CN112291788B - Data processing method, device, storage medium, terminal and network access point equipment - Google Patents

Data processing method, device, storage medium, terminal and network access point equipment Download PDF

Info

Publication number
CN112291788B
CN112291788B CN202011272856.6A CN202011272856A CN112291788B CN 112291788 B CN112291788 B CN 112291788B CN 202011272856 A CN202011272856 A CN 202011272856A CN 112291788 B CN112291788 B CN 112291788B
Authority
CN
China
Prior art keywords
data
access point
network access
terminal
point device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011272856.6A
Other languages
Chinese (zh)
Other versions
CN112291788A (en
Inventor
刘伟
彭昊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Oppo Mobile Telecommunications Corp Ltd
Original Assignee
Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Oppo Mobile Telecommunications Corp Ltd filed Critical Guangdong Oppo Mobile Telecommunications Corp Ltd
Priority to CN202011272856.6A priority Critical patent/CN112291788B/en
Publication of CN112291788A publication Critical patent/CN112291788A/en
Priority to PCT/CN2021/115404 priority patent/WO2022100209A1/en
Application granted granted Critical
Publication of CN112291788B publication Critical patent/CN112291788B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • H04W12/088Access security using filters or firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications

Abstract

The application discloses a data processing method, a data processing device, a storage medium, a terminal and network access point equipment. The data processing method may include: adding a preset identifier for the data; sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification; and receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data. The data security of the terminal can be improved.

Description

Data processing method, device, storage medium, terminal and network access point equipment
Technical Field
The present application belongs to the field of communications technologies, and in particular, to a data processing method, an apparatus, a storage medium, a terminal, and a network access point device.
Background
Users often need to use terminals to access the network. At present, the network security of the terminal is more and more emphasized by users, for example, when the terminal is connected to a public Wi-Fi hotspot, the risk of network attack exists. However, terminals such as smart phones and tablet computers are weak in security detection capability, and are prone to potential safety hazards.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, a storage medium, a terminal and a network access point device, which can improve the data security of the terminal.
In a first aspect, an embodiment of the present application provides a data processing method, which is applied to a terminal, and includes:
adding a preset identifier for the data;
sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification;
and receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
In a second aspect, an embodiment of the present application provides a data processing method, which is applied to a network access point device, and includes:
receiving data from a terminal;
if the data is detected to have the preset identification, performing safety detection on the data;
sending the security detection result of the data to the terminal
In a third aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a terminal, and includes:
the generating module is used for adding a preset identifier to the data;
the first sending module is used for sending the data to network access point equipment connected with the terminal so that the network access point equipment can carry out security detection on the data according to the preset identification;
a first receiving module, configured to receive a prompt message from the network access point device, where the prompt message is used to prompt a security detection result of the data.
In a fourth aspect, an embodiment of the present application provides a data processing apparatus, which is applied to a network access point device, and includes:
a second receiving module, configured to receive data from a terminal;
the detection module is used for carrying out safety detection on the data if the data is detected to have a preset identifier;
and the second sending module is used for sending the safety detection result of the data to the terminal.
In a fifth aspect, an embodiment of the present application provides a storage medium, on which a computer program is stored, and when the computer program is executed on a computer, the computer is caused to execute a flow in the data processing method provided in the first aspect of the embodiment of the present application, or the computer is caused to execute a flow in the data processing method provided in the second aspect of the embodiment of the present application.
In a sixth aspect, an embodiment of the present application further provides a terminal, including a memory and a processor, where the processor executes a flow in the data processing method provided in the first aspect of the present application by calling a computer program stored in the memory.
In a seventh aspect, an embodiment of the present application provides a network access point device, including a memory and a processor, where the processor executes a flow in the data processing method provided in the second aspect of the embodiment of the present application by calling a computer program stored in the memory.
In the embodiment of the application, the terminal can add the preset identifier to the data and then send the data to the network access point device connected with the terminal, so that the network access point device can perform security detection on the data based on the preset identifier. The terminal may then receive a prompt from the network access point device, where the prompt may be used to prompt the terminal to send a security detection result of the data with the preset identifier. According to the embodiment of the application, the security detection capability of the network access point equipment can be utilized to perform security detection on the data of the terminal, and the security detection result is fed back to the terminal. Therefore, the data security of the terminal can be improved.
Drawings
The technical solutions and advantages of the present application will become apparent from the following detailed description of specific embodiments of the present application when taken in conjunction with the accompanying drawings.
Fig. 1 is a schematic flowchart of a first data processing method according to an embodiment of the present application.
Fig. 2 is a second flowchart of a data processing method according to an embodiment of the present application.
Fig. 3 is a third flowchart illustrating a data processing method according to an embodiment of the present application.
Fig. 4 to fig. 6 are schematic scene diagrams of a data processing method according to an embodiment of the present application.
Fig. 7 is a fourth flowchart illustrating a data processing method according to an embodiment of the present application.
Fig. 8 is a schematic diagram of a first structure of a data processing apparatus according to an embodiment of the present application.
Fig. 9 is a schematic diagram of a second structure of a data processing apparatus according to an embodiment of the present application.
Fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present application.
Fig. 11 is another schematic structural diagram of a terminal according to an embodiment of the present application.
Fig. 12 is a schematic structural diagram of a network access point device according to an embodiment of the present application.
Detailed Description
Reference is made to the drawings, wherein like reference numerals refer to like elements, which are illustrated in the various figures, and which are implemented in a suitable computing environment. The following description is based on illustrated embodiments of the application and should not be taken as limiting the application with respect to other embodiments that are not detailed herein.
Referring to fig. 1, fig. 1 is a first flowchart illustrating a data processing method according to an embodiment of the present disclosure. It is understood that the execution subject of the embodiment of the present application may be a terminal such as a smart phone or a tablet computer.
The process provided by the embodiment of the application may include:
101. and adding a preset identifier for the data.
Users often need to use terminals to access the network. At present, the network security of the terminal is more and more emphasized by users, for example, when the terminal is connected to a public Wi-Fi hotspot, the risk of network attack exists. However, terminals such as smart phones and tablet computers are weak in security detection capability, and are prone to potential safety hazards. For example, if a computer virus exists on the terminal, data sent by the terminal to the network may be hijacked by the computer virus, thereby causing information leakage.
In this embodiment, for example, the terminal may add a preset identifier to data that needs to be sent to the network. In the embodiment of the present application, the terminal may be a device without security detection capability. For example, the terminal is not installed with security detection software such as antivirus software.
102. And sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification.
For example, after adding a preset identifier to data that needs to be sent to a network, the terminal may send the data to a network access point device connected to the terminal, so that the network access point device may perform security detection on the data according to the preset identifier. The network access point device may be a Wi-Fi Access Point (AP) or the like. Also, the network access point device may be a device with security detection capabilities, e.g., the network access point device may be a device with antivirus software installed.
It is to be understood that a network access point device is a device that provides network access services for a terminal, i.e. the terminal is connected to the network via the network access point device. The data sent by the terminal to the network is sent to the network access point device first, and then the data is sent to the network by the network access point device. The data fed back to the terminal by the network is received by the network access point equipment and then is sent to the terminal by the network access point equipment.
After receiving the data sent by the terminal, the network access point device may detect whether the data carries a preset identifier.
If the data is detected to carry the preset identification, the network access point equipment can carry out security detection on the data, so that whether the data carries viruses, trojans and the like is detected. If the data is detected to carry viruses, trojans and the like, the data is indicated to be unsafe data. In this case, the network access point device may send a prompt to the terminal, which may be used to prompt the terminal that the data it sends is not secure. If the data is detected to be safe data, the network access point device may send the data to the network, and send a prompt message to the terminal, where the prompt message may be used to prompt the terminal that the data sent by the terminal is safe.
If the data is detected not to carry the preset identification, the network access point equipment does not carry out security detection on the data and sends the data to the network.
103. And receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
For example, the terminal may receive a prompt message from the network access point device, where the prompt message may be used to prompt the terminal to send a security detection result of data with a preset identifier.
For example, if the network access point device detects that the data sent by the terminal carries malicious programs such as viruses and trojans, the network access point device may send the prompt message to the terminal. The terminal may receive the prompt message from the network access point device, where the prompt message may be used to prompt that the data with the preset identifier sent by the terminal is unsafe, so that the terminal and a user thereof may know that the sent data is unsafe data and need to perform security detection on the terminal.
For another example, if the network access point device detects that the data with the preset identifier sent by the terminal is the security data, the network access point device may send a prompt message to the terminal. The terminal may receive a prompt message from the network access point device, where the prompt message may be used to prompt the terminal to secure the data with the preset identifier.
It can be understood that, in the embodiment of the present application, the terminal may add a preset identifier to the data and then send the data to the network access point device connected to the terminal, so that the network access point device may perform security detection on the data based on the preset identifier. The terminal may then receive a prompt from the network access point device, where the prompt may be used to prompt the terminal to send a security detection result of the data with the preset identifier. According to the embodiment of the application, the security detection capability of the network access point equipment can be utilized to perform security detection on the data of the terminal, and the security detection result is fed back to the terminal. Therefore, the data security of the terminal can be improved.
Referring to fig. 2, fig. 2 is a second flowchart illustrating a data processing method according to an embodiment of the present disclosure. The data processing method can be applied to a terminal.
The flow of the data processing method provided by the embodiment of the application may include:
201. when the terminal is connected to the network access point device, if the fact that the network access point device can perform security detection on the received data is determined, the terminal obtains information used as a preset identifier.
For example, when the terminal is connected to the network access point device, the terminal may perform communication negotiation with the network access point device to determine whether the network access point device can perform security detection on the received data, and when the network access point device can perform security detection on the received data, the terminal may obtain information used as the preset identifier. The network access point device may be a device such as a wireless access point of a Wi-Fi network, among others.
For example, the terminal may determine whether the network access point device has the capability of performing security detection on the received data through communication negotiation with the network access point device when establishing a connection with the network access point device. For example, the terminal and the network access point device perform communication negotiation using a DHCP message, so that the network access point device can write information indicating whether the network access point device has the capability of performing security detection on the received data into the DHCP message, and after receiving the DHCP message sent by the network access point device, the terminal can learn whether the network access point device has the capability of performing security detection on the received data by analyzing the DHCP message. In one embodiment, optional parameter fields (Options) of the DHCP messages may be used to indicate whether the network access point device has the capability to perform security detection on the received data. For example, a value of 1 in an optional parameters field (Options) of the DHCP message may indicate that the network access point device has the capability of performing security detection on the received data. When the value of the optional parameter field (Options) of the DHCP message is 0, it may indicate that the network access point device does not have the capability of performing security detection on the received data.
In other embodiments, fields in other types of messages may also be used to carry information whether the network access point device has the capability to perform security detection on received data. For example, an extension field in an 802.11 protocol message may be used to indicate whether the network access point device has the capability of performing security detection on received data, and so on.
In an embodiment Of the present application, the information used as the preset identifier may include a value Of a Type Of Service (TOS) field.
In one embodiment, the information for use as the preset identification may be specified by the network access point device. For example, information for being a preset identification may be stored in advance in the network access point device. Then, when connecting to the network access point device, the terminal may negotiate with the network access point device to determine whether the network access point device can perform security detection on the received data, and when the network access point device can perform security detection on the received data, the terminal acquires information serving as a preset identifier from the network access point device. Or, when the information used as the preset identifier needs to be issued to the terminal, the network access point device may immediately generate information used as the preset identifier and send the information to the terminal for use.
In another embodiment, the information used as the preset identifier may also be generated by negotiation between the network access point device and the terminal. For example, when connecting to a network access point device, a terminal may negotiate with the network access point device to determine whether the network access point device can perform security detection on received data, and when the network access point device can perform security detection on received data, the terminal may negotiate with the network access point device for information serving as a preset identifier, and so on.
It can be understood that, the manner of generating the information used as the preset identifier immediately or by negotiation may make the information used as the preset identifier not be fixed, thereby further improving data security.
202. And the terminal acquires the security level of the data.
203. And if the safety level of the data is higher than the preset level, the terminal adds a preset identifier for the data.
For example, through communication negotiation with the network access point device, the terminal determines that the network access point device has the capability of performing security detection on the received data. In this case, when data needs to be transmitted, the terminal may first acquire the security level of the data. Thereafter, the terminal may detect whether the security level of the data is higher than a preset level.
In one embodiment, the security level of the data may be obtained by:
the terminal determines an application program for generating data;
the terminal acquires a preset security level for the application program;
the terminal determines the security level of the application as the security level of the data.
For example, the terminal may first determine the application that generated the data. For example, the game data is generated by game application a, the payment data is generated by cell phone banking application B, and so on. Then, the terminal may obtain a security level preset for the application program, and determine the security level of the application program as the security level of the data.
For example, if the security level set in advance by the terminal for the mobile banking application B is one level, the security level of the data generated by the mobile banking application B is also one level. The security level that the terminal previously set for the instant communication application C is second level, and then the security level of the data generated by the instant communication application C is also second level. The security level that the terminal has set for online video playback application D in advance is three levels, and then the security level of the data generated by online video playback application D is also three levels, and so on. Wherein, the safety level of the first level, the second level and the third level can be reduced in sequence.
If the security level of the data is detected to be higher than the preset level, the data can be regarded as data needing security protection. For example, the data belongs to data of payment information, and the payment information relates to information such as a bank account and a payment password of a user, so that security protection needs to be performed on the data. In this case, the terminal may add a preset identifier to the data. For example, the terminal may add a TOS value agreed with the network access point device for the data. Thereafter, the process proceeds to step 204.
If the security level of the data is detected not to be higher than the preset level, the data can be regarded as ordinary data, and security protection can be omitted. In this case, the terminal may directly transmit the data to the network access point device. The network access point device, upon receiving the data, may send the data directly to the network.
204. And the terminal sends the data to the network access point equipment so that the network access point equipment carries out security detection on the data according to the preset identification.
For example, after adding a preset identifier to data to be sent to the network, the terminal may send the data to which the preset identifier is added to the network access point device.
After receiving the data sent by the terminal, the network access point device may detect whether the data includes a preset identifier.
If the data is detected to contain the preset identification, the network access point device can perform security detection on the data. For example, the network access point device may invoke its own security scanning software to perform a security scan on the data, and so on.
If the network access point device detects that the data that the terminal needs to send to the network is safe data through the security scanning, the network access point device can send the data to the network and feed back the security detection result of the data to the terminal.
If the network access point device detects, through security scanning, that data that the terminal needs to send to the network is unsafe data, for example, detects that malicious programs such as computer viruses, trojans, and the like exist in the data, the network access point device may feed back, to the terminal, information that the data it sends is unsafe data.
If the preset identification is not detected to be contained in the data, the network access point device can directly send the data to the network.
205. And the terminal receives prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
For example, the terminal may receive a prompt message from the network access point device, where the prompt message may be used to prompt the terminal to send a security detection result of data with a preset identifier.
If the network access point device detects that the data sent by the terminal is not safe, the network access point device can feed back the information to the terminal. Then, the terminal may receive a prompt message from the network access point device, where the prompt message may be used to prompt that the data sent by the terminal and having the preset identifier is unsafe, so that the terminal and a user thereof may know that the sent data is unsafe data and need to perform security detection on the terminal.
For another example, if the network access point device detects that the data with the preset identifier sent by the terminal is the security data, the network access point device may send a prompt message to the terminal. The terminal may receive a prompt message from the network access point device, where the prompt message may be used to prompt the terminal to secure the data with the preset identifier.
Referring to fig. 3, fig. 3 is a third flowchart illustrating a data processing method according to an embodiment of the present disclosure. The data processing method can be applied to network access point equipment.
The flow of the data processing method provided by the embodiment of the application may include:
301. data is received from a terminal.
For example, after a terminal accesses a network access point device, the network access point device may receive data from the terminal that needs to be sent to a network.
Upon receiving the data, the network access point device may detect whether the data has a preset identification.
If the data is detected to have the predetermined identification, then the process proceeds to 302.
If the data is detected to have no preset identification, the network access point device does not perform security detection on the data and sends the data to the network.
302. And if the data is detected to have the preset identification, carrying out safety detection on the data.
For example, if the network access point device detects that data sent by the terminal has a preset identifier, the network access point device may perform security detection on the data. For example, the network access point device may invoke its own security scanning software to perform a security scan on the data.
303. And sending the security detection result of the data to the terminal.
For example, after performing security detection on data with a preset identifier sent by the terminal, the network access point device may feed back a security detection result of the data to the terminal.
For example, if the network access point device detects that the data with the preset identifier, which the terminal needs to send to the network, is unsafe data, the network access point device may send a prompt message to the terminal, where the prompt message may be used to prompt the terminal that the data with the preset identifier sent by the terminal is unsafe.
In one embodiment, if the network access point device detects that the data sent by the terminal is unsafe data, the network access point device may discard the data and not send the data to the network.
For another example, if the network access point device detects that data with the preset identifier, which the terminal needs to send to the network, is safe data, the network access point device may send the data to the network. And the network access point device may send a prompt message to the terminal, where the prompt message may be used to prompt the terminal that the data sent by the terminal has the preset identifier is safe.
Referring to fig. 4 to 6, fig. 4 to 6 are schematic views of a data processing method according to an embodiment of the present disclosure.
For example, the mobile terminal is connected to a Wi-Fi access point. In the process of establishing connection, the mobile terminal and the Wi-Fi access point carry out communication negotiation, and the Wi-Fi access point is determined to be capable of carrying out security detection on received data. And the mobile terminal acquires information used as a preset identifier from the Wi-Fi access point.
For example, a payment-type application in a mobile terminal generates a piece of data that needs to be sent to a server on the network for processing. In this case, since the data of the payment-type application often relates to the bank account number and the payment password of the user, the mobile terminal may add a preset identifier to the data. After adding the preset identifier to the data, the mobile terminal may send the data to the Wi-Fi access point, as shown in fig. 4.
After receiving the data sent by the mobile terminal, the Wi-Fi access point may detect whether the data has a preset identifier.
For example, the Wi-Fi access point detects that the data has a preset identification. In this case, the Wi-Fi access point may invoke its own security scanning software to perform security scanning on the data, and obtain a security scanning result.
If the security scan results reflect that the data is secure data, the Wi-Fi access point can send the data to the network, as shown in FIG. 5. Optionally, the Wi-Fi access point may also send a prompt message to the mobile terminal, where the prompt message may be used to prompt the mobile terminal that the sent data is secure and has the preset identifier.
If the security scanning result reflects that the data is unsafe data, the Wi-Fi access point may send a prompt message to the mobile terminal, where the prompt message may be used to prompt the mobile terminal that the data with the preset identifier sent by the mobile terminal is unsafe, and prompt the mobile terminal to perform security self-check, as shown in fig. 6.
If the Wi-Fi access point detects that the data sent by the mobile terminal does not have the preset identification, the Wi-Fi access point can directly send the data to the network.
The corresponding flow chart of the above embodiment can be shown in fig. 7.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present disclosure. The data processing apparatus can be applied to a terminal. The data processing apparatus 400 may include: a generating module 401, a first sending module 402, a first receiving module 403.
A generating module 401, configured to add a preset identifier to the data.
A first sending module 402, configured to send the data to a network access point device connected to the terminal, so that the network access point device performs security detection on the data according to the preset identifier.
A first receiving module 403, configured to receive, from the network access point device, a prompt message, where the prompt message is used to prompt a security detection result of the data.
In one embodiment, the generating module 401 may be further configured to:
when the network access point equipment is connected, if the fact that the network access point equipment can carry out safety detection on received data is determined, information used as the preset identification is obtained.
In one embodiment, the information for serving as the preset identifier includes a value of a service type field.
In one embodiment, the generating module 401 may be further configured to: acquiring the security level of the data; and if the security level of the data is higher than a preset level, adding a preset identifier for the data.
In one embodiment, the generating module 401 may be further configured to: determining an application program for generating the data; acquiring a safety level preset for the application program; determining a security level of the application as a security level of the data.
Referring to fig. 9, fig. 9 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present disclosure. The data processing apparatus may be applied to a network access point device. The data processing apparatus 500 may include: a second receiving module 501, a detecting module 502 and a second sending module 503.
A second receiving module 501, configured to receive data from the terminal.
A detecting module 502, configured to perform security detection on the data if it is detected that the data has a preset identifier.
A second sending module 503, configured to send the security detection result of the data to the terminal.
In an embodiment, the second sending module 503 is further configured to: and if the data are detected to be unsafe, discarding the data.
The present embodiment provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed on a computer, the computer is caused to execute the flow in the data processing method provided in this embodiment.
The embodiment of the present application further provides a terminal, which includes a memory and a processor, where the processor is configured to execute the flow in the data processing method provided in this embodiment by calling the computer program stored in the memory.
For example, the terminal may be a terminal device such as a tablet computer or a smart phone. Referring to fig. 10, fig. 10 is a schematic structural diagram of a terminal according to an embodiment of the present application.
The terminal 600 may include components such as a display 601, memory 602, processor 603, and the like. Those skilled in the art will appreciate that the terminal structure shown in fig. 10 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The display 601 may be used to display information such as images, text, and the like.
The memory 602 may be used to store applications and data. The memory 602 stores applications containing executable code. The application programs may constitute various functional modules. The processor 603 executes various functional applications and data processing by running an application program stored in the memory 602.
The processor 603 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing an application program stored in the memory 602 and calling data stored in the memory 602, thereby performing overall monitoring of the terminal.
In this embodiment, the processor 603 in the terminal loads the executable code corresponding to the processes of one or more application programs into the memory 602 according to the following instructions, and the processor 603 runs the application programs stored in the memory 602, so as to execute:
adding a preset identifier for the data;
sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification;
and receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
Referring to fig. 11, a terminal 600 may include a display 601, a memory 602, a processor 603, a battery 604, a speaker 605, a microphone 606, and the like.
The display 601 may be used to display information such as images, text, and the like.
The memory 602 may be used to store applications and data. The memory 602 stores applications containing executable code. The application programs may constitute various functional modules. The processor 603 executes various functional applications and data processing by running an application program stored in the memory 602.
The processor 603 is a control center of the terminal, connects various parts of the entire terminal using various interfaces and lines, and performs various functions of the terminal and processes data by running or executing an application program stored in the memory 602 and calling data stored in the memory 602, thereby performing overall monitoring of the terminal.
The battery 604 may be used to provide power support for the various components and modules of the terminal, thereby ensuring proper operation of the various components and modules.
Speaker 605 may be used to play sound signals.
The microphone 606 may be used to capture sound signals in the surrounding environment, such as capturing a user's voice, etc.
In this embodiment, the processor 603 in the terminal loads the executable code corresponding to the processes of one or more application programs into the memory 602 according to the following instructions, and the processor 603 runs the application programs stored in the memory 602, thereby executing:
adding a preset identifier for the data;
sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification;
and receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
In one embodiment, the processor 603 may further perform: when the network access point equipment is connected, if the fact that the network access point equipment can carry out safety detection on received data is determined, information used as the preset identification is obtained.
In one embodiment, the information for serving as the preset identifier includes a value of a service type field.
In one embodiment, the processor 603 may further perform: acquiring the security level of the data; and if the security level of the data is higher than a preset level, adding a preset identifier for the data.
In one embodiment, the processor 603 performs: when the security level of the data is obtained, the following steps may be performed: determining an application program for generating the data; acquiring a preset security level for the application program; determining a security level of the application as a security level of the data.
The embodiment of the present application further provides a network access point device, which includes a memory and a processor, where the processor is configured to execute the flow in the data processing method provided in this embodiment by calling the computer program stored in the memory.
Referring to fig. 12, a network access point device 700 may include a memory 701, a processor 702, and the like. Those skilled in the art will appreciate that the electronic device configuration shown in fig. 12 does not constitute a limitation of the electronic device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
Memory 701 may be used for storing applications and data. The memory 701 stores an application program containing executable code. The application programs may constitute various functional modules. The processor 702 executes various functional applications and data processing by running an application program stored in the memory 701.
The processor 702 is a control center of the electronic device, connects various parts of the entire electronic device using various interfaces and lines, and performs various functions of the electronic device and processes data by running or executing an application program stored in the memory 701 and calling data stored in the memory 701, thereby integrally monitoring the electronic device.
In this embodiment, the processor 702 in the electronic device loads the executable code corresponding to the processes of one or more application programs into the memory 701 according to the following instructions, and the processor 702 runs the application programs stored in the memory 701, so as to execute:
receiving data from a terminal;
if the data is detected to have the preset identification, carrying out safety detection on the data;
and sending the security detection result of the data to the terminal.
In one embodiment, the processor 703 may further perform: and if the data are detected to be unsafe, discarding the data.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed description of the data processing method, which is not described herein again.
The data processing apparatus provided in the embodiment of the present application and the data processing method in the foregoing embodiment belong to the same concept, and any method provided in the data processing method embodiment may be run on the data processing apparatus, and a specific implementation process thereof is described in the data processing method embodiment in detail, and is not described herein again.
It should be noted that, for the data processing method described in the embodiment of the present application, it can be understood by those skilled in the art that all or part of the process of implementing the data processing method described in the embodiment of the present application can be completed by controlling the relevant hardware through a computer program, where the computer program can be stored in a computer-readable storage medium, such as a memory, and executed by at least one processor, and during the execution, the process of the embodiment of the data processing method can be included. The storage medium may be a magnetic disk, an optical disk, a Read Only Memory (ROM), a Random Access Memory (RAM), or the like.
In the data processing apparatus according to the embodiment of the present application, each functional module may be integrated into one processing chip, or each module may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a stand-alone product, may also be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, or the like.
The foregoing detailed description has provided a data processing method, an apparatus, a storage medium, and an electronic device according to embodiments of the present application, and specific examples are applied herein to explain the principles and implementations of the present application, and the descriptions of the foregoing embodiments are only used to help understand the method and the core ideas of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (11)

1. A data processing method is applied to a terminal and is characterized by comprising the following steps:
when the network access point equipment is connected, if the fact that the network access point equipment can carry out safety detection on received data is determined, information used as a preset identifier is obtained from the network access point equipment;
adding a preset identifier to the data according to the information serving as the preset identifier;
sending the data to network access point equipment connected with the terminal so that the network access point equipment carries out security detection on the data according to the preset identification;
and receiving prompt information from the network access point equipment, wherein the prompt information is used for prompting the safety detection result of the data.
2. The data processing method of claim 1, wherein the information for serving as the preset identifier comprises a value of a service type field.
3. The data processing method of claim 1, wherein the method further comprises:
acquiring the security level of the data;
adding a preset identifier for the data comprises the following steps: and if the security level of the data is higher than a preset level, adding a preset identifier to the data.
4. The data processing method of claim 3, wherein the obtaining the security level of the data comprises:
determining an application program for generating the data;
acquiring a preset security level for the application program;
determining a security level of the application as a security level of the data.
5. A data processing method is applied to network access point equipment, and is characterized by comprising the following steps:
when the network access point equipment is connected to a terminal, if the network access point equipment is determined to be capable of carrying out safety detection on received data, sending information used as a preset identifier to the terminal, and receiving the data from the terminal;
if the data is detected to have the preset identification, carrying out safety detection on the data;
and sending the security detection result of the data to the terminal.
6. The data processing method of claim 5, wherein the method further comprises:
and if the data are detected to be unsafe, discarding the data.
7. A data processing device applied to a terminal is characterized by comprising:
the device comprises a determining module and a judging module, wherein the determining module is used for acquiring information used as a preset identifier from a network access point device when the network access point device is connected and if the network access point device is determined to be capable of carrying out security detection on received data;
the generating module is used for adding a preset identifier to the data according to the information serving as the preset identifier;
the first sending module is used for sending the data to network access point equipment connected with the terminal so that the network access point equipment can carry out security detection on the data according to the preset identification;
a first receiving module, configured to receive a prompt message from the network access point device, where the prompt message is used to prompt a security detection result of the data.
8. A data processing apparatus, applied to a network access point device, comprising:
the second receiving module is used for sending information used as a preset identifier to the terminal and receiving data from the terminal if the fact that the network access point equipment can perform security detection on the received data is determined when the network access point equipment is connected to the terminal;
the detection module is used for carrying out safety detection on the data if the data is detected to have a preset identifier;
and the second sending module is used for sending the safety detection result of the data to the terminal.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed on a computer, causes the computer to carry out the method of any one of claims 1 to 4, or causes the computer to carry out the method of any one of claims 5 to 6.
10. A terminal comprising a memory, a processor, wherein the processor performs the method of any one of claims 1 to 4 by invoking a computer program stored in the memory.
11. A network access point device comprising a memory, a processor, wherein the processor performs the method of any one of claims 5 to 6 by invoking a computer program stored in the memory.
CN202011272856.6A 2020-11-13 2020-11-13 Data processing method, device, storage medium, terminal and network access point equipment Active CN112291788B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202011272856.6A CN112291788B (en) 2020-11-13 2020-11-13 Data processing method, device, storage medium, terminal and network access point equipment
PCT/CN2021/115404 WO2022100209A1 (en) 2020-11-13 2021-08-30 Data processing method and apparatus, storage medium, terminal and network access point device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011272856.6A CN112291788B (en) 2020-11-13 2020-11-13 Data processing method, device, storage medium, terminal and network access point equipment

Publications (2)

Publication Number Publication Date
CN112291788A CN112291788A (en) 2021-01-29
CN112291788B true CN112291788B (en) 2023-01-10

Family

ID=74398885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011272856.6A Active CN112291788B (en) 2020-11-13 2020-11-13 Data processing method, device, storage medium, terminal and network access point equipment

Country Status (2)

Country Link
CN (1) CN112291788B (en)
WO (1) WO2022100209A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112291788B (en) * 2020-11-13 2023-01-10 Oppo广东移动通信有限公司 Data processing method, device, storage medium, terminal and network access point equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187395A (en) * 2015-08-10 2015-12-23 济南大学 Method and system for performing malicious software network behavior detection based on access router
CN110710187A (en) * 2018-05-30 2020-01-17 Oppo广东移动通信有限公司 Method and apparatus for flow detection and computer readable storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CA2709651C (en) * 2010-06-07 2011-11-29 Guest Tek Interactive Entertainment Ltd. Hospitality media system operated by mobile device
CN104717653A (en) * 2015-03-12 2015-06-17 惠州Tcl移动通信有限公司 Network connection control method and system of mobile terminal
CN105072045B (en) * 2015-08-10 2018-12-18 济南大学 A kind of wireless router with Malware network behavior ability of discovery
CN106503556A (en) * 2016-10-25 2017-03-15 广东欧珀移动通信有限公司 The method of data storage, apparatus and system
US20190174319A1 (en) * 2017-12-01 2019-06-06 Seven Networks, Llc Detection and identification of potentially harmful applications based on detection and analysis of malware/spyware indicators
CN110035437B (en) * 2018-01-11 2021-02-23 电信科学技术研究院 User plane data security protection method and device
CN111666567A (en) * 2020-06-30 2020-09-15 腾讯科技(深圳)有限公司 Detection method, device, computer program and medium for malicious modification of application program
CN112291788B (en) * 2020-11-13 2023-01-10 Oppo广东移动通信有限公司 Data processing method, device, storage medium, terminal and network access point equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105187395A (en) * 2015-08-10 2015-12-23 济南大学 Method and system for performing malicious software network behavior detection based on access router
CN110710187A (en) * 2018-05-30 2020-01-17 Oppo广东移动通信有限公司 Method and apparatus for flow detection and computer readable storage medium

Also Published As

Publication number Publication date
CN112291788A (en) 2021-01-29
WO2022100209A1 (en) 2022-05-19

Similar Documents

Publication Publication Date Title
US11310239B2 (en) Network connection method, hotspot terminal and management terminal
US11451657B2 (en) Call method of mobile terminal, mobile terminal control method, and related device
CN110392054B (en) Login verification method, device, system, equipment and readable storage medium
JP5899324B2 (en) Method and terminal device for detecting eavesdropping activity
CN105847245B (en) Electronic mailbox login authentication method and device
CN107222936B (en) Data processing method and device and terminal
CN104092542A (en) Account login method, device and system
WO2016000636A1 (en) Communications processing method and system
US9569607B2 (en) Security verification method and apparatus
WO2020156255A1 (en) Payment method, device, system, mobile terminal, payment machine, and server
CN112346751B (en) Application program installation method and device, electronic equipment and storage medium
US10080139B2 (en) Information sending method and apparatus, terminal device, and system
CN107819768B (en) Method for server to actively disconnect illegal long connection, terminal equipment and storage medium
CN112291788B (en) Data processing method, device, storage medium, terminal and network access point equipment
WO2013107301A1 (en) Application processing method and mobile terminal
CN109640277B (en) Short message processing method and device applied to USIM card
CN105577621B (en) Business operation verification method, device and system
CN107743114B (en) Network access method, device and system
CN111148188A (en) Network connection method, device, storage medium and electronic equipment
CN107360634B (en) Data transmission method and device and mobile terminal
CN107809758B (en) SIM card information protection method and device
CN111083694A (en) Application program login method, device, terminal and storage medium
CN111918224B (en) Short message verification method, device, equipment and storage medium
KR102261789B1 (en) Smishing message monitoring method and smishing level determination method
CN114598524B (en) Method, device, equipment and storage medium for detecting agent tool

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant