CN107148022A - A kind of anti-loiter network based reminding method and relevant device - Google Patents

A kind of anti-loiter network based reminding method and relevant device Download PDF

Info

Publication number
CN107148022A
CN107148022A CN201710526338.4A CN201710526338A CN107148022A CN 107148022 A CN107148022 A CN 107148022A CN 201710526338 A CN201710526338 A CN 201710526338A CN 107148022 A CN107148022 A CN 107148022A
Authority
CN
China
Prior art keywords
wireless network
primary user
network
family wireless
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710526338.4A
Other languages
Chinese (zh)
Other versions
CN107148022B (en
Inventor
吴亦舜
林如蓝
邹翼夙
钟俊葳
许汉杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201710526338.4A priority Critical patent/CN107148022B/en
Publication of CN107148022A publication Critical patent/CN107148022A/en
Application granted granted Critical
Publication of CN107148022B publication Critical patent/CN107148022B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud

Abstract

The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, can be in the case of without the adaptation of gateway device and login, " loiter network " is carried out if there is unauthorized user equipment and access to family wireless network, then the unauthorized user equipment to " loiter network " carries out automatic identification, and send anti-loiter network prompting to the validated user of family wireless network in time, so that validated user knows the service condition of family wireless network in time, validated user is facilitated to carry out respective handling to unauthorized user equipment.

Description

A kind of anti-loiter network based reminding method and relevant device
Technical field
The present invention relates to Internet technical field, and in particular to a kind of anti-loiter network based reminding method, a kind of anti-loiter network remind dress Put, a kind of computer-readable storage medium and a kind of user equipment.
Background technology
With the popularization of the related software of shared wireless network, increasing family wireless network is caused by " loiter network " The validated user of the family wireless network network speed of itself is affected.In order to eliminate family wireless network by the peace of " loiter network " Full hidden danger, the solution of " anti-loiter network " is arisen at the historic moment." anti-loiter network " refers to prevent other using some technological means to reach User uses the purpose of family wireless network.At present, most " anti-loiter network " scheme be by controlling gateway device to realize, Its core is the difference in operation for being adapted to the compatible gateway device (such as wireless router) of various brands model on the market, is successfully fitting After gateway device, logged on to by validated user in gateway device and operated the access for such as refusing unauthorized user equipment Request, so as to reach " anti-loiter network " purpose.Due to existing " anti-loiter network " scheme realize premise be gateway device adaptation and Log in, once the gateway device of validated user successful adaptation or can not can not be logged in normally, validated user can not then know itself Family wireless network also just can not make respective handling, shadow to the user equipment of " loiter network " in time certainly by the situation of " loiter network " The normal of family wireless network has been rung to use.
The content of the invention
The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, can be without the suitable of gateway device " loiter network " identification is carried out in the case of matching somebody with somebody and logging in, and exports anti-loiter network in time reminding.
On the one hand, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, it may include:
If detecting primary user device accesses to primary user's family wireless network, primary user's family wireless network is obtained Connection list of devices, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one The mark of user equipment;
The authorisation device list associated with primary user's family wireless network is obtained, is wrapped in the authorisation device list The mark for allowing to access to the authorized user device of primary user's family wireless network containing at least one;
The connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of unauthorized User equipment accesses to primary user's family wireless network;
If in the presence of the anti-loiter network reminder message of output.
Preferably, if the primary user device that detects accesses to primary user's family wireless network, the primary user is obtained Before the connection list of devices of family wireless network, in addition to:
Whether when detecting primary user device and accessing to target radio network, it is doubtful to judge the target radio network Family wireless network;
If the target radio network is doubtful family wireless network, output confirms prompt message, the confirmation prompting letter Cease for point out to perform confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;
Associated authorisation device list is configured for primary user's family wireless network.
Preferably, it is described when detecting primary user device and accessing to target radio network, judge the Target Wireless net Whether network is doubtful family wireless network, including:
When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about;
If the confidence level is higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access Time, access frequency, access place.
Preferably, it is described to configure the authorisation device list being associated for primary user's family wireless network, including:
All user equipmenies that history accesses to primary user's family wireless network are searched, and export found institute There is the mark of user equipment for selection;
It is to allow the authorized user for accessing to primary user's family wireless network to set by selected user device configuration It is standby, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, it is described to configure the authorisation device list being associated for primary user's family wireless network, including:
Configuration prompt information is exported, the configuration prompt information accesses to the primary user family for pointing out input to allow The mark of the authorized user device of wireless network;
Awarded according to the mark generation of the authorized user device inputted is associated with primary user's family wireless network Weigh list of devices.
Preferably, if the primary user device that detects accesses to primary user's family wireless network, the primary user is obtained The connection list of devices of family wireless network, including:
If detecting primary user device accesses to primary user's family wireless network, to primary user's family wireless network Gateway device, which is sent, obtains instruction;
Receive the connection list of devices for primary user's family wireless network that the gateway device is returned.
On the other hand, the embodiment of the present invention provides a kind of anti-loiter network alarm set, it may include:
First acquisition unit, if accessing to primary user's family wireless network for detecting primary user device, obtains described The connection list of devices of primary user's family wireless network, the connection list of devices is currently accessed to the master comprising at least one The mark of the user equipment of subscriber household wireless network;
Second acquisition unit, for obtaining the authorisation device list associated with primary user's family wireless network, institute State and at least one authorized user device for allowing to access to primary user's family wireless network is included in authorisation device list Mark;
Comparing unit, be currently to confirm for the connection list of devices to be compared with the authorisation device list No have unauthorized user equipment and access to primary user's family wireless network;
Reminding unit, if in the presence of the anti-loiter network reminder message of output.
Preferably, the anti-loiter network alarm set also includes:
Doubtful judging unit, for when detecting primary user device and accessing to target radio network, judging the target Whether wireless network is doubtful family wireless network;
Confirm Tip element, if being doubtful family wireless network for the target radio network, output confirms prompting letter Breath, the confirmation prompt message is used to point out to perform to confirm whether the target radio network is main subscriber household wireless network Confirm operation;
Indexing unit, if confirming operation for receiving, primary user's family wireless is labeled as by the target radio network Network;
Dispensing unit, for configuring associated authorisation device list for primary user's family wireless network.
Preferably, the doubtful judging unit accesses to target radio network specifically for that ought detect primary user device When, the confidence level of the target radio network is inquired about, if the confidence level is higher than pre-set threshold value, the target radio network is judged For doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access Time, access frequency, access place.
Preferably, the dispensing unit accesses to all of primary user's family wireless network specifically for searching history User equipment, and it is for selection to export the mark of all user equipmenies found, is by selected user device configuration Allow the authorized user device for accessing to primary user's family wireless network, and generate and primary user's family wireless network Associated authorisation device list;Or,
The dispensing unit is specifically for output configuration prompt information, and the configuration prompt information is used to point out input to allow The mark of the authorized user device of primary user's family wireless network is accessed to, according to the mark of the authorized user device inputted Know the generation authorisation device list associated with primary user's family wireless network.
Preferably, if the first acquisition unit accesses to primary user's family wireless specifically for detecting primary user device Network, sends to the gateway device of primary user's family wireless network and obtains instruction, receives the institute that the gateway device is returned State the connection list of devices of primary user's family wireless network.
Another further aspect, the embodiment of the present invention also provides a kind of computer-readable storage medium, the computer-readable storage medium storage There are one or one or more instruction, described one or one or more instruction are suitable to be loaded by processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
Preferably, before described one or one or more instruction loads by processor and performed step A, also perform and walk as follows Suddenly:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
Preferably, described one or one or more instruction are by during processor load and performs step E, specific execution Following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access Time, access frequency, access place.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution Following steps:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration Equipment, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution Following steps:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network Authorisation device list.
Preferably, described one or one or more instruction are by during processor load and performs step A, specific execution Following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
Another further aspect, the embodiment of the present invention additionally provides a kind of user equipment, including:
Wireless Internet access module, wireless network is accessed to for searching for wireless signal, and by the wireless signal searched;
Processor, is adapted for carrying out one or one or more instruction;And,
Computer-readable storage medium, the computer-readable storage medium be stored with one or one or more instruction, described one or One or more instruction is suitable to be loaded by the processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
Preferably, before described one or one or more instruction loads by processor and performed step A, also perform and walk as follows Suddenly:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
Preferably, described one or one or more instruction are by during processor load and performs step E, specific execution Following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
Preferably, the confidence level is access to the target radio network according to history by cloud server at least one The access information of individual user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any:Access Time, access frequency, access place.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution Following steps:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration Equipment, and generate the authorisation device list associated with primary user's family wireless network.
Preferably, described one or one or more instruction are by during processor load and performs step H, specific execution Following steps:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network Authorisation device list.
Preferably, described one or one or more instruction are by during processor load and performs step A, specific execution Following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is a kind of flow chart of anti-loiter network based reminding method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of another anti-loiter network based reminding method provided in an embodiment of the present invention;
Fig. 3 a- Fig. 3 c are the schematic diagram that family wireless network provided in an embodiment of the present invention marks scene;
Fig. 4 is a kind of structural representation of anti-loiter network alarm set provided in an embodiment of the present invention;
Fig. 5 is a kind of structural representation of user equipment provided in an embodiment of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described.
With the fast development of mobile Internet, most of subscriber household is fitted with the nets such as wireless router, wireless modem Equipment is closed, is provided such as using these gateway devices by user equipmenies such as PDA (tablet personal computer), mobile phones when user stays at home The wireless signals such as wifi (wireless fidelity, Wireless Fidelity) signal are connected to internet;Herein, with subscriber household Gateway device is referred to as family wireless network for the wireless network of core.With the popularization of the related software of shared wireless network, more Carry out more family wireless networks by " loiter network ", cause the validated user of family wireless network (such as:Family wireless network it is all Person user or its kinsfolk user) network speed of itself is affected." loiter network " is family wireless network by as free Hotspot by neighbouring disabled user (such as:The owner user of non-family safe wireless network, nor its kinsfolk user) it is logical Cross the situation that the software of the shared wireless network such as master key is stealthily accessed and freely used.But family wireless network belongs to The private wireless networks of validated user, " loiter network " is not allowed in the case of without validated user mandate, and " is rubbed Net " user often takes the bandwidth of family wireless network, and the normal of validated user for having influence on family wireless network is used, and is Elimination family wireless network is arisen at the historic moment by the potential safety hazard of " loiter network ", the solution of " anti-loiter network "." anti-loiter network " refers to " blacklist " such as is set in gateway device using some technological means, or control gateway device hides the means such as wireless signal to reach To the purpose for preventing other users from using family wireless network.
At present, most " anti-loiter network " scheme is that, by controlling gateway device to realize, its core is to be adapted to compatibility The difference in operation of the gateway device (such as wireless router) of various brands model on the market, after successful adaptation gateway device, by Validated user, which is logged on in gateway device, carries out the configuration such as " blacklist " or " hiding wireless signal ", and gateway device detects non-award When power user equipment accesses to family wireless network, send " anti-loiter network " to validated user and remind, while can be according to configuration or root Refuse the access request of the unauthorized user equipment according to the operation of validated user, so as to reach " anti-loiter network " purpose.Due to existing " anti-loiter network " scheme realize that premise is adaptation and the login of gateway device, once the gateway device of validated user can not succeed Adaptation can not be logged in normally, and validated user can not then know the situation of itself family wireless network quilt " loiter network ", certainly also Respective handling can not be made to the user equipment of " loiter network " in time, have impact on the normal of family wireless network and use.
The method and relevant device reminded the invention provides a kind of anti-loiter network, can be in the adaptation without gateway device And in the case of logging in, " loiter network " is carried out if there is unauthorized user equipment and access to family wireless network, to " loiter network " Unauthorized user equipment carries out automatic identification, and sends anti-loiter network prompting to the validated user of family wireless network in time, so that Validated user knows the service condition of family wireless network in time, facilitates validated user to carry out corresponding position to unauthorized user equipment Reason.
Based on foregoing description, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, refers to Fig. 1, this method can be wrapped Include following steps S101- steps S104.
S101, if detecting primary user device accesses to primary user's family wireless network, obtain the primary user family without The connection list of devices of gauze network, the connection list of devices is currently accessed to primary user's family wireless comprising at least one The mark of the user equipment of network.
Primary user device refers to used in the validated user of family wireless network, for receiving the user that anti-loiter network is reminded Equipment.User equipment can include but is not limited to:The portable terminals such as notebook computer, PDA, smart mobile phone.Primary user Family wireless network refers to the family wireless network possessed using validated user, is also the family that primary user device is currently accessed Wireless network.It is described below with a specific implementation:Assuming that user A installs wireless router in own home, while using pen Remember that this computer, smart mobile phone are beneficial to wireless router access family wifi network;So, user A can set notebook computer For primary user device, it is primary user device that can also set smart mobile phone;User A is the validated user of family's wifi network, Now family's wifi network is referred to as primary user family wifi network.
Due to needing to access to primary user's family wireless network by gateway device, therefore, the connection of any one user equipment Gateway device is to access to during primary user's family wireless network, and gateway device can then add the mark of the user equipment of the access Into connection list of devices;Herein, the mark of user equipment can include but is not limited to IP (Internet Protocol, network Between the agreement that interconnects) address, MAC Address (Media Access Control Address, physical address), cell-phone number, Email (E-mail address) account etc.;For example:When user equipment M is connected with gateway device foundation and accesses to primary user family During wireless network, user equipment M mark is added in connection list of devices by gateway device;Similarly, when user equipment N and net When closing equipment foundation connection and accessing to primary user's family wireless network, user equipment N mark is added to by gateway device to be connected Connect in list of devices.It is understood that after user equipment M (or user equipment N) disconnects the connection with gateway device, gateway Equipment deletes user equipment M (or user equipment N) mark from connection list of devices.In step S101, primary user device connects Enter to primary user's family wireless network, connection list of devices, example can be obtained from the gateway device of primary user's home network Such as:Primary user device can be obtained from gateway device by the way of ping and connect list of devices.
S102, obtains the authorisation device list associated with primary user's family wireless network, the authorisation device row The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in table.
Authorisation device list can be pre-configured with by the validated user of primary user's family wireless network, for example:It is legal The user equipmenies such as PDA, notebook computer, the mobile phone that user can use oneself are each configured to authorized user device, The user equipment such as PDA, notebook computer, smart mobile phone used in the kinsfolk user of oneself can be each configured to Authorized user device.The mark of all authorized user devices is added into authorisation device list, and the authorisation device list can So that in primary user device local storage space, step S102 then can be from primary with primary user's family wireless network associated storage The authorisation device list is directly obtained in the equipment local storage space of family.It should be noted that authorisation device list with it is primary Family family wireless network is associated to refer to the uniquely one authorisation device list of correspondence of primary user's family wireless network.
S103, the connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non- Authorized user device accesses to primary user's family wireless network.
S104, if in the presence of the anti-loiter network reminder message of output.
In step S103-S104, the mark for connecting list of devices and each user equipment in authorisation device list is carried out Compare one by one, if it find that the mark of certain user equipment in connection list of devices is not in authorisation device list, show to work as Before access to primary user's family wireless network the user equipment be unauthorized user equipment, belong to the user equipment of " loiter network ", Anti- loiter network reminder message can be then exported to primary user device, the anti-loiter network reminder message is used to remind primary user device side Validated user pays close attention to situation of the family wireless network by " loiter network " of itself, it is possible to can influence the Web vector graphic of validated user.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.It should be strongly noted that processing herein can It is including but not limited to following several:If the 1. gateway device of primary user's family wireless network successful adaptation, validated user can Log on to gateway device and control gateway device to disconnect the connection with unauthorized user equipment, so that unauthorized user equipment be moved Go out primary user's family wireless network.If 2. the gateway device of primary user's family wireless network is not yet adapted to or is adapted to mistake Lose, validated user can send adaptation application to cloud server, after logging on to gateway device again after gateway device successful adaptation And control gateway device disconnect with the connection of unauthorized user equipment so that by unauthorized user equipment remove primary user family without Gauze network.3. validated user can also log on to gateway device, and the unauthorized user equipment recognized is added into " blacklist " In, then when the unauthorized user equipment is again coupled to gateway device, gateway device can directly refuse the unauthorized user equipment Connection request, refusal accessed to primary user's family wireless network.4. validated user can also log on to gateway device, open " hiding " function of gateway device, with cause unauthorized user equipment can not search gateway device offer wireless signal and then Primary user's family wireless network can not be accessed to.5. validated user is if it find that the unauthorized user equipment belongs to reliable use The mark of the unauthorized user equipment, can also be added in authorisation device list by family equipment.
The embodiment of the present invention additionally provides another anti-loiter network based reminding method, refers to Fig. 2, and this method may include following step Rapid S201- steps S209.
Whether S201, when detecting primary user device and accessing to target radio network, judge the target radio network For doubtful family wireless network.
Whether step S201 is the target radio network for using confidence level tentatively to judge that primary user device is currently accessed for family The process of front yard wireless network.In the specific implementation, step S201 may include following steps s11-s12.
S11, when detecting primary user device and accessing to target radio network, inquires about the confidence of the target radio network Degree.
S12, if the confidence level is higher than pre-set threshold value, judges the target radio network as doubtful family wireless network.
Confidence level is at least one user equipment for accessing to the target radio network according to history by cloud server The access information reported carries out statistical analysis and obtained;Wherein, the access information includes following any:Turn-on time, access Frequency, access place.In the present embodiment, each user equipment can be reported to cloud server after wireless network is accessed to and connect Enter information, or, each user equipment can also periodically be reported to cloud server using certain frequency and itself accessed The related access information of all wireless networks.Cloud server carries out statistical analysis, row according to the access information largely reported Except some public wireless networks, for example:Exclusion is such as designated the wifi network of " Startbuck ", is designated the wifi of " caffee " Network etc. substantially public identifier wireless network, then using access information as consider factorial analysis it is remaining may belong to family without The confidence level of each wireless network of gauze network, for example:For a certain wifi network, analysis finds certain user equipment at continuous one section Time at night 9:00-12:00 period accessed the wifi network, then the wifi network belongs to the confidence level of family's wifi network It is high.Finally store the mark and corresponding confidence level of each wireless network.It should be noted that the higher table of the confidence level of wireless network The bright wireless network is that the possibility of family wireless network is bigger, conversely, the confidence level of wireless network is lower to show the wireless network Network is that the possibility of family wireless network is lower.
Step s11-s12 can include following several implementations, (1) when detect primary user device access to target without During gauze network, the mark of target radio network can be sent to cloud server and carry out confidence level inquiry, and receive high in the clouds clothes The confidence level for the target radio network that business device is returned carries out the judgement of doubtful family wireless network.This implementation by means of The powerful analysis ability of cloud server obtains confidence level, and primary user device side processing load is smaller;But by the upper of access information Give the correct time and prolong and the influence of network delay is larger.(2) confidence level and the storage of each wireless network are pulled from cloud server in advance In primary user device local storage space, then, can be direct when detecting primary user device and accessing to target radio network The confidence level that the target radio network is inquired about from the local storage space of primary user device carries out doubtful family wireless network Judge.This implementation search efficiency is higher, if but the renewal easy influence Query Result not prompt enough of locally stored content Accuracy.(3) logical wrapper that cloud server analyzes confidence statistics is that analysis model is issued to primary user device execution, And the access information of each user equipment to report is transferred to primary user device as parameter, accessed to when detecting primary user device During target radio network, gone forward side by side by primary user device in the confidence level locally with analysis model statistical analysis target radio network The judgement of the doubtful family wireless network of row.This implementation carries out Confidence Analysis by the local side of primary user device to be connect Enter the reporting time delay of information influence and network delay influence it is smaller, but need to carry out extra exploitation in primary user device side Work, cost is higher.Implementation shown in above-mentioned (1)-(3) respectively has advantage and disadvantage, can flexibly select in a particular application.
S202, if the target radio network is doubtful family wireless network, output confirms prompt message, and the confirmation is carried Show information be used for point out perform and confirm whether the target radio network is that the confirmation of main subscriber household wireless network is operated.
S203, if receiving confirmation operation, primary user's family wireless network is labeled as by the target radio network.
Step S202-S203 is to use the means for carrying out secondary-confirmation by validated user finally to mark primary user's family wireless Network.After the preliminary judgement of doubtful home network through step S201, primary user device side is guided by modes such as UI bullet frames Validated user mark primary user's family wireless network.Herein, UI design can include but is not limited to following several scenes: Scape one (refers to Fig. 3 a):If primary user device history of existence accesses the record of target radio network, then can be by the mesh Wireless network, which is marked, as only option is supplied to validated user to be confirmed whether it is family wireless network.Scene two (refers to figure 3b):If primary user device be not present history access target radio network record, then can by the target radio network with Other wireless networks that primary user device history was accessed alternatively are supplied to validated user selection to confirm family wireless in the lump Network.Scene three (refers to Fig. 3 c):If primary user device currently disconnects the connection with target radio network, then prompting is closed Method user first sets up network connection and selects to confirm the family wireless network of itself again.
S204, is the associated authorisation device list of primary user's family wireless network configuration.
Authorisation device list can be pre-configured with by the validated user of primary user's family wireless network, specific configuration Process may include in two kinds of feasible embodiments, one of which embodiment that step S204 specifically includes following steps s21- s22:
S21, searches history and accesses to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection.
S22, is to allow the mandate for accessing to primary user's family wireless network to use by selected user device configuration Family equipment, and generate the authorisation device list associated with primary user's family wireless network.
Above-mentioned embodiment can be applied to the scene of history of existence access record, for example:Pass through before validated user The user equipmenies such as oneself PDA, notebook computer, mobile phone are accessed in primary user's family wireless network, then these, which exist, goes through The mark of each user equipment of history access record has been buffered, and can access the history of existence cached in step s11-s12 The mark of each user equipment of record is supplied to validated user to select, and is authorized user device by selected user device configuration And be added in authorisation device list.
In another embodiment, step S204 specifically includes following steps s31-s32:
S31, exports configuration prompt information, and the configuration prompt information accesses to the primary user for pointing out input to allow The mark of the authorized user device of family wireless network.
S32, is generated associated with primary user's family wireless network according to the mark of the authorized user device inputted Authorisation device list.
Above-mentioned embodiment can be applied to that the scene that history accesses record is not present, for example:Validated user can be inputted certainly The mark of the user equipmenies such as PDA, notebook computer, mobile phone that oneself uses, or input the kinsfolk user of oneself and made The mark of the user equipmenies such as PDA, notebook computer, smart mobile phone, then by the mark of the user equipment inputted It is each configured to the mark of authorized user device and is added in authorisation device list.
S205, if detecting primary user device accesses to primary user's family wireless network, to primary user's family wireless The gateway device of network, which is sent, obtains instruction.
S206, receives the connection list of devices for primary user's family wireless network that the gateway device is returned.
In step S205-S206, it can be Ping instructions to obtain instruction, and sending ping instructions to gateway device can then control Gateway device processed is returned to contain in the connection list of devices of primary user's family wireless network, the connection list of devices and is currently accessed To the mark of all connection equipment of primary user's family wireless network.
S207, obtains the authorisation device list associated with primary user's family wireless network, the authorisation device row The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in table.
S208, the connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non- Authorized user device accesses to primary user's family wireless network.
S209, if in the presence of the anti-loiter network reminder message of output.
Step S207-S209 may refer to the step S102-S104 of embodiment illustrated in fig. 1, will not be described here.
Below in conjunction with an instantiation, the flow to the anti-loiter network based reminding method of the embodiment of the present invention is situated between in detail Continue.
Assuming that primary user device is user A mobile phone a, when user A is connected to wifi-a by mobile phone a, mobile phone a is from high in the clouds Server lookup wifi-a confidence level is to judge whether wifi-a is doubtful family's wifi network, if it is in mobile phone a UI bullets frame guiding user A confirm wifi-a whether the family's wifi network for being user A, being operated according to user A secondary-confirmation will Wifi-a is labeled as primary user family wifi network.Afterwards, the authorisation device list that user A is configured is received, it is assumed that mandate is set Mark comprising mobile phone b and mobile phone c mark in standby list.
Mobile phone a obtains connection list of devices by way of ping to the wireless router of primary user family wifi network, Assuming that including notebook computer d and mark and mobile phone c mark in the connection list of devices.Mobile phone a will connect list of devices with Authorisation device list is compared, it is found that notebook computer d belongs to unauthorized user equipment, therefore the anti-loiter network of output is reminded and disappeared Breath;Hereafter, user A can be logged on in wireless router to operate and moves notebook computer d after wireless router is adapted to successfully Go out in primary user family wifi network.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Based on the embodiment of above-mentioned anti-loiter network based reminding method, dress is reminded the embodiment of the invention also discloses a kind of anti-loiter network Put, the anti-loiter network alarm set can be a computer program (including program code), and the computer program can be run Carried in the user equipmenies such as notebook computer, PDA, mobile phone for performing the anti-loiter network shown in Fig. 1-2 any embodiments Awake method.Fig. 4 is referred to, anti-loiter network the alarm set operation such as lower unit:
First acquisition unit 101, if accessing to primary user's family wireless network for detecting primary user device, obtains institute The connection list of devices of primary user's family wireless network is stated, the connection list of devices is currently accessed to described comprising at least one The mark of the user equipment of primary user's family wireless network.
If in the specific implementation, the first acquisition unit 101 accesses to primary user specifically for detecting primary user device Family wireless network, sends to the gateway device of primary user's family wireless network and obtains instruction, receive the gateway device The connection list of devices of the primary user's family wireless network returned.
Second acquisition unit 102, for obtaining the authorisation device list associated with primary user's family wireless network, The authorized user device that at least one allows to access to primary user's family wireless network is included in the authorisation device list Mark.
Comparing unit 103, is worked as the connection list of devices to be compared with the authorisation device list with confirmation It is preceding to access to primary user's family wireless network with the presence or absence of unauthorized user equipment.
Reminding unit 104, if in the presence of the anti-loiter network reminder message of output.
Alternatively, anti-loiter network alarm set is also run such as lower unit:
Doubtful judging unit 105, for when detecting primary user device and accessing to target radio network, judging the mesh Mark whether wireless network is doubtful family wireless network.
In the specific implementation, the doubtful judging unit 105 specifically for when detect primary user device access to target without During gauze network, inquire about the confidence level of the target radio network, if the confidence level is higher than pre-set threshold value, judge the target without Gauze network is doubtful family wireless network.Wherein, the confidence level is according to history to access to the target by cloud server The access information of at least one user equipment to report of wireless network carries out statistical analysis and obtained;Wherein, the access information bag Include following any:Turn-on time, access frequency, access place.
Confirm Tip element 106, if being doubtful family wireless network for the target radio network, output confirms prompting Information, the confirmation prompt message is used to point out to perform to confirm whether the target radio network is main subscriber household wireless network Confirmation operation.
Indexing unit 107, if for receive confirm operation, by the target radio network labeled as primary user family without Gauze network.
Dispensing unit 108, for configuring associated authorisation device list for primary user's family wireless network.
In the specific implementation, the dispensing unit 108 accesses to primary user's home wireless specifically for searching history All user equipmenies of network, and it is for selection to export the mark of all user equipmenies found, and selected user is set The standby authorized user device for being configured to allow to access to primary user's family wireless network, and generate and the primary user family The associated authorisation device list of wireless network;Or, the dispensing unit 108 is specifically for output configuration prompt information, institute State configuration prompt information be used for point out input allow to access to primary user's family wireless network authorized user device mark Know, according to the mark generation of the authorized user device inputted the authorisation device associated with primary user's family wireless network List.
According to one embodiment of present invention, the step S101-S104 that the anti-loiter network based reminding method shown in Fig. 1 is related to can be with It is the unit in anti-loiter network alarm set as shown in Figure 4 to perform.For example, the step S101-S104 shown in Fig. 1 Can be respectively by the first acquisition unit 101 shown in Fig. 4, second acquisition unit 102, comparing unit 103 and reminding unit 104 To perform.
According to another embodiment of the invention, the step S201-S209 that the anti-loiter network based reminding method shown in Fig. 2 is related to can Performed with being the unit in anti-loiter network alarm set as shown in Figure 4.For example, step S201 shown in Fig. 2, S202, S203, S204, S205-S206, S207, S208, S209 can respectively by the doubtful judging unit 105 shown in Fig. 4, Confirm Tip element 106, indexing unit 107, dispensing unit 108, first acquisition unit 101, second acquisition unit 102, comparison Unit 103 and reminding unit 104 are performed.
According to another embodiment of the invention, the unit in the anti-loiter network alarm set shown in Fig. 4 can be distinguished Or all merge into one or several other units to constitute, or some (a little) unit therein can also be split as again Functionally smaller multiple units are constituted, and this can realize same operation, the technology without influenceing embodiments of the invention The realization of effect.Said units are that logic-based function is divided, and in actual applications, the function of a unit can also be by more Individual unit is realized, or the function of multiple units realized by a unit.In other embodiments of the invention, anti-loiter network is carried Awake device can also include other units, in actual applications, and these functions can also be assisted to realize by other units, and can Realized with being cooperated by multiple units.
According to another embodiment of the invention, can be by including CPU (CPU), random access memory Transported on the universal computing device of such as computer of the treatment elements such as medium (RAM), read-only storage medium (ROM) and memory element Row is able to carry out computer program (including the program generation for each step that the anti-loiter network based reminding method as shown in Fig. 1-Fig. 2 is related to Code), to construct anti-loiter network alarm set equipment as shown in Figure 4, and to realize that the anti-loiter network of the embodiment of the present invention is reminded Method.The computer program can be recorded on such as computer readable recording medium storing program for performing, and is situated between by computer-readable record Matter is loaded into above-mentioned computing device, and run wherein.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
Based on the anti-loiter network based reminding method and anti-loiter network alarm set shown in above-described embodiment, the embodiment of the present invention is also provided A kind of user equipment, the user equipment can be the primary user device in anti-loiter network based reminding method and device illustrated embodiment, Available for the corresponding steps for performing method flow shown in above-mentioned Fig. 1-Fig. 2.In the specific implementation, the use described in the embodiment of the present invention Mobile electricity of the family equipment including but not limited to such as with touch sensitive surface (for example, touch-screen display and/or touch pad) Other portable sets of words, laptop computer or tablet PC etc.Fig. 5 is referred to, the internal junction of the user equipment Structure may include processor, user interface, Wireless Internet access module and computer-readable storage medium.Processor wherein, in user equipment, User interface, Wireless Internet access module and computer-readable storage medium can be connected by bus or other modes, in the embodiment of the present invention In shown Fig. 5 exemplified by being connected by bus.
Wherein, Wireless Internet access module is the module for making user equipment possess wireless networking capabilities, can at least include being used for The wireless signal transceiver of the wireless signal of wifi signals etc. is searched for, and for according to the wireless signal access searched Network interface into wireless network.User interface is to realize that user interacts the medium exchanged with information with user equipment, It, which is embodied, can include the display screen (Display) for exporting and keyboard (Keyboard) for input etc., It should be noted that keyboard herein both can be physical keyboard, or touch screen dummy keyboard, for entity and it can also touch Shield the keyboard that virtualphase is combined.It is to be understood, however, that user interface can also include such as mouse and/or control-rod One or more of the other physical user-interface device.Processor (or CPU (Central Processing Unit, centre Reason device)) be user equipment calculating core and control core, its be adapted for carrying out one or one or more instruction, be particularly adapted to Load and perform one or one or more instruction so as to realizing correlation method flow or corresponding function;For example:CPU can be used for solution The switching on and shutting down instruction transmitted by user to user equipment is analysed, and controls user equipment to carry out switching on and shutting down operation;For another example:CPU can be with All kinds of interaction datas, etc. are transmitted between user equipment internal structure.Computer-readable storage medium (Memory) is user equipment In memory device, for depositing program and data.It is understood that computer-readable storage medium herein can both include using The built-in storage medium of family equipment, naturally it is also possible to the expansion storage medium supported including user equipment.Computer storage is situated between Matter provides memory space, and the memory space stores the operating system of user equipment.Also, also housed in the memory space Suitable for by one or more than one instructions that processor is loaded and is performed, these instructions can be one or more meter Calculation machine program (including program code).It should be noted that computer-readable storage medium herein can be high-speed RAM memory, Can also be non-labile memory (non-volatile memory), for example, at least one magnetic disk storage;It is optional to go back It can be the computer-readable storage medium that at least one is located remotely from aforementioned processor.
Special instruction is also needed to, user equipment supports various application programs, such as one or more of following:Paint Figure application program, demonstration applications, word-processing application, website create application program, disk imprinting application program, electronics Form application program, game application, telephony application, videoconference application, email application, immediately Application program, photo management application program, digital camera application program, digital photography are supported in messaging applications, exercise Machine application program, web-browsing application program, digital music player application and/or video frequency player application program. The various application programs that can be performed on a user device can use at least one public physics of such as touch sensitive surface User interface facilities.It can be adjusted among applications and/or in corresponding application programs and/or change touch sensitive surface The corresponding information shown in one or more functions and user equipment.So, user equipment public physical structure (for example, Touch sensitive surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
In embodiments of the present invention, processor loads and performed one or one or more deposited in computer-readable storage medium Instruction, to realize the corresponding steps of method flow shown in above-mentioned Fig. 1-Fig. 2;In the specific implementation, one in computer-readable storage medium Bar or one or more instruction are loaded by processor and perform following steps:
If A, detecting primary user device and accessing to primary user's family wireless network, primary user's home wireless is obtained The connection list of devices of network, the connection list of devices is currently accessed to primary user's family wireless network comprising at least one User equipment mark;
B, acquisition the authorisation device list associated with primary user's family wireless network, in the authorisation device list The mark for allowing to access to the authorized user device of primary user's family wireless network comprising at least one;
C, the connection list of devices is compared with the authorisation device list and non-awarded with confirming currently to whether there is Power user equipment accesses to primary user's family wireless network;
If D, in the presence of exporting anti-loiter network reminder message.
In the specific implementation, before described one or one or more instruction are loaded by processor and performed step A, also performing such as Lower step:
E, when detecting primary user device and accessing to target radio network, whether judge the target radio network is doubtful Like family wireless network;
If F, the target radio network are doubtful family wireless network, output confirms prompt message, the confirmation prompting Information be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If G, receive confirmation operation, by the target radio network be labeled as primary user's family wireless network;
H, the authorisation device list being associated for primary user's family wireless network configuration.
In the specific implementation, described one or one or more instruction are by during processor loads and performs step E, specifically Perform following steps:
E1, when detecting primary user device and accessing to target radio network, inquire about the confidence of the target radio network Degree;
If E2, the confidence level are higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
In the specific implementation, the confidence level is according to history to access to the target radio network extremely by cloud server The access information of a few user equipment to report carries out statistical analysis and obtained;Wherein, the access information includes following any: Turn-on time, access frequency, access place.
In the specific implementation, in one embodiment, described one or one or more instruction are loaded and performed by processor During step H, following steps are specifically performed:
H1, search history and access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;
H2, it is the authorized user for allowing to access to primary user's family wireless network by selected user device configuration Equipment, and generate the authorisation device list associated with primary user's family wireless network.
In the specific implementation, in another embodiment, described one or one or more instruction are loaded and held by processor During row step H, following steps are specifically performed:
H1, output configuration prompt information, the configuration prompt information access to the primary user for pointing out input to allow The mark of the authorized user device of family wireless network;
H2, according to the authorized user device inputted mark generation it is associated with primary user's family wireless network Authorisation device list.
In the specific implementation, described one or one or more instruction are by during processor loads and performs step A, specifically Perform following steps:
If A1, detecting primary user device and accessing to primary user's family wireless network, to primary user's home wireless The gateway device of network, which is sent, obtains instruction;
A2, the connection list of devices for receiving primary user's family wireless network that the gateway device is returned.
The embodiment of the present invention can be in the case of without the adaptation of gateway device and login, if there is unauthorized user Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When send anti-loiter network to the validated user of family wireless network and remind so that validated user knows making for family wireless network in time With situation, validated user is facilitated to carry out respective handling to unauthorized user equipment.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" be indicated Described feature, entirety, step, operation, the presence of element and/or component, but be not precluded from one or more of the other feature, it is whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, " one " and "the" are intended to include plural form.
It will be further appreciated that, the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combination, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or If " detected【Described condition or event】" can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detect【Described condition or event】" or " in response to detecting【Described condition or event】”.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means to combine specific features, structure, material or the spy that the embodiment or example are described Point is contained at least one embodiment of the present invention or example.In this manual, to the schematic representation of above-mentioned term not Identical embodiment or example must be directed to.Moreover, specific features, structure, material or the feature of description can be with office Combined in an appropriate manner in one or more embodiments or example.In addition, in the case of not conflicting, the skill of this area Art personnel can be tied the not be the same as Example or the feature of example and non-be the same as Example or example described in this specification Close and combine.
In addition, term " first ", " second " are only used for describing purpose, and it is not intended that indicating or implying relative importance Or the implicit quantity for indicating indicated technical characteristic.Thus, define " first ", the feature of " second " can express or Implicitly include at least one this feature.In the description of the invention, " multiple " are meant that at least two, such as two, three It is individual etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow chart or herein, represent to include Module, fragment or the portion of the code of one or more executable instructions for the step of realizing specific logical function or process Point, and the scope of embodiments of the present invention includes other realization, wherein can not be by order that is shown or discussing, bag Include according to involved function by it is basic simultaneously in the way of or in the opposite order, carry out perform function, this should be by the reality of the present invention A person of ordinary skill in the field is applied to be understood.
It should be appreciated that each several part of the present invention can be realized with hardware, software, firmware or combinations thereof.Above-mentioned In embodiment, the software that multiple steps or method can in memory and by suitable instruction execution system be performed with storage Or firmware is realized.If, and in another embodiment, can be with well known in the art for example, realized with hardware Any one of row technology or their combination are realized:With the logic gates for realizing logic function to data-signal Discrete logic, the application specific integrated circuit with suitable combinational logic gate circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..In addition, each functional unit in each embodiment of the invention can be integrated in a processing In module or unit is individually physically present, can also two or more units be integrated in a module. Above-mentioned integrated module can both be realized in the form of hardware, it would however also be possible to employ the form of software function module is realized.It is described If integrated module is realized using in the form of software function module and as independent production marketing or in use, can also stored In a computer read/write memory medium.
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly Enclose, therefore the equivalent variations made according to the claims in the present invention, still belong to the scope that the present invention is covered.

Claims (12)

1. a kind of anti-loiter network based reminding method, it is characterised in that including:
If detecting primary user device accesses to primary user's family wireless network, the company of primary user's family wireless network is obtained List of devices is connect, the connection list of devices is currently accessed to the user of primary user's family wireless network comprising at least one The mark of equipment;
The authorisation device list associated with primary user's family wireless network is obtained, comprising extremely in the authorisation device list Lack a mark for allowing to access to the authorized user device of primary user's family wireless network;
The connection list of devices is compared to confirm currently to whether there is unauthorized user with the authorisation device list Equipment accesses to primary user's family wireless network;
If in the presence of the anti-loiter network reminder message of output.
2. anti-loiter network based reminding method as claimed in claim 1, it is characterised in that if the primary user device that detects is accessed to Before primary user's family wireless network, the connection list of devices for obtaining primary user's family wireless network, in addition to:
Whether when detecting primary user device and accessing to target radio network, it is doubtful family to judge the target radio network Wireless network;
If the target radio network is doubtful family wireless network, output confirms prompt message, and the confirmation prompt message is used In prompting perform confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;
Associated authorisation device list is configured for primary user's family wireless network.
3. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described to access to when detecting primary user device Whether during target radio network, it is doubtful family wireless network to judge the target radio network, including:
When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about;
If the confidence level is higher than pre-set threshold value, judge the target radio network as doubtful family wireless network.
4. anti-loiter network based reminding method as claimed in claim 3, it is characterised in that the confidence level be by cloud server according to The access information progress statistical analysis that history accesses at least one user equipment to report of the target radio network is obtained;Its In, the access information includes following any:Turn-on time, access frequency, access place.
5. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described is primary user's family wireless network The associated authorisation device list of configuration, including:
All user equipmenies that history accesses to primary user's family wireless network are searched, and it is useful to export found institute The mark of family equipment is for selection;
It is the authorized user device for allowing to access to primary user's family wireless network by selected user device configuration, and The generation authorisation device list associated with primary user's family wireless network.
6. anti-loiter network based reminding method as claimed in claim 2, it is characterised in that described is primary user's family wireless network The associated authorisation device list of configuration, including:
Configuration prompt information is exported, the configuration prompt information accesses to primary user's family wireless for pointing out input to allow The mark of the authorized user device of network;
Set according to the mandate that the mark generation of the authorized user device inputted is associated with primary user's family wireless network Standby list.
7. the anti-loiter network based reminding method as described in claim any one of 1-6, it is characterised in that detect primary user if described and set It is standby to access to primary user's family wireless network, the connection list of devices of primary user's family wireless network is obtained, including:
If detecting primary user device accesses to primary user's family wireless network, to the gateway of primary user's family wireless network Equipment, which is sent, obtains instruction;
Receive the connection list of devices for primary user's family wireless network that the gateway device is returned.
8. a kind of anti-loiter network alarm set, it is characterised in that including:
First acquisition unit, if accessing to primary user's family wireless network for detecting primary user device, is obtained described primary The connection list of devices of family family wireless network, the connection list of devices is currently accessed to the primary user comprising at least one The mark of the user equipment of family wireless network;
Second acquisition unit, it is described to award for obtaining the authorisation device list associated with primary user's family wireless network The mark that at least one allows to access to the authorized user device of primary user's family wireless network is included in power list of devices;
Comparing unit, for the connection list of devices to be compared with the authorisation device list to confirm currently whether deposit Primary user's family wireless network is accessed in unauthorized user equipment;
Reminding unit, if in the presence of the anti-loiter network reminder message of output.
9. anti-loiter network alarm set as claimed in claim 8, it is characterised in that also include:
Doubtful judging unit, for when detecting primary user device and accessing to target radio network, judging the Target Wireless Whether network is doubtful family wireless network;
Confirm Tip element, if being doubtful family wireless network for the target radio network, output confirms prompt message, institute State confirm prompt message be used to pointing out performing confirm the target radio network whether be main subscriber household wireless network confirmation Operation;
Indexing unit, if confirming operation for receiving, primary user's family wireless network is labeled as by the target radio network;
Dispensing unit, for configuring associated authorisation device list for primary user's family wireless network.
10. anti-loiter network alarm set as claimed in claim 9, it is characterised in that the doubtful judging unit is specifically for working as When detecting primary user device and accessing to target radio network, the confidence level of the target radio network is inquired about, if the confidence Degree is higher than pre-set threshold value, judges the target radio network as doubtful family wireless network;Wherein, the confidence level is by high in the clouds The access information that server accesses at least one user equipment to report of the target radio network according to history is counted Analysis is obtained;Wherein, the access information includes following any:Turn-on time, access frequency, access place;
The dispensing unit accesses to all user equipmenies of primary user's family wireless network specifically for searching history, and The mark of all user equipmenies found is exported for selection, by selected user device configuration to allow to access to institute The authorized user device of primary user's family wireless network is stated, and generates the mandate associated with primary user's family wireless network List of devices;Or, the dispensing unit is specifically for output configuration prompt information, and the configuration prompt information is defeated for pointing out Enter the mark for the authorized user device for allowing to access to primary user's family wireless network, set according to the authorized user inputted The standby mark generation authorisation device list associated with primary user's family wireless network;
If the first acquisition unit accesses to primary user's family wireless network specifically for detecting primary user device, to described The gateway device of primary user's family wireless network, which is sent, obtains instruction, receives the primary user family that the gateway device is returned The connection list of devices of wireless network.
11. a kind of computer-readable storage medium, it is characterised in that the computer-readable storage medium be stored with one or one or more refer to Order, what described one or one or more instruction were suitable to be loaded as processor and perform as described in claim any one of 1-7 anti-rubs Net based reminding method.
12. a kind of user equipment, it is characterised in that including:
Wireless Internet access module, wireless network is accessed to for searching for wireless signal, and by the wireless signal searched;
Processor, is adapted for carrying out one or one or more instruction;And,
Computer-readable storage medium, the computer-readable storage medium be stored with one or one or more instruction, described one or one Instruction is suitable to be loaded as the processor and perform the anti-loiter network based reminding method as described in claim any one of 1-7 above.
CN201710526338.4A 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device Active CN107148022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710526338.4A CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710526338.4A CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Publications (2)

Publication Number Publication Date
CN107148022A true CN107148022A (en) 2017-09-08
CN107148022B CN107148022B (en) 2019-01-15

Family

ID=59785412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710526338.4A Active CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Country Status (1)

Country Link
CN (1) CN107148022B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810892A (en) * 2018-05-18 2018-11-13 四川斐讯信息技术有限公司 A kind of wireless network management method, smart machine and router
CN109788481A (en) * 2019-01-25 2019-05-21 刘美连 A kind of method and device for preventing from illegally accessing monitoring
CN110401959A (en) * 2018-04-24 2019-11-01 中国移动通信集团广东有限公司 Detect method, apparatus, electronic equipment and the storage medium of loiter network terminal
CN116113012A (en) * 2023-04-14 2023-05-12 微网优联科技(成都)有限公司 Access control method, device and system of wireless router and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access
US20130058274A1 (en) * 2005-06-03 2013-03-07 Wefi Inc. Method and system for accessing wireless networks
CN103475996A (en) * 2013-08-19 2013-12-25 小米科技有限责任公司 Network connecting method, network sharing method and devices
CN105227561A (en) * 2015-10-14 2016-01-06 上海斐讯数据通信技术有限公司 A kind of network access authentication is anti-rubs network method and device
CN105516074A (en) * 2014-10-20 2016-04-20 中兴通讯股份有限公司 Method and terminal for detecting wireless network access security
CN105657712A (en) * 2016-01-06 2016-06-08 广东欧珀移动通信有限公司 Access control method and device of WiFi hotspot
CN105916151A (en) * 2016-06-06 2016-08-31 惠州Tcl移动通信有限公司 Intelligent equipment wireless network access method and system thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130058274A1 (en) * 2005-06-03 2013-03-07 Wefi Inc. Method and system for accessing wireless networks
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access
CN103475996A (en) * 2013-08-19 2013-12-25 小米科技有限责任公司 Network connecting method, network sharing method and devices
CN105516074A (en) * 2014-10-20 2016-04-20 中兴通讯股份有限公司 Method and terminal for detecting wireless network access security
CN105227561A (en) * 2015-10-14 2016-01-06 上海斐讯数据通信技术有限公司 A kind of network access authentication is anti-rubs network method and device
CN105657712A (en) * 2016-01-06 2016-06-08 广东欧珀移动通信有限公司 Access control method and device of WiFi hotspot
CN105916151A (en) * 2016-06-06 2016-08-31 惠州Tcl移动通信有限公司 Intelligent equipment wireless network access method and system thereof

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401959A (en) * 2018-04-24 2019-11-01 中国移动通信集团广东有限公司 Detect method, apparatus, electronic equipment and the storage medium of loiter network terminal
CN108810892A (en) * 2018-05-18 2018-11-13 四川斐讯信息技术有限公司 A kind of wireless network management method, smart machine and router
CN109788481A (en) * 2019-01-25 2019-05-21 刘美连 A kind of method and device for preventing from illegally accessing monitoring
CN109788481B (en) * 2019-01-25 2021-12-28 中科大路(青岛)科技有限公司 Method and device for preventing illegal access monitoring
CN116113012A (en) * 2023-04-14 2023-05-12 微网优联科技(成都)有限公司 Access control method, device and system of wireless router and storage medium
CN116113012B (en) * 2023-04-14 2023-07-21 微网优联科技(成都)有限公司 Access control method, device and system of wireless router and storage medium

Also Published As

Publication number Publication date
CN107148022B (en) 2019-01-15

Similar Documents

Publication Publication Date Title
CN106325108B (en) Management method of clothes management system
CN104182488B (en) Searching method, server and client
CN107148022A (en) A kind of anti-loiter network based reminding method and relevant device
CN101083537B (en) Method, apparatus and system for realizing device management
CN108027946A (en) The method and apparatus for the tactical management that promotion end user defines
CN107678776A (en) Multimode version dependence construction method, device, server and storage medium
CN107533747A (en) For notice to be sent to the technology of subscriber
CN104901991B (en) Virtual resource transfer method, device and system
CN103152462B (en) A kind of address list sharing method and device
CN104967758B (en) A kind of method and user terminal for controlling data transfer
CN102281309B (en) The dissemination method of the network information and the delivery system of the network information and client
CN101938364A (en) Method, device and system for releasing original content of user to telecommunication system
CN109936621A (en) Multi-page information push method, device, equipment and the storage medium of information security
CN101697620A (en) Method and system for determining spam messages
CN105912358A (en) Intelligent electronic device and setting method thereof
CN106056001A (en) Private data protection method and apparatus based on mobile terminal and mobile terminal
CN109246741A (en) Wireless network connecting method for terminal
CN109032815A (en) Information interacting method, device, equipment and storage medium between functional module
CN108550213A (en) A kind of intelligent entrance guard control method and system based on mobile terminal
CN106411920A (en) Data sharing method and device
CN107396364A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN107729765A (en) Management method, device, storage medium and the electronic equipment of multi-medium data
CN106648334A (en) Account transfer method and device
CN111190950B (en) Asset retrieval method and device
CN105847446A (en) Network data obtaining method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant