CN106302315A - A kind of wireless network that improves accesses the method for safety, device and mobile terminal - Google Patents
A kind of wireless network that improves accesses the method for safety, device and mobile terminal Download PDFInfo
- Publication number
- CN106302315A CN106302315A CN201510248968.0A CN201510248968A CN106302315A CN 106302315 A CN106302315 A CN 106302315A CN 201510248968 A CN201510248968 A CN 201510248968A CN 106302315 A CN106302315 A CN 106302315A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- level
- security
- currently accessed
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0892—Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
Abstract
The embodiment of the invention discloses a kind of method improving wireless network access safety, the method includes: judge whether the wireless network being currently accessed is secure network;If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is the first level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first level of security is less than described second level of security;Afterwards, current wireless network is accessed with set level of security.The embodiment of the present invention further simultaneously discloses a kind of wireless network that improves and accesses device and the mobile terminal of safety.
Description
Technical field
The present invention relates to wireless network and access safe practice, particularly relate to a kind of wireless network that improves and access safety
Method, device and the mobile terminal of property.
Background technology
At present, wireless network access technology is more and more universal, and such as, public free Wi-Fi hotspot is increasing,
But wireless network accesses while bringing convenience to people's lives, the leakage of personal information, personal property
Loss is also the safety problem occurred therewith.Under non-secure network environment, some software can automatic synchronization
The mobile terminal such as individual privacy data such as the address list on mobile phone, note, message registration, some also can be rear
Platform is downloaded application and installs.In prior art, also nobody proposes to access environment certainly based on wireless network
The dynamic technical scheme that level of security is set.
Summary of the invention
For solving above-mentioned technical problem, embodiment of the present invention expectation provides one to improve wireless network and accesses safety
Method, device and the mobile terminal of property, it is possible to adjust peace neatly according to the wireless network environment residing for user
Full rank.
The technical scheme is that and be achieved in that:
Embodiments provide a kind of method improving wireless network access safety, including:
Judge whether the wireless network being currently accessed is secure network;
If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is
First level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first peace
Full rank is less than described second level of security;
Current wireless network is accessed with set level of security.
In such scheme, the described level of security arranging mobile terminal is that the second level of security includes:
The access rights of the data of described labelling in advance are set to the one in following two authority: forbid or
Need inquiry;
And/or, it is the one in following two authority by the priority assignation of described application: forbid maybe needing inquiry.
In such scheme, the described level of security arranging mobile terminal is the first level of security, including:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing.
In such scheme, whether the wireless network that described judgement is currently accessed is secure network, including:
Judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if
The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless
Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
The embodiment of the present invention additionally provides a kind of wireless network that improves and accesses the device of safety, including: judge
Module, level of security arrange module and AM access module;Wherein,
Whether judge module, be secure network for judging the wireless network being currently accessed;
Level of security arranges module, for when the described wireless network being currently accessed is secure network, arranges
The level of security of mobile terminal is the first level of security;Described level of security arranges module, is additionally operable to when described
When the wireless network being currently accessed not is secure network, the level of security arranging mobile terminal is the second safe level
Not;Described first level of security is less than described second level of security;
AM access module, for accessing current wireless network with set level of security.
In such scheme, described level of security arranges module, for when described in the wireless network that is currently accessed not
When being secure network, the access rights of the data of described labelling in advance are set in following two authority
Kind: forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application
The one that limit is set in following two authority: forbid maybe needing inquiry.
In such scheme, described level of security arranges module, and the wireless network being used for being currently accessed described in working as is
During secure network, the access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application
For allowing.
In such scheme, described judge module, for judging whether the wireless network being currently accessed is marked in advance
In the one or more wireless networks shown, if the wireless network being currently accessed is indicated in advance or many
In individual wireless network, then the wireless network being currently accessed is secure network;Otherwise, the wireless network being currently accessed
Network is not secure network.
The embodiment of the present invention provides again a kind of mobile terminal, and this mobile terminal includes that any of the above-described kind is improved nothing
The device of line network insertion safety.
What the embodiment of the present invention provided improves the wireless network access method of safety, device and mobile terminal,
First judge the wireless network environment residing for mobile terminal, further according to the wireless network environment residing for mobile terminal certainly
Adaptively adjust the level of security of mobile terminal, to ensure the safety of user data in mobile terminal, so,
Can promote and use while the level of security of mobile terminal is adjusted flexibly according to wireless network environment residing for user
Family is experienced.
Accompanying drawing explanation
Fig. 1 is the flow chart that the embodiment of the present invention improves that wireless network accesses the method for safety;
Fig. 2 is the flow chart that the present invention improves the first embodiment of the method for wireless network access safety;
Fig. 3 is the flow chart that the present invention improves the second embodiment of the method for wireless network access safety;
Fig. 4 is the flow chart that the present invention improves the 3rd embodiment of the method for wireless network access safety;
Fig. 5 is the flow chart that the present invention improves the 4th embodiment of the method for wireless network access safety;
Fig. 6 is the composition structural representation that the embodiment of the present invention improves that wireless network accesses the device of safety.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly
Chu, it is fully described by.
In various embodiments of the present invention, wireless network includes but not limited to Wifi network.Fig. 1 is the present invention
Embodiment improves the flow chart that wireless network accesses the method for safety, as it is shown in figure 1, the method includes:
Step 100: judge whether the wireless network being currently accessed is secure network.
The implementation method of this step includes: user indicates one or more wireless network the most on mobile terminals,
The secure network that these wireless networks typically user thinks, such as, the Wifi network in office or family.
When user accesses wireless network, mobile terminal belonging to user can judge that whether the wireless network that is currently accessed exists
In the one or more wireless networks indicated in advance, if the wireless network being currently accessed is indicated in advance
In individual or multiple wireless network, then judge that the wireless network being currently accessed is secure network;Otherwise, if worked as
The wireless network of front access is not in the one or more wireless networks indicated in advance, then judgement is currently accessed
Wireless network is not secure network.
Step 101: if the wireless network of described access is secure network, then the safety of mobile terminal is set
Rank is the first level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described
First level of security is less than described second level of security.
In this step, the level of security arranging mobile terminal is that the first level of security includes:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing.
Here, after the access rights of the data of labelling being in advance positioned to allow for, user can access labelling in advance
Data;After being permission by the priority assignation of application, external program and background program can perform the behaviour of associated rights
Make, as read current location, reading contact person etc..
In this step, the level of security arranging mobile terminal is that the second level of security includes:
The access rights of the data of labelling in advance are set, and/or the authority of application is set;Labelling in advance is set
The access rights of data include: the access rights of the data of labelling be in advance set in following two authority
A kind of: to forbid maybe needing inquiry;The authority arranging application includes: by the priority assignation of application be following two power
One in limit: forbid maybe needing inquiry;During by the priority assignation of application for forbidding, external program and backstage journey
Sequence can not perform the operation of associated rights, as read current location, read contact person etc., by the authority of application
When being set to inquire, external program and background program are performing the operation of associated rights, need to inquire user,
After only obtaining the permission of user, the operation of associated rights could be performed.
Step 102: access current wireless network with set level of security.
Concrete, this step includes: when the level of security arranging mobile terminal is the first level of security, with
Described first level of security accesses current wireless network;When the level of security arranging mobile terminal is the second peace
During full rank, access current wireless network with described second level of security.
Describe the present invention below in conjunction with specific embodiment.
Fig. 2 is the flow chart that the present invention improves the first embodiment of the method for wireless network access safety, as
Shown in Fig. 2, this flow process includes:
Step 200: flag data the most in advance, and indicate one or more wireless network.
Specifically, the data of above-mentioned labelling in advance refer generally to need to need in non-security wireless network environment
Strengthen accessing the data controlled, such as, the data of this labelling in advance include but not limited to note, contact person,
Positional information, picture, video, sensitive data and the file that some are important.The wireless network of above-mentioned sign
Refer generally to the wireless network that user thinks safe, such as, the Wifi network etc. in office or family.
Step 201: when the wireless network being currently accessed changes, it is judged that whether the new wireless network accessed
For secure network, if the new wireless network accessed is not secure network, then forward step 202 to, otherwise,
Forward step 203 to.
In this step, when the wireless network being currently accessed does not changes, then keep the safety of mobile terminal
Rank is constant, and whether the wireless network continuing monitoring access changes.
Here, when the wireless network being currently accessed changes, if the new wireless network accessed is marked in advance
In the one or more wireless networks shown, then the new wireless network accessed is secure network, otherwise, connects when newly
When the wireless network entered is not in the one or more wireless networks indicated in advance, such as, when the new nothing accessed
When gauze network is strange Wifi network or public Wifi network, then it is assumed that the new wireless network accessed is not peace
Whole network.
Step 202: the level of security arranging mobile terminal in such a way is the second level of security: will be pre-
The access rights of the data of first labelling are set to forbid and keep the authority applied constant;With described second safety
Rank accesses current wireless network and records the wireless network being currently accessed.
Here, after being set to forbid by the access rights of the data of labelling in advance, external program or background program
The data of labelling in advance can not be accessed, such that it is able to effectively protect the personal data of user, enhance non-
The safety of user data in secure network environment.During it should be noted that the authority of holding application is constant,
The authority of the application arranged when the authority of current application is with the last wireless network accessed keeps consistent.
Step 203: the level of security arranging mobile terminal in such a way is the first level of security: will be pre-
The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first
Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance
After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application power
The reading of limit related data.
Fig. 3 is the flow chart that the present invention improves the second embodiment of the method for wireless network access safety, as
Shown in Fig. 3, this flow process includes:
Step 300~step 301 are completely the same with step 200~step 201, repeat no more here.
Step 302: the level of security arranging mobile terminal in such a way is the second level of security: will be pre-
The access rights of the data of first labelling are set to forbid and by the priority assignation of application for forbidding maybe needing inquiry;With
Described second level of security accesses current wireless network and records the wireless network being currently accessed.
Here, after being set to forbid by the access rights of the data of labelling in advance, external program or background program
The data of labelling in advance can not be accessed, such that it is able to effectively protect the personal data of user, enhance non-
The safety of user data in secure network environment.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase
Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry
After, when external program and background program perform associated rights operation, can inquire to user, only use
Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application
The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 303: the level of security arranging mobile terminal in such a way is the first level of security: will be pre-
The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first
Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance
After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase
Close the operation of authority.
Fig. 4 is the flow chart that the present invention improves the 3rd embodiment of the method for wireless network access safety, as
Shown in Fig. 4, this flow process includes:
Step 400~step 401 are completely the same with step 200~step 201, repeat no more here.
Step 402: the level of security arranging mobile terminal in such a way is the second level of security: will be pre-
The access rights of the data of first labelling are set to need to inquire and by the priority assignation of application for forbidding maybe needing inquiry;
Access current wireless network with described second level of security and record the wireless network being currently accessed.
Here, after being set to inquire by the access rights of the data of labelling in advance, external program or backstage journey
When sequence needs the data accessing labelling in advance, can inquire to user, only user could access after agreeing to
The data of this labelling in advance;Now, the access rights of the data of labelling can be grasped by user flexibility in advance,
Consumer's Experience is improve while keeping Information Security.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase
Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry
After, when external program and background program perform associated rights operation, can inquire to user, only use
Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application
The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 403: the level of security arranging mobile terminal in such a way is the first level of security: will be pre-
The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first
Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance
After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase
Close the operation of authority.
Fig. 5 is the flow chart that the present invention improves the 4th embodiment of the method for wireless network access safety, as
Shown in Fig. 5, this flow process includes:
Step 500~step 501 are completely the same with step 200~step 201, repeat no more here.
Step 502: the level of security arranging mobile terminal in such a way is the second level of security: will be pre-
The access limit of the access rights of the data of first labelling and the in advance data of labelling is disposed as inquiring and should
Priority assignation for forbidding maybe needing inquiry;Access current wireless network with described second level of security and remember
The wireless network that record is currently accessed.
Here, after being set to inquire by the access rights of the data of labelling in advance, external program or backstage journey
When sequence needs the data accessing labelling in advance, can inquire to user, only user could access after agreeing to
The data of this labelling in advance;Simultaneously after obtaining user's agreement, external program or background program may proceed to inquiry
The access limit of these data of labelling in advance, the access limit of these data of labelling in advance is divided into read-only and read-write
Two kinds, when obtaining the read-only authority of the data of labelling in advance, the data of this labelling in advance can be read, but
The data of this labelling in advance can not be revised.When obtaining the access limit of the data of labelling in advance, can read
The data of this labelling in advance, it is also possible to revise the data of this labelling in advance.It can be seen that the number of labelling in advance
According to access rights and access limit all can be grasped by user flexibility, carry while Information Security keeping
High Consumer's Experience.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase
Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry
After, when external program and background program perform associated rights operation, can inquire to user, only use
Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application
The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 503: the level of security arranging mobile terminal in such a way is the first level of security: will be pre-
The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first
Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance
After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase
Close the operation of authority.
In the present invention improves the various embodiments of the method that wireless network accesses safety, all can be according to shifting
Dynamic wireless network environment at terminal adjusts level of security automatically, it is possible to ensure the safety of user data
Property, there is the feature of flexibility and reliability.
For the method for the embodiment of the present invention, the embodiment of the present invention also provides for a kind of wireless network that improves and accesses peace
The device of full property, Fig. 6 is the composition structure that the embodiment of the present invention improves that wireless network accesses the device of safety
Schematic diagram, as shown in Figure 6, this device includes that judge module 600 and level of security arrange module 601;Its
In,
Whether judge module 600, be secure network for judging the wireless network being currently accessed.
Level of security arranges module 601, is used for when the described wireless network being currently accessed is secure network,
The level of security arranging mobile terminal is the first level of security;Described level of security arranges module 601, also uses
In time being not secure network when the described wireless network being currently accessed, the level of security arranging mobile terminal is
Two level of securitys;Described first level of security is less than described second level of security.
AM access module 602, for accessing current wireless network with set level of security.
Described judge module 600, specifically for judging that whether the network being currently accessed is chosen in advance
Or in multiple wireless network, if the network being currently accessed is in the one or more wireless networks chosen in advance,
The wireless network being then currently accessed is secure network;Otherwise, the wireless network being currently accessed is not secure network.
Described level of security arranges module 601, specifically for when described in the wireless network that is currently accessed be safety
During network, the access rights of the data of labelling in advance are positioned to allow for, and are fair by the priority assignation of application
Permitted;Described level of security arranges module 601, specifically for when described in the wireless network that is currently accessed be not peace
During whole network, the access rights of the data of described labelling in advance are set to the one in following two authority:
Forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application
The one that limit is set in following two authority: forbid maybe needing inquiry.
In actual applications, described judge module 600 and level of security module 601 is set all can be by being positioned at shifting
Central processing unit (Central Processing Unit, CPU) in dynamic terminal, microprocessor (Micro
Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP),
Or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realizes.
The embodiment of the present invention additionally provides a kind of mobile terminal, and this mobile terminal includes above-mentioned raising wireless network
Access the device of safety.This mobile terminal can realize on mobile phone, wearable device.
The wireless network that improves implementing the embodiment of the present invention accesses device and mobile terminal, the Ke Yigen of safety
Automatically level of security is adjusted, it is possible to ensure user data according to the wireless network environment at mobile terminal
Safety, has the feature of flexibility and reliability.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter
Calculation machine program product.Therefore, the present invention can use hardware embodiment, software implementation or combine software and
The form of the embodiment of hardware aspect.And, the present invention can use and wherein include calculating one or more
The computer-usable storage medium of machine usable program code (includes but not limited to disk memory and optical storage
Device etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program according to embodiments of the present invention
Flow chart and/or block diagram describe.It should be understood that can be by computer program instructions flowchart and/or side
Flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or the knot of square frame
Close.Can provide these computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or
The processor of other programmable data processing device is to produce a machine so that by computer or other can
The instruction that the processor of programming data processing equipment performs produces for realizing in one flow process or multiple of flow chart
The device of the function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing device
In the computer-readable memory worked in a specific way so that be stored in this computer-readable memory
Instruction produces the manufacture including command device, and this command device realizes at one flow process of flow chart or multiple stream
The function specified in journey and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes
Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices
Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one
The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection model of the present invention
Enclose.
Claims (9)
1. one kind is improved the method that wireless network accesses safety, it is characterised in that described method includes:
Judge whether the wireless network being currently accessed is secure network;
If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is
First level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first peace
Full rank is less than described second level of security;
Current wireless network is accessed with set level of security.
Method the most according to claim 1, it is characterised in that the described safe level that mobile terminal is set
It is not that the second level of security includes:
The access rights of the data of described labelling in advance are set to the one in following two authority: forbid or
Need inquiry;
And/or, it is the one in following two authority by the priority assignation of described application: forbid maybe needing inquiry.
Method the most according to claim 2, it is characterised in that the described safe level that mobile terminal is set
It is not the first level of security, including:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described judgement currently connects
Whether the wireless network entered is secure network, including:
Judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if
The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless
Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
5. the device improving wireless network access safety, it is characterised in that described device includes: sentence
Disconnected module, level of security arrange module and AM access module;Wherein,
Whether judge module, be secure network for judging the wireless network being currently accessed;
Level of security arranges module, for when the described wireless network being currently accessed is secure network, arranges
The level of security of mobile terminal is the first level of security;Described level of security arranges module, is additionally operable to when described
When the wireless network being currently accessed not is secure network, the level of security arranging mobile terminal is the second safe level
Not;Described first level of security is less than described second level of security;
AM access module, for accessing current wireless network with set level of security.
Device the most according to claim 5, it is characterised in that described level of security arranges module, uses
In time being not secure network when the described wireless network being currently accessed, by the access of the data of described labelling in advance
Priority assignation is the one in following two authority: forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application
The one that limit is set in following two authority: forbid maybe needing inquiry.
Device the most according to claim 6, it is characterised in that described level of security arranges module, uses
In when the described wireless network being currently accessed is secure network, the access rights of the data of labelling in advance are set
It is set to allow, and by the priority assignation of application for allowing.
8. according to the device described in any one of claim 5 to 7, it is characterised in that described judge module,
For judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if
The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless
Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
9. a mobile terminal, it is characterised in that described mobile terminal includes any one of claim 5 to 8
The described wireless network that improves accesses the device of safety.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510248968.0A CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
PCT/CN2016/075067 WO2016184213A1 (en) | 2015-05-15 | 2016-03-01 | Method and apparatus for improving access security of wireless network and mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510248968.0A CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106302315A true CN106302315A (en) | 2017-01-04 |
Family
ID=57319388
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510248968.0A Pending CN106302315A (en) | 2015-05-15 | 2015-05-15 | A kind of wireless network that improves accesses the method for safety, device and mobile terminal |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106302315A (en) |
WO (1) | WO2016184213A1 (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937248A (en) * | 2017-01-25 | 2017-07-07 | 北京奇虎科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN108337679A (en) * | 2018-03-13 | 2018-07-27 | 徐磊 | A method of it improving wireless network and accesses safety |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104053154A (en) * | 2014-06-16 | 2014-09-17 | 福建星网锐捷网络有限公司 | Wireless network access control method and device and access point device |
CN104506561A (en) * | 2015-01-13 | 2015-04-08 | 深圳市中兴移动通信有限公司 | Terminal data access control method and device |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7269260B2 (en) * | 2001-12-26 | 2007-09-11 | Kabushiki Kaisha Toshiba | Communication system, wireless communication apparatus, and communication method |
CN104301117B (en) * | 2014-10-22 | 2017-11-28 | 中国联合网络通信集团有限公司 | Identity verify method and device |
-
2015
- 2015-05-15 CN CN201510248968.0A patent/CN106302315A/en active Pending
-
2016
- 2016-03-01 WO PCT/CN2016/075067 patent/WO2016184213A1/en active Application Filing
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104053154A (en) * | 2014-06-16 | 2014-09-17 | 福建星网锐捷网络有限公司 | Wireless network access control method and device and access point device |
CN104539439A (en) * | 2015-01-12 | 2015-04-22 | 中国联合网络通信集团有限公司 | Data transmission method and terminal |
CN104506561A (en) * | 2015-01-13 | 2015-04-08 | 深圳市中兴移动通信有限公司 | Terminal data access control method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106937248A (en) * | 2017-01-25 | 2017-07-07 | 北京奇虎科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN106937248B (en) * | 2017-01-25 | 2019-09-17 | 北京安云世纪科技有限公司 | A kind of document handling method of mobile terminal, device and mobile terminal |
CN108337679A (en) * | 2018-03-13 | 2018-07-27 | 徐磊 | A method of it improving wireless network and accesses safety |
Also Published As
Publication number | Publication date |
---|---|
WO2016184213A1 (en) | 2016-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8903359B2 (en) | Mobile device and NFC service protection method of the mobile device | |
CN104461749B (en) | A kind of application program synchronous method, sychronisation and the terminal of multisystem terminal | |
EP2843979B1 (en) | Method and apparatus for preventing sound recording during the call | |
US9639256B2 (en) | Method for starting activity of mobile terminal and the mobile terminal | |
US20160232374A1 (en) | Permission control method and apparatus | |
CN103310149B (en) | The method, apparatus and terminal of system function call | |
CN105022969A (en) | Tamper prevention for electronic subscriber identity module (eSIM) type parameters | |
CN105718272B (en) | A kind of method and terminal of terminal factory reset | |
CN105528553A (en) | A method and a device for secure sharing of data and a terminal | |
US20160234218A1 (en) | Application permission management device and method therefor | |
US9378374B2 (en) | Method and device for prompting program uninstallation | |
CN107871062A (en) | A kind of application permission control method, device and terminal | |
CN102868813A (en) | Method for realizing safety management mechanism and cell phone | |
CN105653969B (en) | Data processing method, device and electronic equipment | |
CN104268472B (en) | Reduction is by the method and apparatus of third party's dynamic base Modification growth function address | |
CN105338550A (en) | Method and device for managing connection of wireless network | |
CN106650519A (en) | Device tracking method and system | |
Stach | How to assure privacy on android phones and devices? | |
CN106502495B (en) | The method and apparatus of desktop are accessed under a kind of guest mode | |
CN106302315A (en) | A kind of wireless network that improves accesses the method for safety, device and mobile terminal | |
CN105095784A (en) | Terminal data writing and reading methods and devices | |
EP3001293A1 (en) | Method and device for rights management | |
CN106503570A (en) | The method and device of protection Root authority | |
WO2015154469A1 (en) | Database operation method and device | |
CN104680083A (en) | Method and device for managing image |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |
|
WD01 | Invention patent application deemed withdrawn after publication |