pictures upon bracelet | |
CN106534083B (en) | Brush machine Tool validation method and device | |
CN105376399B (en) | For controlling the method and device of smart machine | |
CN107302519B (en) | Identity authentication method and device for terminal equipment, terminal equipment and server | |
CN105812339A (en) | Encryption and decryption method and device | |
CN109104361A (en) | Instant communicating method, device, electronic equipment and storage medium | |
EP4510772A1 (en) | Information processing methods, apparatus, communication device and storage medium | |
CN117597958A (en) | Authentication and authorization method, device, communication equipment and storage medium | |
CN117597959A (en) | Authentication and authorization method, device, communication equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |