CN107454099A - A kind of secure data management method, terminal and computer-readable recording medium - Google Patents

A kind of secure data management method, terminal and computer-readable recording medium Download PDF

Info

Publication number
CN107454099A
CN107454099A CN201710766584.7A CN201710766584A CN107454099A CN 107454099 A CN107454099 A CN 107454099A CN 201710766584 A CN201710766584 A CN 201710766584A CN 107454099 A CN107454099 A CN 107454099A
Authority
CN
China
Prior art keywords
terminal
network
secure data
wlan
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710766584.7A
Other languages
Chinese (zh)
Inventor
王春元
杨亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201710766584.7A priority Critical patent/CN107454099A/en
Publication of CN107454099A publication Critical patent/CN107454099A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W84/00Network topologies
    • H04W84/02Hierarchically pre-organised networks, e.g. paging networks, cellular networks, WLAN [Wireless Local Area Network] or WLL [Wireless Local Loop]
    • H04W84/10Small scale networks; Flat hierarchical networks
    • H04W84/12WLAN [Wireless Local Area Networks]

Abstract

The invention discloses a kind of secure data management method, terminal and computer-readable recording medium, this method is by monitoring whether secure data is called, when monitoring that secure data is called, terminal is controlled to access VPN by used data network, then VPN is passed through, data finishing service safe to use, in this process, based on the secure private in VPN during data transfer, the WLAN that secure data will not be accessed by disabled user by terminal is stolen, it ensure that the security of secure data, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance the usage experience of user.

Description

A kind of secure data management method, terminal and computer-readable recording medium
Technical field
The present invention relates to data security arts, more specifically to a kind of secure data management method, terminal and calculating Machine readable storage medium storing program for executing.
Background technology
The bank card information of secure data, such as user, wechat Alipay payment information, used once will be given by unauthorized theft Bring immeasurable loss in family.
With the development of the terminal technology such as mobile phone, user becomes increasingly dependent on mobile phone and moves payment etc.;Meanwhile trade company etc. In order to attract customer, free WLAN can be also provided, for users to use.User is using mobile phone access WLAN Afterwards, the data of mobile phone and network side may be illegally to steal, now, if user calls secure data to carry out business, these Secure data can also have potential safety hazard.
The content of the invention
The technical problem to be solved in the present invention is that terminal access WLAN causes secure data potential safety hazard to be present, For the technical problem, there is provided a kind of secure data management method, terminal and computer-readable recording medium.
In order to solve the above technical problems, the invention provides a kind of secure data management method, including:
Secure data is monitored whether by pending calling service;
If so, terminal is then controlled, by Virtual Private Network, to be used by used data network access virtual special network Secure data completes pending business.
Optionally, after monitoring secure data by pending calling service, control terminal for accessing virtual private network it Before, in addition to:
Obtain the network parameter of data network used in terminal;
According to network parameter, judge whether data network used in terminal is safe;
If data network is dangerous used in terminal, terminal for accessing virtual private network is controlled.
Optionally, network parameter includes the network type of data network, judges whether communication network used in terminal pacifies Include entirely:
Judge whether network type is WLAN;
If network type is WLAN, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous, Also include:
Obtain the positional information of terminal;
According to positional information, judge whether terminal is in home;
If terminal is not in home, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous, Also include:
Obtain the access way of terminal access WLAN;
According to access way, judge whether WLAN is secure network;
If WLAN is not secure network, judge that data network used in terminal is dangerous.
Optionally, when network type is WLAN, before judging that data network used in terminal is dangerous, Also include:
Obtain the network parameter of WLAN;
Network parameter is sent to authentication server;
Receive the result that authentication server returns;
If it is dangerous that the result characterizes WLAN, judge that data network used in terminal is dangerous.
Optionally, control terminal for accessing virtual private network includes:
Terminal is controlled to open Virtual Private Network function;
By data network used in terminal, the security server in Virtual Private Network is accessed;
The Virtual Private Network connection established between terminal and security server.
Optionally, security server is the routing device for being arranged on home, the safety in Virtual Private Network is accessed Before server, in addition to:Terminal is controlled to open the Virtual Private Network function of routing device by remote control.
Further, present invention also offers a kind of terminal, terminal to include processor, memory and communication bus;Communication Bus is used to realize the connection communication between processor and memory;Processor be used to performing stored in memory one or Multiple programs, the step of to realize secure data management method provided by the invention.
Further, present invention also offers a kind of computer-readable recording medium, it is characterised in that computer-readable to deposit Storage media is stored with one or more program, and one or more program can be by one or more computing device, with reality The step of existing secure data management method provided by the invention.
Beneficial effect
The present invention provides a kind of secure data management method, terminal and computer-readable recording medium, for existing terminal Access WLAN causes secure data the defects of potential safety hazard to be present, by monitoring whether secure data is called, is supervising Measure secure data it is called when, control terminal passes through used data network and accesses VPN (Virtual Private Network, Virtual Private Network), then pass through VPN, data finishing service safe to use, in this process, based on data in VPN Secure private during transmission, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and are protected The security of secure data is demonstrate,proved, solving existing terminal access WLAN causes secure data asking for potential safety hazard to be present Topic, enhance the usage experience of user.
Brief description of the drawings
Below in conjunction with drawings and Examples, the invention will be further described, in accompanying drawing:
Fig. 1 is the hardware architecture diagram for realizing each optional mobile terminal of embodiment one of the present invention.
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the secure data management method basic flow sheet that first embodiment of the invention provides;
Fig. 4 is the secure data management method refined flow chart that second embodiment of the invention provides;
Fig. 5 is the secure data management method refined flow chart that third embodiment of the invention provides;
Fig. 6 is the secure data management method refined flow chart that fourth embodiment of the invention provides;
Fig. 7 is the secure data management method refined flow chart that fifth embodiment of the invention provides;
Fig. 8 is the secure data management method refined flow chart that sixth embodiment of the invention provides;
Fig. 9 is the structural representation for the terminal that seventh embodiment of the invention provides;
Figure 10 be the present embodiments relate to VPN functions configuration interface schematic diagram;
Figure 11 be the present embodiments relate to access interface interface schematic diagram;
Figure 12 be the present embodiments relate to white list configuration interface schematic diagram.
Embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In follow-up description, the suffix using such as " module ", " part " or " unit " for representing element is only Be advantageous to the explanation of the present invention, itself there is no a specific meaning.Therefore, " module ", " part " or " unit " can mix Ground uses.
Terminal can be implemented in a variety of manners.For example, the terminal described in the present invention can include such as mobile phone, flat board Computer, notebook computer, palm PC, personal digital assistant (Personal Digital Assistant, PDA), portable Media player (Portable Media Player, PMP), guider, wearable device, Intelligent bracelet, pedometer etc. move Dynamic terminal, and the fixed terminal such as digital TV, desktop computer.
It will be illustrated in subsequent descriptions by taking mobile terminal as an example, it will be appreciated by those skilled in the art that except special Outside element for moving purpose, construction according to the embodiment of the present invention can also apply to the terminal of fixed type.
Referring to Fig. 1, its hardware architecture diagram for a kind of mobile terminal of each embodiment of the realization present invention, the shifting Dynamic terminal 100 can include:RF (Radio Frequency, radio frequency) unit 101, WiFi module 102, audio output unit 103rd, A/V (audio/video) input block 104, sensor 105, display unit 106, user input unit 107, interface unit 108th, the part such as memory 109, processor 110, power supply 111 and antenna 112.Wherein, in the mobile terminal 100 shown in Fig. 1 Including at least three groups of antennas 112, at least three groups of antennas 112 currently with the main transmitting-receiving communication of mobile terminal 100 For primary antenna, currently connected with the auxiliary receiving path of mobile terminal 100 supplemented by antenna, remaining is spare antenna, processor 110 can control each group of antenna respectively with it is main transmitting-receiving path and auxiliary receiving path break-make situation, when processor 110 control certain When one group of antenna is with main transmitting-receiving communication, radio frequency unit 101 can be received or be sent signal by this group of antenna, it should be understood that It is that at least three groups of antennas 112 can be flexibly arranged on the optional position of mobile terminal 100, such as, work as mobile terminal When including three groups of antennas 112 on 100, this three groups of antennas 112 can be separately positioned on the top at the back side of mobile terminal 100, lower-left Side and lower right.Those skilled in the art are further appreciated that the mobile terminal structure shown in Fig. 1 is not formed to mobile whole The restriction at end, mobile terminal can be included than illustrating more or less parts, either combine some parts or different portions Part is arranged.
The all parts of mobile terminal are specifically introduced with reference to Fig. 1:
Radio frequency unit 101 can be used for receiving and sending messages or communication process in, the reception and transmission of signal, specifically, by base station Downlink information receive after, handled to processor 110;In addition, up data are sent to base station.Generally, radio frequency unit 101 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier, duplexer etc..In addition, penetrate Frequency unit 101 can also be communicated by radio communication with network and other equipment.Above-mentioned radio communication can use any communication Standard or agreement, including but not limited to GSM (Global System of Mobile communication, global system for mobile telecommunications System), GPRS (General Packet Radio Service, general packet radio service), CDMA2000 (Code Division Multiple Access 2000, CDMA 2000), WCDMA (Wideband Code Division Multiple Access, WCDMA), TD-SCDMA (Time Division-Synchronous Code Division Multiple Access, TD SDMA), FDD-LTE (Frequency Division Duplexing-Long Term Evolution, FDD Long Term Evolution) and TDD-LTE (Time Division Duplexing-Long Term Evolution, time division duplex Long Term Evolution) etc..
WiFi belongs to short range wireless transmission technology, and mobile terminal can help user to receive and dispatch electricity by WiFi module 102 Sub- mail, browse webpage and access streaming video etc., it has provided the user wireless broadband internet and accessed.Although Fig. 1 shows Go out WiFi module 102, but it is understood that, it is simultaneously not belonging to must be configured into for mobile terminal, completely can be according to need To be omitted in the essential scope for do not change invention.
Audio output unit 103 can be in call signal reception pattern, call mode, record mould in mobile terminal 100 When under the isotypes such as formula, speech recognition mode, broadcast reception mode, by radio frequency unit 101 or WiFi module 102 it is receiving or It is sound that the voice data stored in memory 109, which is converted into audio signal and exported,.Moreover, audio output unit 103 The audio output related to the specific function that mobile terminal 100 performs can also be provided (for example, call signal receives sound, disappeared Breath receives sound etc.).Audio output unit 103 can include loudspeaker, buzzer etc..
A/V input blocks 104 are used to receive audio or video signal.A/V input blocks 104 can include graphics processor (Graphics Processing Unit, GPU) 1041 and microphone 1042, graphics processor 1041 is in video acquisition mode Or the static images or the view data of video obtained in image capture mode by image capture apparatus (such as camera) are carried out Reason.Picture frame after processing may be displayed on display unit 106.Picture frame after the processing of graphics processor 1041 can be deposited Storage is transmitted in memory 109 (or other storage mediums) or via radio frequency unit 101 or WiFi module 102.Mike Wind 1042 can connect in telephone calling model, logging mode, speech recognition mode etc. operational mode via microphone 1042 Quiet down sound (voice data), and can be voice data by such acoustic processing.Audio (voice) data after processing can To be converted to the form output that mobile communication base station can be sent to via radio frequency unit 101 in the case of telephone calling model. Microphone 1042 can implement various types of noises and eliminate (or suppression) algorithm to eliminate (or suppression) in reception and send sound Caused noise or interference during frequency signal.
Mobile terminal 100 also includes at least one sensor 105, such as optical sensor, motion sensor and other biographies Sensor.Specifically, optical sensor includes ambient light sensor and proximity transducer, wherein, ambient light sensor can be according to environment The light and shade of light adjusts the brightness of display panel 1061, and proximity transducer can close when mobile terminal 100 is moved in one's ear Display panel 1061 and/or backlight.As one kind of motion sensor, accelerometer sensor can detect in all directions (general For three axles) size of acceleration, size and the direction of gravity are can detect that when static, the application available for identification mobile phone posture (such as horizontal/vertical screen switching, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, percussion) etc.; The fingerprint sensor that can also configure as mobile phone, pressure sensor, iris sensor, molecule sensor, gyroscope, barometer, The other sensors such as hygrometer, thermometer, infrared ray sensor, will not be repeated here.
Display unit 106 is used for the information for showing the information inputted by user or being supplied to user.Display unit 106 can wrap Display panel 1061 is included, liquid crystal display (Liquid Crystal Display, LCD), Organic Light Emitting Diode can be used Forms such as (Organic Light-Emitting Diode, OLED) configures display panel 1061.
User input unit 107 can be used for the numeral or character information for receiving input, and produce the use with mobile terminal The key signals input that family is set and function control is relevant.Specifically, user input unit 107 may include contact panel 1071 with And other input equipments 1072.Contact panel 1071, also referred to as touch-screen, collect touch operation of the user on or near it (for example user uses any suitable objects or annex such as finger, stylus on contact panel 1071 or in contact panel 1071 Neighbouring operation), and corresponding attachment means are driven according to formula set in advance.Contact panel 1071 may include touch detection Two parts of device and touch controller.Wherein, the touch orientation of touch detecting apparatus detection user, and detect touch operation band The signal come, transmits a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and by it Contact coordinate is converted into, then gives processor 110, and the order sent of reception processing device 110 and can be performed.In addition, can To realize contact panel 1071 using polytypes such as resistance-type, condenser type, infrared ray and surface acoustic waves.Except contact panel 1071, user input unit 107 can also include other input equipments 1072.Specifically, other input equipments 1072 can wrap Include but be not limited to physical keyboard, in function key (such as volume control button, switch key etc.), trace ball, mouse, action bars etc. One or more, do not limit herein specifically.
Further, contact panel 1071 can cover display panel 1061, detect thereon when contact panel 1071 or After neighbouring touch operation, processor 110 is sent to determine the type of touch event, is followed by subsequent processing device 110 according to touch thing The type of part provides corresponding visual output on display panel 1061.Although in Fig. 1, contact panel 1071 and display panel 1061 be the part independent as two to realize the input of mobile terminal and output function, but in certain embodiments, can Input and the output function of mobile terminal are realized so that contact panel 1071 and display panel 1061 is integrated, is not done herein specifically Limit.
Interface unit 108 is connected the interface that can pass through as at least one external device (ED) with mobile terminal 100.For example, External device (ED) can include wired or wireless head-band earphone port, external power source (or battery charger) port, wired or nothing Line FPDP, memory card port, the port for connecting the device with identification module, audio input/output (I/O) end Mouth, video i/o port, ear port etc..Interface unit 108 can be used for receiving the input from external device (ED) (for example, number It is believed that breath, electric power etc.) and the input received is transferred to one or more elements in mobile terminal 100 or can be with For transmitting data between mobile terminal 100 and external device (ED).
Memory 109 can be used for storage software program and various data.Memory 109 can mainly include storing program area And storage data field, wherein, storing program area can storage program area, application program (such as the sound needed at least one function Sound playing function, image player function etc.) etc.;Storage data field can store according to mobile phone use created data (such as Voice data, phone directory etc.) etc..In addition, memory 109 can include high-speed random access memory, can also include non-easy The property lost memory, a for example, at least disk memory, flush memory device or other volatile solid-state parts.
Processor 110 is the control centre of mobile terminal, utilizes each of various interfaces and the whole mobile terminal of connection Individual part, by running or performing the software program and/or module that are stored in memory 109, and call and be stored in storage Data in device 109, the various functions and processing data of mobile terminal are performed, so as to carry out integral monitoring to mobile terminal.Place Reason device 110 may include one or more processing units;Preferably, processor 110 can integrate application processor and modulatedemodulate is mediated Device is managed, wherein, application processor mainly handles operating system, user interface and application program etc., and modem processor is main Handle radio communication.It is understood that above-mentioned modem processor can not also be integrated into processor 110.
Mobile terminal 100 can also include the power supply 111 (such as battery) to all parts power supply, it is preferred that power supply 111 Can be logically contiguous by power-supply management system and processor 110, so as to realize management charging by power-supply management system, put The function such as electricity and power managed.
Although Fig. 1 is not shown, mobile terminal 100 can also will not be repeated here including bluetooth module etc..
For the ease of understanding the embodiment of the present invention, the wireless communication system involved by the mobile terminal of the present invention is entered below Row description.
Referring to Fig. 2, Fig. 2 is a kind of communications network system Organization Chart provided in an embodiment of the present invention, the communication network system Unite as the LTE system of universal mobile communications technology, the UE that the LTE system includes communicating connection successively (User Equipment, is used Family equipment) 201, E-UTRAN (Evolved UMTS Terrestrial Radio Access Network, evolved UMTS lands Ground wireless access network) 202, EPC (Evolved Packet Core, evolved packet-based core networks) 203 and operator IP operation 204。
Specifically, UE201 can be above-mentioned user terminal 100, and here is omitted, including the first user below related to The second user terminal UE 2012 that the first user terminal UE2011 and second user used is used.
E-UTRAN202 includes eNodeB2021 and other eNodeB2022 etc..Wherein, eNodeB2021 can be by returning Journey (backhaul) (such as X2 interface) is connected with other eNodeB2022, and eNodeB2021 is connected to EPC203, ENodeB2021 can provide UE201 to EPC203 access.
EPC203 can include MME (Mobility Management Entity, mobility management entity) 2031, HSS (Home Subscriber Server, home subscriber server) 2032, other MME2033, SGW (Serving Gate Way, Gateway) 2034, PGW (PDN Gate Way, grouped data network gateway) 2035 and PCRF (Policy and Charging Rules Function, policy and rate functional entity) 2036 etc..Wherein, MME2031 be processing UE201 and The control node of signaling between EPC203, there is provided carrying and connection management.HSS2032 is all to manage for providing some registers Such as the function of attaching position register (not shown) etc, and preserve some and used about service features, data rate etc. The special information in family.All customer data can be transmitted by SGW2034, and PGW2035 can provide UE 201 IP Address is distributed and other functions, and PCRF2036 is strategy and the charging control strategic decision-making of business data flow and IP bearing resources Point, it selects and provided available strategy and charging control decision-making with charge execution function unit (not shown) for strategy.
IP operation 204 can include internet, Intranet, IMS (IP Multimedia Subsystem, IP multimedia System) or other IP operations etc., in the present invention, IP operation 204 can be system update service, then corresponding, system clothes Business device will also be realized by the entity device or virtual unit of realizing IP operation 204.
Although above-mentioned be described by taking LTE system as an example, those skilled in the art it is to be understood that the present invention not only Suitable for LTE system, be readily applicable to other wireless communication systems, such as GSM, CDMA2000, WCDMA, TD-SCDMA with And following new network system etc., do not limit herein.
Based on above-mentioned mobile subscriber terminal hardware configuration and communications network system, each implementation of the inventive method is proposed Example.
First embodiment
Fig. 3 is the secure data management method basic flow sheet that the present embodiment provides, and the secure data management method includes:
Whether S301, monitoring secure data are by pending calling service;If so, step S302 is then performed, if it is not, then returning Perform step S301.
In embodiments of the present invention, the secure data bank card information of terminal memory storage, the payment accounts such as including mobile phone Account and encrypted message, and user inputted by mobile phone identifying code, identity information, bank card information etc..
In actual applications, it is necessary to call the business of secure data to be generally two kinds:One kind is payment transaction, and user uses The payment platforms such as wechat, Alipay move payment, such as wechat barcode scanning is paid, and group of U.S. is paid by wechat, webpage Input the business such as bank card payment;One kind is registration business, it is necessary to defeated when user downloads new opplication or needs to open new business Access customer information is registered etc., such as user applies for that bank card online payment function needs to input identity information and bank card letter Breath etc..
In some embodiments of the invention, it can be judged whether by service application that monitoring terminal user is used Occur secure data be called, terminal can with some intended application functions of default setting, or according to user's operation setting some Intended application function, for example, wechat is applied into the barcode scanning payment function of the inside as intended application function etc., when monitoring these When intended application function is needed to perform as pending business, it is believed that secure data is called.In some embodiments of the invention In, intended application function can also include wechat application the inside bank settlement function, Alipay application the inside bank settlement function, Barcode scanning payment function of Alipay application the inside etc..
In some embodiments of the invention, it can be judged whether by operation interface that monitoring terminal user is used There is secure data to be called, terminal can with some keywords of default setting, or according to some keywords of user's operation setting, For example, the field such as " identity card ", " bank's card number " is operated into boundary as critical field when monitoring that these critical fielies appear in When in face, it is believed that secure data is called.In some embodiments of the invention, operation interface includes but is not limited to webpage, answered With interface etc..
S302, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion;
VPN is a new network, has been provided the user a kind of safely special to enterprises by common network The connected mode that network is remotely accessed.Realize VPN connections, it is necessary to be configured with a stylobate in Windows NT or On the one hand Windows2000 Server vpn server, vpn server connect dedicated network, are on the other hand connected to Internet, that is to say, that vpn server must possess a public IP address.When client computer by VPN connections with it is special When computer in network is communicated, all data are first sent to VPN services by ISP (internet service provider) Device, then it is responsible for by vpn server all data being sent to object-computer again.Technologies of the VPN for the use of three is protected The security of communication is demonstrate,proved:Tunnel protocol, authentication and data encryption.Client computer sends request, VPN clothes to vpn server Business device respond request simultaneously sends identity challenge to client computer, and the response message of encryption is sent to vpn server, VPN by client computer Server checks the response according to customer data base, if account is effective, it is long-range that vpn server will check whether the user has Access rights, if the user possesses the authority of remote access, vpn server receives this connection, produced in authentication process itself Raw client-server Public Key will be used for that data are encrypted.
Understood based on foregoing description, when terminal passes through VPN, when data safe to use carry out pending business, secure data Shi Anquan's, therefore, even if communication network is dangerous used in terminal, secure data will not also carry out pending business When, illegally stolen.
Therefore, in some embodiments of the invention, before step S301, in addition to the step of configuration VPN functions.
In some embodiments of the invention, VPN functions are configured, as shown in Figure 10, configure trigger condition, the clothes of VPN functions Device IP address, the communication protocol of being engaged in and the parameters such as key that communicate.Wherein, server ip address, communication protocol and communication key are VPN The special parameter of business according to actual vpn service, it is necessary to realize parameter to set, in some embodiments of the invention, VPN clothes Business device can be private server, and user obtains the parameters such as server ip address or user by buying VPN services Voluntarily by the routing device of safety, as the be in home router of the inside of user installation realizes that user passes through remote control Home router open VPN functions, then using the external IP of home router be used as server ip address, and personalization selection Communication protocol and communication key, the VPN passages then established between terminal and home router, on this basis, pass through family expenses Router come complete pay etc. business.
In some embodiments of the invention, this step S302 specific implementation step is as follows:
Terminal is controlled to open Virtual Private Network function;
By data network used in terminal, the security server in Virtual Private Network is accessed;
The Virtual Private Network connection established between terminal and security server.
In other embodiment of the present invention, security server is the routing device for being arranged on home, this time step Rapid S302 before the security server in accessing Virtual Private Network, in addition to:Control terminal to open by remote control to route The Virtual Private Network function of equipment.
In some embodiments of the invention, trigger condition includes service parameter triggering and network parameter triggers two kinds, can be with Simultaneous selection, it can also only select one kind.In the present embodiment, trigger condition only includes service parameter triggering.
Service parameter triggering includes at least one of the triggering of intended application function and keyword triggering, intended application function Triggering is that the currently pending business of detection is intended application function, if then meeting trigger condition, if not being then unsatisfactory for Trigger condition;And keyword triggering is then to monitor current operation interface whether to include the keyword of setting, if then meeting Trigger condition, if not being then unsatisfactory for trigger condition.In some embodiments of the invention, if service parameter triggering only includes target Application function triggers, then it is intended application function to only need to detect that currently pending business, corresponding, if business is joined Number triggering only includes keyword and triggered, then is only required to be whether monitoring current operation interface includes the keyword of setting i.e. Can, if service parameter triggering needs to detect and currently waits to locate simultaneously including the triggering of intended application function and keyword triggering simultaneously Reason business is whether intended application function or monitoring current operation interface include the keyword of setting, as long as having one Individual satisfaction, then it is assumed that meet trigger condition.
Network parameter triggering refers to judge whether data network used in terminal is safe, if dangerous, then it is assumed that meet Trigger condition, whether the criterion of safety has networks that are a variety of, such as obtaining data network used in terminal to data network Parameter, according to network parameter, judge whether data network used in terminal is safe;Network parameter includes the network of data network Type, now, judge whether communication network used in terminal includes safely:Judge whether network type is WLAN; If network type is WLAN, judge that data network used in terminal is dangerous.Network type includes wireless local Net and mobile network, such as 4G;The present embodiment only considers that network type is because the Information Security of mobile network is than wireless office Domain net will height, therefore, if terminal calls secure data by mobile network, it is believed that in the absence of potential safety hazard, avoid the need for into Row VPN, and it is corresponding, due to the low-security of WLAN, if terminal calls secure data by WLAN, recognize Potential safety hazard to be present, it is necessary to carry out VPN.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, control terminal passes through used data network VPN is accessed, then passes through VPN, data finishing service safe to use, in this process, based on the safety in VPN during data transfer Privacy, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance use The usage experience at family.
Second embodiment
The secure data management method refined flow chart that Fig. 4 provides for second embodiment of the invention, the secure data management Method includes:
S401, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this Sample terminal just needs monitoring business advisory office and network parameter.
Whether S402, monitoring secure data are by pending calling service;If so, then performing S403, performed if it is not, then returning S402。
The realization of this step is identical with S301, repeats no more.
S403, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless LAN.
S404, according to network parameter, judge data network used in terminal whether safety;If so, S405 is then performed, if It is no, then perform S406.
This step is by judging whether network type is WLAN;If network type is WLAN, judge Data network used in terminal is dangerous to be realized, judgment mode is simple, repeat no more.
S405, use current data network, the pending business of calling secure data completion.
This step is conventional step, is repeated no more.
S406, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc. Parameter, to judge whether the current data network of terminal is safe, when its is dangerous, control terminal passes through used data network Network accesses VPN, then passes through VPN, data finishing service safe to use, in this process, based on the peace in VPN during data transfer Full privacy, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that safe number According to security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance The usage experience of user.
3rd embodiment
The secure data management method refined flow chart that Fig. 5 provides for third embodiment of the invention, the secure data management Method includes:
S501, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this Sample terminal just needs monitoring business advisory office and network parameter.
Whether S502, monitoring secure data are by pending calling service;If so, then performing S503, performed if it is not, then returning S502。
The realization of this step is identical with S301, repeats no more.
S503, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless LAN.
S504, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold Row S505, if it is not, then performing S507.
This step is by judging whether network type is WLAN;If network type is WLAN, judge Data network used in terminal is dangerous to be realized, judgment mode is simple, repeat no more.
S505, the positional information for obtaining terminal;
Terminal can determine the positional information of terminal, in some embodiments of the invention, position by technologies such as GPS locations Confidence breath refers to the relative position information such as whether be according to the terminal that longitude and latitude determines.
S506, according to positional information, judge whether terminal is in home;If so, S507 is then performed, if it is not, then holding Row S508.
According to positional information, such as it is in, in company or in supermarket, judges whether terminal is in home, terminal It can give tacit consent to or some positions are set as home, such as setting man and company are home, and other positions are uneasy All positon, the specific deterministic process of this step are conventional step, are repeated no more.
S507, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current Positional information to be in, in homes such as companies, WLAN is safe.It is specific how finishing service, then to be normal The step of rule, repeat no more.
S508, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc. Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the positional information of terminal, According to position signalling judge WLAN whether safety, when dangerous, control terminal is connect by used data network Enter VPN, it is then in this process, private based on the safety in VPN during data transfer by VPN, data finishing service safe to use Close property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user Usage experience.
Fourth embodiment
The secure data management method refined flow chart that Fig. 6 provides for fourth embodiment of the invention, the secure data management Method includes:
S601, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this Sample terminal just needs monitoring business advisory office and network parameter.
Whether S602, monitoring secure data are by pending calling service;If so, then performing S603, performed if it is not, then returning S602。
The realization of this step is identical with S301, repeats no more.
S603, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless LAN.
S604, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold Row S605, if it is not, then performing S607.
The realization of this step is identical with S504, repeats no more.
Access way when S605, acquisition terminal access current wireless Local Area Network;
In some embodiments of the invention, this step is realized by the access way of detection terminal access WLAN WLAN whether the judgement of safety, market or hotel behave more places, the WLAN in these places Larger potential safety hazard be present, and the WLAN that these places are provided often requires that user in access as shown in figure 11 Interface inputs user mobile phone number and identifying code etc., therefore the present embodiment is by the wireless office corresponding to access way as shown in figure 11 Domain net is defined as the WLAN of public place, and its is dangerous.
S606, according to access way, judge whether WLAN is secure network;If so, S607 is then performed, if it is not, Then perform S608.
According to access way, judge whether accessed WLAN is WLAN that public place provides, this The specific deterministic process of step is conventional step, is repeated no more.
S607, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current WLAN be not public place WLAN, WLAN is safe.It is specific how finishing service, then for Conventional step, is repeated no more.
S608, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc. Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the access way of terminal, According to access way judge WLAN whether safety, when dangerous, control terminal is connect by used data network Enter VPN, it is then in this process, private based on the safety in VPN during data transfer by VPN, data finishing service safe to use Close property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that secure data Security, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user Usage experience.
5th embodiment
The secure data management method refined flow chart that Fig. 7 provides for fifth embodiment of the invention, the secure data management Method includes:
S701, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this Sample terminal just needs monitoring business advisory office and network parameter.
Whether S702, monitoring secure data are by pending calling service;If so, then performing S703, performed if it is not, then returning S702。
The realization of this step is identical with S301, repeats no more.
S703, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless LAN.
S704, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold Row S705, if it is not, then performing S707.
The realization of this step is identical with S504, repeats no more.
Network identity when S705, acquisition terminal access current wireless Local Area Network;
In some embodiments of the invention, this step is wireless in white list by setting white list as shown in figure 12 LAN is safe, and the WLAN not in white list is then considered unsafe.
S706, according to white list, judge whether WLAN is secure network;If so, S707 is then performed, if it is not, then Perform S708.
According to access way, judge whether accessed WLAN is WLAN that public place provides, this The specific deterministic process of step is conventional step, is repeated no more.
S707, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current WLAN be WLAN in white list, WLAN is safe.It is specific how finishing service, then to be normal The step of rule, repeat no more.
S708, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc. Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtains the network identity of terminal, According to white list judge WLAN whether safety, when dangerous, control terminal is accessed by used data network VPN, then pass through VPN, data finishing service safe to use, in this process, based on the secure private in VPN during data transfer Property, the WLAN that secure data will not be accessed by disabled user by terminal are stolen, and ensure that the peace of secure data Quan Xing, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, enhance user's Usage experience.
Sixth embodiment
The secure data management method refined flow chart that Fig. 8 provides for sixth embodiment of the invention, the secure data management Method includes:
S801, configuration VPN functions.
The realization of this step is described above, repeats no more.
This embodiment assumes that Figure 10's is configured to trigger condition while is triggered including service parameter triggering and network parameter, this Sample terminal just needs monitoring business advisory office and network parameter.
Whether S802, monitoring secure data are by pending calling service;If so, then performing S803, performed if it is not, then returning S802。
The realization of this step is identical with S301, repeats no more.
S803, the network parameter for obtaining data network used in terminal;
So that network parameter is network type as an example, this step is identified by the web alert above monitoring terminal desktop and obtained Network type, if the mark such as display 4G, network type is mobile network, if display WiFi icons, network type is wireless LAN.
S804, according to network parameter, judge whether data network used in terminal is WLAN;If so, then hold Row S805, if it is not, then performing S807.
The realization of this step is identical with S504, repeats no more.
S805, the network parameter for obtaining WLAN, network parameter is sent to authentication server;
In some embodiments of the invention, this step is verified by authentication server to current wireless Local Area Network, nothing The network parameter of line LAN includes outside ip address, Data Transport Protocol etc., external IP corresponding to authentication server checking Location whether be illegally listened etc. judge WLAN whether safety, if being illegally listened, its is dangerous.
S806, according to the result, judge WLAN whether safety;If so, S807 is then performed, if it is not, then performing S808。
Receive the result that authentication server returns;It is dangerous that if the result characterizes WLAN, such as wirelessly The external IP of LAN is illegally listened, then judges that the WLAN is dangerous.
S807, use current data network, the pending business of calling secure data completion.
This step includes two scenes:Current data network is mobile network, and network is safe in itself;Or terminal is current WLAN be not illegally listened, WLAN is safe.It is specific how finishing service, then be conventional step Suddenly, repeat no more.
S808, control terminal, by Virtual Private Network, use peace by used data network access virtual special network Totally according to the pending business of completion.
This step is identical with S302, repeats no more.
The present embodiment causes secure data the defects of potential safety hazard to be present for existing terminal access WLAN, passes through Whether monitoring secure data is called, and when monitoring that secure data is called, obtains network type of current data network etc. Parameter, to judge whether the current data network of terminal is safe, when it is WLAN, obtain the network parameter hair of terminal Deliver to authentication server to be verified, if the result sign WLAN is dangerous, control terminal passes through used Data network accesses VPN, then passes through VPN, data finishing service safe to use, in this process, based on data transfer in VPN When secure private, the WLAN that secure data will not be accessed by disabled user by terminal steals, ensure that The security of secure data, solve the problems, such as that existing terminal access WLAN causes secure data potential safety hazard to be present, Enhance the usage experience of user.
7th embodiment
A kind of terminal is present embodiments provided, it is shown in Figure 9, including processor 901, memory 902, communication bus 903rd, communication unit 904 and antenna 905;
Communication bus 903 is used to realize the connection communication between processor 901, memory 902 and communication unit 904;
Communication unit 904 can be radio frequency communications unit (radio circuit) or other kinds of communication unit, its Including main transmitting-receiving path, auxiliary receiving path (not shown in path figure), antenna 905 comprises at least three groups, this at least three groups of antenna In currently with it is above-mentioned it is main transmitting-receiving communication be primary antenna, currently connect with above-mentioned auxiliary receiving path supplemented by antenna, residue For spare antenna.
Memory 902 is used to perform one or more programs, processor 901 be used to performing stored in memory one or The multiple programs of person, the step of to realize as above secure data management method exemplified by each embodiment.
Present invention also offers a kind of computer-readable recording medium, computer-readable recording medium storage have one or Multiple programs, one or more program can be by one or more computing devices, to realize exemplified by as above each embodiment Secure data management method the step of.
The present invention provides a kind of secure data management method, terminal and computer-readable recording medium, for existing terminal Access WLAN causes secure data the defects of potential safety hazard to be present, by monitoring whether secure data is called, is supervising Measure secure data it is called when, control terminal accesses VPN by used data network, safe to use then by VPN Data finishing service, in this process, based on the secure private in VPN during data transfer, secure data will not be used illegally The WLAN that family is accessed by terminal is stolen, and ensure that the security of secure data, solves existing terminal access WLAN causes secure data the problem of potential safety hazard to be present, enhances the usage experience of user.
It should be noted that herein, term " comprising ", "comprising" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements not only include those key elements, and And also include the other element being not expressly set out, or also include for this process, method, article or device institute inherently Key element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that including this Other identical element also be present in the process of key element, method, article or device.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal (can be mobile phone, computer, service Device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiments of the invention are described above in conjunction with accompanying drawing, but the invention is not limited in above-mentioned specific Embodiment, above-mentioned embodiment is only schematical, rather than restricted, one of ordinary skill in the art Under the enlightenment of the present invention, in the case of present inventive concept and scope of the claimed protection is not departed from, it can also make a lot Form, these are belonged within the protection of the present invention.

Claims (10)

  1. A kind of 1. secure data management method, it is characterised in that including:
    Secure data is monitored whether by pending calling service;
    If so, then control the terminal by used data network access virtual special network, by the Virtual Private Network, The pending business is completed using the secure data.
  2. 2. secure data management method as claimed in claim 1, it is characterised in that monitoring secure data by pending industry After business is called, before controlling the terminal for accessing virtual private network, in addition to:
    Obtain the network parameter of data network used in terminal;
    According to the network parameter, judge whether data network used in the terminal is safe;
    If data network used in the terminal is dangerous, the terminal for accessing virtual private network is controlled.
  3. 3. secure data management method as claimed in claim 2, it is characterised in that the network parameter includes the data network The network type of network, it is described to judge whether communication network used in the terminal includes safely:
    Judge whether the network type is WLAN;
    If the network type is WLAN, judge that data network used in the terminal is dangerous.
  4. 4. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:
    Obtain the positional information of the terminal;
    According to the positional information, judge whether the terminal is in home;
    If the terminal is not in home, judge that data network used in the terminal is dangerous.
  5. 5. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:
    Obtain the access way that the terminal accesses the WLAN;
    According to the access way, judge whether the WLAN is secure network;
    If the WLAN is not secure network, judge that data network used in the terminal is dangerous.
  6. 6. secure data management method as claimed in claim 3, it is characterised in that when the network type is WLAN When, before judging that data network used in the terminal is dangerous, in addition to:
    Obtain the network parameter of the WLAN;
    The network parameter is sent to authentication server;
    Receive the result that the authentication server returns;
    If it is dangerous that the result characterizes the WLAN, judge that data network used in the terminal is uneasy Entirely.
  7. 7. the secure data management method as described in any one of claim 1 to 6, it is characterised in that the control terminal Access virtual special network includes:
    The terminal is controlled to open Virtual Private Network function;
    By data network used in the terminal, the security server in the Virtual Private Network is accessed;
    The Virtual Private Network connection established between the terminal and the security server.
  8. 8. secure data management method as claimed in claim 7, it is characterised in that the security server is to be arranged on safety The routing device of position, before the security server in accessing the Virtual Private Network, in addition to:The terminal is controlled to pass through Remote control opens the Virtual Private Network function of the routing device.
  9. 9. a kind of terminal, it is characterised in that the terminal includes processor, memory and communication bus;
    The communication bus is used to realize the connection communication between processor and memory;
    The processor is used to perform one or more program stored in memory, to realize as appointed in claim 1 to 8 The step of secure data management method described in one.
  10. A kind of 10. computer-readable recording medium, it is characterised in that the computer-readable recording medium storage have one or Multiple programs, one or more of programs can be by one or more computing devices, to realize such as claim 1 to 8 Any one of secure data management method the step of.
CN201710766584.7A 2017-08-30 2017-08-30 A kind of secure data management method, terminal and computer-readable recording medium Pending CN107454099A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710766584.7A CN107454099A (en) 2017-08-30 2017-08-30 A kind of secure data management method, terminal and computer-readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710766584.7A CN107454099A (en) 2017-08-30 2017-08-30 A kind of secure data management method, terminal and computer-readable recording medium

Publications (1)

Publication Number Publication Date
CN107454099A true CN107454099A (en) 2017-12-08

Family

ID=60493497

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710766584.7A Pending CN107454099A (en) 2017-08-30 2017-08-30 A kind of secure data management method, terminal and computer-readable recording medium

Country Status (1)

Country Link
CN (1) CN107454099A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437456A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Communication method and device in non-public network
CN114389904A (en) * 2022-03-24 2022-04-22 湖南光韵科技有限公司 Service terminal delivery integrated system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130326609A1 (en) * 2012-06-04 2013-12-05 Jeff Sharkey Forcing all mobile network traffic over a secure tunnel connection
CN104008482A (en) * 2014-06-10 2014-08-27 北京奇虎科技有限公司 Mobile terminal and payment method and device based on mobile terminal
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104821992A (en) * 2015-05-25 2015-08-05 广东欧珀移动通信有限公司 Method and device for automatically switching network connection type of mobile phone
CN105959952A (en) * 2016-05-03 2016-09-21 广东欧珀移动通信有限公司 Network secure access method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130326609A1 (en) * 2012-06-04 2013-12-05 Jeff Sharkey Forcing all mobile network traffic over a secure tunnel connection
CN104008482A (en) * 2014-06-10 2014-08-27 北京奇虎科技有限公司 Mobile terminal and payment method and device based on mobile terminal
CN104463569A (en) * 2014-11-11 2015-03-25 北京奇虎科技有限公司 Secure connection payment method and device
CN104821992A (en) * 2015-05-25 2015-08-05 广东欧珀移动通信有限公司 Method and device for automatically switching network connection type of mobile phone
CN105959952A (en) * 2016-05-03 2016-09-21 广东欧珀移动通信有限公司 Network secure access method and device

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112437456A (en) * 2020-12-07 2021-03-02 中国联合网络通信集团有限公司 Communication method and device in non-public network
CN112437456B (en) * 2020-12-07 2023-05-26 中国联合网络通信集团有限公司 Communication method and equipment in non-public network
CN114389904A (en) * 2022-03-24 2022-04-22 湖南光韵科技有限公司 Service terminal delivery integrated system
CN114389904B (en) * 2022-03-24 2022-06-07 湖南光韵科技有限公司 Service terminal delivery integrated system

Similar Documents

Publication Publication Date Title
CN107562336A (en) A kind of method, equipment and computer-readable recording medium for controlling suspension ball
CN107395850A (en) A kind of social communication information guard method, device and computer-readable recording medium
CN108733811A (en) A kind of file access method, terminal and computer readable storage medium
CN109800602A (en) Method for secret protection, mobile terminal and computer readable storage medium
CN107580336A (en) A kind of method for connecting network, terminal and computer-readable recording medium
CN109618316A (en) Network share method, mobile terminal and storage medium
CN107040541A (en) A kind of Ad blocking method, device and computer-readable medium
CN110069229A (en) Screen sharing method, mobile terminal and computer readable storage medium
CN108052845A (en) file display control method, terminal and computer readable storage medium
CN107295501A (en) Information updating method, terminal, server and computer-readable recording medium
CN107563158A (en) Show hiden application figure calibration method, equipment and computer-readable recording medium
CN107635234A (en) Wi Fi control methods, mobile terminal and computer-readable recording medium
CN107506039A (en) Mobile terminal, data transmission method and computer-readable storage medium
CN107517208A (en) Apparatus control method, device and computer-readable recording medium
CN107276991A (en) Load method, equipment and the computer-readable recording medium of Web page
CN107770356A (en) A kind of communication establishing method, equipment and computer-readable recording medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107733860A (en) A kind of processing method of access request, device, family's Cloud Server and computer-readable recording medium
CN107426441A (en) A kind of displaying method of terminal, terminal and computer-readable recording medium
CN107347117A (en) A kind of message management method, mobile terminal and computer-readable recording medium
CN110191465A (en) Authority control method, mobile terminal and computer readable storage medium
CN109600714A (en) A kind of method of payment, terminal and readable storage medium storing program for executing
CN107454099A (en) A kind of secure data management method, terminal and computer-readable recording medium
CN108920917A (en) Log in end switching method, mobile terminal and computer readable storage medium
CN108449736A (en) A kind of data transmission method, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171208