CN109962826A - A kind of method for connecting network and device - Google Patents

A kind of method for connecting network and device Download PDF

Info

Publication number
CN109962826A
CN109962826A CN201811507594.XA CN201811507594A CN109962826A CN 109962826 A CN109962826 A CN 109962826A CN 201811507594 A CN201811507594 A CN 201811507594A CN 109962826 A CN109962826 A CN 109962826A
Authority
CN
China
Prior art keywords
risk
network
environment
network environment
default
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811507594.XA
Other languages
Chinese (zh)
Other versions
CN109962826B (en
Inventor
吕鲲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811507594.XA priority Critical patent/CN109962826B/en
Publication of CN109962826A publication Critical patent/CN109962826A/en
Application granted granted Critical
Publication of CN109962826B publication Critical patent/CN109962826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of determination method and devices of network environment, to improve the safety of user information.The determination method of the network environment, it include: the network environment of terminal monitoring itself, and judge whether the network environment meets preset risk conditions, if so, determine the network environment be it is unsafe, otherwise, determine that the network environment is safe, in this way, can effectively reduce a possibility that user accesses unsafe network, just so as to effectively improve the safety of user information.

Description

A kind of method for connecting network and device
The application is the divisional application of 105577466 A of Chinese patent application CN, the applying date of original application are as follows: 2014 November 7, application No. is: 201410643984.5, a kind of invention and created name are as follows: determination method and device of network environment.
Technical field
This application involves computer internet technical field more particularly to a kind of determination method and devices of network environment.
Background technique
With the continuous development of Internet technology, more and more users get used to mentioning by wireless network acquisition server The various network services supplied.Meanwhile various public places also construct wireless network, the shared of wireless network are realized, with convenient User obtains service.
For example, the public places such as current most food and drink, lodging, amusement have provided wireless network for user.With Family can be scanned by terminal to multiple wireless networks, and terminal is accessed one of wireless network and obtains service.
But in multiple wireless networks for being scanned by terminal of user, it is understood that there may be the wireless network of attacker's building. Terminal once accesses the wireless network of attacker building, and attacker may illegally obtain the privacy information of user, this reduction The safety of user information.
For example, certain eating and drinking establishment and attacker are provided with wireless network, and the two wireless networks in the eating and drinking establishment Network identity is identical, for example, being the trade name of eating and drinking establishment.Scanning in the eating and drinking establishment to network identity as user is the eating and drinking establishment shop When the wireless network of name, it is likely that the wireless network that can provide attacker is mistakenly considered the wireless network of eating and drinking establishment's offer, and will Terminal accesses the wireless network of attacker offer, to obtain service.Attacker can be intercepted and captured by way of network data packet capturing The privacy information of user, this reduces the safeties of user information.
Summary of the invention
The embodiment of the present application provides a kind of determination method and device of network environment, to improve the safety of user information Property.
A kind of determination method of network environment provided by the embodiments of the present application, comprising:
Monitor the network environment of itself;
Judge whether the network environment meets preset risk conditions;
If so, determining that the network environment is dangerous;
Otherwise, it determines the network environment safety.
The determination method of another kind network environment provided by the embodiments of the present application, comprising:
Obtain the attribute information for the risk case that terminal reports;
Risk conditions are determined according to the attribute information;
The risk conditions are sent to terminal, the terminal is made to determine the network of the terminal according to the risk conditions Whether environment is safe.
A kind of determining device of network environment provided by the embodiments of the present application, comprising:
Monitoring modular, for monitoring itself network environment;
Judgment module, for judging whether the network environment meets preset risk conditions;
Determining module, for when the judgment module judges that the network environment meets preset risk conditions, really The fixed network environment is dangerous, otherwise, it determines the network environment is safe.
The determining device of another kind network environment provided by the embodiments of the present application, comprising:
Module is obtained, for obtaining the attribute information for the risk case that terminal reports;
Determining module, for determining risk conditions according to the attribute information;
Sending module determines the terminal according to the risk conditions for the risk conditions to be sent to terminal Whether the network environment of the terminal is safe.
The determination method of network environment provided by the embodiments of the present application, the network environment of terminal monitoring itself, and judge to supervise Whether the network environment measured meets preset risk conditions, if so, determine that the network environment is dangerous, otherwise, it determines The network environment safety.In this way, the user in current network environment could be aware that whether the network environment is safe, and Generally all terminal will not be accessed in unsafe network environment easily, in this way, can reduce terminal accesses unsafe network A possibility that, so as to effectively improve the safety of user information.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is the determination method flow schematic diagram of network environment provided by the embodiments of the present application;
Fig. 2 is one of the determination apparatus structure schematic diagram of network environment provided by the embodiments of the present application;
Fig. 3 is the two of the determination apparatus structure schematic diagram of network environment provided by the embodiments of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below with reference to the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It will be explained in detail the determination method of network environment provided by the embodiments of the present application below.
It is the flow diagram of the determination method of network environment provided by the embodiments of the present application, this method packet referring to Fig. 1 It includes:
S101, the network environment for monitoring itself.
In the embodiment of the present application, the network environment of the terminal itself is each network that terminal is scanned in a certain position Provided network access environment.The network may include the free wireless network for needing to authenticate and do not need certification.
Since the network of different location building is different (i.e. network identity is different), the network environment that heterogeneous networks provide can also It can be different.So the network environment that each network, each network that a certain position, the position are arranged provide uniquely corresponds to.Such as 1 institute of table Show.
Position Each network identity Network environment
Position A a1、a2、a3 Network environment 1
Position B b1、b2、b3 Network environment 2
Table 1
As shown in Table 1, position A is provided with the network that network identity is respectively a1, a2 and a3, these three networks mention for user Network environment 1 is supplied.Position B is provided with the network that network identity is respectively b1, b2 and b3, these three networks provide for user Network environment 2.
Therefore, in the embodiment of the present application, the network environment of terminal monitoring itself, specifically includes: terminal monitoring itself Position, as current location;Or the network identity for each network that Current Scan arrives is monitored, as current network identification.
Terminal can specifically be supervised in real time when monitoring itself current location by the location information for receiving come self aligning system The current location of itself is surveyed, for example, terminal can come from global positioning system (Globle Positioning by receiving System, GPS) or base station location information, using the location information as itself current location.
Wherein, network identity described in the embodiment of the present application can be the services set mark of the corresponding wireless router of each network Know (Service Set Identifier, SSID).
Whether the network environment that S102, judgement monitor meets preset risk conditions, if so, step S103 is executed, it is no Then, step S104 is executed.
In the embodiment of the present application, the risk conditions are to be determined and provided to terminal by server.Specifically, clothes Business device obtains the attribute information for the risk case that terminal reports, and risk conditions is determined according to the attribute information, by the risk conditions It is sent to terminal.Terminal then saves the risk conditions received.
Server can be according to the default risk position of risk case, default risk network identity, default risk environment mark Or the attribute informations such as preset signal strength, determine different risk conditions.
Specifically, server can obtain the generation position for the risk case that terminal reports, using the generation position as default Risk position.
Server determines the first risk conditions are as follows: the position that terminal monitoring arrives is default risk position.
When server can obtain the risk case generation that terminal reports, the network identity of the network of access, by the network mark Know as default risk network identity.
Server determines the second risk conditions are as follows: includes at least one default risk net in the network identity that terminal scans Network mark.
The first risk conditions determined and the second risk conditions are sent to terminal by server.
When terminal monitors current location (network environment) of itself by step S101, judge the current location whether be Default risk position (whether meeting the first risk conditions), if so, determining that the network environment of itself is dangerous, otherwise, it determines should Network environment safety.Alternatively, judgement is current when terminal is scanned by step S101 to each current network identification (network environment) Whether comprising default risk network identity (whether meeting the second risk conditions) in network identity, if so, determining the network of itself Environment is dangerous, otherwise, it determines the network environment is safe.
For example, it is assumed that steal-number event (risk case), in position A, terminal is in the network identity of the position A network accessed a1.Server is using position A as default risk position, using network identity a1 as default risk network identity.
The first risk conditions of server settings are as follows: the position of terminal is position A;Set the second risk conditions are as follows: terminal is swept It include a1 in the network identity retouched.
Assuming that user enters market M1, and monitors to be currently located at position A, determine that position A is default risk position, thus It can determine that A corresponding network environment in position is dangerous.Alternatively, if terminal scanned in the M1 of market to network identity be a1, a2 and The network of a3, it is determined that the network identity a1 scanned is default risk network identity, to can determine that network identity is a1, a2 Network environment corresponding with a3 is dangerous.
In the embodiment of the present application, server determines above-mentioned default risk position and default risk network identity, specifically may be used It realizes in the following way.
In the multiple risk cases reported at the terminal, server can will correspond to each risk thing of same risk network identity The generation position of part, as a default risk position.Further, in each generation position for corresponding to same risk network identity In setting, it can will be located at the generation position in set distance (such as 2km) range, as a default risk position.
S103, determine that current network environment is dangerous.
When terminal determines that itself network environment meets preset first risk conditions by step S102, itself is determined Network environment it is dangerous.
S104, current network environment safety is determined.
When terminal determines that itself network environment is unsatisfactory for preset first risk conditions by step S102, determine from The network environment safety of body.
In method shown in Fig. 1, the network environment of terminal monitoring itself, and it is default to judge whether the network environment meets Risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines the network environment is safe.In this way, in working as User in preceding network environment could be aware that whether the network environment is safe, and generally all will not easily access terminal uneasy In full network environment, in this way, can effectively avoid user do not know itself network environment whether safety in the case where, will be whole It terminates into risk network, and then the safety of user information can be effectively improved.
In view of the accuracy in practical application scene, carrying out the location information of self aligning system is lower, location information is corresponding Current location region it is larger, therefore, terminal by the current location determine the network environment that is presently in whether safety The accuracy of (that is, whether there is risk) is lower.
In addition, attacker often changes the network identity (letter of the risk network of itself building in practical application scene Claim risk network identity).If the risk network identity after change is not in default risk network identity, terminal can not just be determined Current network environment is dangerous.Therefore, terminal by risk network identity determine the network environment that is presently in whether safety Accuracy is relatively low.
In order to improve terminal determine the network environment that is presently in whether An Quan accuracy, in the embodiment of the present application, When terminal passes through network identity (network environment) of the step S101 scanning to current each network, it can determine whether that the network environment of itself is It is no to meet third risk conditions.
The third risk conditions can be determined and provided to terminal by server.It is reported specifically, server can obtain terminal Risk case when occurring its scan but the network identity of network that does not access, using each network identity as default risk Environmental labels.
Server determines third risk conditions are as follows: the quantity for the default risk environment mark that terminal scans is preset with all The ratio of the quantity of risk environment mark is greater than the first preset threshold.
The third risk conditions are sent to terminal by server.
When terminal is scanned by step S101 to current each network identity (network environment), judge that terminal scan presets The ratio of the quantity of the quantity of risk environment mark and all default risk environment marks is greater than the first preset threshold and (judges net Whether network environment meets third risk conditions), if so, determining that current network environment is dangerous, otherwise, it determines current network environment Safety.
Specifically, terminal determines the quantity of current network identification in default risk environment mark, as the first quantity, The quantity that default risk environment is identified judges whether the first quantity and the ratio of the second quantity are greater than first as the second quantity Preset threshold, if so, determine that the network environment meets third risk conditions, so that it is determined that current network environment is dangerous, otherwise, Determine that the network environment is unsatisfactory for third risk conditions, so that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be a2, a3, a4, a5, server is then Using network identity a1 as default risk network identity, and using network identity a2, a3, a4, a5 as default risk environment mark Know.
Server settings third risk conditions are as follows: the quantity of default risk environment that terminal scans mark, and it is all pre- If the ratio of the quantity 4 of risk environment mark is greater than the first preset threshold.
If terminal scanned in the M1 of market to network identity be a1 ', a2, a3, a4, a5 when, terminal is in default risk environment It identifies in a2, a3, a4, a5, determines to include this 4 network identities of current network identification a2, a3, a4, a5, that is, determine default risk The first quantity in environmental labels comprising current network identification is 4.Terminal also determines the second of all default risk environment marks Quantity is 4.Assuming that the first preset threshold is 0.8, terminal determines that the ratio (4/4=1) of the first quantity and the second quantity is greater than the One preset threshold (0.8) then can determine that the network environment of itself meets third risk conditions, to can determine current network environment It is dangerous.
In this way, terminal can also be according to the net even if the network identity a1 of the network itself constructed is changed to a1 ' by attacker Other network identities a2, a3, a4, a5 in network environment in addition to network identity a1 determine that the network environment is dangerous, from And can effectively improve terminal determine the network environment that is presently in whether An Quan accuracy.
In order to further increase terminal determine the network environment that is presently in whether An Quan accuracy, in the application implementation In example, terminal also can determine whether the network environment of itself is full after the network environment for determining itself meets third risk conditions The 4th risk conditions of foot.
4th risk conditions can also be determined and provided to terminal by server.Specifically, the risk case that terminal reports Attribute information further include: each default risk environment that terminal reports identifies corresponding signal strength.
The default risk environment can be identified corresponding signal strength and be used as preset signal strength by server, and determination the Four risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and the default risk environment mark pair The difference for the preset signal strength answered is less than the second preset threshold.
The 4th risk conditions that server determines this are sent to terminal.
Terminal is after the network environment for determining itself meets third risk conditions, further includes: acquisition Current Scan arrives each The signal strength of network, as current signal strength, for each current network identification for including in default risk environment mark, According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current signal strength of the current network identification is judged And whether the difference of preset signal strength is less than the second preset threshold, if so, determining that the network environment of itself meets the 4th risk Condition, thus can determine that current network environment is dangerous, otherwise, it determines the network environment of itself is unsatisfactory for the 4th risk conditions, So that it is determined that current network environment is safe.
For example, it is assumed that steal-number event (risk case) occurs, when steal-number event occurs, to access the net of network in position A Network is identified as a1, terminal position A sweep to but the network identity of network that does not access be respectively a2, a3, a4, a5, network Identifying the corresponding signal strength of a2, a3, a4, a5 is respectively 20dbm, 25dbm, 30dbm, 35dbm.Server is by the network identity A1 is identified as default risk network identity using network identity a2, a3, a4, a5 as default risk environment, by signal strength 20dbm, 25dbm, 30dbm, 35dbm are respectively as the corresponding preset signal strength of a2, a3, a4, a5.
When terminal scanned in the M1 of market to network identity be a1 ', a2 and a3 when, each network identity got is right respectively The current signal strength answered is 15dbm, 14dbm, 18dbm.Obviously, in the network identity that terminal scans, a2 and a3 are default Risk environment mark.The corresponding preset signal strength of default risk environment mark a2 and a3 and current letter that terminal scans Number intensity is as shown in table 2.
Table 2
As shown in Table 2, the corresponding preset signal strength of a2 is 20dbm, and current signal strength 14dbm, a3 is corresponding pre- If signal strength is 25dbm, current signal strength 18dbm.
Assuming that the second preset threshold is 10dbm, after terminal gets the current signal strength of current network identification, according to Table 2 determines the exhausted of the difference for the corresponding preset signal strength of default risk environment mark a2 and current signal strength that Current Scan arrives It is 6dbm to value, the absolute value of the difference of the corresponding preset signal strength of a3 and current signal strength is 7dbm.For a2 and a3, eventually End can determine the difference (6dbm or 7dbm) of preset signal strength and current signal strength less than the second preset threshold (10dbm), from And it can determine the network environment of itself and meet the 4th risk conditions.
In this way, terminal passes through the signal strength of the network scanned, can further determine that whether the network environment of itself is full The 4th risk conditions of foot, thus can further improve terminal determine the network environment that is presently in whether An Quan accuracy.
Certainly, the determination method of network environment provided by the embodiments of the present application, the network environment that terminal can be current in determination When meeting one of condition in the first risk conditions, the second risk conditions, third risk conditions and the 4th risk conditions, or Person determines current network environment safety, which is not described herein again when meeting therein at least two or full terms.
Further, terminal can issue the user with warning information when the network environment for determining itself is dangerous, to mention Showing user's present position, there are risk networks.
Terminal, specifically can be by modes such as output icon, text, voice or vibrations, to user when issuing warning information Issue warning information.
Certainly, terminal can also issue the user with prompt information when the network environment for determining itself is safe, to prompt to use Family current network environment safety.
In view of in practical application scene, when terminal is in, there are the network environments of risk, but do not access the network When risk network in environment, if terminal issues the user with warning information, this can not only make troubles to user, but also waste money Source.
Therefore, in the embodiment of the present application, determined when terminal by step S102 Current Scan to network identity in wrap Containing default risk network identity, so that it is determined that when the network environment of itself is dangerous, method shown in FIG. 1 further include: monitoring is certainly Whether body currently presets the corresponding network of risk network identity (i.e. risk network) to this and has sent access request, if so, can Warning information is issued the user with, prompts user's stopping that terminal is accessed the risk network in time and does not otherwise issue the user with early warning Information.
The above are the determination methods of network environment provided by the embodiments of the present application, are based on same thinking, and the application is implemented Example additionally provides a kind of determining device of network environment, as shown in Figures 2 and 3.
Referring to fig. 2, the determining device of network environment provided by the embodiments of the present application, comprising:
Monitoring modular 21, for monitoring itself network environment;
Judgment module 22, for judging whether the network environment meets preset risk conditions;
Determining module 23, for determining institute when judgment module judges that the network environment meets preset risk conditions It is dangerous to state network environment, and when judgment module judges that the network environment is unsatisfactory for preset risk conditions, determines institute State network environment safety.
Optionally, the monitoring modular 21 is specifically used for: monitoring the current location of itself;
The judgment module 22 is specifically used for: judging whether the current location is default risk position;
The determining module 23 is specifically used for: when the current location is default risk position, determining the network rings Border meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset risk conditions.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that monitoring Current Scan arrives, as current net Network mark;
Whether the judgment module 22 is specifically used for: judging in current network identification comprising at least one default risk network Mark;
The determining module 23 is specifically used for: when including at least one default risk network mark in the current network identification When knowledge, it is determined that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind Dangerous condition.
Optionally, described device further include:
Warning module 24, for monitoring itself to have sent access to the corresponding network of the default risk network identity When request, warning information is issued.
Optionally, the monitoring modular 21 is specifically used for: the mark for each network that Current Scan arrives is obtained, as current net Network mark;
The judgment module 22 is specifically used for: in default risk environment mark, determining the quantity of current network identification, makees For the first quantity;Using the quantity of the default risk environment mark as the second quantity;And judge first quantity and institute Whether the ratio for stating the second quantity is greater than the first preset threshold;
The determining module 23 is specifically used for: presetting when the ratio of first quantity and second quantity is greater than first When threshold value, determine that the network environment meets preset risk conditions, otherwise, it determines the network environment is unsatisfactory for preset wind Dangerous condition.
Optionally, the monitoring modular 21 is specifically used for: the signal strength of each network that Current Scan arrives is obtained, as working as Front signal intensity;
The determining module 23 is specifically used for: for default risk environment mark in include each current network identification, According to the corresponding preset signal strength of the current network identification of preservation, the corresponding current demand signal of the current network identification is determined Intensity and the difference of the preset signal strength are less than the second preset threshold.
Optionally, described device further include:
Warning module 24, for issuing warning information when the determining module 23 determines that the network environment is dangerous.
Referring to Fig. 3, the determining device of network environment provided by the embodiments of the present application, comprising:
Module 31 is obtained, for obtaining the attribute information for the risk case that terminal reports;
Determining module 32, for determining risk conditions according to the attribute information;
Sending module 33 makes the terminal monitor the terminal for the risk conditions to be sent to terminal It when network environment meets the risk conditions, determines that the network environment is dangerous, and monitors that the network environment is discontented When the preset risk conditions of foot, the network environment safety is determined.
Optionally, the module 31 that obtains is specifically used for: the generation position for the risk case that terminal reports is obtained, as pre- If risk position;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the position of terminal is the default risk position It sets.
Optionally, the module 31 that obtains is specifically used for: obtaining accessed network when the risk case that terminal reports occurs Corresponding network identity, as default risk network identity;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: includes in the network identity that terminal scans At least one described default risk network identity.
Optionally, the module 31 that obtains is specifically used for: obtain when the risk case that reports of terminal occurs it is that it is scanned, But the network identity for the network not accessed is identified as default risk environment;
The determining module 32 is specifically used for, and determines the risk conditions are as follows: the default risk environment mark that terminal scans The ratio of the quantity of the quantity of knowledge and all default risk environment marks is greater than the first preset threshold.
Optionally, the attribute information of the risk case, further includes: each default risk environment mark that terminal reports corresponds to Signal strength;
The determining module 32 is specifically used for, and the default risk environment is identified corresponding signal strength as default letter Number intensity;Determine the risk conditions are as follows: the default risk environment that terminal scans identifies corresponding signal strength and this is default Risk environment identifies the difference of corresponding preset signal strength less than the second preset threshold.
In conclusion network environment provided by the embodiments of the present application determines method, the network environment of terminal monitoring itself, and Judge whether the network environment meets preset risk conditions, if so, determining that the network environment is dangerous, otherwise, it determines institute State network environment safety.In this way, the user in current network environment could be aware that whether the network environment is safe, and one As all terminal will not be accessed in unsafe network environment easily, in this way, can effectively avoid user in the net for not knowing itself Network environment accesses risk network whether in the case where safety, by terminal, and then can effectively improve the safety of user information.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including element There is also other identical elements in process, method, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above is only embodiments herein, are not intended to limit this application.To those skilled in the art, Various changes and changes are possible in this application.It is all within the spirit and principles of the present application made by any modification, equivalent replacement, Improve etc., it should be included within the scope of the claims of this application.

Claims (24)

1. a kind of method for connecting network characterized by comprising
Determine whether to issue network insertion request;
If so, determining current network environment;The network environment include position data and/or the network identity scanned and/or The signal strength of the network scanned;
Determine the network environment with the presence or absence of risk according to whether the network environment meets risk conditions;If so, issuing Warning information;
And/or
It determines according to whether the network environment meets risk conditions with the presence or absence of risk network in the network environment, if so, Then warning information is being issued before establishing connection with the risk network and/or when establishing connection.
2. the method as described in claim 1, which is characterized in that
The risk conditions include:
Current location is located at default risk position;
And/or
Current Scan is to default risk network identity;
And/or
It is scanned when risk case is occurred but the network not accessed is identified as default risk environment, the risk conditions packet It includes:
It is default that the ratio of the default risk environment mark that Current Scan arrives and all default risk environment mark quantity is greater than first Threshold value;
And/or
The difference for the preset signal strength that default risk environment that Current Scan arrives mark is identified with the default risk environment is less than the Two preset thresholds.
3. method according to claim 1 or 2, which is characterized in that
Determine that the network environment includes: with the presence or absence of risk according to whether the network environment meets risk conditions
If the network environment meets risk conditions, it is determined that there are risks for the network environment;
And/or
Whether meet risk conditions according to the network environment and determines that whether there is risk network in the network environment includes:
The network for meeting risk conditions is determined as risk network.
4. method according to claim 1 or 2, which is characterized in that if it is determined that there are risks for the network environment, issued There are risk networks for prompting current location for warning information;
And/or
If there are risk networks in the network environment, when having sent access request to the risk network, early warning letter is issued Breath.
5. a kind of method for connecting network characterized by comprising
Determine current network environment;The network environment includes that position data and/or the network identity scanned and/or scanning are arrived Network signal strength;
Determine the network environment with the presence or absence of risk according to whether the network environment meets risk conditions;If so, issuing Warning information;
And/or
It determines according to whether the network environment meets risk conditions with the presence or absence of risk network in the network environment, if so, Then warning information is being issued before establishing connection with the risk network and/or when establishing connection.
6. a kind of method for connecting network, which is characterized in that
The attribute information of risk case is reported to server, so that the server is true according to the attribute information of the risk case Determine risk conditions;The attribute information includes position data and/or the network identity scanned and/or default risk environment mark Signal strength, wherein the default risk environment is identified as the network that is scanned but does not access when risk case occurs;
Obtain the risk conditions;
Determine whether to issue network insertion request, if so, determining current network environment;
Determine the network environment with the presence or absence of risk according to whether the network environment meets risk conditions;If so, issuing Warning information;
And/or
It determines according to whether the network environment meets risk conditions with the presence or absence of risk network in the network environment, if so, Then warning information is being issued before establishing connection with the risk network and/or when establishing connection.
7. method as claimed in claim 6, which is characterized in that the network environment includes position data and/or scans The signal strength of network identity and/or the network scanned.
8. method as claimed in claim 6, which is characterized in that
The risk conditions include:
Current location is located at default risk position;
And/or
Current Scan is to default risk network identity;
And/or
It is default that the ratio of the default risk environment mark that Current Scan arrives and all default risk environment mark quantity is greater than first Threshold value;
And/or
The difference for the preset signal strength that default risk environment that Current Scan arrives mark is identified with the default risk environment is less than the Two preset thresholds.
9. the method as described in any one of claim 6 to 8, which is characterized in that
Determine that the network environment includes: with the presence or absence of risk according to whether the network environment meets risk conditions
If the network environment meets risk conditions, it is determined that there are risks for the network environment;
And/or
Whether meet risk conditions according to the network environment and determines that whether there is risk network in the network environment includes:
The network for meeting risk conditions is determined as risk network.
10. the method as described in any one of claim 6 to 8, which is characterized in that if it is determined that there are wind for the network environment Danger, there are risk networks for prompting current location for the warning information issued;
And/or
If there are risk networks in the network environment, when having sent access request to the risk network, early warning letter is issued Breath.
11. a kind of method for connecting network, which is characterized in that
Receive risk case attribute information, the attribute information include position data and/or the network identity scanned and/or The signal strength of default risk environment mark, wherein the default risk environment is identified as when risk case occurs and is scanned But the network not accessed;
Risk conditions are determined according to the attribute information;
The risk conditions are sent to terminal, so that terminal determines network environment with the presence or absence of risk according to the risk conditions And/or it is determined in network environment according to the risk conditions with the presence or absence of risk network.
12. method as claimed in claim 11, which is characterized in that determine that risk conditions include: according to the attribute information
Default risk position is determined according to the position data, and terminal is located at default risk position as the first risk conditions;
And/or
The network identity of accessed network scans terminal to default as default risk network identity when risk case is occurred Risk network identity is as the second risk conditions;
And/or
It is pre- that the ratio of the default risk environment mark that terminal is scanned and all default risk environment mark quantity is greater than first If threshold value is as third risk conditions;
And/or
The difference of the preset signal strength of default risk environment mark and the default risk environment mark that terminal scans is less than Second preset threshold is as the 4th risk conditions.
13. a kind of network connection device characterized by comprising
Determining module is requested, is used to determine whether to issue network insertion request;
Network environment determining module, if determining current network environment for issuing network insertion request;The network environment includes The signal strength for the network that position data and/or the network identity scanned and/or scanning are arrived;
Risk determining module, for determining that the network environment whether there is according to whether the network environment meets risk conditions Risk;And/or for determining in the network environment according to whether the network environment meets risk conditions with the presence or absence of risk Network;
Warning module, for there are issue warning information when risk in the network environment;And/or if it is used for the network rings There are risk networks in border, are issuing warning information before establishing connection with the risk network and/or when establishing connection.
14. device as claimed in claim 13, which is characterized in that
The risk conditions include:
Current location is located at default risk position;
And/or
Current Scan is to default risk network identity;
And/or
It is scanned when risk case is occurred but the network not accessed is identified as default risk environment, the risk conditions packet It includes:
It is default that the ratio of the default risk environment mark that Current Scan arrives and all default risk environment mark quantity is greater than first Threshold value;
And/or
The difference for the preset signal strength that default risk environment that Current Scan arrives mark is identified with the default risk environment is less than the Two preset thresholds.
15. device according to claim 13 or 14, which is characterized in that whether meet risk conditions according to the network environment Determine that the network environment includes: with the presence or absence of risk
If the network environment meets risk conditions, it is determined that there are risks for the network environment;
And/or
Whether meet risk conditions according to the network environment and determines that whether there is risk network in the network environment includes:
The network for meeting risk conditions is determined as risk network.
16. device according to claim 13 or 14, which is characterized in that if it is determined that there are risks for the network environment, sent out There are risk networks for prompting current location for warning information out;
And/or
The warning module is used for: if there are risk network in the network environment, when having sent access to the risk network When request, warning information is issued.
17. a kind of network connection device characterized by comprising
Network environment determining module, for determining current network environment;The network environment includes that position data and/or scanning are arrived Network identity and/or the signal strength of network that arrives of scanning;
Risk determining module, for determining that the network environment whether there is according to whether the network environment meets risk conditions Risk;And/or for determining in the network environment according to whether the network environment meets risk conditions with the presence or absence of risk Network;
Warning module, for there are issue warning information when risk in the network environment;And/or if it is used for the network rings There are risk networks in border, are issuing warning information before establishing connection with the risk network and/or when establishing connection.
18. a kind of network connection device characterized by comprising
Risk reporting module, for reporting the attribute information of risk case to server, so that the server is according to the wind The attribute information of dangerous event determines risk conditions;The attribute information include position data and/or the network identity scanned and/ Or the signal strength of default risk environment mark, wherein the default risk environment is identified as scanned when risk case occurs To but the network that does not access;
Risk conditions obtain module, for obtaining the risk conditions;
Determining module is requested, is used to determine whether to issue network insertion request;
Network environment determining module, if determining current network environment for issuing network insertion request;
Risk determining module, for determining that the network environment whether there is according to whether the network environment meets risk conditions Risk;And/or for determining in the network environment according to whether the network environment meets risk conditions with the presence or absence of risk Network;
Warning module, for there are issue warning information when risk in the network environment;And/or if it is used for the network rings There are risk networks in border, are issuing warning information before establishing connection with the risk network and/or when establishing connection.
19. device as claimed in claim 18, which is characterized in that the network environment includes that position data and/or scanning are arrived Network identity and/or the signal strength of network that arrives of scanning.
20. device as claimed in claim 18, which is characterized in that
The risk conditions include:
Current location is located at default risk position;
And/or
Current Scan is to default risk network identity;
And/or
It is default that the ratio of the default risk environment mark that Current Scan arrives and all default risk environment mark quantity is greater than first Threshold value;
And/or
The difference for the preset signal strength that default risk environment that Current Scan arrives mark is identified with the default risk environment is less than the Two preset thresholds.
21. the device as described in any one of claim 18 to 20, which is characterized in that
Determine that the network environment includes: with the presence or absence of risk according to whether the network environment meets risk conditions
If the network environment meets risk conditions, it is determined that there are risks for the network environment;
And/or
Whether meet risk conditions according to the network environment and determines that whether there is risk network in the network environment includes:
The network for meeting risk conditions is determined as risk network.
22. the device as described in any one of claim 18 to 20, which is characterized in that if it is determined that there are wind for the network environment Danger, there are risk networks for prompting current location for the warning information issued;
And/or
The warning module is used for: if there are risk network in the network environment, when having sent access to the risk network When request, warning information is issued.
23. a kind of network connection device characterized by comprising
Risk receiving module, for receiving the attribute information of risk case, the attribute information includes position data and/or scanning The signal strength of the network identity arrived and/or default risk environment mark, wherein the default risk environment is identified as risk thing The network that part is scanned but does not access when occurring;
Risk conditions determining module, for determining risk conditions according to the attribute information;
Risk conditions sending module, for sending the risk conditions to terminal, so that terminal is determined according to the risk conditions Network environment determines in network environment with the presence or absence of risk and/or according to the risk conditions with the presence or absence of risk network.
24. device as claimed in claim 23, which is characterized in that determine that risk conditions include: according to the attribute information
Default risk position is determined according to the position data, and terminal is located at default risk position as the first risk conditions;
And/or
The network identity of accessed network scans terminal to default as default risk network identity when risk case is occurred Risk network identity is as the second risk conditions;
And/or
It is pre- that the ratio of the default risk environment mark that terminal is scanned and all default risk environment mark quantity is greater than first If threshold value is as third risk conditions;
And/or
The difference of the preset signal strength of default risk environment mark and the default risk environment mark that terminal scans is less than Second preset threshold is as the 4th risk conditions.
CN201811507594.XA 2014-11-07 2014-11-07 Network connection method and device Active CN109962826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811507594.XA CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201410643984.5A CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment
CN201811507594.XA CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201410643984.5A Division CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Publications (2)

Publication Number Publication Date
CN109962826A true CN109962826A (en) 2019-07-02
CN109962826B CN109962826B (en) 2022-07-26

Family

ID=55887161

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201811507594.XA Active CN109962826B (en) 2014-11-07 2014-11-07 Network connection method and device
CN201410643984.5A Active CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201410643984.5A Active CN105577466B (en) 2014-11-07 2014-11-07 A kind of determination method and device of network environment

Country Status (2)

Country Link
CN (2) CN109962826B (en)
HK (1) HK1224104A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106686544B (en) * 2016-09-06 2019-07-16 腾讯科技(深圳)有限公司 A kind of location-based information early warning method, terminal and system
CN114598543B (en) * 2019-01-16 2023-06-23 创新先进技术有限公司 Network environment monitoring method, system, device and electronic equipment
CN115361470B (en) * 2022-08-26 2024-02-27 中国银行股份有限公司 Method and device for limiting mobile terminal APP operation network environment

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003079214A1 (en) * 2002-03-11 2003-09-25 Goldman, Sachs & Co. Network access risk management
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US20050254652A1 (en) * 2002-07-16 2005-11-17 Haim Engler Automated network security system and method
US20080291007A1 (en) * 2006-12-28 2008-11-27 Vodafone Group Plc Method for improving traffic safety by means of using beacons
US20100062791A1 (en) * 2008-09-08 2010-03-11 Huawei Technologies Co., Ltd. Method of location positioning and verification of an ap, system, and home register
CN101789880A (en) * 2010-01-22 2010-07-28 中国电信股份有限公司 Method for realizing uplink QoS (Quality of Service) based on IP access network and multi-service access gateway
US20120003958A1 (en) * 2010-07-02 2012-01-05 Research In Motion Limited Method and system for data session establishment
CN102638459A (en) * 2012-03-23 2012-08-15 腾讯科技(深圳)有限公司 Authentication information transmission system, authentication information transmission service platform and authentication information transmission method
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signals
US20130212680A1 (en) * 2012-01-12 2013-08-15 Arxceo Corporation Methods and systems for protecting network devices from intrusion
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device
US20130331101A1 (en) * 2012-06-08 2013-12-12 Tito Thomas Automatically Modifying Wireless Network Connection Policies Based on User Activity Levels
CN103621132A (en) * 2013-06-25 2014-03-05 华为技术有限公司 Network monitoring method and device
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
WO2014067040A1 (en) * 2012-10-29 2014-05-08 Intel Corporation Method and apparatus for safe network access point detection
CN104065539A (en) * 2014-07-09 2014-09-24 武汉安问科技发展有限责任公司 Method for monitoring unauthorized network equipment based on application behaviors

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7486666B2 (en) * 2005-07-28 2009-02-03 Symbol Technologies, Inc. Rogue AP roaming prevention
US8655312B2 (en) * 2011-08-12 2014-02-18 F-Secure Corporation Wireless access point detection

Patent Citations (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2003079214A1 (en) * 2002-03-11 2003-09-25 Goldman, Sachs & Co. Network access risk management
US20030232598A1 (en) * 2002-06-13 2003-12-18 Daniel Aljadeff Method and apparatus for intrusion management in a wireless network using physical location determination
US20050254652A1 (en) * 2002-07-16 2005-11-17 Haim Engler Automated network security system and method
US20080291007A1 (en) * 2006-12-28 2008-11-27 Vodafone Group Plc Method for improving traffic safety by means of using beacons
US20100062791A1 (en) * 2008-09-08 2010-03-11 Huawei Technologies Co., Ltd. Method of location positioning and verification of an ap, system, and home register
CN101789880A (en) * 2010-01-22 2010-07-28 中国电信股份有限公司 Method for realizing uplink QoS (Quality of Service) based on IP access network and multi-service access gateway
US20120003958A1 (en) * 2010-07-02 2012-01-05 Research In Motion Limited Method and system for data session establishment
US20130212680A1 (en) * 2012-01-12 2013-08-15 Arxceo Corporation Methods and systems for protecting network devices from intrusion
CN102638459A (en) * 2012-03-23 2012-08-15 腾讯科技(深圳)有限公司 Authentication information transmission system, authentication information transmission service platform and authentication information transmission method
US20130331101A1 (en) * 2012-06-08 2013-12-12 Tito Thomas Automatically Modifying Wireless Network Connection Policies Based on User Activity Levels
WO2014067040A1 (en) * 2012-10-29 2014-05-08 Intel Corporation Method and apparatus for safe network access point detection
CN103347116A (en) * 2012-11-09 2013-10-09 北京深思洛克软件技术股份有限公司 System and method for setting multi-security modes in smart phone
CN103167488A (en) * 2013-03-25 2013-06-19 北京奇虎科技有限公司 Method and device for prompting Wi-Fi signals
WO2014154069A1 (en) * 2013-03-25 2014-10-02 北京奇虎科技有限公司 Method and device for prompting wi-fi signal
CN103368941A (en) * 2013-04-22 2013-10-23 北京奇虎科技有限公司 User network access scenario-based protection method and device
CN103621132A (en) * 2013-06-25 2014-03-05 华为技术有限公司 Network monitoring method and device
CN103648094A (en) * 2013-11-19 2014-03-19 华为技术有限公司 Method, device and system for detecting illegal wireless access point
CN104065539A (en) * 2014-07-09 2014-09-24 武汉安问科技发展有限责任公司 Method for monitoring unauthorized network equipment based on application behaviors

Also Published As

Publication number Publication date
CN105577466A (en) 2016-05-11
CN109962826B (en) 2022-07-26
HK1224104A1 (en) 2017-08-11
CN105577466B (en) 2018-12-21

Similar Documents

Publication Publication Date Title
KR101823562B1 (en) A system and method for registering network information strings
US9712962B2 (en) Public and private geo-fences
CN109302434B (en) Prompt message pushing method and device, service platform and storage medium
EP3544336B1 (en) Information transmission
WO2016034063A1 (en) Method and client for processing malicious short message based on pseudo base station
US10043365B2 (en) Position information prompting method, device and system
US20120215898A1 (en) Applications of a Network-Centric Information Distribution Platform on the Internet
US20150334676A1 (en) Managing Wireless Beacon Devices
CN104834999B (en) Commodity based on cloud, which are traced to the source and consumed, flows to statistical analysis technique and system
CN105391803A (en) Message pushing method and device
US11790257B2 (en) Incident prediction system
US10638270B2 (en) Location-based wireless tracking
CN112788042B (en) Method for determining device identifier of Internet of things and device of Internet of things
CN103235915A (en) Network application program processing method and mobile terminal thereof
RU2012148695A (en) DEVICE AND METHOD FOR TRANSITION FROM A SERVICING NETWORK NODE THAT SUPPORTS AN EXTENDED SECURITY CONTEXT TO A HEREDITARY SERVICE NETWORK NODE
CN105577466B (en) A kind of determination method and device of network environment
US10509100B1 (en) Asset tracking
CN101909298A (en) Secure access control method and device for wireless network
CN106412819A (en) Method and device for positioning device
CN106658665A (en) Method and apparatus for establishing wireless connection
CN105430651A (en) Method and system used for detecting illegal wireless access points
CN106685891A (en) Verification method and apparatus for accessing network
CN108667802A (en) A kind of monitoring method and system of electric power application network safety
CN106815734A (en) A kind of information transferring method and device
CN109729159B (en) Method and device for reminding loss of network equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

Effective date of registration: 20201013

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Applicant before: Advanced innovation technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant