CN107548064A - For the method and apparatus for the security information for providing WAP - Google Patents

For the method and apparatus for the security information for providing WAP Download PDF

Info

Publication number
CN107548064A
CN107548064A CN201610494325.9A CN201610494325A CN107548064A CN 107548064 A CN107548064 A CN 107548064A CN 201610494325 A CN201610494325 A CN 201610494325A CN 107548064 A CN107548064 A CN 107548064A
Authority
CN
China
Prior art keywords
information
user equipment
security information
application
target wireless
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610494325.9A
Other languages
Chinese (zh)
Inventor
侯立军
陈超
王训印
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co.,Ltd.
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201610494325.9A priority Critical patent/CN107548064A/en
Publication of CN107548064A publication Critical patent/CN107548064A/en
Pending legal-status Critical Current

Links

Landscapes

  • Mobile Radio Communication Systems (AREA)

Abstract

The purpose of the application is to provide a kind of method and apparatus for being used to provide the security information of WAP.Compared with prior art, the application is by obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, the security information includes applying safety instruction information via target wireless access points execution application on the user equipment, then provides the security information to the user equipment.The security information of WAP can be supplied to user by this mode; facilitate the security height that user understands WAP; and; the safety instruction information of application can also be supplied to user; user can be allow to know which application is used safely or using can be dangerous etc., so as to preferably protect the information security of user.

Description

For the method and apparatus for the security information for providing WAP
Technical field
The application is related to computer realm, more particularly to a kind of technology for being used to provide the security information of WAP.
Background technology
With the fast development of radio network technique, user is more and more built by WAP in daily life Vertical network connection, still, because the security of different WAPs is different, and user can not know to the wireless of connection Whether access point is safe, and this allows for user can have potential safety hazard when connecting WAP, with the sense of security of users Raising, the demand that people are understood WAP security information is increasing, and prior art can not meet user's Demand.
The content of the invention
The purpose of the application is to provide a kind of method and apparatus for being used to provide the security information of WAP.
According to the one side of the application, there is provided a kind of method for being used to provide the security information of WAP, its In, this method includes:
Security information corresponding to target wireless access points corresponding to user equipment is obtained, wherein, the security information includes On the user equipment safety instruction information is applied via target wireless access points execution application;
The security information is provided to the user equipment.
According to the another aspect of the application, a kind of equipment for being used to provide the security information of WAP is additionally provided, Wherein, the equipment includes:
First device, for obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, it is described Security information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, for the security information to be provided to the user equipment.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc., So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
Brief description of the drawings
By reading the detailed description made to non-limiting example made with reference to the following drawings, of the invention is other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method flow for being used to provide the security information of WAP according to the application one side Figure;
Fig. 2 shows a kind of side for being used to provide the security information of WAP according to one preferred embodiment of the application Method flow chart;
Fig. 3 shows to be shown according to a kind of equipment of security information for providing WAP of the application other side It is intended to;
Fig. 4 is shown according to a kind of security information for being used to provide WAP of the application another preferred embodiment Equipment schematic diagram.
Same or analogous reference represents same or analogous part in accompanying drawing.
Embodiment
The present invention is described in further detail below in conjunction with the accompanying drawings.
In one typical configuration of the application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, magnetic disk storage or other magnetic storage apparatus or Any other non-transmission medium, the information that can be accessed by a computing device available for storage.Defined according to herein, computer Computer-readable recording medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It is below in conjunction with the accompanying drawings and preferably real for the technological means and the effect of acquirement that further elaboration the application is taken Example is applied, to the technical scheme of the application, carries out clear and complete description.
Fig. 1 shows a kind of method for being used to provide the security information of WAP that the application provides on one side, its In, this method includes:
S1 obtains security information corresponding to target wireless access points corresponding to user equipment, wherein, the security information bag Include and apply safety instruction information via target wireless access points execution application on the user equipment;
S2 provides the security information to the user equipment.
In this embodiment, in the step S1, it is corresponding that equipment 1 obtains target wireless access points corresponding to user equipment Security information, wherein, the security information include on the user equipment via the target wireless access points perform should Apply safety instruction information.Here, equipment 1 can be a server or more connected by LAN Server or the multiple servers connected by internet, can also be the cloud being made up of multiple servers.Here, Yun Youji Formed in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation One kind, a super virtual computer being made up of the computer collection of a group loose couplings;Equipment 1 can also be any one The mobile terminal of network service, including but not limited to mobile phone, palm PC (PPC), tablet personal computer or notebook electricity can be carried out Brain etc..Wherein, the security information is to represent the height of target wireless access points security, here, the security information Representation it is not unique, such as numerical value, grade or text information etc. can be included.Wherein, it is described to apply safety instruction Information is prompting user's application risk situation of the different application under corresponding security information.Preferably, wherein, the application Safety instruction information includes following at least any one:It can use safely, safety leaves a question open or prohibitted the use of;The application that can be used safely Type information;The Apply Names information that can be used safely;The application type information to leave a question open safely;The Apply Names letter to leave a question open safely Breath;The application type information prohibitted the use of;The Apply Names information prohibitted the use of.Wherein, " can use safely, safety leave a question open or Prohibit the use of " etc. application safety instruction information can target wireless access points it is safe when prompt the current application of user It can use safely, prompt user is current to leave a question open or in target using safety when the security of target wireless access points is not high The application for prompting user current when the security of WAP is low prohibits the use of;" the application type information that can be used safely " is used To prompt user which kind of application type can be used safely, for example, can be carried when the security of target wireless access points is higher Show that user pays class application, the application of social class, bank client etc. and can used safely;" the Apply Names that can be used safely Information " is to prompt which application on user equipment to use safely, for example, the security in target wireless access points is higher When user's Alipay, Bank of China's client etc. can be prompted to use safely;" the application type information to leave a question open safely " is used To prompt the which type of application of user that safety leaves a question open when in use, for example, when the security of target wireless access points is not high Prompting user pays the safety such as class application, bank client and left a question open;" the Apply Names information to leave a question open safely " is prompting user Which application safety in equipment leaves a question open, for example, user can be prompted to pay when the security of target wireless access points is not high Precious, Bank of China's client etc. safety leaves a question open;" the application type information prohibitted the use of " is prompting user which kind of applies class Type is prohibitted the use of, for example, user can be prompted to pay when the security of target wireless access points is very low, class is applied, social class is answered Prohibitted the use of with, bank client etc.;" the Apply Names information prohibitted the use of " to prompt on user equipment which should With prohibitting the use of, for example, user's Alipay, Bank of China client can be prompted when the security of target wireless access points is relatively low End etc. can use safely.Here, the application safety instruction information is only for example, other are existing or are likely to occur from now on The application is such as applicable to using safety instruction information, should be also included within the application protection domain, and herein with reference side Formula is incorporated herein.Specifically, equipment 1 obtains the mode of security information corresponding to target wireless access points corresponding to user equipment, Can be by corresponding to the lookup in the database that store the relevant information about target wireless access points at network equipment end Security information;In described security information that user equipment end can be sent by receiving network equipment end etc..
Continue in this embodiment, in the step S2, the security information is provided to the user and set by equipment 1 It is standby, here, equipment 1 is network equipment end, specifically, the equipment 1 by based on the network equipment and user equipment it Between the wireless connection established, according to respective communication protocol, the security information is provided to the user equipment.Preferably, Wherein, the step S2 includes:The security information is presented in equipment 1 in the application widget of the user equipment.Here, equipment 1 is user equipment, specifically, when user equipment receives the security information either user equipment sheet of network equipment transmission The security information is presented on corresponding application widget by the security information that body is determined based on certain rule, the user equipment In.
It is highly preferred that wherein, the step S1 includes:S13 (not shown) receives the network equipment is provided, user equipment Security information corresponding to corresponding target wireless access points;S14 (not shown) is according to the security information and the user equipment The demand for security information of middle application, it is determined that performing the application of application via the target wireless access points on the user equipment Safety instruction information.In the step S13, equipment 1 receives Target Wireless corresponding to the network equipment is provided, user equipment Security information corresponding to access point, here, equipment 1 is user equipment, specifically the equipment 1 in the network by based on setting The standby wireless connection established between user equipment, according to respective communication protocol, receive the network equipment is provided, Yong Hushe Security information corresponding to standby corresponding target wireless access points, further, in the step S14, equipment 1 is according to the peace The demand for security information applied in full information and the user equipment, it is determined that on the user equipment via the Target Wireless Safety instruction information is applied in access point execution application.Here, equipment 1 can first detect to apply present in user equipment, Those skilled in the art will be understood that the demand for security information applied in security information and user equipment is different, it is determined that It is different using safety instruction information, for example, when the security information of WAP is relatively low, it is relatively low for demand for security Using, belonging to the application type that can be used safely, its safety instruction information can be " can use safely ", and for demand for security Higher application, belongs to the application type that safety leaves a question open or prohibitted the use of, and its prompt message can be " leaving a question open safely " or " prohibit Only use " etc..Specifically, what equipment 1 can determine to apply in the user equipment based on predetermined rule carries using safety Show information, for example, when the demand for security information applied in the security information and the user equipment is all to use numerical quantization, When can then set the numerical value for the demand for security information for being more than application when the numerical value of security information, the safety instruction information of application can Including " the application type information that can be used safely " or " the Apply Names information that can be used safely " etc.;When the numerical value of security information When being less than certain threshold value less than the numerical value of the demand for security information of application and the absolute value of two numerical differences, the safety of application carries Show that information may include " the application type information to leave a question open safely ", " the Apply Names information to leave a question open safely " etc.;When security information When numerical value is more than certain threshold value less than the numerical value of demand for security information and the absolute value of two numerical differences of application, the peace of application Full enlightening information may include " the application type information prohibitted the use of ", " the Apply Names information prohibitted the use of " etc..
It is highly preferred that wherein, the step S14 includes:Currently should according in the security information and the user equipment Demand for security information, it is determined that performing the current application via the target wireless access points on the user equipment Using safety instruction information;
Wherein, the step S2 includes:Described in being presented described in the user equipment in the application widget of current application Security information.
In the step S14, equipment 1 is according to the safe need of current application in the security information and the user equipment Information is sought, it is determined that performing being carried using safety for the current application via the target wireless access points on the user equipment Show information, here, the equipment 1 is user equipment, those skilled in the art, which will be understood that on user equipment, may have currently The application being used, therefore, when establishing connection with target wireless access points, being carried using safety for current application can be provided Show information so that user chooses whether to be continuing with the current application, here, the application safety instruction information may include:It can pacify Full use, safety leave a question open or prohibitted the use of.Specifically, equipment 1 can determine answering for the current application based on predetermined rule With safety instruction information, for example, when the demand for security information of current application in the security information and the user equipment is all , then, should when can set the numerical value for the demand for security information for being more than current application when the numerical value of security information during with numerical quantization Safety instruction information may include " can use safely ";When the numerical value of security information is less than the demand for security information of current application Numerical value and the absolute value of two numerical differences when being less than certain threshold value, the safety instruction information of current application may include " to deposit safely Doubt ";When the numerical value of security information is more than one less than the numerical value of the demand for security information of current application and the absolute value of two numerical differences During fixed threshold value, the safety instruction information of current application may include " prohibitting the use of ".Further, in step s 2, equipment 1 exists The security information is presented described in the user equipment in the application widget of current application, specifically, equipment 1 can be by described in Security information is presented in the application widget of the current application, to facilitate user to check.
Preferably, wherein, methods described also includes:S5 (not shown) is according to determining the application safety instruction information Current application safety instruction information corresponding to current application in user equipment;
Wherein, the step S2 includes:Described in being presented described in the user equipment in the application widget of current application Security information, wherein, the security information includes the current application safety instruction information.
In the step S5, equipment 1 determines currently should in the user equipment according to the application safety instruction information With corresponding current application safety instruction information, wherein the application safety instruction information includes but is not limited to:Can use safely, Safety leaves a question open or prohibitted the use of;The application type information that can be used safely;The Apply Names information that can be used safely;Safety leaves a question open Application type information;The Apply Names information to leave a question open safely;The application type information prohibitted the use of;The application name prohibitted the use of Claim information etc..Specifically, security information and the application safety instruction information of the equipment 1 according to the target wireless access points Current application safety instruction information is determined, for example, when the security information of target wireless access points is higher than threshold value, from the application " can use safely " may be selected in safety instruction information and be used as current application safety instruction information;When the peace of target wireless access points When full information is less than threshold value, optional " prohibitting the use of " is used as current application safety instruction from the application safety instruction information Information;When the security information of target wireless access points is in Near Threshold, " peace may be selected from the application safety instruction information Leave a question open entirely " as current application safety instruction information etc..
Preferably, wherein, methods described also includes:S3 (not shown) obtain user equipment submit on target access Access information request;Wherein, the step S1 includes:Obtain access information and safety corresponding to the target wireless access points Information, wherein, the security information includes performing answering for application via the target wireless access points on the user equipment With safety instruction information;Wherein, the step S2 includes:The access information and the security information are provided to the user Equipment.
In the step S3, equipment 1 obtains the access information on target access that user equipment is submitted and asked, This, the equipment 1 is the network equipment, and specifically, the equipment 1 between the network equipment and user equipment by based on building Vertical wireless connection, according to respective communication protocol, obtain the access information on target access that user equipment is submitted and ask Ask.Further, in the step S1, equipment 1 obtains access information corresponding to the target wireless access points and safety letter Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, specifically, equipment 1 can be by store the database of the relevant information about target wireless access points Access information and security information corresponding to middle lookup, for example, the name information and MAC of the target wireless access points can be passed through Information carries out matched and searched to the access information and security information of the target wireless access points in database.Further, exist In the step S2, equipment 1 provides the access information and the security information to the user equipment, specifically, specifically Ground, the equipment 1 is by based on the wireless connection established between the network equipment and user equipment, according to respective communication Agreement, the access information and the security information are provided to the user equipment.
Preferably, wherein, methods described also includes:S4 (not shown) according to user equipment submit on WAP Access point inquiry request, inquiry obtains target access corresponding to the user equipment;Wherein, the step S1 includes:Obtain Take security information corresponding to the target wireless access points, wherein, the security information include on the user equipment via Safety instruction information is applied in the target wireless access points execution application;Wherein, the step S2 includes:By the target without Line access point and the security information are provided to the user equipment.In the step S4, equipment 1 is submitted according to user equipment The access point inquiry request on WAP, inquiry obtains target access corresponding to the user equipment, here, institute The WAP that inquiry request is used to inquire about around user equipment is stated, the position that the inquiry request includes user equipment is believed Breath, specifically, equipment 1 can be that user equipment matches wirelessly connecing around the positional information according to the positional information of user equipment Access point, further, in the step S1, equipment 1 obtains the security information of the WAP of surrounding, specifically, equipment 1 Security information corresponding to being searched in the database that store the relevant information about target wireless access points, wherein, institute Stating security information includes performing the application safety instruction letter of application via the target wireless access points on the user equipment Breath.Further, in the step S2, equipment 1 provides the target wireless access points and the security information to institute User equipment is stated, specifically, the equipment 1 based on what is established between the network equipment and user equipment by wirelessly connecting Connect, according to respective communication protocol, the target wireless access points and the security information are provided to the user equipment.
In a preferred embodiment, join shown in Fig. 2, wherein, the step S2' in Fig. 2 and the step in Fig. 1 embodiments S2 is identical or essentially identical, therefore will not be repeated here, and is only incorporated herein by reference.Preferably, wherein, the step S1' includes::S11' obtains security information corresponding to target wireless access points corresponding to user equipment;S12' is according to the safety Information determines to apply safety instruction information via target wireless access points execution application on the user equipment.Institute State in step S11', equipment 1 obtains security information corresponding to target wireless access points corresponding to user equipment, here, described set Standby 1 includes the network equipment or user equipment, and specifically, it is corresponding that equipment 1 obtains target wireless access points corresponding to user equipment Security information mode, can be by store the number of the relevant information about target wireless access points at network equipment end According to security information corresponding to lookup in storehouse;In the security information that user equipment end can be sent by receiving network equipment end Either user equipment is themselves based on described security information of pre-defined rule determination etc..Further, in the step S12' In, equipment 1 determines to perform application via the target wireless access points on the user equipment according to the security information Using safety instruction information, specifically, equipment 1 can determine that the application is pacified based on predetermined rule according to the security information Full enlightening information, for example, the security information is represented in the form of numerical value, when the security information is more than threshold value, described in expression The security of target wireless access points is very high, therefore, can include using safety instruction information:The application type that can be used safely It can include and pay class application, financing class application etc.;When the security information is less than threshold value, the target wireless access points are represented Security it is not high, therefore, can include using safety instruction information:The application type that safety leaves a question open or prohibitted the use of can wrap The application of the class containing payment, financing class application etc..
It is highly preferred that wherein, the step S12' includes:Equipment 1 is according to the security information and the demand for security of application Information, it is determined that applying safety instruction information via target wireless access points execution application on the user equipment.Tool Body, the demand for security information of security information and application are different, it is determined that application safety instruction information be different, example Such as, in the case where the security information of WAP is relatively low, for the relatively low application of demand for security, belong to what can be used safely Application type, its safety instruction information can be " can use safely ", and for the higher application of demand for security, belong to safety and deposit The application type doubted or prohibitted the use of, its prompt message can be " leaving a question open safely " or " prohibitting the use of " etc..Specifically, if Standby 1 can determine the application based on predetermined rule apply safety instruction information, for example, when the security information and described The demand for security information of application is all when using numerical quantization, then can set needs when the numerical value of security information is more than the safe of application When seeking the numerical value of information, the safety instruction information of application may include " the application type information that can be used safely " or " can make safely Apply Names information " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application When absolute value is less than certain threshold value, the safety instruction information of application may include " the application type information to leave a question open safely ", " safety Apply Names information to leave a question open " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application Absolute value when being more than certain threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " prohibit Apply Names information only used " etc..
It is highly preferred that wherein, the step S11' includes:S111'(is not shown) obtain user equipment corresponding to target without Log information corresponding to line access point;S112'(is not shown) Target Wireless is determined according to the log information The security information of access point.Fortune corresponding to target wireless access points corresponding to user equipment is obtained in the step S111' equipment 1 Row record information, here, the equipment 1 is the network equipment, wherein, the log information is included largely and wireless access The relevant data message of point, specifically, equipment 1 obtains the mode of log information corresponding to target wireless access points, can be with By searching the target wireless access points in the database of relevant data message of WAP is store, and obtain the mesh Mark data message corresponding to WAP.For example, can be by searching the titles of the target wireless access points in database And mac address information obtains data message corresponding to the target wireless access points stored in database.Further, in institute State in step S112', equipment 1 determines the security information of the target wireless access points according to the log information, specifically Ground, equipment 1 are based on according to data message relevant with the security information of the target wireless access points in the log Predetermined rule determines the security information of the target wireless access points.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc., So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
Fig. 3 shows a kind of equipment for being used to provide the security information of WAP that the application provides on one side, its In, the equipment includes:
First device, security information corresponding to target wireless access points corresponding to user equipment is obtained, wherein, the safety Information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, the security information is provided to the user equipment.
In this embodiment, it is corresponding to obtain target wireless access points corresponding to user equipment for the first device of the equipment 1 Security information, wherein, the security information include on the user equipment via the target wireless access points perform should Apply safety instruction information.Here, equipment 1 can be a server or more connected by LAN Server or the multiple servers connected by internet, can also be the cloud being made up of multiple servers.Here, Yun Youji Formed in a large amount of computers or the webserver of cloud computing (Cloud Computing), wherein, cloud computing is Distributed Calculation One kind, a super virtual computer being made up of the computer collection of a group loose couplings;Equipment 1 can also be any one The mobile terminal of network service, including but not limited to mobile phone, palm PC (PPC), tablet personal computer or notebook electricity can be carried out Brain etc..Wherein, the security information is to represent the height of target wireless access points security, here, the security information Representation it is not unique, such as numerical value, grade or text information etc. can be included.Wherein, it is described to apply safety instruction Information is prompting user's application risk situation of the different application under corresponding security information.Preferably, wherein, the application Safety instruction information includes following at least any one:It can use safely, safety leaves a question open or prohibitted the use of;The application that can be used safely Type information;The Apply Names information that can be used safely;The application type information to leave a question open safely;The Apply Names letter to leave a question open safely Breath;The application type information prohibitted the use of;The Apply Names information prohibitted the use of.Wherein, " can use safely, safety leave a question open or Prohibit the use of " etc. application safety instruction information can target wireless access points it is safe when prompt the current application of user It can use safely, prompt user is current to leave a question open or in target using safety when the security of target wireless access points is not high The application for prompting user current when the security of WAP is low prohibits the use of;" the application type information that can be used safely " is used To prompt user which kind of application type can be used safely, for example, can be carried when the security of target wireless access points is higher Show that user pays class application, the application of social class, bank client etc. and can used safely;" the Apply Names that can be used safely Information " is to prompt which application on user equipment to use safely, for example, the security in target wireless access points is higher When user's Alipay, Bank of China's client etc. can be prompted to use safely;" the application type information to leave a question open safely " is used To prompt the which type of application of user that safety leaves a question open when in use, for example, when the security of target wireless access points is not high Prompting user pays the safety such as class application, bank client and left a question open;" the Apply Names information to leave a question open safely " is prompting user Which application safety in equipment leaves a question open, for example, user can be prompted to pay when the security of target wireless access points is not high Precious, Bank of China's client etc. safety leaves a question open;" the application type information prohibitted the use of " is prompting user which kind of applies class Type is prohibitted the use of, for example, user can be prompted to pay when the security of target wireless access points is very low, class is applied, social class is answered Prohibitted the use of with, bank client etc.;" the Apply Names information prohibitted the use of " to prompt on user equipment which should With prohibitting the use of, for example, user's Alipay, Bank of China client can be prompted when the security of target wireless access points is relatively low End etc. can use safely.Here, the application safety instruction information is only for example, other are existing or are likely to occur from now on The application is such as applicable to using safety instruction information, should be also included within the application protection domain, and herein with reference side Formula is incorporated herein.Specifically, equipment 1 obtains the mode of security information corresponding to target wireless access points corresponding to user equipment, Can be by corresponding to the lookup in the database that store the relevant information about target wireless access points at network equipment end Security information;In described security information that user equipment end can be sent by receiving network equipment end etc..
Continuing in this embodiment, the second device of the equipment 1 provides the security information to the user equipment, Here, equipment 1 is network equipment end, specifically, the equipment 1 between the network equipment and user equipment by based on building Vertical wireless connection, according to respective communication protocol, the security information is provided to the user equipment.Preferably, wherein, The second device of the equipment 1 is used for:The security information is presented in the application widget of the user equipment.Here, equipment 1 For user equipment, specifically, when user equipment receives the security information either user equipment sheet of network equipment transmission The security information is presented on corresponding application widget by the security information that body is determined based on certain rule, the user equipment In.
It is highly preferred that wherein, the first device includes:Third unit (not shown), that the reception network equipment is provided, Security information corresponding to target wireless access points corresponding to user equipment;4th unit (not shown), according to the security information And the demand for security information applied in the user equipment, it is determined that on the user equipment via the target wireless access points Perform application applies safety instruction information.The third unit of the equipment 1 receives the network equipment is provided, user equipment pair Security information corresponding to the target wireless access points answered, here, equipment 1 is user equipment, specifically the equipment 1 by based on The wireless connection established between the network equipment and user equipment, according to respective communication protocol, receive network equipment institute Security information corresponding to target wireless access points corresponding to provide, user equipment, further, the 4th of the equipment 1 are single Member according to the demand for security information applied in the security information and the user equipment, it is determined that on the user equipment via Safety instruction information is applied in the target wireless access points execution application.Here, equipment 1 can be detected first in user equipment Existing application, those skilled in the art will be understood that the demand for security information applied in security information and user equipment not Together, it is determined that application safety instruction information be different, for example, when the security information of WAP is relatively low, for peace The relatively low application of full demand, belongs to the application type that can be used safely, and its safety instruction information can be " can use safely ", and For the higher application of demand for security, belong to the application type that safety leaves a question open or prohibitted the use of, its prompt message can be " peace Leave a question open entirely " or " prohibitting the use of " etc..Specifically, equipment 1 can determine to apply in the user equipment based on predetermined rule Apply safety instruction information, for example, when the demand for security information applied in the security information and the user equipment is all During with numerical quantization, then when can set the numerical value for the demand for security information for being more than application when the numerical value of security information, application Safety instruction information may include " the application type information that can be used safely " or " the Apply Names information that can be used safely " etc.;When The numerical value of security information is less than the numerical value of demand for security information of application and the absolute value of two numerical differences is less than certain threshold value When, the safety instruction information of application may include " the application type information to leave a question open safely ", " the Apply Names information to leave a question open safely " Deng;When the numerical value of security information is more than necessarily less than the numerical value of the demand for security information of application and the absolute value of two numerical differences During threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " the Apply Names letter prohibitted the use of Breath " etc..
It is highly preferred that wherein, Unit the 4th is used for:Currently should according in the security information and the user equipment Demand for security information, it is determined that performing the current application via the target wireless access points on the user equipment Using safety instruction information;
Wherein, the second device is used for:Institute is presented in the application widget of current application described in the user equipment State security information.
Unit the 4th of the equipment 1 is according to the demand for security of current application in the security information and the user equipment Information, it is determined that applying safety instruction via the target wireless access points execution current application on the user equipment Information, here, the equipment 1 is user equipment, those skilled in the art, which will be understood that on user equipment, may have currently just In the application used, therefore, when establishing connection with target wireless access points, can provide current application applies safety instruction Information is so that user chooses whether to be continuing with the current application, here, the application safety instruction information may include:Can be safe Leave a question open or prohibit the use of using, safety.Specifically, equipment 1 can determine the application of the current application based on predetermined rule Safety instruction information, for example, when the demand for security information of current application in the security information and the user equipment is all to use During numerical quantization, then when can set the numerical value for the demand for security information for being more than current application when the numerical value of security information, application Safety instruction information may include " can use safely ";When the numerical value of security information is less than the demand for security information of current application Numerical value and when the absolute value of two numerical differences is less than certain threshold value, the safety instruction information of current application may include " to deposit safely Doubt ";When the numerical value of security information is more than one less than the numerical value of the demand for security information of current application and the absolute value of two numerical differences During fixed threshold value, the safety instruction information of current application may include " prohibitting the use of ".Further, the second dress of the equipment 1 Put and the security information is presented in the application widget of current application described in the user equipment, specifically, equipment 1 can incite somebody to action The security information is presented in the application widget of the current application, to facilitate user to check.
Preferably, wherein, the equipment also includes:5th device (not shown), according to the application safety instruction information Determine current application safety instruction information corresponding to current application in the user equipment;
Wherein, the second device is used for:Institute is presented in the application widget of current application described in the user equipment Security information is stated, wherein, the security information includes the current application safety instruction information.
5th device of the equipment 1 determines current application in the user equipment according to the application safety instruction information Corresponding current application safety instruction information, wherein the application safety instruction information includes but is not limited to:It can use safely, pacify Leave a question open or prohibit the use of entirely;The application type information that can be used safely;The Apply Names information that can be used safely;Leave a question open safely Application type information;The Apply Names information to leave a question open safely;The application type information prohibitted the use of;The Apply Names prohibitted the use of Information etc..Specifically, equipment 1 is true according to the security information of the target wireless access points and the application safety instruction information Determine current application safety instruction information, for example, when the security information of target wireless access points is higher than threshold value, pacify from the application " can use safely " may be selected in full enlightening information and be used as current application safety instruction information;When the safety of target wireless access points When information is less than threshold value, " prohibitting the use of " may be selected from the application safety instruction information as current application safety instruction letter Breath;When the security information of target wireless access points is in Near Threshold, " safety may be selected from the application safety instruction information Leave a question open " as current application safety instruction information etc..Further, the second device is current described in the user equipment The security information is presented in the application widget of application, wherein, the security information is believed including the current application safety instruction Breath.
Preferably, wherein, the equipment also includes:3rd device (not shown), obtain user equipment submit on mesh The access information request of tag splice access point;Wherein, the first device is used for:Obtain and accessed corresponding to the target wireless access points Information and security information, wherein, the security information includes holding via the target wireless access points on the user equipment Safety instruction information is applied in row application;Wherein, the second device is used for:The access information and the security information are carried It is supplied to the user equipment.
The 3rd device of the equipment 1 obtains the access information on target access that user equipment is submitted and asked, This, the equipment 1 is the network equipment, and specifically, the equipment 1 between the network equipment and user equipment by based on building Vertical wireless connection, according to respective communication protocol, obtain the access information on target access that user equipment is submitted and ask Ask.Further, the first device of the equipment 1 obtains access information corresponding to the target wireless access points and safety letter Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, specifically, equipment 1 can be by store the database of the relevant information about target wireless access points Access information and security information corresponding to middle lookup, for example, the name information and MAC of the target wireless access points can be passed through Information carries out matched and searched to the access information and security information of the target wireless access points in database.Further, institute State the second device of equipment 1 to provide the access information and the security information to the user equipment, specifically, specifically Ground, the equipment 1 is by based on the wireless connection established between the network equipment and user equipment, according to respective communication Agreement, the access information and the security information are provided to the user equipment.
Preferably, wherein, the equipment also includes:4th device (not shown), according to user equipment submission on nothing The access point inquiry request of line access point, inquiry obtain target access corresponding to the user equipment;Wherein, first dress Put and be used for:Security information corresponding to the target wireless access points is obtained, wherein, the security information is included on the user Equipment applies safety instruction information via target wireless access points execution application;Wherein, the second device is used for:Will The target wireless access points and the security information are provided to the user equipment.4th device of the equipment 1 according to The access point inquiry request on WAP that family equipment is submitted, inquiry obtain target access corresponding to the user equipment Point, here, the inquiry request is used for the WAP inquired about around user equipment, the inquiry request includes user equipment Positional information, specifically, equipment 1 can according to the positional information of user equipment be user equipment match around the positional information WAP, further, the first device of the equipment 1 obtain around WAP security information, specifically Ground, equipment 1 can be searched in the database that store the relevant information about target wireless access points corresponding to security information, Wherein, the security information includes the application safety for performing application via the target wireless access points on the user equipment Prompt message.Further, the second device of the equipment 1 provides the target wireless access points and the security information To the user equipment, specifically, the equipment 1 passes through wireless based on what is established between the network equipment and user equipment Connection, according to respective communication protocol, the target wireless access points and the security information are provided to the user equipment.
In a preferred embodiment, join shown in Fig. 4, wherein, second device in Fig. 4 and the in Fig. 3 embodiments Two devices are identical or essentially identical, therefore will not be repeated here, and are only incorporated herein by reference.Preferably, wherein, described One device includes:First module, obtain security information corresponding to target wireless access points corresponding to user equipment;Second unit, Determined to perform the application safety of application via the target wireless access points on the user equipment according to the security information Prompt message.The first module of the equipment 1 obtains security information corresponding to target wireless access points corresponding to user equipment, This, the equipment 1 includes the network equipment or user equipment, and specifically, the first module of equipment 1 is obtained corresponding to user equipment The mode of security information corresponding to target wireless access points, can be by connecing store relevant Target Wireless at network equipment end Security information corresponding to being searched in the database of the relevant information of access point;Can be by receiving network equipment end at user equipment end The security information sent either user equipment is themselves based on described security information of pre-defined rule determination etc..Further Ground, the second unit of the equipment 1 determine to connect via the Target Wireless on the user equipment according to the security information Safety instruction information is applied in access point execution application, and specifically, second unit can be based on predetermined rule according to the safety Information determines the application safety instruction information, for example, the security information is represented in the form of numerical value, when the security information is big When threshold value, represent that the security of the target wireless access points is very high, therefore, can include using safety instruction information:Can The application type of safe handling, which can include, pays class application, financing class application etc.;When the security information is less than threshold value, represent The security of the target wireless access points is not high, therefore, can include using safety instruction information:Safety leaves a question open or forbidden The application type used, which can include, pays class application, financing class application etc..
It is highly preferred that wherein, the second unit is used for:According to the security information and the demand for security information of application, It is determined that apply safety instruction information via target wireless access points execution application on the user equipment.Specifically, Security information and the demand for security information of application are different, it is determined that application safety instruction information be different, for example, in nothing In the case that the security information of line access point is relatively low, for the relatively low application of demand for security, belong to the application class that can be used safely Type, its safety instruction information can be " can use safely ", and for the higher application of demand for security, belong to safety leave a question open or The application type prohibitted the use of, its prompt message can be " leaving a question open safely " or " prohibitting the use of " etc..Specifically, second unit Can be determined based on predetermined rule the application apply safety instruction information, for example, when the security information and it is described should Demand for security information is all when using numerical quantization, then can set when the numerical value of security information is more than the demand for security of application During the numerical value of information, the safety instruction information of application may include " the application type information that can be used safely " or " can use safely Apply Names information " etc.;When security information numerical value be less than application demand for security information numerical value and two numerical differences it is exhausted When being less than certain threshold value to value, the safety instruction information of application may include " the application type information to leave a question open safely ", " deposit safely Doubtful Apply Names information " etc.;When the numerical value of security information is less than the numerical value and two numerical differences of the demand for security information of application When absolute value is more than certain threshold value, the safety instruction information of application may include " the application type information prohibitted the use of ", " forbid Apply Names information used " etc..
It is highly preferred that wherein, the first module includes:First subelement (not shown), obtain corresponding to user equipment Log information corresponding to target wireless access points;Second subelement (not shown), determined according to the log information The security information of the target wireless access points.First subelement of the equipment 1 obtains Target Wireless corresponding to user equipment Log information corresponding to access point, here, the equipment 1 is the network equipment, wherein, the log information includes big The data message relevant with WAP of amount, specifically, equipment 1 obtain log letter corresponding to target wireless access points The mode of breath, it can be accessed by searching the Target Wireless in the database of relevant data message of WAP is store Point, and obtain data message corresponding to the target wireless access points.For example, can be by searching the Target Wireless in database The title of access point and mac address information obtain data message corresponding to the target wireless access points stored in database. Further, the second subelement of the equipment 1 determines the peace of the target wireless access points according to the log information Full information, specifically, equipment 1 is according to data relevant with the security information of the target wireless access points in the log Information, and determine based on predetermined rule the security information of the target wireless access points.
Compared with prior art, the application is believed safely by obtaining corresponding to target wireless access points corresponding to user equipment Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the security information is provided to the user equipment.This mode can be by WAP Security information is supplied to user, the security height that user understands WAP is facilitated, moreover, it is also possible to the peace by application Full enlightening information is supplied to user, and user can be allow to know which application is used safely or using can be dangerous etc., So as to preferably protect the information security of user.
Moreover, the access information on target access that the application can also obtain user equipment submission in network-side please Ask, and then obtain access information and security information corresponding to the target wireless access points, wherein, the security information includes closing Safety instruction information is applied via target wireless access points execution application in the user equipment, then by the access Information and the security information are provided to the user equipment.This mode can make user in request and target wireless access points When establishing connection, the access information and security information of the WAP can be received, so that user understands the wireless access Whether point is safe, and can independently choose whether to connect the WAP, improves Consumer's Experience.
In addition, the access point inquiry request on WAP that the application can also submit according to user equipment, is looked into Ask and obtain target wireless access points corresponding to the user equipment, and then obtain and believe safely corresponding to the target wireless access points Breath, wherein, the security information includes performing the application of application via the target wireless access points on the user equipment Safety instruction information, then the target wireless access points and the security information are provided to the user equipment.Pass through this Kind of mode, make the security information that each WAP is can be appreciated that during WAP of the user around inquiry, so as to So which WAP user connects according to the requirement selection to security, the demand of user can be better met.
It is obvious to a person skilled in the art that the invention is not restricted to the details of above-mentioned one exemplary embodiment, Er Qie In the case of without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, embodiment all should be regarded as exemplary, and be nonrestrictive, the scope of the present invention is by appended power Profit requires rather than described above limits, it is intended that all in the implication and scope of the equivalency of claim by falling Change is included in the present invention.Any reference in claim should not be considered as to the involved claim of limitation.This Outside, it is clear that the word of " comprising " one is not excluded for other units or step, and odd number is not excluded for plural number.That is stated in device claim is multiple Unit or device can also be realized by a unit or device by software or hardware.The first, the second grade word is used for table Show title, and be not offered as any specific order.

Claims (22)

1. a kind of method for being used to provide the security information of WAP, wherein, this method includes:
Obtain user equipment corresponding to security information corresponding to target wireless access points, wherein, the security information include on The user equipment applies safety instruction information via target wireless access points execution application;
The security information is provided to the user equipment.
2. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment Security information includes:
Obtain security information corresponding to target wireless access points corresponding to user equipment;
Determined to perform the application of application via the target wireless access points on the user equipment according to the security information Safety instruction information.
3. the method according to claim 11, wherein, it is described to determine to pass through on the user equipment according to the security information Including using safety instruction information for application is performed by the target wireless access points:
According to the security information and the demand for security information of application, it is determined that on the user equipment via the Target Wireless Safety instruction information is applied in access point execution application.
4. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment Security information includes:
Obtain log information corresponding to target wireless access points corresponding to user equipment;
The security information of the target wireless access points is determined according to the log information.
5. method according to any one of claim 1 to 4, wherein, methods described also includes:
The access information on target access that user equipment is submitted is obtained to ask;
Wherein, security information corresponding to target wireless access points corresponding to the acquisition user equipment includes:
Obtain access information and security information corresponding to the target wireless access points, wherein, the security information include on The user equipment applies safety instruction information via target wireless access points execution application;
Wherein, described provide the security information to the user equipment includes:
The access information and the security information are provided to the user equipment.
6. method according to any one of claim 1 to 4, wherein, methods described also includes:
The access point inquiry request on WAP submitted according to user equipment, it is corresponding that inquiry obtains the user equipment Target access;
Wherein, security information corresponding to target wireless access points corresponding to the acquisition user equipment includes:
Security information corresponding to the target wireless access points is obtained, wherein, the security information includes setting on the user It is standby to apply safety instruction information via target wireless access points execution application;
Wherein, described provide the security information to the user equipment includes:
The target wireless access points and the security information are provided to the user equipment.
7. according to the method for claim 1, wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of the user equipment.
8. the method according to claim 11, wherein, corresponding to target wireless access points corresponding to the acquisition user equipment Security information includes:
Receive security information corresponding to target wireless access points corresponding to the network equipment is provided, user equipment;
According to the demand for security information applied in the security information and the user equipment, it is determined that being passed through on the user equipment Safety instruction information is applied by target wireless access points execution application.
9. according to the method for claim 8, wherein, it is described according to applying in the security information and the user equipment Demand for security information, it is determined that applying safety instruction via target wireless access points execution application on the user equipment Information includes:
According to the demand for security information of current application in the security information and the user equipment, it is determined that being set on the user It is standby to apply safety instruction information via the target wireless access points execution current application;
Wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of current application described in the user equipment.
10. according to the method for claim 7, wherein, methods described also includes:
The current application safety instruction according to corresponding to the application safety instruction information determines current application in the user equipment Information;
Wherein, described provide the security information to the user equipment includes:
The security information is presented in the application widget of current application described in the user equipment, wherein, the safety letter Breath includes the current application safety instruction information.
11. method according to any one of claim 1 to 10, wherein, the application safety instruction information includes following Any one of at least:
It can use safely, safety leaves a question open or prohibitted the use of;
The application type information that can be used safely;
The Apply Names information that can be used safely;
The application type information to leave a question open safely;
The Apply Names information to leave a question open safely;
The application type information prohibitted the use of;
The Apply Names information prohibitted the use of.
12. a kind of equipment for being used to provide the security information of WAP, wherein, the equipment includes:
First device, for obtaining security information corresponding to target wireless access points corresponding to user equipment, wherein, the safety Information includes applying safety instruction information via target wireless access points execution application on the user equipment;
Second device, for the security information to be provided to the user equipment.
13. equipment according to claim 12, wherein, the first device includes:
First module, for obtaining security information corresponding to target wireless access points corresponding to user equipment;
Second unit, for determining to hold via the target wireless access points on the user equipment according to the security information Safety instruction information is applied in row application.
14. equipment according to claim 13, wherein, the second unit is used for:
According to the security information and the demand for security information of application, it is determined that on the user equipment via the Target Wireless Safety instruction information is applied in access point execution application.
15. equipment according to claim 13, wherein, the first module includes:
First subelement, for obtaining log information corresponding to target wireless access points corresponding to user equipment;
Second subelement, for determining the security information of the target wireless access points according to the log information.
16. the equipment according to any one of claim 12 to 15, wherein, the equipment also includes:
3rd device, the access information on target access for obtaining user equipment submission are asked;
Wherein, the first device is used for:
Obtain access information and security information corresponding to the target wireless access points, wherein, the security information include on The user equipment applies safety instruction information via target wireless access points execution application;
Wherein, the second device is used for:
The access information and the security information are provided to the user equipment.
17. the equipment according to any one of claim 12 to 15, wherein, the equipment also includes:
4th device, for the access point inquiry request on WAP submitted according to user equipment, inquiry obtains institute State target access corresponding to user equipment;
Wherein, the first device is used for:
Security information corresponding to the target wireless access points is obtained, wherein, the security information includes setting on the user It is standby to apply safety instruction information via target wireless access points execution application;
Wherein, the second device is used for:
The target wireless access points and the security information are provided to the user equipment.
18. equipment according to claim 12, wherein, the second device is used for:
The security information is presented in the application widget of the user equipment.
19. equipment according to claim 18, wherein, the first device includes:
Third unit, for receiving safety corresponding to target wireless access points corresponding to the network equipment is provided, user equipment Information;
Unit the 4th, for according to the demand for security information applied in the security information and the user equipment, it is determined that on The user equipment applies safety instruction information via target wireless access points execution application.
20. equipment according to claim 19, wherein, Unit the 4th is used for:
According to the demand for security information of current application in the security information and the user equipment, it is determined that being set on the user It is standby to apply safety instruction information via the target wireless access points execution current application;
Wherein, the second device is used for:
The security information is presented in the application widget of current application described in the user equipment.
21. equipment according to claim 18, wherein, the equipment also includes:
5th device, for current corresponding to determining current application in the user equipment according to the application safety instruction information Using safety instruction information;
Wherein, the second device is used for:
The security information is presented in the application widget of current application described in the user equipment, wherein, the safety letter Breath includes the current application safety instruction information.
22. the equipment according to any one of claim 12 to 21, wherein, the application safety instruction information includes following Any one of at least:
It can use safely, safety leaves a question open or prohibitted the use of;
The application type information that can be used safely;
The Apply Names information that can be used safely;
The application type information to leave a question open safely;
The Apply Names information to leave a question open safely;
The application type information prohibitted the use of;
The Apply Names information prohibitted the use of.
CN201610494325.9A 2016-06-29 2016-06-29 For the method and apparatus for the security information for providing WAP Pending CN107548064A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610494325.9A CN107548064A (en) 2016-06-29 2016-06-29 For the method and apparatus for the security information for providing WAP

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610494325.9A CN107548064A (en) 2016-06-29 2016-06-29 For the method and apparatus for the security information for providing WAP

Publications (1)

Publication Number Publication Date
CN107548064A true CN107548064A (en) 2018-01-05

Family

ID=60962719

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610494325.9A Pending CN107548064A (en) 2016-06-29 2016-06-29 For the method and apparatus for the security information for providing WAP

Country Status (1)

Country Link
CN (1) CN107548064A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108990064A (en) * 2018-07-27 2018-12-11 上海连尚网络科技有限公司 Hotspot connection method, electronic equipment and medium
CN111698682A (en) * 2020-06-12 2020-09-22 深圳天度物联信息技术有限公司 Data transmission method based on public WiFi network environment, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104717653A (en) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 Network connection control method and system of mobile terminal
GB2521196B (en) * 2013-12-12 2016-06-15 Good Tech Corp Secure communication channels
CN105682015A (en) * 2016-04-05 2016-06-15 上海连尚网络科技有限公司 Method and device for establishing wireless connection
CN105392134B (en) * 2014-09-02 2019-09-06 恩德莱斯和豪瑟尔分析仪表两合公司 The method of at least one first unit is authenticated at least one second unit

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2521196B (en) * 2013-12-12 2016-06-15 Good Tech Corp Secure communication channels
CN105392134B (en) * 2014-09-02 2019-09-06 恩德莱斯和豪瑟尔分析仪表两合公司 The method of at least one first unit is authenticated at least one second unit
CN104717653A (en) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 Network connection control method and system of mobile terminal
CN105682015A (en) * 2016-04-05 2016-06-15 上海连尚网络科技有限公司 Method and device for establishing wireless connection

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108990064A (en) * 2018-07-27 2018-12-11 上海连尚网络科技有限公司 Hotspot connection method, electronic equipment and medium
CN108990064B (en) * 2018-07-27 2022-03-01 上海尚往网络科技有限公司 Wireless hotspot connection method, electronic device and medium
CN111698682A (en) * 2020-06-12 2020-09-22 深圳天度物联信息技术有限公司 Data transmission method based on public WiFi network environment, server and storage medium

Similar Documents

Publication Publication Date Title
WO2017067394A1 (en) Method and system for distributing customer service modes
CN105873239B (en) The method that wireless connection is set up for the application for user equipment
CN106550004A (en) The recommendation method and device of business object
TW201602823A (en) Prompting login account
EP3200113B1 (en) Password protection question setting method and device
US20140304833A1 (en) Method and system for providing access to crowdsourcing tasks
CN113542201B (en) Access control method and equipment for Internet service
CN106033461A (en) Sensitive information query method and apparatus
CN109257321A (en) Safe login method and device
CN104980420B (en) A kind of method for processing business, device, terminal and server
CN106209970B (en) Determine the method and apparatus of network state connected between user equipment and routing device
CN106330846A (en) Cross-platform object recommendation method and device
CN105898835B (en) Generate the method and apparatus of the access point attribute information of WAP
CN106102059B (en) For the method and apparatus for the owner for determining hotspot
CN106296252A (en) User recommends method and device
US20130152155A1 (en) Providing user attributes to complete an online transaction
CN108156118A (en) User Identity method and device
Sweeney et al. Alexa, Are You Listening?: An Exploration of Smart Voice Assistant Use and Privacy in Libraries
CN107548064A (en) For the method and apparatus for the security information for providing WAP
CN107846662A (en) For the method and apparatus based on WAP push marketing message
CN108259518A (en) A kind of network connection authentication method, device, electronic equipment and storage medium
CN107548032A (en) For providing the method and apparatus of WAP information
CN105873046B (en) A kind of method and apparatus for managing WAP
US20160080387A1 (en) Database Access Using A Common Web Interface
CN105574438B (en) Privacy of user guard method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210415

Address after: 200131 Zone E, 9th floor, No.1 Lane 666, zhangheng Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 201306 N2025 room 24, 2 New Town Road, mud town, Pudong New Area, Shanghai

Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180105