CN107103468A - Network risks detection method, mobile terminal and computer-readable recording medium - Google Patents

Network risks detection method, mobile terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107103468A
CN107103468A CN201710508266.0A CN201710508266A CN107103468A CN 107103468 A CN107103468 A CN 107103468A CN 201710508266 A CN201710508266 A CN 201710508266A CN 107103468 A CN107103468 A CN 107103468A
Authority
CN
China
Prior art keywords
mobile terminal
wlan
network
current connected
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710508266.0A
Other languages
Chinese (zh)
Inventor
李东蔚
张俊
帅朝春
林志泳
梅小虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN201710508266.0A priority Critical patent/CN107103468A/en
Publication of CN107103468A publication Critical patent/CN107103468A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)

Abstract

The present invention is applied to communication technical field there is provided network risks detection method, mobile terminal and computer-readable recording medium, and the network risks detection method includes:In default application operation, the current connected network of the mobile terminal is detected;If the current connected network of the mobile terminal is WLAN WLAN, detect that the current connected WLAN of the mobile terminal whether there is risk;If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.It can avoid leaking the personal information in mobile terminal by the present invention, improve the security of mobile payment.

Description

Network risks detection method, mobile terminal and computer-readable recording medium
Technical field
The invention belongs to communication technical field, more particularly to network risks detection method, mobile terminal and computer-readable Storage medium.
Background technology
With the development of mobile terminal and Internet technology, the function of mobile terminal also becomes increasingly abundant, intelligentized movement Terminal just constantly improves the life of people, and therefore mobile payment also breeds.Mobile payment refers to allow user to use Its mobile terminal (being usually mobile phone) carries out a kind of method of service of account payment to the commodity consumed or service.At present, move The dynamic utilization rate paid is increased sharply, and user carries out account payment by mobile terminal turns into normality.However, user is using movement During payment, for the flow of the mobile data network of saving mobile terminal, nearby there are WLAN (Wireless Local Area Networks, WLAN) when, it is commonly connected WLAN and moves payment, easily the personal letter in leakage mobile terminal Breath, the security of mobile payment is relatively low.
The content of the invention
In view of this, the embodiments of the invention provide network risks detection method, mobile terminal and computer-readable storage Medium, to avoid leaking the personal information in mobile terminal, improves the security of mobile payment.
The first aspect of the embodiment of the present invention provides a kind of network risks detection method, described applied to mobile terminal Network risks detection method includes:
In default application operation, the current connected network of the mobile terminal is detected;
If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal is current The WLAN connected whether there is risk;
If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.
The second aspect of the embodiment of the present invention provides a kind of mobile terminal, and the mobile terminal includes:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, is examined The current connected WLAN of the mobile terminal is surveyed with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the default application Payment function, and point out user to repair the risk.
The third aspect of the embodiment of the present invention provides a kind of mobile terminal, including memory, processor and is stored in In the memory and the computer program that can run on the processor, described in the computing device during computer program Realize as described in above-mentioned first aspect the step of network risks detection method.
The fourth aspect of the embodiment of the present invention provides a kind of computer-readable recording medium, the computer-readable storage Media storage has computer program, and the network wind as described in above-mentioned first aspect is realized when the computer program is executed by processor The step of dangerous detection method.
The beneficial effect that the embodiment of the present invention exists compared with prior art is:The embodiment of the present invention passes through in default application During (class application is paid such as wechat, Alipay) operation, whether the current connected network of detection mobile terminal is WLAN, and When the current connected network of mobile terminal is WLAN, detects that the WLAN whether there is risk, if there is risk, forbid making With the payment function of default application, and user is pointed out to repair the risk.The embodiment of the present invention is by detecting mobile terminal When current connected WLAN has risk, the payment function of default application is prohibitted the use of, has ensured and has used during mobile payment The security of family proprietary information, and point out user to repair the risk, so as to avoid leaking the personal information in mobile terminal, Improve the security of mobile payment.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art In required for the accompanying drawing that uses be briefly described, it should be apparent that, drawings in the following description are only some of the present invention Embodiment, for those of ordinary skill in the art, without having to pay creative labor, can also be according to these Accompanying drawing obtains other accompanying drawings.
Fig. 1 is the implementation process schematic diagram for the network risks detection method that the embodiment of the present invention one is provided;
Fig. 2 is the implementation process schematic diagram for the network risks detection method that the embodiment of the present invention two is provided;
Fig. 3 is the schematic diagram for the mobile terminal that the embodiment of the present invention three is provided;
Fig. 4 is the schematic diagram for the mobile terminal that the embodiment of the present invention four is provided;
Fig. 5 is the schematic diagram for the mobile terminal that the embodiment of the present invention five is provided.
Embodiment
In describing below, in order to illustrate rather than in order to limit, it is proposed that such as tool of particular system structure, technology etc Body details, thoroughly to understand the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific The present invention can also be realized in the other embodiments of details.In other situations, omit to well-known system, device, electricity Road and the detailed description of method, in case unnecessary details hinders description of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " indicates described spy Levy, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, entirety, step, Operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the mobile terminal described in the embodiment of the present invention is including but not limited to such as with the sensitive table of touch Mobile phone, laptop computer or the tablet PC in face (for example, touch-screen display and/or touch pad) etc it is other Portable set.It is to be further understood that in certain embodiments, the equipment not portable communication device, but have The desktop computer of touch sensitive surface (for example, touch-screen display and/or touch pad).
In discussion below, the mobile terminal including display and touch sensitive surface is described.However, should manage Solution, one or more of the other physical User that mobile terminal can include such as physical keyboard, mouse and/or control-rod connects Jaws equipment.
Mobile terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application Program, word-processing application, website establishment application program, disk imprinting application program, spreadsheet applications, game are answered With program, telephony application, videoconference application, email application, instant messaging applications, forging Refining supports application program, photo management application program, digital camera application program, digital camera application program, web-browsing should With program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on mobile terminals can use at least one of such as touch sensitive surface Public physical user-interface device.It can be adjusted among applications and/or in corresponding application programs and/or change touch is quick Feel the corresponding information shown in the one or more functions and mobile terminal on surface.So, the public physics frame of mobile terminal Structure (for example, touch sensitive surface) can support the various application journeys with user interface directly perceived and transparent for a user Sequence.
It should be understood that the size of the sequence number of each step is not meant to the priority of execution sequence in the present embodiment, each process Execution sequence should be determined with its function and internal logic, and any limit is constituted without tackling the implementation process of the embodiment of the present invention.
In order to illustrate technical solutions according to the invention, illustrated below by specific embodiment.
It is the implementation process figure for the network risks detection method that the embodiment of the present invention one is provided, the network risks referring to Fig. 1 Detection method is applied to mobile terminal, and the network risks detection method may comprise steps of as shown in the figure:
Step S101, in default application operation, detects the current connected network of the mobile terminal.
In embodiments of the present invention, the default application refers to certain that user selectes from the mounted application of mobile terminal One type or the application with a certain function, the application such as wechat, Alipay with mobile payment function, that is, pay class Using.Optionally, user can change selected application according to actual needs.
In embodiments of the present invention, mobile terminal detects that the mobile terminal is current when detecting default application operation The network connected, to judge whether the current connected network of the mobile terminal is WLAN, if so, then performing step S102, if not, it is determined that the current connected network of the mobile terminal is mobile data network, and in the mobile data network Under move payment, mobile data network can ensure the security of mobile payment, without carrying out risk supervision again.Optionally, If the mobile terminal detects the WLAN (i.e. in the absence of the WLAN of risk) that there is safety in preset range, in order to save The flow of the mobile data network of mobile terminal is stated, the mobile terminal can also switch to the mobile data network connected The safe WLAN searched.Wherein, the mobile data network refers to belonging to the SIM card that the mobile terminal is installed The network that operator is provided, such as three big UNICOMs of operator, movement, the logical network provided of telecommunications, such as general grouped wireless Service technology (General Packet Radio Service, GPRS) network, 3 G mobile communication network (i.e. 3G network), Forth generation mobile communications network (i.e. 4G networks) etc., is not construed as limiting herein.The WLAN includes but is not limited to Wireless Fidelity (Wireless Fidelity, WiFi) network.
Step S102, if the current connected network of the mobile terminal is WLAN WLAN, detects the shifting The current connected WLAN of dynamic terminal whether there is risk.
In embodiments of the present invention, if the current connected network of the mobile terminal is WLAN, the movement is detected The current connected WLAN of terminal whether there is risk.If not detecting air-out in the current connected WLAN of the mobile terminal Danger, it is determined that the current connected WLAN of the mobile terminal is secure network, the mobile terminal enters under the secure network Row mobile payment;If detecting risk in the current connected WLAN of the mobile terminal, it is determined that the mobile terminal is worked as Preceding connected WLAN is dangerous, there is the risk attacked, the personal information easily stored in leakage mobile terminal, in movement During payment, the proprietary information of user is constituted a threat to safely, the security of mobile payment is reduced.It is above-mentioned in order to solve Problem, it is determined that during the current connected WLAN of the mobile terminal dangerous (i.e. the WLAN has risk), performing step S103.Wherein, the risk includes but is not limited to false WLAN, domain name system (Domain Name System, DNS) abduction And/or address resolution protocol (Address Resolution Protocol, ARP) attack equivalent risk.
Step S103, if so, then prohibitting the use of the payment function of the default application, and points out user to repair the wind Danger.
In embodiments of the present invention, if detecting risk in the current connected WLAN of the mobile terminal, moving It is dynamic pay during there will be the risk that user's proprietary information is stolen, can be by prohibitting the use of the branch of the default application Pay function or close the payment function of the default application, to forbid the mobile terminal to carry out delivery operation, ensure branch Pay the security of user's property in process of exchange.And point out user to change the risk, to improve the security of mobile payment, keep away The personal information of non-leaking mobile terminal and the proprietary information of user.Wherein, the mobile terminal can by voice, label, The modes such as short message, pop-up point out user, are not limited thereto.
The embodiment of the present invention is by when detecting the current connected WLAN of mobile terminal and there is risk, prohibitting the use of pre- If the payment function of application, has ensured the security of user's proprietary information during mobile payment, and it is described to point out user to repair Risk, so as to avoid leaking the personal information in mobile terminal, improves the security of mobile payment.
It is the implementation process figure for the network risks detection method that the embodiment of the present invention two is provided, the network risks referring to Fig. 2 Detection method is applied to mobile terminal, and the network risks detection method may comprise steps of as shown in the figure:
Step S201, in default application operation, detects the current connected network of the mobile terminal.
The step is identical with step S101, for details, reference can be made to step S101 associated description, will not be repeated here.
Step S202, the WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS and robbed Detection and/or ARP attack detecting are held, to determine that the current connected WLAN of the mobile terminal whether there is Risk.
In embodiments of the present invention, if detecting the current connected WLAN of the mobile terminal has falseness WLAN wind Danger, DNS determine described mobile whole when kidnapping the combination of any risk or kinds of risks in risk and ARP risk of attacks There is risk in the current connected WLAN in end.
Wherein, the WLAN current connected to mobile terminal progress falsenesses WLAN detections are specifically as follows:In detection When connecting some WLAN to the mobile terminal, the mobile terminal sends preset instructions to server to server, if The response message of the server feedback is received in preset time, it is determined that the current connected WLAN of the mobile terminal is not False WLAN, i.e. the risk in the absence of false WLAN;If not receiving the response of the server feedback in preset time Information, it is determined that the current connected WLAN of the mobile terminal is falseness WLAN, there is false WLAN risk.If described move The current connected WLAN of dynamic terminal is not false WLAN, then the mobile terminal can be sent preset instructions by the WLAN To the server;If the current connected WLAN of the mobile terminal be falseness WLAN, the mobile terminal can not will in advance If instruction is sent to the server.Wherein, the preset instructions carry request server and verify whether the WLAN is false WLAN information.If the server receives the preset instructions, response message, the response are fed back to the mobile terminal The information that the WLAN is not false WLAN is carried in information.Wherein, the server can be the production firm of mobile terminal Safeguard server.
The DNS kidnaps the request for referring to that domain name mapping is intercepted in the network range of abduction, the domain name of analysis request, Request outside examination scope is let pass, and otherwise returns to the IP address of vacation or doing nothing makes request lose response, its effect Exactly specific network can not be reacted or be accessed is false network address.
The ARP attacks refer to realize that ARP is cheated by forging IP address and MAC Address, can produced in a network big The ARP traffics of amount make network congestion, as long as the continual arp response bag for sending forgery of attacker is with regard to that can change target master IP-MAC address entrys in machine arp cache, cause network interruption or man-in-the-middle attack.
When the WLAN current connected to the mobile terminal carries out DNS abduction detection and ARP attack detectings, specific inspection Survey method can use detection method of the prior art, be not limited thereto.
In embodiments of the present invention, if not detecting false WLAN wind in the current connected WLAN of the mobile terminal Danger, DNS kidnap risk and ARP risk of attacks, it is determined that the current connected WLAN of the mobile terminal is secure network, described Mobile terminal moves payment under the secure network;If detecting void in the current connected WLAN of the mobile terminal False WLAN risks, DNS kidnap risk and any one risk in ARP risk of attacks or the combination of kinds of risks, it is determined that The current connected WLAN of the mobile terminal is dangerous, there is the risk attacked, and is easily stored in leakage mobile terminal Personal information, during mobile payment, constitutes a threat to safely to the proprietary information of user, reduces the safety of mobile payment Property.In order to solve the above problems, it is determined that the current connected WLAN of the mobile terminal dangerous (i.e. there is wind in the WLAN Danger) when, perform step S203.
Step S203, if the current connected WLAN of the mobile terminal has risk, prohibits the use of described preset should Payment function, and point out user to repair the risk.
In embodiments of the present invention, if detecting risk in the current connected WLAN of the mobile terminal, moving It is dynamic pay during there will be the risk that user's proprietary information is stolen, can be by prohibitting the use of the branch of the default application Pay function or close the payment function of the default application, to forbid the mobile terminal to carry out delivery operation, ensure branch Pay the security of user's property in process of exchange.And point out user to change the risk, to improve the security of mobile payment, keep away The personal information of non-leaking mobile terminal and the proprietary information of user.Wherein, the mobile terminal can by voice, label, The modes such as short message, pop-up point out user, are not limited thereto.
Optionally, the prompting user, which repairs the risk, includes:
User is pointed out to close the current connected WLAN of the mobile terminal.
As another embodiment, if the current connected WLAN of the mobile terminal has risk, prohibit the use of described The payment function of default application, and close the current connected WLAN of the mobile terminal.
Optionally, the prompting user closes the current connected WLAN of the mobile terminal and included:
The mobile terminal is switched to secure network by prompting user by current connected WLAN, wherein, the safety Network includes mobile data network and kidnaps detection and/or address resolution association by the false WLAN detections, domain name system DNS Discuss the WLAN of ARP attack detectings.
In embodiments of the present invention, mobile terminal may search for the WLAN in preset range, and detect what is searched WLAN whether there is risk, and there will be no risk WLAN (i.e. by the false WLAN detection, DNS kidnap detection and/or The WLAN of ARP attack detectings) it is shown in the form of a list on the screen of the mobile terminal, in order to which user is from shown The mobile terminal WLAN to be connected is selected in WLAN.
Optionally, the mobile terminal is switched to after secure network by current connected WLAN in prompting user, The embodiment of the present invention also includes:
If detect the mobile terminal switches to secure network by current connected WLAN, allow using described pre- If the payment function of application.
By there is risk (such as falseness WLAN detecting the current connected WLAN of mobile terminal in the embodiment of the present invention Risk, DNS kidnap risk and/or ARP risk of attacks) when, the payment function of default application is prohibitted the use of, mobile payment has been ensured During user's proprietary information security, and point out user to repair the risk, so as to avoid in leakage mobile terminal Personal information, improves the security of mobile payment.
Referring to Fig. 3, it is the schematic diagram for the mobile terminal that the embodiment of the present invention three is provided, for convenience of description, illustrate only The part related to the embodiment of the present invention.
The mobile terminal includes:
Network detection module 31, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module 32, if the network current connected for the mobile terminal is WLAN WLAN, Detect that the current connected WLAN of the mobile terminal whether there is risk;
Disabled module 33, if the testing result for the risk supervision module is yes, prohibits the use of described preset should Payment function, and point out user to repair the risk.
Optionally, the risk supervision module 32 is used for:
The WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS kidnap detect and/ Or ARP attack detecting, to determine that the current connected WLAN of the mobile terminal whether there is risk.
Optionally, the disabled module 33 is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module 33, is switched to the mobile terminal by current connected WLAN specifically for prompting user Secure network, wherein, the secure network includes mobile data network and by the false WLAN detections, domain name system DNS Kidnap the WLAN of detection and/or ARP attack detecting.
Optionally, the mobile terminal also includes:
Allow module 34, if switching to secure network for detecting the mobile terminal by current connected WLAN, Then allow the payment function using the default application.
By there is risk (such as falseness WLAN detecting the current connected WLAN of mobile terminal in the embodiment of the present invention Risk, DNS kidnap risk and/or ARP risk of attacks) when, the payment function of default application is prohibitted the use of, mobile payment has been ensured During user's proprietary information security, and point out user to repair the risk, so as to avoid in leakage mobile terminal Personal information, improves the security of mobile payment.
It is the structured flowchart for the mobile terminal that the embodiment of the present invention four is provided referring to Fig. 4.The mobile terminal as depicted It can include:One or more processors 401 (only show one) in figure;One or more input equipments 402 (are only shown in figure One), one or more output equipments 403 (one is only shown in figure) and memory 404.Above-mentioned processor 401, input equipment 402nd, output equipment 403 and memory 404 are connected by bus 405.Memory 404 is used for store instruction, and processor 401 is used for Perform the instruction that memory 404 is stored.Wherein:
The processor 401, in default application operation, detecting the current connected network of the mobile terminal; If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal is current connected WLAN whether there is risk;If the testing result of the risk supervision module is yes, the branch of the default application is prohibitted the use of Function is paid, and points out user to repair the risk by the output equipment.
Optionally, the processor 401 is used for the WLAN progress falseness WLAN inspection current connected to the mobile terminal Survey, domain name system DNS kidnaps detection and/or ARP attack detecting, with determine the mobile terminal it is current company The WLAN connect whether there is risk.
Optionally, the processor 401 is used to point out user's closing mobile terminal to work as by the output equipment 403 Preceding connected WLAN.
Optionally, the processor 401 by the output equipment 403 specifically for pointing out user by the mobile terminal Secure network is switched to by current connected WLAN, wherein, the secure network includes mobile data network and by described The WLAN of detection and/or ARP attack detecting is kidnapped in false WLAN detections, domain name system DNS.
Optionally, if the processor 401 is additionally operable to detect the mobile terminal by current connected WLAN switchings To secure network, then allow the payment function using the default application.
The memory 404, for storing software program and module.The processor 401 is stored in institute by operation The software program and module of memory 404 are stated, so that various function application and data processing are performed, with described mobile whole When the current connected WLAN in end has risk, the payment function of the default application is prohibitted the use of, and points out user to repair institute State risk.
It should be appreciated that in embodiments of the present invention, the processor 401 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 402 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone, data receiver interface etc..Output equipment 403 can include display (LCD etc.), loudspeaker, data Transmission interface etc..
The memory 404 can include read-only storage and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
In the specific implementation, processor 401, input equipment 402, the and of output equipment 403 described in the embodiment of the present invention Memory 404 can perform the realization described in the embodiment one and two of network risks detection method provided in an embodiment of the present invention Mode, also can perform the implementation described in mobile terminal described in embodiment three, will not be repeated here.
Fig. 5 is the schematic diagram for the mobile terminal that the embodiment of the present invention five is provided.As shown in figure 5, the mobile end of the embodiment End 5 includes:Processor 50, memory 51 and it is stored in the meter that can be run in the memory 51 and on the processor 50 Calculation machine program 52.The processor 50 is realized when performing the computer program 52 in each above-mentioned method for switching network embodiment The step of, such as the step S101 to S103 shown in Fig. 1.Or, the processor 50 performs real during the computer program 52 The function of each module/unit, such as function of module 31 to 34 shown in Fig. 3 in existing above-mentioned each device embodiment.
Exemplary, the computer program 52 can be divided into one or more module/units, it is one or Multiple module/units are stored in the memory 51, and are performed by the processor 50, to complete the present invention.Described one Individual or multiple module/units can complete the series of computation machine programmed instruction section of specific function, and the instruction segment is used for Implementation procedure of the computer program 52 in the mobile terminal 5 is described.For example, the computer program 52 can be divided It is cut into network detection module, risk supervision module, disabled module and allows module, each module concrete function is as follows:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, is examined The current connected WLAN of the mobile terminal is surveyed with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the default application Payment function, and point out user to repair the risk.
Optionally, the risk supervision module is used for:
The WLAN current connected to the mobile terminal carry out falseness WLAN detections, domain name system DNS kidnap detect and/ Or ARP attack detecting, to determine that the current connected WLAN of the mobile terminal whether there is risk.
Optionally, the disabled module is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module, peace is switched to specifically for prompting user by the mobile terminal by current connected WLAN Whole network, wherein, the secure network includes mobile data network and robbed by the false WLAN detections, domain name system DNS Hold the WLAN of detection and/or ARP attack detecting.
Allow module, if switching to secure network for detecting the mobile terminal by current connected WLAN, Allow the payment function using the default application.
The mobile terminal 5 can be that the calculating such as desktop PC, notebook, palm PC and cloud server is set It is standby.The mobile terminal may include, but be not limited only to, processor 50, memory 51.It will be understood by those skilled in the art that Fig. 5 Only the example of mobile terminal 5, does not constitute the restriction to mobile terminal 5, can include than illustrating more or less portions Part, either combines some parts or different parts, such as described mobile terminal can also include input-output equipment, net Network access device, bus etc..
Alleged processor 50 can be CPU (Central Processing Unit, CPU), can also be Other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable Gate Array, FPGA) or other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng.
The memory 51 can be the internal storage unit of the mobile terminal 5, such as hard disk of mobile terminal 5 or interior Deposit.The memory 51 can also be the External memory equipment of the mobile terminal 5, such as is equipped with described mobile terminal 5 Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodges Deposit card (Flash Card) etc..Further, the memory 51 can also both include the storage inside list of the mobile terminal 5 Member also includes External memory equipment.The memory 51 is used for needed for storing the computer program and the mobile terminal Other programs and data.The memory 51 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that, for convenience of description and succinctly, only with above-mentioned each work( Energy unit, the division progress of module are for example, in practical application, as needed can distribute above-mentioned functions by different Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completion The all or part of function of description.Each functional unit, module in embodiment can be integrated in a processing unit, also may be used To be that unit is individually physically present, can also two or more units it is integrated in a unit, it is above-mentioned integrated Unit can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.In addition, each function list Member, the specific name of module are also only to facilitate mutually differentiation, is not limited to the protection domain of the application.Said system The specific work process of middle unit, module, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In the above-described embodiments, the description to each embodiment all emphasizes particularly on different fields, without detailed description or note in some embodiment The part of load, may refer to the associated description of other embodiments.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually Performed with hardware or software mode, depending on the application-specific and design constraint of technical scheme.Professional and technical personnel Described function can be realized using distinct methods to each specific application, but this realization is it is not considered that exceed The scope of the present invention.
, can be with embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method Realize by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute The division of module or unit is stated, only a kind of division of logic function there can be other dividing mode, for example when actually realizing Multiple units or component can combine or be desirably integrated into another system, or some features can be ignored, or not perform.Separately A bit, shown or discussed coupling or direct-coupling or communication connection each other can be by some interfaces, device Or INDIRECT COUPLING or the communication connection of unit, can be electrical, machinery or other forms.
The unit illustrated as separating component can be or may not be it is physically separate, it is aobvious as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, it would however also be possible to employ the form of SFU software functional unit is realized.
If the integrated module/unit realized using in the form of SFU software functional unit and as independent production marketing or In use, can be stored in a computer read/write memory medium.Understood based on such, the present invention realizes above-mentioned implementation All or part of flow in example method, can also instruct the hardware of correlation to complete, described meter by computer program Calculation machine program can be stored in a computer-readable recording medium, and the computer program can be achieved when being executed by processor The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation Code can be source code form, object identification code form, executable file or some intermediate forms etc..The computer-readable medium It can include:Any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic of the computer program code can be carried Dish, CD, computer storage, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described The content that computer-readable medium is included can carry out appropriate increasing according to legislation in jurisdiction and the requirement of patent practice Subtract, such as, in some jurisdictions, according to legislation and patent practice, computer-readable medium does not include electric carrier signal and electricity Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although with reference to foregoing reality Example is applied the present invention is described in detail, it will be understood by those within the art that:It still can be to foregoing each Technical scheme described in embodiment is modified, or carries out equivalent substitution to which part technical characteristic;And these are changed Or replace, the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme, all should Within protection scope of the present invention.

Claims (11)

1. a kind of network risks detection method, applied to mobile terminal, it is characterised in that the network risks detection method bag Include:
In default application operation, the current connected network of the mobile terminal is detected;
If the current connected network of the mobile terminal is WLAN WLAN, detect that the mobile terminal currently connects The WLAN connect whether there is risk;
If so, then prohibitting the use of the payment function of the default application, and user is pointed out to repair the risk.
2. network risks detection method as claimed in claim 1, it is characterised in that the current institute of the detection mobile terminal The WLAN of connection includes with the presence or absence of risk:
The WLAN current connected to the mobile terminal carries out falseness WLAN detections, domain name system DNS and kidnaps detection and/or ground Location analysis protocol ARP attack detectings, to determine that the current connected WLAN of the mobile terminal whether there is risk.
3. network risks detection method as claimed in claim 1 or 2, it is characterised in that the prompting user repairs the wind Danger includes:
User is pointed out to close the current connected WLAN of the mobile terminal.
4. network risks detection method as claimed in claim 3, it is characterised in that the prompting user closes described mobile whole The current connected WLAN in end includes:
The mobile terminal is switched to secure network by prompting user by current connected WLAN, wherein, the secure network Detection and/or address resolution protocol are kidnapped including mobile data network and by the false WLAN detections, domain name system DNS The WLAN of ARP attack detectings.
5. network risks detection method as claimed in claim 4, it is characterised in that prompting user by the mobile terminal by Current connected WLAN is switched to after secure network, and the network risks detection method also includes:
If detect the mobile terminal switches to secure network by current connected WLAN, allowing should using described preset Payment function.
6. a kind of mobile terminal, it is characterised in that the mobile terminal includes:
Network detection module, in default application operation, detecting the current connected network of the mobile terminal;
Risk supervision module, if the network current connected for the mobile terminal is WLAN WLAN, detects institute The current connected WLAN of mobile terminal is stated with the presence or absence of risk;
Disabled module, if the testing result for the risk supervision module is yes, prohibits the use of the branch of the default application Function is paid, and points out user to repair the risk.
7. mobile terminal as claimed in claim 6, it is characterised in that the risk supervision module is used for:
The WLAN current connected to the mobile terminal carries out falseness WLAN detections, domain name system DNS and kidnaps detection and/or ground Location analysis protocol ARP attack detectings, to determine that the current connected WLAN of the mobile terminal whether there is risk.
8. mobile terminal as claimed in claims 6 or 7, it is characterised in that the disabled module is used for:
User is pointed out to close the current connected WLAN of the mobile terminal;
The disabled module, safety net is switched to specifically for prompting user by the mobile terminal by current connected WLAN Network, wherein, the secure network includes mobile data network and kidnaps and examine by the false WLAN detections, domain name system DNS Survey and/or the WLAN of ARP attack detecting.
9. mobile terminal as claimed in claim 8, it is characterised in that the mobile terminal also includes:
Allow module, if switching to secure network for detecting the mobile terminal by current connected WLAN, allow Use the payment function of the default application.
10. a kind of mobile terminal, including memory, processor and it is stored in the memory and can be on the processor The computer program of operation, it is characterised in that realize such as claim 1 to 5 described in the computing device during computer program The step of any one network risks detection method.
11. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, its feature exists In realizing the network risks detection method as described in any one of claim 1 to 5 when the computer program is executed by processor Step.
CN201710508266.0A 2017-06-28 2017-06-28 Network risks detection method, mobile terminal and computer-readable recording medium Pending CN107103468A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710508266.0A CN107103468A (en) 2017-06-28 2017-06-28 Network risks detection method, mobile terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710508266.0A CN107103468A (en) 2017-06-28 2017-06-28 Network risks detection method, mobile terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107103468A true CN107103468A (en) 2017-08-29

Family

ID=59664432

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710508266.0A Pending CN107103468A (en) 2017-06-28 2017-06-28 Network risks detection method, mobile terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107103468A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107621977A (en) * 2017-09-28 2018-01-23 努比亚技术有限公司 A kind of control method of application, terminal and computer-readable recording medium
CN113411302A (en) * 2021-05-11 2021-09-17 银雁科技服务集团股份有限公司 Network security early warning method and device for local area network equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034302A (en) * 2015-03-09 2016-10-19 腾讯科技(深圳)有限公司 Safety monitoring method for hot spot of wireless local area network, device thereof and communication system
CN106485491A (en) * 2016-09-30 2017-03-08 努比亚技术有限公司 A kind of payment terminal and method
CN106714173A (en) * 2016-11-30 2017-05-24 北京小米移动软件有限公司 Reminding method and device for network security

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106034302A (en) * 2015-03-09 2016-10-19 腾讯科技(深圳)有限公司 Safety monitoring method for hot spot of wireless local area network, device thereof and communication system
CN106485491A (en) * 2016-09-30 2017-03-08 努比亚技术有限公司 A kind of payment terminal and method
CN106714173A (en) * 2016-11-30 2017-05-24 北京小米移动软件有限公司 Reminding method and device for network security

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107621977A (en) * 2017-09-28 2018-01-23 努比亚技术有限公司 A kind of control method of application, terminal and computer-readable recording medium
CN107621977B (en) * 2017-09-28 2021-06-18 努比亚技术有限公司 Application control method, terminal and computer readable storage medium
CN113411302A (en) * 2021-05-11 2021-09-17 银雁科技服务集团股份有限公司 Network security early warning method and device for local area network equipment

Similar Documents

Publication Publication Date Title
CN108694668B (en) Digital asset transaction method, device, medium and equipment
CN107484190B (en) Method for connecting network, mobile terminal and computer readable storage medium
CN107222898A (en) Method for switching network, mobile terminal and computer-readable recording medium
CN104917796B (en) Credit accounts creating device, system and method
CN109146489A (en) Safe payment method, device, server and storage medium
WO2019237362A1 (en) Privacy-preserving content classification
CN110225104A (en) Data capture method, device and terminal device
CN108196458A (en) Intelligent home equipment control method, device and terminal device
CN107343279A (en) Method for connecting network, device, terminal device and storage medium
CN107404740A (en) Method for switching network, device and the terminal device of safety
CN106658513A (en) Safety detection method of wireless network, terminal and server
CN106529332B (en) A kind of authority control method of mobile terminal, device and mobile terminal
CN107103468A (en) Network risks detection method, mobile terminal and computer-readable recording medium
CN116541865A (en) Password input method, device, equipment and storage medium based on data security
CN107277896A (en) Wifi hotspot management method, device and terminal device
CN107256356A (en) Pay class application management method, device and mobile terminal
CN107506494A (en) Document handling method, mobile terminal and computer-readable recording medium
CN107318140A (en) Method for switching network, mobile terminal and computer-readable recording medium
CN107332988A (en) Information processing method, mobile terminal and computer-readable recording medium
CN107124719A (en) Method for switching network, mobile terminal and computer-readable recording medium
CN107330058A (en) Application searches method, mobile terminal and computer-readable recording medium
CN108520186A (en) Record screen method, mobile terminal and computer readable storage medium
CN107248078A (en) Mobile payment means of defence, mobile terminal and computer-readable recording medium
CN107292614A (en) Pay class application management method, device and mobile terminal
CN107277877A (en) Method for switching network, mobile terminal and computer-readable recording medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170829