CN106302315A - A kind of wireless network that improves accesses the method for safety, device and mobile terminal - Google Patents

A kind of wireless network that improves accesses the method for safety, device and mobile terminal Download PDF

Info

Publication number
CN106302315A
CN106302315A CN201510248968.0A CN201510248968A CN106302315A CN 106302315 A CN106302315 A CN 106302315A CN 201510248968 A CN201510248968 A CN 201510248968A CN 106302315 A CN106302315 A CN 106302315A
Authority
CN
China
Prior art keywords
wireless network
level
security
currently accessed
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510248968.0A
Other languages
Chinese (zh)
Inventor
王建修
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201510248968.0A priority Critical patent/CN106302315A/en
Priority to PCT/CN2016/075067 priority patent/WO2016184213A1/en
Publication of CN106302315A publication Critical patent/CN106302315A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0892Network architectures or network communication protocols for network security for authentication of entities by using authentication-authorization-accounting [AAA] servers or protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication

Abstract

The embodiment of the invention discloses a kind of method improving wireless network access safety, the method includes: judge whether the wireless network being currently accessed is secure network;If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is the first level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first level of security is less than described second level of security;Afterwards, current wireless network is accessed with set level of security.The embodiment of the present invention further simultaneously discloses a kind of wireless network that improves and accesses device and the mobile terminal of safety.

Description

A kind of wireless network that improves accesses the method for safety, device and mobile terminal
Technical field
The present invention relates to wireless network and access safe practice, particularly relate to a kind of wireless network that improves and access safety Method, device and the mobile terminal of property.
Background technology
At present, wireless network access technology is more and more universal, and such as, public free Wi-Fi hotspot is increasing, But wireless network accesses while bringing convenience to people's lives, the leakage of personal information, personal property Loss is also the safety problem occurred therewith.Under non-secure network environment, some software can automatic synchronization The mobile terminal such as individual privacy data such as the address list on mobile phone, note, message registration, some also can be rear Platform is downloaded application and installs.In prior art, also nobody proposes to access environment certainly based on wireless network The dynamic technical scheme that level of security is set.
Summary of the invention
For solving above-mentioned technical problem, embodiment of the present invention expectation provides one to improve wireless network and accesses safety Method, device and the mobile terminal of property, it is possible to adjust peace neatly according to the wireless network environment residing for user Full rank.
The technical scheme is that and be achieved in that:
Embodiments provide a kind of method improving wireless network access safety, including:
Judge whether the wireless network being currently accessed is secure network;
If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is First level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first peace Full rank is less than described second level of security;
Current wireless network is accessed with set level of security.
In such scheme, the described level of security arranging mobile terminal is that the second level of security includes:
The access rights of the data of described labelling in advance are set to the one in following two authority: forbid or Need inquiry;
And/or, it is the one in following two authority by the priority assignation of described application: forbid maybe needing inquiry.
In such scheme, the described level of security arranging mobile terminal is the first level of security, including:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing.
In such scheme, whether the wireless network that described judgement is currently accessed is secure network, including:
Judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
The embodiment of the present invention additionally provides a kind of wireless network that improves and accesses the device of safety, including: judge Module, level of security arrange module and AM access module;Wherein,
Whether judge module, be secure network for judging the wireless network being currently accessed;
Level of security arranges module, for when the described wireless network being currently accessed is secure network, arranges The level of security of mobile terminal is the first level of security;Described level of security arranges module, is additionally operable to when described When the wireless network being currently accessed not is secure network, the level of security arranging mobile terminal is the second safe level Not;Described first level of security is less than described second level of security;
AM access module, for accessing current wireless network with set level of security.
In such scheme, described level of security arranges module, for when described in the wireless network that is currently accessed not When being secure network, the access rights of the data of described labelling in advance are set in following two authority Kind: forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application The one that limit is set in following two authority: forbid maybe needing inquiry.
In such scheme, described level of security arranges module, and the wireless network being used for being currently accessed described in working as is During secure network, the access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application For allowing.
In such scheme, described judge module, for judging whether the wireless network being currently accessed is marked in advance In the one or more wireless networks shown, if the wireless network being currently accessed is indicated in advance or many In individual wireless network, then the wireless network being currently accessed is secure network;Otherwise, the wireless network being currently accessed Network is not secure network.
The embodiment of the present invention provides again a kind of mobile terminal, and this mobile terminal includes that any of the above-described kind is improved nothing The device of line network insertion safety.
What the embodiment of the present invention provided improves the wireless network access method of safety, device and mobile terminal, First judge the wireless network environment residing for mobile terminal, further according to the wireless network environment residing for mobile terminal certainly Adaptively adjust the level of security of mobile terminal, to ensure the safety of user data in mobile terminal, so, Can promote and use while the level of security of mobile terminal is adjusted flexibly according to wireless network environment residing for user Family is experienced.
Accompanying drawing explanation
Fig. 1 is the flow chart that the embodiment of the present invention improves that wireless network accesses the method for safety;
Fig. 2 is the flow chart that the present invention improves the first embodiment of the method for wireless network access safety;
Fig. 3 is the flow chart that the present invention improves the second embodiment of the method for wireless network access safety;
Fig. 4 is the flow chart that the present invention improves the 3rd embodiment of the method for wireless network access safety;
Fig. 5 is the flow chart that the present invention improves the 4th embodiment of the method for wireless network access safety;
Fig. 6 is the composition structural representation that the embodiment of the present invention improves that wireless network accesses the device of safety.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clearly Chu, it is fully described by.
In various embodiments of the present invention, wireless network includes but not limited to Wifi network.Fig. 1 is the present invention Embodiment improves the flow chart that wireless network accesses the method for safety, as it is shown in figure 1, the method includes:
Step 100: judge whether the wireless network being currently accessed is secure network.
The implementation method of this step includes: user indicates one or more wireless network the most on mobile terminals, The secure network that these wireless networks typically user thinks, such as, the Wifi network in office or family. When user accesses wireless network, mobile terminal belonging to user can judge that whether the wireless network that is currently accessed exists In the one or more wireless networks indicated in advance, if the wireless network being currently accessed is indicated in advance In individual or multiple wireless network, then judge that the wireless network being currently accessed is secure network;Otherwise, if worked as The wireless network of front access is not in the one or more wireless networks indicated in advance, then judgement is currently accessed Wireless network is not secure network.
Step 101: if the wireless network of described access is secure network, then the safety of mobile terminal is set Rank is the first level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described First level of security is less than described second level of security.
In this step, the level of security arranging mobile terminal is that the first level of security includes:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing. Here, after the access rights of the data of labelling being in advance positioned to allow for, user can access labelling in advance Data;After being permission by the priority assignation of application, external program and background program can perform the behaviour of associated rights Make, as read current location, reading contact person etc..
In this step, the level of security arranging mobile terminal is that the second level of security includes:
The access rights of the data of labelling in advance are set, and/or the authority of application is set;Labelling in advance is set The access rights of data include: the access rights of the data of labelling be in advance set in following two authority A kind of: to forbid maybe needing inquiry;The authority arranging application includes: by the priority assignation of application be following two power One in limit: forbid maybe needing inquiry;During by the priority assignation of application for forbidding, external program and backstage journey Sequence can not perform the operation of associated rights, as read current location, read contact person etc., by the authority of application When being set to inquire, external program and background program are performing the operation of associated rights, need to inquire user, After only obtaining the permission of user, the operation of associated rights could be performed.
Step 102: access current wireless network with set level of security.
Concrete, this step includes: when the level of security arranging mobile terminal is the first level of security, with Described first level of security accesses current wireless network;When the level of security arranging mobile terminal is the second peace During full rank, access current wireless network with described second level of security.
Describe the present invention below in conjunction with specific embodiment.
Fig. 2 is the flow chart that the present invention improves the first embodiment of the method for wireless network access safety, as Shown in Fig. 2, this flow process includes:
Step 200: flag data the most in advance, and indicate one or more wireless network.
Specifically, the data of above-mentioned labelling in advance refer generally to need to need in non-security wireless network environment Strengthen accessing the data controlled, such as, the data of this labelling in advance include but not limited to note, contact person, Positional information, picture, video, sensitive data and the file that some are important.The wireless network of above-mentioned sign Refer generally to the wireless network that user thinks safe, such as, the Wifi network etc. in office or family.
Step 201: when the wireless network being currently accessed changes, it is judged that whether the new wireless network accessed For secure network, if the new wireless network accessed is not secure network, then forward step 202 to, otherwise, Forward step 203 to.
In this step, when the wireless network being currently accessed does not changes, then keep the safety of mobile terminal Rank is constant, and whether the wireless network continuing monitoring access changes.
Here, when the wireless network being currently accessed changes, if the new wireless network accessed is marked in advance In the one or more wireless networks shown, then the new wireless network accessed is secure network, otherwise, connects when newly When the wireless network entered is not in the one or more wireless networks indicated in advance, such as, when the new nothing accessed When gauze network is strange Wifi network or public Wifi network, then it is assumed that the new wireless network accessed is not peace Whole network.
Step 202: the level of security arranging mobile terminal in such a way is the second level of security: will be pre- The access rights of the data of first labelling are set to forbid and keep the authority applied constant;With described second safety Rank accesses current wireless network and records the wireless network being currently accessed.
Here, after being set to forbid by the access rights of the data of labelling in advance, external program or background program The data of labelling in advance can not be accessed, such that it is able to effectively protect the personal data of user, enhance non- The safety of user data in secure network environment.During it should be noted that the authority of holding application is constant, The authority of the application arranged when the authority of current application is with the last wireless network accessed keeps consistent.
Step 203: the level of security arranging mobile terminal in such a way is the first level of security: will be pre- The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application power The reading of limit related data.
Fig. 3 is the flow chart that the present invention improves the second embodiment of the method for wireless network access safety, as Shown in Fig. 3, this flow process includes:
Step 300~step 301 are completely the same with step 200~step 201, repeat no more here.
Step 302: the level of security arranging mobile terminal in such a way is the second level of security: will be pre- The access rights of the data of first labelling are set to forbid and by the priority assignation of application for forbidding maybe needing inquiry;With Described second level of security accesses current wireless network and records the wireless network being currently accessed.
Here, after being set to forbid by the access rights of the data of labelling in advance, external program or background program The data of labelling in advance can not be accessed, such that it is able to effectively protect the personal data of user, enhance non- The safety of user data in secure network environment.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry After, when external program and background program perform associated rights operation, can inquire to user, only use Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 303: the level of security arranging mobile terminal in such a way is the first level of security: will be pre- The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase Close the operation of authority.
Fig. 4 is the flow chart that the present invention improves the 3rd embodiment of the method for wireless network access safety, as Shown in Fig. 4, this flow process includes:
Step 400~step 401 are completely the same with step 200~step 201, repeat no more here.
Step 402: the level of security arranging mobile terminal in such a way is the second level of security: will be pre- The access rights of the data of first labelling are set to need to inquire and by the priority assignation of application for forbidding maybe needing inquiry; Access current wireless network with described second level of security and record the wireless network being currently accessed.
Here, after being set to inquire by the access rights of the data of labelling in advance, external program or backstage journey When sequence needs the data accessing labelling in advance, can inquire to user, only user could access after agreeing to The data of this labelling in advance;Now, the access rights of the data of labelling can be grasped by user flexibility in advance, Consumer's Experience is improve while keeping Information Security.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry After, when external program and background program perform associated rights operation, can inquire to user, only use Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 403: the level of security arranging mobile terminal in such a way is the first level of security: will be pre- The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase Close the operation of authority.
Fig. 5 is the flow chart that the present invention improves the 4th embodiment of the method for wireless network access safety, as Shown in Fig. 5, this flow process includes:
Step 500~step 501 are completely the same with step 200~step 201, repeat no more here.
Step 502: the level of security arranging mobile terminal in such a way is the second level of security: will be pre- The access limit of the access rights of the data of first labelling and the in advance data of labelling is disposed as inquiring and should Priority assignation for forbidding maybe needing inquiry;Access current wireless network with described second level of security and remember The wireless network that record is currently accessed.
Here, after being set to inquire by the access rights of the data of labelling in advance, external program or backstage journey When sequence needs the data accessing labelling in advance, can inquire to user, only user could access after agreeing to The data of this labelling in advance;Simultaneously after obtaining user's agreement, external program or background program may proceed to inquiry The access limit of these data of labelling in advance, the access limit of these data of labelling in advance is divided into read-only and read-write Two kinds, when obtaining the read-only authority of the data of labelling in advance, the data of this labelling in advance can be read, but The data of this labelling in advance can not be revised.When obtaining the access limit of the data of labelling in advance, can read The data of this labelling in advance, it is also possible to revise the data of this labelling in advance.It can be seen that the number of labelling in advance According to access rights and access limit all can be grasped by user flexibility, carry while Information Security keeping High Consumer's Experience.
In this step, by the priority assignation of application for forbidding after, external program and background program can not perform phase Close the operation of authority, as read current location, reading contact person etc.;By the priority assignation of application for needing inquiry After, when external program and background program perform associated rights operation, can inquire to user, only use Family just can carry out associative operation after agreeing to;It can be seen that in this step can there be the arranging of authority to application The sensitive data of effect ground protection user is by illegally reading etc., thus improves the safety of mobile terminal.
Step 503: the level of security arranging mobile terminal in such a way is the first level of security: will be pre- The access rights of the data of first labelling are positioned to allow for and by the priority assignation of application for allowing;With described first Level of security accesses current wireless network and records the wireless network being currently accessed.
In this step, owing to the new wireless network accessed is secure network, in the visit by the data of labelling in advance After asking that the authority of authority and application is disposed as allowing, user can be facilitated to carry out data access and application phase Close the operation of authority.
In the present invention improves the various embodiments of the method that wireless network accesses safety, all can be according to shifting Dynamic wireless network environment at terminal adjusts level of security automatically, it is possible to ensure the safety of user data Property, there is the feature of flexibility and reliability.
For the method for the embodiment of the present invention, the embodiment of the present invention also provides for a kind of wireless network that improves and accesses peace The device of full property, Fig. 6 is the composition structure that the embodiment of the present invention improves that wireless network accesses the device of safety Schematic diagram, as shown in Figure 6, this device includes that judge module 600 and level of security arrange module 601;Its In,
Whether judge module 600, be secure network for judging the wireless network being currently accessed.
Level of security arranges module 601, is used for when the described wireless network being currently accessed is secure network, The level of security arranging mobile terminal is the first level of security;Described level of security arranges module 601, also uses In time being not secure network when the described wireless network being currently accessed, the level of security arranging mobile terminal is Two level of securitys;Described first level of security is less than described second level of security.
AM access module 602, for accessing current wireless network with set level of security.
Described judge module 600, specifically for judging that whether the network being currently accessed is chosen in advance Or in multiple wireless network, if the network being currently accessed is in the one or more wireless networks chosen in advance, The wireless network being then currently accessed is secure network;Otherwise, the wireless network being currently accessed is not secure network.
Described level of security arranges module 601, specifically for when described in the wireless network that is currently accessed be safety During network, the access rights of the data of labelling in advance are positioned to allow for, and are fair by the priority assignation of application Permitted;Described level of security arranges module 601, specifically for when described in the wireless network that is currently accessed be not peace During whole network, the access rights of the data of described labelling in advance are set to the one in following two authority: Forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application The one that limit is set in following two authority: forbid maybe needing inquiry.
In actual applications, described judge module 600 and level of security module 601 is set all can be by being positioned at shifting Central processing unit (Central Processing Unit, CPU) in dynamic terminal, microprocessor (Micro Processor Unit, MPU), digital signal processor (Digital Signal Processor, DSP), Or field programmable gate array (Field Programmable Gate Array, FPGA) etc. realizes.
The embodiment of the present invention additionally provides a kind of mobile terminal, and this mobile terminal includes above-mentioned raising wireless network Access the device of safety.This mobile terminal can realize on mobile phone, wearable device.
The wireless network that improves implementing the embodiment of the present invention accesses device and mobile terminal, the Ke Yigen of safety Automatically level of security is adjusted, it is possible to ensure user data according to the wireless network environment at mobile terminal Safety, has the feature of flexibility and reliability.
Those skilled in the art are it should be appreciated that embodiments of the invention can be provided as method, system or meter Calculation machine program product.Therefore, the present invention can use hardware embodiment, software implementation or combine software and The form of the embodiment of hardware aspect.And, the present invention can use and wherein include calculating one or more The computer-usable storage medium of machine usable program code (includes but not limited to disk memory and optical storage Device etc.) form of the upper computer program implemented.
The present invention is with reference to method, equipment (system) and computer program according to embodiments of the present invention Flow chart and/or block diagram describe.It should be understood that can be by computer program instructions flowchart and/or side Flow process in each flow process in block diagram and/or square frame and flow chart and/or block diagram and/or the knot of square frame Close.Can provide these computer program instructions to general purpose computer, special-purpose computer, Embedded Processor or The processor of other programmable data processing device is to produce a machine so that by computer or other can The instruction that the processor of programming data processing equipment performs produces for realizing in one flow process or multiple of flow chart The device of the function specified in flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing device In the computer-readable memory worked in a specific way so that be stored in this computer-readable memory Instruction produces the manufacture including command device, and this command device realizes at one flow process of flow chart or multiple stream The function specified in journey and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded in computer or other programmable data processing device, makes Sequence of operations step must be performed to produce computer implemented place on computer or other programmable devices Reason, thus the instruction performed on computer or other programmable devices provides for realizing flow chart one The step of the function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
The above, only presently preferred embodiments of the present invention, it is not intended to limit the protection model of the present invention Enclose.

Claims (9)

1. one kind is improved the method that wireless network accesses safety, it is characterised in that described method includes:
Judge whether the wireless network being currently accessed is secure network;
If the wireless network being currently accessed described in is secure network, then the level of security arranging mobile terminal is First level of security;Otherwise, the level of security arranging mobile terminal is the second level of security;Described first peace Full rank is less than described second level of security;
Current wireless network is accessed with set level of security.
Method the most according to claim 1, it is characterised in that the described safe level that mobile terminal is set It is not that the second level of security includes:
The access rights of the data of described labelling in advance are set to the one in following two authority: forbid or Need inquiry;
And/or, it is the one in following two authority by the priority assignation of described application: forbid maybe needing inquiry.
Method the most according to claim 2, it is characterised in that the described safe level that mobile terminal is set It is not the first level of security, including:
The access rights of the data of labelling in advance are positioned to allow for, and by the priority assignation of application for allowing.
4. according to the method described in any one of claims 1 to 3, it is characterised in that described judgement currently connects Whether the wireless network entered is secure network, including:
Judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
5. the device improving wireless network access safety, it is characterised in that described device includes: sentence Disconnected module, level of security arrange module and AM access module;Wherein,
Whether judge module, be secure network for judging the wireless network being currently accessed;
Level of security arranges module, for when the described wireless network being currently accessed is secure network, arranges The level of security of mobile terminal is the first level of security;Described level of security arranges module, is additionally operable to when described When the wireless network being currently accessed not is secure network, the level of security arranging mobile terminal is the second safe level Not;Described first level of security is less than described second level of security;
AM access module, for accessing current wireless network with set level of security.
Device the most according to claim 5, it is characterised in that described level of security arranges module, uses In time being not secure network when the described wireless network being currently accessed, by the access of the data of described labelling in advance Priority assignation is the one in following two authority: forbid maybe needing inquiry;
And/or, for when the described wireless network being currently accessed not is secure network, by the power of described application The one that limit is set in following two authority: forbid maybe needing inquiry.
Device the most according to claim 6, it is characterised in that described level of security arranges module, uses In when the described wireless network being currently accessed is secure network, the access rights of the data of labelling in advance are set It is set to allow, and by the priority assignation of application for allowing.
8. according to the device described in any one of claim 5 to 7, it is characterised in that described judge module, For judge the wireless network that is currently accessed whether in the one or more wireless networks indicated in advance, if The wireless network being currently accessed is in the one or more wireless networks indicated in advance, then be currently accessed is wireless Network is secure network;Otherwise, the wireless network being currently accessed is not secure network.
9. a mobile terminal, it is characterised in that described mobile terminal includes any one of claim 5 to 8 The described wireless network that improves accesses the device of safety.
CN201510248968.0A 2015-05-15 2015-05-15 A kind of wireless network that improves accesses the method for safety, device and mobile terminal Pending CN106302315A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201510248968.0A CN106302315A (en) 2015-05-15 2015-05-15 A kind of wireless network that improves accesses the method for safety, device and mobile terminal
PCT/CN2016/075067 WO2016184213A1 (en) 2015-05-15 2016-03-01 Method and apparatus for improving access security of wireless network and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510248968.0A CN106302315A (en) 2015-05-15 2015-05-15 A kind of wireless network that improves accesses the method for safety, device and mobile terminal

Publications (1)

Publication Number Publication Date
CN106302315A true CN106302315A (en) 2017-01-04

Family

ID=57319388

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510248968.0A Pending CN106302315A (en) 2015-05-15 2015-05-15 A kind of wireless network that improves accesses the method for safety, device and mobile terminal

Country Status (2)

Country Link
CN (1) CN106302315A (en)
WO (1) WO2016184213A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937248A (en) * 2017-01-25 2017-07-07 北京奇虎科技有限公司 A kind of document handling method of mobile terminal, device and mobile terminal
CN108337679A (en) * 2018-03-13 2018-07-27 徐磊 A method of it improving wireless network and accesses safety

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104053154A (en) * 2014-06-16 2014-09-17 福建星网锐捷网络有限公司 Wireless network access control method and device and access point device
CN104506561A (en) * 2015-01-13 2015-04-08 深圳市中兴移动通信有限公司 Terminal data access control method and device
CN104539439A (en) * 2015-01-12 2015-04-22 中国联合网络通信集团有限公司 Data transmission method and terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7269260B2 (en) * 2001-12-26 2007-09-11 Kabushiki Kaisha Toshiba Communication system, wireless communication apparatus, and communication method
CN104301117B (en) * 2014-10-22 2017-11-28 中国联合网络通信集团有限公司 Identity verify method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104053154A (en) * 2014-06-16 2014-09-17 福建星网锐捷网络有限公司 Wireless network access control method and device and access point device
CN104539439A (en) * 2015-01-12 2015-04-22 中国联合网络通信集团有限公司 Data transmission method and terminal
CN104506561A (en) * 2015-01-13 2015-04-08 深圳市中兴移动通信有限公司 Terminal data access control method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106937248A (en) * 2017-01-25 2017-07-07 北京奇虎科技有限公司 A kind of document handling method of mobile terminal, device and mobile terminal
CN106937248B (en) * 2017-01-25 2019-09-17 北京安云世纪科技有限公司 A kind of document handling method of mobile terminal, device and mobile terminal
CN108337679A (en) * 2018-03-13 2018-07-27 徐磊 A method of it improving wireless network and accesses safety

Also Published As

Publication number Publication date
WO2016184213A1 (en) 2016-11-24

Similar Documents

Publication Publication Date Title
US8903359B2 (en) Mobile device and NFC service protection method of the mobile device
CN104461749B (en) A kind of application program synchronous method, sychronisation and the terminal of multisystem terminal
EP2843979B1 (en) Method and apparatus for preventing sound recording during the call
US9639256B2 (en) Method for starting activity of mobile terminal and the mobile terminal
US20160232374A1 (en) Permission control method and apparatus
CN103310149B (en) The method, apparatus and terminal of system function call
CN105022969A (en) Tamper prevention for electronic subscriber identity module (eSIM) type parameters
CN105718272B (en) A kind of method and terminal of terminal factory reset
CN105528553A (en) A method and a device for secure sharing of data and a terminal
US20160234218A1 (en) Application permission management device and method therefor
US9378374B2 (en) Method and device for prompting program uninstallation
CN107871062A (en) A kind of application permission control method, device and terminal
CN102868813A (en) Method for realizing safety management mechanism and cell phone
CN105653969B (en) Data processing method, device and electronic equipment
CN104268472B (en) Reduction is by the method and apparatus of third party's dynamic base Modification growth function address
CN105338550A (en) Method and device for managing connection of wireless network
CN106650519A (en) Device tracking method and system
Stach How to assure privacy on android phones and devices?
CN106502495B (en) The method and apparatus of desktop are accessed under a kind of guest mode
CN106302315A (en) A kind of wireless network that improves accesses the method for safety, device and mobile terminal
CN105095784A (en) Terminal data writing and reading methods and devices
EP3001293A1 (en) Method and device for rights management
CN106503570A (en) The method and device of protection Root authority
WO2015154469A1 (en) Database operation method and device
CN104680083A (en) Method and device for managing image

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170104

WD01 Invention patent application deemed withdrawn after publication