CN108647522A - A kind of method of mobile terminal safety access computer network - Google Patents
A kind of method of mobile terminal safety access computer network Download PDFInfo
- Publication number
- CN108647522A CN108647522A CN201810327495.7A CN201810327495A CN108647522A CN 108647522 A CN108647522 A CN 108647522A CN 201810327495 A CN201810327495 A CN 201810327495A CN 108647522 A CN108647522 A CN 108647522A
- Authority
- CN
- China
- Prior art keywords
- computer
- mobile terminal
- record
- access
- mark
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Abstract
A kind of method of mobile terminal access computer network, which is characterized in that described method includes following steps:Step 1, mobile terminal pass through computer described in wireless or wired connection;Step 2, the computer obtain the mark of mobile terminal, and read the record of mobile terminal identification;Step 3, the computer judge the mark:If the identification record is transferred to step 4 in the computer;If the label is not recorded in the computer, then computer sends out the prompt of unknown mobile terminal, when user selects to refuse, the computer does not allow the access of the unknown mobile terminal, when user's selection receives, the record of the mark increases by 1, and the record of the expression becomes 1 by 0, the computer allows computer described in the mobile terminal accessing, does not allow write operation of the mobile terminal to the computer.
Description
Technical field
The present invention relates to a kind of computer control methods, and in particular to a kind of mobile terminal safety access computer network
Method.
Background technology
Currently, computer as network launch point using more and more extensive, computer is also easy by mobile terminal
Attack, mobile terminal may send some hidden small routines and bring unfavorable factor to computer.
Invention content
The invention discloses a kind of methods that mobile terminal safety accesses computer network, in this way, strange shifting
Dynamic terminal or the mobile terminal of limited number of time access cannot send any file to computer, can only pass through network share
Download file.
The specific technical solution of the present invention is as follows:
A kind of method of mobile terminal access computer network, which is characterized in that described method includes following steps:
Step 1, mobile terminal pass through computer described in wireless or wired connection;
Step 2, the computer obtain the mark of mobile terminal, and read the record of mobile terminal identification;
Step 3, the computer judge the mark:If the identification record is transferred in the computer
Step 4;If the label is not recorded in the computer, computer sends out the prompt of unknown mobile terminal, when user selects
When selecting refusal, the computer does not allow the access of the unknown mobile terminal, and when user's selection receives, the record of the mark increases
Add 1, the record of the expression becomes 1 by 0, and the computer allows computer described in the mobile terminal accessing, does not allow the movement
The write operation of computer described in terminal-pair;
Step 4, if the record numerical value of the mark is more than or equal to record threshold value, the computer allows the mobile terminal
Read-write operation is transferred to step 5 if the record numerical value of the mark is less than the record threshold value;
Step 5, the computer send out time prompt of new mobile terminal, and when user selects to refuse, the computer does not allow
The access of the unknown mobile terminal;When user's selection receives, the record of the mark increases by 1, and the computer allows the movement
Computer described in terminal access does not allow write operation of the mobile terminal to the computer.
Further, in the step 1, described is wirelessly bluetooth or wifi.
Further, in the step 5, when user selects to refuse, the computer does not allow this unknown mobile whole
The access at end, the record for recording the mobile terminal in a computer reduce 1.
Further, the computer also records the number that mobile terminal is rejected, in the step 3 and the step
In five, when user selects to refuse, the number which is rejected increases by 1;In the step 3 and the step 5,
If the refusal number of mobile terminal is more than or equal to refusal threshold value, the computer no longer proposes the access of the mobile terminal
Show, and does not allow any read-write operation of the mobile terminal to the computer.
Through the above technical solution, when computer has the access of mobile terminal, it can be determined that go out the mobile terminal and exist
It was linked into the number of the computer in the past, may determine that whether the mobile terminal has the right for accessing the computer according to number.
Specific implementation mode
A kind of method of mobile terminal access computer network, which is characterized in that described method includes following steps:
Step 1, mobile terminal pass through computer described in wireless or wired connection;
Step 2, the computer obtain the mark of mobile terminal, and read the record of mobile terminal identification;
Step 3, the computer judge the mark:If the identification record is transferred in the computer
Step 4;If the label is not recorded in the computer, computer sends out the prompt of unknown mobile terminal, when user selects
When selecting refusal, the computer does not allow the access of the unknown mobile terminal, and when user's selection receives, the record of the mark increases
Add 1, the record of the expression becomes 1 by 0, and the computer allows computer described in the mobile terminal accessing, does not allow the movement
The write operation of computer described in terminal-pair;
Step 4, if the record numerical value of the mark is more than or equal to record threshold value, the computer allows the mobile terminal
Read-write operation is transferred to step 5 if the record numerical value of the mark is less than the record threshold value;
Step 5, the computer send out time prompt of new mobile terminal, and when user selects to refuse, the computer does not allow
The access of the unknown mobile terminal;When user's selection receives, the record of the mark increases by 1, and the computer allows the movement
Computer described in terminal access does not allow write operation of the mobile terminal to the computer.
Further, in the step 1, described is wirelessly bluetooth or wifi.
Further, in the step 5, when user selects to refuse, the computer does not allow this unknown mobile whole
The access at end, the record for recording the mobile terminal in a computer reduce 1.
Further, the computer also records the number that mobile terminal is rejected, in the step 3 and the step
In five, when user selects to refuse, the number which is rejected increases by 1;In the step 3 and the step 5,
If the refusal number of mobile terminal is more than or equal to refusal threshold value, the computer no longer proposes the access of the mobile terminal
Show, and does not allow any read-write operation of the mobile terminal to the computer.
Through the above technical solution, when computer has the access of mobile terminal, it can be determined that go out the mobile terminal and exist
It was linked into the number of the computer in the past, may determine that whether the mobile terminal has the right for accessing the computer according to number.
Finally it should be noted that:The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Present invention has been described in detail with reference to the aforementioned embodiments for pipe, it will be understood by those of ordinary skill in the art that:Its according to
So can with technical scheme described in the above embodiments is modified, either to which part or all technical features into
Row equivalent replacement;And these modifications or replacements, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (5)
1. a kind of method of mobile terminal access computer network, which is characterized in that described method includes following steps:
Step 1, mobile terminal pass through computer described in wireless or wired connection;
Step 2, the computer obtain the mark of mobile terminal, and read the record of mobile terminal identification;
Step 3, the computer judge the mark:If the identification record is transferred in the computer
Step 4;If the label is not recorded in the computer, computer sends out the prompt of unknown mobile terminal, when user selects
When selecting refusal, the computer does not allow the access of the unknown mobile terminal, and when user's selection receives, the record of the mark increases
Add 1, the record of the expression becomes 1 by 0, and the computer allows computer described in the mobile terminal accessing, does not allow the movement
The write operation of computer described in terminal-pair;
Step 4, if the record numerical value of the mark is more than or equal to record threshold value, the computer allows the mobile terminal
Read-write operation is transferred to step 5 if the record numerical value of the mark is less than the record threshold value;
Step 5, the computer send out time prompt of new mobile terminal, and when user selects to refuse, the computer does not allow
The access of this new mobile terminal;When user's selection receives, the record of the mark increases by 1, and the computer allows this this time
Computer described in mobile terminal accessing does not allow write operation of the mobile terminal to the computer.
2. a kind of method of mobile terminal access computer network according to claim 1, which is characterized in that in the step
In rapid one, described is wirelessly bluetooth or wifi.
3. a kind of method of mobile terminal access computer network according to claim 1, which is characterized in that in the step
In rapid five, when user selects to refuse, the computer does not allow the access of the unknown mobile terminal, records in a computer
The record of the mobile terminal reduces 1.
4. a kind of method of mobile terminal access computer network according to claim 1, which is characterized in that the calculating
Machine also records the number that mobile terminal is rejected, in the step 3 and the step 5, when user selects to refuse, and the shifting
The number that dynamic terminal is rejected increases by 1.
5. a kind of method of mobile terminal access computer network according to claim 4, which is characterized in that in the step
Rapid three and the step 5 in, if the refusal number of mobile terminal be more than or equal to refusal threshold value, the computer is no longer to this
The access of mobile terminal is prompted, and does not allow any read-write operation of the mobile terminal to the computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810327495.7A CN108647522A (en) | 2018-04-12 | 2018-04-12 | A kind of method of mobile terminal safety access computer network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810327495.7A CN108647522A (en) | 2018-04-12 | 2018-04-12 | A kind of method of mobile terminal safety access computer network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108647522A true CN108647522A (en) | 2018-10-12 |
Family
ID=63745954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810327495.7A Withdrawn CN108647522A (en) | 2018-04-12 | 2018-04-12 | A kind of method of mobile terminal safety access computer network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108647522A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984705A (en) * | 2012-11-13 | 2013-03-20 | 广东欧珀移动通信有限公司 | System and method for mobile terminal to control wireless network state |
US20150365348A1 (en) * | 2014-06-13 | 2015-12-17 | Canon Kabushiki Kaisha | System, method, server system, and storage medium |
CN105657712A (en) * | 2016-01-06 | 2016-06-08 | 广东欧珀移动通信有限公司 | Access control method and device of WiFi hotspot |
CN106162805A (en) * | 2016-07-01 | 2016-11-23 | 中国联合网络通信集团有限公司 | The connection control method of WIFI hot spot service and device |
CN107659980A (en) * | 2017-09-20 | 2018-02-02 | 惠州Tcl移动通信有限公司 | A kind of WIFI hot spot connection method and mobile terminal based on mobile terminal |
CN107682861A (en) * | 2017-11-22 | 2018-02-09 | 朱秋华 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings |
-
2018
- 2018-04-12 CN CN201810327495.7A patent/CN108647522A/en not_active Withdrawn
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102984705A (en) * | 2012-11-13 | 2013-03-20 | 广东欧珀移动通信有限公司 | System and method for mobile terminal to control wireless network state |
US20150365348A1 (en) * | 2014-06-13 | 2015-12-17 | Canon Kabushiki Kaisha | System, method, server system, and storage medium |
CN105657712A (en) * | 2016-01-06 | 2016-06-08 | 广东欧珀移动通信有限公司 | Access control method and device of WiFi hotspot |
CN106162805A (en) * | 2016-07-01 | 2016-11-23 | 中国联合网络通信集团有限公司 | The connection control method of WIFI hot spot service and device |
CN107659980A (en) * | 2017-09-20 | 2018-02-02 | 惠州Tcl移动通信有限公司 | A kind of WIFI hot spot connection method and mobile terminal based on mobile terminal |
CN107682861A (en) * | 2017-11-22 | 2018-02-09 | 朱秋华 | A kind of method, apparatus, equipment and the readable storage medium storing program for executing of WiFi cipher safe protectings |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7050701B1 (en) | Information recording medium, information recording/reproducing method, and information recording/reproducing device | |
CN108197181A (en) | A kind of compression and storage method of time series data, electronic equipment and storage medium | |
CN101071611B (en) | Information recording /reproducing apparatus and recording/reproducing method | |
CN102609432B (en) | Document management apparatus and file management method | |
CN107870973A (en) | A kind of document storage system accelerated multi-path monitoring and played back simultaneously | |
JP2008112577A (en) | System of recording management information on recording medium and reproducing data | |
CN104809018B (en) | A kind of method and system of built-in system software injection hot patch | |
CN102521349A (en) | Pre-reading method of files | |
CN107273046A (en) | A kind of data processing method and system based on Solid-state disc array | |
CN106095332A (en) | A kind of data heavily delete method and device | |
RU2010145181A (en) | NON-RECORDABLE INFORMATION RECORDING MEDIA, INFORMATION RECORDING DEVICE, INFORMATION RECORDING METHOD, INFORMATION PLAYBACK DEVICE AND METHOD OF PLAYBACK | |
CN108647522A (en) | A kind of method of mobile terminal safety access computer network | |
CN108628718A (en) | It is a kind of to mitigate the SSD management methods and SSD that temperature influences | |
CN109413075A (en) | A kind of method of mobile terminal safety access computer network | |
CN106327832A (en) | Real-time meter reading method adopting wireless concentrator | |
CN102598134B (en) | Information storage medium, recording and reconstruction equipment and recording and reconstruction method | |
CN100545917C (en) | The recording medium and the heavy method and apparatus of formatted record medium | |
CN101158960A (en) | Communication system, communication device, program and communication method | |
CN101765882A (en) | Method for emulating optical disk, optical disk drive using the same, and optical disk including security zone | |
CN112114823B (en) | Burning reading system based on modified MAC address | |
US6674698B2 (en) | Method of creating security medium, device for creating security medium, and reproducing device | |
CN102446183A (en) | Industrial data storage method | |
CN108563943A (en) | It is a kind of can secure accessing mobile terminal computer | |
CN102609664B (en) | Based on the identification of process fingerprint intelligent and fuzzy acquisition system and method thereof that can carry out body | |
US9246745B2 (en) | MAC address management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20181012 |