CN107682861A - A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings - Google Patents
A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings Download PDFInfo
- Publication number
- CN107682861A CN107682861A CN201711174661.6A CN201711174661A CN107682861A CN 107682861 A CN107682861 A CN 107682861A CN 201711174661 A CN201711174661 A CN 201711174661A CN 107682861 A CN107682861 A CN 107682861A
- Authority
- CN
- China
- Prior art keywords
- subscriber terminal
- primary user
- access
- wifi
- wifi network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The embodiment of the invention discloses a kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings; by when accessing WiFi network from subscriber terminal apparatus information; matched described from subscriber terminal apparatus information with the default end message storehouse of primary user; wherein, the default end message storehouse includes the identification code and signature identification of terminal device;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.The present invention solves the problems, such as that WiFi passwords set complex effects Consumer's Experience and automatic crack to influence network security, and the running environment of safety is provided for WiFi network.
Description
Technical field
The present embodiments relate to network technology, more particularly to a kind of Wireless Fidelity (Wireless Fidelity, WiFi)
Method, apparatus, equipment and the readable storage medium storing program for executing of cipher safe protecting.
Background technology
With the development of wireless network, WiFi has become most popular net as the technology wirelessly interconnected
Network technology.
In order to ensure safety, user would generally set WiFi access pin, and close in order to not cracked WiFi illegally
Code, password are usually arranged as the combination of numeral, letter and/or additional character, make user be not easy to remember, the user's body such as input fallibility
Test the defects of not high.Meanwhile as the development of breaking techniques, increasing WiFi can be direct-connected by terminal downloads WiFi
Using and be directly accessed so that the WiFi of primary user is even just linked into the case where knowing nothing from user and primary user
In network, the network security of primary user is set to be on the hazard.
The content of the invention
The present invention provides a kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings, with gram
Take WiFi passwords and complex effects Consumer's Experience and automatic the defects of cracking influence network security are set.
In a first aspect, the embodiments of the invention provide a kind of method of Wireless Fidelity WiFi cipher safe protectings, including:
, will be described pre- with primary user from subscriber terminal apparatus information when accessing WiFi network from subscriber terminal apparatus information
If end message storehouse is matched, wherein, the default end message storehouse includes the identification code and signature identification of terminal device;
When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;
When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
Further, when WiFi is connected with terminal device information, by the terminal device information and default end message
Before storehouse is matched, in addition to:
The request of the access WiFi network of primary user is received, wherein, it is described to ask to include the end message of primary user and connect
Enter password, the primary user is the transactor of the WiFi network;
According to primary user's rights management rule, establish the primary user and preset end message storehouse.
Further, the preset rules include:
Described it will add blacklist from user and/or directly delete.
Further, primary user's rights management rule be according to primary user set allow access the WiFi network
The management rule from subscriber terminal equipment.
Further, will be described from subscriber terminal apparatus information when accessing WiFi network from subscriber terminal apparatus information
End message storehouse is preset with primary user to be matched, in addition to:
Receive the access request sent from subscriber terminal equipment or exist described in illegal access WiFi network from
Family terminal device;
Identification is described from subscriber terminal apparatus information.
Second aspect, the embodiment of the present invention additionally provide a kind of device of Wireless Fidelity WiFi cipher safe protectings, including:
Matching module, for when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal equipment
Information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the identification of terminal device
Code and signature identification;
Allow AM access module, it is described from the subscriber terminal equipment access WiFi nets for when the match is successful, then allowing
Network;
AM access module is shielded, for when it fails to match, then according to preset rules, inciting somebody to action described from subscriber terminal equipment screen
Cover.
Further, before the matching module, in addition to:
Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request bag
The end message and access pin of primary user is included, the primary user is the transactor of the WiFi network;
Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting terminal
Information bank.
Further, in addition to:
The preset rules include:Described it will add blacklist from user and/or directly delete;
Primary user's rights management rule be according to primary user set allow to access the WiFi network from user
The management rule of terminal device;
The matching module also includes:
Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi being present
Network it is described from subscriber terminal equipment;
Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
The third aspect, the embodiment of the present invention additionally provide a kind of computer equipment, including memory, processor and are stored in
On memory and the computer program that can run on a processor, wherein, realize such as this during the computing device described program
The method of Wireless Fidelity WiFi cipher safe protectings described in invention any embodiment.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer-readable recording medium, are stored thereon with computer
Program, wherein, the Wireless Fidelity WiFi passwords peace as described in any embodiment of the present invention is realized when the program is executed by processor
The method of full guard.
The embodiment of the present invention by described from user terminal by when accessing WiFi network from subscriber terminal apparatus information, setting
Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device
Other code and signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When matching is lost
When losing, then according to preset rules, described it will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects
Consumer's Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention two provides;
Fig. 3 is a kind of structural representation of the device for WiFi cipher safe protectings that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural representation for computer equipment that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just
Part related to the present invention rather than full content are illustrate only in description, accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail
The processing described as flow chart or method.Although operations (or step) are described as the processing of order by flow chart,
Many of which operation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be pacified again
Row.The processing can be terminated when its operations are completed, it is also possible to the additional step being not included in accompanying drawing.Institute
State processing and can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
Fig. 1 be the embodiment of the present invention one provide a kind of WiFi cipher safe protectings method flow chart, the present embodiment
The situation of safeguard protection WiFi passwords is applicable to, this method can be performed by a kind of device of WiFi cipher safe protectings,
The device can be realized by the mode of software and/or hardware, and can typically be integrated in computer equipment.The method of the present embodiment
Specifically comprise the following steps:
Step 110, when accessing WiFi network from subscriber terminal apparatus information, will it is described from subscriber terminal apparatus information with
Primary user presets end message storehouse and matched, wherein, the default end message storehouse includes identification code and the spy of terminal device
Sign mark.
Wherein, will be described from subscriber terminal apparatus information and master when accessing WiFi network from subscriber terminal apparatus information
User preset end message storehouse is matched, in addition to:Receive the access request sent from subscriber terminal equipment or presence
It is illegal to access the described from subscriber terminal equipment of WiFi network;Identification is described from subscriber terminal apparatus information.It is understood that
It is application access from subscriber terminal equipment or illegally accesses the terminal device of WiFi network, from subscriber terminal apparatus information
The identification code and signature identification of equipment can be included by presetting end message storehouse with primary user, and identification code is unique body of terminal
Part mark ID, for example, unique ID such as mobile phone factory serial number of smart mobile phone, signature identification is the feature for characterizing end message, example
Such as, the signature identification of the smart mobile phone pet name that can be user set for it or the model of mobile phone etc..It is understood that
Primary user and from user be according to WiFi set authority and define, primary user is the first possessor for handling WiFi accounts,
And from user be application access or the user that has illegally accessed.
Step 120, when the match is successful, then allow described to access the WiFi network from subscriber terminal equipment.
Wherein, if the match is successful, illustrate that primary user is preset in end message storehouse and be stored with this from subscriber terminal equipment
Information, be primary user's setting can allow access from user, therefore can realize that this is directly accessed from subscriber terminal equipment.
Step 130, when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
Wherein, preset rules are to add blacklist from user equipment by it fails to match and/or directly delete, according to default
Rule should shield from subscriber terminal equipment.For example, it is that WiFi nets are illegally accessed by the direct-connected grades of WiFi from subscriber terminal equipment
Network, i.e., it need not input WiFi passwords and can access, now, matching is unsuccessful to be added into blacklist automatically or directly delete
Mode and shielded.If it is by asking access WiFi network to be believed to preset terminal with primary user from subscriber terminal equipment
When ceasing that it fails to match in storehouse, it can directly be shielded, WiFi passwords can also be manually entered according to actual conditions and are accessed.For example,
The terminal device information of kinsfolk is stored in primary user and presets end message storehouse by primary user, but generally will not be by friend's
Terminal device information stores, and now, when friend request accesses, primary user's terminal device does not allow the situation of access again
It is lower to be accessed manually, it is necessary to input WiFi passwords.After friend is accessed manually by WiFi passwords, primary user can set its terminal
Standby information is added to primary user and preset in end message storehouse, and WiFi is directly accessed without inputting again when facilitating friend to use next time
Password.
The embodiment of the present invention by described from user terminal by when accessing WiFi network from subscriber terminal apparatus information, setting
Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device
Other code and signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When matching is lost
When losing, then according to preset rules, described it will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects
Consumer's Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Embodiment two
Fig. 2 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention two provides, such as Fig. 2 institutes
Show, the concrete operation step of this method is as follows:
The request of step 210, the access WiFi network of reception primary user, wherein, the terminal for asking to include primary user
Information and access pin, the primary user are the transactors of the WiFi network.
Wherein, WiFi network transactor is that primary user needs to ask to be linked into WiFi network by inputting WiFi passwords
In.
Step 220, according to primary user's rights management rule, establish primary user preset end message storehouse.
Wherein, primary user's rights management rule be according to primary user set allow access the WiFi network from
The management rule of subscriber terminal equipment.Establish the default terminal letter for allowing access from user of the rights management based on primary user
Storehouse is ceased, by primary user's rights management, other is controlled from the access request of user or illegally accesses situation.
Step 230, when accessing WiFi network from subscriber terminal apparatus information, will it is described from subscriber terminal apparatus information with
Primary user presets end message storehouse and matched, wherein, the default end message storehouse includes identification code and the spy of terminal device
Sign mark.
Step 240, when the match is successful, then allow described to access the WiFi network from subscriber terminal equipment.
Step 250, when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
The embodiment of the present invention establishes primary user and presets end message storehouse, pass through authority according to primary user's rights management rule
Management, setting only primary user's authority setting can just access WiFi network from user.Connect when from subscriber terminal apparatus information
When entering WiFi network, matched described from subscriber terminal apparatus information with the default end message storehouse of primary user, wherein, it is described
Default end message storehouse includes the identification code and signature identification of terminal device;When the match is successful, then allow described whole from user
End equipment accesses the WiFi network;When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
The present invention solves the problems, such as that WiFi passwords set complex effects Consumer's Experience and automatic crack to influence network security, so as to keep away
The illegal access from user is exempted from, the running environment of safety is provided for WiFi network.
Embodiment three
Fig. 3 be the embodiment of the present invention three provide a kind of WiFi cipher safe protectings device structural representation, such as Fig. 3
Shown, the device includes matching module 310, allows AM access module 320 and shielding AM access module 330, wherein:
Matching module 310, for when accessing WiFi network from subscriber terminal apparatus information, being set described from user terminal
Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device
Other code and signature identification;
Allow AM access module 320, it is described from the subscriber terminal equipment access WiFi for when the match is successful, then allowing
Network;
AM access module 330 is shielded, for when it fails to match, then according to preset rules, inciting somebody to action described from subscriber terminal equipment
Shielding.
The present invention is by when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal apparatus information
With primary user end message storehouse is preset to be matched, wherein, the identification code in the default end message storehouse including terminal device and
Signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When it fails to match,
Then according to preset rules, described will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects user
Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Further, further, before the matching module, in addition to:
Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request bag
The end message and access pin of primary user is included, the primary user is the transactor of the WiFi network;
Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting terminal
Information bank.
Further, in addition to:
The preset rules include:Described it will add blacklist from user and/or directly delete;
Primary user's rights management rule be according to primary user set allow to access the WiFi network from user
The management rule of terminal device;
The matching module also includes:
Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi being present
Network it is described from subscriber terminal equipment;
Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
The device for the WiFi cipher safe protectings that the embodiment of the present invention is provided can perform any embodiment of the present invention and be carried
The method of the WiFi cipher safe protectings of confession, possess the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides, as shown in figure 4, the equipment includes place
Manage device 40, memory 41, input unit 42 and output device 43;The quantity of processor 40 can be one or more in equipment,
In Fig. 4 by taking a processor 40 as an example;Processor 40, memory 41, input unit 42 and output device 43 in equipment can be with
Connected by bus or other modes, in Fig. 4 exemplified by being connected by bus.
Memory 41 is used as a kind of computer-readable recording medium, and journey is can perform available for storage software program, computer
Sequence and module, as corresponding to the method for the WiFi cipher safe protectings in the embodiment of the present invention programmed instruction/module (for example,
Matching module 310, allow AM access module 320 and shielding AM access module 330).Processor 40 is stored in memory 41 by operation
In software program, instruction and module, so as to perform the various function application of equipment and data processing, that is, realize above-mentioned
The method of the method for WiFi cipher safe protectings.
Memory 41 can mainly include storing program area and storage data field, wherein, storing program area can store operation system
Application program needed for system, at least one function;Storage data field can store uses created data etc. according to terminal.This
Outside, memory 41 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic
Disk storage device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 41 can be further
Including network connection to equipment can be passed through relative to the remotely located memory of processor 40, these remote memories.It is above-mentioned
The example of network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Input unit 42 can be used for the numeral or character information for receiving input, and produce set with the user of equipment and
The relevant key signals input of function control.Output device 43 may include the display devices such as display screen.
Embodiment five
The embodiment of the present invention five also provides a kind of storage medium for including computer executable instructions, and the computer can be held
Row instruction by computer processor when being performed for performing a kind of associative operation of the method for WiFi cipher safe protectings.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention
It can be realized by software and required common hardware, naturally it is also possible to realized by hardware, but the former is more in many cases
Good embodiment.Based on such understanding, what technical scheme substantially contributed to prior art in other words
Part can be embodied in the form of software product, and the computer software product can be stored in computer-readable recording medium
In, floppy disk, read-only storage (Read-Only Memory, ROM), random access memory (Random such as computer
Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are causing a computer to set
Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the present invention.
It is worth noting that, in the embodiment of above-mentioned WiFi cipher safe protectings, included unit and module are only
Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;Separately
Outside, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that
The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes,
Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention
It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also
Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.
Claims (10)
- A kind of 1. method of Wireless Fidelity WiFi cipher safe protectings, it is characterised in that including:, will be described default eventually from subscriber terminal apparatus information and primary user when accessing WiFi network from subscriber terminal apparatus information Client information storehouse is matched, wherein, the default end message storehouse includes the identification code and signature identification of terminal device;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
- 2. according to the method for claim 1, it is characterised in that when WiFi is connected with terminal device information, by the end Before end equipment information is matched with default end message storehouse, in addition to:The request of the access WiFi network of primary user is received, wherein, the end message for asking to include primary user and access are close Code, the primary user is the transactor of the WiFi network;According to primary user's rights management rule, establish the primary user and preset end message storehouse.
- 3. according to the method for claim 1, it is characterised in that the preset rules include:Described it will add blacklist from user and/or directly delete.
- 4. according to the method for claim 2, it is characterised in that primary user's rights management rule is set according to primary user The fixed management rule from subscriber terminal equipment for allowing to access the WiFi network.
- 5. according to the method for claim 1, it is characterised in that when accessing WiFi network from subscriber terminal apparatus information, Matched described from subscriber terminal apparatus information with the default end message storehouse of primary user, in addition to:Receive the access request sent from subscriber terminal equipment orAccessed in the presence of illegal described in WiFi network from subscriber terminal equipment;Identification is described from subscriber terminal apparatus information.
- A kind of 6. device of Wireless Fidelity WiFi cipher safe protectings, it is characterised in that including:Matching module, for when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal apparatus information With primary user end message storehouse is preset to be matched, wherein, the identification code in the default end message storehouse including terminal device and Signature identification;Allow AM access module, it is described from the subscriber terminal equipment access WiFi network for when the match is successful, then allowing;AM access module is shielded, for when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
- 7. device according to claim 6, it is characterised in that before the matching module, in addition to:Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request includes master The end message and access pin of user, the primary user are the transactors of the WiFi network;Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting end message Storehouse.
- 8. device according to claim 6, it is characterised in that also include:The preset rules include:Described it will add blacklist from user and/or directly delete;Primary user's rights management rule be according to primary user set allow to access the WiFi network from user terminal The management rule of equipment;The matching module also includes:Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi network being present It is described from subscriber terminal equipment;Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
- 9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, it is characterised in that realized during the computing device described program wireless as described in any in claim 1-5 The method of fidelity WiFi cipher safe protectings.
- 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The method that the Wireless Fidelity WiFi cipher safe protectings as described in any in claim 1-5 are realized during execution.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711174661.6A CN107682861A (en) | 2017-11-22 | 2017-11-22 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711174661.6A CN107682861A (en) | 2017-11-22 | 2017-11-22 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107682861A true CN107682861A (en) | 2018-02-09 |
Family
ID=61149747
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711174661.6A Withdrawn CN107682861A (en) | 2017-11-22 | 2017-11-22 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107682861A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108647522A (en) * | 2018-04-12 | 2018-10-12 | 佛山市百里洲科技有限公司 | A kind of method of mobile terminal safety access computer network |
CN116939603A (en) * | 2023-09-13 | 2023-10-24 | 微网优联科技(成都)有限公司 | Wifi safety protection system and method |
-
2017
- 2017-11-22 CN CN201711174661.6A patent/CN107682861A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108647522A (en) * | 2018-04-12 | 2018-10-12 | 佛山市百里洲科技有限公司 | A kind of method of mobile terminal safety access computer network |
CN116939603A (en) * | 2023-09-13 | 2023-10-24 | 微网优联科技(成都)有限公司 | Wifi safety protection system and method |
CN116939603B (en) * | 2023-09-13 | 2023-12-05 | 微网优联科技(成都)有限公司 | Wifi safety protection system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10547601B2 (en) | System and method to allow third-party developer to debug code in customer environment | |
CN103473844B (en) | Public affairs are rented a house intelligent control method and system | |
CN104182687B (en) | The safety detection method of mobile terminal input window and safety detection device | |
CN106134143A (en) | Method, apparatus and system for dynamic network access-in management | |
CN105765597A (en) | Pre-identifying probable malicious rootkit behavior using behavioral contracts | |
CN109920102B (en) | Bluetooth keyless entry intelligent lock method, device, equipment and storage medium | |
CN108829838A (en) | A kind of account information batch processing method and server | |
CN105809007A (en) | Privacy protection method and device | |
CN104469736B (en) | A kind of data processing method, server and terminal | |
CN106169042A (en) | The method and device of administration authority | |
CN108476135A (en) | The access control of numerical data | |
CN105975867A (en) | Data processing method | |
CN106716429A (en) | Monitoring method and device, and electronic equipment | |
CN107682861A (en) | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings | |
CN104346550A (en) | Information processing method and electronic equipment | |
CN112464214A (en) | Authority detection method and device, electronic equipment and readable storage medium | |
CN114040411B (en) | Equipment binding method and device, electronic equipment and storage medium | |
CN107769928A (en) | A kind of terminal and computer-readable recording medium | |
CN106778160A (en) | Data item display methods and device | |
CN110955872A (en) | Authority control method, device, terminal and medium | |
EP3333743B1 (en) | System and method of preventing unfair evaluation of applications by users | |
CN110990802B (en) | Method and device for carrying out batch authorization on mysql user permission information | |
CN109858235B (en) | Portable equipment and password obtaining method and device thereof | |
US9846790B2 (en) | Method for changing an operating mode of a mobile device | |
CN107707550B (en) | Method, device and system for accessing virtual machine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20180209 |