CN106658513A - Safety detection method of wireless network, terminal and server - Google Patents
Safety detection method of wireless network, terminal and server Download PDFInfo
- Publication number
- CN106658513A CN106658513A CN201710020109.5A CN201710020109A CN106658513A CN 106658513 A CN106658513 A CN 106658513A CN 201710020109 A CN201710020109 A CN 201710020109A CN 106658513 A CN106658513 A CN 106658513A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- score value
- network
- terminal
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a safety detection method of a wireless network and a terminal. The safety detection method comprises the steps of obtaining a score value corresponding to the wireless network from a big data server if the wireless network is detected, wherein the score value is calculated by the big data server based on safety parameters of multiple wireless networks; judging whether the corresponding score value of the wireless network meets a preset requirement; if the corresponding score value of the wireless network meets the preset requirement, identifying the wireless network as a target wireless network allowed to be accessed. The terminal of the embodiment can identify an unsafe wireless network and can access a wireless network with relatively high safety; and the network safety risk is reduced.
Description
Technical field
The present invention relates to electronic technology field, more particularly to a kind of safety detection method of wireless network, terminal and service
Device.
Background technology
With the development of wireless network communication technique, Wireless Fidelity (Wireless Fidelity, Wi-Fi) technology should
With more and more extensively, terminal can scan the Wi-Fi access points (Access Point, AP) near it, accessed by Wi-Fi and clicked through
Row online.
But when terminal accesses unsafe wireless network by Wi-Fi access points, there are Network Security Vulnerabilities, may
Terminal data is caused to be revealed, or even cause the user economic loss.
For example, the domain name system (Domain Name System, DNS) of the wireless network that terminal is accessed is kidnapped, address solves
Analysis agreement (Address Resolution Protocol, ARP) spoofing attack, or when accessing false fishing wireless network, exist
Network Security Vulnerabilities.
The content of the invention
The embodiment of the present invention provides a kind of safety detection method of wireless network, terminal and server, is capable of identify that uneasiness
Full wireless network, accesses the higher wireless network of security, reduces network security risk.
In a first aspect, embodiments providing a kind of safety detection method of wireless network, the method includes:
If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;Wherein,
The score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judge whether the corresponding score value of the wireless network meets preset requirement;
If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as to allow to access
Target radio network.
Second aspect, embodiments provides the safety detection method of another kind of wireless network, and the method includes:
Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false wireless network
It is strong that network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted radio network information, signal
In degree one of them or at least two any combination;
The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network;
If the solicited message for obtaining wireless network score value is received, by the corresponding wireless network of the solicited message
Score value is sent to the terminal for sending the solicited message.
The third aspect, embodiments provides a kind of terminal, and the terminal includes:
Acquiring unit, if for detecting wireless network, the wireless network correspondence is obtained from big data server
Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judging unit, for judging whether the corresponding score value of the wireless network meets preset requirement;
Recognition unit, if meeting preset requirement for the corresponding score value of the wireless network, by the wireless network
It is identified as the target radio network for allowing to access.
Fourth aspect, embodiments provides a kind of server, and the server includes:
Receiving unit, for receiving the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter bag
Include false radio network information, address resolution protocol spoofing attack information, domain name system and kidnap information, unencrypted wireless network
In information, signal strength signal intensity one of them or at least two any combination;
Computing unit, for calculating each self-corresponding score of the wireless network according to the security parameter of the wireless network
Value;
Feedback unit, if for receiving the solicited message for obtaining wireless network score value, by the solicited message pair
The score value of the wireless network answered is sent to the terminal for sending the solicited message.
The embodiment of the present invention, if terminal detects wireless network, obtains wireless network correspondence from big data server
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless
Whether the corresponding score value of network meets preset requirement;If the corresponding score value of wireless network meets preset requirement, will be wireless
Network Recognition is the target radio network for allowing to access, each wireless network that terminal can be obtained by big data system-computed
Score value recognizes unsafe wireless network such that it is able to access the higher wireless network of security, reduces network security risk.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, below embodiment will be described needed for be used
Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area
For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the safety detection method of wireless network provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the safety detection method of wireless network that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic flow diagram of the safety detection method of wireless network that yet another embodiment of the invention is provided;
Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided;
Fig. 6 is a kind of schematic block diagram of server provided in an embodiment of the present invention;
Fig. 7 is a kind of schematic block diagram of terminal that yet another embodiment of the invention is provided;
Fig. 8 is a kind of schematic block diagram of server that another embodiment of the present invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this
Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made
Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated
The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole
The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more in the associated item listed and be possible to combination, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface
Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just
Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching
Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal for including display and touch sensitive surface is described.It is, however, to be understood that
It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as it is following in one or more:Drawing application program, demonstration application journey
Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application
Program, telephony application, videoconference application, email application, instant messaging applications, exercise
Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application
Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can be public using at least one of such as touch sensitive surface
Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table
The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal (for example, is touched
Sensing surface) can support that there are the various application programs of user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of exemplary flow of the safety detection method of wireless network provided in an embodiment of the present invention
Figure.The executive agent of the safety detection method of wireless network is terminal in the present embodiment.Terminal can be mobile phone, panel computer etc.
Mobile terminal, but this is not limited to, other-end is can also be, it is not limited herein.The safety of wireless network as shown in Figure 1
Detection method may include following steps:
S101:If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;
Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Terminal in normal work, and open " Wi-Fi " function when, terminal scanning WAP (Access Point,
AP) the wireless signal for sending, to judge whether to be able to detect that wireless network.Terminal when wireless network is detected, according to this
The mark of wireless network obtains score value corresponding with the mark of wireless network from big data server.
Wherein, in the present embodiment the score value of wireless network it is higher (for example, standards of grading are preset initial values, and
It is that parameter to there is potential safety hazard does subtraction on the basis of initial value), the security for identifying the wireless network is higher;At other
In embodiment, it is also possible to which being set to the score value of wireless network, lower (for example, standards of grading are the parameters to there is potential safety hazard
Do addition), the security of the wireless network is higher, is not limited herein.
It is understood that terminal can be with real-time detection wireless network, it is also possible to every Preset Time (for example, 5 minutes,
But it is not limited to this) detection is once.
The wireless network that terminal is detected can be one, or at least two, it is not limited herein.
Big data Big data is that a kind of scale arrives greatly well beyond traditional number in terms of acquisition, storage, management, analysis
According to the data acquisition system of library software means capability scope, the data scale with magnanimity, quick stream compression, various data class
Type and the low four big feature of value density.
The each self-corresponding score value of multiple wireless networks is precalculated and stored in big data server.The score value by
The security parameter of multiple wireless networks that multiple terminals send is calculated.One terminal can send one or more wireless networks
The security parameter of network.The security parameter of wireless network is used to weigh the data safety grade of wireless network, the safety of wireless network
Higher grade mark wireless network is safer, and the network data security hidden danger for existing is less.
It is understood that the security parameter of wireless network is dynamic change, and the wireless network that terminal will can update
The security parameter of network is synchronized to big data server, so that big data server can be recalculated according to the security parameter for updating
The corresponding score value of wireless network.
Further, security parameter includes false radio network information, address resolution protocol spoofing attack information, domain name system
System abduction information, unencrypted radio network information, in signal strength signal intensity one of them or at least two any combination.
Wherein, false wireless network is gone fishing wireless network, and false radio network information can including but not limited to falseness
The mark of wireless network.For example, terminal confirm wireless network for false wireless network when, by the mark of false wireless network
It is uploaded to big data server.
Address resolution protocol (Address Resolution Protocol, ARP) spoofing attack, typically forges media
Access control (Media Access Control, MAC) address, a kind of ARP spoofing attacks are the deceptions to router ARP table;
Another kind of ARP spoofing attacks are the gateway deceptions of internal network termination.ARP spoofing attacks information can include but is not limited to ARP numbers
According to the number of bag.For example, terminal timing statistics receives the number of the ARP packets of broadcast by the wireless network being currently accessed
Mesh, and the number of ARP packets is uploaded to into big data server.
Domain name system is kidnapped and refers to the request that domain name mapping is intercepted in the network range kidnapped, the domain name of analysis request,
Request beyond examination scope is let pass, the IP address of vacation is otherwise returned or doing nothing is made request lose response, its effect
What is really exactly specific network can not reacted or accessed is false network address.Domain name system is kidnapped information and can include but is not limited to quilt
The DNS of abduction.For example, terminal sends the DNS being held as a hostage when the domain name for detecting the wireless network being currently accessed is held as a hostage
To big data server.
Unencrypted radio network information can include the mark of unencrypted wireless network, and the mark can be services set
Identification code (Service Set Identifier, SSID).Terminal is unencrypted the wireless network that is currently accessed is detected
During wireless network, the mark of unencrypted wireless network is sent to big data server.
Signal strength signal intensity is the Wi-Fi signal strength that terminal is received in current location, and Wi-Fi signal strength is stronger, signal
More stable, the data of transmission are more stable.For example, terminal is sent to big data clothes in the corresponding Wi-Fi signal strength in current location
Business device.
For example, terminal is uploaded to the mark of false wireless network when it is false wireless network to confirm wireless network
Big data server.
It is understood that the wireless network in the present embodiment can be the wireless network of public place, it is also possible to right and wrong
The wireless network of public place.
S102:Judge whether the corresponding score value of the wireless network meets preset requirement.
Terminal judges whether the corresponding score value of wireless network meets pre- when the corresponding score value of wireless network is got
If requiring.
When the number of the wireless network for getting is at least two, terminal judges respectively at least two wireless networks each
Whether corresponding score value meets preset requirement.
Wherein, judge whether the corresponding score value of wireless network meets preset requirement and can be:Wireless network is corresponding
Whether score value is compared in default score threshold, judge the score value of wireless network more than or equal to default score threshold
Value.When the score value of wireless network is more than or equal to default score threshold, then being Wei the corresponding score value of the wireless network
Meet preset requirement.
Judge whether the corresponding score value of wireless network meets preset requirement and can also be:The wireless network that judgement gets
Score value belonging to default score it is interval, and judge whether the interval corresponding safe class of the default score meets network security
Demand.When the interval corresponding safe class of the default score meets network security demand, the wireless network is identified as corresponding
Score value meets preset requirement.Wherein, tag memory contains multiple default scores intervals, and the interval correspondence of each default score is not
Same safe class.
Terminal then forbids accessing the wireless network when confirming that the corresponding score value of wireless network is unsatisfactory for preset requirement,
Or there is potential safety hazard, return to step S101 in the prompting user wireless network.
Terminal when confirming that the corresponding score value of wireless network meets preset requirement, execution step S103.
S103:If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as permitting
Perhaps the target radio network for accessing.
Terminal will meet the wireless network of preset requirement when confirming that the corresponding score value of wireless network meets preset requirement
It is identified as the target radio network for allowing to access.
Wherein, the number for meeting the wireless network of preset requirement can be one, or at least two, do not do herein
Limit.When it can be one to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access is one;
When it can be at least two to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access can be one
It is individual, or at least two, i.e. terminal can determine a target radio network from the wireless network for meet preset requirement,
All wireless networks for meeting preset requirement can also be identified as allowing the target radio network of access, so that user selects to treat
The wireless network of access.
It is understood that when target radio network is the wireless network for being not provided with password, terminal can be automatically accessed
The target radio network;When target radio network is password-set wireless network, the terminal notifying user input target
The access pin of wireless network.In another kind of embodiment, as the SSID that target radio network is stored in big data server
And during access pin, terminal can access the target radio network according to the SSID of target radio network and access pin.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network
Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network
It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed
The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
Fig. 2 is referred to, Fig. 2 is a kind of signal of the safety detection method of wireless network that another embodiment of the present invention is provided
Flow chart.The executive agent of the safety detection method of wireless network is terminal in the present embodiment.Terminal can be mobile phone, flat board electricity
The mobile terminals such as brain, but this is not limited to, other-end is can also be, it is not limited herein.Wireless network as shown in Figure 2
Safety detection method may include following steps:
S201:If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;
Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Step S201 in the present embodiment is identical with step S101 in a upper embodiment, specifically refers to an embodiment
The associated description of middle step S101, here is omitted.
S202:Judge whether the corresponding score value of the wireless network meets preset requirement.
Step S202 in the present embodiment is identical with step S102 in a upper embodiment, specifically refers to an embodiment
The associated description of middle step S102, here is omitted.
Terminal then forbids accessing the wireless network when confirming that the corresponding score value of wireless network is unsatisfactory for preset requirement,
Or there is potential safety hazard, return to step S201 in the prompting user wireless network.
Terminal when confirming that the corresponding score value of wireless network meets preset requirement, execution step S203.
S203:If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as permitting
Perhaps the target radio network for accessing.
Terminal will meet the wireless network of preset requirement when confirming that the corresponding score value of wireless network meets preset requirement
It is identified as the target radio network for allowing to access.Wherein, the number for meeting the wireless network of preset requirement can be one, also may be used
Think at least two, be not limited herein.
Further, if the number for meeting the wireless network of preset requirement is at least two, step S203 includes:By score
Value highest wireless network is identified as the target radio network for allowing and accessing.
When it can be one to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access is one
It is individual;When meet the number of wireless network of preset requirement can at least two when, it is allowed to the target radio network of access can be with
For one, or at least two, i.e. terminal can from meeting in the wireless network of preset requirement, by score value highest without
Gauze network is identified as the target radio network for allowing to access.
In the wireless network of preset requirement is met, there is the score of two or more wireless networks identical, and for highest
When, terminal determines that one allows to access target radio network from the wireless network of highest scoring, it is also possible to by highest scoring
All wireless networks are identified as the target radio network for allowing to access, so that user selects wireless network to be accessed.
It is understood that when target radio network is the wireless network for being not provided with password, terminal can be automatically accessed
The target radio network;When target radio network is password-set wireless network, the terminal notifying user input target
The access pin of wireless network, to access target radio network.In another kind of embodiment, when storing in big data server
When the SSID and access pin of target radio network, terminal can be accessed according to the SSID of target radio network and access pin
The target radio network.
S204:If the score value of the first wireless network being currently accessed switches less than the score value of second wireless network
To the second wireless network.
Terminal in real time or timing/sporadically detect wireless network, and is removed when the first wireless network is accessed detecting
During other wireless networks outside the first wireless network, the score value of the first wireless network is obtained from big data system, and
The each self-corresponding score value of other wireless networks in addition to the first wireless network is detected, and judges obtaining for the first wireless network
Whether score value is less than the score value of second wireless network, wherein, second wireless network is other in addition to the first wireless network
The wireless network of the highest scoring in wireless network.
Terminal, will when the score value of the first wireless network for confirming to be currently accessed is less than the score value of second wireless network
Second wireless network is identified as the network of optimum, and terminal sets up the communication connection with second wireless network, and is confirming to have built
During the communication connection of vertical and second wireless network, the communication connection with the first wireless network is disconnected, so as to from the first wireless network
Switch to second wireless network.
Wherein, when terminal can get the access pin of second wireless network, terminal directly passes through the second wireless network
The SSID of network and access pin access second wireless network;When terminal can not get the access pin of second wireless network
When, terminal ejects the interactive interface of input password, points out the access pin of user input second wireless network.
It is understood that terminal is when the security parameter for detecting the arbitrary wireless network for having accessed changes, will
The security parameter of change is updated to big data system, so that big data system can recalculate this according to the security parameter for updating
The score value of wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network
Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network
It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed
The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network
Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to
Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre
The number of times that reason device is waken up, so as to reach the function of saving electricity.
Fig. 3 is referred to, Fig. 3 is a kind of signal of the safety detection method of wireless network that yet another embodiment of the invention is provided
Flow chart.The executive agent of the safety detection method of wireless network is big data server in the present embodiment.Nothing as shown in Figure 3
The safety detection method of gauze network may include following steps:
S301:Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false nothing
The line network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted radio network information, letter
In number intensity one of them or at least two any combination.
The security parameter of the wireless network that the multiple terminals of big data server send.One terminal can send one or many
The security parameter of individual wireless network.The security parameter of wireless network is used to weigh the data safety grade of wireless network, wireless network
Higher mark wireless network of safe class of network is safer, and the network data security hidden danger for existing is less.
It is understood that the security parameter of wireless network is dynamic change, and the wireless network that terminal will can update
The security parameter of network is synchronized to big data server, so that big data server can be recalculated according to the security parameter for updating
The corresponding score value of wireless network.
Further, security parameter includes false radio network information, address resolution protocol spoofing attack information, domain name system
System abduction information, unencrypted radio network information, in signal strength signal intensity one of them or at least two any combination.
Wherein, false wireless network is gone fishing wireless network, and false radio network information can including but not limited to falseness
The mark of wireless network.For example, terminal confirm wireless network for false wireless network when, by the mark of false wireless network
It is uploaded to big data server.
Address resolution protocol (Address Resolution Protocol, ARP) spoofing attack, typically forges media
Access control (Media Access Control, MAC) address, a kind of ARP spoofing attacks are the deceptions to router ARP table;
Another kind of ARP spoofing attacks are the gateway deceptions of internal network termination.ARP spoofing attacks information can include but is not limited to ARP numbers
According to the number of bag.For example, terminal timing statistics receives the number of the ARP packets of broadcast by the wireless network being currently accessed
Mesh, and the number of ARP packets is uploaded to into big data server.
Domain name system is kidnapped and refers to the request that domain name mapping is intercepted in the network range kidnapped, the domain name of analysis request,
Request beyond examination scope is let pass, the IP address of vacation is otherwise returned or doing nothing is made request lose response, its effect
What is really exactly specific network can not reacted or accessed is false network address.Domain name system is kidnapped information and can include but is not limited to quilt
The DNS of abduction.For example, terminal sends the DNS being held as a hostage when the domain name for detecting the wireless network being currently accessed is held as a hostage
To big data server.
Unencrypted radio network information can include the mark of unencrypted wireless network, and the mark can be services set
Identification code (Service Set Identifier, SSID).Terminal is unencrypted the wireless network that is currently accessed is detected
During wireless network, the mark of unencrypted wireless network is sent to big data server.
Signal strength signal intensity is the Wi-Fi signal strength that terminal is received in current location, and Wi-Fi signal strength is stronger, signal
More stable, the data of transmission are more stable.For example, terminal is sent to big data clothes in the corresponding Wi-Fi signal strength in current location
Business device.
For example, terminal is uploaded to the mark of false wireless network when it is false wireless network to confirm wireless network
Big data server.
It is understood that the wireless network in the present embodiment can be the wireless network of public place, it is also possible to right and wrong
The wireless network of public place.
S302:The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network.
The each self-corresponding security parameter of all wireless networks that big data server gets, calculates respectively all wireless networks
The each self-corresponding score value of network.
Wherein, in the present embodiment the score value of wireless network it is higher (for example, standards of grading are preset initial values, and
It is that parameter to there is potential safety hazard does subtraction on the basis of initial value), the security for identifying the wireless network is higher;At other
In embodiment, it is also possible to which being set to the score value of wireless network, lower (for example, standards of grading are the parameters to there is potential safety hazard
Do addition), the security of the wireless network is higher, is not limited herein.
Further, calculating each self-corresponding score value of the wireless network according to the security parameter of the wireless network can
Think:
Big data server is that each wireless network arranges initial value (initial score value, for example, 100 points), and for ARP data
Number of times that the number of bag, the number of times for being identified as false wireless network, domain name system are held as a hostage, signal strength signal intensity are respectively provided with multiple
Pre-set interval, and distribute deduction of points value for each pre-set interval;And the corresponding deduction of points value of setting unencrypted wireless network.
Big data server counts each wireless when each self-corresponding security parameter of the wireless network for receiving terminal transmission
Number of times, letter that the number of the corresponding ARP packets of network, the number of times for being identified as false wireless network, domain name system are held as a hostage
Number intensity level, and determine that the number of ARP packets, the number of times that is identified as false wireless network, domain name system are held as a hostage respectively
Number of times and signal strength values each belonging to pre-set interval, should so as to be calculated according to the corresponding deduction of points value of affiliated pre-set interval
The corresponding score value of wireless network.
Wherein, when wireless network is unencrypted wireless network, cut not on the basis of calculated score value
The corresponding deduction of points value of wireless network of encryption, obtains the corresponding final score value of the wireless network.
In another kind of embodiment, big data server can arrange initial value (initial score value, example for each wireless network
Such as, 100 points), and be respectively provided with the number of ARP packets, the number of times that is identified as false wireless network, domain name system and be robbed
Number of times, signal strength values, each self-corresponding predetermined threshold value of unencrypted wireless network held, and each predetermined threshold value pair is set
The deduction of points value answered, when each parameter is more than or equal to its corresponding predetermined threshold value, cuts deduction of points value, so as to calculate from initial value
Obtain the corresponding score value of the wireless network.
For example, when signal strength signal intensity -90dbm (but being not limited to this) of the wireless network in certain region, deduction of points value is 5
Point.
The wireless network that total score is more than or equal to 60 points can be identified as that safety requirements can be met by big data server
Wireless network.Wireless network of the total score less than 60 points is identified as the presence of the larger wireless network of potential safety hazard or potential safety hazard
Network.
S303:It is if receiving the solicited message for obtaining wireless network score value, the solicited message is corresponding wireless
The score value of network is sent to the terminal for sending the solicited message.
Terminal sends to big data server and obtains wireless network when needing to obtain the score value of the wireless network for detecting
The solicited message of network score value.Wherein, the solicited message includes wireless network identification, terminal iidentification.Wireless network identification user
Big data server can search its corresponding score value according to the wireless network identification;Terminal iidentification is used for big data server
The corresponding score value of wireless network identification in the solicited message for getting can be transmitted according to terminal iidentification.
Wireless network identification of the big data server in the solicited message for receiving, obtains and the wireless network identification
Corresponding score value, and the terminal iidentification in solicited message sends the score value for getting to sending the solicited message
Terminal.
Such scheme, big data server receives the security parameter of the wireless network that multiple terminals send, according to the nothing
The security parameter of gauze network calculates each self-corresponding score value of the wireless network, if receive obtaining wireless network score value
Solicited message, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message,
It is capable of the score value of calculated each wireless network, for the unsafe wireless network of terminal recognition such that it is able to access peace
The higher wireless network of full property, reduces network security risk.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal can be mobile phone, put down
The mobile terminals such as plate computer, but this is not limited to, can also be other-end, it is not limited herein.The terminal 400 of the present embodiment
Including each unit be used to perform each step in the corresponding embodiments of Fig. 1, specifically refer to the corresponding enforcements of Fig. 1 and Fig. 1
Associated description in example, does not repeat herein.The terminal of the present embodiment includes:Acquiring unit 410, judging unit 420 and identification
Unit 430.
If acquiring unit 410 is used to detect wireless network, the wireless network pair is obtained from big data server
The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks
Arrive.
Such as, if acquiring unit 410 detects wireless network, the wireless network pair is obtained from big data server
The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks
Arrive.
Acquiring unit 410 sends the corresponding score value of wireless network to judging unit 420.
Judging unit 420 is used to receive the corresponding score value of wireless network of the transmission of acquiring unit 410, judges described wireless
Whether the corresponding score value of network meets preset requirement.Such as, judging unit 420 receives the wireless network that acquiring unit 410 sends
The corresponding score value of network, judges whether the corresponding score value of the wireless network meets preset requirement.Judging unit 420 will determine that
As a result send to recognition unit 430.
Recognition unit 430 is used to receive the judged result of the transmission of judging unit 420, if judged result is the wireless network
Corresponding score value meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such as, recognition unit 430 receives the judged result that judging unit 420 sends, if judged result is the wireless network
The corresponding score value of network meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network
Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network
It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed
The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
Referring to Fig. 5, Fig. 5 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.Terminal can be hand
The mobile terminals such as machine, panel computer, but this is not limited to, can also be other-end, it is not limited herein.The end of the present embodiment
The each unit that end 500 includes is used for each step performed in the corresponding embodiments of Fig. 2, specifically refers to Fig. 2 and Fig. 2 is corresponding
Associated description in embodiment, does not repeat herein.The terminal of the present embodiment includes:Acquiring unit 510, judging unit 520, identification
Unit 530 and switch unit 540.
If acquiring unit 510 is used to detect wireless network, the wireless network pair is obtained from big data server
The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks
Arrive.
Such as, if acquiring unit 510 detects wireless network, the wireless network pair is obtained from big data server
The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks
Arrive.
Further, the security parameter includes false radio network information, address resolution protocol spoofing attack information, domain
Name system kidnaps one of them in information, unencrypted radio network information, signal strength signal intensity or at least two any combination.
Acquiring unit 510 sends the corresponding score value of wireless network to judging unit 520.
Judging unit 520 is used to receive the corresponding score value of wireless network of the transmission of acquiring unit 510, judges described wireless
Whether the corresponding score value of network meets preset requirement.Such as, judging unit 520 receives the wireless network that acquiring unit 510 sends
The corresponding score value of network, judges whether the corresponding score value of the wireless network meets preset requirement.Judging unit 520 will determine that
As a result send to recognition unit 530.
Recognition unit 530 is used to receive the judged result of the transmission of judging unit 520, if judged result is the wireless network
Corresponding score value meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such as, recognition unit 530 receives the judged result that judging unit 520 sends, if judged result is the wireless network
The corresponding score value of network meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Further, if the number for meeting the wireless network of preset requirement is at least two, recognition unit 530 is used to incite somebody to action
Score value highest wireless network is identified as the target radio network for allowing and accessing.Recognition unit 530 is it is determined that allow to access
Target radio network when, to switch unit 540 send announcement information.
Switch unit 540 is used to receive the announcement information of the transmission of recognition unit 530, if the first wireless network being currently accessed
Score value less than second wireless network score value, then switch to the second wireless network.
Such as, switch unit 540 receives the announcement information that recognition unit 530 sends, if the first wireless network being currently accessed
The score value of network then switches to the second wireless network less than the score value of second wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network
Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network
It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed
The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network
Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to
Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre
The number of times that reason device is waken up, so as to reach the function of saving electricity.
Referring to Fig. 6, Fig. 6 is a kind of schematic block diagram of server provided in an embodiment of the present invention, and server is big data
The corresponding server of system.The each unit that the server 600 of the present embodiment includes is each in the corresponding embodiments of Fig. 3 for performing
Step, specifically refers to the associated description in the corresponding embodiments of Fig. 3 and Fig. 3, does not repeat herein.The server of the present embodiment
Including:Receiving unit 610, computing unit 620 and feedback unit 630.
Receiving unit 610 is used to receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter
Information, unencrypted wireless network are kidnapped including false radio network information, address resolution protocol spoofing attack information, domain name system
In network information, signal strength signal intensity one of them or at least two any combination.
Such as, receiving unit 610 receives the security parameter of the wireless network that multiple terminals send;Wherein, the safety ginseng
Number includes that false radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted is wireless
In the network information, signal strength signal intensity one of them or at least two any combination.Receiving unit 610 is by the safety of wireless network
Parameter to computing unit 620 sends.
Computing unit 620 is used for the security parameter of the wireless network for receiving the transmission of receiving unit 610, according to the wireless network
The security parameter of network calculates each self-corresponding score value of the wireless network.
Such as, computing unit 620 receives the security parameter of the wireless network that receiving unit 610 sends, according to described wireless
The security parameter of network calculates each self-corresponding score value of the wireless network.
Computing unit 620 sends each self-corresponding score value of wireless network to feedback unit 630.
Feedback unit 630 is used to receive each self-corresponding score value of wireless network of the transmission of computing unit 620, if receiving
The solicited message of wireless network score value is obtained, then the score value of the corresponding wireless network of the solicited message is sent to transmission
The terminal of the solicited message.
Such as, feedback unit 630 receives each self-corresponding score value of wireless network that computing unit 620 sends, if receiving
To obtain wireless network score value solicited message, then by the score value of the corresponding wireless network of the solicited message send to send out
Send the terminal of the solicited message.
Such scheme, big data server receives the security parameter of the wireless network that multiple terminals send, according to the nothing
The security parameter of gauze network calculates each self-corresponding score value of the wireless network, if receive obtaining wireless network score value
Solicited message, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message,
It is capable of the score value of calculated each wireless network, for the unsafe wireless network of terminal recognition such that it is able to access peace
The higher wireless network of full property, reduces network security risk.
Referring to Fig. 7, Fig. 7 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.This enforcement as depicted
Terminal 700 in example can include:One or more processors 710;One or more input equipments 720, one or more are defeated
Go out equipment 730 and memory 740.Above-mentioned processor 710, input equipment 720, output equipment 730 and memory 740 pass through bus
750 connections.
Memory 740 is for storage program instruction.
Processor 710 is used to perform following operation according to the programmed instruction of the storage of memory 740:
If processor 710 is used to detect wireless network, the wireless network correspondence is obtained from big data server
Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Processor 710 is additionally operable to judge whether the corresponding score value of the wireless network meets preset requirement.
If processor 710 is additionally operable to the wireless network, corresponding score value meets preset requirement, by the wireless network
Network is identified as the target radio network for allowing to access.
Further, the security parameter includes false radio network information, address resolution protocol spoofing attack information, domain
Name system kidnaps one of them in information, unencrypted radio network information, signal strength signal intensity or at least two any combination.
Further, if the number that processor 710 is additionally operable to meet the wireless network of preset requirement is at least two, will
Score value highest wireless network is identified as the target radio network for allowing and accessing.
Further, if to be additionally operable to the score value of the first wireless network being currently accessed wireless less than second for processor 710
The score value of network, then switch to the second wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains
Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network
Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network
It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed
The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network
Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to
Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre
The number of times that reason device is waken up, so as to reach the function of saving electricity.
It should be appreciated that in embodiments of the present invention, alleged processor 710 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), special IC (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device can also be any conventional processor etc..
Input equipment 720 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information and fingerprint of user
Directional information), microphone etc., output equipment 730 can include display (LCD etc.), loudspeaker etc..
The memory 740 can include read-only storage and random access memory, and to processor 710 provide instruction and
Data.The a part of of memory 740 can also include nonvolatile RAM.For example, memory 740 can also be deposited
The information of storage device type.
In implementing, processor 710, input equipment 720 described in the embodiment of the present invention, output equipment 730 can
Perform described in the first embodiment and second embodiment of the safety detection method of wireless network provided in an embodiment of the present invention
Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be described here.
Referring to Fig. 8, Fig. 8 is a kind of server schematic block diagram that another embodiment of the present invention is provided, and server is big data
The corresponding server of system.Server 800 in the present embodiment as shown in Figure 8 can include:One or more processors
810;One or more input equipments 820, one or more output equipments 830 and memory 840.Above-mentioned processor 810, input
Equipment 820, output equipment 830 and memory 840 are connected by bus 850.
Memory 840 is for storage program instruction.
Processor 810 is used to perform following operation according to the programmed instruction of the storage of memory 840:
Processor 810 is used to receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter bag
Include false radio network information, address resolution protocol spoofing attack information, domain name system and kidnap information, unencrypted wireless network
In information, signal strength signal intensity one of them or at least two any combination.
Processor 810 is additionally operable to calculate the wireless network according to the security parameter of the wireless network each self-corresponding
Score value.
If processor 810 is additionally operable to receive the solicited message for obtaining wireless network score value, by the solicited message
The score value of corresponding wireless network is sent to the terminal for sending the solicited message.
Such scheme, server receives the security parameter of the wireless network that multiple terminals send, according to the wireless network
Security parameter calculate each self-corresponding score value of the wireless network, if receiving the request letter for obtaining wireless network score value
Breath, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message, Neng Gouji
The score value of each wireless network for obtaining, for the unsafe wireless network of terminal recognition such that it is able to access security compared with
High wireless network, reduces network security risk.
Those of ordinary skill in the art are it is to be appreciated that the list of each example with reference to the embodiments described herein description
Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware
With the interchangeability of software, according to function the composition and step of each example have been generally described in the above description.This
A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specially
Industry technical staff can use different methods to realize described function to each specific application, but this realization is not
It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, the end of foregoing description
End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through
Its mode is realized.For example, device embodiment described above is only schematic, for example, the division of the unit, and only
Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied
Close or be desirably integrated into another system, or some features can be ignored, or do not perform.In addition, shown or discussed phase
Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit
Connection, or electricity, machinery or other forms connections.
Step in present invention method can according to actual needs carry out order adjustment, merge and delete.
Unit in embodiment of the present invention terminal can according to actual needs be merged, divides and deleted.
Unit in embodiment of the present invention server can according to actual needs be merged, divides and deleted.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit
The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be according to the actual needs selected to realize embodiment of the present invention scheme
Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to
It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated
Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used
When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially
Prior art is contributed part in other words, or all or part of the technical scheme can be in the form of software product
Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention
Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey
The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced
Change, these modifications or replacement all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right
The protection domain of requirement is defined.
Claims (10)
1. a kind of safety detection method of wireless network, it is characterised in that the safety detection method of the wireless network includes:
If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;Wherein, it is described
Score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judge whether the corresponding score value of the wireless network meets preset requirement;
If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as the mesh for allowing to access
Mark wireless network.
2. the safety detection method of wireless network according to claim 1, it is characterised in that the security parameter includes void
False radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted wireless network letter
Breath, in signal strength signal intensity one of them or at least two any combination.
3. method according to claim 1, it is characterised in that if the number for meeting the wireless network of preset requirement is at least
Two, if the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as to allow to connect
The target radio network for entering includes:
Score value highest wireless network is identified as into the target radio network for allowing and accessing.
4. the method according to any one of claim 1-3, it is characterised in that the safety detection method of the wireless network is also
Including:
If the score value of the first wireless network being currently accessed switches to described second less than the score value of second wireless network
Wireless network.
5. a kind of safety detection method of wireless network, it is characterised in that the safety detection method of the wireless network includes:
Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false wireless network letter
Breath, address resolution protocol spoofing attack information, domain name system are kidnapped in information, unencrypted radio network information, signal strength signal intensity
One of them or at least two any combination;
The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network;
If the solicited message for obtaining wireless network score value is received, by the score of the corresponding wireless network of the solicited message
Value is sent to the terminal for sending the solicited message.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, if for detecting wireless network, the wireless network is obtained from big data server corresponding
Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judging unit, for judging whether the corresponding score value of the wireless network meets preset requirement;
Recognition unit, if meeting preset requirement for the corresponding score value of the wireless network, by wireless network identification
For the target radio network for allowing to access.
7. terminal according to claim 6, it is characterised in that the security parameter include false radio network information,
Location analysis protocol spoofing attack information, domain name system are kidnapped in information, unencrypted radio network information, signal strength signal intensity wherein
One or at least two any combination.
8. terminal according to claim 6, it is characterised in that if the number for meeting the wireless network of preset requirement is at least
Two, the recognition unit is used to for score value highest wireless network to be identified as the target radio network for allowing and accessing.
9. the terminal according to any one of claim 6-8, it is characterised in that the terminal also includes:
Switch unit, if the score value of the first wireless network for being currently accessed is less than the score value of second wireless network,
Switch to the second wireless network.
10. a kind of server, it is characterised in that the server includes:
Receiving unit, for receiving the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes void
False radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted wireless network letter
Breath, in signal strength signal intensity one of them or at least two any combination;
Computing unit, for calculating each self-corresponding score value of the wireless network according to the security parameter of the wireless network;
Feedback unit, if for receiving the solicited message for obtaining wireless network score value, the solicited message is corresponding
The score value of wireless network is sent to the terminal for sending the solicited message.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710020109.5A CN106658513A (en) | 2017-01-11 | 2017-01-11 | Safety detection method of wireless network, terminal and server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710020109.5A CN106658513A (en) | 2017-01-11 | 2017-01-11 | Safety detection method of wireless network, terminal and server |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106658513A true CN106658513A (en) | 2017-05-10 |
Family
ID=58844015
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710020109.5A Pending CN106658513A (en) | 2017-01-11 | 2017-01-11 | Safety detection method of wireless network, terminal and server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106658513A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124719A (en) * | 2017-06-29 | 2017-09-01 | 广东欧珀移动通信有限公司 | Method for switching network, mobile terminal and computer-readable recording medium |
CN108934026A (en) * | 2018-06-30 | 2018-12-04 | 江苏有线数据网络有限责任公司 | A kind of mobile terminal Wi-Fi quality determining method |
CN109286919A (en) * | 2017-07-20 | 2019-01-29 | 展讯通信(上海)有限公司 | BLE equipment and its data packet receiving method, computer readable storage medium |
CN110366172A (en) * | 2019-08-23 | 2019-10-22 | 北京丁牛科技有限公司 | A kind of the safety ranking method and device of wireless access points |
CN112399416A (en) * | 2020-12-02 | 2021-02-23 | 中国联合网络通信集团有限公司 | Access method and device |
CN112437434A (en) * | 2020-12-02 | 2021-03-02 | 中国联合网络通信集团有限公司 | Access method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060197702A1 (en) * | 2005-03-01 | 2006-09-07 | Alcatel | Wireless host intrusion detection system |
CN103891332A (en) * | 2011-08-12 | 2014-06-25 | F-赛酷公司 | Detection of suspect wireless access points |
CN103891331A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | Mobile risk assessment |
CN104660594A (en) * | 2015-02-09 | 2015-05-27 | 中国科学院信息工程研究所 | Method for identifying virtual malicious nodes and virtual malicious node network in social networks |
-
2017
- 2017-01-11 CN CN201710020109.5A patent/CN106658513A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060197702A1 (en) * | 2005-03-01 | 2006-09-07 | Alcatel | Wireless host intrusion detection system |
CN103891332A (en) * | 2011-08-12 | 2014-06-25 | F-赛酷公司 | Detection of suspect wireless access points |
CN103891331A (en) * | 2011-10-17 | 2014-06-25 | 迈可菲公司 | Mobile risk assessment |
CN104660594A (en) * | 2015-02-09 | 2015-05-27 | 中国科学院信息工程研究所 | Method for identifying virtual malicious nodes and virtual malicious node network in social networks |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107124719A (en) * | 2017-06-29 | 2017-09-01 | 广东欧珀移动通信有限公司 | Method for switching network, mobile terminal and computer-readable recording medium |
CN109286919A (en) * | 2017-07-20 | 2019-01-29 | 展讯通信(上海)有限公司 | BLE equipment and its data packet receiving method, computer readable storage medium |
CN109286919B (en) * | 2017-07-20 | 2021-09-14 | 展讯通信(上海)有限公司 | BLE equipment, data packet receiving method thereof and computer readable storage medium |
CN108934026A (en) * | 2018-06-30 | 2018-12-04 | 江苏有线数据网络有限责任公司 | A kind of mobile terminal Wi-Fi quality determining method |
CN110366172A (en) * | 2019-08-23 | 2019-10-22 | 北京丁牛科技有限公司 | A kind of the safety ranking method and device of wireless access points |
CN112399416A (en) * | 2020-12-02 | 2021-02-23 | 中国联合网络通信集团有限公司 | Access method and device |
CN112437434A (en) * | 2020-12-02 | 2021-03-02 | 中国联合网络通信集团有限公司 | Access method and device |
CN112437434B (en) * | 2020-12-02 | 2023-03-21 | 中国联合网络通信集团有限公司 | Access method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106658513A (en) | Safety detection method of wireless network, terminal and server | |
EP3200487B1 (en) | Message processing method and apparatus | |
US20160241589A1 (en) | Method and apparatus for identifying malicious website | |
CN103634294B (en) | Information verifying method and device | |
CN107580005A (en) | Website protection method, device, website safeguard and readable storage medium storing program for executing | |
CN106713266B (en) | Method, device, terminal and system for preventing information leakage | |
CN105306610B (en) | Network identity detection method and device | |
CN104735657B (en) | Security terminal verification method, wireless access point binding method, apparatus and system | |
CN107733891A (en) | A kind of user registering method, server and computer-readable recording medium | |
CN102801706A (en) | Terminal and security processing method for information contents | |
CN107743108B (en) | Method and device for identifying medium access control address | |
CN103136255A (en) | Method and device for information management | |
CN113468515A (en) | User identity authentication method and device, electronic equipment and storage medium | |
CN104580108A (en) | Information prompting method and system as well as server | |
WO2015018266A1 (en) | Method and apparatus for determining health state of information system | |
CN113836509A (en) | Information acquisition method and device, electronic equipment and storage medium | |
CN106302519A (en) | The method of a kind of internet security management and terminal | |
WO2018166142A1 (en) | Authentication processing method and apparatus | |
CN106385415B (en) | Information security control method and device and terminal | |
CN110489657B (en) | Information filtering method and device, terminal equipment and storage medium | |
CN101770553B (en) | Mobile terminal and calling method for root certificate in mobile terminal | |
CN107704734A (en) | A kind of recognition methods of user account and its equipment | |
CN109450853B (en) | Malicious website determination method and device, terminal and server | |
CN115118636B (en) | Method and device for determining network jitter state, electronic equipment and storage medium | |
CN110378120A (en) | Application programming interfaces attack detection method, device and readable storage medium storing program for executing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170510 |