CN107148022B - A kind of anti-loiter network based reminding method and relevant device - Google Patents

A kind of anti-loiter network based reminding method and relevant device Download PDF

Info

Publication number
CN107148022B
CN107148022B CN201710526338.4A CN201710526338A CN107148022B CN 107148022 B CN107148022 B CN 107148022B CN 201710526338 A CN201710526338 A CN 201710526338A CN 107148022 B CN107148022 B CN 107148022B
Authority
CN
China
Prior art keywords
primary user
wireless network
network
family wireless
family
Prior art date
Application number
CN201710526338.4A
Other languages
Chinese (zh)
Other versions
CN107148022A (en
Inventor
吴亦舜
林如蓝
邹翼夙
钟俊葳
许汉杰
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Priority to CN201710526338.4A priority Critical patent/CN107148022B/en
Publication of CN107148022A publication Critical patent/CN107148022A/en
Application granted granted Critical
Publication of CN107148022B publication Critical patent/CN107148022B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0876Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/12Fraud detection or prevention

Abstract

The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, it can be in the case where the adaptation and login without gateway, unauthorized user equipment accesses to family wireless network and carries out " loiter network " if it exists, automatic identification then is carried out to the unauthorized user equipment of " loiter network ", and anti-loiter network is issued to the legitimate user of family wireless network in time and is reminded, so that the service condition of legitimate user's timely learning family wireless network, facilitates legitimate user to carry out respective handling to unauthorized user equipment.

Description

A kind of anti-loiter network based reminding method and relevant device

Technical field

The present invention relates to Internet technical fields, and in particular to a kind of anti-loiter network based reminding method, a kind of anti-loiter network remind dress It sets, a kind of computer storage medium and a kind of user equipment.

Background technique

With shared wireless network related software it is universal, more and more family wireless networks are caused by " loiter network " The network speed of the legitimate user of family wireless network itself is affected.In order to eliminate peace of the family wireless network by " loiter network " The solution of full hidden danger, " anti-loiter network " is come into being." anti-loiter network ", which refers to, prevents other using some technological means to reach User uses the purpose of family wireless network.Currently, most " anti-loiter network " scheme is realized by control gateway, Its core is to be adapted to the difference in operation of the compatible gateway (such as wireless router) of various brands model on the market, successfully fit After gateway, is logged on in gateway by legitimate user and operated the access for such as refusing unauthorized user equipment Request, to reach " anti-loiter network " purpose.Due to existing " anti-loiter network " scheme realize premise be gateway adaptation and It logs in, once the gateway of legitimate user successful adaptation or can not can not normally log in, legitimate user can not then know itself The case where family wireless network is by " loiter network ", certainly also just can not the user equipment in time to " loiter network " make respective handling, shadow The normal use of family wireless network is rung.

Summary of the invention

The embodiment of the present invention provides a kind of anti-loiter network based reminding method and relevant device, can be without the suitable of gateway " loiter network " identification is carried out in the case where matching and logging in, and is exported anti-loiter network in time and reminded.

On the one hand, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, it may include:

If detecting, primary user device accesses to primary user's family wireless network, obtains primary user's family wireless network Connection list of devices, the connection list of devices include at least one be currently accessed to primary user's family wireless network The mark of user equipment;

Authorisation device list associated with primary user's family wireless network is obtained, is wrapped in the authorisation device list Mark containing at least one authorized user device for allowing to access to primary user's family wireless network;

The connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of unauthorized User equipment accesses to primary user's family wireless network;

If it exists, anti-loiter network reminder message is exported.

Preferably, if described detect that primary user device accesses to primary user's family wireless network, the primary user is obtained Before the connection list of devices of family wireless network, further includes:

When detecting that primary user device accesses to target radio network, judge whether the target radio network is doubtful Family wireless network;

If the target radio network is doubtful family wireless network, output confirmation prompt information, the confirmation prompt letter Breath for prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation operation;

If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;

Associated authorisation device list is configured for primary user's family wireless network.

Preferably, described when detecting that primary user device accesses to target radio network, judge the Target Wireless net Whether network is doubtful family wireless network, comprising:

When detecting that primary user device accesses to target radio network, the confidence level of the target radio network is inquired;

If the confidence level is higher than preset threshold, determine that the target radio network is doubtful family wireless network.

Preferably, the confidence level is to access at least the one of the target radio network according to history by cloud server The access information of a user equipment to report is for statistical analysis to be obtained;Wherein, the access information includes following any: access Time, access frequency, access place.

It is preferably, described to configure associated authorisation device list for primary user's family wireless network, comprising:

All user equipmenies that history accesses to primary user's family wireless network are searched, and export found institute There is the mark of user equipment for selection;

It is to allow to access to the authorized user of primary user's family wireless network to set by selected user device configuration It is standby, and generate authorisation device list associated with primary user's family wireless network.

It is preferably, described to configure associated authorisation device list for primary user's family wireless network, comprising:

Configuration prompt information is exported, the configuration prompt information is for prompting input to allow to access to the primary user family The mark of the authorized user device of wireless network;

Award associated with primary user's family wireless network is generated according to the mark of the authorized user device inputted Weigh list of devices.

Preferably, if described detect that primary user device accesses to primary user's family wireless network, the primary user is obtained The connection list of devices of family wireless network, comprising:

If detecting, primary user device accesses to primary user's family wireless network, to primary user's family wireless network Gateway sends acquisition instruction;

Receive the connection list of devices for primary user's family wireless network that the gateway returns.

On the other hand, the embodiment of the present invention provides a kind of anti-loiter network alarm set, it may include:

First acquisition unit, if for detecting that primary user device accesses to primary user's family wireless network, described in acquisition The connection list of devices of primary user's family wireless network, the connection list of devices include that at least one is currently accessed to the master The mark of the user equipment of subscriber household wireless network;

Second acquisition unit, for obtaining authorisation device list associated with primary user's family wireless network, institute Stating in authorisation device list allows to access to the authorized user device of primary user's family wireless network comprising at least one Mark;

Comparing unit, for the connection list of devices being compared with the authorisation device list to confirm and be currently It is no that there are unauthorized user equipment to access to primary user's family wireless network;

Reminding unit, for if it exists, exporting anti-loiter network reminder message.

Preferably, the anti-loiter network alarm set further include:

Doubtful judging unit, for when detecting that primary user device accesses to target radio network, judging the target Whether wireless network is doubtful family wireless network;

Prompt unit is confirmed, if being doubtful family wireless network, output confirmation prompt letter for the target radio network Breath, the confirmation prompt information confirm whether the target radio network is main subscriber household wireless network for prompting to execute Confirmation operation;

Marking unit, if the target radio network is labeled as primary user's family wireless for receiving confirmation operation Network;

Configuration unit, for configuring associated authorisation device list for primary user's family wireless network.

Preferably, the doubtful judging unit, which is specifically used for working as, detects that primary user device accesses to target radio network When, the confidence level of the target radio network is inquired, if the confidence level is higher than preset threshold, determines the target radio network For doubtful family wireless network.

Preferably, the confidence level is to access at least the one of the target radio network according to history by cloud server The access information of a user equipment to report is for statistical analysis to be obtained;Wherein, the access information includes following any: access Time, access frequency, access place.

Preferably, the configuration unit accesses to all of primary user's family wireless network specifically for searching history User equipment, and the mark for exporting all user equipmenies found is for selection, is by selected user device configuration Allow to access to the authorized user device of primary user's family wireless network, and generates and primary user's family wireless network Associated authorisation device list;Alternatively,

The configuration unit is specifically used for output configuration prompt information, and the configuration prompt information is for prompting input to allow The mark for accessing to the authorized user device of primary user's family wireless network, according to the mark of the authorized user device inputted Know and generates authorisation device list associated with primary user's family wireless network.

Preferably, if the first acquisition unit is specifically used for detecting that primary user device accesses to primary user's family wireless Network sends acquisition instruction to the gateway of primary user's family wireless network, receives the institute that the gateway returns State the connection list of devices of primary user's family wireless network.

In another aspect, the embodiment of the present invention also provides a kind of computer storage medium, the computer storage medium storage There are one or one or more instruction, described one or one or more instruction are suitable for being loaded by processor and executing following steps:

If A, detecting, primary user device accesses to primary user's family wireless network, obtains primary user's home wireless The connection list of devices of network, the connection list of devices include that at least one is currently accessed to primary user's family wireless network User equipment mark;

B, associated with primary user's family wireless network authorisation device list is obtained, in the authorisation device list Mark comprising at least one authorized user device for allowing to access to primary user's family wireless network;

C, the connection list of devices is compared with the authorisation device list and is currently awarded with the presence or absence of non-with confirming Power user equipment accesses to primary user's family wireless network;

D, anti-loiter network reminder message if it exists, is exported.

Preferably, described one or one or more instruction load by processor and is executed step A before, also execute as follows walk It is rapid:

E, when detecting that primary user device accesses to target radio network, judge whether the target radio network is doubtful Like family wireless network;

If F, the target radio network is doubtful family wireless network, output confirmation prompt information, the confirmation prompt Information be used to prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation operation;

If G, receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;

H, associated authorisation device list is configured for primary user's family wireless network.

Preferably, during described one or one or more instruction loads by processor and are executed step E, specific execution Following steps:

E1, when detecting that primary user device accesses to target radio network, inquire the confidence of the target radio network Degree;

If E2, the confidence level are higher than preset threshold, determine that the target radio network is doubtful family wireless network.

Preferably, the confidence level is to access at least the one of the target radio network according to history by cloud server The access information of a user equipment to report is for statistical analysis to be obtained;Wherein, the access information includes following any: access Time, access frequency, access place.

Preferably, during described one or one or more instruction loads by processor and are executed step H, specific execution Following steps:

H1, lookup history access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;

It H2, by selected user device configuration is to allow to access to the authorized user of primary user's family wireless network Equipment, and generate authorisation device list associated with primary user's family wireless network.

Preferably, during described one or one or more instruction loads by processor and are executed step H, specific execution Following steps:

H1, output configuration prompt information, the configuration prompt information is for prompting input to allow to access to the primary user The mark of the authorized user device of family wireless network;

H2, according to the mark of the authorized user device inputted generate it is associated with primary user's family wireless network Authorisation device list.

Preferably, during described one or one or more instruction loads by processor and are executed step A, specific execution Following steps:

If A1, detecting that primary user device accesses to primary user's family wireless network, to primary user's home wireless The gateway of network sends acquisition instruction;

A2, the connection list of devices for receiving primary user's family wireless network that the gateway returns.

In another aspect, the embodiment of the invention also provides a kind of user equipmenies, comprising:

Wireless Internet access module, for searching for wireless signal, and the wireless signal by searching accesses to wireless network;

Processor is adapted for carrying out one or one or more instruction;And

Computer storage medium, the computer storage medium be stored with one or one or more instruction, described one or One or more instruction is suitable for being loaded by the processor and executing following steps:

If A, detecting, primary user device accesses to primary user's family wireless network, obtains primary user's home wireless The connection list of devices of network, the connection list of devices include that at least one is currently accessed to primary user's family wireless network User equipment mark;

B, associated with primary user's family wireless network authorisation device list is obtained, in the authorisation device list Mark comprising at least one authorized user device for allowing to access to primary user's family wireless network;

C, the connection list of devices is compared with the authorisation device list and is currently awarded with the presence or absence of non-with confirming Power user equipment accesses to primary user's family wireless network;

D, anti-loiter network reminder message if it exists, is exported.

Preferably, described one or one or more instruction load by processor and is executed step A before, also execute as follows walk It is rapid:

E, when detecting that primary user device accesses to target radio network, judge whether the target radio network is doubtful Like family wireless network;

If F, the target radio network is doubtful family wireless network, output confirmation prompt information, the confirmation prompt Information be used to prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation operation;

If G, receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;

H, associated authorisation device list is configured for primary user's family wireless network.

Preferably, during described one or one or more instruction loads by processor and are executed step E, specific execution Following steps:

E1, when detecting that primary user device accesses to target radio network, inquire the confidence of the target radio network Degree;

If E2, the confidence level are higher than preset threshold, determine that the target radio network is doubtful family wireless network.

Preferably, the confidence level is to access at least the one of the target radio network according to history by cloud server The access information of a user equipment to report is for statistical analysis to be obtained;Wherein, the access information includes following any: access Time, access frequency, access place.

Preferably, during described one or one or more instruction loads by processor and are executed step H, specific execution Following steps:

H1, lookup history access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;

It H2, by selected user device configuration is to allow to access to the authorized user of primary user's family wireless network Equipment, and generate authorisation device list associated with primary user's family wireless network.

Preferably, during described one or one or more instruction loads by processor and are executed step H, specific execution Following steps:

H1, output configuration prompt information, the configuration prompt information is for prompting input to allow to access to the primary user The mark of the authorized user device of family wireless network;

H2, according to the mark of the authorized user device inputted generate it is associated with primary user's family wireless network Authorisation device list.

Preferably, during described one or one or more instruction loads by processor and are executed step A, specific execution Following steps:

If A1, detecting that primary user device accesses to primary user's family wireless network, to primary user's home wireless The gateway of network sends acquisition instruction;

A2, the connection list of devices for receiving primary user's family wireless network that the gateway returns.

The embodiment of the present invention can be in the case where the adaptation and login without gateway, unauthorized user if it exists Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When issue anti-loiter network to the legitimate user of family wireless network and remind so that legitimate user's timely learning family wireless network makes With situation, legitimate user is facilitated to carry out respective handling to unauthorized user equipment.

Detailed description of the invention

In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.

Fig. 1 is a kind of flow chart of anti-loiter network based reminding method provided in an embodiment of the present invention;

Fig. 2 is the flow chart of the anti-loiter network based reminding method of another kind provided in an embodiment of the present invention;

Fig. 3 a- Fig. 3 c is the schematic diagram that family wireless network provided in an embodiment of the present invention marks scene;

Fig. 4 is a kind of structural schematic diagram of anti-loiter network alarm set provided in an embodiment of the present invention;

Fig. 5 is a kind of structural schematic diagram of user equipment provided in an embodiment of the present invention.

Specific embodiment

Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.

With the fast development of mobile Internet, most of subscriber household is fitted with the nets such as wireless router, wireless modem Equipment is closed, is provided such as by the user equipmenies such as PDA (tablet computer), mobile phone using these gateways when user stays at home The wireless signals such as wifi (wireless fidelity, Wireless Fidelity) signal are connected to internet;Herein, with subscriber household Gateway is that the wireless network of core is known as family wireless network.With shared wireless network related software it is universal, more Carry out more family wireless networks by " loiter network ", (such as: family wireless network owns the legitimate user for leading to family wireless network Person user or its kinsfolk user) itself network speed is affected." loiter network " is family wireless network by as free Hotspot is logical by neighbouring illegal user (such as: the owner user nor its kinsfolk user of non-family safe wireless network) Cross the case where software of the shared wireless network such as master key is stealthily accessed and freely used.However family wireless network belongs to The private wireless networks of legitimate user, in the case where authorizing without legitimate user, " loiter network " is not allowed to, and " is rubbed Net " user often occupies the bandwidth of family wireless network, influences the normal use of the legitimate user of family wireless network, is Elimination family wireless network is come into being by the security risk of " loiter network ", the solution of " anti-loiter network "." anti-loiter network " refers to " blacklist " such as is set in gateway using some technological means, or control gateway hides the means such as wireless signal to reach To the purpose for preventing other users from using family wireless network.

Currently, most " anti-loiter network " scheme is realized by control gateway, core is to be adapted to compatibility The difference in operation of the gateway (such as wireless router) of various brands model on the market, after successful adaptation gateway, by Legitimate user, which logs on in gateway, carries out the configuration such as " blacklist " or " hiding wireless signal ", and gateway detects non-award When power user equipment accesses to family wireless network, " anti-loiter network " is issued to legitimate user and is reminded, while can be according to configuration or root The access request for refusing the unauthorized user equipment according to the operation of legitimate user, to reach " anti-loiter network " purpose.Due to existing " anti-loiter network " scheme realize that premise is the adaptation and login of gateway, once the gateway of legitimate user can not succeed Adaptation can not be logged in normally, and legitimate user can not then know the case where itself family wireless network is by " loiter network ", certainly also Can not the user equipment in time to " loiter network " make respective handling, affect the normal use of family wireless network.

The present invention provides a kind of method that anti-loiter network is reminded and relevant devices, can be in the adaptation without gateway And in the case where logging in, unauthorized user equipment accesses to family wireless network and carries out " loiter network " if it exists, then to " loiter network " Unauthorized user equipment carries out automatic identification, and issues anti-loiter network to the legitimate user of family wireless network in time and remind, so that The service condition of legitimate user's timely learning family wireless network facilitates legitimate user to carry out corresponding position to unauthorized user equipment Reason.

Based on foregoing description, the embodiment of the present invention provides a kind of anti-loiter network based reminding method, and referring to Figure 1, this method can wrap Include following steps S101- step S104.

S101, if detecting, primary user device accesses to primary user's family wireless network, obtain the primary user family without The connection list of devices of gauze network, the connection list of devices include that at least one is currently accessed to primary user's family wireless The mark of the user equipment of network.

Primary user device refers to the user reminded used in the legitimate user of family wireless network, for receiving anti-loiter network Equipment.User equipment can include but is not limited to: the portable terminals such as laptop, PDA, smart phone.Primary user Family wireless network refers to the family that the family wireless network possessed using legitimate user and primary user device are currently accessed Wireless network.It is described below with a specific implementation: assuming that user A installs wireless router in own home, while using pen Remember that this computer, smart phone are conducive to wireless router and access family's wifi network;So, laptop can be set in user A For primary user device, it is primary user device that smart phone, which also can be set,;User A is the legitimate user of family's wifi network, Family's wifi network is known as primary user family wifi network at this time.

Due to needing to access to primary user's family wireless network by gateway, the connection of any one user equipment When gateway is to access to primary user's family wireless network, gateway can then be added the mark of the user equipment of the access Into connection list of devices;Herein, the mark of user equipment can include but is not limited to IP (Internet Protocol, network Between the agreement that interconnects) address, MAC Address (Media Access Control Address, physical address), cell-phone number, Email (E-mail address) account etc.;Such as: when user equipment M and gateway establish connection and access to primary user family When wireless network, the mark of user equipment M is added in connection list of devices by gateway;Similarly, when user equipment N and net When pass equipment establishes connection and accesses to primary user's family wireless network, the mark of user equipment N is added to company by gateway It connects in list of devices.It is understood that after user equipment M (or user equipment N) disconnects the connection with gateway, gateway Equipment deletes the mark of user equipment M (or user equipment N) from connection list of devices.In step S101, primary user device is connect Enter to primary user's family wireless network, connection list of devices, example can be obtained from the gateway of primary user's home network Such as: primary user device can obtain connection list of devices from gateway by the way of ping.

S102 obtains authorisation device list associated with primary user's family wireless network, the authorisation device column Allow to access to the mark of the authorized user device of primary user's family wireless network comprising at least one in table.

Authorisation device list can be it is preconfigured by the legitimate user of primary user's family wireless network, such as: it is legal The user equipmenies such as PDA, laptop, mobile phone that oneself is used can be each configured to authorized user device by user, The user equipmenies such as the kinsfolk of oneself PDA used by a user, laptop, smart phone can be each configured to Authorized user device.The mark of all authorized user devices is added into authorisation device list, and the authorisation device list can With in primary user device local storage space, step S102 then can be from primary with primary user's family wireless network associated storage The authorisation device list is directly acquired in the equipment local storage space of family.It should be noted that authorisation device list with it is primary Family family wireless network is associated to refer to that primary user's family wireless network uniquely corresponds to an authorisation device list.

The connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non-S103 Authorized user device accesses to primary user's family wireless network.

S104, and if it exists, export anti-loiter network reminder message.

In step S103-S104, the mark for connecting each user equipment in list of devices and authorisation device list is carried out It compares one by one, if it find that the mark of certain user equipment in connection list of devices shows to work as not in authorisation device list Before access to primary user's family wireless network the user equipment be unauthorized user equipment, belong to the user equipment of " loiter network ", Anti- loiter network reminder message can be then exported to primary user device, the anti-loiter network reminder message is for reminding primary user device side Legitimate user pays close attention to the case where family wireless network of itself is by " loiter network ", it is possible to will affect the Web vector graphic of legitimate user.

The embodiment of the present invention can be in the case where the adaptation and login without gateway, unauthorized user if it exists Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When issue anti-loiter network to the legitimate user of family wireless network and remind so that legitimate user's timely learning family wireless network makes With situation, legitimate user is facilitated to carry out respective handling to unauthorized user equipment.It should be strongly noted that processing herein can It is including but not limited to following several: 1. if the gateway of primary user's family wireless network successful adaptation, legitimate user can It logs on to gateway and controls the connection of gateway disconnection and unauthorized user equipment, so that unauthorized user equipment be moved Primary user's family wireless network out.2. if the gateway of primary user's family wireless network is not yet adapted to or is adapted to mistake It loses, legitimate user can send adaptation application to cloud server, log on to gateway again after gateway successful adaptation And control gateway disconnect with the connection of unauthorized user equipment, thus by unauthorized user equipment remove primary user family without Gauze network.3. legitimate user can also log on to gateway, and the unauthorized user equipment recognized is added to " blacklist " In, then gateway can directly refuse the unauthorized user equipment when unauthorized user equipment is again coupled to gateway Connection request, refusal accessed to primary user's family wireless network.4. legitimate user can also log on to gateway, open " hiding " function of gateway, so that unauthorized user equipment can not search the wireless signal of gateway offer in turn Primary user's family wireless network can not be accessed to.5. legitimate user is if it find that the unauthorized user equipment belongs to reliable use The mark of the unauthorized user equipment can also be added in authorisation device list by family equipment.

The embodiment of the invention also provides another anti-loiter network based reminding methods, refer to Fig. 2, this method may include following step Rapid S201- step S209.

Whether S201 judges the target radio network when detecting that primary user device accesses to target radio network For doubtful family wireless network.

Step S201 be use confidence level tentatively to judge that primary user device is currently accessed target radio network whether for family The process of front yard wireless network.In the specific implementation, step S201 may include following steps s11-s12.

S11 inquires the confidence of the target radio network when detecting that primary user device accesses to target radio network Degree.

S12 determines that the target radio network is doubtful family wireless network if the confidence level is higher than preset threshold.

Confidence level is at least one user equipment for accessing to the target radio network according to history by cloud server The access information reported is for statistical analysis to be obtained;Wherein, the access information includes following any: turn-on time, access Frequency, access place.In the present embodiment, each user equipment can be reported to cloud server after accessing to wireless network and be connect Enter information, itself was accessed alternatively, each user equipment can also periodically be reported to cloud server using certain frequency The relevant access information of all wireless networks.Cloud server is for statistical analysis according to the access information largely reported, row Except some public wireless networks, such as: exclusion is such as identified as the wifi network of " Startbuck ", is identified as the wifi of " caffee " The wireless network of the obvious public identifier such as network, then using access information as consider factorial analysis it is remaining may belong to family without The confidence level of each wireless network of gauze network, such as: it is directed to a certain wifi network, analysis finds certain user equipment at continuous one section Time, the 9:00-12:00 period accessed the wifi network at night, then the wifi network belongs to the confidence level of family's wifi network It is high.Finally store the mark and corresponding confidence level of each wireless network.It should be noted that the higher table of the confidence level of wireless network A possibility that bright wireless network is family wireless network is bigger, conversely, the confidence level of wireless network is lower to show the wireless network A possibility that network is family wireless network is lower.

Step s11-s12 may include following several implementations, (1) when detect primary user device access to target without When gauze network, the mark of target radio network can be sent to cloud server and carry out confidence level inquiry, and receive cloud clothes The confidence level for the target radio network that business device returns carries out the judgement of doubtful family wireless network.This implementation by means of The powerful analysis ability of cloud server obtains confidence level, and primary user device side processing load is smaller;But by the upper of access information It gives the correct time and prolongs and network delay is affected.(2) confidence level and the storage of each wireless network are pulled from cloud server in advance In primary user device local storage space, then when detecting that primary user device accesses to target radio network, it can be direct The confidence level that the target radio network is inquired from the local storage space of primary user device carries out doubtful family wireless network Determine.This implementation search efficiency is higher, if but the update easy influence query result not prompt enough of locally stored content Accuracy.(3) logic that confidence statistics are analyzed is encapsulated as analysis model and is issued to primary user device execution by cloud server, And the access information of each user equipment to report is transferred to primary user device as parameter, when detecting that primary user device accesses to When target radio network, gone forward side by side by primary user device in the confidence level for statisticalling analyze target radio network locally with analysis model The judgement of the doubtful family wireless network of row.This implementation, which carries out Confidence Analysis by primary user device local side, to be connect The influence of the influence and network delay that enter the reporting time delay of information is smaller, but needs to carry out additional exploitation in primary user device side Work, higher cost.Implementation shown in above-mentioned (1)-(3) respectively has advantage and disadvantage, in a particular application can be with flexible choice.

S202, if the target radio network is doubtful family wireless network, output confirms prompt information, and the confirmation mentions Show information for prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation operation.

The target radio network is labeled as primary user's family wireless network if receiving confirmation operation by S203.

Step S202-S203 is finally to mark primary user's family wireless using the means for carrying out secondary-confirmation by legitimate user Network.After the preliminary judgement of doubtful home network through step S201, primary user device side is guided by modes such as UI bullet frames Legitimate user mark primary user's family wireless network.Herein, the design of UI can include but is not limited to following several scenes: field Scape one (refers to Fig. 3 a): if primary user device there are history access target radio network record, can be by the mesh Mark wireless network is supplied to legitimate user as only option and is confirmed whether it is family wireless network.Scene two (refers to figure 3b): if primary user device there is no history access target radio network record, can by the target radio network with Other wireless networks that primary user device history accessed alternatively are supplied to legitimate user together and select confirmation family wireless Network.Scene three (refers to Fig. 3 c): closing if primary user device is currently disconnected with the connection of target radio network, prompt Method user first establishes network connection and selects to confirm the family wireless network of itself again.

S204 configures associated authorisation device list for primary user's family wireless network.

Authorisation device list can be, specific configuration preconfigured by the legitimate user of primary user's family wireless network Process may include two kinds of feasible embodiments, and in one of embodiment, step S204 specifically includes following steps s21- S22:

S21 searches history and accesses to all user equipmenies of primary user's family wireless network, and exports and found All user equipmenies mark it is for selection.

Selected user device configuration is to allow to access to the authorization use of primary user's family wireless network by s22 Family equipment, and generate authorisation device list associated with primary user's family wireless network.

Above embodiment can be applied to access the scene recorded there are history, such as: legitimate user has passed through before The user equipmenies such as oneself PDA, laptop, mobile phone access in primary user's family wireless network, go through then these exist The mark of each user equipment of history access record has been buffered, in step s11-s12 can by cached there are history accesses The mark of each user equipment of record is supplied to legitimate user's selection, is authorized user device by selected user device configuration And it is added in authorisation device list.

In another embodiment, step S204 specifically includes following steps s31-s32:

S31 exports configuration prompt information, and the configuration prompt information is for prompting input to allow to access to the primary user The mark of the authorized user device of family wireless network.

S32 is generated associated with primary user's family wireless network according to the mark of the authorized user device inputted Authorisation device list.

Above embodiment can be applied to access the scene recorded there is no history, such as: legitimate user can input certainly The mark of the user equipmenies such as PDA, laptop, mobile phone that oneself uses, or input oneself kinsfolk user and made The mark of the user equipmenies such as PDA, laptop, smart phone, then by the mark of the user equipment inputted It is each configured to the mark of authorized user device and is added in authorisation device list.

S205, if detecting, primary user device accesses to primary user's family wireless network, to primary user's family wireless The gateway of network sends acquisition instruction.

S206 receives the connection list of devices for primary user's family wireless network that the gateway returns.

In step S205-S206, acquisition instruction can be Ping instruction, and sending ping instruction to gateway can then control Gateway processed returns to the connection list of devices of primary user's family wireless network, contains and is currently accessed in the connection list of devices To the mark of all connection equipment of primary user's family wireless network.

S207 obtains authorisation device list associated with primary user's family wireless network, the authorisation device column Allow to access to the mark of the authorized user device of primary user's family wireless network comprising at least one in table.

The connection list of devices is compared with the authorisation device list to confirm currently with the presence or absence of non-S208 Authorized user device accesses to primary user's family wireless network.

S209, and if it exists, export anti-loiter network reminder message.

Step S207-S209 may refer to the step S102-S104 of embodiment illustrated in fig. 1, and this will not be repeated here.

Below in conjunction with a specific example, it is situated between in detail to the process of the anti-loiter network based reminding method of the embodiment of the present invention It continues.

Assuming that primary user device is the mobile phone a of user A, when user A is connected to wifi-a by mobile phone a, mobile phone a is from cloud Server inquires the confidence level of wifi-a to judge whether wifi-a is doubtful family's wifi network, if it is in mobile phone a UI bullet frame guide user A confirmation wifi-a whether the family's wifi network for being user A, according to the secondary-confirmation of user A operate will Wifi-a is labeled as primary user family wifi network.Later, the authorisation device list that user A is configured is received, it is assumed that authorization is set The mark of mark comprising mobile phone b and mobile phone c in standby list.

Mobile phone a obtains connection list of devices to the wireless router of primary user family wifi network by way of ping, Assuming that the mark in the connection list of devices comprising laptop d and mark and mobile phone c.Mobile phone a will connect list of devices with Authorisation device list is compared, and discovery laptop d belongs to unauthorized user equipment, therefore exports anti-loiter network prompting and disappear Breath;Hereafter, user A can log on to operation in wireless router and move laptop d after wireless router is adapted to successfully Out in primary user family wifi network.

The embodiment of the present invention can be in the case where the adaptation and login without gateway, unauthorized user if it exists Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When issue anti-loiter network to the legitimate user of family wireless network and remind so that legitimate user's timely learning family wireless network makes With situation, legitimate user is facilitated to carry out respective handling to unauthorized user equipment.

Based on the embodiment of above-mentioned anti-loiter network based reminding method, the embodiment of the invention also discloses a kind of anti-loiter networks to remind dress It sets, which can be a computer program (including program code), and the computer program can be run It is mentioned in the user equipmenies such as laptop, PDA, mobile phone with being used to execute anti-loiter network shown in Fig. 1-2 any embodiment Awake method.Fig. 4 is referred to, anti-loiter network the alarm set operation such as lower unit:

First acquisition unit 101, if obtaining institute for detecting that primary user device accesses to primary user's family wireless network The connection list of devices of primary user's family wireless network is stated, the connection list of devices includes that at least one is currently accessed to described The mark of the user equipment of primary user's family wireless network.

In the specific implementation, if the first acquisition unit 101 is specifically used for detecting that primary user device accesses to primary user Family wireless network sends acquisition instruction to the gateway of primary user's family wireless network, receives the gateway The connection list of devices of the primary user's family wireless network returned.

Second acquisition unit 102, for obtaining authorisation device list associated with primary user's family wireless network, Allow to access to the authorized user device of primary user's family wireless network comprising at least one in the authorisation device list Mark.

Comparing unit 103, for the connection list of devices being compared with the authorisation device list to confirm and work as It is preceding to access to primary user's family wireless network with the presence or absence of unauthorized user equipment.

Reminding unit 104, for if it exists, exporting anti-loiter network reminder message.

Optionally, anti-loiter network alarm set also runs such as lower unit:

Doubtful judging unit 105, for when detecting that primary user device accesses to target radio network, judging the mesh Mark whether wireless network is doubtful family wireless network.

In the specific implementation, the doubtful judging unit 105 be specifically used for when detect primary user device access to target without When gauze network, inquire the confidence level of the target radio network, if the confidence level be higher than preset threshold, determine the target without Gauze network is doubtful family wireless network.Wherein, the confidence level is to access to the target according to history by cloud server The access information of at least one user equipment to report of wireless network is for statistical analysis to be obtained;Wherein, the access information packet It includes following any: turn-on time, access frequency, access place.

Prompt unit 106 is confirmed, if being doubtful family wireless network, output confirmation prompt for the target radio network Information, the confirmation prompt information confirm whether the target radio network is main subscriber household wireless network for prompting to execute Confirmation operation.

Marking unit 107, if for receiving confirmation operation, by the target radio network labeled as primary user family without Gauze network.

Configuration unit 108, for configuring associated authorisation device list for primary user's family wireless network.

In the specific implementation, the configuration unit 108, which is specifically used for lookup history, accesses to primary user's home wireless All user equipmenies of network, and the mark for exporting all user equipmenies found is for selection, and selected user is set It is standby to be configured to allow to access to the authorized user device of primary user's family wireless network, and generate and the primary user family The associated authorisation device list of wireless network;Alternatively, the configuration unit 108 is specifically used for output configuration prompt information, institute State the mark of authorized user device of the configuration prompt information for prompting input to allow to access to primary user's family wireless network Know, authorisation device associated with primary user's family wireless network is generated according to the mark of the authorized user device inputted List.

According to one embodiment of present invention, the step S101-S104 that anti-loiter network based reminding method shown in FIG. 1 is related to can be with It is that each unit in anti-loiter network alarm set as shown in Figure 4 is performed.For example, step S101-S104 shown in Fig. 1 It can first acquisition unit 101, second acquisition unit 102 as shown in Fig. 4, comparing unit 103 and reminding unit 104 respectively To execute.

According to another embodiment of the invention, the step S201-S209 that anti-loiter network based reminding method shown in Fig. 2 is related to can To be that each unit in anti-loiter network alarm set as shown in Figure 4 is performed.For example, step S201 shown in Fig. 2, S202, S203, S204, S205-S206, S207, S208, S209 can respectively the doubtful judging unit 105 as shown in Fig. 4, Confirm prompt unit 106, marking unit 107, configuration unit 108, first acquisition unit 101, second acquisition unit 102, compare Unit 103 and reminding unit 104 execute.

According to another embodiment of the invention, each unit in anti-loiter network alarm set shown in Fig. 4 can be distinguished Or one or several other units all are merged into constitute or some (a little) unit therein can also be split as again Functionally smaller multiple units are constituted, this may be implemented similarly to operate, the technology without influencing the embodiment of the present invention The realization of effect.Said units are logic-based function divisions, and in practical applications, the function of a unit can also be by more A unit is realized or the function of multiple units is realized by a unit.In other embodiments of the invention, anti-loiter network mentions Awake device also may include other units, and in practical applications, these functions can also be assisted to realize by other units, and can It is realized with being cooperated by multiple units.

It according to another embodiment of the invention, can be by including central processing unit (CPU), random access memory It is transported on the universal computing device of such as computer of the processing elements such as medium (RAM), read-only storage medium (ROM) and memory element Row is able to carry out computer program (including the program generation for each step being related to such as Fig. 1-anti-loiter network based reminding method shown in Fig. 2 Code), to construct anti-loiter network alarm set equipment as shown in Figure 4, and to realize that the anti-loiter network of the embodiment of the present invention is reminded Method.The computer program can be recorded in such as computer readable recording medium, and be situated between by computer-readable record Matter is loaded into above-mentioned calculating equipment, and is run wherein.

The embodiment of the present invention can be in the case where the adaptation and login without gateway, unauthorized user if it exists Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When issue anti-loiter network to the legitimate user of family wireless network and remind so that legitimate user's timely learning family wireless network makes With situation, legitimate user is facilitated to carry out respective handling to unauthorized user equipment.

Anti- loiter network based reminding method and anti-loiter network alarm set, the embodiment of the present invention shown in based on the above embodiment also provide A kind of user equipment, the user equipment can be the primary user device in anti-loiter network based reminding method and device illustrated embodiment, It can be used for executing the corresponding steps of method flow shown in above-mentioned Fig. 1-Fig. 2.In the specific implementation, being used described in the embodiment of the present invention Mobile electricity of the family equipment including but not limited to such as with touch sensitive surface (for example, touch-screen display and/or touch tablet) Other portable devices of words, laptop computer or tablet computer etc.Fig. 5 is referred to, the internal junction of the user equipment Structure may include processor, user interface, Wireless Internet access module and computer storage medium.Wherein, the processor in user equipment, User interface, Wireless Internet access module and computer storage medium can be connected by bus or other modes, in the embodiment of the present invention In shown Fig. 5 for being connected by bus.

Wherein, Wireless Internet access module is the module for making user equipment have wireless networking capabilities, at least may include being used for The wireless signal transceiver of the wireless signal of wifi signal etc. is searched for, and for according to the wireless signal access searched Network interface into wireless network.User interface is the medium realizing user and user equipment and interacting with information exchange, It may include the display screen (Display) for output and keyboard (Keyboard) for input etc. that it, which is embodied, It should be noted that keyboard herein both can be physical keyboard, or touch screen dummy keyboard can also be entity and touching Shield the keyboard that virtualphase combines.It is to be understood, however, that user interface can also include such as mouse and/or control-rod One or more of the other physical user-interface device.Processor (or CPU (Central Processing Unit, centre Reason device)) be user equipment calculating core and control core, be adapted for carrying out one or one or more instruction, be particularly adapted to It loads and executes one or one or more instruction to realizing correlation method process or corresponding function;Such as: CPU can be used for solving It analyses user to instruct to switching on and shutting down transmitted by user equipment, and controls user equipment and carry out switching on and shutting down operation;For another example: CPU can be with All kinds of interaction datas, etc. are transmitted between user equipment internal structure.Computer storage medium (Memory) is user equipment In memory device, for storing program and data.It is understood that computer storage medium herein both may include using The built-in storage medium of family equipment, naturally it is also possible to the expansion storage medium supported including user equipment.Computer storage is situated between Matter provides memory space, which stores the operating system of user equipment.Also, it is also housed in the memory space Suitable for by one or more than one instructions that processor loads and executes, these instructions can be one or more meter Calculation machine program (including program code).It should be noted that computer storage medium herein can be high speed RAM memory, It is also possible to non-labile memory (non-volatile memory), for example, at least a magnetic disk storage;It is optional to go back It can be at least one computer storage medium for being located remotely from aforementioned processor.

Also it should be strongly noted that user equipment supports various application programs, such as one of the following or multiple: drawing Figure application program, demonstration applications, word-processing application, website create application program, disk imprinting application program, electronics Table application program, game application, telephony application, videoconference application, email application, immediately Messaging applications take exercise and support application program, photo management application program, digital camera application program, digital photography Machine application program, web-browsing application program, digital music player application and/or video frequency player application program. At least one public physics of such as touch sensitive surface can be used in the various application programs that can be executed on a user device User interface facilities.Touch sensitive surface can be adjusted and/or changed among applications and/or in corresponding application programs The corresponding information shown in one or more functions and user equipment.In this way, user equipment public physical structure (for example, Touch sensitive surface) it can support the various application programs with user interface intuitive and transparent for a user.

In embodiments of the present invention, processor load and execute one stored in computer storage medium or one or more Instruction, to realize the corresponding steps of method flow shown in above-mentioned Fig. 1-Fig. 2;In the specific implementation, one in computer storage medium Item or one or more instruction are loaded by processor and execute following steps:

If A, detecting, primary user device accesses to primary user's family wireless network, obtains primary user's home wireless The connection list of devices of network, the connection list of devices include that at least one is currently accessed to primary user's family wireless network User equipment mark;

B, associated with primary user's family wireless network authorisation device list is obtained, in the authorisation device list Mark comprising at least one authorized user device for allowing to access to primary user's family wireless network;

C, the connection list of devices is compared with the authorisation device list and is currently awarded with the presence or absence of non-with confirming Power user equipment accesses to primary user's family wireless network;

D, anti-loiter network reminder message if it exists, is exported.

In the specific implementation, described one or one or more instruction loaded by processor and executed step A before, also execute such as Lower step:

E, when detecting that primary user device accesses to target radio network, judge whether the target radio network is doubtful Like family wireless network;

If F, the target radio network is doubtful family wireless network, output confirmation prompt information, the confirmation prompt Information be used to prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation operation;

If G, receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;

H, associated authorisation device list is configured for primary user's family wireless network.

In the specific implementation, described one or one or more instruction loaded by processor and executed step E during, specifically Execute following steps:

E1, when detecting that primary user device accesses to target radio network, inquire the confidence of the target radio network Degree;

If E2, the confidence level are higher than preset threshold, determine that the target radio network is doubtful family wireless network.

In the specific implementation, the confidence level is to access to the target radio network extremely according to history by cloud server The access information of a few user equipment to report is for statistical analysis to be obtained;Wherein, the access information includes following any: Turn-on time, access frequency, access place.

In the specific implementation, in one embodiment, described one or one or more instruction are loaded and are executed by processor During step H, following steps are specifically executed:

H1, lookup history access to all user equipmenies of primary user's family wireless network, and export and found All user equipmenies mark it is for selection;

It H2, by selected user device configuration is to allow to access to the authorized user of primary user's family wireless network Equipment, and generate authorisation device list associated with primary user's family wireless network.

In the specific implementation, in another embodiment, described one or one or more instruction are loaded and are held by processor During row step H, following steps are specifically executed:

H1, output configuration prompt information, the configuration prompt information is for prompting input to allow to access to the primary user The mark of the authorized user device of family wireless network;

H2, according to the mark of the authorized user device inputted generate it is associated with primary user's family wireless network Authorisation device list.

In the specific implementation, described one or one or more instruction loaded by processor and executed step A during, specifically Execute following steps:

If A1, detecting that primary user device accesses to primary user's family wireless network, to primary user's home wireless The gateway of network sends acquisition instruction;

A2, the connection list of devices for receiving primary user's family wireless network that the gateway returns.

The embodiment of the present invention can be in the case where the adaptation and login without gateway, unauthorized user if it exists Equipment accesses to family wireless network and carries out " loiter network ", then to the unauthorized user equipment progress automatic identification of " loiter network ", and and When issue anti-loiter network to the legitimate user of family wireless network and remind so that legitimate user's timely learning family wireless network makes With situation, legitimate user is facilitated to carry out respective handling to unauthorized user equipment.

It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.

It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.

It will be further appreciated that the term "and/or" used in description of the invention and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.

As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".

In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.

In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.

Any process described otherwise above or method description are construed as in flow chart or herein, and expression includes It is one or more for realizing specific logical function or process the step of executable instruction code module, segment or portion Point, and the range of embodiments of the present invention includes other realization, wherein sequence shown or discussed, packet can not be pressed Include according to related function by it is basic simultaneously in the way of or in the opposite order, to execute function, this should be by reality of the invention A person of ordinary skill in the field is applied to be understood.

It should be appreciated that each section of the invention can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..It is handled in addition, each functional unit in each embodiment of the present invention can integrate at one In module, it is also possible to each unit and physically exists alone, can also be integrated in two or more units in a module. Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It is described If integrated module is realized and when sold or used as an independent product in the form of software function module, also can store In a computer readable storage medium.

The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (12)

1. a kind of anti-loiter network based reminding method characterized by comprising
If detecting, primary user device accesses to primary user's family wireless network, the primary user device by the way of ping from The gateway of primary user's home network obtains the connection list of devices of primary user's family wireless network, the connection List of devices includes that at least one is currently accessed the mark of the user equipment to primary user's family wireless network;
The primary user device obtains authorisation device list associated with primary user's family wireless network, and the authorization is set Allow to access to the mark of the authorized user device of primary user's family wireless network comprising at least one in standby list;Its In, sky is locally stored in the primary user device with primary user's family wireless network associated storage in the authorisation device list Between in;The list of authorized users is associated with primary user's family wireless network to refer to primary user's family wireless network A uniquely corresponding authorisation device list;
The primary user device connection list of devices is compared with the authorisation device list with confirm it is current whether There are unauthorized user equipment to access to primary user's family wireless network;
If it exists, the primary user device exports anti-loiter network reminder message.
2. anti-loiter network based reminding method as described in claim 1, which is characterized in that if described detect that primary user device accesses to Primary user's family wireless network, the primary user device is by the way of ping from the gateway of primary user's home network Before the connection list of devices for obtaining primary user's family wireless network, further includes:
When detecting that primary user device accesses to target radio network, judge whether the target radio network is doubtful family Wireless network;
If the target radio network is doubtful family wireless network, output confirmation prompt information, the confirmation prompt information use In prompt execute confirm the target radio network whether be main subscriber household wireless network confirmation operation;
If receiving confirmation operation, the target radio network is labeled as primary user's family wireless network;
Associated authorisation device list is configured for primary user's family wireless network.
3. anti-loiter network based reminding method as claimed in claim 2, which is characterized in that described to detect that primary user device accesses to When target radio network, judge whether the target radio network is doubtful family wireless network, comprising:
When detecting that primary user device accesses to target radio network, the confidence level of the target radio network is inquired;
If the confidence level is higher than preset threshold, determine that the target radio network is doubtful family wireless network.
4. anti-loiter network based reminding method as claimed in claim 3, which is characterized in that the confidence level be by cloud server according to The access information that history accesses at least one user equipment to report of the target radio network for statistical analysis obtains;Its In, the access information includes following any: turn-on time, access frequency, access place.
5. anti-loiter network based reminding method as claimed in claim 2, which is characterized in that described is primary user's family wireless network Configure associated authorisation device list, comprising:
All user equipmenies that history accesses to primary user's family wireless network are searched, and it is useful to export found institute The mark of family equipment is for selection;
Be by selected user device configuration allow to access to the authorized user device of primary user's family wireless network, and Generate authorisation device list associated with primary user's family wireless network.
6. anti-loiter network based reminding method as claimed in claim 2, which is characterized in that described is primary user's family wireless network Configure associated authorisation device list, comprising:
Configuration prompt information is exported, the configuration prompt information is for prompting input to allow to access to primary user's family wireless The mark of the authorized user device of network;
Authorization associated with primary user's family wireless network is generated according to the mark of the authorized user device inputted to set Standby list.
7. anti-loiter network based reminding method as claimed in any one of claims 1 to 6, which is characterized in that if described detect that primary user sets Standby to access to primary user's family wireless network, the primary user device is by the way of ping from primary user's home network Gateway obtains the connection list of devices of primary user's family wireless network, comprising:
If detecting, primary user device accesses to primary user's family wireless network, the primary user device by the way of ping to The gateway of primary user's family wireless network sends acquisition instruction;
Receive the connection list of devices for primary user's family wireless network that the gateway returns.
8. a kind of anti-loiter network alarm set, which is characterized in that described device is set in primary user device, comprising:
First acquisition unit, if for detecting that primary user device accesses to primary user's family wireless network, using the side of ping Formula obtains the connection list of devices of primary user's family wireless network, and the connection list of devices includes that at least one currently connects Enter the mark of the user equipment to primary user's family wireless network;
Second acquisition unit, it is described to award for obtaining authorisation device list associated with primary user's family wireless network Allow to access to the mark of the authorized user device of primary user's family wireless network comprising at least one in power list of devices; Wherein, the authorisation device list is locally stored with primary user's family wireless network associated storage in the primary user device In space;The list of authorized users is associated with primary user's family wireless network to refer to primary user's home wireless Network uniquely corresponds to an authorisation device list;
Comparing unit, for the connection list of devices being compared with the authorisation device list to confirm currently whether deposit Primary user's family wireless network is accessed in unauthorized user equipment;
Reminding unit, for if it exists, exporting anti-loiter network reminder message.
9. anti-loiter network alarm set as claimed in claim 8, which is characterized in that further include:
Doubtful judging unit, for when detecting that primary user device accesses to target radio network, judging the Target Wireless Whether network is doubtful family wireless network;
Prompt unit is confirmed, if being doubtful family wireless network, output confirmation prompt information, institute for the target radio network State confirmation prompt information be used to prompt to execute the confirmation target radio network whether be main subscriber household wireless network confirmation Operation;
Marking unit, if the target radio network is labeled as primary user's family wireless network for receiving confirmation operation;
Configuration unit, for configuring associated authorisation device list for primary user's family wireless network.
10. anti-loiter network alarm set as claimed in claim 9, which is characterized in that the doubtful judging unit is specifically used for working as When detecting that primary user device accesses to target radio network, the confidence level of the target radio network is inquired, if the confidence Degree is higher than preset threshold, determines that the target radio network is doubtful family wireless network;Wherein, the confidence level is by cloud The access information at least one user equipment to report that end server accesses to the target radio network according to history is united Meter analysis obtains;Wherein, the access information includes following any: turn-on time, access frequency, access place;
The configuration unit is specifically used for searching all user equipmenies that history accesses to primary user's family wireless network, and The mark for exporting all user equipmenies found is for selection, allows to access to institute for selected user device configuration The authorized user device of primary user's family wireless network is stated, and generates authorization associated with primary user's family wireless network List of devices;Alternatively, the configuration unit is specifically used for output configuration prompt information, the configuration prompt information is defeated for prompting Enter the mark for allowing to access to the authorized user device of primary user's family wireless network, is set according to the authorized user inputted Standby mark generates authorisation device list associated with primary user's family wireless network;
If the first acquisition unit is specifically used for detecting that primary user device accesses to primary user's family wireless network, to described The gateway of primary user's family wireless network sends acquisition instruction, receives the primary user family that the gateway returns The connection list of devices of wireless network.
11. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with one or one or more refers to Enable, described one or one or more instruction be suitable for load by processor and execute as claim 1-7 it is described in any item prevent rub Net based reminding method.
12. a kind of user equipment characterized by comprising
Wireless Internet access module, for searching for wireless signal, and the wireless signal by searching accesses to wireless network;
Processor is adapted for carrying out one or one or more instruction;And
Computer storage medium, the computer storage medium is stored with one or one or more is instructed, and described one or one Above instructions are suitable for being loaded by the processor and being executed such as the described in any item anti-loiter network based reminding methods of claim 1-7.
CN201710526338.4A 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device CN107148022B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710526338.4A CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710526338.4A CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Publications (2)

Publication Number Publication Date
CN107148022A CN107148022A (en) 2017-09-08
CN107148022B true CN107148022B (en) 2019-01-15

Family

ID=59785412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710526338.4A CN107148022B (en) 2017-06-30 2017-06-30 A kind of anti-loiter network based reminding method and relevant device

Country Status (1)

Country Link
CN (1) CN107148022B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access
CN103475996A (en) * 2013-08-19 2013-12-25 小米科技有限责任公司 Network connecting method, network sharing method and devices
CN105516074A (en) * 2014-10-20 2016-04-20 中兴通讯股份有限公司 Method and terminal for detecting wireless network access security

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130058274A1 (en) * 2005-06-03 2013-03-07 Wefi Inc. Method and system for accessing wireless networks
CN105227561A (en) * 2015-10-14 2016-01-06 上海斐讯数据通信技术有限公司 A kind of network access authentication is anti-rubs network method and device
CN105657712A (en) * 2016-01-06 2016-06-08 广东欧珀移动通信有限公司 Access control method and device of WiFi hotspot
CN105916151A (en) * 2016-06-06 2016-08-31 惠州Tcl移动通信有限公司 Intelligent equipment wireless network access method and system thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access
CN103475996A (en) * 2013-08-19 2013-12-25 小米科技有限责任公司 Network connecting method, network sharing method and devices
CN105516074A (en) * 2014-10-20 2016-04-20 中兴通讯股份有限公司 Method and terminal for detecting wireless network access security

Also Published As

Publication number Publication date
CN107148022A (en) 2017-09-08

Similar Documents

Publication Publication Date Title
US20170295143A1 (en) Communicating with machine to machine devices
US8923806B2 (en) System and method for presenting application data by data processing system(s) in a vicinity
JP5736433B2 (en) IoT browsing method and apparatus
CN103475996B (en) Method for connecting network, network share method and device
US9832076B2 (en) Resource change management in machine to machine network
JP6100898B2 (en) Method and device for processing messages
Oriwoh et al. Internet of things forensics: Challenges and approaches
TWI545916B (en) Adaptive and extensible universal schema for heterogeneous internet of things (iot) devices
CN104246738B (en) Migration in place
US9608958B2 (en) Lightweight directory access protocol (LDAP) join search mechanism
CN105247830B (en) Mobile device management function is provided
CN104125216B (en) A kind of method, system and terminal for lifting credible performing environment security
US20170220940A1 (en) Interoperability mechanisms for internet of things integration platform
US10171586B2 (en) Physical environment profiling through Internet of Things integration platform
CN102741839B (en) Based on the url filtering of user browser history
US20160261465A1 (en) Behavioral analysis to automate direct and indirect local monitoring of internet of things device health
CN106164859B (en) Equipment strategy manager
CN102985915B (en) Control system user interface
Alam et al. Interoperability of security-enabled internet of things
Kolias et al. Learning Internet-of-Things Security" Hands-On"
CN102088379B (en) Detecting method and device of client honeypot webpage malicious code based on sandboxing technology
KR20160044068A (en) Method and system for controlling device based internet of things
US20150006696A1 (en) Semantic mappings from human readable messages to programmatic interfaces
US8959175B2 (en) Method, device and system for creating a virtual local social network
CN103605924B (en) A kind of method and device preventing rogue program attacking network from paying the page

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant