CN106304072A - Safe verification method and device - Google Patents

Safe verification method and device Download PDF

Info

Publication number
CN106304072A
CN106304072A CN201610743851.4A CN201610743851A CN106304072A CN 106304072 A CN106304072 A CN 106304072A CN 201610743851 A CN201610743851 A CN 201610743851A CN 106304072 A CN106304072 A CN 106304072A
Authority
CN
China
Prior art keywords
wireless network
safe class
verification
currently
determines
Prior art date
Application number
CN201610743851.4A
Other languages
Chinese (zh)
Inventor
王硕
朱瑞贤
鲍协浩
Original Assignee
北京小米移动软件有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 北京小米移动软件有限公司 filed Critical 北京小米移动软件有限公司
Priority to CN201610743851.4A priority Critical patent/CN106304072A/en
Publication of CN106304072A publication Critical patent/CN106304072A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/06Authentication

Abstract

The disclosure is directed to a kind of safe verification method and device, belong to internet arena.The method includes: when detecting that safety verification instructs, it is judged that currently the most connected wireless network;When currently attached wireless network, determine the safe class of described wireless network;Safe class based on described wireless network, determines the verification operation currently carrying out safety verification;Based on a determination that verification operation carry out safety verification.Disclosure embodiment is when terminal detects that safety verification instructs, the verification operation currently carrying out safety verification is determined by the safe class of currently attached wireless network, and then the verification operation being determined by is to carry out safety verification, that is to say, the verification operation difference that different safe classes is corresponding, thus when safe class is higher, verification operation also can more simplify, thus improve the efficiency of safety verification.

Description

Safe verification method and device

Technical field

It relates to internet arena, particularly relate to a kind of safe verification method and device.

Background technology

Along with the development of Internet technology, the operating system of various terminals, payment platform, application etc. are extensively made by people With, and the safety problem of user account and information the most day by day obtains people and payes attention to.When people use various terminal system, pay and put down When platform, application, safety verification can be carried out by modes such as the passwords that pre-sets, such as when the operating system using terminal Time, safety verification can be carried out by the screen locking password arranged, when using payment platform, can be by arranging on payment platform Payment cipher carry out safety verification.

Summary of the invention

For overcoming problem present in correlation technique, the disclosure provides a kind of safe verification method and device.

First aspect according to disclosure embodiment, it is provided that a kind of safe verification method, described method includes:

When detecting that safety verification instructs, it is judged that currently the most connected wireless network;

When currently attached wireless network, determine the safe class of described wireless network;

Safe class based on described wireless network, determines the verification operation currently carrying out safety verification;

Based on a determination that verification operation carry out safety verification.

Alternatively, the described safe class determining described wireless network, including:

From multiple default credible conditions, determine the default credible condition that described wireless network is met;

Determine the quantity of the default credible condition that described wireless network is met;

Quantity based on the default credible condition that described netting twine network is met, from the quantitative range of storage and safety etc. In corresponding relation between Ji, obtain the safe class of described wireless network.

Alternatively, the described safe class determining described wireless network, including:

From multiple default credible conditions, determine the default credible condition that described wireless network is met;

The default credible condition met based on described wireless network, from the credible condition and safe class of storage it Between corresponding relation in, obtain the safe class of described wireless network.

Alternatively, the plurality of default credible condition includes but not limited to following condition:

The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

The domain name of the appointed website parsed by wireless network is identical with designated domain name, and described designated domain name is domain name clothes Business device is the domain name of described appointed website distribution;

Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;

The time period connecting wireless network is positioned at the appointment time period;

The frequency connecting wireless network is positioned at designated frequency range.

Alternatively, the described safe class determining described wireless network, including:

Obtain the physical address of described wireless network;

To security server send safe class obtain request, described safe class obtain request in carry described in physically Location, and described safe class obtains request and is used for indicating described security server to return described wireless network based on described physical address The safe class of network;

Receive the safe class of the described wireless network that described security server returns based on described physical address.

Alternatively, described safe class based on described wireless network, determine the verification operation currently carrying out safety verification, Including:

Determine the intended application mark currently carrying out safety verification;

Judging to preset in list of application and whether stored described intended application mark, described default list of application is used for storing Multiple application identities of the verification operation of safety verification are determined by the safe class of wireless network;

When in described default list of application, storage has described intended application to identify, safety based on described wireless network etc. Level, the corresponding relation between safe class and the verification operation of storage, obtains the verification operation currently carrying out safety verification.

Alternatively, described safe class based on described wireless network, determine the verification operation currently carrying out safety verification, Including:

Determine the intended application mark currently carrying out safety verification;

Based on described intended application mark and the safe class of described wireless network, from the application identities of storage, safety etc. In corresponding relation between level and verification operation, obtain the verification operation currently carrying out safety verification.

Second aspect according to disclosure embodiment, it is provided that a kind of safety verification device, described device includes:

Judge module, for when detecting that safety verification instructs, it is judged that currently the most connected wireless network;

First determines module, for when currently attached wireless network, determines the safe class of described wireless network;

Second determines module, for safe class based on described wireless network, determines and currently carries out testing of safety verification Card operation;

Authentication module, for based on a determination that verification operation carry out safety verification.

Alternatively, described first determines that module includes:

First determines submodule, for, from multiple default credible conditions, determining that described wireless network is met pre- If credible condition;

Second determines submodule, is used for the quantity of the default credible condition determining that described wireless network is met;

First obtains submodule, and the quantity of the default credible condition for being met based on described netting twine network, from depositing In corresponding relation between quantitative range and the safe class of storage, obtain the safe class of described wireless network.

Alternatively, described first determines that module includes:

3rd determines submodule, for, from multiple default credible conditions, determining that described wireless network is met pre- If credible condition;

Second obtains submodule, for the default credible condition met based on described wireless network, and can from store In corresponding relation between letter property condition and safe class, obtain the safe class of described wireless network.

Alternatively, the plurality of default credible condition includes but not limited to following condition:

The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

The domain name of the appointed website parsed by wireless network is identical with designated domain name, and described designated domain name is domain name clothes Business device is the domain name of described appointed website distribution;

Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;

The time period connecting wireless network is positioned at the appointment time period;

The frequency connecting wireless network is positioned at designated frequency range.

Alternatively, described first determines that module includes:

3rd obtains submodule, for obtaining the physical address of described wireless network;

Sending submodule, obtain request for sending safe class to security server, described safe class obtains request In carry described physical address, and described safe class obtain request be used for indicating described security server based on described physically Location returns the safe class of described wireless network;

Receive submodule, for receiving described wireless network that described security server returns based on described physical address Safe class.

Alternatively, described second determines that module includes:

4th determines submodule, for determining the intended application mark currently carrying out safety verification;

Judge submodule, be used for judging to preset in list of application whether stored described intended application mark, described default List of application determines multiple application identities of the verification operation of safety verification for storage by the safe class of wireless network;

4th obtains submodule, is used for when in described default list of application, storage has described intended application to identify, based on The safe class of described wireless network, the corresponding relation between safe class and the verification operation of storage, obtains when advancing The verification operation of row safety verification.

Alternatively, described second determines that module includes:

5th determines submodule, for determining the intended application mark currently carrying out safety verification;

5th obtains submodule, for based on described intended application mark and the safe class of described wireless network, from depositing In corresponding relation between application identities, safe class and the verification operation of storage, obtain the checking behaviour currently carrying out safety verification Make.

The third aspect according to disclosure embodiment, it is provided that a kind of safety verification device, described device includes:

Processor;

For storing the memorizer of processor executable;

Wherein, described processor is configured to:

When detecting that safety verification instructs, it is judged that currently the most connected wireless network;

When currently attached wireless network, determine the safe class of described wireless network;

Safe class based on described wireless network, determines the verification operation currently carrying out safety verification;

Based on a determination that verification operation carry out safety verification.

Embodiment of the disclosure that the technical scheme of offer can include following beneficial effect: in the disclosed embodiments, when Terminal detects when safety verification instructs, and determines the safe class of currently attached wireless network, and by currently attached The safe class of wireless network determine the verification operation currently carrying out safety verification, and then the verification operation being determined by comes Carry out safety verification, that is to say, when the safe class difference of current connected wireless network, carry out the checking of safety verification Operation also can be different, thus when safe class is higher, verification operation also can more simplify, thus improve the effect of safety verification Rate.

It should be appreciated that it is only exemplary and explanatory, not that above general description and details hereinafter describe The disclosure can be limited.

Accompanying drawing explanation

Accompanying drawing herein is merged in description and constitutes the part of this specification, it is shown that meet the enforcement of the present invention Example, and for explaining the principle of the present invention together with description.

Fig. 1 is the flow chart of a kind of safe verification method that disclosure embodiment provides.

Fig. 2 is the flow chart of the another kind of safe verification method that disclosure embodiment provides.

Fig. 3 A is a kind of safety verification device block diagram that disclosure embodiment provides.

Fig. 3 B is that the one first that disclosure embodiment provides determines module frame chart.

Fig. 3 C is that the another kind first that disclosure embodiment provides determines module frame chart.

Fig. 3 D is that the another kind first that disclosure embodiment provides determines module frame chart.

Fig. 3 E is that the one second that disclosure embodiment provides determines module frame chart.

Fig. 3 F is that the another kind second that disclosure embodiment provides determines module frame chart.

Fig. 4 is a kind of safety verification device block diagram that disclosure embodiment provides.

Detailed description of the invention

Here will illustrate exemplary embodiment in detail, its example represents in the accompanying drawings.Explained below relates to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represents same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they are only with the most appended The example of the apparatus and method that some aspects that described in detail in claims, the present invention are consistent.

Before disclosure embodiment is carried out detailed explanation, first the application scenarios of disclosure embodiment is given Introduce.When people use various terminal system, payment platform, application, need each to be independently arranged the password of safety verification, logical Cross the password arranged and carry out safety verification, such as, when using the operating system of terminal, can be entered by the screen locking password arranged Row safety verification, when using payment platform, can carry out safety verification by the payment cipher arranged on payment platform.So And, for a user, when certain currently used application carries out safety verification, need the checking provided by this application to grasp Making to verify, step is relatively complicated, reduces the efficiency of safety verification, and therefore, disclosure embodiment provides a kind of peace Full verification method, when terminal detects that safety verification instructs, is come really by the safe class of currently attached wireless network Carry out the verification operation of safety verification before settled, and then the verification operation being determined by is to carry out safety verification, that is to say, different Verification operation corresponding to safe class different, thus when safe class is higher, verification operation also can more simplify, thus carries The high efficiency of safety verification.

Fig. 1 is the flow chart according to a kind of safe verification method shown in an exemplary embodiment.As it is shown in figure 1, this peace Full verification method, in terminal, comprises the following steps.

In a step 101, when detecting that safety verification instructs, it is judged that currently the most connected wireless network.

In a step 102, when currently attached wireless network, determine the safe class of wireless network.

In step 103, safe class based on wireless network, determine the verification operation currently carrying out safety verification.

At step 104, based on a determination that verification operation carry out safety verification.

In the disclosed embodiments, when terminal detects that safety verification instructs, currently attached wireless network is determined Safe class, and determined by the safe class of currently attached wireless network currently carry out safety verification checking behaviour Make, and then the verification operation being determined by is to carry out safety verification, that is to say, when the safety etc. of current connected wireless network When level is different, the verification operation carrying out safety verification also can be different, thus when safe class is higher, verification operation also can be more Simplify, thus improve the efficiency of safety verification.

Optionally it is determined that the safe class of wireless network, including:

From multiple default credible conditions, determine the default credible condition that wireless network is met;

Determine the quantity of the default credible condition that wireless network is met;

Quantity based on the default credible condition that netting twine network is met, from the quantitative range and safe class of storage it Between corresponding relation in, obtain wireless network safe class.

Optionally it is determined that the safe class of wireless network, including:

From multiple default credible conditions, determine the default credible condition that wireless network is met;

The default credible condition met based on wireless network, between credible condition and the safe class of storage In corresponding relation, obtain the safe class of wireless network.

Alternatively, multiple default credible conditions include but not limited to following condition:

The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

The domain name of the appointed website parsed by wireless network is identical with designated domain name, it is intended that domain name is name server Domain name for appointed website distribution;

Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;

The time period connecting wireless network is positioned at the appointment time period;

The frequency connecting wireless network is positioned at designated frequency range.

Optionally it is determined that the safe class of wireless network, including:

Obtain the physical address of wireless network;

Sending safe class to security server and obtain request, safe class obtains carries physical address in request, and peace Congruence level obtains request for indicating security server to return the safe class of wireless network based on physical address;

Receive the safe class of the wireless network that security server returns based on physical address.

Alternatively, safe class based on wireless network, determine the verification operation currently carrying out safety verification, including:

Determine the intended application mark currently carrying out safety verification;

Judge to preset in list of application and whether stored intended application mark, preset list of application for storage by wireless The safe class of network determines multiple application identities of the verification operation of safety verification;

When in default list of application, storage has intended application to identify, safe class based on wireless network, from storage In corresponding relation between safe class and verification operation, obtain the verification operation currently carrying out safety verification.

Alternatively, safe class based on wireless network, determine the verification operation currently carrying out safety verification, including:

Determine the intended application mark currently carrying out safety verification;

Based on intended application mark and the safe class of wireless network, from application identities, safe class and the checking of storage In corresponding relation between operation, obtain the verification operation currently carrying out safety verification.

Above-mentioned all optional technical schemes, all can be according to arbitrarily combining the alternative embodiment forming the disclosure, and the disclosure is real Execute example this is repeated the most one by one.

Fig. 2 is the flow chart according to a kind of safe verification method shown in an exemplary embodiment.As in figure 2 it is shown, this peace Full verification method, in terminal, comprises the following steps.

In step 201, when detecting that safety verification instructs, it is judged that currently the most connected wireless network.

Wherein, safety verification instruction is used for indicating terminal to carry out safety verification, and the instruction of this safety verification can be by user Triggering, this user can be triggered by assigned operation, and such as, this assigned operation can be slide, clicking operation etc., this This is not specifically limited by open embodiment.

It addition, this wireless network can be WLAN, such as, this wireless network can be WiFi (Wireless Fidelity, Wireless Fidelity) etc., this is not specifically limited by disclosure embodiment.

In step 202., when currently attached wireless network, from multiple default credible conditions, determine current institute The default credible condition that the wireless network connected is met.

Wherein, the plurality of default credible condition can include but not limited to following condition:

(1) physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

(2) domain name of the appointed website parsed by wireless network is identical with designated domain name, it is intended that domain name is domain name clothes Business device is the domain name of appointed website distribution;

(3) determined by wireless network that the confidentiality agreement of given server is for specifying confidentiality agreement;

(4) time period connecting wireless network is positioned at the appointment time period;

(5) frequency connecting wireless network is positioned at designated frequency range.

It should be noted that the plurality of default credible condition can include at least one condition above-mentioned, certainly, reality should In with, the plurality of default credible condition can also include other condition, and this is not specifically limited by disclosure embodiment.

Owing to when the plurality of default credible condition difference, terminal, from the plurality of default credible condition, determines and works as The method of the default credible condition that front connected wireless network is met is the most different, therefore, followed by following several Possible situation, to terminal from the plurality of default credible condition, determines that current connected wireless network is met pre- If the method for credible condition illustrates respectively:

The first possible situation: when the plurality of default credible condition includes above-mentioned default credible condition (1), Terminal can obtain the physical address of current connected wireless network and Address Management Server is current connected wireless The physical address of network allocation, and be current connected by current connected wireless network address and Address Management Server The physical address of wireless network distribution compares, if both are identical, it is determined that the wireless network that this terminal is current connected Meet above-mentioned default credible condition (1), if both are different, it is determined that the current connected wireless network of this terminal is unsatisfactory for Above-mentioned default credible condition (1).

Wherein, terminal obtains the operation of the physical address that Address Management Server is current connected wireless network distribution Can be: this terminal sends physical address to Address Management Server and obtains request, and this physical address obtains request and carries currently The mark of the wireless network connected, when Address Management Server receives the acquisition request of this physical address, wireless based on this The mark of network, the corresponding relation between wireless network identification and the physical address of storage, obtains corresponding physical address, And the physical address of acquisition is sent to terminal, when this terminal receives this physical address, this physical address is defined as ground Location management server is the physical address of current connected wireless network distribution.

Further, since during terminal this wireless network currently attached, the SSID (Service of this wireless network can be known Set Identifier, service set), password, the information such as physical address, therefore, this terminal can be directly based upon current institute The wireless network connected, obtains the physical address of this wireless network.

It should be noted that the physical address of wireless network can be MAC (the Media Access of wireless network Control, media interviews control) address, this is not specifically limited by disclosure embodiment.

It addition, the mark of current connected wireless network identifies this wireless network for unique, such as, this mark is permissible Information after being combined by predetermined manner with password for the SSID of this wireless network, the SSID of this wireless network etc., this This is not specifically limited by open embodiment.

For the first possible situation above-mentioned, there is also a kind of optional mode current connected to judge this terminal Whether wireless network meets above-mentioned default credible condition (1), it is achieved process can be: terminal obtains current connected wireless The physical address of network, is sent to Address Management Server by the mark of this physical address and current connected wireless network, When Address Management Server receives physical address and the mark of wireless network that terminal sends, mark based on this wireless network Know, the corresponding relation between wireless network identification and the physical address of storage, obtain corresponding physical address, and will receive The physical address of physical address and acquisition compare, and comparative result is sent to terminal, compares when terminal receives this During result, if comparative result is that both are identical, it is determined that current connected wireless network meets presets credible condition (1), if comparative result differs for both, it is determined that current connected wireless network is unsatisfactory for presetting credible condition (1)。

The situation that the second is possible: when the plurality of default credible condition includes above-mentioned default credible condition (2), The domain name of appointed website by current connected wireless network access appointed website, and can be resolved by terminal, and will The domain name parsed compares with designated domain name, if both are identical, it is determined that current connected wireless network meets pre- If credible condition (2), if both are different, it is determined that current connected wireless network is unsatisfactory for presetting credible condition (2)。

It should be noted that due to designated domain name be name server be appointed website distribution domain name, therefore, this terminal This designated domain name can be obtained in advance from name server, and this designated domain name is stored in terminal local.

For the situation that above-mentioned the second is possible, there is also a kind of optional mode current connected to judge this terminal Whether wireless network meets above-mentioned default credible condition (2), it is achieved process can be: terminal is by current connected wireless Network accesses appointed website, and resolves the domain name of appointed website, and the domain name parsed is sent to name server, when When name server receives the domain name parsed that terminal sends, the domain name parsed is compared with designated domain name, and Comparative result is sent to terminal, when terminal receives this comparative result, if comparative result is that both are identical, it is determined that when Front connected wireless network meets presets credible condition (2), if comparative result differs for both, it is determined that current institute The wireless network connected is unsatisfactory for presetting credible condition (2).

The third possible situation: when the plurality of default credible condition includes above-mentioned default credible condition (3), Terminal can be obtained the network address of appointed website from the website information of the website logged in by the current wireless network connected and believe Breath, the website that this appointed website provides for given server, it is judged that whether comprise designated character in the website information of appointed website, When the website information of appointed website comprises designated character, determine that the confidentiality agreement of given server is specified protocol, and really Fixed current connected wireless network meets presets credible condition (3), when not comprising appointment in the website information of appointed website During character, determine that the confidentiality agreement of given server is not specified protocol, and determine that current connected wireless network is unsatisfactory for Preset credible condition (3).

It should be noted that this given server can be the server pre-set, it is intended that website can be to specify clothes Arbitrary website that business device provides.

It addition, this designated character is used for indicating appointment confidentiality agreement, this designated character can be the character pre-set, than As, this designated character can be https, and this appointment confidentiality agreement can be the confidentiality agreement being previously stored by terminal, the disclosure This is not specifically limited by embodiment.

4th kind of possible situation: when the plurality of default credible condition includes above-mentioned default credible condition (4), Terminal can obtain the Connection Time section of current connected wireless network, and in this connection of this Connection Time Duan Weicong, this is wireless Network started to the time period between disconnecting this wireless network, it is judged that whether this Connection Time section is positioned at the appointment time period In, when in this Connection Time section section at fixed time, it is determined that current connected wireless network meets presets credibility Condition (4), when this Connection Time section is not positioned at the appointment time period, it is determined that current connected wireless network is unsatisfactory for pre- If credible condition (4).

It should be noted that this appointment time period can be the time period arranged in advance by terminal, such as this appointment time Section is some every day 18 .-24.

5th kind of possible situation: when the plurality of default credible condition includes above-mentioned default credible condition (5), Terminal can obtain the rate of connections of current connected wireless network, it is judged that the rate of connections of current connected wireless network Whether it is positioned at designated frequency range, when the rate of connections of current connected wireless network is positioned at designated frequency range, then Determine that current connected wireless network meets and preset credible condition (5), when the connection frequency of current connected wireless network Rate is not positioned at designated frequency range, it is determined that current connected wireless network is unsatisfactory for presetting credible condition (5).

It should be noted that the rate of connections of wireless network is the number of times by connecting this wireless network in certain time length Determining and obtain, this designated frequency range can be the frequency range arranged in advance by terminal, such as this designated frequency range 3-5 Secondary/24 hours.

Further, when being currently not connected with wireless network, this terminal with end operation, and can be performed without follow-up step Suddenly.

In step 203, the default credible condition met based on current connected wireless network, can from store In corresponding relation between letter property condition and safe class, obtain the safe class of current connected wireless network.

Wherein, the default credible condition that terminal can be met based on current connected wireless network, from storage In corresponding relation between credible condition and safe class, obtain corresponding safe class, the safe class of acquisition is determined Safe class for current connected wireless network.

In the disclosed embodiments, terminal determines current connected nothing not only by above-mentioned steps 202-203 The safe class of gauze network, certainly, this terminal can also be determined by the implementation that the following two kinds is possible, respectively following institute Show:

The first possible implementation: terminal, from multiple default credible conditions, determines current connected wireless The default credible condition that network is met, determines the number of the default credible condition that current connected wireless network is met Amount, quantity based on the default credible condition that current connected wireless network is met, from quantitative range and the peace of storage In corresponding relation between congruence level, obtain the safe class of current connected wireless network.

Wherein, terminal, from multiple default credible conditions, determines that current connected wireless network is met default The method of credible condition is identical with the method in above-mentioned steps 202, and disclosure embodiment does not repeats at this.

Wherein, terminal determines the realization of quantity of default credible condition that current connected wireless network met Journey can be by: after terminal determines the default credible condition that current connected wireless network is met, by currently being connected The each default credible condition setting labelling that the wireless network connect is met, and add up the number of labelling, by the number of statistics It is defined as the quantity of the default credible condition that current connected wireless network is met.

Such as, after terminal determines the default credible condition that current connected wireless network is met, for currently The each default credible condition setting labelling that the wireless network connected is met, and add up the number of labelling, it is assumed that statistics The labelling number gone out is 3, and terminal determines that quantity M of the default credible condition that current connected wireless network is met is 3.

It should be noted that above-mentioned implementation only determine that current connected wireless network is met default credible Property condition a kind of implementation of quantity, certainly, in actual application, it is also possible to be determine by other means current connected The quantity of default credible condition that met of wireless network, this is not specifically limited by disclosure embodiment.

Wherein, the quantity of the default credible condition that terminal is met based on current connected wireless network, from storage Quantitative range and safe class between corresponding relation in, obtain the operation of the safe class of current connected wireless network Can be: multiple quantitative ranges that terminal includes from the corresponding relation obtained between quantitative range and safe class, many from this Individual quantitative range determines the quantity model belonging to quantity of the default credible condition that current connected wireless network is met Enclose, based on a determination that quantitative range, from the corresponding relation between quantitative range and safe class, obtain corresponding safety etc. Level, and the safe class of acquisition is defined as the safe class of current connected wireless network.

Such as, the corresponding relation between quantitative range and the safe class of terminal storage can be as shown in table 1 below right Should be related to, quantity M of the default credible condition that current connected wireless network is met is 3, and terminal obtains quantitative range And multiple quantitative ranges that the corresponding relation between safe class includes are respectively M < 2,2≤M < 3,3≤M < 4......, And determine from the plurality of quantitative range belonging to the quantity of default credible condition that current connected wireless network met Quantitative range be 3≤M < 4, based on a determination that quantitative range 3≤M < 4, from the quantitative range shown in table 1 below with safety etc. The safe class obtaining correspondence in corresponding relation between Ji is high safety grade, and therefore terminal may determine that current connected The safe class of wireless network is high safety grade.

Table 1

Quantitative range Safe class M < 2 Lower security grade 2≤M < 3 Middle safe class 3≤M < 4 High safety grade …… ……

It should be noted that only with between quantitative range as listed in Table 1 and safe class in disclosure embodiment Illustrating as a example by corresponding relation, above-mentioned table 1 constitutes restriction to disclosure embodiment.

The implementation that the second is possible: terminal obtains the physical address of current connected wireless network, to safety clothes Business device sends safe class and obtains request, and safe class obtains in request and carries current connected wireless network physically Location, and safe class acquisition request is for indicating security server physical address based on current connected wireless network to return The safe class of current connected wireless network, receives security server based on current connected wireless network physically The safe class of the current connected wireless network that location returns.

Wherein, terminal obtains the physical address of current connected wireless network, sends safe class to security server Obtain request, when this security server receives the safe class acquisition request that terminal sends, based on current connected nothing The physical address of gauze network, the corresponding relation between physical address and the safe class of storage, obtains corresponding safety etc. Level, and the safe class of acquisition is sent to terminal, when this terminal receives the safe class that security server sends, will connect The safe class received is defined as the safe class of current connected wireless network.

In step 204, safe class based on current connected wireless network, determine and currently carry out safety verification Verification operation.

On the one hand, safe class based on current connected wireless network, determine the checking currently carrying out safety verification The process that realizes of operation can be: terminal safe class based on current connected wireless network, from the safe class of storage And in the corresponding relation between verification operation, obtain corresponding verification operation, be defined as the verification operation of acquisition currently carrying out The verification operation of safety verification.

Further, in order to improve the accuracy determining the verification operation currently carrying out safety verification, terminal is based on currently The safe class of the wireless network connected, the corresponding relation between safe class and the verification operation of storage, it is right to obtain Before the verification operation answered, this terminal is it may also be determined that currently carry out the intended application mark of safety verification, it is judged that preset application Whether list stores this intended application mark, has preset list of application and determined by the safe class of wireless network for storage Multiple application identities of the verification operation of safety verification, when in default list of application, storage has this intended application to identify, perform Above-mentioned safe class based on current connected wireless network, the corresponding pass between safe class and the verification operation of storage In system, obtain the step of the verification operation currently carrying out safety verification.

It should be noted that intended application mark is for uniquely identifying intended application, such as, intended application mark can be The title of this intended application, certain intended application mark can also identify for other, the icon etc. of such as this intended application, these public affairs Open embodiment this is not specifically limited.Such as this intended application is A application, the title that application identities is A application of A application AA。

Such as, intended application is A application, title AA that application identities is A application of A application, and current connected nothing The safe class of gauze network is high safety grade, and when in default list of application, storage has title AA that A applies, terminal can be with base In the safe class of current connected wireless network, right between safe class as described in Table 2 and verification operation In should being related to, obtaining corresponding verification operation is operation 1, is defined as currently carrying out the verification operation of safety verification by operation 1.

Table 2

Safe class Verification operation Lower security grade Operation 1, operation 2, operation 3 Middle safe class Operation 1, operation 2 High safety grade Operation 1 …… ……

It should be noted that corresponding with between safe class and the verification operation shown in above-mentioned table 2 of disclosure embodiment Illustrating as a example by relation, above-mentioned table 2 constitutes restriction to disclosure embodiment.

When terminal determines, based on said method, the verification operation currently carrying out safety verification, it may be determined that for this terminal For arbitrary application of middle installation, safe class based on current connected wireless network, the verification operation determined is the most identical. Certainly, in actual application, the different application that this terminal is installed, safety based on current connected wireless network etc. Level, the verification operation determined is likely to difference, it is achieved process can be realized by the method for following another aspect:

On the other hand, safe class based on current connected wireless network, determine and currently carry out testing of safety verification The process that realizes of card operation can be: terminal determines the intended application mark currently carrying out safety verification, based on this intended application Mark and the safe class of wireless network, the corresponding relation between application identities, safe class and the verification operation of storage, Obtain corresponding verification operation, and the verification operation of acquisition is defined as currently carrying out the verification operation of safety verification.

Compared on the one hand, in above-mentioned another aspect, terminal can obtain different checking behaviour for different application Make rather than the verification operation of each application correspondence is identical, such that it is able to the safety realizing intended application targetedly is tested Card.

In step 205, based on a determination that verification operation carry out safety verification.

Wherein, terminal, after determining the verification operation currently carrying out safety verification, can perform in this verification operation Step carries out safety verification.

In the disclosed embodiments, first, when terminal detects that safety verification instructs, determine currently attached wireless The safe class of network, and determined by the safe class of currently attached wireless network and currently carry out testing of safety verification Card operation, and then the verification operation being determined by is to carry out safety verification, that is to say, when the peace of current connected wireless network During congruence level difference, the verification operation carrying out safety verification also can be different, thus when safe class is higher, verification operation also can More simplify, thus improve the efficiency of safety verification.Secondly, terminal identifies based on the intended application currently carrying out safety verification With the safe class of wireless network, can from storage application identities, safe class and verification operation between corresponding relation, Obtain the verification operation currently carrying out safety verification, that is to say, different verification operations can be set for different application, Such that it is able to realize the safety verification of intended application targetedly.

Fig. 3 A is the block diagram of a kind of safety verification device 300 that disclosure embodiment provides.Seeing Fig. 3 A, this device includes Judge module 301, first determine module 302, second determine module 303 and authentication module 304.

Judge module 301, for when detecting that safety verification instructs, it is judged that currently the most connected wireless network;

First determines module 302, for when currently attached wireless network, determines the safe class of wireless network;

Second determines module 303, for safe class based on wireless network, determines the checking currently carrying out safety verification Operation;

Authentication module 304, for based on a determination that verification operation carry out safety verification.

Alternatively, seeing Fig. 3 B, first determines that module 302 includes:

First determines submodule 3021, for, from multiple default credible conditions, determining that wireless network is met pre- If credible condition;

Second determines submodule 3022, is used for the quantity of the default credible condition determining that wireless network is met;

First obtains submodule 3023, and the quantity of the default credible condition for being met based on netting twine network, from depositing In corresponding relation between quantitative range and the safe class of storage, obtain the safe class of wireless network.

Alternatively, seeing Fig. 3 C, first determines that module 302 includes:

3rd determines submodule 3024, for, from multiple default credible conditions, determining that wireless network is met pre- If credible condition;

Second obtains submodule 3025, for the default credible condition met based on wireless network, and can from store In corresponding relation between letter property condition and safe class, obtain the safe class of wireless network.

Alternatively, multiple default credible conditions include but not limited to following condition:

The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

The domain name of the appointed website parsed by wireless network is identical with designated domain name, it is intended that domain name is name server Domain name for appointed website distribution;

Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;

The time period connecting wireless network is positioned at the appointment time period;

The frequency connecting wireless network is positioned at designated frequency range.

Alternatively, seeing Fig. 3 D, first determines that module 302 includes:

3rd obtains submodule 3026, for obtaining the physical address of wireless network;

Sending submodule 3027, obtain request for sending safe class to security server, safe class obtains request In carry physical address, and safe class obtains request for indicating security server to return wireless network based on physical address Safe class;

Receive submodule 3028, for receiving the safety etc. of the wireless network that security server returns based on physical address Level.

Alternatively, seeing Fig. 3 E, second determines that module 303 includes:

4th determines submodule 3031, for determining the intended application mark currently carrying out safety verification;

Judge submodule 3032, be used for judging to preset in list of application whether stored intended application mark, preset application List determines multiple application identities of the verification operation of safety verification for storage by the safe class of wireless network;

4th obtains submodule 3033, for when in default list of application, storage has intended application to identify, based on wireless The safe class of network, the corresponding relation between safe class and the verification operation of storage, obtains and currently carries out testing safely The verification operation of card.

Alternatively, seeing Fig. 3 F, second determines that module 303 includes:

5th determines submodule 3034, for determining the intended application mark currently carrying out safety verification;

5th obtains submodule 3035, for based on intended application mark and the safe class of wireless network, from storage In corresponding relation between application identities, safe class and verification operation, obtain the verification operation currently carrying out safety verification.

In the disclosed embodiments, when terminal detects that safety verification instructs, currently attached wireless network is determined Safe class, and determined by the safe class of currently attached wireless network currently carry out safety verification checking behaviour Make, and then the verification operation being determined by is to carry out safety verification, that is to say, when the safety etc. of current connected wireless network When level is different, the verification operation carrying out safety verification also can be different, thus when safe class is higher, verification operation also can be more Simplify, thus improve the efficiency of safety verification.

About the device in above-described embodiment, wherein modules performs the concrete mode of operation in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.

Fig. 4 is the block diagram of a kind of safety verification device 400 that disclosure embodiment provides.Such as, device 400 can be to move Mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, body-building sets Standby, personal digital assistant etc..

With reference to Fig. 4, device 400 can include following one or more assembly: processes assembly 402, memorizer 404, power supply Assembly 406, multimedia groupware 408, audio-frequency assembly 410, the interface 412 of input/output (I/O), sensor cluster 414, and Communications component 416.

Process assembly 402 and generally control the integrated operation of device 400, such as with display, call, data communication, phase The operation that machine operation and record operation are associated.Process assembly 402 and can include that one or more processor 420 performs to refer to Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 402 can include one or more module, just Mutual in process between assembly 402 and other assemblies.Such as, process assembly 402 and can include multi-media module, many to facilitate Media component 408 and process between assembly 402 mutual.

Memorizer 404 is configured to store various types of data to support the operation at device 400.Showing of these data Example includes any application program for operation on device 400 or the instruction of method, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 404 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM), erasable compile Journey read only memory (EPROM), programmable read only memory (PROM), read only memory (ROM), magnetic memory, flash Device, disk or CD.

The various assemblies that power supply module 406 is device 400 provide power supply.Power supply module 406 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 400, the assembly that power supply is associated.

The screen of one output interface of offer that multimedia groupware 408 is included between described device 400 and user.One In a little embodiments, screen can include liquid crystal display (LCD) and touch panel (TP).If screen includes touch panel, screen Curtain may be implemented as touch screen, to receive the input signal from user.Touch panel includes one or more touch sensing Device is with the gesture on sensing touch, slip and touch panel.Described touch sensor can not only sense touch or sliding action Border, but also detect the persistent period relevant to described touch or slide and pressure.In certain embodiments, many matchmakers Body assembly 408 includes a front-facing camera and/or post-positioned pick-up head.When device 400 is in operator scheme, such as screening-mode or During video mode, front-facing camera and/or post-positioned pick-up head can receive the multi-medium data of outside.Each front-facing camera and Post-positioned pick-up head can be a fixing optical lens system or have focal length and optical zoom ability.

Audio-frequency assembly 410 is configured to output and/or input audio signal.Such as, audio-frequency assembly 410 includes a Mike Wind (MIC), when device 400 is in operator scheme, during such as call model, logging mode and speech recognition mode, mike is joined It is set to receive external audio signal.The audio signal received can be further stored at memorizer 404 or via communication set Part 416 sends.In certain embodiments, audio-frequency assembly 410 also includes a speaker, is used for exporting audio signal.

I/O interface 412 provides interface for processing between assembly 402 and peripheral interface module, above-mentioned peripheral interface module can To be keyboard, put striking wheel, button etc..These buttons may include but be not limited to: home button, volume button, start button and lock Set button.

Sensor cluster 414 includes one or more sensor, for providing the state of various aspects to comment for device 400 Estimate.Such as, what sensor cluster 414 can detect device 400 opens/closed mode, the relative localization of assembly, such as described Assembly is display and the keypad of device 400, and sensor cluster 414 can also detect device 400 or 400 1 assemblies of device Position change, the presence or absence that user contacts with device 400, device 400 orientation or acceleration/deceleration and device 400 Variations in temperature.Sensor cluster 414 can include proximity transducer, is configured to when not having any physical contact detect The existence of neighbouring object.Sensor cluster 414 can also include optical sensor, such as CMOS or ccd image sensor, is used for becoming Use as in application.In certain embodiments, this sensor cluster 414 can also include acceleration transducer, gyro sensors Device, Magnetic Sensor, pressure transducer or temperature sensor.

Communications component 416 is configured to facilitate the communication of wired or wireless mode between device 400 and other equipment.Device 400 can access wireless network based on communication standard, such as WiFi, 2G or 3G, or combinations thereof.An exemplary enforcement In example, communications component 416 receives the broadcast singal from external broadcasting management system or broadcast related information via broadcast channel. In one exemplary embodiment, described communications component 416 also includes near-field communication (NFC) module, to promote junction service.Example As, can be based on RF identification (RFID) technology in NFC module, Infrared Data Association (IrDA) technology, ultra broadband (UWB) technology, Bluetooth (BT) technology and other technologies realize.

In the exemplary embodiment, device 400 can be by one or more application specific integrated circuits (ASIC), numeral letter Number processor (DSP), digital signal processing appts (DSPD), PLD (PLD), field programmable gate array (FPGA), controller, microcontroller, microprocessor or other electronic components realize, be used for performing said method.

In the exemplary embodiment, a kind of non-transitory computer-readable recording medium including instruction, example are additionally provided As included the memorizer 404 of instruction, above-mentioned instruction can have been performed said method by the processor 420 of device 400.Such as, Described non-transitory computer-readable recording medium can be ROM, random access memory (RAM), CD-ROM, tape, floppy disk With optical data storage devices etc..

A kind of non-transitory computer-readable recording medium, when the instruction in described storage medium is by the process of mobile terminal When device performs so that mobile terminal is able to carry out a kind of safe verification method, and described method includes:

When detecting that safety verification instructs, it is judged that currently the most connected wireless network;

When currently attached wireless network, determine the safe class of wireless network;

Safe class based on wireless network, determines the verification operation currently carrying out safety verification;

Based on a determination that verification operation carry out safety verification.

Optionally it is determined that the safe class of wireless network, including:

From multiple default credible conditions, determine the default credible condition that wireless network is met;

Determine the quantity of the default credible condition that wireless network is met;

Quantity based on the default credible condition that netting twine network is met, from the quantitative range and safe class of storage it Between corresponding relation in, obtain wireless network safe class.

Optionally it is determined that the safe class of wireless network, including:

From multiple default credible conditions, determine the default credible condition that wireless network is met;

The default credible condition met based on wireless network, between credible condition and the safe class of storage In corresponding relation, obtain the safe class of wireless network.

Alternatively, multiple default credible conditions include but not limited to following condition:

The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;

The domain name of the appointed website parsed by wireless network is identical with designated domain name, it is intended that domain name is name server Domain name for appointed website distribution;

Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;

The time period connecting wireless network is positioned at the appointment time period;

The frequency connecting wireless network is positioned at designated frequency range.

Optionally it is determined that the safe class of wireless network, including:

Obtain the physical address of wireless network;

Sending safe class to security server and obtain request, safe class obtains carries physical address in request, and peace Congruence level obtains request for indicating security server to return the safe class of wireless network based on physical address;

Receive the safe class of the wireless network that security server returns based on physical address.

Alternatively, safe class based on wireless network, determine the verification operation currently carrying out safety verification, including:

Determine the intended application mark currently carrying out safety verification;

Judge to preset in list of application and whether stored intended application mark, preset list of application for storage by wireless The safe class of network determines multiple application identities of the verification operation of safety verification;

When in default list of application, storage has intended application to identify, safe class based on wireless network, from storage In corresponding relation between safe class and verification operation, obtain the verification operation currently carrying out safety verification.

Alternatively, safe class based on wireless network, determine the verification operation currently carrying out safety verification, including:

Determine the intended application mark currently carrying out safety verification;

Based on intended application mark and the safe class of wireless network, from application identities, safe class and the checking of storage In corresponding relation between operation, obtain the verification operation currently carrying out safety verification.

In the disclosed embodiments, when terminal detects that safety verification instructs, currently attached wireless network is determined Safe class, and determined by the safe class of currently attached wireless network currently carry out safety verification checking behaviour Make, and then the verification operation being determined by is to carry out safety verification, that is to say, when the safety etc. of current connected wireless network When level is different, the verification operation carrying out safety verification also can be different, thus when safe class is higher, verification operation also can be more Simplify, thus improve the efficiency of safety verification.

Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modification, purposes or Person's adaptations is followed the general principle of the present invention and includes the undocumented common knowledge in the art of the disclosure Or conventional techniques means.Description and embodiments is considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.

It should be appreciated that the invention is not limited in precision architecture described above and illustrated in the accompanying drawings, and And various modifications and changes can carried out without departing from the scope.The scope of the present invention is only limited by appended claim.

Claims (15)

1. a safe verification method, it is characterised in that described method includes:
When detecting that safety verification instructs, it is judged that currently the most connected wireless network;
When currently attached wireless network, determine the safe class of described wireless network;
Safe class based on described wireless network, determines the verification operation currently carrying out safety verification;
Based on a determination that verification operation carry out safety verification.
2. the method for claim 1, it is characterised in that the described safe class determining described wireless network, including:
From multiple default credible conditions, determine the default credible condition that described wireless network is met;
Determine the quantity of the default credible condition that described wireless network is met;
Quantity based on the default credible condition that described wireless network is met, from the quantitative range and safe class of storage it Between corresponding relation in, obtain the safe class of described wireless network.
3. the method for claim 1, it is characterised in that the described safe class determining described wireless network, including:
From multiple default credible conditions, determine the default credible condition that described wireless network is met;
The default credible condition met based on described wireless network, between credible condition and the safe class of storage In corresponding relation, obtain the safe class of described wireless network.
4. method as claimed in claim 2 or claim 3, it is characterised in that the plurality of default credible condition includes but not limited to Following condition:
The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;
The domain name of the appointed website parsed by wireless network is identical with designated domain name, and described designated domain name is name server The domain name distributed for described appointed website;
Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;
The time period connecting wireless network is positioned at the appointment time period;
The frequency connecting wireless network is positioned at designated frequency range.
5. the method for claim 1, it is characterised in that the described safe class determining described wireless network, including:
Obtain the physical address of described wireless network;
Sending safe class to security server and obtain request, described safe class obtains in request and carries described physical address, And described safe class obtains request and is used for indicating described security server to return described wireless network based on described physical address Safe class;
Receive the safe class of the described wireless network that described security server returns based on described physical address.
6. the method for claim 1, it is characterised in that described safe class based on described wireless network, determines and works as Before carry out the verification operation of safety verification, including:
Determine the intended application mark currently carrying out safety verification;
Judging to preset in list of application and whether stored described intended application mark, described default list of application passes through for storage The safe class of wireless network determines multiple application identities of the verification operation of safety verification;
When in described default list of application, storage has described intended application to identify, safe class based on described wireless network, Corresponding relation between safe class and the verification operation of storage, obtain the verification operation currently carrying out safety verification.
7. the method for claim 1, it is characterised in that described safe class based on described wireless network, determines and works as Before carry out the verification operation of safety verification, including:
Determine the intended application mark currently carrying out safety verification;
Based on described intended application mark and the safe class of described wireless network, from the application identities of storage, safe class with In corresponding relation between verification operation, obtain the verification operation currently carrying out safety verification.
8. a safety verification device, it is characterised in that described device includes:
Judge module, for when detecting that safety verification instructs, it is judged that currently the most connected wireless network;
First determines module, for when currently attached wireless network, determines the safe class of described wireless network;
Second determines module, for safe class based on described wireless network, determines the checking behaviour currently carrying out safety verification Make;
Authentication module, for based on a determination that verification operation carry out safety verification.
9. device as claimed in claim 8, it is characterised in that described first determines that module includes:
First determines submodule, for when currently attached wireless network, from multiple default credible conditions, determines described The default credible condition that wireless network is met;
Second determines submodule, is used for the quantity of the default credible condition determining that described wireless network is met;
First obtains submodule, and the quantity of the default credible condition for being met based on described wireless network, from storage In corresponding relation between quantitative range and safe class, obtain the safe class of described wireless network.
10. device as claimed in claim 8, it is characterised in that described first determines that module includes:
3rd determines submodule, for when currently attached wireless network, from multiple default credible conditions, determines described The default credible condition that wireless network is met;
Second obtains submodule, for the default credible condition met based on described wireless network, from the credibility of storage In corresponding relation between condition and safe class, obtain the safe class of described wireless network.
11. devices as described in claim 9 or 10, it is characterised in that the plurality of default credible condition includes but do not limits In following condition:
The physical address of wireless network is identical with the physical address that Address Management Server is wireless network distribution;
The domain name of the appointed website parsed by wireless network is identical with designated domain name, and described designated domain name is name server The domain name distributed for described appointed website;
Determine that the confidentiality agreement of given server is for specifying confidentiality agreement by wireless network;
The time period connecting wireless network is positioned at the appointment time period;
The frequency connecting wireless network is positioned at designated frequency range.
12. devices as claimed in claim 8, it is characterised in that described first determines that module includes:
3rd obtains submodule, for when currently attached wireless network, obtains the physical address of described wireless network;
Sending submodule, obtain request for sending safe class to security server, described safe class obtains in request and takes Carry described physical address, and described safe class obtains request and is used for indicating described security server to return based on described physical address Return the safe class of described wireless network;
Receive submodule, for receiving the safety of the described wireless network that described security server returns based on described physical address Grade.
13. devices as claimed in claim 8, it is characterised in that described second determines that module includes:
4th determines submodule, for determining the intended application mark currently carrying out safety verification;
Judge submodule, be used for judging to preset in list of application whether stored described intended application mark, described default application List determines multiple application identities of the verification operation of safety verification for storage by the safe class of wireless network;
4th obtains submodule, for when in described default list of application, storage has described intended application to identify, based on described The safe class of wireless network, the corresponding relation between safe class and the verification operation of storage, obtains and currently pacifies The verification operation of full checking.
14. devices as claimed in claim 8, it is characterised in that described second determines that module includes:
5th determines submodule, for determining the intended application mark currently carrying out safety verification;
5th obtains submodule, for based on described intended application mark and the safe class of described wireless network, from storage In corresponding relation between application identities, safe class and verification operation, obtain the verification operation currently carrying out safety verification.
15. 1 kinds of safety verification devices, it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When detecting that safety verification instructs, it is judged that currently the most connected wireless network;
When currently attached wireless network, determine the safe class of described wireless network;
Safe class based on described wireless network, determines the verification operation currently carrying out safety verification;
Based on a determination that verification operation carry out safety verification.
CN201610743851.4A 2016-08-26 2016-08-26 Safe verification method and device CN106304072A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610743851.4A CN106304072A (en) 2016-08-26 2016-08-26 Safe verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610743851.4A CN106304072A (en) 2016-08-26 2016-08-26 Safe verification method and device

Publications (1)

Publication Number Publication Date
CN106304072A true CN106304072A (en) 2017-01-04

Family

ID=57677290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610743851.4A CN106304072A (en) 2016-08-26 2016-08-26 Safe verification method and device

Country Status (1)

Country Link
CN (1) CN106304072A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070016950A1 (en) * 2005-07-12 2007-01-18 Nec Corporation Method and system for providing terminal security checking service
CN103957103A (en) * 2014-04-17 2014-07-30 小米科技有限责任公司 Safety authentication method and device and mobile terminal
CN104239816A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Electronic equipment capable of switching work status and switching method thereof
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105635156A (en) * 2016-01-05 2016-06-01 上海大之商科技发展股份有限公司 Large distributed financial terminal system
CN105867969A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 APP starting method and terminal

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070016950A1 (en) * 2005-07-12 2007-01-18 Nec Corporation Method and system for providing terminal security checking service
CN103957103A (en) * 2014-04-17 2014-07-30 小米科技有限责任公司 Safety authentication method and device and mobile terminal
CN104239816A (en) * 2014-09-28 2014-12-24 联想(北京)有限公司 Electronic equipment capable of switching work status and switching method thereof
CN104301117A (en) * 2014-10-22 2015-01-21 中国联合网络通信集团有限公司 Identity verification method and device
CN104933351A (en) * 2015-05-26 2015-09-23 小米科技有限责任公司 Information security processing method and information security processing device
CN105635156A (en) * 2016-01-05 2016-06-01 上海大之商科技发展股份有限公司 Large distributed financial terminal system
CN105867969A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 APP starting method and terminal

Similar Documents

Publication Publication Date Title
CN104038263B (en) Method and device for establishing Bluetooth connection
CN104202306B (en) Access authentication method, Apparatus and system
CN106020784B (en) Application message display method and device and terminal
KR101755589B1 (en) Method and apparatus, program and recording medium for network access
CN106231259B (en) Display methods, video player and the server of monitored picture
CN105184561A (en) Safety payment method and device
WO2016145862A1 (en) Device binding method and apparatus
JP6186508B2 (en) Network connection method and terminal
EP2978265B1 (en) Method and apparatus for automatically connecting to a wireless network
CN104991789A (en) Method and apparatus for starting application
CN103916233A (en) Information encryption method and device
CN105578411B (en) Positioning information prompting method and device
CN103986969B (en) application management method, device and system
CN104936304A (en) Intelligent equipment binding method, intelligent equipment, and server
US20170300503A1 (en) Method and apparatus for managing video data, terminal, and server
CN104216742B (en) Brush machine control method and device based on password
US9693296B2 (en) Network connection method and apparatus
CN104660685A (en) Method and device for obtaining equipment information
JP2017537414A (en) Fingerprint authentication method and apparatus, program and recording medium
CN104363631A (en) Connection method, device and system of wireless router
CN105306204A (en) Security verification method, device and system
CN104540184A (en) Equipment networking method and device
RU2626659C1 (en) Method and equipment for device control
CN105094962A (en) Application disabled method and apparatus
CN104091376B (en) Intelligent lock control method and apparatus thereof

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination