CN105577466A - Method and device for determining network environment - Google Patents

Method and device for determining network environment Download PDF

Info

Publication number
CN105577466A
CN105577466A CN201410643984.5A CN201410643984A CN105577466A CN 105577466 A CN105577466 A CN 105577466A CN 201410643984 A CN201410643984 A CN 201410643984A CN 105577466 A CN105577466 A CN 105577466A
Authority
CN
China
Prior art keywords
network
risk
terminal
environment
network environment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410643984.5A
Other languages
Chinese (zh)
Other versions
CN105577466B (en
Inventor
吕鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410643984.5A priority Critical patent/CN105577466B/en
Priority to CN201811507594.XA priority patent/CN109962826B/en
Publication of CN105577466A publication Critical patent/CN105577466A/en
Priority to HK16112216.5A priority patent/HK1224104A1/en
Application granted granted Critical
Publication of CN105577466B publication Critical patent/CN105577466B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and device for determining a network environment. The objective of the invention is to improve the security of user information. The method for determining a network environment includes the following steps that: a terminal monitors the network environment of the terminal itself; whether the network environment meets a preset risk condition is judged; if the network environment meets the preset risk condition, it is determined that the network environment is not secure; and if the network environment does not meet the preset risk condition, it is determined that the network environment is secure. With the method and device of the invention adopted, the possibility of the connection of users into unsecure networks can be effectively decreased, and the security of user information can be effectively improved.

Description

A kind of defining method of network environment and device
Technical field
The application relates to computer internet technical field, particularly relates to a kind of defining method and device of network environment.
Background technology
Along with the development of Internet technology, increasing user habit is in the various network services provided by wireless network acquisition server.Meanwhile, various public place also constructs wireless network, realizes sharing of wireless network, obtains service to facilitate user.
Such as, the current public place such as most food and drink, lodging, amusement is all for user provides wireless network.User by terminal scanning to multiple wireless network, and terminal is accessed one of them wireless network obtain service.
But, user by terminal scanning to multiple wireless networks in, may exist assailant build wireless network.Terminal is once access the wireless network of this assailant structure, and assailant just illegally may obtain the privacy information of user, it reduces the fail safe of user profile.
Such as, certain eating and drinking establishment and assailant are all provided with wireless network in this eating and drinking establishment, and the network identity of these two wireless networks is identical, such as, are the trade name of eating and drinking establishment.When to scan network identity in this eating and drinking establishment be the wireless network of this eating and drinking establishment's trade name to user, the wireless network possibly assailant provided, think the wireless network that eating and drinking establishment provides by mistake, and terminal is accessed the wireless network that this assailant provides, to obtain service.Assailant intercepts and captures the privacy information of user by the mode of network data packet capturing, this reduces the fail safe of user profile.
Summary of the invention
The embodiment of the present application provides a kind of defining method and device of network environment, in order to improve the fail safe of user profile.
The defining method of a kind of network environment that the embodiment of the present application provides, comprising:
Monitor the network environment of self;
Judge whether described network environment meets the risk conditions preset;
If so, determine that described network environment is dangerous;
Otherwise, determine described network environment safety.
The defining method of the another kind of network environment that the embodiment of the present application provides, comprising:
Obtain the attribute information of the risk case of terminal to report;
According to described attribute information determination risk conditions;
Described risk conditions is sent to terminal, makes described terminal determine the network environment whether safety of described terminal according to described risk conditions.
The determining device of a kind of network environment that the embodiment of the present application provides, comprising:
Monitoring modular, for monitoring the network environment of self;
Judge module, for judging whether described network environment meets the risk conditions preset;
Determination module, for when described judge module judges that described network environment meets default risk conditions, determines that described network environment is dangerous, otherwise, determine described network environment safety.
The determining device of the another kind of network environment that the embodiment of the present application provides, comprising:
Acquisition module, for obtaining the attribute information of the risk case of terminal to report;
Determination module, for according to described attribute information determination risk conditions;
Sending module, for described risk conditions is sent to terminal, makes described terminal determine the network environment whether safety of described terminal according to described risk conditions.
The defining method of the network environment that the embodiment of the present application provides, the network environment of terminal monitoring self, and judge whether this network environment monitored meets the risk conditions preset, if, determine that described network environment is dangerous, otherwise, determine described network environment safety.Like this, the user be in current network conditions can know this network environment whether safety, and generally all can not terminal be accessed in unsafe network environment easily, like this, just can reduce the possibility that terminal accesses unsafe network, thus effectively can improve the fail safe of user profile.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide further understanding of the present application, and form a application's part, the schematic description and description of the application, for explaining the application, does not form the improper restriction to the application.In the accompanying drawings:
The determination method flow schematic diagram of the network environment that Fig. 1 provides for the embodiment of the present application;
One of determination apparatus structure schematic diagram of the network environment that Fig. 2 provides for the embodiment of the present application;
The determination apparatus structure schematic diagram two of the network environment that Fig. 3 provides for the embodiment of the present application.
Embodiment
For making the object of the application, technical scheme and advantage clearly, below with reference to the application's specific embodiment and corresponding accompanying drawing, technical scheme is clearly and completely described.Obviously, described embodiment is only some embodiments of the present application, instead of whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not making the every other embodiment obtained under creative work prerequisite, all belong to the scope of the application's protection.
The defining method of the network environment that the embodiment of the present application provides will be illustrated below.
See Fig. 1, the schematic flow sheet of the defining method of the network environment provided for the embodiment of the present application, the method comprises:
S101, monitor self network environment.
In the embodiment of the present application, the network access environment that provides for each network that terminal scans in a certain position of the network environment of described terminal self.Described network can comprise the free wireless network needing certification and do not need certification.
Due to the network difference (namely network identity is different) that diverse location builds, the network environment that heterogeneous networks provides also may be different.So the network environment that each network that a certain position, this position are arranged, each network provide is uniquely corresponding.As shown in table 1.
Position Each network identity Network environment
Position A a1、a2、a3 Network environment 1
Position B b1、b2、b3 Network environment 2
Table 1
As shown in Table 1, position A is provided with the network that network identity is respectively a1, a2 and a3, and these three networks provide network environment 1 for user.Position B is provided with the network that network identity is respectively b1, b2 and b3, and these three networks provide network environment 2 for user.
Therefore, in the embodiment of the present application, the network environment of terminal monitoring self, specifically comprises: the position of terminal monitoring self, as current location; Or each network of network mark that monitoring Current Scan arrives, as current network identification.
Terminal is when monitoring the current location of self, specifically by receiving the current location of the locating information Real-Time Monitoring self of self aligning system, such as, terminal is by receiving from global positioning system (GloblePositioningSystem, GPS) or the locating information of base station, using the current location of this locating information as self.
Wherein, the network identity described in the embodiment of the present application can be the service set (ServiceSetIdentifier, SSID) of the wireless router that each network is corresponding.
Whether the network environment that S102, judgement monitor meets the risk conditions preset, and if so, performs step S103, otherwise, perform step S104.
In the embodiment of the present application, described risk conditions is determined by server and is supplied to terminal.Concrete, server obtains the attribute information of the risk case of terminal to report, according to this attribute information determination risk conditions, this risk conditions is sent to terminal.Terminal then preserves the risk conditions received.
Server according to attribute informations such as the default risk position of risk case, default risk network identity, default risk environment mark or preset signal strength, can determine different risk conditions.
Concrete, server can obtain the occurrence positions of the risk case of terminal to report, using this occurrence positions as default risk position.
Server determines that the first risk conditions is: the position that terminal monitoring arrives is for presetting risk position.
When server can obtain the risk case generation of terminal to report, the network of network mark of access, using this network identity as default risk network identity.
Server determines that the second risk conditions is: terminal scanning to network identity in comprise at least one default risk network identity.
The first risk conditions determined and the second risk conditions are sent to terminal by server.
Terminal monitors current location (network environment) of self during by step S101, judge whether this current location is default risk position (whether meeting the first risk conditions), if so, determines that the network environment of self is dangerous, otherwise, determine this network environment safety.Or, when terminal scans each current network identification (network environment) by step S101, judge in current network identification, whether to comprise default risk network identity (whether meeting the second risk conditions), if, determine that the network environment of self is dangerous, otherwise, determine this network environment safety.
Such as, suppose that steal-number event (risk case) is at position A, the network of network that terminal accesses at position A is designated a1.Server using this position A as default risk position, using this network identity a1 as default risk network identity.
Server settings first risk conditions is: the position of terminal is position A; Setting the second risk conditions is: terminal scanning to network identity in comprise a1.
Suppose that user enters market M1, and monitor and be currently located at position A, determine that position A is for presetting risk position, thus can determine that the network environment that position A is corresponding is dangerous.Or, if terminal scans the network that network identity is a1, a2 and a3 in the M1 of market, then determine that the network identity a1 scanned is for presetting risk network identity, thus can determine that network identity is that the network environment that a1, a2 and a3 are corresponding is dangerous.
In the embodiment of the present application, server determines above-mentioned default risk position and default risk network identity, specifically by such as under type realization.
In multiple risk cases of terminal to report, server can by corresponding to the occurrence positions of each risk case of same risk network identity, as a default risk position.Further, in each occurrence positions corresponding to same risk network identity, the occurrence positions of setpoint distance (as 2km) scope will can be positioned at, as a default risk position.
S103, determine that current network conditions is dangerous.
When by step S102, terminal determines that the network environment of self meets the first default risk conditions, determine that the network environment of self is dangerous.
S104, determine current network conditions safety.
When by step S102, terminal determines that the network environment of self does not meet the first risk conditions preset, determine the network environment safety of self.
In the method shown in Fig. 1, the network environment of terminal monitoring self, and judge whether this network environment meets the risk conditions preset, and if so, determines that described network environment is dangerous, otherwise, determine described network environment safety.Like this, the user be in current network conditions can know this network environment whether safety, and generally all can not easily terminal be accessed in unsafe network environment, like this, can effectively avoid user when not knowing that whether the network environment of self is safe, terminal is accessed risk network, and then effectively can improve the fail safe of user profile.
Consider in practical application scene, the accuracy carrying out the locating information of self aligning system is lower, the region of the current location that locating information is corresponding is larger, therefore, by this current location, terminal determines that the accuracy of current residing network environment whether safety (that is, whether there is risk) is lower.
In addition, in practical application scene, assailant often can change the risk network of network mark (being called for short risk network identity) self built.If when the risk network identity after change is not in default risk network identity, terminal just cannot determine that current network conditions is dangerous.Therefore, by risk network identity, terminal determines that the accuracy of current residing network environment whether safety is also lower.
The accuracy whether current residing network environment is safe is determined in order to improve terminal, in the embodiment of the present application, when terminal scans current each network of network mark (network environment) by step S101, can judge whether the network environment of self meets the 3rd risk conditions.
3rd risk conditions can be determined by server and be supplied to terminal.Concrete, when the risk case that server can obtain terminal to report occurs its scan but the network of network do not accessed mark, each network identity is identified as default risk environment.
Server determines that the 3rd risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
3rd risk conditions is sent to terminal by server.
When terminal scans current each network identity (network environment) by step S101, judge terminal scanning to the ratio of quantity that identifies with all default risk environments of the quantity of default risk environment mark be greater than the first predetermined threshold value (namely judging whether satisfied 3rd risk conditions of network environment), if, determine that current network conditions is dangerous, otherwise, determine current network conditions safety.
Concrete, terminal, in default risk environment mark, determines the quantity of current network identification, as the first quantity, the quantity identified by default risk environment is as the second quantity, judge whether the ratio of the first quantity and the second quantity is greater than the first predetermined threshold value, if so, determine that this network environment meets the 3rd risk conditions, thus determine that current network conditions is dangerous, otherwise, determine that this network environment does not meet the 3rd risk conditions, thus determine current network conditions safety.
Such as, suppose that steal-number event (risk case) occurs in position A, when steal-number event occurs, the network identity of access network is a1, terminal position A sweep to but the network of network do not accessed is designated a2, a3, a4, a5, server then using this network identity a1 as default risk network identity, and network identity a2, a3, a4, a5 to be identified as default risk environment.
Server settings the 3rd risk conditions is: the quantity of the default risk environment mark that terminal scanning arrives, the ratio of the quantity 4 identified with all default risk environments is greater than the first predetermined threshold value.
If terminal scans network identity in the M1 of market when being a1 ', a2, a3, a4, a5, terminal is in default risk environment mark a2, a3, a4, a5, determine to comprise these 4 network identities of current network identification a2, a3, a4, a5, namely determine that the first quantity comprising current network identification in default risk environment mark is 4.Terminal also determines that the second quantity of all default risk environment marks is 4.Suppose that the first predetermined threshold value is 0.8, terminal determines that the ratio (4/4=1) of the first quantity and the second quantity is greater than the first predetermined threshold value (0.8), then can determine that the network environment of self meets the 3rd risk conditions, thus can determine that current network conditions is dangerous.
Like this, even if the network of network self built mark a1 is changed to a1 ' by assailant, according to other network identities a2, a3, a4, the a5 in this network environment except this network identity a1, terminal also can determine that this network environment is dangerous, thus effectively can improve the accuracy that terminal determines current residing network environment whether safety.
The accuracy whether current residing network environment is safe is determined in order to improve terminal further, in the embodiment of the present application, terminal, after determining that the network environment of self meets the 3rd risk conditions, also can judge whether the network environment of self meets the 4th risk conditions.
4th risk conditions also can be determined by server and be supplied to terminal.Concrete, the attribute information of the risk case of terminal to report also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report.
Server using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength, and can determine that the 4th risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
The 4th risk conditions that this determines by server sends to terminal.
Terminal is after determining that the network environment of self meets the 3rd risk conditions, also comprise: the signal strength signal intensity obtaining each network that Current Scan arrives, as current signal strength, for each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the current network identification preserved, judge whether the difference of the current signal strength that this current network identification is corresponding and preset signal strength is less than the second predetermined threshold value, if, then determine that the network environment of self meets the 4th risk conditions, thus can determine that current network conditions is dangerous, otherwise, determine that the network environment of self does not meet the 4th risk conditions, thus determine that current network conditions is safe.
Such as, suppose that steal-number event (risk case) occurs in position A, when steal-number event occurs, the network identity of access network is a1, terminal position A sweep to but the network of network do not accessed mark be respectively a2, a3, a4, a5, the signal strength signal intensity that network identity a2, a3, a4, a5 are corresponding is respectively 20dbm, 25dbm, 30dbm, 35dbm.Server using this network identity a1 as default risk network identity, and network identity a2, a3, a4, a5 are identified as default risk environment, using signal strength signal intensity 20dbm, 25dbm, 30dbm, 35dbm as preset signal strength corresponding to a2, a3, a4, a5.
When to scan network identity in the M1 of market be a1 ', a2 and a3 to terminal, the current signal strength that each network identity got is corresponding is respectively 15dbm, 14dbm, 18dbm.Obviously, terminal scanning to network identity in, a2 and a3 be default risk environment mark.The preset signal strength that default risk environment mark a2 and a3 that terminal scanning arrives is corresponding respectively and current signal strength as shown in table 2.
Network identity Preset signal strength (dbm) Current signal strength (dbm)
a2 20 14
a3 25 18
Table 2
As shown in Table 2, the preset signal strength that a2 is corresponding is 20dbm, and current signal strength is the preset signal strength that 14dbm, a3 are corresponding is 25dbm, and current signal strength is 18dbm.
Suppose that the second predetermined threshold value is 10dbm, after terminal gets the current signal strength of current network identification, according to table 2 determine Current Scan to preset signal strength corresponding to default risk environment mark a2 and the absolute value of difference of current signal strength be the absolute value of the difference of preset signal strength that 6dbm, a3 are corresponding and current signal strength be 7dbm.For a2 and a3, terminal can determine that the difference (6dbm or 7dbm) of preset signal strength and current signal strength is less than the second predetermined threshold value (10dbm), thus can determine that the network environment of self meets the 4th risk conditions.
Like this, the signal strength signal intensity of network of terminal by scanning, can determine whether the network environment of self meets the 4th risk conditions further, thus can further improve the accuracy that terminal determines current residing network environment whether safety.
Certainly, the defining method of the network environment that the embodiment of the present application provides, terminal can when determining one of them condition that current network environment meets in the first risk conditions, the second risk conditions, the 3rd risk conditions and the 4th risk conditions, or when at least two that meet wherein or full terms, determine current network environment safety, repeat no more here.
Further, terminal, when determining that the network environment of self is dangerous, can send early warning information to user, there is risk network to point out the current position of user.
Terminal, when sending early warning information, specifically by exporting the modes such as icon, word, voice or vibration, sends early warning information to user.
Certainly, terminal, when determining that the network environment of self is safe, also can send information to user, to point out user's current network conditions safety.
Consider in practical application scene, when terminal is in the network environment that there is risk, but when not accessing the risk network in this network environment, if terminal sends early warning information to user, this not only can make troubles to user, and waste resource.
Therefore, in the embodiment of the present application, when terminal to be determined by step S102 Current Scan to network identity in comprise default risk network identity, thus when determining that the network environment of self is dangerous, method shown in Fig. 1 also comprises: monitor self and currently whether have sent access request to the network (i.e. risk network) that this default risk network identity is corresponding, if, then can send early warning information to user, timely prompting user stops terminal accessing this risk network, otherwise, do not send early warning information to user.
The defining method of the network environment provided for the embodiment of the present application above, based on same thinking, the embodiment of the present application additionally provides a kind of determining device of network environment, as shown in Figures 2 and 3.
See Fig. 2, the determining device of the network environment that the embodiment of the present application provides, comprising:
Monitoring modular 21, for monitoring the network environment of self;
Judge module 22, for judging whether described network environment meets the risk conditions preset;
Determination module 23, during for judging that described network environment meets default risk conditions when judge module, determine that described network environment is dangerous, and when judge module judges that described network environment does not meet the risk conditions preset, determine described network environment safety.
Optionally, described monitoring modular 21 is specifically for the current location of monitoring self;
Described judge module 22 specifically for: judge whether described current location is default risk position;
Described determination module 23 specifically for: when described current location for preset risk position time, determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
Optionally, described monitoring modular 21 specifically for the mark of each network that monitoring Current Scan arrives, as current network identification;
Described judge module 22 specifically for: judge in current network identification, whether to comprise at least one default risk network identity;
Described determination module 23 specifically for: when comprising at least one default risk network identity in described current network identification, then determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
Optionally, described device also comprises:
Warning module 24, for when monitoring self and have sent access request to the network that described default risk network identity is corresponding, sends early warning information.
Optionally, described monitoring modular 21 specifically for: obtain the mark of each network that Current Scan arrives, as current network identification;
Described judge module 22 specifically for: in default risk environment mark, determine the quantity of current network identification, as the first quantity; Using the quantity of described default risk environment mark as the second quantity; And judge whether the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value;
Described determination module 23 specifically for: when the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value, determine that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.。
Optionally, described monitoring modular 21 specifically for: obtain the signal strength signal intensity of each network that Current Scan arrives, as current signal strength;
Described determination module 23 specifically for: for each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the described current network identification preserved, determines that the difference of the current signal strength that this current network identification is corresponding and described preset signal strength is less than the second predetermined threshold value.
Optionally, described device also comprises:
Warning module 24, for when described determination module 23 determines that described network environment is dangerous, sends early warning information.
See Fig. 3, the determining device of the network environment that the embodiment of the present application provides, comprising:
Acquisition module 31, for obtaining the attribute information of the risk case of terminal to report;
Determination module 32, for according to described attribute information determination risk conditions;
Sending module 33, for described risk conditions is sent to terminal, make described terminal when the network environment monitoring described terminal meets described risk conditions, determine that described network environment is dangerous, and monitor described network environment meet preset risk conditions time, determine described network environment safety.
Optionally, described acquisition module 31 specifically for the occurrence positions of risk case that obtains terminal to report, as default risk position;
Described determination module 32 specifically for, determine that described risk conditions is: the position of terminal is described default risk position.
Optionally, described acquisition module 31 specifically for: there is network identity corresponding to time institute's access network, as default risk network identity in the risk case obtaining terminal to report;
Described determination module 32 specifically for, determine described risk conditions for: terminal scanning to network identity in comprise described at least one and preset risk network identity.
Optionally, described acquisition module 31 specifically for: obtain terminal to report risk case occur time its scan but the network of network do not accessed mark, identify as default risk environment;
Described determination module 32 specifically for, determine that described risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
Optionally, the attribute information of described risk case, also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report;
Described determination module 32 specifically for, using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength; Determine that described risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
In sum, the network environment defining method that the embodiment of the present application provides, the network environment of terminal monitoring self, and judge whether this network environment meets the risk conditions preset, and if so, determines that described network environment is dangerous, otherwise, determine described network environment safety.Like this, the user be in current network conditions can know this network environment whether safety, and generally all can not easily terminal be accessed in unsafe network environment, like this, can effectively avoid user when not knowing that whether the network environment of self is safe, terminal is accessed risk network, and then effectively can improve the fail safe of user profile.
Those skilled in the art should understand, the embodiment of the application can be provided as method, system or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
The application describes with reference to according to the flow chart of the method for the embodiment of the present application, equipment (system) and computer program and/or block diagram.Should understand can by the combination of the flow process in each flow process in computer program instructions realization flow figure and/or block diagram and/or square frame and flow chart and/or block diagram and/or square frame.These computer program instructions can being provided to the processor of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device to produce a machine, making the instruction performed by the processor of computer or other programmable data processing device produce device for realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be stored in can in the computer-readable memory that works in a specific way of vectoring computer or other programmable data processing device, the instruction making to be stored in this computer-readable memory produces the manufacture comprising command device, and this command device realizes the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, make on computer or other programmable devices, to perform sequence of operations step to produce computer implemented process, thus the instruction performed on computer or other programmable devices is provided for the step realizing the function of specifying in flow chart flow process or multiple flow process and/or block diagram square frame or multiple square frame.
In one typically configuration, computing equipment comprises one or more processor (CPU), input/output interface, network interface and internal memory.
Internal memory may comprise the volatile memory in computer-readable medium, and the forms such as random access memory (RAM) and/or Nonvolatile memory, as read-only memory (ROM) or flash memory (flashRAM).Internal memory is the example of computer-readable medium.
Computer-readable medium comprises permanent and impermanency, removable and non-removable media can be stored to realize information by any method or technology.Information can be computer-readable instruction, data structure, the module of program or other data.The example of the storage medium of computer comprises, but be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), the random access memory (RAM) of other types, read-only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassette tape, tape magnetic rigid disk stores or other magnetic storage apparatus or any other non-transmitting medium, can be used for storing the information can accessed by computing equipment.According to defining herein, computer-readable medium does not comprise temporary computer readable media (transitorymedia), as data-signal and the carrier wave of modulation.
Also it should be noted that, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, commodity or equipment and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, commodity or equipment.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, commodity or the equipment comprising key element and also there is other identical element.
It will be understood by those skilled in the art that the embodiment of the application can be provided as method, system or computer program.Therefore, the application can adopt the form of complete hardware embodiment, completely software implementation or the embodiment in conjunction with software and hardware aspect.And the application can adopt in one or more form wherein including the upper computer program implemented of computer-usable storage medium (including but not limited to magnetic disc store, CD-ROM, optical memory etc.) of computer usable program code.
These are only the embodiment of the application, be not limited to the application.To those skilled in the art, the application can have various modifications and variations.Any amendment done within all spirit in the application and principle, equivalent replacement, improvement etc., within the right that all should be included in the application.

Claims (24)

1. a defining method for network environment, is characterized in that, comprising:
Monitor the network environment of self;
Judge whether described network environment meets the risk conditions preset;
If so, determine that described network environment is dangerous;
Otherwise, determine described network environment safety.
2. the method for claim 1, is characterized in that, monitors the network environment of self, specifically comprises:
Monitor the current location of self;
Judge whether described network environment meets the risk conditions preset, and specifically comprises:
Judge whether described current location is default risk position, if so, determines that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.
3. the method for claim 1, is characterized in that, monitors the network environment of self, specifically comprises:
The mark of each network that monitoring Current Scan arrives, as current network identification;
Judge whether described network environment meets the risk conditions preset, and specifically comprises:
Judge in current network identification, whether to comprise at least one default risk network identity, if so, then determine that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.
4. method as claimed in claim 3, it is characterized in that, after determining that described network environment is dangerous, described method also comprises:
When monitoring self and have sent access request to the network that described default risk network identity is corresponding, send early warning information.
5. the method for claim 1, is characterized in that, monitors the network environment of self, specifically comprises:
Obtain the mark of each network that Current Scan arrives, as current network identification;
Judge whether described network environment meets the risk conditions preset, and specifically comprises:
In default risk environment mark, determine the quantity of current network identification, as the first quantity;
Using the quantity of described default risk environment mark as the second quantity;
Judge whether the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value, if so, determine that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.
6. method as claimed in claim 5, it is characterized in that, before determining that described network environment meets default risk conditions, described method also comprises:
Obtain the signal strength signal intensity of each network that Current Scan arrives, as current signal strength;
For each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the described current network identification preserved, determines that the difference of the current signal strength that this current network identification is corresponding and described preset signal strength is less than the second predetermined threshold value.
7. the method as described in claim 1,2,3,5 or 6, is characterized in that, when determining that described network environment is dangerous, described method also comprises:
Send early warning information.
8. a defining method for network environment, is characterized in that, comprising:
Obtain the attribute information of the risk case of terminal to report;
According to described attribute information determination risk conditions;
Described risk conditions is sent to terminal, makes described terminal determine the network environment whether safety of described terminal according to described risk conditions.
9. method as claimed in claim 8, is characterized in that, obtains the attribute information of the risk case of terminal to report, specifically comprises:
Obtain the occurrence positions of the risk case of terminal to report, as default risk position;
According to described attribute information determination risk conditions, specifically comprise:
Determine that described risk conditions is: the position of terminal is described default risk position.
10. method as claimed in claim 8, is characterized in that, obtains the attribute information of the risk case of terminal to report, specifically comprises:
Obtain the network identity that risk case generation time institute's access network of terminal to report is corresponding, as default risk network identity;
According to described attribute information determination risk conditions, specifically comprise:
Determine described risk conditions for: terminal scanning to network identity in comprise described at least one and preset risk network identity.
11. methods as claimed in claim 8, is characterized in that, obtain the attribute information of the risk case of terminal to report, specifically comprise:
Obtain terminal to report risk case occur time its scan but the network of network do not accessed mark, identify as default risk environment;
According to described attribute information determination risk conditions, specifically comprise:
Determine that described risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
12. methods as claimed in claim 11, it is characterized in that, the attribute information of described risk case also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report;
According to described attribute information determination risk conditions, specifically comprise:
Using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength;
Determine that described risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
The determining device of 13. 1 kinds of network environments, is characterized in that, comprising:
Monitoring modular, for monitoring the network environment of self;
Judge module, for judging whether described network environment meets the risk conditions preset;
Determination module, for when described network environment meets default risk conditions, determines that described network environment is dangerous, otherwise, determine described network environment safety.
14. devices as claimed in claim 13, is characterized in that, described monitoring modular is specifically for the current location of monitoring self;
Described judge module specifically for: judge whether described current location is default risk position;
Described determination module specifically for: when described current location for preset risk position time, determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
15. devices as claimed in claim 13, is characterized in that, described monitoring modular specifically for the mark of each network that monitoring Current Scan arrives, as current network identification;
Described judge module specifically for: judge in current network identification, whether to comprise at least one default risk network identity;
Described determination module specifically for: when comprising at least one default risk network identity in described current network identification, then determine that described network environment meets default risk conditions, otherwise, determine described network environment meet preset risk conditions.
16. devices as claimed in claim 15, it is characterized in that, described device also comprises:
Also comprise warning module, for when monitoring self and have sent access request to the network that described default risk network identity is corresponding, send early warning information.
17. devices as claimed in claim 13, is characterized in that, described monitoring modular specifically for: obtain the mark of each network that Current Scan arrives, as current network identification;
Described judge module specifically for: in default risk environment mark, determine the quantity of current network identification, as the first quantity; Using the quantity of described default risk environment mark as the second quantity; And judge whether the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value;
Described determination module specifically for: when the ratio of described first quantity and described second quantity is greater than the first predetermined threshold value, determine that described network environment meets default risk conditions, otherwise, determine that described network environment does not meet the risk conditions preset.
18. devices as claimed in claim 17, is characterized in that, described monitoring modular specifically for: obtain the signal strength signal intensity of each network that Current Scan arrives, as current signal strength;
Described determination module specifically for: for each current network identification comprised in default risk environment mark, the preset signal strength corresponding according to the described current network identification preserved, determines that the difference of the current signal strength that this current network identification is corresponding and described preset signal strength is less than the second predetermined threshold value.
19. devices as described in claim 13,14,15,17 or 18, it is characterized in that, described device also comprises:
Warning module, for when described determination module determines that described network environment is dangerous, sends early warning information.
The determining device of 20. 1 kinds of network environments, is characterized in that, comprising:
Acquisition module, for obtaining the attribute information of the risk case of terminal to report;
Determination module, for according to described attribute information determination risk conditions;
Sending module, for described risk conditions is sent to terminal, makes described terminal determine the network environment whether safety of described terminal according to described risk conditions.
21. devices as claimed in claim 20, is characterized in that, described acquisition module specifically for the occurrence positions of risk case that obtains terminal to report, as default risk position;
Described determination module specifically for, determine that described risk conditions is: the position of terminal is described default risk position.
22. devices as claimed in claim 20, is characterized in that, described acquisition module specifically for: there is network identity corresponding to time institute's access network, as default risk network identity in the risk case obtaining terminal to report;
Described determination module specifically for, determine described risk conditions for: terminal scanning to network identity in comprise described at least one and preset risk network identity.
23. devices as claimed in claim 20, is characterized in that, described acquisition module specifically for: obtain terminal to report risk case occur time its scan but the network of network do not accessed mark, identify as default risk environment;
Described determination module specifically for, determine that described risk conditions is: terminal scanning to the quantity of default risk environment mark and the ratio of quantity that identifies of all default risk environments be greater than the first predetermined threshold value.
24. devices as claimed in claim 23, it is characterized in that, the attribute information of described risk case also comprises: the signal strength signal intensity of each default risk environment mark correspondence of terminal to report;
Described determination module specifically for, using signal strength signal intensity corresponding for described default risk environment mark as preset signal strength; Determine that described risk conditions is: terminal scanning to signal strength signal intensity corresponding to default risk environment mark be less than the second predetermined threshold value with the difference that this default risk environment identifies corresponding preset signal strength.
CN201410643984.5A 2014-11-07 2014-11-07 A kind of determination method and device of network environment Active CN105577466B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201410643984.5A CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment
CN201811507594.XA CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device
HK16112216.5A HK1224104A1 (en) 2014-11-07 2016-10-25 Method and device for determining network environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410643984.5A CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201811507594.XA Division CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Publications (2)

Publication Number Publication Date
CN105577466A true CN105577466A (en) 2016-05-11
CN105577466B CN105577466B (en) 2018-12-21

Family

ID=55887161

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811507594.XA Active CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device
CN201410643984.5A Active CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201811507594.XA Active CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Country Status (2)

Country Link
CN (2) CN109962826B (en)
HK (1) HK1224104A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045962A1 (en) * 2016-09-06 2018-03-15 腾讯科技(深圳)有限公司 Method, terminal, server, and system for location-based information early warning
CN114598543A (en) * 2019-01-16 2022-06-07 创新先进技术有限公司 Network environment monitoring method, system and device and electronic equipment
CN115361470A (en) * 2022-08-26 2022-11-18 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496364A (en) * 2005-07-28 2009-07-29 讯宝科技公司 Rogue AP roaming prevention
US20100062791A1 (en) * 2008-09-08 2010-03-11 Huawei Technologies Co., Ltd. Method of location positioning and verification of an ap, system, and home register
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signals
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1488334A1 (en) * 2002-03-11 2004-12-22 Goldman, Sachs & Co. Network access risk management
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
EP1532766A2 (en) * 2002-07-16 2005-05-25 Haim Engler Automated network security system and method
ES2326057B1 (en) * 2006-12-28 2010-06-25 Vodafone España, S.A. METHOD FOR IMPROVING TRAFFIC SAFETY THROUGH THE USE OF BEAMS.
CN101789880B (en) * 2010-01-22 2012-09-05 中国电信股份有限公司 Method for realizing uplink QoS (Quality of Service) based on IP access network and multi-service access gateway
US8843112B2 (en) * 2010-07-02 2014-09-23 Blackberry Limited Method and system for data session establishment
US20130212680A1 (en) * 2012-01-12 2013-08-15 Arxceo Corporation Methods and systems for protecting network devices from intrusion
CN102638459B (en) * 2012-03-23 2018-01-26 腾讯科技(深圳)有限公司 Authentication information Transmission system, authentication information transmission service platform and transmission method
US8718644B2 (en) * 2012-06-08 2014-05-06 Apple Inc. Automatically modifying wireless network connection policies based on user activity levels
WO2014067040A1 (en) * 2012-10-29 2014-05-08 Intel Corporation Method and apparatus for safe network access point detection
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN103621132A (en) * 2013-06-25 2014-03-05 华为技术有限公司 Network monitoring method and device
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
CN104065539A (en) * 2014-07-09 2014-09-24 武汉安问科技发展有限责任公司 Method for monitoring unauthorized network equipment based on application behaviors

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101496364A (en) * 2005-07-28 2009-07-29 讯宝科技公司 Rogue AP roaming prevention
US20100062791A1 (en) * 2008-09-08 2010-03-11 Huawei Technologies Co., Ltd. Method of location positioning and verification of an ap, system, and home register
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signals
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018045962A1 (en) * 2016-09-06 2018-03-15 腾讯科技(深圳)有限公司 Method, terminal, server, and system for location-based information early warning
CN114598543A (en) * 2019-01-16 2022-06-07 创新先进技术有限公司 Network environment monitoring method, system and device and electronic equipment
CN114598543B (en) * 2019-01-16 2023-06-23 创新先进技术有限公司 Network environment monitoring method, system, device and electronic equipment
CN115361470A (en) * 2022-08-26 2022-11-18 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment
CN115361470B (en) * 2022-08-26 2024-02-27 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Also Published As

Publication number Publication date
CN109962826B (en) 2022-07-26
CN109962826A (en) 2019-07-02
HK1224104A1 (en) 2017-08-11
CN105577466B (en) 2018-12-21

Similar Documents

Publication Publication Date Title
US9742773B2 (en) Managing network interaction for devices
EP3544336B1 (en) Information transmission
US20140045536A1 (en) Systems and methods for service set identifier-based location detection
CN105451232A (en) Pseudo base station detection method and system, terminal and server
US20150281239A1 (en) Provision of access privileges to a user
CN105516186A (en) Method for preventing replay attack and server
CN106658665A (en) Method and apparatus for establishing wireless connection
CN104683965A (en) Interception method and equipment for spam short messages of pseudo base station
KR101606352B1 (en) System, user terminal, and method for detecting rogue access point and computer program for the same
SG192896A1 (en) Systems and methods for authenticating devices in a sensor-web network
CN105142146A (en) Authentication method of WIFI hotspot access, device and system
CN105430651A (en) Method and system used for detecting illegal wireless access points
CN111328078B (en) Method and device for positioning pseudo base station
CN105577466A (en) Method and device for determining network environment
CN105933185A (en) Method and device for determining connection abnormity type of router
CN106685891A (en) Verification method and apparatus for accessing network
WO2017084456A1 (en) Wifi hotspot processing method, device and system
CN104980420A (en) Business processing method, device, terminal and server
CN108667802A (en) A kind of monitoring method and system of electric power application network safety
EP3125596A1 (en) Wireless local area network user side device and information processing method
CN108200059A (en) Document transmission method, device, equipment and computer readable storage medium
CN104053159A (en) Method and device for distributing frequency points to multi-carrier base station
US10085175B2 (en) Load control method and apparatus for notification messages
AU2017422091B2 (en) Hotspot scanning method and electronic device
CN105188062A (en) Confidence leakage protection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1224104

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200921

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right