CN105991626A - Network access method and network access device - Google Patents

Network access method and network access device Download PDF

Info

Publication number
CN105991626A
CN105991626A CN201510101198.7A CN201510101198A CN105991626A CN 105991626 A CN105991626 A CN 105991626A CN 201510101198 A CN201510101198 A CN 201510101198A CN 105991626 A CN105991626 A CN 105991626A
Authority
CN
China
Prior art keywords
network
identified application
secure
security level
current network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510101198.7A
Other languages
Chinese (zh)
Inventor
吴鸣
詹远
孙龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Technology Co Ltd
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201510101198.7A priority Critical patent/CN105991626A/en
Publication of CN105991626A publication Critical patent/CN105991626A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a network access method and a network access device and belongs to the terminal technical field. The methods includes the following steps that: whether an identified application satisfies a security judgment condition is monitored; when the identified application satisfies the security judgment condition, a network security level corresponding to a current network is obtained; whether the current network satisfies a network security access condition is judged according to the security identifier of the identified application and the network security level; and if the current network satisfies the network security access condition, the identified application is allowed to carry out network access. According to the network access method and the network access device of the invention, when it is detected that the identified application satisfies the security judgment condition, whether the identified application is allowed to carry out network access is judged according to the security identifier of the identified application and the network security level, and therefore, the security of data user in the identified application can be improved, and the risk that the user data are hijacked can be lowered.

Description

The method and device that network accesses
Technical field
It relates to field of terminal technology, the method and device accessed particularly to a kind of network.
Background technology
Along with popularizing of the Internet, increasing user accesses nothing by the terminal with wireless access function Gauze network carries out network access.
Generally, user carries out network fixed location (such as: in family, coffee-house, company etc.) During access, can select to use the network access of Wireless Fidelity WI-FI.WI-FI network is the nothing of main flow Line network standard, before using WI-FI network to carry out network access, needs to access terminal WI-FI net Network equipment, and after being successfully accessed, can be carried out network access.
Summary of the invention
In order to solve the problem of correlation technique, disclosure embodiment provides method and the dress that a kind of network accesses Put.Described technical scheme is as follows:
First aspect according to disclosure embodiment, it is provided that a kind of method that network accesses, including:
Monitor whether identified application meets analysis condition;
When described identified application meets analysis condition, obtain the network security level that current network is corresponding Not;
Secure ID and described network security level according to described identified application determine that described current network is No meet secure network access conditions;
If described current network meets secure network access conditions, then described identified application is allowed to carry out net Network accesses.
Optionally, whether the identified application of described monitoring meets analysis condition, including:
When monitoring identified application and starting, determine that described identified application meets analysis condition;
Or,
When monitoring identified application and initiating network access, determine that described identified application meets analysis Condition.
Optionally, the network security level that described acquisition current network is corresponding, including:
If current network is not provided with network security level, then the network security that described current network is corresponding is set Rank is N level of security, and wherein said N level of security is minimum level of security.
Optionally, the described secure ID according to described identified application and described network security level determine institute State whether current network meets secure network access conditions, including:
When the secure ID of described identified application is identical with described network security level, determine described currently Network meets secure network access conditions;
Or,
When the secure ID of described identified application is less than described network security level, determine described current net Network meets secure network access conditions.
Optionally, the described secure ID according to described identified application and described network security level determine institute Stating after whether current network meet secure network access conditions, described method also includes:
If described current network not met secure network access conditions, then forbid that described identified application is carried out Network accesses.
Optionally, described method also includes:
If detecting during accessing terminal to network that current network is not provided with network security level, then prompting user sets Put the network security level of described current network;
Receive the network security level of the described current network of described user setup;
Preserve the network security level of the described current network of described user setup and the mark of described current network Corresponding relation.
Second aspect according to disclosure embodiment, it is provided that the device that a kind of network accesses, including:
Monitoring modular, is used for monitoring whether identified application meets analysis condition;
Acquisition module, for when described identified application meets analysis condition, obtains current network pair The network security level answered;
Determine module, for determining according to secure ID and the described network security level of described identified application Whether described current network meets secure network access conditions;
First control module, for when described current network meets secure network access conditions, it is allowed to described Identified application carries out network access.
Optionally, described monitoring modular, including:
First determines unit, for when monitoring identified application and starting, determines that described identified application is full Foot analysis condition;
Second determines unit, for when monitor identified application initiate network access time, determine described in mark Know application and meet analysis condition.
Optionally, described acquisition module is used for:
If current network is not provided with network security level, then the network security that described current network is corresponding is set Rank is N level of security, and wherein said N level of security is minimum level of security.
Optionally, described determine module, including:
3rd determines unit, is used for the secure ID when described identified application and described network security level phase Meanwhile, determine that described current network meets secure network access conditions;
4th determines unit, for the secure ID when described identified application less than described network security level Time, determine that described current network meets secure network access conditions.
Optionally, described device also includes:
Second control module, is used for, if for described current network not met secure network access conditions, Then forbid that described identified application carries out network access.
Optionally, described device also includes:
Reminding module, in time detecting that current network is not provided with network security level when accessing terminal to network, The network security level of current network described in prompting user setup;
Receiver module, for receiving the network security level of the described current network of described user setup;
Preserve module, for preserving the network security level of the described current network of described user setup with described The corresponding relation of the mark of current network.
The third aspect according to disclosure embodiment, it is provided that the device that a kind of network accesses, including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Monitor whether identified application meets analysis condition;
When described identified application meets analysis condition, obtain the network security level that current network is corresponding Not;
Secure ID and described network security level according to described identified application determine that described current network is No meet secure network access conditions;
If described current network meets secure network access conditions, then described identified application is allowed to carry out net Network accesses.
Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect:
By when detecting that identified application meets analysis condition, according to the safety post of identified application Know and network security level determines whether that identified application carries out network access.Improve identified application In the safety of user data, reduce the risk that user data is held as a hostage.
It should be appreciated that it is only exemplary and explanatory that above general description and details hereinafter describe, The disclosure can not be limited.
Accompanying drawing explanation
Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the disclosure Embodiment, and for explaining the principle of the disclosure together with description.
Fig. 1 is the flow chart of the method accessed according to a kind of network shown in an exemplary embodiment;
Fig. 2 is the flow chart of the method accessed according to a kind of network shown in an exemplary embodiment;
Fig. 3 is the flow chart of the method accessed according to a kind of network shown in an exemplary embodiment;
Fig. 4 is the flow chart of the method accessed according to a kind of network shown in an exemplary embodiment;
Fig. 5 is the block diagram of the device accessed according to a kind of network shown in an exemplary embodiment;
Fig. 6 is according to the block diagram of monitoring modular in the device of a kind of network access shown in an exemplary embodiment;
Fig. 7 is according to the block diagram determining module in the device of a kind of network access shown in an exemplary embodiment;
Fig. 8 is the block diagram (general structure of mobile terminal) according to a kind of device shown in an exemplary embodiment.
Detailed description of the invention
For making the purpose of the disclosure, technical scheme and advantage clearer, below in conjunction with accompanying drawing to the disclosure Embodiment is described in further detail.
The disclosure one exemplary embodiment provides a kind of method that network accesses, and this method embodiment is applied to In terminal, seeing Fig. 1, method flow includes:
In a step 101, monitor whether identified application meets analysis condition;
In a step 102, when identified application meets analysis condition, obtain current network corresponding Network security level;
In step 103, secure ID and network security level according to identified application determine current network Whether meet secure network access conditions;
At step 104, if current network meets secure network access conditions, then identified application is allowed Carry out network access.
Disclosure embodiment is by when detecting that identified application meets analysis condition, according to identified Secure ID and the network security level of application determine whether that identified application carries out network access.Improve The safety of the user data in identified application, reduces the risk that user data is held as a hostage.
Disclosure another exemplary embodiment provides a kind of method that network accesses, and this method embodiment is applied In terminal, seeing Fig. 2, method flow includes:
In step 201, monitor whether identified application meets analysis condition.
In the disclosed embodiments, the identified application that terminal can determine for user or cloud server Carry out the control of network access.Before being controlled, it is thus necessary to determine that whether identified application meets safety is sentenced Broken strip part just set out control judgment mechanism.
Wherein, can include but not limited to following two situation in this step, therefore step 201 can include Following two step realizes:
In step 2011, when monitoring identified application and starting, determine that identified application meets safety and sentences Broken strip part;Or,
In step 2012, when monitoring identified application and initiating network access, determine that identified application is full Foot analysis condition.
In addition, it is necessary to pre-set the secure ID that identified application is corresponding.Wherein, secure ID can wrap Include but be not limited to following rank:
Family's (the highest level of security);Work (intermediate security level);Public (lowest security level).
Wherein it is possible to the application relating to the aspects such as payment, privacy of user data, office, mail is defined as Identified application needs the application of the highest level of security;
Instant messaging class, social networks, the application that browses the aspects such as webpage can be defined as identified application The middle application needing intermediate security level;
Can be defined as in identified application needing minimum safe by the application of the aspects such as game, reading, news The application of rank.
Accordingly, the process arranging level of security corresponding to identified application can be divided into two kinds:
The first, manually carried out according to the demand of self by user in the setting options of each identified application Secure ID is set.Wherein, the level of security that each identified application is corresponding can be saved in joining of each application Put in file.
The second, application identities corresponding for self mounted identified application is reported cloud service by terminal Device, is issued to terminal by cloud server by the secure ID of each identified application correspondence, and will by terminal The secure ID of each identified application correspondence writes in the configuration file of each identified application.Wherein, cloud Preserving the secure ID that each identified application is corresponding in end server, be saved in cloud server is each The safety that according to the secure ID that individual identified application is corresponding, each identified application of each user setup is corresponding The result statistics of mark obtains.
Further, it is not limiting as the secure ID other quantity of middle rank, can only comprise high level of security and low Level of security two kinds;Can also comprise N kind, wherein N level of security is minimum level of security.
In step 202., when identified application meets analysis condition, obtain current network corresponding Network security level.
Obtained currently in the corresponding relation of the mark of network by the network of network level of security pre-saved The network security level that network is corresponding.
Wherein, the mark of network can be SSID (Service Set Identifier, service set) or SSID and MAC (Media Access Control, media interviews control) address.
Further, need to pre-set the level of security that each network is corresponding.Wherein, level of security is permissible Include but not limited to following rank:
Family's (the highest level of security);Work (intermediate security level);Public (lowest security level).
Wherein, the network settings of family, office space etc. can be the highest level of security by user;
Can be intermediate security level by the network settings in dining room, coffee-house etc.;
Can be lowest security level by the network settings in unknown place.
Accordingly, the process arranging level of security corresponding to network can be divided into two kinds:
The first, be manually configured network peace by user according to the demand of self in network insertion point list Full rank.
Wherein, during the level of security that Network Access Point is corresponding is set, need each network insertion SSID and level of security that point is corresponding are associated and preserve.
The second, terminal obtains the network security level that each network is corresponding from cloud server.
Wherein, terminal directly gets, from cloud server, the SSID that each network is corresponding in the latter case Corresponding relation with level of security.SSID corresponding to each network preserved in cloud server and level of security Corresponding relation according to the result statistics of network security level corresponding to the network of each user setup obtain.
Further, the SSID corresponding due to each network not exclusive existence, therefore can use each further MAC Address and SSID that network is corresponding carry out each network of common ID.Accordingly, it is corresponding that each network is set Level of security during, need network security level corresponding for each network and SSID, MAC ground Location is associated and preserves.
Further, it is not limiting as the network security level other quantity of middle rank, can only comprise high level of security With lower security rank two kinds;Can also comprise N kind, wherein N level of security is minimum level of security.
In step 203, secure ID and network security level according to identified application determine current network Whether meet secure network access conditions.
Wherein, step 203 determining whether, the mode meeting the network insertion condition preset can be by following Step realizes:
In step 2031, when the secure ID of identified application is identical with network security level, determines and work as Front network meets secure network access conditions;
Or,
In step 2032, when the secure ID of identified application is less than network security level, determine current Network meets secure network access conditions.
Such as: the secure ID of identified application is: family, network security level is: work, the most then Show that the secure ID of identified application is higher than network security level, and do not meet above-mentioned two situations;
The secure ID of identified application is: work, and the second level of security is: work, the most then shown The secure ID of mark application is identical with network security level, meets the first situation;
The secure ID of identified application is: work, the second level of security is: family, the most then shown The secure ID of mark application, less than network security level, meets the second situation.
Above two mode can be arranged in same network jointly, it is also possible to chooses in above two mode A kind of mode be arranged in network, the mode of setting does not limit.
In step 204, if current network meets secure network access conditions, then identified application is allowed Carry out network access.
Wherein, identified application is set allows to carry out the mode of network access and can be: keep being currently accessed The connection status of network, and when receiving the network request that identified application sends, by terminal This network request is processed by WIFI link block normally, to realize the data transmission of identified application.
In step 205, if current network not met secure network access conditions, then identified answering is forbidden With carrying out network access.
Wherein, identified application is set allows to carry out the mode of network access and can be: the net that will be currently accessed The network connection of network turns off;Or, when receiving the network request that identified application sends, not This network request is processed, and the instruction returned operation failure to identified application, identified apply After receiving the instruction of operation failure, the operation interface of identified application is ejected prompting, to point out use Carry out corresponding network after the more switching network of family again and access operation.
Disclosure embodiment is by when detecting that identified application meets analysis condition, according to identified Secure ID and the network security level of application determine whether that identified application carries out network access.Improve The safety of the user data in identified application, reduces the risk that user data is held as a hostage.
Disclosure another exemplary embodiment provides a kind of method that network accesses, and this method embodiment is applied In terminal, seeing Fig. 3, method flow includes:
In step 301, monitor whether identified application meets analysis condition;
In step 302, when identified application meets analysis condition, obtain current network corresponding Network security level.
Owing to there is the situation of the Network Access Point being not provided with level of security.Obtain current the most in this step During the level of security of the Network Access Point accessed, detect that the Network Access Point of access is not provided with safe level Time other, then the Network Access Point for being currently accessed arranges lowest security level.And this Network Access Point is corresponding SSID and the other corresponding relation of minimum security level preserve.
In step 303, if current network is not provided with network security level, then it is corresponding that current network is set Network security level be N level of security, wherein N level of security is minimum level of security.
Now, it is lowest security level by the network settings of unknown network level of security.
In step 304, secure ID and network security level according to identified application determine current network Whether meet secure network access conditions.
In step 305, if current network meets secure network access conditions, then identified application is allowed Carry out network access.
Within step 306, if current network not met secure network access conditions, then identified answering is forbidden With carrying out network access.
Disclosure embodiment is by when detecting that identified application meets analysis condition, according to identified Secure ID and the network security level of application determine whether that identified application carries out network access.Improve The safety of the user data in identified application, reduces the risk that user data is held as a hostage.
Disclosure another exemplary embodiment provides a kind of method that network accesses, and this method embodiment is applied In terminal, seeing Fig. 4, method flow includes:
In step 401, if detecting during accessing terminal to network that current network is not provided with network security level, Then point out the network security level of user setup current network.
In the disclosed embodiments, also include a kind of prompting user setup safe level method for distinguishing, detecting When current network is not provided with network security level, eject setting options to point out the net of user setup current network Network level of security.Wherein, setting options include each level of security preset.
In step 402, the network security level of the current network of user setup is received;
In step 403, network security level and the mark of current network of the current network of user setup are preserved The corresponding relation known.
Disclosure embodiment is by detecting current network when access network, if being not provided with network peace Full rank then points out user to be configured, and by the network security level of user setup and this network of network mark Know and preserve.
Corresponding to the device of the network access that above-mentioned exemplary embodiment provides, disclosure another exemplary is implemented Example provides the device that a kind of network accesses, and sees Fig. 5, and this device includes:
Monitoring modular 501, is configured to monitor whether identified application meets analysis condition;
Acquisition module 502, is configured as identified application when meeting analysis condition, obtains current network Corresponding network security level;
Determine module 503, be configured to the secure ID according to identified application and network security level determines and works as Whether front network meets secure network access conditions;
First control module 504, is configured to when current network meets secure network access conditions, it is allowed to Mark application carries out network access.
Wherein, as shown in Figure 6, monitoring modular 501, including:
First determines unit 5011, when being configured as monitoring identified application startup, determines identified answering With meeting analysis condition;
Second determines unit 5012, when being configured as monitoring identified application initiation network access, determines Identified application meets analysis condition.
Wherein, acquisition module 502 is configured to:
If current network is not provided with network security level, then the network security level that current network is corresponding is set Being N level of security, wherein N level of security is minimum level of security.
Wherein, as it is shown in fig. 7, determine module 503, including:
3rd determines unit 5031, is configured as secure ID and the network security level phase of identified application Meanwhile, determine that current network meets secure network access conditions;
4th determines unit 5032, is configured as the secure ID of identified application less than network security level Time, determine that current network meets secure network access conditions.
Wherein, device also includes:
Second control module 505, if being configured to current network not met secure network access conditions, then prohibits Only identified application carries out network access.
Wherein, device also includes:
Reminding module 506, is configured to when accessing terminal to network detect that current network is not provided with network security During rank, the network security level of prompting user setup current network;
Receiver module 507, is configured to receive the network security level of the current network of user setup;
Preserve module 508, be configured to the network security level preserving the current network of user setup and current net The corresponding relation of the mark of network.
Disclosure embodiment is by when detecting that identified application meets analysis condition, according to identified Secure ID and the network security level of application determine whether that identified application carries out network access.Improve The safety of the user data in identified application, reduces the risk that user data is held as a hostage.
Corresponding to the device of the network access that above-mentioned exemplary embodiment provides, disclosure another exemplary is implemented Example provides the device 800 that a kind of network accesses, and sees Fig. 8.Such as, device 800 can be mobile phone, Computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, Body-building equipment, personal digital assistant etc..
With reference to Fig. 8, device 800 can include following one or more assembly: processes assembly 802, memorizer 804, electric power assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface of input/output (I/O) 812, sensor cluster 814, and communications component 816.
Process assembly 802 and generally control the integrated operation of device 800, such as with display, call, number The operation being associated according to communication, camera operation and record operation.Process assembly 802 and can include one or many Individual processor 820 performs instruction, to complete all or part of step of above-mentioned method.Additionally, process Assembly 802 can include one or more module, it is simple to process between assembly 802 and other assemblies is mutual. Such as, process assembly 802 and can include multi-media module, to facilitate multimedia groupware 808 and to process assembly Mutual between 802.
Memorizer 804 is configured to store various types of data to support the operation at equipment 800.These The example of data includes any application program for operation on device 800 or the instruction of method, contact person Data, telephone book data, message, picture, video etc..Memorizer 804 can be by any kind of volatile Property or non-volatile memory device or combinations thereof realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), Erasable Programmable Read Only Memory EPROM (EPROM), Programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash memory, Disk or CD.
The various assemblies that electric power assembly 806 is device 800 provide electric power.Electric power assembly 806 can include electricity Management system, one or more power supplys, and other generate, manage and distribute electric power phase with for device 800 The assembly of association.
The screen of one output interface of offer that multimedia groupware 808 is included between device 800 and user. In certain embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen Curtain includes that touch panel, screen may be implemented as touch screen, to receive the input signal from user.Touch Touch panel and include that one or more touch sensor is with the gesture on sensing touch, slip and touch panel.Touch Touch sensor and can not only sense touch or the border of sliding action, but also detect and touch or slide Relevant persistent period and pressure.In certain embodiments, multimedia groupware 808 includes a preposition shooting Head and/or post-positioned pick-up head.When equipment 800 is in operator scheme, during such as screening-mode or video mode, front Put photographic head and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and rearmounted Photographic head can be a fixing optical lens system or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.Such as, audio-frequency assembly 810 includes One mike (MIC), when device 800 is in operator scheme, such as call model, logging mode and voice During recognition mode, mike is configured to receive external audio signal.The audio signal received can be entered One step is stored in memorizer 804 or sends via communications component 816.In certain embodiments, audio-frequency assembly 810 also include a speaker, are used for exporting audio signal.
I/O interface 812 provides interface, above-mentioned peripheral interface for processing between assembly 802 and peripheral interface module Module can be keyboard, puts striking wheel, button etc..These buttons may include but be not limited to: home button, sound Amount button, start button and locking press button.
Sensor cluster 814 includes one or more sensor, for providing various aspects for device 800 State estimation.Such as, what sensor cluster 814 can detect equipment 800 opens/closed mode, assembly Relative localization, such as assembly is display and the keypad of device 800, and sensor cluster 814 is all right Detection the device 800 or position change of 800 1 assemblies of device, existence that user contacts with device 800 or Do not exist, device 800 orientation or acceleration/deceleration and the variations in temperature of device 800.Sensor cluster 814 can To include proximity transducer, it is configured to when there is no any physical contact object near detecting. Sensor cluster 814 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 814 can also include acceleration transducer, Gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to facilitate the logical of wired or wireless mode between device 800 and other equipment Letter.Device 800 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or they Combination.In one exemplary embodiment, communications component 816 receives wide from outside via broadcast channel The broadcast singal of broadcast management system or broadcast related information.In one exemplary embodiment, communications component 816 Also include near-field communication (NFC) module, to promote junction service.Such as, can be based on penetrating in NFC module Frequency identifies (RFID) technology, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, indigo plant Tooth (BT) technology and other technologies realize.
In the exemplary embodiment, device 800 can by one or more application specific integrated circuits (ASIC), Digital signal processor (DSP), digital signal processing appts (DSPD), PLD (PLD), Field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components are real Existing, it is used for performing said method.
In the exemplary embodiment, a kind of non-transitory computer-readable storage medium including instruction is additionally provided Matter, such as, include the memorizer 804 of instruction, and above-mentioned instruction can be performed by the processor 820 of device 800 with complete Become said method.Such as, non-transitory computer-readable recording medium can be ROM, random access memory Device (RAM), CD-ROM, tape, floppy disk and optical data storage devices etc..
Disclosure embodiment is by when detecting that identified application meets analysis condition, according to identified Secure ID and the network security level of application determine whether that identified application carries out network access.Improve The safety of the user data in identified application, reduces the risk that user data is held as a hostage.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to these public affairs Other embodiment opened.The application is intended to any modification, purposes or the adaptations of the disclosure, These modification, purposes or adaptations are followed the general principle of the disclosure and include that the disclosure is not disclosed Common knowledge in the art or conventional techniques means.Description and embodiments is considered only as exemplary , the true scope of the disclosure and spirit are pointed out by claim below.
It should be appreciated that the invention is not limited in accurate knot described above and illustrated in the accompanying drawings Structure, and various modifications and changes can carried out without departing from the scope.The scope of the present invention is only by appended Claim limits.

Claims (13)

1. the method that a network accesses, it is characterised in that described method includes:
Monitor whether identified application meets analysis condition;
When described identified application meets analysis condition, obtain the network security level that current network is corresponding Not;
Secure ID and described network security level according to described identified application determine that described current network is No meet secure network access conditions;
If described current network meets secure network access conditions, then described identified application is allowed to carry out net Network accesses.
Method the most according to claim 1, it is characterised in that the identified application of described monitoring is the fullest Foot analysis condition, including:
When monitoring identified application and starting, determine that described identified application meets analysis condition;
Or,
When monitoring identified application and initiating network access, determine that described identified application meets analysis Condition.
Method the most according to claim 1, it is characterised in that the net that described acquisition current network is corresponding Network level of security, including:
If current network is not provided with network security level, then the network security that described current network is corresponding is set Rank is N level of security, and wherein said N level of security is minimum level of security.
Method the most according to claim 1, it is characterised in that described according to described identified application Secure ID and described network security level determine whether described current network meets secure network access conditions, Including:
When the secure ID of described identified application is identical with described network security level, determine described currently Network meets secure network access conditions;
Or,
When the secure ID of described identified application is less than described network security level, determine described current net Network meets secure network access conditions.
Method the most according to claim 1, it is characterised in that described according to described identified application Secure ID and described network security level determine described current network whether meet secure network access conditions it After, described method also includes:
If described current network not met secure network access conditions, then forbid that described identified application is carried out Network accesses.
Method the most according to claim 1, it is characterised in that described method also includes:
If detecting during accessing terminal to network that current network is not provided with network security level, then prompting user sets Put the network security level of described current network;
Receive the network security level of the described current network of described user setup;
Preserve the network security level of the described current network of described user setup and the mark of described current network Corresponding relation.
7. the device that a network accesses, it is characterised in that described device includes:
Monitoring modular, is used for monitoring whether identified application meets analysis condition;
Acquisition module, for when described identified application meets analysis condition, obtains current network pair The network security level answered;
Determine module, for determining according to secure ID and the described network security level of described identified application Whether described current network meets secure network access conditions;
First control module, for when described current network meets secure network access conditions, it is allowed to described Identified application carries out network access.
Device the most according to claim 7, it is characterised in that described monitoring modular, including:
First determines unit, for when monitoring identified application and starting, determines that described identified application is full Foot analysis condition;
Second determines unit, for when monitor identified application initiate network access time, determine described in mark Know application and meet analysis condition.
Device the most according to claim 7, it is characterised in that described acquisition module is used for:
If current network is not provided with network security level, then the network security that described current network is corresponding is set Rank is N level of security, and wherein said N level of security is minimum level of security.
Device the most according to claim 7, it is characterised in that described determine module, including:
3rd determines unit, is used for the secure ID when described identified application and described network security level phase Meanwhile, determine that described current network meets secure network access conditions;
4th determines unit, for the secure ID when described identified application less than described network security level Time, determine that described current network meets secure network access conditions.
11. devices according to claim 7, it is characterised in that described device also includes:
Second control module, is used for, if for described current network not met secure network access conditions, Then forbid that described identified application carries out network access.
12. devices according to claim 7, it is characterised in that described device also includes:
Reminding module, in time detecting that current network is not provided with network security level when accessing terminal to network, The network security level of current network described in prompting user setup;
Receiver module, for receiving the network security level of the described current network of described user setup;
Preserve module, for preserving the network security level of the described current network of described user setup with described The corresponding relation of the mark of current network.
The device that 13. 1 kinds of networks access, it is characterised in that including:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
Monitor whether identified application meets analysis condition;
When described identified application meets analysis condition, obtain the network security level that current network is corresponding Not;
Secure ID and described network security level according to described identified application determine that described current network is No meet secure network access conditions;
If described current network meets secure network access conditions, then described identified application is allowed to carry out net Network accesses.
CN201510101198.7A 2015-03-06 2015-03-06 Network access method and network access device Pending CN105991626A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510101198.7A CN105991626A (en) 2015-03-06 2015-03-06 Network access method and network access device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510101198.7A CN105991626A (en) 2015-03-06 2015-03-06 Network access method and network access device

Publications (1)

Publication Number Publication Date
CN105991626A true CN105991626A (en) 2016-10-05

Family

ID=57040135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510101198.7A Pending CN105991626A (en) 2015-03-06 2015-03-06 Network access method and network access device

Country Status (1)

Country Link
CN (1) CN105991626A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106656756A (en) * 2016-12-15 2017-05-10 北京容联光辉科技有限公司 Operation method and device of instant messaging software
CN106714173A (en) * 2016-11-30 2017-05-24 北京小米移动软件有限公司 Reminding method and device for network security
CN108076501A (en) * 2018-01-24 2018-05-25 维沃移动通信有限公司 A kind of Wi-Fi network connection management method and mobile terminal
CN110413372A (en) * 2019-06-20 2019-11-05 中国科学院信息工程研究所 A kind of web services middleware extended method for supporting service security to mark

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621523A (en) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 User security access control method as well as device and system thereof
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
US20130067535A1 (en) * 2011-09-08 2013-03-14 Pantech Co., Ltd. Apparatus and method for controlling a network connection
CN103312682A (en) * 2012-03-16 2013-09-18 中兴通讯股份有限公司 Method and system for accessing gateway safely
CN103581156A (en) * 2012-08-09 2014-02-12 中铁信息计算机工程有限责任公司 Trusted network and operating method thereof

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101621523A (en) * 2009-07-22 2010-01-06 中兴通讯股份有限公司 User security access control method as well as device and system thereof
CN102573107A (en) * 2010-11-22 2012-07-11 三星电子株式会社 Apparatus and method for connecting an access point in portable terminal
US20130067535A1 (en) * 2011-09-08 2013-03-14 Pantech Co., Ltd. Apparatus and method for controlling a network connection
CN103312682A (en) * 2012-03-16 2013-09-18 中兴通讯股份有限公司 Method and system for accessing gateway safely
CN103581156A (en) * 2012-08-09 2014-02-12 中铁信息计算机工程有限责任公司 Trusted network and operating method thereof

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106714173A (en) * 2016-11-30 2017-05-24 北京小米移动软件有限公司 Reminding method and device for network security
CN106656756A (en) * 2016-12-15 2017-05-10 北京容联光辉科技有限公司 Operation method and device of instant messaging software
CN106656756B (en) * 2016-12-15 2019-09-13 北京容联光辉科技有限公司 The operation method and device of instant message applications
CN108076501A (en) * 2018-01-24 2018-05-25 维沃移动通信有限公司 A kind of Wi-Fi network connection management method and mobile terminal
CN110413372A (en) * 2019-06-20 2019-11-05 中国科学院信息工程研究所 A kind of web services middleware extended method for supporting service security to mark

Similar Documents

Publication Publication Date Title
EP2975821B1 (en) Network connection method and apparatus
CN106603667B (en) Screen information sharing method and device
CN105357734B (en) The method and device of control access WIFI hot spot
EP3179397A1 (en) Methods and devices for managing automatic parallel login and logout in several applications
WO2016095448A1 (en) Equipment networking method and apparatus
EP3068154A1 (en) Method and apparatus for setting smart device management account
CN104506491B (en) Personal data accounts management method and device
CN106331761A (en) Live broadcast list display method and apparatuses
CN107666583B (en) Call processing method and terminal
CN105323244A (en) Method and device for network identification
CN108052822B (en) Terminal control method, device and system
EP3136697A1 (en) Contact record processing method and apparatus
CN104933419A (en) Method and device for obtaining iris images and iris identification equipment
CN106060257A (en) Method and device for viewing relevant information of contact
CN106101456A (en) A kind of method and device of call contact
CN105991626A (en) Network access method and network access device
CN105392141A (en) Device control method and device
CN106101600A (en) The method of attachment of video calling and device
CN106130873A (en) Information processing method and device
CN109040651B (en) Video communication method and device
CN104539497B (en) Method for connecting network and device
CN105512542B (en) Data inputting method and device
CN106506808B (en) Method and device for prompting communication message
CN110913276B (en) Data processing method, device, server, terminal and storage medium
CN107203964A (en) Image processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005