CN107404740B - Method for switching network, device and the terminal device of safety - Google Patents
Method for switching network, device and the terminal device of safety Download PDFInfo
- Publication number
- CN107404740B CN107404740B CN201710667177.0A CN201710667177A CN107404740B CN 107404740 B CN107404740 B CN 107404740B CN 201710667177 A CN201710667177 A CN 201710667177A CN 107404740 B CN107404740 B CN 107404740B
- Authority
- CN
- China
- Prior art keywords
- network
- class
- security level
- security
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0011—Control or signalling for completing the hand-off for data sessions of end-to-end connection
- H04W36/0033—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information
- H04W36/0038—Control or signalling for completing the hand-off for data sessions of end-to-end connection with transfer of context information of security context information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/14—Reselecting a network or an air interface
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/24—Reselection being triggered by specific parameters
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention is suitable for network switching technical field, provides a kind of safe method for switching network, device and terminal device.Include: the enabled instruction for receiving application, corresponding application is started according to the enabled instruction;The information for obtaining the application determines the security classification rank of the application, the information of the preset security classification table storage application and the corresponding relationship of security classification rank according to the information of the application and preset security classification table;Currently used network is detected, determines the security level of the currently used network according to testing result;Compare the security level of the currently used network and the security classification rank of the application;Handover network is chosen whether according to comparison result.By the above method, can guarantee in the application access and the matched network of its security level of starting.
Description
Technical field
The invention belongs to network switching technical fields, more particularly to method for switching network, device and the terminal device of safety.
Background technique
Currently, people's using terminal equipment access network can obtain various information, in the process of access network
In, the switching that is usually directed between heterogeneous networks.
In existing method for switching network, if the network being currently accessed is data network, open wireless network is being detected
When network, the wireless network will be connected automatically, to reduce the campus network of terminal device;Alternatively, if the network being currently accessed is nothing
Gauze network will be from signal when detecting the presence of the stronger wireless network of new signal when the signal weaker of the wireless network and again
Weak wireless network switches to the strong wireless network of signal.But due to only considering the type of network during network switching
Or signal strength, and in a practical situation, the new network detected is most likely unsafe, and accesses unsafe network
The information of user will be made to be in unsafe network environment, therefore most probably cause the leakage of information or property loss of user.
Therefore, it is desirable to provide a kind of new method, to solve the above technical problems.
Summary of the invention
In view of this, the embodiment of the invention provides a kind of safe method for switching network, device and terminal device, with solution
Certainly the prior art only considers the type or signal strength of network, and if accessing unsafe network is in the information of user not
The network environment of safety, thus the problem of most probably causing the leakage of information or property loss of user.
The first aspect of the embodiment of the present invention provides a kind of safe method for switching network, comprising:
The enabled instruction for receiving application starts corresponding application according to the enabled instruction;
The information for obtaining the application determines the application according to the information of the application and preset security classification table
Security classification rank, the information of the preset security classification table storage application and the corresponding relationship of security classification rank;
Currently used network is detected, determines the security level of the currently used network according to testing result;
Compare the security level of the currently used network and the security classification rank of the application;
Handover network is chosen whether according to comparison result.
The second aspect of the embodiment of the present invention provides a kind of safe network switching device, comprising:
Enabled instruction receiving unit is answered for receiving the enabled instruction of application according to enabled instruction starting accordingly
With;
The information acquisition unit of application according to the information of the application and is preset for obtaining the information of the application
Security classification table determine the security classification rank of the application, the information and peace of the preset security classification table storage application
The corresponding relationship of full category level;
The security level determination unit of network, for detecting currently used network, according to testing result determine described in work as
The security level of the preceding network used;
Security level comparing unit, for the security level of the currently used network and the safety of the application
Category level;
Network switching selecting unit, for choosing whether handover network according to comparison result.
The third aspect of the embodiment of the present invention provides a kind of terminal device, including memory, processor and is stored in
In the memory and the computer program that can run on the processor, when the processor executes the computer program
It realizes such as the step of any one of the method for switching network of safety the method.
The fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer program, realizes that the method for switching network such as safety is any when the computer program is executed by processor
The step of item the method.
Existing beneficial effect is the embodiment of the present invention compared with prior art:
Since the comparison result of the security classification rank according to the security level and application of currently used network selects
Select whether handover network, therefore, so that the switching result of network and the security level of currently used network and the peace of application
Full category level is related, in the application access and the matched network of its security level so as to guarantee starting.
Detailed description of the invention
It to describe the technical solutions in the embodiments of the present invention more clearly, below will be to embodiment or description of the prior art
Needed in attached drawing be briefly described, it should be apparent that, the accompanying drawings in the following description is only of the invention some
Embodiment for those of ordinary skill in the art without any creative labor, can also be according to these
Attached drawing obtains other attached drawings.
Fig. 1 is a kind of flow chart for safe method for switching network that the embodiment of the present invention one provides;
Fig. 2 is a kind of structural schematic diagram for mobile terminal that the embodiment of the present invention one provides;
Fig. 3 is a kind of structural schematic diagram of safe network switching device provided by Embodiment 2 of the present invention;
Fig. 4 is the schematic diagram for the terminal device that the embodiment of the present invention three provides.
Specific embodiment
In being described below, for illustration and not for limitation, the tool of such as particular system structure, technology etc is proposed
Body details, to understand thoroughly the embodiment of the present invention.However, it will be clear to one skilled in the art that there is no these specific
The present invention also may be implemented in the other embodiments of details.In other situations, it omits to well-known system, device, electricity
The detailed description of road and method, in case unnecessary details interferes description of the invention.
In order to illustrate technical solutions according to the invention, the following is a description of specific embodiments.
Embodiment one:
Fig. 1 shows a kind of flow chart of safe method for switching network of first embodiment of the invention offer, is described in detail such as
Under:
Step S11 receives the enabled instruction of application, starts corresponding application according to the enabled instruction.
Specifically, when user double-clicks the application icon for the screen for being shown in terminal device, which will be received
The enabled instruction of the application, and start the application;Alternatively, the terminal for installing the application is set when application receives specified message
It is standby to be set as receiving the enabled instruction of the application, and then start the application.
Specifically, when terminal device is mobile terminal, the schematic diagram of the mobile terminal is somebody's turn to do as shown in Fig. 2, in Fig. 2
Mobile terminal includes memory 201, processor 202, input equipment 203, output equipment 204, bus 205.
Step S12 obtains the information of the application, is determined according to the information of the application and preset security classification table
The information of the security classification rank of the application, the preset security classification table storage application is corresponding with security classification rank
Relationship.
Specifically, the information of application include application mark, such as apply title, icon, application packet name.
Specifically, it is divided into corresponding security classification rank to be mounted on each application of terminal device in advance, for example, will
Be related to proprietary information application (as payment class such as each bank payment application) security classification partition of the level be highest, chat
The security classification partition of the level of the application (such as wechat, QQ) of class is time height, and the security classification rank of other application is minimum.
Step S13, detects currently used network, determines safety of the currently used network etc. according to testing result
Grade.
Specifically, security level different for different network settings in advance, for example, the safety of setting mobile data network
Grade highest needs the security level of the wifi network of password to take second place, and the complete grade for not needing the wifi network of password is minimum.
After the setup, it can determine the security level of the currently used network by detecting currently used network.
Step S14, the security level of the currently used network and the security classification rank of the application.
Wherein, the series of the security level of network is identical as the series of security classification rank of application, for example, when network
When the series of security level is 3, the series of the security classification rank of the application is also 3, in this way, the security level of highest network
It is corresponding with the security classification rank of highest application, the security classification rank of the security level of secondary high network and secondary high application
Corresponding, the security level of minimum network is corresponding with the security classification rank of minimum application.For example, if the security level of network
Series be it is minimum, the security classification rank of application be it is time high, then determine peace of the series lower than application of the security level of network
Full category level.
Step S15 chooses whether handover network according to comparison result.
Optionally, the step S15 includes:
Whether A1, the security classification rank for judging the application are highest.
A2, the application security classification rank be highest when, if judging the safety of the currently used network
Grade is lower than the security classification rank of the application, then forces highest from the currently used network switching to security level
Network;If judging, the security level of the currently used network is equal to the security classification rank of the application, forbids cutting
Shift to the network of the security level lower than the currently used network.
In above-mentioned A1 and A2, since the corresponding application of highest security classification rank is to be related to the application of proprietary information,
Guarantee that currently used network is the network of highest security level, can reduce the information as caused by access insecure network and let out
The risk of dew.
Optionally, the security classification rank of application is divided into PA class, PB class and PC class, the security level of network from high to low
It is divided into A class, B class and C class from high to low, at this point, the step S15 includes:
B1, the application security classification rank be PB class when, judge the security level of the currently used network
It whether is A class, when the security level of the currently used network is A class, detection is currently B class with the presence or absence of security level
Available network, security level is the available network of B class if it exists, then from the network switching that security level is A class to safety etc.
Grade is the available network of B class;Security level is the available network of C class if it exists, then does not switch.Specifically, if the safety of application
Category level is PB class, and the security level of currently used network is A class (mobile data network), if detecting the presence of safety
Grade is the available network of B class, then the available network (wifi network for needing password) of B class is switched to, in such manner, it is possible to which saving makes
The flow brought by mobile data network expends;If detecting the presence of the available network that security level is C class, will not switch
To the available network (wifi network for not needing password) of the C class, the safety without the wifi network of password is minimum
But chat class application be related to the personal information of user, therefore, be arranged in this way, can greatly reduce due to being linked into
The risk of information leakage brought by insecure network.
B2, the application security classification rank be PC class when, judge the security level of the currently used network
It whether is A class, when the security level of the currently used network is A class, detection is currently lower than A with the presence or absence of security level
The available network of class, available network if it exists include the network that security level is B class, then are the network of A class from security level
Switch to the available network that security level is B class;Available network if it exists only include security level be C class network, then from
Security level is that network switching to the security level of A class is the available network of C class, if it does not exist security level lower than A class can
With network, then do not switch;When the security level of the currently used network is B class, do not switch;Described currently used
When the security level of network is C class, detection is currently the available network of B class with the presence or absence of security level, there are security levels
For B class available network when, from currently used network switching to security level be B class available network.It should be pointed out that
It is B class (alternatively, the security level in the currently used network is C class in the security level of the currently used network
And there is currently no the available networks that security level is B class) when, if judging the signal strength of currently used network lower than pre-
If signal threshold value, then from currently used network switching to security level be A class available network, to guarantee the smooth of network
It is logical.Further, since mobile data network will generate certain rate, it is the available of A class when switching to security level
When network, corresponding prompt information is issued, so that user knows.
It optionally, is mobile data network since security level is Class A Network, if security classification rank is PC class
Application always using the security level be Class A Network will generate certain campus network, in order to reduce the expense, step B2
In security level if it does not exist be lower than A class available network, then do not switch and specifically include: if it does not exist security level be B class
With the network of C class, then count the security classification rank be PC class apply be using the security level at this A class network
The flow of consuming prompts user if the flow expended is greater than or equal to preset flow threshold, alternatively, disconnecting and the peace
Congruent grade is the connection of the network of A class and prompts user, if the flow expended is less than preset flow threshold, continues to use institute
State the network that security level is A class.
Optionally, due to the wifi network for needing password may have it is multiple, and the signal strength of heterogeneous networks also usually not
Together, therefore, in order to improve communication quality, then the step S15 includes:
C1, the application security classification rank be PB class, and the security level of the currently used network be B
When class, detection is current, and whether there is also the available networks that other security levels are B class.
If C2, there is also the available networks that other security levels are B class, judge other described security levels as B class
Whether the signal strength of available network is higher than the signal strength of the currently used network, is B in other described security levels
When the signal strength of the available network of class is higher than the signal strength of the currently used network, from currently used network switching
It is the available network of B class to other described security levels, in the signal strength for the available network that other described security levels are B class
Equal to or less than the currently used network signal strength when, then do not switch.
Optionally, in above-mentioned C1, other security levels are the available network of B class if it does not exist, but are A there are security level
The available network of class, then judge whether the signal strength of the currently used network is lower than preset signal threshold value, if so,
It is the available network of A class from currently used network switching to security level.It is PB class in the security classification rank of the application
When, show that the application is more important application, is B class in the security level of the currently used network and judges current
When the signal strength of the network used is lower, switching to the available network (mobile data network) that security level is A class can be protected
Demonstrate,prove the unimpeded of network.Further, since mobile data network will generate certain rate, when switching to security level
For A class available network when, corresponding prompt information is issued, so that user knows.
In first embodiment of the invention, the enabled instruction of application is received, corresponding application is started according to the enabled instruction,
The information for obtaining the application determines the safety point of the application according to the information of the application and preset security classification table
Class rank, the information of the preset security classification table storage application and the corresponding relationship of security classification rank, detection currently make
Network determines the security level of the currently used network, the currently used network according to testing result
Security level and the application security classification rank, handover network is chosen whether according to comparison result.Due to according to current
The comparison result of the security level of the network used and the security classification rank of the application chooses whether handover network, therefore,
So that the switching result of network is related with the security level of currently used network and the security classification rank of application, so as to
Enough guarantee in the application access and the matched network of its security level of starting.
Embodiment two:
Corresponding with a kind of safe method for switching network that embodiment one provides, Fig. 3 shows second embodiment of the invention
A kind of structural schematic diagram of the safe network switching device provided, the network switching device of the safety can be applied to terminal device
In, for ease of description, only parts related to embodiments of the present invention are shown:
The network switching device of the safety includes: enabled instruction receiving unit 31, the information acquisition unit 32 of application, network
Security level determination unit 33, security level comparing unit 34, network switching selecting unit 35.Wherein:
Enabled instruction receiving unit 31 starts corresponding for receiving the enabled instruction of application according to the enabled instruction
Using.
Specifically, when user double-clicks the application icon for the screen for being shown in terminal device, which will be received
The enabled instruction of the application, and start the application;Alternatively, the terminal for installing the application is set when application receives specified message
It is standby to be set as receiving the enabled instruction of the application, and then start the application.
The information acquisition unit 32 of application, for obtaining the information of the application, according to the information of the application and in advance
If security classification table determine the security classification rank of the application, the information of the preset security classification table storage application with
The corresponding relationship of security classification rank.
Specifically, the information of application include application mark, such as apply title, icon, application packet name.
Specifically, it is divided into corresponding security classification rank to be mounted on each application of terminal device in advance, for example, will
Be related to proprietary information application (as payment class such as each bank payment application) security classification partition of the level be highest, chat
The security classification partition of the level of the application (such as wechat, QQ) of class is time height, and the security classification rank of other application is minimum.
The security level determination unit 33 of network, for detecting currently used network, according to testing result determine described in
The security level of currently used network.
Specifically, security level different for different network settings in advance, for example, the safety of setting mobile data network
Grade highest needs the security level of the wifi network of password to take second place, and the complete grade for not needing the wifi network of password is minimum.
After the setup, it can determine the security level of the currently used network by detecting currently used network.
Security level comparing unit 34, for the security level of the currently used network and the peace of the application
Full category level.
Wherein, the series of the security level of network is identical as the series of security classification rank of application, in this way, highest net
The security level of network is corresponding with the security classification rank of highest application, the security level of secondary high network and secondary high application
Security classification rank is corresponding, and the security level of minimum network is corresponding with the security classification rank of minimum application.
Network switching selecting unit 35, for choosing whether handover network according to comparison result.
Optionally, the network switching selecting unit 35 includes:
Security classification rank judgment module, for judging whether the security classification rank of the application is highest;
First network switch selecting module, for the security classification rank in the application be highest when, if judging institute
The security level for stating currently used network is lower than the security classification rank of the application, then forces from the currently used net
Network switches to the highest network of security level;If judging, the security level of the currently used network is equal to the application
Security classification rank then forbids the network for switching to the security level lower than the currently used network.
Optionally, the security classification rank of application is divided into PA class, PB class and PC class, the security level of network from high to low
It is divided into A class, B class and C class from high to low, at this point, the network switching selecting unit 35 includes:
When second network switching selecting module for the security classification rank in the application is PB class, work as described in judgement
Whether the security level of the preceding network used is A class, and when the security level of the currently used network is A class, detection is worked as
Preceding to whether there is the available network that security level is B class, security level is the available network of B class if it exists, then from security level
Network switching to security level for A class is the available network of B class;Security level is the available network of C class if it exists, then does not cut
It changes;
When third network switching selecting module for the security classification rank in the application is PC class, work as described in judgement
Whether the security level of the preceding network used is A class, and when the security level of the currently used network is A class, detection is worked as
The preceding available network for being lower than A class with the presence or absence of security level, available network if it exists include the network that security level is B class,
It is then the available network of B class from the network switching that security level is A class to security level;Available network if it exists only includes peace
Congruent grade is the network of C class, then is the available network of C class from the network switching that security level is A class to security level, if not depositing
It is lower than the available network of A class in security level, then does not switch;When the security level of the currently used network is B class, no
Switching;The currently used network security level be C class when, detection currently with the presence or absence of security level be B class can
It is B class from currently used network switching to security level when there are the available network that security level is B class with network
Available network.
It optionally, is mobile data network since security level is Class A Network, if security classification rank is PC class
Application always using the security level be Class A Network will generate certain campus network, in order to reduce the expense, the third net
Network switches the available network that the security level if it does not exist in selecting module is lower than A class, then does not switch and specifically include: if it does not exist
Security level is the network of B class and C class, then counting the security classification rank is that applying for PC class uses the safety etc. at this
Grade is the flow that the network of A class expends, if the flow expended prompts user more than or equal to preset flow threshold, alternatively,
It disconnects the connection with the network that the security level is A class and prompts user, if the flow expended is less than preset flow threshold,
Then continue to use the network that the security level is A class.
Optionally, due to the wifi network for needing password may have it is multiple, and the signal strength of heterogeneous networks also usually not
Together, therefore, in order to improve communication quality, the network switching selecting unit 35 includes:
Available network detection module is PB class for the security classification rank in the application, and described currently used
The security level of network when being B class, detection is current, and whether there is also the available networks that other security levels are B class.
Signal strength judgment module, described in when there is also the available network that other security levels are B class, then judging
Other security levels are whether the signal strength of the available network of B class is higher than the signal strength of the currently used network,
When other described security levels are that the signal strength of the available network of B class is higher than the signal strength of the currently used network,
It is the available network of B class from currently used network switching to other described security levels, is B class in other described security levels
Available network signal strength be equal to or less than the currently used network signal strength when, then do not switch.
Optionally, the network switching selecting unit 35 further include:
Available network switching module for the available network that other security levels are B class to be not present, but exists safe etc.
When grade is the available network of A class, then judge whether the signal strength of the currently used network is lower than preset signal threshold value,
If so, being the available network of A class from currently used network switching to security level.Further, due to mobile data network
Network will generate certain rate, therefore, when switching to the available network that security level is A class, issue corresponding prompt information,
So that user knows.
In second embodiment of the invention, due to according to the security level of currently used network and the safety point of the application
The comparison result of class rank chooses whether handover network, therefore, so that the peace of the switching result of network and currently used network
Congruent grade and the security classification rank of application are related, so as to guarantee that it is matched with its security level that the application of starting is accessed
In network.
Embodiment three:
Fig. 4 is the schematic diagram for the terminal device that one embodiment of the invention provides.As shown in figure 4, the terminal of the embodiment is set
Standby 4 include: processor 40, memory 41 and are stored in the meter that can be run in the memory 41 and on the processor 40
Calculation machine program 42.The processor 40 realizes that above-mentioned each wifi hotspot management method is implemented when executing the computer program 42
Step in example, such as step S11 to S15 shown in FIG. 1.Alternatively, when the processor 40 executes the computer program 42
Realize the function of each module/unit in above-mentioned each Installation practice, such as the function of module 31 to 35 shown in Fig. 3.
Illustratively, the computer program 42 can be divided into one or more module/units, it is one or
Multiple module/units are stored in the memory 41, and are executed by the processor 40, to complete the present invention.Described one
A or multiple module/units can be the series of computation machine program instruction section that can complete specific function, which is used for
Implementation procedure of the computer program 42 in the terminal device 4 is described.For example, the computer program 42 can be divided
It is more single to be cut into enabled instruction receiving unit, the information acquisition unit of application, security level determination unit, the security level of network
Member, network switching selecting unit.Each unit concrete function is as follows:
Enabled instruction receiving unit is answered for receiving the enabled instruction of application according to enabled instruction starting accordingly
With;
The information acquisition unit of application according to the information of the application and is preset for obtaining the information of the application
Security classification table determine the security classification rank of the application, the information and peace of the preset security classification table storage application
The corresponding relationship of full category level;
The security level determination unit of network, for detecting currently used network, according to testing result determine described in work as
The security level of the preceding network used;
Security level comparing unit, for the security level of the currently used network and the safety of the application
Category level;
Network switching selecting unit, for choosing whether handover network according to comparison result.
The terminal device 4 can be the calculating such as desktop PC, notebook, palm PC and cloud server and set
It is standby.The terminal device may include, but be not limited only to, processor 40, memory 41.It will be understood by those skilled in the art that Fig. 4
The only example of terminal device 4 does not constitute the restriction to terminal device 4, may include than illustrating more or fewer portions
Part perhaps combines certain components or different components, such as the terminal device can also include input-output equipment, net
Network access device, bus etc..
Alleged processor 40 can be central processing unit (Central Processing Unit, CPU), can also be
Other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit
(Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-
Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic,
Discrete hardware components etc..General processor can be microprocessor or the processor is also possible to any conventional processor
Deng.
The memory 41 can be the internal storage unit of the terminal device 4, such as the hard disk or interior of terminal device 4
It deposits.The memory 41 is also possible to the External memory equipment of the terminal device 4, such as be equipped on the terminal device 4
Plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card dodge
Deposit card (Flash Card) etc..Further, the memory 41 can also both include the storage inside list of the terminal device 4
Member also includes External memory equipment.The memory 41 is for storing needed for the computer program and the terminal device
Other programs and data.The memory 41 can be also used for temporarily storing the data that has exported or will export.
It is apparent to those skilled in the art that for convenience of description and succinctly, only with above-mentioned each function
Can unit, module division progress for example, in practical application, can according to need and by above-mentioned function distribution by different
Functional unit, module are completed, i.e., the internal structure of described device is divided into different functional unit or module, more than completing
The all or part of function of description.Each functional unit in embodiment, module can integrate in one processing unit, can also
To be that each unit physically exists alone, can also be integrated in one unit with two or more units, it is above-mentioned integrated
Unit both can take the form of hardware realization, can also realize in the form of software functional units.In addition, each function list
Member, the specific name of module are also only for convenience of distinguishing each other, the protection scope being not intended to limit this application.Above system
The specific work process of middle unit, module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, is not described in detail or remembers in some embodiment
The part of load may refer to the associated description of other embodiments.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The scope of the present invention.
In embodiment provided by the present invention, it should be understood that disclosed device/terminal device and method, it can be with
It realizes by another way.For example, device described above/terminal device embodiment is only schematical, for example, institute
The division of module or unit is stated, only a kind of logical function partition, there may be another division manner in actual implementation, such as
Multiple units or components can be combined or can be integrated into another system, or some features can be ignored or not executed.Separately
A bit, shown or discussed mutual coupling or direct-coupling or communication connection can be through some interfaces, device
Or the INDIRECT COUPLING or communication connection of unit, it can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated module/unit be realized in the form of SFU software functional unit and as independent product sale or
In use, can store in a computer readable storage medium.Based on this understanding, the present invention realizes above-mentioned implementation
All or part of the process in example method, can also instruct relevant hardware to complete, the meter by computer program
Calculation machine program can be stored in a computer readable storage medium, the computer program when being executed by processor, it can be achieved that on
The step of stating each embodiment of the method.Wherein, the computer program includes computer program code, the computer program generation
Code can be source code form, object identification code form, executable file or certain intermediate forms etc..The computer-readable medium
It may include: any entity or device, recording medium, USB flash disk, mobile hard disk, magnetic that can carry the computer program code
Dish, CD, computer storage, read-only memory (ROM, Read-Only Memory), random access memory (RAM,
Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..It should be noted that described
The content that computer-readable medium includes can carry out increasing appropriate according to the requirement made laws in jurisdiction with patent practice
Subtract, such as does not include electric carrier signal and electricity according to legislation and patent practice, computer-readable medium in certain jurisdictions
Believe signal.
Embodiment described above is merely illustrative of the technical solution of the present invention, rather than its limitations;Although referring to aforementioned reality
Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each
Technical solution documented by embodiment is modified or equivalent replacement of some of the technical features;And these are modified
Or replacement, the spirit and scope for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution should all
It is included within protection scope of the present invention.
Claims (8)
1. a kind of safe method for switching network characterized by comprising
The enabled instruction for receiving application starts corresponding application according to the enabled instruction;
The information for obtaining the application determines the peace of the application according to the information of the application and preset security classification table
Full category level, the information of the preset security classification table storage application and the corresponding relationship of security classification rank;
Currently used network is detected, determines the security level of the currently used network, setting movement according to testing result
The security level highest of data network, needs the security level of the wifi network of password to take second place, and does not need the wifi network of password
Security level it is minimum;
Compare the security level of the currently used network and the security classification rank of the application, wherein the safety of network
The series of grade is identical as the series of security classification rank of application;
Handover network is chosen whether according to comparison result;
The security classification rank of application is divided into PA class, PB class and PC class from high to low, and the security level of network is drawn from high to low
It is divided into A class, B class and C class, at this point, described choose whether handover network according to comparison result, comprising:
When the security classification rank of the application is PB class, judge whether the security level of the currently used network is A
Class, when the security level of the currently used network is A class, detection is currently the available of B class with the presence or absence of security level
Network, it is then B class from the network switching that security level is A class to security level that security level, which is the available network of B class, if it exists
Available network;Security level is the available network of C class if it exists, then does not switch;
When the security classification rank of the application is PC class, judge whether the security level of the currently used network is A
Class, the currently used network security level be A class when, detection currently with the presence or absence of security level lower than A class can
With network, available network if it exists includes the network that security level is B class, then from the network switching that security level is A class to
Security level is the available network of B class;Available network if it exists only includes the network that security level is C class, then from safety etc.
It is the available network of C class that grade, which is network switching to the security level of A class, and security level is lower than the available network of A class if it does not exist,
Do not switch then;When the security level of the currently used network is B class, do not switch;In the currently used network
When security level is C class, detection is currently the available network of B class with the presence or absence of security level, is being B class there are security level
It is the available network of B class from currently used network switching to security level when available network.
2. the method for switching network of safety as described in claim 1, which is characterized in that described to be chosen whether according to comparison result
Handover network, comprising:
Whether the security classification rank for judging the application is highest;
When the security classification rank of the application is highest, if judging, the security level of the currently used network is lower than
The security classification rank of the application is then forced from the currently used network switching to the highest network of security level;If
Judge that the security level of the currently used network is equal to the security classification rank of the application, then forbids switching to being lower than
The network of the security level of the currently used network.
3. the method for switching network of safety as described in claim 1, which is characterized in that described to be chosen whether according to comparison result
Handover network, comprising:
It is PB class in the security classification rank of the application, and when the security level of the currently used network is B class, inspection
Survey currently whether there is also the available networks that other security levels are B class;
If judging other described security levels as the available network of B class there is also the available network that other security levels are B class
Signal strength whether be higher than the signal strength of the currently used network, be the available of B class in other described security levels
The signal strength of network be higher than the currently used network signal strength when, from currently used network switching to it is described its
His security level is the available network of B class, is equal to or low in the signal strength for the available network that other described security levels are B class
When the signal strength of the currently used network, then do not switch.
4. the method for switching network of safety as claimed in claim 3, which is characterized in that other security levels are B if it does not exist
The available network of class, but there are the available network that security level is A class, then judge the signal strength of the currently used network
Whether preset signal threshold value is lower than, if so, being the available network of A class from currently used network switching to security level.
5. a kind of safe network switching device characterized by comprising
Enabled instruction receiving unit starts corresponding application according to the enabled instruction for receiving the enabled instruction of application;
The information acquisition unit of application, for obtaining the information of the application, according to the information of the application and preset peace
Full classification chart determines the security classification rank of the application, the information and safety point of the preset security classification table storage application
The corresponding relationship of class rank;
The security level determination unit of network, for detecting currently used network, determine described currently makes according to testing result
The security level highest of mobile data network is arranged in the security level of network, needs safety of the wifi network of password etc.
Grade is taken second place, and the security level for not needing the wifi network of password is minimum;
Security level comparing unit, for the security level of the currently used network and the security classification of the application
Rank, wherein the series of the security level of network is identical as the series of security classification rank of application;
Network switching selecting unit, for choosing whether handover network according to comparison result;
The security classification rank of application is divided into PA class, PB class and PC class from high to low, and the security level of network is drawn from high to low
It is divided into A class, B class and C class, at this point, the network switching selecting unit includes:
When second network switching selecting module for the security classification rank in the application is PB class, judge described currently to make
Whether the security level of network is A class, and when the security level of the currently used network is A class, detection is currently
No there are the available networks that security level is B class, and security level is the available network of B class if it exists, then are A class from security level
Network switching to security level be B class available network;Security level is the available network of C class if it exists, then does not switch;
When third network switching selecting module for the security classification rank in the application is PC class, judge described currently to make
Whether the security level of network is A class, and when the security level of the currently used network is A class, detection is currently
It is no there are security level be lower than A class available network, available network if it exists include security level be B class network, then from
Security level is that network switching to the security level of A class is the available network of B class;Available network if it exists only includes safety etc.
Grade is the network of C class, then is the available network of C class from the network switching that security level is A class to security level, pacifies if it does not exist
Congruent grade is lower than the available network of A class, then does not switch;When the security level of the currently used network is B class, do not cut
It changes;When the security level of the currently used network is C class, detection is currently the available of B class with the presence or absence of security level
Network, there are security level be B class available network when, from currently used network switching to security level for B class can
Use network.
6. the network switching device of safety as claimed in claim 5, which is characterized in that the network switching selecting unit packet
It includes:
Security classification rank judgment module, for judging whether the security classification rank of the application is highest;
First network switches selecting module, when for the security classification rank in the application being highest, if judging described work as
The security level of the preceding network used is lower than the security classification rank of the application, then forces to cut from the currently used network
Shift to the highest network of security level;If judging, the security level of the currently used network is equal to the safety of the application
Category level then forbids the network for switching to the security level lower than the currently used network.
7. a kind of terminal device, including memory, processor and storage are in the memory and can be on the processor
The computer program of operation, which is characterized in that the processor realizes such as Claims 1-4 when executing the computer program
The step of any one the method.
8. a kind of computer readable storage medium, the computer-readable recording medium storage has computer program, and feature exists
In when the computer program is executed by processor the step of any one of such as Claims 1-4 of realization the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710667177.0A CN107404740B (en) | 2017-08-07 | 2017-08-07 | Method for switching network, device and the terminal device of safety |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710667177.0A CN107404740B (en) | 2017-08-07 | 2017-08-07 | Method for switching network, device and the terminal device of safety |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107404740A CN107404740A (en) | 2017-11-28 |
CN107404740B true CN107404740B (en) | 2019-04-12 |
Family
ID=60402043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710667177.0A Active CN107404740B (en) | 2017-08-07 | 2017-08-07 | Method for switching network, device and the terminal device of safety |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107404740B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108616947A (en) * | 2018-04-11 | 2018-10-02 | 维沃移动通信有限公司 | A kind of method and apparatus of network switching |
CN110362359A (en) * | 2019-07-11 | 2019-10-22 | 重庆传音通讯技术有限公司 | A kind of program starting method, apparatus, terminal and storage medium |
CN110417470B (en) * | 2019-09-03 | 2021-07-27 | Oppo广东移动通信有限公司 | Network switching method based on visible light communication and related product |
CN111148188B (en) * | 2019-12-30 | 2022-11-04 | Oppo广东移动通信有限公司 | Network connection method, device, storage medium and electronic equipment |
CN111988824A (en) * | 2020-08-31 | 2020-11-24 | 北京字节跳动网络技术有限公司 | Network switching method and device, electronic equipment and storage medium |
CN113852962A (en) * | 2021-08-20 | 2021-12-28 | 荣耀终端有限公司 | Network connection control method, device, storage medium and software program product |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN103561404A (en) * | 2013-10-22 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for having access to network |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
CN105550591A (en) * | 2015-12-10 | 2016-05-04 | 厦门美图移动科技有限公司 | Security protection device and method for user data in mobile terminal |
CN106096393A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of application control method and device |
CN106211164A (en) * | 2016-07-28 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | Terminal network changing method, terminal network switching device and terminal |
-
2017
- 2017-08-07 CN CN201710667177.0A patent/CN107404740B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102573107A (en) * | 2010-11-22 | 2012-07-11 | 三星电子株式会社 | Apparatus and method for connecting an access point in portable terminal |
CN103561404A (en) * | 2013-10-22 | 2014-02-05 | 宇龙计算机通信科技(深圳)有限公司 | Method and device for having access to network |
CN104902479A (en) * | 2015-05-20 | 2015-09-09 | 玉环看知信息科技有限公司 | Network security management equipment and method and mobile terminal |
CN105550591A (en) * | 2015-12-10 | 2016-05-04 | 厦门美图移动科技有限公司 | Security protection device and method for user data in mobile terminal |
CN106096393A (en) * | 2016-06-07 | 2016-11-09 | 广东欧珀移动通信有限公司 | A kind of application control method and device |
CN106211164A (en) * | 2016-07-28 | 2016-12-07 | 宇龙计算机通信科技(深圳)有限公司 | Terminal network changing method, terminal network switching device and terminal |
Also Published As
Publication number | Publication date |
---|---|
CN107404740A (en) | 2017-11-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107404740B (en) | Method for switching network, device and the terminal device of safety | |
CN107295594B (en) | Method for switching network, device and mobile terminal | |
CN107484190B (en) | Method for connecting network, mobile terminal and computer readable storage medium | |
CN108196458A (en) | Intelligent home equipment control method, device and terminal device | |
CN110225104A (en) | Data capture method, device and terminal device | |
CN112804697B (en) | Network distribution method and device for equipment to be networked, electronic equipment and computer readable medium | |
CN107277896B (en) | Wifi hotspot management method, device and terminal device | |
CN107222898A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN107277878A (en) | Method for switching network, device and mobile terminal | |
CN108494972A (en) | A kind of message prompt method, prompting message device and mobile terminal | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
CN110505516A (en) | A kind of throwing screen control method, device and system | |
CN109561329A (en) | Control method, mobile terminal and the computer readable storage medium of smart television | |
CN105049452B (en) | Switching method, device and the intelligent terminal of resource downloading mode | |
CN107037294A (en) | The detection method and detecting system of a kind of host computer, frequency conversion integrated board | |
CN107333286B (en) | Wifi hotspot connection management method, apparatus and terminal device | |
CN107277815A (en) | Wifi hotspot management method, device and terminal device | |
CN109068355A (en) | A kind of method, phone wrist-watch, server and mobile terminal for saving data traffic | |
CN108738092A (en) | Method for switching network and Related product | |
CN107124719A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN108536512A (en) | interface switching method, device and terminal device | |
CN107103468A (en) | Network risks detection method, mobile terminal and computer-readable recording medium | |
CN107277877A (en) | Method for switching network, mobile terminal and computer-readable recording medium | |
CN107708176A (en) | A kind of method for connecting network, network connection device and mobile terminal | |
CN107426780B (en) | Wifi hotspot management method, device and terminal device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant after: OPPO Guangdong Mobile Communications Co., Ltd. Address before: 523860 No. 18, Wu Sha Beach Road, Changan Town, Dongguan, Guangdong Applicant before: Guangdong OPPO Mobile Communications Co., Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |