CN107548064A - For the method and apparatus for the security information for providing WAP - Google Patents
For the method and apparatus for the security information for providing WAP Download PDFInfo
- Publication number
- CN107548064A CN107548064A CN201610494325.9A CN201610494325A CN107548064A CN 107548064 A CN107548064 A CN 107548064A CN 201610494325 A CN201610494325 A CN 201610494325A CN 107548064 A CN107548064 A CN 107548064A
- Authority
- CN
- China
- Prior art keywords
- information
- user equipment
- security information
- application
- target wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The purpose of the application is to provide a kind of method and apparatus for being used to provide the security information of WAP.Compared with prior art, the application is by obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, the security information includes applying safety instruction information via target wireless access points execution application on the user equipment, then provides the security information to the user equipment.The security information of WAP can be supplied to user by this mode; facilitate the security height that user understands WAP; and; the safety instruction information of application can also be supplied to user; user can be allow to know which application is used safely or using can be dangerous etc., so as to preferably protect the information security of user.
Description
Technical field
The application is related to computer realm, more particularly to a kind of technology for being used to provide the security information of WAP.
Background technology
With the fast development of radio network technique, user is more and more built by WAP in daily life
Vertical network connection, still, because the security of different WAPs is different, and user can not know to the wireless of connection
Whether access point is safe, and this allows for user can have potential safety hazard when connecting WAP, with the sense of security of users
Raising, the demand that people are understood WAP security information is increasing, and prior art can not meet user's
Demand.
The content of the invention
The purpose of the application is to provide a kind of method and apparatus for being used to provide the security information of WAP.
According to the one side of the application, there is provided a kind of method for being used to provide the security information of WAP, its
In, this method includes:
Security information corresponding to target wireless access points corresponding to user equipment is obtained, wherein, the security information includes
On the user equipment safety instruction information is applied via target wireless access points execution application;
The security information is provided to the user equipment.
According to the another aspect of the application, a kind of equipment for being used to provide the security information of WAP is additionally provided,
Wherein, the equipment includes:
First device, for obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, it is described
Security information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, for the security information to be provided to the user equipment.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP
Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application
Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc.,
So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please
Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing
Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access
Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points
When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access
Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into
Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this
Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to
So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method flow for being used to provide the security information of WAP according to the application one side
Figure;
Fig. 2 shows a kind of side for being used to provide the security information of WAP according to one preferred embodiment of the application
Method flow chart;
Fig. 3 shows to be shown according to a kind of equipment of security information for providing WAP of the application other side
It is intended to;
Fig. 4 is shown according to a kind of security information for being used to provide WAP of the application another preferred embodiment
Equipment schematic diagram.
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
In one typical configuration of the application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved
State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable
Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM),
Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, magnetic disk storage or other magnetic storage apparatus or
Any other non-transmission medium, the information that can be accessed by a computing device available for storage.Defined according to herein, computer
Computer-readable recording medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It is below in conjunction with the accompanying drawings and preferably real for the technological means and the effect of acquirement that further elaboration the application is taken
Example is applied, to the technical scheme of the application, carries out clear and complete description.
Fig. 1 shows a kind of method for being used to provide the security information of WAP that the application provides on one side, its
In, this method includes:
S1 obtains security information corresponding to target wireless access points corresponding to user equipment, wherein, the security information bag
Include and apply safety instruction information via target wireless access points execution application on the user equipment;
S2 provides the security information to the user equipment.
In this embodiment, in the step S1, it is corresponding that equipment 1 obtains target wireless access points corresponding to user equipment
Security information, wherein, the security information include on the user equipment via the target wireless access points perform should
Apply safety instruction information.Here, equipment 1 can be a server or more connected by LAN
Server or the multiple servers connected by internet, can also be the cloud being made up of multiple servers.Here, Yun Youji
Formed in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation
One kind, a super virtual computer being made up of the computer collection of a group loose couplings;Equipment 1 can also be any one
The mobile terminal of network service, including but not limited to mobile phone, palm PC (PPC), tablet personal computer or notebook electricity can be carried out
Brain etc..Wherein, the security information is to represent the height of target wireless access points security, here, the security information
Representation it is not unique, such as numerical value, grade or text information etc. can be included.Wherein, it is described to apply safety instruction
Information is prompting user's application risk situation of the different application under corresponding security information.Preferably, wherein, the application
Safety instruction information includes following at least any one:It can use safely, safety leaves a question open or prohibitted the use of;The application that can be used safely
Type information;The Apply Names information that can be used safely;The application type information to leave a question open safely;The Apply Names letter to leave a question open safely
Breath;The application type information prohibitted the use of;The Apply Names information prohibitted the use of.Wherein, " can use safely, safety leave a question open or
Prohibit the use of " etc. application safety instruction information can target wireless access points it is safe when prompt the current application of user
It can use safely, prompt user is current to leave a question open or in target using safety when the security of target wireless access points is not high
The application for prompting user current when the security of WAP is low prohibits the use of;" the application type information that can be used safely " is used
To prompt user which kind of application type can be used safely, for example, can be carried when the security of target wireless access points is higher
Show that user pays class application, the application of social class, bank client etc. and can used safely;" the Apply Names that can be used safely
Information " is to prompt which application on user equipment to use safely, for example, the security in target wireless access points is higher
When user's Alipay, Bank of China's client etc. can be prompted to use safely;" the application type information to leave a question open safely " is used
To prompt the which type of application of user that safety leaves a question open when in use, for example, when the security of target wireless access points is not high
Prompting user pays the safety such as class application, bank client and left a question open;" the Apply Names information to leave a question open safely " is prompting user
Which application safety in equipment leaves a question open, for example, user can be prompted to pay when the security of target wireless access points is not high
Precious, Bank of China's client etc. safety leaves a question open;" the application type information prohibitted the use of " is prompting user which kind of applies class
Type is prohibitted the use of, for example, user can be prompted to pay when the security of target wireless access points is very low, class is applied, social class is answered
Prohibitted the use of with, bank client etc.;" the Apply Names information prohibitted the use of " to prompt on user equipment which should
With prohibitting the use of, for example, user's Alipay, Bank of China client can be prompted when the security of target wireless access points is relatively low
End etc. can use safely.Here, the application safety instruction information is only for example, other are existing or are likely to occur from now on
The application is such as applicable to using safety instruction information, should be also included within the application protection domain, and herein with reference side
Formula is incorporated herein.Specifically, equipment 1 obtains the mode of security information corresponding to target wireless access points corresponding to user equipment,
Can be by corresponding to the lookup in the database that store the relevant information about target wireless access points at network equipment end
Security information;In described security information that user equipment end can be sent by receiving network equipment end etc..
Continue in this embodiment, in the step S2, the security information is provided to the user and set by equipment 1
It is standby, here, equipment 1 is network equipment end, specifically, the equipment 1 by based on the network equipment and user equipment it
Between the wireless connection established, according to respective communication protocol, the security information is provided to the user equipment.Preferably,
Wherein, the step S2 includes:The security information is presented in equipment 1 in the application widget of the user equipment.Here, equipment
1 is user equipment, specifically, when user equipment receives the security information either user equipment sheet of network equipment transmission
The security information is presented on corresponding application widget by the security information that body is determined based on certain rule, the user equipment
In.
It is highly preferred that wherein, the step S1 includes:S13 (not shown) receives the network equipment is provided, user equipment
Security information corresponding to corresponding target wireless access points;S14 (not shown) is according to the security information and the user equipment
The demand for security information of middle application, it is determined that performing the application of application via the target wireless access points on the user equipment
Safety instruction information.In the step S13, equipment 1 receives Target Wireless corresponding to the network equipment is provided, user equipment
Security information corresponding to access point, here, equipment 1 is user equipment, specifically the equipment 1 in the network by based on setting
The standby wireless connection established between user equipment, according to respective communication protocol, receive the network equipment is provided, Yong Hushe
Security information corresponding to standby corresponding target wireless access points, further, in the step S14, equipment 1 is according to the peace
The demand for security information applied in full information and the user equipment, it is determined that on the user equipment via the Target Wireless
Safety instruction information is applied in access point execution application.Here, equipment 1 can first detect to apply present in user equipment,
Those skilled in the art will be understood that the demand for security information applied in security information and user equipment is different, it is determined that
It is different using safety instruction information, for example, when the security information of WAP is relatively low, it is relatively low for demand for security
Using, belonging to the application type that can be used safely, its safety instruction information can be " can use safely ", and for demand for security
Higher application, belongs to the application type that safety leaves a question open or prohibitted the use of, and its prompt message can be " leaving a question open safely " or " prohibit
Only use " etc..Specifically, what equipment 1 can determine to apply in the user equipment based on predetermined rule carries using safety
Show information, for example, when the demand for security information applied in the security information and the user equipment is all to use numerical quantization,
When can then set the numerical value for the demand for security information for being more than application when the numerical value of security information, the safety instruction information of application can
Including " the application type information that can be used safely " or " the Apply Names information that can be used safely " etc.;When the numerical value of security information
When being less than certain threshold value less than the numerical value of the demand for security information of application and the absolute value of two numerical differences, the safety of application carries
Show that information may include " the application type information to leave a question open safely ", " the Apply Names information to leave a question open safely " etc.;When security information
When numerical value is more than certain threshold value less than the numerical value of demand for security information and the absolute value of two numerical differences of application, the peace of application
Full enlightening information may include " the application type information prohibitted the use of ", " the Apply Names information prohibitted the use of " etc..
It is highly preferred that wherein, the step S14 includes:Currently should according in the security information and the user equipment
Demand for security information, it is determined that performing the current application via the target wireless access points on the user equipment
Using safety instruction information;
Wherein, the step S2 includes:Described in being presented described in the user equipment in the application widget of current application
Security information.
In the step S14, equipment 1 is according to the safe need of current application in the security information and the user equipment
Information is sought, it is determined that performing being carried using safety for the current application via the target wireless access points on the user equipment
Show information, here, the equipment 1 is user equipment, those skilled in the art, which will be understood that on user equipment, may have currently
The application being used, therefore, when establishing connection with target wireless access points, being carried using safety for current application can be provided
Show information so that user chooses whether to be continuing with the current application, here, the application safety instruction information may include:It can pacify
Full use, safety leave a question open or prohibitted the use of.Specifically, equipment 1 can determine answering for the current application based on predetermined rule
With safety instruction information, for example, when the demand for security information of current application in the security information and the user equipment is all
, then, should when can set the numerical value for the demand for security information for being more than current application when the numerical value of security information during with numerical quantization
Safety instruction information may include " can use safely ";When the numerical value of security information is less than the demand for security information of current application
Numerical value and the absolute value of two numerical differences when being less than certain threshold value, the safety instruction information of current application may include " to deposit safely
Doubt ";When the numerical value of security information is more than one less than the numerical value of the demand for security information of current application and the absolute value of two numerical differences
During fixed threshold value, the safety instruction information of current application may include " prohibitting the use of ".Further, in step s 2, equipment 1 exists
The security information is presented described in the user equipment in the application widget of current application, specifically, equipment 1 can be by described in
Security information is presented in the application widget of the current application, to facilitate user to check.
Preferably, wherein, methods described also includes:S5 (not shown) is according to determining the application safety instruction information
Current application safety instruction information corresponding to current application in user equipment;
Wherein, the step S2 includes:Described in being presented described in the user equipment in the application widget of current application
Security information, wherein, the security information includes the current application safety instruction information.
In the step S5, equipment 1 determines currently should in the user equipment according to the application safety instruction information
With corresponding current application safety instruction information, wherein the application safety instruction information includes but is not limited to:Can use safely,
Safety leaves a question open or prohibitted the use of;The application type information that can be used safely;The Apply Names information that can be used safely;Safety leaves a question open
Application type information;The Apply Names information to leave a question open safely;The application type information prohibitted the use of;The application name prohibitted the use of
Claim information etc..Specifically, security information and the application safety instruction information of the equipment 1 according to the target wireless access points
Current application safety instruction information is determined, for example, when the security information of target wireless access points is higher than threshold value, from the application
" can use safely " may be selected in safety instruction information and be used as current application safety instruction information;When the peace of target wireless access points
When full information is less than threshold value, optional " prohibitting the use of " is used as current application safety instruction from the application safety instruction information
Information;When the security information of target wireless access points is in Near Threshold, " peace may be selected from the application safety instruction information
Leave a question open entirely " as current application safety instruction information etc..
Preferably, wherein, methods described also includes:S3 (not shown) obtain user equipment submit on target access
Access information request;Wherein, the step S1 includes:Obtain access information and safety corresponding to the target wireless access points
Information, wherein, the security information includes performing answering for application via the target wireless access points on the user equipment
With safety instruction information;Wherein, the step S2 includes:The access information and the security information are provided to the user
Equipment.
In the step S3, equipment 1 obtains the access information on target access that user equipment is submitted and asked,
This, the equipment 1 is the network equipment, and specifically, the equipment 1 between the network equipment and user equipment by based on building
Vertical wireless connection, according to respective communication protocol, obtain the access information on target access that user equipment is submitted and ask
Ask.Further, in the step S1, equipment 1 obtains access information corresponding to the target wireless access points and safety letter
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, specifically, equipment 1 can be by store the database of the relevant information about target wireless access points
Access information and security information corresponding to middle lookup, for example, the name information and MAC of the target wireless access points can be passed through
Information carries out matched and searched to the access information and security information of the target wireless access points in database.Further, exist
In the step S2, equipment 1 provides the access information and the security information to the user equipment, specifically, specifically
Ground, the equipment 1 is by based on the wireless connection established between the network equipment and user equipment, according to respective communication
Agreement, the access information and the security information are provided to the user equipment.
Preferably, wherein, methods described also includes:S4 (not shown) according to user equipment submit on WAP
Access point inquiry request, inquiry obtains target access corresponding to the user equipment;Wherein, the step S1 includes:Obtain
Take security information corresponding to the target wireless access points, wherein, the security information include on the user equipment via
Safety instruction information is applied in the target wireless access points execution application;Wherein, the step S2 includes:By the target without
Line access point and the security information are provided to the user equipment.In the step S4, equipment 1 is submitted according to user equipment
The access point inquiry request on WAP, inquiry obtains target access corresponding to the user equipment, here, institute
The WAP that inquiry request is used to inquire about around user equipment is stated, the position that the inquiry request includes user equipment is believed
Breath, specifically, equipment 1 can be that user equipment matches wirelessly connecing around the positional information according to the positional information of user equipment
Access point, further, in the step S1, equipment 1 obtains the security information of the WAP of surrounding, specifically, equipment 1
Security information corresponding to being searched in the database that store the relevant information about target wireless access points, wherein, institute
Stating security information includes performing the application safety instruction letter of application via the target wireless access points on the user equipment
Breath.Further, in the step S2, equipment 1 provides the target wireless access points and the security information to institute
User equipment is stated, specifically, the equipment 1 based on what is established between the network equipment and user equipment by wirelessly connecting
Connect, according to respective communication protocol, the target wireless access points and the security information are provided to the user equipment.
In a preferred embodiment, join shown in Fig. 2, wherein, the step S2' in Fig. 2 and the step in Fig. 1 embodiments
S2 is identical or essentially identical, therefore will not be repeated here, and is only incorporated herein by reference.Preferably, wherein, the step
S1' includes::S11' obtains security information corresponding to target wireless access points corresponding to user equipment;S12' is according to the safety
Information determines to apply safety instruction information via target wireless access points execution application on the user equipment.Institute
State in step S11', equipment 1 obtains security information corresponding to target wireless access points corresponding to user equipment, here, described set
Standby 1 includes the network equipment or user equipment, and specifically, it is corresponding that equipment 1 obtains target wireless access points corresponding to user equipment
Security information mode, can be by store the number of the relevant information about target wireless access points at network equipment end
According to security information corresponding to lookup in storehouse;In the security information that user equipment end can be sent by receiving network equipment end
Either user equipment is themselves based on described security information of pre-defined rule determination etc..Further, in the step S12'
In, equipment 1 determines to perform application via the target wireless access points on the user equipment according to the security information
Using safety instruction information, specifically, equipment 1 can determine that the application is pacified based on predetermined rule according to the security information
Full enlightening information, for example, the security information is represented in the form of numerical value, when the security information is more than threshold value, described in expression
The security of target wireless access points is very high, therefore, can include using safety instruction information:The application type that can be used safely
It can include and pay class application, financing class application etc.;When the security information is less than threshold value, the target wireless access points are represented
Security it is not high, therefore, can include using safety instruction information:The application type that safety leaves a question open or prohibitted the use of can wrap
The application of the class containing payment, financing class application etc..
It is highly preferred that wherein, the step S12' includes:Equipment 1 is according to the security information and the demand for security of application
Information, it is determined that applying safety instruction information via target wireless access points execution application on the user equipment.Tool
Body, the demand for security information of security information and application are different, it is determined that application safety instruction information be different, example
Such as, in the case where the security information of WAP is relatively low, for the relatively low application of demand for security, belong to what can be used safely
Application type, its safety instruction information can be " can use safely ", and for the higher application of demand for security, belong to safety and deposit
The application type doubted or prohibitted the use of, its prompt message can be " leaving a question open safely " or " prohibitting the use of " etc..Specifically, if
Standby 1 can determine the application based on predetermined rule apply safety instruction information, for example, when the security information and described
The demand for security information of application is all when using numerical quantization, then can set needs when the numerical value of security information is more than the safe of application
When seeking the numerical value of information, the safety instruction information of application may include " the application type information that can be used safely " or " can make safely
Apply Names information " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application
When absolute value is less than certain threshold value, the safety instruction information of application may include " the application type information to leave a question open safely ", " safety
Apply Names information to leave a question open " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application
Absolute value when being more than certain threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " prohibit
Apply Names information only used " etc..
It is highly preferred that wherein, the step S11' includes:S111'(is not shown) obtain user equipment corresponding to target without
Log information corresponding to line access point;S112'(is not shown) Target Wireless is determined according to the log information
The security information of access point.Fortune corresponding to target wireless access points corresponding to user equipment is obtained in the step S111' equipment 1
Row record information, here, the equipment 1 is the network equipment, wherein, the log information is included largely and wireless access
The relevant data message of point, specifically, equipment 1 obtains the mode of log information corresponding to target wireless access points, can be with
By searching the target wireless access points in the database of relevant data message of WAP is store, and obtain the mesh
Mark data message corresponding to WAP.For example, can be by searching the titles of the target wireless access points in database
And mac address information obtains data message corresponding to the target wireless access points stored in database.Further, in institute
State in step S112', equipment 1 determines the security information of the target wireless access points according to the log information, specifically
Ground, equipment 1 are based on according to data message relevant with the security information of the target wireless access points in the log
Predetermined rule determines the security information of the target wireless access points.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP
Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application
Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc.,
So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please
Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing
Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access
Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points
When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access
Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into
Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this
Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to
So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
Fig. 3 shows a kind of equipment for being used to provide the security information of WAP that the application provides on one side, its
In, the equipment includes:
First device, security information corresponding to target wireless access points corresponding to user equipment is obtained, wherein, the safety
Information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, the security information is provided to the user equipment.
In this embodiment, it is corresponding to obtain target wireless access points corresponding to user equipment for the first device of the equipment 1
Security information, wherein, the security information include on the user equipment via the target wireless access points perform should
Apply safety instruction information.Here, equipment 1 can be a server or more connected by LAN
Server or the multiple servers connected by internet, can also be the cloud being made up of multiple servers.Here, Yun Youji
Formed in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation
One kind, a super virtual computer being made up of the computer collection of a group loose couplings;Equipment 1 can also be any one
The mobile terminal of network service, including but not limited to mobile phone, palm PC (PPC), tablet personal computer or notebook electricity can be carried out
Brain etc..Wherein, the security information is to represent the height of target wireless access points security, here, the security information
Representation it is not unique, such as numerical value, grade or text information etc. can be included.Wherein, it is described to apply safety instruction
Information is prompting user's application risk situation of the different application under corresponding security information.Preferably, wherein, the application
Safety instruction information includes following at least any one:It can use safely, safety leaves a question open or prohibitted the use of;The application that can be used safely
Type information;The Apply Names information that can be used safely;The application type information to leave a question open safely;The Apply Names letter to leave a question open safely
Breath;The application type information prohibitted the use of;The Apply Names information prohibitted the use of.Wherein, " can use safely, safety leave a question open or
Prohibit the use of " etc. application safety instruction information can target wireless access points it is safe when prompt the current application of user
It can use safely, prompt user is current to leave a question open or in target using safety when the security of target wireless access points is not high
The application for prompting user current when the security of WAP is low prohibits the use of;" the application type information that can be used safely " is used
To prompt user which kind of application type can be used safely, for example, can be carried when the security of target wireless access points is higher
Show that user pays class application, the application of social class, bank client etc. and can used safely;" the Apply Names that can be used safely
Information " is to prompt which application on user equipment to use safely, for example, the security in target wireless access points is higher
When user's Alipay, Bank of China's client etc. can be prompted to use safely;" the application type information to leave a question open safely " is used
To prompt the which type of application of user that safety leaves a question open when in use, for example, when the security of target wireless access points is not high
Prompting user pays the safety such as class application, bank client and left a question open;" the Apply Names information to leave a question open safely " is prompting user
Which application safety in equipment leaves a question open, for example, user can be prompted to pay when the security of target wireless access points is not high
Precious, Bank of China's client etc. safety leaves a question open;" the application type information prohibitted the use of " is prompting user which kind of applies class
Type is prohibitted the use of, for example, user can be prompted to pay when the security of target wireless access points is very low, class is applied, social class is answered
Prohibitted the use of with, bank client etc.;" the Apply Names information prohibitted the use of " to prompt on user equipment which should
With prohibitting the use of, for example, user's Alipay, Bank of China client can be prompted when the security of target wireless access points is relatively low
End etc. can use safely.Here, the application safety instruction information is only for example, other are existing or are likely to occur from now on
The application is such as applicable to using safety instruction information, should be also included within the application protection domain, and herein with reference side
Formula is incorporated herein.Specifically, equipment 1 obtains the mode of security information corresponding to target wireless access points corresponding to user equipment,
Can be by corresponding to the lookup in the database that store the relevant information about target wireless access points at network equipment end
Security information;In described security information that user equipment end can be sent by receiving network equipment end etc..
Continuing in this embodiment, the second device of the equipment 1 provides the security information to the user equipment,
Here, equipment 1 is network equipment end, specifically, the equipment 1 between the network equipment and user equipment by based on building
Vertical wireless connection, according to respective communication protocol, the security information is provided to the user equipment.Preferably, wherein,
The second device of the equipment 1 is used for:The security information is presented in the application widget of the user equipment.Here, equipment 1
For user equipment, specifically, when user equipment receives the security information either user equipment sheet of network equipment transmission
The security information is presented on corresponding application widget by the security information that body is determined based on certain rule, the user equipment
In.
It is highly preferred that wherein, the first device includes:Third unit (not shown), that the reception network equipment is provided,
Security information corresponding to target wireless access points corresponding to user equipment;4th unit (not shown), according to the security information
And the demand for security information applied in the user equipment, it is determined that on the user equipment via the target wireless access points
Perform application applies safety instruction information.The third unit of the equipment 1 receives the network equipment is provided, user equipment pair
Security information corresponding to the target wireless access points answered, here, equipment 1 is user equipment, specifically the equipment 1 by based on
The wireless connection established between the network equipment and user equipment, according to respective communication protocol, receive network equipment institute
Security information corresponding to target wireless access points corresponding to provide, user equipment, further, the 4th of the equipment 1 are single
Member according to the demand for security information applied in the security information and the user equipment, it is determined that on the user equipment via
Safety instruction information is applied in the target wireless access points execution application.Here, equipment 1 can be detected first in user equipment
Existing application, those skilled in the art will be understood that the demand for security information applied in security information and user equipment not
Together, it is determined that application safety instruction information be different, for example, when the security information of WAP is relatively low, for peace
The relatively low application of full demand, belongs to the application type that can be used safely, and its safety instruction information can be " can use safely ", and
For the higher application of demand for security, belong to the application type that safety leaves a question open or prohibitted the use of, its prompt message can be " peace
Leave a question open entirely " or " prohibitting the use of " etc..Specifically, equipment 1 can determine to apply in the user equipment based on predetermined rule
Apply safety instruction information, for example, when the demand for security information applied in the security information and the user equipment is all
During with numerical quantization, then when can set the numerical value for the demand for security information for being more than application when the numerical value of security information, application
Safety instruction information may include " the application type information that can be used safely " or " the Apply Names information that can be used safely " etc.;When
The numerical value of security information is less than the numerical value of demand for security information of application and the absolute value of two numerical differences is less than certain threshold value
When, the safety instruction information of application may include " the application type information to leave a question open safely ", " the Apply Names information to leave a question open safely "
Deng;When the numerical value of security information is more than necessarily less than the numerical value of the demand for security information of application and the absolute value of two numerical differences
During threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " the Apply Names letter prohibitted the use of
Breath " etc..
It is highly preferred that wherein, Unit the 4th is used for:Currently should according in the security information and the user equipment
Demand for security information, it is determined that performing the current application via the target wireless access points on the user equipment
Using safety instruction information;
Wherein, the second device is used for:Institute is presented in the application widget of current application described in the user equipment
State security information.
Unit the 4th of the equipment 1 is according to the demand for security of current application in the security information and the user equipment
Information, it is determined that applying safety instruction via the target wireless access points execution current application on the user equipment
Information, here, the equipment 1 is user equipment, those skilled in the art, which will be understood that on user equipment, may have currently just
In the application used, therefore, when establishing connection with target wireless access points, can provide current application applies safety instruction
Information is so that user chooses whether to be continuing with the current application, here, the application safety instruction information may include:Can be safe
Leave a question open or prohibit the use of using, safety.Specifically, equipment 1 can determine the application of the current application based on predetermined rule
Safety instruction information, for example, when the demand for security information of current application in the security information and the user equipment is all to use
During numerical quantization, then when can set the numerical value for the demand for security information for being more than current application when the numerical value of security information, application
Safety instruction information may include " can use safely ";When the numerical value of security information is less than the demand for security information of current application
Numerical value and when the absolute value of two numerical differences is less than certain threshold value, the safety instruction information of current application may include " to deposit safely
Doubt ";When the numerical value of security information is more than one less than the numerical value of the demand for security information of current application and the absolute value of two numerical differences
During fixed threshold value, the safety instruction information of current application may include " prohibitting the use of ".Further, the second dress of the equipment 1
Put and the security information is presented in the application widget of current application described in the user equipment, specifically, equipment 1 can incite somebody to action
The security information is presented in the application widget of the current application, to facilitate user to check.
Preferably, wherein, the equipment also includes:5th device (not shown), according to the application safety instruction information
Determine current application safety instruction information corresponding to current application in the user equipment;
Wherein, the second device is used for:Institute is presented in the application widget of current application described in the user equipment
Security information is stated, wherein, the security information includes the current application safety instruction information.
5th device of the equipment 1 determines current application in the user equipment according to the application safety instruction information
Corresponding current application safety instruction information, wherein the application safety instruction information includes but is not limited to:It can use safely, pacify
Leave a question open or prohibit the use of entirely;The application type information that can be used safely;The Apply Names information that can be used safely;Leave a question open safely
Application type information;The Apply Names information to leave a question open safely;The application type information prohibitted the use of;The Apply Names prohibitted the use of
Information etc..Specifically, equipment 1 is true according to the security information of the target wireless access points and the application safety instruction information
Determine current application safety instruction information, for example, when the security information of target wireless access points is higher than threshold value, pacify from the application
" can use safely " may be selected in full enlightening information and be used as current application safety instruction information;When the safety of target wireless access points
When information is less than threshold value, " prohibitting the use of " may be selected from the application safety instruction information as current application safety instruction letter
Breath;When the security information of target wireless access points is in Near Threshold, " safety may be selected from the application safety instruction information
Leave a question open " as current application safety instruction information etc..Further, the second device is current described in the user equipment
The security information is presented in the application widget of application, wherein, the security information is believed including the current application safety instruction
Breath.
Preferably, wherein, the equipment also includes:3rd device (not shown), obtain user equipment submit on mesh
The access information request of tag splice access point;Wherein, the first device is used for:Obtain and accessed corresponding to the target wireless access points
Information and security information, wherein, the security information includes holding via the target wireless access points on the user equipment
Safety instruction information is applied in row application;Wherein, the second device is used for:The access information and the security information are carried
It is supplied to the user equipment.
The 3rd device of the equipment 1 obtains the access information on target access that user equipment is submitted and asked,
This, the equipment 1 is the network equipment, and specifically, the equipment 1 between the network equipment and user equipment by based on building
Vertical wireless connection, according to respective communication protocol, obtain the access information on target access that user equipment is submitted and ask
Ask.Further, the first device of the equipment 1 obtains access information corresponding to the target wireless access points and safety letter
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, specifically, equipment 1 can be by store the database of the relevant information about target wireless access points
Access information and security information corresponding to middle lookup, for example, the name information and MAC of the target wireless access points can be passed through
Information carries out matched and searched to the access information and security information of the target wireless access points in database.Further, institute
State the second device of equipment 1 to provide the access information and the security information to the user equipment, specifically, specifically
Ground, the equipment 1 is by based on the wireless connection established between the network equipment and user equipment, according to respective communication
Agreement, the access information and the security information are provided to the user equipment.
Preferably, wherein, the equipment also includes:4th device (not shown), according to user equipment submission on nothing
The access point inquiry request of line access point, inquiry obtain target access corresponding to the user equipment;Wherein, first dress
Put and be used for:Security information corresponding to the target wireless access points is obtained, wherein, the security information is included on the user
Equipment applies safety instruction information via target wireless access points execution application;Wherein, the second device is used for:Will
The target wireless access points and the security information are provided to the user equipment.4th device of the equipment 1 according to
The access point inquiry request on WAP that family equipment is submitted, inquiry obtain target access corresponding to the user equipment
Point, here, the inquiry request is used for the WAP inquired about around user equipment, the inquiry request includes user equipment
Positional information, specifically, equipment 1 can according to the positional information of user equipment be user equipment match around the positional information
WAP, further, the first device of the equipment 1 obtain around WAP security information, specifically
Ground, equipment 1 can be searched in the database that store the relevant information about target wireless access points corresponding to security information,
Wherein, the security information includes the application safety for performing application via the target wireless access points on the user equipment
Prompt message.Further, the second device of the equipment 1 provides the target wireless access points and the security information
To the user equipment, specifically, the equipment 1 passes through wireless based on what is established between the network equipment and user equipment
Connection, according to respective communication protocol, the target wireless access points and the security information are provided to the user equipment.
In a preferred embodiment, join shown in Fig. 4, wherein, second device in Fig. 4 and the in Fig. 3 embodiments
Two devices are identical or essentially identical, therefore will not be repeated here, and are only incorporated herein by reference.Preferably, wherein, described
One device includes:First module, obtain security information corresponding to target wireless access points corresponding to user equipment;Second unit,
Determined to perform the application safety of application via the target wireless access points on the user equipment according to the security information
Prompt message.The first module of the equipment 1 obtains security information corresponding to target wireless access points corresponding to user equipment,
This, the equipment 1 includes the network equipment or user equipment, and specifically, the first module of equipment 1 is obtained corresponding to user equipment
The mode of security information corresponding to target wireless access points, can be by connecing store relevant Target Wireless at network equipment end
Security information corresponding to being searched in the database of the relevant information of access point;Can be by receiving network equipment end at user equipment end
The security information sent either user equipment is themselves based on described security information of pre-defined rule determination etc..Further
Ground, the second unit of the equipment 1 determine to connect via the Target Wireless on the user equipment according to the security information
Safety instruction information is applied in access point execution application, and specifically, second unit can be based on predetermined rule according to the safety
Information determines the application safety instruction information, for example, the security information is represented in the form of numerical value, when the security information is big
When threshold value, represent that the security of the target wireless access points is very high, therefore, can include using safety instruction information:Can
The application type of safe handling, which can include, pays class application, financing class application etc.;When the security information is less than threshold value, represent
The security of the target wireless access points is not high, therefore, can include using safety instruction information:Safety leaves a question open or forbidden
The application type used, which can include, pays class application, financing class application etc..
It is highly preferred that wherein, the second unit is used for:According to the security information and the demand for security information of application,
It is determined that apply safety instruction information via target wireless access points execution application on the user equipment.Specifically,
Security information and the demand for security information of application are different, it is determined that application safety instruction information be different, for example, in nothing
In the case that the security information of line access point is relatively low, for the relatively low application of demand for security, belong to the application class that can be used safely
Type, its safety instruction information can be " can use safely ", and for the higher application of demand for security, belong to safety leave a question open or
The application type prohibitted the use of, its prompt message can be " leaving a question open safely " or " prohibitting the use of " etc..Specifically, second unit
Can be determined based on predetermined rule the application apply safety instruction information, for example, when the security information and it is described should
Demand for security information is all when using numerical quantization, then can set when the numerical value of security information is more than the demand for security of application
During the numerical value of information, the safety instruction information of application may include " the application type information that can be used safely " or " can use safely
Apply Names information " etc.;When security information numerical value be less than application demand for security information numerical value and two numerical differences it is exhausted
When being less than certain threshold value to value, the safety instruction information of application may include " the application type information to leave a question open safely ", " deposit safely
Doubtful Apply Names information " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application
When absolute value is more than certain threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " forbid
Apply Names information used " etc..
It is highly preferred that wherein, the first module includes:First subelement (not shown), obtain corresponding to user equipment
Log information corresponding to target wireless access points;Second subelement (not shown), determined according to the log information
The security information of the target wireless access points.First subelement of the equipment 1 obtains Target Wireless corresponding to user equipment
Log information corresponding to access point, here, the equipment 1 is the network equipment, wherein, the log information includes big
The data message relevant with WAP of amount, specifically, equipment 1 obtain log letter corresponding to target wireless access points
The mode of breath, it can be accessed by searching the Target Wireless in the database of relevant data message of WAP is store
Point, and obtain data message corresponding to the target wireless access points.For example, can be by searching the Target Wireless in database
The title of access point and mac address information obtain data message corresponding to the target wireless access points stored in database.
Further, the second subelement of the equipment 1 determines the peace of the target wireless access points according to the log information
Full information, specifically, equipment 1 is according to data relevant with the security information of the target wireless access points in the log
Information, and determine based on predetermined rule the security information of the target wireless access points.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP
Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application
Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc.,
So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please
Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing
Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access
Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points
When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access
Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into
Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points
Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment
Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this
Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to
So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie
In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power
Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling
Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.This
Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple
Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table
Show title, and be not offered as any specific order.
Claims (22)
1. a kind of method for being used to provide the security information of WAP, wherein, this method includes:
Obtain user equipment corresponding to security information corresponding to target wireless access points, wherein, the security information include on
The user equipment applies safety instruction information via target wireless access points execution application;
The security information is provided to the user equipment.
2. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment
Security information includes:
Obtain security information corresponding to target wireless access points corresponding to user equipment;
Determined to perform the application of application via the target wireless access points on the user equipment according to the security information
Safety instruction information.
3. the method according to claim 11, wherein, it is described to determine to pass through on the user equipment according to the security information
Including using safety instruction information for application is performed by the target wireless access points:
According to the security information and the demand for security information of application, it is determined that on the user equipment via the Target Wireless
Safety instruction information is applied in access point execution application.
4. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment
Security information includes:
Obtain log information corresponding to target wireless access points corresponding to user equipment;
The security information of the target wireless access points is determined according to the log information.
5. method according to any one of claim 1 to 4, wherein, methods described also includes:
The access information on target access that user equipment is submitted is obtained to ask;
Wherein, security information corresponding to target wireless access points corresponding to the acquisition user equipment includes:
Obtain access information and security information corresponding to the target wireless access points, wherein, the security information include on
The user equipment applies safety instruction information via target wireless access points execution application;
Wherein, described provide the security information to the user equipment includes:
The access information and the security information are provided to the user equipment.
6. method according to any one of claim 1 to 4, wherein, methods described also includes:
The access point inquiry request on WAP submitted according to user equipment, it is corresponding that inquiry obtains the user equipment
Target access;
Wherein, security information corresponding to target wireless access points corresponding to the acquisition user equipment includes:
Security information corresponding to the target wireless access points is obtained, wherein, the security information includes setting on the user
It is standby to apply safety instruction information via target wireless access points execution application;
Wherein, described provide the security information to the user equipment includes:
The target wireless access points and the security information are provided to the user equipment.
7. according to the method for claim 1, wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of the user equipment.
8. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment
Security information includes:
Receive security information corresponding to target wireless access points corresponding to the network equipment is provided, user equipment;
According to the demand for security information applied in the security information and the user equipment, it is determined that being passed through on the user equipment
Safety instruction information is applied by target wireless access points execution application.
9. according to the method for claim 8, wherein, it is described according to applying in the security information and the user equipment
Demand for security information, it is determined that applying safety instruction via target wireless access points execution application on the user equipment
Information includes:
According to the demand for security information of current application in the security information and the user equipment, it is determined that being set on the user
It is standby to apply safety instruction information via the target wireless access points execution current application;
Wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of current application described in the user equipment.
10. according to the method for claim 7, wherein, methods described also includes:
The current application safety instruction according to corresponding to the application safety instruction information determines current application in the user equipment
Information;
Wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of current application described in the user equipment, wherein, the safety letter
Breath includes the current application safety instruction information.
11. method according to any one of claim 1 to 10, wherein, the application safety instruction information includes following
Any one of at least:
It can use safely, safety leaves a question open or prohibitted the use of;
The application type information that can be used safely;
The Apply Names information that can be used safely;
The application type information to leave a question open safely;
The Apply Names information to leave a question open safely;
The application type information prohibitted the use of;
The Apply Names information prohibitted the use of.
12. a kind of equipment for being used to provide the security information of WAP, wherein, the equipment includes:
First device, for obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, the safety
Information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, for the security information to be provided to the user equipment.
13. equipment according to claim 12, wherein, the first device includes:
First module, for obtaining security information corresponding to target wireless access points corresponding to user equipment;
Second unit, for determining to hold via the target wireless access points on the user equipment according to the security information
Safety instruction information is applied in row application.
14. equipment according to claim 13, wherein, the second unit is used for:
According to the security information and the demand for security information of application, it is determined that on the user equipment via the Target Wireless
Safety instruction information is applied in access point execution application.
15. equipment according to claim 13, wherein, the first module includes:
First subelement, for obtaining log information corresponding to target wireless access points corresponding to user equipment;
Second subelement, for determining the security information of the target wireless access points according to the log information.
16. the equipment according to any one of claim 12 to 15, wherein, the equipment also includes:
3rd device, the access information on target access for obtaining user equipment submission are asked;
Wherein, the first device is used for:
Obtain access information and security information corresponding to the target wireless access points, wherein, the security information include on
The user equipment applies safety instruction information via target wireless access points execution application;
Wherein, the second device is used for:
The access information and the security information are provided to the user equipment.
17. the equipment according to any one of claim 12 to 15, wherein, the equipment also includes:
4th device, for the access point inquiry request on WAP submitted according to user equipment, inquiry obtains institute
State target access corresponding to user equipment;
Wherein, the first device is used for:
Security information corresponding to the target wireless access points is obtained, wherein, the security information includes setting on the user
It is standby to apply safety instruction information via target wireless access points execution application;
Wherein, the second device is used for:
The target wireless access points and the security information are provided to the user equipment.
18. equipment according to claim 12, wherein, the second device is used for:
The security information is presented in the application widget of the user equipment.
19. equipment according to claim 18, wherein, the first device includes:
Third unit, for receiving safety corresponding to target wireless access points corresponding to the network equipment is provided, user equipment
Information;
Unit the 4th, for according to the demand for security information applied in the security information and the user equipment, it is determined that on
The user equipment applies safety instruction information via target wireless access points execution application.
20. equipment according to claim 19, wherein, Unit the 4th is used for:
According to the demand for security information of current application in the security information and the user equipment, it is determined that being set on the user
It is standby to apply safety instruction information via the target wireless access points execution current application;
Wherein, the second device is used for:
The security information is presented in the application widget of current application described in the user equipment.
21. equipment according to claim 18, wherein, the equipment also includes:
5th device, for current corresponding to determining current application in the user equipment according to the application safety instruction information
Using safety instruction information;
Wherein, the second device is used for:
The security information is presented in the application widget of current application described in the user equipment, wherein, the safety letter
Breath includes the current application safety instruction information.
22. the equipment according to any one of claim 12 to 21, wherein, the application safety instruction information includes following
Any one of at least:
It can use safely, safety leaves a question open or prohibitted the use of;
The application type information that can be used safely;
The Apply Names information that can be used safely;
The application type information to leave a question open safely;
The Apply Names information to leave a question open safely;
The application type information prohibitted the use of;
The Apply Names information prohibitted the use of.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494325.9A CN107548064A (en) | 2016-06-29 | 2016-06-29 | For the method and apparatus for the security information for providing WAP |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610494325.9A CN107548064A (en) | 2016-06-29 | 2016-06-29 | For the method and apparatus for the security information for providing WAP |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107548064A true CN107548064A (en) | 2018-01-05 |
Family
ID=60962719
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610494325.9A Pending CN107548064A (en) | 2016-06-29 | 2016-06-29 | For the method and apparatus for the security information for providing WAP |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107548064A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108990064A (en) * | 2018-07-27 | 2018-12-11 | 上海连尚网络科技有限公司 | Hotspot connection method, electronic equipment and medium |
CN111698682A (en) * | 2020-06-12 | 2020-09-22 | 深圳天度物联信息技术有限公司 | Data transmission method based on public WiFi network environment, server and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
GB2521196B (en) * | 2013-12-12 | 2016-06-15 | Good Tech Corp | Secure communication channels |
CN105682015A (en) * | 2016-04-05 | 2016-06-15 | 上海连尚网络科技有限公司 | Method and device for establishing wireless connection |
CN105392134B (en) * | 2014-09-02 | 2019-09-06 | 恩德莱斯和豪瑟尔分析仪表两合公司 | The method of at least one first unit is authenticated at least one second unit |
-
2016
- 2016-06-29 CN CN201610494325.9A patent/CN107548064A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2521196B (en) * | 2013-12-12 | 2016-06-15 | Good Tech Corp | Secure communication channels |
CN105392134B (en) * | 2014-09-02 | 2019-09-06 | 恩德莱斯和豪瑟尔分析仪表两合公司 | The method of at least one first unit is authenticated at least one second unit |
CN104717653A (en) * | 2015-03-12 | 2015-06-17 | 惠州Tcl移动通信有限公司 | Network connection control method and system of mobile terminal |
CN105682015A (en) * | 2016-04-05 | 2016-06-15 | 上海连尚网络科技有限公司 | Method and device for establishing wireless connection |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108990064A (en) * | 2018-07-27 | 2018-12-11 | 上海连尚网络科技有限公司 | Hotspot connection method, electronic equipment and medium |
CN108990064B (en) * | 2018-07-27 | 2022-03-01 | 上海尚往网络科技有限公司 | Wireless hotspot connection method, electronic device and medium |
CN111698682A (en) * | 2020-06-12 | 2020-09-22 | 深圳天度物联信息技术有限公司 | Data transmission method based on public WiFi network environment, server and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI647583B (en) | Prompt method and prompting device for login account | |
EP3435260A1 (en) | Method and device for outputting risk information and constructing risk information | |
WO2017067394A1 (en) | Method and system for distributing customer service modes | |
CN105873239B (en) | The method that wireless connection is set up for the application for user equipment | |
CN106550004A (en) | The recommendation method and device of business object | |
EP3200113B1 (en) | Password protection question setting method and device | |
CN105471581A (en) | Identity verification method and device | |
US20140304833A1 (en) | Method and system for providing access to crowdsourcing tasks | |
CN113542201B (en) | Access control method and equipment for Internet service | |
US9384330B2 (en) | Providing user attributes to complete an online transaction | |
CN109257321A (en) | Safe login method and device | |
CN104980420B (en) | A kind of method for processing business, device, terminal and server | |
CN106209970B (en) | Determine the method and apparatus of network state connected between user equipment and routing device | |
CN106330846A (en) | Cross-platform object recommendation method and device | |
CN105898835B (en) | Generate the method and apparatus of the access point attribute information of WAP | |
CN106102059B (en) | For the method and apparatus for the owner for determining hotspot | |
CN108156118A (en) | User Identity method and device | |
CN107548064A (en) | For the method and apparatus for the security information for providing WAP | |
CN108259518A (en) | A kind of network connection authentication method, device, electronic equipment and storage medium | |
CN105337946B (en) | The method and apparatus of webpage fake certification | |
CN107548032A (en) | For providing the method and apparatus of WAP information | |
CN105873046B (en) | A kind of method and apparatus for managing WAP | |
US20160080387A1 (en) | Database Access Using A Common Web Interface | |
CN107547221A (en) | A kind of method and apparatus for being used to provide log information | |
Von Platen | Communication consulting and consultancies |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210415 Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd. Address before: 201306 N2025 room 24, 2 New Town Road, mud town, Pudong New Area, Shanghai Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180105 |