CN107148022A - A kind of anti-loiter network based reminding method and relevant device - Google Patents
A kind of anti-loiter network based reminding method and relevant device Download PDFInfo
- Publication number
- CN107148022A CN107148022A CN201710526338.4A CN201710526338A CN107148022A CN 107148022 A CN107148022 A CN 107148022A CN 201710526338 A CN201710526338 A CN 201710526338A CN 107148022 A CN107148022 A CN 107148022A
- Authority
- CN
- China
- Prior art keywords
- wireless network
- primary user
- network
- family wireless
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
Abstract
The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, can be in the case of without the adaptation of gateway device and login, " loiter network " is carried out if there is unauthorized user equipment and access to family wireless network, then the unauthorized user equipment to " loiter network " carries out automatic identification, and send anti-loiter network prompting to the validated user of family wireless network in time, so that validated user knows the service condition of family wireless network in time, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Description
Technical field
The present invention relates to Internet technical field, and in particular to a kind of anti-loiter network based reminding method, a kind of anti-loiter network remind dress
Put, a kind of computer-readable storage medium and a kind of user equipment.
Background technology
With the popularization of the related software of shared wireless network, increasing family wireless network is caused by " loiter network "
The validated user of the family wireless network network speed of itself is affected.In order to eliminate family wireless network by the peace of " loiter network "
Full hidden danger, the solution of " anti-loiter network " is arisen at the historic moment." anti-loiter network " refers to prevent other using some technological means to reach
User uses the purpose of family wireless network.At present, most " anti-loiter network " scheme be by controlling gateway device to realize,
Its core is the difference in operation for being adapted to the compatible gateway device (such as wireless router) of various brands model on the market, is successfully fitting
After gateway device, logged on to by validated user in gateway device and operated the access for such as refusing unauthorized user equipment
Request, so as to reach " anti-loiter network " purpose.Due to existing " anti-loiter network " scheme realize premise be gateway device adaptation and
Log in, once the gateway device of validated user successful adaptation or can not can not be logged in normally, validated user can not then know itself
Family wireless network also just can not make respective handling, shadow to the user equipment of " loiter network " in time certainly by the situation of " loiter network "
The normal of family wireless network has been rung to use.
The content of the invention
The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, can be without the suitable of gateway device
" loiter network " identification is carried out in the case of matching somebody with somebody and logging in, and exports anti-loiter network in time reminding.
On the one hand, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, it may include:
If detecting primary user device accesses to primary user's family wireless network, primary user's family wireless network is obtained
Connection list of devices, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one
The mark of user equipment;
The authorisation device list associated with primary user's family wireless network is obtained, is wrapped in the authorisation device list
The mark for allowing to access to the authorized user device of primary user's family wireless network containing at least one;
The connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of unauthorized
User equipment accesses to primary user's family wireless network;
If in the presence of the anti-loiter network reminder message of output.
Preferably, if the primary user device that detects accesses to primary user's family wireless network, the primary user is obtained
Before the connection list of devices of family wireless network, in addition to:
Whether when detecting primary user device and accessing to target radio network, it is doubtful to judge the target radio network
Family wireless network;
If the target radio network is doubtful family wireless network, output confirms prompt message, the confirmation prompting letter
Cease for point out to perform confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;
Associated authorisation device list is configured for primary user's family wireless network.
Preferably, it is described when detecting primary user device and accessing to target radio network, judge the Target Wireless net
Whether network is doubtful family wireless network, including:
When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about;
If the confidence level is higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one
The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access
Time, access frequency, access place.
Preferably, it is described to configure the authorisation device list being associated for primary user's family wireless network, including:
All user equipmenies that history accesses to primary user's family wireless network are searched, and export found institute
There is the mark of user equipment for selection;
It is to allow the authorized user for accessing to primary user's family wireless network to set by selected user device configuration
It is standby, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, it is described to configure the authorisation device list being associated for primary user's family wireless network, including:
Configuration prompt information is exported, the configuration prompt information accesses to the primary user family for pointing out input to allow
The mark of the authorized user device of wireless network;
Awarded according to the mark generation of the authorized user device inputted is associated with primary user's family wireless network
Weigh list of devices.
Preferably, if the primary user device that detects accesses to primary user's family wireless network, the primary user is obtained
The connection list of devices of family wireless network, including:
If detecting primary user device accesses to primary user's family wireless network, to primary user's family wireless network
Gateway device, which is sent, obtains instruction;
Receive the connection list of devices for primary user's family wireless network that the gateway device is returned.
On the other hand, the embodiment of the present invention provides a kind of anti-loiter network alarm set, it may include:
First acquisition unit, if accessing to primary user's family wireless network for detecting primary user device, obtains described
The connection list of devices of primary user's family wireless network, the connection list of devices is currently accessed to the master comprising at least one
The mark of the user equipment of subscriber household wireless network;
Second acquisition unit, for obtaining the authorisation device list associated with primary user's family wireless network, institute
State and at least one authorized user device for allowing to access to primary user's family wireless network is included in authorisation device list
Mark;
Comparing unit, be currently to confirm for the connection list of devices to be compared with the authorisation device list
No have unauthorized user equipment and access to primary user's family wireless network;
Reminding unit, if in the presence of the anti-loiter network reminder message of output.
Preferably, the anti-loiter network alarm set also includes:
Doubtful judging unit, for when detecting primary user device and accessing to target radio network, judging the target
Whether wireless network is doubtful family wireless network;
Confirm Tip element, if being doubtful family wireless network for the target radio network, output confirms prompting letter
Breath, the confirmation prompt message is used to point out to perform to confirm whether the target radio network is main subscriber household wireless network
Confirm operation;
Indexing unit, if confirming operation for receiving, primary user's family wireless is labeled as by the target radio network
Network;
Dispensing unit, for configuring associated authorisation device list for primary user's family wireless network.
Preferably, the doubtful judging unit accesses to target radio network specifically for that ought detect primary user device
When, the confidence level of the target radio network is inquired about, if the confidence level is higher than pre-set threshold value, the target radio network is judged
For doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one
The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access
Time, access frequency, access place.
Preferably, the dispensing unit accesses to all of primary user's family wireless network specifically for searching history
User equipment, and it is for selection to export the mark of all user equipmenies found, is by selected user device configuration
Allow the authorized user device for accessing to primary user's family wireless network, and generate and primary user's family wireless network
Associated authorisation device list;Or,
The dispensing unit is specifically for output configuration prompt information, and the configuration prompt information is used to point out input to allow
The mark of the authorized user device of primary user's family wireless network is accessed to, according to the mark of the authorized user device inputted
Know the generation authorisation device list associated with primary user's family wireless network.
Preferably, if the first acquisition unit accesses to primary user's family wireless specifically for detecting primary user device
Network, sends to the gateway device of primary user's family wireless network and obtains instruction, receives the institute that the gateway device is returned
State the connection list of devices of primary user's family wireless network.
Another further aspect, the embodiment of the present invention also provides a kind of computer-readable storage medium, the computer-readable storage medium storage
There are one or one or more instruction, described one or one or more instruction are suitable to be loaded by processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained
The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one
User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list
The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is
Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
Preferably, before described one or one or more instruction loads by processor and performed step A, also perform and walk as follows
Suddenly:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful
Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting
Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
Preferably, described one or one or more instruction are by during processor load and performs step E, specific execution
Following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network
Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one
The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access
Time, access frequency, access place.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution
Following steps:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found
All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration
Equipment, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution
Following steps:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow
The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network
Authorisation device list.
Preferably, described one or one or more instruction are by during processor load and performs step A, specific execution
Following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless
The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
Another further aspect, the embodiment of the present invention additionally provides a kind of user equipment, including:
Wireless Internet access module, wireless network is accessed to for searching for wireless signal, and by the wireless signal searched;
Processor, is adapted for carrying out one or one or more instruction;And,
Computer-readable storage medium, the computer-readable storage medium be stored with one or one or more instruction, described one or
One or more instruction is suitable to be loaded by the processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained
The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one
User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list
The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is
Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
Preferably, before described one or one or more instruction loads by processor and performed step A, also perform and walk as follows
Suddenly:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful
Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting
Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
Preferably, described one or one or more instruction are by during processor load and performs step E, specific execution
Following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network
Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one
The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access
Time, access frequency, access place.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution
Following steps:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found
All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration
Equipment, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution
Following steps:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow
The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network
Authorisation device list.
Preferably, described one or one or more instruction are by during processor load and performs step A, specific execution
Following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless
The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user
Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and
When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time
With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of anti-loiter network based reminding method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another anti-loiter network based reminding method provided in an embodiment of the present invention;
Fig. 3 a- Fig. 3 c are the schematic diagram that family wireless network provided in an embodiment of the present invention marks scene;
Fig. 4 is a kind of structural representation of anti-loiter network alarm set provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of user equipment provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described.
With the fast development of mobile Internet, most of subscriber household is fitted with the nets such as wireless router, wireless modem
Equipment is closed, is provided such as using these gateway devices by user equipmenies such as PDA (tablet personal computer), mobile phones when user stays at home
The wireless signals such as wifi (wireless fidelity, Wireless Fidelity) signal are connected to internet;Herein, with subscriber household
Gateway device is referred to as family wireless network for the wireless network of core.With the popularization of the related software of shared wireless network, more
Carry out more family wireless networks by " loiter network ", cause the validated user of family wireless network (such as:Family wireless network it is all
Person user or its kinsfolk user) network speed of itself is affected." loiter network " is family wireless network by as free
Hotspot by neighbouring disabled user (such as:The owner user of non-family safe wireless network, nor its kinsfolk user) it is logical
Cross the situation that the software of the shared wireless network such as master key is stealthily accessed and freely used.But family wireless network belongs to
The private wireless networks of validated user, " loiter network " is not allowed in the case of without validated user mandate, and " is rubbed
Net " user often takes the bandwidth of family wireless network, and the normal of validated user for having influence on family wireless network is used, and is
Elimination family wireless network is arisen at the historic moment by the potential safety hazard of " loiter network ", the solution of " anti-loiter network "." anti-loiter network " refers to
" blacklist " such as is set in gateway device using some technological means, or control gateway device hides the means such as wireless signal to reach
To the purpose for preventing other users from using family wireless network.
At present, most " anti-loiter network " scheme is that, by controlling gateway device to realize, its core is to be adapted to compatibility
The difference in operation of the gateway device (such as wireless router) of various brands model on the market, after successful adaptation gateway device, by
Validated user, which is logged on in gateway device, carries out the configuration such as " blacklist " or " hiding wireless signal ", and gateway device detects non-award
When power user equipment accesses to family wireless network, send " anti-loiter network " to validated user and remind, while can be according to configuration or root
Refuse the access request of the unauthorized user equipment according to the operation of validated user, so as to reach " anti-loiter network " purpose.Due to existing
" anti-loiter network " scheme realize that premise is adaptation and the login of gateway device, once the gateway device of validated user can not succeed
Adaptation can not be logged in normally, and validated user can not then know the situation of itself family wireless network quilt " loiter network ", certainly also
Respective handling can not be made to the user equipment of " loiter network " in time, have impact on the normal of family wireless network and use.
The method and relevant device reminded the invention provides a kind of anti-loiter network, can be in the adaptation without gateway device
And in the case of logging in, " loiter network " is carried out if there is unauthorized user equipment and access to family wireless network, to " loiter network "
Unauthorized user equipment carries out automatic identification, and sends anti-loiter network prompting to the validated user of family wireless network in time, so that
Validated user knows the service condition of family wireless network in time, facilitates validated user to carry out corresponding position to unauthorized user equipment
Reason.
Based on foregoing description, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, refers to Fig. 1, this method can be wrapped
Include following steps S101- steps S104.
S101, if detecting primary user device accesses to primary user's family wireless network, obtain the primary user family without
The connection list of devices of gauze network, the connection list of devices is currently accessed to primary user's family wireless comprising at least one
The mark of the user equipment of network.
Primary user device refers to used in the validated user of family wireless network, for receiving the user that anti-loiter network is reminded
Equipment.User equipment can include but is not limited to:The portable terminals such as notebook computer, PDA, smart mobile phone.Primary user
Family wireless network refers to the family wireless network possessed using validated user, is also the family that primary user device is currently accessed
Wireless network.It is described below with a specific implementation:Assuming that user A installs wireless router in own home, while using pen
Remember that this computer, smart mobile phone are beneficial to wireless router access family wifi network;So, user A can set notebook computer
For primary user device, it is primary user device that can also set smart mobile phone;User A is the validated user of family's wifi network,
Now family's wifi network is referred to as primary user family wifi network.
Due to needing to access to primary user's family wireless network by gateway device, therefore, the connection of any one user equipment
Gateway device is to access to during primary user's family wireless network, and gateway device can then add the mark of the user equipment of the access
Into connection list of devices;Herein, the mark of user equipment can include but is not limited to IP (Internet Protocol, network
Between the agreement that interconnects) address, MAC Address (Media Access Control Address, physical address), cell-phone number,
Email (E-mail address) account etc.;For example:When user equipment M is connected with gateway device foundation and accesses to primary user family
During wireless network, user equipment M mark is added in connection list of devices by gateway device;Similarly, when user equipment N and net
When closing equipment foundation connection and accessing to primary user's family wireless network, user equipment N mark is added to by gateway device to be connected
Connect in list of devices.It is understood that after user equipment M (or user equipment N) disconnects the connection with gateway device, gateway
Equipment deletes user equipment M (or user equipment N) mark from connection list of devices.In step S101, primary user device connects
Enter to primary user's family wireless network, connection list of devices, example can be obtained from the gateway device of primary user's home network
Such as:Primary user device can be obtained from gateway device by the way of ping and connect list of devices.
S102, obtains the authorisation device list associated with primary user's family wireless network, the authorisation device row
The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in table.
Authorisation device list can be pre-configured with by the validated user of primary user's family wireless network, for example:It is legal
The user equipmenies such as PDA, notebook computer, the mobile phone that user can use oneself are each configured to authorized user device,
The user equipment such as PDA, notebook computer, smart mobile phone used in the kinsfolk user of oneself can be each configured to
Authorized user device.The mark of all authorized user devices is added into authorisation device list, and the authorisation device list can
So that in primary user device local storage space, step S102 then can be from primary with primary user's family wireless network associated storage
The authorisation device list is directly obtained in the equipment local storage space of family.It should be noted that authorisation device list with it is primary
Family family wireless network is associated to refer to the uniquely one authorisation device list of correspondence of primary user's family wireless network.
S103, the connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non-
Authorized user device accesses to primary user's family wireless network.
S104, if in the presence of the anti-loiter network reminder message of output.
In step S103-S104, the mark for connecting list of devices and each user equipment in authorisation device list is carried out
Compare one by one, if it find that the mark of certain user equipment in connection list of devices is not in authorisation device list, show to work as
Before access to primary user's family wireless network the user equipment be unauthorized user equipment, belong to the user equipment of " loiter network ",
Anti- loiter network reminder message can be then exported to primary user device, the anti-loiter network reminder message is used to remind primary user device side
Validated user pays close attention to situation of the family wireless network by " loiter network " of itself, it is possible to can influence the Web vector graphic of validated user.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user
Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and
When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time
With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.It should be strongly noted that processing herein can
It is including but not limited to following several:If the 1. gateway device of primary user's family wireless network successful adaptation, validated user can
Log on to gateway device and control gateway device to disconnect the connection with unauthorized user equipment, so that unauthorized user equipment be moved
Go out primary user's family wireless network.If 2. the gateway device of primary user's family wireless network is not yet adapted to or is adapted to mistake
Lose, validated user can send adaptation application to cloud server, after logging on to gateway device again after gateway device successful adaptation
And control gateway device disconnect with the connection of unauthorized user equipment so that by unauthorized user equipment remove primary user family without
Gauze network.3. validated user can also log on to gateway device, and the unauthorized user equipment recognized is added into " blacklist "
In, then when the unauthorized user equipment is again coupled to gateway device, gateway device can directly refuse the unauthorized user equipment
Connection request, refusal accessed to primary user's family wireless network.4. validated user can also log on to gateway device, open
" hiding " function of gateway device, with cause unauthorized user equipment can not search gateway device offer wireless signal and then
Primary user's family wireless network can not be accessed to.5. validated user is if it find that the unauthorized user equipment belongs to reliable use
The mark of the unauthorized user equipment, can also be added in authorisation device list by family equipment.
The embodiment of the present invention additionally provides another anti-loiter network based reminding method, refers to Fig. 2, and this method may include following step
Rapid S201- steps S209.
Whether S201, when detecting primary user device and accessing to target radio network, judge the target radio network
For doubtful family wireless network.
Whether step S201 is the target radio network for using confidence level tentatively to judge that primary user device is currently accessed for family
The process of front yard wireless network.In the specific implementation, step S201 may include following steps s11-s12.
S11, when detecting primary user device and accessing to target radio network, inquires about the confidence of the target radio network
Degree.
S12, if the confidence level is higher than pre-set threshold value, judges the target radio network as doubtful family wireless network.
Confidence level is at least one user equipment for accessing to the target radio network according to history by cloud server
The access information reported carries out statistical analysis and obtained;Wherein, the access information includes following any:Turn-on time, access
Frequency, access place.In the present embodiment, each user equipment can be reported to cloud server after wireless network is accessed to and connect
Enter information, or, each user equipment can also periodically be reported to cloud server using certain frequency and itself accessed
The related access information of all wireless networks.Cloud server carries out statistical analysis, row according to the access information largely reported
Except some public wireless networks, for example:Exclusion is such as designated the wifi network of " Startbuck ", is designated the wifi of " caffee "
Network etc. substantially public identifier wireless network, then using access information as consider factorial analysis it is remaining may belong to family without
The confidence level of each wireless network of gauze network, for example:For a certain wifi network, analysis finds certain user equipment at continuous one section
Time at night 9:00-12:00 period accessed the wifi network, then the wifi network belongs to the confidence level of family's wifi network
It is high.Finally store the mark and corresponding confidence level of each wireless network.It should be noted that the higher table of the confidence level of wireless network
The bright wireless network is that the possibility of family wireless network is bigger, conversely, the confidence level of wireless network is lower to show the wireless network
Network is that the possibility of family wireless network is lower.
Step s11-s12 can include following several implementations, (1) when detect primary user device access to target without
During gauze network, the mark of target radio network can be sent to cloud server and carry out confidence level inquiry, and receive high in the clouds clothes
The confidence level for the target radio network that business device is returned carries out the judgement of doubtful family wireless network.This implementation by means of
The powerful analysis ability of cloud server obtains confidence level, and primary user device side processing load is smaller;But by the upper of access information
Give the correct time and prolong and the influence of network delay is larger.(2) confidence level and the storage of each wireless network are pulled from cloud server in advance
In primary user device local storage space, then, can be direct when detecting primary user device and accessing to target radio network
The confidence level that the target radio network is inquired about from the local storage space of primary user device carries out doubtful family wireless network
Judge.This implementation search efficiency is higher, if but the renewal easy influence Query Result not prompt enough of locally stored content
Accuracy.(3) logical wrapper that cloud server analyzes confidence statistics is that analysis model is issued to primary user device execution,
And the access information of each user equipment to report is transferred to primary user device as parameter, accessed to when detecting primary user device
During target radio network, gone forward side by side by primary user device in the confidence level locally with analysis model statistical analysis target radio network
The judgement of the doubtful family wireless network of row.This implementation carries out Confidence Analysis by the local side of primary user device to be connect
Enter the reporting time delay of information influence and network delay influence it is smaller, but need to carry out extra exploitation in primary user device side
Work, cost is higher.Implementation shown in above-mentioned (1)-(3) respectively has advantage and disadvantage, can flexibly select in a particular application.
S202, if the target radio network is doubtful family wireless network, output confirms prompt message, and the confirmation is carried
Show information be used for point out perform and confirm whether the target radio network is that the confirmation of main subscriber household wireless network is operated.
S203, if receiving confirmation operation, primary user's family wireless network is labeled as by the target radio network.
Step S202-S203 is to use the means for carrying out secondary-confirmation by validated user finally to mark primary user's family wireless
Network.After the preliminary judgement of doubtful home network through step S201, primary user device side is guided by modes such as UI bullet frames
Validated user mark primary user's family wireless network.Herein, UI design can include but is not limited to following several scenes:
Scape one (refers to Fig. 3 a):If primary user device history of existence accesses the record of target radio network, then can be by the mesh
Wireless network, which is marked, as only option is supplied to validated user to be confirmed whether it is family wireless network.Scene two (refers to figure
3b):If primary user device be not present history access target radio network record, then can by the target radio network with
Other wireless networks that primary user device history was accessed alternatively are supplied to validated user selection to confirm family wireless in the lump
Network.Scene three (refers to Fig. 3 c):If primary user device currently disconnects the connection with target radio network, then prompting is closed
Method user first sets up network connection and selects to confirm the family wireless network of itself again.
S204, is the associated authorisation device list of primary user's family wireless network configuration.
Authorisation device list can be pre-configured with by the validated user of primary user's family wireless network, specific configuration
Process may include in two kinds of feasible embodiments, one of which embodiment that step S204 specifically includes following steps s21-
s22:
S21, searches history and accesses to all user equipmenies of primary user's family wireless network, and export and found
All user equipmenies mark it is for selection.
S22, is to allow the mandate for accessing to primary user's family wireless network to use by selected user device configuration
Family equipment, and generate the authorisation device list associated with primary user's family wireless network.
Above-mentioned embodiment can be applied to the scene of history of existence access record, for example:Pass through before validated user
The user equipmenies such as oneself PDA, notebook computer, mobile phone are accessed in primary user's family wireless network, then these, which exist, goes through
The mark of each user equipment of history access record has been buffered, and can access the history of existence cached in step s11-s12
The mark of each user equipment of record is supplied to validated user to select, and is authorized user device by selected user device configuration
And be added in authorisation device list.
In another embodiment, step S204 specifically includes following steps s31-s32:
S31, exports configuration prompt information, and the configuration prompt information accesses to the primary user for pointing out input to allow
The mark of the authorized user device of family wireless network.
S32, is generated associated with primary user's family wireless network according to the mark of the authorized user device inputted
Authorisation device list.
Above-mentioned embodiment can be applied to that the scene that history accesses record is not present, for example:Validated user can be inputted certainly
The mark of the user equipmenies such as PDA, notebook computer, mobile phone that oneself uses, or input the kinsfolk user of oneself and made
The mark of the user equipmenies such as PDA, notebook computer, smart mobile phone, then by the mark of the user equipment inputted
It is each configured to the mark of authorized user device and is added in authorisation device list.
S205, if detecting primary user device accesses to primary user's family wireless network, to primary user's family wireless
The gateway device of network, which is sent, obtains instruction.
S206, receives the connection list of devices for primary user's family wireless network that the gateway device is returned.
In step S205-S206, it can be Ping instructions to obtain instruction, and sending ping instructions to gateway device can then control
Gateway device processed is returned to contain in the connection list of devices of primary user's family wireless network, the connection list of devices and is currently accessed
To the mark of all connection equipment of primary user's family wireless network.
S207, obtains the authorisation device list associated with primary user's family wireless network, the authorisation device row
The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in table.
S208, the connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non-
Authorized user device accesses to primary user's family wireless network.
S209, if in the presence of the anti-loiter network reminder message of output.
Step S207-S209 may refer to the step S102-S104 of embodiment illustrated in fig. 1, will not be described here.
Below in conjunction with an instantiation, the flow to the anti-loiter network based reminding method of the embodiment of the present invention is situated between in detail
Continue.
Assuming that primary user device is user A mobile phone a, when user A is connected to wifi-a by mobile phone a, mobile phone a is from high in the clouds
Server lookup wifi-a confidence level is to judge whether wifi-a is doubtful family's wifi network, if it is in mobile phone a
UI bullets frame guiding user A confirm wifi-a whether the family's wifi network for being user A, being operated according to user A secondary-confirmation will
Wifi-a is labeled as primary user family wifi network.Afterwards, the authorisation device list that user A is configured is received, it is assumed that mandate is set
Mark comprising mobile phone b and mobile phone c mark in standby list.
Mobile phone a obtains connection list of devices by way of ping to the wireless router of primary user family wifi network,
Assuming that including notebook computer d and mark and mobile phone c mark in the connection list of devices.Mobile phone a will connect list of devices with
Authorisation device list is compared, it is found that notebook computer d belongs to unauthorized user equipment, therefore the anti-loiter network of output is reminded and disappeared
Breath;Hereafter, user A can be logged on in wireless router to operate and moves notebook computer d after wireless router is adapted to successfully
Go out in primary user family wifi network.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user
Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and
When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time
With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Based on the embodiment of above-mentioned anti-loiter network based reminding method, dress is reminded the embodiment of the invention also discloses a kind of anti-loiter network
Put, the anti-loiter network alarm set can be a computer program (including program code), and the computer program can be run
Carried in the user equipmenies such as notebook computer, PDA, mobile phone for performing the anti-loiter network shown in Fig. 1-2 any embodiments
Awake method.Fig. 4 is referred to, anti-loiter network the alarm set operation such as lower unit:
First acquisition unit 101, if accessing to primary user's family wireless network for detecting primary user device, obtains institute
The connection list of devices of primary user's family wireless network is stated, the connection list of devices is currently accessed to described comprising at least one
The mark of the user equipment of primary user's family wireless network.
If in the specific implementation, the first acquisition unit 101 accesses to primary user specifically for detecting primary user device
Family wireless network, sends to the gateway device of primary user's family wireless network and obtains instruction, receive the gateway device
The connection list of devices of the primary user's family wireless network returned.
Second acquisition unit 102, for obtaining the authorisation device list associated with primary user's family wireless network,
The authorized user device that at least one allows to access to primary user's family wireless network is included in the authorisation device list
Mark.
Comparing unit 103, is worked as the connection list of devices to be compared with the authorisation device list with confirmation
It is preceding to access to primary user's family wireless network with the presence or absence of unauthorized user equipment.
Reminding unit 104, if in the presence of the anti-loiter network reminder message of output.
Alternatively, anti-loiter network alarm set is also run such as lower unit:
Doubtful judging unit 105, for when detecting primary user device and accessing to target radio network, judging the mesh
Mark whether wireless network is doubtful family wireless network.
In the specific implementation, the doubtful judging unit 105 specifically for when detect primary user device access to target without
During gauze network, inquire about the confidence level of the target radio network, if the confidence level is higher than pre-set threshold value, judge the target without
Gauze network is doubtful family wireless network.Wherein, the confidence level is according to history to access to the target by cloud server
The access information of at least one user equipment to report of wireless network carries out statistical analysis and obtained;Wherein, the access information bag
Include following any:Turn-on time, access frequency, access place.
Confirm Tip element 106, if being doubtful family wireless network for the target radio network, output confirms prompting
Information, the confirmation prompt message is used to point out to perform to confirm whether the target radio network is main subscriber household wireless network
Confirmation operation.
Indexing unit 107, if for receive confirm operation, by the target radio network labeled as primary user family without
Gauze network.
Dispensing unit 108, for configuring associated authorisation device list for primary user's family wireless network.
In the specific implementation, the dispensing unit 108 accesses to primary user's home wireless specifically for searching history
All user equipmenies of network, and it is for selection to export the mark of all user equipmenies found, and selected user is set
The standby authorized user device for being configured to allow to access to primary user's family wireless network, and generate and the primary user family
The associated authorisation device list of wireless network;Or, the dispensing unit 108 is specifically for output configuration prompt information, institute
State configuration prompt information be used for point out input allow to access to primary user's family wireless network authorized user device mark
Know, according to the mark generation of the authorized user device inputted the authorisation device associated with primary user's family wireless network
List.
According to one embodiment of present invention, the step S101-S104 that the anti-loiter network based reminding method shown in Fig. 1 is related to can be with
It is the unit in anti-loiter network alarm set as shown in Figure 4 to perform.For example, the step S101-S104 shown in Fig. 1
Can be respectively by the first acquisition unit 101 shown in Fig. 4, second acquisition unit 102, comparing unit 103 and reminding unit 104
To perform.
According to another embodiment of the invention, the step S201-S209 that the anti-loiter network based reminding method shown in Fig. 2 is related to can
Performed with being the unit in anti-loiter network alarm set as shown in Figure 4.For example, step S201 shown in Fig. 2,
S202, S203, S204, S205-S206, S207, S208, S209 can respectively by the doubtful judging unit 105 shown in Fig. 4,
Confirm Tip element 106, indexing unit 107, dispensing unit 108, first acquisition unit 101, second acquisition unit 102, comparison
Unit 103 and reminding unit 104 are performed.
According to another embodiment of the invention, the unit in the anti-loiter network alarm set shown in Fig. 4 can be distinguished
Or all merge into one or several other units to constitute, or some (a little) unit therein can also be split as again
Functionally smaller multiple units are constituted, and this can realize same operation, the technology without influenceing embodiments of the invention
The realization of effect.Said units are that logic-based function is divided, and in actual applications, the function of a unit can also be by more
Individual unit is realized, or the function of multiple units realized by a unit.In other embodiments of the invention, anti-loiter network is carried
Awake device can also include other units, in actual applications, and these functions can also be assisted to realize by other units, and can
Realized with being cooperated by multiple units.
According to another embodiment of the invention, can be by including CPU (CPU), random access memory
Transported on the universal computing device of such as computer of the treatment elements such as medium (RAM), read-only storage medium (ROM) and memory element
Row is able to carry out computer program (including the program generation for each step that the anti-loiter network based reminding method as shown in Fig. 1-Fig. 2 is related to
Code), to construct anti-loiter network alarm set equipment as shown in Figure 4, and to realize that the anti-loiter network of the embodiment of the present invention is reminded
Method.The computer program can be recorded on such as computer readable recording medium storing program for performing, and is situated between by computer-readable record
Matter is loaded into above-mentioned computing device, and run wherein.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user
Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and
When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time
With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Based on the anti-loiter network based reminding method and anti-loiter network alarm set shown in above-described embodiment, the embodiment of the present invention is also provided
A kind of user equipment, the user equipment can be the primary user device in anti-loiter network based reminding method and device illustrated embodiment,
Available for the corresponding steps for performing method flow shown in above-mentioned Fig. 1-Fig. 2.In the specific implementation, the use described in the embodiment of the present invention
Mobile electricity of the family equipment including but not limited to such as with touch sensitive surface (for example, touch-screen display and/or touch pad)
Other portable sets of words, laptop computer or tablet PC etc.Fig. 5 is referred to, the internal junction of the user equipment
Structure may include processor, user interface, Wireless Internet access module and computer-readable storage medium.Processor wherein, in user equipment,
User interface, Wireless Internet access module and computer-readable storage medium can be connected by bus or other modes, in the embodiment of the present invention
In shown Fig. 5 exemplified by being connected by bus.
Wherein, Wireless Internet access module is the module for making user equipment possess wireless networking capabilities, can at least include being used for
The wireless signal transceiver of the wireless signal of wifi signals etc. is searched for, and for according to the wireless signal access searched
Network interface into wireless network.User interface is to realize that user interacts the medium exchanged with information with user equipment,
It, which is embodied, can include the display screen (Display) for exporting and keyboard (Keyboard) for input etc.,
It should be noted that keyboard herein both can be physical keyboard, or touch screen dummy keyboard, for entity and it can also touch
Shield the keyboard that virtualphase is combined.It is to be understood, however, that user interface can also include such as mouse and/or control-rod
One or more of the other physical user-interface device.Processor (or CPU (Central Processing Unit, centre
Reason device)) be user equipment calculating core and control core, its be adapted for carrying out one or one or more instruction, be particularly adapted to
Load and perform one or one or more instruction so as to realizing correlation method flow or corresponding function;For example:CPU can be used for solution
The switching on and shutting down instruction transmitted by user to user equipment is analysed, and controls user equipment to carry out switching on and shutting down operation;For another example:CPU can be with
All kinds of interaction datas, etc. are transmitted between user equipment internal structure.Computer-readable storage medium (Memory) is user equipment
In memory device, for depositing program and data.It is understood that computer-readable storage medium herein can both include using
The built-in storage medium of family equipment, naturally it is also possible to the expansion storage medium supported including user equipment.Computer storage is situated between
Matter provides memory space, and the memory space stores the operating system of user equipment.Also, also housed in the memory space
Suitable for by one or more than one instructions that processor is loaded and is performed, these instructions can be one or more meter
Calculation machine program (including program code).It should be noted that computer-readable storage medium herein can be high-speed RAM memory,
Can also be non-labile memory (non-volatile memory), for example, at least one magnetic disk storage;It is optional to go back
It can be the computer-readable storage medium that at least one is located remotely from aforementioned processor.
Special instruction is also needed to, user equipment supports various application programs, such as one or more of following:Paint
Figure application program, demonstration applications, word-processing application, website create application program, disk imprinting application program, electronics
Form application program, game application, telephony application, videoconference application, email application, immediately
Application program, photo management application program, digital camera application program, digital photography are supported in messaging applications, exercise
Machine application program, web-browsing application program, digital music player application and/or video frequency player application program.
The various application programs that can be performed on a user device can use at least one public physics of such as touch sensitive surface
User interface facilities.It can be adjusted among applications and/or in corresponding application programs and/or change touch sensitive surface
The corresponding information shown in one or more functions and user equipment.So, user equipment public physical structure (for example,
Touch sensitive surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
In embodiments of the present invention, processor loads and performed one or one or more deposited in computer-readable storage medium
Instruction, to realize the corresponding steps of method flow shown in above-mentioned Fig. 1-Fig. 2;In the specific implementation, one in computer-readable storage medium
Bar or one or more instruction are loaded by processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained
The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one
User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list
The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is
Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
In the specific implementation, before described one or one or more instruction are loaded by processor and performed step A, also performing such as
Lower step:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful
Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting
Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
In the specific implementation, described one or one or more instruction are by during processor loads and performs step E, specifically
Perform following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network
Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
In the specific implementation, the confidence level is according to history to access to the target radio network extremely by cloud server
The access information of a few user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:
Turn-on time, access frequency, access place.
In the specific implementation, in one embodiment, described one or one or more instruction are loaded and performed by processor
During step H, following steps are specifically performed:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found
All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration
Equipment, and generate the authorisation device list associated with primary user's family wireless network.
In the specific implementation, in another embodiment, described one or one or more instruction are loaded and held by processor
During row step H, following steps are specifically performed:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow
The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network
Authorisation device list.
In the specific implementation, described one or one or more instruction are by during processor loads and performs step A, specifically
Perform following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless
The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user
Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and
When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time
With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" be indicated
Described feature, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, it is whole
Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment
And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is
Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or
If " detected【Described condition or event】" can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detect【Described condition or event】" or " in response to detecting【Described condition or event】”.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described
Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not
Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office
Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area
Art personnel can be tied the not be the same as Example or the feature of example and non-be the same as Example or example described in this specification
Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying relative importance
Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or
Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three
It is individual etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include
Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process
Point, and the scope of embodiments of the present invention includes other realization, wherein can not be by order that is shown or discussing, bag
Include according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the reality of the present invention
A person of ordinary skill in the field is applied to be understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned
In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage
Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware
Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal
Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..In addition, each functional unit in each embodiment of the invention can be integrated in a processing
In module or unit is individually physically present, can also two or more units be integrated in a module.
Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.It is described
If integrated module is realized using in the form of software function module and as independent production marketing or in use, can also stored
In a computer read/write memory medium.
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly
Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.
Claims (12)
1. a kind of anti-loiter network based reminding method, it is characterised in that including:
If detecting primary user device accesses to primary user's family wireless network, the company of primary user's family wireless network is obtained
List of devices is connect, the connection list of devices is currently accessed to the user of primary user's family wireless network comprising at least one
The mark of equipment;
The authorisation device list associated with primary user's family wireless network is obtained, comprising extremely in the authorisation device list
Lack a mark for allowing to access to the authorized user device of primary user's family wireless network;
The connection list of devices is compared to confirm currently to whether there is unauthorized user with the authorisation device list
Equipment accesses to primary user's family wireless network;
If in the presence of the anti-loiter network reminder message of output.
2. anti-loiter network based reminding method as claimed in claim 1, it is characterised in that if the primary user device that detects is accessed to
Before primary user's family wireless network, the connection list of devices for obtaining primary user's family wireless network, in addition to:
Whether when detecting primary user device and accessing to target radio network, it is doubtful family to judge the target radio network
Wireless network;
If the target radio network is doubtful family wireless network, output confirms prompt message, and the confirmation prompt message is used
In prompting perform confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;
Associated authorisation device list is configured for primary user's family wireless network.
3. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described to access to when detecting primary user device
Whether during target radio network, it is doubtful family wireless network to judge the target radio network, including:
When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about;
If the confidence level is higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
4. anti-loiter network based reminding method as claimed in claim 3, it is characterised in that the confidence level be by cloud server according to
The access information progress statistical analysis that history accesses at least one user equipment to report of the target radio network is obtained;Its
In, the access information includes following any:Turn-on time, access frequency, access place.
5. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described is primary user's family wireless network
The associated authorisation device list of configuration, including:
All user equipmenies that history accesses to primary user's family wireless network are searched, and it is useful to export found institute
The mark of family equipment is for selection;
It is the authorized user device for allowing to access to primary user's family wireless network by selected user device configuration, and
The generation authorisation device list associated with primary user's family wireless network.
6. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described is primary user's family wireless network
The associated authorisation device list of configuration, including:
Configuration prompt information is exported, the configuration prompt information accesses to primary user's family wireless for pointing out input to allow
The mark of the authorized user device of network;
Set according to the mandate that the mark generation of the authorized user device inputted is associated with primary user's family wireless network
Standby list.
7. the anti-loiter network based reminding method as described in claim any one of 1-6, it is characterised in that detect primary user if described and set
It is standby to access to primary user's family wireless network, the connection list of devices of primary user's family wireless network is obtained, including:
If detecting primary user device accesses to primary user's family wireless network, to the gateway of primary user's family wireless network
Equipment, which is sent, obtains instruction;
Receive the connection list of devices for primary user's family wireless network that the gateway device is returned.
8. a kind of anti-loiter network alarm set, it is characterised in that including:
First acquisition unit, if accessing to primary user's family wireless network for detecting primary user device, is obtained described primary
The connection list of devices of family family wireless network, the connection list of devices is currently accessed to the primary user comprising at least one
The mark of the user equipment of family wireless network;
Second acquisition unit, it is described to award for obtaining the authorisation device list associated with primary user's family wireless network
The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in power list of devices;
Comparing unit, for the connection list of devices to be compared with the authorisation device list to confirm currently whether deposit
Primary user's family wireless network is accessed in unauthorized user equipment;
Reminding unit, if in the presence of the anti-loiter network reminder message of output.
9. anti-loiter network alarm set as claimed in claim 8, it is characterised in that also include:
Doubtful judging unit, for when detecting primary user device and accessing to target radio network, judging the Target Wireless
Whether network is doubtful family wireless network;
Confirm Tip element, if being doubtful family wireless network for the target radio network, output confirms prompt message, institute
State confirm prompt message be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation
Operation;
Indexing unit, if confirming operation for receiving, primary user's family wireless network is labeled as by the target radio network;
Dispensing unit, for configuring associated authorisation device list for primary user's family wireless network.
10. anti-loiter network alarm set as claimed in claim 9, it is characterised in that the doubtful judging unit is specifically for working as
When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about, if the confidence
Degree is higher than pre-set threshold value, judges the target radio network as doubtful family wireless network;Wherein, the confidence level is by high in the clouds
The access information that server accesses at least one user equipment to report of the target radio network according to history is counted
Analysis is obtained;Wherein, the access information includes following any:Turn-on time, access frequency, access place;
The dispensing unit accesses to all user equipmenies of primary user's family wireless network specifically for searching history, and
The mark of all user equipmenies found is exported for selection, by selected user device configuration to allow to access to institute
The authorized user device of primary user's family wireless network is stated, and generates the mandate associated with primary user's family wireless network
List of devices;Or, the dispensing unit is specifically for output configuration prompt information, and the configuration prompt information is defeated for pointing out
Enter the mark for the authorized user device for allowing to access to primary user's family wireless network, set according to the authorized user inputted
The standby mark generation authorisation device list associated with primary user's family wireless network;
If the first acquisition unit accesses to primary user's family wireless network specifically for detecting primary user device, to described
The gateway device of primary user's family wireless network, which is sent, obtains instruction, receives the primary user family that the gateway device is returned
The connection list of devices of wireless network.
11. a kind of computer-readable storage medium, it is characterised in that the computer-readable storage medium be stored with one or one or more refer to
Order, what described one or one or more instruction were suitable to be loaded as processor and perform as described in claim any one of 1-7 anti-rubs
Net based reminding method.
12. a kind of user equipment, it is characterised in that including:
Wireless Internet access module, wireless network is accessed to for searching for wireless signal, and by the wireless signal searched;
Processor, is adapted for carrying out one or one or more instruction;And,
Computer-readable storage medium, the computer-readable storage medium be stored with one or one or more instruction, described one or one
Instruction is suitable to be loaded as the processor and perform the anti-loiter network based reminding method as described in claim any one of 1-7 above.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710526338.4A CN107148022B (en) | 2017-06-30 | 2017-06-30 | A kind of anti-loiter network based reminding method and relevant device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710526338.4A CN107148022B (en) | 2017-06-30 | 2017-06-30 | A kind of anti-loiter network based reminding method and relevant device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107148022A true CN107148022A (en) | 2017-09-08 |
CN107148022B CN107148022B (en) | 2019-01-15 |
Family
ID=59785412
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710526338.4A Active CN107148022B (en) | 2017-06-30 | 2017-06-30 | A kind of anti-loiter network based reminding method and relevant device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107148022B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108810892A (en) * | 2018-05-18 | 2018-11-13 | 四川斐讯信息技术有限公司 | A kind of wireless network management method, smart machine and router |
CN109788481A (en) * | 2019-01-25 | 2019-05-21 | 刘美连 | A kind of method and device for preventing from illegally accessing monitoring |
CN110401959A (en) * | 2018-04-24 | 2019-11-01 | 中国移动通信集团广东有限公司 | Detect method, apparatus, electronic equipment and the storage medium of loiter network terminal |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102149092A (en) * | 2011-01-28 | 2011-08-10 | 中国联合网络通信集团有限公司 | Method and device for processing user illegal access |
US20130058274A1 (en) * | 2005-06-03 | 2013-03-07 | Wefi Inc. | Method and system for accessing wireless networks |
CN103475996A (en) * | 2013-08-19 | 2013-12-25 | 小米科技有限责任公司 | Network connecting method, network sharing method and devices |
CN105227561A (en) * | 2015-10-14 | 2016-01-06 | 上海斐讯数据通信技术有限公司 | A kind of network access authentication is anti-rubs network method and device |
CN105516074A (en) * | 2014-10-20 | 2016-04-20 | 中兴通讯股份有限公司 | Method and terminal for detecting wireless network access security |
CN105657712A (en) * | 2016-01-06 | 2016-06-08 | 广东欧珀移动通信有限公司 | Access control method and device of WiFi hotspot |
CN105916151A (en) * | 2016-06-06 | 2016-08-31 | 惠州Tcl移动通信有限公司 | Intelligent equipment wireless network access method and system thereof |
-
2017
- 2017-06-30 CN CN201710526338.4A patent/CN107148022B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130058274A1 (en) * | 2005-06-03 | 2013-03-07 | Wefi Inc. | Method and system for accessing wireless networks |
CN102149092A (en) * | 2011-01-28 | 2011-08-10 | 中国联合网络通信集团有限公司 | Method and device for processing user illegal access |
CN103475996A (en) * | 2013-08-19 | 2013-12-25 | 小米科技有限责任公司 | Network connecting method, network sharing method and devices |
CN105516074A (en) * | 2014-10-20 | 2016-04-20 | 中兴通讯股份有限公司 | Method and terminal for detecting wireless network access security |
CN105227561A (en) * | 2015-10-14 | 2016-01-06 | 上海斐讯数据通信技术有限公司 | A kind of network access authentication is anti-rubs network method and device |
CN105657712A (en) * | 2016-01-06 | 2016-06-08 | 广东欧珀移动通信有限公司 | Access control method and device of WiFi hotspot |
CN105916151A (en) * | 2016-06-06 | 2016-08-31 | 惠州Tcl移动通信有限公司 | Intelligent equipment wireless network access method and system thereof |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401959A (en) * | 2018-04-24 | 2019-11-01 | 中国移动通信集团广东有限公司 | Detect method, apparatus, electronic equipment and the storage medium of loiter network terminal |
CN108810892A (en) * | 2018-05-18 | 2018-11-13 | 四川斐讯信息技术有限公司 | A kind of wireless network management method, smart machine and router |
CN109788481A (en) * | 2019-01-25 | 2019-05-21 | 刘美连 | A kind of method and device for preventing from illegally accessing monitoring |
CN109788481B (en) * | 2019-01-25 | 2021-12-28 | 中科大路(青岛)科技有限公司 | Method and device for preventing illegal access monitoring |
CN116113012A (en) * | 2023-04-14 | 2023-05-12 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
CN116113012B (en) * | 2023-04-14 | 2023-07-21 | 微网优联科技(成都)有限公司 | Access control method, device and system of wireless router and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN107148022B (en) | 2019-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106325108B (en) | Management method of clothes management system | |
CN104182488B (en) | Searching method, server and client | |
CN107148022A (en) | A kind of anti-loiter network based reminding method and relevant device | |
CN101083537B (en) | Method, apparatus and system for realizing device management | |
CN108027946A (en) | The method and apparatus for the tactical management that promotion end user defines | |
CN107678776A (en) | Multimode version dependence construction method, device, server and storage medium | |
CN107533747A (en) | For notice to be sent to the technology of subscriber | |
CN104901991B (en) | Virtual resource transfer method, device and system | |
CN103152462B (en) | A kind of address list sharing method and device | |
CN104967758B (en) | A kind of method and user terminal for controlling data transfer | |
CN102281309B (en) | The dissemination method of the network information and the delivery system of the network information and client | |
CN101938364A (en) | Method, device and system for releasing original content of user to telecommunication system | |
CN109936621A (en) | Multi-page information push method, device, equipment and the storage medium of information security | |
CN101697620A (en) | Method and system for determining spam messages | |
CN105912358A (en) | Intelligent electronic device and setting method thereof | |
CN106056001A (en) | Private data protection method and apparatus based on mobile terminal and mobile terminal | |
CN109246741A (en) | Wireless network connecting method for terminal | |
CN109032815A (en) | Information interacting method, device, equipment and storage medium between functional module | |
CN108550213A (en) | A kind of intelligent entrance guard control method and system based on mobile terminal | |
CN106411920A (en) | Data sharing method and device | |
CN107396364A (en) | A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization | |
CN107729765A (en) | Management method, device, storage medium and the electronic equipment of multi-medium data | |
CN106648334A (en) | Account transfer method and device | |
CN111190950B (en) | Asset retrieval method and device | |
CN105847446A (en) | Network data obtaining method, device and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |