CN107103468A - Network risks detection method, mobile terminal and computer-readable recording medium - Google Patents
Network risks detection method, mobile terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107103468A CN107103468A CN201710508266.0A CN201710508266A CN107103468A CN 107103468 A CN107103468 A CN 107103468A CN 201710508266 A CN201710508266 A CN 201710508266A CN 107103468 A CN107103468 A CN 107103468A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- wlan
- network
- current connected
- risk
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/32—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
- G06Q20/327—Short range or proximity payments by means of M-devices
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
Abstract
The present invention is applied to communication technical field there is provided network risks detection method, mobile terminal and computer-readable recording medium, and the network risks detection method includes:In default application operation, the current connected network of the mobile terminal is detected;If the current connected network of the mobile terminal is WLAN WLAN, detect that the current connected WLAN of the mobile terminal whether there is risk;If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.It can avoid leaking the personal information in mobile terminal by the present invention, improve the security of mobile payment.
Description
Technical field
The invention belongs to communication technical field, more particularly to network risks detection method, mobile terminal and computer-readable
Storage medium.
Background technology
With the development of mobile terminal and Internet technology, the function of mobile terminal also becomes increasingly abundant, intelligentized movement
Terminal just constantly improves the life of people, and therefore mobile payment also breeds.Mobile payment refers to allow user to use
Its mobile terminal (being usually mobile phone) carries out a kind of method of service of account payment to the commodity consumed or service.At present, move
The dynamic utilization rate paid is increased sharply, and user carries out account payment by mobile terminal turns into normality.However, user is using movement
During payment, for the flow of the mobile data network of saving mobile terminal, nearby there are WLAN (Wireless Local
Area Networks, WLAN) when, it is commonly connected WLAN and moves payment, easily the personal letter in leakage mobile terminal
Breath, the security of mobile payment is relatively low.
The content of the invention
In view of this, the embodiments of the invention provide network risks detection method, mobile terminal and computer-readable storage
Medium, to avoid leaking the personal information in mobile terminal, improves the security of mobile payment.
The first aspect of the embodiment of the present invention provides a kind of network risks detection method, described applied to mobile terminal
Network risks detection method includes:
In default application operation, the current connected network of the mobile terminal is detected;
If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal is current
The WLAN connected whether there is risk;
If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.
The second aspect of the embodiment of the present invention provides a kind of mobile terminal, and the mobile terminal includes:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, is examined
The current connected WLAN of the mobile terminal is surveyed with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the default application
Payment function, and point out user to repair the risk.
The third aspect of the embodiment of the present invention provides a kind of mobile terminal, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, described in the computing device during computer program
Realize as described in above-mentioned first aspect the step of network risks detection method.
The fourth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, the computer-readable storage
Media storage has computer program, and the network wind as described in above-mentioned first aspect is realized when the computer program is executed by processor
The step of dangerous detection method.
The beneficial effect that the embodiment of the present invention exists compared with prior art is:The embodiment of the present invention passes through in default application
During (class application is paid such as wechat, Alipay) operation, whether the current connected network of detection mobile terminal is WLAN, and
When the current connected network of mobile terminal is WLAN, detects that the WLAN whether there is risk, if there is risk, forbid making
With the payment function of default application, and user is pointed out to repair the risk.The embodiment of the present invention is by detecting mobile terminal
When current connected WLAN has risk, the payment function of default application is prohibitted the use of, has ensured and has used during mobile payment
The security of family proprietary information, and point out user to repair the risk, so as to avoid leaking the personal information in mobile terminal,
Improve the security of mobile payment.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
In required for the accompanying drawing that uses be briefly described, it should be apparent that, drawings in the following description are only some of the present invention
Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these
Accompanying drawing obtains other accompanying drawings.
Fig. 1 is the implementation process schematic diagram for the network risks detection method that the embodiment of the present invention one is provided;
Fig. 2 is the implementation process schematic diagram for the network risks detection method that the embodiment of the present invention two is provided;
Fig. 3 is the schematic diagram for the mobile terminal that the embodiment of the present invention three is provided;
Fig. 4 is the schematic diagram for the mobile terminal that the embodiment of the present invention four is provided;
Fig. 5 is the schematic diagram for the mobile terminal that the embodiment of the present invention five is provided.
Embodiment
In describing below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc
Body details, thoroughly to understand the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity
Road and the detailed description of method, in case unnecessary details hinders description of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " indicates described spy
Levy, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, entirety, step,
Operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the mobile terminal described in the embodiment of the present invention is including but not limited to such as with the sensitive table of touch
Mobile phone, laptop computer or the tablet PC in face (for example, touch-screen display and/or touch pad) etc it is other
Portable set.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have
The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch pad).
In discussion below, the mobile terminal including display and touch sensitive surface is described.However, should manage
Solution, one or more of the other physical User that mobile terminal can include such as physical keyboard, mouse and/or control-rod connects
Jaws equipment.
Mobile terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application
Program, word-processing application, website establishment application program, disk imprinting application program, spreadsheet applications, game are answered
With program, telephony application, videoconference application, email application, instant messaging applications, forging
Refining supports application program, photo management application program, digital camera application program, digital camera application program, web-browsing should
With program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on mobile terminals can use at least one of such as touch sensitive surface
Public physical user-interface device.It can be adjusted among applications and/or in corresponding application programs and/or change touch is quick
Feel the corresponding information shown in the one or more functions and mobile terminal on surface.So, the public physics frame of mobile terminal
Structure (for example, touch sensitive surface) can support the various application journeys with user interface directly perceived and transparent for a user
Sequence.
It should be understood that the size of the sequence number of each step is not meant to the priority of execution sequence in the present embodiment, each process
Execution sequence should be determined with its function and internal logic, and any limit is constituted without tackling the implementation process of the embodiment of the present invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
It is the implementation process figure for the network risks detection method that the embodiment of the present invention one is provided, the network risks referring to Fig. 1
Detection method is applied to mobile terminal, and the network risks detection method may comprise steps of as shown in the figure:
Step S101, in default application operation, detects the current connected network of the mobile terminal.
In embodiments of the present invention, the default application refers to certain that user selectes from the mounted application of mobile terminal
One type or the application with a certain function, the application such as wechat, Alipay with mobile payment function, that is, pay class
Using.Optionally, user can change selected application according to actual needs.
In embodiments of the present invention, mobile terminal detects that the mobile terminal is current when detecting default application operation
The network connected, to judge whether the current connected network of the mobile terminal is WLAN, if so, then performing step
S102, if not, it is determined that the current connected network of the mobile terminal is mobile data network, and in the mobile data network
Under move payment, mobile data network can ensure the security of mobile payment, without carrying out risk supervision again.Optionally,
If the mobile terminal detects the WLAN (i.e. in the absence of the WLAN of risk) that there is safety in preset range, in order to save
The flow of the mobile data network of mobile terminal is stated, the mobile terminal can also switch to the mobile data network connected
The safe WLAN searched.Wherein, the mobile data network refers to belonging to the SIM card that the mobile terminal is installed
The network that operator is provided, such as three big UNICOMs of operator, movement, the logical network provided of telecommunications, such as general grouped wireless
Service technology (General Packet Radio Service, GPRS) network, 3 G mobile communication network (i.e. 3G network),
Forth generation mobile communications network (i.e. 4G networks) etc., is not construed as limiting herein.The WLAN includes but is not limited to Wireless Fidelity
(Wireless Fidelity, WiFi) network.
Step S102, if the current connected network of the mobile terminal is WLAN WLAN, detects the shifting
The current connected WLAN of dynamic terminal whether there is risk.
In embodiments of the present invention, if the current connected network of the mobile terminal is WLAN, the movement is detected
The current connected WLAN of terminal whether there is risk.If not detecting air-out in the current connected WLAN of the mobile terminal
Danger, it is determined that the current connected WLAN of the mobile terminal is secure network, the mobile terminal enters under the secure network
Row mobile payment;If detecting risk in the current connected WLAN of the mobile terminal, it is determined that the mobile terminal is worked as
Preceding connected WLAN is dangerous, there is the risk attacked, the personal information easily stored in leakage mobile terminal, in movement
During payment, the proprietary information of user is constituted a threat to safely, the security of mobile payment is reduced.It is above-mentioned in order to solve
Problem, it is determined that during the current connected WLAN of the mobile terminal dangerous (i.e. the WLAN has risk), performing step
S103.Wherein, the risk includes but is not limited to false WLAN, domain name system (Domain Name System, DNS) abduction
And/or address resolution protocol (Address Resolution Protocol, ARP) attack equivalent risk.
Step S103, if so, then prohibitting the use of the payment function of the default application, and points out user to repair the wind
Danger.
In embodiments of the present invention, if detecting risk in the current connected WLAN of the mobile terminal, moving
It is dynamic pay during there will be the risk that user's proprietary information is stolen, can be by prohibitting the use of the branch of the default application
Pay function or close the payment function of the default application, to forbid the mobile terminal to carry out delivery operation, ensure branch
Pay the security of user's property in process of exchange.And point out user to change the risk, to improve the security of mobile payment, keep away
The personal information of non-leaking mobile terminal and the proprietary information of user.Wherein, the mobile terminal can by voice, label,
The modes such as short message, pop-up point out user, are not limited thereto.
The embodiment of the present invention is by when detecting the current connected WLAN of mobile terminal and there is risk, prohibitting the use of pre-
If the payment function of application, has ensured the security of user's proprietary information during mobile payment, and it is described to point out user to repair
Risk, so as to avoid leaking the personal information in mobile terminal, improves the security of mobile payment.
It is the implementation process figure for the network risks detection method that the embodiment of the present invention two is provided, the network risks referring to Fig. 2
Detection method is applied to mobile terminal, and the network risks detection method may comprise steps of as shown in the figure:
Step S201, in default application operation, detects the current connected network of the mobile terminal.
The step is identical with step S101, for details, reference can be made to step S101 associated description, will not be repeated here.
Step S202, the WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS and robbed
Detection and/or ARP attack detecting are held, to determine that the current connected WLAN of the mobile terminal whether there is
Risk.
In embodiments of the present invention, if detecting the current connected WLAN of the mobile terminal has falseness WLAN wind
Danger, DNS determine described mobile whole when kidnapping the combination of any risk or kinds of risks in risk and ARP risk of attacks
There is risk in the current connected WLAN in end.
Wherein, the WLAN current connected to mobile terminal progress falsenesses WLAN detections are specifically as follows:In detection
When connecting some WLAN to the mobile terminal, the mobile terminal sends preset instructions to server to server, if
The response message of the server feedback is received in preset time, it is determined that the current connected WLAN of the mobile terminal is not
False WLAN, i.e. the risk in the absence of false WLAN;If not receiving the response of the server feedback in preset time
Information, it is determined that the current connected WLAN of the mobile terminal is falseness WLAN, there is false WLAN risk.If described move
The current connected WLAN of dynamic terminal is not false WLAN, then the mobile terminal can be sent preset instructions by the WLAN
To the server;If the current connected WLAN of the mobile terminal be falseness WLAN, the mobile terminal can not will in advance
If instruction is sent to the server.Wherein, the preset instructions carry request server and verify whether the WLAN is false
WLAN information.If the server receives the preset instructions, response message, the response are fed back to the mobile terminal
The information that the WLAN is not false WLAN is carried in information.Wherein, the server can be the production firm of mobile terminal
Safeguard server.
The DNS kidnaps the request for referring to that domain name mapping is intercepted in the network range of abduction, the domain name of analysis request,
Request outside examination scope is let pass, and otherwise returns to the IP address of vacation or doing nothing makes request lose response, its effect
Exactly specific network can not be reacted or be accessed is false network address.
The ARP attacks refer to realize that ARP is cheated by forging IP address and MAC Address, can produced in a network big
The ARP traffics of amount make network congestion, as long as the continual arp response bag for sending forgery of attacker is with regard to that can change target master
IP-MAC address entrys in machine arp cache, cause network interruption or man-in-the-middle attack.
When the WLAN current connected to the mobile terminal carries out DNS abduction detection and ARP attack detectings, specific inspection
Survey method can use detection method of the prior art, be not limited thereto.
In embodiments of the present invention, if not detecting false WLAN wind in the current connected WLAN of the mobile terminal
Danger, DNS kidnap risk and ARP risk of attacks, it is determined that the current connected WLAN of the mobile terminal is secure network, described
Mobile terminal moves payment under the secure network;If detecting void in the current connected WLAN of the mobile terminal
False WLAN risks, DNS kidnap risk and any one risk in ARP risk of attacks or the combination of kinds of risks, it is determined that
The current connected WLAN of the mobile terminal is dangerous, there is the risk attacked, and is easily stored in leakage mobile terminal
Personal information, during mobile payment, constitutes a threat to safely to the proprietary information of user, reduces the safety of mobile payment
Property.In order to solve the above problems, it is determined that the current connected WLAN of the mobile terminal dangerous (i.e. there is wind in the WLAN
Danger) when, perform step S203.
Step S203, if the current connected WLAN of the mobile terminal has risk, prohibits the use of described preset should
Payment function, and point out user to repair the risk.
In embodiments of the present invention, if detecting risk in the current connected WLAN of the mobile terminal, moving
It is dynamic pay during there will be the risk that user's proprietary information is stolen, can be by prohibitting the use of the branch of the default application
Pay function or close the payment function of the default application, to forbid the mobile terminal to carry out delivery operation, ensure branch
Pay the security of user's property in process of exchange.And point out user to change the risk, to improve the security of mobile payment, keep away
The personal information of non-leaking mobile terminal and the proprietary information of user.Wherein, the mobile terminal can by voice, label,
The modes such as short message, pop-up point out user, are not limited thereto.
Optionally, the prompting user, which repairs the risk, includes:
User is pointed out to close the current connected WLAN of the mobile terminal.
As another embodiment, if the current connected WLAN of the mobile terminal has risk, prohibit the use of described
The payment function of default application, and close the current connected WLAN of the mobile terminal.
Optionally, the prompting user closes the current connected WLAN of the mobile terminal and included:
The mobile terminal is switched to secure network by prompting user by current connected WLAN, wherein, the safety
Network includes mobile data network and kidnaps detection and/or address resolution association by the false WLAN detections, domain name system DNS
Discuss the WLAN of ARP attack detectings.
In embodiments of the present invention, mobile terminal may search for the WLAN in preset range, and detect what is searched
WLAN whether there is risk, and there will be no risk WLAN (i.e. by the false WLAN detection, DNS kidnap detection and/or
The WLAN of ARP attack detectings) it is shown in the form of a list on the screen of the mobile terminal, in order to which user is from shown
The mobile terminal WLAN to be connected is selected in WLAN.
Optionally, the mobile terminal is switched to after secure network by current connected WLAN in prompting user,
The embodiment of the present invention also includes:
If detect the mobile terminal switches to secure network by current connected WLAN, allow using described pre-
If the payment function of application.
By there is risk (such as falseness WLAN detecting the current connected WLAN of mobile terminal in the embodiment of the present invention
Risk, DNS kidnap risk and/or ARP risk of attacks) when, the payment function of default application is prohibitted the use of, mobile payment has been ensured
During user's proprietary information security, and point out user to repair the risk, so as to avoid in leakage mobile terminal
Personal information, improves the security of mobile payment.
Referring to Fig. 3, it is the schematic diagram for the mobile terminal that the embodiment of the present invention three is provided, for convenience of description, illustrate only
The part related to the embodiment of the present invention.
The mobile terminal includes:
Network detection module 31, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module 32, if the network current connected for the mobile terminal is WLAN WLAN,
Detect that the current connected WLAN of the mobile terminal whether there is risk;
Disabled module 33, if the testing result for the risk supervision module is yes, prohibits the use of described preset should
Payment function, and point out user to repair the risk.
Optionally, the risk supervision module 32 is used for:
The WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS kidnap detect and/
Or ARP attack detecting, to determine that the current connected WLAN of the mobile terminal whether there is risk.
Optionally, the disabled module 33 is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module 33, is switched to the mobile terminal by current connected WLAN specifically for prompting user
Secure network, wherein, the secure network includes mobile data network and by the false WLAN detections, domain name system DNS
Kidnap the WLAN of detection and/or ARP attack detecting.
Optionally, the mobile terminal also includes:
Allow module 34, if switching to secure network for detecting the mobile terminal by current connected WLAN,
Then allow the payment function using the default application.
By there is risk (such as falseness WLAN detecting the current connected WLAN of mobile terminal in the embodiment of the present invention
Risk, DNS kidnap risk and/or ARP risk of attacks) when, the payment function of default application is prohibitted the use of, mobile payment has been ensured
During user's proprietary information security, and point out user to repair the risk, so as to avoid in leakage mobile terminal
Personal information, improves the security of mobile payment.
It is the structured flowchart for the mobile terminal that the embodiment of the present invention four is provided referring to Fig. 4.The mobile terminal as depicted
It can include:One or more processors 401 (only show one) in figure;One or more input equipments 402 (are only shown in figure
One), one or more output equipments 403 (one is only shown in figure) and memory 404.Above-mentioned processor 401, input equipment
402nd, output equipment 403 and memory 404 are connected by bus 405.Memory 404 is used for store instruction, and processor 401 is used for
Perform the instruction that memory 404 is stored.Wherein:
The processor 401, in default application operation, detecting the current connected network of the mobile terminal;
If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal is current connected
WLAN whether there is risk;If the testing result of the risk supervision module is yes, the branch of the default application is prohibitted the use of
Function is paid, and points out user to repair the risk by the output equipment.
Optionally, the processor 401 is used for the WLAN progress falseness WLAN inspection current connected to the mobile terminal
Survey, domain name system DNS kidnaps detection and/or ARP attack detecting, with determine the mobile terminal it is current company
The WLAN connect whether there is risk.
Optionally, the processor 401 is used to point out user's closing mobile terminal to work as by the output equipment 403
Preceding connected WLAN.
Optionally, the processor 401 by the output equipment 403 specifically for pointing out user by the mobile terminal
Secure network is switched to by current connected WLAN, wherein, the secure network includes mobile data network and by described
The WLAN of detection and/or ARP attack detecting is kidnapped in false WLAN detections, domain name system DNS.
Optionally, if the processor 401 is additionally operable to detect the mobile terminal by current connected WLAN switchings
To secure network, then allow the payment function using the default application.
The memory 404, for storing software program and module.The processor 401 is stored in institute by operation
The software program and module of memory 404 are stated, so that various function application and data processing are performed, with described mobile whole
When the current connected WLAN in end has risk, the payment function of the default application is prohibitted the use of, and points out user to repair institute
State risk.
It should be appreciated that in embodiments of the present invention, the processor 401 can be CPU (Central
Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint
Directional information), microphone, data receiver interface etc..Output equipment 403 can include display (LCD etc.), loudspeaker, data
Transmission interface etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the and of output equipment 403 described in the embodiment of the present invention
Memory 404 can perform the realization described in the embodiment one and two of network risks detection method provided in an embodiment of the present invention
Mode, also can perform the implementation described in mobile terminal described in embodiment three, will not be repeated here.
Fig. 5 is the schematic diagram for the mobile terminal that the embodiment of the present invention five is provided.As shown in figure 5, the mobile end of the embodiment
End 5 includes:Processor 50, memory 51 and it is stored in the meter that can be run in the memory 51 and on the processor 50
Calculation machine program 52.The processor 50 is realized when performing the computer program 52 in each above-mentioned method for switching network embodiment
The step of, such as the step S101 to S103 shown in Fig. 1.Or, the processor 50 performs real during the computer program 52
The function of each module/unit, such as function of module 31 to 34 shown in Fig. 3 in existing above-mentioned each device embodiment.
Exemplary, the computer program 52 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 51, and are performed by the processor 50, to complete the present invention.Described one
Individual or multiple module/units can complete the series of computation machine programmed instruction section of specific function, and the instruction segment is used for
Implementation procedure of the computer program 52 in the mobile terminal 5 is described.For example, the computer program 52 can be divided
It is cut into network detection module, risk supervision module, disabled module and allows module, each module concrete function is as follows:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, is examined
The current connected WLAN of the mobile terminal is surveyed with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the default application
Payment function, and point out user to repair the risk.
Optionally, the risk supervision module is used for:
The WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS kidnap detect and/
Or ARP attack detecting, to determine that the current connected WLAN of the mobile terminal whether there is risk.
Optionally, the disabled module is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module, peace is switched to specifically for prompting user by the mobile terminal by current connected WLAN
Whole network, wherein, the secure network includes mobile data network and robbed by the false WLAN detections, domain name system DNS
Hold the WLAN of detection and/or ARP attack detecting.
Allow module, if switching to secure network for detecting the mobile terminal by current connected WLAN,
Allow the payment function using the default application.
The mobile terminal 5 can be that the calculating such as desktop PC, notebook, palm PC and cloud server is set
It is standby.The mobile terminal may include, but be not limited only to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5
Only the example of mobile terminal 5, does not constitute the restriction to mobile terminal 5, can include than illustrating more or less portions
Part, either combines some parts or different parts, such as described mobile terminal can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 50 can be CPU (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor
Deng.
The memory 51 can be the internal storage unit of the mobile terminal 5, such as hard disk of mobile terminal 5 or interior
Deposit.The memory 51 can also be the External memory equipment of the mobile terminal 5, such as is equipped with described mobile terminal 5
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodges
Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the mobile terminal 5
Member also includes External memory equipment.The memory 51 is used for needed for storing the computer program and the mobile terminal
Other programs and data.The memory 51 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that, for convenience of description and succinctly, only with above-mentioned each work(
Energy unit, the division progress of module are for example, in practical application, as needed can distribute above-mentioned functions by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completion
The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used
To be that unit is individually physically present, can also two or more units it is integrated in a unit, it is above-mentioned integrated
Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.In addition, each function list
Member, the specific name of module are also only to facilitate mutually differentiation, is not limited to the protection domain of the application.Said system
The specific work process of middle unit, module, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, without detailed description or note in some embodiment
The part of load, may refer to the associated description of other embodiments.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein
Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel
Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed
The scope of the present invention.
, can be with embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method
Realize by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of division of logic function there can be other dividing mode, for example when actually realizing
Multiple units or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.Separately
A bit, shown or discussed coupling or direct-coupling or communication connection each other can be by some interfaces, device
Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated module/unit realized using in the form of SFU software functional unit and as independent production marketing or
In use, can be stored in a computer read/write memory medium.Understood based on such, the present invention realizes above-mentioned implementation
All or part of flow in example method, can also instruct the hardware of correlation to complete, described meter by computer program
Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium
It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried
Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium is included can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice
Subtract, such as, in some jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier signal and electricity
Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality
Example is applied the present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each
Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed
Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme, all should
Within protection scope of the present invention.
Claims (11)
1. a kind of network risks detection method, applied to mobile terminal, it is characterised in that the network risks detection method bag
Include:
In default application operation, the current connected network of the mobile terminal is detected;
If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal currently connects
The WLAN connect whether there is risk;
If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.
2. network risks detection method as claimed in claim 1, it is characterised in that the current institute of the detection mobile terminal
The WLAN of connection includes with the presence or absence of risk:
The WLAN current connected to the mobile terminal carries out falseness WLAN detections, domain name system DNS and kidnaps detection and/or ground
Location analysis protocol ARP attack detectings, to determine that the current connected WLAN of the mobile terminal whether there is risk.
3. network risks detection method as claimed in claim 1 or 2, it is characterised in that the prompting user repairs the wind
Danger includes:
User is pointed out to close the current connected WLAN of the mobile terminal.
4. network risks detection method as claimed in claim 3, it is characterised in that the prompting user closes described mobile whole
The current connected WLAN in end includes:
The mobile terminal is switched to secure network by prompting user by current connected WLAN, wherein, the secure network
Detection and/or address resolution protocol are kidnapped including mobile data network and by the false WLAN detections, domain name system DNS
The WLAN of ARP attack detectings.
5. network risks detection method as claimed in claim 4, it is characterised in that prompting user by the mobile terminal by
Current connected WLAN is switched to after secure network, and the network risks detection method also includes:
If detect the mobile terminal switches to secure network by current connected WLAN, allowing should using described preset
Payment function.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, detects institute
The current connected WLAN of mobile terminal is stated with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the branch of the default application
Function is paid, and points out user to repair the risk.
7. mobile terminal as claimed in claim 6, it is characterised in that the risk supervision module is used for:
The WLAN current connected to the mobile terminal carries out falseness WLAN detections, domain name system DNS and kidnaps detection and/or ground
Location analysis protocol ARP attack detectings, to determine that the current connected WLAN of the mobile terminal whether there is risk.
8. mobile terminal as claimed in claims 6 or 7, it is characterised in that the disabled module is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module, safety net is switched to specifically for prompting user by the mobile terminal by current connected WLAN
Network, wherein, the secure network includes mobile data network and kidnaps and examine by the false WLAN detections, domain name system DNS
Survey and/or the WLAN of ARP attack detecting.
9. mobile terminal as claimed in claim 8, it is characterised in that the mobile terminal also includes:
Allow module, if switching to secure network for detecting the mobile terminal by current connected WLAN, allow
Use the payment function of the default application.
10. a kind of mobile terminal, including memory, processor and it is stored in the memory and can be on the processor
The computer program of operation, it is characterised in that realize such as claim 1 to 5 described in the computing device during computer program
The step of any one network risks detection method.
11. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists
In realizing the network risks detection method as described in any one of claim 1 to 5 when the computer program is executed by processor
Step.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710508266.0A CN107103468A (en) | 2017-06-28 | 2017-06-28 | Network risks detection method, mobile terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710508266.0A CN107103468A (en) | 2017-06-28 | 2017-06-28 | Network risks detection method, mobile terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107103468A true CN107103468A (en) | 2017-08-29 |
Family
ID=59664432
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710508266.0A Pending CN107103468A (en) | 2017-06-28 | 2017-06-28 | Network risks detection method, mobile terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107103468A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107621977A (en) * | 2017-09-28 | 2018-01-23 | 努比亚技术有限公司 | A kind of control method of application, terminal and computer-readable recording medium |
CN113411302A (en) * | 2021-05-11 | 2021-09-17 | 银雁科技服务集团股份有限公司 | Network security early warning method and device for local area network equipment |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106034302A (en) * | 2015-03-09 | 2016-10-19 | 腾讯科技(深圳)有限公司 | Safety monitoring method for hot spot of wireless local area network, device thereof and communication system |
CN106485491A (en) * | 2016-09-30 | 2017-03-08 | 努比亚技术有限公司 | A kind of payment terminal and method |
CN106714173A (en) * | 2016-11-30 | 2017-05-24 | 北京小米移动软件有限公司 | Reminding method and device for network security |
-
2017
- 2017-06-28 CN CN201710508266.0A patent/CN107103468A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106034302A (en) * | 2015-03-09 | 2016-10-19 | 腾讯科技(深圳)有限公司 | Safety monitoring method for hot spot of wireless local area network, device thereof and communication system |
CN106485491A (en) * | 2016-09-30 | 2017-03-08 | 努比亚技术有限公司 | A kind of payment terminal and method |
CN106714173A (en) * | 2016-11-30 | 2017-05-24 | 北京小米移动软件有限公司 | Reminding method and device for network security |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107621977A (en) * | 2017-09-28 | 2018-01-23 | 努比亚技术有限公司 | A kind of control method of application, terminal and computer-readable recording medium |
CN107621977B (en) * | 2017-09-28 | 2021-06-18 | 努比亚技术有限公司 | Application control method, terminal and computer readable storage medium |
CN113411302A (en) * | 2021-05-11 | 2021-09-17 | 银雁科技服务集团股份有限公司 | Network security early warning method and device for local area network equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108694668B (en) | Digital asset transaction method, device, medium and equipment | |
CN107484190B (en) | Method for connecting network, mobile terminal and computer readable storage medium | |
CN107222898A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN104917796B (en) | Credit accounts creating device, system and method | |
CN109146489A (en) | Safe payment method, device, server and storage medium | |
WO2019237362A1 (en) | Privacy-preserving content classification | |
CN110225104A (en) | Data capture method, device and terminal device | |
CN108196458A (en) | Intelligent home equipment control method, device and terminal device | |
CN107343279A (en) | Method for connecting network, device, terminal device and storage medium | |
CN107404740A (en) | Method for switching network, device and the terminal device of safety | |
CN106658513A (en) | Safety detection method of wireless network, terminal and server | |
CN106529332B (en) | A kind of authority control method of mobile terminal, device and mobile terminal | |
CN107103468A (en) | Network risks detection method, mobile terminal and computer-readable recording medium | |
CN116541865A (en) | Password input method, device, equipment and storage medium based on data security | |
CN107277896A (en) | Wifi hotspot management method, device and terminal device | |
CN107256356A (en) | Pay class application management method, device and mobile terminal | |
CN107506494A (en) | Document handling method, mobile terminal and computer-readable recording medium | |
CN107318140A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN107332988A (en) | Information processing method, mobile terminal and computer-readable recording medium | |
CN107124719A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN107330058A (en) | Application searches method, mobile terminal and computer-readable recording medium | |
CN108520186A (en) | Record screen method, mobile terminal and computer readable storage medium | |
CN107248078A (en) | Mobile payment means of defence, mobile terminal and computer-readable recording medium | |
CN107292614A (en) | Pay class application management method, device and mobile terminal | |
CN107277877A (en) | Method for switching network, mobile terminal and computer-readable recording medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170829 |