CN106658513A - Safety detection method of wireless network, terminal and server - Google Patents

Safety detection method of wireless network, terminal and server Download PDF

Info

Publication number
CN106658513A
CN106658513A CN201710020109.5A CN201710020109A CN106658513A CN 106658513 A CN106658513 A CN 106658513A CN 201710020109 A CN201710020109 A CN 201710020109A CN 106658513 A CN106658513 A CN 106658513A
Authority
CN
China
Prior art keywords
wireless network
score value
network
terminal
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710020109.5A
Other languages
Chinese (zh)
Inventor
常鹏慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710020109.5A priority Critical patent/CN106658513A/en
Publication of CN106658513A publication Critical patent/CN106658513A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a safety detection method of a wireless network and a terminal. The safety detection method comprises the steps of obtaining a score value corresponding to the wireless network from a big data server if the wireless network is detected, wherein the score value is calculated by the big data server based on safety parameters of multiple wireless networks; judging whether the corresponding score value of the wireless network meets a preset requirement; if the corresponding score value of the wireless network meets the preset requirement, identifying the wireless network as a target wireless network allowed to be accessed. The terminal of the embodiment can identify an unsafe wireless network and can access a wireless network with relatively high safety; and the network safety risk is reduced.

Description

A kind of safety detection method of wireless network, terminal and server
Technical field
The present invention relates to electronic technology field, more particularly to a kind of safety detection method of wireless network, terminal and service Device.
Background technology
With the development of wireless network communication technique, Wireless Fidelity (Wireless Fidelity, Wi-Fi) technology should With more and more extensively, terminal can scan the Wi-Fi access points (Access Point, AP) near it, accessed by Wi-Fi and clicked through Row online.
But when terminal accesses unsafe wireless network by Wi-Fi access points, there are Network Security Vulnerabilities, may Terminal data is caused to be revealed, or even cause the user economic loss.
For example, the domain name system (Domain Name System, DNS) of the wireless network that terminal is accessed is kidnapped, address solves Analysis agreement (Address Resolution Protocol, ARP) spoofing attack, or when accessing false fishing wireless network, exist Network Security Vulnerabilities.
The content of the invention
The embodiment of the present invention provides a kind of safety detection method of wireless network, terminal and server, is capable of identify that uneasiness Full wireless network, accesses the higher wireless network of security, reduces network security risk.
In a first aspect, embodiments providing a kind of safety detection method of wireless network, the method includes:
If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;Wherein, The score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judge whether the corresponding score value of the wireless network meets preset requirement;
If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as to allow to access Target radio network.
Second aspect, embodiments provides the safety detection method of another kind of wireless network, and the method includes:
Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false wireless network It is strong that network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted radio network information, signal In degree one of them or at least two any combination;
The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network;
If the solicited message for obtaining wireless network score value is received, by the corresponding wireless network of the solicited message Score value is sent to the terminal for sending the solicited message.
The third aspect, embodiments provides a kind of terminal, and the terminal includes:
Acquiring unit, if for detecting wireless network, the wireless network correspondence is obtained from big data server Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judging unit, for judging whether the corresponding score value of the wireless network meets preset requirement;
Recognition unit, if meeting preset requirement for the corresponding score value of the wireless network, by the wireless network It is identified as the target radio network for allowing to access.
Fourth aspect, embodiments provides a kind of server, and the server includes:
Receiving unit, for receiving the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter bag Include false radio network information, address resolution protocol spoofing attack information, domain name system and kidnap information, unencrypted wireless network In information, signal strength signal intensity one of them or at least two any combination;
Computing unit, for calculating each self-corresponding score of the wireless network according to the security parameter of the wireless network Value;
Feedback unit, if for receiving the solicited message for obtaining wireless network score value, by the solicited message pair The score value of the wireless network answered is sent to the terminal for sending the solicited message.
The embodiment of the present invention, if terminal detects wireless network, obtains wireless network correspondence from big data server Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless Whether the corresponding score value of network meets preset requirement;If the corresponding score value of wireless network meets preset requirement, will be wireless Network Recognition is the target radio network for allowing to access, each wireless network that terminal can be obtained by big data system-computed Score value recognizes unsafe wireless network such that it is able to access the higher wireless network of security, reduces network security risk.
Description of the drawings
In order to be illustrated more clearly that embodiment of the present invention technical scheme, below embodiment will be described needed for be used Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, can be with according to these other accompanying drawings of accompanying drawings acquisition.
Fig. 1 is a kind of schematic flow diagram of the safety detection method of wireless network provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic flow diagram of the safety detection method of wireless network that another embodiment of the present invention is provided;
Fig. 3 is a kind of schematic flow diagram of the safety detection method of wireless network that yet another embodiment of the invention is provided;
Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided;
Fig. 6 is a kind of schematic block diagram of server provided in an embodiment of the present invention;
Fig. 7 is a kind of schematic block diagram of terminal that yet another embodiment of the invention is provided;
Fig. 8 is a kind of schematic block diagram of server that another embodiment of the present invention is provided.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is a part of embodiment of the invention, rather than the embodiment of whole.Based on this Embodiment in bright, the every other enforcement that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that when using in this specification and in the appended claims, term " including " and "comprising" are indicated The presence of described feature, entirety, step, operation, element and/or component, but it is not precluded from one or more of the other feature, whole The presence or addition of body, step, operation, element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and " being somebody's turn to do " is intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more in the associated item listed and be possible to combination, and including these combinations.
As in this specification and in the appended claims as use, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In implementing, the terminal described in the embodiment of the present invention including but not limited to such as has touch sensitive surface Other of the mobile phone of (for example, touch-screen display and/or touch pad), laptop computer or tablet PC etc are just Portable device.It is to be further understood that in certain embodiments, the equipment not portable communication device, but with touching Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal for including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as it is following in one or more:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can be public using at least one of such as touch sensitive surface Physical user-interface device.Can adjust among applications and/or in corresponding application programs and/or change and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal (for example, is touched Sensing surface) can support that there are the various application programs of user interface directly perceived and transparent for a user.
Fig. 1 is referred to, Fig. 1 is a kind of exemplary flow of the safety detection method of wireless network provided in an embodiment of the present invention Figure.The executive agent of the safety detection method of wireless network is terminal in the present embodiment.Terminal can be mobile phone, panel computer etc. Mobile terminal, but this is not limited to, other-end is can also be, it is not limited herein.The safety of wireless network as shown in Figure 1 Detection method may include following steps:
S101:If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server; Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Terminal in normal work, and open " Wi-Fi " function when, terminal scanning WAP (Access Point, AP) the wireless signal for sending, to judge whether to be able to detect that wireless network.Terminal when wireless network is detected, according to this The mark of wireless network obtains score value corresponding with the mark of wireless network from big data server.
Wherein, in the present embodiment the score value of wireless network it is higher (for example, standards of grading are preset initial values, and It is that parameter to there is potential safety hazard does subtraction on the basis of initial value), the security for identifying the wireless network is higher;At other In embodiment, it is also possible to which being set to the score value of wireless network, lower (for example, standards of grading are the parameters to there is potential safety hazard Do addition), the security of the wireless network is higher, is not limited herein.
It is understood that terminal can be with real-time detection wireless network, it is also possible to every Preset Time (for example, 5 minutes, But it is not limited to this) detection is once.
The wireless network that terminal is detected can be one, or at least two, it is not limited herein.
Big data Big data is that a kind of scale arrives greatly well beyond traditional number in terms of acquisition, storage, management, analysis According to the data acquisition system of library software means capability scope, the data scale with magnanimity, quick stream compression, various data class Type and the low four big feature of value density.
The each self-corresponding score value of multiple wireless networks is precalculated and stored in big data server.The score value by The security parameter of multiple wireless networks that multiple terminals send is calculated.One terminal can send one or more wireless networks The security parameter of network.The security parameter of wireless network is used to weigh the data safety grade of wireless network, the safety of wireless network Higher grade mark wireless network is safer, and the network data security hidden danger for existing is less.
It is understood that the security parameter of wireless network is dynamic change, and the wireless network that terminal will can update The security parameter of network is synchronized to big data server, so that big data server can be recalculated according to the security parameter for updating The corresponding score value of wireless network.
Further, security parameter includes false radio network information, address resolution protocol spoofing attack information, domain name system System abduction information, unencrypted radio network information, in signal strength signal intensity one of them or at least two any combination.
Wherein, false wireless network is gone fishing wireless network, and false radio network information can including but not limited to falseness The mark of wireless network.For example, terminal confirm wireless network for false wireless network when, by the mark of false wireless network It is uploaded to big data server.
Address resolution protocol (Address Resolution Protocol, ARP) spoofing attack, typically forges media Access control (Media Access Control, MAC) address, a kind of ARP spoofing attacks are the deceptions to router ARP table; Another kind of ARP spoofing attacks are the gateway deceptions of internal network termination.ARP spoofing attacks information can include but is not limited to ARP numbers According to the number of bag.For example, terminal timing statistics receives the number of the ARP packets of broadcast by the wireless network being currently accessed Mesh, and the number of ARP packets is uploaded to into big data server.
Domain name system is kidnapped and refers to the request that domain name mapping is intercepted in the network range kidnapped, the domain name of analysis request, Request beyond examination scope is let pass, the IP address of vacation is otherwise returned or doing nothing is made request lose response, its effect What is really exactly specific network can not reacted or accessed is false network address.Domain name system is kidnapped information and can include but is not limited to quilt The DNS of abduction.For example, terminal sends the DNS being held as a hostage when the domain name for detecting the wireless network being currently accessed is held as a hostage To big data server.
Unencrypted radio network information can include the mark of unencrypted wireless network, and the mark can be services set Identification code (Service Set Identifier, SSID).Terminal is unencrypted the wireless network that is currently accessed is detected During wireless network, the mark of unencrypted wireless network is sent to big data server.
Signal strength signal intensity is the Wi-Fi signal strength that terminal is received in current location, and Wi-Fi signal strength is stronger, signal More stable, the data of transmission are more stable.For example, terminal is sent to big data clothes in the corresponding Wi-Fi signal strength in current location Business device.
For example, terminal is uploaded to the mark of false wireless network when it is false wireless network to confirm wireless network Big data server.
It is understood that the wireless network in the present embodiment can be the wireless network of public place, it is also possible to right and wrong The wireless network of public place.
S102:Judge whether the corresponding score value of the wireless network meets preset requirement.
Terminal judges whether the corresponding score value of wireless network meets pre- when the corresponding score value of wireless network is got If requiring.
When the number of the wireless network for getting is at least two, terminal judges respectively at least two wireless networks each Whether corresponding score value meets preset requirement.
Wherein, judge whether the corresponding score value of wireless network meets preset requirement and can be:Wireless network is corresponding Whether score value is compared in default score threshold, judge the score value of wireless network more than or equal to default score threshold Value.When the score value of wireless network is more than or equal to default score threshold, then being Wei the corresponding score value of the wireless network Meet preset requirement.
Judge whether the corresponding score value of wireless network meets preset requirement and can also be:The wireless network that judgement gets Score value belonging to default score it is interval, and judge whether the interval corresponding safe class of the default score meets network security Demand.When the interval corresponding safe class of the default score meets network security demand, the wireless network is identified as corresponding Score value meets preset requirement.Wherein, tag memory contains multiple default scores intervals, and the interval correspondence of each default score is not Same safe class.
Terminal then forbids accessing the wireless network when confirming that the corresponding score value of wireless network is unsatisfactory for preset requirement, Or there is potential safety hazard, return to step S101 in the prompting user wireless network.
Terminal when confirming that the corresponding score value of wireless network meets preset requirement, execution step S103.
S103:If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as permitting Perhaps the target radio network for accessing.
Terminal will meet the wireless network of preset requirement when confirming that the corresponding score value of wireless network meets preset requirement It is identified as the target radio network for allowing to access.
Wherein, the number for meeting the wireless network of preset requirement can be one, or at least two, do not do herein Limit.When it can be one to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access is one; When it can be at least two to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access can be one It is individual, or at least two, i.e. terminal can determine a target radio network from the wireless network for meet preset requirement, All wireless networks for meeting preset requirement can also be identified as allowing the target radio network of access, so that user selects to treat The wireless network of access.
It is understood that when target radio network is the wireless network for being not provided with password, terminal can be automatically accessed The target radio network;When target radio network is password-set wireless network, the terminal notifying user input target The access pin of wireless network.In another kind of embodiment, as the SSID that target radio network is stored in big data server And during access pin, terminal can access the target radio network according to the SSID of target radio network and access pin.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
Fig. 2 is referred to, Fig. 2 is a kind of signal of the safety detection method of wireless network that another embodiment of the present invention is provided Flow chart.The executive agent of the safety detection method of wireless network is terminal in the present embodiment.Terminal can be mobile phone, flat board electricity The mobile terminals such as brain, but this is not limited to, other-end is can also be, it is not limited herein.Wireless network as shown in Figure 2 Safety detection method may include following steps:
S201:If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server; Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Step S201 in the present embodiment is identical with step S101 in a upper embodiment, specifically refers to an embodiment The associated description of middle step S101, here is omitted.
S202:Judge whether the corresponding score value of the wireless network meets preset requirement.
Step S202 in the present embodiment is identical with step S102 in a upper embodiment, specifically refers to an embodiment The associated description of middle step S102, here is omitted.
Terminal then forbids accessing the wireless network when confirming that the corresponding score value of wireless network is unsatisfactory for preset requirement, Or there is potential safety hazard, return to step S201 in the prompting user wireless network.
Terminal when confirming that the corresponding score value of wireless network meets preset requirement, execution step S203.
S203:If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as permitting Perhaps the target radio network for accessing.
Terminal will meet the wireless network of preset requirement when confirming that the corresponding score value of wireless network meets preset requirement It is identified as the target radio network for allowing to access.Wherein, the number for meeting the wireless network of preset requirement can be one, also may be used Think at least two, be not limited herein.
Further, if the number for meeting the wireless network of preset requirement is at least two, step S203 includes:By score Value highest wireless network is identified as the target radio network for allowing and accessing.
When it can be one to meet the number of wireless network of preset requirement, it is allowed to which the target radio network of access is one It is individual;When meet the number of wireless network of preset requirement can at least two when, it is allowed to the target radio network of access can be with For one, or at least two, i.e. terminal can from meeting in the wireless network of preset requirement, by score value highest without Gauze network is identified as the target radio network for allowing to access.
In the wireless network of preset requirement is met, there is the score of two or more wireless networks identical, and for highest When, terminal determines that one allows to access target radio network from the wireless network of highest scoring, it is also possible to by highest scoring All wireless networks are identified as the target radio network for allowing to access, so that user selects wireless network to be accessed.
It is understood that when target radio network is the wireless network for being not provided with password, terminal can be automatically accessed The target radio network;When target radio network is password-set wireless network, the terminal notifying user input target The access pin of wireless network, to access target radio network.In another kind of embodiment, when storing in big data server When the SSID and access pin of target radio network, terminal can be accessed according to the SSID of target radio network and access pin The target radio network.
S204:If the score value of the first wireless network being currently accessed switches less than the score value of second wireless network To the second wireless network.
Terminal in real time or timing/sporadically detect wireless network, and is removed when the first wireless network is accessed detecting During other wireless networks outside the first wireless network, the score value of the first wireless network is obtained from big data system, and The each self-corresponding score value of other wireless networks in addition to the first wireless network is detected, and judges obtaining for the first wireless network Whether score value is less than the score value of second wireless network, wherein, second wireless network is other in addition to the first wireless network The wireless network of the highest scoring in wireless network.
Terminal, will when the score value of the first wireless network for confirming to be currently accessed is less than the score value of second wireless network Second wireless network is identified as the network of optimum, and terminal sets up the communication connection with second wireless network, and is confirming to have built During the communication connection of vertical and second wireless network, the communication connection with the first wireless network is disconnected, so as to from the first wireless network Switch to second wireless network.
Wherein, when terminal can get the access pin of second wireless network, terminal directly passes through the second wireless network The SSID of network and access pin access second wireless network;When terminal can not get the access pin of second wireless network When, terminal ejects the interactive interface of input password, points out the access pin of user input second wireless network.
It is understood that terminal is when the security parameter for detecting the arbitrary wireless network for having accessed changes, will The security parameter of change is updated to big data system, so that big data system can recalculate this according to the security parameter for updating The score value of wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre The number of times that reason device is waken up, so as to reach the function of saving electricity.
Fig. 3 is referred to, Fig. 3 is a kind of signal of the safety detection method of wireless network that yet another embodiment of the invention is provided Flow chart.The executive agent of the safety detection method of wireless network is big data server in the present embodiment.Nothing as shown in Figure 3 The safety detection method of gauze network may include following steps:
S301:Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false nothing The line network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted radio network information, letter In number intensity one of them or at least two any combination.
The security parameter of the wireless network that the multiple terminals of big data server send.One terminal can send one or many The security parameter of individual wireless network.The security parameter of wireless network is used to weigh the data safety grade of wireless network, wireless network Higher mark wireless network of safe class of network is safer, and the network data security hidden danger for existing is less.
It is understood that the security parameter of wireless network is dynamic change, and the wireless network that terminal will can update The security parameter of network is synchronized to big data server, so that big data server can be recalculated according to the security parameter for updating The corresponding score value of wireless network.
Further, security parameter includes false radio network information, address resolution protocol spoofing attack information, domain name system System abduction information, unencrypted radio network information, in signal strength signal intensity one of them or at least two any combination.
Wherein, false wireless network is gone fishing wireless network, and false radio network information can including but not limited to falseness The mark of wireless network.For example, terminal confirm wireless network for false wireless network when, by the mark of false wireless network It is uploaded to big data server.
Address resolution protocol (Address Resolution Protocol, ARP) spoofing attack, typically forges media Access control (Media Access Control, MAC) address, a kind of ARP spoofing attacks are the deceptions to router ARP table; Another kind of ARP spoofing attacks are the gateway deceptions of internal network termination.ARP spoofing attacks information can include but is not limited to ARP numbers According to the number of bag.For example, terminal timing statistics receives the number of the ARP packets of broadcast by the wireless network being currently accessed Mesh, and the number of ARP packets is uploaded to into big data server.
Domain name system is kidnapped and refers to the request that domain name mapping is intercepted in the network range kidnapped, the domain name of analysis request, Request beyond examination scope is let pass, the IP address of vacation is otherwise returned or doing nothing is made request lose response, its effect What is really exactly specific network can not reacted or accessed is false network address.Domain name system is kidnapped information and can include but is not limited to quilt The DNS of abduction.For example, terminal sends the DNS being held as a hostage when the domain name for detecting the wireless network being currently accessed is held as a hostage To big data server.
Unencrypted radio network information can include the mark of unencrypted wireless network, and the mark can be services set Identification code (Service Set Identifier, SSID).Terminal is unencrypted the wireless network that is currently accessed is detected During wireless network, the mark of unencrypted wireless network is sent to big data server.
Signal strength signal intensity is the Wi-Fi signal strength that terminal is received in current location, and Wi-Fi signal strength is stronger, signal More stable, the data of transmission are more stable.For example, terminal is sent to big data clothes in the corresponding Wi-Fi signal strength in current location Business device.
For example, terminal is uploaded to the mark of false wireless network when it is false wireless network to confirm wireless network Big data server.
It is understood that the wireless network in the present embodiment can be the wireless network of public place, it is also possible to right and wrong The wireless network of public place.
S302:The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network.
The each self-corresponding security parameter of all wireless networks that big data server gets, calculates respectively all wireless networks The each self-corresponding score value of network.
Wherein, in the present embodiment the score value of wireless network it is higher (for example, standards of grading are preset initial values, and It is that parameter to there is potential safety hazard does subtraction on the basis of initial value), the security for identifying the wireless network is higher;At other In embodiment, it is also possible to which being set to the score value of wireless network, lower (for example, standards of grading are the parameters to there is potential safety hazard Do addition), the security of the wireless network is higher, is not limited herein.
Further, calculating each self-corresponding score value of the wireless network according to the security parameter of the wireless network can Think:
Big data server is that each wireless network arranges initial value (initial score value, for example, 100 points), and for ARP data Number of times that the number of bag, the number of times for being identified as false wireless network, domain name system are held as a hostage, signal strength signal intensity are respectively provided with multiple Pre-set interval, and distribute deduction of points value for each pre-set interval;And the corresponding deduction of points value of setting unencrypted wireless network.
Big data server counts each wireless when each self-corresponding security parameter of the wireless network for receiving terminal transmission Number of times, letter that the number of the corresponding ARP packets of network, the number of times for being identified as false wireless network, domain name system are held as a hostage Number intensity level, and determine that the number of ARP packets, the number of times that is identified as false wireless network, domain name system are held as a hostage respectively Number of times and signal strength values each belonging to pre-set interval, should so as to be calculated according to the corresponding deduction of points value of affiliated pre-set interval The corresponding score value of wireless network.
Wherein, when wireless network is unencrypted wireless network, cut not on the basis of calculated score value The corresponding deduction of points value of wireless network of encryption, obtains the corresponding final score value of the wireless network.
In another kind of embodiment, big data server can arrange initial value (initial score value, example for each wireless network Such as, 100 points), and be respectively provided with the number of ARP packets, the number of times that is identified as false wireless network, domain name system and be robbed Number of times, signal strength values, each self-corresponding predetermined threshold value of unencrypted wireless network held, and each predetermined threshold value pair is set The deduction of points value answered, when each parameter is more than or equal to its corresponding predetermined threshold value, cuts deduction of points value, so as to calculate from initial value Obtain the corresponding score value of the wireless network.
For example, when signal strength signal intensity -90dbm (but being not limited to this) of the wireless network in certain region, deduction of points value is 5 Point.
The wireless network that total score is more than or equal to 60 points can be identified as that safety requirements can be met by big data server Wireless network.Wireless network of the total score less than 60 points is identified as the presence of the larger wireless network of potential safety hazard or potential safety hazard Network.
S303:It is if receiving the solicited message for obtaining wireless network score value, the solicited message is corresponding wireless The score value of network is sent to the terminal for sending the solicited message.
Terminal sends to big data server and obtains wireless network when needing to obtain the score value of the wireless network for detecting The solicited message of network score value.Wherein, the solicited message includes wireless network identification, terminal iidentification.Wireless network identification user Big data server can search its corresponding score value according to the wireless network identification;Terminal iidentification is used for big data server The corresponding score value of wireless network identification in the solicited message for getting can be transmitted according to terminal iidentification.
Wireless network identification of the big data server in the solicited message for receiving, obtains and the wireless network identification Corresponding score value, and the terminal iidentification in solicited message sends the score value for getting to sending the solicited message Terminal.
Such scheme, big data server receives the security parameter of the wireless network that multiple terminals send, according to the nothing The security parameter of gauze network calculates each self-corresponding score value of the wireless network, if receive obtaining wireless network score value Solicited message, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message, It is capable of the score value of calculated each wireless network, for the unsafe wireless network of terminal recognition such that it is able to access peace The higher wireless network of full property, reduces network security risk.
Referring to Fig. 4, Fig. 4 is a kind of schematic block diagram of terminal provided in an embodiment of the present invention.Terminal can be mobile phone, put down The mobile terminals such as plate computer, but this is not limited to, can also be other-end, it is not limited herein.The terminal 400 of the present embodiment Including each unit be used to perform each step in the corresponding embodiments of Fig. 1, specifically refer to the corresponding enforcements of Fig. 1 and Fig. 1 Associated description in example, does not repeat herein.The terminal of the present embodiment includes:Acquiring unit 410, judging unit 420 and identification Unit 430.
If acquiring unit 410 is used to detect wireless network, the wireless network pair is obtained from big data server The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks Arrive.
Such as, if acquiring unit 410 detects wireless network, the wireless network pair is obtained from big data server The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks Arrive.
Acquiring unit 410 sends the corresponding score value of wireless network to judging unit 420.
Judging unit 420 is used to receive the corresponding score value of wireless network of the transmission of acquiring unit 410, judges described wireless Whether the corresponding score value of network meets preset requirement.Such as, judging unit 420 receives the wireless network that acquiring unit 410 sends The corresponding score value of network, judges whether the corresponding score value of the wireless network meets preset requirement.Judging unit 420 will determine that As a result send to recognition unit 430.
Recognition unit 430 is used to receive the judged result of the transmission of judging unit 420, if judged result is the wireless network Corresponding score value meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such as, recognition unit 430 receives the judged result that judging unit 420 sends, if judged result is the wireless network The corresponding score value of network meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
Referring to Fig. 5, Fig. 5 is a kind of schematic block diagram of terminal that another embodiment of the present invention is provided.Terminal can be hand The mobile terminals such as machine, panel computer, but this is not limited to, can also be other-end, it is not limited herein.The end of the present embodiment The each unit that end 500 includes is used for each step performed in the corresponding embodiments of Fig. 2, specifically refers to Fig. 2 and Fig. 2 is corresponding Associated description in embodiment, does not repeat herein.The terminal of the present embodiment includes:Acquiring unit 510, judging unit 520, identification Unit 530 and switch unit 540.
If acquiring unit 510 is used to detect wireless network, the wireless network pair is obtained from big data server The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks Arrive.
Such as, if acquiring unit 510 detects wireless network, the wireless network pair is obtained from big data server The score value answered;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks Arrive.
Further, the security parameter includes false radio network information, address resolution protocol spoofing attack information, domain Name system kidnaps one of them in information, unencrypted radio network information, signal strength signal intensity or at least two any combination.
Acquiring unit 510 sends the corresponding score value of wireless network to judging unit 520.
Judging unit 520 is used to receive the corresponding score value of wireless network of the transmission of acquiring unit 510, judges described wireless Whether the corresponding score value of network meets preset requirement.Such as, judging unit 520 receives the wireless network that acquiring unit 510 sends The corresponding score value of network, judges whether the corresponding score value of the wireless network meets preset requirement.Judging unit 520 will determine that As a result send to recognition unit 530.
Recognition unit 530 is used to receive the judged result of the transmission of judging unit 520, if judged result is the wireless network Corresponding score value meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Such as, recognition unit 530 receives the judged result that judging unit 520 sends, if judged result is the wireless network The corresponding score value of network meets preset requirement, then the wireless network is identified as the target radio network for allowing to access.
Further, if the number for meeting the wireless network of preset requirement is at least two, recognition unit 530 is used to incite somebody to action Score value highest wireless network is identified as the target radio network for allowing and accessing.Recognition unit 530 is it is determined that allow to access Target radio network when, to switch unit 540 send announcement information.
Switch unit 540 is used to receive the announcement information of the transmission of recognition unit 530, if the first wireless network being currently accessed Score value less than second wireless network score value, then switch to the second wireless network.
Such as, switch unit 540 receives the announcement information that recognition unit 530 sends, if the first wireless network being currently accessed The score value of network then switches to the second wireless network less than the score value of second wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre The number of times that reason device is waken up, so as to reach the function of saving electricity.
Referring to Fig. 6, Fig. 6 is a kind of schematic block diagram of server provided in an embodiment of the present invention, and server is big data The corresponding server of system.The each unit that the server 600 of the present embodiment includes is each in the corresponding embodiments of Fig. 3 for performing Step, specifically refers to the associated description in the corresponding embodiments of Fig. 3 and Fig. 3, does not repeat herein.The server of the present embodiment Including:Receiving unit 610, computing unit 620 and feedback unit 630.
Receiving unit 610 is used to receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter Information, unencrypted wireless network are kidnapped including false radio network information, address resolution protocol spoofing attack information, domain name system In network information, signal strength signal intensity one of them or at least two any combination.
Such as, receiving unit 610 receives the security parameter of the wireless network that multiple terminals send;Wherein, the safety ginseng Number includes that false radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted is wireless In the network information, signal strength signal intensity one of them or at least two any combination.Receiving unit 610 is by the safety of wireless network Parameter to computing unit 620 sends.
Computing unit 620 is used for the security parameter of the wireless network for receiving the transmission of receiving unit 610, according to the wireless network The security parameter of network calculates each self-corresponding score value of the wireless network.
Such as, computing unit 620 receives the security parameter of the wireless network that receiving unit 610 sends, according to described wireless The security parameter of network calculates each self-corresponding score value of the wireless network.
Computing unit 620 sends each self-corresponding score value of wireless network to feedback unit 630.
Feedback unit 630 is used to receive each self-corresponding score value of wireless network of the transmission of computing unit 620, if receiving The solicited message of wireless network score value is obtained, then the score value of the corresponding wireless network of the solicited message is sent to transmission The terminal of the solicited message.
Such as, feedback unit 630 receives each self-corresponding score value of wireless network that computing unit 620 sends, if receiving To obtain wireless network score value solicited message, then by the score value of the corresponding wireless network of the solicited message send to send out Send the terminal of the solicited message.
Such scheme, big data server receives the security parameter of the wireless network that multiple terminals send, according to the nothing The security parameter of gauze network calculates each self-corresponding score value of the wireless network, if receive obtaining wireless network score value Solicited message, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message, It is capable of the score value of calculated each wireless network, for the unsafe wireless network of terminal recognition such that it is able to access peace The higher wireless network of full property, reduces network security risk.
Referring to Fig. 7, Fig. 7 is a kind of terminal schematic block diagram that yet another embodiment of the invention is provided.This enforcement as depicted Terminal 700 in example can include:One or more processors 710;One or more input equipments 720, one or more are defeated Go out equipment 730 and memory 740.Above-mentioned processor 710, input equipment 720, output equipment 730 and memory 740 pass through bus 750 connections.
Memory 740 is for storage program instruction.
Processor 710 is used to perform following operation according to the programmed instruction of the storage of memory 740:
If processor 710 is used to detect wireless network, the wireless network correspondence is obtained from big data server Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks.
Processor 710 is additionally operable to judge whether the corresponding score value of the wireless network meets preset requirement.
If processor 710 is additionally operable to the wireless network, corresponding score value meets preset requirement, by the wireless network Network is identified as the target radio network for allowing to access.
Further, the security parameter includes false radio network information, address resolution protocol spoofing attack information, domain Name system kidnaps one of them in information, unencrypted radio network information, signal strength signal intensity or at least two any combination.
Further, if the number that processor 710 is additionally operable to meet the wireless network of preset requirement is at least two, will Score value highest wireless network is identified as the target radio network for allowing and accessing.
Further, if to be additionally operable to the score value of the first wireless network being currently accessed wireless less than second for processor 710 The score value of network, then switch to the second wireless network.
Such scheme, if terminal detects wireless network, acquisition wireless network is corresponding from big data server obtains Score value;Wherein, score value is calculated by big data server according to the security parameter of multiple wireless networks;Judge wireless network Whether corresponding score value meets preset requirement;If the corresponding score value of wireless network meets preset requirement, by wireless network It is identified as the target radio network for allowing to access, the score of each wireless network that terminal can be obtained by big data system-computed The unsafe wireless network of value identification such that it is able to access the higher wireless network of security, reduces network security risk.
When it is at least two to meet the number of wireless network of preset requirement, terminal accesses score value highest wireless network Network such that it is able to access security highest wireless network, further reduces network security risk, improves Information Security.
When the score value of the first wireless network being currently accessed is less than the score value of second wireless network, automatically switch to Second wireless network, rather than in bright screen, by the information alert of second wireless network to user, can so reduce centre The number of times that reason device is waken up, so as to reach the function of saving electricity.
It should be appreciated that in embodiments of the present invention, alleged processor 710 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), special IC (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device can also be any conventional processor etc..
Input equipment 720 can include that Trackpad, fingerprint adopt sensor (for gathering the finger print information and fingerprint of user Directional information), microphone etc., output equipment 730 can include display (LCD etc.), loudspeaker etc..
The memory 740 can include read-only storage and random access memory, and to processor 710 provide instruction and Data.The a part of of memory 740 can also include nonvolatile RAM.For example, memory 740 can also be deposited The information of storage device type.
In implementing, processor 710, input equipment 720 described in the embodiment of the present invention, output equipment 730 can Perform described in the first embodiment and second embodiment of the safety detection method of wireless network provided in an embodiment of the present invention Implementation, also can perform the embodiment of the present invention described by terminal implementation, will not be described here.
Referring to Fig. 8, Fig. 8 is a kind of server schematic block diagram that another embodiment of the present invention is provided, and server is big data The corresponding server of system.Server 800 in the present embodiment as shown in Figure 8 can include:One or more processors 810;One or more input equipments 820, one or more output equipments 830 and memory 840.Above-mentioned processor 810, input Equipment 820, output equipment 830 and memory 840 are connected by bus 850.
Memory 840 is for storage program instruction.
Processor 810 is used to perform following operation according to the programmed instruction of the storage of memory 840:
Processor 810 is used to receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter bag Include false radio network information, address resolution protocol spoofing attack information, domain name system and kidnap information, unencrypted wireless network In information, signal strength signal intensity one of them or at least two any combination.
Processor 810 is additionally operable to calculate the wireless network according to the security parameter of the wireless network each self-corresponding Score value.
If processor 810 is additionally operable to receive the solicited message for obtaining wireless network score value, by the solicited message The score value of corresponding wireless network is sent to the terminal for sending the solicited message.
Such scheme, server receives the security parameter of the wireless network that multiple terminals send, according to the wireless network Security parameter calculate each self-corresponding score value of the wireless network, if receiving the request letter for obtaining wireless network score value Breath, then send the score value of the corresponding wireless network of the solicited message to the terminal for sending the solicited message, Neng Gouji The score value of each wireless network for obtaining, for the unsafe wireless network of terminal recognition such that it is able to access security compared with High wireless network, reduces network security risk.
Those of ordinary skill in the art are it is to be appreciated that the list of each example with reference to the embodiments described herein description Unit and algorithm steps, can with electronic hardware, computer software or the two be implemented in combination in, in order to clearly demonstrate hardware With the interchangeability of software, according to function the composition and step of each example have been generally described in the above description.This A little functions are performed with hardware or software mode actually, depending on the application-specific and design constraint of technical scheme.Specially Industry technical staff can use different methods to realize described function to each specific application, but this realization is not It is considered as beyond the scope of this invention.
Those skilled in the art can be understood that, for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be described here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematic, for example, the division of the unit, and only Only a kind of division of logic function, can there is other dividing mode when actually realizing, such as multiple units or component can be tied Close or be desirably integrated into another system, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection, or electricity, machinery or other forms connections.
Step in present invention method can according to actual needs carry out order adjustment, merge and delete.
Unit in embodiment of the present invention terminal can according to actual needs be merged, divides and deleted.
Unit in embodiment of the present invention server can according to actual needs be merged, divides and deleted.
The unit as separating component explanation can be or may not be it is physically separate, it is aobvious as unit The part for showing can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be according to the actual needs selected to realize embodiment of the present invention scheme Purpose.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, it is also possible to It is that unit is individually physically present, or two or more units are integrated in a unit.It is above-mentioned integrated Unit both can be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated unit is realized using in the form of SFU software functional unit and as independent production marketing or used When, during a computer read/write memory medium can be stored in.Based on such understanding, technical scheme is substantially Prior art is contributed part in other words, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the invention Portion or part steps.And aforesaid storage medium includes:USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The above, the only specific embodiment of the present invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or replacement all should be included within the scope of the present invention.Therefore, protection scope of the present invention should be with right The protection domain of requirement is defined.

Claims (10)

1. a kind of safety detection method of wireless network, it is characterised in that the safety detection method of the wireless network includes:
If detecting wireless network, the corresponding score value of the wireless network is obtained from big data server;Wherein, it is described Score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judge whether the corresponding score value of the wireless network meets preset requirement;
If the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as the mesh for allowing to access Mark wireless network.
2. the safety detection method of wireless network according to claim 1, it is characterised in that the security parameter includes void False radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted wireless network letter Breath, in signal strength signal intensity one of them or at least two any combination.
3. method according to claim 1, it is characterised in that if the number for meeting the wireless network of preset requirement is at least Two, if the corresponding score value of the wireless network meets preset requirement, the wireless network is identified as to allow to connect The target radio network for entering includes:
Score value highest wireless network is identified as into the target radio network for allowing and accessing.
4. the method according to any one of claim 1-3, it is characterised in that the safety detection method of the wireless network is also Including:
If the score value of the first wireless network being currently accessed switches to described second less than the score value of second wireless network Wireless network.
5. a kind of safety detection method of wireless network, it is characterised in that the safety detection method of the wireless network includes:
Receive the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes false wireless network letter Breath, address resolution protocol spoofing attack information, domain name system are kidnapped in information, unencrypted radio network information, signal strength signal intensity One of them or at least two any combination;
The each self-corresponding score value of the wireless network is calculated according to the security parameter of the wireless network;
If the solicited message for obtaining wireless network score value is received, by the score of the corresponding wireless network of the solicited message Value is sent to the terminal for sending the solicited message.
6. a kind of terminal, it is characterised in that the terminal includes:
Acquiring unit, if for detecting wireless network, the wireless network is obtained from big data server corresponding Score value;Wherein, the score value is calculated by the big data server according to the security parameter of multiple wireless networks;
Judging unit, for judging whether the corresponding score value of the wireless network meets preset requirement;
Recognition unit, if meeting preset requirement for the corresponding score value of the wireless network, by wireless network identification For the target radio network for allowing to access.
7. terminal according to claim 6, it is characterised in that the security parameter include false radio network information, Location analysis protocol spoofing attack information, domain name system are kidnapped in information, unencrypted radio network information, signal strength signal intensity wherein One or at least two any combination.
8. terminal according to claim 6, it is characterised in that if the number for meeting the wireless network of preset requirement is at least Two, the recognition unit is used to for score value highest wireless network to be identified as the target radio network for allowing and accessing.
9. the terminal according to any one of claim 6-8, it is characterised in that the terminal also includes:
Switch unit, if the score value of the first wireless network for being currently accessed is less than the score value of second wireless network, Switch to the second wireless network.
10. a kind of server, it is characterised in that the server includes:
Receiving unit, for receiving the security parameter of the wireless network that multiple terminals send;Wherein, the security parameter includes void False radio network information, address resolution protocol spoofing attack information, domain name system kidnap information, unencrypted wireless network letter Breath, in signal strength signal intensity one of them or at least two any combination;
Computing unit, for calculating each self-corresponding score value of the wireless network according to the security parameter of the wireless network;
Feedback unit, if for receiving the solicited message for obtaining wireless network score value, the solicited message is corresponding The score value of wireless network is sent to the terminal for sending the solicited message.
CN201710020109.5A 2017-01-11 2017-01-11 Safety detection method of wireless network, terminal and server Pending CN106658513A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710020109.5A CN106658513A (en) 2017-01-11 2017-01-11 Safety detection method of wireless network, terminal and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710020109.5A CN106658513A (en) 2017-01-11 2017-01-11 Safety detection method of wireless network, terminal and server

Publications (1)

Publication Number Publication Date
CN106658513A true CN106658513A (en) 2017-05-10

Family

ID=58844015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710020109.5A Pending CN106658513A (en) 2017-01-11 2017-01-11 Safety detection method of wireless network, terminal and server

Country Status (1)

Country Link
CN (1) CN106658513A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124719A (en) * 2017-06-29 2017-09-01 广东欧珀移动通信有限公司 Method for switching network, mobile terminal and computer-readable recording medium
CN108934026A (en) * 2018-06-30 2018-12-04 江苏有线数据网络有限责任公司 A kind of mobile terminal Wi-Fi quality determining method
CN109286919A (en) * 2017-07-20 2019-01-29 展讯通信(上海)有限公司 BLE equipment and its data packet receiving method, computer readable storage medium
CN110366172A (en) * 2019-08-23 2019-10-22 北京丁牛科技有限公司 A kind of the safety ranking method and device of wireless access points
CN112399416A (en) * 2020-12-02 2021-02-23 中国联合网络通信集团有限公司 Access method and device
CN112437434A (en) * 2020-12-02 2021-03-02 中国联合网络通信集团有限公司 Access method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060197702A1 (en) * 2005-03-01 2006-09-07 Alcatel Wireless host intrusion detection system
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103891331A (en) * 2011-10-17 2014-06-25 迈可菲公司 Mobile risk assessment
CN104660594A (en) * 2015-02-09 2015-05-27 中国科学院信息工程研究所 Method for identifying virtual malicious nodes and virtual malicious node network in social networks

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060197702A1 (en) * 2005-03-01 2006-09-07 Alcatel Wireless host intrusion detection system
CN103891332A (en) * 2011-08-12 2014-06-25 F-赛酷公司 Detection of suspect wireless access points
CN103891331A (en) * 2011-10-17 2014-06-25 迈可菲公司 Mobile risk assessment
CN104660594A (en) * 2015-02-09 2015-05-27 中国科学院信息工程研究所 Method for identifying virtual malicious nodes and virtual malicious node network in social networks

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107124719A (en) * 2017-06-29 2017-09-01 广东欧珀移动通信有限公司 Method for switching network, mobile terminal and computer-readable recording medium
CN109286919A (en) * 2017-07-20 2019-01-29 展讯通信(上海)有限公司 BLE equipment and its data packet receiving method, computer readable storage medium
CN109286919B (en) * 2017-07-20 2021-09-14 展讯通信(上海)有限公司 BLE equipment, data packet receiving method thereof and computer readable storage medium
CN108934026A (en) * 2018-06-30 2018-12-04 江苏有线数据网络有限责任公司 A kind of mobile terminal Wi-Fi quality determining method
CN110366172A (en) * 2019-08-23 2019-10-22 北京丁牛科技有限公司 A kind of the safety ranking method and device of wireless access points
CN112399416A (en) * 2020-12-02 2021-02-23 中国联合网络通信集团有限公司 Access method and device
CN112437434A (en) * 2020-12-02 2021-03-02 中国联合网络通信集团有限公司 Access method and device
CN112437434B (en) * 2020-12-02 2023-03-21 中国联合网络通信集团有限公司 Access method and device

Similar Documents

Publication Publication Date Title
CN106658513A (en) Safety detection method of wireless network, terminal and server
EP3200487B1 (en) Message processing method and apparatus
US20160241589A1 (en) Method and apparatus for identifying malicious website
CN103634294B (en) Information verifying method and device
CN107580005A (en) Website protection method, device, website safeguard and readable storage medium storing program for executing
CN106713266B (en) Method, device, terminal and system for preventing information leakage
CN105306610B (en) Network identity detection method and device
CN104735657B (en) Security terminal verification method, wireless access point binding method, apparatus and system
CN107733891A (en) A kind of user registering method, server and computer-readable recording medium
CN102801706A (en) Terminal and security processing method for information contents
CN107743108B (en) Method and device for identifying medium access control address
CN103136255A (en) Method and device for information management
CN113468515A (en) User identity authentication method and device, electronic equipment and storage medium
CN104580108A (en) Information prompting method and system as well as server
WO2015018266A1 (en) Method and apparatus for determining health state of information system
CN113836509A (en) Information acquisition method and device, electronic equipment and storage medium
CN106302519A (en) The method of a kind of internet security management and terminal
WO2018166142A1 (en) Authentication processing method and apparatus
CN106385415B (en) Information security control method and device and terminal
CN110489657B (en) Information filtering method and device, terminal equipment and storage medium
CN101770553B (en) Mobile terminal and calling method for root certificate in mobile terminal
CN107704734A (en) A kind of recognition methods of user account and its equipment
CN109450853B (en) Malicious website determination method and device, terminal and server
CN115118636B (en) Method and device for determining network jitter state, electronic equipment and storage medium
CN110378120A (en) Application programming interfaces attack detection method, device and readable storage medium storing program for executing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170510