CN108513300A - A kind of processing method and terminal of management and control wifi connections - Google Patents
A kind of processing method and terminal of management and control wifi connections Download PDFInfo
- Publication number
- CN108513300A CN108513300A CN201810758784.2A CN201810758784A CN108513300A CN 108513300 A CN108513300 A CN 108513300A CN 201810758784 A CN201810758784 A CN 201810758784A CN 108513300 A CN108513300 A CN 108513300A
- Authority
- CN
- China
- Prior art keywords
- wifi
- violation
- rules
- regulations
- strategy
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
- H04L63/306—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications
Abstract
The embodiment of the present invention provides a kind of processing method and terminal of management and control wifi connections, the method includes:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time, and obtains the terminal iidentification for executing the wifi connecting moves;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and the first wifi for executing the software operating right of limitation user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.The terminal executes the above method.The processing method and terminal of management and control wifi connections provided in an embodiment of the present invention, it first passes through wifi connection blacklists and intercepts wifi connections, wifi is executed again punishes strategy in violation of rules and regulations, to limit the software operating right of user, can fully and effectively management and control wifi connections, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
Description
Technical field
The present embodiments relate to technical field of network security, and in particular to a kind of processing method of management and control wifi connections and
Terminal.
Background technology
With the continuous development of the technologies such as Internet technology, hacking technique, the network security of enterprises seems particularly heavy
It wants.
In order to ensure that the network security of enterprises, prior art generally use intercept the method for wifi connections to prevent from using
Family is connected to network by the wifi there are security risk, to ensure the network security of enterprises, still, this method pair
The management and control of wifi connections has merely ensured that user can not access network, can not comprehensively, effectively prevent what Network Security Vulnerabilities were brought
Potential risk, the adverse effects such as to cause company information to be leaked, utilize.
Therefore, how to avoid drawbacks described above, can fully and effectively management and control wifi connections, it is hidden to prevent network security
Suffer from the potential risk brought to enterprise, becoming need solve the problems, such as.
Invention content
In view of the problems of the existing technology, the embodiment of the present invention provides processing method and the end of a kind of management and control wifi connections
End.
In a first aspect, the embodiment of the present invention provides a kind of processing method of management and control wifi connections, the method includes:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time
Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification
The first wifi for making permission punishes strategy in violation of rules and regulations.
Second aspect, the embodiment of the present invention provide a kind of processing terminal of management and control wifi connections, and the terminal includes:
Acquiring unit, for obtaining wifi connection identifier in wifi connections;
Interception unit, if for judging to know the wifi connection identifier in the wifi connection blacklists being obtained ahead of time,
The wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;
Execution unit executes limitation and the terminal iidentification pair for punishing strategy in violation of rules and regulations according to the wifi being obtained ahead of time
Strategy is punished in violation of rules and regulations using the first wifi of the software operating right at family.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, including:Processor, memory and bus, wherein
The processor and the memory complete mutual communication by the bus;
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to
Order is able to carry out following method:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time
Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification
The first wifi for making permission punishes strategy in violation of rules and regulations.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, including:
The non-transient computer readable storage medium stores computer instruction, and the computer instruction makes the computer
Execute following method:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time
Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification
The first wifi for making permission punishes strategy in violation of rules and regulations.
The processing method and terminal of management and control wifi connections provided in an embodiment of the present invention first pass through wifi connection blacklists and block
Wifi connections are cut, then executes wifi and punishes strategy in violation of rules and regulations, to limit the software operating right of user, can fully and effectively be managed
Wifi connections are controlled, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair
Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the process flow schematic diagram of management and control of embodiment of the present invention wifi connections;
Fig. 2 is the processing terminal structural schematic diagram of management and control of embodiment of the present invention wifi connections;
Fig. 3 is electronic equipment entity structure schematic diagram provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the process flow schematic diagram of management and control of embodiment of the present invention wifi connections, as shown in Figure 1, the present invention is real
The processing method for applying a kind of management and control wifi connections of example offer, includes the following steps:
S101:Wifi connection identifier is obtained in wifi connections.
Specifically, terminal obtains wifi connection identifier in wifi connections.Terminal, which may include mobile phone etc., can realize nothing
The equipment of line online, wifi connection identifier can be wifi names in the available WLAN lists in mobile phone, can also be SSID
(Service Set Identifier), it includes having ESSID and BSSID, for distinguishing different networks, does not limit specifically
It is fixed.
S102:If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time,
And obtain the terminal iidentification for executing the wifi connecting moves.
Specifically, if terminal judgement knows that the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, blocks
The wifi connections are cut, and obtain the terminal iidentification for executing the wifi connecting moves.Wifi connections blacklist can in advance from
Server is issued to the terminal, and the wifi connection identifier that prestores in blacklist can be regarded as the companies of the risky wifi by verification
Connect mark.By intercepting wifi connections, to achieve the purpose that make the terminal can not continue to access network, to a certain extent
It can ensure the safety of company information.Terminal iidentification may include IMEI, i.e. international mobile equipment identification number (IMEI:
International Mobile Equipment Identification Number), it is the mark of difference mobile device, but
It is not especially limited.
S103:Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and is executed and is limited user's corresponding with the terminal iidentification
First wifi of software operating right punishes strategy in violation of rules and regulations.
Specifically, terminal punishes strategy in violation of rules and regulations according to the wifi being obtained ahead of time, it is corresponding with the terminal iidentification to execute limitation
First wifi of the software operating right of user punishes strategy in violation of rules and regulations.It should be noted that:Punishment strategy can be pre- in violation of rules and regulations by wifi
It first is issued to the terminal from server, punishment strategy may include terminal iidentification pass corresponding with user basic information to wifi in violation of rules and regulations
System, may be used list and stores the correspondence to terminal, user may include enterprises office worker, and correspondence can illustrate
For enterprises office worker Zhang San-IMEI a;Enterprises office worker Li Si-IMEI b etc..Execute limitation and the terminal iidentification
First wifi of the software operating right of corresponding user punishes strategy in violation of rules and regulations, can specifically include:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.Here software can be understood as and the duty
Employee makees relevant software, for example, the office worker is Software Development Engineer, then the relevant software that works with the office worker may include
Enterprise's OA, Software Development Tools software etc..Restricted software logon operation, i.e., so that the office worker can not log in above-mentioned enterprise's OA,
Software Development Tools software etc..
Can also include specifically:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.With reference to the example above, restricted software editor
Operation, i.e., so that the office worker is only limitted to log in above-mentioned enterprise's OA, Software Development Tools software etc., and the enterprise that browsing is above-mentioned
The information of OA, Software Development Tools software etc. such as can not be created, be write, being deleted, being changed at the edit operations.
Further, the software data of user corresponding with the terminal iidentification can also be obtained;The software data is standby
Part to server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violations for emptying the software data
Punishment strategy.Software data can be understood as all data with the relevant all softwares of the user job, with above-mentioned enterprise's OA
For, software data includes all data of enterprise's OA, such as:Enterprise's notice, address list, mail management, work plan, administration
Management, financial management etc. do not illustrate all data of Software Development Tools software.The software data is emptied, i.e.,
So that deleting all and relevant software data of the user job completely in the corresponding terminal of the user.Thoroughly prevent
The security risk that company information leaks etc..
The punishment daily record in violation of rules and regulations of strategy corresponding first is punished in violation of rules and regulations with the first wifi it is possible to further generate respectively
Daily record is punished in violation of rules and regulations with strategy corresponding second is punished in violation of rules and regulations with the 2nd wifi;Send it is described first in violation of rules and regulations punishment daily record and
Described second punishes daily record to server in violation of rules and regulations.Punishing daily record by violation further can effectively trace the corresponding wifi of execution
The record for punishing strategy in violation of rules and regulations, is convenient for follow-up management.
The processing method of management and control wifi connections provided in an embodiment of the present invention first passes through wifi connection blacklists and intercepts wifi
Connection, then execute wifi and punish strategy in violation of rules and regulations, it, being capable of fully and effectively management and control wifi to limit the software operating right of user
Connection, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
On the basis of the above embodiments, described to execute the software operating right for limiting user corresponding with the terminal iidentification
The first wifi in violation of rules and regulations punish strategy, including:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
Specifically, the first wifi that terminal executes restricted software logon operation punishes strategy in violation of rules and regulations.It can refer to above-mentioned implementation
Example, repeats no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software logon operation the
One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise
The potential risk that industry is brought.
On the basis of the above embodiments, described to execute the software operating right for limiting user corresponding with the terminal iidentification
The first wifi in violation of rules and regulations punish strategy, including:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
Specifically, the first wifi that terminal executes restricted software edit operation punishes strategy in violation of rules and regulations.It can refer to above-mentioned implementation
Example, repeats no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software edit operation the
One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise
The potential risk that industry is brought.
On the basis of the above embodiments, the method further includes:
Obtain the software data of user corresponding with the terminal iidentification.
Specifically, terminal obtains the software data of user corresponding with the terminal iidentification.Above-described embodiment is can refer to, no longer
It repeats.
The software data is backed up into server.
Specifically, the software data is backed up to server by terminal.Above-described embodiment is can refer to, is repeated no more.
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and the 2nd wifi that execution empties the software data is punished in violation of rules and regulations
Strategy.
Specifically, terminal punishes strategy in violation of rules and regulations according to the wifi being obtained ahead of time, execution empties the second of the software data
Wifi punishes strategy in violation of rules and regulations.Above-described embodiment is can refer to, is repeated no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention empties the second of software data by executing
Wifi punishes strategy in violation of rules and regulations, fully and effectively management and control wifi connections is further able to, to prevent Network Security Vulnerabilities to enterprise
The potential risk brought.
On the basis of the above embodiments, the wifi connection blacklists and the wifi punish strategy in advance from clothes in violation of rules and regulations
Business device is issued to terminal.
Specifically, wifi connection blacklists in terminal and the wifi punish strategy in advance under server in violation of rules and regulations
It is sent to terminal.Above-described embodiment is can refer to, is repeated no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention is connected by obtaining wifi from server in advance
It connects blacklist and wifi punishes strategy in violation of rules and regulations, can in time, effectively get newest wifi connection blacklists and wifi is disobeyed
Rule punishment strategy.
On the basis of the above embodiments, the method further includes:
It generates respectively and punishes strategy corresponding first in violation of rules and regulations with the first wifi and punish daily record in violation of rules and regulations and with described second
Wifi punishes the punishment daily record in violation of rules and regulations of strategy corresponding second in violation of rules and regulations.
Specifically, terminal generate respectively with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punishment daily record and
Punish the punishment daily record in violation of rules and regulations of strategy corresponding second in violation of rules and regulations with the 2nd wifi.Above-described embodiment is can refer to, is repeated no more.
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
Specifically, terminal sends described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.It can
With reference to above-described embodiment, repeat no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by generating the first punishment daily record and the in violation of rules and regulations
Two punishment daily records in violation of rules and regulations can be traced effectively and execute the record that corresponding wifi punishes strategy in violation of rules and regulations, be convenient for follow-up management.
Fig. 2 is the processing terminal structural schematic diagram of management and control of embodiment of the present invention wifi connections, as shown in Fig. 2, the present invention is real
It applies example and provides a kind of processing terminal of management and control wifi connections, including acquiring unit 201, interception unit 202 and execution unit
203, wherein:
Acquiring unit 201 is used to obtain wifi connection identifier in wifi connections;If interception unit 202 is known for judging
The wifi connection identifier intercepts the wifi connections, and obtain described in execution in the wifi connection blacklists being obtained ahead of time
The terminal iidentification of wifi connecting moves;Execution unit 203 is used to punish strategy in violation of rules and regulations according to the wifi being obtained ahead of time, and executes limitation
First wifi of the software operating right of user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.
Specifically, acquiring unit 201 is used to obtain wifi connection identifier in wifi connections;If interception unit 202 is used for
Judgement knows that the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, intercepts the wifi connections, and obtain
Execute the terminal iidentification of the wifi connecting moves;Execution unit 203 is used to punish strategy in violation of rules and regulations according to the wifi being obtained ahead of time,
Execute the first wifi violation punishment strategies for limiting the software operating right of user corresponding with the terminal iidentification.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention first passes through wifi connection blacklists and intercepts wifi
Connection, then execute wifi and punish strategy in violation of rules and regulations, it, being capable of fully and effectively management and control wifi to limit the software operating right of user
Connection, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
On the basis of the above embodiments, the execution unit 203 is specifically used for:Execute the of restricted software logon operation
One wifi punishes strategy in violation of rules and regulations.
Specifically, the execution unit 203 is specifically used for:The first wifi for executing restricted software logon operation is punished in violation of rules and regulations
Strategy.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software logon operation the
One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise
The potential risk that industry is brought.
On the basis of the above embodiments, the execution unit 203 is specifically used for:Execute the of restricted software edit operation
One wifi punishes strategy in violation of rules and regulations.
Specifically, the execution unit 203 is specifically used for:The first wifi for executing restricted software edit operation is punished in violation of rules and regulations
Strategy.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software edit operation the
One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise
The potential risk that industry is brought.
On the basis of the above embodiments, the terminal is additionally operable to:Obtain the software of user corresponding with the terminal iidentification
Data;The software data is backed up into server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and execution empties described soft
2nd wifi of number of packages evidence punishes strategy in violation of rules and regulations.
Specifically, the terminal is additionally operable to:Obtain the software data of user corresponding with the terminal iidentification;By the software
Data backup is to server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and execution empties the second of the software data
Wifi punishes strategy in violation of rules and regulations.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention empties the second of software data by executing
Wifi punishes strategy in violation of rules and regulations, fully and effectively management and control wifi connections is further able to, to prevent Network Security Vulnerabilities to enterprise
The potential risk brought.
On the basis of the above embodiments, the wifi connection blacklists and the wifi punish strategy in advance from clothes in violation of rules and regulations
Business device is issued to terminal.
Specifically, the wifi connection blacklists and the wifi punish strategy in violation of rules and regulations is issued to end from server in advance
End.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention is connected by obtaining wifi from server in advance
It connects blacklist and wifi punishes strategy in violation of rules and regulations, can in time, effectively get newest wifi connection blacklists and wifi is disobeyed
Rule punishment strategy.
On the basis of the above embodiments, the terminal is additionally operable to:It generates respectively and punishes plan in violation of rules and regulations with the first wifi
Slightly corresponding first punishment daily record and the corresponding with the 2nd wifi violation punishment strategies second punishment daily record in violation of rules and regulations in violation of rules and regulations;Hair
It send described first to punish daily record and described second in violation of rules and regulations and punishes daily record in violation of rules and regulations to server.
Specifically, the terminal is additionally operable to:Corresponding with the first wifi violation punishment strategies first is generated respectively to disobey
Rule punishment daily record and the corresponding with the 2nd wifi violation punishment strategies second punishment daily record in violation of rules and regulations;Send described first in violation of rules and regulations
It punishes daily record and described second and punishes daily record in violation of rules and regulations to server.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by generating the first punishment daily record and the in violation of rules and regulations
Two punishment daily records in violation of rules and regulations can be traced effectively and execute the record that corresponding wifi punishes strategy in violation of rules and regulations, be convenient for follow-up management.
It is real that the processing terminal of management and control wifi connections provided in an embodiment of the present invention specifically can be used for executing above-mentioned each method
The process flow of example is applied, details are not described herein for function, is referred to the detailed description of above method embodiment.
Fig. 3 is electronic equipment entity structure schematic diagram provided in an embodiment of the present invention, as shown in figure 3, the electronic equipment
Including:Processor (processor) 301, memory (memory) 302 and bus 303;
Wherein, the processor 301, memory 302 complete mutual communication by bus 303;
The processor 301 is used to call the program instruction in the memory 302, to execute above-mentioned each method embodiment
The method provided, such as including:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier is obtained in advance
In the wifi connection blacklists obtained, the wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;Root
Strategy is punished in violation of rules and regulations according to the wifi that is obtained ahead of time, executes the of the software operating right for limiting user corresponding with the terminal iidentification
One wifi punishes strategy in violation of rules and regulations.
The present embodiment discloses a kind of computer program product, and the computer program product includes being stored in non-transient calculating
Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is calculated
When machine executes, computer is able to carry out the method that above-mentioned each method embodiment is provided, such as including:It is obtained in wifi connections
Wifi connection identifier;If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time,
And obtain the terminal iidentification for executing the wifi connecting moves;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes limitation
First wifi of the software operating right of user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium
Computer instruction is stored, the computer instruction makes the computer execute the method that above-mentioned each method embodiment is provided, example
Such as include:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier is black in the wifi connections being obtained ahead of time
In list, the wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;According to what is be obtained ahead of time
Strategy is punished in wifi violations, is executed and is limited at the first wifi violations of the software operating right of user corresponding with the terminal iidentification
Penalize strategy.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through
The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program
When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light
The various media that can store program code such as disk.
The embodiments such as electronic equipment described above are only schematical, illustrate as separating component wherein described
Unit may or may not be physically separated, and the component shown as unit may or may not be object
Manage unit, you can be located at a place, or may be distributed over multiple network units.It can select according to the actual needs
Some or all of module therein is selected to achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying wound
In the case of the labour for the property made, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
It is realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on
Stating technical solution, substantially the part that contributes to existing technology can be expressed in the form of software products in other words, should
Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including several fingers
It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation
Method described in certain parts of example or embodiment.
Finally it should be noted that:The above various embodiments is only to illustrate the technical solution of the embodiment of the present invention rather than right
It is limited;Although the embodiment of the present invention is described in detail with reference to foregoing embodiments, the ordinary skill of this field
Personnel should understand that:It still can be with technical scheme described in the above embodiments is modified, or to which part
Or all technical features carries out equivalent replacement;And these modifications or replacements, it does not separate the essence of the corresponding technical solution
The range of various embodiments of the present invention technical solution.
Claims (14)
1. a kind of processing method of management and control wifi connections, which is characterized in that including:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, intercepts the wifi connections, and obtains and hold
The terminal iidentification of the row wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software operating rights for limiting user corresponding with the terminal iidentification
First wifi of limit punishes strategy in violation of rules and regulations.
2. according to the method described in claim 1, it is characterized in that, described execute limits user's corresponding with the terminal iidentification
First wifi of software operating right punishes strategy in violation of rules and regulations, including:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
3. according to the method described in claim 1, it is characterized in that, described execute limits user's corresponding with the terminal iidentification
First wifi of software operating right punishes strategy in violation of rules and regulations, including:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
4. method according to any one of claims 1 to 3, which is characterized in that the method further includes:
Obtain the software data of user corresponding with the terminal iidentification;
The software data is backed up into server;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violation punishment plans for emptying the software data
Slightly.
5. method according to any one of claims 1 to 3, which is characterized in that the wifi connection blacklists and the wifi
Strategy is punished in violation of rules and regulations is issued to terminal from server in advance.
6. according to the method described in claim 4, it is characterized in that, the method further includes:
Respectively generate with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punish daily record and with the 2nd wifi
The punishment daily record in violation of rules and regulations of strategy corresponding second is punished in violation of rules and regulations;
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
7. a kind of processing terminal of management and control wifi connections, which is characterized in that including:
Acquiring unit, for obtaining wifi connection identifier in wifi connections;
If interception unit intercepts for judging to know the wifi connection identifier in the wifi connection blacklists being obtained ahead of time
The wifi connections, and obtain the terminal iidentification for executing the wifi connecting moves;
Execution unit executes limitation with the terminal iidentification to application for punishing strategy in violation of rules and regulations according to the wifi being obtained ahead of time
First wifi of the software operating right at family punishes strategy in violation of rules and regulations.
8. terminal according to claim 7, which is characterized in that the execution unit is specifically used for:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
9. terminal according to claim 7, which is characterized in that the execution unit is specifically used for:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
10. according to any terminal of claim 7 to 9, which is characterized in that the terminal is additionally operable to:
Obtain the software data of user corresponding with the terminal iidentification;
The software data is backed up into server;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violation punishment plans for emptying the software data
Slightly.
11. according to any terminal of claim 7 to 9, which is characterized in that the wifi connection blacklists and the wifi
Strategy is punished in violation of rules and regulations is issued to terminal from server in advance.
12. terminal according to claim 10, which is characterized in that the terminal is additionally operable to:
Respectively generate with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punish daily record and with the 2nd wifi
The punishment daily record in violation of rules and regulations of strategy corresponding second is punished in violation of rules and regulations;
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
13. a kind of electronic equipment, which is characterized in that including:Processor, memory and bus, wherein
The processor and the memory complete mutual communication by the bus;
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy
Enough methods executed as described in claim 1 to 6 is any.
14. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited
Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 6 is any.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810758784.2A CN108513300A (en) | 2018-07-11 | 2018-07-11 | A kind of processing method and terminal of management and control wifi connections |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810758784.2A CN108513300A (en) | 2018-07-11 | 2018-07-11 | A kind of processing method and terminal of management and control wifi connections |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108513300A true CN108513300A (en) | 2018-09-07 |
Family
ID=63404246
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810758784.2A Pending CN108513300A (en) | 2018-07-11 | 2018-07-11 | A kind of processing method and terminal of management and control wifi connections |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108513300A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103401691A (en) * | 2013-07-18 | 2013-11-20 | 山东省计算中心 | Portable WiFi equipment invasion precautionary method |
US20150222641A1 (en) * | 2012-06-12 | 2015-08-06 | Zte Corporation | Method and device for controlling permission of application |
CN104955028A (en) * | 2015-06-23 | 2015-09-30 | 北京奇虎科技有限公司 | Method, device and sensor for identifying phishing WIFI (wireless fidelity) |
CN105636050A (en) * | 2015-08-28 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for preventing wrong connection with WIFI network |
CN106778089A (en) * | 2016-12-01 | 2017-05-31 | 联信摩贝软件(北京)有限公司 | A kind of system and method that security management and control is carried out to software authority and behavior |
-
2018
- 2018-07-11 CN CN201810758784.2A patent/CN108513300A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150222641A1 (en) * | 2012-06-12 | 2015-08-06 | Zte Corporation | Method and device for controlling permission of application |
CN103401691A (en) * | 2013-07-18 | 2013-11-20 | 山东省计算中心 | Portable WiFi equipment invasion precautionary method |
CN104955028A (en) * | 2015-06-23 | 2015-09-30 | 北京奇虎科技有限公司 | Method, device and sensor for identifying phishing WIFI (wireless fidelity) |
CN105636050A (en) * | 2015-08-28 | 2016-06-01 | 宇龙计算机通信科技(深圳)有限公司 | Method and system for preventing wrong connection with WIFI network |
CN106778089A (en) * | 2016-12-01 | 2017-05-31 | 联信摩贝软件(北京)有限公司 | A kind of system and method that security management and control is carried out to software authority and behavior |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20080183603A1 (en) | Policy enforcement over heterogeneous assets | |
US20070250424A1 (en) | Virtual asset groups in a compliance management system | |
US20120042354A1 (en) | Entitlement conflict enforcement | |
CN106034054B (en) | Redundant access controls list acl rule file test method and device | |
US20060184995A1 (en) | Creating a privacy policy from a process model and verifying the compliance | |
Schlegel et al. | Structured system threat modeling and mitigation analysis for industrial automation systems | |
CN110324334A (en) | Secure group policy management method, device, equipment and computer readable storage medium | |
Scheid et al. | Automatic sla compensation based on smart contracts | |
CN108399490A (en) | A kind of big data cloud computing platform for serving business policy planning | |
CN112910868A (en) | Enterprise network security management method and device, computer equipment and storage medium | |
CN107909488A (en) | The processing method and processing device of settlement of insurance claim flow | |
CN108513300A (en) | A kind of processing method and terminal of management and control wifi connections | |
US8341530B1 (en) | Customer service center database management | |
Al-Lawati et al. | The impact of cloud computing IT departments: A case study of Oman's financial institutions | |
CN109194700B (en) | Flow control method and related device | |
CN109495575B (en) | Service configuration method, system and ERP server | |
CN113312390A (en) | Service data calling method and device, storage medium and electronic equipment | |
CN111062688A (en) | Management method and system based on carbon emission right account | |
Asadullah et al. | A survey on security issues and challenges in cloud computing | |
JP2022537124A (en) | A software application for continuous real-time determination, treatment and remediation of cyber risk | |
CN107295556B (en) | Method, device and equipment for detecting policy control and charging policy conflict | |
KR20040011863A (en) | Real Time Information Security Risk Management System and Method | |
Boehm et al. | Enhanced cyberrisk reporting: Opening doors to risk-based cybersecurity | |
US11736525B1 (en) | Generating access control policies using static analysis | |
Pradana et al. | Service Audit in Filling Annual tax Return Using The Cobit 5 Framework at Tabanan Primary Tax service Office |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180907 |