CN107454099A - A kind of secure data management method, terminal and computer-readable recording medium - Google Patents
A kind of secure data management method, terminal and computer-readable recording medium Download PDFInfo
- Publication number
- CN107454099A CN107454099A CN201710766584.7A CN201710766584A CN107454099A CN 107454099 A CN107454099 A CN 107454099A CN 201710766584 A CN201710766584 A CN 201710766584A CN 107454099 A CN107454099 A CN 107454099A
- Authority
- CN
- China
- Prior art keywords
- terminal
- network
- secure data
- wlan
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0272—Virtual private networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W84/00—Network topologies
- H04W84/02—Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
- H04W84/10—Small scale networks; Flat hierarchical networks
- H04W84/12—WLAN [Wireless Local Area Networks]
Abstract
The invention discloses a kind of secure data management method, terminal and computer-readable recording medium, this method is by monitoring whether secure data is called, when monitoring that secure data is called, terminal is controlled to access VPN by used data network, then VPN is passed through, data finishing service safe to use, in this process, based on the secure private in VPN during data transfer, the WLAN that secure data will not be accessed by disabled user by terminal is stolen, it ensure that the security of secure data, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance the usage experience of user.
Description
Technical field
The present invention relates to data security arts, more specifically to a kind of secure data management method, terminal and calculating
Machine readable storage medium storing program for executing.
Background technology
The bank card information of secure data, such as user, wechat Alipay payment information, used once will be given by unauthorized theft
Bring immeasurable loss in family.
With the development of the terminal technology such as mobile phone, user becomes increasingly dependent on mobile phone and moves payment etc.;Meanwhile trade company etc.
In order to attract customer, free WLAN can be also provided, for users to use.User is using mobile phone access WLAN
Afterwards, the data of mobile phone and network side may be illegally to steal, now, if user calls secure data to carry out business, these
Secure data can also have potential safety hazard.
The content of the invention
The technical problem to be solved in the present invention is that terminal access WLAN causes secure data potential safety hazard to be present,
For the technical problem, there is provided a kind of secure data management method, terminal and computer-readable recording medium.
In order to solve the above technical problems, the invention provides a kind of secure data management method, including:
Secure data is monitored whether by pending calling service;
If so, terminal is then controlled, by Virtual Private Network, to be used by used data network access virtual special network
Secure data completes pending business.
Optionally, after monitoring secure data by pending calling service, control terminal for accessing virtual private network it
Before, in addition to:
Obtain the network parameter of data network used in terminal;
According to network parameter, judge whether data network used in terminal is safe;
If data network is dangerous used in terminal, terminal for accessing virtual private network is controlled.
Optionally, network parameter includes the network type of data network, judges whether communication network used in terminal pacifies
Include entirely:
Judge whether network type is WLAN;
If network type is WLAN, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous,
Also include:
Obtain the positional information of terminal;
According to positional information, judge whether terminal is in home;
If terminal is not in home, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous,
Also include:
Obtain the access way of terminal access WLAN;
According to access way, judge whether WLAN is secure network;
If WLAN is not secure network, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous,
Also include:
Obtain the network parameter of WLAN;
Network parameter is sent to authentication server;
Receive the result that authentication server returns;
If it is dangerous that the result characterizes WLAN, judge that data network used in terminal is dangerous.
Optionally, control terminal for accessing virtual private network includes:
Terminal is controlled to open Virtual Private Network function;
By data network used in terminal, the security server in Virtual Private Network is accessed;
The Virtual Private Network connection established between terminal and security server.
Optionally, security server is the routing device for being arranged on home, the safety in Virtual Private Network is accessed
Before server, in addition to:Terminal is controlled to open the Virtual Private Network function of routing device by remote control.
Further, present invention also offers a kind of terminal, terminal to include processor, memory and communication bus;Communication
Bus is used to realize the connection communication between processor and memory;Processor be used to performing stored in memory one or
Multiple programs, the step of to realize secure data management method provided by the invention.
Further, present invention also offers a kind of computer-readable recording medium, it is characterised in that computer-readable to deposit
Storage media is stored with one or more program, and one or more program can be by one or more computing device, with reality
The step of existing secure data management method provided by the invention.
Beneficial effect
The present invention provides a kind of secure data management method, terminal and computer-readable recording medium, for existing terminal
Access WLAN causes secure data the defects of potential safety hazard to be present, by monitoring whether secure data is called, is supervising
Measure secure data it is called when, control terminal passes through used data network and accesses VPN (Virtual Private
Network, Virtual Private Network), then pass through VPN, data finishing service safe to use, in this process, based on data in VPN
Secure private during transmission, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and are protected
The security of secure data is demonstrate,proved, solving existing terminal access WLAN causes secure data asking for potential safety hazard to be present
Topic, enhance the usage experience of user.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram for realizing each optional mobile terminal of embodiment one of the present invention.
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the secure data management method basic flow sheet that first embodiment of the invention provides;
Fig. 4 is the secure data management method refined flow chart that second embodiment of the invention provides;
Fig. 5 is the secure data management method refined flow chart that third embodiment of the invention provides;
Fig. 6 is the secure data management method refined flow chart that fourth embodiment of the invention provides;
Fig. 7 is the secure data management method refined flow chart that fifth embodiment of the invention provides;
Fig. 8 is the secure data management method refined flow chart that sixth embodiment of the invention provides;
Fig. 9 is the structural representation for the terminal that seventh embodiment of the invention provides;
Figure 10 be the present embodiments relate to VPN functions configuration interface schematic diagram;
Figure 11 be the present embodiments relate to access interface interface schematic diagram;
Figure 12 be the present embodiments relate to white list configuration interface schematic diagram.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only
Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix
Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board
Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable
Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move
Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special
Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting
Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit
103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit
108th, the part such as memory 109, processor 110, power supply 111 and antenna 112.Wherein, in the mobile terminal 100 shown in Fig. 1
Including at least three groups of antennas 112, at least three groups of antennas 112 currently with the main transmitting-receiving communication of mobile terminal 100
For primary antenna, currently connected with the auxiliary receiving path of mobile terminal 100 supplemented by antenna, remaining is spare antenna, processor
110 can control each group of antenna respectively with it is main transmitting-receiving path and auxiliary receiving path break-make situation, when processor 110 control certain
When one group of antenna is with main transmitting-receiving communication, radio frequency unit 101 can be received or be sent signal by this group of antenna, it should be understood that
It is that at least three groups of antennas 112 can be flexibly arranged on the optional position of mobile terminal 100, such as, work as mobile terminal
When including three groups of antennas 112 on 100, this three groups of antennas 112 can be separately positioned on the top at the back side of mobile terminal 100, lower-left
Side and lower right.Those skilled in the art are further appreciated that the mobile terminal structure shown in Fig. 1 is not formed to mobile whole
The restriction at end, mobile terminal can be included than illustrating more or less parts, either combine some parts or different portions
Part is arranged.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station
Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate
Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication
Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications
System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code
Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division
Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code
Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division
Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division
Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102
Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows
Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need
To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100
When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or
It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103
The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared
Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor
(Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode
Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out
Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited
Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike
Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042
Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can
To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model.
Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound
Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies
Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment
The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear
Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general
For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture
(such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.;
The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer,
The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap
Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used
Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal
The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with
And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it
(for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071
Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection
Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band
The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it
Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can
To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel
1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap
Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc.
One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or
After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing
The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel
1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can
Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically
Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example,
External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing
Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end
Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number
It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with
For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area
And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function
Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as
Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy
The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection
Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage
Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place
Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated
Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main
Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111
Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put
The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the wireless communication system involved by the mobile terminal of the present invention is entered below
Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system
Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used
Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands
Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation
204。
Specifically, UE201 can be above-mentioned user terminal 100, and here is omitted, including the first user below related to
The second user terminal UE 2012 that the first user terminal UE2011 and second user used is used.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning
Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203,
ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS
(Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way,
Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and
Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and
The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers
Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc.
The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP
Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources
Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia
System) or other IP operations etc., in the present invention, IP operation 204 can be system update service, then corresponding, system clothes
Business device will also be realized by the entity device or virtual unit of realizing IP operation 204.
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only
Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with
And following new network system etc., do not limit herein.
Based on above-mentioned mobile subscriber terminal hardware configuration and communications network system, each implementation of the inventive method is proposed
Example.
First embodiment
Fig. 3 is the secure data management method basic flow sheet that the present embodiment provides, and the secure data management method includes:
Whether S301, monitoring secure data are by pending calling service;If so, step S302 is then performed, if it is not, then returning
Perform step S301.
In embodiments of the present invention, the secure data bank card information of terminal memory storage, the payment accounts such as including mobile phone
Account and encrypted message, and user inputted by mobile phone identifying code, identity information, bank card information etc..
In actual applications, it is necessary to call the business of secure data to be generally two kinds:One kind is payment transaction, and user uses
The payment platforms such as wechat, Alipay move payment, such as wechat barcode scanning is paid, and group of U.S. is paid by wechat, webpage
Input the business such as bank card payment;One kind is registration business, it is necessary to defeated when user downloads new opplication or needs to open new business
Access customer information is registered etc., such as user applies for that bank card online payment function needs to input identity information and bank card letter
Breath etc..
In some embodiments of the invention, it can be judged whether by service application that monitoring terminal user is used
Occur secure data be called, terminal can with some intended application functions of default setting, or according to user's operation setting some
Intended application function, for example, wechat is applied into the barcode scanning payment function of the inside as intended application function etc., when monitoring these
When intended application function is needed to perform as pending business, it is believed that secure data is called.In some embodiments of the invention
In, intended application function can also include wechat application the inside bank settlement function, Alipay application the inside bank settlement function,
Barcode scanning payment function of Alipay application the inside etc..
In some embodiments of the invention, it can be judged whether by operation interface that monitoring terminal user is used
There is secure data to be called, terminal can with some keywords of default setting, or according to some keywords of user's operation setting,
For example, the field such as " identity card ", " bank's card number " is operated into boundary as critical field when monitoring that these critical fielies appear in
When in face, it is believed that secure data is called.In some embodiments of the invention, operation interface includes but is not limited to webpage, answered
With interface etc..
S302, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion;
VPN is a new network, has been provided the user a kind of safely special to enterprises by common network
The connected mode that network is remotely accessed.Realize VPN connections, it is necessary to be configured with a stylobate in Windows NT or
On the one hand Windows2000 Server vpn server, vpn server connect dedicated network, are on the other hand connected to
Internet, that is to say, that vpn server must possess a public IP address.When client computer by VPN connections with it is special
When computer in network is communicated, all data are first sent to VPN services by ISP (internet service provider)
Device, then it is responsible for by vpn server all data being sent to object-computer again.Technologies of the VPN for the use of three is protected
The security of communication is demonstrate,proved:Tunnel protocol, authentication and data encryption.Client computer sends request, VPN clothes to vpn server
Business device respond request simultaneously sends identity challenge to client computer, and the response message of encryption is sent to vpn server, VPN by client computer
Server checks the response according to customer data base, if account is effective, it is long-range that vpn server will check whether the user has
Access rights, if the user possesses the authority of remote access, vpn server receives this connection, produced in authentication process itself
Raw client-server Public Key will be used for that data are encrypted.
Understood based on foregoing description, when terminal passes through VPN, when data safe to use carry out pending business, secure data
Shi Anquan's, therefore, even if communication network is dangerous used in terminal, secure data will not also carry out pending business
When, illegally stolen.
Therefore, in some embodiments of the invention, before step S301, in addition to the step of configuration VPN functions.
In some embodiments of the invention, VPN functions are configured, as shown in Figure 10, configure trigger condition, the clothes of VPN functions
Device IP address, the communication protocol of being engaged in and the parameters such as key that communicate.Wherein, server ip address, communication protocol and communication key are VPN
The special parameter of business according to actual vpn service, it is necessary to realize parameter to set, in some embodiments of the invention, VPN clothes
Business device can be private server, and user obtains the parameters such as server ip address or user by buying VPN services
Voluntarily by the routing device of safety, as the be in home router of the inside of user installation realizes that user passes through remote control
Home router open VPN functions, then using the external IP of home router be used as server ip address, and personalization selection
Communication protocol and communication key, the VPN passages then established between terminal and home router, on this basis, pass through family expenses
Router come complete pay etc. business.
In some embodiments of the invention, this step S302 specific implementation step is as follows:
Terminal is controlled to open Virtual Private Network function;
By data network used in terminal, the security server in Virtual Private Network is accessed;
The Virtual Private Network connection established between terminal and security server.
In other embodiment of the present invention, security server is the routing device for being arranged on home, this time step
Rapid S302 before the security server in accessing Virtual Private Network, in addition to:Control terminal to open by remote control to route
The Virtual Private Network function of equipment.
In some embodiments of the invention, trigger condition includes service parameter triggering and network parameter triggers two kinds, can be with
Simultaneous selection, it can also only select one kind.In the present embodiment, trigger condition only includes service parameter triggering.
Service parameter triggering includes at least one of the triggering of intended application function and keyword triggering, intended application function
Triggering is that the currently pending business of detection is intended application function, if then meeting trigger condition, if not being then unsatisfactory for
Trigger condition;And keyword triggering is then to monitor current operation interface whether to include the keyword of setting, if then meeting
Trigger condition, if not being then unsatisfactory for trigger condition.In some embodiments of the invention, if service parameter triggering only includes target
Application function triggers, then it is intended application function to only need to detect that currently pending business, corresponding, if business is joined
Number triggering only includes keyword and triggered, then is only required to be whether monitoring current operation interface includes the keyword of setting i.e.
Can, if service parameter triggering needs to detect and currently waits to locate simultaneously including the triggering of intended application function and keyword triggering simultaneously
Reason business is whether intended application function or monitoring current operation interface include the keyword of setting, as long as having one
Individual satisfaction, then it is assumed that meet trigger condition.
Network parameter triggering refers to judge whether data network used in terminal is safe, if dangerous, then it is assumed that meet
Trigger condition, whether the criterion of safety has networks that are a variety of, such as obtaining data network used in terminal to data network
Parameter, according to network parameter, judge whether data network used in terminal is safe;Network parameter includes the network of data network
Type, now, judge whether communication network used in terminal includes safely:Judge whether network type is WLAN;
If network type is WLAN, judge that data network used in terminal is dangerous.Network type includes wireless local
Net and mobile network, such as 4G;The present embodiment only considers that network type is because the Information Security of mobile network is than wireless office
Domain net will height, therefore, if terminal calls secure data by mobile network, it is believed that in the absence of potential safety hazard, avoid the need for into
Row VPN, and it is corresponding, due to the low-security of WLAN, if terminal calls secure data by WLAN, recognize
Potential safety hazard to be present, it is necessary to carry out VPN.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, control terminal passes through used data network
VPN is accessed, then passes through VPN, data finishing service safe to use, in this process, based on the safety in VPN during data transfer
Privacy, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data
Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance use
The usage experience at family.
Second embodiment
The secure data management method refined flow chart that Fig. 4 provides for second embodiment of the invention, the secure data management
Method includes:
S401, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this
Sample terminal just needs monitoring business advisory office and network parameter.
Whether S402, monitoring secure data are by pending calling service;If so, then performing S403, performed if it is not, then returning
S402。
The realization of this step is identical with S301, repeats no more.
S403, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained
Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless
LAN.
S404, according to network parameter, judge data network used in terminal whether safety;If so, S405 is then performed, if
It is no, then perform S406.
This step is by judging whether network type is WLAN;If network type is WLAN, judge
Data network used in terminal is dangerous to be realized, judgment mode is simple, repeat no more.
S405, use current data network, the pending business of calling secure data completion.
This step is conventional step, is repeated no more.
S406, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc.
Parameter, to judge whether the current data network of terminal is safe, when its is dangerous, control terminal passes through used data network
Network accesses VPN, then passes through VPN, data finishing service safe to use, in this process, based on the peace in VPN during data transfer
Full privacy, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that safe number
According to security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance
The usage experience of user.
3rd embodiment
The secure data management method refined flow chart that Fig. 5 provides for third embodiment of the invention, the secure data management
Method includes:
S501, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this
Sample terminal just needs monitoring business advisory office and network parameter.
Whether S502, monitoring secure data are by pending calling service;If so, then performing S503, performed if it is not, then returning
S502。
The realization of this step is identical with S301, repeats no more.
S503, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained
Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless
LAN.
S504, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold
Row S505, if it is not, then performing S507.
This step is by judging whether network type is WLAN;If network type is WLAN, judge
Data network used in terminal is dangerous to be realized, judgment mode is simple, repeat no more.
S505, the positional information for obtaining terminal;
Terminal can determine the positional information of terminal, in some embodiments of the invention, position by technologies such as GPS locations
Confidence breath refers to the relative position information such as whether be according to the terminal that longitude and latitude determines.
S506, according to positional information, judge whether terminal is in home;If so, S507 is then performed, if it is not, then holding
Row S508.
According to positional information, such as it is in, in company or in supermarket, judges whether terminal is in home, terminal
It can give tacit consent to or some positions are set as home, such as setting man and company are home, and other positions are uneasy
All positon, the specific deterministic process of this step are conventional step, are repeated no more.
S507, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current
Positional information to be in, in homes such as companies, WLAN is safe.It is specific how finishing service, then to be normal
The step of rule, repeat no more.
S508, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc.
Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the positional information of terminal,
According to position signalling judge WLAN whether safety, when dangerous, control terminal is connect by used data network
Enter VPN, it is then in this process, private based on the safety in VPN during data transfer by VPN, data finishing service safe to use
Close property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data
Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user
Usage experience.
Fourth embodiment
The secure data management method refined flow chart that Fig. 6 provides for fourth embodiment of the invention, the secure data management
Method includes:
S601, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this
Sample terminal just needs monitoring business advisory office and network parameter.
Whether S602, monitoring secure data are by pending calling service;If so, then performing S603, performed if it is not, then returning
S602。
The realization of this step is identical with S301, repeats no more.
S603, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained
Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless
LAN.
S604, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold
Row S605, if it is not, then performing S607.
The realization of this step is identical with S504, repeats no more.
Access way when S605, acquisition terminal access current wireless Local Area Network;
In some embodiments of the invention, this step is realized by the access way of detection terminal access WLAN
WLAN whether the judgement of safety, market or hotel behave more places, the WLAN in these places
Larger potential safety hazard be present, and the WLAN that these places are provided often requires that user in access as shown in figure 11
Interface inputs user mobile phone number and identifying code etc., therefore the present embodiment is by the wireless office corresponding to access way as shown in figure 11
Domain net is defined as the WLAN of public place, and its is dangerous.
S606, according to access way, judge whether WLAN is secure network;If so, S607 is then performed, if it is not,
Then perform S608.
According to access way, judge whether accessed WLAN is WLAN that public place provides, this
The specific deterministic process of step is conventional step, is repeated no more.
S607, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current
WLAN be not public place WLAN, WLAN is safe.It is specific how finishing service, then for
Conventional step, is repeated no more.
S608, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc.
Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the access way of terminal,
According to access way judge WLAN whether safety, when dangerous, control terminal is connect by used data network
Enter VPN, it is then in this process, private based on the safety in VPN during data transfer by VPN, data finishing service safe to use
Close property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data
Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user
Usage experience.
5th embodiment
The secure data management method refined flow chart that Fig. 7 provides for fifth embodiment of the invention, the secure data management
Method includes:
S701, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this
Sample terminal just needs monitoring business advisory office and network parameter.
Whether S702, monitoring secure data are by pending calling service;If so, then performing S703, performed if it is not, then returning
S702。
The realization of this step is identical with S301, repeats no more.
S703, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained
Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless
LAN.
S704, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold
Row S705, if it is not, then performing S707.
The realization of this step is identical with S504, repeats no more.
Network identity when S705, acquisition terminal access current wireless Local Area Network;
In some embodiments of the invention, this step is wireless in white list by setting white list as shown in figure 12
LAN is safe, and the WLAN not in white list is then considered unsafe.
S706, according to white list, judge whether WLAN is secure network;If so, S707 is then performed, if it is not, then
Perform S708.
According to access way, judge whether accessed WLAN is WLAN that public place provides, this
The specific deterministic process of step is conventional step, is repeated no more.
S707, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current
WLAN be WLAN in white list, WLAN is safe.It is specific how finishing service, then to be normal
The step of rule, repeat no more.
S708, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc.
Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the network identity of terminal,
According to white list judge WLAN whether safety, when dangerous, control terminal is accessed by used data network
VPN, then pass through VPN, data finishing service safe to use, in this process, based on the secure private in VPN during data transfer
Property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that the peace of secure data
Quan Xing, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user's
Usage experience.
Sixth embodiment
The secure data management method refined flow chart that Fig. 8 provides for sixth embodiment of the invention, the secure data management
Method includes:
S801, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this
Sample terminal just needs monitoring business advisory office and network parameter.
Whether S802, monitoring secure data are by pending calling service;If so, then performing S803, performed if it is not, then returning
S802。
The realization of this step is identical with S301, repeats no more.
S803, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained
Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless
LAN.
S804, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold
Row S805, if it is not, then performing S807.
The realization of this step is identical with S504, repeats no more.
S805, the network parameter for obtaining WLAN, network parameter is sent to authentication server;
In some embodiments of the invention, this step is verified by authentication server to current wireless Local Area Network, nothing
The network parameter of line LAN includes outside ip address, Data Transport Protocol etc., external IP corresponding to authentication server checking
Location whether be illegally listened etc. judge WLAN whether safety, if being illegally listened, its is dangerous.
S806, according to the result, judge WLAN whether safety;If so, S807 is then performed, if it is not, then performing
S808。
Receive the result that authentication server returns;It is dangerous that if the result characterizes WLAN, such as wirelessly
The external IP of LAN is illegally listened, then judges that the WLAN is dangerous.
S807, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current
WLAN be not illegally listened, WLAN is safe.It is specific how finishing service, then be conventional step
Suddenly, repeat no more.
S808, control terminal, by Virtual Private Network, use peace by used data network access virtual special network
Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through
Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc.
Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtain the network parameter hair of terminal
Deliver to authentication server to be verified, if the result sign WLAN is dangerous, control terminal passes through used
Data network accesses VPN, then passes through VPN, data finishing service safe to use, in this process, based on data transfer in VPN
When secure private, the WLAN that secure data will not be accessed by disabled user by terminal steals, ensure that
The security of secure data, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present,
Enhance the usage experience of user.
7th embodiment
A kind of terminal is present embodiments provided, it is shown in Figure 9, including processor 901, memory 902, communication bus
903rd, communication unit 904 and antenna 905;
Communication bus 903 is used to realize the connection communication between processor 901, memory 902 and communication unit 904;
Communication unit 904 can be radio frequency communications unit (radio circuit) or other kinds of communication unit, its
Including main transmitting-receiving path, auxiliary receiving path (not shown in path figure), antenna 905 comprises at least three groups, this at least three groups of antenna
In currently with it is above-mentioned it is main transmitting-receiving communication be primary antenna, currently connect with above-mentioned auxiliary receiving path supplemented by antenna, residue
For spare antenna.
Memory 902 is used to perform one or more programs, processor 901 be used to performing stored in memory one or
The multiple programs of person, the step of to realize as above secure data management method exemplified by each embodiment.
Present invention also offers a kind of computer-readable recording medium, computer-readable recording medium storage have one or
Multiple programs, one or more program can be by one or more computing devices, to realize exemplified by as above each embodiment
Secure data management method the step of.
The present invention provides a kind of secure data management method, terminal and computer-readable recording medium, for existing terminal
Access WLAN causes secure data the defects of potential safety hazard to be present, by monitoring whether secure data is called, is supervising
Measure secure data it is called when, control terminal accesses VPN by used data network, safe to use then by VPN
Data finishing service, in this process, based on the secure private in VPN during data transfer, secure data will not be used illegally
The WLAN that family is accessed by terminal is stolen, and ensure that the security of secure data, solves existing terminal access
WLAN causes secure data the problem of potential safety hazard to be present, enhances the usage experience of user.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row
His property includes, so that process, method, article or device including a series of elements not only include those key elements, and
And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently
Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this
Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words
Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service
Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific
Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art
Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot
Form, these are belonged within the protection of the present invention.
Claims (10)
- A kind of 1. secure data management method, it is characterised in that including:Secure data is monitored whether by pending calling service;If so, then control the terminal by used data network access virtual special network, by the Virtual Private Network, The pending business is completed using the secure data.
- 2. secure data management method as claimed in claim 1, it is characterised in that monitoring secure data by pending industry After business is called, before controlling the terminal for accessing virtual private network, in addition to:Obtain the network parameter of data network used in terminal;According to the network parameter, judge whether data network used in the terminal is safe;If data network used in the terminal is dangerous, the terminal for accessing virtual private network is controlled.
- 3. secure data management method as claimed in claim 2, it is characterised in that the network parameter includes the data network The network type of network, it is described to judge whether communication network used in the terminal includes safely:Judge whether the network type is WLAN;If the network type is WLAN, judge that data network used in the terminal is dangerous.
- 4. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:Obtain the positional information of the terminal;According to the positional information, judge whether the terminal is in home;If the terminal is not in home, judge that data network used in the terminal is dangerous.
- 5. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:Obtain the access way that the terminal accesses the WLAN;According to the access way, judge whether the WLAN is secure network;If the WLAN is not secure network, judge that data network used in the terminal is dangerous.
- 6. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:Obtain the network parameter of the WLAN;The network parameter is sent to authentication server;Receive the result that the authentication server returns;If it is dangerous that the result characterizes the WLAN, judge that data network used in the terminal is uneasy Entirely.
- 7. the secure data management method as described in any one of claim 1 to 6, it is characterised in that the control terminal Access virtual special network includes:The terminal is controlled to open Virtual Private Network function;By data network used in the terminal, the security server in the Virtual Private Network is accessed;The Virtual Private Network connection established between the terminal and the security server.
- 8. secure data management method as claimed in claim 7, it is characterised in that the security server is to be arranged on safety The routing device of position, before the security server in accessing the Virtual Private Network, in addition to:The terminal is controlled to pass through Remote control opens the Virtual Private Network function of the routing device.
- 9. a kind of terminal, it is characterised in that the terminal includes processor, memory and communication bus;The communication bus is used to realize the connection communication between processor and memory;The processor is used to perform one or more program stored in memory, to realize as appointed in claim 1 to 8 The step of secure data management method described in one.
- A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be by one or more computing devices, to realize such as claim 1 to 8 Any one of secure data management method the step of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710766584.7A CN107454099A (en) | 2017-08-30 | 2017-08-30 | A kind of secure data management method, terminal and computer-readable recording medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710766584.7A CN107454099A (en) | 2017-08-30 | 2017-08-30 | A kind of secure data management method, terminal and computer-readable recording medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107454099A true CN107454099A (en) | 2017-12-08 |
Family
ID=60493497
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710766584.7A Pending CN107454099A (en) | 2017-08-30 | 2017-08-30 | A kind of secure data management method, terminal and computer-readable recording medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107454099A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112437456A (en) * | 2020-12-07 | 2021-03-02 | 中国联合网络通信集团有限公司 | Communication method and device in non-public network |
CN114389904A (en) * | 2022-03-24 | 2022-04-22 | 湖南光韵科技有限公司 | Service terminal delivery integrated system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130326609A1 (en) * | 2012-06-04 | 2013-12-05 | Jeff Sharkey | Forcing all mobile network traffic over a secure tunnel connection |
CN104008482A (en) * | 2014-06-10 | 2014-08-27 | 北京奇虎科技有限公司 | Mobile terminal and payment method and device based on mobile terminal |
CN104463569A (en) * | 2014-11-11 | 2015-03-25 | 北京奇虎科技有限公司 | Secure connection payment method and device |
CN104821992A (en) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for automatically switching network connection type of mobile phone |
CN105959952A (en) * | 2016-05-03 | 2016-09-21 | 广东欧珀移动通信有限公司 | Network secure access method and device |
-
2017
- 2017-08-30 CN CN201710766584.7A patent/CN107454099A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130326609A1 (en) * | 2012-06-04 | 2013-12-05 | Jeff Sharkey | Forcing all mobile network traffic over a secure tunnel connection |
CN104008482A (en) * | 2014-06-10 | 2014-08-27 | 北京奇虎科技有限公司 | Mobile terminal and payment method and device based on mobile terminal |
CN104463569A (en) * | 2014-11-11 | 2015-03-25 | 北京奇虎科技有限公司 | Secure connection payment method and device |
CN104821992A (en) * | 2015-05-25 | 2015-08-05 | 广东欧珀移动通信有限公司 | Method and device for automatically switching network connection type of mobile phone |
CN105959952A (en) * | 2016-05-03 | 2016-09-21 | 广东欧珀移动通信有限公司 | Network secure access method and device |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112437456A (en) * | 2020-12-07 | 2021-03-02 | 中国联合网络通信集团有限公司 | Communication method and device in non-public network |
CN112437456B (en) * | 2020-12-07 | 2023-05-26 | 中国联合网络通信集团有限公司 | Communication method and equipment in non-public network |
CN114389904A (en) * | 2022-03-24 | 2022-04-22 | 湖南光韵科技有限公司 | Service terminal delivery integrated system |
CN114389904B (en) * | 2022-03-24 | 2022-06-07 | 湖南光韵科技有限公司 | Service terminal delivery integrated system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107562336A (en) | A kind of method, equipment and computer-readable recording medium for controlling suspension ball | |
CN107395850A (en) | A kind of social communication information guard method, device and computer-readable recording medium | |
CN108733811A (en) | A kind of file access method, terminal and computer readable storage medium | |
CN109800602A (en) | Method for secret protection, mobile terminal and computer readable storage medium | |
CN107580336A (en) | A kind of method for connecting network, terminal and computer-readable recording medium | |
CN109618316A (en) | Network share method, mobile terminal and storage medium | |
CN107040541A (en) | A kind of Ad blocking method, device and computer-readable medium | |
CN110069229A (en) | Screen sharing method, mobile terminal and computer readable storage medium | |
CN108052845A (en) | file display control method, terminal and computer readable storage medium | |
CN107295501A (en) | Information updating method, terminal, server and computer-readable recording medium | |
CN107563158A (en) | Show hiden application figure calibration method, equipment and computer-readable recording medium | |
CN107635234A (en) | Wi Fi control methods, mobile terminal and computer-readable recording medium | |
CN107506039A (en) | Mobile terminal, data transmission method and computer-readable storage medium | |
CN107517208A (en) | Apparatus control method, device and computer-readable recording medium | |
CN107276991A (en) | Load method, equipment and the computer-readable recording medium of Web page | |
CN107770356A (en) | A kind of communication establishing method, equipment and computer-readable recording medium | |
CN108012270A (en) | A kind of method of information processing, equipment and computer-readable recording medium | |
CN107733860A (en) | A kind of processing method of access request, device, family's Cloud Server and computer-readable recording medium | |
CN107426441A (en) | A kind of displaying method of terminal, terminal and computer-readable recording medium | |
CN107347117A (en) | A kind of message management method, mobile terminal and computer-readable recording medium | |
CN110191465A (en) | Authority control method, mobile terminal and computer readable storage medium | |
CN109600714A (en) | A kind of method of payment, terminal and readable storage medium storing program for executing | |
CN107454099A (en) | A kind of secure data management method, terminal and computer-readable recording medium | |
CN108920917A (en) | Log in end switching method, mobile terminal and computer readable storage medium | |
CN108449736A (en) | A kind of data transmission method, terminal and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171208 |