CN108513300A - A kind of processing method and terminal of management and control wifi connections - Google Patents

A kind of processing method and terminal of management and control wifi connections Download PDF

Info

Publication number
CN108513300A
CN108513300A CN201810758784.2A CN201810758784A CN108513300A CN 108513300 A CN108513300 A CN 108513300A CN 201810758784 A CN201810758784 A CN 201810758784A CN 108513300 A CN108513300 A CN 108513300A
Authority
CN
China
Prior art keywords
wifi
violation
rules
regulations
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810758784.2A
Other languages
Chinese (zh)
Inventor
张晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qianxin Technology Co Ltd
Original Assignee
Beijing Qianxin Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qianxin Technology Co Ltd filed Critical Beijing Qianxin Technology Co Ltd
Priority to CN201810758784.2A priority Critical patent/CN108513300A/en
Publication of CN108513300A publication Critical patent/CN108513300A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/306Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information intercepting packet switched data communications, e.g. Web, Internet or IMS communications

Abstract

The embodiment of the present invention provides a kind of processing method and terminal of management and control wifi connections, the method includes:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time, and obtains the terminal iidentification for executing the wifi connecting moves;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and the first wifi for executing the software operating right of limitation user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.The terminal executes the above method.The processing method and terminal of management and control wifi connections provided in an embodiment of the present invention, it first passes through wifi connection blacklists and intercepts wifi connections, wifi is executed again punishes strategy in violation of rules and regulations, to limit the software operating right of user, can fully and effectively management and control wifi connections, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.

Description

A kind of processing method and terminal of management and control wifi connections
Technical field
The present embodiments relate to technical field of network security, and in particular to a kind of processing method of management and control wifi connections and Terminal.
Background technology
With the continuous development of the technologies such as Internet technology, hacking technique, the network security of enterprises seems particularly heavy It wants.
In order to ensure that the network security of enterprises, prior art generally use intercept the method for wifi connections to prevent from using Family is connected to network by the wifi there are security risk, to ensure the network security of enterprises, still, this method pair The management and control of wifi connections has merely ensured that user can not access network, can not comprehensively, effectively prevent what Network Security Vulnerabilities were brought Potential risk, the adverse effects such as to cause company information to be leaked, utilize.
Therefore, how to avoid drawbacks described above, can fully and effectively management and control wifi connections, it is hidden to prevent network security Suffer from the potential risk brought to enterprise, becoming need solve the problems, such as.
Invention content
In view of the problems of the existing technology, the embodiment of the present invention provides processing method and the end of a kind of management and control wifi connections End.
In a first aspect, the embodiment of the present invention provides a kind of processing method of management and control wifi connections, the method includes:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification The first wifi for making permission punishes strategy in violation of rules and regulations.
Second aspect, the embodiment of the present invention provide a kind of processing terminal of management and control wifi connections, and the terminal includes:
Acquiring unit, for obtaining wifi connection identifier in wifi connections;
Interception unit, if for judging to know the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, The wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;
Execution unit executes limitation and the terminal iidentification pair for punishing strategy in violation of rules and regulations according to the wifi being obtained ahead of time Strategy is punished in violation of rules and regulations using the first wifi of the software operating right at family.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, including:Processor, memory and bus, wherein
The processor and the memory complete mutual communication by the bus;
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to refer to Order is able to carry out following method:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification The first wifi for making permission punishes strategy in violation of rules and regulations.
Fourth aspect, the embodiment of the present invention provide a kind of non-transient computer readable storage medium, including:
The non-transient computer readable storage medium stores computer instruction, and the computer instruction makes the computer Execute following method:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier intercepts the wifi connections, and obtain in the wifi connection blacklists being obtained ahead of time Take the terminal iidentification for executing the wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software behaviour for limiting user corresponding with the terminal iidentification The first wifi for making permission punishes strategy in violation of rules and regulations.
The processing method and terminal of management and control wifi connections provided in an embodiment of the present invention first pass through wifi connection blacklists and block Wifi connections are cut, then executes wifi and punishes strategy in violation of rules and regulations, to limit the software operating right of user, can fully and effectively be managed Wifi connections are controlled, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
Description of the drawings
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technology description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this hair Some bright embodiments for those of ordinary skill in the art without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is the process flow schematic diagram of management and control of embodiment of the present invention wifi connections;
Fig. 2 is the processing terminal structural schematic diagram of management and control of embodiment of the present invention wifi connections;
Fig. 3 is electronic equipment entity structure schematic diagram provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art The every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Fig. 1 is the process flow schematic diagram of management and control of embodiment of the present invention wifi connections, as shown in Figure 1, the present invention is real The processing method for applying a kind of management and control wifi connections of example offer, includes the following steps:
S101:Wifi connection identifier is obtained in wifi connections.
Specifically, terminal obtains wifi connection identifier in wifi connections.Terminal, which may include mobile phone etc., can realize nothing The equipment of line online, wifi connection identifier can be wifi names in the available WLAN lists in mobile phone, can also be SSID (Service Set Identifier), it includes having ESSID and BSSID, for distinguishing different networks, does not limit specifically It is fixed.
S102:If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time, And obtain the terminal iidentification for executing the wifi connecting moves.
Specifically, if terminal judgement knows that the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, blocks The wifi connections are cut, and obtain the terminal iidentification for executing the wifi connecting moves.Wifi connections blacklist can in advance from Server is issued to the terminal, and the wifi connection identifier that prestores in blacklist can be regarded as the companies of the risky wifi by verification Connect mark.By intercepting wifi connections, to achieve the purpose that make the terminal can not continue to access network, to a certain extent It can ensure the safety of company information.Terminal iidentification may include IMEI, i.e. international mobile equipment identification number (IMEI: International Mobile Equipment Identification Number), it is the mark of difference mobile device, but It is not especially limited.
S103:Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and is executed and is limited user's corresponding with the terminal iidentification First wifi of software operating right punishes strategy in violation of rules and regulations.
Specifically, terminal punishes strategy in violation of rules and regulations according to the wifi being obtained ahead of time, it is corresponding with the terminal iidentification to execute limitation First wifi of the software operating right of user punishes strategy in violation of rules and regulations.It should be noted that:Punishment strategy can be pre- in violation of rules and regulations by wifi It first is issued to the terminal from server, punishment strategy may include terminal iidentification pass corresponding with user basic information to wifi in violation of rules and regulations System, may be used list and stores the correspondence to terminal, user may include enterprises office worker, and correspondence can illustrate For enterprises office worker Zhang San-IMEI a;Enterprises office worker Li Si-IMEI b etc..Execute limitation and the terminal iidentification First wifi of the software operating right of corresponding user punishes strategy in violation of rules and regulations, can specifically include:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.Here software can be understood as and the duty Employee makees relevant software, for example, the office worker is Software Development Engineer, then the relevant software that works with the office worker may include Enterprise's OA, Software Development Tools software etc..Restricted software logon operation, i.e., so that the office worker can not log in above-mentioned enterprise's OA, Software Development Tools software etc..
Can also include specifically:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.With reference to the example above, restricted software editor Operation, i.e., so that the office worker is only limitted to log in above-mentioned enterprise's OA, Software Development Tools software etc., and the enterprise that browsing is above-mentioned The information of OA, Software Development Tools software etc. such as can not be created, be write, being deleted, being changed at the edit operations.
Further, the software data of user corresponding with the terminal iidentification can also be obtained;The software data is standby Part to server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violations for emptying the software data Punishment strategy.Software data can be understood as all data with the relevant all softwares of the user job, with above-mentioned enterprise's OA For, software data includes all data of enterprise's OA, such as:Enterprise's notice, address list, mail management, work plan, administration Management, financial management etc. do not illustrate all data of Software Development Tools software.The software data is emptied, i.e., So that deleting all and relevant software data of the user job completely in the corresponding terminal of the user.Thoroughly prevent The security risk that company information leaks etc..
The punishment daily record in violation of rules and regulations of strategy corresponding first is punished in violation of rules and regulations with the first wifi it is possible to further generate respectively Daily record is punished in violation of rules and regulations with strategy corresponding second is punished in violation of rules and regulations with the 2nd wifi;Send it is described first in violation of rules and regulations punishment daily record and Described second punishes daily record to server in violation of rules and regulations.Punishing daily record by violation further can effectively trace the corresponding wifi of execution The record for punishing strategy in violation of rules and regulations, is convenient for follow-up management.
The processing method of management and control wifi connections provided in an embodiment of the present invention first passes through wifi connection blacklists and intercepts wifi Connection, then execute wifi and punish strategy in violation of rules and regulations, it, being capable of fully and effectively management and control wifi to limit the software operating right of user Connection, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
On the basis of the above embodiments, described to execute the software operating right for limiting user corresponding with the terminal iidentification The first wifi in violation of rules and regulations punish strategy, including:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
Specifically, the first wifi that terminal executes restricted software logon operation punishes strategy in violation of rules and regulations.It can refer to above-mentioned implementation Example, repeats no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software logon operation the One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise The potential risk that industry is brought.
On the basis of the above embodiments, described to execute the software operating right for limiting user corresponding with the terminal iidentification The first wifi in violation of rules and regulations punish strategy, including:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
Specifically, the first wifi that terminal executes restricted software edit operation punishes strategy in violation of rules and regulations.It can refer to above-mentioned implementation Example, repeats no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software edit operation the One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise The potential risk that industry is brought.
On the basis of the above embodiments, the method further includes:
Obtain the software data of user corresponding with the terminal iidentification.
Specifically, terminal obtains the software data of user corresponding with the terminal iidentification.Above-described embodiment is can refer to, no longer It repeats.
The software data is backed up into server.
Specifically, the software data is backed up to server by terminal.Above-described embodiment is can refer to, is repeated no more.
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and the 2nd wifi that execution empties the software data is punished in violation of rules and regulations Strategy.
Specifically, terminal punishes strategy in violation of rules and regulations according to the wifi being obtained ahead of time, execution empties the second of the software data Wifi punishes strategy in violation of rules and regulations.Above-described embodiment is can refer to, is repeated no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention empties the second of software data by executing Wifi punishes strategy in violation of rules and regulations, fully and effectively management and control wifi connections is further able to, to prevent Network Security Vulnerabilities to enterprise The potential risk brought.
On the basis of the above embodiments, the wifi connection blacklists and the wifi punish strategy in advance from clothes in violation of rules and regulations Business device is issued to terminal.
Specifically, wifi connection blacklists in terminal and the wifi punish strategy in advance under server in violation of rules and regulations It is sent to terminal.Above-described embodiment is can refer to, is repeated no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention is connected by obtaining wifi from server in advance It connects blacklist and wifi punishes strategy in violation of rules and regulations, can in time, effectively get newest wifi connection blacklists and wifi is disobeyed Rule punishment strategy.
On the basis of the above embodiments, the method further includes:
It generates respectively and punishes strategy corresponding first in violation of rules and regulations with the first wifi and punish daily record in violation of rules and regulations and with described second Wifi punishes the punishment daily record in violation of rules and regulations of strategy corresponding second in violation of rules and regulations.
Specifically, terminal generate respectively with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punishment daily record and Punish the punishment daily record in violation of rules and regulations of strategy corresponding second in violation of rules and regulations with the 2nd wifi.Above-described embodiment is can refer to, is repeated no more.
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
Specifically, terminal sends described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.It can With reference to above-described embodiment, repeat no more.
The processing method of management and control wifi connections provided in an embodiment of the present invention, by generating the first punishment daily record and the in violation of rules and regulations Two punishment daily records in violation of rules and regulations can be traced effectively and execute the record that corresponding wifi punishes strategy in violation of rules and regulations, be convenient for follow-up management.
Fig. 2 is the processing terminal structural schematic diagram of management and control of embodiment of the present invention wifi connections, as shown in Fig. 2, the present invention is real It applies example and provides a kind of processing terminal of management and control wifi connections, including acquiring unit 201, interception unit 202 and execution unit 203, wherein:
Acquiring unit 201 is used to obtain wifi connection identifier in wifi connections;If interception unit 202 is known for judging The wifi connection identifier intercepts the wifi connections, and obtain described in execution in the wifi connection blacklists being obtained ahead of time The terminal iidentification of wifi connecting moves;Execution unit 203 is used to punish strategy in violation of rules and regulations according to the wifi being obtained ahead of time, and executes limitation First wifi of the software operating right of user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.
Specifically, acquiring unit 201 is used to obtain wifi connection identifier in wifi connections;If interception unit 202 is used for Judgement knows that the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, intercepts the wifi connections, and obtain Execute the terminal iidentification of the wifi connecting moves;Execution unit 203 is used to punish strategy in violation of rules and regulations according to the wifi being obtained ahead of time, Execute the first wifi violation punishment strategies for limiting the software operating right of user corresponding with the terminal iidentification.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention first passes through wifi connection blacklists and intercepts wifi Connection, then execute wifi and punish strategy in violation of rules and regulations, it, being capable of fully and effectively management and control wifi to limit the software operating right of user Connection, to prevent the potential risk that Network Security Vulnerabilities are brought to enterprise.
On the basis of the above embodiments, the execution unit 203 is specifically used for:Execute the of restricted software logon operation One wifi punishes strategy in violation of rules and regulations.
Specifically, the execution unit 203 is specifically used for:The first wifi for executing restricted software logon operation is punished in violation of rules and regulations Strategy.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software logon operation the One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise The potential risk that industry is brought.
On the basis of the above embodiments, the execution unit 203 is specifically used for:Execute the of restricted software edit operation One wifi punishes strategy in violation of rules and regulations.
Specifically, the execution unit 203 is specifically used for:The first wifi for executing restricted software edit operation is punished in violation of rules and regulations Strategy.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by execute restricted software edit operation the One wifi punishes strategy in violation of rules and regulations, is further able to fully and effectively management and control wifi connections, to prevent Network Security Vulnerabilities to enterprise The potential risk that industry is brought.
On the basis of the above embodiments, the terminal is additionally operable to:Obtain the software of user corresponding with the terminal iidentification Data;The software data is backed up into server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and execution empties described soft 2nd wifi of number of packages evidence punishes strategy in violation of rules and regulations.
Specifically, the terminal is additionally operable to:Obtain the software data of user corresponding with the terminal iidentification;By the software Data backup is to server;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and execution empties the second of the software data Wifi punishes strategy in violation of rules and regulations.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention empties the second of software data by executing Wifi punishes strategy in violation of rules and regulations, fully and effectively management and control wifi connections is further able to, to prevent Network Security Vulnerabilities to enterprise The potential risk brought.
On the basis of the above embodiments, the wifi connection blacklists and the wifi punish strategy in advance from clothes in violation of rules and regulations Business device is issued to terminal.
Specifically, the wifi connection blacklists and the wifi punish strategy in violation of rules and regulations is issued to end from server in advance End.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention is connected by obtaining wifi from server in advance It connects blacklist and wifi punishes strategy in violation of rules and regulations, can in time, effectively get newest wifi connection blacklists and wifi is disobeyed Rule punishment strategy.
On the basis of the above embodiments, the terminal is additionally operable to:It generates respectively and punishes plan in violation of rules and regulations with the first wifi Slightly corresponding first punishment daily record and the corresponding with the 2nd wifi violation punishment strategies second punishment daily record in violation of rules and regulations in violation of rules and regulations;Hair It send described first to punish daily record and described second in violation of rules and regulations and punishes daily record in violation of rules and regulations to server.
Specifically, the terminal is additionally operable to:Corresponding with the first wifi violation punishment strategies first is generated respectively to disobey Rule punishment daily record and the corresponding with the 2nd wifi violation punishment strategies second punishment daily record in violation of rules and regulations;Send described first in violation of rules and regulations It punishes daily record and described second and punishes daily record in violation of rules and regulations to server.
The processing terminal of management and control wifi connections provided in an embodiment of the present invention, by generating the first punishment daily record and the in violation of rules and regulations Two punishment daily records in violation of rules and regulations can be traced effectively and execute the record that corresponding wifi punishes strategy in violation of rules and regulations, be convenient for follow-up management.
It is real that the processing terminal of management and control wifi connections provided in an embodiment of the present invention specifically can be used for executing above-mentioned each method The process flow of example is applied, details are not described herein for function, is referred to the detailed description of above method embodiment.
Fig. 3 is electronic equipment entity structure schematic diagram provided in an embodiment of the present invention, as shown in figure 3, the electronic equipment Including:Processor (processor) 301, memory (memory) 302 and bus 303;
Wherein, the processor 301, memory 302 complete mutual communication by bus 303;
The processor 301 is used to call the program instruction in the memory 302, to execute above-mentioned each method embodiment The method provided, such as including:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier is obtained in advance In the wifi connection blacklists obtained, the wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;Root Strategy is punished in violation of rules and regulations according to the wifi that is obtained ahead of time, executes the of the software operating right for limiting user corresponding with the terminal iidentification One wifi punishes strategy in violation of rules and regulations.
The present embodiment discloses a kind of computer program product, and the computer program product includes being stored in non-transient calculating Computer program on machine readable storage medium storing program for executing, the computer program include program instruction, when described program instruction is calculated When machine executes, computer is able to carry out the method that above-mentioned each method embodiment is provided, such as including:It is obtained in wifi connections Wifi connection identifier;If the wifi connection identifier intercepts the wifi connections in the wifi connection blacklists being obtained ahead of time, And obtain the terminal iidentification for executing the wifi connecting moves;Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes limitation First wifi of the software operating right of user corresponding with the terminal iidentification punishes strategy in violation of rules and regulations.
The present embodiment provides a kind of non-transient computer readable storage medium, the non-transient computer readable storage medium Computer instruction is stored, the computer instruction makes the computer execute the method that above-mentioned each method embodiment is provided, example Such as include:Wifi connection identifier is obtained in wifi connections;If the wifi connection identifier is black in the wifi connections being obtained ahead of time In list, the wifi connections are intercepted, and obtain the terminal iidentification for executing the wifi connecting moves;According to what is be obtained ahead of time Strategy is punished in wifi violations, is executed and is limited at the first wifi violations of the software operating right of user corresponding with the terminal iidentification Penalize strategy.
One of ordinary skill in the art will appreciate that:Realize that all or part of step of above method embodiment can pass through The relevant hardware of program instruction is completed, and program above-mentioned can be stored in a computer read/write memory medium, the program When being executed, step including the steps of the foregoing method embodiments is executed;And storage medium above-mentioned includes:ROM, RAM, magnetic disc or light The various media that can store program code such as disk.
The embodiments such as electronic equipment described above are only schematical, illustrate as separating component wherein described Unit may or may not be physically separated, and the component shown as unit may or may not be object Manage unit, you can be located at a place, or may be distributed over multiple network units.It can select according to the actual needs Some or all of module therein is selected to achieve the purpose of the solution of this embodiment.Those of ordinary skill in the art are not paying wound In the case of the labour for the property made, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can It is realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on this understanding, on Stating technical solution, substantially the part that contributes to existing technology can be expressed in the form of software products in other words, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including several fingers It enables and using so that a computer equipment (can be personal computer, server or the network equipment etc.) executes each implementation Method described in certain parts of example or embodiment.
Finally it should be noted that:The above various embodiments is only to illustrate the technical solution of the embodiment of the present invention rather than right It is limited;Although the embodiment of the present invention is described in detail with reference to foregoing embodiments, the ordinary skill of this field Personnel should understand that:It still can be with technical scheme described in the above embodiments is modified, or to which part Or all technical features carries out equivalent replacement;And these modifications or replacements, it does not separate the essence of the corresponding technical solution The range of various embodiments of the present invention technical solution.

Claims (14)

1. a kind of processing method of management and control wifi connections, which is characterized in that including:
Wifi connection identifier is obtained in wifi connections;
If the wifi connection identifier in the wifi connection blacklists being obtained ahead of time, intercepts the wifi connections, and obtains and hold The terminal iidentification of the row wifi connecting moves;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the software operating rights for limiting user corresponding with the terminal iidentification First wifi of limit punishes strategy in violation of rules and regulations.
2. according to the method described in claim 1, it is characterized in that, described execute limits user's corresponding with the terminal iidentification First wifi of software operating right punishes strategy in violation of rules and regulations, including:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
3. according to the method described in claim 1, it is characterized in that, described execute limits user's corresponding with the terminal iidentification First wifi of software operating right punishes strategy in violation of rules and regulations, including:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
4. method according to any one of claims 1 to 3, which is characterized in that the method further includes:
Obtain the software data of user corresponding with the terminal iidentification;
The software data is backed up into server;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violation punishment plans for emptying the software data Slightly.
5. method according to any one of claims 1 to 3, which is characterized in that the wifi connection blacklists and the wifi Strategy is punished in violation of rules and regulations is issued to terminal from server in advance.
6. according to the method described in claim 4, it is characterized in that, the method further includes:
Respectively generate with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punish daily record and with the 2nd wifi The punishment daily record in violation of rules and regulations of strategy corresponding second is punished in violation of rules and regulations;
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
7. a kind of processing terminal of management and control wifi connections, which is characterized in that including:
Acquiring unit, for obtaining wifi connection identifier in wifi connections;
If interception unit intercepts for judging to know the wifi connection identifier in the wifi connection blacklists being obtained ahead of time The wifi connections, and obtain the terminal iidentification for executing the wifi connecting moves;
Execution unit executes limitation with the terminal iidentification to application for punishing strategy in violation of rules and regulations according to the wifi being obtained ahead of time First wifi of the software operating right at family punishes strategy in violation of rules and regulations.
8. terminal according to claim 7, which is characterized in that the execution unit is specifically used for:
The first wifi for executing restricted software logon operation punishes strategy in violation of rules and regulations.
9. terminal according to claim 7, which is characterized in that the execution unit is specifically used for:
The first wifi for executing restricted software edit operation punishes strategy in violation of rules and regulations.
10. according to any terminal of claim 7 to 9, which is characterized in that the terminal is additionally operable to:
Obtain the software data of user corresponding with the terminal iidentification;
The software data is backed up into server;
Strategy is punished in violation of rules and regulations according to the wifi being obtained ahead of time, and executes the 2nd wifi violation punishment plans for emptying the software data Slightly.
11. according to any terminal of claim 7 to 9, which is characterized in that the wifi connection blacklists and the wifi Strategy is punished in violation of rules and regulations is issued to terminal from server in advance.
12. terminal according to claim 10, which is characterized in that the terminal is additionally operable to:
Respectively generate with the first wifi in violation of rules and regulations punish strategy it is corresponding first in violation of rules and regulations punish daily record and with the 2nd wifi The punishment daily record in violation of rules and regulations of strategy corresponding second is punished in violation of rules and regulations;
Sending described first, punishment daily record and second violation punish daily record to server in violation of rules and regulations.
13. a kind of electronic equipment, which is characterized in that including:Processor, memory and bus, wherein
The processor and the memory complete mutual communication by the bus;
The memory is stored with the program instruction that can be executed by the processor, and the processor calls described program to instruct energy Enough methods executed as described in claim 1 to 6 is any.
14. a kind of non-transient computer readable storage medium, which is characterized in that the non-transient computer readable storage medium is deposited Computer instruction is stored up, the computer instruction makes the computer execute the method as described in claim 1 to 6 is any.
CN201810758784.2A 2018-07-11 2018-07-11 A kind of processing method and terminal of management and control wifi connections Pending CN108513300A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810758784.2A CN108513300A (en) 2018-07-11 2018-07-11 A kind of processing method and terminal of management and control wifi connections

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810758784.2A CN108513300A (en) 2018-07-11 2018-07-11 A kind of processing method and terminal of management and control wifi connections

Publications (1)

Publication Number Publication Date
CN108513300A true CN108513300A (en) 2018-09-07

Family

ID=63404246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810758784.2A Pending CN108513300A (en) 2018-07-11 2018-07-11 A kind of processing method and terminal of management and control wifi connections

Country Status (1)

Country Link
CN (1) CN108513300A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
US20150222641A1 (en) * 2012-06-12 2015-08-06 Zte Corporation Method and device for controlling permission of application
CN104955028A (en) * 2015-06-23 2015-09-30 北京奇虎科技有限公司 Method, device and sensor for identifying phishing WIFI (wireless fidelity)
CN105636050A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Method and system for preventing wrong connection with WIFI network
CN106778089A (en) * 2016-12-01 2017-05-31 联信摩贝软件(北京)有限公司 A kind of system and method that security management and control is carried out to software authority and behavior

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150222641A1 (en) * 2012-06-12 2015-08-06 Zte Corporation Method and device for controlling permission of application
CN103401691A (en) * 2013-07-18 2013-11-20 山东省计算中心 Portable WiFi equipment invasion precautionary method
CN104955028A (en) * 2015-06-23 2015-09-30 北京奇虎科技有限公司 Method, device and sensor for identifying phishing WIFI (wireless fidelity)
CN105636050A (en) * 2015-08-28 2016-06-01 宇龙计算机通信科技(深圳)有限公司 Method and system for preventing wrong connection with WIFI network
CN106778089A (en) * 2016-12-01 2017-05-31 联信摩贝软件(北京)有限公司 A kind of system and method that security management and control is carried out to software authority and behavior

Similar Documents

Publication Publication Date Title
US20080183603A1 (en) Policy enforcement over heterogeneous assets
US20070250424A1 (en) Virtual asset groups in a compliance management system
US20120042354A1 (en) Entitlement conflict enforcement
CN106034054B (en) Redundant access controls list acl rule file test method and device
US20060184995A1 (en) Creating a privacy policy from a process model and verifying the compliance
Schlegel et al. Structured system threat modeling and mitigation analysis for industrial automation systems
CN110324334A (en) Secure group policy management method, device, equipment and computer readable storage medium
Scheid et al. Automatic sla compensation based on smart contracts
CN108399490A (en) A kind of big data cloud computing platform for serving business policy planning
CN112910868A (en) Enterprise network security management method and device, computer equipment and storage medium
CN107909488A (en) The processing method and processing device of settlement of insurance claim flow
CN108513300A (en) A kind of processing method and terminal of management and control wifi connections
US8341530B1 (en) Customer service center database management
Al-Lawati et al. The impact of cloud computing IT departments: A case study of Oman's financial institutions
CN109194700B (en) Flow control method and related device
CN109495575B (en) Service configuration method, system and ERP server
CN113312390A (en) Service data calling method and device, storage medium and electronic equipment
CN111062688A (en) Management method and system based on carbon emission right account
Asadullah et al. A survey on security issues and challenges in cloud computing
JP2022537124A (en) A software application for continuous real-time determination, treatment and remediation of cyber risk
CN107295556B (en) Method, device and equipment for detecting policy control and charging policy conflict
KR20040011863A (en) Real Time Information Security Risk Management System and Method
Boehm et al. Enhanced cyberrisk reporting: Opening doors to risk-based cybersecurity
US11736525B1 (en) Generating access control policies using static analysis
Pradana et al. Service Audit in Filling Annual tax Return Using The Cobit 5 Framework at Tabanan Primary Tax service Office

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180907