CN106255107A - Router identification authentication method based on wireless linguistic context and terminal unit - Google Patents
Router identification authentication method based on wireless linguistic context and terminal unit Download PDFInfo
- Publication number
- CN106255107A CN106255107A CN201610615791.8A CN201610615791A CN106255107A CN 106255107 A CN106255107 A CN 106255107A CN 201610615791 A CN201610615791 A CN 201610615791A CN 106255107 A CN106255107 A CN 106255107A
- Authority
- CN
- China
- Prior art keywords
- network information
- security
- wireless
- router
- security strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W88/00—Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
- H04W88/08—Access point devices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a kind of router identification authentication method based on wireless linguistic context and terminal unit, wherein method includes: collect the radio network information of router under the wireless linguistic context of periphery;Set security strategy, determine security dimension parameter according to security strategy and radio network information, with different detection models, the network information is detected based on security dimension parameter, and output detections result;According to security strategy, testing result is analyzed, to assess the safety of router.The present invention, by differentiating the degree of depth of router identification, avoids the fishing trap of assailant, improves user's level of security in wireless network environment, it is to avoid information leakage, prevents economic loss, improves security performance.
Description
Technical field
The invention belongs to mobile Internet security fields, specifically, the present invention relates to a kind of road based on wireless linguistic context
By device identity identifying method and terminal unit.
Background technology
Growing along with radio network technique, traditional access in radio is increasingly confined to IT operation enterprise and fixing
The access of facility, and in daily life, people are also main based on wireless access way.It can be said that wireless network exists
Occupying very important status in the live and work that people are usual, the people of today can not leave wireless network, people
Life be also increasingly dependent on wireless network.Meanwhile, along with the increase of wireless network traffic, wireless network carries
Increasing private information, becomes hacker and the object of lawless person's attack, and the potential safety hazard of wireless communication is the brightest
Aobvious.
In existing wireless attack means, phishing attack is relatively conventional a kind of mode.In the manner, assailant
By forging false wifi hotspot, induction user radio connects, and then eavesdrops the network transmission process of user, causes
The private information of user is revealed, and safety and economy to user bring greater impact.
Why phishing attack is so universal, because which is simple and easy to do, due to existing operating system mainly
Identify the identity accessing hotspot according to SSID (service set), and the SSID of hotspot to be user can arbitrarily set
Fixed, therefore, assailant without wanting special instrument and complicated technology, can realize the camouflage to target focus.
The most notably, the system of present most of terminal units is all built-in with disconnection reconnecting mechanism, for being user-friendly to experience
Purpose, operating system can remember title and the password of the focus that user connected, when feelings wireless network disconnecting occur
During condition, system detects the focus of this title automatically, upon this detection can Auto-reconnect, and, these operations be all system with
It is automatically performed on backstage in the case of the unknown of family, it is therefore intended that facilitate user, improves the experience of user, but be also
Lawless person and assailant provide convenience, and they pretend to be the focus under normal safe environment, induction visitor by setting SSID
Family connects the focus of their camouflage, thus completes the purpose of rogue attacks, brings the biggest potential safety hazard and loss to client.
For the problems referred to above, have been proposed that some solutions at present, such as, outside SSID, add focus MAC ground
Location (physical address) is as the strengthening measure of identification, but unfortunately, the SSID of MAC Address belongs to revise easily
Identity, so this solution the most fundamentally solves this technical problem.
Summary of the invention
The present invention is directed to the disadvantages mentioned above of existing mode, propose a kind of router identification qualification side based on wireless linguistic context
Method and terminal unit, be prone to camouflage in order to solve the identification information of the wireless router that prior art exists, and causes illegal
Molecule is by pretending the focus of wireless router, and induction client connects the focus of their camouflage, thus completes the mesh of rogue attacks
, thus the problem bringing bigger potential safety hazard and economic loss to client.
Embodiments of the invention are according to an aspect, it is provided that a kind of router identification qualification side based on wireless linguistic context
Method, including:
Collect the radio network information of router under the wireless linguistic context of periphery;
Set security strategy, determine security dimension parameter according to security strategy and radio network information, tie up based on safety
The network information is detected by degree parameter with different detection models, and output detections result;
According to security strategy, testing result is analyzed, to assess the safety of router.
Preferably, radio network information includes: SSID, MAC and RSSI etc..
Preferably, the radio network information collected is organized in XML structure mode and stores.
Preferably, detection model is corresponding with the network information, the different network informations or a combination thereof correspondence one detection mould
Type.
Preferably, according to security dimension parameter and the testing result of detection model, it may be judged whether need to carry out higher level
Detection.
Preferably, when testing result is less than predetermined secure threshold, then need to carry out the detection of higher level;
When testing result is higher than the secure threshold set, if security strategy requires, then need to carry out higher level
Detection, if security strategy no requirement (NR), then without carrying out the detection of higher level.
Preferably, when testing result is analyzed, enter with testing result with the parameter in the default security linguistic context that prestores
Row comparative analysis.
Preferably, the method for comparative analysis is the method being analyzed based on similarity of character string.
Preferably, the method for comparative analysis is to utilize NCD algorithm to the method comparing analysis.
It addition, the invention also discloses a kind of terminal unit, comprising:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
According to security strategy and radio network information, detection module, in order to set security strategy, determines that security dimension is joined
Number, detects the network information with different detection models based on security dimension parameter, and output detections result;
Analysis and assessment module, in order to according to security strategy, to be analyzed testing result, to assess the safety of router
Property.
In embodiments of the invention, the information such as SSID and MAC Address of not being simply based on router self is carried out
Identity criterion, but judge according to the wireless network environment residing for router, owing to the network environment of router sets
Meter is to the factor of a lot of every aspects, so for assailant, being far from arranging of simple modification self can forge,
It is greatly improved the difficulty of attack.Additionally the present invention is by differentiating the degree of depth of router identification, avoids the fishing of assailant
Fish-trap, improve user's level of security in wireless network environment, it is to avoid information leakage, prevents economic loss, carries
High security performance.
Aspect and advantage that the present invention adds will part be given in the following description, and these will become from the following description
Obtain substantially, or recognized by the practice of the present invention.
Accompanying drawing explanation
The present invention above-mentioned and/or that add aspect and advantage will become from the following description of the accompanying drawings of embodiments
Substantially with easy to understand, wherein:
Fig. 1 is the schematic flow sheet of present invention router identification based on a wireless linguistic context authentication method wherein embodiment;
Detailed description of the invention
Embodiments of the invention are described below in detail, and the example of described embodiment is shown in the drawings, the most from start to finish
Same or similar label represents same or similar element or has the element of same or like function.Below with reference to attached
The embodiment that figure describes is exemplary, is only used for explaining the present invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singulative used herein " ", "
Individual ", " described " and " being somebody's turn to do " may also comprise plural form.It is to be further understood that use in the description of the present invention arranges
Diction " including " refers to there is described feature, integer, step, operation, element and/or assembly, but it is not excluded that existence or adds
Other features one or more, integer, step, operation, element, assembly and/or their group.It should be understood that when we claim unit
Part is " connected " or during " coupled " to another element, and it can be directly connected or coupled to other elements, or can also exist
Intermediary element.Additionally, " connection " used herein or " coupling " can include wireless connections or wireless couple.Used herein arrange
Diction "and/or" includes that one or more list the whole of item or any cell being associated combines with whole.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, and all terms used herein (include technology art
Language and scientific terminology), have with the those of ordinary skill in art of the present invention be commonly understood by identical meaning.Also should
Be understood by, those terms defined in such as general dictionary, it should be understood that have with in the context of prior art
The meaning that meaning is consistent, and unless by specific definitions as here, otherwise will not use idealization or the most formal implication
Explain.
Those skilled in the art of the present technique are appreciated that " terminal unit " used herein above, " terminal unit equipment " both wrapped
Including the equipment of wireless signal receiver, it only possesses the equipment of wireless signal receiver of non-emissive ability, include again receiving and
Launching the equipment of hardware, it has the reception that on bidirectional communication link, can carry out two-way communication and the equipment launching hardware.
This equipment may include that honeycomb or other communication equipments, and it has single line display or multi-line display or the most
The honeycomb of multi-line display or other communication equipments;PCS (Personal Communications Service, personal communication system
System), it can process with combine voice, data, fax and/or its communication ability;PDA(Personal Digital
Assistant, personal digital assistant), it can include that the access of radio frequency receiver, pager, the Internet/intranet, network are clear
Look at device, notepad, calendar and/or GPS (Global Positioning System, global positioning system) receptor;Conventional knee joint
Mo(u)ld top half and/or palmtop computer or other equipment, it has and/or includes conventional laptop and/or the palm of radio frequency receiver
Laptop computer or other equipment." terminal " used herein above, " terminal unit " can be portable, can transport, be arranged on
In the vehicles (aviation, sea-freight and/or land), or it is suitable for and/or is configured at local runtime, and/or with distribution
Form, any other position operating in the earth and/or space is run." terminal " used herein above, " terminal unit " also may be used
To be communication terminal, access terminals, music/video playback terminal, such as, can be PDA, MID (Mobile Internet
Device, mobile internet device) and/or there is the mobile phone of music/video playing function, it is also possible to be intelligent television,
The equipment such as Set Top Box.
Below according to accompanying drawing 1, by embodiment, disclosed by the invention router identification of based on wireless linguistic context is discussed in detail
Authentication method.
In embodiments of the invention, terminal unit gathers the wireless messages of router, this wireless communication under the wireless linguistic context of periphery
Breath includes but are not limited to the key messages such as SSID, MAC and RSSI (the signal intensity instruction of acceptance).
The above-mentioned wireless messages collected organized in the way of xml (XML (extensible Markup Language)) collects and stores, making network
Global Information structuring, organizes in the way of xml collection here and stores, and has description simple, direct advantage, the most also
Can organize in the way of selecting other and store, the most not do concrete restriction.
Then, carry out model monitoring, first set security strategy, then according to this security strategy and collection and store
Radio network information determine current security dimension parameter, then with this security dimension parameter with different detection models to net
Network information detects, and the result of output detections.It should be noted that detection model is by security dimension parameter here
Information carries out building, and the information of this security dimension depends on the key parameter of network environment and the safe plan of setting
Slightly.Come illustratively detection model and the safety detection carried out thereof below by a specific embodiment, and this model is used
To radio network information and data be not intended as the restriction of the present invention.
First, based on the SSID information collected, constructing safety detection model 1, detailed process is:
The SSID collected is expressed as n character string, then according to the order of letter (Chinese character is according to sound sequence) is arranged
Sequence, completes execution character string concatenation after sequence, forms long character string S1.Under the default security ambient parameter that will prestore
SSID also extract, according to the representation of SSID under this environment, be similarly formed long character string S0.Then it is right to need
The similarity of character string S0 and character string S1 compares and weighs.
According to the expression way of network environment, when weighing similarity between two network environments, generally use character string similar
The computational methods of degree, conventional computational methods have local sensitivity Hash LSH (Locality Sensitive Hashing), normalizing
Change compression distance NCD (Normalized Compressed Distance), Perturbed algorithms (Rounding Algorithm) and
The methods such as editing distance (Edit Distance), what we used here is NCD algorithm, and this algorithm is that one can be used to weigh
The method of information content similarity degree, the method applies and achieves good effect in multiple fields, as gene test,
Anthelmintic and Malware identification etc..It addition, NCD algorithm has java standard library support, it is easy to accomplish, comparatively ideal result can be obtained.
NCD is defined as follows:
Wherein, in m+n "+" expression character string attended operation, after Compress (m) represents that character string m is compressed
Length, compression function herein uses zlib (providing the data base of data compression).It is obvious that NCD (m, n) sign m and n
Between the degree that overlaps of content, and m, n content coincidence degree is the highest, then we can say that both is the most similar, therefore can use
(m n) weighs m, the similarity between n to NCD.Typically, if NCD (m, n)=1, then it is considered that m, n are identical.
In general, if the wireless linguistic context of the acquiescence of router is Pi, the current wireless linguistic context of router is Pj, then both
Behavior similarity is:
(i j) features the similarity degree evaluating behavior of node (set) i and node (set) j to behavior similarity Sim.
Character string S0 and S1 are substituted into these computational methods and just can draw testing result, detected into the detection of output identity
Result R1, determines a need for detecting further according to the comparing result of testing result with detection threshold value, and detection threshold value is in safety
Strategy presets.If less than the secure threshold set, then needing to detect further, perform next step operation, if high
In secure threshold, but security strategy requirement, it is also desirable to perform next step operation.
2., below, based on the SSID collected and mac address information, construct security model 2.
The process of tectonic model is by character to being expressed as ssid+mac of SSID and MAC of each focus that collect
String, then according to lexicographic order (Chinese character is according to sound sequence) is ranked up, completes execution character string concatenation after sequence, forms one
Individual long character string S1, extracts SSID and MAC in default security ambient parameter, in the manner described above, is similarly formed one
Individual long character string S0.
Then referring to the NCD algorithm in step 1, current wireless linguistic context and the similarity giving tacit consent to wireless linguistic context are weighed
Amount.
Detect into output identity testing result R2, determined whether according to the comparing result of testing result with detection threshold value
Detection further, detection threshold value is needed to preset in security strategy.If less than the secure threshold set, then needed into one
Step detection, performs next step operation, if above secure threshold, but security strategy requirement, it is also desirable to perform next step operation.
The most further, based on the SSID collected, mac address information and RSSI information, construct security model 3.
The process of tectonic model is to being expressed as ssid+mac+ by SSID, MAC and RSSI of each focus of collecting
The character string of rssi, then according to lexicographic order (Chinese character is according to sound sequence) is ranked up, completes execution character string splicing after sequence
Operation, forms long character string S1, is extracted by SSID, MAC and the RSSI in default security ambient parameter, according to above-mentioned
Mode, is similarly formed long character string S0.
Then referring to the NCD algorithm in step 1, current wireless linguistic context and the similarity giving tacit consent to wireless linguistic context are weighed
Amount.
Detect into output identity testing result R3.
More than detection is only distance explanation, does not do concrete restriction, collects according to such as above detection only
SSID, mac address information and RSSI information are made that the detection of Three Estate, here can also be by different kind of information, to the greatest extent
The infomation detection of heart multiple combination or the infomation detection of higher level.
Finally, according to the security strategy set, and the result come detected by each step, consider, to currently
Can the identity state of router provides a final qualification result, to assess whether this router has safety, carry out nothing
Line connects.
According to above-mentioned testing result, general for, according to the Stringency of the security strategy used, can be divided into as follows
Several situations, brief analysis is as follows.
Situation one: when the safe class that security strategy requires is higher, mainly with R3 as judgment basis, be referred to
R2, can ignore for R1 result.
Situation two, when the moderate safe class that security strategy requires, mainly with R2 as judgment basis, is referred to R1
And R3, provide final conclusion after carrying out synthetic determination.
Situation three: when the safe class ratio of security strategy requirement is time relatively low, mainly with R1 as judgment basis, be referred to
R2, R3.
For professional person, it is also possible to according to this model and the algorithm of detection Process Design oneself and Application way, at tool
Body environment reaches best effect, thus router identification is analyzed more comprehensively, the most do not do concrete restriction.
It addition, the invention also discloses a kind of terminal unit using said method, this equipment at least includes with lower part:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
Detection module, in order to set security strategy, determines safe dimension according to this security strategy and this radio network information
Degree parameter, detects this network information with different detection models based on described security dimension parameter, and output detections knot
Really;
Analysis and assessment module, in order to according to this security strategy, to be analyzed this testing result, to assess described router
Safety.
The above is only the some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For Yuan, under the premise without departing from the principles of the invention, it is also possible to make some improvements and modifications, these improvements and modifications also should
It is considered as protection scope of the present invention.
Claims (10)
1. a router identification authentication method based on wireless linguistic context, comprises the steps:
Collect the radio network information of router under the wireless linguistic context of periphery;
Set security strategy, determine security dimension parameter according to described security strategy and described radio network information, based on institute
State security dimension parameter with different detection models, the described network information to be detected, and output detections result;
According to described security strategy, described testing result is analyzed, to assess the safety of described router.
2. the method for claim 1, it is characterised in that described radio network information includes: SSID, MAC and RSSI etc..
3. the method for claim 1, it is characterised in that by the described radio network information collected with XML structure
Mode is organized and stores.
4. the method for claim 1, it is characterised in that described detection model is corresponding with the described network information is different
The network information or the corresponding different detection model of a combination thereof.
5. the method for claim 1, it is characterised in that according to described security dimension parameter and the inspection of described detection model
Survey result, it may be judged whether need to carry out the detection of higher level.
6. method as claimed in claim 5, it is characterised in that
When described testing result is less than predetermined secure threshold, then need to carry out the detection of higher level;
When described testing result is higher than the secure threshold set, if security strategy requires, then need to carry out higher level
Detection, if described security strategy no requirement (NR), then without carrying out the detection of higher level.
7. the either method as described in claim 1-6, it is characterised in that
When described testing result is analyzed, compare with described testing result with the parameter in the default security linguistic context that prestores
Relatively analyze.
8. method as claimed in claim 7, it is characterised in that the method for described comparative analysis is to come based on similarity of character string
The method being analyzed.
9. method as claimed in claim 8, it is characterised in that the method for described comparative analysis is to utilize NCD algorithm to carry out
The method of comparative analysis.
10. a terminal unit, it is characterised in that including:
Collection module, in order to collect the radio network information of router under the wireless linguistic context of periphery;
Detection module, in order to set security strategy, determines safe dimension according to described security strategy and described radio network information
Degree parameter, detects the described network information with different detection models based on described security dimension parameter, and output detections
Result;
Analysis and assessment module, in order to according to described security strategy, to be analyzed described testing result, to assess described router
Safety.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610615791.8A CN106255107A (en) | 2016-07-28 | 2016-07-28 | Router identification authentication method based on wireless linguistic context and terminal unit |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610615791.8A CN106255107A (en) | 2016-07-28 | 2016-07-28 | Router identification authentication method based on wireless linguistic context and terminal unit |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106255107A true CN106255107A (en) | 2016-12-21 |
Family
ID=57605957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610615791.8A Pending CN106255107A (en) | 2016-07-28 | 2016-07-28 | Router identification authentication method based on wireless linguistic context and terminal unit |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106255107A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106792702A (en) * | 2017-01-23 | 2017-05-31 | 北京坤腾畅联科技有限公司 | Router identification detection method and terminal device based on unusual route |
CN112399416A (en) * | 2020-12-02 | 2021-02-23 | 中国联合网络通信集团有限公司 | Access method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277229A (en) * | 2008-05-26 | 2008-10-01 | 杭州华三通信技术有限公司 | Method for detecting illegality equipment and wireless client terminal |
CN104852894A (en) * | 2014-12-10 | 2015-08-19 | 北京奇虎科技有限公司 | Wireless message monitor detecting method, system and central control server |
CN105472621A (en) * | 2015-12-03 | 2016-04-06 | 西北大学 | Pseudo AP detection method based on RSSI |
-
2016
- 2016-07-28 CN CN201610615791.8A patent/CN106255107A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101277229A (en) * | 2008-05-26 | 2008-10-01 | 杭州华三通信技术有限公司 | Method for detecting illegality equipment and wireless client terminal |
CN104852894A (en) * | 2014-12-10 | 2015-08-19 | 北京奇虎科技有限公司 | Wireless message monitor detecting method, system and central control server |
CN105472621A (en) * | 2015-12-03 | 2016-04-06 | 西北大学 | Pseudo AP detection method based on RSSI |
Non-Patent Citations (2)
Title |
---|
王强: "WLAN接入安全检测评估模型的研究", 《中国优秀硕士学位论文全文数据库》 * |
郑跃明: "无线局域网安全检测系统研究", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106792702A (en) * | 2017-01-23 | 2017-05-31 | 北京坤腾畅联科技有限公司 | Router identification detection method and terminal device based on unusual route |
CN112399416A (en) * | 2020-12-02 | 2021-02-23 | 中国联合网络通信集团有限公司 | Access method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107852410B (en) | Dissect rogue access point | |
CN112055024B (en) | Authority verification method and device, storage medium and electronic equipment | |
Cunche et al. | I know who you will meet this evening! linking wireless devices using wi-fi probe requests | |
CN109451182B (en) | Detection method and device for fraud telephone | |
US8331904B2 (en) | Apparatus and a security node for use in determining security attacks | |
CN100418114C (en) | Mobile communication appts. monitoring appts. monitoring system, monitoring method, onotoring program, and computer-readable recording medium contg. monitoring program | |
CN105447388B (en) | A kind of Android malicious code detection system based on weight and method | |
CN104639907A (en) | Intelligent security and protection method and system based on mobile terminal | |
CN104284337A (en) | Base station detection method and system | |
CN108198303A (en) | A kind of intelligent door lock control method, device and system | |
CN106211157A (en) | Base station reorientation method and base station redirection device | |
CN106204984A (en) | A kind of burglary-resisting installation based on wireless signal and method | |
KR20090038189A (en) | Apparatus and method for managing terminal users | |
Wang et al. | On optimality of myopic sensing policy with imperfect sensing in multi-channel opportunistic access | |
CN109658311A (en) | A kind of data analysis system for serving E-Government | |
CN106255107A (en) | Router identification authentication method based on wireless linguistic context and terminal unit | |
CN109189780A (en) | The storage of ideology and politics material and inquiry management system and method based on big data | |
CN109871211A (en) | Information displaying method and device | |
CN114363069A (en) | Data management system for guaranteeing information network security of colleges and universities | |
Rusca et al. | Privacy‐preserving WiFi‐based crowd monitoring | |
CN116846610A (en) | Network security threat detection method, device, equipment and medium | |
CN106060826A (en) | Base station redirection method and base station redirection device | |
CN201514632U (en) | Portable multifunctional multi-channel acquisition identity identification device based on 3G network | |
CN114338187B (en) | Terminal safety detection method and device based on decision tree | |
CN107371122B (en) | Method for realizing auxiliary positioning based on electronic equipment behavior mode |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20161221 |
|
WD01 | Invention patent application deemed withdrawn after publication |