CN107682861A - A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings - Google Patents

A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings Download PDF

Info

Publication number
CN107682861A
CN107682861A CN201711174661.6A CN201711174661A CN107682861A CN 107682861 A CN107682861 A CN 107682861A CN 201711174661 A CN201711174661 A CN 201711174661A CN 107682861 A CN107682861 A CN 107682861A
Authority
CN
China
Prior art keywords
subscriber terminal
primary user
access
wifi
wifi network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711174661.6A
Other languages
Chinese (zh)
Inventor
朱秋华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201711174661.6A priority Critical patent/CN107682861A/en
Publication of CN107682861A publication Critical patent/CN107682861A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings; by when accessing WiFi network from subscriber terminal apparatus information; matched described from subscriber terminal apparatus information with the default end message storehouse of primary user; wherein, the default end message storehouse includes the identification code and signature identification of terminal device;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.The present invention solves the problems, such as that WiFi passwords set complex effects Consumer's Experience and automatic crack to influence network security, and the running environment of safety is provided for WiFi network.

Description

A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings
Technical field
The present embodiments relate to network technology, more particularly to a kind of Wireless Fidelity (Wireless Fidelity, WiFi) Method, apparatus, equipment and the readable storage medium storing program for executing of cipher safe protecting.
Background technology
With the development of wireless network, WiFi has become most popular net as the technology wirelessly interconnected Network technology.
In order to ensure safety, user would generally set WiFi access pin, and close in order to not cracked WiFi illegally Code, password are usually arranged as the combination of numeral, letter and/or additional character, make user be not easy to remember, the user's body such as input fallibility Test the defects of not high.Meanwhile as the development of breaking techniques, increasing WiFi can be direct-connected by terminal downloads WiFi Using and be directly accessed so that the WiFi of primary user is even just linked into the case where knowing nothing from user and primary user In network, the network security of primary user is set to be on the hazard.
The content of the invention
The present invention provides a kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings, with gram Take WiFi passwords and complex effects Consumer's Experience and automatic the defects of cracking influence network security are set.
In a first aspect, the embodiments of the invention provide a kind of method of Wireless Fidelity WiFi cipher safe protectings, including:
, will be described pre- with primary user from subscriber terminal apparatus information when accessing WiFi network from subscriber terminal apparatus information If end message storehouse is matched, wherein, the default end message storehouse includes the identification code and signature identification of terminal device;
When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;
When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
Further, when WiFi is connected with terminal device information, by the terminal device information and default end message Before storehouse is matched, in addition to:
The request of the access WiFi network of primary user is received, wherein, it is described to ask to include the end message of primary user and connect Enter password, the primary user is the transactor of the WiFi network;
According to primary user's rights management rule, establish the primary user and preset end message storehouse.
Further, the preset rules include:
Described it will add blacklist from user and/or directly delete.
Further, primary user's rights management rule be according to primary user set allow access the WiFi network The management rule from subscriber terminal equipment.
Further, will be described from subscriber terminal apparatus information when accessing WiFi network from subscriber terminal apparatus information End message storehouse is preset with primary user to be matched, in addition to:
Receive the access request sent from subscriber terminal equipment or exist described in illegal access WiFi network from Family terminal device;
Identification is described from subscriber terminal apparatus information.
Second aspect, the embodiment of the present invention additionally provide a kind of device of Wireless Fidelity WiFi cipher safe protectings, including:
Matching module, for when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal equipment Information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the identification of terminal device Code and signature identification;
Allow AM access module, it is described from the subscriber terminal equipment access WiFi nets for when the match is successful, then allowing Network;
AM access module is shielded, for when it fails to match, then according to preset rules, inciting somebody to action described from subscriber terminal equipment screen Cover.
Further, before the matching module, in addition to:
Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request bag The end message and access pin of primary user is included, the primary user is the transactor of the WiFi network;
Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting terminal Information bank.
Further, in addition to:
The preset rules include:Described it will add blacklist from user and/or directly delete;
Primary user's rights management rule be according to primary user set allow to access the WiFi network from user The management rule of terminal device;
The matching module also includes:
Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi being present Network it is described from subscriber terminal equipment;
Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
The third aspect, the embodiment of the present invention additionally provide a kind of computer equipment, including memory, processor and are stored in On memory and the computer program that can run on a processor, wherein, realize such as this during the computing device described program The method of Wireless Fidelity WiFi cipher safe protectings described in invention any embodiment.
Fourth aspect, the embodiment of the present invention additionally provide a kind of computer-readable recording medium, are stored thereon with computer Program, wherein, the Wireless Fidelity WiFi passwords peace as described in any embodiment of the present invention is realized when the program is executed by processor The method of full guard.
The embodiment of the present invention by described from user terminal by when accessing WiFi network from subscriber terminal apparatus information, setting Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device Other code and signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When matching is lost When losing, then according to preset rules, described it will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects Consumer's Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Brief description of the drawings
Fig. 1 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention one provides;
Fig. 2 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention two provides;
Fig. 3 is a kind of structural representation of the device for WiFi cipher safe protectings that the embodiment of the present invention three provides;
Fig. 4 is a kind of structural representation for computer equipment that the embodiment of the present invention four provides.
Embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention, rather than limitation of the invention.It also should be noted that in order to just Part related to the present invention rather than full content are illustrate only in description, accompanying drawing.
It should be mentioned that some exemplary embodiments are described as before exemplary embodiment is discussed in greater detail The processing described as flow chart or method.Although operations (or step) are described as the processing of order by flow chart, Many of which operation can be implemented concurrently, concomitantly or simultaneously.In addition, the order of operations can be pacified again Row.The processing can be terminated when its operations are completed, it is also possible to the additional step being not included in accompanying drawing.Institute State processing and can correspond to method, function, code, subroutine, subprogram etc..
Embodiment one
Fig. 1 be the embodiment of the present invention one provide a kind of WiFi cipher safe protectings method flow chart, the present embodiment The situation of safeguard protection WiFi passwords is applicable to, this method can be performed by a kind of device of WiFi cipher safe protectings, The device can be realized by the mode of software and/or hardware, and can typically be integrated in computer equipment.The method of the present embodiment Specifically comprise the following steps:
Step 110, when accessing WiFi network from subscriber terminal apparatus information, will it is described from subscriber terminal apparatus information with Primary user presets end message storehouse and matched, wherein, the default end message storehouse includes identification code and the spy of terminal device Sign mark.
Wherein, will be described from subscriber terminal apparatus information and master when accessing WiFi network from subscriber terminal apparatus information User preset end message storehouse is matched, in addition to:Receive the access request sent from subscriber terminal equipment or presence It is illegal to access the described from subscriber terminal equipment of WiFi network;Identification is described from subscriber terminal apparatus information.It is understood that It is application access from subscriber terminal equipment or illegally accesses the terminal device of WiFi network, from subscriber terminal apparatus information The identification code and signature identification of equipment can be included by presetting end message storehouse with primary user, and identification code is unique body of terminal Part mark ID, for example, unique ID such as mobile phone factory serial number of smart mobile phone, signature identification is the feature for characterizing end message, example Such as, the signature identification of the smart mobile phone pet name that can be user set for it or the model of mobile phone etc..It is understood that Primary user and from user be according to WiFi set authority and define, primary user is the first possessor for handling WiFi accounts, And from user be application access or the user that has illegally accessed.
Step 120, when the match is successful, then allow described to access the WiFi network from subscriber terminal equipment.
Wherein, if the match is successful, illustrate that primary user is preset in end message storehouse and be stored with this from subscriber terminal equipment Information, be primary user's setting can allow access from user, therefore can realize that this is directly accessed from subscriber terminal equipment.
Step 130, when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
Wherein, preset rules are to add blacklist from user equipment by it fails to match and/or directly delete, according to default Rule should shield from subscriber terminal equipment.For example, it is that WiFi nets are illegally accessed by the direct-connected grades of WiFi from subscriber terminal equipment Network, i.e., it need not input WiFi passwords and can access, now, matching is unsuccessful to be added into blacklist automatically or directly delete Mode and shielded.If it is by asking access WiFi network to be believed to preset terminal with primary user from subscriber terminal equipment When ceasing that it fails to match in storehouse, it can directly be shielded, WiFi passwords can also be manually entered according to actual conditions and are accessed.For example, The terminal device information of kinsfolk is stored in primary user and presets end message storehouse by primary user, but generally will not be by friend's Terminal device information stores, and now, when friend request accesses, primary user's terminal device does not allow the situation of access again It is lower to be accessed manually, it is necessary to input WiFi passwords.After friend is accessed manually by WiFi passwords, primary user can set its terminal Standby information is added to primary user and preset in end message storehouse, and WiFi is directly accessed without inputting again when facilitating friend to use next time Password.
The embodiment of the present invention by described from user terminal by when accessing WiFi network from subscriber terminal apparatus information, setting Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device Other code and signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When matching is lost When losing, then according to preset rules, described it will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects Consumer's Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Embodiment two
Fig. 2 is a kind of flow chart of the method for WiFi cipher safe protectings that the embodiment of the present invention two provides, such as Fig. 2 institutes Show, the concrete operation step of this method is as follows:
The request of step 210, the access WiFi network of reception primary user, wherein, the terminal for asking to include primary user Information and access pin, the primary user are the transactors of the WiFi network.
Wherein, WiFi network transactor is that primary user needs to ask to be linked into WiFi network by inputting WiFi passwords In.
Step 220, according to primary user's rights management rule, establish primary user preset end message storehouse.
Wherein, primary user's rights management rule be according to primary user set allow access the WiFi network from The management rule of subscriber terminal equipment.Establish the default terminal letter for allowing access from user of the rights management based on primary user Storehouse is ceased, by primary user's rights management, other is controlled from the access request of user or illegally accesses situation.
Step 230, when accessing WiFi network from subscriber terminal apparatus information, will it is described from subscriber terminal apparatus information with Primary user presets end message storehouse and matched, wherein, the default end message storehouse includes identification code and the spy of terminal device Sign mark.
Step 240, when the match is successful, then allow described to access the WiFi network from subscriber terminal equipment.
Step 250, when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
The embodiment of the present invention establishes primary user and presets end message storehouse, pass through authority according to primary user's rights management rule Management, setting only primary user's authority setting can just access WiFi network from user.Connect when from subscriber terminal apparatus information When entering WiFi network, matched described from subscriber terminal apparatus information with the default end message storehouse of primary user, wherein, it is described Default end message storehouse includes the identification code and signature identification of terminal device;When the match is successful, then allow described whole from user End equipment accesses the WiFi network;When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment. The present invention solves the problems, such as that WiFi passwords set complex effects Consumer's Experience and automatic crack to influence network security, so as to keep away The illegal access from user is exempted from, the running environment of safety is provided for WiFi network.
Embodiment three
Fig. 3 be the embodiment of the present invention three provide a kind of WiFi cipher safe protectings device structural representation, such as Fig. 3 Shown, the device includes matching module 310, allows AM access module 320 and shielding AM access module 330, wherein:
Matching module 310, for when accessing WiFi network from subscriber terminal apparatus information, being set described from user terminal Standby information is preset end message storehouse with primary user and matched, wherein, the default end message storehouse includes the knowledge of terminal device Other code and signature identification;
Allow AM access module 320, it is described from the subscriber terminal equipment access WiFi for when the match is successful, then allowing Network;
AM access module 330 is shielded, for when it fails to match, then according to preset rules, inciting somebody to action described from subscriber terminal equipment Shielding.
The present invention is by when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal apparatus information With primary user end message storehouse is preset to be matched, wherein, the identification code in the default end message storehouse including terminal device and Signature identification;When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;When it fails to match, Then according to preset rules, described will be shielded from subscriber terminal equipment.The present invention solves WiFi passwords and sets complex effects user Experience and automatic the problem of cracking influence network security, the running environment of safety is provided for WiFi network.
Further, further, before the matching module, in addition to:
Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request bag The end message and access pin of primary user is included, the primary user is the transactor of the WiFi network;
Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting terminal Information bank.
Further, in addition to:
The preset rules include:Described it will add blacklist from user and/or directly delete;
Primary user's rights management rule be according to primary user set allow to access the WiFi network from user The management rule of terminal device;
The matching module also includes:
Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi being present Network it is described from subscriber terminal equipment;
Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
The device for the WiFi cipher safe protectings that the embodiment of the present invention is provided can perform any embodiment of the present invention and be carried The method of the WiFi cipher safe protectings of confession, possess the corresponding functional module of execution method and beneficial effect.
Example IV
Fig. 4 is a kind of structural representation for equipment that the embodiment of the present invention four provides, as shown in figure 4, the equipment includes place Manage device 40, memory 41, input unit 42 and output device 43;The quantity of processor 40 can be one or more in equipment, In Fig. 4 by taking a processor 40 as an example;Processor 40, memory 41, input unit 42 and output device 43 in equipment can be with Connected by bus or other modes, in Fig. 4 exemplified by being connected by bus.
Memory 41 is used as a kind of computer-readable recording medium, and journey is can perform available for storage software program, computer Sequence and module, as corresponding to the method for the WiFi cipher safe protectings in the embodiment of the present invention programmed instruction/module (for example, Matching module 310, allow AM access module 320 and shielding AM access module 330).Processor 40 is stored in memory 41 by operation In software program, instruction and module, so as to perform the various function application of equipment and data processing, that is, realize above-mentioned The method of the method for WiFi cipher safe protectings.
Memory 41 can mainly include storing program area and storage data field, wherein, storing program area can store operation system Application program needed for system, at least one function;Storage data field can store uses created data etc. according to terminal.This Outside, memory 41 can include high-speed random access memory, can also include nonvolatile memory, for example, at least a magnetic Disk storage device, flush memory device or other non-volatile solid state memory parts.In some instances, memory 41 can be further Including network connection to equipment can be passed through relative to the remotely located memory of processor 40, these remote memories.It is above-mentioned The example of network includes but is not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Input unit 42 can be used for the numeral or character information for receiving input, and produce set with the user of equipment and The relevant key signals input of function control.Output device 43 may include the display devices such as display screen.
Embodiment five
The embodiment of the present invention five also provides a kind of storage medium for including computer executable instructions, and the computer can be held Row instruction by computer processor when being performed for performing a kind of associative operation of the method for WiFi cipher safe protectings.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to realized by hardware, but the former is more in many cases Good embodiment.Based on such understanding, what technical scheme substantially contributed to prior art in other words Part can be embodied in the form of software product, and the computer software product can be stored in computer-readable recording medium In, floppy disk, read-only storage (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are causing a computer to set Standby (can be personal computer, server, or network equipment etc.) performs the method described in each embodiment of the present invention.
It is worth noting that, in the embodiment of above-mentioned WiFi cipher safe protectings, included unit and module are only Divided according to function logic, but be not limited to above-mentioned division, as long as corresponding function can be realized;Separately Outside, the specific name of each functional unit is also only to facilitate mutually distinguish, the protection domain being not intended to limit the invention.
Pay attention to, above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The invention is not restricted to specific embodiment described here, can carry out for a person skilled in the art various obvious changes, Readjust and substitute without departing from protection scope of the present invention.Therefore, although being carried out by above example to the present invention It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also Other more equivalent embodiments can be included, and the scope of the present invention is determined by scope of the appended claims.

Claims (10)

  1. A kind of 1. method of Wireless Fidelity WiFi cipher safe protectings, it is characterised in that including:
    , will be described default eventually from subscriber terminal apparatus information and primary user when accessing WiFi network from subscriber terminal apparatus information Client information storehouse is matched, wherein, the default end message storehouse includes the identification code and signature identification of terminal device;
    When the match is successful, then allow described from the subscriber terminal equipment access WiFi network;
    When it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
  2. 2. according to the method for claim 1, it is characterised in that when WiFi is connected with terminal device information, by the end Before end equipment information is matched with default end message storehouse, in addition to:
    The request of the access WiFi network of primary user is received, wherein, the end message for asking to include primary user and access are close Code, the primary user is the transactor of the WiFi network;
    According to primary user's rights management rule, establish the primary user and preset end message storehouse.
  3. 3. according to the method for claim 1, it is characterised in that the preset rules include:
    Described it will add blacklist from user and/or directly delete.
  4. 4. according to the method for claim 2, it is characterised in that primary user's rights management rule is set according to primary user The fixed management rule from subscriber terminal equipment for allowing to access the WiFi network.
  5. 5. according to the method for claim 1, it is characterised in that when accessing WiFi network from subscriber terminal apparatus information, Matched described from subscriber terminal apparatus information with the default end message storehouse of primary user, in addition to:
    Receive the access request sent from subscriber terminal equipment or
    Accessed in the presence of illegal described in WiFi network from subscriber terminal equipment;
    Identification is described from subscriber terminal apparatus information.
  6. A kind of 6. device of Wireless Fidelity WiFi cipher safe protectings, it is characterised in that including:
    Matching module, for when accessing WiFi network from subscriber terminal apparatus information, inciting somebody to action described from subscriber terminal apparatus information With primary user end message storehouse is preset to be matched, wherein, the identification code in the default end message storehouse including terminal device and Signature identification;
    Allow AM access module, it is described from the subscriber terminal equipment access WiFi network for when the match is successful, then allowing;
    AM access module is shielded, for when it fails to match, then according to preset rules, described will be shielded from subscriber terminal equipment.
  7. 7. device according to claim 6, it is characterised in that before the matching module, in addition to:
    Primary user's access request module, the request of the access WiFi network for receiving primary user, wherein, the request includes master The end message and access pin of user, the primary user are the transactors of the WiFi network;
    Module is established in end message storehouse, for according to primary user's managing entitlement rule, establishing the primary user and presetting end message Storehouse.
  8. 8. device according to claim 6, it is characterised in that also include:
    The preset rules include:Described it will add blacklist from user and/or directly delete;
    Primary user's rights management rule be according to primary user set allow to access the WiFi network from user terminal The management rule of equipment;
    The matching module also includes:
    Submodule is accessed, for receiving the access request sent from subscriber terminal equipment or illegal access WiFi network being present It is described from subscriber terminal equipment;
    Submodule is identified, it is described from subscriber terminal apparatus information for identifying.
  9. 9. a kind of computer equipment, including memory, processor and storage are on a memory and the meter that can run on a processor Calculation machine program, it is characterised in that realized during the computing device described program wireless as described in any in claim 1-5 The method of fidelity WiFi cipher safe protectings.
  10. 10. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that the program is by processor The method that the Wireless Fidelity WiFi cipher safe protectings as described in any in claim 1-5 are realized during execution.
CN201711174661.6A 2017-11-22 2017-11-22 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings Withdrawn CN107682861A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711174661.6A CN107682861A (en) 2017-11-22 2017-11-22 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711174661.6A CN107682861A (en) 2017-11-22 2017-11-22 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings

Publications (1)

Publication Number Publication Date
CN107682861A true CN107682861A (en) 2018-02-09

Family

ID=61149747

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711174661.6A Withdrawn CN107682861A (en) 2017-11-22 2017-11-22 A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings

Country Status (1)

Country Link
CN (1) CN107682861A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647522A (en) * 2018-04-12 2018-10-12 佛山市百里洲科技有限公司 A kind of method of mobile terminal safety access computer network
CN116939603A (en) * 2023-09-13 2023-10-24 微网优联科技(成都)有限公司 Wifi safety protection system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108647522A (en) * 2018-04-12 2018-10-12 佛山市百里洲科技有限公司 A kind of method of mobile terminal safety access computer network
CN116939603A (en) * 2023-09-13 2023-10-24 微网优联科技(成都)有限公司 Wifi safety protection system and method
CN116939603B (en) * 2023-09-13 2023-12-05 微网优联科技(成都)有限公司 Wifi safety protection system and method

Similar Documents

Publication Publication Date Title
US10547601B2 (en) System and method to allow third-party developer to debug code in customer environment
CN103473844B (en) Public affairs are rented a house intelligent control method and system
CN104182687B (en) The safety detection method of mobile terminal input window and safety detection device
CN106134143A (en) Method, apparatus and system for dynamic network access-in management
CN105765597A (en) Pre-identifying probable malicious rootkit behavior using behavioral contracts
CN109920102B (en) Bluetooth keyless entry intelligent lock method, device, equipment and storage medium
CN108829838A (en) A kind of account information batch processing method and server
CN105809007A (en) Privacy protection method and device
CN104469736B (en) A kind of data processing method, server and terminal
CN106169042A (en) The method and device of administration authority
CN108476135A (en) The access control of numerical data
CN105975867A (en) Data processing method
CN106716429A (en) Monitoring method and device, and electronic equipment
CN107682861A (en) A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings
CN104346550A (en) Information processing method and electronic equipment
CN112464214A (en) Authority detection method and device, electronic equipment and readable storage medium
CN114040411B (en) Equipment binding method and device, electronic equipment and storage medium
CN107769928A (en) A kind of terminal and computer-readable recording medium
CN106778160A (en) Data item display methods and device
CN110955872A (en) Authority control method, device, terminal and medium
EP3333743B1 (en) System and method of preventing unfair evaluation of applications by users
CN110990802B (en) Method and device for carrying out batch authorization on mysql user permission information
CN109858235B (en) Portable equipment and password obtaining method and device thereof
US9846790B2 (en) Method for changing an operating mode of a mobile device
CN107707550B (en) Method, device and system for accessing virtual machine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20180209