CN106211164A - Terminal network changing method, terminal network switching device and terminal - Google Patents
Terminal network changing method, terminal network switching device and terminal Download PDFInfo
- Publication number
- CN106211164A CN106211164A CN201610613460.0A CN201610613460A CN106211164A CN 106211164 A CN106211164 A CN 106211164A CN 201610613460 A CN201610613460 A CN 201610613460A CN 106211164 A CN106211164 A CN 106211164A
- Authority
- CN
- China
- Prior art keywords
- network environment
- terminal
- application program
- safe class
- switched over
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a kind of terminal network changing method, terminal network switching device and terminal, wherein, terminal network changing method includes: the safe class of the application program being currently running in detection terminal;Safe class according to described application program, it is determined whether the network environment that described terminal is current is switched over.Pass through technical scheme so that the network environment of terminal matches with the safe class of application program, it is ensured that application program can operate under safe network environment, save data traffic as much as possible simultaneously.
Description
Technical field
The present invention relates to field of terminal technology, in particular to a kind of terminal network changing method, a kind of terminal network
Switching device and a kind of terminal.
Background technology
Along with Wi-Fi brings increasingly enriching experiences, various public places invariably to provide free to the life of people
Wi-Fi service, but it is to steal privacy of user data and private property and set that the free Wi-Fi of part is likely to hacker
" trap ", specifically, in Wi-Fi environment, hacker can build the Wi-Fi trap not setting password, lures that user is by terminal even into
Receive these traps, then by information datas such as all kinds of accounts of software grabs user, passwords, it is seen that current Wi-Fi net
There is huge potential safety hazard in network, especially when running some application programs relating to user sensitive information in terminal, it is impossible to really
Protect it to be under safe network environment.
Therefore, how to guarantee application program to operate under safe network environment to become technical problem urgently to be resolved hurrily.
Summary of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new terminal network handover scheme, makes
The safe class of the network environment and application program that obtain terminal matches, it is ensured that application program can operate in safe network
Under environment.
In view of this, the present invention proposes a kind of terminal network changing method, including: be currently running in detection terminal should
By the safe class of program;Safe class according to described application program, it is determined whether the network environment current to described terminal
Switch over.
In this technical scheme, the safe class of the application program by being currently running in detection terminal, and according to application
The safe class of program, it is determined whether the network environment that terminal is current is switched over so that the networked environments at terminal place with
The level of security of application program matches, it is ensured that application program can operate under safe network environment.
In technique scheme, it is preferable that described network environment includes data network environment and wireless network environment.
In any of the above-described technical scheme, it is preferable that when described terminal is currently at described wireless network environment, institute
State the safe class according to described application program, it is determined whether the step that the network environment that described terminal is current is switched over,
Specifically include: when described application program is the first safe class, determines and described wireless network environment is switched over, and by institute
State wireless network environment and switch to described data network environment;When described application program is the second safe class, detection is described
Whether the current access point of terminal is target access;When the current access point of described terminal is described target access, really
Determine described wireless network environment not to be switched over;When the current access point of described terminal is not described target access, really
Determine described wireless network environment is switched over, and described wireless network environment is switched to described data network environment;When really
When fixed described application program is three safe class, determines and described wireless network environment is not switched over.
In this technical scheme, time under terminal is in wireless network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now wireless network environment is switched to data network environment, answer to meet to a greater extent
With the program security requirement to network environment, it is that (the second safe class is relative to first for the second safe class at application program
Safe class is relatively low to the security requirement of network environment) time, now if it is determined that the current access point of terminal is target access
(target access can be the appointment access point that level of security that user pre-sets is higher), it is determined that not to wireless network ring
Border switches over, however, it is determined that the current access point of terminal is not target access, it is determined that switch over wireless network environment,
Both met the application program security requirement to network environment, and saved data traffic as much as possible simultaneously, at application program be
During the 3rd safe class (the 3rd safe class is lower to the security requirement of network environment relative to the second safe class), now
Determine and wireless network environment is not switched over, save data traffic to a greater extent.
In any of the above-described technical scheme, it is preferable that when described terminal is currently under described data network environment,
The described safe class according to described application program, it is determined whether the step that the network environment that described terminal is current is switched over
Suddenly, specifically include: when described application program is the first safe class, determine and described data network environment is not switched over;
When described application program is the second safe class, when described terminal detects target access, determine described data network
Environment switches over, and points out user to access described target access, when described terminal is not detected by described target access,
Determine and described data network environment is not switched over;When described application program is three safe class, determine described number
Switch over according to network environment.
In this technical scheme, time under terminal is in data network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now determine and data network environment is not switched over, to meet application journey to a greater extent
The security requirement of ordered pair network environment, is that (the second safe class is relative to the first safety for the second safe class at application program
Grade is relatively low to the security requirement of network environment) time, now detect that (target access can be target access in terminal
The appointment access point that level of security that user pre-sets is higher) time, determine and data network environment is switched over, and point out use
Target access is accessed at family, accesses mesh with the access information of the access information inputted according to user or the target access of pre-stored
Tag splice access point, had both met the application program security requirement to network environment, saved data traffic as much as possible simultaneously, was answering
It is that (the 3rd safe class is relative to the second safe class to the security requirement of network environment more for the 3rd safe class by program
Low) time, now determine and data network environment is switched over, to save data traffic to a greater extent, certainly determining logarithm
When switching over according to network, terminal can detect the satisfied access point presetting access conditions and (preset access conditions and include that access point sets
Be equipped with password authentification, access point has the identification information specified, such as APN etc.), and point out user access meet preset connect
Enter the access point of condition, and avoid accessing the access point of some safeties relatively low (being such as not provided with password authentification).
In any of the above-described technical scheme, it is preferable that the peace of the application program being currently running in described detection terminal
Before the step of congruence level, also include: receiving when arranging instruction of the safe class to described application program, arrange described
The safe class of application program.
In this technical scheme, by receiving when arranging instruction of the safe class to application program, application is set
The safe class of program so that user can be arranged safe class for the application program in terminal according to actually used demand, carry
Rise the experience of user.
According to the second aspect of the invention, it is proposed that a kind of terminal network switching device, including: detector unit, it is used for examining
Survey the safe class of the application program being currently running in terminal;Processing unit, for the safe class according to described application program,
Determine whether that the network environment to described terminal is current switches over.
In this technical scheme, the safe class of the application program by being currently running in detection terminal, and according to application
The safe class of program, it is determined whether the network environment that terminal is current is switched over so that the networked environments at terminal place with
The level of security of application program matches, it is ensured that application program can operate under safe network environment.
In technique scheme, it is preferable that described network environment includes data network environment and wireless network environment.
In any of the above-described technical scheme, it is preferable that when described terminal is currently at described wireless network environment, institute
State processing unit specifically for: when described application program is the first safe class, determines and described wireless network environment carried out
Switching, and described wireless network environment is switched to described data network environment;When described application program is the second safe class
Time, whether the current access point detecting described terminal is target access;It is described target in the current access point of described terminal
During access point, determine and described wireless network environment is not switched over;It not described target in the current access point of described terminal
During access point, determine and described wireless network environment is switched over, and described wireless network environment is switched to described data network
Network environment;When described application program is three safe class, determines and described wireless network environment is not switched over.
In this technical scheme, time under terminal is in wireless network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now wireless network environment is switched to data network environment, answer to meet to a greater extent
With the program security requirement to network environment, determine application program be the second safe class (the second safe class relative to
First safe class is relatively low to the security requirement of network environment), now if it is determined that the current access point of terminal is target access
During point (target access can be the appointment access point that level of security that user pre-sets is higher), it is determined that not to wireless network
Network environment switches over, however, it is determined that when the current access point of terminal is not target access, it is determined that enter wireless network environment
Row switching, had both met the application program security requirement to network environment, saved data traffic as much as possible simultaneously, in application
Program is the 3rd safe class (the 3rd safe class is lower to the security requirement of network environment relative to the second safe class)
Time, now determine and wireless network environment is not switched over, save data traffic to a greater extent.
In any of the above-described technical scheme, it is preferable that when described terminal is currently under described data network environment,
Described processing unit specifically for: when described application program is the first safe class, determine not to described data network environment
Switch over;When described application program is the second safe class, when described terminal detects target access, determine described
Data network environment switches over, and points out user to access described target access, is not detected by described target in described terminal
During access point, determine and described data network environment is not switched over;When described application program is three safe class, determine
Described data network environment is switched over.
In this technical scheme, time under terminal is in data network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now determine and data network environment is not switched over, to meet application journey to a greater extent
The security requirement of ordered pair network environment, is that (the second safe class is relative to the first safety for the second safe class at application program
Grade is relatively low to the security requirement of network environment) time, now detect that (target access can be target access in terminal
The appointment access point that level of security that user pre-sets is higher) time, determine and data network environment is switched over, and point out use
Target access is accessed at family, accesses mesh with the access information of the access information inputted according to user or the target access of pre-stored
Tag splice access point, had both met the application program security requirement to network environment, saved data traffic as much as possible simultaneously, was answering
It is that (the 3rd safe class is relative to the second safe class to the security requirement of network environment more for the 3rd safe class by program
Low) time, now determine and data network environment is switched over, to save data traffic to a greater extent, certainly determining logarithm
When switching over according to network, terminal can detect the satisfied access point presetting access conditions and (preset access conditions and include that access point sets
Be equipped with password authentification, access point has the identification information specified, such as APN etc.), and point out user access meet preset connect
Enter the access point of condition, and avoid accessing the access point of some safeties relatively low (being such as not provided with password authentification).
In any of the above-described technical scheme, it is preferable that also include: arrange unit, for receiving described application
When arranging instruction of the safe class of program, arranges the safe class of described application program.
In this technical scheme, by receiving when arranging instruction of the safe class to application program, application is set
The safe class of program so that user can be arranged safe class for the application program in terminal according to actually used demand, carry
Rise the experience of user.
According to the third aspect of the invention we, it is proposed that a kind of terminal, including: as according to any one of technique scheme
Terminal network switching device.
By above technical scheme so that the network environment of terminal matches with the safe class of application program, it is ensured that
Application program can operate under safe network environment, saves data traffic as much as possible simultaneously.
Accompanying drawing explanation
Fig. 1 shows the schematic flow diagram of terminal network changing method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of terminal network switching device according to an embodiment of the invention;
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention;
Fig. 4 shows the schematic block diagram of terminal according to another embodiment of the invention;
Fig. 5 shows the schematic flow diagram of terminal network changing method according to another embodiment of the invention.
Detailed description of the invention
In order to be more clearly understood that the above-mentioned purpose of the present invention, feature and advantage, real with concrete below in conjunction with the accompanying drawings
The present invention is further described in detail by mode of executing.It should be noted that in the case of not conflicting, the enforcement of the application
Feature in example and embodiment can be mutually combined.
Elaborate a lot of detail in the following description so that fully understanding the present invention, but, the present invention also may be used
Implementing to use other to be different from other modes described here, therefore, protection scope of the present invention is not by described below
The restriction of specific embodiment.
Fig. 1 shows the schematic flow diagram of terminal network changing method according to an embodiment of the invention.
As it is shown in figure 1, terminal network changing method according to an embodiment of the invention, including:
Step 102, the safe class of the application program being currently running in detection terminal.
Step 104, according to the safe class of described application program, it is determined whether enter the network environment that described terminal is current
Row switching.Wherein, described network environment includes data network environment and wireless network environment.When there being multiple different safety class
When application program runs simultaneously, can be according to the highest application program of level of security, it is determined whether the network environment current to terminal
Switch over, or (according to selected application program specifically, can show and include the selection of multiple application programs being currently running
Interface, according to receive selection operation, determine selected application program) level of security determine whether the net current to terminal
Network environment switches over.
The safe class of the application program by being currently running in detection terminal, and according to the safe class of application program,
Determine whether that the network environment to terminal is current switches over, so that the networked environments at terminal place and the safe level of application program
Do not match, it is ensured that application program can operate under safe network environment.
Preferably, when described terminal is currently at described wireless network environment, step 104 specifically includes: answer when described
When being the first safe class by program, determine and described wireless network environment is switched over, and described wireless network environment is cut
It is changed to described data network environment;When described application program is the second safe class, detect the current access point of described terminal
Whether it is target access;When the current access point of described terminal is described target access, determine not to described wireless network
Network environment switches over;When the current access point of described terminal is not described target access, determine described wireless network
Environment switches over, and described wireless network environment is switched to described data network environment;When described application program is the 3rd
During safe class, determine and described wireless network environment is not switched over.
In this technical scheme, time under terminal is in wireless network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher), now wireless network environment is switched to data network environment, to meet application to a greater extent
The program security requirement to network environment, is that (the second safe class is relative to the first peace for the second safe class at application program
Congruence level is relatively low to the security requirement of network environment), now if it is determined that the current access point of terminal is target access (target
Access point can be the appointment access point that level of security that user pre-sets is higher) time, determine wireless network environment not to be entered
Row switching, however, it is determined that when the current access point of terminal is not target access, determines and wireless network environment is switched over, both full
The foot application program security requirement to network environment, saves data traffic as much as possible simultaneously, is the 3rd at application program
During safe class (the 3rd safe class is lower to the security requirement of network environment relative to the second safe class), now determine
Wireless network environment is not switched over, save data traffic to a greater extent.
Preferably, when described terminal is currently under described data network environment, step 104 specifically includes: when described
When application program is the first safe class, determines and described data network environment is not switched over;When described application program is
Two safe classes, when described terminal detects target access, determine and switch over described data network environment, and point out
User accesses described target access;When described terminal is not detected by described target access, determine not to described data network
Network environment switches over;When described application program is three safe class, determines and described data network environment is switched over.
In this technical scheme, time under terminal is in data network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is determining that application program is that (the first safe class is to net for the first safe class
The security requirement of network environment is higher), now determine and data network environment is not switched over, to meet application to a greater extent
The program security requirement to network environment, is determining that application program is that (the second safe class is relative to for the second safe class
One safe class is relatively low to the security requirement of network environment), (target access can now target access to be detected in terminal
To be the appointment access point that level of security that user pre-sets is higher) time, determine and data network environment is switched over, and carry
Show that user accesses target access, connect with the access information of the access information inputted according to user or the target access of pre-stored
Enter target access, both met the application program security requirement to network environment, save data traffic as much as possible simultaneously,
It is that (the 3rd safe class is relative to the security requirement to network environment of second safe class for the 3rd safe class at application program
Lower) time, now determine and data network environment switched over, to save data traffic to a greater extent, certainly determine right
When data network switches over, terminal can detect the satisfied access point presetting access conditions and (preset access conditions and include access point
Be provided with password authentification, access point has the identification information specified, such as APN etc.), and point out user to access satisfied presetting
The access point of access conditions, and avoid accessing the access point of some safeties relatively low (being such as not provided with password authentification)
In any of the above-described technical scheme, it is preferable that also include: receiving the safe class to described application program
When instruction is set, the safe class of described application program is set.
In this technical scheme, by receiving when arranging instruction of the safe class to application program, application is set
The safe class of program so that user can be arranged safe class for the application program in terminal according to actually used demand, carry
Rise the experience of user.
Fig. 2 shows the schematic block diagram of terminal network switching device according to an embodiment of the invention.
As in figure 2 it is shown, terminal network switching device 200 according to an embodiment of the invention, including: detector unit 202 He
Processing unit 204.
Wherein, detector unit 202 is for detecting the safe class of the application program being currently running in terminal;Processing unit
204 for the safe class according to described application program, it is determined whether switch over the network environment that described terminal is current.Its
In, described network environment includes data network environment and wireless network environment.
The safe class of the application program by being currently running in detection terminal, and according to the safe class of application program,
Determine whether that the network environment to terminal is current switches over, so that the networked environments at terminal place and the safe level of application program
Do not match, it is ensured that application program can operate under safe network environment.Wherein, when there being multiple different safety class
When application program runs, according to the application program that level of security is the highest, it is determined whether the network environment that terminal is current is entered simultaneously
Row switching, or (according to selected application program specifically, can show and include selection circle of multiple application programs being currently running
Face, according to receive selection operation, determine selected application program) level of security determine whether the network current to terminal
Environment switches over.
Preferably, when described terminal is currently at described wireless network environment, described processing unit 204 specifically for:
When described application program is the first safe class, determines and described wireless network environment is switched over, and by described wireless network
Network environment changing is described data network environment;When described application program is the second safe class, detect working as of described terminal
Whether front access point is target access;When the current access point of described terminal is described target access, determine not to institute
State wireless network environment to switch over;When the current access point of described terminal is not described target access, determine described
Wireless network environment switches over, and described wireless network environment is switched to described data network environment;When described application journey
When sequence is three safe class, determines and described wireless network environment is not switched over.
In this technical scheme, time under terminal is in wireless network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now wireless network environment is switched to data network environment, answer to meet to a greater extent
With the program security requirement to network environment, it is that (the second safe class is relative to first for the second safe class at application program
Safe class is relatively low to the security requirement of network environment) time, now if it is determined that the current access point of terminal is target access
Time (target access can be the appointment access point that level of security that user pre-sets is higher), determine not to wireless network ring
Border switches over, however, it is determined that when the current access point of terminal is not target access, determines and switches over wireless network environment,
Both met the application program security requirement to network environment, and saved data traffic as much as possible simultaneously, at application program be
During the 3rd safe class (the 3rd safe class is lower to the security requirement of network environment relative to the second safe class), now
Determine and wireless network environment is not switched over, save data traffic to a greater extent.
Preferably, when described terminal is currently under described data network environment, described processing unit 204 is specifically used
In: when described application program is the first safe class, determines and described data network environment is not switched over;When described application
Program is the second safe class, when described terminal detects target access, determines and cuts described data network environment
Change, and point out user to access described target access, when described terminal is not detected by described target access, determine not to institute
State data network environment to switch over;When described application program is three safe class, determine described data network environment
Switch over.
In this technical scheme, time under terminal is in data network environment, the level of security of application program is different, and it is right
The network switchover policy answered also differs, and specifically, is that (the first safe class is to network rings for the first safe class at application program
The security requirement in border is higher) time, now determine and data network environment is not switched over, to meet application journey to a greater extent
The security requirement of ordered pair network environment, is that (the second safe class is relative to the first safety for the second safe class at application program
Grade is relatively low to the security requirement of network environment) time, now detect that (target access can be target access in terminal
The appointment access point that level of security that user pre-sets is higher) time, determine and data network environment is switched over, and point out use
Target access is accessed at family, accesses mesh with the access information of the access information inputted according to user or the target access of pre-stored
Tag splice access point, had both met the application program security requirement to network environment, saved data traffic as much as possible simultaneously, was answering
It is that (the 3rd safe class is relative to the second safe class to the security requirement of network environment more for the 3rd safe class by program
Low) time, now determine and data network environment is switched over, to save data traffic to a greater extent, certainly determining logarithm
When switching over according to network, terminal can detect the satisfied access point presetting access conditions and (preset access conditions and include that access point sets
Be equipped with password authentification, access point has the identification information specified, such as APN etc.), and point out user access meet preset connect
Enter the access point of condition, and avoid accessing the access point of some safeties relatively low (being such as not provided with password authentification).
In any of the above-described technical scheme, it is preferable that also include: unit 206 is set, for receive to described should
With when arranging instruction of the safe class of program, the safe class of described application program is set.
In this technical scheme, by receiving when arranging instruction of the safe class to application program, application is set
The safe class of program so that user can be arranged safe class for the application program in terminal according to actually used demand, carry
Rise the experience of user.
Fig. 3 shows the schematic block diagram of terminal according to an embodiment of the invention.
As it is shown on figure 3, terminal 300 according to an embodiment of the invention, including: terminal network as shown in Figure 2 is cut
Changing device 200.
Below in conjunction with Fig. 4 and Fig. 5, technical scheme is described further.
As shown in Figure 4, terminal 400 according to another embodiment of the invention, including: safe class arrange unit 402,
Network monitoring unit 404, decision unit 406 and network control unit 408.Wherein, safe class arranges unit 402 for arranging
The safe class of the application program in terminal;Network monitoring unit 404 is used for the network environment residing for monitor terminal, and to judgement
Unit 406 feedback network environmental information;Decision unit 406 is for judging the application program of current network environment and front stage operation
Safe class whether mate, then court verdict is fed back to network control unit 408;Network control unit 408 is for root
The switching of terminal networking is controlled according to court verdict.
Specifically, the handling process between above-mentioned modules, as it is shown in figure 5, include:
Step 502, arranges the safe class of application program.Specifically, user can be according to the purposes of used application program
Safe class is set.
Step 504, safe class arranges unit and the safe class of each application program is fed back to decision unit.
Step 506, user enables application program.
Step 508, network monitoring unit detects network environment and to decision unit feedback network environmental information.
Step 510, it is judged that whether network environment mates with the safe class of application program, the most then perform 512;Otherwise,
Perform step 514.
Step 512, it is allowed to terminal maintains original Wi-Fi network environment;
Step 514, is switched to data network environment.
In above process, in step 502, safe class arranges unit and can provide the user three kinds of hierarchical selection: point
Not Wei A (the i.e. first safe class), B (the i.e. second safe class), C (the i.e. the 3rd safe class), A level refers to unconditionally switch to
Data network environment (such as 4G network), C level then can allow user to use under the conditions of any secure Wi-Fi network, and B level
Mean that, when only terminal is connected to specific Wi-Fi Hotspot (i.e. access point), application program just can maintain current Wi-Fi
Run under environment, otherwise, also can switch to 4G network by force.Therefore when user certain application program arranged grade be B time, it is desirable to
SSID (Service Set Identifier, service set) and the password of Wi-Fi Hotspot trusty are provided.
In step 508, if network monitoring unit detects that terminal is in Wi-Fi network environment, network monitoring unit
Also will can connect the SSID of focus and cipher feedback to decision unit, the most neighbouring Wi-Fi Hotspot is scanned by timing,
The focus not having cryptoguard is carried out safety label, is used for reminding user that these focuses exist hidden danger.
In step 510, if it is 4G network that network monitoring unit detects current network environment, all application programs
Court verdict is all considered as coupling;If user is set to B to the protection class of application program, and terminal is in Wi-Fi even
Connect state, but with protection class B, the SSID of current Wi-Fi Hotspot and password require that the Wi-Fi protection information provided is inconsistent,
Court verdict will be regarded as not mating.
In step 510, if the protection class of the current application program run is B or C, for saving examining of flow
Considering, network monitoring unit will rescan neighbouring Wi-Fi Hotspot, and assess whether this focus meets current application program
Safety guarantee condition, if it is satisfied, terminal then can issue the user with use prompting.Such as, if the current application program run
Grade is C, and terminal is in 4G network state, and network monitoring unit will be searched for reliable Wi-Fi Hotspot and select for user.
In step 510, if the current application software grade run is A and B, network control unit can switch to by force
4G network.
In the above-described embodiments, safe class based on user setup application program, by monitoring network environment in real time also
Can interpolate that whether the current network conditions application program to calling exists potential safety hazard, it is possible in different degree of risk network rings
Handover network type in border, 4G Network Priority both can have been utilized to ensure, and user calls the application program that confidentiality is higher, thus is
The safety guarantee of terminal network environment sets up defence line, improves the guarantee dynamics of privacy of user and property safety, again can basis
The safe class of application program is searched for Wi-Fi Hotspot trusty and is used for user, reduces user for excessively using stream
The worry of amount, on the premise of preferential guarantee user terminal network safety, has taken into account the problem saving flow.
Technical scheme being described in detail above in association with accompanying drawing, technical scheme proposes a kind of new
Terminal network handover scheme so that the network environment of terminal matches with the safe class of application program, it is ensured that application program
Can operate under safe network environment, save data traffic as much as possible simultaneously.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for the skill of this area
For art personnel, the present invention can have various modifications and variations.All within the spirit and principles in the present invention, that is made any repaiies
Change, equivalent, improvement etc., should be included within the scope of the present invention.
Claims (11)
1. a terminal network changing method, it is characterised in that including:
The safe class of the application program being currently running in detection terminal;
Safe class according to described application program, it is determined whether the network environment that described terminal is current is switched over.
Terminal network changing method the most according to claim 1, it is characterised in that described network environment includes data network
Environment and wireless network environment.
Terminal network changing method the most according to claim 2, it is characterised in that be currently at described nothing in described terminal
During line network environment, the described safe class according to described application program, it is determined whether the network environment current to described terminal
The step switched over, specifically includes:
When described application program is the first safe class, determines and described wireless network environment is switched over, and by described nothing
Gauze network environment changing is described data network environment;
When described application program is the second safe class, whether the current access point detecting described terminal is target access;
When the current access point of described terminal is described target access, determines and described wireless network environment is not cut
Change;
When the current access point of described terminal is not described target access, determines and described wireless network environment is cut
Change, and described wireless network environment is switched to described data network environment;
When described application program is three safe class, determines and described wireless network environment is not switched over.
Terminal network changing method the most according to claim 2, it is characterised in that be currently at described number in described terminal
According to time under network environment, the described safe class according to described application program, it is determined whether the network rings current to described terminal
The step that border switches over, specifically includes:
When described application program is the first safe class, determines and described data network environment is not switched over;
When described application program is the second safe class, when described terminal detects target access, determine described data
Network environment switches over, and points out user to access described target access, is not detected by described target in described terminal and accesses
During point, determine and described data network environment is not switched over;
When described application program is three safe class, determines and described data network environment is switched over.
Terminal network changing method the most according to any one of claim 1 to 4, it is characterised in that in described detection eventually
Before the step of the safe class of the application program being currently running in end, also include:
Reception when the arranging instruction of safe class to described application program, the safe class of described application program is set.
6. a terminal network switching device, it is characterised in that including:
Detector unit, for detecting the safe class of the application program being currently running in terminal;
Processing unit, for the safe class according to described application program, it is determined whether the network environment current to described terminal
Switch over.
Terminal network switching device the most according to claim 6, it is characterised in that described network environment includes data network
Environment and wireless network environment.
Terminal network switching device the most according to claim 7, it is characterised in that be currently at described nothing in described terminal
During line network environment, described processing unit specifically for:
When described application program is the first safe class, determines and described wireless network environment is switched over, and by described nothing
Gauze network environment changing is described data network environment;
When described application program is the second safe class, whether the current access point detecting described terminal is target access;
When the current access point of described terminal is described target access, determines and described wireless network environment is not cut
Change;
When the current access point of described terminal is not described target access, determines and described wireless network environment is cut
Change, and described wireless network environment is switched to described data network environment;
When described application program is three safe class, determines and described wireless network environment is not switched over.
Terminal network switching device the most according to claim 7, it is characterised in that be currently at described number in described terminal
According to time under network environment, described processing unit specifically for:
When described application program is the first safe class, determines and described data network environment is not switched over;
When described application program is the second safe class, when described terminal detects target access, determine described data
Network environment switches over, and points out user to access described target access, is not detected by described target in described terminal and accesses
During point, determine and described data network environment is not switched over;
When described application program is three safe class, determines and described data network environment is switched over.
10. according to the terminal network switching device according to any one of claim 6 to 9, it is characterised in that also include:
Unit is set, for receiving when arranging instruction of the safe class to described application program, described application journey is set
The safe class of sequence.
11. 1 kinds of terminals, it is characterised in that including:
Terminal network switching device as according to any one of claim 6 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613460.0A CN106211164A (en) | 2016-07-28 | 2016-07-28 | Terminal network changing method, terminal network switching device and terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610613460.0A CN106211164A (en) | 2016-07-28 | 2016-07-28 | Terminal network changing method, terminal network switching device and terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106211164A true CN106211164A (en) | 2016-12-07 |
Family
ID=57496805
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610613460.0A Pending CN106211164A (en) | 2016-07-28 | 2016-07-28 | Terminal network changing method, terminal network switching device and terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106211164A (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107404740A (en) * | 2017-08-07 | 2017-11-28 | 广东欧珀移动通信有限公司 | Method for switching network, device and the terminal device of safety |
CN108093450A (en) * | 2018-01-08 | 2018-05-29 | 平安科技(深圳)有限公司 | A kind of method for switching network and terminal device |
CN108156598A (en) * | 2017-12-28 | 2018-06-12 | Tcl移动通信科技(宁波)有限公司 | Application control method and storage medium when mobile terminal and wifi switch |
CN108430083A (en) * | 2018-04-11 | 2018-08-21 | 维沃移动通信有限公司 | A kind of method and apparatus of network switching |
CN108616947A (en) * | 2018-04-11 | 2018-10-02 | 维沃移动通信有限公司 | A kind of method and apparatus of network switching |
CN108924911A (en) * | 2018-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of starting wifi hotspot shares the method and device of network |
CN109587053A (en) * | 2018-12-28 | 2019-04-05 | Oppo广东移动通信有限公司 | Network shunt method and relevant device |
CN111356096A (en) * | 2020-02-24 | 2020-06-30 | 维沃移动通信有限公司 | Information sending method and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
CN105282149A (en) * | 2015-09-16 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, device, and terminal, and data transmission method, device and terminal |
CN105636142A (en) * | 2015-07-16 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data communication network selection method and system |
-
2016
- 2016-07-28 CN CN201610613460.0A patent/CN106211164A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
CN105636142A (en) * | 2015-07-16 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Data communication network selection method and system |
CN105282149A (en) * | 2015-09-16 | 2016-01-27 | 宇龙计算机通信科技(深圳)有限公司 | Data processing method, device, and terminal, and data transmission method, device and terminal |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107404740A (en) * | 2017-08-07 | 2017-11-28 | 广东欧珀移动通信有限公司 | Method for switching network, device and the terminal device of safety |
CN107404740B (en) * | 2017-08-07 | 2019-04-12 | Oppo广东移动通信有限公司 | Method for switching network, device and the terminal device of safety |
CN108156598A (en) * | 2017-12-28 | 2018-06-12 | Tcl移动通信科技(宁波)有限公司 | Application control method and storage medium when mobile terminal and wifi switch |
CN108156598B (en) * | 2017-12-28 | 2021-10-22 | Tcl移动通信科技(宁波)有限公司 | Mobile terminal, application control method during wifi switching and storage medium |
CN108093450A (en) * | 2018-01-08 | 2018-05-29 | 平安科技(深圳)有限公司 | A kind of method for switching network and terminal device |
WO2019134227A1 (en) * | 2018-01-08 | 2019-07-11 | 平安科技(深圳)有限公司 | Network switching method, computer readable storage medium, terminal apparatus, and device |
CN108430083B (en) * | 2018-04-11 | 2021-01-15 | 维沃移动通信有限公司 | Network switching method and device |
CN108430083A (en) * | 2018-04-11 | 2018-08-21 | 维沃移动通信有限公司 | A kind of method and apparatus of network switching |
CN108616947A (en) * | 2018-04-11 | 2018-10-02 | 维沃移动通信有限公司 | A kind of method and apparatus of network switching |
CN108924911A (en) * | 2018-07-27 | 2018-11-30 | 维沃移动通信有限公司 | A kind of starting wifi hotspot shares the method and device of network |
CN109587053A (en) * | 2018-12-28 | 2019-04-05 | Oppo广东移动通信有限公司 | Network shunt method and relevant device |
CN109587053B (en) * | 2018-12-28 | 2021-09-07 | Oppo广东移动通信有限公司 | Network shunting method and related equipment |
CN111356096A (en) * | 2020-02-24 | 2020-06-30 | 维沃移动通信有限公司 | Information sending method and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106211164A (en) | Terminal network changing method, terminal network switching device and terminal | |
CN104156657B (en) | The data inputting method of terminal, the message input device of terminal and terminal | |
KR101730357B1 (en) | Apparatus and method for connecting access point in portable terminal | |
US11418486B2 (en) | Method and system for controlling internet browsing user security | |
CN105260682B (en) | Method and device for protecting user privacy | |
RU2477520C1 (en) | System and method for device configuration-based dynamic adaptation of antivirus application functional | |
CN104244281A (en) | Base station detection method and base station detection device | |
CN106470115B (en) | Security configuration method, related device and system | |
CN106127030A (en) | A kind of interface control method and device | |
CN104268454A (en) | Management method and device of application program of terminal | |
CN104166844A (en) | Login method and system through human face identification based on mobile terminal | |
CN102110220A (en) | Application program monitoring method and device | |
CN104268470B (en) | Method of controlling security and safety control | |
CN106126327B (en) | A kind of control method and control device of application program launching | |
CN104184738A (en) | Information sharing method and information sharing device of terminal and terminal | |
CN105549786A (en) | System switching method and device based on pressure touch control and terminal | |
CN109275144A (en) | Identify the method, apparatus and terminal of pseudo-base station | |
Yu et al. | Remotely wiping sensitive data on stolen smartphones | |
Lee et al. | Security and privacy risks of number recycling at mobile carriers in the United States | |
CN107992745A (en) | Kidnap countermeasure in a kind of interface based on Android platform | |
KR20080077187A (en) | Method for call-theft detection | |
CN106714181A (en) | Method and apparatus for accessing WiFi hotspot | |
CN106097500A (en) | A kind of method and system responding user's entrance | |
WO2020087418A1 (en) | Method and device for handling pseudo base station, mobile terminal, and storage medium | |
KR101953562B1 (en) | Appratus of mobile device classification for preventing wireless intrusion |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |