CN106550365B - WIFI network access processing method and terminal - Google Patents

WIFI network access processing method and terminal Download PDF

Info

Publication number
CN106550365B
CN106550365B CN201610955246.3A CN201610955246A CN106550365B CN 106550365 B CN106550365 B CN 106550365B CN 201610955246 A CN201610955246 A CN 201610955246A CN 106550365 B CN106550365 B CN 106550365B
Authority
CN
China
Prior art keywords
network
wifi network
wifi
trusted
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610955246.3A
Other languages
Chinese (zh)
Other versions
CN106550365A (en
Inventor
安占磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microgrid Union Technology Chengdu Co ltd
Original Assignee
Shenzhen Micronet Force Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Micronet Force Information Technology Co Ltd filed Critical Shenzhen Micronet Force Information Technology Co Ltd
Priority to CN201610955246.3A priority Critical patent/CN106550365B/en
Publication of CN106550365A publication Critical patent/CN106550365A/en
Application granted granted Critical
Publication of CN106550365B publication Critical patent/CN106550365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/16Discovering, processing access restriction or access information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W48/00Access restriction; Network selection; Access point selection
    • H04W48/18Selecting a network or a communication service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

A method of WIFI network access processing, comprising: monitoring a connected WIFI network; determining whether the WIFI network is a trusted network; and processing the application programming interface calling request sent by the WIFI network according to the judgment result. According to the scheme, the situation that the user privacy data is stolen by the untrusted WIFI can be avoided.

Description

WIFI network access processing method and terminal
Technical Field
The embodiment of the invention relates to a communication technology, in particular to a WIFI (Wireless Fidelity) network access processing method and a terminal.
Background
With the popularization of intelligent mobile terminals, no matter social contact or office work, mobile networks need to be connected to obtain information. In public places, people often search for many WIFI hotspots, and the hotspots provide great convenience for people to connect with the network at any time. However, in addition to normal WIFI provided by communication carriers and individuals, there are some pseudo-WIFI that specifically steal user privacy. Often, the intelligent terminal can automatically connect the WIFI, the collected user privacy data generally has no noise, the information acquired in a short time is little, and the user can hardly find the information.
At present, the Android system performs many security management on data of a user, and simultaneously provides an access interface for data access due to the openness of the Android system. Access to these interfaces is also managed by rights, but many software require a user to be forcibly authorized. And the data stolen by the pseudo WIFI each time is few, and the user is hard to find out the privacy disclosure in appearance.
Disclosure of Invention
In order to solve the technical problem, embodiments of the present invention provide a method and a terminal for WIFI network access processing, which can prevent untrusted WIFI from stealing user privacy data.
A method of WIFI network access processing, comprising:
monitoring a connected WIFI network;
determining whether the WIFI network is a trusted network;
and processing the application programming interface calling request sent by the WIFI network according to the judgment result.
According to the method, after the terminal is connected to the WIFI network, whether the WIFI network is a trusted network is judged firstly, the trusted network and the untrusted network are treated differently for the interface of the access bottom layer, and therefore the situation that the untrusted WIFI network steals user privacy data can be avoided, and therefore the safety of the mobile terminal is improved.
Optionally, the determining whether the WIFI network is a trusted network includes:
and inquiring whether the WIFI network is a trusted network or not, and if the WIFI network is an untrusted network, judging whether the WIFI network is a trusted network or not according to a preset rule.
Optionally, the determining whether the WIFI network is a trusted network according to a predetermined rule includes:
and monitoring the WIFI network, if all calls of the WIFI network to the virtual interface are triggered by user behaviors in a specified time, judging that the WIFI network is a trusted network, and otherwise, judging that the WIFI network is an untrusted network.
Optionally, the determining whether the WIFI network is a trusted network according to a predetermined rule includes:
if the WIFI network is a specific network, judging that the WIFI network is a trusted network, otherwise, monitoring the WIFI network, if all calls of the WIFI network to a virtual interface are triggered by user behaviors in a specific time, judging that the WIFI network is a trusted network, otherwise, judging that the WIFI network is an untrusted network.
Optionally, the processing, according to the determination result, the application programming interface call request sent by the WIFI network includes:
if the judgment result is the trusted network, the application programming interface calling request sent by the WIFI network is forwarded to a specified application programming interface, and if the judgment result is the untrusted network, the application programming interface calling request sent by the WIFI network is forwarded to a preset virtual interface module and virtual data randomly generated by the virtual interface module is returned.
Optionally, after the determination result is the untrusted network, the method further includes:
and recording the calling request of the application programming interface of the WIFI network.
Optionally, after determining whether the WIFI network is a trusted network, the method further includes:
and recording whether the WIFI network is a trusted network.
An embodiment of the present invention further provides a terminal, including:
the monitoring module is used for monitoring the connected wireless fidelity (WIFI) network;
the network judgment module is used for judging whether the WIFI network is a trusted network;
and the processing module is used for processing the application programming interface calling request sent by the WIFI network according to the judgment result.
Optionally, the network determination module includes: a query unit and a decision unit, wherein,
the inquiry unit is used for inquiring whether the WIFI network is a trusted network or not, and if the WIFI network is an untrusted network, the judgment unit is triggered;
the judging unit is used for judging whether the WIFI network is a trusted network or not according to a preset rule.
Optionally, the determining unit is specifically configured to monitor the WIFI network, and if it is monitored within a specified time that all calls of the virtual interface by the WIFI network are triggered by user behavior, determine that the WIFI network is a trusted network, otherwise determine that the WIFI network is an untrusted network.
Optionally, the determining unit is specifically configured to determine that the WIFI network is a trusted network if the WIFI network is a specific network, otherwise monitor the WIFI network, determine that the WIFI network is a trusted network if all calls of the WIFI network to a virtual interface are triggered by user behavior within a specified time, and otherwise determine that the WIFI network is an untrusted network.
Optionally, the terminal further comprises a virtual interface module,
the processing module is used for processing the application programming interface call request sent by the WIFI network according to the judgment result and comprises the following steps: if the judgment result is a trusted network, forwarding the application programming interface calling request sent by the WIFI network to a specified application programming interface, and if the judgment result is an untrusted network, forwarding the application programming interface calling request sent by the WIFI network to a preset virtual interface module and returning virtual data generated by the virtual interface module;
and the virtual interface module is used for randomly generating the virtual data after receiving the application programming interface calling request.
Optionally, the processing module, after determining that the result is the untrusted network, further includes: and recording the calling request of the application programming interface of the WIFI network.
Optionally, after determining whether the WIFI network is a trusted network, the network determining module further includes: and recording whether the WIFI network is a trusted network.
The WIFI network access processing method and the terminal provided by the embodiment of the invention can avoid the situation that the untrusted WIFI steals the user privacy data, thereby improving the safety of the mobile terminal.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a schematic diagram of a hardware structure of a mobile terminal implementing various embodiments of the present invention;
FIG. 2 is a diagram of a wireless communication system for the mobile terminal shown in FIG. 1;
fig. 3 is a flowchart of a WIFI network access processing method according to a first embodiment of the present invention;
fig. 4 is a flowchart of a WIFI network access processing method according to a second embodiment of the present invention;
fig. 5 is a flowchart of a WIFI network access processing method according to a third embodiment of the present invention;
fig. 6 is a flowchart of a WIFI network access processing method according to a fourth embodiment of the present invention;
fig. 7 is a schematic diagram of a terminal according to a fifth embodiment of the present invention;
fig. 8 is a schematic diagram of a terminal according to a sixth embodiment of the present invention;
fig. 9 is a schematic diagram of a terminal according to a seventh embodiment of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
A mobile terminal implementing various embodiments of the present invention will now be described with reference to the accompanying drawings. In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in themselves. Thus, "module" and "component" may be used in a mixture.
The mobile terminal may be implemented in various forms. For example, the terminal described in the present invention may include a mobile terminal such as a mobile phone, a smart phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a navigation device, and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. In the following, it is assumed that the terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present invention can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Fig. 1 is a schematic hardware configuration of a mobile terminal implementing various embodiments of the present invention.
The mobile terminal 100 may include a wireless communication unit 110, an a/V (audio/video) input unit 120, a user input unit 130, a sensing unit 140, an output unit 150, a memory 160, an interface unit 170, a controller 180, and a power supply unit 190, etc. Fig. 1 illustrates a mobile terminal having various components, but it is to be understood that not all illustrated components are required to be implemented. More or fewer components may alternatively be implemented. Elements of the mobile terminal will be described in detail below.
The wireless communication unit 110 typically includes one or more components that allow radio communication between the mobile terminal 100 and a wireless communication system or network. For example, the wireless communication unit may include at least one of a broadcast receiving module 111, a mobile communication module 112, a wireless internet module 113, a short-range communication module 114, and a location information module 115.
The broadcast receiving module 111 receives a broadcast signal and/or broadcast associated information from an external broadcast management server via a broadcast channel. The broadcast channel may include a satellite channel and/or a terrestrial channel. The broadcast management server may be a server that generates and transmits a broadcast signal and/or broadcast associated information or a server that receives a previously generated broadcast signal and/or broadcast associated information and transmits it to a terminal. The broadcast signal may include a TV broadcast signal, a radio broadcast signal, a data broadcast signal, and the like. Also, the broadcast signal may further include a broadcast signal combined with a TV or radio broadcast signal. The broadcast associated information may also be provided via a mobile communication network, and in this case, the broadcast associated information may be received by the mobile communication module 112. The broadcast signal may exist in various forms, for example, it may exist in the form of an Electronic Program Guide (EPG) of Digital Multimedia Broadcasting (DMB), an Electronic Service Guide (ESG) of digital video broadcasting-handheld (DVB-H), and the like. The broadcast receiving module 111 may receive a signal broadcast by using various types of broadcasting systems. In particular, the broadcast receiving module 111 may receive digital broadcasting by using a digital broadcasting system such as a data broadcasting system of multimedia broadcasting-terrestrial (DMB-T), digital multimedia broadcasting-satellite (DMB-S), digital video broadcasting-handheld (DVB-H), forward link media (MediaFLO @), terrestrial digital broadcasting integrated service (ISDB-T), and the like. The broadcast receiving module 111 may be constructed to be suitable for various broadcasting systems that provide broadcast signals as well as the above-mentioned digital broadcasting systems. The broadcast signal and/or broadcast associated information received via the broadcast receiving module 111 may be stored in the memory 160 (or other type of storage medium).
The mobile communication module 112 transmits and/or receives radio signals to and/or from at least one of a base station (e.g., access point, node B, etc.), an external terminal, and a server. Such radio signals may include voice call signals, video call signals, or various types of data transmitted and/or received according to text and/or multimedia messages.
The wireless internet module 113 supports wireless internet access of the mobile terminal. The module may be internally or externally coupled to the terminal. The wireless internet access technology to which the module relates may include WLAN (wireless LAN) (Wi-Fi), Wibro (wireless broadband), Wimax (worldwide interoperability for microwave access), HSDPA (high speed downlink packet access), and the like.
The short-range communication module 114 is a module for supporting short-range communication. Some examples of short-range communication technologies include bluetooth (TM), Radio Frequency Identification (RFID), infrared data association (IrDA), Ultra Wideband (UWB), zigbee (TM), and the like.
The location information module 115 is a module for checking or acquiring location information of the mobile terminal. A typical example of the location information module is a GPS (global positioning system). According to the current technology, the GPS module 115 calculates distance information and accurate time information from three or more satellites and applies triangulation to the calculated information, thereby accurately calculating three-dimensional current location information according to longitude, latitude, and altitude. Currently, a method for calculating position and time information uses three satellites and corrects an error of the calculated position and time information by using another satellite. In addition, the GPS module 115 can calculate speed information by continuously calculating current position information in real time.
The a/V input unit 120 is used to receive an audio or video signal. The a/V input unit 120 may include a camera 121 and a microphone 1220, and the camera 121 processes image data of still pictures or video obtained by an image capturing apparatus in a video capturing mode or an image capturing mode. The processed image frames may be displayed on the display unit 151. The image frames processed by the camera 121 may be stored in the memory 160 (or other storage medium) or transmitted via the wireless communication unit 110, and two or more cameras 1210 may be provided according to the construction of the mobile terminal. The microphone 122 may receive sounds (audio data) via the microphone in a phone call mode, a recording mode, a voice recognition mode, or the like, and can process such sounds into audio data. The processed audio (voice) data may be converted into a format output transmittable to a mobile communication base station via the mobile communication module 112 in case of a phone call mode. The microphone 122 may implement various types of noise cancellation (or suppression) algorithms to cancel (or suppress) noise or interference generated in the course of receiving and transmitting audio signals.
The user input unit 130 may generate key input data according to a command input by a user to control various operations of the mobile terminal. The user input unit 130 allows a user to input various types of information, and may include a keyboard, dome sheet, touch pad (e.g., a touch-sensitive member that detects changes in resistance, pressure, capacitance, and the like due to being touched), scroll wheel, joystick, and the like. In particular, when the touch pad is superimposed on the display unit 151 in the form of a layer, a touch screen may be formed.
The sensing unit 140 detects a current state of the mobile terminal 100 (e.g., an open or closed state of the mobile terminal 100), a position of the mobile terminal 100, presence or absence of contact (i.e., touch input) by a user with the mobile terminal 100, an orientation of the mobile terminal 100, acceleration or deceleration movement and direction of the mobile terminal 100, and the like, and generates a command or signal for controlling an operation of the mobile terminal 100. For example, when the mobile terminal 100 is implemented as a slide-type mobile phone, the sensing unit 140 may sense whether the slide-type phone is opened or closed. In addition, the sensing unit 140 can detect whether the power supply unit 190 supplies power or whether the interface unit 170 is coupled with an external device. The sensing unit 140 may include a proximity sensor 1410 as will be described below in connection with a touch screen.
The interface unit 170 serves as an interface through which at least one external device is connected to the mobile terminal 100. For example, the external device may include a wired or wireless headset port, an external power supply (or battery charger) port, a wired or wireless data port, a memory card port, a port for connecting a device having an identification module, an audio input/output (I/O) port, a video I/O port, an earphone port, and the like. The identification module may store various information for authenticating a user using the mobile terminal 100 and may include a User Identity Module (UIM), a Subscriber Identity Module (SIM), a Universal Subscriber Identity Module (USIM), and the like. In addition, a device having an identification module (hereinafter, referred to as an "identification device") may take the form of a smart card, and thus, the identification device may be connected with the mobile terminal 100 via a port or other connection means. The interface unit 170 may be used to receive input (e.g., data information, power, etc.) from an external device and transmit the received input to one or more elements within the mobile terminal 100 or may be used to transmit data between the mobile terminal and the external device.
In addition, when the mobile terminal 100 is connected with an external cradle, the interface unit 170 may serve as a path through which power is supplied from the cradle to the mobile terminal 100 or may serve as a path through which various command signals input from the cradle are transmitted to the mobile terminal. Various command signals or power input from the cradle may be used as signals for recognizing whether the mobile terminal is accurately mounted on the cradle. The output unit 150 is configured to provide output signals (e.g., audio signals, video signals, alarm signals, vibration signals, etc.) in a visual, audio, and/or tactile manner. The output unit 150 may include a display unit 151, an audio output module 152, an alarm unit 153, and the like.
The display unit 151 may display information processed in the mobile terminal 100. For example, when the mobile terminal 100 is in a phone call mode, the display unit 151 may display a User Interface (UI) or a Graphical User Interface (GUI) related to a call or other communication (e.g., text messaging, multimedia file downloading, etc.). When the mobile terminal 100 is in a video call mode or an image capturing mode, the display unit 151 may display a captured image and/or a received image, a UI or GUI showing a video or an image and related functions, and the like.
Meanwhile, when the display unit 151 and the touch pad are overlapped with each other in the form of a layer to form a touch screen, the display unit 151 may serve as an input device and an output device. The display unit 151 may include at least one of a Liquid Crystal Display (LCD), a thin film transistor LCD (TFT-LCD), an Organic Light Emitting Diode (OLED) display, a flexible display, a three-dimensional (3D) display, and the like. Some of these displays may be configured to be transparent to allow a user to view from the outside, which may be referred to as transparent displays, and a typical transparent display may be, for example, a TOLED (transparent organic light emitting diode) display or the like. Depending on the particular desired implementation, the mobile terminal 100 may include two or more display units (or other display devices), for example, the mobile terminal may include an external display unit (not shown) and an internal display unit (not shown). The touch screen may be used to detect a touch input pressure as well as a touch input position and a touch input area.
The audio output module 152 may convert audio data received by the wireless communication unit 110 or stored in the memory 160 into an audio signal and output as sound when the mobile terminal is in a call signal reception mode, a call mode, a recording mode, a voice recognition mode, a broadcast reception mode, or the like. Also, the audio output module 152 may provide audio output related to a specific function performed by the mobile terminal 100 (e.g., a call signal reception sound, a message reception sound, etc.). The audio output module 152 may include a speaker, a buzzer, and the like.
The alarm unit 153 may provide an output to notify the mobile terminal 100 of the occurrence of an event. Typical events may include call reception, message reception, key signal input, touch input, and the like. In addition to audio or video output, the alarm unit 153 may provide output in different ways to notify the occurrence of an event. For example, the alarm unit 153 may provide an output in the form of vibration, and when a call, a message, or some other incoming communication (incomingmunication) is received, the alarm unit 153 may provide a tactile output (i.e., vibration) to inform the user thereof. By providing such a tactile output, the user can recognize the occurrence of various events even when the user's mobile phone is in the user's pocket. The alarm unit 153 may also provide an output notifying the occurrence of an event via the display unit 151 or the audio output module 152.
The memory 160 may store software programs and the like for processing and controlling operations performed by the controller 180, or may temporarily store data (e.g., a phonebook, messages, still images, videos, and the like) that has been or will be output. Also, the memory 160 may store data regarding various ways of vibration and audio signals output when a touch is applied to the touch screen.
The memory 160 may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. Also, the mobile terminal 100 may cooperate with a network storage device that performs a storage function of the memory 160 through a network connection.
The controller 180 generally controls the overall operation of the mobile terminal. For example, the controller 180 performs control and processing related to voice calls, data communications, video calls, and the like. In addition, the controller 180 may include a multimedia module 1810 for reproducing (or playing back) multimedia data, and the multimedia module 1810 may be constructed within the controller 180 or may be constructed separately from the controller 180. The controller 180 may perform a pattern recognition process to recognize a handwriting input or a picture drawing input performed on the touch screen as a character or an image.
The power supply unit 190 receives external power or internal power and provides appropriate power required to operate various elements and components under the control of the controller 180.
The various embodiments described herein may be implemented in a computer-readable medium using, for example, computer software, hardware, or any combination thereof. For a hardware implementation, the embodiments described herein may be implemented using at least one of an Application Specific Integrated Circuit (ASIC), a Digital Signal Processor (DSP), a Digital Signal Processing Device (DSPD), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a processor, a controller, a microcontroller, a microprocessor, an electronic unit designed to perform the functions described herein, and in some cases, such embodiments may be implemented in the controller 180. For a software implementation, the implementation such as a process or a function may be implemented with a separate software module that allows performing at least one function or operation. The software codes may be implemented by software applications (or programs) written in any suitable programming language, which may be stored in the memory 160 and executed by the controller 180.
Up to this point, mobile terminals have been described in terms of their functionality. Hereinafter, a slide-type mobile terminal among various types of mobile terminals, such as a folder-type, bar-type, swing-type, slide-type mobile terminal, and the like, will be described as an example for the sake of brevity. Accordingly, the present invention can be applied to any type of mobile terminal, and is not limited to a slide type mobile terminal.
The mobile terminal 100 as shown in fig. 1 may be configured to operate with communication systems such as wired and wireless communication systems and satellite-based communication systems that transmit data via frames or packets.
A communication system in which a mobile terminal according to the present invention is operable will now be described with reference to fig. 2.
Such communication systems may use different air interfaces and/or physical layers. For example, the air interface used by the communication system includes, for example, Frequency Division Multiple Access (FDMA), Time Division Multiple Access (TDMA), Code Division Multiple Access (CDMA), and Universal Mobile Telecommunications System (UMTS) (in particular, Long Term Evolution (LTE)), global system for mobile communications (GSM), and the like. By way of non-limiting example, the following description relates to a CDMA communication system, but such teachings are equally applicable to other types of systems.
Referring to fig. 2, the CDMA wireless communication system may include a plurality of mobile terminals 100, a plurality of Base Stations (BSs) 270, Base Station Controllers (BSCs) 275, and a Mobile Switching Center (MSC) 280. The MSC280 is configured to interface with a Public Switched Telephone Network (PSTN) 290. The MSC280 is also configured to interface with a BSC275, which may be coupled to the base station 270 via a backhaul. The backhaul may be constructed according to any of several known interfaces including, for example, E1/T1, ATM, IP, PPP, frame Relay, HDSL, ADSL, or xDSL. It will be understood that a system as shown in fig. 2 may include multiple BSCs 2750.
Each BS270 may serve one or more sectors (or regions), each sector covered by a multi-directional antenna or an antenna pointing in a particular direction being radially distant from the BS 270. Alternatively, each partition may be covered by two or more antennas for diversity reception. Each BS270 may be configured to support multiple frequency allocations, with each frequency allocation having a particular frequency spectrum (e.g., 1.25MHz,5MHz, etc.).
The intersection of partitions with frequency allocations may be referred to as a CDMA channel. The BS270 may also be referred to as a Base Transceiver Subsystem (BTS) or other equivalent terminology. In such a case, the term "base station" may be used to generically refer to a single BSC275 and at least one BS 270. The base stations may also be referred to as "cells". Alternatively, each sector of a particular BS270 may be referred to as a plurality of cell sites.
As shown in fig. 2, a Broadcast Transmitter (BT)295 transmits a broadcast signal to the mobile terminal 100 operating within the system. A broadcast receiving module 111 as shown in fig. 1 is provided at the mobile terminal 100 to receive a broadcast signal transmitted by the BT 295. In fig. 2, several Global Positioning System (GPS) satellites 300 are shown. The satellite 300 assists in locating at least one of the plurality of mobile terminals 100.
In fig. 2, a plurality of satellites 300 are depicted, but it is understood that useful positioning information may be obtained with any number of satellites. The GPS module 115 as shown in fig. 1 is generally configured to cooperate with satellites 300 to obtain desired positioning information. Other techniques that can track the location of the mobile terminal may be used instead of or in addition to GPS tracking techniques. In addition, at least one GPS satellite 300 may selectively or additionally process satellite DMB transmission.
As a typical operation of the wireless communication system, the BS270 receives reverse link signals from various mobile terminals 100. The mobile terminal 100 is generally engaged in conversations, messaging, and other types of communications. Each reverse link signal received by a particular base station 270 is processed within the particular BS 270. The obtained data is forwarded to the associated BSC 275. The BSC provides call resource allocation and mobility management functions including coordination of soft handoff procedures between BSs 270. The BSCs 275 also route the received data to the MSC280, which provides additional routing services for interfacing with the PSTN 290. Similarly, the PSTN290 interfaces with the MSC280, the MSC interfaces with the BSCs 275, and the BSCs 275 accordingly control the BS270 to transmit forward link signals to the mobile terminal 100.
Based on the above mobile terminal hardware structure and communication system, the present invention provides various embodiments of the method.
Example one
Fig. 3 is a flowchart of a WIFI network access processing method according to an embodiment of the present invention, and to solve a security problem existing in an existing Android system structure, an embodiment of the present invention provides a WIFI network access processing method, and as shown in fig. 3, the method according to the present embodiment includes:
s301, monitoring a connected WIFI network by a terminal;
step S302, the terminal judges whether the WIFI network is a trusted network;
step S303, the terminal processes an API (application programming Interface) call request sent by the WIFI network according to the determination result.
According to the method, after the terminal is connected to the WIFI network, whether the WIFI network is a trusted network or not is judged, the trusted network and the untrusted network are treated differently for accessing the underlying interface, and therefore the situation that the untrusted WIFI network steals user privacy data can be avoided, and therefore the safety of the mobile terminal is improved.
Example two
Fig. 4 is a flowchart of a WIFI network access processing method according to an embodiment of the present invention, and as shown in fig. 4, the method according to this embodiment includes the following steps:
s401, monitoring a connected WIFI network by a terminal;
step S402, the terminal inquires whether the WIFI network is a trusted network, and if the WIFI network is the trusted network, the step S404 is executed; if the WIFI network is an untrusted network, go to step 403;
step 403, the terminal judges whether the WIFI network is a trusted network according to a preset rule, and if the WIFI network is the trusted network, the step 404 is executed; if the WIFI network is an untrusted network, go to step 405;
the predetermined rule may be a rule for determining a trusted network, which is set in the terminal system in advance, and a specific embodiment will be given below.
Step 404, forwarding the API call request sent by the WIFI network to a designated API;
in this step, the designated API refers to a real API in the terminal system of the WIFI network API call request.
Step 405, forwarding the API call request sent by the WIFI network to a preset virtual interface module, and returning virtual data randomly generated by the virtual interface module.
The processing method for the untrusted WIFI network in the embodiment includes the steps of forwarding the API call request of the untrusted WIFI network to the preset virtual interface module, and returning the virtual data randomly generated by the virtual interface module to the untrusted WIFI network, so that the untrusted WIFI network can be prevented from stealing user privacy data, and the safety of the mobile terminal is improved.
EXAMPLE III
Fig. 5 is a flowchart of a method for WIFI network access processing according to an embodiment of the present invention, and as shown in fig. 5, the method of the present embodiment includes the following steps:
s501, monitoring a connected WIFI network by a terminal;
step S502, the terminal inquires whether the WIFI network is a trusted network, and if the WIFI network is the trusted network, the step S504 is executed; if the WIFI network is an untrusted network, go to step 503;
step 503, the terminal monitors the WIFI network, and if it is monitored that all calls of the virtual interface by the WIFI network are triggered by user behavior within a specified time, it is determined that the WIFI network is a trusted network, and then step 504 is executed; if the calling of the virtual interface by the WIFI network is monitored to exist within the specified time and is not triggered by the user behavior, judging that the WIFI network is an untrusted network, and turning to step 505;
and if the calling of the WIFI network to the virtual interface is calling of a point touch message of a screen received by the terminal or calling of a trigger message of a key received by the terminal, the calling is regarded as being triggered by the user behavior.
Step 504, forwarding the API call request sent by the WIFI network to a designated API;
in this step, the designated API refers to a real API in the terminal system of the WIFI network API call request.
And 505, forwarding the API call request sent by the WIFI network to a preset virtual interface module, and returning virtual data randomly generated by the virtual interface module.
Example four
Fig. 6 is a flowchart of a method for WIFI network access processing according to an embodiment of the present invention, and as shown in fig. 6, the method of this embodiment includes the following steps:
s601, monitoring a connected WIFI network by the terminal;
step S602, the terminal inquires whether the WIFI network is a trusted network, and if the WIFI network is the trusted network, the step S604 is executed; if the WIFI network is an untrusted network, go to step 603;
step 603, the terminal inquires whether the WIFI network is a specific network, if the WIFI network is inquired to be the specific network, the WIFI network is judged to be a trusted network and is recorded, then the step 605 is performed, and if the WIFI network is not the specific network, the step 604 is performed;
the specific network in this step may be a WIFI network with high reliability, such as a china mobile network, a china unicom network, and a china telecommunication network.
Step 604, monitoring the WIFI network, if all calls of the WIFI network to a virtual interface are triggered by user behaviors in a specified time, judging that the WIFI network is a trusted network, recording, and then turning to step 605; if the calling of the WIFI network to the virtual interface is monitored within the specified time and is not triggered by the user behavior, judging that the WIFI network is an untrusted network, recording, and turning to step 606;
step 605, forwarding the API call request sent by the WIFI network to a designated API;
in this step, the designated API refers to a real API in the terminal system of the WIFI network API call request.
Step 606, recording the application programming interface call request of the WIFI network, forwarding the API call request sent by the WIFI network to a preset virtual interface module, and returning virtual data randomly generated by the virtual interface module.
EXAMPLE five
Fig. 7 is a schematic diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 7, the terminal according to the embodiment includes:
a monitoring module 701, configured to monitor a connected WIFI network;
a network determination module 702, configured to determine whether the WIFI network is a trusted network;
and the processing module 703 is configured to process the application programming interface call request sent by the WIFI network according to the determination result.
After the terminal receives the WIFI network, whether the WIFI network is a trusted network or not is judged firstly, the trusted network and the untrusted network are treated differently for the interface of the access bottom layer, and therefore the situation that the untrusted WIFI network steals user privacy data can be avoided, and therefore the safety of the mobile terminal is improved.
EXAMPLE six
Fig. 8 is a schematic diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 8, the network determining module 702 of the embodiment includes:
a querying unit 7021, configured to query whether the WIFI network is a trusted network, and if the WIFI network is an untrusted network, trigger a determining unit;
determining unit 7022 is configured to determine whether the WIFI network is a trusted network according to a predetermined rule.
In a preferred embodiment, determining unit 7022 may be configured to monitor the WIFI network, and if it is monitored that all calls of the virtual interface by the WIFI network are triggered by user behavior within a specified time, determine that the WIFI network is a trusted network, otherwise determine that the WIFI network is an untrusted network.
In another preferred embodiment, determining unit 7022 may be configured to determine that the WIFI network is a trusted network if the WIFI network is a specific network, otherwise monitor the WIFI network, determine that the WIFI network is a trusted network if all calls to the virtual interface from the WIFI network are triggered by user behavior within a specified time, and otherwise determine that the WIFI network is an untrusted network.
EXAMPLE seven
Fig. 9 is a schematic diagram of a terminal according to an embodiment of the present invention, and as shown in fig. 9, the terminal according to the embodiment includes:
a monitoring module 901, configured to monitor a connected WIFI network;
a network determining module 902, configured to determine whether the WIFI network is a trusted network;
the processing module 903, configured to process the application programming interface call request sent by the WIFI network according to the determination result, includes: if the judgment result is a trusted network, forwarding the application programming interface calling request sent by the WIFI network to a specified application programming interface, and if the judgment result is an untrusted network, forwarding the application programming interface calling request sent by the WIFI network to a preset virtual interface module and returning virtual data generated by the virtual interface module;
the virtual interface module 904 is configured to randomly generate the virtual data after receiving the application programming interface call request.
In an optional embodiment, the processing module 903, after determining that the result is the untrusted network, may further include: and recording the calling request of the application programming interface of the WIFI network.
In an optional embodiment, after determining whether the WIFI network is a trusted network, the network determining module 902 further includes: and recording whether the WIFI network is a trusted network.
The method for processing the untrusted WIFI network by the terminal comprises the steps of forwarding the API call request of the untrusted WIFI network to the preset virtual interface module, and returning virtual data randomly generated by the virtual interface module to the untrusted WIFI network, so that the untrusted WIFI network is prevented from stealing user privacy data.
The terminal of the embodiment adopts a mode of a virtual system privacy interface to judge the untrusted WIFI network, so that stealing of user privacy information by pseudo WIFI can be effectively prevented, and the safety of the mobile terminal is improved.
It should be noted that the listening module 701/901, the network determining module 702/902, and the processing module 703/903 in the mobile terminal (or apparatus) provided in the embodiment of the present invention may be disposed in the wireless internet module 113 in fig. 1, and the virtual interface module 904 may be disposed in the wireless internet module 113 or the controller 180 in fig. 1.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present invention may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for WIFI network access processing is characterized by comprising the following steps:
monitoring a connected WIFI network;
inquiring whether the WIFI network is a trusted network or not, if so, judging whether the WIFI network is a trusted network or not according to a preset rule;
processing an application programming interface calling request sent by the WIFI network according to a judgment result;
the determining whether the WIFI network is a trusted network according to a predetermined rule includes:
monitoring the WIFI network, if all calls of the WIFI network to a virtual interface are triggered by user behaviors in a specific time, judging the WIFI network to be a trusted network, and otherwise, judging the WIFI network to be an untrusted network;
the processing of the application programming interface call request sent by the WIFI network according to the judgment result comprises:
if the judgment result is the trusted network, the application programming interface calling request sent by the WIFI network is forwarded to a specified application programming interface, and if the judgment result is the untrusted network, the application programming interface calling request sent by the WIFI network is forwarded to a preset virtual interface module and virtual data randomly generated by the virtual interface module is returned.
2. A WIFI network access processing method according to claim 1, characterized in that the call to the virtual interface from the WIFI network is a call that receives a click message from the screen or a call that receives a trigger message from a key, and then the call is regarded as being triggered by the user behavior.
3. A method for WIFI network access processing according to claim 1, wherein said determining if the WIFI network is a trusted network according to predetermined rules, the method further comprising:
and if the WIFI network is a specific network, judging that the WIFI network is a trusted network, otherwise, monitoring the WIFI network.
4. A WIFI network access processing method according to claim 1, characterized by that, after said decision result is an untrusted network, it further includes:
and recording the calling request of the application programming interface of the WIFI network.
5. A WIFI network access processing method according to claim 1, wherein said determining if said WIFI network is a trusted network further comprises:
and recording whether the WIFI network is a trusted network.
6. A terminal, comprising:
the monitoring module is used for monitoring the connected wireless fidelity (WIFI) network;
the network judgment module is used for judging whether the WIFI network is a trusted network;
the processing module is used for processing the application programming interface calling request sent by the WIFI network according to the judgment result;
the network determination module includes: a query unit and a decision unit, wherein,
the inquiry unit is used for inquiring whether the WIFI network is a trusted network or not, and if the WIFI network is an untrusted network, the judgment unit is triggered;
the judgment unit is used for judging whether the WIFI network is a trusted network or not according to a preset rule;
the determination unit is specifically configured to monitor the WIFI network, and if it is monitored within a specified time that all calls of the WIFI network to a virtual interface are triggered by user behavior, determine that the WIFI network is a trusted network, otherwise determine that the WIFI network is an untrusted network;
the terminal further comprises a virtual interface module,
the processing module is used for processing the application programming interface call request sent by the WIFI network according to the judgment result and comprises the following steps: if the judgment result is a trusted network, forwarding the application programming interface calling request sent by the WIFI network to a specified application programming interface, and if the judgment result is an untrusted network, forwarding the application programming interface calling request sent by the WIFI network to a preset virtual interface module and returning virtual data generated by the virtual interface module;
and the virtual interface module is used for randomly generating the virtual data after receiving the application programming interface calling request.
7. The terminal of claim 6, wherein the call to the virtual interface by the WIFI network is a call to receive a click message from a screen or a call to receive a trigger message from a key, and the call is considered to be triggered by user behavior.
8. The terminal of claim 6,
the determining unit is specifically further configured to determine that the WIFI network is a trusted network if the WIFI network is a specific network, and otherwise, monitor the WIFI network.
9. The terminal of claim 6,
the processing module, after determining that the result is the untrusted network, further includes: and recording the calling request of the application programming interface of the WIFI network.
10. The terminal of claim 6,
the network determination module, after determining whether the WIFI network is a trusted network, further includes: and recording whether the WIFI network is a trusted network.
CN201610955246.3A 2016-10-27 2016-10-27 WIFI network access processing method and terminal Active CN106550365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610955246.3A CN106550365B (en) 2016-10-27 2016-10-27 WIFI network access processing method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610955246.3A CN106550365B (en) 2016-10-27 2016-10-27 WIFI network access processing method and terminal

Publications (2)

Publication Number Publication Date
CN106550365A CN106550365A (en) 2017-03-29
CN106550365B true CN106550365B (en) 2020-04-17

Family

ID=58393492

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610955246.3A Active CN106550365B (en) 2016-10-27 2016-10-27 WIFI network access processing method and terminal

Country Status (1)

Country Link
CN (1) CN106550365B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108650265B (en) * 2018-05-11 2021-08-20 阿里巴巴(中国)有限公司 File downloading method and device, storage medium and electronic terminal

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227358A (en) * 2015-09-17 2016-01-06 广东欧珀移动通信有限公司 The method to set up of network type and system
CN105262717A (en) * 2015-08-31 2016-01-20 福建天晴数码有限公司 Network service security management method and device
CN105516984A (en) * 2015-07-29 2016-04-20 哈尔滨工业大学(威海) Safe access system of public WiFi

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516984A (en) * 2015-07-29 2016-04-20 哈尔滨工业大学(威海) Safe access system of public WiFi
CN105262717A (en) * 2015-08-31 2016-01-20 福建天晴数码有限公司 Network service security management method and device
CN105227358A (en) * 2015-09-17 2016-01-06 广东欧珀移动通信有限公司 The method to set up of network type and system

Also Published As

Publication number Publication date
CN106550365A (en) 2017-03-29

Similar Documents

Publication Publication Date Title
CN105188098B (en) Network switching device and network switching method of mobile terminal
CN106844029B (en) Self-management Android process freezing and unfreezing device and method
CN106304037B (en) Virtual SIM card management method and device
CN106027804B (en) Unlocking method and unlocking device of mobile terminal
CN106533928B (en) Method and device for updating unread message reminding identification
CN105577532B (en) Application message processing method and device based on keywords and mobile terminal
CN106488420B (en) Incoming call processing method, device and system and readable storage medium
CN105898703B (en) Management method and device for identified pseudo base station
CN104932697B (en) Gesture unlocking method and device
CN106778176B (en) Information processing method and mobile terminal
CN110928708B (en) Icon display method and device, electronic equipment and computer readable storage medium
CN107133508B (en) Application management method and mobile terminal
CN106484534B (en) Control method and control device for displayed mobile terminal
CN106371704B (en) Application shortcut layout method of screen locking interface and terminal
CN106455009B (en) Network searching device and method
CN106453863B (en) Method and system for controlling terminal and earphone
CN106231657B (en) Method and device for switching power saving modes of double-screen mobile terminal
CN106856617B (en) Terminal and cell reselection method
CN106412877B (en) Activation method and activation device for mobile terminal SIM card
CN106569670B (en) Device and method for processing application
CN106792878B (en) Data traffic monitoring method and device
CN106385494B (en) Method and device for acquiring dynamic home page of mobile terminal application
CN105094733B (en) Split screen display method and device
CN106896988B (en) Application icon alignment device, terminal and method
CN106550365B (en) WIFI network access processing method and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200323

Address after: B808, Fu'an science and technology building, No. 013, gaoxinnan 1st Road, Yuehai street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: SHENZHEN WEIWANG LIHE INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 518000 Guangdong Province, Shenzhen high tech Zone of Nanshan District City, No. 9018 North Central Avenue's innovation building A, 6-8 layer, 10-11 layer, B layer, C District 6-10 District 6 floor

Applicant before: NUBIA TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230302

Address after: No. 502, Building 5, No. 528, Yuefei Road, Shibantan Street, Xindu District, Chengdu, Sichuan, 610000

Patentee after: Microgrid union Technology (Chengdu) Co.,Ltd.

Address before: B808, Fu'an technology building, 013 Gaoxin South 1st Road, Yuehai street, Nanshan District, Shenzhen, Guangdong 518000

Patentee before: SHENZHEN WEIWANG LIHE INFORMATION TECHNOLOGY CO.,LTD.