Embodiment
For making the object of the application, technical scheme and advantage clearly, below with reference to the application's specific embodiment and corresponding accompanying drawing, technical scheme is clearly and completely described.Obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
The defining method of the network environment that the embodiment of the present application provides will be illustrated below.
See Fig. 1, the schematic flow sheet of the defining method of the network environment provided for the embodiment of the present application, the method comprises:
S101, monitor self network environment.
In the embodiment of the present application, the network access environment that provides for each network that terminal scans in a certain position of the network environment of described terminal self.Described network can comprise the free wireless network needing certification and do not need certification.
Due to the network difference (namely network identity is different) that diverse location builds, the network environment that heterogeneous networks provides also may be different.So the network environment that each network that a certain position, this position are arranged, each network provide is uniquely corresponding.As shown in table 1.
Position |
Each network identity |
Network environment |
Position A |
a1、a2、a3 |
Network environment 1 |
Position B |
b1、b2、b3 |
Network environment 2 |
Table 1
As shown in Table 1, position A is provided with the network that network identity is respectively a1, a2 and a3, and these three networks provide network environment 1 for user.Position B is provided with the network that network identity is respectively b1, b2 and b3, and these three networks provide network environment 2 for user.
Therefore, in the embodiment of the present application, the network environment of terminal monitoring self, specifically comprises: the position of terminal monitoring self, as current location; Or each network of network mark that monitoring Current Scan arrives, as current network identification.
Terminal is when monitoring the current location of self, specifically by receiving the current location of the locating information Real-Time Monitoring self of self aligning system, such as, terminal is by receiving from global positioning system (GloblePositioningSystem, GPS) or the locating information of base station, using the current location of this locating information as self.
Wherein, the network identity described in the embodiment of the present application can be the service set (ServiceSetIdentifier, SSID) of the wireless router that each network is corresponding.
Whether the network environment that S102, judgement monitor meets the risk conditions preset, and if so, performs step S103, otherwise, perform step S104.
In the embodiment of the present application, described risk conditions is determined by server and is supplied to terminal.Concrete, server obtains the attribute information of the risk case of terminal to report, according to this attribute information determination risk conditions, this risk conditions is sent to terminal.Terminal then preserves the risk conditions received.
Server according to attribute informations such as the default risk position of risk case, default risk network identity, default risk environment mark or preset signal strength, can determine different risk conditions.
Concrete, server can obtain the occurrence positions of the risk case of terminal to report, using this occurrence positions as default risk position.
Server determines that the first risk conditions is: the position that terminal monitoring arrives is for presetting risk position.
When server can obtain the risk case generation of terminal to report, the network of network mark of access, using this network identity as default risk network identity.
Server determines that the second risk conditions is: terminal scanning to network identity in comprise at least one default risk network identity.
The first risk conditions determined and the second risk conditions are sent to terminal by server.
Terminal monitors current location (network environment) of self during by step S101, judge whether this current location is default risk position (whether meeting the first risk conditions), if so, determines that the network environment of self is dangerous, otherwise, determine this network environment safety.Or, when terminal scans each current network identification (network environment) by step S101, judge in current network identification, whether to comprise default risk network identity (whether meeting the second risk conditions), if, determine that the network environment of self is dangerous, otherwise, determine this network environment safety.
Such as, suppose that steal-number event (risk case) is at position A, the network of network that terminal accesses at position A is designated a1.Server using this position A as default risk position, using this network identity a1 as default risk network identity.
Server settings first risk conditions is: the position of terminal is position A; Setting the second risk conditions is: terminal scanning to network identity in comprise a1.
Suppose that user enters market M1, and monitor and be currently located at position A, determine that position A is for presetting risk position, thus can determine that the network environment that position A is corresponding is dangerous.Or, if terminal scans the network that network identity is a1, a2 and a3 in the M1 of market, then determine that the network identity a1 scanned is for presetting risk network identity, thus can determine that network identity is that the network environment that a1, a2 and a3 are corresponding is dangerous.
In the embodiment of the present application, server determines above-mentioned default risk position and default risk network identity, specifically by such as under type realization.
In multiple risk cases of terminal to report, server can by corresponding to the occurrence positions of each risk case of same risk network identity, as a default risk position.Further, in each occurrence positions corresponding to same risk network identity, the occurrence positions of setpoint distance (as 2km) scope will can be positioned at, as a default risk position.
S103, determine that current network conditions is dangerous.
When by step S102, terminal determines that the network environment of self meets the first default risk conditions, determine that the network environment of self is dangerous.
S104, determine current network conditions safety.
When by step S102, terminal determines that the network environment of self does not meet the first risk conditions preset, determine the network environment safety of self.
In the method shown in Fig. 1, the network environment of terminal monitoring self, and judge whether this network environment meets the risk conditions preset, and if so, determines that described network environment is dangerous, otherwise, determine described network environment safety.Like this, the user be in current network conditions can know this network environment whether safety, and generally all can not easily terminal be accessed in unsafe network environment, like this, can effectively avoid user when not knowing that whether the network environment of self is safe, terminal is accessed risk network, and then effectively can improve the fail safe of user profile.
Consider in practical application scene, the accuracy carrying out the locating information of self aligning system is lower, the region of the current location that locating information is corresponding is larger, therefore, by this current location, terminal determines that the accuracy of current residing network environment whether safety (that is, whether there is risk) is lower.
In addition, in practical application scene, assailant often can change the risk network of network mark (being called for short risk network identity) self built.If when the risk network identity after change is not in default risk network identity, terminal just cannot determine that current network conditions is dangerous.Therefore, by risk network identity, terminal determines that the accuracy of current residing network environment whether safety is also lower.
The accuracy whether current residing network environment is safe is determined in order to improve terminal, in the embodiment of the present application, when terminal scans current each network of network mark (network environment) by step S101, can judge whether the network environment of self meets the 3rd risk conditions.
3rd risk conditions can be determined by server and be supplied to terminal.Concrete, when the risk case that server can obtain terminal to report occurs its scan but the network of network do not accessed mark, each network identity is identified as default risk environment.
Server determines that the 3rd risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
3rd risk conditions is sent to terminal by server.
When terminal scans current each network identity (network environment) by step S101, judge terminal scanning to the ratio of quantity that identifies with all default risk environments of the quantity of default risk environment mark be greater than the first predetermined threshold value (namely judging whether satisfied 3rd risk conditions of network environment), if, determine that current network conditions is dangerous, otherwise, determine current network conditions safety.
Concrete, terminal, in default risk environment mark, determines the quantity of current network identification, as the first quantity, the quantity identified by default risk environment is as the second quantity, judge whether the ratio of the first quantity and the second quantity is greater than the first predetermined threshold value, if so, determine that this network environment meets the 3rd risk conditions, thus determine that current network conditions is dangerous, otherwise, determine that this network environment does not meet the 3rd risk conditions, thus determine current network conditions safety.
Such as, suppose that steal-number event (risk case) occurs in position A, when steal-number event occurs, the network identity of access network is a1, terminal position A sweep to but the network of network do not accessed is designated a2, a3, a4, a5, server then using this network identity a1 as default risk network identity, and network identity a2, a3, a4, a5 to be identified as default risk environment.
Server settings the 3rd risk conditions is: the quantity of the default risk environment mark that terminal scanning arrives, the ratio of the quantity 4 identified with all default risk environments is greater than the first predetermined threshold value.
If terminal scans network identity in the M1 of market when being a1 ', a2, a3, a4, a5, terminal is in default risk environment mark a2, a3, a4, a5, determine to comprise these 4 network identities of current network identification a2, a3, a4, a5, namely determine that the first quantity comprising current network identification in default risk environment mark is 4.Terminal also determines that the second quantity of all default risk environment marks is 4.Suppose that the first predetermined threshold value is 0.8, terminal determines that the ratio (4/4=1) of the first quantity and the second quantity is greater than the first predetermined threshold value (0.8), then can determine that the network environment of self meets the 3rd risk conditions, thus can determine that current network conditions is dangerous.
Like this, even if the network of network self built mark a1 is changed to a1 ' by assailant, according to other network identities a2, a3, a4, the a5 in this network environment except this network identity a1, terminal also can determine that this network environment is dangerous, thus effectively can improve the accuracy that terminal determines current residing network environment whether safety.
The accuracy whether current residing network environment is safe is determined in order to improve terminal further, in the embodiment of the present application, terminal, after determining that the network environment of self meets the 3rd risk conditions, also can judge whether the network environment of self meets the 4th risk conditions.
4th risk conditions also can be determined by server and be supplied to terminal.Concrete, the attribute information of the risk case of terminal to report also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report.
Server using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength, and can determine that the 4th risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
The 4th risk conditions that this determines by server sends to terminal.
Terminal is after determining that the network environment of self meets the 3rd risk conditions, also comprise: the signal strength signal intensity obtaining each network that Current Scan arrives, as current signal strength, for each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the current network identification preserved, judge whether the difference of the current signal strength that this current network identification is corresponding and preset signal strength is less than the second predetermined threshold value, if, then determine that the network environment of self meets the 4th risk conditions, thus can determine that current network conditions is dangerous, otherwise, determine that the network environment of self does not meet the 4th risk conditions, thus determine that current network conditions is safe.
Such as, suppose that steal-number event (risk case) occurs in position A, when steal-number event occurs, the network identity of access network is a1, terminal position A sweep to but the network of network do not accessed mark be respectively a2, a3, a4, a5, the signal strength signal intensity that network identity a2, a3, a4, a5 are corresponding is respectively 20dbm, 25dbm, 30dbm, 35dbm.Server using this network identity a1 as default risk network identity, and network identity a2, a3, a4, a5 are identified as default risk environment, using signal strength signal intensity 20dbm, 25dbm, 30dbm, 35dbm as preset signal strength corresponding to a2, a3, a4, a5.
When to scan network identity in the M1 of market be a1 ', a2 and a3 to terminal, the current signal strength that each network identity got is corresponding is respectively 15dbm, 14dbm, 18dbm.Obviously, terminal scanning to network identity in, a2 and a3 be default risk environment mark.The preset signal strength that default risk environment mark a2 and a3 that terminal scanning arrives is corresponding respectively and current signal strength as shown in table 2.
Network identity |
Preset signal strength (dbm) |
Current signal strength (dbm) |
a2 |
20 |
14 |
a3 |
25 |
18 |
Table 2
As shown in Table 2, the preset signal strength that a2 is corresponding is 20dbm, and current signal strength is the preset signal strength that 14dbm, a3 are corresponding is 25dbm, and current signal strength is 18dbm.
Suppose that the second predetermined threshold value is 10dbm, after terminal gets the current signal strength of current network identification, according to table 2 determine Current Scan to preset signal strength corresponding to default risk environment mark a2 and the absolute value of difference of current signal strength be the absolute value of the difference of preset signal strength that 6dbm, a3 are corresponding and current signal strength be 7dbm.For a2 and a3, terminal can determine that the difference (6dbm or 7dbm) of preset signal strength and current signal strength is less than the second predetermined threshold value (10dbm), thus can determine that the network environment of self meets the 4th risk conditions.
Like this, the signal strength signal intensity of network of terminal by scanning, can determine whether the network environment of self meets the 4th risk conditions further, thus can further improve the accuracy that terminal determines current residing network environment whether safety.
Certainly, the defining method of the network environment that the embodiment of the present application provides, terminal can when determining one of them condition that current network environment meets in the first risk conditions, the second risk conditions, the 3rd risk conditions and the 4th risk conditions, or when at least two that meet wherein or full terms, determine current network environment safety, repeat no more here.
Further, terminal, when determining that the network environment of self is dangerous, can send early warning information to user, there is risk network to point out the current position of user.
Terminal, when sending early warning information, specifically by exporting the modes such as icon, word, voice or vibration, sends early warning information to user.
Certainly, terminal, when determining that the network environment of self is safe, also can send information to user, to point out user's current network conditions safety.
Consider in practical application scene, when terminal is in the network environment that there is risk, but when not accessing the risk network in this network environment, if terminal sends early warning information to user, this not only can make troubles to user, and waste resource.
Therefore, in the embodiment of the present application, when terminal to be determined by step S102 Current Scan to network identity in comprise default risk network identity, thus when determining that the network environment of self is dangerous, method shown in Fig. 1 also comprises: monitor self and currently whether have sent access request to the network (i.e. risk network) that this default risk network identity is corresponding, if, then can send early warning information to user, timely prompting user stops terminal accessing this risk network, otherwise, do not send early warning information to user.
The defining method of the network environment provided for the embodiment of the present application above, based on same thinking, the embodiment of the present application additionally provides a kind of determining device of network environment, as shown in Figures 2 and 3.
See Fig. 2, the determining device of the network environment that the embodiment of the present application provides, comprising:
Monitoring modular 21, for monitoring the network environment of self;
Judge module 22, for judging whether described network environment meets the risk conditions preset;
Determination module 23, during for judging that described network environment meets default risk conditions when judge module, determine that described network environment is dangerous, and when judge module judges that described network environment does not meet the risk conditions preset, determine described network environment safety.
Optionally, described monitoring modular 21 is specifically for the current location of monitoring self;
Described judge module 22 specifically for: judge whether described current location is default risk position;
Described determination module 23 specifically for: when described current location for preset risk position time, determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
Optionally, described monitoring modular 21 specifically for the mark of each network that monitoring Current Scan arrives, as current network identification;
Described judge module 22 specifically for: judge in current network identification, whether to comprise at least one default risk network identity;
Described determination module 23 specifically for: when comprising at least one default risk network identity in described current network identification, then determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
Optionally, described device also comprises:
Warning module 24, for when monitoring self and have sent access request to the network that described default risk network identity is corresponding, sends early warning information.
Optionally, described monitoring modular 21 specifically for: obtain the mark of each network that Current Scan arrives, as current network identification;
Described judge module 22 specifically for: in default risk environment mark, determine the quantity of current network identification, as the first quantity; Using the quantity of described default risk environment mark as the second quantity; And judge whether the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value;
Described determination module 23 specifically for: when the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value, determine that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.。
Optionally, described monitoring modular 21 specifically for: obtain the signal strength signal intensity of each network that Current Scan arrives, as current signal strength;
Described determination module 23 specifically for: for each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the described current network identification preserved, determines that the difference of the current signal strength that this current network identification is corresponding and described preset signal strength is less than the second predetermined threshold value.
Optionally, described device also comprises:
Warning module 24, for when described determination module 23 determines that described network environment is dangerous, sends early warning information.
See Fig. 3, the determining device of the network environment that the embodiment of the present application provides, comprising:
Acquisition module 31, for obtaining the attribute information of the risk case of terminal to report;
Determination module 32, for according to described attribute information determination risk conditions;
Sending module 33, for described risk conditions is sent to terminal, make described terminal when the network environment monitoring described terminal meets described risk conditions, determine that described network environment is dangerous, and monitor described network environment meet preset risk conditions time, determine described network environment safety.
Optionally, described acquisition module 31 specifically for the occurrence positions of risk case that obtains terminal to report, as default risk position;
Described determination module 32 specifically for, determine that described risk conditions is: the position of terminal is described default risk position.
Optionally, described acquisition module 31 specifically for: there is network identity corresponding to time institute's access network, as default risk network identity in the risk case obtaining terminal to report;
Described determination module 32 specifically for, determine described risk conditions for: terminal scanning to network identity in comprise described at least one and preset risk network identity.
Optionally, described acquisition module 31 specifically for: obtain terminal to report risk case occur time its scan but the network of network do not accessed mark, identify as default risk environment;
Described determination module 32 specifically for, determine that described risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
Optionally, the attribute information of described risk case, also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report;
Described determination module 32 specifically for, using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength; Determine that described risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
In sum, the network environment defining method that the embodiment of the present application provides, the network environment of terminal monitoring self, and judge whether this network environment meets the risk conditions preset, and if so, determines that described network environment is dangerous, otherwise, determine described network environment safety.Like this, the user be in current network conditions can know this network environment whether safety, and generally all can not easily terminal be accessed in unsafe network environment, like this, can effectively avoid user when not knowing that whether the network environment of self is safe, terminal is accessed risk network, and then effectively can improve the fail safe of user profile.
Those skilled in the art should understand, the embodiment of the application can be provided as method, system or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The application describes with reference to according to the flow chart of the method for the embodiment of the present application, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
In one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, and the forms such as random access memory (RAM) and/or Nonvolatile memory, as read-only memory (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), the random access memory (RAM) of other types, read-only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise temporary computer readable media (transitorymedia), as data-signal and the carrier wave of modulation.
Also it should be noted that, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising key element and also there is other identical element.
It will be understood by those skilled in the art that the embodiment of the application can be provided as method, system or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
These are only the embodiment of the application, be not limited to the application.To those skilled in the art, the application can have various modifications and variations.Any amendment done within all spirit in the application and principle, equivalent replacement, improvement etc., within the right that all should be included in the application.